<updates><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>RHBA-2022:6577</id><title>Samba Bug Fix Update</title><description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es):
* Fix possible crash bug in winbind (BZ#2119058)
</description><issued date="2022-09-20 15:00:20" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-client-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">cacc282e68d55a8a4df7bdd1d389e5c33ff3eefde6ab7fa892c56f1a03c6d7f8</sum></package><package arch="x86_64" name="samba-common-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">2a22d8bf7e49ace37c1836bb6dffc293100d603845800a5a7a00a8934d7307cd</sum></package><package arch="x86_64" name="ctdb-tests" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f8d3f5de5d78d57c24f877ab16955ba73987426e386f8ba993cd7c9bc7a3792a</sum></package><package arch="noarch" name="samba-pidl" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-20.el7_9.noarch.rpm</filename><sum type="sha256">09893b38eca1472f8d54d6ae51d1880e4fd68e7a4271cb71d3ae92e73e68ca8f</sum></package><package arch="x86_64" name="samba" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">7ac313df927797c05b41436e42e604cbd43161be21fd68cdd96d0ecae30d9acf</sum></package><package arch="x86_64" name="libwbclient" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">c5d60bee506bcb302ece1a17611f829ba892e4220d5c8f9c060ff74fc230eb38</sum></package><package arch="noarch" name="samba-common" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-20.el7_9.noarch.rpm</filename><sum type="sha256">44a6459695c6006ad82c374924f9f42f0666af0ffb5ce60c07c6f4ae970bce53</sum></package><package arch="i686" name="samba-winbind-modules" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">df8572b335939df919a32ef8bff3ca1b55651cc8fe2ea023eac2ca4fde67fa00</sum></package><package arch="i686" name="libwbclient" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">19466f49d3d87d055974d9b450b0bfacca1de8a5d7e4a247488f52f48433fb8c</sum></package><package arch="i686" name="samba-client-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">735fb48a6b667643771efd8f4082fde5fee9571925e0b6ba0364f444c094a479</sum></package><package arch="x86_64" name="samba-python-test" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">84c7a9f5130dd17ef7829c5028c94134cebca4eae40d69d47f2fce2381b58eeb</sum></package><package arch="x86_64" name="samba-client" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">abb13fc44bf00e6e8e05a15171a49ad22adf187e18a32c41ec75fa7f9b2048a3</sum></package><package arch="i686" name="libsmbclient-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">661414a845a083cac5b3e441a3b4d217b7f90ad66360c013ea11b525fc51d75a</sum></package><package arch="x86_64" name="samba-winbind-modules" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">15d8c7f0ed898c85e546550b168b365f6cf730c57f9b9986da2a1a4c29d1eff7</sum></package><package arch="i686" name="libsmbclient" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">6f8ce0108a5f7d6346ac6a2aff0a646978840494f6b4a74da36da7fded21c4db</sum></package><package arch="x86_64" name="libwbclient-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">c6e8739d3f7024b2c898c6b7d8ea9e580c0122bc467430c5ea453821822c6bfb</sum></package><package arch="x86_64" name="libsmbclient" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">dc1a9465eb7fb4114846196fe2e5c3d33fbc3975f899338b00ca89592e825e26</sum></package><package arch="i686" name="samba-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">7a6b86056ceb34ad19d83caefe29f0ba504db426f62aaf5d4da89ec59db0268a</sum></package><package arch="i686" name="samba-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">4dd2497954144c5af89e132a94c2108670d0a4c11ca680e0cabe76d4e7502333</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f397cc045c0190a87e463e87f86ae18a178e1aae0b5f60c2694a7751c84d3daf</sum></package><package arch="x86_64" name="libsmbclient-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">3660a1bebf97db29376d4bbc2c74e9e146d91dc0f9255c9f59f9bec430ba0447</sum></package><package arch="x86_64" name="samba-winbind-clients" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">255996be29ce489ef14234d31a7f1bb4db363760379ad326b76900222d95030a</sum></package><package arch="x86_64" name="samba-winbind" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">0633bba0bdbe5435adc07edbb268e2961ea1c47533d4926264ed5861f3561ab4</sum></package><package arch="x86_64" name="samba-test" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">a94585adfd140fc3d138f715ad7c9953a047cd8e750af9ceecd08293f1f375e4</sum></package><package arch="x86_64" name="ctdb" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">46a9e0c3831feec611855045a6424b31e7fd60804974f249b613de9fe2ced97d</sum></package><package arch="x86_64" name="samba-krb5-printing" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">0b38802866912cf2a4cbea96ffa954393582a6de922bb2554ed16975926eec76</sum></package><package arch="x86_64" name="samba-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">5a8440321cd0edde5dcd44d28dfe703e734447b3f2af301b009ffe3f85c6fb9d</sum></package><package arch="x86_64" name="samba-common-tools" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">61a4a9c9929462af1d399b9fbf7974f91a67bf8506124f29447d9931c38ccb84</sum></package><package arch="x86_64" name="samba-python" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f3139f49bed0ef0301fc615f023d797cd653216f38a551e6f6e4fa9e4b4d6398</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">1f076b7c3d04cd7a81c3b287f238b6daf628b3adb75ec1813de275a73e4badac</sum></package><package arch="x86_64" name="samba-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">7e9a75e73ebe7cea8c107131cdd29cc9dc10563c3643388bc6e049002516abef</sum></package><package arch="i686" name="samba-common-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">9dbfa5fd8bb1eb6ed8b84dcd57cd0b1b71c7e20ff7f7ecd44b3b4a6f3866cfde</sum></package><package arch="x86_64" name="samba-dc-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f5d8689b8fc2b40e39898be7390a5f496ed7f04cd4a2035e0456bb06344a9475</sum></package><package arch="i686" name="samba-test-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">91e0191180ab976e905b15cf945888f31ae2a79a3e211d42d366cd23408c416a</sum></package><package arch="i686" name="libwbclient-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">6db2d2f59f78e800c9e2e03c678771f064d1afb70b8fe9cf27edc47b94f119e0</sum></package><package arch="x86_64" name="samba-test-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f42aef1f809c15b39b535bd178d6a76df4068d9e4f3cc1ca9f299d6a7d36f482</sum></package><package arch="i686" name="samba-python" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">0f6fde71a4536f44b6dc4f43b3733a167fa2a745296da54bf854a7e5565968e2</sum></package><package arch="x86_64" name="samba-dc" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">cec3a3e3bf74d55202d85ffb3be0f8c2456381013381e66067f6375101a942eb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6577" id="RHBA-2022:6577" title="Samba Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2119058" id="2119058" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>RHSA-2024:3980</id><title>Important: Flatpak Security Update</title><description>Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Security Fix(es):
* flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
</description><issued date="2024-06-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-builder" release="13.el7_9" src="flatpak-1.0.9-13.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-13.el7_9.x86_64.rpm</filename><sum type="sha256">4c3c8ef224b14e51d92d2a517e700660afd223d2e04db12da4dae7d610d20bfe</sum></package><package arch="x86_64" name="flatpak" release="13.el7_9" src="flatpak-1.0.9-13.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-13.el7_9.x86_64.rpm</filename><sum type="sha256">9fa899d97993d2074421d0d5ea94a2be28bc9a7405a273725d5a4bed03f9d18a</sum></package><package arch="x86_64" name="flatpak-libs" release="13.el7_9" src="flatpak-1.0.9-13.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-13.el7_9.x86_64.rpm</filename><sum type="sha256">1a0e87bb9526df4686c6913d11e7ce6f8ebad3b9c44746906d2467e68ac8ad23</sum></package><package arch="x86_64" name="flatpak-devel" release="13.el7_9" src="flatpak-1.0.9-13.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-13.el7_9.x86_64.rpm</filename><sum type="sha256">d27f5cb0fbca6ecc57ac43aaa1b60fac929a3b99463c707edccf33b6e3ddb8a4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:3980" id="RHSA-2024:3980" title="Important: Flatpak Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>RHSA-2024:4016</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.12.1.
Security Fix(es):
* thunderbird: Use-after-free in networking (CVE-2024-5702) * thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688) * thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690) * thunderbird:  Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696) * thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-06-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.12.1-1.el7_9.src.rpm" version="115.12.1"><filename>thunderbird-115.12.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">c02679c8d3641a8061ea08965de7674c5c793a0546570d4b49ec370f87bfae28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:4016" id="RHSA-2024:4016" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3160-1</id><title>Ding-Libs Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libpath_utils-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-32.el7.i686.rpm</filename><sum type="sha256">fddec707e075300ef26d09606007fc681ba4e8e3765ded5ab7bc12d8db5c2b66</sum></package><package arch="x86_64" name="libini_config" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="1.3.1"><filename>libini_config-1.3.1-32.el7.x86_64.rpm</filename><sum type="sha256">d158dc00c3dd2b717b4c93c508d3529ec7af0e674b328878c16ed013d2ed1cfc</sum></package><package arch="x86_64" name="libini_config-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="1.3.1"><filename>libini_config-devel-1.3.1-32.el7.x86_64.rpm</filename><sum type="sha256">0adb92226545fcb9479639a961aefab3d5ca6031885fbdc5c9b8928e1c25099d</sum></package><package arch="i686" name="libcollection-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.7.0"><filename>libcollection-devel-0.7.0-32.el7.i686.rpm</filename><sum type="sha256">079e78887385d4983297bc946a5ca1a39fb43c64bfdf2765bd7984fb6e30af2e</sum></package><package arch="i686" name="libref_array-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.5"><filename>libref_array-devel-0.1.5-32.el7.i686.rpm</filename><sum type="sha256">1cc9bf073c4b9ccf470b2ca1e82a5156b5332be9145df0f7e8c02a30775b4437</sum></package><package arch="i686" name="libdhash-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.5.0"><filename>libdhash-devel-0.5.0-32.el7.i686.rpm</filename><sum type="sha256">ec4d4c13501046db18518b9ffa9a49965b5daaf143374b2b102ef90a274b5657</sum></package><package arch="i686" name="libdhash" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.5.0"><filename>libdhash-0.5.0-32.el7.i686.rpm</filename><sum type="sha256">74f66387878ac180d4ff009c199cbc8b53ffdb0497d18d3d1ee038ab4749b236</sum></package><package arch="i686" name="libref_array" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.5"><filename>libref_array-0.1.5-32.el7.i686.rpm</filename><sum type="sha256">12e0ed95d4c78d5a1d7d2f06b283d8886fbf097afb948553459348af14ce1b63</sum></package><package arch="i686" name="libini_config" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="1.3.1"><filename>libini_config-1.3.1-32.el7.i686.rpm</filename><sum type="sha256">079469d3f3928e17e4c2b2935cd611bd8fc4751ed82ecf272b4d265450fee2d8</sum></package><package arch="i686" name="libbasicobjects" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-32.el7.i686.rpm</filename><sum type="sha256">e5a8b867c63d89c45ad66978c3600144d5322484bbcdf1248369ec48102a7e45</sum></package><package arch="x86_64" name="libcollection" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.7.0"><filename>libcollection-0.7.0-32.el7.x86_64.rpm</filename><sum type="sha256">561d9dadfd4f6ed0bf1a880212515939d1cb0b0d470709a31c164d50509c75ab</sum></package><package arch="x86_64" name="libdhash" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.5.0"><filename>libdhash-0.5.0-32.el7.x86_64.rpm</filename><sum type="sha256">6ae27cc1d76de7eb2d83e44167fd2a86a91115e26b33db0ede20a3bf32315583</sum></package><package arch="i686" name="libcollection" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.7.0"><filename>libcollection-0.7.0-32.el7.i686.rpm</filename><sum type="sha256">05c21dd1bfbcc702f8680894ce141728d7a3be1de12917dca12165df2f8ae758</sum></package><package arch="x86_64" name="libcollection-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.7.0"><filename>libcollection-devel-0.7.0-32.el7.x86_64.rpm</filename><sum type="sha256">8f98fc629bbc82ebf27ad52a3a4746c15d544be93e03ed06acd3e8b61de77046</sum></package><package arch="i686" name="libbasicobjects-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-32.el7.i686.rpm</filename><sum type="sha256">d757fa386123abc17785a2717e9429c5975be117da444c8ca2132c8aaf5626de</sum></package><package arch="x86_64" name="libbasicobjects" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-32.el7.x86_64.rpm</filename><sum type="sha256">28dcdfc925a1a7561726aade00b01595095a0c2213408144235159c64182441b</sum></package><package arch="x86_64" name="libpath_utils-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-32.el7.x86_64.rpm</filename><sum type="sha256">0d8b4c6480c24b608d358349918e31ea9f5c2e47699246e8ffdb384e70c7c465</sum></package><package arch="i686" name="libpath_utils" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-32.el7.i686.rpm</filename><sum type="sha256">72aab9cf9d159dd5c8f41b7d1cd4ad7c2ae92974117c339a6def48ed6a0f020a</sum></package><package arch="x86_64" name="libref_array-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.5"><filename>libref_array-devel-0.1.5-32.el7.x86_64.rpm</filename><sum type="sha256">8807db32aae70ad79c17c208994f91e80ef24e2a45b246916696f4be7a7c68ef</sum></package><package arch="x86_64" name="libref_array" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.5"><filename>libref_array-0.1.5-32.el7.x86_64.rpm</filename><sum type="sha256">06c8183188dd5d9eba52048e387fce0f70f80cbb6b5dcb2e6a987471797c197f</sum></package><package arch="x86_64" name="libpath_utils" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-32.el7.x86_64.rpm</filename><sum type="sha256">75566a4c7145b891a44a1d57e848387f0cc45a3e94adb258706d6057d16fa655</sum></package><package arch="x86_64" name="libdhash-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.5.0"><filename>libdhash-devel-0.5.0-32.el7.x86_64.rpm</filename><sum type="sha256">5caf696f1c475b0ace376d9bd4ef88369dcf927507c01edee3e71b4d2ec3e206</sum></package><package arch="i686" name="libini_config-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="1.3.1"><filename>libini_config-devel-1.3.1-32.el7.i686.rpm</filename><sum type="sha256">14be63b894aa62fab7b897e966592f49f7a078d76caa9caf5a7c47fe73c30496</sum></package><package arch="x86_64" name="libbasicobjects-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-32.el7.x86_64.rpm</filename><sum type="sha256">ac45cf9e2a5d1bb85249629100217f5a469e711537ea8b5f5c426838f30abec5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3160" id="RHBA-2018:3160-1" title="Rhba-2018:3160-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2107-1</id><title>Llvm-Private Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="llvm-private" release="1.el7" src="llvm-private-7.0.1-1.el7.src.rpm" version="7.0.1"><filename>llvm-private-7.0.1-1.el7.x86_64.rpm</filename><sum type="sha256">aed704e1be4abe86f92f15d6db78e1495251a74cf56eb3f632224928a0f53260</sum></package><package arch="x86_64" name="llvm-private-devel" release="1.el7" src="llvm-private-7.0.1-1.el7.src.rpm" version="7.0.1"><filename>llvm-private-devel-7.0.1-1.el7.x86_64.rpm</filename><sum type="sha256">2d211bf0346c792990edc6827d12e2fab61275b92307f72fd358696e740753c6</sum></package><package arch="i686" name="llvm-private-devel" release="1.el7" src="llvm-private-7.0.1-1.el7.src.rpm" version="7.0.1"><filename>llvm-private-devel-7.0.1-1.el7.i686.rpm</filename><sum type="sha256">a167bf41553925bd84717cde9e11549013667da44b5e37441e27b7e54626072e</sum></package><package arch="i686" name="llvm-private" release="1.el7" src="llvm-private-7.0.1-1.el7.src.rpm" version="7.0.1"><filename>llvm-private-7.0.1-1.el7.i686.rpm</filename><sum type="sha256">8c77b75b25a3b788d9fd9246cfdc7e6c73d186d096b06cc5dc26d858abd0c2b1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2107" id="RHBA-2019:2107-1" title="Rhba-2019:2107-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:0991-1</id><title>Libtalloc Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 08:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>libtalloc-devel-2.1.16-1.el7.i686.rpm</filename><sum type="sha256">a98926e7cf0376ec2ca75db51c964aa900e3ae1fe69e04a9d1fee08f2fe6ea72</sum></package><package arch="x86_64" name="libtalloc" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>libtalloc-2.1.16-1.el7.x86_64.rpm</filename><sum type="sha256">2da1603b64a260885615e3589386be9f9941c5c3d1b3d31f77a4c2275a3d0b6e</sum></package><package arch="x86_64" name="pytalloc" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>pytalloc-2.1.16-1.el7.x86_64.rpm</filename><sum type="sha256">c6862e9c3ab8939dddae843fc610653aa0e6f803e82493ab700c080e1cb0da00</sum></package><package arch="i686" name="pytalloc" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>pytalloc-2.1.16-1.el7.i686.rpm</filename><sum type="sha256">22828299404e989ddf87ab406a3dadda02f2a852f8f7664d0ae2e5983d837ac5</sum></package><package arch="i686" name="libtalloc" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>libtalloc-2.1.16-1.el7.i686.rpm</filename><sum type="sha256">fb69cccc4077d4915453e6feb35f56e5b77283b699bc1792c04c237aba344af1</sum></package><package arch="i686" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>pytalloc-devel-2.1.16-1.el7.i686.rpm</filename><sum type="sha256">ecf6f5126434bd87f16417a44d562dac3932d41df43fbaf83bad2dc75433af4f</sum></package><package arch="x86_64" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>pytalloc-devel-2.1.16-1.el7.x86_64.rpm</filename><sum type="sha256">3796e011aae01468a4cc1080dfd545cc7e5bb1eb38ba1de4abd3edbf1c393ba2</sum></package><package arch="x86_64" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>libtalloc-devel-2.1.16-1.el7.x86_64.rpm</filename><sum type="sha256">ef554ef7cafb18aef7ca04d8f401090a31e59a79f2e891cccd0fc335f51a218d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:0991" id="RHBA-2020:0991-1" title="Rhba-2020:0991-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1736005" id="1736005" title="Rebase Libtalloc To Version 2.1.16 For Samba" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1012-1</id><title>Bcc Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bcc-devel" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>bcc-devel-0.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">4914a980e6f9b92cf98d80aabf7bb7e87ffc4c66f9f89e6b79f138bca8ef847e</sum></package><package arch="x86_64" name="bcc-tools" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>bcc-tools-0.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">182f51dc408fcb82875d80410ce35a54aa062e689c3cc4c80c882bdc5d20edd8</sum></package><package arch="x86_64" name="python-bcc" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>python-bcc-0.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">7e50bf01dba9aaeee79ac762ec2d192db08dab2ff958764d11c35d610494ed04</sum></package><package arch="noarch" name="bcc-doc" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>bcc-doc-0.10.0-1.el7.noarch.rpm</filename><sum type="sha256">b402475b9480e8e1660e7965606a56376c8c23e0e6055fbf5c1b3e6619711b5d</sum></package><package arch="x86_64" name="bcc" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>bcc-0.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">66e814087bf69fdfdbe152521646a017129c65dbe514b2162b4ba84046e6a37f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1012" id="RHBA-2020:1012-1" title="Rhba-2020:1012-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1734910" id="1734910" title="Rebase Bcc To 0.10.0" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1030-1</id><title>Nuxwdog Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nuxwdog-devel" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-devel-1.0.5-1.el7.i686.rpm</filename><sum type="sha256">7a5d595a260d23e2d1a15f5398edd5df496ab336eb49721116b172c3fba5ff82</sum></package><package arch="x86_64" name="nuxwdog-devel" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-devel-1.0.5-1.el7.x86_64.rpm</filename><sum type="sha256">f2d745e465bb96dfda42838ca95a9e7b3f55b46ba8e33dd002e27670a59d097d</sum></package><package arch="x86_64" name="nuxwdog" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-1.0.5-1.el7.x86_64.rpm</filename><sum type="sha256">888f7b5e5f08b841b62876eaa8872c224e81ad9d9de081a945c63dca1e8091c3</sum></package><package arch="i686" name="nuxwdog" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-1.0.5-1.el7.i686.rpm</filename><sum type="sha256">406750ff3ab35401faf838b44209ece9bca6f87e27c2cfdca5f5e272dcff48fc</sum></package><package arch="x86_64" name="nuxwdog-client-perl" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-client-perl-1.0.5-1.el7.x86_64.rpm</filename><sum type="sha256">43699a9166fadff4e6fcad822777d3abd027c54b77f1b28f1bab70a6ea160279</sum></package><package arch="x86_64" name="nuxwdog-client-java" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-client-java-1.0.5-1.el7.x86_64.rpm</filename><sum type="sha256">bdd13dd32cf2a75bef793291cdd67b1e717b5412a2322942b4fd61e61f11dad5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1030" id="RHBA-2020:1030-1" title="Rhba-2020:1030-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1509040" id="1509040" title="Nuxwdog Spec File Has Outdated Source For Tarballs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1634817" id="1634817" title="Re-Base Nuxwdog From 1.0.3 To 1.0.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1056-1</id><title>Libtevent Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 08:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libtevent" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>libtevent-0.9.39-1.el7.x86_64.rpm</filename><sum type="sha256">07adeafab452983bae66a5b81321271a28426c20c9cc557f5463a87aa44a80ed</sum></package><package arch="i686" name="libtevent-devel" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>libtevent-devel-0.9.39-1.el7.i686.rpm</filename><sum type="sha256">b8786f5696f25ff3d141b48d4f15ba3ab6add2d895943d06f0befada4185e278</sum></package><package arch="i686" name="libtevent" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>libtevent-0.9.39-1.el7.i686.rpm</filename><sum type="sha256">d6138c1ad3ccec3e01ba8838ac30502352988291b408661eb6b6475e8eee341e</sum></package><package arch="x86_64" name="libtevent-devel" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>libtevent-devel-0.9.39-1.el7.x86_64.rpm</filename><sum type="sha256">52ec549fedb3b205ac00332951a34f4f7682bc514c0b08e7bb7f040528c33141</sum></package><package arch="x86_64" name="python-tevent" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>python-tevent-0.9.39-1.el7.x86_64.rpm</filename><sum type="sha256">69a608b41dd0ec2d684ce916352f8b5320bc341bfb9181a6d768f234c60ec29c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1056" id="RHBA-2020:1056-1" title="Rhba-2020:1056-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1736006" id="1736006" title="Rebase Libtevent To Version 0.9.39 For Samba" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1073-1</id><title>Tomcatjss Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 08:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcatjss" release="1.el7" src="tomcatjss-7.2.5-1.el7.src.rpm" version="7.2.5"><filename>tomcatjss-7.2.5-1.el7.noarch.rpm</filename><sum type="sha256">c612860830a18587c3ba8c7183f5410390a24ae58b740115e01967a203664871</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1073" id="RHBA-2020:1073-1" title="Rhba-2020:1073-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659867" id="1659867" title="Re-Base Tomcatjss From 7.2.1 To 7.2.X" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3904-1</id><title>Sssd Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 08:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsss_simpleifp-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">b6ad09cd762f7c0f9d31aeb021c80f3deb28150434a7ba2ebf2075194901e8c7</sum></package><package arch="x86_64" name="python-libipa_hbac" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-libipa_hbac-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">bfb5c319c528fb4a438ca756b55bfcf5b3437e72d040b4bc71c9e4ba776f110d</sum></package><package arch="x86_64" name="sssd-krb5-common" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-krb5-common-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">94075fad1ed400d85fede47d3430fd92c30a52cf9fdda56dbf6be393bfe4cf56</sum></package><package arch="i686" name="libsss_certmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">ef30bd623ce6771df6aa383cda4124ace90ce726e8e3481fc5e61e643c105c4e</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">71c4e59346c4971c2691239d58f3ce8518f5db9ebdcd951ee7c37e440f27a9bd</sum></package><package arch="i686" name="sssd-client" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">4f8617434e11247650ffb0ce727e3f5038b587c12d2635330f054d7a7a1f77f5</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">ff4f2f781dd34237de3e565049fdbf751b03fc77f41a729b82d9907fd6afb6f9</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">cee913763ba7c946da161254194d4813cafa7e22521e9c777a068d87089d95d9</sum></package><package arch="x86_64" name="sssd-common" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-common-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">b00a2e0101ae1ce0dfe47eb0789a75f37ffa6fec6bbb482e13e17cf9656b6490</sum></package><package arch="x86_64" name="sssd-krb5" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-krb5-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">5aadcd7a4b722450ab2e7f293f8e951c1209eb90e2fcd83c6f949ca19d21c466</sum></package><package arch="x86_64" name="python-sss" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-sss-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">cea1a8153fe4dc35563a5191b7182b8181113efa89653742b23d6e65c3473eae</sum></package><package arch="x86_64" name="python-sss-murmur" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-sss-murmur-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">1d817c0758ce55eba4693073589512c7abb8002dc1a7fadcbdd0a46ac7bfcec8</sum></package><package arch="x86_64" name="sssd-proxy" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-proxy-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">6c0eedb41607c1e7c089250258d295716ed0dba4394ddf5e99f87b4042a1a1aa</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">7de43beef8408f3adea65aa52d68999eb41e8be477f5f4a61bbaf77958bd45a0</sum></package><package arch="i686" name="libipa_hbac-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">230c3396a490f480e3166912f9baefb94171a242703db84c77e9829021cfe7fd</sum></package><package arch="x86_64" name="libipa_hbac" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">8f07b60bb80ec160a01ac2fa139605099154ef161aa616e8f2b82ffb8ecbe0c5</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-polkit-rules-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">1380cbfd195f71ff2850774e9443be5067ee2a7287741ac43d78c2b491a98bd6</sum></package><package arch="i686" name="libsss_nss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">6272c5ce9d04babaa08ba323936e82e2fcae39df41b237e5923206f931e2c369</sum></package><package arch="x86_64" name="libsss_autofs" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_autofs-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">0d89e298936f270ab1711cae70d43e5455cb6bc7e12bc9b7a3525b2ebf0e1082</sum></package><package arch="x86_64" name="sssd-common-pac" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-common-pac-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">d6a3586ae72b0ffe472615b009618cd8b3ecc704a736baf920eb8a646862a7b5</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">ac3491913ea9478a5743b02fc9f2b21d61a2540db4df0426c2a8b8544ec59f24</sum></package><package arch="x86_64" name="sssd-kcm" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-kcm-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">8d5f30e1f1ed1440239cd912fb101f9112909a1385da61a71cb4073f92a7f539</sum></package><package arch="x86_64" name="sssd-ipa" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-ipa-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">748cde649eb550a724b4261401b29fad1e2c21c4123497d1f80bd2dd0eaec406</sum></package><package arch="i686" name="libsss_certmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">2ba1adc110b1fe52315431ce7e168f62fbc777708083caf59c24453b7759fa5d</sum></package><package arch="x86_64" name="sssd-ad" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-ad-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">27c1e64d5a2fa00752b78a1f330d336c23d6a1f2c34010c09aaf8650f7bc81ee</sum></package><package arch="x86_64" name="sssd-client" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">7e12ee2d7c78991cc66c43562cb663158192413f3a065a6ade10aecd736477e5</sum></package><package arch="x86_64" name="sssd" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">7c177b59ca9993ed13a5ebfd0284261feb600b83c905469bcfd4806929ece70d</sum></package><package arch="i686" name="libsss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">8df4148e9b940c311035310320c561513b76698bf6f59d25f4f687310c1a0c46</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">2774474c57023faba365973c87890d09b433f4703185681d4ac33199ee9d7d52</sum></package><package arch="x86_64" name="libsss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">46927507311208d6f890916295b1fe2f188a33a9b31b69aa09a1b00efcfd7c27</sum></package><package arch="i686" name="libsss_simpleifp" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">40430368c1f2f2dd32efb263f2a0d0063952f0d6faa436faf7ba4c0475c6478d</sum></package><package arch="i686" name="libsss_idmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">06c942ed290379ec4ef526b04628bde59fcc799dd82cdbcd1203be7b99e743f6</sum></package><package arch="x86_64" name="sssd-dbus" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-dbus-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">ed5989c76b9a6b84461a2b827a4cb311bb0aba4de34997486afcdbe16455f55d</sum></package><package arch="i686" name="libipa_hbac" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">1ec8549c97feae0e23c0f8ba6908769abef1599dae5a1d1cf3e88f0ba852f3e7</sum></package><package arch="x86_64" name="libsss_certmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">5977fb5991f46125ea4b8a1c218b1570543bc389518110ed4cd14336443b023a</sum></package><package arch="x86_64" name="libsss_sudo" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_sudo-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">cabb426062d8ee3fc4ec3fdd43706417ef64b3604605d9efe1ae6559c9768194</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">c26f6ee86a4dcea5d06a3c7a62075a3c96a8178346176c2b77bde6bafae034ed</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-libsss_nss_idmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">bfc4726d4b72440e527bb8c92d79de9b00f4069ca0edc3ef8b82f1e0fcd33e53</sum></package><package arch="x86_64" name="sssd-ldap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-ldap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">c70e67210e2a11b6c07f7f6ce409977ba623a8bcc924adf92d36d475ddb7ddf6</sum></package><package arch="x86_64" name="sssd-tools" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-tools-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">48e11e1de67d905e4fbd5840b018b4dacb1d1c3ae9e515d52541145b69d1bd86</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">7af4431d59f5b89ef70447dadefe647df67aff10b6b97bc831f8220b237ebe6e</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-winbind-idmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">d3bbccaf0c4a33abd594aeb9da9042fde0399ad9b1844edc6987529074d02861</sum></package><package arch="x86_64" name="libsss_simpleifp" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">2000b33f01b9a0f2c89cdc72f984eb68f173b0f509c226b76e18b09b02c26d9b</sum></package><package arch="x86_64" name="sssd-libwbclient" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-libwbclient-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">bc96272fa09064f0185ca371bcf124578864bdbbae8107826bdb4c3e5f21aebb</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">cb62befff8b7761a9468259a6e920b172ebc74026bc14870096e26321a0572a5</sum></package><package arch="noarch" name="python-sssdconfig" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-sssdconfig-1.16.5-10.el7.noarch.rpm</filename><sum type="sha256">51ba1016cdb1060babab5efb9631e32153eb613dd33c812ba50ac5a1ca85739b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3904" id="RHBA-2020:3904-1" title="Rhba-2020:3904-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1507683" id="1507683" title="Gdm Password Prompt When Cert Mapped To Multiple Users And Promptusername Is False" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513371" id="1513371" title="[Abrt] [Faf] Sssd: Raise(): /Usr/Libexec/Sssd/Sssd_Be[Proxy] Killed By 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551077" id="1551077" title="Gdm Failure Loop When No User Mapped For Smart Card" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553784" id="1553784" title="Document How To Prevent Invalid Selinux Context For Default Home Directories In Sssd-Ad Direct Integration." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568083" id="1568083" title="Subdomain Lookup Fails When Certmaprule Contains Dn" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1683946" id="1683946" title="Sssd Or Sssd-Ad Not Updating Their Dependencies On &quot;Yum Update&quot; Which Breaks Working Setup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719718" id="1719718" title="Validator Warning Issue :  Attribute 'Dns_Resolver_Op_Timeout' Is Not Allowed In Section 'Domain/Removed'. Check For Typos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1736110" id="1736110" title="Lookup Identity Does Not Work In Some Cases" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765246" id="1765246" title="Impossible To Enforce Gid On The Ad'S &quot;Domain Users&quot; Group In The Ipa-Ad Trust Setup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1767159" id="1767159" title="Sssd Is Crashing: Dbus_Watch_Handle() Is Invoked With Corrupted 'Watch' Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1773409" id="1773409" title="Sssd Is Failing To Discover Other Subdomains In The Forest If Ldap Entries Do Not Contain Ad Forest Root Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774140" id="1774140" title="Backport Patches For Objectcategory And Smart Refresh Improvements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781539" id="1781539" title="Pkinit With Kcm Does Not Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1782087" id="1782087" title="Removing An Ipa Sub-Group Should Not Remove The Members From Indirect Parent That Also Belong To Other Subgroups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1786341" id="1786341" title="Sssd Doesn'T Honour The Customized Id View Created In Ipa" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789349" id="1789349" title="Id Command Taking 1+ Minute For Returning User Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795960" id="1795960" title="Expecting Appropriate Error Message When New Password Length Is Less Than 8 Characters When Ldap_Pwmodify_Mode = Ldap_Modify In Sssd.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1796352" id="1796352" title="Rebase Sssd For Rhel 7.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800564" id="1800564" title="`Sssd.Api.Conf` And `Sssd.Api.D` Should Belong To `Python-Sssdconfig` Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800571" id="1800571" title="Multiples Kerberos Ticket On Rhel 7.7 After Lock And Unlock Screen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1804005" id="1804005" title="Sssd Doesn'T Follow The Link Order Of Ad Group Policy Management" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1807070" id="1807070" title="Ldap_Uri Failover Doesn'T Work With Different Ports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1819013" id="1819013" title="Pam_Sss Reports Pam_Cred_Err When Providing Wrong Password For An Existing Ipa User, But This Error'S Description Is Misleading" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1822461" id="1822461" title="Background Refresh Task Does Not Refresh Updated Netgroup Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829806" id="1829806" title="[Bug] Reduce Logging About Flat Names" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834266" id="1834266" title="&quot;Off-By-One Error&quot; In Watchdog Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835813" id="1835813" title="Sssd Boots Offline If Symlink For /Etc/Resolv.Conf Is Broken/Missing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836910" id="1836910" title="Rhel7.7 Server Have An Issue Regarding Dyndns Update For Ptr-Records Which Is Done By Sssd On Active Directory Dns Servers. It Is Done In Two Steps (Two Different Nsupdate Messages)." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837545" id="1837545" title="Users Must Be Informed Better When Internal Watchdog Terminates Process." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3909-1</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 08:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="13.sl7" src="scap-security-guide-0.1.49-13.sl7.src.rpm" version="0.1.49"><filename>scap-security-guide-0.1.49-13.sl7.noarch.rpm</filename><sum type="sha256">ed1530365ae6c625a79c06864835f0af3db3bd80f989cb62d0d315646ecba957</sum></package><package arch="noarch" name="scap-security-guide-doc" release="13.sl7" src="scap-security-guide-0.1.49-13.sl7.src.rpm" version="0.1.49"><filename>scap-security-guide-doc-0.1.49-13.sl7.noarch.rpm</filename><sum type="sha256">355d05da740b6bf25b55801b1b52b87ac9df389c19b6e5aa7e8bc5586bcef65a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3909" id="RHBA-2020:3909-1" title="Rhba-2020:3909-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494606" id="1494606" title="Rules Requiring Sysctl.Conf Values Have Misleading Descriptions - Sysctl Values Defaults Are Ignored, Description Says Otherwise." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547642" id="1547642" title="Oval Check For Content_Rule_Bootloader_Audit_Argument Uses Wrong File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549671" id="1549671" title="Check For Module Skipping In Accounts_Passwords_Pam_Faillock_Deny Is Tricked By Comment In Config File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574586" id="1574586" title="Oscap Rule Xccdf_Org.Ssgproject.Content_Rule_Audit_Rules_Login_Event Remediation Is Not Detected" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609014" id="1609014" title="Firewall-Cmd Command In Https://Static.Open-Scap.Org/Ssg-Guides/Ssg-Rhel7-Guide-Index.Html Is Breaking Firewalld Functionality" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691579" id="1691579" title="Disa Stig Does Not Recognize Options On Removable Partitions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691877" id="1691877" title="Remediation For Xccdf_Org.Ssgproject.Content_Rule_Audit_Rules_Privileged_Commands Rule Doesn'T Fix The System." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1722237" id="1722237" title="Bootloader Options On C2S Show &quot;Notchecked&quot; Even When Manually Selected With A Tailoring File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1776780" id="1776780" title="Rule 'Xccdf_Org.Ssgproject.Content_Rule_Dconf_Gnome_Login_Banner_Text' Fail To Remediate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781244" id="1781244" title="Fips Approved Ciphers Need To Be Updated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791583" id="1791583" title="[Doc] C2S Security Profile - Services Are Now Masked Instead Of Disabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1794402" id="1794402" title="Link In Scap-Security-Guide Rhel6 Datastream Is 404" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801411" id="1801411" title="The Test If Atd Is Stopped Gives A False Postive On The Service 'Rpc-Statd.Service' Because It Also Contains The Letters 'Atd'." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815008" id="1815008" title="Rebase Scap-Security-Guide In Red Hat Enterprise Linux 7.9 To Latest Upstream Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1821633" id="1821633" title="Ship Cis Aligned Profile In Rhel7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1823576" id="1823576" title="Openscap Ssh Rules Content_Rule_Sshd_Do_Not_Permit_User_Env Content_Rule_Sshd_Allow_Only_Protocol2 Failing After Upgrade" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829743" id="1829743" title="Undocumented Fact That File Ownership-Related Rules Dont Work With Remote User/Group Backends" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844431" id="1844431" title="Xccdf_Org.Ssgproject.Content_Rule_Sshd_Do_Not_Permit_User_Env Rule Is Broken" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3914-1</id><title>Openscap Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="openscap-devel" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-11.el7.i686.rpm</filename><sum type="sha256">5f16a3af77db983ac3a0f5c17a5664f0252f129caf1a54f2e189a549331dc770</sum></package><package arch="x86_64" name="openscap-python" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">5adbaa50cbc340d9d8ad54704c8b5fbc58d49a4eeca65983f161ab014601b4bf</sum></package><package arch="x86_64" name="openscap-extra-probes" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">90ce2ded320b9ba224b241f5a84c8ee3393ac380899755e165b92000ed0b9380</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">dd39e29e3c6413d14e4c945164f0db6c16272fa7c33aec47a01a97e2f7cb5925</sum></package><package arch="i686" name="openscap" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-1.2.17-11.el7.i686.rpm</filename><sum type="sha256">c1bef430a1cbb4947078fb8367ebe6b97d55a6f2bc080f0894e3c958cf23e892</sum></package><package arch="i686" name="openscap-engine-sce" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-11.el7.i686.rpm</filename><sum type="sha256">4db722c7ef92a16b04ed9b46367dbad108bc23db12b13fae36666366d5fc2408</sum></package><package arch="x86_64" name="openscap-scanner" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">84a0793e05b3055291d75259a7a43200e42b30c237ddb33d858ed1df04519418</sum></package><package arch="x86_64" name="openscap-engine-sce" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">7cca309204759e1dcdd6c129a541b28d16067f00120ee0c4c81c54a5d050f2f0</sum></package><package arch="x86_64" name="openscap" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">0c7ebd8f421b7471c3a5442eb6b9d48abc9c10941349130d6720dfc1ea269f27</sum></package><package arch="x86_64" name="openscap-devel" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">8a2160ba8b1f0cc260177a418cc9bbe9cc3da2a712f07ec78de15ccf12f5b262</sum></package><package arch="noarch" name="openscap-containers" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-11.el7.noarch.rpm</filename><sum type="sha256">81f96ef394b91625ce5216521944902389300695be8c3da85e0b37f6750ad391</sum></package><package arch="i686" name="openscap-engine-sce-devel" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-11.el7.i686.rpm</filename><sum type="sha256">954c57cefbd274046e95f0f9e35f3dfe674f203dc4e3b39bda46d72343963f72</sum></package><package arch="x86_64" name="openscap-utils" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">a76dd94183111f060ee049c919c6bbf4ac99ef7a8fac2431c0921af9f3c76780</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3914" id="RHBA-2020:3914-1" title="Rhba-2020:3914-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1465661" id="1465661" title="Openscap Ships With Outdated Documentation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1478285" id="1478285" title="Probe_Systemdunitdependency Failed With Segmentation Fault" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640522" id="1640522" title="Selinux Security Context Probe Produces A Flood Of Annoying Messages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642283" id="1642283" title="Null Pointer Dereference In Cvrf_Priv.C:Cvrf_Model_Filter_By_Cpe() With `Oscap Cvrf Eval`" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1803114" id="1803114" title="Oscap-Ssh Fails To Retrieve The Result Files When --Sudo Is Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828779" id="1828779" title="Url Link For Red Hat Errata Needs To Be Updated To &quot;Https://Access.Redhat.Com/Errata&quot;" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3925-1</id><title>Selinux-Policy Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-devel" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">6f9e1e4c8beeca7c1d9e661ab2ae35f6ecb6a53b0cdc3ee4ba421a44552e2bf4</sum></package><package arch="noarch" name="selinux-policy" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">ac85f9475feb4c91f58d886a500196603e8436d4846ae4f92c139b48a47569e1</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">959a2efd8d68e27b2dfe4019beac808c07176b399e4d1fa395436719e7c2f030</sum></package><package arch="noarch" name="selinux-policy-mls" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">e71dde05a3abfb984e13302667dabc14a114da914f7b8adc31070bbe11ef84d9</sum></package><package arch="noarch" name="selinux-policy-minimum" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">bd08f54777b5f6991f4956c0321c542c80bcbaf0aa914d5035c2a5980a23be4a</sum></package><package arch="noarch" name="selinux-policy-doc" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">1d0a6325ec4552c2a148378b529c6e1b2e542f4f5ec459768c1a8a151c6bf4ea</sum></package><package arch="noarch" name="selinux-policy-targeted" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">53087bdf24d08cd7310a9037f7d3767c473bde3c75318084f6a9036b3e2fccfd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3925" id="RHBA-2020:3925-1" title="Rhba-2020:3925-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1770123" id="1770123" title="Pcp Pmsignal Is Not Allowed To Send Signal To Pmdas (Eg. Pmdaproc)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1780332" id="1780332" title="Audit Daemon Does Not Halt The System When The Audit Partition Is Full" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820298" id="1820298" title="Avc Denial During Ipa-Adtrust-Install --Add-Agents" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824625" id="1824625" title="Nagios/Nrpe No Longer Allowed To Check Mail Queue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837461" id="1837461" title="Avc:  Denied  { Search } For Comm=&quot;Rhsmd&quot; Dev=&quot;Proc&quot;" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3938-1</id><title>Jss Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="jss" release="3.el7" src="jss-4.4.9-3.el7.src.rpm" version="4.4.9"><filename>jss-4.4.9-3.el7.x86_64.rpm</filename><sum type="sha256">100a543a99455b3593ff688cb43e28b179ae8dcd189096979852c03872bead93</sum></package><package arch="x86_64" name="jss-javadoc" release="3.el7" src="jss-4.4.9-3.el7.src.rpm" version="4.4.9"><filename>jss-javadoc-4.4.9-3.el7.x86_64.rpm</filename><sum type="sha256">4e137c200d7f44c21a2e4a5642c37bac068805f42e3dc56c48a898cb7f014c19</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3938" id="RHBA-2020:3938-1" title="Rhba-2020:3938-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1710105" id="1710105" title="Jss: Add Rsa Pss Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1796642" id="1796642" title="Jss -- Remove Hardcoded Native Library /Usr/Lib{64}/Jss/Libjss4.So" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1818631" id="1818631" title="Rebase Jss To V4.4.9 In Rhel 7.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3961-1</id><title>Gssproxy Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gssproxy" release="29.el7" src="gssproxy-0.7.0-29.el7.src.rpm" version="0.7.0"><filename>gssproxy-0.7.0-29.el7.x86_64.rpm</filename><sum type="sha256">3675d375a146d150b5fb0aaed6a9b4ad4e0574c737e77e4cebb8449dfa586ee4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3961" id="RHBA-2020:3961-1" title="Rhba-2020:3961-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373421" id="1373421" title="[Gssproxy] Unspecified Gss Failure Occurs When Mount With Krb5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3990-1</id><title>Mesa Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="mesa-libGLES" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGLES-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">41b45b56bfa5930bf6a3c679ca594ec3a966da8f5216b794f1102553a4dc4864</sum></package><package arch="i686" name="mesa-khr-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-khr-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">c85f4b5a8ad57bde4a5a089911989e7ab3dd653f96868b1653d63b1af4812ceb</sum></package><package arch="x86_64" name="mesa-libGLES" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGLES-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">79794d4968a5f72fcbe19138a774dc18cfad04e5cfb875bc5acbcf5abbb64c74</sum></package><package arch="x86_64" name="mesa-libgbm-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libgbm-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">bc0105a5f0f598340aeb5d02fe846572a7914c819c13110dcda30d743b2b58c0</sum></package><package arch="i686" name="mesa-vdpau-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-vdpau-drivers-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">0c043f6b4c530b251f59d3ae79475ea475bd2d7c6bcf8a36a6b1f90f08187300</sum></package><package arch="x86_64" name="mesa-libGLES-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGLES-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">f96a30b81d462af6bb0a2c9787cbd998c357aa53aa91e26c04d1ed2a99377879</sum></package><package arch="i686" name="mesa-libxatracker" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libxatracker-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">1daafe96d0b1b72716947243bb4391eb5f1e1b3eff336552330c6edcbadce7bd</sum></package><package arch="x86_64" name="mesa-libglapi" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libglapi-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">26c2b1f2976e5fd7617c0fd53e0c0fe6f80569f1920ae0d45d834fc496e78f51</sum></package><package arch="i686" name="mesa-libEGL" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libEGL-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">d4be5fd3df3465dba0227523c6b527da5e1427df1cd532e9f57a79721fbee997</sum></package><package arch="i686" name="mesa-vulkan-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-vulkan-drivers-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">9b7e191ab94d033b8e2757a97e7973da180ff3434edf6f5c7e43e5be3cc93238</sum></package><package arch="x86_64" name="mesa-libGL-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGL-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">c3f4e9e29548909283ee1d61cb5efedf81b5d2da148b20c555aff5e379992f30</sum></package><package arch="x86_64" name="mesa-khr-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-khr-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">0dfae6c8b5f70289b624b8aea5607a6ecc711ffa17a0509562210d298afdb9f3</sum></package><package arch="x86_64" name="mesa-libOSMesa" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libOSMesa-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">388697bc4c4f6f35465ab9722efd32098b561c77066f3d51b6e955def6c6f781</sum></package><package arch="x86_64" name="mesa-dri-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-dri-drivers-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">066a833a964b516df838faaba5b827b06895c645c1bc8503d6c670204a13284f</sum></package><package arch="x86_64" name="mesa-libEGL-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libEGL-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">64ad09b0b632ab255b990f4d680fe04f7c3eb30c2175e9212f507f378b418f48</sum></package><package arch="i686" name="mesa-libOSMesa-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libOSMesa-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">262347f806287bba6b9d6fda186e2e9934352059f09eec5106bcf43b413fa33d</sum></package><package arch="i686" name="mesa-dri-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-dri-drivers-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">2d1a64a7c9fead5feb9d16246d6e7d0c49f70008da11c80a226f504bedb28e24</sum></package><package arch="i686" name="mesa-libGLES-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGLES-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">10b4387ca836295b14b3f06fd0adf567ab3420b5ee68f0985b2dea52dfc0779d</sum></package><package arch="i686" name="mesa-libGL" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGL-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">5ac49f3393ec87c6b089b2cba390df5c778ce547c073454316c0fe87c224b69b</sum></package><package arch="x86_64" name="mesa-libEGL" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libEGL-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">fe5fe2947b1fbeb80d1d2e072108df41f981ea0c267482362fedb4ff77c1c95b</sum></package><package arch="i686" name="mesa-libxatracker-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libxatracker-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">fd8477fbe2e619c309abe7011b4f1544c40a446a3267bf5d9f72713246ef00fe</sum></package><package arch="x86_64" name="mesa-vdpau-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-vdpau-drivers-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">764ce6fbd92b18856ee9322db9426a5666ab448dacf4a741e60e823e5e7b44cf</sum></package><package arch="x86_64" name="mesa-libGL" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGL-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">ab274b94ac80af76c948c29b20541897e6789ebf7484e7f3f8d66342fdf9a011</sum></package><package arch="x86_64" name="mesa-filesystem" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-filesystem-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">d53c74ecb12d5916f1890868e86f729f1e19582d09f0649ec2e7580d66ed6362</sum></package><package arch="x86_64" name="mesa-libgbm" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libgbm-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">d7b656c429f154db0885d0edd57e0a7720c26e37fb12ada34d692515e8430eb5</sum></package><package arch="i686" name="mesa-libgbm" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libgbm-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">3004a5009e8aa50d641126acb450397eff4235ee9a92e62376583c41c661389b</sum></package><package arch="i686" name="mesa-libglapi" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libglapi-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">9f8f448ea0cc2d2f5629f7d6400ea34d5bf3c985d2f7446920a72074a5856b32</sum></package><package arch="i686" name="mesa-libGL-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGL-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">5aa9001775ce4a2c5720e80f57d33be287e9286fe3fc771d5d09f0795854247b</sum></package><package arch="i686" name="mesa-filesystem" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-filesystem-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">c072a0a8caa2ff2ed30ba75d45d30cc55ffb1c4b51074c698df36f7bd073e470</sum></package><package arch="i686" name="mesa-libEGL-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libEGL-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">1c19628db4b3e3f47b6bef6996f1a4bcc24d58cfced9591a76cde5c2afe9ee70</sum></package><package arch="x86_64" name="mesa-libxatracker-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libxatracker-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">3262c507521b2b0b0c7f337a964cccf89a9b7ee7261de0cd5f86bfcce66d904b</sum></package><package arch="x86_64" name="mesa-libOSMesa-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libOSMesa-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">240ba79f360e197a848a9cfa1a80812f25e929215953b5a2e8cafe123877a074</sum></package><package arch="i686" name="mesa-libOSMesa" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libOSMesa-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">4ec4c5964661a7f4a2bee627560eab424b4372a4e9ab3013ad4fea08332f0bd0</sum></package><package arch="x86_64" name="mesa-vulkan-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-vulkan-drivers-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">b9079ff60ce2179710b8fda6c157380b65c3e5f88bc61eca514c17cc24ae0bf9</sum></package><package arch="x86_64" name="mesa-libxatracker" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libxatracker-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">00112f5405635a25c888d837e579cc619f5d38cbffbe45429a7aa36b84508807</sum></package><package arch="i686" name="mesa-libgbm-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libgbm-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">890d72575971988fc9647778e9d577c6c96c99e5ee03e945dd82953813b51982</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3990" id="RHBA-2020:3990-1" title="Rhba-2020:3990-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1843381" id="1843381" title="Webgl Context Lost With Fix For Rhbz#1803811" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4045-1</id><title>Shim Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="shim-unsigned-ia32" release="9.el7" src="shim-15-9.el7.src.rpm" version="15"><filename>shim-unsigned-ia32-15-9.el7.x86_64.rpm</filename><sum type="sha256">eb5461acd44f5c417de7bac321eb8b4c6740f0aa141957e3a716e9cfda8b4843</sum></package><package arch="x86_64" name="fwupdate" release="6.sl7" src="fwupdate-12-6.sl7.src.rpm" version="12"><filename>fwupdate-12-6.sl7.x86_64.rpm</filename><sum type="sha256">4fa835008eaba7ecd258a12a50c7edc2c262dc91b9f57ef7ab0b68a3f230e5cf</sum></package><package arch="x86_64" name="shim-ia32" release="11.sl7" src="shim-signed-15-11.sl7.src.rpm" version="15"><filename>shim-ia32-15-11.sl7.x86_64.rpm</filename><sum type="sha256">c7666614ad7283b1c36eb793c49b3b93b626d77401fdd99494a2ec20f8c722f0</sum></package><package arch="x86_64" name="fwupdate-devel" release="6.sl7" src="fwupdate-12-6.sl7.src.rpm" version="12"><filename>fwupdate-devel-12-6.sl7.x86_64.rpm</filename><sum type="sha256">9c2ce6e2180c22510fde878ad56abfcacdcf6e7fc1e4fcb8433d06826a5aa096</sum></package><package arch="x86_64" name="mokutil" release="11.sl7" src="shim-signed-15-11.sl7.src.rpm" version="15"><filename>mokutil-15-11.sl7.x86_64.rpm</filename><sum type="sha256">d30740543fd917ca84498aaae16dc3ae1e02dc0e435557bd2b1a79ea70683ac2</sum></package><package arch="x86_64" name="fwupdate-efi" release="6.sl7" src="fwupdate-12-6.sl7.src.rpm" version="12"><filename>fwupdate-efi-12-6.sl7.x86_64.rpm</filename><sum type="sha256">18eafdb03a82cbea9831d61b934bca5e521c92f02831b9d85bd409d159b3eb02</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="9.el7" src="shim-15-9.el7.src.rpm" version="15"><filename>shim-unsigned-x64-15-9.el7.x86_64.rpm</filename><sum type="sha256">ac97d4bbc89cbe4a2867a15b4c5a80b238032fc96f20a097f8ab5eea1826a5f8</sum></package><package arch="x86_64" name="shim-x64" release="11.sl7" src="shim-signed-15-11.sl7.src.rpm" version="15"><filename>shim-x64-15-11.sl7.x86_64.rpm</filename><sum type="sha256">717fb66d267e396cd41eab8585900e45a2b457a95afd82bd20a461b81c53d6c8</sum></package><package arch="x86_64" name="fwupdate-libs" release="6.sl7" src="fwupdate-12-6.sl7.src.rpm" version="12"><filename>fwupdate-libs-12-6.sl7.x86_64.rpm</filename><sum type="sha256">bee8d631ee0009cd3fec3b278011294aff1ea944c5ba0a4c404bd008b46f68d0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4045" id="RHBA-2020:4045-1" title="Rhba-2020:4045-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862045" id="1862045" title="Grub Or Shim Dies Since Updating To Grub2-2.02-0.86.El7_8 / Shim-X64-15-7.El7_8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4046-1</id><title>Grub2 Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">293f8036a24e2e14d29bc0daafbff547bb3c96b38173fed1465cfc346a512683</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">9654a6edd1745435bf775e6bef3c9a49e476381564c420919d10a65da8e3d770</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">6817637dc99e043a6e591f4b7e9fd1449085d3cebfaba565bb7a21b199da87f1</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">5ca499bac3cc7f39168d4d6dc3440a2942278d213aca164cdec039727fbf97b6</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7.noarch.rpm</filename><sum type="sha256">b941d64d188dfa6d10000be0ee58870eac7bf1a2ac311859c090f7c393266c6a</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7.noarch.rpm</filename><sum type="sha256">f067e1ce69f25cdbe8673cb80d9f3c16eae49fac7029d20388baa149dc0e3fbb</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">467add357c1a4bccb041d872365fa84fcdf72cdf83bc172377ff167c6bb91de1</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">26f1493108bcf32bcb33ce424772e962c86d311a24695fd87dd4291bf432bb51</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">34f05e3a10f2fd1572df65eb075d02d5edccec1c6c761933c49ffa55b0255e7f</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7.noarch.rpm</filename><sum type="sha256">d4a7df3ae98c2a5817e531af29c5525f47ac123d13df835760448d77d22040be</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7.noarch.rpm</filename><sum type="sha256">0c3359bb8b97ef527f9ef247bee46e3f991f6458ab0622ed9442933b5a9dd036</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">0848767975cfdf7f5e942e607355ac050f3e272baaf9d499ad8982bc4438541b</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">e802633c2d6655fcdcfdc3d6c75cf853ba51733c06d6425115a7016c374ea80f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4046" id="RHBA-2020:4046-1" title="Rhba-2020:4046-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869987" id="1869987" title="Error: ../../Grub-Core/Net/Net.C:1795:Timeout Reading Initrd.Img" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4180-1</id><title>Kernel Bug Fix Update</title><description>This update fixes the following bugs:

* kernel: scsi: ses: don't ask for diagnostic pages repeatedly during probe

* OVS drops secondary SCTP connection

* Unable to insert 'i10nm_edac.ko' EDAC kernel module on JVL after CPU upgraded

* File corruption when a 1 MB (or bigger) file is pulled from a container running memory mapped AF_PACKET TX ring

* [mlx5] kernel crash at mlx5e_encap_take()

The system must be rebooted for this update to take effect.</description><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.2.1.el7.noarch.rpm</filename><sum type="sha256">ee38276592d03247c195503a3a84bb788acf4f2375852d5e37e53aa10e5e14ec</sum></package><package arch="x86_64" name="kernel-headers" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">305ee7b1e141efb86dad88ce8f64d891d4499515a0b86cc2492a7afe7354f2cc</sum></package><package arch="x86_64" name="kernel-tools" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">47e102d549470ebe722222c158bf8bbe23ce7edaa9f6dbcf3ac2522f29f4f841</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">05238fa7733a2854c8da926c1cfc153aefeb49566288f67f02062c65d3f5d183</sum></package><package arch="x86_64" name="python-perf" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">ddca29711b7c5250cc0031df2c682dc3642d51de1ba6b31c4d3fee300d97abde</sum></package><package arch="x86_64" name="kernel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">f64734816b193587747ba3f6f37cef54cb714507a9a60de8dcd9de5e30f6174b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">12e0cf4a6ac5e1725da5c23f45471c5137290387f7dc775f1a3ab186307231cb</sum></package><package arch="x86_64" name="bpftool" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">cbd170a26667e7100abca4aabfa06d0d24d6bd8ab65264cfb8e8e767de442a5c</sum></package><package arch="x86_64" name="kernel-devel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">72a1ee6bb71ce33bc004874f657bbdb022ac6f31d44a5f9b87164617d4693673</sum></package><package arch="x86_64" name="kernel-debug" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">5134deda0899e9a38e7e47fd0e23fe5b02271f2c23fc669bc6716c59f0a46170</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">542cbe64be29e0eee7ba6662f92806774a6f86524e5857bb9ebe2a35d9cb552d</sum></package><package arch="noarch" name="kernel-doc" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.2.1.el7.noarch.rpm</filename><sum type="sha256">367bf3076424250e2b5a936305fd9d34309323521cbc12c90ccd88ec4f96a989</sum></package><package arch="x86_64" name="perf" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">e1e87432d6037c047a0c13b2fa71288d378d6cf91d2cd94f3d7298c4b980c1a1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4180" id="RHBA-2020:4180-1" title="Rhba-2020:4180-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4282-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020b, which addresses recent time zone changes. Notably:

* Yukon timezones represented by America/Whitehorse and America/Dawson will change time zone rules from -08/-07 to permanent -07 on November 01, 2020, not on August 03, 2020, contrary to what was in the version 2020a.

* The most recent winter(+08)/summer(+11) transition for Casey Station, Antarctica was on April 04, 2020 at 00:01.

* Obsolete pacificnew, systemv, and yearistype.sh files have been removed from the distribution.</description><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="3.el7" src="tzdata-2020b-3.el7.src.rpm" version="2020b"><filename>tzdata-java-2020b-3.el7.noarch.rpm</filename><sum type="sha256">e2e2a484a6f1ee84161056075eb83c7c1fb9608b45fb487cfa3ccf4623f5629c</sum></package><package arch="noarch" name="tzdata" release="3.el7" src="tzdata-2020b-3.el7.src.rpm" version="2020b"><filename>tzdata-2020b-3.el7.noarch.rpm</filename><sum type="sha256">bae5d3ba085cab34024698659c79a9f30feb14b936052f6a4e1ad4af87ac9ce0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4282" id="RHBA-2020:4282-1" title="Rhba-2020:4282-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4329-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020d, which addresses recent time zone changes. Notably:

* Fiji starts the daylight saving time (DST) later than usual on December 20, 2020, rather than the predicted November O8, 2020.

* Palestine will end summer time on October 24, 2020 rather than the predicted October 31, 2020.</description><release>Scientific Linux</release><issued date="2020-10-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="2.el7" src="tzdata-2020d-2.el7.src.rpm" version="2020d"><filename>tzdata-java-2020d-2.el7.noarch.rpm</filename><sum type="sha256">e86d66eb32256341996577a3468858f80ccc4b9e24f0049daf6bb64f596d23e6</sum></package><package arch="noarch" name="tzdata" release="2.el7" src="tzdata-2020d-2.el7.src.rpm" version="2020d"><filename>tzdata-2020d-2.el7.noarch.rpm</filename><sum type="sha256">32dcd49fca4845c52d8522bcd6ee06a92751dbd5bf2f8449c49d779f56716432</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4329" id="RHBA-2020:4329-1" title="Rhba-2020:4329-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5017-1</id><title>Openscap Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* Huge memory leak in probe_rpmverifyfile

* OpenSCAP doesn't take advantage of gzip compression when downloading remote content.</description><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openscap-engine-sce" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">26a432b346c85143df5fdde282d9c47924e375ed738a6d801c45e1889c8bfbb0</sum></package><package arch="i686" name="openscap-engine-sce-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">55deefdf2b8baccf6dcfe7257b32da1358ffad07cf45c4774b6d2da7f42958f4</sum></package><package arch="x86_64" name="openscap-scanner" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">88b70d5aff9e78052b1ef48e3ef10e440554a5c0306783325f1f213c1b5f2de1</sum></package><package arch="noarch" name="openscap-containers" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-13.el7_9.noarch.rpm</filename><sum type="sha256">c1ace00cb7cc2d0d459c60346f512dd63fc382408c65f15647f43f0fd262d2cd</sum></package><package arch="x86_64" name="openscap-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">64a29549d82f9078cb03fd0e266169dcfbab9789a34103b1a314a26944eec89a</sum></package><package arch="x86_64" name="openscap-utils" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">b589b72959da4539156217de78bc14092ecd190bf5d5b9959e6850117fe6124d</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">3adb46260adf0b3729fb688454a01a951bef015104991962f74a481da3628919</sum></package><package arch="x86_64" name="openscap-extra-probes" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">3d8d218227e06c86640e9048c0727f9448126b03d50998f86968af7a7fba4e02</sum></package><package arch="i686" name="openscap-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">6611815a691ea4ef9286b3dbe25ca75872e61dd1b821777aa27898bc7e926549</sum></package><package arch="x86_64" name="openscap-python" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">9eda95b4bf068a4dd42578893cec8d34023919dcc2d6d1e5f43e9ae2e04c3f3b</sum></package><package arch="x86_64" name="openscap" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">0f431fc0de2d54d27ef73e8763305530fdafe7e75e8d14971ef6d6dd456740ec</sum></package><package arch="i686" name="openscap-engine-sce" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">02a2970fe161c63ce93bba1e1800f38b3e7bf320f728029a7a08e948297071d7</sum></package><package arch="i686" name="openscap" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">e172cb1bfb4d2cb42fdf435dbc33fce6ffb9db9419388628508591f6d41530f3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5017" id="RHBA-2020:5017-1" title="Rhba-2020:5017-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861300" id="1861300" title="Huge Memory Leak In Probe_Rpmverifyfile [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1870147" id="1870147" title="Openscap Doesn'T Take Advantage Of Gzip Compression When Downloading Remote Content. [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5027-1</id><title>Selinux-Policy Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* [SL-7.9]- Selinux policy need to be updated for RHGS to fix permission issues

* Selinux prevents nss from creating directory inside the certs directory.</description><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-devel" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">bf544dffd42e2c80a47b65fbfb4490df371130b42ec4467e85b20839b3ffb0d0</sum></package><package arch="noarch" name="selinux-policy-doc" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">ff9576077bc32507c027488b37dc29449d1687a5859e8c9dd6183804f2f65cd8</sum></package><package arch="noarch" name="selinux-policy-minimum" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">4c4425d26098ce827f3d90fb9055b74ad86caaf510c5786578f15f3e97a9ad42</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">d30d91abee991346cbe1e380d0ec23b629bfe2e39cdaf821f892963542506751</sum></package><package arch="noarch" name="selinux-policy-mls" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">a7e1b16a3019fe3300dafdd834094cc64b70668c4afb1e2a448a5afe3774a0b2</sum></package><package arch="noarch" name="selinux-policy-targeted" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">b55b489fad47589263e056c0967fb2386b7504d965aff36c7beb7a936e3cb5e7</sum></package><package arch="noarch" name="selinux-policy" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">57914f4194867a8f2455b8d04689c9b5b7f83402a400a1ec5183b01ff64d8533</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5027" id="RHBA-2020:5027-1" title="Rhba-2020:5027-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1867995" id="1867995" title="[Rhel-7.9]- Selinux Policy Need To Be Updated For Rhgs To Fix Permission Issues [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5032-1</id><title>Python-Blivet Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* Not closing the fd  if blivet fails to read the device</description><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="python-blivet" release="1.el7_9" src="python-blivet-0.61.15.76-1.el7_9.src.rpm" version="0.61.15.76"><filename>python-blivet-0.61.15.76-1.el7_9.noarch.rpm</filename><sum type="sha256">4ae70a3b7c5aa57c7c8b891f6d4cd92afd4f8e708e75955cbc5e3414fabcc366</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5032" id="RHBA-2020:5032-1" title="Rhba-2020:5032-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1879920" id="1879920" title="Not Closing The Fd  If Blivet Fails To Read The Device [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5451-1</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* The "DISA STIG for Scientific Linux 7" profile in the SCAP Security Guide has been updated to the latest version V3R1. This update adds more coverage and fixes reference problems. The profile is now also more stable and better aligns with the SL7 STIG benchmark provided by the Defense Information Systems Agency (DISA).

You should use only the current version of this profile because the older versions of this profile are no longer valid. The OVAL checks for several rules have changed, and scans using the V3R1 version will fail for systems that were hardened using older versions of SCAP Security Guide. You can fix the rules automatically by running the remediation with the new version of SCAP Security Guide.

WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first.

The following rules have been changed:

CCE-80224-9:: The default value of this SSHD configuration has changed from "delayed" to "yes". You must now provide a value according to recommendations. Check the rule description for information about fixing this problem or run the remediation to fix it automatically.

CCE-80393-2:: xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon CCE-80394-0:: xccdf_org.ssgproject.content_rule_audit_rules_execution_restorecon CCE-80391-6:: xccdf_org.ssgproject.content_rule_audit_rules_execution_semanage CCE-80660-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setfiles CCE-80392-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setsebool CCE-82362-5:: xccdf_org.ssgproject.content_rule_audit_rules_execution_seunshare CCE-80398-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage CCE-80404-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh CCE-80410-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_crontab CCE-80397-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd CCE-80403-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp CCE-80411-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_pam_timestamp_check CCE-27437-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands CCE-80395-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd CCE-80406-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postdrop CCE-80407-0:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_postqueue CCE-80408-8:: xccdf_org.ssgproject.content_rule_audit_rule s_privileged_commands_ssh_keysign CCE-80402-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit CCE-80401-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo CCE-80400-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su CCE-80405-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_umount CCE-80396-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_unix_chkpwd CCE-80399-9:: xccdf_org.ssgproject.content_rule_audit_ru les_privileged_commands_userhelper</description><release>Scientific Linux</release><issued date="2020-12-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-doc" release="2.sl7_9" src="scap-security-guide-0.1.52-2.sl7_9.src.rpm" version="0.1.52"><filename>scap-security-guide-doc-0.1.52-2.sl7_9.noarch.rpm</filename><sum type="sha256">a76226596f9cf1af0cf1fb7a48a9bd48b064fb4ea543aa8bf5672aad2b08c5bc</sum></package><package arch="noarch" name="scap-security-guide" release="2.sl7_9" src="scap-security-guide-0.1.52-2.sl7_9.src.rpm" version="0.1.52"><filename>scap-security-guide-0.1.52-2.sl7_9.noarch.rpm</filename><sum type="sha256">c3f704db0ab1790e4b3b80c95b321134d3fd4bef2ad363890a0892ff8f12a9d2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5451" id="RHBA-2020:5451-1" title="Rhba-2020:5451-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665233" id="1665233" title="Latest Rhel7 Stig Is Not Present In Latest Version Of Scap-Security-Guide. [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:0013-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2020f, which addresses recent time zone changes. Notably:

* Europe/Volgograd will change from UTC+04 to UTC+03 on December 27, 2020.</description><release>Scientific Linux</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2020f-1.el7.src.rpm" version="2020f"><filename>tzdata-2020f-1.el7.noarch.rpm</filename><sum type="sha256">c37375a99001e0ec3742ba21f8b5a51f2034945b5b7e54a211166c3e76ad451d</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2020f-1.el7.src.rpm" version="2020f"><filename>tzdata-java-2020f-1.el7.noarch.rpm</filename><sum type="sha256">8539392e7e8de6c9aecd029b448821e59301400a279fd44b232bc6f76473cfcc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:0013" id="RHBA-2021:0013-1" title="Rhba-2021:0013-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:0276-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2021a, which addresses recent time zone changes. Notably:

* South Sudan will change from UTC+03 to UTC+02 on February 1, 2021.</description><release>Scientific Linux</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2021a-1.el7.src.rpm" version="2021a"><filename>tzdata-2021a-1.el7.noarch.rpm</filename><sum type="sha256">e4e436444c61697321d0ce5167151f9c6997ad25cbb4f76b349d4096c59d127a</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2021a-1.el7.src.rpm" version="2021a"><filename>tzdata-java-2021a-1.el7.noarch.rpm</filename><sum type="sha256">665540ad82981076b64025f9f7818c8e13241edc37cc0917f95d810de3efdccd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:0276" id="RHBA-2021:0276-1" title="Rhba-2021:0276-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:1383</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* [RFE] Add ANSSI-BP-028 to SSG (Minimal, Intermediary and Enhanced Levels) (BZ#1497415) * Remove deprecated follow argument from Ansible remediations (BZ#1890111) * Rules of type Service Disabled do not have clear description on which actions the user should take (BZ#1891435) * Latest RHEL7 STIG (V3R2) is not present in latest version of scap-security-guide. (BZ#1921643)
</description><issued date="2021-04-27 15:26:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-doc" release="3.sl7_9" src="scap-security-guide-0.1.54-3.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-doc-0.1.54-3.sl7_9.noarch.rpm</filename><sum type="sha256">5a48575cc47a52dd21176c83682cf6d2b6e69970bd2f7569345a06e0ec89b86b</sum></package><package arch="noarch" name="scap-security-guide" release="3.sl7_9" src="scap-security-guide-0.1.54-3.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-0.1.54-3.sl7_9.noarch.rpm</filename><sum type="sha256">490f4f763d6c2bf415fa620bde6d30e05157b264820ed1e75c62f520297a507a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:1383" id="RHBA-2021:1383" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1497415" id="1497415" title="1497415 &#8211; [Rfe] Add Anssi-Bp-028 To Ssg (Minimal, Intermediary And Enhanced Levels) [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1890111" id="1890111" title="1890111 &#8211; Remove Deprecated Follow Argument From Ansible Remediations [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1891435" id="1891435" title="1891435 &#8211; Rules Of Type Service Disabled Do Not Have Clear Description On Which Actions The User Should Take [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1921643" id="1921643" title="1921643 &#8211; Latest Rhel7 Stig (V3R2) Is Not Present In Latest Version Of Scap-Security-Guide. [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:2803</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* Update ANSSI-BP-028 High level profile (BZ#1955180) * Update rhel7 DISA STIG profile to v3r3 (BZ#1958789) * dconf_gnome_login_retries remediation results in error and breaks dconf
configuration file (BZ#1967566)
* Add STIG variant for GUI installations (BZ#1970131)
</description><issued date="2021-07-26 16:08:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="7.sl7_9" src="scap-security-guide-0.1.54-7.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-0.1.54-7.sl7_9.noarch.rpm</filename><sum type="sha256">8584a00307740e79f24152cf8b271df7208391b14b97be9e8822560e49e0deb5</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="7.sl7_9" src="scap-security-guide-0.1.54-7.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-rule-playbooks-0.1.54-7.sl7_9.noarch.rpm</filename><sum type="sha256">ed957b3e66f6be580be168f954918d6951e1a392d9adc7585299604e799b4825</sum></package><package arch="noarch" name="scap-security-guide-doc" release="7.sl7_9" src="scap-security-guide-0.1.54-7.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-doc-0.1.54-7.sl7_9.noarch.rpm</filename><sum type="sha256">1fb811204dae05a886079d275760ae5ca800b6dd46b9bb4d384e1b2a99e676fb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:2803" id="RHBA-2021:2803" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1955180" id="1955180" title="1955180 &#8211; Update Anssi-Bp-028 High Level Profile" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1958789" id="1958789" title="1958789 &#8211; Update Rhel7 Disa Stig Profile To V3R3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1967566" id="1967566" title="1967566 &#8211; Dconf_Gnome_Login_Retries Remediation Results In Error And Breaks Dconf Configuration File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1970131" id="1970131" title="1970131 &#8211; Add Stig Variant For Gui Installations" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3326</id><title>Gvfs Bug Fix And Enhancement Update</title><description>GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer.
Bug Fix(es) and Enhancement(s):
* memory leak in gvfs-udisks2-volume-monitor (BZ#1944813)
</description><issued date="2021-08-31 11:29:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gvfs-archive" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-archive-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">1aca23e2697140a6da45b00779021a5b231a22b372bcc3edab121535d926fb40</sum></package><package arch="x86_64" name="gvfs-fuse" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-fuse-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">0434109b9834c6c9f679d7458edd323cc168a42c0c326e32cdeecb44cef57ee0</sum></package><package arch="x86_64" name="gvfs-gphoto2" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-gphoto2-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">11560e5bbd54521ea0e6bca0318491d2b8673269f5d4fdc9c084e67c90273e47</sum></package><package arch="x86_64" name="gvfs-afc" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-afc-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">afc98b4b4e1ac910f4abefffaf5cf30cb0b545709e78fa080fa79ba7f258ed33</sum></package><package arch="x86_64" name="gvfs-tests" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-tests-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">c4f5fa9a22e86bec97bb0afd34278b0631e8c84d6dbcdb266469105fd0cca994</sum></package><package arch="x86_64" name="gvfs-smb" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-smb-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">8d525cd93e3ea2a99271db99f09ad4d564cb9e886613805250d55be1ad9a936d</sum></package><package arch="x86_64" name="gvfs-devel" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-devel-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">50886aff29128c7b0486408a3b5dd822e447fb844d03755370c2c5a151dcef9e</sum></package><package arch="x86_64" name="gvfs-goa" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-goa-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">8a74d5afc3a4679e176ccc0dd4ac8142f23d75065afef64ed61368b3fdb7f559</sum></package><package arch="x86_64" name="gvfs-client" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-client-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">9ea4e39482d284454fc7ff5b2256de153dd924e105c3400370510a1689922337</sum></package><package arch="i686" name="gvfs-client" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-client-1.36.2-5.el7_9.i686.rpm</filename><sum type="sha256">ae3ea04777b15e748e136d4348277956668010867cb6a6fdb656ff397497801e</sum></package><package arch="x86_64" name="gvfs-afp" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-afp-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">2b7bd38e06c8d0a25e04a78ebb8d92536aa223b8d39954f117dd48e4155bb4a2</sum></package><package arch="x86_64" name="gvfs-mtp" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-mtp-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">6b2a6a73ad2c7d30b771ba301e2652e2dde4f927f70f54bc64e7fe05f162633c</sum></package><package arch="x86_64" name="gvfs" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">deda765e131121c287f623ddef5a409121c54a309045dfbc75169e2da558ffb1</sum></package><package arch="i686" name="gvfs" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-1.36.2-5.el7_9.i686.rpm</filename><sum type="sha256">3f349a1203324c6f5455398298324f6820f42183960f4c215f9ea981b3dc0df2</sum></package><package arch="i686" name="gvfs-devel" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-devel-1.36.2-5.el7_9.i686.rpm</filename><sum type="sha256">7a4f19f435a83650765bc7d3568d477bf165fd943c5ec2d3b3db02a753181914</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3326" id="RHBA-2021:3326" title="Gvfs Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1944813" id="1944813" title="1944813 &#8211; Memory Leak In Gvfs-Udisks2-Volume-Monitor" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3790</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2021c, which addresses recent time zone changes. Notably:
* Samoa does not switch to the daylight saving time (DST) in 2021.
(BZ#2007732, BZ#2007785, BZ#2008251, BZ#2010126, BZ#2010127, BZ#2010312)
</description><issued date="2021-10-12 15:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2021c-1.el7.src.rpm" version="2021c"><filename>tzdata-java-2021c-1.el7.noarch.rpm</filename><sum type="sha256">ce1f65142b07a7c2f539e818e24356a5ababcfa788fe29d9410d9ebb9ea1080c</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2021c-1.el7.src.rpm" version="2021c"><filename>tzdata-2021c-1.el7.noarch.rpm</filename><sum type="sha256">39eb52d8920c1d74883252f632751e5fee35f70add925cbee7199855ace9e2c9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3790" id="RHBA-2021:3790" title="Tzdata Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2007732" id="2007732" title="2007732 &#8211; Tzdata-2021B - Pacific/Apia No Dst From 25/Sep/2021" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2007785" id="2007785" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2008251" id="2008251" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2010126" id="2010126" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2010127" id="2010127" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2010312" id="2010312" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3793</id><title>Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement Update</title><description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
The nss-softokn package provides the Network Security Services Softoken Cryptographic Module.
The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.
Bug Fix(es) and Enhancement(s):
* Integrity protection is not active on all database fields (BZ#1879933) * NSS sometimes causes CURL deadlocks (BZ#1896808) * yum gets deadlocked/hung up (indefinitely) waiting for urlgrabber-ext-down (BZ#1909150) * Recursive locks observed in nss-3.53.1 (BZ#1909261) * Need to rebase to NSS 3.66 for Firefox 91 Release [RHEL 7.9] (BZ#1966816) * NSS cannot use SQL databases created by specific versions of NSS (BZ#1978433) * Inconsistent handling of malformed CertificateRequest messages [rhel-7.9z] (BZ#1980046)
</description><issued date="2021-10-18 06:34:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-devel" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-devel-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">2c0f670ad48cb9ba882fdfeacdc869245ff97cb2320eb484022798efa965a473</sum></package><package arch="i686" name="nss-devel" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-devel-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">87fd30874b2b8b6ea451e0478c5ab0f71c3357ac0524e5197f2d9171912b34d3</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-freebl-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">ab996e4b9cdc0e5c0495805a72d005f6bcf3e6c1b7c9f1df9c1c91b85e1ec57f</sum></package><package arch="i686" name="nspr-devel" release="1.el7_9" src="nspr-4.32.0-1.el7_9.src.rpm" version="4.32.0"><filename>nspr-devel-4.32.0-1.el7_9.i686.rpm</filename><sum type="sha256">e36ace0b56dfefa947060cb4e2390383264e9d6a1c072b832cb55c35b11b8b94</sum></package><package arch="x86_64" name="nss-softokn-devel" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-devel-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">7beddb7631518604b4e3cff8364e1ab5daff98ecae28da3b679247b241026a1c</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_9" src="nss-util-3.67.0-1.el7_9.src.rpm" version="3.67.0"><filename>nss-util-devel-3.67.0-1.el7_9.i686.rpm</filename><sum type="sha256">e2619a570f375cc27050a73e1be344665a8ec0cd78341148a74adfdbeb382b47</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-freebl-devel-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">9bc2727ee996d4b8b416648ccbcc7aa3959454c3dadb7b35c6921ba4ddb73a0d</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_9" src="nss-util-3.67.0-1.el7_9.src.rpm" version="3.67.0"><filename>nss-util-devel-3.67.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">649f82efb3ff7a7b30bbb14bafad86e6003fe023b4de9813ed2525a61ee801fb</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-freebl-devel-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">e6ad52307f29b631f9c6bdb14fd5436628349a751beab2462a2b72bf55dee53b</sum></package><package arch="i686" name="nss-util" release="1.el7_9" src="nss-util-3.67.0-1.el7_9.src.rpm" version="3.67.0"><filename>nss-util-3.67.0-1.el7_9.i686.rpm</filename><sum type="sha256">f9f20cb196069ff6fc17ded3d73b7631d948cfcfd718565148b7459eb0a3639c</sum></package><package arch="x86_64" name="nss-tools" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-tools-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">82b5608db91380a02c78ba181395f8263fa772615f25d2dddf58193b096bac18</sum></package><package arch="i686" name="nss-softokn-devel" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-devel-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">d1a9c51ad1cc93aa7cdef20cd6c93bf5d1da6ff3520ad02419b6f83b7cd54af2</sum></package><package arch="x86_64" name="nss" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">eda6cfbb071aab353de25677b3b0e107b5ad7e3f59951407bd45450effc0d453</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-pkcs11-devel-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">6da92c396cd6ce357ecfb3faf406ee21f61118003201c1c15997a242b4425999</sum></package><package arch="i686" name="nss-softokn-freebl" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-freebl-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">1d42d82366258ade1c349216ae1f9b90526982e2e2961cec7657a2114e1a5426</sum></package><package arch="x86_64" name="nss-softokn" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">f71e7ed72ba31abcb53eb5f0c3203e03eaafe5d7f248cd8abbf9603288dedebd</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-pkcs11-devel-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">298b690f8d2735e8fe7b477ecd2defaab30edfd913e692635636320c4201f4d4</sum></package><package arch="i686" name="nspr" release="1.el7_9" src="nspr-4.32.0-1.el7_9.src.rpm" version="4.32.0"><filename>nspr-4.32.0-1.el7_9.i686.rpm</filename><sum type="sha256">58b6fb3d52922d32614c80d2e4376e4bfa7cdd632cf8529cbae89ec994874dc9</sum></package><package arch="i686" name="nss" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">237b8d5deabaeee02c7336476b9136567cbd8f5234849d5672d36f4e98f3e894</sum></package><package arch="x86_64" name="nspr-devel" release="1.el7_9" src="nspr-4.32.0-1.el7_9.src.rpm" version="4.32.0"><filename>nspr-devel-4.32.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">6489403e07ebd577f870a4568713fbbbb883e5a59a7d8ffe4635d32a84e02ec3</sum></package><package arch="x86_64" name="nss-util" release="1.el7_9" src="nss-util-3.67.0-1.el7_9.src.rpm" version="3.67.0"><filename>nss-util-3.67.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">7eafc5254ebcce4f3ed8e5a99677e1a6c714789347e30e1a288b47fac43cbf5e</sum></package><package arch="i686" name="nss-softokn" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">ec1f4772a2e82eaaf1e00b556efdf57a3d602819fb2ed1fe813d72cbe3895f71</sum></package><package arch="x86_64" name="nss-sysinit" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-sysinit-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">02f8ef2ecaa45b41bbb4ac0debc3d8cddf92bd8f4c975dc8d01b3074f1c83003</sum></package><package arch="x86_64" name="nspr" release="1.el7_9" src="nspr-4.32.0-1.el7_9.src.rpm" version="4.32.0"><filename>nspr-4.32.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">8f352f7a82a458922db56d82dc8d63d1b6e66069cf73a7f4a56e790945c58bd0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3793" id="RHBA-2021:3793" title="Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1879933" id="1879933" title="1879933 &#8211; Integrity Protection Is Not Active On All Database Fields" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1896808" id="1896808" title="1896808 &#8211; Nss Sometimes Causes Curl Deadlocks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1909150" id="1909150" title="1909150 &#8211; Yum Gets Deadlocked/Hung Up (Indefinitely) Waiting For Urlgrabber-Ext-Down" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1909261" id="1909261" title="1909261 &#8211; Recursive Locks Observed In Nss-3.53.1 [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1966816" id="1966816" title="1966816 &#8211; Need To Rebase To Nss 3.66 For Firefox 91 Release [Rhel 7.9]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1978433" id="1978433" title="1978433 &#8211; Nss Cannot Use Sql Databases Created By Specific Versions Of Nss [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1980046" id="1980046" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3800</id><title>Ipa Bug Fix And Enhancement Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* extdom: LDAP_INVALID_SYNTAX returned instead of LDAP_NO_SUCH_OBJECT
(BZ#2000261)
</description><issued date="2021-10-12 15:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">41e0b47432858828cc2106f9874b762fdb184614a04f4726a4236dc8fa4dd7aa</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.9.x86_64.rpm</filename><sum type="sha256">ef17cc21eec485fbe0692bc7a7590be3248479273a74a5545c4c59ac43483971</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">a0c91e360b47fb9f3c9642044c349d3b6985bde9261712151d1e2c37705c5bcd</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.9.x86_64.rpm</filename><sum type="sha256">95cad1c2465c7cd71b6931c1e54f48dab469d3bd75a26743d3edddadaa08c6ef</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">84d4c7cf560d79075edc1a42b6c9ddc5fa12d371ccf80d15f662efd1d209fd4c</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">e4e7127bb63d889f2044cd811cff7a8d141a6f20110f919ca2332852b4e3a301</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.9.x86_64.rpm</filename><sum type="sha256">62d0456d32a15daea2e8aed6b63d3fe97c75f82f5f11465be5331e7d25765316</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">67bc072b25687f470b5ff797415ec5e7cc911d1d31cded229a95d80450c34015</sum></package><package arch="noarch" name="ipa-client-common" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">80f987c27a87872d59c18c0b4d98af6629791fab56c1e5c97d36a7944bb8a069</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">da28eee5f08704830533dcbfbe02070114d97443c679e331e87133a799f511f4</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">6a032b03a786c53d33b95aa6f53af6c35d69b76cb6a1d25ff429b638c357b431</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3800" id="RHBA-2021:3800" title="Ipa Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2000261" id="2000261" title="2000261 &#8211; Extdom: Ldap_Invalid_Syntax Returned Instead Of Ldap_No_Such_Object" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3804</id><title>Pki-Core Bug Fix And Enhancement Update</title><description>The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.
Bug Fix:
* ipa: ERROR: Request failed with status 500: Non-2xx response from CA REST
API: 500 (BZ#1958788)
</description><issued date="2021-10-13 06:45:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-ca" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-ca-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">f13c8a17bd7ad06b0ff1a7f99c4d952ce8c3d27a8439ba4b821557a3246286d7</sum></package><package arch="noarch" name="pki-javadoc" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-javadoc-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">9fb683639d340b9802f01086cdb14ef026bbb4f243f14240b5b1dc4ca5fbf903</sum></package><package arch="x86_64" name="pki-tools" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-tools-10.5.18-17.el7_9.x86_64.rpm</filename><sum type="sha256">3761340e411df2efeb62821c5fb549f3d0ca5765d3a67dc7dbdcc874cfdc96fa</sum></package><package arch="noarch" name="pki-server" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-server-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">3e0bc224483605ed81901ddbbaf0ab507896add15347603bdc55710f5c9714ed</sum></package><package arch="x86_64" name="pki-symkey" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-symkey-10.5.18-17.el7_9.x86_64.rpm</filename><sum type="sha256">cfad3f2a0cba4a572bfa4ed7cb7de3336c7e25dd6a44237a7c12e1e2c862445e</sum></package><package arch="noarch" name="pki-base" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-base-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">9a69fd8ca9191ce9765dca7e90ac0d7676e0457eb56f3bbf662f528aff23200a</sum></package><package arch="noarch" name="pki-base-java" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-base-java-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">293585ab40dfbecb575e73bd5834c00225d9b0168c02aad8d9852451198debcc</sum></package><package arch="noarch" name="pki-kra" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-kra-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">a53dd9436b90bdfca04f79ee43c97898bcfe380022b4edfe07745b6933ecf1b4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3804" id="RHBA-2021:3804" title="Pki-Core Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1958788" id="1958788" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:4003</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2021e, which addresses recent time zone changes. Notably:
* The Pacific/Fiji timezone has suspended daylight saving time (DST) for the 2021/2022 season. * The 'zic -r' command now marks unspecified timestamps with "-00". * Palestine will end daylight saving time (DST) on October 29, 2021 at 01:00, rather than the predicted October 30, 2021.
(BZ#2015242, BZ#2015246, BZ#2016369)
</description><issued date="2021-10-27 14:12:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2021e-1.el7.src.rpm" version="2021e"><filename>tzdata-java-2021e-1.el7.noarch.rpm</filename><sum type="sha256">9d885a3f4ea1b9ee78acda35303ce6d7ddc39c5414ff955017dabaa410d9b371</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2021e-1.el7.src.rpm" version="2021e"><filename>tzdata-2021e-1.el7.noarch.rpm</filename><sum type="sha256">502a8d632f40de778a2c065bd63517e81f6afd7354c9188b9872859877f35a34</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:4003" id="RHBA-2021:4003" title="Tzdata Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2015242" id="2015242" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2015246" id="2015246" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2016369" id="2016369" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:4780</id><title>Openscap Bug Fix And Enhancement Update</title><description>The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* Report shows "pass" while command output shows "fail" items (BZ#1858502) * Memory leaks in probe_file (BZ#1861793) * oscap dies with segfault when using --stig-viewer option and latest XML
file from DoD (BZ#1911999)
* probe_file consumes all the RAM of the system (128GB) (BZ#1932833) * Ansible playbooks for profiles have duplicate variable definitions
(BZ#1944683)
</description><issued date="2021-11-30 11:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openscap-utils" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">3d799ea31e47c7922e5cfe2fbbf4686e570d0a127189ea8e806604ffb3a74298</sum></package><package arch="i686" name="openscap" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-14.el7_9.i686.rpm</filename><sum type="sha256">bc4661a363dab8a8c703267149be0e9218834cec03de3c7b9243f2de476c8afb</sum></package><package arch="i686" name="openscap-engine-sce" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-14.el7_9.i686.rpm</filename><sum type="sha256">1bc26a17f1599a69c7104b9a7f02b833edbb7a3d9efe3b62e439813a1f4b39c7</sum></package><package arch="x86_64" name="openscap" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">bd74786e781b5514f67db81b5a657b47b2c804fb640fb1dc6481d3d1692c383e</sum></package><package arch="i686" name="openscap-devel" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-14.el7_9.i686.rpm</filename><sum type="sha256">1a127768c1bd492614f5bdbd5318f52cf7eafedfcdd910557915a00bcaf45a29</sum></package><package arch="i686" name="openscap-engine-sce-devel" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-14.el7_9.i686.rpm</filename><sum type="sha256">a17c9d9cc19b0a06f3d8ea7164f329b2c113e6a9ffd91a4386568ee3a6818e6f</sum></package><package arch="x86_64" name="openscap-scanner" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">37f640cc29d3c6e8915c6041e8d9b4df67db84e701148845bc09bddb2f9bce79</sum></package><package arch="x86_64" name="openscap-devel" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">7094e2f5a6e417455d4bc02eb74f68e4b91b5239492dfd64fb32162c0c5b4f8e</sum></package><package arch="x86_64" name="openscap-python" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">f405937b54e1ebb9762fcc33aa9f922e79a92c243bf92fbf46955187a02eb93f</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">4ce5595b4468787dc8e5ab4b62438002307e760a34f8e8241ba2122a68a3166f</sum></package><package arch="x86_64" name="openscap-engine-sce" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">3a0a404fa4b80b779631cfeab831338037a2a4f23652bf1cbd92d28b96fb6951</sum></package><package arch="x86_64" name="openscap-extra-probes" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">90c44cabcea4e43996ec4a90e757d7a294f2b0b5fc5b4a1604ef1b3ad1fc0cba</sum></package><package arch="noarch" name="openscap-containers" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-14.el7_9.noarch.rpm</filename><sum type="sha256">78fa0b4b21a1a3642d66229f016c2db3e7dd37fa25972a201d264a4689c8d479</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:4780" id="RHBA-2021:4780" title="Openscap Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1858502" id="1858502" title="1858502 &#8211; Report Shows 'Pass' While Command Output Shows 'Fail' Items" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1861793" id="1861793" title="1861793 &#8211; Memory Leaks In Probe_File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1911999" id="1911999" title="1911999 &#8211; Oscap Dies With Segfault When Using --Stig-Viewer Option And Latest Xml File From Dod" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1932833" id="1932833" title="1932833 &#8211; Probe_File Consumes All The Ram Of The System (128Gb)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1944683" id="1944683" title="1944683 &#8211; Ansible Playbooks For Profiles Have Duplicate Variable Definitions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:4781</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* xccdf_org.ssgproject.content_rule_package_MFEhiplsm_installed does not
properly check for SELinux (BZ#1944297)
* Insights does not use latest benchmark for CIS compliance (BZ#1953787) * Ansible remediations of 3 dconf_gnome related rules don't work properly
(BZ#1976123)
* Update rhel7 DISA STIG profile to v3r5 (BZ#1996678)
</description><issued date="2021-11-29 18:48:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="4.sl7_9" src="scap-security-guide-0.1.57-4.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-0.1.57-4.sl7_9.noarch.rpm</filename><sum type="sha256">34b51c5bc4b0fdcb126de54e516c912ae49536a750759fa5eb10b185df31f716</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="4.sl7_9" src="scap-security-guide-0.1.57-4.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-rule-playbooks-0.1.57-4.sl7_9.noarch.rpm</filename><sum type="sha256">f9f68aa9f3fb47b03571e50bacf7d612945de926bf71212d965d2de3a973bb7e</sum></package><package arch="noarch" name="scap-security-guide-doc" release="4.sl7_9" src="scap-security-guide-0.1.57-4.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-doc-0.1.57-4.sl7_9.noarch.rpm</filename><sum type="sha256">b7c847545012d13dfdffe57a3189942a91879a02fae26daf176ef346382ee2f9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:4781" id="RHBA-2021:4781" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1944297" id="1944297" title="1944297 &#8211; Xccdf_Org.Ssgproject.Content_Rule_Package_Mfehiplsm_Installed Does Not Properly Check For Selinux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1953787" id="1953787" title="1953787 &#8211; Insights Does Not Use Latest Benchmark For Cis Compliance" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1976123" id="1976123" title="1976123 &#8211; Ansible Remediations Of 3 Dconf_Gnome Related Rules Don'T Work Properly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1996678" id="1996678" title="1996678 &#8211; Update Rhel7 Disa Stig Profile To V3R5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:0701</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* Update RHEL7 DISA STIG profile to V3R6 (BZ#2049532)
</description><issued date="2022-03-01 06:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-rule-playbooks" release="6.sl7_9" src="scap-security-guide-0.1.57-6.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-rule-playbooks-0.1.57-6.sl7_9.noarch.rpm</filename><sum type="sha256">6cfae01e405036fc6c9bc1dad1f1b2af3cf0b0d0a3527f39a267908754069cf7</sum></package><package arch="noarch" name="scap-security-guide-doc" release="6.sl7_9" src="scap-security-guide-0.1.57-6.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-doc-0.1.57-6.sl7_9.noarch.rpm</filename><sum type="sha256">3ccacefd6ea02017cec03049ebeab09181953aed25356068f40ca92f92fb8531</sum></package><package arch="noarch" name="scap-security-guide" release="6.sl7_9" src="scap-security-guide-0.1.57-6.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-0.1.57-6.sl7_9.noarch.rpm</filename><sum type="sha256">4df0bc8bcdcc1bea9da053779deef090e5f179f6b302c0d6d54efdef352b3a69</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:0701" id="RHBA-2022:0701" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2049532" id="2049532" title="2049532 &#8211; Update Rhel7 Disa Stig Profile To V3R6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:1032</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022a, which addresses recent time zone changes. Notably:
* In Palestine the daylight saving time (DST) starts on March 27, 2022, not on March 26. * The zdump -v command now outputs better failure information. * This update provides fixes for a code that read corrupted TZif data.
</description><issued date="2022-03-24 18:33:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022a-1.el7.src.rpm" version="2022a"><filename>tzdata-java-2022a-1.el7.noarch.rpm</filename><sum type="sha256">151cfed56b482c8d1befbb66f69fe3839eee9334e1c283fbb3f6d3da36531141</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022a-1.el7.src.rpm" version="2022a"><filename>tzdata-2022a-1.el7.noarch.rpm</filename><sum type="sha256">2bd81e7c3b4b394094d0ff8d122a291ca35556608f8141093ea7aaac2b16c70e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:1032" id="RHBA-2022:1032" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:4647</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* McAfee packages not detected properly by the RHEL7 rules (BZ#2066321) * Update RHEL7 DISA STIG profile to V3R7 (BZ#2079217)
</description><issued date="2022-05-19 17:36:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-doc" release="8.sl7_9" src="scap-security-guide-0.1.57-8.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-doc-0.1.57-8.sl7_9.noarch.rpm</filename><sum type="sha256">408202f740301c34e37133d0bba9c8c79e27ea0366a76dfedd262f2bc63d5ceb</sum></package><package arch="noarch" name="scap-security-guide" release="8.sl7_9" src="scap-security-guide-0.1.57-8.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-0.1.57-8.sl7_9.noarch.rpm</filename><sum type="sha256">208aebc50b47c17f0d0a4753624c24b0fd4ed743c6fac58bcd0d48ce3ab528fd</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="8.sl7_9" src="scap-security-guide-0.1.57-8.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-rule-playbooks-0.1.57-8.sl7_9.noarch.rpm</filename><sum type="sha256">a7d8dfb326f66727f85327ebe37848008a74d7f20797a6ece46466ad90686083</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:4647" id="RHBA-2022:4647" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2066321" id="2066321" title="2066321 &#8211; Mcafee Packages Not Detected Properly By The Rhel7 Rules [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2079217" id="2079217" title="2079217 &#8211; Update Rhel7 Disa Stig Profile To V3R7 [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:6138</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022c, which addresses recent time zone changes. Notably:
* In Chile (the America/Santiago time zone), the daylight saving time (DST) starts on September 11, 2022 instead of September 4.
</description><issued date="2022-08-23 08:32:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022c-1.el7.src.rpm" version="2022c"><filename>tzdata-2022c-1.el7.noarch.rpm</filename><sum type="sha256">2526692b84bdac51c09de6cee75a9740d154f258e3f1ad4e7c7539b537c5a510</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022c-1.el7.src.rpm" version="2022c"><filename>tzdata-java-2022c-1.el7.noarch.rpm</filename><sum type="sha256">db8d6f0b1278aa4cdec8aa873f85d6fc25e37b02c372b78b01922680ef29c6f9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6138" id="RHBA-2022:6138" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:6576</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* Align RHEL 7 STIG profile with DISA STIG Benchmark (BZ#1967950) * content_rule_audit_basic_configuration enforces using default buffer size (8192) for audit, which isn't always suitable on busy systems (BZ#1993822) * Rule file_permissions_sshd_private_key fails after kickstart installation (BZ#2021258) * Update source of CVE data in data stream (BZ#2028432) * Remove PCI-DSS-centric XCCDF Benchmark from scap-security-guide (BZ#2038165) * Update RHEL7 DISA STIG profile to V3R8 (BZ#2112939) * Rebase scap-security-guide in Red Hat Enterprise Linux 7.9 to latest upstream version (BZ#2116359)
</description><issued date="2022-09-20 10:15:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-rule-playbooks" release="1.sl7_9" src="scap-security-guide-0.1.63-1.sl7_9.src.rpm" version="0.1.63"><filename>scap-security-guide-rule-playbooks-0.1.63-1.sl7_9.noarch.rpm</filename><sum type="sha256">f52637667eb5a2187f932a8a5a05586283f500d28d628501fcd653d4d25edec8</sum></package><package arch="noarch" name="scap-security-guide-doc" release="1.sl7_9" src="scap-security-guide-0.1.63-1.sl7_9.src.rpm" version="0.1.63"><filename>scap-security-guide-doc-0.1.63-1.sl7_9.noarch.rpm</filename><sum type="sha256">94a85061d97a42f352b1f371ac22a05bec5536c421266a08e6361b5360d91890</sum></package><package arch="noarch" name="scap-security-guide" release="1.sl7_9" src="scap-security-guide-0.1.63-1.sl7_9.src.rpm" version="0.1.63"><filename>scap-security-guide-0.1.63-1.sl7_9.noarch.rpm</filename><sum type="sha256">dac6ee364834b698e57df24a4eccb73de0db2fe69172681f54532edaf4bfa706</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6576" id="RHBA-2022:6576" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1967950" id="1967950" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1993822" id="1993822" title="1993822 &#8211; Content_Rule_Audit_Basic_Configuration Enforces Using Default Buffer Size (8192) For Audit, Which Isn'T Always Suitable On Busy Systems [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2021258" id="2021258" title="2021258 &#8211; Rule File_Permissions_Sshd_Private_Key Fails After Kickstart Installation [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2028432" id="2028432" title="2028432 &#8211; Update Source Of Cve Data In Data Stream [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2038165" id="2038165" title="2038165 &#8211; Remove Pci-Dss-Centric Xccdf Benchmark From Scap-Security-Guide [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2112939" id="2112939" title="2112939 &#8211; Update Rhel7 Disa Stig Profile To V3R8 [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2116359" id="2116359" title="2116359 &#8211; Rebase Scap-Security-Guide In Red Hat Enterprise Linux 7.9 To Latest Upstream Version [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:6712</id><title>Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement Update</title><description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
The nss-softokn package provides the Network Security Services Softoken Cryptographic Module.
The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.
Bug Fix(es) and Enhancement(s):
* Import of PKCS#12 files with Camellia encryption is not supported (BZ#1462297)  * Rebase nss to 3.79 for Firefox 103 ESR (BZ#2064364) * NSS sometimes causes hang for customer application (BZ#2066679) * Rebase nss-util to 3.79 for Firefox 103 ESR (BZ#2093506) * Rebase nss-softokn to 3.79 for Firefox 103 ESR (BZ#2093507) * Rebase nspr to 3.79 for Firefox 103 ESR (BZ#2093508) * update-ca-trust fails with /usr/bin/p11-kit extract calls getting aborted (BZ#2096268) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097811) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (nss) (BZ#2097842) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (nspr) (BZ#2097904) * curl segfaults (BZ#2103706)
</description><issued date="2022-09-30 08:37:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-sysinit" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-sysinit-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">717eea39d2aa9e9184975eeed842014f45b14c444f53f59de786621ab7ed2734</sum></package><package arch="i686" name="nss-softokn-devel" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-devel-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">5476523c29380f539332b29dc5309a868c2ff52a91096115d6028f6137883294</sum></package><package arch="i686" name="nspr" release="3.1.el7_9" src="nspr-4.34.0-3.1.el7_9.src.rpm" version="4.34.0"><filename>nspr-4.34.0-3.1.el7_9.i686.rpm</filename><sum type="sha256">7dbdc6ee9f0f8f77fb4b7bcd7ac52016207b3edab103060b5d61050a9c3570d2</sum></package><package arch="i686" name="nss-softokn-freebl" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-freebl-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">a353095c518f10d49c7e80ea897ad387b21e25854313d534075b7b5f2f6465d2</sum></package><package arch="x86_64" name="nss" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">13b925723c08f99571a2097f97ee70a74fda215aee270a4c8e620242d73ee852</sum></package><package arch="i686" name="nss-util" release="1.el7_9" src="nss-util-3.79.0-1.el7_9.src.rpm" version="3.79.0"><filename>nss-util-3.79.0-1.el7_9.i686.rpm</filename><sum type="sha256">8d197cc06e73cbe55bfd20060eacc65685601555f77dc85568f5bb490e83fe3a</sum></package><package arch="x86_64" name="nss-softokn-devel" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-devel-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">2ca839847c5550bc4f5ddf11e3535fa8e46b0943ac3a65f9b89ca157da090d26</sum></package><package arch="x86_64" name="nss-softokn" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">167f0a4aeb1c09264bb4ef61f7a6c59de588e06a08195ab7b3e67e52aa2cd101</sum></package><package arch="i686" name="nspr-devel" release="3.1.el7_9" src="nspr-4.34.0-3.1.el7_9.src.rpm" version="4.34.0"><filename>nspr-devel-4.34.0-3.1.el7_9.i686.rpm</filename><sum type="sha256">5402ff5f1241395f94fb3e604641b0b68ca43d1d61a08cf7f806e075df949132</sum></package><package arch="x86_64" name="nspr-devel" release="3.1.el7_9" src="nspr-4.34.0-3.1.el7_9.src.rpm" version="4.34.0"><filename>nspr-devel-4.34.0-3.1.el7_9.x86_64.rpm</filename><sum type="sha256">55e256f8ae60657b3a61612b1991bb4981554b794c75335970a7cb2595f4b6c1</sum></package><package arch="x86_64" name="nss-util" release="1.el7_9" src="nss-util-3.79.0-1.el7_9.src.rpm" version="3.79.0"><filename>nss-util-3.79.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">3142083148f43ab008bce4419a7289209620b024ee7091fa8a9d73a379f56451</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_9" src="nss-util-3.79.0-1.el7_9.src.rpm" version="3.79.0"><filename>nss-util-devel-3.79.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">6dcaeaf3e23cd6e103685d1ec84ff38d94c89e7d600bd14b87211b7390f2e222</sum></package><package arch="x86_64" name="nss-tools" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-tools-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">1713aec9855779538668e46177c7e738d0a0892ac2078dd0c538cf154cbb3b3d</sum></package><package arch="x86_64" name="nss-devel" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-devel-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">63584668c447eb2c6b01095d7f6aba35b6a09dac00efaee4964d5c9f0fcfe0ed</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-pkcs11-devel-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">9b0f709efaf08e35bb9eac6973c3d433a4b011a42b860954588e1599105d1d41</sum></package><package arch="i686" name="nss-devel" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-devel-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">590e47b59ca6cd7241939955196bf27599dde733c01a0fc20a52c5b4861206f1</sum></package><package arch="i686" name="nss-softokn" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">72187c2f765bb749d6088a6446d14bbd7ba12da8774af35b2deb35d35b2abae8</sum></package><package arch="i686" name="nss-pkcs11-devel" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-pkcs11-devel-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">1c83452ff7cc28a33974a11b8e12dea9218f1fd01f632307b37241a6ddf60e12</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_9" src="nss-util-3.79.0-1.el7_9.src.rpm" version="3.79.0"><filename>nss-util-devel-3.79.0-1.el7_9.i686.rpm</filename><sum type="sha256">fff77c933cf38500888db2bf93fc4340097877874490438b3418897cc0937cb5</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-freebl-devel-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">db7bbda5be560f602b5594716e7b92829d1f1c41bd9b428eb44f00a44559b9ec</sum></package><package arch="x86_64" name="nspr" release="3.1.el7_9" src="nspr-4.34.0-3.1.el7_9.src.rpm" version="4.34.0"><filename>nspr-4.34.0-3.1.el7_9.x86_64.rpm</filename><sum type="sha256">48b4e6653da1eb4229713d7c9241bc50f81a9d67f2a7e2e14e94d24251b331e0</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-freebl-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">c911e5c946a25f1b2a978735330881ecfafd5b1f7f805b1584c866aaa076046b</sum></package><package arch="i686" name="nss" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">ee4b3aed756beb4b69e7cf12635c63492af12edb727fc74b29f0f2ef39291190</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-freebl-devel-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">561cba4e0ccb895de95856af3ce838de7cfabafcf6db99c36e4d74f2b4243173</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6712" id="RHBA-2022:6712" title="Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1462297" id="1462297" title="1462297 &#8211; Import Of Pkcs#12 Files With Camellia Encryption Is Not Supported" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2064364" id="2064364" title="2064364 &#8211; Rebase Nss To 3.79 For Firefox 103 Esr [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2066679" id="2066679" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2093506" id="2093506" title="2093506 &#8211; Rebase Nss-Util To 3.79 For Firefox 103 Esr [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2093507" id="2093507" title="2093507 &#8211; Rebase Nss-Softokn To 3.79 For Firefox 103 Esr [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2093508" id="2093508" title="2093508 &#8211; Rebase Nspr To 3.79 For Firefox 103 Esr [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2096268" id="2096268" title="2096268 &#8211; Update-Ca-Trust Fails With /Usr/Bin/P11-Kit Extract Calls Getting Aborted [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2097811" id="2097811" title="2097811 &#8211; Certmonger Startup Very Slow Using Default Nss Sqlite Database Backend [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2097842" id="2097842" title="2097842 &#8211; Selfserv Binds On Ipv6 Only Instead Of Both Ipv6 And Ipv4 (Nss) [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2097904" id="2097904" title="2097904 &#8211; Selfserv Binds On Ipv6 Only Instead Of Both Ipv6 And Ipv4 (Nspr) [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2103706" id="2103706" title="2103706 &#8211; Curl Segfaults [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:6827</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022d, which addresses recent time zone changes. Notably:
* Palestine will transition to daylight saving time (DST) on October 29, 2022 instead of October 28, 2022. * Europe/Uzhgorod and Europe/Zaporozhye are moved to the 'backzone' file.
</description><issued date="2022-10-06 12:06:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022d-1.el7.src.rpm" version="2022d"><filename>tzdata-java-2022d-1.el7.noarch.rpm</filename><sum type="sha256">aa8c2791f3c77330bdde1873e5dc9aa039495379b9e49c9bd539636e1453cc3d</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022d-1.el7.src.rpm" version="2022d"><filename>tzdata-2022d-1.el7.noarch.rpm</filename><sum type="sha256">e29657e0ab4a9adfc968a48499f95dabe2c9b1b55b91307237bd9ef79589f1d5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6827" id="RHBA-2022:6827" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:7067</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022e, which addresses recent time zone changes. Notably:
* Jordan and Syria cancelled the daylight saving time (DST) transition planned for October 28 2022 and will remain at time offset of +03:00 from the coordinated universal time (UTC) permanently.
</description><issued date="2022-10-21 09:05:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022e-1.el7.src.rpm" version="2022e"><filename>tzdata-2022e-1.el7.noarch.rpm</filename><sum type="sha256">bb921010ac58172a3a2ded25bde14eeb0b515ba6faef765dea2efb1e10e7256d</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022e-1.el7.src.rpm" version="2022e"><filename>tzdata-java-2022e-1.el7.noarch.rpm</filename><sum type="sha256">f964a856c27ee43d19659d570924fc1cfe1104b018c8e052165488217e60b08d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:7067" id="RHBA-2022:7067" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:7404</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST).
</description><issued date="2022-11-03 08:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022f-1.el7.src.rpm" version="2022f"><filename>tzdata-java-2022f-1.el7.noarch.rpm</filename><sum type="sha256">419a66f43a09d2d55dad85fe19134693e98ea63126303accf356fbe0d2cb977e</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022f-1.el7.src.rpm" version="2022f"><filename>tzdata-2022f-1.el7.noarch.rpm</filename><sum type="sha256">2f62960f7056adb2aa0c6f6aa3da568a6588baae81dc6de89e438d64258c0078</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:7404" id="RHBA-2022:7404" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:8785</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably:
* On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added.
</description><issued date="2022-12-06 08:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022g-1.el7.src.rpm" version="2022g"><filename>tzdata-java-2022g-1.el7.noarch.rpm</filename><sum type="sha256">68f3b82080120841f4ad82d719ee4570f9fa63177d69fde1ba0aa173448abcf2</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022g-1.el7.src.rpm" version="2022g"><filename>tzdata-2022g-1.el7.noarch.rpm</filename><sum type="sha256">bb123b23987cd20416556db907bd9564418cfa6e78e9ed20f3a719a4eadc32a7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:8785" id="RHBA-2022:8785" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1094</id><title>Openscap Bug Fix And Enhancement Update</title><description>The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* Potential invalid scan results in OpenSCAP. (BZ#2111041)
</description><issued date="2023-03-07 10:48:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="openscap-engine-sce-devel" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-15.el7_9.i686.rpm</filename><sum type="sha256">da53f46a4c67f90b223ab07a1f586c1eba98630e728315fc0f32a28834c7c960</sum></package><package arch="x86_64" name="openscap-engine-sce" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">9eaffc2d4b0b1066f9fd6c24e4d8e060ead83958d736cc3079b4ed8ede000bbd</sum></package><package arch="x86_64" name="openscap-devel" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">b51ca8653da9180796ccb42b29054f561c6e56bc9c4d0b56d9a4d7d36006399b</sum></package><package arch="x86_64" name="openscap-scanner" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">f0261e7d1cfa92d6fe9e9abd07b22a07067312cdf0390f6a4b4240ed6e6e9545</sum></package><package arch="noarch" name="openscap-containers" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-15.el7_9.noarch.rpm</filename><sum type="sha256">501eb0d76ddd27ce2d3915947213e39cea80ebe499dc423ab3b590fcd88606b2</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">2d1d4ce394f8c1b0afc66d49d335f168cab5bbd3f96425edf8698f5e2aa0de9b</sum></package><package arch="x86_64" name="openscap-python" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">a7d7997bc2aa8a38b5eb3b000c0b4fa96150a9658f55c84651cd6127f2bcc37f</sum></package><package arch="x86_64" name="openscap-extra-probes" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">204a8cba807ba67c41efda5b48f0a2d2e7e0ff5a15688e3cbd3ad2e687735fa7</sum></package><package arch="x86_64" name="openscap-utils" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">dc2c0db93642b89ee53df753654d9314ae61eaeaf111f35c2d43780482928c45</sum></package><package arch="x86_64" name="openscap" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">c7927ed6542837c5713897ed63c49d7bbdc10e4b4713ae7a018d41c1f55d847f</sum></package><package arch="i686" name="openscap-engine-sce" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-15.el7_9.i686.rpm</filename><sum type="sha256">799ee42a178599fb8fabccbcb8d18289129dcd4654b8de0445f1d033046f9931</sum></package><package arch="i686" name="openscap" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-15.el7_9.i686.rpm</filename><sum type="sha256">cfc2f5c78d541ba22f88885b732a1b652d64d330709a388aa72647fb622cb13b</sum></package><package arch="i686" name="openscap-devel" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-15.el7_9.i686.rpm</filename><sum type="sha256">2af9e67de95817b3a9afba1fde15e4e09e71ba5d8356417d8753ec55bd66b846</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1094" id="RHBA-2023:1094" title="Openscap Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2111041" id="2111041" title="2111041 &#8211; Potential Invalid Scan Results In Openscap [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1099</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2123284) * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2123367) * Update RHEL7 DISA STIG profile to V3R10 (BZ#2152657) * Rebase SSG to latest upstream version in RHEL 7.9 (BZ#2158410) * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2170038)
</description><issued date="2023-03-07 10:48:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-rule-playbooks" release="1.sl7_9" src="scap-security-guide-0.1.66-1.sl7_9.src.rpm" version="0.1.66"><filename>scap-security-guide-rule-playbooks-0.1.66-1.sl7_9.noarch.rpm</filename><sum type="sha256">8c896e9b2af0229b23afe8b3b521d6edecf8f758349df435ed63be14bb9a19c5</sum></package><package arch="noarch" name="scap-security-guide" release="1.sl7_9" src="scap-security-guide-0.1.66-1.sl7_9.src.rpm" version="0.1.66"><filename>scap-security-guide-0.1.66-1.sl7_9.noarch.rpm</filename><sum type="sha256">51c20f7783a416005f490dd4757723c285cbc4574923a141e6549a56996d089c</sum></package><package arch="noarch" name="scap-security-guide-doc" release="1.sl7_9" src="scap-security-guide-0.1.66-1.sl7_9.src.rpm" version="0.1.66"><filename>scap-security-guide-doc-0.1.66-1.sl7_9.noarch.rpm</filename><sum type="sha256">c77812f9eba2fa7464fd7744d0cd653deb1014d23ec906498f320863a2c2121b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1099" id="RHBA-2023:1099" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2123284" id="2123284" title="2123284 &#8211; File_Permissions_Sshd_Private_Key Is Not Aligned With Disa Stig Benchmark [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2123367" id="2123367" title="2123367 &#8211; Audit_Rules_Usergroup_Modification_Shadow Don'T Remediate Existing Audit Rule [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2152657" id="2152657" title="2152657 &#8211; Update Rhel7 Disa Stig Profile To V3R10 [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2158410" id="2158410" title="2158410 &#8211; Rebase Ssg To Latest Upstream Version In Rhel 7.9 [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2170038" id="2170038" title="2170038 &#8211; [Scap] Pci-Dss Rsyslog Log Files Related Rules Fails For Rsyslog 8 Rainerscript Syntax [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1491</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2023b, which addresses recent time zone changes. Notably:
* Egypt will reintroduce daylight saving time (DST) from April through October. * Morocco will observe DST from April 23, 2023 instead of April 30. * This year, Palestine is delaying the start of DST. * This year, Lebanon is delaying the start of DST until April 20.
</description><issued date="2023-04-04 08:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2023b-1.el7.src.rpm" version="2023b"><filename>tzdata-2023b-1.el7.noarch.rpm</filename><sum type="sha256">a6eecba20da600ff330d091e2cf2a518e167cb6a256bb05c7c460e3e52e0b380</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2023b-1.el7.src.rpm" version="2023b"><filename>tzdata-java-2023b-1.el7.noarch.rpm</filename><sum type="sha256">a3326ac04c1bf1f60a6717458e915ce1d654bc263f8c2f8d0828b38f77898fee</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1491" id="RHBA-2023:1491" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1534</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2023c, which addresses recent time zone changes. Notably:
* The changes added for Lebanon in tzdata-2023b have been reversed. This update reinstates the DST change for Lebanon effective March 25.
</description><issued date="2023-04-04 08:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2023c-1.el7.src.rpm" version="2023c"><filename>tzdata-java-2023c-1.el7.noarch.rpm</filename><sum type="sha256">d7986e88f5938d15b2cdb0725f9baa8d5d795f83fde52f1732b3412f4448ed15</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2023c-1.el7.src.rpm" version="2023c"><filename>tzdata-2023c-1.el7.noarch.rpm</filename><sum type="sha256">db1001e6ec93cfa2f1804ca3e89c41cfa944eb81bdff04df3383ca1d3ba15529</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1534" id="RHBA-2023:1534" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1991</id><title>Shim Bug Fix And Enhancement Update</title><description>The shim package contains a first stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Bug Fix(es) and Enhancement(s):
* Shim refuses to boot the system when TPM event logging fails. (BZ#2002648) * Shim loops indefinitely processing certificates when space in mok is smaller than certificate size. (BZ#2007084)
</description><issued date="2023-07-18 09:51:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="shim-unsigned-ia32" release="3.el7" src="shim-15.6-3.el7.src.rpm" version="15.6"><filename>shim-unsigned-ia32-15.6-3.el7.x86_64.rpm</filename><sum type="sha256">28cad241c3839168fa5f00d1f4c70a73860eb8bb2c0e4640b3ae258c33622d5f</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="3.el7" src="shim-15.6-3.el7.src.rpm" version="15.6"><filename>shim-unsigned-x64-15.6-3.el7.x86_64.rpm</filename><sum type="sha256">d4e013392e4e29f8a7d58bb378abd82acb48084535a350ca8a90e591371a6403</sum></package><package arch="x86_64" name="mokutil" release="3.sl7" src="shim-signed-15.6-3.sl7.src.rpm" version="15.6"><filename>mokutil-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">d8932c49f75ea8f4f398e9eeaa80eef43d3f8e48cb174d8da9ef754a43db7cff</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1991" id="RHBA-2023:1991" title="Shim Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2002648" id="2002648" title="2002648 &#8211; Shim Refuses To Boot The System When Tpm Event Logging Fails [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2007084" id="2007084" title="2007084 &#8211; Shim Loops Indefinitely Processing Certificates When Space In Mok Is Smaller Than Certificate Size" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:4598</id><title>Firefox Bug Fix Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Bug Fix:
* Updating Firefox to 102.14.0 prevents all pages from loading. (BZ#2230023)
</description><issued date="2023-08-10 09:17:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="3.el7_9" src="firefox-102.14.0-3.el7_9.src.rpm" version="102.14.0"><filename>firefox-102.14.0-3.el7_9.i686.rpm</filename><sum type="sha256">8a33ccae5f36446832cdebfee806a98620b32eb271ffa4913d5dbf57cd9cd8c0</sum></package><package arch="x86_64" name="firefox" release="3.el7_9" src="firefox-102.14.0-3.el7_9.src.rpm" version="102.14.0"><filename>firefox-102.14.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">ca47117b220a0bbd5c8083dada38c466ccff34032000a9c2cdd83be018c5bccc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:4598" id="RHBA-2023:4598" title="Firefox Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2230023" id="2230023" title="2230023 &#8211; Updating Firefox To 102.14.0 Prevents All Pages Loading [7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:4599</id><title>Thunderbird Bug Fix Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
Bug Fix:
* TLS broken for POP3 and SMTP connections. (BZ#2229981)
</description><issued date="2023-08-10 09:17:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-102.14.0-3.el7_9.src.rpm" version="102.14.0"><filename>thunderbird-102.14.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">950ffadc0560f6aee5fc3c3f0202ebd7023c4bc086bbbfb7af5e05fa99f89d59</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:4599" id="RHBA-2023:4599" title="Thunderbird Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2229981" id="2229981" title="2229981 &#8211; Tls Broken For Pop3 And Smtp Connections [7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:4824</id><title>Scap-Security-Guide Bug Fix Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es):
* Update ANSSI BP-028 in RHEL7 to v2.0 (BZ#2155793) * openscap shows IPv6 as enabled even if it is disabled (BZ#2210276) * Rebase scap-security-guide in Red Hat Enterprise Linux 7.9 to latest upstream
version (BZ#2221694)
* Remote resource referenced  from datastream is missing
https://access.redhat.com/security/data/oval/com.redhat.rhsa-RHEL7.xml.bz2 (BZ#2223817)
</description><issued date="2023-08-30 14:40:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="1.sl7_9" src="scap-security-guide-0.1.69-1.sl7_9.src.rpm" version="0.1.69"><filename>scap-security-guide-0.1.69-1.sl7_9.noarch.rpm</filename><sum type="sha256">f127d4b826901e47d24dc9a99c48f66343f06f7d8a2090a14bd23c4fac296b0b</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="1.sl7_9" src="scap-security-guide-0.1.69-1.sl7_9.src.rpm" version="0.1.69"><filename>scap-security-guide-rule-playbooks-0.1.69-1.sl7_9.noarch.rpm</filename><sum type="sha256">6b6f66cddc9c2482a484b76671b21ae1e39d264deca43657ab958a269f01eaad</sum></package><package arch="noarch" name="scap-security-guide-doc" release="1.sl7_9" src="scap-security-guide-0.1.69-1.sl7_9.src.rpm" version="0.1.69"><filename>scap-security-guide-doc-0.1.69-1.sl7_9.noarch.rpm</filename><sum type="sha256">74e0ee0a5e07d64aa98a46657247ec14c067dc34caa2ea2cbc40b6d52f3d2518</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:4824" id="RHBA-2023:4824" title="Scap-Security-Guide Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2155793" id="2155793" title="2155793 &#8211; Update Anssi Bp-028 In Rhel7 To V2.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2210276" id="2210276" title="2210276 &#8211; Openscap Shows Ipv6 As Enabled Even If It Is Disabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2221694" id="2221694" title="2221694 &#8211; Rebase Scap-Security-Guide In Red Hat Enterprise Linux 7.9 To Latest Upstream Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2223817" id="2223817" title="2223817 &#8211; Remote Resource Referenced  From Datastream Is Missing Https://Access.Redhat.Com/Security/Data/Oval/Com.Redhat.Rhsa-Rhel7.Xml.Bz2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:4827</id><title>Ipa Bug Fix Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* libipa_otp_lasttoken plugin memory leak (BZ#2209636)
</description><issued date="2023-08-30 14:08:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.15" src="ipa-4.6.8-5.sl7_9.15.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.15.noarch.rpm</filename><sum type="sha256">3cfa1d7d92b8a20f0308e96cd8718cf2bbc439ce29a42685712fee057503adf6</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.15" src="ipa-4.6.8-5.sl7_9.15.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.15.noarch.rpm</filename><sum type="sha256">f74831f26143848fdc824feeacf83204bbe746769235f11e4a1405472f92aebc</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.15" src="ipa-4.6.8-5.sl7_9.15.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.15.noarch.rpm</filename><sum type="sha256">83b7f9cad4ccdaf7799e4d5657e9a7e0082c74feebcd62e29ca7f41fab44889d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:4827" id="RHBA-2023:4827" title="Ipa Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2209636" id="2209636" title="2209636 &#8211; Libipa_Otp_Lasttoken Plugin Memory Leak" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:5478</id><title>Nss And Nspr Bug Fix And Enhancement Update</title><description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.
The following packages have been upgraded to a later upstream version: nss (3.90), nss-softokn (3.90), nss-util (3.90), nspr (4.35). (BZ#2211859)
</description><issued date="2023-10-10 06:21:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-pkcs11-devel" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-pkcs11-devel-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">833cd6c91d1a08aa3ebe685b7aea647ce01d5a1ffb483ec74587013cdcd51ad8</sum></package><package arch="x86_64" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-devel-3.90.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">e6a5c1b405b29c400e4f2d2f24853391ecb784004266e870c50e85090e570412</sum></package><package arch="i686" name="nss-pkcs11-devel" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-pkcs11-devel-3.90.0-2.el7_9.i686.rpm</filename><sum type="sha256">6fd9b7e03da8401e9b539f86845c53c9206853efc5b8aa081fbf7d4e9a1e57fa</sum></package><package arch="i686" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-devel-3.90.0-6.el7_9.i686.rpm</filename><sum type="sha256">b00a9b8bf9847ca51a49f00b861d392d6f0f3d6b9230072a10a760e7014897e1</sum></package><package arch="x86_64" name="nspr-devel" release="1.el7_9" src="nspr-4.35.0-1.el7_9.src.rpm" version="4.35.0"><filename>nspr-devel-4.35.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">3ec2bf3d3161853724c484fea24801c07e9d5e62428b300c5fdeafb7a4d75ce3</sum></package><package arch="i686" name="nss-devel" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-devel-3.90.0-2.el7_9.i686.rpm</filename><sum type="sha256">e0a5d74373fb9ca4da0adf92664deae1f36e575acc5b7a3789b24aed50b95548</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-freebl-3.90.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">a9b91349cf9aff0bd4bcd70493ddbf1e17e67977c72865b1d0c6f79898778c38</sum></package><package arch="x86_64" name="nspr" release="1.el7_9" src="nspr-4.35.0-1.el7_9.src.rpm" version="4.35.0"><filename>nspr-4.35.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a8e5282a90fa724da81caf2f08726b6ef455b2249b9232d455db53a784dd92ac</sum></package><package arch="x86_64" name="nss-util" release="1.el7_9" src="nss-util-3.90.0-1.el7_9.src.rpm" version="3.90.0"><filename>nss-util-3.90.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">7cf1a5b624097801b794c4c63213821ba51c841f207b6706ab173add0abb3759</sum></package><package arch="x86_64" name="nss-sysinit" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-sysinit-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">2c506d27cf3ef2869f5aa4c98bc9fc7cc57cfc6ceb333dfad8102c1a24e1df1b</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-freebl-devel-3.90.0-6.el7_9.i686.rpm</filename><sum type="sha256">5160dd7b34539accf4e74613c5645d6999a9367c1e04fad393c8426a31876929</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_9" src="nss-util-3.90.0-1.el7_9.src.rpm" version="3.90.0"><filename>nss-util-devel-3.90.0-1.el7_9.i686.rpm</filename><sum type="sha256">6bf03cc81b4f1241c7611802a7c7f27279e6be39ceb3f1892024fb1fd54c3fe8</sum></package><package arch="i686" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-3.90.0-6.el7_9.i686.rpm</filename><sum type="sha256">18241dca1d91129301c8556a8b62ffefb6a424b5db11c601fe0462ca61d34f85</sum></package><package arch="x86_64" name="nss" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">1648b5a87b74c820c9aed6eb6a1d10d1498a2bbd6976445cf34be8c657a3b32f</sum></package><package arch="x86_64" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-3.90.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">c384ccf712d2130439a9fe5c98f3d0d73b3b0b8e603927073425a7f65197294e</sum></package><package arch="i686" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-freebl-3.90.0-6.el7_9.i686.rpm</filename><sum type="sha256">fb670a39ad0ac44f9739100ef1eb8fe3dbb82c9ca6d4e874598e5597997c8a1a</sum></package><package arch="i686" name="nss" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-3.90.0-2.el7_9.i686.rpm</filename><sum type="sha256">d6b591087318537794a40f4dc5921268e0467eb57ccf341a78aaa01aff79228b</sum></package><package arch="i686" name="nss-util" release="1.el7_9" src="nss-util-3.90.0-1.el7_9.src.rpm" version="3.90.0"><filename>nss-util-3.90.0-1.el7_9.i686.rpm</filename><sum type="sha256">fa85b3c8810ce262d235b22bbb0e4ede00c0aecca5772ffb60129a8c7c3b8dd1</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_9" src="nss-util-3.90.0-1.el7_9.src.rpm" version="3.90.0"><filename>nss-util-devel-3.90.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">2df03fb85e1abc6dcd8cceca2311aaa12c2c60dcc42c2228a70031b4d4f61915</sum></package><package arch="x86_64" name="nss-devel" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-devel-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">144718bcc1de8e2e2d3933fdc91e926a0451b51102c883d7ebbc7a3ba8584519</sum></package><package arch="i686" name="nspr" release="1.el7_9" src="nspr-4.35.0-1.el7_9.src.rpm" version="4.35.0"><filename>nspr-4.35.0-1.el7_9.i686.rpm</filename><sum type="sha256">e7517a5cb57ad2758aa5cd91085301e4b16ae5cfe3b2e2d03cfdab3d5134f3e9</sum></package><package arch="i686" name="nspr-devel" release="1.el7_9" src="nspr-4.35.0-1.el7_9.src.rpm" version="4.35.0"><filename>nspr-devel-4.35.0-1.el7_9.i686.rpm</filename><sum type="sha256">210cdbbea75730caea5849bb61ec1926957562090f3e4259b68810f2c0070449</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-freebl-devel-3.90.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">047aa93f55583f55c64b2592ba7b00f67b106f93540b1b6b0c08bba1bd1b0f10</sum></package><package arch="x86_64" name="nss-tools" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-tools-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">0d827bd967e29c6c8012e7cf1de16fa724ba482f60039dd2578c26519e5b45e2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:5478" id="RHBA-2023:5478" title="Nss And Nspr Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2211859" id="2211859" title="2211859 &#8211; Rebase Nss To 3.90 For Firefox 115 Esr [ Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:5620</id><title>Microcode_Ctl Bug Fix And Enhancement Update</title><description>The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20230808 release, which addresses CVE-2022-40982, CVE-2022-41804, and CVE-2023-23908. (BZ#2223994)
</description><issued date="2023-10-11 11:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.19.el7_9" src="microcode_ctl-2.1-73.19.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.19.el7_9.x86_64.rpm</filename><sum type="sha256">547fb7118701708094c3b5c00ffe046269ed859553dbf86cf402c5302828f3c2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:5620" id="RHBA-2023:5620" title="Microcode_Ctl Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2223994" id="2223994" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:0350</id><title>Net-Snmp Bug Fix Update</title><description>The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es):
* net-snmp: fix a crash triggered by wrong passphrase (JIRA:RHEL-2882)
</description><issued date="2024-01-23 14:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="net-snmp-devel" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.4.i686.rpm</filename><sum type="sha256">c658da0ffb451524e8fc09eadad31e74ce67eab1d7a25030959b1a41ba9763c1</sum></package><package arch="i686" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.4.i686.rpm</filename><sum type="sha256">e1810e0e60ef8ff20aa9bd2dde94c85b892ec99d28be6aeac23e789a8c71a6e0</sum></package><package arch="x86_64" epoch="1" name="net-snmp" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">c1e7bb09e847ce3bb6c454756a753a7d4d4dad85c7906763daa6306c56563480</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">8ec73a83612f455a74445026b1cd2daa1dfea073c7c8c2d124a3ec0af77468f2</sum></package><package arch="x86_64" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">671aae63d47d6e21cb4352f75ad02f588ffa53700a552842d721ab4ac3de261e</sum></package><package arch="x86_64" epoch="1" name="net-snmp-perl" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-perl-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">ba1aaf9cc68fe79d17116b8d9c12c19c8e92bf8a264baf936cb628d71e34ea88</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.4.i686.rpm</filename><sum type="sha256">89c86951e7ec026c2d82738ca5c9e597ab13002e329a31e39ea7710144063363</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">5e27b4aa992324800c76d1fad361a54d1a9d667a281fd98f24830a68c5db564e</sum></package><package arch="x86_64" epoch="1" name="net-snmp-gui" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-gui-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">332d57d5e8b8be75894169db2389a1b5d15a86f1d8653de1449baff44b8c043b</sum></package><package arch="x86_64" epoch="1" name="net-snmp-sysvinit" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-sysvinit-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">bb3fb2524a52f113142385015bd9636ef9dd05293bb0bdaf0e3194d63528b110</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-utils-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">f41bfd2bedb28d96c91a6426110db9c28e5d468234adb2a3c8c1b2d0c3fbfa36</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-python-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">77eebfe70b4d96f9e590e535bb09c068d3100e7a465e306fb0f266a9a2ec6426</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:0350" id="RHBA-2024:0350" title="Net-Snmp Bug Fix Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:0762</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2024a, which addresses recent time zone changes. Notably:
* Kazakhstan will transition from UTC+6 to UTC+5 on March 1 2024. * Palestine will transition to the daylight saving time (DST) a week later than previously predicted.
</description><issued date="2024-02-09 16:22:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2024a-1.el7.src.rpm" version="2024a"><filename>tzdata-java-2024a-1.el7.noarch.rpm</filename><sum type="sha256">2fbe19464f1e459fda37277248976644b1e9de5afd43ccf1c60472a896b94548</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2024a-1.el7.src.rpm" version="2024a"><filename>tzdata-2024a-1.el7.noarch.rpm</filename><sum type="sha256">269866c2e28a43307abef7ef8968f108fbf18c61bc4da8b5fdf9cbf83425c9c6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:0762" id="RHBA-2024:0762" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:0987</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section.
</description><issued date="2024-02-28 08:34:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="2.sl7_9" src="scap-security-guide-0.1.72-2.sl7_9.src.rpm" version="0.1.72"><filename>scap-security-guide-0.1.72-2.sl7_9.noarch.rpm</filename><sum type="sha256">b16440341a0b9327f3148a5ba31d74ced89f48a9706a5a62d4bf199041026f0d</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="2.sl7_9" src="scap-security-guide-0.1.72-2.sl7_9.src.rpm" version="0.1.72"><filename>scap-security-guide-rule-playbooks-0.1.72-2.sl7_9.noarch.rpm</filename><sum type="sha256">9c4b957b491174811c87df2dbccc1a326f8f405d95700a2cd1bd53ebbc8fadc7</sum></package><package arch="noarch" name="scap-security-guide-doc" release="2.sl7_9" src="scap-security-guide-0.1.72-2.sl7_9.src.rpm" version="0.1.72"><filename>scap-security-guide-doc-0.1.72-2.sl7_9.noarch.rpm</filename><sum type="sha256">c28c2c7bb50773bc3f4d71efd4dd7cc7da4a1c6aad6221ce3aeae71538c68166</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:0987" id="RHBA-2024:0987" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:1276</id><title>Resource-Agents Bug Fix And Enhancement Update</title><description>The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.
</description><issued date="2024-03-19 09:34:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="resource-agents-aliyun" release="61.el7_9.20" src="resource-agents-4.1.1-61.el7_9.20.src.rpm" version="4.1.1"><filename>resource-agents-aliyun-4.1.1-61.el7_9.20.x86_64.rpm</filename><sum type="sha256">e841523b6d12bfb7e7bf38dbce2dc0dbc0dd3aeca1c9cfe8de269ea3736577f0</sum></package><package arch="x86_64" name="resource-agents-gcp" release="61.el7_9.20" src="resource-agents-4.1.1-61.el7_9.20.src.rpm" version="4.1.1"><filename>resource-agents-gcp-4.1.1-61.el7_9.20.x86_64.rpm</filename><sum type="sha256">92053d13004094b1d5f374d585c4b055e4de5d81c36fe8af96d84849ac02ed17</sum></package><package arch="x86_64" name="resource-agents" release="61.el7_9.20" src="resource-agents-4.1.1-61.el7_9.20.src.rpm" version="4.1.1"><filename>resource-agents-4.1.1-61.el7_9.20.x86_64.rpm</filename><sum type="sha256">c7814974ccf16878f7a15f38101bd8cfc432a27b11ff3e7a5a316a7dd68c966b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:1276" id="RHBA-2024:1276" title="Resource-Agents Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:3624</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section.
</description><issued date="2024-06-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="1.sl7_9" src="scap-security-guide-0.1.73-1.sl7_9.src.rpm" version="0.1.73"><filename>scap-security-guide-0.1.73-1.sl7_9.noarch.rpm</filename><sum type="sha256">f725062f860358a91f914178fa656fdc5b24aca28abacc677b3afad32a8193cc</sum></package><package arch="noarch" name="scap-security-guide-doc" release="1.sl7_9" src="scap-security-guide-0.1.73-1.sl7_9.src.rpm" version="0.1.73"><filename>scap-security-guide-doc-0.1.73-1.sl7_9.noarch.rpm</filename><sum type="sha256">a8e3d73c8d75b9e04ad93839e41198cd845560d7a2493c8596cbb20191324217</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="1.sl7_9" src="scap-security-guide-0.1.73-1.sl7_9.src.rpm" version="0.1.73"><filename>scap-security-guide-rule-playbooks-0.1.73-1.sl7_9.noarch.rpm</filename><sum type="sha256">60111515946d2e2906b7a22343ba156c79722b74490f3df1c8268f3604240e28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:3624" id="RHBA-2024:3624" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0740-1</id><title>Ocaml Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ocaml" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">6af8e9111139cfb3303253ebe1f182c4b4b9d59351a3754cd8053630dc737982</sum></package><package arch="x86_64" name="ocaml-emacs" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-emacs-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">e740c8943cdeaf3c62594e94cd1b3ba5e3e3f81d1f96d25a72606f80442a2d3a</sum></package><package arch="x86_64" name="ocaml-ocamldoc" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-ocamldoc-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">b7a8c80034e2acf7012eda9f2c29c0e984b17e5105b30d15d13b0e39cbe5efde</sum></package><package arch="x86_64" name="ocaml-docs" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-docs-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">7c342b08321b493cb0e58c44f5ebf256add4205d3cb2d5944840196fef6f41da</sum></package><package arch="x86_64" name="ocaml-compiler-libs" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-compiler-libs-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">3613f4c134d60d6f1bd51c4e3498926591eeff254145b5499b860a5106fa2f3c</sum></package><package arch="x86_64" name="ocaml-source" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-source-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">0715986e20d4a72714368ec2705ed2bb290af9165d30cda547496b4599dc8159</sum></package><package arch="x86_64" name="ocaml-runtime" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-runtime-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">c7e48494c6e3ca7a7911c2660ea6625c2fcc6426cb0e51a1db021dfb931b405a</sum></package><package arch="x86_64" name="ocaml-x11" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-x11-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">b90c008d39d2c7e631902181ec68cdff3c51e02103ff2dc132082b9a45f9450d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0740" id="RHEA-2018:0740-1" title="Rhea-2018:0740-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2023:7283</id><title>Microcode_Ctl Bug Fix And Enhancement Update</title><description>The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20231009 release, which addresses CVE-2023-23583. (RHEL-3920)
</description><issued date="2023-11-17 09:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.20.el7_9" src="microcode_ctl-2.1-73.20.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.20.el7_9.x86_64.rpm</filename><sum type="sha256">5923cdb7d020178f9cbd103fcf7ca35481fb5db52ccfeb2fd18940c86ee0a80f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2023:7283" id="RHEA-2023:7283" title="Microcode_Ctl Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3848-1</id><title>Libmspack</title><description>Security Fix(es): 
* libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libmspack" release="0.8.alpha.el7" src="libmspack-0.5-0.8.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.8.alpha.el7.x86_64.rpm</filename><sum type="sha256">41311f31457f4f756f9e1942224751cff503b72d974ae4f22f07826c2aa128bf</sum></package><package arch="i686" name="libmspack-devel" release="0.8.alpha.el7" src="libmspack-0.5-0.8.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.8.alpha.el7.i686.rpm</filename><sum type="sha256">33ad46ba4af18f39fd96519dccec0d132e06e32c0fff3ae0f184a699fb2ef1d2</sum></package><package arch="i686" name="libmspack" release="0.8.alpha.el7" src="libmspack-0.5-0.8.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.8.alpha.el7.i686.rpm</filename><sum type="sha256">71aa1de05bbbd120f8a80c43e91bf43cb02888f16786e63e755847a8e2b9d535</sum></package><package arch="x86_64" name="libmspack-devel" release="0.8.alpha.el7" src="libmspack-0.5-0.8.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.8.alpha.el7.x86_64.rpm</filename><sum type="sha256">a7c8d1b66389e0e5b8d28c80232607abbd6c5b2d858566697ba0f15c6e15fa7a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010305" id="CVE-2019-1010305" title="Cve-2019-1010305" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3848" id="RHSA-2020:3848-1" title="Rhsa-2020:3848-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730568" id="1730568" title="Cve-2019-1010305 Libmspack: Buffer Overflow In Function Chmd_Read_Headers()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3861-1</id><title>Glibc</title><description>Security Fix(es): 
* glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE-2019-19126)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glibc-devel" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-317.el7.i686.rpm</filename><sum type="sha256">b54addb92e1fd63a02c50f03488e00892a51602fc1208e3d9219ee3b0425097a</sum></package><package arch="x86_64" name="glibc-common" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-common-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">3e35753d321f94879f260cecfab0f0af189cfbde3be8a81b74a6534e5b61c0b4</sum></package><package arch="x86_64" name="glibc-utils" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-utils-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">4bee882d975d57ec82e900cd282b206c125da3d188900829f5b4b7b26a7f3c6c</sum></package><package arch="x86_64" name="glibc-headers" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-headers-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">08b6e6a7a630564ff22d00916d88c866a84cecedd53d96f14fb3213033634c45</sum></package><package arch="x86_64" name="glibc-devel" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">5deae7193de12549166f1cd5b82dcb13ad609a517597b5460c029b2c22bb3c72</sum></package><package arch="x86_64" name="nscd" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>nscd-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">60fed772cfa9694f3f618c1bfedf86fff5300877ff3f31a57e6a65598be2d86f</sum></package><package arch="i686" name="glibc-static" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-317.el7.i686.rpm</filename><sum type="sha256">298dc4ef9855e9fa6360093578e621ec4cf5f44f9f8a1b1f0adb5f13d9e5ee83</sum></package><package arch="i686" name="glibc" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-2.17-317.el7.i686.rpm</filename><sum type="sha256">3d66fa6a4fdf2d1c3d2f6853c35958e700556f22826998c21839ef65b535c228</sum></package><package arch="x86_64" name="glibc-static" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">6a2e3e27b3b370ff2c77d99f82524a5b5a736b3162dfd214e9e846560fd6b95e</sum></package><package arch="x86_64" name="glibc" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">4c7ef22bb13adea1db797d46db4d7e38144839a990b00791c5b146ee5f1959e0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" id="CVE-2019-19126" title="Cve-2019-19126" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3861" id="RHSA-2020:3861-1" title="Rhsa-2020:3861-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763325" id="1763325" title="Argp.H Kills __Attribute__, Causing Gcc 4.8.5 With -Std=C++ Results In Compile / Link Errors For __Gthrw_Pthread_Mutex_* Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1772307" id="1772307" title="Glibc: Measured Performance Loss In Lmbench For Bcopy On Haswell Processor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774681" id="1774681" title="Cve-2019-19126 Glibc: Ld_Prefer_Map_32Bit_Exec Not Ignored In Setuid Binaries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775816" id="1775816" title="Glibc: Disable Libio Vtable Validation For Interposed Pre-2.1 Stdio Handles [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795573" id="1795573" title="Glibc: Remove Problematic Obsoletes: From The Spec File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834816" id="1834816" title="Glibc: Internal_End*Ent In Nss_Compat May Clobber Errno, Hiding Erange" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3864-1</id><title>Cups</title><description>Security Fix(es): 
* cups: DNS rebinding attacks via incorrect whitelist (CVE-2017-18190) 
* cups: stack-buffer-overflow in libcups's asn1_get_type function (CVE-2019-8675) 
* cups: stack-buffer-overflow in libcups's asn1_get_packed function (CVE-2019-8696)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="cups-ipptool" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-ipptool-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">abbf65d0730c8623d87d754b024e0e71a6c6469b922d4cbf6aee7748986a4f7b</sum></package><package arch="i686" epoch="1" name="cups-libs" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-51.el7.i686.rpm</filename><sum type="sha256">f34fd5420818e5d64bdf14e69b516fc8e7419d8e587a5cc2002ac4eac0fec31d</sum></package><package arch="x86_64" epoch="1" name="cups-client" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-client-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">fb79471cac1098e9e9ce97fbab3436252d162e208ed31055af01fc1ec9940a48</sum></package><package arch="i686" epoch="1" name="cups-devel" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-51.el7.i686.rpm</filename><sum type="sha256">48ff95dd5b1ea2d6772013197c49e35e13a13e47cdb8cd694f26ac6419b86f51</sum></package><package arch="x86_64" epoch="1" name="cups-libs" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">6a4150f8ba8a33881386c4f43fe3ca5d5337d6b4faa98af7c66b4323b49602f5</sum></package><package arch="x86_64" epoch="1" name="cups" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">e497103a7aa7818ece2a98adcd40446797765527f149a3ca68cb89e52f80303f</sum></package><package arch="x86_64" epoch="1" name="cups-lpd" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-lpd-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">3b060a15d6c5d947cc771b8e7e276d15d428243facdd7d802a522fe805f3f5aa</sum></package><package arch="noarch" epoch="1" name="cups-filesystem" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-filesystem-1.6.3-51.el7.noarch.rpm</filename><sum type="sha256">f8efae5dcf706474ab5dc48bfde94d65d3b60290f9d2c1dd064905d205f7b99d</sum></package><package arch="x86_64" epoch="1" name="cups-devel" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">c6495b6587fa162de9f7af52b39218ec00db42d1c00b9381cfe144b4df09a566</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190" id="CVE-2017-18190" title="Cve-2017-18190" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675" id="CVE-2019-8675" title="Cve-2019-8675" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696" id="CVE-2019-8696" title="Cve-2019-8696" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3864" id="RHSA-2020:3864-1" title="Rhsa-2020:3864-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1546395" id="1546395" title="Cve-2017-18190 Cups: Dns Rebinding Attacks Via Incorrect Whitelist" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1715907" id="1715907" title="Cups- Client: Cupsgetppd3() Function Tries To Load Ppd From Ipp Printer And Not From The Cups Queue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1738455" id="1738455" title="Cve-2019-8675 Cups: Stack-Buffer-Overflow In Libcups'S Asn1_Get_Type Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1738497" id="1738497" title="Cve-2019-8696 Cups: Stack-Buffer-Overflow In Libcups'S Asn1_Get_Packed Function" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3868-1</id><title>Sdl</title><description>Security Fix(es): 
* SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c (CVE-2019-7572) 
* SDL: heap-based buffer overflow in function MS_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7575) 
* SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (CVE-2019-7636) 
* SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (CVE-2019-7637) 
* SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c (CVE-2019-7638) 
* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7573) 
* SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7574) 
* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7576) 
* SDL: buffer over-read in function SDL_LoadWAV_RW in audio/SDL_wave.c (CVE-2019-7577) 
* SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (CVE-2019-7578) 
* SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c (CVE-2019-7635)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="SDL-static" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-static-1.2.15-17.el7.i686.rpm</filename><sum type="sha256">9f01a6029c0164c93afd860499f7360fa6d73c01e43f68d77bdc39914ea36364</sum></package><package arch="x86_64" name="SDL-static" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-static-1.2.15-17.el7.x86_64.rpm</filename><sum type="sha256">184508f6f204d853a4ce76b79a0128684e4daf7db07b8aed42483bda21d95172</sum></package><package arch="x86_64" name="SDL-devel" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-devel-1.2.15-17.el7.x86_64.rpm</filename><sum type="sha256">26d9cba78f9af85dd75925d8969cacdd3cd0040c1a33c50cd4538e7f2210dcd8</sum></package><package arch="i686" name="SDL" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-1.2.15-17.el7.i686.rpm</filename><sum type="sha256">90afcf2b1ae15e0b807d48864fd939a88b5e584d9e4c4365794a7a739c569d02</sum></package><package arch="i686" name="SDL-devel" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-devel-1.2.15-17.el7.i686.rpm</filename><sum type="sha256">9c3dfe7904800b07de5904704f3b43a23e2a692f3f455018e0f5095e47ac0ed1</sum></package><package arch="x86_64" name="SDL" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-1.2.15-17.el7.x86_64.rpm</filename><sum type="sha256">740d2d2435ed2310b1ecd7dd28552f2d8e6acea070ed35d416d9c0e05b219085</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572" id="CVE-2019-7572" title="Cve-2019-7572" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573" id="CVE-2019-7573" title="Cve-2019-7573" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7574" id="CVE-2019-7574" title="Cve-2019-7574" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7575" id="CVE-2019-7575" title="Cve-2019-7575" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7576" id="CVE-2019-7576" title="Cve-2019-7576" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7577" id="CVE-2019-7577" title="Cve-2019-7577" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7578" id="CVE-2019-7578" title="Cve-2019-7578" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7635" id="CVE-2019-7635" title="Cve-2019-7635" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7636" id="CVE-2019-7636" title="Cve-2019-7636" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7637" id="CVE-2019-7637" title="Cve-2019-7637" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7638" id="CVE-2019-7638" title="Cve-2019-7638" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3868" id="RHSA-2020:3868-1" title="Rhsa-2020:3868-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676509" id="1676509" title="Cve-2019-7577 Sdl: Buffer Over-Read In Function Sdl_Loadwav_Rw In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676743" id="1676743" title="Cve-2019-7575 Sdl: Heap-Based Buffer Overflow In Function Ms_Adpcm_Decode In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676749" id="1676749" title="Cve-2019-7574 Sdl: Heap-Based Buffer Over-Read In Ima_Adpcm_Decode In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676751" id="1676751" title="Cve-2019-7573 Sdl: Heap-Based Buffer Over-Read In Initms_Adpcm In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676753" id="1676753" title="Cve-2019-7572 Sdl: Buffer Over-Read In Ima_Adpcm_Nibble In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676755" id="1676755" title="Cve-2019-7576 Sdl: Heap-Based Buffer Over-Read In Initms_Adpcm In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676781" id="1676781" title="Cve-2019-7578 Sdl: Heap-Based Buffer Over-Read In Initima_Adpcm In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677143" id="1677143" title="Cve-2019-7638 Sdl: Heap-Based Buffer Over-Read In Map1Ton In Video/Sdl_Pixels.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677151" id="1677151" title="Cve-2019-7637 Sdl: Heap-Based Buffer Overflow In Sdl_Fillrect In Video/Sdl_Surface.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677156" id="1677156" title="Cve-2019-7636 Sdl: Heap-Based Buffer Over-Read In Sdl_Getrgb In Video/Sdl_Pixels.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677158" id="1677158" title="Cve-2019-7635 Sdl: Heap-Based Buffer Over-Read In Blit1To4 In Video/Sdl_Blit_1.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3869-1</id><title>Pcp</title><description>Security Fix(es): 
* pcp: Local privilege escalation in pcp spec file %post section (CVE-2019-3695) 
* pcp: Local privilege escalation in pcp spec file through migrate_tempdirs (CVE-2019-3696)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pcp-pmda-weblog" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-weblog-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">a454a7212895649230aa8b8773377e2b7abb57748e17dad7c6a82ff91b678e9e</sum></package><package arch="x86_64" name="pcp-pmda-json" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-json-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">0232ddeefa4840d074f9e382a5730369a5b15828c07fadd4c0cd6bc1409ecdd0</sum></package><package arch="x86_64" name="pcp-pmda-lmsensors" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-lmsensors-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">36f129bac1ef3cd113865d963391f70527cd18a9356629a03cc0fc0af2714b17</sum></package><package arch="x86_64" name="pcp-pmda-perfevent" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-perfevent-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">bc5b0bc62804ee029cd8a9ae5c6f87d831d92de5b4826728fc3b07d6cc0e629c</sum></package><package arch="x86_64" name="pcp-import-sar2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-sar2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">6c0cc250506da7c4c449b0a09b6e1dd6336b0b69222fecac821b7f6ae0ac896f</sum></package><package arch="x86_64" name="pcp-pmda-mounts" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-mounts-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">28f2023572aee618b698185d867d23a2911e6feb479d5eea01c654279162a527</sum></package><package arch="x86_64" name="pcp-pmda-lio" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-lio-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">704fb5287922c28a1f768b7ab9005e3cfef030b9a07fd075e56286fdb3c60933</sum></package><package arch="x86_64" name="perl-PCP-PMDA" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>perl-PCP-PMDA-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">548bf0cce3d40be957caa901a926f47a3bcf4c391ef349dd6abe26a84bac6eb1</sum></package><package arch="x86_64" name="pcp-export-pcp2spark" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2spark-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">43aeeff52449f37de6a073bc442992d0f25c7515a422451e77a9f61e38ce1381</sum></package><package arch="x86_64" name="pcp-export-pcp2elasticsearch" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2elasticsearch-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">51509bf3f0dd3a720067d0bf2fe870d4a195979e0bbe284762ce7f0baa376ee6</sum></package><package arch="x86_64" name="pcp-pmda-prometheus" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-prometheus-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">1ab5a52191aa2b9032268963b20b966c58219f4c6bcd3a84017fbeb71ddea360</sum></package><package arch="x86_64" name="pcp-import-collectl2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-collectl2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">7d602a9cf5b23d89c4a2f5a0215355d02fff23b835c1c3bb62be139538be1c9f</sum></package><package arch="noarch" name="pcp-webapp-vector" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapp-vector-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">d965889635760a409ba1db0e6be686732d03ba698e7bd520be67e8eed309507f</sum></package><package arch="x86_64" name="pcp-pmda-elasticsearch" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-elasticsearch-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">fc127b59a84407583f19aa226119fd6b7ec97312321759794c869b12890b79cd</sum></package><package arch="i686" name="pcp-devel" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-devel-4.3.2-12.el7.i686.rpm</filename><sum type="sha256">3a043966b438e7b70b0e746e0eb3a03d5df4ad1ece6323104d995d93a527a5fd</sum></package><package arch="x86_64" name="pcp-export-pcp2xml" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2xml-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">40104f37b00da1b4331d82c02740d2248eec07c53a1cdaa551e6278bb5a4d438</sum></package><package arch="x86_64" name="pcp-pmda-bonding" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-bonding-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8e311bd3c9a0148dc4605d32cea4328bf95432946f30391189a36c5204bb062f</sum></package><package arch="x86_64" name="pcp-pmda-bcc" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-bcc-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">2872768ff4db2f0331d17ee74575c96d415af909088a89ff6890c3cbe7d5453b</sum></package><package arch="x86_64" name="pcp-manager" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-manager-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">48f8f9458265db55901547921ee51377e23ebbb7b4d4b19cf2d5125805dc58da</sum></package><package arch="x86_64" name="pcp-pmda-dm" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-dm-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">5ac27c3daaff3ccdd950bf47bc8ded829741512b716e07bd27fff2d01ba862c4</sum></package><package arch="x86_64" name="pcp-pmda-bash" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-bash-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">86246b5c92705b14a4e26d93ad8ceba3de4b714685fa028ad4a1115f0e62d9de</sum></package><package arch="x86_64" name="pcp-pmda-mailq" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-mailq-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">69e458711e14465b398401de4bc76dbe05d336c9a897edaf275aadd7b98f1524</sum></package><package arch="x86_64" name="pcp-pmda-postfix" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-postfix-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">aff4025f51ee417d55e1a60bee57a8f5bf06af5fd0cf129cb5ff2de80a3b60cd</sum></package><package arch="x86_64" name="pcp-pmda-zimbra" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-zimbra-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">7c8cc7bd10672add7a8e8aa690da7f28bac36660fb0a2c6296bffa003702bf6e</sum></package><package arch="x86_64" name="pcp-pmda-rsyslog" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-rsyslog-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">b52b4b34f44eebca2f9bb3eaeab201fde66b58c4d9c8f7988ac6003eae3c3d9d</sum></package><package arch="x86_64" name="pcp-pmda-memcache" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-memcache-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">4595abce8417afca060ec4cdf04b48a123d1fc8986d9e1b34626e0b362fbc5b7</sum></package><package arch="x86_64" name="pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">a03dd25155cdafd9f19bdeae3a79f381e5a6d82d22a0feab3288ab2000aaae26</sum></package><package arch="x86_64" name="pcp-pmda-nvidia-gpu" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-nvidia-gpu-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">34b48a857bd683b6b17ef8485c074c4cb666305807584ff03c6210e4660060fe</sum></package><package arch="x86_64" name="pcp-pmda-gpfs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-gpfs-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">fa2f8d94f8ba6c65436eddda0a96cc35482eb9732202f77158536a668726344a</sum></package><package arch="x86_64" name="pcp-pmda-trace" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-trace-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8395984bd7a7db5d6519d1d27d8a39899c3a8261e711e856a1613200dfc763d1</sum></package><package arch="x86_64" name="pcp-export-pcp2zabbix" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2zabbix-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">018d2534564a9c60dc3b1226d96b5a55906145bc9ede8d682f8746c20b4f4658</sum></package><package arch="x86_64" name="pcp-pmda-lustrecomm" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-lustrecomm-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">7fece26ad4fcb4589facea7c55c61305423912557b940f01e59a7f539a9da2e1</sum></package><package arch="x86_64" name="pcp-import-ganglia2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-ganglia2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">c911207fc5c11570cdb420b9093f109a9e8cf434f6b390a542d3882e76f580c8</sum></package><package arch="x86_64" name="perl-PCP-LogSummary" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>perl-PCP-LogSummary-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">a71ba75848f5455be52c265cc897c20c2406363b7d2b49663105ef124227c3ef</sum></package><package arch="x86_64" name="pcp-pmda-apache" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-apache-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">e6b1aa988dd567e7198948d406e7b39fe274980c0a275c2da12b4ac952a9586c</sum></package><package arch="x86_64" name="pcp-pmda-nfsclient" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-nfsclient-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">5f81174aff5ff1d1450862cc1035c58164b44f9ece54fa0bb695c8e99d4b6053</sum></package><package arch="x86_64" name="pcp-import-mrtg2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-mrtg2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">c77ade8f3323d958d756bcc7af4f7b4ab957bd82168a3fa8fe430fe4aa40ecac</sum></package><package arch="x86_64" name="pcp-pmda-sendmail" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-sendmail-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">4911131c35164a782591490055311ed91b70f269fa933493ce25463ff7d652f0</sum></package><package arch="x86_64" name="pcp-gui" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-gui-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">57c6e135711aa806c4549f61aec101cffc3780aed81e50a88c59131cab6014f7</sum></package><package arch="x86_64" name="pcp-pmda-nginx" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-nginx-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">3b402e84b2237bea32bc9156516b033d91bc3614b374b47f2a1c6f91f46ab46d</sum></package><package arch="x86_64" name="pcp-export-zabbix-agent" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-zabbix-agent-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">eaa0a4f04f576390a7dcfb5b7078ee205f3962991d2f0de623a0cdd032068ca9</sum></package><package arch="x86_64" name="pcp-devel" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-devel-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8274ec24323e0fd7a1ca0738b43245b1f6a896f499aefe6fe860ee0517bb4f45</sum></package><package arch="x86_64" name="pcp-pmda-cisco" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-cisco-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">5c98e31fd5f60de072922fa0a8d72f62a59fcd400d8f237f4e6eab1401f1ba71</sum></package><package arch="x86_64" name="pcp-webapi" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapi-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">d200dad51c7435df07a58883c0ebf0dab0e64fd9ac7255533c3fd2db9742a6cd</sum></package><package arch="noarch" name="pcp-webapp-blinkenlights" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapp-blinkenlights-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">8324ac0d2aa9881d0664a933f14da0c691ed485501c3657f2c083e98853b5378</sum></package><package arch="x86_64" name="pcp-pmda-gpsd" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-gpsd-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">0a4a628f55f730cc52c56210b31184a93dd1350d034ac54df9b705e6f0059fcd</sum></package><package arch="x86_64" name="pcp-pmda-oracle" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-oracle-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">eda0c7d47626662b85706829ddfcb029d5f8fc59ea2f8684319e65e05c175cc9</sum></package><package arch="x86_64" name="pcp-export-pcp2json" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2json-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">48b08bcae33f208ac72b3a27e94c02e231019fd49a4e7cd5c0b4b9df7ddf9aac</sum></package><package arch="x86_64" name="pcp-pmda-smart" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-smart-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">2129308a91344e882d2d295f941b7ae93ccc8d844d94d03766bf7dca7de5cb0e</sum></package><package arch="x86_64" name="pcp-zeroconf" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-zeroconf-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">2e7743a4e438f8fbd0f35e6c24f7f4499575d40253eb99f74d3c298b7de84388</sum></package><package arch="noarch" name="pcp-doc" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-doc-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">ec41ebaf7da387a1f16f39d6d1fe44289b03ffc7c952fc1e69a9308c5036b2b3</sum></package><package arch="x86_64" name="python-pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>python-pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">ce52a3660802a820ff127957de7f4b874249e660834088ed1b9c0bc428398f26</sum></package><package arch="x86_64" name="pcp-system-tools" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-system-tools-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">333a40445aca73268667005f996a88fd3ed33f381fb4dac5769ea78ef8d9c644</sum></package><package arch="x86_64" name="pcp-testsuite" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-testsuite-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">0d95aa8daef0c28b864be440a2d59665e54d3e6f6e44282003d144662e0027eb</sum></package><package arch="x86_64" name="pcp-export-pcp2influxdb" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2influxdb-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8b07d0f0b1eceae8f0ef58380bb391b78927e1ca09c4976b5b909a98ea17be95</sum></package><package arch="x86_64" name="pcp-pmda-redis" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-redis-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">bb12895076899f8bb934ab0095597fc4b1d9b33b784fac7f1c008fffa29c5b04</sum></package><package arch="x86_64" name="pcp-pmda-cifs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-cifs-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f301c8b3ad6dd7c7c1b9921e2f914a3dce2656c3ea016fa3278f9226f5cd456b</sum></package><package arch="x86_64" name="pcp-pmda-systemd" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-systemd-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">3f9a59a2ee1a7ab01c24f7c7c2f62bf9fd6242cf963e37a207b92048624aaeef</sum></package><package arch="x86_64" name="pcp-conf" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-conf-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">9b6b4e8634b3bfa809bfcebfd3915134b245fb38745e949d61da59490ca2f1a6</sum></package><package arch="x86_64" name="pcp-export-pcp2graphite" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2graphite-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">fbfdef935f7bf379c0736d57f1ffdb001b2f2114a515b0f1553ca911241152d6</sum></package><package arch="x86_64" name="pcp-pmda-ds389" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-ds389-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">87899613e58e5b3d0c15911786a8c606d060c62f3be8b4ba51ac40fffeb1bcf4</sum></package><package arch="x86_64" name="pcp-pmda-snmp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-snmp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">13d4002cca44d54a0c966a8732cd0a012a43ef3b5944375c22948d06fabc2fb4</sum></package><package arch="x86_64" name="pcp-pmda-gfs2" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-gfs2-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">188c4bd83f512aa350f5a0cde4e885c08d6b5fa3a6078f8089ae60881c44239c</sum></package><package arch="x86_64" name="pcp-pmda-infiniband" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-infiniband-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f29e04e7a1a4ee8dbad285d177c418f42dccec6de8fb9d6c8f5f6180b5f8cdbb</sum></package><package arch="i686" name="pcp-libs-devel" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-libs-devel-4.3.2-12.el7.i686.rpm</filename><sum type="sha256">3731054a7e66517359dab6b2f4c2701b392ef92c285d10db904925abe5573a9d</sum></package><package arch="noarch" name="pcp-webjs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webjs-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">34caa133a0b87790de287a87108a295dfee713eab06635eca09012f8a22851ac</sum></package><package arch="x86_64" name="perl-PCP-MMV" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>perl-PCP-MMV-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">2d3af366b35b32fb7a9e0e2086721697df720fc3366c1a35e15070a18d380305</sum></package><package arch="x86_64" name="pcp-libs-devel" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-libs-devel-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">d8537665520b7dc85c3feabbe4ec8e73ff1dc52cd197940837fd768be7f30870</sum></package><package arch="x86_64" name="pcp-pmda-lustre" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-lustre-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">c75fa8443f366dc882869bfd5fd0ce3b18f84be9bb293120cdfa5e3ffacb96eb</sum></package><package arch="noarch" name="pcp-webapp-grafana" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapp-grafana-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">67a08ef8d3c2155f46e24bab1cd4919ecc193e1affa3bcf9154d05691c09e80a</sum></package><package arch="x86_64" name="pcp-pmda-postgresql" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-postgresql-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">3ea66e8554babdc95cb9b215bcffa31a4818b92413706713875c290d4ba6c1d5</sum></package><package arch="x86_64" name="pcp-pmda-news" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-news-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8ff2db2354e68d26f3ce528494b905646e8fa01a55b4e409a1f7a7fd1ac42f0d</sum></package><package arch="x86_64" name="pcp-pmda-named" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-named-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">ebceb40ee5c385c714234d74bd43d038c1ce73a239452a3fffc57720e27207ad</sum></package><package arch="x86_64" name="pcp-pmda-haproxy" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-haproxy-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8bbb991de40f0c9585d36a388046369c3aea250d4192f854950549138725fc5b</sum></package><package arch="x86_64" name="pcp-selinux" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-selinux-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f8c39a44203878dfb7a92115778cfd906c12e3bb008679557ab8b5b7a9ce7126</sum></package><package arch="x86_64" name="perl-PCP-LogImport" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>perl-PCP-LogImport-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f82a3cb82dfd0960cf3475808fa23a9ac70c3e2f080ce951673bb8c61f17e6cb</sum></package><package arch="x86_64" name="pcp-pmda-summary" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-summary-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">1924bb5fa8c4d179f85a0d54b734e36c30f0d14b2dcc98aa2eb25e887804ed59</sum></package><package arch="x86_64" name="pcp-pmda-pdns" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-pdns-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f0816da6003870e6b52cf2b2613e5634ab83968b15ed33b8548ab4c4a7455894</sum></package><package arch="x86_64" name="pcp-pmda-gluster" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-gluster-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">db042a9cefac99b68b2036612b7ce4641e9333a03ce969aa89ee9293c7b4e38e</sum></package><package arch="x86_64" name="pcp-import-iostat2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-iostat2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">6899765db035630361e39765ba1eee15382f9143485affc6ca62fe228abcab77</sum></package><package arch="x86_64" name="pcp-pmda-samba" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-samba-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">d7c4757f33855758ec9e7630a08dd3a62892e0ca48a540eefdd231aecf93df9c</sum></package><package arch="x86_64" name="pcp-pmda-rpm" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-rpm-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">42b8963defba99d9bd04019be374fab137cffdcc344a2982962d9bea760e4bf5</sum></package><package arch="x86_64" name="pcp-pmda-logger" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-logger-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">4a334eaca4cd7400cb9a89f644ee83f63db52c3e5fb9b3c7f3a6a5a085adcc06</sum></package><package arch="x86_64" name="pcp-pmda-ds389log" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-ds389log-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">bc3def914cbe36b1232a0dff5dc68f188a743fb2584fa19fcdc414f6f789a7f7</sum></package><package arch="i686" name="pcp-libs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-libs-4.3.2-12.el7.i686.rpm</filename><sum type="sha256">586d81a8f97a4911899beb30e1128a1dde2533aa7682197fcb2b6d03aeb846ff</sum></package><package arch="x86_64" name="pcp-pmda-libvirt" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-libvirt-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f0534334af6c18411356d89d8ad2e598cb1a4dbd284e16addbd08c1476a83427</sum></package><package arch="noarch" name="pcp-webapp-graphite" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapp-graphite-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">5850fbac343b48075fc7a74bdb9972ac452db3414091e2a66b2e81394a2048b9</sum></package><package arch="x86_64" name="pcp-pmda-activemq" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-activemq-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">40f93060970aa2902d25f6757937c9852fa37f2864f576a8c4404e2810152767</sum></package><package arch="x86_64" name="pcp-pmda-dbping" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-dbping-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">7398ff1b648557ea6e52e9487a835598e9f0c209c67079d652e4776f8265432f</sum></package><package arch="x86_64" name="pcp-pmda-shping" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-shping-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">74c4df59928de268d66830f43cac4c561f10c3961b19c31629ad933a6b2f49c2</sum></package><package arch="x86_64" name="pcp-libs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-libs-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">ab6a8dd6ebec57c9b0f1999b95e2f4107f587187f619f9c171cb7fa2a78f9f83</sum></package><package arch="x86_64" name="pcp-pmda-mic" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-mic-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">4b06c4d24ecdd93b586a641eacf6abc6f5c1a696eefbd66244980c96ba66c877</sum></package><package arch="x86_64" name="pcp-pmda-mysql" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-mysql-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">367a59953bb3c028132ee0a7fb379046bd234773fb86d0a362a72bf0e396a1ed</sum></package><package arch="x86_64" name="pcp-pmda-slurm" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-slurm-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">c01a166080a10d2b46385ad284e08ef0d0b74614b76e0a94fa23f5529bb334ea</sum></package><package arch="x86_64" name="pcp-pmda-netfilter" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-netfilter-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">46894601507a441e377b4e388970ef04ffc583c2d0d3a0d69d9c2934ea78d193</sum></package><package arch="x86_64" name="pcp-pmda-bind2" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-bind2-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">6a32163e4540f98fa1dc33366cda02fe440f309137a3ccd32f896f599499f800</sum></package><package arch="x86_64" name="pcp-pmda-zswap" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-zswap-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">a7cb05a1dd91152f78d2caf31a139168811953a84d5bb55be76afee453ce71f8</sum></package><package arch="x86_64" name="pcp-pmda-docker" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-docker-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">6f61e4f0094fbe1bce20c623c6918ef026b12a87a794e71d1f8727cc71f6def1</sum></package><package arch="x86_64" name="pcp-pmda-roomtemp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-roomtemp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8634b803899810ff128a29ea217b3423a219782027abbdc2e7b0da767ceb1db3</sum></package><package arch="x86_64" name="pcp-pmda-unbound" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-unbound-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">e515a9a8dec6cc0acb270e426cf887f088bad821a5ac20ce4c250c60f090640b</sum></package><package arch="x86_64" name="pcp-pmda-vmware" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-vmware-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">0fafca5834e49f8181ac688bdfa01e4ede409522a5ad37765907d688537b421e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3695" id="CVE-2019-3695" title="Cve-2019-3695" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3696" id="CVE-2019-3696" title="Cve-2019-3696" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3869" id="RHSA-2020:3869-1" title="Rhsa-2020:3869-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730107" id="1730107" title="Hugepage Data Is Incorrect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730492" id="1730492" title="Some Numa Nodes Have No Instances" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749870" id="1749870" title="Selinux Is Preventing Pcp-Pmda-Named From Executing /Usr/Sbin/Rndc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1756252" id="1756252" title="Missing Dependency Of Pcp-Selinux Package On Selinux-Policy-Targeted Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760750" id="1760750" title="Selinux Issue When Running Sanity Tests Of Pcp Testsuite" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764748" id="1764748" title="Pcp Atopsar Ignores 'Samples' Count" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765641" id="1765641" title="Pcp Atop Crash Due To Devtstat-&gt;Nprocactive Set To One Above The Expected Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775373" id="1775373" title="[Rfe] Pcp-Zeroconf Should Gather Per-Thread Info By Default" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1792859" id="1792859" title="Pmlogger Selinux Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1811703" id="1811703" title="Cve-2019-3695 Pcp: Local Privilege Escalation In Pcp Spec File %Post Section" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1811707" id="1811707" title="Cve-2019-3696 Pcp: Local Privilege Escalation In Pcp Spec File Through Migrate_Tempdirs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1818710" id="1818710" title="Pcp-Atop Is Crashing Due To An Uninitialized Value Within A Sort Comparison Routine" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3873-1</id><title>Libsrtp</title><description>Security Fix(es): 
* libsrtp: improper handling of CSRC count and extension header length in RTP header (CVE-2015-6360) 
* libsrtp: buffer overflow in application of crypto profiles (CVE-2013-2139)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsrtp" release="11.20101004cvs.el7" src="libsrtp-1.4.4-11.20101004cvs.el7.src.rpm" version="1.4.4"><filename>libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm</filename><sum type="sha256">3d46addf1591cdc73cbb9035da2ea20700eea4bc42ee514c085f204a7fd7afdc</sum></package><package arch="i686" name="libsrtp-devel" release="11.20101004cvs.el7" src="libsrtp-1.4.4-11.20101004cvs.el7.src.rpm" version="1.4.4"><filename>libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm</filename><sum type="sha256">9e481eb4354af9064dc727515da91a84ad0ae703d261dcee68eb6f50891a4fb4</sum></package><package arch="i686" name="libsrtp" release="11.20101004cvs.el7" src="libsrtp-1.4.4-11.20101004cvs.el7.src.rpm" version="1.4.4"><filename>libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm</filename><sum type="sha256">3bcb18505b8aef66783481971e0c7ab5a46d592919b9f799c802b021e2b766c8</sum></package><package arch="x86_64" name="libsrtp-devel" release="11.20101004cvs.el7" src="libsrtp-1.4.4-11.20101004cvs.el7.src.rpm" version="1.4.4"><filename>libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm</filename><sum type="sha256">a97d9980586cd80b86756c8c3641a1d4d9145c0ac259182348922b42701e36b4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2139" id="CVE-2013-2139" title="Cve-2013-2139" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6360" id="CVE-2015-6360" title="Cve-2015-6360" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3873" id="RHSA-2020:3873-1" title="Rhsa-2020:3873-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301202" id="1301202" title="Libsrtp Global-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323702" id="1323702" title="Cve-2015-6360 Libsrtp: Improper Handling Of Csrc Count And Extension Header Length In Rtp Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323705" id="1323705" title="Cve-2015-6360 Libsrtp: Improper Handling Of Csrc Count And Extension Header Length In Rtp Header [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=970697" id="970697" title="Cve-2013-2139 Libsrtp: Buffer Overflow In Application Of Crypto Profiles" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3875-1</id><title>Tigervnc</title><description>Security Fix(es): 
* tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder (CVE-2019-15691) 
* tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks (CVE-2019-15692) 
* tigervnc: Heap buffer overflow in TightDecoder::FilterGradient (CVE-2019-15693) 
* tigervnc: Heap buffer overflow in DecodeManager::decodeRect (CVE-2019-15694) 
* tigervnc: Stack buffer overflow in CMsgReader::readSetCursor (CVE-2019-15695)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tigervnc-license" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-21.el7.noarch.rpm</filename><sum type="sha256">60dc13b47f3eaa35a40b7370da949560f4b0a214384164572a0282dd03dc7528</sum></package><package arch="x86_64" name="tigervnc-server" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-21.el7.x86_64.rpm</filename><sum type="sha256">da195def7f91aa6e312f33beab418d56b160a60db1cfec308d4480ed95b26c1d</sum></package><package arch="x86_64" name="tigervnc" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-21.el7.x86_64.rpm</filename><sum type="sha256">6dfe2cc20b9f7947721e62e440e119302369357d21ff4f95c975ac4e8442b54e</sum></package><package arch="noarch" name="tigervnc-icons" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-21.el7.noarch.rpm</filename><sum type="sha256">50b608c98ce41c7b39f524660f5c7cf6aeda392512ae5832c2103a6785367c48</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-21.el7.x86_64.rpm</filename><sum type="sha256">eafd08607c4951ff4a167761a3047dd24a0c1a50a65f34e5295512cb11cbcedd</sum></package><package arch="x86_64" name="tigervnc-server-module" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-21.el7.x86_64.rpm</filename><sum type="sha256">225539e1f71b76534a9136b9068c0187b57b955cac092df86701be4444be287e</sum></package><package arch="noarch" name="tigervnc-server-applet" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-21.el7.noarch.rpm</filename><sum type="sha256">fbb91ee4575bd7b803058c51126747a87126ebc5dda45146450c4058dde3539f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691" id="CVE-2019-15691" title="Cve-2019-15691" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692" id="CVE-2019-15692" title="Cve-2019-15692" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693" id="CVE-2019-15693" title="Cve-2019-15693" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694" id="CVE-2019-15694" title="Cve-2019-15694" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695" id="CVE-2019-15695" title="Cve-2019-15695" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3875" id="RHSA-2020:3875-1" title="Rhsa-2020:3875-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789527" id="1789527" title="Cve-2019-15692 Tigervnc: Heap Buffer Overflow Triggered From Copyrectdecoder Due To Incorrect Value Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789908" id="1789908" title="Cve-2019-15691 Tigervnc: Stack Use-After-Return Due To Incorrect Usage Of Stack Memory In Zrledecoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790313" id="1790313" title="Cve-2019-15693 Tigervnc: Heap Buffer Overflow In Tightdecoder::Filtergradient" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790315" id="1790315" title="Cve-2019-15694 Tigervnc: Heap Buffer Overflow In Decodemanager::Decoderect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790318" id="1790318" title="Cve-2019-15695 Tigervnc: Stack Buffer Overflow In Cmsgreader::Readsetcursor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791996" id="1791996" title="Tigervnc Should Not Arbitrarily Start On Unspecified Ports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1826822" id="1826822" title="Tigervnc Exits At Startup" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3876-1</id><title>Libvpx</title><description>Security Fix(es): 
* libvpx: Denial of service in mediaserver (CVE-2017-0393) 
* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) 
* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) 
* libvpx: Out of bounds read in vp8_decode_frame in decodeframe.c (CVE-2020-0034)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvpx" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-1.3.0-8.el7.x86_64.rpm</filename><sum type="sha256">52f05b8fee498a4be7e99ff0408af2f735789bb5fbcd167bf6ac3fe94e7ee739</sum></package><package arch="x86_64" name="libvpx-devel" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-devel-1.3.0-8.el7.x86_64.rpm</filename><sum type="sha256">0ec7b3d61c7211ba012bd89199a4c4ab1639a742fa3d6be7c4f2f0147e119785</sum></package><package arch="x86_64" name="libvpx-utils" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-utils-1.3.0-8.el7.x86_64.rpm</filename><sum type="sha256">ba63453c446906577c14da5df5fcb30b34dae6d55bcdbc3858687d18fc28cd00</sum></package><package arch="i686" name="libvpx" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-1.3.0-8.el7.i686.rpm</filename><sum type="sha256">c99a2275a9b83069f71bc275c281ca99fcc7c831676e1b473633d5a3cf7ef1d8</sum></package><package arch="i686" name="libvpx-devel" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-devel-1.3.0-8.el7.i686.rpm</filename><sum type="sha256">4965e6e8d821d8af743041d219a8560a247ae4815a30e3a77f461599432e970f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0393" id="CVE-2017-0393" title="Cve-2017-0393" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9232" id="CVE-2019-9232" title="Cve-2019-9232" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9433" id="CVE-2019-9433" title="Cve-2019-9433" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0034" id="CVE-2020-0034" title="Cve-2020-0034" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3876" id="RHSA-2020:3876-1" title="Rhsa-2020:3876-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769657" id="1769657" title="Cve-2017-0393 Libvpx: Denial Of Service In Mediaserver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788966" id="1788966" title="Cve-2019-9232 Libvpx: Out Of Bounds Read In Vp8_Norm Table" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788994" id="1788994" title="Cve-2019-9433 Libvpx: Use-After-Free In Vp8_Deblock() In Vp8/Common/Postproc.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1813000" id="1813000" title="Cve-2020-0034 Libvpx: Out Of Bounds Read In Vp8_Decode_Frame In Decodeframe.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3877-1</id><title>Audiofile</title><description>Security Fix(es): 
* audiofile: Heap-based buffer overflow in Expand3To4Module::run() when running sfconvert (CVE-2018-17095) 
* audiofile: NULL pointer dereference in ModuleState::setup() in modules/ModuleState.cpp allows for denial of service via crafted file (CVE-2018-13440)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="audiofile" release="9.el7" src="audiofile-0.3.6-9.el7.src.rpm" version="0.3.6"><filename>audiofile-0.3.6-9.el7.i686.rpm</filename><sum type="sha256">9a26fcbae2192fcdecba94b61cf7e69c38b5d1f215a3903e1efd155ced1ad6a1</sum></package><package arch="x86_64" epoch="1" name="audiofile" release="9.el7" src="audiofile-0.3.6-9.el7.src.rpm" version="0.3.6"><filename>audiofile-0.3.6-9.el7.x86_64.rpm</filename><sum type="sha256">5068bee84e675ca2f2d01d126bd58bb37ab11c0bc48d3d108ff1c2f35cba1e88</sum></package><package arch="x86_64" epoch="1" name="audiofile-devel" release="9.el7" src="audiofile-0.3.6-9.el7.src.rpm" version="0.3.6"><filename>audiofile-devel-0.3.6-9.el7.x86_64.rpm</filename><sum type="sha256">56216a297f60c0ee46730c797b75c76b1fe563a3307942a11e3f549a7036b5a0</sum></package><package arch="i686" epoch="1" name="audiofile-devel" release="9.el7" src="audiofile-0.3.6-9.el7.src.rpm" version="0.3.6"><filename>audiofile-devel-0.3.6-9.el7.i686.rpm</filename><sum type="sha256">2282107381450a6ba84215a95078f451c1460c294fa8d3c48833f3d7b77690f8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3877" id="RHSA-2020:3877-1" title="Rhsa-2020:3877-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3878-1</id><title>Dnsmasq</title><description>Security Fix(es): 
* dnsmasq: memory leak in the create_helper() function in /src/helper.c (CVE-2019-14834)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="dnsmasq" release="16.el7" src="dnsmasq-2.76-16.el7.src.rpm" version="2.76"><filename>dnsmasq-2.76-16.el7.x86_64.rpm</filename><sum type="sha256">daa4d767de0095812b2aa6f65e301a0e8e303c46cdaafece3c3f7f4a4827fd04</sum></package><package arch="x86_64" name="dnsmasq-utils" release="16.el7" src="dnsmasq-2.76-16.el7.src.rpm" version="2.76"><filename>dnsmasq-utils-2.76-16.el7.x86_64.rpm</filename><sum type="sha256">d9c5c1ec38c5880a759e8f8fd74c86a2a8e82bbb74b93188e00b40a042e6b8fc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14834" id="CVE-2019-14834" title="Cve-2019-14834" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3878" id="RHSA-2020:3878-1" title="Rhsa-2020:3878-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752569" id="1752569" title="[Rhel-7] Change Dhcp_Release To Use Default Address When No Ip Subnet Matches" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1755610" id="1755610" title="Dnsmasq Not Returning Refused To Dns Queries Without The Recursion Bit Set" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757247" id="1757247" title="Dhcpv6 Relay-Fwd Requests Are Ignored By Dnsmasq" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764425" id="1764425" title="Cve-2019-14834 Dnsmasq: Memory Leak In The Create_Helper() Function In /Src/Helper.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815080" id="1815080" title="Stop Treating Servfail As A Successful Response From Upstream Servers" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3887-1</id><title>Python-Pillow</title><description>Security Fix(es): 
* python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-pillow-doc" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-doc-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">b010e860a28fb10f1dc289199f9d53d8e7cb7695fc07bdca7c1e68ecf62fe2d8</sum></package><package arch="i686" name="python-pillow" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-21.gitd1c6db8.el7.i686.rpm</filename><sum type="sha256">8291569a120b0df9e5e6288837682ca4b4c339c45998f2aae2b4dc21d2ee3308</sum></package><package arch="x86_64" name="python-pillow-tk" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-tk-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">0858f2e391eb6529e671cadf474bca62bdef7b26d057d0997a29fce49aa00acc</sum></package><package arch="i686" name="python-pillow-devel" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-21.gitd1c6db8.el7.i686.rpm</filename><sum type="sha256">40398008e1a1fe5a8739bb01444ab77dd8acfb6ef4e95c2e24442114e901f637</sum></package><package arch="x86_64" name="python-pillow" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">dd67334460ba6f58f5bacc7454a593cf2ca27c5be1ddfc7aaedb307b5f4196e6</sum></package><package arch="x86_64" name="python-pillow-sane" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-sane-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">1171170eb9c007f0ad256743979db0021b3407c0b6d88adf6367577d3591eadb</sum></package><package arch="x86_64" name="python-pillow-devel" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">d1cc10c620f775819173ca6106443acba2e7f18fa9b3339d61a15fd74a4f1f2b</sum></package><package arch="x86_64" name="python-pillow-qt" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-qt-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">8930062c157d5419b324f5de78c527fd1e0d0e0d1ec54c9e6c8ba31f888f66dd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5313" id="CVE-2020-5313" title="Cve-2020-5313" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3887" id="RHSA-2020:3887-1" title="Rhsa-2020:3887-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789532" id="1789532" title="Cve-2020-5313 Python-Pillow: Out-Of-Bounds Read In Imagingflidecode When Loading Fli Images" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3888-1</id><title>Python3</title><description>Security Fix(es): 
* python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935) 
* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python3-libs" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">3786657d74649a5ef22c5f2f998273c99694812081dc386c17b318b5ba37ba29</sum></package><package arch="x86_64" name="python3-tkinter" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">e19e0c8ded7b6d161afa546da31ac053da70c2907a23e1b010464f4c2045d29b</sum></package><package arch="x86_64" name="python3-test" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">db1880e68d8478b3fd6f648fc76c7b6a7b1e724264da71f3993cd44cfbd09b34</sum></package><package arch="x86_64" name="python3-idle" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">0529688f400285d529efdce8e4ec0ecb67be47e53a7742a49025f080ce9ab6e2</sum></package><package arch="x86_64" name="python3" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">5777b19c4aab76059c9b38e47e3f7f6470e10c864e49ffaa2e771281fbe3fc3e</sum></package><package arch="i686" name="python3-tkinter" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">11a2d12d28012d1a2c308db52468b86fd56922376a9c87d2779594ea350ec1a7</sum></package><package arch="i686" name="python3-devel" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">a584ccf6e24363faa109f7c98777f86b3814289758653f29f5cb3b9dab8dbb04</sum></package><package arch="i686" name="python3" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">305afdf13a5f552ffa00dd59f154b6ea0546c90e2962410db11d67b28c602f07</sum></package><package arch="x86_64" name="python3-devel" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">ecb31d93f55639cd16cec810b53bd5a250f91b6bb60842aa0b158cf63d6c67f7</sum></package><package arch="i686" name="python3-debug" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">b549d3f8ef59e18d3e6bbec90dfd5180d86440ecb66885266b722d1b28337cff</sum></package><package arch="x86_64" name="python3-debug" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">1e909825758411d5f787c612c08ae2dab9beb4fa7eeacdf2bc7c94c0930b5bc5</sum></package><package arch="i686" name="python3-test" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">71c341657b208a997fa0a9daddcf06784b2fbf0d1ed972a21965902a791150fe</sum></package><package arch="i686" name="python3-idle" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">82cd4860dfa00c2cce22b6b685a98f4cf465fd7053161eb0338e2cf8c48d0918</sum></package><package arch="i686" name="python3-libs" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">00b41c5dca14a515d1d4004df978c9e8c86463ce7453e04fd7aad0de3346dac8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492" id="CVE-2020-8492" title="Cve-2020-8492" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3888" id="RHSA-2020:3888-1" title="Rhsa-2020:3888-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763229" id="1763229" title="Cve-2019-16935 Python: Xss Vulnerability In The Documentation Xml-Rpc Server In Server_Title Field" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763730" id="1763730" title="Python3-Idle Is Not Providing Python36-Tools" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1809065" id="1809065" title="Cve-2020-8492 Python: Wrong Backtracking In Urllib.Request.Abstractbasicauthhandler Allows For A Redos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3898-1</id><title>Cloud-Init</title><description>Security Fix(es): 
* cloud-init: Use of random.choice when generating random password (CVE-2020-8631) 
* cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py (CVE-2020-8632) 
* cloud-init: default configuration disabled deletion of SSH host keys (CVE-2018-10896)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="cloud-init" release="7.el7" src="cloud-init-19.4-7.el7.src.rpm" version="19.4"><filename>cloud-init-19.4-7.el7.x86_64.rpm</filename><sum type="sha256">55591cfe2ed22e312cd0b8366a69f59cb8b93c12c430cb5e47186b85f942000a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10896" id="CVE-2018-10896" title="Cve-2018-10896" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8631" id="CVE-2020-8631" title="Cve-2020-8631" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8632" id="CVE-2020-8632" title="Cve-2020-8632" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3898" id="RHSA-2020:3898-1" title="Rhsa-2020:3898-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574338" id="1574338" title="Cve-2018-10896 Cloud-Init: Default Configuration Disabled Deletion Of Ssh Host Keys [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598831" id="1598831" title="Cve-2018-10896 Cloud-Init: Default Configuration Disabled Deletion Of Ssh Host Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748015" id="1748015" title="[Cloud-Init][Rhel7] /Etc/Resolv.Conf Lose Config After Reboot (Initial Instance Is Ok)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1772505" id="1772505" title="[Rhel7] Swapon Fails With &quot;Swapfile Has Holes&quot; When Created On A Xfs Filesystem By Cloud-Init" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1793652" id="1793652" title="Support For Aws Imds V2 (Available In Cloud-Init 19.4)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798728" id="1798728" title="Cve-2020-8632 Cloud-Init: Too Short Random Password Length In Cc_Set_Password In Config/Cc_Set_Passwords.Py" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798731" id="1798731" title="Cve-2020-8631 Cloud-Init: Use Of Random.Choice When Generating Random Password" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1803094" id="1803094" title="[Rhel-7.9] Cloud-Init Rebase To 19.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1821679" id="1821679" title="[Cloud-Init Test] Cloud-Init Rebase To 19.4 Testing In Rhel-7.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1821999" id="1821999" title="[Rhel7.9] Do Not Log Imdsv2 Token Values Into Cloud-Init.Log" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3901-1</id><title>Libpng</title><description>Security Fix(es): 
* libpng: does not check length of chunks against user limit (CVE-2017-12652)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="libpng-devel" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-devel-1.5.13-8.el7.x86_64.rpm</filename><sum type="sha256">9675e15c9e84a9cef3d71cf0822605a6aea0120b63bb9c6b0e501b5e9ec4fd21</sum></package><package arch="x86_64" epoch="2" name="libpng-static" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-static-1.5.13-8.el7.x86_64.rpm</filename><sum type="sha256">644daab0c8f61d93af68ea63a1329d3e8c85c7c84488316748cd97cf54ec2f3c</sum></package><package arch="x86_64" epoch="2" name="libpng" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-1.5.13-8.el7.x86_64.rpm</filename><sum type="sha256">0e4f8cdfd63647f81a806f76b25e797c7a8bd64df53ea28e42d8955dba4781bd</sum></package><package arch="i686" epoch="2" name="libpng-static" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-static-1.5.13-8.el7.i686.rpm</filename><sum type="sha256">70fa7e0da54383b8d3de74bcc4fd1b553c53534e41e35b927bf14d2ebe291502</sum></package><package arch="i686" epoch="2" name="libpng" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-1.5.13-8.el7.i686.rpm</filename><sum type="sha256">5345462ec540ee430e2470dff68515295d373d88c06aab6e4aac87f47f83081a</sum></package><package arch="i686" epoch="2" name="libpng-devel" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-devel-1.5.13-8.el7.i686.rpm</filename><sum type="sha256">cbecd58b02f2f55e095fb0957743f361210530ef6ba1fc06cae838bfc8be6ba4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12652" id="CVE-2017-12652" title="Cve-2017-12652" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3901" id="RHSA-2020:3901-1" title="Rhsa-2020:3901-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733956" id="1733956" title="Cve-2017-12652 Libpng: Does Not Check Length Of Chunks Against User Limit" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3902-1</id><title>Libtiff</title><description>Security Fix(es): 
* libtiff: integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c (CVE-2019-14973) 
* libtiff: integer overflow leading to heap-based buffer overflow in tif_getimage.c (CVE-2019-17546)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libtiff-static" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-35.el7.i686.rpm</filename><sum type="sha256">4456a90574ff9aefd2dbced4ba6eeb3ddc886eb2574e1c1bc0feaa445f70d6a1</sum></package><package arch="i686" name="libtiff-devel" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-35.el7.i686.rpm</filename><sum type="sha256">28e354f99c58b96c0667cdd4c28733455e37ef7e83f02d7108584c62490da904</sum></package><package arch="i686" name="libtiff" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-35.el7.i686.rpm</filename><sum type="sha256">55a2a87e891e5ae9e6f76106a7e7af9e5408261ba9311cc702e2e1000c13052d</sum></package><package arch="x86_64" name="libtiff-devel" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-35.el7.x86_64.rpm</filename><sum type="sha256">114620bc9f5fc438848ae84a24af1c535ac8f7f843f3403c1f179a7624c00a1d</sum></package><package arch="x86_64" name="libtiff-tools" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-tools-4.0.3-35.el7.x86_64.rpm</filename><sum type="sha256">21335421bd3acb7c2782aa6f2be48a81df6a8313af864a35f8b0b0a711b12c3c</sum></package><package arch="x86_64" name="libtiff-static" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-35.el7.x86_64.rpm</filename><sum type="sha256">5f50220995c43eedf26e02f65a1dfe4f5ca2afb6d28811d24818233ec1350a49</sum></package><package arch="x86_64" name="libtiff" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-35.el7.x86_64.rpm</filename><sum type="sha256">80943e54372643083901569fde0f17b642f859629923f381a2fc308e01a31c2c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14973" id="CVE-2019-14973" title="Cve-2019-14973" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17546" id="CVE-2019-17546" title="Cve-2019-17546" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3902" id="RHSA-2020:3902-1" title="Rhsa-2020:3902-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1745951" id="1745951" title="Cve-2019-14973 Libtiff: Integer Overflow In _Tiffcheckmalloc And _Tiffcheckrealloc In Tif_Aux.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765705" id="1765705" title="Cve-2019-17546 Libtiff: Integer Overflow Leading To Heap-Based Buffer Overflow In Tif_Getimage.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3906-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: seccomp: blacklist is not applied to all threads (CVE-2018-15746) 
* QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7" src="qemu-kvm-1.5.3-175.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7.x86_64.rpm</filename><sum type="sha256">6d2e2c9316d08af5d94e7984eef0dd6f9b13071883bcb530b8d5b0a2242448d6</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7" src="qemu-kvm-1.5.3-175.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7.x86_64.rpm</filename><sum type="sha256">8935d99c77ff3a7742a7f2ec0da11407bdf6613ca2a6a6267ef70e662682d383</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7" src="qemu-kvm-1.5.3-175.el7.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7.x86_64.rpm</filename><sum type="sha256">490a44a4f588c2e6fad927d8f679f9568c0ee6392989dbd582b305314eee57ad</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7" src="qemu-kvm-1.5.3-175.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7.x86_64.rpm</filename><sum type="sha256">f6487877daa75615bb84590866b1a331a449e6bf4b231691d97c161634f93451</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746" id="CVE-2018-15746" title="Cve-2018-15746" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20382" id="CVE-2019-20382" title="Cve-2019-20382" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3906" id="RHSA-2020:3906-1" title="Rhsa-2020:3906-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1615637" id="1615637" title="Cve-2018-15746 Qemu: Seccomp: Blacklist Is Not Applied To All Threads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791679" id="1791679" title="Qemu: Slirp: Disable Emulation Of Tcp Programs Like Ftp Irc Etc. [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1802215" id="1802215" title="Add Support For Newer Glusterfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1810390" id="1810390" title="Cve-2019-20382 Qemu: Vnc: Memory Leakage Upon Disconnect" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3908-1</id><title>Cpio</title><description>Security Fix(es): 
* cpio: improper input validation when writing tar header fields leads to unexpect tar generation (CVE-2019-14866)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="cpio" release="28.el7" src="cpio-2.11-28.el7.src.rpm" version="2.11"><filename>cpio-2.11-28.el7.x86_64.rpm</filename><sum type="sha256">1abeea9894fe45a8983e0258f79069bad85b9effa640033aae9dbebdb497c3a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866" id="CVE-2019-14866" title="Cve-2019-14866" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3908" id="RHSA-2020:3908-1" title="Rhsa-2020:3908-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765511" id="1765511" title="Cve-2019-14866 Cpio: Improper Input Validation When Writing Tar Header Fields Leads To Unexpect Tar Generation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3911-1</id><title>Python</title><description>Security Fix(es): 
* python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-debug" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">7fde2bf851b595d53b7c14b4f3d1948af9d33b5dd5315610c9b0f7688f753cb4</sum></package><package arch="x86_64" name="python-test" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">081601053786fb5bf339113a631a01c31622be8022d404ecc8b7b2ee78122097</sum></package><package arch="x86_64" name="python-tools" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">9442bbf8a094feddb106bb41188944fa3d74d2263bf742a5e90136d47413608e</sum></package><package arch="x86_64" name="python-libs" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">429a0cc93beceebc65292b64f2809b0414206ab4940b0f0708b0ba2fdbe2fafd</sum></package><package arch="x86_64" name="python-devel" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">a98e9a7c5b39a55c0dc3114ee895fa705371cc5f1e4b29af071a78d5362cb7cc</sum></package><package arch="x86_64" name="tkinter" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">c1308978f2637e9a481d20a9d9d676539f33037c942962fd498a512ba18514ed</sum></package><package arch="i686" name="python-libs" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-89.el7.i686.rpm</filename><sum type="sha256">119b23cdb1e1b152d671f2933dbc802e277e2c7f3db2cb0c06422430366138e2</sum></package><package arch="x86_64" name="python" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">512c563a817b55c187e202e047acf8b53ddb456d814712d495c3aae33b1fad60</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935" id="CVE-2019-16935" title="Cve-2019-16935" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3911" id="RHSA-2020:3911-1" title="Rhsa-2020:3911-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763229" id="1763229" title="Cve-2019-16935 Python: Xss Vulnerability In The Documentation Xml-Rpc Server In Server_Title Field" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3915-1</id><title>Libssh2</title><description>Security Fix(es): 
* libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c (CVE-2019-17498)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libssh2-devel" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-4.el7.i686.rpm</filename><sum type="sha256">de09a90cf07de953e079f73a15570e61771f15212421ae4c688927b5e3c674ce</sum></package><package arch="noarch" name="libssh2-docs" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-docs-1.8.0-4.el7.noarch.rpm</filename><sum type="sha256">41146c005a9cb5bfcc19aaab25ad2a27cc16646a6e53fc57d770d59ee5035ff1</sum></package><package arch="i686" name="libssh2" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-4.el7.i686.rpm</filename><sum type="sha256">158a01f5bc056e08a40a418661ef06d1800d719cc93ed4720b966d62f75c4777</sum></package><package arch="x86_64" name="libssh2" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-4.el7.x86_64.rpm</filename><sum type="sha256">bcf4dc42888aa5074ae44a1849b80215c1cb26ec7a6e4a10034f4e7979ba6d51</sum></package><package arch="x86_64" name="libssh2-devel" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-4.el7.x86_64.rpm</filename><sum type="sha256">e6fa7588e0c282c2611051609f1e0de3f2f4e1bd2dd9251d4e45c4eb61259cdf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" id="CVE-2019-17498" title="Cve-2019-17498" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3915" id="RHSA-2020:3915-1" title="Rhsa-2020:3915-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766898" id="1766898" title="Cve-2019-17498 Libssh2: Integer Overflow In Ssh_Msg_Disconnect Logic In Packet.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3916-1</id><title>Curl</title><description>Security Fix(es): 
* curl: heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libcurl-devel" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7.i686.rpm</filename><sum type="sha256">9c856db762bc0d68f141856d7ff090c59b88eb98324eaa20a5eaf3a5708f2128</sum></package><package arch="x86_64" name="libcurl-devel" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7.x86_64.rpm</filename><sum type="sha256">ef28b8a79559ef802ae17fb9d184bb8be96478e0672806a3449a831df2791fe7</sum></package><package arch="x86_64" name="libcurl" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7.x86_64.rpm</filename><sum type="sha256">b9c5025044f93b09dd9ab29fc5e0106d9f6114624ebbd9d3f3a1e663197b6da3</sum></package><package arch="x86_64" name="curl" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>curl-7.29.0-59.el7.x86_64.rpm</filename><sum type="sha256">6dd40f8f62b4aa20eb4088f398bd86eb63bb7b0f20db35e4eb1ececc9ff0934e</sum></package><package arch="i686" name="libcurl" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7.i686.rpm</filename><sum type="sha256">b0754db1cf23accbf020f12c8d5c7cd5b34a9e48b0be6a062d5410c1eb227125</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482" id="CVE-2019-5482" title="Cve-2019-5482" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3916" id="RHSA-2020:3916-1" title="Rhsa-2020:3916-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749652" id="1749652" title="Cve-2019-5482 Curl: Heap Buffer Overflow In Function Tftp_Receive_Packet()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836773" id="1836773" title="Post Followed By A Get With Large Headers On The Same Connection Leads To A Null Dereference" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3922-1</id><title>Libsndfile</title><description>Security Fix(es): 
* libsndfile: buffer over-read in the function i2alaw_array in alaw.c (CVE-2018-19662)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsndfile" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-12.el7.i686.rpm</filename><sum type="sha256">71e5162542918806a4652b151f5fd4cd3db47c381fa01ccbe8e3b2d3d1402621</sum></package><package arch="i686" name="libsndfile-devel" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-12.el7.i686.rpm</filename><sum type="sha256">956400c7497fff01c175cc68617a199fe84a679d23c0286d4272880bc43c6da3</sum></package><package arch="x86_64" name="libsndfile-devel" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-12.el7.x86_64.rpm</filename><sum type="sha256">7f488640237061a08ec756d39b5aabe0a362778c64a1a2ea1a6c9dc9dc59886d</sum></package><package arch="x86_64" name="libsndfile-utils" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-utils-1.0.25-12.el7.x86_64.rpm</filename><sum type="sha256">7f5ee5d38598133a1d18c261aab7a039e28273babf667fc9761158cc6f95a83e</sum></package><package arch="x86_64" name="libsndfile" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-12.el7.x86_64.rpm</filename><sum type="sha256">de695e200b57e33040970a26f9031d65ce22de590c21f5fa37e6fbb4e3fa82d9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19662" id="CVE-2018-19662" title="Cve-2018-19662" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3922" id="RHSA-2020:3922-1" title="Rhsa-2020:3922-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659631" id="1659631" title="Cve-2018-19662 Libsndfile: Buffer Over-Read In The Function I2Alaw_Array In Alaw.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3936-1</id><title>Ipa</title><description>Security Fix(es): 
* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) 
* bootstrap: XSS in the data-target attribute (CVE-2016-10735) 
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) 
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip. (CVE-2018-14042) 
* bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) 
* bootstrap: XSS in the affix configuration target property (CVE-2018-20677) 
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) 
* js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358) 
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) 
* ipa: No password length restriction leads to denial of service (CVE-2020-1722)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ipa-server" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7.x86_64.rpm</filename><sum type="sha256">212f856b3912d675c1fb7be2d49c6137e78a30a80fb3c02a5f699e5a1ad125e0</sum></package><package arch="noarch" name="ipa-common" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">958b97d9fc31c879fdb2dbea8031420b87898c9b965279e694bf538909f79792</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7.x86_64.rpm</filename><sum type="sha256">95e90f07a9f23ede63feb3c4fd5757a4d99f10386c6a1faa05098e6791814077</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">b003b3c0797415a96115c3e01f3850f3b7938c91770a5901dd2fb36c18921466</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">94283f04a0455a3a998e4b570a0395866e61bc6830f3bca211d3ef3feb256d1c</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">af6dde81ad208f3dd8d38a6fffd9dfcfe14627fd7a159c17e13e4503c0d43ebc</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">8d477c0f051efd043f9805ff8c8098eedf08b3486b81a230a3d38ff99bd77954</sum></package><package arch="noarch" name="ipa-client-common" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">2ec31f79a3aaa0d80dc2816837aa21b209afe379391da2ec801b9fc2d659cb04</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">495fb3fc28301901f52de79642bbae01063134fa48b82666f9d38ed887839b41</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">eb08d748f9cb5646645f1dbe27d87dc5db7a327f3211dc8139f2c519b4bfbf69</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7.x86_64.rpm</filename><sum type="sha256">9cf9f179f4f658e86a05603a72e8022514431711915e6b68f62f722936d5f0c9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251" id="CVE-2015-9251" title="Cve-2015-9251" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735" id="CVE-2016-10735" title="Cve-2016-10735" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14040" id="CVE-2018-14040" title="Cve-2018-14040" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14042" id="CVE-2018-14042" title="Cve-2018-14042" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676" id="CVE-2018-20676" title="Cve-2018-20676" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677" id="CVE-2018-20677" title="Cve-2018-20677" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358" id="CVE-2019-11358" title="Cve-2019-11358" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331" id="CVE-2019-8331" title="Cve-2019-8331" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022" id="CVE-2020-11022" title="Cve-2020-11022" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1722" id="CVE-2020-1722" title="Cve-2020-1722" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3936" id="RHSA-2020:3936-1" title="Rhsa-2020:3936-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399546" id="1399546" title="Cve-2015-9251 Js-Jquery: Cross-Site Scripting Via Cross-Domain Ajax Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404770" id="1404770" title="Id Views: Do Not Allow Custom Views For The Masters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1545755" id="1545755" title="Ipa-Replica-Prepare Should Not Update Pki Admin Password." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601614" id="1601614" title="Cve-2018-14040 Bootstrap: Cross-Site Scripting (Xss) In The Collapse Data-Parent Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601617" id="1601617" title="Cve-2018-14042 Bootstrap: Cross-Site Scripting (Xss) In The Data-Container Property Of Tooltip." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1668082" id="1668082" title="Cve-2018-20676 Bootstrap: Xss In The Tooltip Data-Viewport Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1668089" id="1668089" title="Cve-2018-20677 Bootstrap: Xss In The Affix Configuration Target Property" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1668097" id="1668097" title="Cve-2016-10735 Bootstrap: Xss In The Data-Target Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1686454" id="1686454" title="Cve-2019-8331 Bootstrap: Xss In The Tooltip Or Popover Data-Template Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1701972" id="1701972" title="Cve-2019-11358 Js-Jquery: Prototype Pollution In Object'S Prototype Leading To Denial Of Service Or Remote Code Execution Or Property Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1754902" id="1754902" title="Running Ipa-Server-Install Fails When Rhel 7.7 Packages Are Installed On Rhel 7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1755535" id="1755535" title="Ipa-Advise On A Rhel7 Idm Server Is Not Able To Generate A Configuration Script For A Rhel8 Idm Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1756568" id="1756568" title="Ipa-Server-Certinstall Man Page Does Not Match Built-In Help." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758406" id="1758406" title="Kra Authentication Fails When Ipa Ca Has Custom Subject Dn" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769791" id="1769791" title="Invisible Part Of Notification Area In Web Ui Intercepts Clicks Of Some Page Elements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1771356" id="1771356" title="Default Client Configuration Breaks Ssh In Fips Mode." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1780548" id="1780548" title="Man Page Ipa-Cacert-Manage Does Not Display Correctly On Rhel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1782587" id="1782587" title="Add &quot;Systemctl Restart Sssd&quot; To Warning Message When Adding Trust Agents To Replicas" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788718" id="1788718" title="Ipa-Server-Install Incorrectly Setting Slew Mode (-X) When Setting Up Ntpd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788907" id="1788907" title="Renewed Certs Are Not Picked Up By Ipa Cas" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1793071" id="1793071" title="Cve-2020-1722 Ipa: No Password Length Restriction Leads To Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795890" id="1795890" title="Ipa-Pkinit-Manage Enable Fails On Replica If It Doesn'T Host The Ca" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801791" id="1801791" title="Compatibility Schema Difference In Functionality For Systems Following Rhel 7.5 -&gt; 7.6 Upgrade Path As Opposed To New Rhel 7.6 Systems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817886" id="1817886" title="Ipa Group-Add-Member: Prevent Adding Ipa Objects As External Members" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817918" id="1817918" title="Secure Tomcat Ajp Connector" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817919" id="1817919" title="Enable Compat Tree To Provide Information About Ad Users And Groups On Trust Agents" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817922" id="1817922" title="Covscan Memory Leaks Report" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817923" id="1817923" title="Ipa Upgrade Is Failing With Error &quot;Failed To Get Request: Bus, Object_Path And Dbus_Interface Must Not Be None.&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817927" id="1817927" title="Host-Add --Password Logs Cleartext Userpassword To Apache Error Log" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1819725" id="1819725" title="Rebase Ipa To Latest 4.6.X Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1825829" id="1825829" title="Ipa-Advise On A Rhel7 Idm Server Generate A Configuration Script For Client Having Hardcoded Python3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828406" id="1828406" title="Cve-2020-11022 Jquery: Cross-Site Scripting Due To Improper Injquery.Htmlprefilter Method" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829787" id="1829787" title="Ipa Service-Del Deletes The Required Principal When Specified In Lower/Upper Case" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834385" id="1834385" title="Man Page Syntax Issue Detected By Rpminspect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1842950" id="1842950" title="Ipa-Adtrust-Install Fails When Replica Is Offline" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3940-1</id><title>Openwsman</title><description>Security Fix(es): 
* openwsman: Infinite loop in process_connection() allows denial of service (CVE-2019-3833)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwsman-devel" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>libwsman-devel-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">17355de3560fc7405745ea50c5fb8ecab0f6096568dd89b3813e92ba131902a6</sum></package><package arch="x86_64" name="libwsman1" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>libwsman1-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">b143ae5c86e39bee0b9d0e90cddc05917c4ad6f0fda6df2c89254e4c22c6b37a</sum></package><package arch="i686" name="openwsman-client" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-client-2.6.3-7.git4391e5c.el7.i686.rpm</filename><sum type="sha256">ff62a824c5f57da21d2acad939e8b631d536c80d57bb80f0f08b96e413c96eff</sum></package><package arch="x86_64" name="openwsman-client" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-client-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">a15665c76215e6eb6065f39cab4965986c3e58f2c64bf59141eff1ed81954e7d</sum></package><package arch="i686" name="openwsman-server" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-server-2.6.3-7.git4391e5c.el7.i686.rpm</filename><sum type="sha256">d1e212b90758f5a4b789aed571902ad1bcb6d640084f606b640012c5d0d6f45d</sum></package><package arch="x86_64" name="openwsman-python" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-python-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">ab2e2282adff3c60550ea68ae8c6b3b395fef3b455805d0c0a1aaabeb81f0d9a</sum></package><package arch="x86_64" name="openwsman-perl" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-perl-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">4594f53f2adc81772658d3beed9db7ff7513cdf06c0b687978c58ad589eb7483</sum></package><package arch="i686" name="libwsman-devel" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>libwsman-devel-2.6.3-7.git4391e5c.el7.i686.rpm</filename><sum type="sha256">b90cc5a6f47f7328d4c465d24613d2fd73b68bc0e358499e31ec9d7ccfa582ff</sum></package><package arch="i686" name="libwsman1" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>libwsman1-2.6.3-7.git4391e5c.el7.i686.rpm</filename><sum type="sha256">2ac3a4e56bc45f14b8a72ee0f98ff4239a4b2d18e0ceb4ef0aca94eac58c80a7</sum></package><package arch="x86_64" name="openwsman-server" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-server-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">b56ae81b6084d06b1e50372555f0041f6ef2ece94fe969b83db36469c0e50807</sum></package><package arch="x86_64" name="openwsman-ruby" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-ruby-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">752b88babaa24ded54c6f3f6f2e9aae905326e58e122c0526244a913d3788d9b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3833" id="CVE-2019-3833" title="Cve-2019-3833" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3940" id="RHSA-2020:3940-1" title="Rhsa-2020:3940-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1674478" id="1674478" title="Cve-2019-3833 Openwsman: Infinite Loop In Process_Connection() Allows Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3943-1</id><title>Libwmf</title><description>Security Fix(es): 
* gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwmf" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-0.2.8.4-44.el7.x86_64.rpm</filename><sum type="sha256">0305c87f54bfeaeedd8830e1e69d72e13f56bb4c1a32a34cee7e9002001567df</sum></package><package arch="i686" name="libwmf" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-0.2.8.4-44.el7.i686.rpm</filename><sum type="sha256">a65b16d445a9f49bac7ce47b48450c5e9d251f9b0a74dc3d0513c44ed93bac80</sum></package><package arch="x86_64" name="libwmf-devel" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-devel-0.2.8.4-44.el7.x86_64.rpm</filename><sum type="sha256">d9f5ecf2c2176631670e054af0f39e71319279196dea4f44804b35f4eddbcdd4</sum></package><package arch="x86_64" name="libwmf-lite" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-lite-0.2.8.4-44.el7.x86_64.rpm</filename><sum type="sha256">34bcc527bc53616bd383b921114d1cc768631b411fa468e17f1323a765130957</sum></package><package arch="i686" name="libwmf-devel" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-devel-0.2.8.4-44.el7.i686.rpm</filename><sum type="sha256">8322e751b91b7cf1542c0463119a8afca17870c9459ae1a471e5fd58a4262d8f</sum></package><package arch="i686" name="libwmf-lite" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-lite-0.2.8.4-44.el7.i686.rpm</filename><sum type="sha256">ea7e092fccc28d46aa2376e62a935c174a1e29bda5797f40df15ce43e957b719</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978" id="CVE-2019-6978" title="Cve-2019-6978" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3943" id="RHSA-2020:3943-1" title="Rhsa-2020:3943-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671390" id="1671390" title="Cve-2019-6978 Gd: Double Free In The Gdimage*Ptr In Gd_Gif_Out.C, Gd_Jpeg.C, And Gd_Wbmp.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1840569" id="1840569" title="Bz1638365 Broke Libwmf Utils" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3944-1</id><title>Unoconv</title><description>Security Fix(es): 
* unoconv: mishandling of pathname leads to SSRF and local file inclusion (CVE-2019-17400)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="unoconv" release="8.el7" src="unoconv-0.6-8.el7.src.rpm" version="0.6"><filename>unoconv-0.6-8.el7.noarch.rpm</filename><sum type="sha256">97695d70feca1dcd27e7ad8d2760e314ae94fcd2b92ab547e24355b42415edd2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3944" id="RHSA-2020:3944-1" title="Rhsa-2020:3944-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3949-1</id><title>Librabbitmq</title><description>Security Fix(es): 
* librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow (CVE-2019-18609)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="librabbitmq-examples" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-examples-0.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">727e41346155507386016f6a7843b9fb983cdd981078d2e1d88c529c063a373a</sum></package><package arch="x86_64" name="librabbitmq-devel" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-devel-0.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">b0f8ffaca682b7bf6a64be397e8ea9be66fef21fdeded919285dc972082a3b3f</sum></package><package arch="i686" name="librabbitmq" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-0.8.0-3.el7.i686.rpm</filename><sum type="sha256">8e91da77c204be6513fc1b4863c65455ab600e85d74a80596e071ebd9847e64f</sum></package><package arch="i686" name="librabbitmq-devel" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-devel-0.8.0-3.el7.i686.rpm</filename><sum type="sha256">4920939d44ebc704eec2f33283fc1a258aa1eb481d60130098595479c717148c</sum></package><package arch="x86_64" name="librabbitmq" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-0.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">95019a3bc277abfecc2901a6591a03ef47aed5f54738ab6fae37b9563493a6ff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18609" id="CVE-2019-18609" title="Cve-2019-18609" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3949" id="RHSA-2020:3949-1" title="Rhsa-2020:3949-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1786646" id="1786646" title="Cve-2019-18609 Librabbitmq: Integer Overflow In Amqp_Handle_Input In Amqp_Connection.C Leads To Heap-Based Buffer Overflow" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3952-1</id><title>Expat</title><description>Security Fix(es): 
* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843) 
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="expat" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-2.1.0-12.el7.i686.rpm</filename><sum type="sha256">2821d8234609253c34b8216e80ac1cb471811ea7cbd2f6fe2996500557fc312c</sum></package><package arch="x86_64" name="expat-devel" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-12.el7.x86_64.rpm</filename><sum type="sha256">7f73d056ec93cd87853f3ed50e15854fd573a27e708d8d8ec86a9ef1c386f8a9</sum></package><package arch="x86_64" name="expat-static" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-12.el7.x86_64.rpm</filename><sum type="sha256">baa06e09b3b30fc6775a25044c4286e5e6d919e503bf0dcc78a003444c4759d2</sum></package><package arch="i686" name="expat-devel" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-12.el7.i686.rpm</filename><sum type="sha256">03be57e99f6187bf48e30f38836507c5ad5c166aa752443353649f066b827449</sum></package><package arch="x86_64" name="expat" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-2.1.0-12.el7.x86_64.rpm</filename><sum type="sha256">d1d93801fd83ba106092ab5b688bbad6d0ffa39d000af9bfb9f82feeb2e20401</sum></package><package arch="i686" name="expat-static" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-12.el7.i686.rpm</filename><sum type="sha256">c521f597bfb4875495920019ac6fbadf086d279b41a94805e66e0582b4316dfd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843" id="CVE-2018-20843" title="Cve-2018-20843" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3952" id="RHSA-2020:3952-1" title="Rhsa-2020:3952-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1723723" id="1723723" title="Cve-2018-20843 Expat: Large Number Of Colons In Input Makes Parser Consume High Amount Of Resources, Leading To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752592" id="1752592" title="Expat: Heap-Based Buffer Over-Read Via Crafted " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3958-1</id><title>Httpd</title><description>Security Fix(es): 
* httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications (CVE-2018-1283) 
* httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS (CVE-2018-1303) 
* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) 
* httpd: &lt;FilesMatch&gt; bypass with a trailing newline in the file name (CVE-2017-15715) 
* httpd: mod_rewrite potential open redirect (CVE-2019-10098) 
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mod_proxy_html" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">56159d40bdb54fe04bc5540e9e046a33f73de0c32386fe0de6c1a200516d273f</sum></package><package arch="x86_64" name="mod_ldap" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">72ce3e7ecec1cbb64444f97de85ca67c4c49b456407ea4c56d3ae8c027b4a566</sum></package><package arch="x86_64" name="httpd" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>httpd-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">8ae239a2a1435334b2013a17c8d9a4f76f2063fd4b2e4800c17c5685e5474a35</sum></package><package arch="noarch" name="httpd-manual" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-95.sl7.noarch.rpm</filename><sum type="sha256">d71c6aba2678eea06a0baaa73f1307a24e1baaa644faaa69ee140cfa2fc32a71</sum></package><package arch="x86_64" name="httpd-devel" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">627fb306c6d41a1d20dc9f5cb9b68d173fcba4221a4177538d9885636e270cc1</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">c72c4a6b8d39138716cd25949b11d11f471bfc6d3b32625645963e9fe006af3f</sum></package><package arch="x86_64" name="mod_session" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">e268ecec31c591436a4f3cbdd2fb223d5b4eccbf731ffc2139db088b4a461692</sum></package><package arch="x86_64" name="httpd-tools" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">4956f09c9255dbec36163703d7ec819ddcbab8e977824971cf9d2a88e0afcbf8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715" id="CVE-2017-15715" title="Cve-2017-15715" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283" id="CVE-2018-1283" title="Cve-2018-1283" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303" id="CVE-2018-1303" title="Cve-2018-1303" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098" id="CVE-2019-10098" title="Cve-2019-10098" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927" id="CVE-2020-1927" title="Cve-2020-1927" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934" id="CVE-2020-1934" title="Cve-2020-1934" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3958" id="RHSA-2020:3958-1" title="Rhsa-2020:3958-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560395" id="1560395" title="Cve-2018-1283 Httpd: Improper Handling Of Headers In Mod_Session Can Allow A Remote User To Modify Session Data For Cgi Applications" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560399" id="1560399" title="Cve-2018-1303 Httpd: Out Of Bounds Read In Mod_Cache_Socache Can Allow A Remote Attacker To Cause Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560614" id="1560614" title="Cve-2017-15715 Httpd: &lt;Filesmatch&gt; Bypass With A Trailing Newline In The File Name" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1715981" id="1715981" title="Backport Of Sessionexpiryupdateinterval Directive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724879" id="1724879" title="Httpd Terminates All Ssl Connections Using An Abortive Shutdown" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1743959" id="1743959" title="Cve-2019-10098 Httpd: Mod_Rewrite Potential Open Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820761" id="1820761" title="Cve-2020-1927 Httpd: Mod_Rewrite Configurations Vulnerable To Open Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820772" id="1820772" title="Cve-2020-1934 Httpd: Mod_Proxy_Ftp Use Of Uninitialized Value" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3966-1</id><title>Fontforge</title><description>Security Fix(es): 
* fontforge: out-of-bounds write in SFD_GetFontMetaData function in sfd.c (CVE-2020-5395)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="fontforge-devel" release="13.el7" src="fontforge-20120731b-13.el7.src.rpm" version="20120731b"><filename>fontforge-devel-20120731b-13.el7.x86_64.rpm</filename><sum type="sha256">7b9ec8018b910197e8f886af88df0b2f554ea3dc1256fb045988d26ecf3cf335</sum></package><package arch="i686" name="fontforge" release="13.el7" src="fontforge-20120731b-13.el7.src.rpm" version="20120731b"><filename>fontforge-20120731b-13.el7.i686.rpm</filename><sum type="sha256">a14c4929fd088e999f39b9bace435ea660435f83337354d66a2e04821494ae26</sum></package><package arch="i686" name="fontforge-devel" release="13.el7" src="fontforge-20120731b-13.el7.src.rpm" version="20120731b"><filename>fontforge-devel-20120731b-13.el7.i686.rpm</filename><sum type="sha256">27aaa4c8e0346e188923b9e9d9b669f0ef842343dd8d6310cb26558f44b02c9d</sum></package><package arch="x86_64" name="fontforge" release="13.el7" src="fontforge-20120731b-13.el7.src.rpm" version="20120731b"><filename>fontforge-20120731b-13.el7.x86_64.rpm</filename><sum type="sha256">4dac7c8b6ab4a8b661524f83bb7a58b6fc7ae519682c3894f6a99e68d00d0216</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3966" id="RHSA-2020:3966-1" title="Rhsa-2020:3966-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3970-1</id><title>Mod_Auth_Openidc</title><description>Security Fix(es): 
* mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) 
* mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_auth_openidc" release="7.el7" src="mod_auth_openidc-1.8.8-7.el7.src.rpm" version="1.8.8"><filename>mod_auth_openidc-1.8.8-7.el7.x86_64.rpm</filename><sum type="sha256">b2dfaf03eb4ebc8d8caeb9fdc01a93c11fe2539156932b02766d5fee41165193</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14857" id="CVE-2019-14857" title="Cve-2019-14857" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20479" id="CVE-2019-20479" title="Cve-2019-20479" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3970" id="RHSA-2020:3970-1" title="Rhsa-2020:3970-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760613" id="1760613" title="Cve-2019-14857 Mod_Auth_Openidc: Open Redirect In Logout Url When Using Urls With Leading Slashes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1805102" id="1805102" title="Cve-2019-20479 Mod_Auth_Openidc: Open Redirect Issue Exists In Urls With Slash And Backslash" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3971-1</id><title>Hunspell</title><description>Security Fix(es): 
* hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx (CVE-2019-16707)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="hunspell" release="16.el7" src="hunspell-1.3.2-16.el7.src.rpm" version="1.3.2"><filename>hunspell-1.3.2-16.el7.i686.rpm</filename><sum type="sha256">afc57b23bf220b4e0bdc5d47b03385ce3e462b56694d27decf794f344f7fe852</sum></package><package arch="x86_64" name="hunspell-devel" release="16.el7" src="hunspell-1.3.2-16.el7.src.rpm" version="1.3.2"><filename>hunspell-devel-1.3.2-16.el7.x86_64.rpm</filename><sum type="sha256">796a35dc7e3ca03b3989f7a1e31d15e36d0b50988167bc6a6895e8c254c36026</sum></package><package arch="x86_64" name="hunspell" release="16.el7" src="hunspell-1.3.2-16.el7.src.rpm" version="1.3.2"><filename>hunspell-1.3.2-16.el7.x86_64.rpm</filename><sum type="sha256">6ea12e07ba97623a9ed74f099804324f7aba437527c9c04fca59cea7af0fa235</sum></package><package arch="i686" name="hunspell-devel" release="16.el7" src="hunspell-1.3.2-16.el7.src.rpm" version="1.3.2"><filename>hunspell-devel-1.3.2-16.el7.i686.rpm</filename><sum type="sha256">529137a8d24c430049873f23d7e4cf1655cc9392eea9f0dc9a7e57568a0ce0fe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707" id="CVE-2019-16707" title="Cve-2019-16707" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3971" id="RHSA-2020:3971-1" title="Rhsa-2020:3971-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1771026" id="1771026" title="Cve-2019-16707 Hunspell: Out-Of-Bounds Read In Suggestmgr::Leftcommonsubstring In Suggestmgr.Cxx" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3972-1</id><title>Subversion</title><description>Security Fix(es): 
* subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="subversion-javahl" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-javahl-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">9e420241533f135082de5962bcee6e9248e4244dc1d7ae9a6c3d8b5de47fbedb</sum></package><package arch="i686" name="subversion-perl" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-perl-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">88b1c81c21147fd47988ba979e9b71c16d88a7e08a4d7ecba266ca7c87f8c19e</sum></package><package arch="i686" name="subversion-libs" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-libs-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">b60bd800b686799dcfcf3446f081d0e5e965f2ccaf92bca5e1fa8e90081796ab</sum></package><package arch="x86_64" name="subversion-perl" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-perl-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">f5aeb55dca994afb3c1c8bed03eaa09ec1dd5e9980fde2aac4e725355b68fe82</sum></package><package arch="x86_64" name="subversion-kde" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-kde-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">a25ce5dcbb8ab3e39b15ca98efe3c25128f9ba3a548b0c3cebf42e90ebb306dc</sum></package><package arch="x86_64" name="subversion-tools" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-tools-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">118e499f5eede7fd3942d9a36e2fd97e2a875e35ef39140befc2ce03be4b4aa0</sum></package><package arch="x86_64" name="subversion-libs" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-libs-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">010444981277e7d62cc5053a15c43c1f1e79daef3eb85cc36bb0275db8722abf</sum></package><package arch="i686" name="subversion-devel" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-devel-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">9af90c245daa07dcd2f23d63eee1f759e9bdbf90064987861c53ac32171261a5</sum></package><package arch="i686" name="subversion-ruby" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-ruby-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">a9b5a8aa8f74e57105df14e52f258227b83e67c3fa1f2c6732bc4cfa5eb23a2b</sum></package><package arch="x86_64" name="subversion-devel" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-devel-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">ecda44c19b4f383da58b33d7e4fbf4e96c9bb90a2cefde29ec76b83d3d12c142</sum></package><package arch="x86_64" name="subversion-gnome" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-gnome-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">6e4b59df7286843cc7fd87ca04f8d2c7bbc8da3be6d59ea6c9947ac6d17aa7ef</sum></package><package arch="i686" name="subversion-gnome" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-gnome-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">98ce8a27404b1f7097e12536e49cb623f92930957ec02659f5495e581cdea09b</sum></package><package arch="x86_64" name="subversion" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">dc9fa0f11f228fc248be9473998b8736cf3b3f20fe7e04f7a88c34dbee345785</sum></package><package arch="x86_64" name="mod_dav_svn" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>mod_dav_svn-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">475fd383a654fb50705e508b5feaa727f2a2761063bb6715d6296bbdbe8386f3</sum></package><package arch="x86_64" name="subversion-javahl" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-javahl-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">9ad2551310778946957642458a9e7ace2119e53e6266ab9def612fc49c15daa1</sum></package><package arch="i686" name="subversion-kde" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-kde-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">c0dca587c707bef32984b23bcf2fc8ab3b03014223ee41bfe1b519a58be72c37</sum></package><package arch="x86_64" name="subversion-ruby" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-ruby-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">83022b57260bb140ced33314bd05d9276e317c082e214de22c833d4aafbef476</sum></package><package arch="i686" name="subversion" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">9de49ccc1bde5e1743a1b5798adafa97d28a8edb10271d816049f4d7467aee60</sum></package><package arch="x86_64" name="subversion-python" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-python-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">1692e14c1dcbce4ca904c18de551b779e2b8296bc1d0c2ea37007f77e792715f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11782" id="CVE-2018-11782" title="Cve-2018-11782" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3972" id="RHSA-2020:3972-1" title="Rhsa-2020:3972-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733088" id="1733088" title="Cve-2018-11782 Subversion: Remotely Triggerable Dos Vulnerability In Svnserve 'Get-Deleted-Rev'" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3973-1</id><title>Spamassassin</title><description>Security Fix(es): 
* spamassassin: crafted email message can lead to DoS (CVE-2019-12420)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spamassassin" release="6.el7" src="spamassassin-3.4.0-6.el7.src.rpm" version="3.4.0"><filename>spamassassin-3.4.0-6.el7.x86_64.rpm</filename><sum type="sha256">7c97448ab50cb66a231bd9eca82c0ca7abd651266984b18985ccc0ca877d4bb5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12420" id="CVE-2019-12420" title="Cve-2019-12420" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3973" id="RHSA-2020:3973-1" title="Rhsa-2020:3973-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1784984" id="1784984" title="Cve-2019-12420 Spamassassin: Crafted Email Message Can Lead To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3977-1</id><title>Evince And Poppler</title><description>Security Fix(es): 
* poppler: divide-by-zero in function SplashOutputDev::tilingPatternFill in SplashOutputDev.cc (CVE-2019-14494)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="poppler-utils" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-utils-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">5162d9ba3e48d7a413e808bc06676a7edd04bd51a1c8718ea002afdcc9c5c798</sum></package><package arch="i686" name="poppler-qt" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">a8c17f651e4689f51fafcdb24b6ceb6a6667de0ebd2a94a0218f7b41369f8a59</sum></package><package arch="i686" name="evince-libs" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-10.el7.i686.rpm</filename><sum type="sha256">0a7e2afa167ac64174373e2176bd9a5b793164fe600eb087b0d9c135321c0958</sum></package><package arch="x86_64" name="evince-devel" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">440bf76a88b9de54ff33055b838d90ef127bb6f7150c2fed7f779c00671f5c02</sum></package><package arch="x86_64" name="poppler-qt" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">f225514c1b098616e6a2e9fcdfe23dd3c46b3660c74c275f15416b80e0536065</sum></package><package arch="i686" name="poppler-cpp" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">c95bce5df205c729b17580903b5d571758835e9862b07837d7f8ca67d468731e</sum></package><package arch="x86_64" name="evince" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">fa555a23db3376d0c808697903ae356d4e7ebb92c7c80cef1a3c6b0149f885b5</sum></package><package arch="x86_64" name="evince-dvi" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-dvi-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">e4ca88fe129792db68f53c68842f5d3d9a55ec1b0d09855ca5903dc12a943f3e</sum></package><package arch="x86_64" name="poppler" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">cc82fdda6fbfb96c3bc7db238c8f3b6cff6a2c2b2af63d9797cf692e506fac70</sum></package><package arch="x86_64" name="evince-nautilus" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-nautilus-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">2e33b3d8b8615beb10e1b3be97f8e8aed5e025cdae69650c97d718adee365fe1</sum></package><package arch="i686" name="poppler-glib" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">f9ec3cb0a1ccac2b2bf58a1a355fd3e3bce1edbe4b29debc4b63669b9d8b62cf</sum></package><package arch="x86_64" name="poppler-cpp" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">0b13cd58e466f810a4082a1122d708791267c13ec395b5fcf8583998618b0409</sum></package><package arch="x86_64" name="poppler-demos" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-demos-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">1c42f9eb888f94c4ffacc590c35919688fb5252dd826f1b50b12f1c9f3d3aec5</sum></package><package arch="x86_64" name="evince-browser-plugin" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-browser-plugin-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">a2cf943feb5433df74daccf975da5ed1a10066171bef5002af436de390a47ed1</sum></package><package arch="i686" name="poppler-qt-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">21ec1a1e55d461ee50d50e3be096779910d1012137fa812ab5a77c1d3ef58a09</sum></package><package arch="x86_64" name="poppler-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">998e1ecc3582be17d9ffc2ecf64cdbbcfe709fe98be4d7a09e2cff573a8cf5d5</sum></package><package arch="x86_64" name="poppler-glib-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">3e7748820b14fa03f68d8be7b2a762c8f6ee1416eecb7cb605d5b7d568942616</sum></package><package arch="i686" name="poppler-glib-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">a0e5e60efa02d2706115fbac1f6059cb2c1a29f212b3395edea5c07b14b03600</sum></package><package arch="x86_64" name="poppler-qt-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">eb7cdd7ade46da10de65b24fb861a3eb5a7ba70710abb3f21a3e323bd77b92f5</sum></package><package arch="i686" name="poppler-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">884787b7f46a499bbbbe89201d6005b32810ef2823634b16b0a87917af768c1c</sum></package><package arch="x86_64" name="poppler-cpp-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">f08181c4683469e1625abf561ba0bee55295adaf152c5e70d92542b186505178</sum></package><package arch="i686" name="poppler-cpp-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">98d43dff4629260d31e859406a3d58fc1bf6b1c0a8b0783228ac35dc7e6fa6d5</sum></package><package arch="x86_64" name="poppler-glib" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">6bbefede8c6f9015b890a521f75b2023fcca8f7813ee42d67bab970b92b33d9a</sum></package><package arch="i686" name="evince-devel" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-10.el7.i686.rpm</filename><sum type="sha256">3345138d4c12ed09b94b094fb918e0b55a52f3f1b0333e4e49133ae37c267b03</sum></package><package arch="i686" name="poppler" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">c1507b53f3555f5e0a26321678c2ecf72b064ff523d4676ebb7d4e6fb207adbe</sum></package><package arch="x86_64" name="evince-libs" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">2b645c23c0cf4ce5eb5629605682782940d1a7834f2c5e74d337f8476b4d9dbc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494" id="CVE-2019-14494" title="Cve-2019-14494" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3977" id="RHSA-2020:3977-1" title="Rhsa-2020:3977-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610436" id="1610436" title="Gtk-Criticals When Scrolling In Thumbnails Bar In Large File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1797453" id="1797453" title="Cve-2019-14494 Poppler: Divide-By-Zero In Function Splashoutputdev::Tilingpatternfill In Splashoutputdev.Cc" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3978-1</id><title>Glib2 And Ibus</title><description>Security Fix(es): 
* glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress (CVE-2019-12450) 
* ibus: missing authorization allows local attacker to access the input bus of another user (CVE-2019-14822)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glib2" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-2.56.1-7.el7.i686.rpm</filename><sum type="sha256">dba2e320e5d55a1ad320f43b87818ebfb57707a36f883864412a3d912f209b60</sum></package><package arch="i686" name="ibus-devel" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-devel-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">812dcaedfae5eb783659c22b0d53a4b126e48d453893be400e2fdc8e2c7d86f1</sum></package><package arch="noarch" name="ibus-devel-docs" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-devel-docs-1.5.17-11.el7.noarch.rpm</filename><sum type="sha256">7b6aa8682348126008cfe3d621c457cca8f6cf8ecfbb6ee0137c150d2944f8e3</sum></package><package arch="x86_64" name="ibus-gtk3" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-gtk3-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">41f5c91bc15c18f3c58641ebe933f2fb3b513160e03fd114177282b66fe567bf</sum></package><package arch="x86_64" name="glib2" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">0ff883bb12db31cdc019be14bc63bd925868869886903f8c1cafd5dbd0403a40</sum></package><package arch="x86_64" name="ibus-devel" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-devel-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">45e9cf8924dc993d1ba8a39959bc987667bfb0f382a7555a27cf65e60cca809b</sum></package><package arch="x86_64" name="ibus" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">20015550f6cb008cf8669db337f38c6ada4491d8e9f62aa3cac989e61a0b3a5a</sum></package><package arch="i686" name="ibus-gtk3" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-gtk3-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">695bf7fe48bbcecd3729cfb89e33479d474b6eacb99b2a54e6fed35e1cf7a51c</sum></package><package arch="x86_64" name="glib2-tests" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-tests-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">a459c1af581430dec38b93d052b964b787c6ceda9ce5dad4a5c34b5a4fd7b16c</sum></package><package arch="x86_64" name="ibus-libs" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-libs-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">38de27d5c3a5ed14e693230bb049fa34f2d6b680a37fba8174bc49c12fee0dee</sum></package><package arch="x86_64" name="glib2-static" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">0468728a64c29056f6b1aec2bccf23bc0bb28b13f3e5994eb5559b20c631b38d</sum></package><package arch="i686" name="ibus-libs" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-libs-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">20cad8d3bd4754b4af69075d3390e97fa46d7eba49b981cfbc2a16382a80ab8c</sum></package><package arch="i686" name="glib2-static" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-7.el7.i686.rpm</filename><sum type="sha256">a79b0ccbc423cfe1916d291feb7637fb7452295bbb0dfc4332075a701531cc7f</sum></package><package arch="i686" name="ibus-gtk2" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-gtk2-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">e6dd9f1a17f11a3606114286bacfc7739649dd7e5244968f57f00f22c953b13a</sum></package><package arch="noarch" name="glib2-doc" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-doc-2.56.1-7.el7.noarch.rpm</filename><sum type="sha256">b5b8fcfe054e7296605c3716bd48db1d25ecfcb2fe709a40a2d2fd7a1e009e99</sum></package><package arch="i686" name="glib2-devel" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-7.el7.i686.rpm</filename><sum type="sha256">4515cefd9767d0724da9ff92efe8ea4d611fd999428a85d14f586a344e2823ac</sum></package><package arch="noarch" name="ibus-setup" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-setup-1.5.17-11.el7.noarch.rpm</filename><sum type="sha256">37dd4e489a8144e9001f16eddec4a3b4f239902e2405405f0399b1f886cae9f2</sum></package><package arch="x86_64" name="glib2-fam" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-fam-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">979b9d7fc459b432b0a9dbc3439b3e23ec0420784ac5ac11a810fd650ef61c59</sum></package><package arch="noarch" name="ibus-pygtk2" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-pygtk2-1.5.17-11.el7.noarch.rpm</filename><sum type="sha256">ab7a658c8deb5defb98a43fce38cae69bf3d82a183273ad0e0ab2ee448e43e4d</sum></package><package arch="x86_64" name="ibus-gtk2" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-gtk2-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">ad6517fb5ddccc13e3330e7f71d482c3cf70be067a2bb94d0707c12288a6e9ee</sum></package><package arch="x86_64" name="glib2-devel" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">39675b88fa1d10df44a36f4101aa8a02d85ecca4c9e8e9ead12dc14dc7696127</sum></package><package arch="i686" name="ibus" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">1d8930b8c8f78f873d600a6db0d545b567af6da483630e6932cdf5daaa8528a3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12450" id="CVE-2019-12450" title="Cve-2019-12450" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14822" id="CVE-2019-14822" title="Cve-2019-14822" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3978" id="RHSA-2020:3978-1" title="Rhsa-2020:3978-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1717958" id="1717958" title="Cve-2019-14822 Ibus: Missing Authorization Allows Local Attacker To Access The Input Bus Of Another User" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719141" id="1719141" title="Cve-2019-12450 Glib2: File_Copy_Fallback In Gio/Gfile.C In Gnome Glib Does Not Properly Restrict File Permissions While A Copy Operation Is In Progress" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777221" id="1777221" title="Ibus Input Methods Don'T Work In Qt5-Based Applications" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3981-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Crash after failed character conversion at log level 3 or above (CVE-2019-14907)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="samba-common-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">4433702c6f052a4ae01729333ae0306b4a0a9fc8745cc12f64f0460e3a2e07d4</sum></package><package arch="x86_64" name="samba-python-test" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">28b0a289b685cfecb68be9243ec02e94677c4bcfe6e27d2c2e31f2c5a3f4ade7</sum></package><package arch="i686" name="libwbclient" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">da98ab4422063585f85848f30fd290ae964bdb431fca151f47b1087d7a2a8083</sum></package><package arch="i686" name="samba-test-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">d515625d0f8c09eca2cbfad9d2fe34085d260ffa5529e44a766ee10d37b3d374</sum></package><package arch="x86_64" name="samba" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">2d0f9329836d6501a33d207858a79dba6c9bb51c2cebec698cced5b7a8665329</sum></package><package arch="x86_64" name="samba-client-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">27ea67987195d1416452eba0caa1059c7d4f679f5708aee0e822be2d2b8e464b</sum></package><package arch="i686" name="libwbclient-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">cac6d1848308ec6e87b108f86954d24f117d5f9b67e35b399725cadd16c2746d</sum></package><package arch="x86_64" name="samba-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">2a5fe36b5e561d9a3933e52afc3c5313f410a91799e5e782dc88f0c61777bbcf</sum></package><package arch="x86_64" name="samba-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">755f03864afca4db04eb988657f9a59c9b13e797f4bd1e828145b40a90f67649</sum></package><package arch="x86_64" name="samba-python" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">2531e6c7b21b0847d74fe616b02ad83047b6d4a19853687bf3fedb7c4ae9b7f2</sum></package><package arch="x86_64" name="samba-common-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">394731b92d6a154d4b35575c8cb3e1ec5af3766b2dfe187c5b68336ea0760403</sum></package><package arch="x86_64" name="samba-test-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">9b3c4550839b8993121aaddb28673d70922426420c4f7882f5438cdc278504e3</sum></package><package arch="x86_64" name="libwbclient" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">77934186de7c38d772ad4dad60a9118a7e312029b7d4745dddf51edef7e8304e</sum></package><package arch="x86_64" name="samba-winbind" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">d10108b8d29238429076cb308300d86143b050275725a90c75e691821fe6d61f</sum></package><package arch="x86_64" name="ctdb-tests" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">76667b5388a6e6d18f1cd220537952b9072e46ca84af15ffefa2f6c34222198e</sum></package><package arch="x86_64" name="samba-dc-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">4d78134794aa567ff154ed2cd401e57dbb43ef5a96b594a866078b5c33c7e5d2</sum></package><package arch="i686" name="samba-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">9187e1b0d2c719896e3c670ef35c4bea2620564afc04f06b0be2f4117f43979c</sum></package><package arch="noarch" name="samba-common" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-5.el7.noarch.rpm</filename><sum type="sha256">0bb6a7568e891375b42e986ddfb2cd3787b195493f6f0472625e23dfb4955547</sum></package><package arch="i686" name="libsmbclient-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">e608f00a87f8efa20d4ebc5c97215c826d5c0285225b6275e70e5aa174c7d3d7</sum></package><package arch="x86_64" name="samba-common-tools" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">fda2273d80424a0add92b6556aaa18126dcfc4c862895da5d7270363c4ed3508</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">49437a5b961425beb47e7ddcb95eb1d288e0886860dbee4c9e7f1f6c99c1af2c</sum></package><package arch="x86_64" name="libsmbclient" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">316ffb4dadc05783a92dbf777eb9499c65f2aae8b091f180042d6d6908586e1f</sum></package><package arch="x86_64" name="libwbclient-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">c4401295f9bb51233356788c096d7968feb8ba4534ded907333131bcc8829d75</sum></package><package arch="x86_64" name="samba-winbind-clients" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">e75a6bc5aa24e0d8fc5c80c4ffb6f2e67e4e96e7f07df02f3f2ebca35d1b6430</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">ea4b5610a8d66487502c65043cbc2a7836d40263913e72291190b3539717c189</sum></package><package arch="i686" name="samba-python" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">8f11ef77cd00e75ed47dd73d6bb19576e67b818c522d07efbb5fc8fa2253583b</sum></package><package arch="i686" name="samba-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">700ae8bf484c06b74d108510e2a82a32e90a0de557f8d94ea666b4eee6e67723</sum></package><package arch="i686" name="samba-winbind-modules" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">27a8c897c14b2e00d268fb5703740c69c62c9dc432c0396268263ac65bf273db</sum></package><package arch="noarch" name="samba-pidl" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-5.el7.noarch.rpm</filename><sum type="sha256">5a79235d44f7c7c04080d3bf7115a934667640dbc373f7d51c355304d455263f</sum></package><package arch="x86_64" name="ctdb" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">da610c0aed36bca99b74785ef1b508b6478783e9b5efed71d4091e158f0f4e08</sum></package><package arch="x86_64" name="samba-client" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">64fe5f9f2b705c3f9af0515f1f23b948cfd585fc22f9f1eec4d4dc6afb25bdf4</sum></package><package arch="x86_64" name="libsmbclient-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">6ebf1d08b95fd3d6418d3e6c08ad864bcfca13a752788137372b60c4097747a1</sum></package><package arch="x86_64" name="samba-test" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">8d935b4bad0b99403e1513c347030460ca8502789c64ec540209a6ccc762a857</sum></package><package arch="i686" name="samba-client-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">549d6cb0c8c952851323e8b9af03bd8ef0eb7838bda43f0d31b9a9391a34e44c</sum></package><package arch="x86_64" name="samba-winbind-modules" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">10a914e3a55da8ccd70a14ef850e825b07f4afd8ee8df5afc16c28ac81964b2b</sum></package><package arch="x86_64" name="samba-krb5-printing" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">abc9b834724eaf486d251e83f7c794f6061a25d98223568c80f43b34825eaba2</sum></package><package arch="i686" name="libsmbclient" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">09736a08fbf93986ac6f3e134ce18c0cd85f936c93ad64c8739f58791a337655</sum></package><package arch="x86_64" name="samba-dc" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">427ba84be0d94ba9ecdee57d4427880f0a99bcc12b60e3af8b079de0229b97cf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907" id="CVE-2019-14907" title="Cve-2019-14907" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3981" id="RHSA-2020:3981-1" title="Rhsa-2020:3981-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737888" id="1737888" title="Libwbclient Alternatives Manual Setting Lost" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1776333" id="1776333" title="Cli Tools Printing &quot;Unable To Initialize Messaging Context&quot; Running As Non Root" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1785121" id="1785121" title="Rebase Samba To The The Latest 4.10.X Maintenance Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791207" id="1791207" title="Cve-2019-14907 Samba: Crash After Failed Character Conversion At Log Level 3 Or Above" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791823" id="1791823" title="Wbinfo -K Doesn'T Work For Users Of Trusted Domains/Forests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801496" id="1801496" title="Missing Directories In Ctdb Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1813017" id="1813017" title="Can'T Get 'Log Events Generated From Smbclient'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828354" id="1828354" title="After Adding &quot;Additional Dns Hostname&quot; To Smb.Conf It Does Not Generate /Etc/Krb5.Keytab With The Proper Spn." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828924" id="1828924" title="Fix 'Require_Membership_Of' Documentation In Pam_Winbind Manpages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1831986" id="1831986" title="Unprivileged User Should Be Able To Read-Only To Gencache.Tdb Instead Of Permission Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836427" id="1836427" title="Net Ads Join Use Of Netbios+Realm Breaks Gssapi Authentication" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3984-1</id><title>Freeradius</title><description>Security Fix(es): 
* freeradius: privilege escalation due to insecure logrotate configuration (CVE-2019-10143) 
* freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations (CVE-2019-13456) 
* freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access (CVE-2019-17185)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freeradius-utils" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-utils-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">7feb6de238043e6a856a4acd13d187da88ddcc7daf10c7edf6fdf56d3f772801</sum></package><package arch="i686" name="freeradius-devel" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-devel-3.0.13-15.el7.i686.rpm</filename><sum type="sha256">7f9fdea8d5855592486268c8928b6e86fd429c1ff032fe7ca7ec7bf331764d99</sum></package><package arch="x86_64" name="freeradius-krb5" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-krb5-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">36e5b67458d1eb68da1cf45283b6ee493d07c02d17e325850fd91422b7fa5df6</sum></package><package arch="x86_64" name="freeradius-mysql" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-mysql-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">e1d08544abe854a451e745b5dff2d021dc8e13d4c63779359a2c5683d723d185</sum></package><package arch="x86_64" name="freeradius-sqlite" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-sqlite-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">97ab8cff5c543c2eb68fa0d3026c3855c41a1544f4c3f5d1a97236ad42ea3063</sum></package><package arch="x86_64" name="freeradius-doc" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-doc-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">cc604a6ba3277d8d609250a753ba807a3bc957261def0a8ac69d8ceadf003233</sum></package><package arch="x86_64" name="freeradius-devel" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-devel-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">d3f5c2720d685b00d53fbc6d856688947a97acf0bd2303dd28af9a4ca743915f</sum></package><package arch="x86_64" name="freeradius-ldap" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-ldap-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">241fa7606c84c8c850441e373ca5d420ba8c8a41cec600cb22b8189e3b29e9e2</sum></package><package arch="x86_64" name="freeradius-postgresql" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-postgresql-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">2d35bc7bd5d9dd205085a5660dac86558ffabe9b27e5dc73ddcf4c5d09a068e2</sum></package><package arch="x86_64" name="freeradius-python" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-python-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">9f531af4b5d5a6c0fd6b862c87c9e70b644a7e88982c198d22f0f734b2d67e90</sum></package><package arch="x86_64" name="freeradius-unixODBC" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-unixODBC-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">86213d9fbd06e0cb48446face4377f73a241ab26ab752c0eb0e4f1dead64c501</sum></package><package arch="x86_64" name="freeradius" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">ccb6b87a403cc6d513fde29a3a5e6b2581551fddca847ce28ed70c8f475f4e21</sum></package><package arch="x86_64" name="freeradius-perl" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-perl-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">1ebb1fc819a326b63e0c7c84362ca01be3ba1de6917770d5d4d3b603b861d939</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10143" id="CVE-2019-10143" title="Cve-2019-10143" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13456" id="CVE-2019-13456" title="Cve-2019-13456" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17185" id="CVE-2019-17185" title="Cve-2019-17185" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3984" id="RHSA-2020:3984-1" title="Rhsa-2020:3984-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1592741" id="1592741" title="Freeradius Paircompare With Attribute References And Expansions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1630684" id="1630684" title="Correct Receiving Of Multiple Radius Packets Through Radsec By Freeradius" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677435" id="1677435" title="Freeradius Logs Cleartext Pap Passwords On Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705340" id="1705340" title="Cve-2019-10143 Freeradius: Privilege Escalation Due To Insecure Logrotate Configuration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737663" id="1737663" title="Cve-2019-13456 Freeradius: Eap-Pwd: Information Leak Due To Aborting When Needing More Than 10 Iterations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816680" id="1816680" title="Cve-2019-17185 Freeradius: Eap-Pwd: Dos Issues Due To Multithreaded Bn_Ctx Access" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3996-1</id><title>Libxml2</title><description>Security Fix(es): 
* libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c (CVE-2019-19956) 
* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388) 
* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libxml2-devel" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7.5.x86_64.rpm</filename><sum type="sha256">dbd4aa5cee7ef698a5a3e1668fe4a585f4ae31d42e63ea585f4c75b11978f93c</sum></package><package arch="x86_64" name="libxml2-python" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-python-2.9.1-6.el7.5.x86_64.rpm</filename><sum type="sha256">3b7c67f100e199f2efbeb212e280843a651365b6b0f3b474bfbcf08ac5838cc6</sum></package><package arch="i686" name="libxml2-devel" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7.5.i686.rpm</filename><sum type="sha256">68c1d8263bbd70e213a086a81c0773024a80a6d62ff489ec90711af32e953d5c</sum></package><package arch="x86_64" name="libxml2-static" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7.5.x86_64.rpm</filename><sum type="sha256">ae33ed58034989dbd2a87fb25d809eaf1cfcbbc2dbd19ad12874d4ccde897279</sum></package><package arch="i686" name="libxml2" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7.5.i686.rpm</filename><sum type="sha256">4ee258fe6435d7b424f6f81240b50508424eee0c11e160d80bd5c470f4e45447</sum></package><package arch="x86_64" name="libxml2" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7.5.x86_64.rpm</filename><sum type="sha256">6419297e1d1a20ae43bff5d8f1dfaa1d30d53c0204a64ca3a74a748e4cdea048</sum></package><package arch="i686" name="libxml2-static" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7.5.i686.rpm</filename><sum type="sha256">4744bc51e5511cfc541b88fbb5e944b1739235a38dcc568fe434f91836b35254</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956" id="CVE-2019-19956" title="Cve-2019-19956" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388" id="CVE-2019-20388" title="Cve-2019-20388" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595" id="CVE-2020-7595" title="Cve-2020-7595" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3996" id="RHSA-2020:3996-1" title="Rhsa-2020:3996-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788856" id="1788856" title="Cve-2019-19956 Libxml2: Memory Leak In Xmlparsebalancedchunkmemoryrecover In Parser.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1799734" id="1799734" title="Cve-2019-20388 Libxml2: Memory Leak In Xmlschemaprerun In Xmlschemas.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1799786" id="1799786" title="Cve-2020-7595 Libxml2: Infinite Loop In Xmlstringlendecodeentities In Some End-Of-File Situations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812145" id="1812145" title="Xsd Validation Fails On Xsd:Any" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4000-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) 
* libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-docs" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">b75211ad700f417723012281893e8d8bd9c1b4bca51c6eddbd5122dbaa70d7af</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">496b33c1674c7ae7250cf1896790b186852808bfb5ce0b5cb0ebd6502db4d2ad</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">eb4f8a8f50f1f87916e682635898d022659327f8e0bc753a1f682db73724e04d</sum></package><package arch="x86_64" name="libvirt" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">4342f4ce8801b71d719cb361a768ef40b011b82bc55713242a8f5f98381a9412</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">a1ab324cbba9b45adab889d9bc0da6adc0cb3dac91829340eeaca9f68efae820</sum></package><package arch="i686" name="libvirt-client" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7.i686.rpm</filename><sum type="sha256">b46fd5042892e80519b7c053ceddce9a86285fa457dbef04a488faf7f3d581c4</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">10fc3288e9a96eacf3f4116723e2be911e3765435d73b5e56857bb485027b4d2</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">1b5411200b747f1620b6cab3063b7777811e634c0aa7df00a3a52b0e98bd7786</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">cf6db16e8ffb5da193690a51de76299f497b352a69a111598d08d817e186f6b8</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">df3f5f92f589c68eabdf536a9095a236e1e7ff95cd8086ae6517fb38312d75b5</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">4a6fde25b076d001a9ae766ecac2c04dd73d44b5ba039d9685c5669c6bf4e3a8</sum></package><package arch="x86_64" name="libvirt-libs" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">d92cf06a7b04a889cb9be5df7b18bae2e37a213b974063de5aa00e0212f10755</sum></package><package arch="x86_64" name="libvirt-daemon" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">b82da992e57525d2255417023bf2ba09cac822aa28461efe2ceb3f170b165bd4</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">1255e9ff441baa64e74254dab8954eb79ceace3f6e2999c4a08b8996afa69d52</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">619d7b207f4b55ef16b0f64822d35693c75f360b0ddbd10b89f4dfa9261e4fb1</sum></package><package arch="x86_64" name="libvirt-nss" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">edbda8b07b56058e5ff680499db324dc4858a4e18e6bbd5ff92a085f743a9cb2</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">fabd0fd7b11570e88a0651b0ba7c04e719fc67670dcbf0c9e87c81483ceec4f6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">f724365cea637756505ba19938ac48245a4ee35ddda05a5996659ebc254b3906</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">ebf986dc9d961bfaecc99b37ac73f25afdce9daed4d6e60ee8400a0169fb083b</sum></package><package arch="x86_64" name="libvirt-devel" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">bc04447756d3ce6c7bcbf9c0db4e09f5121bf85d7ab746fca00136fa1c3e75d0</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">05ea88240cc245c611a7be42e4247d4f181368e11b1abbe8289d3e02d69bec86</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">0aefc155c8423513f987338b7bfd66ab6e9280c70245c9bc5700943567c5311b</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">cb6833f1004de879a3ad8ceb3596ab1f70b78685958eeefd071af805d9823528</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">1aaef4e813e2102b8ff4734389c3548a1a23ebd6b9ff972379c00dc6272d3121</sum></package><package arch="i686" name="libvirt-devel" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7.i686.rpm</filename><sum type="sha256">57b2ba8114fe9f847896c89d0a3562a9fe21b6c01f6854326e6f621fe609fa9f</sum></package><package arch="x86_64" name="libvirt-bash-completion" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">81e67fa91a548e0c1a774884121f9d59f70b38694aa8ad2c00693437eb102c36</sum></package><package arch="x86_64" name="libvirt-login-shell" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">622d332a0ca7e642e1c368f483b2b44b3dcfca419547d115b9981ddeba6a3034</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">b16fb2a5b53721064432a56b0723b4a575418b557008673f5847ad9513e6147a</sum></package><package arch="x86_64" name="libvirt-admin" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">86c39d819469ad10d482b6c5c7c4c9cd12fd067c0685607a5079889da6a4dcde</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">ebfaef3eb423b6fd65bc0451c87251349a9c5c155a2a005753f9392dc58d4527</sum></package><package arch="x86_64" name="libvirt-client" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">0c2ace1e8529336b50bd710718ffed9d99f3f29f550b979d1a9459cbaaa7a076</sum></package><package arch="i686" name="libvirt-libs" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7.i686.rpm</filename><sum type="sha256">173d7168ddccdf15adb81421561edafc9420d14d80e8ff1e134c96505def39ea</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">64e0243d6afed485d0dbf416f1d194a39b0e603faad5d17226d1c36502274483</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">d02123c8e6fd6b554fe1d1302665ea5db756df3c45e92ee732506473e04c350c</sum></package><package arch="i686" name="libvirt-nss" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7.i686.rpm</filename><sum type="sha256">a53f754c6285352146827f07575ec836229172d7798e6a8625bcf351dfd41346</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485" id="CVE-2019-20485" title="Cve-2019-20485" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703" id="CVE-2020-10703" title="Cve-2020-10703" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4000" id="RHSA-2020:4000-1" title="Rhsa-2020:4000-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1809740" id="1809740" title="Cve-2019-20485 Libvirt: Potential Dos By Holding A Monitor Job While Querying Qemu Guest-Agent" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815269" id="1815269" title="Migration Failing Due To &quot;Internal Error: Missing Essential Config Entry 'Ide0:0.Filename'&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815572" id="1815572" title="Vm Live Migration Fails: The Cpu Is Incompatible With Host Cpu: Host Cpu Does Not Provide Required Fea-Tures: Virt-Ssbd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816650" id="1816650" title="Cve-2020-10703 Libvirt: Potential Denial Of Service Via Active Pool Without Target Path" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1823976" id="1823976" title="Libdevmapper Fails With &quot;Device %S Not Found&quot; When Calling Dm_Task_Set_Name()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4001-1</id><title>Bluez</title><description>Security Fix(es): 
* bluez: Improper access control in subsystem could result in privilege escalation and DoS (CVE-2020-0556)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bluez" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">2a7c532d13084cce124cb6ca75c9bfab50395636149fe3faffbac839edd8d126</sum></package><package arch="i686" name="bluez-libs" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-libs-5.44-7.el7.i686.rpm</filename><sum type="sha256">3406c53e60fb9f5dbf082ff4d9c0ffdfa71dd89b9cae3f261acf7d75454bf46f</sum></package><package arch="x86_64" name="bluez-libs-devel" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-libs-devel-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">5d132f663f3e29b196ff3ea530085cddd445277a12db52ec2ecf37cbdadc2323</sum></package><package arch="x86_64" name="bluez-cups" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-cups-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">003193f244334d2b54bb844572e00673a3bd5c044690b9faa773ea02a1910e70</sum></package><package arch="x86_64" name="bluez-libs" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-libs-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">d8c30dad8d8ae6b79e21029a8fd77046b07ed9778d53fc3a37779105b72abd23</sum></package><package arch="i686" name="bluez-libs-devel" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-libs-devel-5.44-7.el7.i686.rpm</filename><sum type="sha256">e5f47dc7d3a2f07c9caf704265d08e9f97c4f726f6d37a911f84af63e16ba245</sum></package><package arch="x86_64" name="bluez-hid2hci" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-hid2hci-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">b038da1fc353e81a1f64eecd80292e975ee1b92b81b131dd6c2b702440ad77fc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0556" id="CVE-2020-0556" title="Cve-2020-0556" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4001" id="RHSA-2020:4001-1" title="Rhsa-2020:4001-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1814293" id="1814293" title="Cve-2020-0556 Bluez: Improper Access Control In Subsystem Could Result In Privilege Escalation And Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4003-1</id><title>Networkmanager</title><description>Security Fix(es): 
* NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults (CVE-2020-10754)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="NetworkManager-adsl" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-adsl-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">d8edc78e849570ddf8483a19e266d9ed2d49bd641169a61347a6295806547d35</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wwan" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-wwan-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">48b053252567a61b402d37447475ccdd941547bf6609c59834a7a1b9646bd49a</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm-devel" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-libnm-devel-1.18.8-1.el7.i686.rpm</filename><sum type="sha256">f76699181515b748d9ce1e6a2e51cad62386648cd42d38b99db74f6101ee784e</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-bluetooth" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-bluetooth-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">4b39ed1225bc8c51480e223d07d307b0d660b3a1348c9e1886d4551229489650</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-libnm-1.18.8-1.el7.i686.rpm</filename><sum type="sha256">a62d19861728a2bbba0edfee065cc23d686ec219d7c8c24b67d86de1621adda0</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-ppp" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-ppp-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">e04b4f1b6c062f4c1064c8152741163efc7a639d5ac97defe01a61c225cef30d</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm-devel" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-libnm-devel-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">5d448ac10548d0cf49cfb5d3afd192d8a291290a22ae6bfebfd9af103c8b1ec0</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib-devel" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-glib-devel-1.18.8-1.el7.i686.rpm</filename><sum type="sha256">838864e66ccb3d6748ed29a152edc3622d8df575bb758969844cbb9201b69c71</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-glib-1.18.8-1.el7.i686.rpm</filename><sum type="sha256">a70a5fe1268909f14a63b9b0b274d7afb27d3e3226b599559a43e3e6c96bb4bf</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-ovs" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-ovs-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">e3d25fd1863714afe048ae512a5f3d491855dcf576dddcd866c25b8dd5e948ad</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-tui" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-tui-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">4701a45225590b1ad266b502a1859c45778bbfb37ed1aabc3232e69932efda0c</sum></package><package arch="x86_64" epoch="1" name="NetworkManager" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">b4ea7cbe44f9840b2cb3c99d1b5755b66ebd88b00a5d564bea3fdf7687cce507</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-glib" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-glib-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">ba74547a0dc95c5498de4f462614d8577c146af750168d73c9ff9312279682e1</sum></package><package arch="noarch" epoch="1" name="NetworkManager-config-server" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-config-server-1.18.8-1.el7.noarch.rpm</filename><sum type="sha256">48f0bc72be92efa7e80d6413d11bf39dfd7eec528472645aa2b97218b8da2ddd</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-libnm-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">9ff9cf68ba518cd85ee7a94539e2d28009e54054bbaee86e70a8e98430730f55</sum></package><package arch="noarch" epoch="1" name="NetworkManager-dispatcher-routing-rules" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-dispatcher-routing-rules-1.18.8-1.el7.noarch.rpm</filename><sum type="sha256">3b73fb6eb579b58910848316231944d75274b0dbc65baae675b1078905a75146</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-team" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-team-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">d09b654320de212d3356a7f307c774205a444aac01063db4d51b05756153a5b2</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-glib-devel" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-glib-devel-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">89fc41bf847a9f71ed1b3ca0d307466ebc9c842b4d5335f06ae129ffd9af6c22</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wifi" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-wifi-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">4f9a5bb6f3580553d4058916e93753fcda252e7d2e47188b5067053ddd46d5ad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10754" id="CVE-2020-10754" title="Cve-2020-10754" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4003" id="RHSA-2020:4003-1" title="Rhsa-2020:4003-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1706646" id="1706646" title="The Network Target Is Reached Before Ipv6 Adresses Are Assigned" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737774" id="1737774" title="[Abrt] [Faf] Networkmanager: Raise(): /Usr/Sbin/Networkmanager Killed By 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758550" id="1758550" title="Conditional Statements From Dhclient.Conf Not Merged" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765566" id="1765566" title="Bringing Up One Slave Of Team0 Also Brings Up Team1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1785039" id="1785039" title="Nmcli Command To Add Ipv4.Gateway Does Not Work When Defroute=No And Throws No Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1797915" id="1797915" title="[Abrt] [Faf] G_Ascii_Strtoll() For &quot;10&quot; Failed With Errno=11 (Resource Temporarily Unavailable)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1832170" id="1832170" title="Cannot Bring Up Ip6Gre Tunnel Connection Via Networkmanager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1841041" id="1841041" title="Cve-2020-10754 Networkmanager: User Configuration Not Honoured Leaving The Connection Unauthenticated Via Insecure Defaults" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4004-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS (CVE-2020-13935) 
* tomcat: session fixation when using FORM authentication (CVE-2019-17563)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-webapps" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">87b3d642e61504e29155413564fec0b52d5f57b09c4db068f9a05e959791dc23</sum></package><package arch="noarch" name="tomcat-jsvc" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">51964b41102672ad9252b5e716670cd72fc295b594df3ce2ba17bee8837dde96</sum></package><package arch="noarch" name="tomcat" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">d8b7d8cecb0cdb9287b65b2266c0e626574b30948b4524c1c0774dbd8b725cbf</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">a692cdb3a57907beef6d8360fea12e0c84d8312c78ec7e5573d4359a0efaa409</sum></package><package arch="noarch" name="tomcat-javadoc" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">eed676b99abdbd7b5b4ed025138ebdb94f103951a7eabb7be5d23fcf916426fb</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">b81c410e21ecb8ebed71b452ff00698b3982880affcce2fe6c1bdbe42b658ef2</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">fc0d17a16d3d5df3fb42abf3c476dbaf7fb20aa0e20927da2e86afb328c0e628</sum></package><package arch="noarch" name="tomcat-lib" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">3b5ab3dcdf94abfb690066f4414f22d0cba6854807f38a44b0338f577c10ed8b</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">25a9e1fa67fde116785c962eb8a75cf960a3c8c7b09eed7fac582a45397ad602</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">2d42ec82abd43740e643aae0207161557c27d966214830b0f646cccf4c351e4b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563" id="CVE-2019-17563" title="Cve-2019-17563" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935" id="CVE-2020-13935" title="Cve-2020-13935" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4004" id="RHSA-2020:4004-1" title="Rhsa-2020:4004-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1523112" id="1523112" title="Tomcat Systemd Does Not Cope With - In Service Names." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1629162" id="1629162" title="Tomcat-Dbcp.Jar Is Missing From Tomcat Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1785711" id="1785711" title="Cve-2019-17563 Tomcat: Session Fixation When Using Form Authentication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795645" id="1795645" title="Connection Leak With Statementcache, Slowqueryreport Or Statementdecoratorinterceptor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1822453" id="1822453" title="Tomcat Parses A Request Having An Absolute Uri Path Incorrectly And Returns 404 Not Found After Bz#1455483" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1831127" id="1831127" title="Failed To Install Ipa-Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1857024" id="1857024" title="Cve-2020-13935 Tomcat: Multiple Requests With Invalid Payload Length In A Websocket Frame Could Lead To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4005-1</id><title>Libxslt</title><description>Security Fix(es): 
* libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL (CVE-2019-11068) 
* libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure (CVE-2019-18197)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libxslt-python" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-python-1.1.28-6.el7.x86_64.rpm</filename><sum type="sha256">1b508ab0ac76456f425eebc50523e8af8f3799a0248bbda6d3f9a5e66102f9e8</sum></package><package arch="x86_64" name="libxslt-devel" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-devel-1.1.28-6.el7.x86_64.rpm</filename><sum type="sha256">26426b49f1bf78eefb3c7661f6a3b8ccabf421518246e57c4a0bbc79ac2ff70e</sum></package><package arch="i686" name="libxslt" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-1.1.28-6.el7.i686.rpm</filename><sum type="sha256">bacab1d3c17759b7844f6aa146f9fd71ed0a261dd7ab1842f660dfe9a5c160a9</sum></package><package arch="i686" name="libxslt-devel" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-devel-1.1.28-6.el7.i686.rpm</filename><sum type="sha256">c33a3d94a13b4f48be72e87c0e1cae7ee5fef991741568d1fe9dfd3f191aba66</sum></package><package arch="x86_64" name="libxslt" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-1.1.28-6.el7.x86_64.rpm</filename><sum type="sha256">2cb886c9aec87e6ce4f173be84e20243e3118e9d078d9f13a2e75f69746c3d37</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068" id="CVE-2019-11068" title="Cve-2019-11068" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4005" id="RHSA-2020:4005-1" title="Rhsa-2020:4005-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709697" id="1709697" title="Cve-2019-11068 Libxslt: Xsltcheckread And Xsltcheckwrite Routines Security Bypass By Crafted Url" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1770768" id="1770768" title="Cve-2019-18197 Libxslt: Use After Free In Xsltcopytext In Transform.C Could Lead To Information Disclosure" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4007-1</id><title>Systemd</title><description>Security Fix(es): 
* systemd: memory leak in button_open() in login/logind-button.c when udev events are received (CVE-2019-20386)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="systemd-devel" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-devel-219-78.el7.x86_64.rpm</filename><sum type="sha256">9e4a239151efd3c119dc72374bbcf566492374dd93db1a5af3ad4d91b015305a</sum></package><package arch="x86_64" name="libgudev1-devel" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>libgudev1-devel-219-78.el7.x86_64.rpm</filename><sum type="sha256">86cd6d60f6ba9d20d5a3bc76e1a44c2f870ed91756ee13046686061ae716123a</sum></package><package arch="x86_64" name="libgudev1" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>libgudev1-219-78.el7.x86_64.rpm</filename><sum type="sha256">1634fa6c32fef933648f5e283b236bbd9b98e8d54c81d804dec589c8cf92afbb</sum></package><package arch="x86_64" name="systemd-networkd" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-networkd-219-78.el7.x86_64.rpm</filename><sum type="sha256">d6e8711e69c48b45fa944c006c4cb2be87314b42a389e4a2dd2b4610f42a42c1</sum></package><package arch="i686" name="systemd-devel" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-devel-219-78.el7.i686.rpm</filename><sum type="sha256">29308d4b3f7d40d0e03caf50269889c3b92646b1c8c7cfbabf5f30b8cc05059b</sum></package><package arch="x86_64" name="systemd-python" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-python-219-78.el7.x86_64.rpm</filename><sum type="sha256">92761bffa75a36304ecc817ce59ffbf6689d078de7445ba5880e023f6ec0eb82</sum></package><package arch="i686" name="libgudev1" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>libgudev1-219-78.el7.i686.rpm</filename><sum type="sha256">69adfbad6505778b4334a38e21414471b3d0f94635f27c359943158dc4672df2</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-journal-gateway-219-78.el7.x86_64.rpm</filename><sum type="sha256">1185a7c7fd7c2849afe7db2bddd6830eba1cc4fab57cfd019d99ef20d0c9be7e</sum></package><package arch="i686" name="systemd-libs" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-libs-219-78.el7.i686.rpm</filename><sum type="sha256">2259559df5e82f98bf8479428bd2322a64f5daf38e8eaf06456b3f44a52c684c</sum></package><package arch="x86_64" name="systemd" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-219-78.el7.x86_64.rpm</filename><sum type="sha256">822e1c3f53cb29006bd164865d072215423d8b50dca9c62147ed26a76a9c30b0</sum></package><package arch="i686" name="systemd-resolved" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-resolved-219-78.el7.i686.rpm</filename><sum type="sha256">07f83bd725e762217e0a6feaa74d8281b88f4fec6b86de401bbc13a40f82554d</sum></package><package arch="x86_64" name="systemd-resolved" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-resolved-219-78.el7.x86_64.rpm</filename><sum type="sha256">a6af5a300b787c0b0e20defce0ff772e2f4c1b1872aa34557c7096dbb436a4ee</sum></package><package arch="x86_64" name="systemd-sysv" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-sysv-219-78.el7.x86_64.rpm</filename><sum type="sha256">a33a30d06e5107808e2ea9d21e6b3a7315d68327c4d5557b45ebddab6c0552e9</sum></package><package arch="x86_64" name="systemd-libs" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-libs-219-78.el7.x86_64.rpm</filename><sum type="sha256">fe5ac8fb977e4d3d7f8a80bb4dacdd1792bb6af5e6344de73326cc46af45d2ad</sum></package><package arch="i686" name="libgudev1-devel" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>libgudev1-devel-219-78.el7.i686.rpm</filename><sum type="sha256">bba990c649a32557f5e0e2b704752c33c6f8669613635fdc2317238808e0f19e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386" id="CVE-2019-20386" title="Cve-2019-20386" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4007" id="RHSA-2020:4007-1" title="Rhsa-2020:4007-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244691" id="1244691" title="Systemd Journal Remote Service Does Not Work When Multiple Virtual Machines Send Logs Via Journal Upload Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1679934" id="1679934" title="Spurious &quot;Failed To Propagate Agent Release Message&quot; Messages On Shutdown" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1689344" id="1689344" title="Please Add Kptr_Restrict=1 To /Usr/Lib/Sysctl.Conf/50-Default.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1693374" id="1693374" title="Using Quotas On Iscsi-Hosed Filesystems Causes Systemd &quot;Ordering Cycle&quot; Resulting In Random Services Not Starting On Boot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757704" id="1757704" title="Restarting Systemd-Journald To Load New Configurations Causes Other Daemons Stop Working" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766477" id="1766477" title="Systemd Does Not Attempt To Kill Child Processes If Execstoppost Is Set" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769923" id="1769923" title="Timer: Don'T Use Persistent File Timestamps From The Future" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769928" id="1769928" title="Systemd Leaks Memory (In Dbus) And Spends Its Time Sending Propertieschanged Notifications" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1770158" id="1770158" title="Sd-Bus: Bump Message Queue Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775291" id="1775291" title="Services With Restart=Always Fail To Restart When It Has A Dependent Service With Stopwhenunneeded=True" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1793979" id="1793979" title="Cve-2019-20386 Systemd: Memory Leak In Button_Open() In Login/Logind-Button.C When Udev Events Are Received" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1804757" id="1804757" title="Mount Units End Up In Erroneous State (Not-Found Active Mounted) After Daemon Reload" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1809053" id="1809053" title="[Azure][Rhel7.6]Inconsistent Creation Of Symlinks In /Dev/Disk/By-Path In Azure Vms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812889" id="1812889" title="Lazy Setup Of Inotify_Fd In Sd-Journal May Cause Clients To Leak File Descriptors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1814028" id="1814028" title="Veritas Netbackup Engineering Would Like An Official Rhel Method To Create /Etc/Udev/Rules.D/60-Persistent-Tape.Rules" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817576" id="1817576" title="Backport Systemd Collectmode For Runc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828953" id="1828953" title="Systemd Segfaults Reloading While Serializing A Service Executing A Execstartpost Command [Rhel-7.7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829754" id="1829754" title="Systemctl Try-Restart Command Hangs Indefinitely While Being Executed During A Yum Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1832816" id="1832816" title="[Azure][Rhel-7.9]Error In `/Usr/Lib/Systemd/Systemd-Udevd': Double Free Or Corruption" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4011-1</id><title>E2Fsprogs</title><description>Security Fix(es): 
* e2fsprogs: Crafted ext4 partition leads to out-of-bounds write (CVE-2019-5094) 
* e2fsprogs: Out-of-bounds write in e2fsck/rehash.c (CVE-2019-5188)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="e2fsprogs-static" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-static-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">b13acf7be6e3ee574a91e839289b6abbd0d3e894897a67112e536a4d4ca5ed7e</sum></package><package arch="x86_64" name="libss" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libss-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">0571c9cc209e9dc2c5cbb4d69ea350677fa0b7d5758bac2c4b3c693778651880</sum></package><package arch="i686" name="libcom_err-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libcom_err-devel-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">29c3c0d7965321619ca46b50c43c315967302ff0e4dfa216436d97320a007a21</sum></package><package arch="i686" name="libss" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libss-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">3448fac475a69c773ccc6478561f3ace4bc763c52ba1440ab47fe5ce0ec189c6</sum></package><package arch="x86_64" name="e2fsprogs-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-devel-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">b989e45b8d91ded5ca37d0b2e45b2276b3de9443b5cb4cb4ded10449654f7753</sum></package><package arch="x86_64" name="e2fsprogs" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">35e5efa68a1b9e729d60d7300338bb55c88fab016e42eaabc942645b43dcfb23</sum></package><package arch="i686" name="e2fsprogs-libs" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-libs-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">c79875b56cbaaa387b7f382ffa802bef9d1aa507b32d1925dd846958720b996b</sum></package><package arch="x86_64" name="libss-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libss-devel-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">adbf8a194351a859e578994d45cb4f40e5d876a0642659f1c6c4246ba0c972da</sum></package><package arch="i686" name="e2fsprogs-static" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-static-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">c019fa9a7fcc4264ed62c4664e5d613f74696bcccf11227dabc2027590697bd4</sum></package><package arch="x86_64" name="libcom_err" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libcom_err-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">643d68b3898aae12e14d804f7ef7ca3e1951bdabe998357d75b5188ef4967642</sum></package><package arch="i686" name="libss-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libss-devel-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">e10b1c8d2a7d13341874177e947aead0e9aa44de33dfff748b09d8b0b63def16</sum></package><package arch="i686" name="e2fsprogs-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-devel-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">3c9deb8a85a2b74c3d327a22a43fae6a2ddc9f6b7297803095fc8c1bc878759d</sum></package><package arch="i686" name="libcom_err" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libcom_err-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">4d0990dd22e09ae4e90d0d284a716440f9c20f9fe81e6c6fde627b7770252ad3</sum></package><package arch="x86_64" name="libcom_err-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libcom_err-devel-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">6da95fb7be290714e949ddffb21d3049f34307af9272b4579d9fbbe8fdf121c7</sum></package><package arch="x86_64" name="e2fsprogs-libs" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-libs-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">cfde5380a1da5cfa2bdee6e4c2f20a2c3ed421d33e9b1201aafc446239e52ce8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094" id="CVE-2019-5094" title="Cve-2019-5094" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188" id="CVE-2019-5188" title="Cve-2019-5188" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4011" id="RHSA-2020:4011-1" title="Rhsa-2020:4011-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1711880" id="1711880" title="[Rhel-7.7] E2Image Against Meta_Bg Enabled Ext4 Image Creates Corrupts Metadata On Some Arches" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720130" id="1720130" title="[Rhel-7.7 E2Fsprogs] Fix Typo In Ext4(5) Man Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1768555" id="1768555" title="Cve-2019-5094 E2Fsprogs: Crafted Ext4 Partition Leads To Out-Of-Bounds Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1780277" id="1780277" title="Update Mke2Fs.Conf To Provide Easy Method Of Making Rhel6-Compatible Filesystems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790048" id="1790048" title="Cve-2019-5188 E2Fsprogs: Out-Of-Bounds Write In E2Fsck/Rehash.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4024-1</id><title>Okular</title><description>Security Fix(es): 
* okular: local binary execution via specially crafted PDF files (CVE-2020-9359)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="okular" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-4.10.5-9.el7.x86_64.rpm</filename><sum type="sha256">227ee627aeeb063798344088808c9a66d7dbe0cfe5a2ca556f23e5ecd5ea679b</sum></package><package arch="x86_64" name="okular-devel" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-devel-4.10.5-9.el7.x86_64.rpm</filename><sum type="sha256">e10dc39c17c4e3c58a6ae470a3ddebc05ef3b3d3a19cb652ff1cb519cd087776</sum></package><package arch="i686" name="okular-libs" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-libs-4.10.5-9.el7.i686.rpm</filename><sum type="sha256">6007b024d163f9ee217ee795d79daaa975ef722aefff755990c3ecf0f304d633</sum></package><package arch="x86_64" name="okular-part" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-part-4.10.5-9.el7.x86_64.rpm</filename><sum type="sha256">4108c4a129092e7b3677c768a52b1bf2b93832de180f505b9d27ab656c773173</sum></package><package arch="x86_64" name="okular-libs" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-libs-4.10.5-9.el7.x86_64.rpm</filename><sum type="sha256">ce739b58b2f977bb44604027eb902dc20ea3f179665e6f77915774a7bee0a9ad</sum></package><package arch="i686" name="okular-devel" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-devel-4.10.5-9.el7.i686.rpm</filename><sum type="sha256">e3e89569de22f6209882571e46f9db700b345c11c1e41ebc89246987b80bb9f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9359" id="CVE-2020-9359" title="Cve-2020-9359" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4024" id="RHSA-2020:4024-1" title="Rhsa-2020:4024-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815651" id="1815651" title="Cve-2020-9359 Okular: Local Binary Execution Via Specially Crafted Pdf Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4025-1</id><title>Qt5-Qtbase</title><description>Security Fix(es): 
* qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0569) 
* qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0570)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="qt5-qtbase-gui" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">abab1227dc0ff0370441bfd6278dd3be09d19e4e297a5d50eaeaa1d6bcc0f2fe</sum></package><package arch="i686" name="qt5-qtbase-static" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">85982af26b66ccedeb8e13ca9df958dd07cd2c969597e65d6bf84c7f30717de6</sum></package><package arch="x86_64" name="qt5-qtbase-devel" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">7bae4add7fbb0e8b397aa454a9a1f1a033fd4a7988b4afe49a99698accd15a43</sum></package><package arch="x86_64" name="qt5-qtbase" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">fa797e1be38c73b8781cad9156f3b3ce128ccbfd5383824e180594a36da783bc</sum></package><package arch="noarch" name="qt5-qtbase-common" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-common-5.9.7-4.el7.noarch.rpm</filename><sum type="sha256">7f1c9432f93dd8c5dde95696eb73298ec04c0544882f443d64991cb81c3a3e63</sum></package><package arch="i686" name="qt5-qtbase-odbc" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">f525b0851ad58810176d72a29f72d3a20e33d5ec1963c984c60fc31111c9fcf6</sum></package><package arch="x86_64" name="qt5-qtbase-odbc" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">3065f28397158af1c0fc3072e3e2b5d0a027f27ed7d3875701d83620873139bc</sum></package><package arch="x86_64" name="qt5-qtbase-mysql" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">ddcfc60323daf117580a3fcee0db370dbb6564a2abc2b9eedae8b40b21515a0c</sum></package><package arch="i686" name="qt5-qtbase-gui" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">334b59f119bbfe1554f1da9b6cf1f4eab417c714f66414a221c2754f4fc441a7</sum></package><package arch="noarch" name="qt5-rpm-macros" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-rpm-macros-5.9.7-4.el7.noarch.rpm</filename><sum type="sha256">711f1c0aab7124cafb5d774346c9ae55a5de90e72315ed2d17df91193c4ca07f</sum></package><package arch="x86_64" name="qt5-qtbase-doc" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-doc-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">a8ec25d608f268834f7132d62f591d624f927d7b0f5477977270ac880c15552f</sum></package><package arch="i686" name="qt5-qtbase-postgresql" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">5e2ba3a99a781f9d33a77f83a2f44ca6a40df0ad61dd32641b151108a1e880eb</sum></package><package arch="i686" name="qt5-qtbase-mysql" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">4c585e99c4fbf42622b8c8e443126da264bc61c7ec907381b0292651494a16dc</sum></package><package arch="x86_64" name="qt5-qtbase-static" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">c457697974f37793091902fec69e8006182da5ace574c164a1e29543226d474a</sum></package><package arch="i686" name="qt5-qtbase-devel" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">1e59d1e9cd21ea65f23b6583662395a4ef48a8b46a2c679b385e544baef3b9e6</sum></package><package arch="x86_64" name="qt5-qtbase-examples" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-examples-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">81c9cdfe894e4e00581b84c4858769dfe4e4ed852c1b5051a7c822a8f4f8b01a</sum></package><package arch="x86_64" name="qt5-qtbase-postgresql" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">2bf5dead3482eabeab1d6dd021f72927c072d86c1d09e4cf65c303ac7a58d5f1</sum></package><package arch="i686" name="qt5-qtbase" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">504912a51f798dff9d6a988f8d985b776142728f5d2d35151ab118ddacbdc159</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0569" id="CVE-2020-0569" title="Cve-2020-0569" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0570" id="CVE-2020-0570" title="Cve-2020-0570" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4025" id="RHSA-2020:4025-1" title="Rhsa-2020:4025-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800600" id="1800600" title="Cve-2020-0569 Qt: Files Placed By Attacker Can Influence The Working Directory And Lead To Malicious Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800604" id="1800604" title="Cve-2020-0570 Qt: Files Placed By Attacker Can Influence The Working Directory And Lead To Malicious Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4026-1</id><title>Mariadb</title><description>Security Fix(es): 
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) 
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) 
* mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) 
* mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) 
* mysql: C API: unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-embedded-5.5.68-1.el7.i686.rpm</filename><sum type="sha256">698adde9d3d1b11478b26b49844754a907752444f4bcdbf36d7333b6124644ae</sum></package><package arch="x86_64" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-devel-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">a851ac042508beda19cac0bdbcd6af89a6668867bc5212054ff69ccceda81051</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-embedded-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">1702cdb5c291ebdf5d6276cc6f99980fddfe6d9a80efea64eeb5b34e2adfe5ca</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-embedded-devel-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">c47cc49de59ddb583c025f53f3624d1ae8355c6b57dab59969043e4c4faa3901</sum></package><package arch="x86_64" epoch="1" name="mariadb-server" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-server-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">c6caf93379bbb675d16f142ed22ba0720c52abbc7f7b132da92ac7e22081fe8e</sum></package><package arch="x86_64" epoch="1" name="mariadb" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">f305d3e78cbc2910e780f9298634aef9754974308eafe7130dc5f2e39c7abd27</sum></package><package arch="x86_64" epoch="1" name="mariadb-test" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-test-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">5eacd199a619557bde3bb3fba63c742fad338e57f09525ae410fd12ac79b0cc9</sum></package><package arch="x86_64" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-libs-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">19b4ec56288c2563d082a4af7f23c6d0a408a0b3485cd1d6b9fb1d72511d2832</sum></package><package arch="i686" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-devel-5.5.68-1.el7.i686.rpm</filename><sum type="sha256">a64490c6af7b1557f50a34ade4889ec1df0b8b8d00036c99f3c3bae186af3b14</sum></package><package arch="i686" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-libs-5.5.68-1.el7.i686.rpm</filename><sum type="sha256">966f5671d0876ee87e6c8e19592314c1db68a9057f130c7d79f334fcd66ed3c2</sum></package><package arch="i686" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-embedded-devel-5.5.68-1.el7.i686.rpm</filename><sum type="sha256">b537cec0f706f485eeb58e826d577af79f764d20574b8e8f0298b4ede8a317fd</sum></package><package arch="x86_64" epoch="1" name="mariadb-bench" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-bench-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">9974118028d740e534857e7930076a251c21ab12415a631123b461537b067eb7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974" id="CVE-2019-2974" title="Cve-2019-2974" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574" id="CVE-2020-2574" title="Cve-2020-2574" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752" id="CVE-2020-2752" title="Cve-2020-2752" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2780" id="CVE-2020-2780" title="Cve-2020-2780" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2812" id="CVE-2020-2812" title="Cve-2020-2812" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4026" id="RHSA-2020:4026-1" title="Rhsa-2020:4026-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1465481" id="1465481" title="Test Case Failure: /Coreos/Mariadb55/Testsuite - Perfschema.Func_File_Io / Aarch64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1592735" id="1592735" title="Testsuite Failure During Rebuild - Parts.Partition_Alter1_2_Innodb 'Innodb_Plugin'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1689827" id="1689827" title="[Mariadb Client] Memory Leak Of Around 2 Kb For Every Mysql Connect()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1704296" id="1704296" title="Test Case Failure: /Coreos/Mariadb55/Testsuite - Main.Mysqldump" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1713365" id="1713365" title="Mysqldump Unit Test Fail" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1718877" id="1718877" title="Main.Innodb_Mrr_Cpk Unit Test Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764691" id="1764691" title="Cve-2019-2974 Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Oct 2019)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798587" id="1798587" title="Cve-2020-2574 Mysql: C Api Unspecified Vulnerability (Cpu Jan 2020)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820269" id="1820269" title="[Ftbfs] Mariadb Main.Events_Bugs Fails Due To 2020-01-01 Date" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1830056" id="1830056" title="Cve-2020-2780 Mysql: Server: Dml Unspecified Vulnerability (Cpu Apr 2020)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1830059" id="1830059" title="Cve-2020-2812 Mysql: Server: Stored Procedure Unspecified Vulnerability (Cpu Apr 2020)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834835" id="1834835" title="Tracker: Mariadb Rebase To The Latest Version (5.5.68)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835849" id="1835849" title="Cve-2020-2752 Mysql: C Api Unspecified Vulnerability (Cpu Apr 2020)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4030-1</id><title>Exiv2</title><description>Security Fix(es): 
* exiv2: out-of-bounds read in CiffDirectory::readDirectory due to lack of size check (CVE-2019-17402)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="exiv2-devel" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-3.el7_8.x86_64.rpm</filename><sum type="sha256">699b7f384aea8609147679d079b0fa531e464c9fab4beda9861a1b6fd06ab980</sum></package><package arch="noarch" name="exiv2-doc" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-doc-0.27.0-3.el7_8.noarch.rpm</filename><sum type="sha256">9712b0545f1a74cbb8b7e53f2c2c90f6bf4e8f5b13fe14dad57c8fd90cb82ad7</sum></package><package arch="i686" name="exiv2-devel" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-3.el7_8.i686.rpm</filename><sum type="sha256">aa31d9d0acf7fd5f431a3469e9cd75d7e1317328dfc274b957ff4916f8e1d82a</sum></package><package arch="x86_64" name="exiv2-libs" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-3.el7_8.x86_64.rpm</filename><sum type="sha256">b4f067e21c8994450c7c4964d2b81305ed823c8bcc67f39a7fab13fdcc52283f</sum></package><package arch="i686" name="exiv2-libs" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-3.el7_8.i686.rpm</filename><sum type="sha256">2f1e194e18531d71a2bed100da5671f2d21229ca4731f713862a2a7ae9316ed8</sum></package><package arch="x86_64" name="exiv2" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-0.27.0-3.el7_8.x86_64.rpm</filename><sum type="sha256">128fb873cb7d2ffc1a10d64715ee26891c2a7629b3dab15dd784acdef0a6a67a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17402" id="CVE-2019-17402" title="Cve-2019-17402" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4030" id="RHSA-2020:4030-1" title="Rhsa-2020:4030-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1773683" id="1773683" title="Cve-2019-17402 Exiv2: Out-Of-Bounds Read In Ciffdirectory::Readdirectory Due To Lack Of Size Check" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4031-1</id><title>Freerdp</title><description>Security Fix(es): 
* freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) 
* freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) 
* freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) 
* freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) 
* freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) 
* freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) 
* freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) 
* freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) 
* freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) 
* freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) 
* freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) 
* freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) 
* freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) 
* freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) 
* freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) 
* freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) 
* freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) 
* freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) 
* freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) 
* freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) 
* freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) 
* freerdp: out-of-bounds read in irp functions (CVE-2020-11089) 
* freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) 
* freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) 
* freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freerdp-libs" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-libs-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">50f478d4d3649092f7c414be5db7af1464e846b8c6f3c6a6942423af7c4521ea</sum></package><package arch="x86_64" name="freerdp" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">899f978bbb36db7396207aa5631483c9256f46dbea8aacb1ad8b6aa0ce6ad1da</sum></package><package arch="i686" name="libwinpr-devel" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>libwinpr-devel-2.1.1-2.el7.i686.rpm</filename><sum type="sha256">8933fcd83816423744b93bedc67f18e0da393f01b50156f0b313ce31dc6def14</sum></package><package arch="x86_64" name="libwinpr" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>libwinpr-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">a16b61139ef5f5a409a2d34683c6e10bcfbc45c303883acc61f6230065ece19b</sum></package><package arch="i686" name="libwinpr" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>libwinpr-2.1.1-2.el7.i686.rpm</filename><sum type="sha256">bed5fd94e38041d14d9606e33eb0a29666be596b107e22604ccec195d57b98ef</sum></package><package arch="i686" name="freerdp-devel" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-devel-2.1.1-2.el7.i686.rpm</filename><sum type="sha256">658b8f764bfcded5b3dfe9e506ec8d0ab2f272bf7c73a87fbfe97ac4eb18516b</sum></package><package arch="i686" name="freerdp-libs" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-libs-2.1.1-2.el7.i686.rpm</filename><sum type="sha256">070079fee97cd015d6aa2bf66249388d99c85eebfac8a252d2e62fe27b44f384</sum></package><package arch="x86_64" name="freerdp-devel" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-devel-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">f0263a6d5bb65e61a7b8f6a62ab158564213b749d76bdf6197f72317b336bc48</sum></package><package arch="x86_64" name="libwinpr-devel" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>libwinpr-devel-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">1100ac0e91ed41264d2410ac18988a56753b53e8faeb84dfb5248342c16454ba</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11018" id="CVE-2020-11018" title="Cve-2020-11018" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11019" id="CVE-2020-11019" title="Cve-2020-11019" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11038" id="CVE-2020-11038" title="Cve-2020-11038" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11039" id="CVE-2020-11039" title="Cve-2020-11039" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11040" id="CVE-2020-11040" title="Cve-2020-11040" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11041" id="CVE-2020-11041" title="Cve-2020-11041" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11042" id="CVE-2020-11042" title="Cve-2020-11042" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11043" id="CVE-2020-11043" title="Cve-2020-11043" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11044" id="CVE-2020-11044" title="Cve-2020-11044" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11045" id="CVE-2020-11045" title="Cve-2020-11045" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11046" id="CVE-2020-11046" title="Cve-2020-11046" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11047" id="CVE-2020-11047" title="Cve-2020-11047" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11048" id="CVE-2020-11048" title="Cve-2020-11048" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11049" id="CVE-2020-11049" title="Cve-2020-11049" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11058" id="CVE-2020-11058" title="Cve-2020-11058" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11085" id="CVE-2020-11085" title="Cve-2020-11085" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11086" id="CVE-2020-11086" title="Cve-2020-11086" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11087" id="CVE-2020-11087" title="Cve-2020-11087" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11088" id="CVE-2020-11088" title="Cve-2020-11088" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11089" id="CVE-2020-11089" title="Cve-2020-11089" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11522" id="CVE-2020-11522" title="Cve-2020-11522" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11525" id="CVE-2020-11525" title="Cve-2020-11525" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11526" id="CVE-2020-11526" title="Cve-2020-11526" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13396" id="CVE-2020-13396" title="Cve-2020-13396" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13397" id="CVE-2020-13397" title="Cve-2020-13397" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4031" id="RHSA-2020:4031-1" title="Rhsa-2020:4031-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834286" id="1834286" title="Update Freerdp To 2.1.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835382" id="1835382" title="Cve-2020-11042 Freerdp: Out-Of-Bounds Read In Update_Read_Icon_Info Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835391" id="1835391" title="Cve-2020-11044 Freerdp: Double Free In Update_Read_Cache_Bitmap_V3_Order Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835399" id="1835399" title="Cve-2020-11045 Freerdp: Out Of Bounds Read In Update_Read_Bitmap_Data Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835403" id="1835403" title="Cve-2020-11046 Freerdp: Out Of Bounds Seek In Update_Read_Synchronize Function Could Lead Out Of Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835762" id="1835762" title="Cve-2020-11047 Freerdp: Out-Of-Bounds Read In Autodetect_Recv_Bandwidth_Measure_Results Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835766" id="1835766" title="Cve-2020-11048 Freerdp: Out-Of-Bounds Read Could Result In Aborting The Session" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835772" id="1835772" title="Cve-2020-11049 Freerdp: Out-Of-Bound Read Of Client Memory That Is Then Passed On To The Protocol Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835779" id="1835779" title="Cve-2020-11058 Freerdp: Stream Out-Of-Bounds Seek In Rdp_Read_Font_Capability_Set Could Lead To Out-Of-Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836223" id="1836223" title="Cve-2020-11522 Freerdp: Out-Of-Bounds Read In Gdi.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836239" id="1836239" title="Cve-2020-11525 Freerdp: Out-Of-Bounds Read In Bitmap.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836247" id="1836247" title="Cve-2020-11526 Freerdp: Stream Pointer Out Of Bounds In Update_Recv_Secondary_Order Could Lead Out Of Bounds Read Later" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1841189" id="1841189" title="Cve-2020-13396 Freerdp: Out-Of-Bounds Read In Ntlm_Read_Challengemessage In Winpr/Libwinpr/Sspi/Ntlm/Ntlm_Message.C." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1841196" id="1841196" title="Cve-2020-13397 Freerdp: Out-Of-Bounds Read In Security_Fips_Decrypt In Libfreerdp/Core/Security.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844161" id="1844161" title="Cve-2020-11085 Freerdp: Out-Of-Bounds Read In Cliprdr_Read_Format_List Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844166" id="1844166" title="Cve-2020-11086 Freerdp: Out-Of-Bounds Read In Ntlm_Read_Ntlm_V2_Client_Challenge Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844171" id="1844171" title="Cve-2020-11087 Freerdp: Out-Of-Bounds Read In Ntlm_Read_Authenticatemessage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844177" id="1844177" title="Cve-2020-11088 Freerdp: Out-Of-Bounds Read In Ntlm_Read_Negotiatemessage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844184" id="1844184" title="Cve-2020-11089 Freerdp: Out-Of-Bounds Read In Irp Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848008" id="1848008" title="Cve-2020-11018 Freerdp: Out Of Bound Read In Cliprdr_Server_Receive_Capabilities" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848012" id="1848012" title="Cve-2020-11019 Freerdp: Out Of Bound Read In Update_Recv Could Result In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848018" id="1848018" title="Cve-2020-11038 Freerdp: Integer Overflow In Video Channel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848022" id="1848022" title="Cve-2020-11039 Freerdp: Out Of Bound Read/Write In Usb Redirection Channel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848029" id="1848029" title="Cve-2020-11040 Freerdp: Out Of Bound Access In Clear_Decompress_Subcode_Rlex" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848034" id="1848034" title="Cve-2020-11041 Freerdp: Unchecked Read Of Array Offset In Rdpsnd_Recv_Wave2_Pdu" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848038" id="1848038" title="Cve-2020-11043 Freerdp: Out Of Bound Read In Rfx_Process_Message_Tileset" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4032-1</id><title>Dbus</title><description>Security Fix(es): 
* dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass (CVE-2019-12749)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="dbus" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">49613d23e5af1574fead789a20abd2c5a4f3ea9c12836f12ecdf4ceb307b6438</sum></package><package arch="x86_64" epoch="1" name="dbus-x11" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-x11-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">69faa197f1a91f3de92ff8c0d67eaca2cf0067fc7205ed90f96c6ad3e2029f92</sum></package><package arch="noarch" epoch="1" name="dbus-doc" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-doc-1.10.24-15.el7.noarch.rpm</filename><sum type="sha256">0152845e126e3c84a26aaa8c36a9fd1d44978eb885ae6fc23b8c057aa86cb45c</sum></package><package arch="x86_64" epoch="1" name="dbus-libs" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-libs-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">1af526b357ce623df3bb58d6e8a692a9d0ba31fe8461b764b0570c4fe4e18cd2</sum></package><package arch="i686" epoch="1" name="dbus-devel" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-devel-1.10.24-15.el7.i686.rpm</filename><sum type="sha256">2021654c8951ba2e8d71d9065b02f7dea21ceceece169adcb8d8333688c246ad</sum></package><package arch="x86_64" epoch="1" name="dbus-tests" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-tests-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">e4e97d5cb1e5b020854335e04f51d1f2ee53f7bc79e90cffb42e6cc549a5131d</sum></package><package arch="i686" epoch="1" name="dbus-libs" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-libs-1.10.24-15.el7.i686.rpm</filename><sum type="sha256">b296591bca8453364ae229e583e2d8821a0d626792a2d431992a2a08dcc54cbc</sum></package><package arch="x86_64" epoch="1" name="dbus-devel" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-devel-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">db8141daf59c2fa1e9e07c88e2727c016f087c8f594a5c789ee3c7aeb00b04b6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4032" id="RHSA-2020:4032-1" title="Rhsa-2020:4032-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719344" id="1719344" title="Dbus: Dbusserver Dbus_Cookie_Sha1 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4035-1</id><title>Webkitgtk4</title><description>Security Fix(es): 
* webkitgtk: Multiple security issues (CVE-2019-6237, CVE-2019-6251, CVE-2019-8506, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551, CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-8571, CVE-2019-8583, CVE-2019-8584, CVE-2019-8586, CVE-2019-8587, CVE-2019-8594, CVE-2019-8595, CVE-2019-8596, CVE-2019-8597, CVE-2019-8601, CVE-2019-8607, CVE-2019-8608, CVE-2019-8609, CVE-2019-8610, CVE-2019-8611, CVE-2019-8615, CVE-2019-8619, CVE-2019-8622, CVE-2019-8623, CVE-2019-8625, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673, CVE-2019-8674, CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680, CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687, CVE-2019-8688, CVE-2019-8689, CVE-2019-8690, CVE-2019-8707, CVE-2019-8710, CVE-2019-8719, CVE-2019-8720, CVE-2019-8726, CVE-2019-8733, CVE-2019-8735, CVE-2019-8743, CVE-2019-8763, CVE-2019-8764, CVE-2019-8765, CVE-2019-8766, CVE-2019-8768, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8821, CVE-2019-8822, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2019-11070, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-10018, CVE-2020-11793)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="webkitgtk4-jsc-devel" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-devel-2.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">aceb7a1c5cd23f70dfed22b1c73b064e692bd4724ed40dfcc6e2acfdc86991b0</sum></package><package arch="x86_64" name="webkitgtk4" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-2.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">a854513d09cd166c5d487700abc2ceb9975ab4cf584ade02a4570b890e9ca0f9</sum></package><package arch="i686" name="webkitgtk4-jsc-devel" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-devel-2.28.2-2.el7.i686.rpm</filename><sum type="sha256">a340b60560733de3fe9cfb6a83c1bbfa27c4fce8bc30c727fde8c50343ea9a23</sum></package><package arch="i686" name="webkitgtk4-jsc" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-2.28.2-2.el7.i686.rpm</filename><sum type="sha256">ce6685ad0c4617164c3292239310271f102d836b7fd2e13c4f6d0efc64be8951</sum></package><package arch="i686" name="webkitgtk4" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-2.28.2-2.el7.i686.rpm</filename><sum type="sha256">6e8bedb988c417322723f3557dd9fefd208e4c5d835ddaec54518a79591008b7</sum></package><package arch="x86_64" name="webkitgtk4-jsc" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-2.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">5feddee015f19f292616832b1f0bfbb8398172ec215b24980033ae467b687363</sum></package><package arch="noarch" name="webkitgtk4-doc" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-doc-2.28.2-2.el7.noarch.rpm</filename><sum type="sha256">a14f84c45f338b6c099ec9f886a9a891560d1b7b197b7a84df5d7af9e16c2950</sum></package><package arch="i686" name="webkitgtk4-devel" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-devel-2.28.2-2.el7.i686.rpm</filename><sum type="sha256">7bf37530a79b1e5fc06f0ba014a3db9a3bffe8ea6f34a0cc8cc6262f7490e50d</sum></package><package arch="x86_64" name="webkitgtk4-devel" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-devel-2.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">e95de77af90a26f474731ed34fae4e2cbdd0f8288536d08dceab82c121070800</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070" id="CVE-2019-11070" title="Cve-2019-11070" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6237" id="CVE-2019-6237" title="Cve-2019-6237" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251" id="CVE-2019-6251" title="Cve-2019-6251" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506" id="CVE-2019-8506" title="Cve-2019-8506" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524" id="CVE-2019-8524" title="Cve-2019-8524" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535" id="CVE-2019-8535" title="Cve-2019-8535" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536" id="CVE-2019-8536" title="Cve-2019-8536" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544" id="CVE-2019-8544" title="Cve-2019-8544" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551" id="CVE-2019-8551" title="Cve-2019-8551" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558" id="CVE-2019-8558" title="Cve-2019-8558" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559" id="CVE-2019-8559" title="Cve-2019-8559" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563" id="CVE-2019-8563" title="Cve-2019-8563" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8571" id="CVE-2019-8571" title="Cve-2019-8571" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8583" id="CVE-2019-8583" title="Cve-2019-8583" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8584" id="CVE-2019-8584" title="Cve-2019-8584" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8586" id="CVE-2019-8586" title="Cve-2019-8586" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8587" id="CVE-2019-8587" title="Cve-2019-8587" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8594" id="CVE-2019-8594" title="Cve-2019-8594" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595" id="CVE-2019-8595" title="Cve-2019-8595" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8596" id="CVE-2019-8596" title="Cve-2019-8596" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8597" id="CVE-2019-8597" title="Cve-2019-8597" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8601" id="CVE-2019-8601" title="Cve-2019-8601" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607" id="CVE-2019-8607" title="Cve-2019-8607" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8608" id="CVE-2019-8608" title="Cve-2019-8608" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8609" id="CVE-2019-8609" title="Cve-2019-8609" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8610" id="CVE-2019-8610" title="Cve-2019-8610" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8611" id="CVE-2019-8611" title="Cve-2019-8611" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615" id="CVE-2019-8615" title="Cve-2019-8615" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8619" id="CVE-2019-8619" title="Cve-2019-8619" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8622" id="CVE-2019-8622" title="Cve-2019-8622" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8623" id="CVE-2019-8623" title="Cve-2019-8623" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625" id="CVE-2019-8625" title="Cve-2019-8625" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" id="CVE-2019-8644" title="Cve-2019-8644" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" id="CVE-2019-8649" title="Cve-2019-8649" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" id="CVE-2019-8658" title="Cve-2019-8658" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" id="CVE-2019-8666" title="Cve-2019-8666" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" id="CVE-2019-8669" title="Cve-2019-8669" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" id="CVE-2019-8671" title="Cve-2019-8671" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" id="CVE-2019-8672" title="Cve-2019-8672" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" id="CVE-2019-8673" title="Cve-2019-8673" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" id="CVE-2019-8674" title="Cve-2019-8674" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" id="CVE-2019-8676" title="Cve-2019-8676" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" id="CVE-2019-8677" title="Cve-2019-8677" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" id="CVE-2019-8678" title="Cve-2019-8678" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" id="CVE-2019-8679" title="Cve-2019-8679" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" id="CVE-2019-8680" title="Cve-2019-8680" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" id="CVE-2019-8681" title="Cve-2019-8681" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" id="CVE-2019-8683" title="Cve-2019-8683" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" id="CVE-2019-8684" title="Cve-2019-8684" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" id="CVE-2019-8686" title="Cve-2019-8686" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" id="CVE-2019-8687" title="Cve-2019-8687" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" id="CVE-2019-8688" title="Cve-2019-8688" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" id="CVE-2019-8689" title="Cve-2019-8689" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" id="CVE-2019-8690" title="Cve-2019-8690" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" id="CVE-2019-8707" title="Cve-2019-8707" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710" id="CVE-2019-8710" title="Cve-2019-8710" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" id="CVE-2019-8719" title="Cve-2019-8719" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720" id="CVE-2019-8720" title="Cve-2019-8720" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8726" id="CVE-2019-8726" title="Cve-2019-8726" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" id="CVE-2019-8733" title="Cve-2019-8733" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8735" id="CVE-2019-8735" title="Cve-2019-8735" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743" id="CVE-2019-8743" title="Cve-2019-8743" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" id="CVE-2019-8763" title="Cve-2019-8763" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764" id="CVE-2019-8764" title="Cve-2019-8764" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" id="CVE-2019-8765" title="Cve-2019-8765" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766" id="CVE-2019-8766" title="Cve-2019-8766" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8768" id="CVE-2019-8768" title="Cve-2019-8768" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769" id="CVE-2019-8769" title="Cve-2019-8769" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771" id="CVE-2019-8771" title="Cve-2019-8771" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782" id="CVE-2019-8782" title="Cve-2019-8782" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783" id="CVE-2019-8783" title="Cve-2019-8783" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808" id="CVE-2019-8808" title="Cve-2019-8808" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811" id="CVE-2019-8811" title="Cve-2019-8811" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8812" id="CVE-2019-8812" title="Cve-2019-8812" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813" id="CVE-2019-8813" title="Cve-2019-8813" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8814" id="CVE-2019-8814" title="Cve-2019-8814" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815" id="CVE-2019-8815" title="Cve-2019-8815" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816" id="CVE-2019-8816" title="Cve-2019-8816" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819" id="CVE-2019-8819" title="Cve-2019-8819" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820" id="CVE-2019-8820" title="Cve-2019-8820" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" id="CVE-2019-8821" title="Cve-2019-8821" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" id="CVE-2019-8822" title="Cve-2019-8822" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823" id="CVE-2019-8823" title="Cve-2019-8823" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8835" id="CVE-2019-8835" title="Cve-2019-8835" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8844" id="CVE-2019-8844" title="Cve-2019-8844" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8846" id="CVE-2019-8846" title="Cve-2019-8846" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018" id="CVE-2020-10018" title="Cve-2020-10018" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793" id="CVE-2020-11793" title="Cve-2020-11793" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3862" id="CVE-2020-3862" title="Cve-2020-3862" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3864" id="CVE-2020-3864" title="Cve-2020-3864" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3865" id="CVE-2020-3865" title="Cve-2020-3865" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3867" id="CVE-2020-3867" title="Cve-2020-3867" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3868" id="CVE-2020-3868" title="Cve-2020-3868" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" id="CVE-2020-3885" title="Cve-2020-3885" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" id="CVE-2020-3894" title="Cve-2020-3894" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" id="CVE-2020-3895" title="Cve-2020-3895" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" id="CVE-2020-3897" title="Cve-2020-3897" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" id="CVE-2020-3899" title="Cve-2020-3899" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" id="CVE-2020-3900" title="Cve-2020-3900" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" id="CVE-2020-3901" title="Cve-2020-3901" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" id="CVE-2020-3902" title="Cve-2020-3902" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4035" id="RHSA-2020:4035-1" title="Rhsa-2020:4035-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667409" id="1667409" title="Cve-2019-6251 Webkitgtk: Processing Maliciously Crafted Web Content Lead To Uri Spoofing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709289" id="1709289" title="Cve-2019-11070 Webkitgtk: Http Proxy Setting Deanonymization Information Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719199" id="1719199" title="Cve-2019-8506 Webkitgtk: Malicous Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719209" id="1719209" title="Cve-2019-8524 Webkitgtk: Malicious Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719210" id="1719210" title="Cve-2019-8535 Webkitgtk: Malicious Crafted Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719213" id="1719213" title="Cve-2019-8536 Webkitgtk: Malicious Crafted Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719224" id="1719224" title="Cve-2019-8544 Webkitgtk: Malicious Crafted Web Content Leads To Arbitrary We Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719231" id="1719231" title="Cve-2019-8558 Webkitgtk: Malicious Crafted Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719235" id="1719235" title="Cve-2019-8559 Webkitgtk: Malicious Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719237" id="1719237" title="Cve-2019-8563 Webkitgtk: Malicious Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719238" id="1719238" title="Cve-2019-8551 Webkitgtk: Malicious Web Content Leads To Cross Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1811721" id="1811721" title="Cve-2020-10018 Webkitgtk: Use-After-Free Issue In Accessibility/Axobjectcache.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816678" id="1816678" title="Cve-2019-8846 Webkitgtk: Use After Free Issue May Lead To Remote Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816684" id="1816684" title="Cve-2019-8835 Webkitgtk: Processing Maliciously Crafted Web Content May Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816686" id="1816686" title="Cve-2019-8844 Webkitgtk: Processing Maliciously Crafted Web Content May Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817144" id="1817144" title="Rebase Webkitgtk To 2.28" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829369" id="1829369" title="Cve-2020-11793 Webkitgtk: Use-After-Free Via Crafted Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876462" id="1876462" title="Cve-2020-3885 Webkitgtk: Incorrect Processing Of File Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876463" id="1876463" title="Cve-2020-3894 Webkitgtk: Race Condition Allows Reading Of Restricted Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876465" id="1876465" title="Cve-2020-3895 Webkitgtk: Memory Corruption Triggered By A Malicious Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876468" id="1876468" title="Cve-2020-3897 Webkitgtk: Type Confusion Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876470" id="1876470" title="Cve-2020-3899 Webkitgtk: Memory Consumption Issue Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876472" id="1876472" title="Cve-2020-3900 Webkitgtk: Memory Corruption  Triggered By A Malicious Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876473" id="1876473" title="Cve-2020-3901 Webkitgtk: Type Confusion Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876476" id="1876476" title="Cve-2020-3902 Webkitgtk: Input Validation Issue Leading To Cross-Site Script Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876516" id="1876516" title="Cve-2020-3862 Webkitgtk: Denial Of Service Via Incorrect Memory Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876518" id="1876518" title="Cve-2020-3864 Webkitgtk: Non-Unique Security Origin For Dom Object Contexts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876521" id="1876521" title="Cve-2020-3865 Webkitgtk: Incorrect Security Check For A Top-Level Dom Object Context" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876522" id="1876522" title="Cve-2020-3867 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876523" id="1876523" title="Cve-2020-3868 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876536" id="1876536" title="Cve-2019-8710 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876537" id="1876537" title="Cve-2019-8743 Webkitgtk: Multiple Memory Corruption  Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876540" id="1876540" title="Cve-2019-8764 Webkitgtk: Incorrect State  Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876542" id="1876542" title="Cve-2019-8765 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876543" id="1876543" title="Cve-2019-8766 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876545" id="1876545" title="Cve-2019-8782 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876548" id="1876548" title="Cve-2019-8783 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876549" id="1876549" title="Cve-2019-8808 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876550" id="1876550" title="Cve-2019-8811 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876552" id="1876552" title="Cve-2019-8812 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876553" id="1876553" title="Cve-2019-8813 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876554" id="1876554" title="Cve-2019-8814 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876555" id="1876555" title="Cve-2019-8815 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876556" id="1876556" title="Cve-2019-8816 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876590" id="1876590" title="Cve-2019-8819 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876591" id="1876591" title="Cve-2019-8820 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876592" id="1876592" title="Cve-2019-8821 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876593" id="1876593" title="Cve-2019-8822 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876594" id="1876594" title="Cve-2019-8823 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876607" id="1876607" title="Cve-2019-8625 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876608" id="1876608" title="Cve-2019-8674 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876609" id="1876609" title="Cve-2019-8707 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876610" id="1876610" title="Cve-2019-8719 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876611" id="1876611" title="Cve-2019-8720 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876612" id="1876612" title="Cve-2019-8726 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876613" id="1876613" title="Cve-2019-8733 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876614" id="1876614" title="Cve-2019-8735 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876615" id="1876615" title="Cve-2019-8763 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876616" id="1876616" title="Cve-2019-8768 Webkitgtk: Browsing History Could Not Be Deleted" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876617" id="1876617" title="Cve-2019-8769 Webkitgtk: Websites Could Reveal Browsing History" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876619" id="1876619" title="Cve-2019-8771 Webkitgtk: Violation Of Iframe Sandboxing Policy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876626" id="1876626" title="Cve-2019-8644 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876628" id="1876628" title="Cve-2019-8649 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876629" id="1876629" title="Cve-2019-8658 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876630" id="1876630" title="Cve-2019-8666 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876631" id="1876631" title="Cve-2019-8669 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876632" id="1876632" title="Cve-2019-8671 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876634" id="1876634" title="Cve-2019-8672 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876643" id="1876643" title="Cve-2019-8673 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876644" id="1876644" title="Cve-2019-8676 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876645" id="1876645" title="Cve-2019-8677 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876646" id="1876646" title="Cve-2019-8678 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876647" id="1876647" title="Cve-2019-8679 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876648" id="1876648" title="Cve-2019-8680 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876650" id="1876650" title="Cve-2019-8681 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876651" id="1876651" title="Cve-2019-8683 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876652" id="1876652" title="Cve-2019-8684 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876653" id="1876653" title="Cve-2019-8686 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876655" id="1876655" title="Cve-2019-8687 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876656" id="1876656" title="Cve-2019-8688 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876657" id="1876657" title="Cve-2019-8689 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876664" id="1876664" title="Cve-2019-8690 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876880" id="1876880" title="Cve-2019-6237 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876881" id="1876881" title="Cve-2019-8571 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876882" id="1876882" title="Cve-2019-8583 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876883" id="1876883" title="Cve-2019-8584 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876884" id="1876884" title="Cve-2019-8586 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876887" id="1876887" title="Cve-2019-8587 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876891" id="1876891" title="Cve-2019-8594 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876892" id="1876892" title="Cve-2019-8595 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876893" id="1876893" title="Cve-2019-8596 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876894" id="1876894" title="Cve-2019-8597 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876895" id="1876895" title="Cve-2019-8601 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876897" id="1876897" title="Cve-2019-8607 Webkitgtk: Out-Of-Bounds Read Leading To Memory Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876898" id="1876898" title="Cve-2019-8608 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876899" id="1876899" title="Cve-2019-8609 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876900" id="1876900" title="Cve-2019-8610 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877045" id="1877045" title="Cve-2019-8615 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877046" id="1877046" title="Cve-2019-8611 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877047" id="1877047" title="Cve-2019-8619 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877048" id="1877048" title="Cve-2019-8622 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877049" id="1877049" title="Cve-2019-8623 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4039-1</id><title>Openexr</title><description>Security Fix(es): 
* OpenEXR: out-of-bounds read during Huffman uncompression (CVE-2020-11761) 
* OpenEXR: std::vector out-of-bounds read and write in ImfTileOffsets.cpp (CVE-2020-11763) 
* OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in ImfMisc.cpp (CVE-2020-11764)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="OpenEXR-libs" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-libs-1.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">718ced468bf51b2002f9affbb2cb4e978272e6de9a1a74ef424c3a78eea82005</sum></package><package arch="x86_64" name="OpenEXR-devel" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-devel-1.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">18c2c0c079ff1e9552402956c508d05d41bfc05e82b03a1d8605dca773782c19</sum></package><package arch="i686" name="OpenEXR-libs" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-libs-1.7.1-8.el7.i686.rpm</filename><sum type="sha256">8677a62336741f83adde8e09a6ff228e0d7ea4b118d5d0082a216d43a1ba3a38</sum></package><package arch="i686" name="OpenEXR-devel" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-devel-1.7.1-8.el7.i686.rpm</filename><sum type="sha256">23931bd35b53dcec540bd01060db7f3b24e8425d5ac6bb065a54bb4b578779ed</sum></package><package arch="x86_64" name="OpenEXR" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-1.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">0fdc6cc95ba73c327efefaada1b9f262e579214a66cace2d711a3191be003b87</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11761" id="CVE-2020-11761" title="Cve-2020-11761" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11763" id="CVE-2020-11763" title="Cve-2020-11763" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11764" id="CVE-2020-11764" title="Cve-2020-11764" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4039" id="RHSA-2020:4039-1" title="Rhsa-2020:4039-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828990" id="1828990" title="Cve-2020-11764 Openexr: Out-Of-Bounds Write In Copyintoframebuffer Function In Imfmisc.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828995" id="1828995" title="Cve-2020-11763 Openexr: Std::Vector Out-Of-Bounds Read And Write In Imftileoffsets.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829002" id="1829002" title="Cve-2020-11761 Openexr: Out-Of-Bounds Read During Huffman Uncompression" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4040-1</id><title>Libexif</title><description>Security Fix(es): 
* libexif: out of bound write in exif-data.c (CVE-2019-9278) 
* libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c (CVE-2020-0093) 
* libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free (CVE-2020-13113) 
* libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time (CVE-2020-13114) 
* libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c (CVE-2020-0182) 
* libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c (CVE-2020-12767)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libexif-doc" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-doc-0.6.22-1.el7.x86_64.rpm</filename><sum type="sha256">29c8870ea192bd1a7f25455101ffb9da5bc0eb70a3d1c509be4d041156e70749</sum></package><package arch="x86_64" name="libexif-devel" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-1.el7.x86_64.rpm</filename><sum type="sha256">7660c2b5f75652c415c05e4e1281c0fc970455970ec8315d17f74eafbdeeb0ca</sum></package><package arch="i686" name="libexif" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-0.6.22-1.el7.i686.rpm</filename><sum type="sha256">c55b7d08e21c66626adc2d006015053d3f6759e16fa2b7a551f93c0b29d401c1</sum></package><package arch="i686" name="libexif-devel" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-1.el7.i686.rpm</filename><sum type="sha256">759bcabb28968dd4f558845a96872f25aa7ab7d487ee845956652ea06ee5cad0</sum></package><package arch="x86_64" name="libexif" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-0.6.22-1.el7.x86_64.rpm</filename><sum type="sha256">462a6cff319a50bf552362667dfd8b845d5d5742cd1ed0d818486fea72cb19dc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9278" id="CVE-2019-9278" title="Cve-2019-9278" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0093" id="CVE-2020-0093" title="Cve-2020-0093" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0182" id="CVE-2020-0182" title="Cve-2020-0182" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12767" id="CVE-2020-12767" title="Cve-2020-12767" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13113" id="CVE-2020-13113" title="Cve-2020-13113" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13114" id="CVE-2020-13114" title="Cve-2020-13114" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4040" id="RHSA-2020:4040-1" title="Rhsa-2020:4040-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789031" id="1789031" title="Cve-2019-9278 Libexif: Out Of Bound Write In Exif-Data.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834950" id="1834950" title="Cve-2020-12767 Libexif: Divide-By-Zero In Exif_Entry_Get_Value Function In Exif-Entry.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1840347" id="1840347" title="Cve-2020-13113 Libexif: Use Of Uninitialized Memory In Exif Makernote Handling Can Lead To Crashes And Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1840350" id="1840350" title="Cve-2020-13114 Libexif: Unrestricted Size In Handling Canon Exif Makernote Data Can Lead To Consumption Of Large Amounts Of Compute Time" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1841316" id="1841316" title="Rebase To Libexif 0.6.22" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1852487" id="1852487" title="Cve-2020-0093 Libexif: Out Of Bounds Read Due To A Missing Bounds Check In Exif_Data_Save_Data_Entry Function In Exif-Data.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1852490" id="1852490" title="Cve-2020-0182 Libexif: Out Of Bounds Read Due To A Missing Bounds Check In Exif_Entry_Get_Value Function In Exif-Entry.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4041-1</id><title>Openldap</title><description>Security Fix(es): 
* openldap: denial of service via nested boolean expressions in LDAP search filters (CVE-2020-12243)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openldap" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">45dd51741f681ba924741cc13c9c0e0679bee065ad86d33579ad269e37a8f7d1</sum></package><package arch="x86_64" name="openldap-servers" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-servers-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">d4202c530f9ecaa0524744cee78c5b2d4182d8174436a32df0a4c26b6ddafe82</sum></package><package arch="i686" name="openldap" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-2.4.44-22.el7.i686.rpm</filename><sum type="sha256">0bdc4ef73447eb751de5c1fd537d1a560a4def7f81efdac649e29ebc0a92960d</sum></package><package arch="x86_64" name="openldap-servers-sql" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-servers-sql-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">93e88fd229200c0a07889e9a1f8ef9311ed85a5374a49df5e98a602180bfc2e2</sum></package><package arch="i686" name="openldap-devel" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-22.el7.i686.rpm</filename><sum type="sha256">ddd4c977e73eef7016cf40ec711b5f0d4ff153510a2016a2f4c44a60c3e72e98</sum></package><package arch="x86_64" name="openldap-devel" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">14982fa0e7b07d91720de6da1a47f092ad681e504be3acee6afb76724318354f</sum></package><package arch="x86_64" name="openldap-clients" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-clients-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">26847425b742ad43c5306aeff209ff4bc2d782d60aa1ae17eda7b4c842a0a07f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243" id="CVE-2020-12243" title="Cve-2020-12243" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4041" id="RHSA-2020:4041-1" title="Rhsa-2020:4041-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1833535" id="1833535" title="Cve-2020-12243 Openldap: Denial Of Service Via Nested Boolean Expressions In Ldap Search Filters" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4060-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807) 
* kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551) 
* kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free (CVE-2018-20836) 
* kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454) 
* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-perf" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">05ee4ea7b278f80f4fd8ae40901116798482739f0c932197a3e8db62348a37c9</sum></package><package arch="x86_64" name="kernel-devel" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">e30ca60530716a375bf5876a5168948c6012e487b6dc5789630a41078a57052b</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">9bae0055d052e84412b1be2b219879ceff924b81efabb571f275a86555eed844</sum></package><package arch="x86_64" name="kernel-headers" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">e1d63994d9db669ec855e25f7f0eafb726996cc9e4e9a613f96474f93f55c4a4</sum></package><package arch="x86_64" name="bpftool" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">c5d517b5e094f8e519d19d1338c6ea8e051c2a5704a01c5d08861bace992e23f</sum></package><package arch="x86_64" name="perf" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">d71f3e601b0d37028d2d378a3ba7dafb0e2c58f5ebf72805c4e0b16b9d497e7c</sum></package><package arch="x86_64" name="kernel" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">7eb44887d89dd1c11abb325b3c8693be2cbcbb99e62c3c32d8db52d0ce483d8a</sum></package><package arch="noarch" name="kernel-doc" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.el7.noarch.rpm</filename><sum type="sha256">57077c9598b9fb2cd9c0742374e9169b29a3a9f26b469e7b3a7ba028c2777df4</sum></package><package arch="x86_64" name="kernel-tools" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">e0f769d0ffd95c24ffae5f1ed3470c7b5f52a009aea99b439db99e5cc12ff716</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-1160" release="290.sl7.1160" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>kmod-openafs-1.6-sl-1160-1.6.24-290.sl7.1160.x86_64.rpm</filename><sum type="sha256">2bc7a46865aef14d675e8485f1a1cbc0823b27f4e5dbf714890b3a0ee874e6ac</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">5a7407e03439617f377f9bab2077d86184aad3c92ce85dac7c6d5a62ba481196</sum></package><package arch="noarch" name="kmod-openafs-1.6-sl" release="1.SL79.el7" src="kmod-openafs-1.6-sl-1.6.24-1.SL79.el7.src.rpm" version="1.6.24"><filename>kmod-openafs-1.6-sl-1.6.24-1.SL79.el7.noarch.rpm</filename><sum type="sha256">477c073309fed9f6024465094de52dfaf0461607e3c0ff972e787a3f8b515e1f</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">198789134d8196e6d8f0c485712fc885c446140b5e915bccc870529c81e94806</sum></package><package arch="x86_64" name="kernel-debug" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">9df47dfc2aa200d4e3dd239dbc9fa4d8598d68d3f08b54ab340704d851964bb5</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.el7.noarch.rpm</filename><sum type="sha256">05ad8c8d7e419eba02a6ca3fe402f0c112510ebfd17aefa7e9f8866648f3ba90</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551" id="CVE-2017-18551" title="Cve-2017-18551" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836" id="CVE-2018-20836" title="Cve-2018-20836" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614" id="CVE-2019-12614" title="Cve-2019-12614" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217" id="CVE-2019-15217" title="Cve-2019-15217" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15807" id="CVE-2019-15807" title="Cve-2019-15807" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917" id="CVE-2019-15917" title="Cve-2019-15917" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231" id="CVE-2019-16231" title="Cve-2019-16231" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233" id="CVE-2019-16233" title="Cve-2019-16233" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994" id="CVE-2019-16994" title="Cve-2019-16994" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053" id="CVE-2019-17053" title="Cve-2019-17053" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808" id="CVE-2019-18808" title="Cve-2019-18808" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046" id="CVE-2019-19046" title="Cve-2019-19046" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055" id="CVE-2019-19055" title="Cve-2019-19055" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058" id="CVE-2019-19058" title="Cve-2019-19058" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059" id="CVE-2019-19059" title="Cve-2019-19059" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062" id="CVE-2019-19062" title="Cve-2019-19062" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063" id="CVE-2019-19063" title="Cve-2019-19063" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332" id="CVE-2019-19332" title="Cve-2019-19332" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447" id="CVE-2019-19447" title="Cve-2019-19447" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523" id="CVE-2019-19523" title="Cve-2019-19523" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524" id="CVE-2019-19524" title="Cve-2019-19524" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530" id="CVE-2019-19530" title="Cve-2019-19530" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534" id="CVE-2019-19534" title="Cve-2019-19534" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537" id="CVE-2019-19537" title="Cve-2019-19537" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767" id="CVE-2019-19767" title="Cve-2019-19767" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807" id="CVE-2019-19807" title="Cve-2019-19807" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054" id="CVE-2019-20054" title="Cve-2019-20054" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095" id="CVE-2019-20095" title="Cve-2019-20095" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636" id="CVE-2019-20636" title="Cve-2019-20636" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454" id="CVE-2019-9454" title="Cve-2019-9454" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458" id="CVE-2019-9458" title="Cve-2019-9458" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690" id="CVE-2020-10690" title="Cve-2020-10690" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" id="CVE-2020-10732" title="Cve-2020-10732" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10742" id="CVE-2020-10742" title="Cve-2020-10742" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" id="CVE-2020-10751" title="Cve-2020-10751" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942" id="CVE-2020-10942" title="Cve-2020-10942" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565" id="CVE-2020-11565" title="Cve-2020-11565" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770" id="CVE-2020-12770" title="Cve-2020-12770" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826" id="CVE-2020-12826" title="Cve-2020-12826" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305" id="CVE-2020-14305" title="Cve-2020-14305" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749" id="CVE-2020-1749" title="Cve-2020-1749" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732" id="CVE-2020-2732" title="Cve-2020-2732" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647" id="CVE-2020-8647" title="Cve-2020-8647" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649" id="CVE-2020-8649" title="Cve-2020-8649" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383" id="CVE-2020-9383" title="Cve-2020-9383" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4060" id="RHSA-2020:4060-1" title="Rhsa-2020:4060-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448750" id="1448750" title="Bug: Unable To Handle Kernel Paging Request At 0; Ip: [&lt;Ffffffffc05Ae76B&gt;] Nfsd4_Cb_Done+0X2B/0X310 [Nfsd]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1699402" id="1699402" title="Smallfile Caused Kernel Cephfs Crash In Rhocs (Openshift-On-Ceph)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1707796" id="1707796" title="Cve-2018-20836 Kernel: Race Condition In Smp_Task_Timedout() And Smp_Task_Done() In Drivers/Scsi/Libsas/Sas_Expander.C Leads To Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1718176" id="1718176" title="Cve-2019-12614 Kernel: Null Pointer Dereference In Dlpar_Parse_Cc_Property In Arch/Powerrc/Platforms/Pseries/Dlpar.C Causing Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724345" id="1724345" title="Mkfs.Xfs Hangs Issuing Discards" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1745528" id="1745528" title="Cve-2019-15217 Kernel: Null Pointer Dereference In Drivers/Media/Usb/Zr364Xx/Zr364Xx.C Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1747216" id="1747216" title="Cve-2019-15807 Kernel: Memory Leak In Drivers/Scsi/Libsas/Sas_Expander.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757368" id="1757368" title="Cve-2017-18551 Kernel: Out Of Bounds Write In Function I2C_Smbus_Xfer_Emulated In Drivers/I2C/I2C-Core-Smbus.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758242" id="1758242" title="Cve-2019-17053 Kernel: Unprivileged Users Able To Create Raw Sockets In Af_Ieee802154 Network Protocol" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758248" id="1758248" title="Kernel: Unprivileged Users Able To Create Raw Sockets In Af_Isdn  Network Protocol." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1759681" id="1759681" title="Cve-2019-16994 Kernel: Memory Leak In Sit_Init_Net() In Net/Ipv6/Sit.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760100" id="1760100" title="Cve-2019-15917 Kernel: Use-After-Free In Drivers/Bluetooth/Hci_Ldisc.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760310" id="1760310" title="Cve-2019-16231 Kernel: Null-Pointer Dereference In Drivers/Net/Fjes/Fjes_Main.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760420" id="1760420" title="Cve-2019-16233 Kernel: Null Pointer Dereference In Drivers/Scsi/Qla2Xxx/Qla_Os.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774988" id="1774988" title="Cve-2019-19046 Kernel: Denial Of Service In The __Ipmi_Bmc_Register() Function In Drivers/Char/Ipmi/Ipmi_Msghandler.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775015" id="1775015" title="Cve-2019-19063 Kernel: Two Memory Leaks In The Rtl_Usb_Probe() Function In Drivers/Net/Wireless/Realtek/Rtlwifi/Usb.C Allow For A Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775021" id="1775021" title="Cve-2019-19062 Kernel: Memory Leak In The Crypto_Report() Function In Crypto/Crypto_User_Base.C Allows For Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775042" id="1775042" title="Cve-2019-19059 Kernel: Multiple Memory Leaks In The Iwl_Pcie_Ctxt_Info_Gen3_Init() Function In Drivers/Net/Wireless/Intel/Iwlwifi/Pcie/Ctxt-Info-Gen3.C Allows For A Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775047" id="1775047" title="Cve-2019-19058 Kernel: A Memory Leak In The Alloc_Sgtable() Function In Drivers/Net/Wireless/Intel/Iwlwifi/Fw/Dbg.C Allows For A Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775074" id="1775074" title="Cve-2019-19055 Kernel: Memory Leak In The Nl80211_Get_Ftm_Responder_Stats() Function In Net/Wireless/Nl80211.C Allows Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777239" id="1777239" title="Unable To Exclude Files From Auditing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777418" id="1777418" title="Cve-2019-18808 Kernel: Memory Leak In Ccp_Run_Sha_Cmd() Function In Drivers/Crypto/Ccp/Ccp-Ops.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779594" id="1779594" title="Cve-2019-19332 Kernel: Kvm: Oob Memory Write Via Kvm_Dev_Ioctl_Get_Cpuid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781679" id="1781679" title="Cve-2019-19447 Kernel: Mounting A Crafted Ext4 Filesystem Image, Performing Some Operations, And Unmounting Can Lead To A Use-After-Free In Ext4_Put_Super In Fs/Ext4/Super.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783434" id="1783434" title="Cve-2019-19523 Kernel: Use-After-Free Caused By A Malicious Usb Device In The Drivers/Usb/Misc/Adutux.C Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783459" id="1783459" title="Cve-2019-19524 Kernel: A Malicious Usb Device In The Drivers/Input/Ff-Memless.C Leads To Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783518" id="1783518" title="Cve-2019-19530 Kernel: Use-After-Free Caused By A Malicious Usb Device In The Drivers/Usb/Class/Cdc-Acm.C Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783540" id="1783540" title="Cve-2019-19534 Kernel: Information Leak Bug Caused By A Malicious Usb Device In The Drivers/Net/Can/Usb/Peak_Usb/Pcan_Usb_Core.C Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783554" id="1783554" title="Fix Copy_File_Range Return Value In Case Of Same-File Copy On Nfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783561" id="1783561" title="Cve-2019-19537 Kernel: Race Condition Caused By A Malicious Usb Device In The Usb Character Device Driver Layer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1786078" id="1786078" title="Cve-2019-19807 Kernel: Use-After-Free In Sound/Core/Timer.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1786160" id="1786160" title="Cve-2019-19767 Kernel: Use-After-Free In __Ext4_Expand_Extra_Isize And Ext4_Xattr_Set_Entry Related To Fs/Ext4/Inode.C And Fs/Ext4/Super.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790063" id="1790063" title="Cve-2019-20054 Kernel: Null Pointer Dereference In Drop_Sysctl_Table() In Fs/Proc/Proc_Sysctl.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791954" id="1791954" title="Cve-2019-20095 Kernel: Memory Leak In Mwifiex_Tm_Cmd In Drivers/Net/Wireless/Marvell/Mwifiex/Cfg80211.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1802555" id="1802555" title="Cve-2020-8649 Kernel: Invalid Read Location In Vgacon_Invert_Region Function In Drivers/Video/Console/Vgacon.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1802563" id="1802563" title="Cve-2020-8647 Kernel: Out-Of-Bounds Read In In Vc_Do_Resize Function In Drivers/Tty/Vt/Vt.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1805135" id="1805135" title="Cve-2020-2732 Kernel: Kvm: Nvmx: L2 Guest May Trick The L0 Hypervisor To Access Sensitive L1 Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1809833" id="1809833" title="Cve-2020-1749 Kernel: Some Ipv6 Protocols Not Encrypted Over Ipsec Tunnel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1810685" id="1810685" title="Cve-2020-9383 Kernel: Out-Of-Bounds Read In Set_Fdc In Drivers/Block/Floppy.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817141" id="1817141" title="Cve-2020-10690 Kernel: Use-After-Free In Cdev_Put() When A Ptp Device Is Removed While It'S Chardev Is Open" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817718" id="1817718" title="Cve-2020-10942 Kernel: Vhost-Net: Stack Overflow In Get_Raw_Socket While Checking Sk_Family Field" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1818818" id="1818818" title="Cve-2019-9454 Kernel: Out Of Bounds Write In I2C Driver Leads To Local Escalation Of Privilege" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1819377" id="1819377" title="Cve-2019-9458 Kernel: Use After Free Due To Race Condition In The Video Driver Leads To Local Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1822077" id="1822077" title="Cve-2020-12826 Kernel: Possible To Send Arbitrary Signals To A Privileged (Suidroot) Parent Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824059" id="1824059" title="Cve-2019-20636 Kernel: Out-Of-Bounds Write Via Crafted Keycode Table" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824270" id="1824270" title="Cve-2020-10742 Kernel: Nfs Client Crash Due To Index Buffer Overflow During Direct Io Write Causing Kernel Panic [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824918" id="1824918" title="Cve-2020-11565 Kernel: Out-Of-Bounds Write In Mpol_Parse_Str Function In Mm/Mempolicy.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829662" id="1829662" title="Kernel Bug At Fs/Fscache/Operation.C:70! Fs-Cache: 4 == 5 Is False - Current State Is Fscache_Op_St_Complete But Should Be Fscache_Op_Cancelled In Fscache_Enqueue_Operation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1831399" id="1831399" title="Cve-2020-10732 Kernel: Uninitialized Kernel Data Leak In Userspace Coredumps" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1832332" id="1832332" title="&quot;[Sig-Network] Services Should Be Rejected When No Endpoints Exist&quot; Test Fails Frequently On Rhel7 Nodes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834845" id="1834845" title="Cve-2020-12770 Kernel: Sg_Write Function Lacks An Sg_Remove_Request Call In A Certain Failure Case" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835127" id="1835127" title="Cve-2020-10742 Kernel: Nfs Client Crash Due To Index Buffer Overflow During Direct Io Write Causing Kernel Panic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1839634" id="1839634" title="Cve-2020-10751 Kernel: Selinux Netlink Permission Check Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1845326" id="1845326" title="Libaio Is Returning Duplicate Events" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1850716" id="1850716" title="Cve-2020-14305 Kernel: Memory Corruption In Voice Over Ip Nf_Conntrack_H323 Module" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4072-1</id><title>Libcroco</title><description>Security Fix(es): 
* libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libcroco" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-0.6.12-6.el7_9.x86_64.rpm</filename><sum type="sha256">d87d08920dc0d6fc8115db1658235f5de735757dd37422431369a61fa249bc82</sum></package><package arch="i686" name="libcroco-devel" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-devel-0.6.12-6.el7_9.i686.rpm</filename><sum type="sha256">4b512395a6822fa76d4c0fbc4014b8f33e37eca0dd449e27b22c5393b5532837</sum></package><package arch="i686" name="libcroco" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-0.6.12-6.el7_9.i686.rpm</filename><sum type="sha256">4b4a8dbf07510cc58a5400f60b2f8e517bfe51567f1cb13fc26df73e19798391</sum></package><package arch="x86_64" name="libcroco-devel" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-devel-0.6.12-6.el7_9.x86_64.rpm</filename><sum type="sha256">bf8fdd5833f8236b37fe8bc05897aa99e052984c436bfda0351d38cc387973bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825" id="CVE-2020-12825" title="Cve-2020-12825" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4072" id="RHSA-2020:4072-1" title="Rhsa-2020:4072-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835377" id="1835377" title="Cve-2020-12825 Libcroco: Stack Overflow In Function Cr_Parser_Parse_Any_Core In Cr-Parser.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4076-1</id><title>Nss And Nspr</title><description>Security Fix(es): 
* nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) 
* nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) 
* nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) 
* nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) 
* nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) 
* nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) 
* nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) 
* nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) 
* nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) 
* nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-sysinit" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-sysinit-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">15a101e35a98f34fac1b771804494d4c6301eff549833e5e78786fb9feacc8ad</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-devel-3.53.1-1.el7_9.i686.rpm</filename><sum type="sha256">60683f92b2008461920e8aefda0a27b834a00c7faf48ecb927eaae4d44292177</sum></package><package arch="i686" name="nspr-devel" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-devel-4.25.0-2.el7_9.i686.rpm</filename><sum type="sha256">3fa4d956eae89cfce468432d9c19af7d360fe488c4e0e6f05e5afa2b9fbae8a1</sum></package><package arch="i686" name="nss-util" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-3.53.1-1.el7_9.i686.rpm</filename><sum type="sha256">9262d3904ffb913894939f0d81393714589b96d493ddba11f6ef0dbf62e79022</sum></package><package arch="x86_64" name="nspr" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-4.25.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">e08439dde765b18f4e224a91ae854eeae94dc7dc8f37a60fde90504ab233d7bf</sum></package><package arch="i686" name="nss-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-3.el7_9.i686.rpm</filename><sum type="sha256">0e0db7d4094860e358678dc2afd7975797eb597cee877b304953603ca2e2f5c5</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">6431e62f2f37e81f770ef6c16adf677c8d181bfbbd1a6751ab6852a3a42312ca</sum></package><package arch="i686" name="nss" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-3.el7_9.i686.rpm</filename><sum type="sha256">5dd111c183707e7ceb015f79188e924f397b034aca7c7d274b336cf993c68b2b</sum></package><package arch="i686" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">cae33d2ff8fd02ddf817a0b2ba3293d31b3d563276e4d274205aac710cd30c1b</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">25e1bf14fd9e2ace713eb7f595db1ee2e60d6099813d5f1fcd98a9970be276ac</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">cbcdecdc2c895a1b0fc34ae177210bbdc8a94f583f59e47c1c64b7f8db0c17b2</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">ce95acdf422ce3fc7b3662005438988b14f6bcd6195a429730e16d44bec1a098</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-devel-3.53.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">216d1def1e80a5867a486fb4d2412663739458dd2ad8b11039291f32e307265d</sum></package><package arch="i686" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">e96391c99b548cc3fe9f16fe843cfda2d20d5e6d39204401aafc0e1a5492f73f</sum></package><package arch="x86_64" name="nss-util" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-3.53.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">fc0d30529d44c6c4edd76892d8700f7f24074c3a0448172bc76bca0df143652c</sum></package><package arch="i686" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-devel-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">3f1b6bf28bb95723ac1c3e7ac8b0fba7c45bb42472b4fe44bef21aaa36b48fd5</sum></package><package arch="x86_64" name="nss" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">50faf714fa7d06ecc9cabcfa5e31bfdd489b5a6e1a18e20736f8575c128b032b</sum></package><package arch="x86_64" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">0d0cac5d697578932de17afb870c3df1b9c244b0d9b718a127079b18531b3487</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm</filename><sum type="sha256">5e12474924151c097b3f2bde740bbdd83c387afd02498a1baefc13829bb7cb75</sum></package><package arch="x86_64" name="nss-tools" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-tools-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">a1f9fa142ea8067c25ed2764b30e0e813ec4d1650d0fb278c73afc1f64fbc787</sum></package><package arch="x86_64" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">4875de4d0a8cda97d3e56860fbecd2284818e04a30520087d0f0e84fd958bce3</sum></package><package arch="x86_64" name="nspr-devel" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-devel-4.25.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">dc2cbeebe55c53402d9a5a92ec9bc3f0e479b8e5b26d2fb7ab73370586edd447</sum></package><package arch="i686" name="nspr" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-4.25.0-2.el7_9.i686.rpm</filename><sum type="sha256">b2a769c0f5a9bf9cd471371b1ce23fb1db144a7fd1e4147634136668b6fd9349</sum></package><package arch="x86_64" name="nss-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">4fdcf0080023ce61c49172ad09c2e9b10d47698b82a79433039d3ff87ce3f64d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756" id="CVE-2019-11756" title="Cve-2019-11756" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" id="CVE-2019-17006" title="Cve-2019-17006" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023" id="CVE-2019-17023" title="Cve-2019-17023" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400" id="CVE-2020-12400" title="Cve-2020-12400" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401" id="CVE-2020-12401" title="Cve-2020-12401" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" id="CVE-2020-12402" title="Cve-2020-12402" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403" id="CVE-2020-12403" title="Cve-2020-12403" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829" id="CVE-2020-6829" title="Cve-2020-6829" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4076" id="RHSA-2020:4076-1" title="Rhsa-2020:4076-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1688958" id="1688958" title="Memory Leak: Libcurl Leaks 120 Bytes On Each Connection [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724251" id="1724251" title="Make Tls 1.3 Work In Fips Mode [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728436" id="1728436" title="Cve-2019-11719 Nss: Out-Of-Bounds Read When Importing Curve25519 Private Key" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730988" id="1730988" title="Cve-2019-11727 Nss: Pkcs#1 V1.5 Signatures Can Be Used For Tls 1.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737910" id="1737910" title="Name Constraints Validation: Cn Treated As Dns Name Even When Syntactically Invalid As Dns Name [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774835" id="1774835" title="Cve-2019-11756 Nss: Use-After-Free In Sftk_Freesession Due To Improper Refcounting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775916" id="1775916" title="Cve-2019-17006 Nss: Check Length Of Inputs For Cryptographic Primitives" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779325" id="1779325" title="When Nss_Sdb_Use_Cache Not Set, After Curl Access Https, Dentry Increase But Never Released - Consider Alternative Algorithm For Benchmarking Access Call In Sdb_Measureaccess" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791225" id="1791225" title="Cve-2019-17023 Nss: Tls 1.3 Helloretryrequest Downgrade Request Sets Client Into Invalid State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1804015" id="1804015" title="Running Ipa-Backup Continuously Causes Httpd To Crash And Makes It Irrecoverable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1826187" id="1826187" title="Cve-2020-6829 Nss: Side Channel Attack On Ecdsa Signature Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1826231" id="1826231" title="Cve-2020-12402 Nss: Side Channel Vulnerabilities During Rsa Key Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1851294" id="1851294" title="Cve-2020-12401 Nss: Ecdsa Timing Attack Mitigation Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1853983" id="1853983" title="Cve-2020-12400 Nss: P-384 And P-521 Implementation Uses A Side-Channel Vulnerable Modular Inversion Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868931" id="1868931" title="Cve-2020-12403 Nss: Chacha20-Poly1305 Decryption With Undersized Tag Leads To Out-Of-Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1870885" id="1870885" title="Kdf-Self-Tests-Induced Changes For Nss In Rhel 7.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4079-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) 
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">cc234b4588abcd0ace2c803e27f48acda0fdbd096ca6f37c4165f7b9af872a60</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">780e0463b252a18a14de1b3be1627dfd4eff587bfe3e83a798a52422463cf1f4</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">8176a5ae74de01a8446831210e7e4ac7d83a5eafaa628b4e447fbf28d716ba63</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">6bbc2982e31448005f29f6958c4a3cf6103d542e2ae8395d4163eb14fe7cabf8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" id="CVE-2020-14364" title="Cve-2020-14364" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983" id="CVE-2020-1983" title="Cve-2020-1983" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4079" id="RHSA-2020:4079-1" title="Rhsa-2020:4079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829825" id="1829825" title="Cve-2020-1983 Qemu: Slirp: Use-After-Free In Ip_Reass() Function In Ip_Input.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869201" id="1869201" title="Cve-2020-14364 Qemu: Usb: Out-Of-Bounds R/W Access Issue While Processing Usb Packets" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4080-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) 
* Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (CVE-2020-12422) 
* Mozilla: X-Frame-Options bypass using object or embed tags (CVE-2020-15648) 
* Mozilla: Bypassing iframe sandbox when allowing popups (CVE-2020-15653) 
* Mozilla: Type confusion for special arguments in IonMonkey (CVE-2020-15656) 
* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) 
* Mozilla: Download origin spoofing via redirect (CVE-2020-15677) 
* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678) 
* Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process (CVE-2020-12424) 
* Mozilla: Out of bound read in Date.parse() (CVE-2020-12425) 
* Mozilla: Custom cursor can overlay user interface (CVE-2020-15654) 
* Mozilla: Overriding file type when saving to disk (CVE-2020-15658)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.3.0-1.el7_9.src.rpm" version="78.3.0"><filename>firefox-78.3.0-1.el7_9.i686.rpm</filename><sum type="sha256">60d7ccbae0fb2e7efd40487513ffa31855c8ffc70640fa40f3fc0632303be2fd</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.3.0-1.el7_9.src.rpm" version="78.3.0"><filename>firefox-78.3.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">d32524acf8d66c8f275ec8f19eac5c77f0c48f37d45eb3086f01118fa87a5862</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12422" id="CVE-2020-12422" title="Cve-2020-12422" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12424" id="CVE-2020-12424" title="Cve-2020-12424" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12425" id="CVE-2020-12425" title="Cve-2020-12425" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15648" id="CVE-2020-15648" title="Cve-2020-15648" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15653" id="CVE-2020-15653" title="Cve-2020-15653" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15654" id="CVE-2020-15654" title="Cve-2020-15654" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15656" id="CVE-2020-15656" title="Cve-2020-15656" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15658" id="CVE-2020-15658" title="Cve-2020-15658" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" id="CVE-2020-15673" title="Cve-2020-15673" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" id="CVE-2020-15676" title="Cve-2020-15676" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" id="CVE-2020-15677" title="Cve-2020-15677" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" id="CVE-2020-15678" title="Cve-2020-15678" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4080" id="RHSA-2020:4080-1" title="Rhsa-2020:4080-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861645" id="1861645" title="Cve-2020-15653 Mozilla: Bypassing Iframe Sandbox When Allowing Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861646" id="1861646" title="Cve-2020-15656 Mozilla: Type Confusion For Special Arguments In Ionmonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861647" id="1861647" title="Cve-2020-15658 Mozilla: Overriding File Type When Saving To Disk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861649" id="1861649" title="Cve-2020-15654 Mozilla: Custom Cursor Can Overlay User Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868842" id="1868842" title="Warnings Displayed When Removing Firefox Package [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872537" id="1872537" title="Cve-2020-15648 Mozilla: X-Frame-Options Bypass Using Object Or Embed Tags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872538" id="1872538" title="Cve-2020-12422 Mozilla: Integer Overflow In Nsjpegencoder::Emptyoutputbuffer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872539" id="1872539" title="Cve-2020-12424 Mozilla: Webrtc Permission Prompt Could Have Been Bypassed By A Compromised Content Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872540" id="1872540" title="Cve-2020-12425 Mozilla: Out Of Bound Read In Date.Parse()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881664" id="1881664" title="Cve-2020-15677 Mozilla: Download Origin Spoofing Via Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881665" id="1881665" title="Cve-2020-15676 Mozilla: Xss When Pasting Attacker-Controlled Data Into A Contenteditable Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881666" id="1881666" title="Cve-2020-15678 Mozilla: When Recursing Through Layers While Scrolling, An Iterator May Have Become Invalid, Resulting In A Potential Use-After-Free Scenario" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881667" id="1881667" title="Cve-2020-15673 Mozilla: Memory Safety Bugs Fixed In Firefox 81 And Firefox Esr 78.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4082-1</id><title>Squid</title><description>Security Fix(es): 
* squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) 
* squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) 
* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) 
* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) 
* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) 
* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) 
* squid: Improper input validation could result in a DoS (CVE-2020-24606)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.4" src="squid-3.5.20-17.el7_9.4.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.4.x86_64.rpm</filename><sum type="sha256">8b1a3a2a254b270fd04a7dd2f33021ff52c0e5a558ad766f1130305e0b5229c8</sum></package><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.4" src="squid-3.5.20-17.el7_9.4.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.4.x86_64.rpm</filename><sum type="sha256">ecd073112bc98e8306973eadf51161a824607ae734f6035cf67e1d6b648e4b1c</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.4" src="squid-3.5.20-17.el7_9.4.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.4.x86_64.rpm</filename><sum type="sha256">23e389475386958ead15f709c786b5aef35748f47648d7ef0fb23fcf0b218c67</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12528" id="CVE-2019-12528" title="Cve-2019-12528" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15049" id="CVE-2020-15049" title="Cve-2020-15049" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810" id="CVE-2020-15810" title="Cve-2020-15810" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811" id="CVE-2020-15811" title="Cve-2020-15811" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24606" id="CVE-2020-24606" title="Cve-2020-24606" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8449" id="CVE-2020-8449" title="Cve-2020-8449" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8450" id="CVE-2020-8450" title="Cve-2020-8450" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4082" id="RHSA-2020:4082-1" title="Rhsa-2020:4082-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798534" id="1798534" title="Cve-2019-12528 Squid: Information Disclosure Issue In Ftp Gateway" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798540" id="1798540" title="Cve-2020-8449 Squid: Improper Input Validation Issues In Http Request Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798552" id="1798552" title="Cve-2020-8450 Squid: Buffer Overflow In Reverse-Proxy Configurations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1852550" id="1852550" title="Cve-2020-15049 Squid: Request Smuggling And Poisoning Attack Against The Http Cache" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1871700" id="1871700" title="Cve-2020-15810 Squid: Http Request Smuggling Could Result In Cache Poisoning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1871702" id="1871702" title="Cve-2020-15811 Squid: Http Request Splitting Could Result In Cache Poisoning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1871705" id="1871705" title="Cve-2020-24606 Squid: Improper Input Validation Could Result In A Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4163-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) 
* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) 
* Mozilla: Download origin spoofing via redirect (CVE-2020-15677) 
* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.3.1-1.el7_9.src.rpm" version="78.3.1"><filename>thunderbird-78.3.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">8cb9469cd9c20428bd5bf8d36bc3fc27f29a59bb3479ebc96ab319f2ce2aabdb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4163" id="RHSA-2020:4163-1" title="Rhsa-2020:4163-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4187-1</id><title>Important: Spice And Spice-Gtk</title><description>The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol.

Security Fix(es):

* spice: multiple buffer overflow vulnerabilities in QUIC decoding code (CVE-2020-14355)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-server" release="9.el7_9.1" src="spice-0.14.0-9.el7_9.1.src.rpm" version="0.14.0"><filename>spice-server-0.14.0-9.el7_9.1.x86_64.rpm</filename><sum type="sha256">30ddab719cd3bda859be66754d7d019ffca626947b292b067a2a72dfe1a01a6d</sum></package><package arch="x86_64" name="spice-gtk3-vala" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-vala-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">262d414824db1a2bb0e8ee584ec73af35c3c7db6055033e89edc18aa4fd668a7</sum></package><package arch="x86_64" name="spice-glib-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-devel-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">5668c3958f2bd0877b5c7434b6ecb4978e0477f7a16563bb3bfa182819435de7</sum></package><package arch="i686" name="spice-glib-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-devel-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">6b893540268d67f008da133de195375193a3762a0d193247364e5d35047c66ce</sum></package><package arch="i686" name="spice-glib" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">9e0dabdc7afa3624b57a12126fc0ce4332d48a001957581c671df2452588e965</sum></package><package arch="x86_64" name="spice-gtk3-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-devel-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">f1e2dba59dec195d5ab66ee51017e2c82d0f693d1da1a486030708b353c79849</sum></package><package arch="x86_64" name="spice-gtk3" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">1d890fc3d9e7b196242546c79cfd32d16da1136b607656068dc6e494ae0432f1</sum></package><package arch="x86_64" name="spice-glib" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">27dac680038754a54a867169760f0bde6a9c0de366c074ba11a3316893bd5e83</sum></package><package arch="i686" name="spice-gtk3" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">2ff0e30297f5cc7bad06deabaf27e3f4358401c3cdb42dfefd2a15d7389efe5a</sum></package><package arch="i686" name="spice-gtk3-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-devel-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">ad0df4223041cd1c29b64383f16fc2695653d6501c31ecb9bd9dce0994238855</sum></package><package arch="x86_64" name="spice-gtk-tools" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk-tools-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">a689d51b6ae85dbbd313c4dd9733e45ab054009104bfd8cdd4f53ddfabe8f7d0</sum></package><package arch="x86_64" name="spice-server-devel" release="9.el7_9.1" src="spice-0.14.0-9.el7_9.1.src.rpm" version="0.14.0"><filename>spice-server-devel-0.14.0-9.el7_9.1.x86_64.rpm</filename><sum type="sha256">2b766e8ccc48003a1738820137238bc972b83cc48a6c1295d680c105fd7a51ad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355" id="CVE-2020-14355" title="Cve-2020-14355" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4187" id="RHSA-2020:4187-1" title="Rhsa-2020:4187-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868435" id="1868435" title="Cve-2020-14355 Spice: Multiple Buffer Overflow Vulnerabilities In Quic Decoding Code" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4276-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351) 
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bpftool" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">47cc98d79612c44ee4c50be036ff1202c827bacc377befbbe255b5e964fe5134</sum></package><package arch="noarch" name="kernel-doc" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.2.2.el7.noarch.rpm</filename><sum type="sha256">727a63e696b987d5633e3b1f12ac7506e0e6c8de8afa32f85e45451effb2aff2</sum></package><package arch="x86_64" name="kernel-headers" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">da5331ece8f1ff9c937d00d93ec8c1c92274df24d1e7b195011c9bacea3a120a</sum></package><package arch="x86_64" name="kernel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">6c14fb888501068824f2ed38908bb795a5dced8da3ca3a110e10b291b79084b2</sum></package><package arch="x86_64" name="python-perf" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">0dc203103a8e108ebd3e9035912ca0c3c036b2495e563b21611cae6ce04b9ae1</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">243e81730c77eecf1958dcee6298e81ed0a91814ebcc940f777ac975caac5142</sum></package><package arch="x86_64" name="kernel-devel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">e6af572c94419b586d36fa4592d7f067100928b0977cab2367d22cdaa053678e</sum></package><package arch="x86_64" name="perf" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">4f8c8280a6df9babc06d5b037f4e9892dd15a5814df3794afeebae843de1661e</sum></package><package arch="x86_64" name="kernel-tools" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">222d55b53701eb15e5f6faff4c9efbb061f6c50214ccab31f16c010eb3cc958a</sum></package><package arch="x86_64" name="kernel-debug" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">95227e1a8230974169c9b94c54634753c92c01eff32a5387731e006b4dceb4f8</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">8fc5c8d4c4b9c8824a39c471e5b7b1a7f2fbb955875cb93ee8ae5f2aa389bdb9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.2.2.el7.noarch.rpm</filename><sum type="sha256">7a19019424a7b2bb7896b09adcc4e479eb6d809b7efff3d1e9387fa579f96b3f</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">545d852acb5f838546dd9015a7c2dda4a03847b8fd77d35373ccbfd1ee6c50ef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4276" id="RHSA-2020:4276-1" title="Rhsa-2020:4276-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4307-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) 
* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) 
* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) 
* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) 
* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) 
* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) 
* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-static-libs-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">7773fe9ab00a5e8c1fa37599c574b80af7c1ee660b6c99e28a71207d48ced107</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">785df6e2691fd683771687fa700cff34019c9eb04cb47b8889d6ac893bb37be1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">dfdba17e9f0906b0f52585265c332e327a2a82f69723e8751c5d44cb735adb16</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">4bf919398968b3130277688dc7cfcfa05884ff3075f03a968b2483ee714a7a92</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">27f5b0fbd8d539fab8c1a4ea03126541add9095f6eb6a5117f17e91a5e89b81f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">fce83dfde7f0630f6f930fbd5397f0bed2fb0aa112ad8a717766dfe72382a090</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">00d0710ee0f2d7fb402b45cc52980e660c7fd3c073124f5ab8d5a8c8fa1c05d2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">7aaee6e13b69540fa095cf098931f029d21869f2f620cf21b8e04d1ffb78126d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">b357ecf4582909f59a3c364cc226ee82afe3b3a1ff6f4640abd93163eabf7b9b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">a00bf0b70968ee49ec3a963c94ad6ae7e3aec54b16592b9af8a7b6aae4165507</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">e454ea47a65bf2a519a48a11562b81125f4879bea34a5a8f3f06a7ad1fc4dca5</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">fd1c5e53b94b26df626a313c7db3b0c152f8ce9de178876b29ab259269b42341</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">7646e5a15007012257dae0968a551100a2a1097760531d183b8028a02d41ea5a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">6d036817e9eff8bd9ab8b2c6579e62b1bd65e5d6deb3e63e7fcb1ac58d17f54d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">d62dc9f69a52e7342d29a506d12f244ff1ed71c35bb9d98e9463b80896699839</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">843c4d95590a7a3f422307ecad5a20705513c70ea54d3c384ba0499e4423bb80</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">a34d858422fd29ddaeca302b07a4ae044c1df031e7fbdd9e85d80405ebd3d84e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">14b2f5753b2aaa759ab0f96933f8ce6e26c91b6edd91a5545d3a2dd3ad39490a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">d6208d100a97ed19eecc9f95cca5ce4d7f635c6c4caff6805a86b34dfde8bad6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">980fdd5684afb67ba596416cd0ddb2883f0957474269e36b86e5063a43855b6f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">3c57bd28c1411992c646173d8a33781d72a541ea82d98483398fef0793276115</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">c7c73df4d3bf0a3af20c68f89b944f55df8ac09ab84cb4c16c5e4b53cfe48317</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">927bcc99f1a34ca8fa03cdcd6e6adacc2443d4d20ed3a66350d6f330620c64ed</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">8996bc1bf68f25eacd32125341f0fd1650b6e1ba3a7d482c77bb348c58f2a45d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">9463ccd7aefcf1ab73ae5fe04106befaeef8b28a0366ba35b2d03dc604f29bbd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">f996fcb1bae7301ace4b33f230c7237d608983c1b357c30b92596293af396be9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-static-libs-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">290b0863990ac66b00fb4083c4fa0cd5652aa7dd425b6d7d0125f55add12540b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">7406a9cbd48f8589fe8d021f10a10e13087b1d25ba804f38899e45af24af7648</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">cf2e2b4b7d6b2a08ececc865b2db978d4c8ac3e5ab27bc1bdbb22628d6badc00</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">75b390535e29603b8704b9f7a10850d6ec91bb8513c78638bf71dac9dd29c4b0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">60c79a1a8ead07a961e19e44366f566b078c1e072ed131ca67b8fb8e4c449df0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">976242e401e45c3996fceab5cdac2d634b5b8fe950e37f1702b881557951ef71</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">2dea15a7b85e8b1588d2903733f00dcc9f960170d0e46d94cbb178e847b5205f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">8f33384eb89293e170cc12a5699a793ea71f7d2bd7b116da06375d6a8062449d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4307" id="RHSA-2020:4307-1" title="Rhsa-2020:4307-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4310-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) 
* chromium-browser: Use after free in WebRTC (CVE-2020-15969)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.4.0-1.el7_9.src.rpm" version="78.4.0"><filename>firefox-78.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">0f7cecb12ce176dfe68f58e23a8658f885e895967d328d6dddf495a467874d40</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.4.0-1.el7_9.src.rpm" version="78.4.0"><filename>firefox-78.4.0-1.el7_9.i686.rpm</filename><sum type="sha256">5368bac75f97a694f3d50cc99544bb65499f5d8bc09af1b0212e2a7b49b5590d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4310" id="RHSA-2020:4310-1" title="Rhsa-2020:4310-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4350-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) 
* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) 
* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) 
* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) 
* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) 
* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) 
* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">84315cb088343d080c977e86a915e6409155b31470e1dd809df045148936bf74</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">8e53e8a1970a57d292b99eafb9991e560ec8637365609a3beee02c75712490d3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">19c42b5702f1772fb858a7dd625a9b7b25ae36a5a446343251b25d688f52344e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">291c256aaa593a5b2fadc2c71892cc2cfd49cac62877de65c4d7333d6d1e2766</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">11da3b9851328b21be471ff58700b9b2f5bd82687423bb4aeff49ad5fe74bde7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">23e32a42c36201c41a19045602fe6a68c373dc8a114ceea2847e3ff69c95af67</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">1aa199552998d535623ef176edb0599d6e3ce6ea5c2b304c46e91633ca9c42dd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">427823d292ddc2e1912dbc3efd235617a03bcc39f55eb6ab6c73999879440526</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">0166f48d73f52d1b4960002169d5fdc6a3bc2dee12fb8cd565131982b16df6ac</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">de17e98792cf998ea57892d253aa9a014d87b676323cb00ffe23ffc808a855c1</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">2fff35aad1f8f8087da29e944b74e864cf77a51390c4b6a8da086ea967ffb7dd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">3e2f48307168177298cebba77c02b2add7e979bb11604f1884e6ac3e5c7ae81b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">75a2baf703633777a09a0843420f231b218fb5ccf667034b9217546011a5f1f4</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">e6a43a8ce33d46f21008e0f57a5e9274718a5846f796b6fd574fd749ad0cd256</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">e4ff55c6a3974510ed0d5a27e453efe217672a67b02dcaf63899407789e101aa</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">9652581e291a509533b2e4ee788ace94e553dbaaeee77f9bea281899d9280f6b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">cb363849f85f163f11d69c5721b4171bae4f79393951dd15de33b722872d9d0c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">944ae8a673c37a87563b11c7a02b258b99e4ee270605ef31999f3e742fa7b203</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">f69ec149f70f7f866239649eb6f5c5a4c0b8fd826fc431f07b08aa8d93a3c054</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">c32d7e9e4972acc71800876a40238760a778cca2fb2c037511180e03720602c8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">5f035231f2a2dfb229860b0c91dac5dc62d9fe8e22f095fc467d08875dc80a5f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">d16c13b69c6aa06ee4183431a1edeb59292c109ae4c060ae4ad634d8edca96e3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">daaa6fd0a3d4bacf1db37e863d92ecee085d896317a68639f52ed55426d1581c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">42bf03a22cc2276874f1429ebc2578e1c28675d80ff51a26adcfca2400c960fc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">ccb82da1647e57bbc6d08fdc599b42fd105616c8daa1899f3729ea126caa883a</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">9a8f96cf3e2853d9be82443633e43a8e6e6272b20a9c2d38fbb40f4621c941a5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">787f313e98da032ef62f0dfb22807715b5919725bb31240e48f28826aeb1b884</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">4b751ddb7f6a4e3be1a7475be83045a254e457b2320ef35a477e8aa79e0c7eef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4350" id="RHSA-2020:4350-1" title="Rhsa-2020:4350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4907-1</id><title>Freetype</title><description>Security Fix(es): 
* freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png (CVE-2020-15999)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freetype-demos" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-demos-2.8-14.el7_9.1.x86_64.rpm</filename><sum type="sha256">4bfcf2c7e50e92c1f2d9409f26c5831b3896ec5ce1f8e47ffa61da84870812b6</sum></package><package arch="i686" name="freetype" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-2.8-14.el7_9.1.i686.rpm</filename><sum type="sha256">856e5771864d72fc764d1a8042323f58fa6a121257e801239a8283d4034dd58c</sum></package><package arch="x86_64" name="freetype-devel" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-devel-2.8-14.el7_9.1.x86_64.rpm</filename><sum type="sha256">a55d3145c81d7f556319415342886d99a289c7a2c055ff488a8e8ec4eaeb56c3</sum></package><package arch="x86_64" name="freetype" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-2.8-14.el7_9.1.x86_64.rpm</filename><sum type="sha256">0a2506c221bec596a80aac2b5f9956724acd36ff358e33a36d7a72ab9028ed34</sum></package><package arch="i686" name="freetype-devel" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-devel-2.8-14.el7_9.1.i686.rpm</filename><sum type="sha256">b490be3e3b925087ecd0ba1133a0fb1f6d84b413a04d69e80a0a3c4040a6d12c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4907" id="RHSA-2020:4907-1" title="Rhsa-2020:4907-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4908-1</id><title>Libx11</title><description>Security Fix(es): 
* libX11: integer overflow leads to double free in locale handling (CVE-2020-14363)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libX11" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">6e8e14ca7f672249ccf93b21f9a05353d9f869e8c9e82c21e193d279eacf068d</sum></package><package arch="x86_64" name="libX11-devel" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">f19a029ec329dc1e1243c645ea26b5a7f62dabf74c5b549969d58b13561ffacd</sum></package><package arch="i686" name="libX11-devel" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-3.el7_9.i686.rpm</filename><sum type="sha256">1dde8930cae65481b398449efa31c5cfb59d23826f5fa96d9e52cb282f70b99f</sum></package><package arch="noarch" name="libX11-common" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-common-1.6.7-3.el7_9.noarch.rpm</filename><sum type="sha256">381c93461e119984e0434b571d08714051e8aa858e2e2094b1bf2d0d1edc6d75</sum></package><package arch="i686" name="libX11" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-3.el7_9.i686.rpm</filename><sum type="sha256">fafea10ff0634bedb1da4a7f7bd5dc1d0ac3b3d282e8c0db6348a5cc6311c657</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4908" id="RHSA-2020:4908-1" title="Rhsa-2020:4908-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4909-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) 
* chromium-browser: Use after free in WebRTC (CVE-2020-15969)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.4.0-1.el7_9.src.rpm" version="78.4.0"><filename>thunderbird-78.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">25bc3fd79765278178210c5f457310376fb4fdc89b63a3716d1622c585ef860f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4909" id="RHSA-2020:4909-1" title="Rhsa-2020:4909-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4910-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) 
* xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) 
* xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) 
* xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xvfb" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">f6838ab4d46d3054257b828a7aa09da6f020cb48bf424014e1be418934f66c74</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">59a891a6804e0ea057830bf640a4a7e10fd3488c6fd198af5ff0ccaa60ebafdb</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">5b1c4f1a7d447b4905e86e7f92cc9afe83d803cadacd5e87d2e0cbf650f0f8d9</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">09033bb3f0b3195c416ec4fd68f5def0470d5a45fb96b8ac599fcf8db93c9ec5</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">e030ba439f9e18e27c1304a0037acde04069f35196f4d1edcb1e520ebb5b9a56</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">9ebc5b0228dc8be2571033eb26e2cb3cee0ac8bb36f72b7366734efbf3c25748</sum></package><package arch="noarch" name="xorg-x11-server-source" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-12.el7_9.noarch.rpm</filename><sum type="sha256">a61f91a5c7e074ebe99958241cf0e74824ed077b38d3eed8ce45ade8cd175ae6</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">10e5862388d8b6540d5d679da3bdd3164dcfd8bf2f7719cdbabb6921943bc62b</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">36769b74f79e05de43a4c183a16bcd665b4d5c8e9015f7bcebdbfbbd472521c7</sum></package><package arch="i686" name="xorg-x11-server-devel" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-12.el7_9.i686.rpm</filename><sum type="sha256">91ea49af08c78dbd43a08054b978fc8c15fed8ff793db9324e1388e9f68989d4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4910" id="RHSA-2020:4910-1" title="Rhsa-2020:4910-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5002-1</id><title>Curl</title><description /><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="curl" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>curl-7.29.0-59.el7_9.1.x86_64.rpm</filename><sum type="sha256">ba54d7541f99b9c1b96d3b33b9c2e18d90849d7cb66887cc3a1bc986b7c7f482</sum></package><package arch="i686" name="libcurl-devel" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.1.i686.rpm</filename><sum type="sha256">5807aead12a31810010e2917c43ef8bc265f212fb924fb1601e9ccf1704807d8</sum></package><package arch="i686" name="libcurl" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.1.i686.rpm</filename><sum type="sha256">a1e0db291e8a9c734565c398e9a27b6c860183f135ea3a9d7cc5c228584dd083</sum></package><package arch="x86_64" name="libcurl" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.1.x86_64.rpm</filename><sum type="sha256">10d4a066a84d6742cd80208aa0113d24ee91fa5f9920eb44afb28547ed632f79</sum></package><package arch="x86_64" name="libcurl-devel" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.1.x86_64.rpm</filename><sum type="sha256">498795c1e33bc252ef6ba34b65cae08deff1823ffc0ba48263b049e343cea197</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177" id="CVE-2020-8177" title="Cve-2020-8177" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5002" id="RHSA-2020:5002-1" title="Rhsa-2020:5002-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1847915" id="1847915" title="Cve-2020-8177 Curl: Incorrect Argument Check Can Allow Remote Servers To Overwrite Local Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5003-1</id><title>Fence-Agents</title><description /><severity>low</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="fence-agents-amt-ws" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-amt-ws-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">19c1b59f34566a07a680e1125699a5601016c4f319a0b75705d98377c2492973</sum></package><package arch="x86_64" name="fence-agents-brocade" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-brocade-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">f02e59eb643f3e54fc7b389da7546ae132453de6cacbde4abbd99385e56ea2e5</sum></package><package arch="x86_64" name="fence-agents-heuristics-ping" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-heuristics-ping-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">94d69c86f62a895488c9b506d6f5cfae82631017a45cb41c0ca9c35c8e1d215a</sum></package><package arch="x86_64" name="fence-agents-aws" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-aws-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">625fa195bf09fd0b2ff93c606f5a10b4b48607c4e7c658eef69c693e2a4349ad</sum></package><package arch="x86_64" name="fence-agents-ifmib" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ifmib-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">f8f38967fe30cdad7aad67901ffaa6bf47b8469b46d6c0e1e3d11aaf7afee7b8</sum></package><package arch="x86_64" name="fence-agents-apc-snmp" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-apc-snmp-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">5a6ed6aaba21a98dcdd9f4401143fc147a0c989312f25d7cbe1db6834b413402</sum></package><package arch="x86_64" name="fence-agents-cisco-ucs" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-cisco-ucs-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">e80734486c4d4890d8320ff21ae677068bca71fe5fe2ba91ff0f5829b4940c1c</sum></package><package arch="x86_64" name="fence-agents-ipmilan" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ipmilan-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">ecf3927df5579f5a536b62f71366d279a3915439e331cd613df65b75c8a8ceed</sum></package><package arch="x86_64" name="fence-agents-emerson" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-emerson-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">93e973edf16a36d9dce880b159f61ff25e2e8ec26970ea2a50ddf29bc65f9b54</sum></package><package arch="x86_64" name="fence-agents-eaton-snmp" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-eaton-snmp-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">87cf4a8df3796539e14f2e45e097ddff5962023dab57efce4dae747dc8706a87</sum></package><package arch="x86_64" name="fence-agents-bladecenter" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-bladecenter-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">97effd14d1127ea087f512a63b22ed75bec9dc9b3cc841f314ffca633bd5a723</sum></package><package arch="x86_64" name="fence-agents-ipdu" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ipdu-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">06e39bab1ee277ae744255675cfbb44271fd3f3c903323f1a0917f1f7c322f14</sum></package><package arch="x86_64" name="fence-agents-ilo-mp" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo-mp-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">9d8ff4d2b0dd185e45ba025d522050a6642a47d963f089b3d899c3e757e15ec8</sum></package><package arch="x86_64" name="fence-agents-eps" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-eps-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">acda91e12e2d0ac30de4dcf54773de27a5ddf0d8d2c59ac643733ef5d7d0d725</sum></package><package arch="x86_64" name="fence-agents-compute" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-compute-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">b1a61cc6f553521b7e4e4056b66462718b8e5b59466f1ea3d18c75603bad5cfc</sum></package><package arch="x86_64" name="fence-agents-hpblade" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-hpblade-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">21d3e84059bb8d99d386f4e742374915338e840d53b783e2f45c5bca9fd43138</sum></package><package arch="x86_64" name="fence-agents-cisco-mds" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-cisco-mds-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">02a116fb8545da6c0b78a4c1122e6aa029ed2baded2336a6539bd3744f282103</sum></package><package arch="x86_64" name="fence-agents-aliyun" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-aliyun-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">decc5ac47e2f630fffdbb821ca6ebf7b38269bbae0565bb8410589351ba59a31</sum></package><package arch="x86_64" name="fence-agents-azure-arm" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-azure-arm-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">1d8b493c7e010d1bebcde306db5209fddc3e122f7ef2ac1332d13fd044061e9e</sum></package><package arch="x86_64" name="fence-agents-gce" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-gce-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">6d650ff5a7bc1d93d552eed702fb8ff4af0e255a6e012e1ddb3971204bc91755</sum></package><package arch="x86_64" name="fence-agents-redfish" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-redfish-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">07122c2fadde5f1434def7ae61dd0550c73eb7309b3f87b309c0a2991b14b217</sum></package><package arch="x86_64" name="fence-agents-vmware-soap" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-vmware-soap-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">afac04d76ee59901927a64348eb93e4ea0c48a164cc0e2029847e8b26edc0ddc</sum></package><package arch="x86_64" name="fence-agents-kdump" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-kdump-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">8d6a4bc8e0c2082f7bb2fc692d41ccd385925ae94b94fe095591a846c940c7ce</sum></package><package arch="x86_64" name="fence-agents-rhevm" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-rhevm-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">798e4abc8535513ab7c780003067d0d787535100f412f57adad927899771c7c9</sum></package><package arch="x86_64" name="fence-agents-rsa" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-rsa-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">891ca7ba40226f9600a88b4c203b435de729c7aad318c3d08794bf769091c792</sum></package><package arch="x86_64" name="fence-agents-intelmodular" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-intelmodular-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">9d4cf92a8bd0efc8af62ffa59e709ac8ea92a414e65d08dcb1915cae96da714f</sum></package><package arch="x86_64" name="fence-agents-scsi" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-scsi-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">17c615fffd7a175d4158fe6c35728dd9b713c112f9e99529fc0708769b90fb70</sum></package><package arch="x86_64" name="fence-agents-ilo-moonshot" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo-moonshot-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">7a5a2b4de31ed4b73eb64ea6166a28dca4bc14a5a6ed7d2ac80c8d1e5e18260a</sum></package><package arch="x86_64" name="fence-agents-common" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-common-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">3113ef7fa8701385c7a5c6f61e717ac7835c22d5799875b014af41ab19820f98</sum></package><package arch="x86_64" name="fence-agents-wti" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-wti-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">c68f45aa1282b59a0f376da3c37f2f012d3bae05ea7c9c38c304b04359cb989e</sum></package><package arch="x86_64" name="fence-agents-sbd" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-sbd-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">7d1d59df509363d91c0363179db6fcc242c229a2d617512faad157605bb5b391</sum></package><package arch="x86_64" name="fence-agents-drac5" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-drac5-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">39f494fb8d21bdde0e273d8a4c3110f811ba071cf2e9bb1a137ff0bc70799f05</sum></package><package arch="x86_64" name="fence-agents-mpath" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-mpath-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">77d14651c7a89a3873fcb841320bc6c4f37aa9bbcb4b118c292899eb16afad4b</sum></package><package arch="x86_64" name="fence-agents-all" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-all-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">af1d5dde503828705086ed1cfd537bafb76e83b568ad1063e3ae8374cbe99153</sum></package><package arch="x86_64" name="fence-agents-rsb" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-rsb-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">b4ddaf6fcca6625e8b557cd3c7de1d0a230f23a22a0888d793ab0b0ebf9dbb48</sum></package><package arch="x86_64" name="fence-agents-ilo-ssh" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo-ssh-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">57abe5040417b44ca1df4883b214df169899cfd1775a2d76c76389f600741506</sum></package><package arch="x86_64" name="fence-agents-ibmblade" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ibmblade-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">c3cf909e55970318c1441c421986aace5355b213f0f27fd605c1929384f6d03c</sum></package><package arch="x86_64" name="fence-agents-lpar" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-lpar-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">b268844e144424fb2899eb26e623c12278f50a473077c04f46012cb21459cc7d</sum></package><package arch="x86_64" name="fence-agents-vmware-rest" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-vmware-rest-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">9cfec09f827118a1a090fd807df6f879dc8c0c728d097cdc1c32225d4d967a25</sum></package><package arch="x86_64" name="fence-agents-virsh" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-virsh-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">68430c1c9dd9c303ef148a63c8ae963e773a7baad7617607883d068bb71d43a7</sum></package><package arch="x86_64" name="fence-agents-ilo2" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo2-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">41ee415447647eed027bb185416b14ded13e68e705ac15690df996d2d3c48084</sum></package><package arch="x86_64" name="fence-agents-apc" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-apc-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">8d62c1b3065122e397a7cb931437908eee8860e1f8174171619a6fa1c01fe69d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11078" id="CVE-2020-11078" title="Cve-2020-11078" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5003" id="RHSA-2020:5003-1" title="Rhsa-2020:5003-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1845937" id="1845937" title="Cve-2020-11078 Python-Httplib2: Crlf Injection Via An Attacker Controlled Unescaped Part Of Uri For Httplib2.Http.Request Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1860545" id="1860545" title="Fence_Lpar: Long Username, Hmc Hostname, Or Managed System Name Causes Failures [Rhel 7] [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862024" id="1862024" title="Instanceha Does Not Evacuate Instances Created With Private Flavor In Tenant Project (Rhel7)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5004-1</id><title>Resource-Agents</title><description /><severity>low</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="resource-agents-aliyun" release="61.el7_9.4" src="resource-agents-4.1.1-61.el7_9.4.src.rpm" version="4.1.1"><filename>resource-agents-aliyun-4.1.1-61.el7_9.4.x86_64.rpm</filename><sum type="sha256">6741e110d07ae95142ad9c8ae7ce0b4ee1d84fa4d443de2263c0efffc0faea0a</sum></package><package arch="x86_64" name="resource-agents-gcp" release="61.el7_9.4" src="resource-agents-4.1.1-61.el7_9.4.src.rpm" version="4.1.1"><filename>resource-agents-gcp-4.1.1-61.el7_9.4.x86_64.rpm</filename><sum type="sha256">24113aaad452a826353ff1a9bb70cd501196a5e195fb1af3a339e6cbd1ab0329</sum></package><package arch="x86_64" name="resource-agents" release="61.el7_9.4" src="resource-agents-4.1.1-61.el7_9.4.src.rpm" version="4.1.1"><filename>resource-agents-4.1.1-61.el7_9.4.x86_64.rpm</filename><sum type="sha256">c655d13e0a6b3232dcb85372644ad9a0e41bd2b42ba00a1ed919d79f31a588f4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5004" id="RHSA-2020:5004-1" title="Rhsa-2020:5004-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5009-1</id><title>Python</title><description>Security Fix(es): 
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">4e752d78be10a3150e118f067de4a2c1741192fa3a1b1ccccc7cacb2a1d55ada</sum></package><package arch="x86_64" name="python-devel" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">6fb703ebfb6d07fc86aee57f61ebab154a48b3392f9099feb0f862c34dc60570</sum></package><package arch="x86_64" name="tkinter" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">d3887158f3657a31a93bb8a42b504368e58bd61a76a727d1c5d849cd123e8362</sum></package><package arch="x86_64" name="python-test" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">8d4fbc682f98395e2a3b2bd59bfdbc00148c0046f3a93674ef17515ecbd500de</sum></package><package arch="x86_64" name="python-libs" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">fbe061a1f6a0f7e4c2c206db5a149e0fbf9a5e07101a22c47f5850913cd6b10c</sum></package><package arch="x86_64" name="python-tools" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">028b8c625d2bbbc8ddba8669893ce2244b9c34d746b9cd2a11d853ff0de8a2c8</sum></package><package arch="i686" name="python-libs" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-90.el7.i686.rpm</filename><sum type="sha256">2a375c1e3a4738e095ec03be404443859dd6b779f5e580b5bc1eaf005734c925</sum></package><package arch="x86_64" name="python-debug" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">c2ff66a4cfe90e016335af67c6f9119b924f27fc10d839788bef5b13de7db1a3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5009" id="RHSA-2020:5009-1" title="Rhsa-2020:5009-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5010-1</id><title>Python3</title><description>Security Fix(es): 
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) 
* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="python3-libs" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">a7660e2a2f3125d61888433e08d9b119eabfbfee7814b5956f641daaac3d16e7</sum></package><package arch="x86_64" name="python3-devel" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">43aa3c0434b1412eae7822f4051ba310a53d1c3096d9758d21ff6652fbeadcc9</sum></package><package arch="x86_64" name="python3-tkinter" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">e10cafc4bd4ff0c1a0ddbf36d5c7fc9446fafa85804e1ae63c8410cfe65822f2</sum></package><package arch="i686" name="python3-tkinter" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">317fd91d642bdf926eca2d224aec7b948873ca9f78379436fb32cd2d01ac63d4</sum></package><package arch="x86_64" name="python3-debug" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">c533139272942d0922d04eb19a99e44fde769aa9f76a93c0cdfa8d9fa1497d37</sum></package><package arch="x86_64" name="python3-libs" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">17b2a06a86a63c0a24c38aca3f59357bb05f561bb409f13c8092423c0084f60b</sum></package><package arch="i686" name="python3-idle" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">a59689e48b4c5506ac5031f9d6a3c4f529576283504531c5c70e9439a8cf2d9f</sum></package><package arch="i686" name="python3-devel" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">38bfd095c97c53712cd65a01f6ec085a53ec6a7b043fad17da3a850a0584aeb8</sum></package><package arch="x86_64" name="python3" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">16d6911fd5e4e2d70be8d42e87fb416477baff5c313c3e251f010af76df67b49</sum></package><package arch="i686" name="python3-test" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">87478d3ab6ff72a3be98c75fcf0cf08a0668c71e8d030671ebeb7579ff5bfa7f</sum></package><package arch="x86_64" name="python3-test" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">1d09983f1cf741814abec6324ed5c1e8aff39a249e854538ac774ce447973e9a</sum></package><package arch="i686" name="python3-debug" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">aed68cdc24710bf3087d20dc03abb64dbff1a5fbd9d7fa002637558108e158a7</sum></package><package arch="i686" name="python3" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">7f812c3e6f365f2e84fdbac137a6976e42f0f3a5f5c1b5fa95aed1c0a784bb15</sum></package><package arch="x86_64" name="python3-idle" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">8d4219b8ff1bc224f28bd8ad7d6bfc5c993aead45dcda9bdb2364414a3984cf0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5010" id="RHSA-2020:5010-1" title="Rhsa-2020:5010-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5011-1</id><title>Bind</title><description /><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">6e55a724a60ef42a4e13b4bd0f32a3abf34323df4958482ae7662740d6d223bb</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">aac0b90e4609b7004d2027c64a3e27da3b92969c8fbad97d0d053f41f8cac10d</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">d473992a2a6512f6bd697e4200b71804f572691556f4c398170305cc7ec4223c</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">caea82264b0e1e6c343dccf95cc52f257fed2e135b0e15d4d3e5defbc810f433</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">ed3d5cbf0009188355cb6fe08fa821cb0bb6013b6b2f560c3c28a6053f4fc0b7</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">601f32234eb3bc2aaaa8c34b7b814bca3974368c5bcd14b3b20e3391075fc37e</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">f209b01442c24e01c0dbf9b26af008c58b811c96f758b2e58db3985146b10a63</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">568c85d08f58ab6c94e2f8dd086448b0295ba44be1669d80600c780dad7c1831</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">eec76e247d93cbd1f7a186b88afc0f06111d005d9a21e92861f98222488a46bc</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">dd0ef240b3a27a372f8677ad72902b7ca400c4d6d99a8949e123b8b7fd6c09f3</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">98c7ca6154305aeab368688f1c27a1e05fbc2de5e742b32ed3218bd7fc1f544c</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">35c0bd5b784f981951eb890d7e96f670a92cca814aafde0c84790be6f65d2a9e</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">b1435d0c8da81b0a72b274eca170649f9b76349b539f6421ab4a2687a8fb64a8</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">af95fc594e7fd389c1077dc9950675416f28bbfef92e60bb9d1db4e8054bad3e</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">ba84e4f9783f4a9c8e8d0314626d596326644b918391d562eab30c32a28f97be</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">2455b597f2205f173708218e701b1a898dfb109b1b3ff6a04e0808b2417d0fb9</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">1137d00e19fe5e5304f4beac20b234bf52ab2cd1df0f0aecaddf6936cd14d078</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">d6bd50edb212bde63536e11a4ca1a861fc56b7096b2ab4953614ad3de87381ca</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.2.noarch.rpm</filename><sum type="sha256">91a402777de0497989837c462b009b8a4c06d9536038f7b2ce28ab4003396004</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">adfbe5e8a9b3385e09f7c2e56341682c55a23e8fe1100868dd15e08d3e5dee34</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">a062858ee2760dc527dc773c645df312b22e5440d711a0bf9105450bd563815a</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">273e674dedfdc72bb0c9762512c41a5ed7c3323bc79888dfd46352cd41558ff5</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">b28870f9473211a5aab4761aaf1811a52d8f7d737a53892e03fb98700da4e032</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">682d4b7e4aa8fe2d2eee80929a26956290c764782a27195eaa18ddb39cbabe00</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" id="CVE-2020-8623" title="Cve-2020-8623" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" id="CVE-2020-8624" title="Cve-2020-8624" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5011" id="RHSA-2020:5011-1" title="Rhsa-2020:5011-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869473" id="1869473" title="Bind: Truncated Tsig Response Can Lead To An" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869477" id="1869477" title="Cve-2020-8623 Bind: Remotely Triggerable Assertion Failure In Pk11.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869480" id="1869480" title="Cve-2020-8624 Bind: Incorrect Enforcement Of Update-Policy Rules Of Type &quot;Subdomain&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1884530" id="1884530" title="Bind Stops Dnskey Lookup In Get_Dst_Key() When A Key With Unsupported Algorithm Is Found First [Rhel7]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5012-1</id><title>Librepo</title><description /><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="librepo-devel" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-devel-1.8.1-8.el7_9.i686.rpm</filename><sum type="sha256">5e9aa35a981d2840134692f84d2e65150bd03a045a1df0f2432b0c46f8e24f44</sum></package><package arch="i686" name="librepo" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-1.8.1-8.el7_9.i686.rpm</filename><sum type="sha256">54ac0b83a5980f0fe79f81d89bbc74511e224e96f3aa6acc5b69f30f2ba73f4d</sum></package><package arch="x86_64" name="librepo-devel" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-devel-1.8.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">842b884bcff0768ce4bcf18fafeb9f1ab99bd8d1e6249607717fa18cd58b9109</sum></package><package arch="x86_64" name="librepo" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-1.8.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">818449bd35f4147b579a34e08feb2b30eccdb473abe5bcdf6a069186449e303a</sum></package><package arch="x86_64" name="python-librepo" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>python-librepo-1.8.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">b29277245dc259c20968baf397c933cc0ec2a338941c8e11b46ac3d016d038b8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14352" id="CVE-2020-14352" title="Cve-2020-14352" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5012" id="RHSA-2020:5012-1" title="Rhsa-2020:5012-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1866498" id="1866498" title="Cve-2020-14352 Librepo: Missing Path Validation In Repomd.Xml May Lead To Directory Traversal" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5020-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2020-1935)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-admin-webapps" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">aa6977941c1bd2072e8fb52668afe505c2954183b66b3542044143bf50d5a61f</sum></package><package arch="noarch" name="tomcat" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">9278de0d20e9970c899c261f58a8f877dfda254c508e807a26543581b5f2a1cb</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">21603edf7a3c774277bf9bd700aa3094ba96a1202a280e3b47028eca16978998</sum></package><package arch="noarch" name="tomcat-javadoc" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">5cf6522a174594dc8829b733123119299d4b28d31cc1517b9ba363d2e1502949</sum></package><package arch="noarch" name="tomcat-lib" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">7b0ac0b8e2b581ecfcdd755f439d5d9f8d1177b580d36862164e42614f57befc</sum></package><package arch="noarch" name="tomcat-jsvc" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">ab625888831656616637f61767d19ed69855e9bc8b5613b1f2b21a614d4c9fa4</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">f32c86c05713f79a60c47dc334f63927ee9b7e4c2882a0ec800cf568da8d75d5</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">bae2181cfc1afb37bbb46b70c86db7759a895db94e4d2532e82885dec4ad6a76</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">6d36a3c8047de2d05a4432fb9e3a2ef78553a6a23865860d8490688bd4f34d27</sum></package><package arch="noarch" name="tomcat-webapps" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">e143514d193ed8743b67b9e1a19c66408778aa408d716b211c28a4e923a3f833</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5020" id="RHSA-2020:5020-1" title="Rhsa-2020:5020-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5021-1</id><title>Qt And Qt5-Qtbase</title><description>Security Fix(es): 
* qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp (CVE-2020-17507)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="qt-postgresql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">2f990625aac0eaefe277e1d90296642a9b1769a0ab847d974fc6286a24a7c032</sum></package><package arch="x86_64" epoch="1" name="qt" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">f465ebe6ef7078025b0aef2d83521766c0193731dd513dd340f86e97c40ad4b6</sum></package><package arch="x86_64" name="qt5-qtbase-doc" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-doc-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">2357df991d7653d7a563cff583d91c69ec6f2a4a8b540b12b8ec0fbe40647975</sum></package><package arch="x86_64" epoch="1" name="qt-odbc" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">be734a03e61cd155d5157f9293d70582a3dec56a806f6d159263e2e43df3453b</sum></package><package arch="x86_64" epoch="1" name="qt-examples" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-examples-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">eafba1d14ae64d4274b6c589e86ec5469654769e36a98ad2c045e854c79d627e</sum></package><package arch="i686" name="qt5-qtbase-devel" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">5ba87d3495269210ce50d1d1d8f9f85aca324920ec8afd356a9f1e264e0063ac</sum></package><package arch="i686" name="qt5-qtbase-postgresql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">0a15d3c8e425c94919803f505f5c16e79ee114bfa4a0728e8d6c5fea205dc7e6</sum></package><package arch="i686" name="qt5-qtbase" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">496b6233b011be7d3c40f8ca6ba7099784979e45792a5248866fd658d8f3e41f</sum></package><package arch="i686" epoch="1" name="qt-mysql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">a929b6861f8b6c71c5b8806107be20a35a566658b50f679f7ec99a516832966d</sum></package><package arch="noarch" epoch="1" name="qt-doc" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-doc-4.8.7-9.el7_9.noarch.rpm</filename><sum type="sha256">b1f0394efc9e9b5c449853c0a4b7985aa41366fb86f0b0a5b2a1a04c4a5e21bf</sum></package><package arch="i686" name="qt5-qtbase-odbc" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">39a8424c0f12bf955a09694a34d9d52554f1d69487bd25f7bfaefbea7eedf1c5</sum></package><package arch="x86_64" epoch="1" name="qt-qdbusviewer" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-qdbusviewer-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">c31cd6a5bc81ed156dc959959be0c07c9a77eae076fab9e71bd31c425dc9580f</sum></package><package arch="noarch" name="qt5-rpm-macros" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-rpm-macros-5.9.7-5.el7_9.noarch.rpm</filename><sum type="sha256">477f92195f9f353679121b03e73d2c4b1a890938adba3e8de175814c3c5b2203</sum></package><package arch="x86_64" name="qt5-qtbase-static" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">e6c9d053df810165e1f2ceed63ff22ffc9223f392eac16b7c0446017e7d8bad2</sum></package><package arch="x86_64" epoch="1" name="qt-postgresql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">149eaca53c75a7f7715efa7375b2df5b9e7825188b555992a4bd55aa0d3a4b6a</sum></package><package arch="i686" epoch="1" name="qt-devel" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">9e89c257e4ca088f35aaa05d178f8fc7500e8aad245912921618dfad3c3f4539</sum></package><package arch="i686" epoch="1" name="qt" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">99a1970527986d3b3cf24e7c62f6b13abecc10a37afb1d5185e37f5913043a19</sum></package><package arch="x86_64" epoch="1" name="qt-qvfb" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-qvfb-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">7c7dfcdb90154564be2c0bb73e0c60527fa1e3293115df89d59dccc529ee1f6d</sum></package><package arch="noarch" name="qt5-qtbase-common" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-common-5.9.7-5.el7_9.noarch.rpm</filename><sum type="sha256">1bd4ac9a033b7f25c252543ac7663d0b33543e34b8cc11b6628e6a2535a5ac84</sum></package><package arch="x86_64" epoch="1" name="qt-devel" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">5d24d57c02883634e33c1d9ffb5ce1b6fcb0159ad1c355eb3d49db7b325628f1</sum></package><package arch="i686" name="qt5-qtbase-static" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">f9be3f2d2203d1e2fcca65c02e36c78a22cecb1f9e11d8585ff624120f847bcb</sum></package><package arch="x86_64" epoch="1" name="qt-assistant" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-assistant-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">cb546610e2a63c8897ebbae15c0c09c5df5dd8cfc8339dee8a9697fc5b98567e</sum></package><package arch="x86_64" name="qt5-qtbase-mysql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">c0e467fe03493409c25efa83cd410e575e50bf5efb6592d7548fdc194873c39d</sum></package><package arch="i686" name="qt5-qtbase-gui" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">8410d859b7b9b6895b658d281e39f178f170fffb144fa4a96cf695b8d3f181a2</sum></package><package arch="x86_64" name="qt5-qtbase-examples" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-examples-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">fde83ba6b73398217a03eacb43561b1efe091402f0e46c8bafb7b2c39e129ea1</sum></package><package arch="i686" epoch="1" name="qt-odbc" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">266ec15244d156419688218c64525e94997973c67cd35fcd430cf705691701c9</sum></package><package arch="x86_64" name="qt5-qtbase-odbc" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">ddd010fb1e2ac6f97354294d8f0b4fabbe246258d2ee3a8ebd278813a1382fd8</sum></package><package arch="x86_64" epoch="1" name="qt-mysql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">c78b158f03cd6cd903729cce4953053c132ef22fa81777395da63ea4fbfae809</sum></package><package arch="x86_64" epoch="1" name="qt-config" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-config-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">4fd2cea00c844b2380defbe708ee6002c8a61625f882effe9faad668f8946803</sum></package><package arch="x86_64" name="qt5-qtbase-gui" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">1bdf02c469fd8c928c5f7bc4577cf91d538e5948c64d99dd3cce9717fa353a08</sum></package><package arch="i686" epoch="1" name="qt-x11" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">998752272c7d54ce4a591d170f4f8197ef8c7a373c5ca88230adb00b199eb56a</sum></package><package arch="x86_64" name="qt5-qtbase-devel" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">f88198b4c90ff9433ca2a2051df7211a64a455f9d78a234769c486c9986ac744</sum></package><package arch="x86_64" name="qt5-qtbase-postgresql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">c666834945473919c0e820375fc1f95feb723453ddab373bc21413acf4056d0e</sum></package><package arch="x86_64" name="qt5-qtbase" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">4e32bb93412d4410552a25aee3725c4e54e83cde7570a39112c0fd22c91467f0</sum></package><package arch="x86_64" epoch="1" name="qt-demos" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-demos-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">b138388f394bccf5081a71cbfe11077b9d1293aab2cfabbc8d645e828dd2fd00</sum></package><package arch="i686" name="qt5-qtbase-mysql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">929dc10998613b29239d2d0c0df5ff67bfbf9ae456727ec0f4ab2ac7496a9f11</sum></package><package arch="noarch" epoch="1" name="qt-devel-private" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-devel-private-4.8.7-9.el7_9.noarch.rpm</filename><sum type="sha256">5340530c5e9e64293ae99b4eec8571eb6b5bb68e23ee1e54c806ebf25a337ae1</sum></package><package arch="x86_64" epoch="1" name="qt-x11" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">e6d8cf8f67ced43c167000c58fc99685d0279f60bf240565e821ecad0c1f67e7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5021" id="RHSA-2020:5021-1" title="Rhsa-2020:5021-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5023-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: buffer over write in vgacon_scroll (CVE-2020-14331) 
* kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811) 
Bug Fix(es): 
* [OSP13,mlx5] SRIOV VF still sending traffic when PF is down 
* gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk 
* GPF panic in qlt_free_session_done+626 
* [ Brazos ] "Core(s) per socket" and "Socket" values are interchanged in lscpu output. (kernel) 
* megaraid Aero: call trace observed during reboots 
* Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool 
* The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced 
* tcp_fragment() limit causes packet drop under normal TCP load 
* ip link command shows state as UNKNOWN for MACVLAN interface 
* Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug 
* [SL-7/mlx4]  ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] 
* Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV 
* kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome 
* Null ptr deref after nf_reinject-&gt;nf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct()</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">fa43ac3b28b2a8ab4caaaff4c501aaa62eb34f17d175b59668859842a2dfc67b</sum></package><package arch="x86_64" name="kernel-debug" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">be5779f6ededf4a8c550a4c6ed791e39823ebd7af2ee0aefa2042ae67ebb33da</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">ae5303acd4a7d66ac9451fd20e8165b57d9049c0ba2c78c5447419aebc511406</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">6f1b80feb6f65d1f20927fce25cee1c4070164eeb39a4e0247cf7cafa574fffe</sum></package><package arch="x86_64" name="perf" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">e8d3cf4b090395d832d9b94609de61cc6e05b8882aaa11c0bce3f2467bbee963</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.6.1.el7.noarch.rpm</filename><sum type="sha256">a22cea3e44550afadd16969a5e1e921fcb265865c06e12a02f28a45048c6c12c</sum></package><package arch="x86_64" name="kernel-tools" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">35379a584782bb5df8ca0f8ce2d9aeab27ce17bf5c63d748d6cf49a2f4686b08</sum></package><package arch="x86_64" name="kernel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">b8a8c00cf831a57b9ba0ddcc51dda482b846d42992c80ae25b23f54429b4a697</sum></package><package arch="x86_64" name="kernel-headers" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">b5cf9d49c2f50a57f515fda688ac10e942090ce5336eda682507913e9cc6692c</sum></package><package arch="x86_64" name="bpftool" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">eb459b8bea04b524153136161e04a74bdc58d71fbbdcecf2c5312c67abac7349</sum></package><package arch="noarch" name="kernel-doc" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.6.1.el7.noarch.rpm</filename><sum type="sha256">56f33f85d9f3a92f5b629f9b0e6533bcbba80e6aaf7636c660214210f6313ade</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">f70f095585c8e87bfadb97237bf57c2bcab6d063838b2de7ed3e3bd6b07a5129</sum></package><package arch="x86_64" name="python-perf" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">3cad1140ec4766ed2b2b01cd82d19d1f706fd5b2f813c63d97c5d804a7ab1166</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5023" id="RHSA-2020:5023-1" title="Rhsa-2020:5023-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5040-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libvirt-nss" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">2834e674277a3d4e5c7b920b64448cd37bd2adc9ad0b75c0673a883b5cb42af0</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">e52837fd79aa0d9826502e8fc0fc99fe6040d6d83650ed563e063623cfab3276</sum></package><package arch="i686" name="libvirt-libs" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">46b60bd7c943bde038f8269c067525f00f0a93a8ba84daaadb4a8baff822fe78</sum></package><package arch="x86_64" name="libvirt-nss" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">7234513bca5e17ca7de87da8f24343e09ea045c9e45fa1349b5d391b53d046f2</sum></package><package arch="x86_64" name="libvirt-daemon" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">d39fae834251654f0e4be3f781d29f24b50126708581f7db9983f195d84debf6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">eb732df91cd5bfefea2c0e1ef932e89a2ab33cb3eb0215cbe3aa3d8175c53902</sum></package><package arch="x86_64" name="libvirt-admin" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">7aa1a1b7fd3f1ca0cf554f60e93d42021762187e81a733e813184f208e275955</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">ba769f4988875848ca17fce27df881b29a65f835e8ac237c7f7a8575a40d7973</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">73bf5e1ce2f47e28417ca23a447dd3bfed734385d78204c930458c3deaebeee7</sum></package><package arch="x86_64" name="libvirt-client" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">cb146dff7ec24a5bf7cd1a26acb894693db3c5edb11344ccd3c3bf945bab20a0</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">a02e55e98bac0ae38460a3dee0335f4c09db03805b94c3e8a5406dacdf32a152</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">59f3951acf83f1ec0815442186beb088b5da8c52d531f1d94816e8a300703fa3</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">c029da9d94f4e235fb8c6e39e2c5bbbf7351bd2ac3393e59812213fbd7e90999</sum></package><package arch="x86_64" name="libvirt-login-shell" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">454d51418987da1014849d4132925cdef134737d1d08fb1cfa779c89c19a3924</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">050ef515b3c64595620bf6d53a462b54936c3dfe4126a4fdc609cc9a53d9dda1</sum></package><package arch="x86_64" name="libvirt-docs" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">0235ba04c3a98a9b5d2d31e85027b2a62fda74d77152debd17e4e99064e8a3e7</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">1f62e1ba3e85b38d3025b12c077dd9caf6641a553330ddd49f01479942dfafbf</sum></package><package arch="i686" name="libvirt-devel" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">e02dccd71df37070314abbf77e7e94e6eb1bae0729fe537cc6e981013716fa58</sum></package><package arch="x86_64" name="libvirt-bash-completion" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">3dfc31f773bb1efa5ef5e687088ab0f1b47fdaf91cd7e929a6f7c385541ccb37</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">0efbfbc232bcaca3fedfd060b20a8283fc7613f565f6048d0518818441c089c0</sum></package><package arch="x86_64" name="libvirt" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">157e09bbc77984eafc509c3191726f1dc17fa954ae54bdf641158f7fe20cf557</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">93fbbb3a834d068f53db7b551ba09e14ecb5b2e3fd93582f968124aede4d96dc</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">1b59823c76125992f394d22eb838c8c0478a1f5deca52420b620ef0fcb6932f9</sum></package><package arch="x86_64" name="libvirt-devel" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">7d0ec88254e280eeb07bdf1bb1252c900681099c26df13ad3245a7e3bde7b64a</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">57452d96f8978a1410c3ef2338fe270c97148911d03e9debba47513a2cdb9c1b</sum></package><package arch="x86_64" name="libvirt-libs" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">e4860ecebc9088da31ce413a567de94ecf49d342e5bbcaae46ebe7087cface77</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">505fdac487bef830c4d4567539061bf5c9fed6948c86ae44b98fd191025af572</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">664362fcb2c8a7b8ee0bdfaf8c52138a82c9483bd9218a414850e9a21f4aaed6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">f5bf6a17338facb41aa3bb9612efa5e11af562e49ebfdef125efaecfa993cedb</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">b83688c176dbdd74fb82d3ce011884783b08005d08bd554dffd76245bd1d5405</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">5cf289a88e882a0dc6dfffd8e313c4fc5c957a4f3b4f352a04a1ae18226f94b1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">10f8c9d89b219b32a7d6f3d52e2f9431d37878c6a14c8c463148e6921bdb38ea</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">9b80a91b5a9f66eafe3468984eea8a0972f7b87dd2cc42f4c75491d687e0b1b7</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">9c92d5f80c668de652d744c66676942226c077b22154a8834a69ff2ba0d9b75f</sum></package><package arch="i686" name="libvirt-client" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">14bb3afa97114d6eeffeb31b1eb538b277f938a05301296d515b7678e4061d07</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5040" id="RHSA-2020:5040-1" title="Rhsa-2020:5040-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5083-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) 
* hw: Vector Register Leakage-Active (CVE-2020-8696) 
* hw: Fast forward store predictor (CVE-2020-8698)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.2.el7_9" src="microcode_ctl-2.1-73.2.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.2.el7_9.x86_64.rpm</filename><sum type="sha256">69c381a9699c988fbdc4fd0b3bf8fa247e4ecd50868a7e2dda3900188d845d0e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5083" id="RHSA-2020:5083-1" title="Rhsa-2020:5083-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5099-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2020-11-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.4.1-1.el7_9.src.rpm" version="78.4.1"><filename>firefox-78.4.1-1.el7_9.i686.rpm</filename><sum type="sha256">e94ecc4b20facf2606282703cebc3026a4dedd3039002f228c9c9c7e379fb682</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.4.1-1.el7_9.src.rpm" version="78.4.1"><filename>firefox-78.4.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">ba519645c1953d71030a3ab3e27da0c317a547ef9d7fdd4fcb158af75e5f3fa6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5099" id="RHSA-2020:5099-1" title="Rhsa-2020:5099-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5163-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.4.3.

Security Fix(es):

* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.4.3-1.el7_9.src.rpm" version="78.4.3"><filename>thunderbird-78.4.3-1.el7_9.x86_64.rpm</filename><sum type="sha256">92c042553512da9c96c8ee1f78a34771072021043df5e88a87657128ef708ae9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950" id="CVE-2020-26950" title="Mozilla: Write Side Effects In Mcallgetproperty Opcode Not Accounted For" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5163" id="RHSA-2020:5163-1" title="Rhsa-2020:5163-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1896306" id="1896306" title="Mozilla: Write Side Effects In Mcallgetproperty Opcode Not Accounted For" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5235-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.5.0. 
Security Fix(es): 
* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) 
* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) 
* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) 
* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) 
* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) 
* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) 
* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) 
* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) 
* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) 
* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.5.0-1.el7_9.src.rpm" version="78.5.0"><filename>thunderbird-78.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">4aeda6a0fc5b123d030ff8d61dbe999dbc7911a850bd5ec4dc587824b0165205</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" id="CVE-2020-16012" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" id="CVE-2020-26951" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" id="CVE-2020-26953" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" id="CVE-2020-26956" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" id="CVE-2020-26958" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" id="CVE-2020-26959" title="Mozilla: Use-After-Free In Webrequestservice" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" id="CVE-2020-26960" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" id="CVE-2020-26961" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" id="CVE-2020-26965" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" id="CVE-2020-26968" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5235" id="RHSA-2020:5235-1" title="Rhsa-2020:5235-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898731" id="1898731" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898732" id="1898732" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898733" id="1898733" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898734" id="1898734" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898735" id="1898735" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898736" id="1898736" title="Mozilla: Use-After-Free In Webrequestservice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898737" id="1898737" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898738" id="1898738" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898739" id="1898739" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898741" id="1898741" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5239-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.5.0 ESR. 
Security Fix(es): 
* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) 
* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) 
* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) 
* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) 
* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) 
* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) 
* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) 
* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) 
* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) 
* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.5.0-1.el7_9.src.rpm" version="78.5.0"><filename>firefox-78.5.0-1.el7_9.i686.rpm</filename><sum type="sha256">a01136ebd107e00f13819a1ff47a00f4cbfeb618cdbf488899e2a52c75436684</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.5.0-1.el7_9.src.rpm" version="78.5.0"><filename>firefox-78.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">2a9ea789628f4859bab83c8ccf1e5fb214ddecae7f670f550109871358f6f0c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" id="CVE-2020-16012" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" id="CVE-2020-26951" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" id="CVE-2020-26953" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" id="CVE-2020-26956" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" id="CVE-2020-26958" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" id="CVE-2020-26959" title="Mozilla: Use-After-Free In Webrequestservice" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" id="CVE-2020-26960" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" id="CVE-2020-26961" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" id="CVE-2020-26965" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" id="CVE-2020-26968" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5239" id="RHSA-2020:5239-1" title="Rhsa-2020:5239-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898731" id="1898731" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898732" id="1898732" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898733" id="1898733" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898734" id="1898734" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898735" id="1898735" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898736" id="1898736" title="Mozilla: Use-After-Free In Webrequestservice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898737" id="1898737" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898738" id="1898738" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898739" id="1898739" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898741" id="1898741" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5350-1</id><title>Net-Snmp</title><description>Security Fix(es): 
* net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution (CVE-2020-15862)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="net-snmp" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">5f6a4f07a16a430a5b5bfba0cdb49f4bfc4d1e82080aea19d098c9b941d9dbe5</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">6413cc63e27157a63f2213d9d33f8c3d0dd24d69c57973a0c5c54bcd2b35419c</sum></package><package arch="i686" epoch="1" name="net-snmp-devel" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.1.i686.rpm</filename><sum type="sha256">28dff9113f62a657c99729c6b0820921088723d1e2e36f196f4397e59ea9ba16</sum></package><package arch="x86_64" epoch="1" name="net-snmp-perl" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-perl-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">aacc4173eeb02c57b5cc603e87ff09dc3a4ef9e0a2a56b1c222d24ffe71d0378</sum></package><package arch="x86_64" epoch="1" name="net-snmp-gui" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-gui-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">0ef72584b2f56c25f567db0b159846d0faf805414aa22a99d0a2a9124df784a2</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.1.i686.rpm</filename><sum type="sha256">5784605d171bbbd0bd502566b65fcf1fd6a7fcd2f265986217732a1a38dbee40</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-python-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">8bf9e96031cfb8602feea8e199798171335e163802f8142bb6de4eadfcc732ae</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-utils-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">583d10cddad6c1df718a9d6240aae5d363b041f98f6297f5db023169b5cd3b93</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">4db5985d46f717d6201094c9d68072769154cfb8cf8ad20bd8ba5483aba0c9cb</sum></package><package arch="i686" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.1.i686.rpm</filename><sum type="sha256">9844acef0228629f571c059899ca877686ded22a947c3273c28ce700a142a27d</sum></package><package arch="x86_64" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">4772c5fea319e3ef852b4455691ab029d4376fada1b836c313b524699f279811</sum></package><package arch="x86_64" epoch="1" name="net-snmp-sysvinit" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-sysvinit-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">51b05cd2c54b3e2bd5925721e2bb6fbe877dcf442c355aeb026b2ab7ef226f1a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15862" id="CVE-2020-15862" title="Net-Snmp: Improper Privilege Management In Extend Mib May Lead To Privileged Commands Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5350" id="RHSA-2020:5350-1" title="Rhsa-2020:5350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1873038" id="1873038" title="Net-Snmp: Improper Privilege Management In Extend Mib May Lead To Privileged Commands Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5400-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes (CVE-2020-26970)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.5.1-1.el7_9.src.rpm" version="78.5.1"><filename>thunderbird-78.5.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">7204232e5916e30474537b49e8e3c380d323cb508133e2a3f272e2675f6c6b17</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5400" id="RHSA-2020:5400-1" title="Rhsa-2020:5400-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5402-1</id><title>Libexif</title><description>Security Fix(es): 
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libexif" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-0.6.22-2.el7_9.x86_64.rpm</filename><sum type="sha256">efbb1fc8a925b088d782730b192f4f3261c241540dbc16525fda27d7fef82897</sum></package><package arch="i686" name="libexif-devel" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-2.el7_9.i686.rpm</filename><sum type="sha256">2074ac598018d8710f20fde5efeef22a67981e962c305d38de81c36dfbe22cde</sum></package><package arch="i686" name="libexif" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-0.6.22-2.el7_9.i686.rpm</filename><sum type="sha256">6dc932c606a8b0b97108d1313fe5d3b59706d7feaa9d4ea4404b25eed3b2422e</sum></package><package arch="x86_64" name="libexif-devel" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-2.el7_9.x86_64.rpm</filename><sum type="sha256">390e5bc8b3656b1360b772fd168205e8632a1bbe2c3c20340e617ee5d4f9ef2d</sum></package><package arch="x86_64" name="libexif-doc" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-doc-0.6.22-2.el7_9.x86_64.rpm</filename><sum type="sha256">037a55132984a0bd769eb3194ef66167ad9badf0f745e36d5cd34f40e88b48d5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5402" id="RHSA-2020:5402-1" title="Rhsa-2020:5402-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5408-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) 
* xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) 
* xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xorg-x11-server-source" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-15.el7_9.noarch.rpm</filename><sum type="sha256">28092e85516bb3ad3abaaa0a8b12b886194e9a4ab782b91d22231fecb2c2b59d</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">1dd324a9b38007b9921ab6ca548aef439afa6b55470d00a8549f6d93eb4c43f5</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">e0ac1be16eddcef7251eab2e5914fbe32fa46053d7e52c533a3529dbf537fdf1</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">bd4762bed5392c807dfe22257611857ae4ff9775f8864505a2c88f549d561f61</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">97c2405899a3c2cc2e38b12158a34ef817b67bc043c72a1da2b1aa67f6608699</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">b43f75f93755916cd7662809f920674ff0ee386549c0c1425cc08a180aef832b</sum></package><package arch="i686" name="xorg-x11-server-devel" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-15.el7_9.i686.rpm</filename><sum type="sha256">21aba054790d48f8b74cd55320fea0b6b2b8bd4afde2619f98143688b977283f</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">cccae5645a379eb7651f950e94e10ff2c9b9eb125ff58b3482125c9e41e461ec</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">ce9b2f9a96cb6f7e910bee5639099c84ce13bb87dc6a8d001c67dccb4195668d</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">b3c791887936cc4ae55234af68d275037b4d90c2f0823745aa024e7b6cc7b138</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5408" id="RHSA-2020:5408-1" title="Rhsa-2020:5408-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5434-1</id><title>Targetcli</title><description>Security Fix(es): 
* targetcli: weak permissions for /etc/target and backup files (CVE-2020-13867)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="targetcli" release="1.el7_9" src="targetcli-2.1.53-1.el7_9.src.rpm" version="2.1.53"><filename>targetcli-2.1.53-1.el7_9.noarch.rpm</filename><sum type="sha256">f1961207eea2a46a9b25e2d7d57195737a0fe1065b3b41498db025f6c36b0b49</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5434" id="RHSA-2020:5434-1" title="Rhsa-2020:5434-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5435-1</id><title>Python-Rtslib</title><description>Security Fix(es): 
* python-rtslib: weak permissions for /etc/target/saveconfig.json (CVE-2020-14019)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-rtslib-doc" release="1.el7_9" src="python-rtslib-2.1.74-1.el7_9.src.rpm" version="2.1.74"><filename>python-rtslib-doc-2.1.74-1.el7_9.noarch.rpm</filename><sum type="sha256">38c2d69ce491410d16dcc623d71d2ba6d7cd30792f3efd20768cbe67df54f372</sum></package><package arch="noarch" name="python-rtslib" release="1.el7_9" src="python-rtslib-2.1.74-1.el7_9.src.rpm" version="2.1.74"><filename>python-rtslib-2.1.74-1.el7_9.noarch.rpm</filename><sum type="sha256">34ed38fcd5a5d16bf9c664b9a92f7daf7464ec726c1e79df4b99d50df1737d45</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5435" id="RHSA-2020:5435-1" title="Rhsa-2020:5435-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5437-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385) 
* kernel: The flow_dissector feature allows device tracking (CVE-2019-18282) 
* kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. (CVE-2020-10769) 
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314) 
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394) 
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212) 
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.11.1.el7.noarch.rpm</filename><sum type="sha256">8c4901a1254d52706a8026f9afa5b964c896fa61d871a47079c886e5434978bb</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">074a2ca70735365ae82e9859c9fb8820f3d264b5eebd7f7384fddb980c8d44be</sum></package><package arch="x86_64" name="perf" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">3e60b1603a251cb4af8f03c0bc08ef03504dda7ef9e0d50efc34f888cb7bc920</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">f3984b7e00b733ed304ad9d2d1ad2c6d9030b3e8a3cc5430f7cf112a2ff1ce12</sum></package><package arch="x86_64" name="kernel-tools" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">0756af1a558d435b5a1b5788bba4d62c3ce18384bea6d923907834a4d391ca89</sum></package><package arch="x86_64" name="kernel-headers" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">18f207344f466c5b6e74407601a61ea3185e644570f53fdb7df45290e5857e99</sum></package><package arch="x86_64" name="bpftool" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">613af626396059c1078e7f852972e17b69faf1df7b048d6b581f4298a67460f3</sum></package><package arch="x86_64" name="python-perf" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">f074050a3bde5f5f20b5402b58a3aab71f9cb94edbd5bef991c127e9f463bde7</sum></package><package arch="x86_64" name="kernel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">cf318a19af37dcd5a560f417ec291a5766a60ec24e9eb2d762f936beb26e6a47</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">91db286c495fd0f265c5bc0289268239c2d0303c21844bf1415b0310ca867a66</sum></package><package arch="x86_64" name="kernel-devel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">01b394eb16a7a6be9c376e088f71a0c44eb4249a28c05fe9a72d53631fb08a81</sum></package><package arch="x86_64" name="kernel-debug" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">01b2018f24bebe98aa6e01b7c5459bf12743278485212b48fe8f9bddd59eb947</sum></package><package arch="noarch" name="kernel-doc" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.11.1.el7.noarch.rpm</filename><sum type="sha256">4b790062be5b1197903241e00a4ce71a06e3b3952ee700a67880eebdd161b388</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5437" id="RHSA-2020:5437-1" title="Rhsa-2020:5437-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5439-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Netlogon elevation of privilege vulnerability (Zerologon) (CVE-2020-1472) 
* samba: Missing handle permissions check in SMB1/2/3 ChangeNotify (CVE-2020-14318) 
* samba: Unprivileged user can crash winbind (CVE-2020-14323)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">b076a9f33db35192bbe69ddc9517f2144661cb2756de1d628b5de2ab5a334c7b</sum></package><package arch="noarch" name="samba-pidl" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-9.el7_9.noarch.rpm</filename><sum type="sha256">3a45929ff73f086c20b0a688e69ef39579cf32ef1e9c5c96c7710496c79ffadb</sum></package><package arch="x86_64" name="samba-test" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3ab1e89086f913190e3587876a6da9484d97916ccc0302bd04884a9913c55919</sum></package><package arch="x86_64" name="samba-common-tools" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">00c9de7f1cee8e94b586633ba12a1646f89d9575bfc324aa6e9893adbd412b8c</sum></package><package arch="i686" name="samba-winbind-modules" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">2efb086f89ba6912cef4104107b9dc01431fdfa669245c1fc061a97749b406b4</sum></package><package arch="i686" name="libwbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">e86d831cbb14eea16e57267c13a3bfdf06cdec971de24c476e14371a01006b89</sum></package><package arch="x86_64" name="samba-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">38f0416a4ecb0e7ebb6bb334f9a75709e2c8e2188270fefea9966db2e6a69ffb</sum></package><package arch="x86_64" name="ctdb" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">612a9671a5afdfbb3e174a8b747bf1c96e2c5bfb515bf7a93df196c71d5d139b</sum></package><package arch="x86_64" name="samba-krb5-printing" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">d78679a5aa74bcda36d9974620f0b8cfedec6e1f47a91fbce65ae5e23d5b3490</sum></package><package arch="x86_64" name="samba-test-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">0b91a59f9c5d32bae9d04b11b50595a48e404f15b4028c9dae01329507923dd8</sum></package><package arch="i686" name="samba-python" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">40217003284ac87071f9769e54b664943c738205ae94df6c9f13321692a77a04</sum></package><package arch="x86_64" name="samba" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">abf987af637efa73be4eac3641569c7bc4cfee8b251450d6a1370756a74cb1d2</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">031218649908fa353e5a8c2af61e9054cb39ffcfc8264ee8ac7a677440b4d9d4</sum></package><package arch="i686" name="samba-test-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">440286e7959b0a2cf2a559cfc8bf7c5842d258b6f43a0b2a02247cb90f44d6a1</sum></package><package arch="i686" name="samba-client-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">f80fded3dda885bdf26417baaa147b6d4d7961990adc48677e2e419d3a5b56c2</sum></package><package arch="x86_64" name="samba-winbind-clients" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e4fab9053b7ba9b38722867bfdfb42fe7c990e577baaedefe6b50c7e0c75dfd0</sum></package><package arch="x86_64" name="samba-winbind" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e3ea6c53cd4e4a8dd2ad0a380c0d55f72d28c563ff59e6cdb5464de51951d18d</sum></package><package arch="i686" name="libsmbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">4db73018e1489cf37ea5ed6abdfc1250946046971a05741eb565a17d513c4471</sum></package><package arch="x86_64" name="samba-common-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">46407be156046b26ccbcf0cf131c8a692ce20c4fbfd186d31939e623f5defb39</sum></package><package arch="i686" name="samba-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">519e0a4e6bb18214cfa971b232228ff43feda3f36ed123c177ff2ce00feb5b52</sum></package><package arch="x86_64" name="ctdb-tests" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">b5ecc1bc7a4e2f1a0c2083725d83c7e9d14a464e2d5fe429bb516da24a5e7b6e</sum></package><package arch="i686" name="samba-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">090851bfc72aebe18ed191ca16a3cc57251a653a9381c485872cea5f58232254</sum></package><package arch="x86_64" name="samba-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3920df3a2074dcb6633966fda57013415d63549b3a51e8fa993c57af2d8b0e19</sum></package><package arch="x86_64" name="samba-dc" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">f271d4c8fc59778b3b8546be5c012d971833fff265e96060c707ea6a9cb543ab</sum></package><package arch="i686" name="libsmbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">56efcdcd4fe1755029a174cb76499b2bfece3ec8f226435265a7b1d18f3444be</sum></package><package arch="noarch" name="samba-common" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-9.el7_9.noarch.rpm</filename><sum type="sha256">8042e4e4498238bd6f4eeeef17522327228b39708be95839399d54209c0cf126</sum></package><package arch="i686" name="libwbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">bfae295faf35a3784d08fd0cc0e76ab928dfe85a67e8542b97318740b7ac5cc2</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3132857bdc0fcec518e8acb2b76662447c28bc201249fa6acb401b75da54dad6</sum></package><package arch="x86_64" name="libwbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">facd100d567679a5e3aa45f595cedbfa4197d17c4521c3fb59dd58696491aaa1</sum></package><package arch="x86_64" name="samba-winbind-modules" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">efe3852c88c046489eecb30a7b8a61e8fc9f02b0115a70f058721293394c21ac</sum></package><package arch="x86_64" name="samba-client-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e326f21e78e4f94efcd3c3d83cfc199c4e73af0b5feb4a2726c784fa11b409aa</sum></package><package arch="x86_64" name="samba-python" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e8cca8a7f801b65b906a85bf563bb92a26cd1f1cea813b09c411a24a6825c2de</sum></package><package arch="x86_64" name="samba-dc-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">2909b4efe04c93c004227897e2fb7a63a02d8bf698b8ced94d01c672d69cde93</sum></package><package arch="x86_64" name="samba-python-test" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">2a3764105780fcec87cfc7bfd12f80e964d091148cc161ec6f2e8b8d5c6a50af</sum></package><package arch="x86_64" name="samba-client" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">66843da5bf400fc5a2b51436f14a76168fe62e236105023477f2de19c4110b8d</sum></package><package arch="x86_64" name="libsmbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">9ffb0c883afdde797002ba30d19b5e199cbbe4c7606cbabe8b1822cb3a6d131b</sum></package><package arch="i686" name="samba-common-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">a9501b4b0918e9be3d9fef799513020f2f61a6dac411d9c87427d70b1df1b002</sum></package><package arch="x86_64" name="libsmbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3358e17bd6642a2f9ca9247da03aaf13d2b635b0c225a12a5a25064c0b5c8f15</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5439" id="RHSA-2020:5439-1" title="Rhsa-2020:5439-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5443-1</id><title>Gd</title><description>Security Fix(es): 
* gd: Integer overflow in _gd2GetHeader() resulting in heap overflow (CVE-2016-5766)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gd-devel" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-devel-2.0.35-27.el7_9.x86_64.rpm</filename><sum type="sha256">649bdfb3f448048e424b079817af7ac828e5133323f87bd84aeea5fac6c348ca</sum></package><package arch="x86_64" name="gd" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-2.0.35-27.el7_9.x86_64.rpm</filename><sum type="sha256">8b22d155263ae48053312e120ad698f6691a26cbdcb53a29352683ed3c58ef31</sum></package><package arch="i686" name="gd-devel" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-devel-2.0.35-27.el7_9.i686.rpm</filename><sum type="sha256">6098eaf3c89f9adc5feb38e58ebc2cbd2740ba4e3fc45e79edb50c313ff4fe77</sum></package><package arch="x86_64" name="gd-progs" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-progs-2.0.35-27.el7_9.x86_64.rpm</filename><sum type="sha256">c1a23e3027865afcf15a1d2e06244f0b21f0ce8db329622b8d14e7e81704db26</sum></package><package arch="i686" name="gd" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-2.0.35-27.el7_9.i686.rpm</filename><sum type="sha256">b6a019ac8d2811b6eb3296ab2c7e6a72c0bb66a0c848d53764d54111c462c601</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5443" id="RHSA-2020:5443-1" title="Rhsa-2020:5443-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5453-1</id><title>Pacemaker</title><description>Security Fix(es): 
* pacemaker: ACL restrictions bypass (CVE-2020-25654)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pacemaker" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">ae3bba33a30bb03d79e842d929b208994522c37c9977689e76b884755b38dec6</sum></package><package arch="x86_64" name="pacemaker-cts" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cts-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">f7ab16be28c957f828ec50d955adfb38bfe761e1227191b1d0f81dd5f2ed8eb8</sum></package><package arch="x86_64" name="pacemaker-cli" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cli-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">d0087929e1f47f53190f5fbf4d8fe27e38a25bc761ca9ba9588ea414ba4d7657</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-devel-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">7cec82a8fa695ce95c8dc6a9afd2a81953378a288b588f3bc9625de7919da188</sum></package><package arch="x86_64" name="pacemaker-remote" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-remote-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">51d1edcf063c3879e8ab0eea384d56bed87768ca583037f2be802612ead7bf59</sum></package><package arch="x86_64" name="pacemaker-doc" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-doc-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">993efca7ba035e125ad01223a8b75047cf4db2c60a2d463655c1cbecc8e38725</sum></package><package arch="x86_64" name="pacemaker-nagios-plugins-metadata" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-nagios-plugins-metadata-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">e0bba6c20f230d4333a2b050b2fc240886d29b28aca71b1675efe08397bd4a10</sum></package><package arch="i686" name="pacemaker-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-1.1.23-1.el7_9.1.i686.rpm</filename><sum type="sha256">02d2eb1cf8b91bb2e0c736fafd47e28f0f2f721980e93a7f3ac7d7ca85e10075</sum></package><package arch="i686" name="pacemaker-libs-devel" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-devel-1.1.23-1.el7_9.1.i686.rpm</filename><sum type="sha256">e31001032b9a817b564d4c6c391c732fcce21415a6286678668fef5a87b0e9ea</sum></package><package arch="x86_64" name="pacemaker-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">a0ea29234910e70b9d1fa10fd7f12dab0a432c90dd75fc5c556e5e83c131253f</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cluster-libs-1.1.23-1.el7_9.1.i686.rpm</filename><sum type="sha256">b323aa8453cb317274a80e53f4b62ad3a90fc6aa19354a9f555e9c8656cacd90</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cluster-libs-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">83b6faf7f1326a0139ff3b89a28d8e314962a83618d819a1fd9033638c3b020a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5453" id="RHSA-2020:5453-1" title="Rhsa-2020:5453-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5561-1</id><title>Firefox</title><description>Security Fix(es): 
* chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) 
* Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) 
* Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free (CVE-2020-26974) 
* Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) 
* Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.6.0-1.el7_9.src.rpm" version="78.6.0"><filename>firefox-78.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">0d6c4bd288c7d0a631ae8312388c5237d3f3d49d362067931f0c964cbac8b520</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.6.0-1.el7_9.src.rpm" version="78.6.0"><filename>firefox-78.6.0-1.el7_9.i686.rpm</filename><sum type="sha256">5c1c1f487c0ee722a18c9d0a2d1773a488d2035cd91be329429dfc49017c2fff</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5561" id="RHSA-2020:5561-1" title="Rhsa-2020:5561-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5566-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-libs" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">4ab783a4b56a43eaa048038f945673f33909a21827029d5ee93b4c81b2f4d92e</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-21.el7_9.i686.rpm</filename><sum type="sha256">2f99416e28a3c658927d78ec90fccfc640eb34bc303f9fa15688a0f049acfb86</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">25730dc215dab87a5e0cba02d8dc32feb2ad2b924d97e568eb75d86c2377ab8d</sum></package><package arch="x86_64" epoch="1" name="openssl" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">4099de643d8ffb0d9d7adfd5fcd3b57be8aa259b40a444e71e2bdbfe398ec449</sum></package><package arch="i686" epoch="1" name="openssl-static" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-21.el7_9.i686.rpm</filename><sum type="sha256">5324134a3422bb4d2e370d8fd60b425f256ffce1ca7b2f9b5f1766915a5ae87b</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">d3f15aa14d37b7458ce9c8f81ad92b40434161a838e064006949813cadecffc1</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">2ff54248f85df13efadba6fe2669cfb9cbc7cfd6901218fb56f02821dc6255c7</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-21.el7_9.i686.rpm</filename><sum type="sha256">6b0eba3b5d8c40fc55a6cbb70138d15c50baf2325cf5f637ff2696afcda2d7a0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" id="CVE-2020-1971" title="Openssl: Edipartyname Null Pointer De-Reference" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5566" id="RHSA-2020:5566-1" title="Rhsa-2020:5566-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1903409" id="1903409" title="Openssl: Edipartyname Null Pointer De-Reference" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5618-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.6.0. 
Security Fix(es): 
* chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) 
* Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) 
* Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use- after-free (CVE-2020-26974) 
* Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) 
* Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.6.0-1.el7_9.src.rpm" version="78.6.0"><filename>thunderbird-78.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">24422101a4101285534840c54c1008ac45327f0e93b99ebec74e41c60d009b27</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" id="CVE-2020-16042" title="Chromium-Browser: Uninitialized Use In V8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" id="CVE-2020-26971" title="Mozilla: Heap Buffer Overflow In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" id="CVE-2020-26973" title="Mozilla: Css Sanitizer Performed Incorrect Sanitization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" id="CVE-2020-26974" title="Mozilla: Incorrect Cast Of Stylegenericflexbasis Resulted In A Heap Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" id="CVE-2020-26978" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" id="CVE-2020-35111" title="Mozilla: The Proxy.Onrequest Api Did Not Catch View-Source Urls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" id="CVE-2020-35113" title="Mozilla: Memory Safety Bugs Fixed In Firefox 84 And Firefox Esr 78.6" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5618" id="RHSA-2020:5618-1" title="Rhsa-2020:5618-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1904515" id="1904515" title="Chromium-Browser: Uninitialized Use In V8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908022" id="1908022" title="Mozilla: Heap Buffer Overflow In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908023" id="1908023" title="Mozilla: Css Sanitizer Performed Incorrect Sanitization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908024" id="1908024" title="Mozilla: Incorrect Cast Of Stylegenericflexbasis Resulted In A Heap Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908025" id="1908025" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908027" id="1908027" title="Mozilla: The Proxy.Onrequest Api Did Not Catch View-Source Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908029" id="1908029" title="Mozilla: Memory Safety Bugs Fixed In Firefox 84 And Firefox Esr 78.6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0024-1</id><title>Imagemagick</title><description>Security Fix(es): 
* ImageMagick: Shell injection via PDF password could result in arbitrary code execution (CVE-2020-29599)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ImageMagick-perl" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-perl-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">35ed20c4a1405b7be51394d2770f8a6cb1ce8727ae75d6d3dd7e11d21181344b</sum></package><package arch="i686" name="ImageMagick-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">38a5bc8854084aea0e436621674b7342c734829122be1f2058521c6a81b1df89</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">c2557d70027530bb4e624c9789ba066907eb63145e00bcc4191d80800f6f14a9</sum></package><package arch="x86_64" name="ImageMagick-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">263a8c54000db5a2c00dc0d1c8c6eb6c498857eaa6dfcc32979da35f66bdbaa7</sum></package><package arch="x86_64" name="ImageMagick-doc" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-doc-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">1902faa24f58f417c8470021e076e97d10952b55e960a365d261c3badc438d29</sum></package><package arch="x86_64" name="ImageMagick" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">007a874cbb5e96e0ec9d091dc1e1375f5163bc7b51fb924b588b4a9e89693d33</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">b456d51876febb32c76dac09baa9c049c2a05189e8faf5b3b031170cf506b943</sum></package><package arch="i686" name="ImageMagick" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">962a00fd6dd0394c38fa745e7b153b4fc4604d16450524ee89d4c89d2c4ae7df</sum></package><package arch="i686" name="ImageMagick-c++" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">8c7cb49693f69f88cfce4cee36178f33bbb1569e4f2b33f3c279dfffc162bf40</sum></package><package arch="x86_64" name="ImageMagick-c++" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">203e4810eb5b87904246399de6deec2bb5476e647432cc3fb3cb783a63f969f2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2021:0024" id="RHSA-2021:0024-1" title="Rhsa-2021:0024-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0053-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.6.1 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-01-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.6.1-1.el7_9.src.rpm" version="78.6.1"><filename>firefox-78.6.1-1.el7_9.i686.rpm</filename><sum type="sha256">4f8f75fe33d42ec9e805e56187ee91e42c099a99a22371bdd370f5acdf4717a0</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.6.1-1.el7_9.src.rpm" version="78.6.1"><filename>firefox-78.6.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">8b08548589ca2d090a5090b87ad796bc4b16114224126f9945f0c0f89a03a6de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" id="CVE-2020-16044" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0053" id="RHSA-2021:0053-1" title="Rhsa-2021:0053-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1913503" id="1913503" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0087-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.6.1. 
Security Fix(es): 
* Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-01-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.6.1-1.el7_9.src.rpm" version="78.6.1"><filename>thunderbird-78.6.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">a9297af8abb6b9ee3f7c109429da762fde47e129d27893f0aec68f2cfb840ce8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" id="CVE-2020-16044" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0087" id="RHSA-2021:0087-1" title="Rhsa-2021:0087-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1913503" id="1913503" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0153-1</id><title>Dnsmasq</title><description>Security Fix(es): 
* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684) 
* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685) 
* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="dnsmasq" release="16.el7_9.1" src="dnsmasq-2.76-16.el7_9.1.src.rpm" version="2.76"><filename>dnsmasq-2.76-16.el7_9.1.x86_64.rpm</filename><sum type="sha256">6729ababc68f71a67e57ee1a7c0b81375a2804a4081a054fa0f8d03fcdcc046b</sum></package><package arch="x86_64" name="dnsmasq-utils" release="16.el7_9.1" src="dnsmasq-2.76-16.el7_9.1.src.rpm" version="2.76"><filename>dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm</filename><sum type="sha256">d6187f9c7b3e1aab9110e2fd2a764e32f9e4e46af3419d745a1c54aa6423e585</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25684" id="CVE-2020-25684" title="Dnsmasq: Loose Address/Port Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25685" id="CVE-2020-25685" title="Dnsmasq: Loose Query Name Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25686" id="CVE-2020-25686" title="Dnsmasq: Multiple Queries Forwarded For The Same Name Makes Forging Replies Easier For An Off-Path Attacker" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0153" id="RHSA-2021:0153-1" title="Rhsa-2021:0153-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1889686" id="1889686" title="Dnsmasq: Loose Address/Port Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1889688" id="1889688" title="Dnsmasq: Loose Query Name Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1890125" id="1890125" title="Dnsmasq: Multiple Queries Forwarded For The Same Name Makes Forging Replies Easier For An Off-Path Attacker" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0162-1</id><title>Xstream</title><description>Security Fix(es): 
* XStream: remote code execution due to insecure XML deserialization when relying on blocklists (CVE-2020-26217)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xstream-javadoc" release="12.el7_9" src="xstream-1.3.1-12.el7_9.src.rpm" version="1.3.1"><filename>xstream-javadoc-1.3.1-12.el7_9.noarch.rpm</filename><sum type="sha256">d1c3984fcbe1a1b24baec7263e375eadc97b343c9a463f934c92e43a4e1cf0ff</sum></package><package arch="noarch" name="xstream" release="12.el7_9" src="xstream-1.3.1-12.el7_9.src.rpm" version="1.3.1"><filename>xstream-1.3.1-12.el7_9.noarch.rpm</filename><sum type="sha256">72fb816c08d0492a3c4beddb831f9b13718f36bd9c071a40576baebea1d75bfd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26217" id="CVE-2020-26217" title="Xstream: Remote Code Execution Due To Insecure Xml Deserialization When Relying On Blocklists" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0162" id="RHSA-2021:0162-1" title="Rhsa-2021:0162-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898907" id="1898907" title="Xstream: Remote Code Execution Due To Insecure Xml Deserialization When Relying On Blocklists" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0221-1</id><title>Sudo</title><description>Security Fix(es): 
* sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo" release="10.el7_9.1" src="sudo-1.8.23-10.el7_9.1.src.rpm" version="1.8.23"><filename>sudo-1.8.23-10.el7_9.1.x86_64.rpm</filename><sum type="sha256">5423b800533b588b826b3262e43317d7483ded52bec632b31e2ad6a7196959a3</sum></package><package arch="x86_64" name="sudo-devel" release="10.el7_9.1" src="sudo-1.8.23-10.el7_9.1.src.rpm" version="1.8.23"><filename>sudo-devel-1.8.23-10.el7_9.1.x86_64.rpm</filename><sum type="sha256">70d08e1e1e5a472c05109310f94e7080642cb63861cf299c0c4461b4a0fdd814</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156" id="CVE-2021-3156" title="Sudo: Heap Buffer Overflow In Argument Parsing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0221" id="RHSA-2021:0221-1" title="Rhsa-2021:0221-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917684" id="1917684" title="Sudo: Heap Buffer Overflow In Argument Parsing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0290-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.7.0 ESR. 
Security Fix(es): 
* Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) 
* Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) 
* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) 
* Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) 
* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-78.7.0-2.el7_9.src.rpm" version="78.7.0"><filename>firefox-78.7.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">aefb9ecf93045e1f02b4d18b8454ea6a069d36374d511813302be771e372b6ca</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-78.7.0-2.el7_9.src.rpm" version="78.7.0"><filename>firefox-78.7.0-2.el7_9.i686.rpm</filename><sum type="sha256">fcf145cb6953a4256c0a7ee96f328579e3a0f81fc046931f75aabff454ec4dad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" id="CVE-2020-26976" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" id="CVE-2021-23953" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" id="CVE-2021-23954" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" id="CVE-2021-23960" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" id="CVE-2021-23964" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0290" id="RHSA-2021:0290-1" title="Rhsa-2021:0290-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920646" id="1920646" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920648" id="1920648" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920649" id="1920649" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920650" id="1920650" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920651" id="1920651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0297-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.7.0. 
Security Fix(es): 
* Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) 
* Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) 
* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) 
* Mozilla: IMAP Response Injection when using STARTTLS (CVE-2020-15685) 
* Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) 
* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.7.0-1.el7_9.src.rpm" version="78.7.0"><filename>thunderbird-78.7.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">da24d84fbba521a1fd1d55d856a97ac7be93b07dd9850ee602f76e37e112e419</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685" id="CVE-2020-15685" title="Mozilla: Imap Response Injection When Using Starttls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" id="CVE-2020-26976" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" id="CVE-2021-23953" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" id="CVE-2021-23954" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" id="CVE-2021-23960" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" id="CVE-2021-23964" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0297" id="RHSA-2021:0297-1" title="Rhsa-2021:0297-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920646" id="1920646" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920648" id="1920648" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920649" id="1920649" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920650" id="1920650" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920651" id="1920651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1921543" id="1921543" title="Mozilla: Imap Response Injection When Using Starttls" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0336-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in fs/block_dev.c (CVE-2020-15436) 
* kernel: Nfsd failure to clear umask after processing an open or create (CVE-2020-35513) 
Bug Fix(es): 
* double free issue in filelayout_alloc_commit_info 
* Regression: Plantronics Device SHS2355-11 PTT button does not work after update to 7.7 
* Openstack network node reports unregister_netdevice: waiting for qr- 3cec0c92-9a to become free. Usage count = 1 
* dlm: add ability to interrupt waiting for acquire POSIX lock 
* [Azure][SL7] soft lockups and performance loss occurring during final fsync with parallel dd writes to xfs filesystem in azure instance 
* Guest crashed when hotplug vcpus on booting kernel stage 
* soft lockup occurs while a thread group leader is waiting on tasklist_waiters in mm_update_next_owner() where a huge number of the thread group members are exiting and trying to take the tasklist_lock. 
* [DELL EMC 7.6 BUG] Kioxia CM6 NVMe drive fails to enumerate 
* [Hyper-V][SL7] Request to included a commit that adds a timeout to vmbus_wait_for_unload 
* Unable to discover the LUNs from new storage port 
* SL 7.9 Kernel panic at ceph_put_snap_realm+0x21 
* A hard lockup occurrs where one task is looping in an sk_lock spinlock that has been taken by another task running timespec64_add_ns(). 
* ethtool/mlx5_core provides incorrect SFP module info 
* SL7.7 - zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl 
* SL7.7 - s390/dasd: Fix zero write for FBA devices 
* [Azure]IP forwarding issue in netvsc[7.9.z] 
* Security patch for CVE-2020-25212 breaks directory listings via 'ls' on NFS V4.2 shares mounted with selinux enabled labels 
Enhancement(s): 
* RFE : handle better ERRbaduid on SMB1</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">4819a3eb9dca66f723dfa5c13d6373518d260cde9d2c6f060a94d0b1e77b0b3e</sum></package><package arch="x86_64" name="bpftool" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">f157c6631d357e858553558139fb5cb505ca50b43e3602c2d0736df2c18bed82</sum></package><package arch="x86_64" name="python-perf" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">641f97a285f424556bbe68a21bf178e0ef2ef20905b29aab3210af75d103fe47</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">fe660577b9eaf88827f03c8381566415ad8e1bb3f1650e927c13ecbec550cbd2</sum></package><package arch="x86_64" name="kernel-devel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">6e2d1b4c71950f840f62fc5181b4b8896f0715df42b1776df145f66fc8807109</sum></package><package arch="x86_64" name="kernel-tools" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">011bf1357ed906b856da1da696aa34b0363f0eded1c76a912905c9eed2072391</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">e5e98d69d8bf787726353d7de45385c0473b6d619cfd0231181dd27fa36eb526</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">f68403ea1737e930fb238d3bf1366df3b6427cedc9549ee2d921d114ba1574df</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.15.2.el7.noarch.rpm</filename><sum type="sha256">05e3ce588d2f58ff8b8657f7f34d05ae57d7c27621e6186af6ecf4ccc23e8566</sum></package><package arch="x86_64" name="kernel-headers" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">366f98be9c759b1a0c83154a9e3a2de474e4afbf6600c12149628ed46f2e14a2</sum></package><package arch="x86_64" name="kernel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">220521bb5eac456a87ce0f75842a5f6e283dd26f69ebc503e9a2fa145c185884</sum></package><package arch="noarch" name="kernel-doc" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.15.2.el7.noarch.rpm</filename><sum type="sha256">a403da577d61eca9239b730a897039157a0631dcb86dca6f68feb8fdc21a0282</sum></package><package arch="x86_64" name="perf" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">90114f195d468dfecac0fb18a9ce5729b7d851a4cb0bcf939bf32d5a58dfdfcd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15436" id="CVE-2020-15436" title="Kernel: Use-After-Free In Fs/Block_Dev.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35513" id="CVE-2020-35513" title="Kernel: Nfsd Failure To Clear Umask After Processing An Open Or Create" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0336" id="RHSA-2021:0336-1" title="Rhsa-2021:0336-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1901168" id="1901168" title="Kernel: Use-After-Free In Fs/Block_Dev.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1911309" id="1911309" title="Kernel: Nfsd Failure To Clear Umask After Processing An Open Or Create" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917504" id="1917504" title="Security Patch For Cve-2020-25212 Breaks Directory Listings Via 'Ls' On Nfs V4.2 Shares Mounted With Selinux Enabled Labels" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0339-1</id><title>Linux-Firmware</title><description>Security Fix(es): 
* hardware: buffer overflow in bluetooth firmware (CVE-2020-12321)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="linux-firmware" release="80.git78c0348.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="20200421"><filename>linux-firmware-20200421-80.git78c0348.el7_9.noarch.rpm</filename><sum type="sha256">a04f0ec2d675e33d01959e1a83242c245a2d39a7a2c944c9ff1009cdf6e45167</sum></package><package arch="noarch" name="iwl3160-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl3160-firmware-25.30.13.0-80.el7_9.noarch.rpm</filename><sum type="sha256">b441c460e2aff73fff57433dc2c1a269499d061e7824dcc3a5f7e4776093ad9d</sum></package><package arch="noarch" name="iwl6050-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-80.el7_9.noarch.rpm</filename><sum type="sha256">09990683afec4d460dac7bfe114f290ebc74fa8713f0ac58085a21e7f86c6998</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2a-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">4fa1b02c8567b22d22a9160f692c5bf1964b5b6ce2c69247a257dcb5e95848ac</sum></package><package arch="noarch" name="iwl3945-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-80.el7_9.noarch.rpm</filename><sum type="sha256">359d7aad7d2f44daf6f9f5e8fb3a227f45b7aba607138f749fc647b09297c245</sum></package><package arch="noarch" name="iwl5150-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-80.el7_9.noarch.rpm</filename><sum type="sha256">1309fbd237fcad5bbaf316bc5374f2020ab43416535194e4fac7404730bd0895</sum></package><package arch="noarch" name="iwl5000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-80.el7_9.noarch.rpm</filename><sum type="sha256">a7da327f21ce36292d130875344e0e8a29685864c119177b2416a80190b9efde</sum></package><package arch="noarch" name="iwl105-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">6c35d887982d431759d462240adc49e8ee0cf75846a4cadbda700b42ea88d394</sum></package><package arch="noarch" name="iwl7260-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl7260-firmware-25.30.13.0-80.el7_9.noarch.rpm</filename><sum type="sha256">50f87a1a5e9d58a92daf1f05b74d1eb117127a54d0d2da5c7c507619612af72f</sum></package><package arch="noarch" name="iwl4965-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-80.el7_9.noarch.rpm</filename><sum type="sha256">3ff0d2ff99bfb7b9d6e7ea6f3159545ee33521dea7558a0f2a8ffa9e75898c93</sum></package><package arch="noarch" name="iwl2000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">b2376b69963be7591f80ee41efad20b6c7001d42d260ab5d229287d2ec8d3ae0</sum></package><package arch="noarch" name="iwl6000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-80.el7_9.noarch.rpm</filename><sum type="sha256">bf625e797575121e1d90ab40d4487d83578daf2dc8ee043453b4bd44c8cfdb21</sum></package><package arch="noarch" name="iwl100-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-80.el7_9.noarch.rpm</filename><sum type="sha256">707ce9d9cea1f66a7bb4e3c721711e9575cb5a927ec6644fedbbb30de12dd413</sum></package><package arch="noarch" name="iwl2030-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">0ccc1eeceda14b1c43ec3ba8060a006c0baa36948c3b6c13f60ab3342c7bc2f0</sum></package><package arch="noarch" name="iwl135-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">d7440a356a4d6c9feb4a573c817eb1e3dbcb37f4dc94dbdfeb6600e6f53f003c</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2b-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">61fac0b0aa5a70b9407d35efa59114947ff835794f071a1db6c66302b83e6115</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-80.el7_9.noarch.rpm</filename><sum type="sha256">c639d41f580e6ba17208031184ec07414e2e09241967dce78acfc1036386bab2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12321" id="CVE-2020-12321" title="Hardware: Buffer Overflow In Bluetooth Firmware" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0339" id="RHSA-2021:0339-1" title="Rhsa-2021:0339-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1893914" id="1893914" title="Hardware: Buffer Overflow In Bluetooth Firmware" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0343-1</id><title>Perl</title><description>Security Fix(es): 
* perl: heap-based buffer overflow in regular expression compiler leads to DoS (CVE-2020-10543) 
* perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS (CVE-2020-10878) 
* perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS (CVE-2020-12723)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="perl-Object-Accessor" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.42"><filename>perl-Object-Accessor-0.42-299.el7_9.noarch.rpm</filename><sum type="sha256">d64afc4f611b5fadf848454ebc5d24ba6d29fad9eceb01e1b1eb9ef47f82d186</sum></package><package arch="noarch" epoch="1" name="perl-IO-Zlib" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.10"><filename>perl-IO-Zlib-1.10-299.el7_9.noarch.rpm</filename><sum type="sha256">696a5ac2086dab867d43a0f6a9a8ed324d0887e3acf41c5a064c2c41122ac2b4</sum></package><package arch="x86_64" epoch="4" name="perl-devel" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-devel-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">96de282bb6995063683f9a9e03302fcc8e3259ad67bf4023f8d20ab9793f6a02</sum></package><package arch="x86_64" epoch="4" name="perl" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">8a1ebda5a8b0d73310ce9a196fa387435c6c86e2b570476b10f055c13481c86d</sum></package><package arch="noarch" epoch="1" name="perl-Pod-Escapes" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.04"><filename>perl-Pod-Escapes-1.04-299.el7_9.noarch.rpm</filename><sum type="sha256">068db7d933a580c661090d8a379621bcee2d174b33a1d8976f5317b2ff59df6e</sum></package><package arch="x86_64" epoch="4" name="perl-libs" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-libs-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">04d5bc27c7b13d66e657fd814dcbbe926f96552aa5805972137ccec6b9a23965</sum></package><package arch="x86_64" name="perl-core" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-core-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">1da5c538c63a3ecaa62da94d0bdc5d44ecc3f690ec2dda0632e2590c28092edd</sum></package><package arch="noarch" epoch="1" name="perl-Module-CoreList" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="2.76.02"><filename>perl-Module-CoreList-2.76.02-299.el7_9.noarch.rpm</filename><sum type="sha256">eb4fb6d9d0878452d5ffaeeec24440164ac1ad7ed67c47c6b0daaea384ebeeb6</sum></package><package arch="noarch" epoch="1" name="perl-Locale-Maketext-Simple" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.21"><filename>perl-Locale-Maketext-Simple-0.21-299.el7_9.noarch.rpm</filename><sum type="sha256">77c4bcc8c9ef5781b764dd9542a1596e8cf1b6a50edaaf11ca3a1b102aa2cc25</sum></package><package arch="i686" epoch="4" name="perl-devel" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-devel-5.16.3-299.el7_9.i686.rpm</filename><sum type="sha256">5ab0659408b632e1c380e0a22f046b28275a2ea546300491de5294deb3914044</sum></package><package arch="noarch" epoch="1" name="perl-Module-Loaded" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.08"><filename>perl-Module-Loaded-0.08-299.el7_9.noarch.rpm</filename><sum type="sha256">75b836eb19a38795869ec7bed3116c6ff0ffd00da7ca9ff9821e8ca47839b359</sum></package><package arch="noarch" epoch="1" name="perl-ExtUtils-CBuilder" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.28.2.6"><filename>perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.noarch.rpm</filename><sum type="sha256">85e6da0f6a6dd62d6dc5e93f54aadeb0132ce1a8be521478e0e0dc004bb20763</sum></package><package arch="noarch" epoch="1" name="perl-Package-Constants" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.02"><filename>perl-Package-Constants-0.02-299.el7_9.noarch.rpm</filename><sum type="sha256">c6625ac445d3b437ea31e7828492f99e7a9db3ab7edf9de0b9b24402756a989f</sum></package><package arch="noarch" name="perl-ExtUtils-Install" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.58"><filename>perl-ExtUtils-Install-1.58-299.el7_9.noarch.rpm</filename><sum type="sha256">37c2112c1518ee42c1df7e6f8fe87e262117d4f6ad41932686a04edc1b8ceea8</sum></package><package arch="x86_64" epoch="4" name="perl-tests" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-tests-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">592b542b405321165353857c4695891647bc7a67673d5c68676e60b0fdcaa4c9</sum></package><package arch="x86_64" epoch="4" name="perl-macros" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-macros-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">a879c7b50bb471730f8ee371ff90439aa238254bacf7b8cd7873afbe3b42538b</sum></package><package arch="i686" epoch="4" name="perl-libs" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-libs-5.16.3-299.el7_9.i686.rpm</filename><sum type="sha256">ac2d5dac30d4a5ce7ba68f7945408344ab95816306be5e169da469e58c0d7c5c</sum></package><package arch="noarch" name="perl-CPAN" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.9800"><filename>perl-CPAN-1.9800-299.el7_9.noarch.rpm</filename><sum type="sha256">e3c5ea3f13c03a16f5e33e284e704abdb353679e0cc3a4efd49921c39b8d867f</sum></package><package arch="noarch" name="perl-ExtUtils-Embed" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.30"><filename>perl-ExtUtils-Embed-1.30-299.el7_9.noarch.rpm</filename><sum type="sha256">e89ea9809b4a2d6e54e5beff03ee40da52b44c48e659e0f85f239db2841bf276</sum></package><package arch="x86_64" name="perl-Time-Piece" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.20.1"><filename>perl-Time-Piece-1.20.1-299.el7_9.x86_64.rpm</filename><sum type="sha256">43c6481cdb21258a36f8c8ecdb8a4512cb899ea3d99c5fd5709a1cee4e004463</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543" id="CVE-2020-10543" title="Perl: Heap-Based Buffer Overflow In Regular Expression Compiler Leads To Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878" id="CVE-2020-10878" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Integer Overflow Leads To Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723" id="CVE-2020-12723" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Recursive S_Study_Chunk() Calls Leads To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0343" id="RHSA-2021:0343-1" title="Rhsa-2021:0343-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837975" id="1837975" title="Perl: Heap-Based Buffer Overflow In Regular Expression Compiler Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837988" id="1837988" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Integer Overflow Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1838000" id="1838000" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Recursive S_Study_Chunk() Calls Leads To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0347-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: loader: OOB access while loading registered ROM may lead to code execution (CVE-2020-13765) 
* QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) 
Bug Fix(es): 
* qemu-kvm FTBFS on rhel7.9</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">3d983d02fae65d5d2d794245897da2c827f12948c7a4ee123f80ca80ae9acecc</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">a5d343cba227c6c6f03908786c70e3da960559910b7c92460d14db8c2a4c0f2a</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">c63f9feea8f5a3ed3c274cf5193209dd2390dbc612b647c2ea50e74c3442d4f2</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">3e53c4a294b534c01ee62b3f8659b72b3f66297c9fef4145c78ffe5d9e5e2929</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765" id="CVE-2020-13765" title="Qemu: Loader: Oob Access While Loading Registered Rom May Lead To Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" id="CVE-2020-16092" title="Qemu: Reachable Assertion Failure In Net_Tx_Pkt_Add_Raw_Fragment() In Hw/Net/Net_Tx_Pkt.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0347" id="RHSA-2021:0347-1" title="Rhsa-2021:0347-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1842912" id="1842912" title="Qemu: Loader: Oob Access While Loading Registered Rom May Lead To Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1860283" id="1860283" title="Qemu: Reachable Assertion Failure In Net_Tx_Pkt_Add_Raw_Fragment() In Hw/Net/Net_Tx_Pkt.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1884997" id="1884997" title="Qemu-Kvm Ftbfs On Rhel7.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0348-1</id><title>Glibc</title><description>Security Fix(es): 
* glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013) 
* glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE-2020-10029) 
* glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern (CVE-2020-29573) 
Bug Fix(es): 
* glibc: 64bit_strstr_via_64bit_strstr_sse2_unaligned detection fails with large device and inode numbers 
* glibc: Performance regression in ebizzy benchmark</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glibc" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-2.17-322.el7_9.i686.rpm</filename><sum type="sha256">eacc8efa6a1535da6f99f937267659b1ec828fcc3fa4a56f47093a9a8315a0ca</sum></package><package arch="i686" name="glibc-static" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-static-2.17-322.el7_9.i686.rpm</filename><sum type="sha256">c0ddb6b8b1d2c5a02c0430a5c0f7e13c771bdc14316e37090c97beaea11feeff</sum></package><package arch="x86_64" name="nscd" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>nscd-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">f75977b94de6357ed40a544a2303b9c7b8718902a93c2167721c2afcc9838949</sum></package><package arch="x86_64" name="glibc-headers" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-headers-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">08a987cadf27a5435d8396d0aab85bc190e0c769adebb5d12441a18c54f5a6ee</sum></package><package arch="x86_64" name="glibc" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">7313f96fbe52fdf0ebe11d6f4104839038daa082391d8cebd0ce2ea53feaf182</sum></package><package arch="x86_64" name="glibc-common" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-common-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">8cbea99ed186c6a595b589a89239605dbf2e938c91f7c4163a3048d4e1e74e96</sum></package><package arch="x86_64" name="glibc-static" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-static-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">15893bf07ed763152dc3095f86c85e9d53b6fa08a4b88bd34ec084179d8c9f9b</sum></package><package arch="x86_64" name="glibc-utils" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-utils-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">a155c586e5c649ea52af5ef4ff5dc331be482d4a9e5c4ab76cf7a5288dd9b444</sum></package><package arch="x86_64" name="glibc-devel" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-devel-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">c7e682d49ec90a9e70349e91dffb34b3e5542f8bde9305784e05b6e5988c9ea1</sum></package><package arch="i686" name="glibc-devel" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-devel-2.17-322.el7_9.i686.rpm</filename><sum type="sha256">f1012e0c66ae6b9a3d92cb167dd69f5096c1a450369f4bbdc677e3a52ffcfcf2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" id="CVE-2019-25013" title="Glibc: Buffer Over-Read In Iconv When Processing Invalid Multi-Byte Input Sequences In The Euc-Kr Encoding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" id="CVE-2020-10029" title="Glibc: Stack Corruption From Crafted Input In Cosl, Sinl, Sincosl, And Tanl Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573" id="CVE-2020-29573" title="Glibc: Stack-Based Buffer Overflow If The Input To Any Of The Printf Family Of Functions Is An 80-Bit Long Double With A Non-Canonical Bit Pattern" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0348" id="RHSA-2021:0348-1" title="Rhsa-2021:0348-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1810670" id="1810670" title="Glibc: Stack Corruption From Crafted Input In Cosl, Sinl, Sincosl, And Tanl Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1905213" id="1905213" title="Glibc: Stack-Based Buffer Overflow If The Input To Any Of The Printf Family Of Functions Is An 80-Bit Long Double With A Non-Canonical Bit Pattern" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1912960" id="1912960" title="Glibc: Buffer Over-Read In Iconv When Processing Invalid Multi-Byte Input Sequences In The Euc-Kr Encoding" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0411-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: sandbox escape via spawn portal (CVE-2021-21261)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-devel" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-10.el7_9.x86_64.rpm</filename><sum type="sha256">c61b58e307ac1e785724862fa5f80d57d397110acfe5376f714c6d64087cb797</sum></package><package arch="x86_64" name="flatpak" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-10.el7_9.x86_64.rpm</filename><sum type="sha256">d0145d8c5521f572cee69348e00b09664808dac4e662590d902cde19fa22dded</sum></package><package arch="x86_64" name="flatpak-builder" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">66b166ee3a30969fcbfd740f8798191aaf894a4056c4c2a7f7042a9669e71c5f</sum></package><package arch="x86_64" name="flatpak-libs" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-10.el7_9.x86_64.rpm</filename><sum type="sha256">53e599519edd6b04990f2649ab7bf1bde929af36f047272d2e76b9b41697686b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21261" id="CVE-2021-21261" title="Flatpak: Sandbox Escape Via Spawn Portal" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0411" id="RHSA-2021:0411-1" title="Rhsa-2021:0411-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917430" id="1917430" title="Flatpak: Sandbox Escape Via Spawn Portal" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0617-1</id><title>Xterm</title><description>Security Fix(es): 
* xterm: crash when processing combining characters (CVE-2021-27135) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xterm" release="3.el7_9.1" src="xterm-295-3.el7_9.1.src.rpm" version="295"><filename>xterm-295-3.el7_9.1.x86_64.rpm</filename><sum type="sha256">448e8b7f54e28e5c9703d5229aee2e63307a6bea9d70f84bd855c88859fc5a8c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27135" id="CVE-2021-27135" title="Xterm: Crash When Processing Combining Characters" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0617" id="RHSA-2021:0617-1" title="Rhsa-2021:0617-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1927559" id="1927559" title="Xterm: Crash When Processing Combining Characters" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0656-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.8.0 ESR. 
Security Fix(es): 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) 
* Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) 
* Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-02-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.8.0-1.el7_9.src.rpm" version="78.8.0"><filename>firefox-78.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">bffabc0d15725ce0f2db7e29a57216be2d3b29e90cf0e23635a246d57c21c2ca</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.8.0-1.el7_9.src.rpm" version="78.8.0"><filename>firefox-78.8.0-1.el7_9.i686.rpm</filename><sum type="sha256">538a8b1e2d4d02551f4ad78f403e7084b8f3fd3f64f30bc3365faba14fe7b146</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23968" id="CVE-2021-23968" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23969" id="CVE-2021-23969" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23973" id="CVE-2021-23973" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23978" id="CVE-2021-23978" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0656" id="RHSA-2021:0656-1" title="Rhsa-2021:0656-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932109" id="1932109" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932110" id="1932110" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932111" id="1932111" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932112" id="1932112" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0661-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.8.0. 
Security Fix(es): 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) 
* Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) 
* Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.8.0-1.el7_9.src.rpm" version="78.8.0"><filename>thunderbird-78.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">1aa130714f02d6a5c556311988160f3c524434952a6b6e37c8b5523300e692e3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23968" id="CVE-2021-23968" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23969" id="CVE-2021-23969" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23973" id="CVE-2021-23973" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23978" id="CVE-2021-23978" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0661" id="RHSA-2021:0661-1" title="Rhsa-2021:0661-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932109" id="1932109" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932110" id="1932110" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932111" id="1932111" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932112" id="1932112" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0671-1</id><title>Bind</title><description>Security Fix(es): 
* bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">9e5b6954ca3d6c7894e4f201dc81b3a44cc8cf313cb643ca80993250d9547edb</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.4.noarch.rpm</filename><sum type="sha256">d81fadde04be1fafc43fab22dc897c12cbb19a14fc937003d8d95ba767f91843</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">155fb158aedbbfa4309a2fc1adf9a9254c1e72832ec0430dbde5fd8000939dcb</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">38346b34188c8f02e33be391b9c1028daff131a0a07eb929d74946b40509a22c</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">b41e52f3edca20a46f973b6dd81fd78b02a2d0c135774557825a882f2af91f13</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">75de22a7c836f42186a20178c133abd0833d0c7f608cb1872a24ead5ae2b0596</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">3b21ac1132c5ac0564d420000174627746983bb56597497b7afa20ea1b190d44</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">ea67cc77ffa069331349999858a7be56379764c27f50aa00f11994ed1db6fa60</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">8ce0b348fce9caddf37e20278fe63d1e4bac52334a6403f1c4b4cb898d8d7eea</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">5f919bfe6e9caae3aeb37ac98f75fb8e1dd268d48a739a6f26e988f9cb5ffcdb</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">0e77cacde069f2e0f0d7cfd869a9bd2d68b63c6590cff598244fedf369b126ef</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">a5b9ea01e6d83a3239e98c5c2e8e6ca8197a99b540fd9892eadbac9228b5e94b</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">66663a2950103cfddb2b2f82893add4ddc1d4fb874136a91225bf566acb6d3ad</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">75a0b671d85195099bb672d52ce7bf7fb374f2def8985d6f2c8ad1be6185b8ac</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">3ddbdf296547fabaacae407f196f83ca4e63c7ce59bf70b98d7d54611641957e</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">0cb5b1e3f2f602e1b5303ccfc199c83effa19de2cecccb547d247f0c4184a099</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">e1645fffa1754662ae830cc70dea4f10d4b8bc0118a0418d0fb520dc4215eac5</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">c3863f0ffda833af04d3aabbb71c6855ecdb162552dbe1bb9a0909b2dd8d3a88</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">23d6d30f7a3e3d1a5ce04d5dca4b240fbac6e2ba56d0b5fc4f50706aa9f82cc7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">82e44e5a3424840261903624d40dab0f3bef3083778f2b39620e718284f247f3</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">6ff982494cc963eca0c9b8829b0c2e54bb1c40f199bb66e79111c7f17169a152</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">b2c9ec7a5b017591dbec8b4ce004c08404f77f88b6b86bab6a7425de98e969b7</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">1fa6d5cfee562631a69c72c711493521bb2ee0ce0781c824a931813e133eb96e</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">b6310e106c6c0a80ef9e0f873a5e7a774de6d8f5cba6ca65cb9e7abd23c62b60</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625" id="CVE-2020-8625" title="Bind: Buffer Overflow In The Spnego Implementation Affecting Gssapi Security Policy Negotiation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0671" id="RHSA-2021:0671-1" title="Rhsa-2021:0671-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1928486" id="1928486" title="Bind: Buffer Overflow In The Spnego Implementation Affecting Gssapi Security Policy Negotiation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0699-1</id><title>Grub2</title><description>Security Fix(es): 
* grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) 
* grub2: Use-after-free in rmmod command (CVE-2020-25632) 
* grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) 
* grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) 
* grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) 
* grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) 
* grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">211792b09de5351782267910616b09be86c67abe554507762bc029ab89f713ff</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">91c1cbec8dedb06f74858471953cc877a5897595d67ccdfcf76ec92f57f75a4c</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">c999bc78e1c7d24ce12dff9c26b89727827463f3ee2f11ad6ad55695ac479321</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">d9d357ee4502829702d4de4272c92a61df523bd845e715f0f95ba8a04b68357d</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">a610c089ce1abe1c02eb23d1a75f32d70130c8670f7e8e6b751b6f1d80988078</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">a5cce68e0bdd981b7e54b89917843063ffb01baa386511f618d6b3d3c7022d7b</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">af47dfa3848878a70d820bf584b6e27b477adfc7101a848e174f2a863fd0593d</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">bebee412feb48e7dd3053fe1436ae36d8dcb365da4e707c6e277d3510339dc66</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">f2b308408f69ad224c62a000f51ee6113a732caa79e13f048c6ca0dc3f3f9ec3</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">b7e8bbde9b06adc5a0547bc1a3eeaf5fd036048fd4b3f69ac9a6b5b4f4cd94db</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">bfd4e691d2d6adfe6486f9b58b48dad5c0f08ae2e264704e14be52fd9806a2ec</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">9be8073a973b51f8bf465f1ba7c590e9068250fd7379e83ca46bd83a52f5d2f3</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">0ff26046d5996a5ff945f544bbdf505d6c8486faa7944e7efefa2fa7fd15a66b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372" id="CVE-2020-14372" title="Grub2: Acpi Command Allows Privileged User To Load Crafted Acpi Tables When Secure Boot Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632" id="CVE-2020-25632" title="Grub2: Use-After-Free In Rmmod Command" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647" id="CVE-2020-25647" title="Grub2: Out-Of-Bounds Write In Grub_Usb_Device_Initialize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749" id="CVE-2020-27749" title="Grub2: Stack Buffer Overflow In Grub_Parser_Split_Cmdline()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779" id="CVE-2020-27779" title="Grub2: Cutmem Command Allows Privileged User To Remove Memory Regions When Secure Boot Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225" id="CVE-2021-20225" title="Grub2: Heap Out-Of-Bounds Write In Short Form Option Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233" id="CVE-2021-20233" title="Grub2: Heap Out-Of-Bounds Write Due To Miscalculation Of Space Required For Quoting" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0699" id="RHSA-2021:0699-1" title="Rhsa-2021:0699-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1873150" id="1873150" title="Grub2: Acpi Command Allows Privileged User To Load Crafted Acpi Tables When Secure Boot Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1879577" id="1879577" title="Grub2: Use-After-Free In Rmmod Command" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1886936" id="1886936" title="Grub2: Out-Of-Bounds Write In Grub_Usb_Device_Initialize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899966" id="1899966" title="Grub2: Stack Buffer Overflow In Grub_Parser_Split_Cmdline()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1900698" id="1900698" title="Grub2: Cutmem Command Allows Privileged User To Remove Memory Regions When Secure Boot Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1924696" id="1924696" title="Grub2: Heap Out-Of-Bounds Write In Short Form Option Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1926263" id="1926263" title="Grub2: Heap Out-Of-Bounds Write Due To Miscalculation Of Space Required For Quoting" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0742-1</id><title>Screen</title><description>Security Fix(es): 
* screen: crash when processing combining chars (CVE-2021-26937) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="screen" release="0.27.20120314git3c2946.el7_9" src="screen-4.1.0-0.27.20120314git3c2946.el7_9.src.rpm" version="4.1.0"><filename>screen-4.1.0-0.27.20120314git3c2946.el7_9.x86_64.rpm</filename><sum type="sha256">04b381686a62e297500b1341fea5c3bc9d8d3c2a9d9708a47b83290754881a02</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937" id="CVE-2021-26937" title="Screen: Crash When Processing Combining Chars" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0742" id="RHSA-2021:0742-1" title="Rhsa-2021:0742-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1927062" id="1927062" title="Screen: Crash When Processing Combining Chars" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0808-1</id><title>Wpa_Supplicant</title><description>Security Fix(es): 
* wpa_supplicant: Use-after-free in P2P provision discovery processing (CVE-2021-27803) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="wpa_supplicant" release="12.el7_9.2" src="wpa_supplicant-2.6-12.el7_9.2.src.rpm" version="2.6"><filename>wpa_supplicant-2.6-12.el7_9.2.x86_64.rpm</filename><sum type="sha256">9dc31d95856d46cb6ea4112361e906f5810c2e5fb807ed3171c9959c5764c7ff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27803" id="CVE-2021-27803" title="Wpa_Supplicant: Use-After-Free In P2P Provision Discovery Processing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0808" id="RHSA-2021:0808-1" title="Rhsa-2021:0808-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1933361" id="1933361" title="Wpa_Supplicant: Use-After-Free In P2P Provision Discovery Processing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0851-1</id><title>Pki-Core</title><description>Security Fix(es): 
* pki-core: Unprivileged users can renew any certificate (CVE-2021-20179) 
* pki-core: XSS in the certificate search results (CVE-2020-25715) 
* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) 
* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) 
* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) 
* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Add KRA Transport and Storage Certificates profiles, audit for IPA</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-server" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-server-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">27fbad63d48e3e5d745e3fa7226c4ff0c35826d1c159730c9dab129f41446f32</sum></package><package arch="x86_64" name="pki-symkey" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-symkey-10.5.18-12.el7_9.x86_64.rpm</filename><sum type="sha256">e8b4db9bf26442f9289a6ade6e8d75677b468c723c62a78555fef78dac9a052b</sum></package><package arch="x86_64" name="pki-tools" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-tools-10.5.18-12.el7_9.x86_64.rpm</filename><sum type="sha256">ecd82e0ce19a61c9f8e51befbcb13609b71dd3297b543dff15cd31a7c738bd75</sum></package><package arch="noarch" name="pki-base-java" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-base-java-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">b667db533d0b0466cd9a7f191ed2f46ff7b6343365895224fdc58b4ccfdf8dbb</sum></package><package arch="noarch" name="pki-base" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-base-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">0650738faad52eaabc98983e443017fb63828e5b482060b4c112d7c239c9f00b</sum></package><package arch="noarch" name="pki-kra" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-kra-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">7f670bc1e1e47d342b2576e33faa19251ea3b33eac328048705c167d0e486a4e</sum></package><package arch="noarch" name="pki-javadoc" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-javadoc-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">bdd7527f205895ae73cada65090a85605f39ab7185d081b4d36572e13e0b01c2</sum></package><package arch="noarch" name="pki-ca" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-ca-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">b25de0464afb617728604cf1bc4f9918c412182ca2720ef7f00193e098eaf5a4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10146" id="CVE-2019-10146" title="Pki-Core: Reflected Xss In 'Path Length' Constraint Field In Ca'S Agent Page" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10179" id="CVE-2019-10179" title="Pki-Core/Pki-Kra: Reflected Xss In Recoveryid Search Field At Kra'S Drm Agent Page In Authorize Recovery Tab" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10221" id="CVE-2019-10221" title="Pki-Core: Reflected Xss In Getcookies?Url= Endpoint In Ca" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1721" id="CVE-2020-1721" title="Pki-Core: Kra Vulnerable To Reflected Xss Via The Getpk12 Page" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25715" id="CVE-2020-25715" title="Pki-Core: Xss In The Certificate Search Results" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20179" id="CVE-2021-20179" title="Pki-Core: Unprivileged Users Can Renew Any Certificate" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0851" id="RHSA-2021:0851-1" title="Rhsa-2021:0851-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695901" id="1695901" title="Pki-Core/Pki-Kra: Reflected Xss In Recoveryid Search Field At Kra'S Drm Agent Page In Authorize Recovery Tab" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1710171" id="1710171" title="Pki-Core: Reflected Xss In 'Path Length' Constraint Field In Ca'S Agent Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732565" id="1732565" title="Pki-Core: Reflected Xss In Getcookies?Url= Endpoint In Ca" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777579" id="1777579" title="Pki-Core: Kra Vulnerable To Reflected Xss Via The Getpk12 Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883639" id="1883639" title="Add Kra Transport And Storage Certificates Profiles, Audit For Ipa" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1891016" id="1891016" title="Pki-Core: Xss In The Certificate Search Results" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1914379" id="1914379" title="Pki-Core: Unprivileged Users Can Renew Any Certificate" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0856-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211) 
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374) 
* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an  use- after-free (CVE-2020-29661) 
* kernel: malicious USB devices can lead to multiple out-of-bounds write (CVE-2019-19532) 
* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427) 
* kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c (CVE-2020-7053) 
* kernel: performance counters race condition use-after-free (CVE-2020-14351) 
* kernel: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints (CVE-2020-25645) 
* kernel: use-after-free in read in vt_do_kdgkb_ioctl (CVE-2020-25656) 
* kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705) 
* kernel: increase slab leak leads to DoS (CVE-2021-20265) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* BUG: scheduling while atomic: memory allocation under spinlock in scsi_register_device_handler() 
* WARNING in __iscsit_free_cmd during recovery Abort 
* lpfc does not issue adisc to fcp-2 devices, does not respond to nvme targer that send an adisc. 
* Panic in semctl_nolock.constprop.15+0x25b 
* [SL 7.7][md]Crash due to invalid pool workqueue pointer, work queue race 
* Guest crash on intel CPU with -cpu host,-spec-ctrl,+ibpb 
* SL7.9 - kernel/uv: handle length extension properly 
* Commit b144f013fc16a06d7a4b9a4be668a3583fafeda2 'i40e: don't report link up for a VF who hasn't enabled queues' introducing issues with VM using DPDK 
* writing to /sys/devices/(...)/net/eno49/queues/tx-16/xps_cpus triggers kernel panic 
* [Hyper-V][SL-7.9]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit 
* kvm-rhel7.9 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. 
* kernel: nvme nvme7: Connect command failed, error wo/DNR bit: 2 
* dm-mirror crashes from assuming underlying storage will have a non-NULL merge_bvec_fn 
* watchdog: use nmi registers snapshot in hardlockup handler 
* [DELL EMC 7.9 BUG] - Intel E810 NIC interfaces are not functional in SL 7.9 on system with AMD Rome CPUs 
* [DELL EMC BUG] SL system log shows AMD-Vi error when system connected with Gen 4 NVMe drives.</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.21.1.el7.noarch.rpm</filename><sum type="sha256">6094e9603b4da2bd6f6ba4f79b712d16a8d14b56191887cfcc8d668c5e2362d3</sum></package><package arch="x86_64" name="python-perf" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">038ef49230c56246614a9e976d4e48bf691c27dd1babf0c510652da1ecda040f</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">0100ae043f3b4577d767caf812e96a0c2347a2d109e71d143e3bc254b9b10ddb</sum></package><package arch="x86_64" name="kernel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">ef252a2debd82692426f4c01bf78fbc47a5fd2373952a6843a3bb47333493e49</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">62d08da1cc34e06dd21140d6be0ca0f6e7869848011f83c5a23144333caf3a2e</sum></package><package arch="x86_64" name="kernel-tools" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">d48e0daae8ef795b5f3cf826a5881096543adf966c215e3388fa49de360c058f</sum></package><package arch="x86_64" name="bpftool" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">f4f24d0198c3147ef985fad6a6f613c5aa3129c52651d6c13beb40148b07493f</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">8f972059f758fb7bee95648c26a782e740d4fdfa4df401a6a1148e86a46d9871</sum></package><package arch="x86_64" name="perf" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">6ffd6ee9056d8b8f8c7239bb253fd49c4e0a57d1dce37430e7feb045b84e089b</sum></package><package arch="x86_64" name="kernel-debug" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">a287d94257eaa061dbe260bb586cba664091cb667304204191a35dd9db5978aa</sum></package><package arch="x86_64" name="kernel-devel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">ff02f6293b776f7974a19d1df5e50d274398f2b81212892aa18f9004c1920919</sum></package><package arch="x86_64" name="kernel-headers" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">9aaef01ecab63328e3ee79422bf5342559480ec96b42b3e1ebf609a58030336e</sum></package><package arch="noarch" name="kernel-doc" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.21.1.el7.noarch.rpm</filename><sum type="sha256">adfcbf58602c4b3dbbd37b346c6368af906a4c0af87daa81824d1135b0976a3d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19532" id="CVE-2019-19532" title="Kernel: Malicious Usb Devices Can Lead To Multiple Out-Of-Bounds Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0427" id="CVE-2020-0427" title="Kernel: Out-Of-Bounds Reads In Pinctrl Subsystem." type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14351" id="CVE-2020-14351" title="Kernel: Performance Counters Race Condition Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211" id="CVE-2020-25211" title="Kernel: Local Buffer Overflow In Ctnetlink_Parse_Tuple_Filter In Net/Netfilter/Nf_Conntrack_Netlink.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25645" id="CVE-2020-25645" title="Kernel: Geneve/Ipsec Traffic May Be Unencrypted Between Two Geneve Endpoints" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656" id="CVE-2020-25656" title="Kernel: Use-After-Free In Read In Vt_Do_Kdgkb_Ioctl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25705" id="CVE-2020-25705" title="Kernel: Icmp Rate Limiting Can Be Used For Dns Poisoning Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374" id="CVE-2020-28374" title="Kernel: Scsi Target (Lio) Write To Any Block On Ilo Backstore" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661" id="CVE-2020-29661" title="Kernel: Locking Issue In Drivers/Tty/Tty_Jobctrl.C Can Lead To An Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7053" id="CVE-2020-7053" title="Kernel: Use-After-Free In I915_Ppgtt_Close In Drivers/Gpu/Drm/I915/I915_Gem_Gtt.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20265" id="CVE-2021-20265" title="Kernel: Increase Slab Leak Leads To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0856" id="RHSA-2021:0856-1" title="Rhsa-2021:0856-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781821" id="1781821" title="Kernel: Malicious Usb Devices Can Lead To Multiple Out-Of-Bounds Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795624" id="1795624" title="Kernel: Use-After-Free In I915_Ppgtt_Close In Drivers/Gpu/Drm/I915/I915_Gem_Gtt.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862849" id="1862849" title="Kernel: Performance Counters Race Condition Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877571" id="1877571" title="Kernel: Local Buffer Overflow In Ctnetlink_Parse_Tuple_Filter In Net/Netfilter/Nf_Conntrack_Netlink.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883988" id="1883988" title="Kernel: Geneve/Ipsec Traffic May Be Unencrypted Between Two Geneve Endpoints" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1888726" id="1888726" title="Kernel: Use-After-Free In Read In Vt_Do_Kdgkb_Ioctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1894579" id="1894579" title="Kernel: Icmp Rate Limiting Can Be Used For Dns Poisoning Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899804" id="1899804" title="Kernel: Scsi Target (Lio) Write To Any Block On Ilo Backstore" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1901064" id="1901064" title="Commit B144F013Fc16A06D7A4B9A4Be668A3583Fafeda2 'I40E: Don'T Report Link Up For A Vf Who Hasn'T Enabled Queues' Introducing Issues With Vm Using Dpdk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1906525" id="1906525" title="Kernel: Locking Issue In Drivers/Tty/Tty_Jobctrl.C Can Lead To An Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908827" id="1908827" title="Kernel: Increase Slab Leak Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1916589" id="1916589" title="Watchdog: Use Nmi Registers Snapshot In Hardlockup Handler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1919893" id="1919893" title="Kernel: Out-Of-Bounds Reads In Pinctrl Subsystem." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0860</id><title>Moderate: Ipa Security And Bug Fix Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* jquery: Passing HTML containing &amp;lt;option&amp;gt; elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* cannot issue certs with multiple IP addresses corresponding to different hosts (BZ#1846349) * CA-less install does not set required permissions on KDC certificate (BZ#1863619) * IdM Web UI shows users as disabled (BZ#1884819) * Authentication and login times are over several seconds due to unindexed ipaExternalMember (BZ#1892793) * improve IPA PKI susbsystem detection by other means than a directory presence, use pki-server subsystem-find (BZ#1895197) * IPA WebUI inaccessible after upgrading to RHEL 8.3 - idoverride-memberof.js missing (BZ#1897253)
</description><severity>moderate</severity><issued date="2021-03-16 11:55:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ipa-client" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.4.x86_64.rpm</filename><sum type="sha256">1ed4bf14bd52dc244d62b6916df8470e09377e46366a271670570b0061ae62d0</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">9ff8b4cb8abe9ed22d2ccbc4fc24bf9f5c69da12e614592e1128d818280a7085</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">aeffe6fb3d8ef7a95f472e281a7cfdeede480ba3e6f5c08565584bb163a5f20d</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">d4febde3124992711419e10f72a60fed11bd033cab1c426a6b9cb7a0a862cc42</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.4.x86_64.rpm</filename><sum type="sha256">3bc5d8e6824bcb898657402f40baa86030f2ed3eff94f1ff0b806f58b69f9aaa</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">9b29cedcbaed715cc305adfb56233bfada6d59d95e46d69f348ea4f78c904993</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.4.x86_64.rpm</filename><sum type="sha256">b1ffa453b3b8caee571c289db11631bdcaf82a08b717da819c84bcfececb7493</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">8136719389c6e1ad756cefa0e711d90ed61d67b9d8957f5b473daf227e478eab</sum></package><package arch="noarch" name="ipa-client-common" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">f22012aec24260700ec750141870e1af40568ead8cac252af493ae9124daf9b7</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">f915a15b5337d345c496b3db7f86bff99fb018766ed8a2892868bdcbfdc6f7e8</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">4f3b2a4c67baf3947332d06ac24edffb730353ea58514553191762376a3db5f5</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" id="CVE-2020-11023" title="Cve-2020-11023" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0860" id="RHSA-2021:0860" title="Moderate: Ipa Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1846349" id="1846349" title="1846349 &#8211; Cannot Issue Certs With Multiple Ip Addresses Corresponding To Different Hosts [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1863619" id="1863619" title="1863619 &#8211; Ca-Less Install Does Not Set Required Permissions On Kdc Certificate [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1884819" id="1884819" title="1884819 &#8211; Idm Web Ui Shows Users As Disabled [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1892793" id="1892793" title="1892793 &#8211; Authentication And Login Times Are Over Several Seconds Due To Unindexed Ipaexternalmember [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1895197" id="1895197" title="1895197 &#8211; Improve Ipa Pki Susbsystem Detection By Other Means Than A Directory Presence, Use Pki-Server Subsystem-Find [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1897253" id="1897253" title="1897253 &#8211; Ipa Webui Inaccessible After Upgrading To Rhel 8.3 - Idoverride-Memberof.Js Missing [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0992-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.9.0 ESR. 
Security Fix(es): 
* Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) 
* Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) 
* Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.9.0-1.el7_9.src.rpm" version="78.9.0"><filename>firefox-78.9.0-1.el7_9.i686.rpm</filename><sum type="sha256">449df14cbc360743a3ab34d43f07a97ec2ae373f63491b35c475434ecfb308c5</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.9.0-1.el7_9.src.rpm" version="78.9.0"><filename>firefox-78.9.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ad40a8508cce4f79864e7962536bb3f03c4fabb32ecc482d6995b438af64895f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" id="CVE-2021-23981" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" id="CVE-2021-23982" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" id="CVE-2021-23984" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" id="CVE-2021-23987" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0992" id="RHSA-2021:0992-1" title="Rhsa-2021:0992-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942783" id="1942783" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942785" id="1942785" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942786" id="1942786" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942787" id="1942787" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0996-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.9.0. 
Security Fix(es): 
* Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) 
* Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) 
* Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-78.9.0-3.el7_9.src.rpm" version="78.9.0"><filename>thunderbird-78.9.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">9166b8b1c37e08b4a4701b5003444858ecacb6bcdc9d9b193f7e4d3b351b924a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" id="CVE-2021-23981" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" id="CVE-2021-23982" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" id="CVE-2021-23984" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" id="CVE-2021-23987" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0996" id="RHSA-2021:0996-1" title="Rhsa-2021:0996-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942783" id="1942783" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942785" id="1942785" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942786" id="1942786" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942787" id="1942787" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1002-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: "file forwarding" feature can be used to gain unprivileged access to files (CVE-2021-21381) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-libs" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-11.el7_9.x86_64.rpm</filename><sum type="sha256">a0c8d1985df717702a00c219b1dfd9411914253a7af93163f746b240db61095c</sum></package><package arch="x86_64" name="flatpak-builder" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-11.el7_9.x86_64.rpm</filename><sum type="sha256">00b6c14edd3fba4506b7a3230dca8b89b5540cebc377e2a51f7db1bd3ca4597b</sum></package><package arch="x86_64" name="flatpak" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-11.el7_9.x86_64.rpm</filename><sum type="sha256">cf33c9234e001b7606a40cc1b452c7b75d25d06e6005bde9a65aa998a9ad0676</sum></package><package arch="x86_64" name="flatpak-devel" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-11.el7_9.x86_64.rpm</filename><sum type="sha256">6521ddac74e82ae43234671eddc5f24b795a47e80b72b9e7a97ff01c824d8094</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21381" id="CVE-2021-21381" title="Flatpak: &quot;File Forwarding&quot; Feature Can Be Used To Gain Unprivileged Access To Files" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1002" id="RHSA-2021:1002-1" title="Rhsa-2021:1002-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1936985" id="1936985" title="Flatpak: &quot;File Forwarding&quot; Feature Can Be Used To Gain Unprivileged Access To Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1071-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) 
* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) 
* kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Customer testing eMMC sees and intermittent boot problem on 7.8+, was not  seen on 7.3 
* tcm loopback driver causes double-start of scsi command when work is delayed 
* [Azure][SL-7]Mellanox Patches To Prevent Kernel Hang In MLX4 
* A patch from upstream c365c292d059 causes us to end up leaving rt_nr_boosted in an inconsistent state, which causes a hard lockup. 
* [SL7.9.z] Add fix to update snd_wl1 in bulk receiver fast path</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-perf" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">2f2fd4117c14eeede25c4093b900d7201919a46389f10857579254ea0eff776b</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">cb76211b757a3cd464b24f2d7060fe2d0e72afa9d11fc8f3469391eb16fde71c</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm</filename><sum type="sha256">f1afb9b8996e3da3191f1c34adc71dc6a7647897dec1cfc5f1d92b0de7032716</sum></package><package arch="x86_64" name="kernel-debug" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">656c38db2453c891ad2c45f9cfb9e74539e60e77471f2bd16c7825c9ec494794</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">e8adb9705ab08223016f1a2d3f3bbe7cc9527178c1416d3e9701c563b42fc66d</sum></package><package arch="x86_64" name="kernel" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">8b02c778e6f475a8c05a6fd907f4a30cbf2b398de2db16b774c0e8f80dbf7639</sum></package><package arch="noarch" name="kernel-doc" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm</filename><sum type="sha256">4e1999914ac5f99b35772588a3724ac771e06bf70bccb969b19a7f947346c40d</sum></package><package arch="x86_64" name="kernel-tools" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">2a5af3560c0d2b58d3e92e072f21cbac7d005054e5669bb750df3ad80e342df9</sum></package><package arch="x86_64" name="kernel-headers" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">40794e52ae66c3260a991b1ec548f180df2c79ae3be19e9ae2469ce661494ff0</sum></package><package arch="x86_64" name="kernel-devel" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">45e0d2a3eec5f01530801e319c16cf353c1f4f01e2f671899c1538957580233d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">af70c25c4ef9a8ad37b20d2897f7284b9821b5f051e96e2323c73913435c71e1</sum></package><package arch="x86_64" name="bpftool" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">e8937433e163b569db4594a6ef9ca6282fc9d0a4c26320c2b8ad3fa4594bdc77</sum></package><package arch="x86_64" name="perf" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">aa3218f14b92997019671e64c7e60538305d57e6c18be05678bb7221b3a44707</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363" id="CVE-2021-27363" title="Kernel: Iscsi: Unrestricted Access To Sessions And Handles" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364" id="CVE-2021-27364" title="Kernel: Out-Of-Bounds Read In Libiscsi Module" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365" id="CVE-2021-27365" title="Kernel: Heap Buffer Overflow In The Iscsi Subsystem" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1071" id="RHSA-2021:1071-1" title="Rhsa-2021:1071-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930078" id="1930078" title="Kernel: Heap Buffer Overflow In The Iscsi Subsystem" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930079" id="1930079" title="Kernel: Iscsi: Unrestricted Access To Sessions And Handles" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930080" id="1930080" title="Kernel: Out-Of-Bounds Read In Libiscsi Module" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1072-1</id><title>Libldb</title><description>Security Fix(es): 
* samba: Out of bounds read in AD DC LDAP server (CVE-2021-20277) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libldb" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>libldb-1.5.4-2.el7_9.i686.rpm</filename><sum type="sha256">c8d61843617f2cb1f30708c3766acab28cf3322cd4463a6440845f80e58e0006</sum></package><package arch="x86_64" name="ldb-tools" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>ldb-tools-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">5a30e6206b96aa941cf5bc0787be552ed795b37a5bcaa3a6c566e416ae0cdeac</sum></package><package arch="x86_64" name="libldb-devel" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>libldb-devel-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">f075bcf6db662ef2ff6165da440e97f8d5daf699c0ca75a1429fc2ae623a0680</sum></package><package arch="i686" name="pyldb-devel" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>pyldb-devel-1.5.4-2.el7_9.i686.rpm</filename><sum type="sha256">49a598cb1f95a358da7e166ce9e7e42690b515c9300f27f66e3348c87bbccf6b</sum></package><package arch="i686" name="pyldb" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>pyldb-1.5.4-2.el7_9.i686.rpm</filename><sum type="sha256">592e2a51c0c0d2c9a8cbb6ec431564ac5672d3b5cf36c580ed538c146e63b7eb</sum></package><package arch="x86_64" name="libldb" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>libldb-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">35c4dfcc466c55a684cde022968cfdc5ed8f6a7908615dacf8de89abead874b5</sum></package><package arch="x86_64" name="pyldb-devel" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>pyldb-devel-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">0b05d33f911795ff1eed0b117ae6d8f659ca91a120a52db97b25120f8ad1055d</sum></package><package arch="x86_64" name="pyldb" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>pyldb-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">81b3e1a7462a0ab7d801d10d06cdb7ed1bab30a7ecce8be02a42815c88acb34e</sum></package><package arch="i686" name="libldb-devel" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>libldb-devel-1.5.4-2.el7_9.i686.rpm</filename><sum type="sha256">459a9a0a10f37d4d5422f8b7bd6395b4812e62746ceb5112c9e4686a45100076</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277" id="CVE-2021-20277" title="Samba: Out Of Bounds Read In Ad Dc Ldap Server" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1072" id="RHSA-2021:1072-1" title="Rhsa-2021:1072-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1941402" id="1941402" title="Samba: Out Of Bounds Read In Ad Dc Ldap Server" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1135-1</id><title>Squid</title><description>Security Fix(es): 
* squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.6" src="squid-3.5.20-17.el7_9.6.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.6.x86_64.rpm</filename><sum type="sha256">5f4efbb47e4ef8bbc123c76ee5739139033149ca48f605398cce3d283a615c5c</sum></package><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.6" src="squid-3.5.20-17.el7_9.6.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.6.x86_64.rpm</filename><sum type="sha256">01e8917843e5d9f7a76ba9ed41ea78f043ea28b08aa9d34e1f89abae28a4f03c</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.6" src="squid-3.5.20-17.el7_9.6.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.6.x86_64.rpm</filename><sum type="sha256">51672f3d8d35b136ea56a3926eb0d200f56f7a2a7323edc37fb2a2367a10748e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25097" id="CVE-2020-25097" title="Squid: Improper Input Validation May Allow A Trusted Client To Perform Http Request Smuggling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1135" id="RHSA-2021:1135-1" title="Rhsa-2021:1135-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1939925" id="1939925" title="Squid: Improper Input Validation May Allow A Trusted Client To Perform Http Request Smuggling" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1145-1</id><title>Nettle</title><description>Security Fix(es): 
* nettle: Out of bounds memory access in signature verification (CVE-2021-20305) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nettle" release="9.el7_9" src="nettle-2.7.1-9.el7_9.src.rpm" version="2.7.1"><filename>nettle-2.7.1-9.el7_9.i686.rpm</filename><sum type="sha256">3a8ab2056c7e273d4f5e3b312f3cae6e1231f8f22fd6e4c7e7a7a47b33230b87</sum></package><package arch="i686" name="nettle-devel" release="9.el7_9" src="nettle-2.7.1-9.el7_9.src.rpm" version="2.7.1"><filename>nettle-devel-2.7.1-9.el7_9.i686.rpm</filename><sum type="sha256">a6ee2bc74687ca5ddc54502f97621d44d3b20108dc5bb3fce0b5199f5f156d72</sum></package><package arch="x86_64" name="nettle-devel" release="9.el7_9" src="nettle-2.7.1-9.el7_9.src.rpm" version="2.7.1"><filename>nettle-devel-2.7.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">ed4b165b6393d04c01395bbffabde34c663918d165af9a17d15c8ffc49829fc9</sum></package><package arch="x86_64" name="nettle" release="9.el7_9" src="nettle-2.7.1-9.el7_9.src.rpm" version="2.7.1"><filename>nettle-2.7.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">631114eff14ce13570db80ea06c014964225734de427b1f5ed72f06315e9985d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305" id="CVE-2021-20305" title="Nettle: Out Of Bounds Memory Access In Signature Verification" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1145" id="RHSA-2021:1145-1" title="Rhsa-2021:1145-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942533" id="1942533" title="Nettle: Out Of Bounds Memory Access In Signature Verification" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1192-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.9.1. 
Security Fix(es): 
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991) 
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992) 
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.9.1-1.el7_9.src.rpm" version="78.9.1"><filename>thunderbird-78.9.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">15b668cdfd777d49d74ef2aa02560696e79393a9ea3435db1cd9eca0c1112f0a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" id="CVE-2021-23991" title="Mozilla: An Attacker May Use Thunderbird'S Openpgp Key Refresh Mechanism To Poison An Existing Key" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" id="CVE-2021-23992" title="Mozilla: A Crafted Openpgp Key With An Invalid User Id Could Be Used To Confuse The User" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" id="CVE-2021-23993" title="Mozilla: Inability To Send Encrypted Openpgp Email After Importing A Crafted Openpgp Key" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1192" id="RHSA-2021:1192-1" title="Rhsa-2021:1192-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1948393" id="1948393" title="Mozilla: An Attacker May Use Thunderbird'S Openpgp Key Refresh Mechanism To Poison An Existing Key" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1948394" id="1948394" title="Mozilla: A Crafted Openpgp Key With An Invalid User Id Could Be Used To Confuse The User" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1948395" id="1948395" title="Mozilla: Inability To Send Encrypted Openpgp Email After Importing A Crafted Openpgp Key" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1297-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* JNI local refs exceeds capacity warning in NetworkInterface::getAll</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-devel-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">0034ea4bb6360a4195b2e893473abe05a4caa5d3fba1bb2f947031a3a0fb23bd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">a92890f9b8897ff784d2e09cde43a32bcefc529e957334f81ad717bdf0ef804a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">3ba7659fe7c21237ddda65067f9bb0890b009f76b99da806d44b95de2f97090d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">80c07f488b277fe77a6804f464351a593c6eec64ccd99cc9625c423fa316d30c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">8c32b31903c528c50a3c9f314fc80503666bdde1e27c87f65b8f07b22fbe9558</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-demo-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">2eddd05a74f9ce62bca7c94ecb11d6e12d0625b51b7d497c3b1f0b24fb3b82d8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-headless-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">b831a9d9f5307edb419c8930fd5099ddfbaaf35b776a30084af53e8cd977e1d8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-devel-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d5a59b97373234482ec6638e3c0f5b8e6634b1a516221f18411c301d78b93cf2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">81ff8c66823e9f782647553c4a9813a7c6bfe157175608311fc2b820f514483b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-jmods-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">3b832771787ee5616db81159d8160c2730f7ffbb49acef711362ecf717af0062</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-jmods-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">063d70c16819779f8dd01c87fed8f1414af2f4e4e6170fa8589352be7a259200</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-src-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">dacfb2f2f25e11ffa8ee9bf607585542ad824f662579fdb8c497a98b80f7e706</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">792639abaff2f0c400ac29f6632604909863bc86c812ffb374b0cdd78172eef7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-static-libs-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">a8ad8dd549b80506f39dd78eb7a580a83f13b05f9e4e20b17746ffe9fb940ab6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-headless-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">2ad3fb50999eb4448ecaa27c4c74e591a26a89d8afb93a3664485d53d4265d48</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-src-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">4f998f3be20e475b38d401b610ce40fc3075b39248e60e4b0e45f67c11a6805b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-demo-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">2fd6b328021bbc7b816576def60e0caeb865777f0a739f8bf42ba154122d2340</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" id="CVE-2021-2163" title="Openjdk: Incomplete Enforcement Of Jar Signing Disabled Algorithms (Libraries, 8249906)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1297" id="RHSA-2021:1297-1" title="Rhsa-2021:1297-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1937736" id="1937736" title="Jni Local Refs Exceeds Capacity Warning In Networkinterface::Getall" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951217" id="1951217" title="Openjdk: Incomplete Enforcement Of Jar Signing Disabled Algorithms (Libraries, 8249906)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1298</id><title>Moderate: Java-1.8.0-Openjdk Security Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2021-04-21 07:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">20f1ecd8e9bf9493f51e9e3e4ad46f03716f572e0d03aa6ed89bcb0422a736d5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-devel-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">b1707f74e24c39439f064c2c0608d13521966668120480c3a0e392511838f7d3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">0497048dabe9d531c1ec54f14cdbcb011ac31893866ef21176a3776c93fc86b6</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">c9ecdbedd7a440f9e6e1502dacbdd2ca61a677acc91882764ec9728f61020162</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">755ab6e8a59dc81a4d169f0795737c1eb5efa94ff5da876423486843206c50c0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-headless-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">90c0f00388fc9e9eac0870a6558600244a789e5527841d0441099baf08764adb</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">48bcc55e3c9f9449e580635946425f8e9913b40d6a1d772c01ee6bd8545145c0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">6f1c618f7b579e38486cf7ef243f41eafce72022a794e139d8163c2abcb1f737</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">7a37644b790d36eebc1a9ef0d0ddb8856db0c32523139b8be8cd1a31b9ccab1a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d12b1cb6a0c7d32067a6dfd14876769e23d5b384c6edadbce494b24eca63d328</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-demo-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">3d7626bbf610ca3321dbbe2f152ce1080dda51c998b72bcbbdc9deedd3994f50</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.292.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">09cd33f2498b4600c66a4b50b804b380bf784fa1a8c0eb3f92ec6156b74e310e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">025f84677045b1bc006ff4fb9b94d983e93bbafb5c5227c155801e50cee9a69f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-demo-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">4e2b3380bfbe792c3dc17ec39c66108b64fd7d6268873a85c9507dc39c817823</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">fe3d03c7aa5b25bbbba8bbfec4966633a33aa87bd64561c061609c0cd98cb7a1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">d5a2b4ebf25305d2d76e406d8c7425458f422b7a082c2abe2542d5304fbb9f76</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">24e32f28858eac569e35cea1acfad83e9778475a851a563f6243ebf7583b8f78</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-jmods-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">0d4f527254b81660e0c00bd87b366e7d938b953f30a37bc2a819f4a596a14dab</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-src-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">12a30ec6773dd5188740529f8a94d3fa98311a5609376c0f73a079eb63ef905a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-headless-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">ea7f20e35d355ba99ac2c946c02a7c2f8ce5a4d445825c5ad3929c0dac8138ea</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">a2d0c0863c67920e8212c5175b77d34a9210a5febc07280fcbbc4f2b323d5a93</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">82ebb5ea88130b5baccde7fb30ab71a4ce8e87394a7fd4c09d94ea03590eee12</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">807f249ef9285c017d4dfee5c2e940521554d6c8378206c08d3cc4b1095b6aad</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-devel-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">bca96f85c4ef034058789f509a0d5bb4b6677339dfdf275cdf1cfebf14239580</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.292.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">e8f5ec498e68ffd8e77385a6f7666685c600940e1b7c66a577294259d5a43066</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">0a1c20ad5252902044a839f3c8263fff1d22f7ea5cf00046b9cc6491932c1408</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">1fb515ba0185aa49efac841b994ee51361d81257bc667d3674e4609211e715aa</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-jmods-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">2bdcbc12db372cf829c93a6fa9cb4b88acf5e3a49d80a069d05213adc493bfe7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-src-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">ca7ea3307804ce88ab2f3fccd44456f9cdc9828683df5cf677c636ac8d01ddb1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">910eb565d7499e6844c58b3773f584cc6e0e2c05d3750de5452e9e2471a87507</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">1060c8a7f5760644787be8e5ee05857ff13a5300c3823256589628ca2a701d2f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" id="CVE-2021-2163" title="Cve-2021-2163" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1298" id="RHSA-2021:1298" title="Moderate: Java-1.8.0-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1298-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">d03c8ce0b348dd6928c11d3dfb645d2a4657f44f170706201fc479d8a627cb42</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">adbacd36f4f9b5815f023d1a88175b6c1e014528885323bd2d05bfb02ae9f28e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">8f1e47839e3931532edd0952d2dd654a0ab2a021655e0ab0c01a2e0ab3c8e228</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">087265fadbbacc30a0aa9e3b485705ca587ead4d557bc9244d30c797c9b5b7fb</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">7284648b1cfbdcf5702d0ae9bf0ecf10dd9128adcbdc0cf3b951b5ff24b9b064</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.292.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">ca42c18ea84acad61b4d70f3092f9a7ece7183a707fdf308926585290aab5ddd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">6edeaf04168713d76c97ac60d7d99896e8c692e4aa5d0cd60229911165f2d729</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">d77c4ada5fda9a0850e0d37927c004f34a5b595a9da58dcf9a3b432ff325a164</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">dcf161f4074c15ee5784e48bbe788ea29a66a3826a3d5f9fcc2a0100baceb2df</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">623d9d3fedf80e8038397f5569802131699c05b528dbec27d9893875c316c419</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.292.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">adf23389a8a04651ea763f3883c9f77bc38564835bf1bb76599423a1071f66c2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">7213a69373655871bf60b0bc346bb499a8329615a5516b39f1daec67a15d1ebd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">729ea2ffc7c834f188bd8afb5aacc960a453e5542edde397ac1eebc821ac7ab5</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">a5bb2b2a2acf5261549aba3fa664dd82c550f31a4e3ffc8bbe1f1cb52ebd4a6a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" id="CVE-2021-2163" title="Openjdk: Incomplete Enforcement Of Jar Signing Disabled Algorithms (Libraries, 8249906)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1298" id="RHSA-2021:1298-1" title="Rhsa-2021:1298-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951217" id="1951217" title="Openjdk: Incomplete Enforcement Of Jar Signing Disabled Algorithms (Libraries, 8249906)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1350-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.10.0. 
Security Fix(es): 
* Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994) 
* Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995) 
* Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961) 
* Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998) 
* Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999) 
* Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002) 
* Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945) 
* Mozilla: Port blocking could be bypassed (CVE-2021-29946) 
* Mozilla: Race condition when reading from disk while verifying signatures  (CVE-2021-29948) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- 
SL7  x86_64  - thunderbird-78.10.0-1.el7_9.x86_64.rpm  - thunderbird-debuginfo-78.10.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.10.0-1.el7_9.src.rpm" version="78.10.0"><filename>thunderbird-78.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">27ff7bb70e8a0f52811bae4fed2444655d1143c8e82d93338a5c3a20588f2fc6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" id="CVE-2021-23961" title="Mozilla: More Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" id="CVE-2021-23994" title="Mozilla: Out Of Bound Write Due To Lazy Initialization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" id="CVE-2021-23995" title="Mozilla: Use-After-Free In Responsive Design Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" id="CVE-2021-23998" title="Mozilla: Secure Lock Icon Could Have Been Spoofed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" id="CVE-2021-23999" title="Mozilla: Blob Urls May Have Been Granted Additional Privileges" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" id="CVE-2021-24002" title="Mozilla: Arbitrary Ftp Command Execution On Ftp Servers Using An Encoded Url" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" id="CVE-2021-29945" title="Mozilla: Incorrect Size Computation In Webassembly Jit Could Lead To Null-Reads" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" id="CVE-2021-29946" title="Mozilla: Port Blocking Could Be Bypassed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" id="CVE-2021-29948" title="Mozilla: Race Condition When Reading From Disk While Verifying Signatures" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1350" id="RHSA-2021:1350-1" title="Rhsa-2021:1350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951364" id="1951364" title="Mozilla: Out Of Bound Write Due To Lazy Initialization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951365" id="1951365" title="Mozilla: Use-After-Free In Responsive Design Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951366" id="1951366" title="Mozilla: Secure Lock Icon Could Have Been Spoofed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951367" id="1951367" title="Mozilla: More Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951368" id="1951368" title="Mozilla: Blob Urls May Have Been Granted Additional Privileges" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951369" id="1951369" title="Mozilla: Arbitrary Ftp Command Execution On Ftp Servers Using An Encoded Url" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951370" id="1951370" title="Mozilla: Incorrect Size Computation In Webassembly Jit Could Lead To Null-Reads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951371" id="1951371" title="Mozilla: Port Blocking Could Be Bypassed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951381" id="1951381" title="Mozilla: Race Condition When Reading From Disk While Verifying Signatures" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1354-1</id><title>Xstream</title><description>Security Fix(es): 
* XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet (CVE-2021-21344) 
* XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry (CVE-2021-21345) 
* XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue (CVE-2021-21346) 
* XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator (CVE-2021-21347) 
* XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader (CVE-2021-21350) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  noarch  - xstream-1.3.1-13.el7_9.noarch.rpm  - xstream-javadoc-1.3.1-13.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xstream-javadoc" release="13.el7_9" src="xstream-1.3.1-13.el7_9.src.rpm" version="1.3.1"><filename>xstream-javadoc-1.3.1-13.el7_9.noarch.rpm</filename><sum type="sha256">2ecc7fa6ee2bb422a255f7346c1a40b982110351e3e3d93daa2dcbc7ec134fb2</sum></package><package arch="noarch" name="xstream" release="13.el7_9" src="xstream-1.3.1-13.el7_9.src.rpm" version="1.3.1"><filename>xstream-1.3.1-13.el7_9.noarch.rpm</filename><sum type="sha256">9002183ae963575c82637c92eaf93e240c2fae160ecf24a6e2913de1a5d8637d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21344" id="CVE-2021-21344" title="Xstream: Unsafe Deserizaliation Of Javax.Sql.Rowset.Baserowset" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21345" id="CVE-2021-21345" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Corba.Se.Impl.Activation.Servertableentry" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21346" id="CVE-2021-21346" title="Xstream: Unsafe Deserizaliation Of Sun.Swing.Swinglazyvalue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21347" id="CVE-2021-21347" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Tools.Javac.Processing.Javacprocessingenvironment Nameprocessiterator" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21350" id="CVE-2021-21350" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Org.Apache.Bcel.Internal.Util.Classloader" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1354" id="RHSA-2021:1354-1" title="Rhsa-2021:1354-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942554" id="1942554" title="Xstream: Unsafe Deserizaliation Of Javax.Sql.Rowset.Baserowset" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942558" id="1942558" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Corba.Se.Impl.Activation.Servertableentry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942578" id="1942578" title="Xstream: Unsafe Deserizaliation Of Sun.Swing.Swinglazyvalue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942629" id="1942629" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Tools.Javac.Processing.Javacprocessingenvironment Nameprocessiterator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942637" id="1942637" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Org.Apache.Bcel.Internal.Util.Classloader" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1363-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.10.0 ESR. 
Security Fix(es): 
* Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994) 
* Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995) 
* Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961) 
* Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998) 
* Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999) 
* Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002) 
* Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945) 
* Mozilla: Port blocking could be bypassed (CVE-2021-29946) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - firefox-78.10.0-1.el7_9.i686.rpm  - firefox-78.10.0-1.el7_9.x86_64.rpm  - firefox-debuginfo-78.10.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.10.0-1.el7_9.src.rpm" version="78.10.0"><filename>firefox-78.10.0-1.el7_9.i686.rpm</filename><sum type="sha256">dbeaf4541e0a177fed5c3a943650a1c55f6c5ca4be2278bf258e750e8da3258b</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.10.0-1.el7_9.src.rpm" version="78.10.0"><filename>firefox-78.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">668cd09b9146cfe77e64f0561ed96cc794dde90f1c701d4eaf63ae128e432131</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" id="CVE-2021-23961" title="Mozilla: More Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" id="CVE-2021-23994" title="Mozilla: Out Of Bound Write Due To Lazy Initialization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" id="CVE-2021-23995" title="Mozilla: Use-After-Free In Responsive Design Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" id="CVE-2021-23998" title="Mozilla: Secure Lock Icon Could Have Been Spoofed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" id="CVE-2021-23999" title="Mozilla: Blob Urls May Have Been Granted Additional Privileges" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" id="CVE-2021-24002" title="Mozilla: Arbitrary Ftp Command Execution On Ftp Servers Using An Encoded Url" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" id="CVE-2021-29945" title="Mozilla: Incorrect Size Computation In Webassembly Jit Could Lead To Null-Reads" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" id="CVE-2021-29946" title="Mozilla: Port Blocking Could Be Bypassed" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1363" id="RHSA-2021:1363-1" title="Rhsa-2021:1363-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951364" id="1951364" title="Mozilla: Out Of Bound Write Due To Lazy Initialization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951365" id="1951365" title="Mozilla: Use-After-Free In Responsive Design Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951366" id="1951366" title="Mozilla: Secure Lock Icon Could Have Been Spoofed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951367" id="1951367" title="Mozilla: More Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951368" id="1951368" title="Mozilla: Blob Urls May Have Been Granted Additional Privileges" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951369" id="1951369" title="Mozilla: Arbitrary Ftp Command Execution On Ftp Servers Using An Encoded Url" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951370" id="1951370" title="Mozilla: Incorrect Size Computation In Webassembly Jit Could Lead To Null-Reads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951371" id="1951371" title="Mozilla: Port Blocking Could Be Bypassed" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1384-1</id><title>Nss</title><description>Security Fix(es): 
* nss: TLS 1.3 CCS flood remote DoS Attack (CVE-2020-25648) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* FTBFS: Paypal Cert expired 
* FTBFS: IKE CLASS_1563 fails gtest 
* Cannot compile code with nss headers and -Werror=strict-prototypes 
* CA HSM ncipher token disabled after SL-7.9 update 
--- 
SL7  x86_64  - nss-3.53.1-7.el7_9.i686.rpm  - nss-3.53.1-7.el7_9.x86_64.rpm  - nss-debuginfo-3.53.1-7.el7_9.i686.rpm  - nss-debuginfo-3.53.1-7.el7_9.x86_64.rpm  - nss-devel-3.53.1-7.el7_9.i686.rpm  - nss-devel-3.53.1-7.el7_9.x86_64.rpm  - nss-pkcs11-devel-3.53.1-7.el7_9.i686.rpm  - nss-pkcs11-devel-3.53.1-7.el7_9.x86_64.rpm  - nss-sysinit-3.53.1-7.el7_9.x86_64.rpm  - nss-tools-3.53.1-7.el7_9.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-pkcs11-devel" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">9de797b2cfcdc8cc229ef47fb4ec244a8feaab780959d0be0ac2e754a7965709</sum></package><package arch="i686" name="nss-pkcs11-devel" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-7.el7_9.i686.rpm</filename><sum type="sha256">2a04e2b686baf9f3095fb36281f181cac13d70033a54c2c6478cfcde3edd16b8</sum></package><package arch="x86_64" name="nss-tools" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-tools-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">64916d0f417c88546d00651592a19f62947019455574ac2f7b04887a6934868d</sum></package><package arch="i686" name="nss" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-7.el7_9.i686.rpm</filename><sum type="sha256">46fa84cb2dca239707b5af9e20f16ccc5d9294315fe37e9b522bf89800dbcb3e</sum></package><package arch="i686" name="nss-devel" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-7.el7_9.i686.rpm</filename><sum type="sha256">92efd45efbd9743b4c1338be321742f0ffc9b0c2f3dc9423d465909e0891587c</sum></package><package arch="x86_64" name="nss" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">8a388e9732a15b191de402c4877cd8f4a610ae3f6b531180147ca991458310e4</sum></package><package arch="x86_64" name="nss-devel" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">c7e84f4e7bce7eaa95ae02f5ada3ca4674e75b25f31695be6fcc139129f18567</sum></package><package arch="x86_64" name="nss-sysinit" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-sysinit-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">944e84dff5016a57957f4fd0e4f7ac40d2b03659d269083286aa3cc20749fabe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648" id="CVE-2020-25648" title="Nss: Tls 1.3 Ccs Flood Remote Dos Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1384" id="RHSA-2021:1384-1" title="Rhsa-2021:1384-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1885321" id="1885321" title="Cannot Compile Code With Nss Headers And -Werror=Strict-Prototypes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1887319" id="1887319" title="Nss: Tls 1.3 Ccs Flood Remote Dos Attack" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1389-1</id><title>Openldap</title><description>Security Fix(es): 
* openldap: NULL pointer dereference for unauthenticated packet in slapd (CVE-2020-25692) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - openldap-2.4.44-23.el7_9.i686.rpm  - openldap-2.4.44-23.el7_9.x86_64.rpm  - openldap-clients-2.4.44-23.el7_9.x86_64.rpm  - openldap-debuginfo-2.4.44-23.el7_9.i686.rpm  - openldap-debuginfo-2.4.44-23.el7_9.x86_64.rpm  - openldap-devel-2.4.44-23.el7_9.i686.rpm  - openldap-devel-2.4.44-23.el7_9.x86_64.rpm  - openldap-servers-2.4.44-23.el7_9.x86_64.rpm  - openldap-servers-sql-2.4.44-23.el7_9.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openldap-devel" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">c4ab39a53ed3b7bb4f40dc04dcb331d76549a4e65f7f0b133ce34c3ad4929f6d</sum></package><package arch="x86_64" name="openldap" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">7d1b468fd544df1619789b5b84c2e9bbc652e6b5b28bdc697819b0d9cc7e94b8</sum></package><package arch="x86_64" name="openldap-clients" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-clients-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">c8b54025ff6c00c6b495fc954f5b7df7858a05b302acd95c0e9898863aa85ac9</sum></package><package arch="i686" name="openldap" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-2.4.44-23.el7_9.i686.rpm</filename><sum type="sha256">fd10af55c5e2b360e0ee4415366c8a70c20d17bee41f8fba730521a9f5087ede</sum></package><package arch="x86_64" name="openldap-servers" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-servers-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">a2a6a577481dfc70c41991fcd7fc83d5f9ef43bf8858b216813cf13e3bdd56d9</sum></package><package arch="x86_64" name="openldap-servers-sql" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-servers-sql-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">85aecde5a653c61d7d092db4c474810a86c2a72839d3d618dcea9e943f0d568c</sum></package><package arch="i686" name="openldap-devel" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-23.el7_9.i686.rpm</filename><sum type="sha256">148afb143da738103e79fa5ef8fd77a8967b0badc3662c6b1a0d0705527fb980</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692" id="CVE-2020-25692" title="Openldap: Null Pointer Dereference For Unauthenticated Packet In Slapd" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1389" id="RHSA-2021:1389-1" title="Rhsa-2021:1389-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1894567" id="1894567" title="Openldap: Null Pointer Dereference For Unauthenticated Packet In Slapd" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1469-1</id><title>Bind</title><description>Security Fix(es): 
* bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - bind-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-debuginfo-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-debuginfo-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-devel-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-export-devel-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-export-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-export-libs-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-export-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-libs-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-libs-lite-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-libs-lite-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-lite-devel-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-lite-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-pkcs11-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-pkcs11-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-sdb-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-sdb-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm 
noarch  - bind-license-9.11.4-26.P2.el7_9.5.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">5f12080002eed2b3d0a5fe0d6ba3ae0e493c0381fa9774ffdd5cee036061a661</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">774c99015bc2d7baa39bd1348801f0737353305e3111a2e54c4d246721f9b918</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">5ac89251e16484e5d8d51ec3ec74b8593b1f7e44421a4c2c2c12c739c424198a</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">04d776e8211418700d08b85c04ec9a87f114ad6aff51b5af0f8245a9bd0ebf4b</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">52932470558a95a9898dd936150ba8d7d5d1494fd33b28e0fb7e3cc876e85827</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">e09f37081e387b39c847460852f1f063d2bf45b1eb51a5faa7b908e3b1692f17</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">93b73fa12dd56caed82ccac43a574078149254704f2bc72a0470c26dc276ac6d</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">da50831ec3b2b0082f6afb1063c471e85c72a7f9625e037f481a6ebd16df6ec8</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">2434d790ef2452f0887d8bb623d4e64057327d9b96e9fc87c347075ae9a31436</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">c1853aeb2a81d958cce56306aa4add20566b32e562c0d813dbd7a54c72265db0</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">dd979fdb8a371cfaf0e06724b90691e2dc742dab923870ca92f84600ac103a19</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">1ddb59ec131528bb776e435125a5117d5a42dbf4ccde72580fa129dc95b7f998</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">1adbfc28887c4de3d43e936db64d8e7b29ba01f03ad1087ae3b6ca4c2eb6a715</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">3519feefe599d74baeb7cc28541296e856f7c5ca3ba404acf4e8c0ae0f83a248</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">dd9591546ab81de27fd16f3f509dda1250c4eec929644d02aa9f3603f8116d81</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">7e0d29db6cb6308fe03e6db8b4701e2ee5d392a0d28a1bc266b4017a8af9ad62</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">65cd52b5f02b1cfbc2c72d324520e3e1c45762ba676522175fb1c889f682c0a2</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">1a54382277a41b4d57517df82f5ce170034b915e91f2e46349f10c019c3b35e6</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.5.noarch.rpm</filename><sum type="sha256">937c00c41008fa6a8771e1b421b4fc0d85fd86dea954d9543eb489091019d111</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">1c2bc6b788dbd7703f88045376009b98493a97ca155af266dd3ffb8a6d80481e</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">3a08818423154fa939cc02b2acfb974d8fdd7d9a6bdeb3a98cf0ac1e6aa3efe6</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">51cea52e6d70ec317d51e8fe2e80f3b77cadb97ba8b32c168e190f9b1cc42df4</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">5c4745efc2fba02f614bc1d5f9e45ac28360f9033761a90666e03575e78c59f6</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">7445a4d51ed6814795bc41931485e412959d1cf7e5ec5c73e6df210edb3df949</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215" id="CVE-2021-25215" title="Bind: An Assertion Check Can Fail While Answering Queries For Dname Records That Require The Dname To Be Processed To Resolve Itself" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1469" id="RHSA-2021:1469-1" title="Rhsa-2021:1469-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1953857" id="1953857" title="Bind: An Assertion Check Can Fail While Answering Queries For Dname Records That Require The Dname To Be Processed To Resolve Itself" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1512-1</id><title>Postgresql</title><description>Security Fix(es): 
* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) 
* postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) 
* postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution (CVE-2019-10208) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7  x86_64  - postgresql-9.2.24-6.el7_9.i686.rpm  - postgresql-9.2.24-6.el7_9.x86_64.rpm  - postgresql-contrib-9.2.24-6.el7_9.x86_64.rpm  - postgresql-debuginfo-9.2.24-6.el7_9.i686.rpm  - postgresql-debuginfo-9.2.24-6.el7_9.x86_64.rpm  - postgresql-devel-9.2.24-6.el7_9.i686.rpm  - postgresql-devel-9.2.24-6.el7_9.x86_64.rpm  - postgresql-docs-9.2.24-6.el7_9.x86_64.rpm  - postgresql-libs-9.2.24-6.el7_9.i686.rpm  - postgresql-libs-9.2.24-6.el7_9.x86_64.rpm  - postgresql-plperl-9.2.24-6.el7_9.x86_64.rpm  - postgresql-plpython-9.2.24-6.el7_9.x86_64.rpm  - postgresql-pltcl-9.2.24-6.el7_9.x86_64.rpm  - postgresql-server-9.2.24-6.el7_9.x86_64.rpm  - postgresql-static-9.2.24-6.el7_9.i686.rpm  - postgresql-static-9.2.24-6.el7_9.x86_64.rpm  - postgresql-test-9.2.24-6.el7_9.x86_64.rpm  - postgresql-upgrade-9.2.24-6.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-05-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-server" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-server-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">13a43265d2a3f0399dbeb8650fd44ce7cf064a5082a1a13ee263a4e5b2f2017a</sum></package><package arch="x86_64" name="postgresql-devel" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">a46b2709b9a06be227d0a9504dc34592f8c0cc5495d41a52ad85f67d3bb4cdc4</sum></package><package arch="x86_64" name="postgresql-pltcl" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-pltcl-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">deac119a80db8d2e3c3d75857be661445fc171e4bc4aaa76595a053295bd093f</sum></package><package arch="x86_64" name="postgresql-upgrade" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-upgrade-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">a1f9e294cf6a6b0dbf5472ffc42946c8eb7f6f6b999de851d7eb2f06b5b9848b</sum></package><package arch="i686" name="postgresql" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-6.el7_9.i686.rpm</filename><sum type="sha256">8b554d1337699f1a83589a30e426978094fc7483066b317095e3501bcca3453e</sum></package><package arch="i686" name="postgresql-devel" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-6.el7_9.i686.rpm</filename><sum type="sha256">24e50e2bcbcd328ac72503f34bc8a23d9a680df300ad6b7c2c0feeeb4cf1129d</sum></package><package arch="x86_64" name="postgresql" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">b54b8faa628b7928240cc047de9648888f6834e88fd302e1ea19e4526df7b47d</sum></package><package arch="i686" name="postgresql-static" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-6.el7_9.i686.rpm</filename><sum type="sha256">35c129497e7c62242bdfe8cfd5ac8ce7b3341c94bcc30ce5931ab5dbeb375552</sum></package><package arch="x86_64" name="postgresql-docs" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-docs-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">88664b6db2f6bf2e9d987f0310bdf165b0b334591e5dcaa442ff7177a388de4e</sum></package><package arch="x86_64" name="postgresql-plpython" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plpython-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">1dd1e6e73a83e66cd49691e2ff5d2bb0a78cafab2d756031de3a1357bfb3670e</sum></package><package arch="x86_64" name="postgresql-test" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-test-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">002be0d729f775fd923898a302d85600951ccbbeb44be32ad2a4839c726d6d26</sum></package><package arch="x86_64" name="postgresql-plperl" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plperl-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">a7f95a93113c7bf49d560e2e2d7f25381263e9c3e8db95bde96f3b21d0fea763</sum></package><package arch="x86_64" name="postgresql-static" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">b4a8eb4283bfdae2206f4419c69bf49236f8358dc7cb7728882d30bfc3f8b7bb</sum></package><package arch="x86_64" name="postgresql-libs" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">477b5f0b7e2864b6503c2f5fb08b852b34dbb7eceaa411e471235aaae2a64f8a</sum></package><package arch="i686" name="postgresql-libs" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-6.el7_9.i686.rpm</filename><sum type="sha256">d929748c04c4fc3d85556033ca3b3b50e454fee4c67ee56bfbfb64d30371a0c3</sum></package><package arch="x86_64" name="postgresql-contrib" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-contrib-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">ecc7664978f843392d0baeb80516fa54aad6913d69bf6e8b5cd69bc92061020f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" id="CVE-2019-10208" title="Postgresql: Type In Pg_Temp Executes Arbitrary Sql During Security Definer Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694" id="CVE-2020-25694" title="Postgresql: Reconnection Can Downgrade Connection Security Settings" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695" id="CVE-2020-25695" title="Postgresql: Multiple Features Escape &quot;Security Restricted Operation&quot; Sandbox" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1512" id="RHSA-2021:1512-1" title="Rhsa-2021:1512-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1734416" id="1734416" title="Postgresql: Type In Pg_Temp Executes Arbitrary Sql During Security Definer Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1894423" id="1894423" title="Postgresql: Reconnection Can Downgrade Connection Security Settings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1894425" id="1894425" title="Postgresql: Multiple Features Escape &quot;Security Restricted Operation&quot; Sandbox" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2032-1</id><title>Slapi-Nis</title><description>Security Fix(es): 
* slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - slapi-nis-0.56.5-4.el7_9.x86_64.rpm  - slapi-nis-debuginfo-0.56.5-4.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-05-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="slapi-nis" release="4.el7_9" src="slapi-nis-0.56.5-4.el7_9.src.rpm" version="0.56.5"><filename>slapi-nis-0.56.5-4.el7_9.x86_64.rpm</filename><sum type="sha256">6dfcfec44b8eae028e7946736c04aa975f5c9a2b13e5400da680b1c9f9caf52b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3480" id="CVE-2021-3480" title="Slapi-Nis: Null Dereference (Dos) With Specially Crafted Binding Dn" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2032" id="RHSA-2021:2032-1" title="Rhsa-2021:2032-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1944640" id="1944640" title="Slapi-Nis: Null Dereference (Dos) With Specially Crafted Binding Dn" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2033-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: XChangeFeedbackControl integer underflow leads to privilege escalation (CVE-2021-3472) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - xorg-x11-server-Xdmx-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xephyr-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xnest-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xorg-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xvfb-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xwayland-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-common-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-debuginfo-1.20.4-16.el7_9.i686.rpm  - xorg-x11-server-debuginfo-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-devel-1.20.4-16.el7_9.i686.rpm  - xorg-x11-server-devel-1.20.4-16.el7_9.x86_64.rpm  noarch  - xorg-x11-server-source-1.20.4-16.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-05-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-devel" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">ee7a8ed348dab7340c8d5207228f6e2bd64e0e046d079d7714ffc986001873d7</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">6a2a64f392461a3b1798f2c302639c694ce80af3c9c8400fd6a4b48bd2d07f54</sum></package><package arch="i686" name="xorg-x11-server-devel" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-16.el7_9.i686.rpm</filename><sum type="sha256">0cddf15d75c07eb4495bafc2e68800bc009c65ec332c60b48f6cc11276437422</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">3d263b42fd00a1bc625a17575b763e61b0e44d3770ddd403473adfa1f608602b</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">93ed5a11123ff02f577e4714f6ee7b6948362b95c6cdae9501006c6de7567654</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">ab7c5ecda7303df4af58245291daef6c585fb946a021a625899271b965112f8e</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">20e2e6671dd40ce6f5709f9f9ca380787fee0a3b7a6c8a796bdf946b59258a58</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">79a98194010cfed4a7a94c41206fedd321efa41aec8b350e841bcc81640e0388</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">dba96725be36791a883264af65d73262f268d36501250f164888631570cfb6d4</sum></package><package arch="noarch" name="xorg-x11-server-source" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-16.el7_9.noarch.rpm</filename><sum type="sha256">ec17ae4c7d16c6c046921d42d4155b519290c9e019f112cc3165b805c7744778</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472" id="CVE-2021-3472" title="Xorg-X11-Server: Xchangefeedbackcontrol Integer Underflow Leads To Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2033" id="RHSA-2021:2033-1" title="Rhsa-2021:2033-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1944167" id="1944167" title="Xorg-X11-Server: Xchangefeedbackcontrol Integer Underflow Leads To Privilege Escalation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2147-1</id><title>Glib2</title><description>Security Fix(es): 
* glib: integer overflow in g_bytes_new function on 64-bit platforms due to  an implicit cast from 64 bits to 32 bits (CVE-2021-27219) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
----- 
SL7  x86_64  - glib2-2.56.1-9.el7_9.i686.rpm  - glib2-2.56.1-9.el7_9.x86_64.rpm  - glib2-debuginfo-2.56.1-9.el7_9.i686.rpm  - glib2-debuginfo-2.56.1-9.el7_9.x86_64.rpm  - glib2-devel-2.56.1-9.el7_9.i686.rpm  - glib2-devel-2.56.1-9.el7_9.x86_64.rpm  - glib2-fam-2.56.1-9.el7_9.x86_64.rpm  - glib2-static-2.56.1-9.el7_9.i686.rpm  - glib2-static-2.56.1-9.el7_9.x86_64.rpm  - glib2-tests-2.56.1-9.el7_9.x86_64.rpm  noarch  - glib2-doc-2.56.1-9.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="glib2-tests" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-tests-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">02520b0ebb0cf7e0a5e9397fb4daa2545702764867693f2deeb5b132fa2cb0c8</sum></package><package arch="noarch" name="glib2-doc" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-doc-2.56.1-9.el7_9.noarch.rpm</filename><sum type="sha256">71008da68cdfc784b6dc939ea17a2de7e7e34db0694983f4e87dba4ae175bc3e</sum></package><package arch="i686" name="glib2" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-2.56.1-9.el7_9.i686.rpm</filename><sum type="sha256">7c88e4ba0edbbb2d5831e0d90860a239c1b0b104ca9558ad1c1524c8cb37ce9f</sum></package><package arch="i686" name="glib2-static" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-9.el7_9.i686.rpm</filename><sum type="sha256">e455d5f1b61eb74b40d4f9dcea43818954ec8e8bbb640101a6f382e56f118061</sum></package><package arch="x86_64" name="glib2-devel" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">c30ed59651df9ad80a6770b71379384b5efe926628fbf4692c2bd8e8c88e52c6</sum></package><package arch="x86_64" name="glib2" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">7e8632f2c3557076b52c2bcd40f6e8c8799af61e4dd641a7a82a04074f453059</sum></package><package arch="x86_64" name="glib2-fam" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-fam-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">f20e6e399f5ce60cb494f80096222050f02bc70e181261b2ba342171674e85fc</sum></package><package arch="x86_64" name="glib2-static" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">97ce77b9c203931971627d4b79e4a79e618a5aed74a76f464ad4596e3cfaae3c</sum></package><package arch="i686" name="glib2-devel" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-9.el7_9.i686.rpm</filename><sum type="sha256">f5b6e9f7130c9060ead03a9eccce33b0217f061be640ed896034f10f969290ec</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219" id="CVE-2021-27219" title="Glib: Integer Overflow In G_Bytes_New Function On 64-Bit Platforms Due To An Implicit Cast From 64 Bits To 32 Bits" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2147" id="RHSA-2021:2147-1" title="Rhsa-2021:2147-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1929858" id="1929858" title="Glib: Integer Overflow In G_Bytes_New Function On 64-Bit Platforms Due To An Implicit Cast From 64 Bits To 32 Bits" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2206-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.11.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 (CVE-2021-29967) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- 
SL7  x86_64  - firefox-78.11.0-3.el7_9.i686.rpm  - firefox-78.11.0-3.el7_9.x86_64.rpm  - firefox-debuginfo-78.11.0-3.el7_9.x86_64.rpm</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-06-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="3.el7_9" src="firefox-78.11.0-3.el7_9.src.rpm" version="78.11.0"><filename>firefox-78.11.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">460e9b9d43dff32fec92291d72995fcc32837e1eff428ffaa799376b642c971c</sum></package><package arch="i686" name="firefox" release="3.el7_9" src="firefox-78.11.0-3.el7_9.src.rpm" version="78.11.0"><filename>firefox-78.11.0-3.el7_9.i686.rpm</filename><sum type="sha256">ffa44d31cf931ba3ee78db4b3eb806f2ecd97561508a84053ab3bf7897661fdb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967" id="CVE-2021-29967" title="Mozilla: Memory Safety Bugs Fixed In Firefox 89 And Firefox Esr 78.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2206" id="RHSA-2021:2206-1" title="Rhsa-2021:2206-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966831" id="1966831" title="Mozilla: Memory Safety Bugs Fixed In Firefox 89 And Firefox Esr 78.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2260-1</id><title>Libwebp</title><description>Security Fix(es): 
* libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) 
* libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) 
* libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - libwebp-0.3.0-10.el7_9.i686.rpm  - libwebp-0.3.0-10.el7_9.x86_64.rpm  - libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm  - libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm  - libwebp-devel-0.3.0-10.el7_9.i686.rpm  - libwebp-devel-0.3.0-10.el7_9.x86_64.rpm  - libwebp-java-0.3.0-10.el7_9.x86_64.rpm  - libwebp-tools-0.3.0-10.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwebp-tools" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-tools-0.3.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">c45e7e543b9e9122850a55e5e94f14c3c555539e4238d302d71509fb5c558c83</sum></package><package arch="x86_64" name="libwebp-devel" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-devel-0.3.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">0e9dea5793b1620cf4b8947c70e5b15d5e56f4b10b342d9ff46bf9cad44aa3f7</sum></package><package arch="i686" name="libwebp" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-0.3.0-10.el7_9.i686.rpm</filename><sum type="sha256">c7c8944319977c15afb204ecae3b947eeaf258f7c7435675a6f8e7974029a5b2</sum></package><package arch="i686" name="libwebp-devel" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-devel-0.3.0-10.el7_9.i686.rpm</filename><sum type="sha256">ab915f9d617061e7465a1e70e84cc78e43359dce1e5a44fbcedbc1c3636dd0f0</sum></package><package arch="x86_64" name="libwebp" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-0.3.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">eec5495efec86d0c336291e4b4a8529f0fc2c4b58c94dc9d397d3e20f261cf2f</sum></package><package arch="x86_64" name="libwebp-java" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-java-0.3.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">3052051d8334ead45132328c82d330d98df5f11bd6919b90bbdde3ffaa08263d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011" id="CVE-2018-25011" title="Libwebp: Heap-Based Buffer Overflow In Putle16()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328" id="CVE-2020-36328" title="Libwebp: Heap-Based Buffer Overflow In Webpdecode*Into Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329" id="CVE-2020-36329" title="Libwebp: Use-After-Free In Emitfancyrgb() In Dec/Io_Dec.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2260" id="RHSA-2021:2260-1" title="Rhsa-2021:2260-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956829" id="1956829" title="Libwebp: Heap-Based Buffer Overflow In Webpdecode*Into Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956843" id="1956843" title="Libwebp: Use-After-Free In Emitfancyrgb() In Dec/Io_Dec.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956919" id="1956919" title="Libwebp: Heap-Based Buffer Overflow In Putle16()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2263-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.11.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 (CVE-2021-29967) 
* Mozilla: Thunderbird stored OpenPGP secret keys without master password protection (CVE-2021-29956) 
* Mozilla: Partial protection of inline OpenPGP message not indicated (CVE-2021-29957) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - thunderbird-78.11.0-1.el7_9.x86_64.rpm  - thunderbird-debuginfo-78.11.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.11.0-1.el7_9.src.rpm" version="78.11.0"><filename>thunderbird-78.11.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">14a6750cef537a37e7a776f11d13460260cb59d4cdd01c5d92b8eaa134dc1b10</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29956" id="CVE-2021-29956" title="Mozilla: Thunderbird Stored Openpgp Secret Keys Without Master Password Protection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29957" id="CVE-2021-29957" title="Mozilla: Partial Protection Of Inline Openpgp Message Not Indicated" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967" id="CVE-2021-29967" title="Mozilla: Memory Safety Bugs Fixed In Firefox 89 And Firefox Esr 78.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2263" id="RHSA-2021:2263-1" title="Rhsa-2021:2263-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961503" id="1961503" title="Mozilla: Partial Protection Of Inline Openpgp Message Not Indicated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961504" id="1961504" title="Mozilla: Thunderbird Stored Openpgp Secret Keys Without Master Password Protection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966831" id="1966831" title="Mozilla: Memory Safety Bugs Fixed In Firefox 89 And Firefox Esr 78.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2305-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* hw: vt-d related privilege escalation (CVE-2020-24489) 
* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511) 
* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512) 
* hw: information disclosure on some Intel Atom processors (CVE-2020-24513) 
Bug Fix(es) and Enhancement(s): 
* Update Intel CPU microcode to microcode-20210525 release 
--- 
SL7  x86_64   microcode_ctl-2.1-73.9.el7_9.x86_64.rpm   microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.9.el7_9" src="microcode_ctl-2.1-73.9.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.9.el7_9.x86_64.rpm</filename><sum type="sha256">8a41f6c98891c5e2891129fbcaa9cc7ef5d648a0c4e84107665486b80a36c569</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489" id="CVE-2020-24489" title="Hw: Vt-D Related Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511" id="CVE-2020-24511" title="Hw: Improper Isolation Of Shared Resources In Some Intel Processors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512" id="CVE-2020-24512" title="Hw: Observable Timing Discrepancy In Some Intel Processors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513" id="CVE-2020-24513" title="Hw: Information Disclosure On Some Intel Atom Processors" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2305" id="RHSA-2021:2305-1" title="Rhsa-2021:2305-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962650" id="1962650" title="Hw: Vt-D Related Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962666" id="1962666" title="Hw: Information Disclosure On Some Intel Atom Processors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962702" id="1962702" title="Hw: Improper Isolation Of Shared Resources In Some Intel Processors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962722" id="1962722" title="Hw: Observable Timing Discrepancy In Some Intel Processors" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2313</id><title>Moderate: Samba Security And Bug Fix Update</title><description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* smb.service stops when samba rpms are updated (BZ#1930747) * samba printing dumps core (BZ#1937867)
</description><severity>moderate</severity><issued date="2021-06-15 11:33:35" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ctdb-tests" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">2528a7abd08712c2e83b2d01510bf14e8f036bf31c2adfaa29f9f4ad9aa971d8</sum></package><package arch="x86_64" name="ctdb" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">69326f1343382296243313ccb2c28e33cd1f41edd81337f9b06c7f14c92a3417</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254" id="CVE-2021-20254" title="Cve-2021-20254" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2313" id="RHSA-2021:2313" title="Moderate: Samba Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1930747" id="1930747" title="1930747 &#8211; [Rhel7.9] Smb.Service Stops When Samba Rpms Are Updated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1937867" id="1937867" title="1937867 &#8211; Samba Printing Dumps Core" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2313-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* smb.service stops when samba rpms are updated 
* samba printing dumps core 
--- SL7 x86_64 
libsmbclient-4.10.16-15.el7_9.i686.rpm libsmbclient-4.10.16-15.el7_9.x86_64.rpm libsmbclient-devel-4.10.16-15.el7_9.i686.rpm libsmbclient-devel-4.10.16-15.el7_9.x86_64.rpm libwbclient-4.10.16-15.el7_9.i686.rpm libwbclient-4.10.16-15.el7_9.x86_64.rpm libwbclient-devel-4.10.16-15.el7_9.i686.rpm libwbclient-devel-4.10.16-15.el7_9.x86_64.rpm samba-4.10.16-15.el7_9.x86_64.rpm samba-client-4.10.16-15.el7_9.x86_64.rpm samba-client-libs-4.10.16-15.el7_9.i686.rpm samba-client-libs-4.10.16-15.el7_9.x86_64.rpm samba-common-libs-4.10.16-15.el7_9.i686.rpm samba-common-libs-4.10.16-15.el7_9.x86_64.rpm samba-common-tools-4.10.16-15.el7_9.x86_64.rpm samba-dc-4.10.16-15.el7_9.x86_64.rpm samba-dc-libs-4.10.16-15.el7_9.x86_64.rpm samba-debuginfo-4.10.16-15.el7_9.i686.rpm samba-debuginfo-4.10.16-15.el7_9.x86_64.rpm samba-devel-4.10.16-15.el7_9.i686.rpm samba-devel-4.10.16-15.el7_9.x86_64.rpm samba-krb5-printing-4.10.16-15.el7_9.x86_64.rpm samba-libs-4.10.16-15.el7_9.i686.rpm samba-libs-4.10.16-15.el7_9.x86_64.rpm samba-python-4.10.16-15.el7_9.i686.rpm samba-python-4.10.16-15.el7_9.x86_64.rpm samba-python-test-4.10.16-15.el7_9.x86_64.rpm samba-test-4.10.16-15.el7_9.x86_64.rpm samba-test-libs-4.10.16-15.el7_9.i686.rpm samba-test-libs-4.10.16-15.el7_9.x86_64.rpm samba-vfs-glusterfs-4.10.16-15.el7_9.x86_64.rpm samba-winbind-4.10.16-15.el7_9.x86_64.rpm samba-winbind-clients-4.10.16-15.el7_9.x86_64.rpm samba-winbind-krb5-locator-4.10.16-15.el7_9.x86_64.rpm samba-winbind-modules-4.10.16-15.el7_9.i686.rpm samba-winbind-modules-4.10.16-15.el7_9.x86_64.rpm 
noarch samba-common-4.10.16-15.el7_9.noarch.rpm samba-pidl-4.10.16-15.el7_9.noarch.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="samba-python" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">3bf08c96289e6609050edc7e544893b1c9a5e09067ac53e9c6c4635bd3ffb766</sum></package><package arch="x86_64" name="libwbclient-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">541d45d9952b27d8aae45dfee62461b9ef0522eb86c1c9a86b8c33c587869b9b</sum></package><package arch="x86_64" name="samba-winbind-modules" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">a0077b3516a5ec8cef57b138f6161f2d1ac71edb9a0700dc84f990a5a0c93a6f</sum></package><package arch="i686" name="libwbclient-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">fcb4911e26b223e9506ac04519eeb4e8a757270d4e51cc5f25a2de47ca037163</sum></package><package arch="x86_64" name="samba-common-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">9522acf0e649723e808fc7a15aa11f4047696074b59c08216271a8843bcd5da9</sum></package><package arch="x86_64" name="samba-python" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">1b4b8e88dc3795e20dcea916964ef368b00aa0f4de34fd51416dbb69135c0880</sum></package><package arch="i686" name="samba-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">8b27e9c6089087bd6f05226f64bab1d7a45403695e4c9fdfdabf89ceadd0e02d</sum></package><package arch="i686" name="libwbclient" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">0027f30c8daa1b1244fb454bb207a937744c0fe26441cd9f202eb4aba5cb7e06</sum></package><package arch="i686" name="samba-test-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">9b0fe9fb48ddda3ed0f438b7ba79a3b88b1154bb9971bf3e222b55cc26c30ca4</sum></package><package arch="x86_64" name="samba-dc-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">5e97176ca96821cf7b2987ad6778852edeefa029247ea222f178224454936116</sum></package><package arch="x86_64" name="samba-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">963af811ad5dba4265daa8f8a64eb47b8f4125e26ecaa248ac83546b80d8777c</sum></package><package arch="x86_64" name="samba-test-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">4693eda3daca745d78f4a07bc36c41d7d1cbc6113b521d604472a8675a6d43c4</sum></package><package arch="x86_64" name="samba-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">4ea0d60644619ed6909a51a0d3872b005f554c96c57e86400dcb53c168ce0b65</sum></package><package arch="x86_64" name="samba-python-test" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">c02fa36775cde71f0544da4873695f57a7f8b3eab8db8159734475cc3011ba67</sum></package><package arch="noarch" name="samba-pidl" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-15.el7_9.noarch.rpm</filename><sum type="sha256">a91fbce57c5064ae71882789184f99f7243d33673cc2b408d18c7067b49c0f27</sum></package><package arch="x86_64" name="libwbclient" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">45f6edf64767adcab7ad34a3ad7c63d0c4719d398df338dc169219806e1d7018</sum></package><package arch="i686" name="samba-winbind-modules" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">1fa938d059993bfc45d595574c6999fd4f061684fdf951118a6e83020d1416ac</sum></package><package arch="x86_64" name="samba-client-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">5d04a03b32a375baf0ae04d00724f2f0f6b75995aa54c3dd03f94264517cf6f5</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">aa3617c92e2f894b6d62ade87fc696e02387bb5bc58a31accbc7ebce985ca9f0</sum></package><package arch="noarch" name="samba-common" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-15.el7_9.noarch.rpm</filename><sum type="sha256">4fb374a6298799a03fff8eab3a1b72575e00874d3de4eb9fb6902b8e34ea5bb0</sum></package><package arch="i686" name="samba-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">5dcd901abf67c55779f7d66b45042221c291f91b06dcdd52987586c0a189b277</sum></package><package arch="x86_64" name="samba-winbind" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">8c73518a4061449bdcf6ea0a7b6068f710b2098d4ee1768dbc7f46ce97c33a1c</sum></package><package arch="i686" name="samba-client-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">5800750cc72e98dca3f66cffcd98de3cdc4956705b7d15defa356a15bd0c2ab0</sum></package><package arch="x86_64" name="libsmbclient-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">13fca3c22d89f209c28012214df13cdc52972f9572afbb7da8bc1118d70edefd</sum></package><package arch="x86_64" name="samba-test" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">6fe9c97b1783752e9919df0798864794c9e8394b4f21566eeb0fc3e66194d19a</sum></package><package arch="x86_64" name="samba-client" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">c87e85699cd76dd6849214745a5bc836fdc9402ed58ccc7c5fd317505d1c7fb7</sum></package><package arch="x86_64" name="samba-dc" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">1bb49aca0d1c28f45c006f4481d6f3d2addcbcf2c03fb18da465a0c482a09a9d</sum></package><package arch="i686" name="libsmbclient" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">a1d617af8ba3c59a4c1374e93e31276ef7701468d90b52d93ca3a511476042f3</sum></package><package arch="x86_64" name="samba-common-tools" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">ecf340838f6a535449d829827da7ecaf25b83e51529a606f4754c8c4eb7d2f31</sum></package><package arch="x86_64" name="libsmbclient" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">38fcc3da40f8d15fffd50868e35dd44de40449b82a3133cf2c8ae6c624180f4d</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">077416a1636d36455d70022191d90ef391f7afb49da60fb87bba6c8fc0fe9fbc</sum></package><package arch="i686" name="samba-common-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">28fdbfa6a292b8f48ad831e6bfba4f6a7b16ba2c39c064679a1335d9201e6da7</sum></package><package arch="x86_64" name="samba" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">0199d755d8c5759035e92e83969a69b1bb0e6f70c63f61f61fa51d82d20f1bf3</sum></package><package arch="x86_64" name="samba-krb5-printing" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">3086146d97fbd2fa391f0df8be69d3bb0bcb6558f8f0720e036a046f2b05a7e5</sum></package><package arch="x86_64" name="samba-winbind-clients" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">42cc740c2b2a91a831f7bdc3230194787daa79abf26b1365e848d170de97ecba</sum></package><package arch="i686" name="libsmbclient-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">41060951f6192311613b9ab0b609916c5704ea15f3d586f9f790133820855594</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254" id="CVE-2021-20254" title="Samba: Negative Idmap Cache Entries Can Cause Incorrect Group Entries In The Samba File Server Process Token" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2313" id="RHSA-2021:2313-1" title="Rhsa-2021:2313-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930747" id="1930747" title="[Rhel7.9] Smb.Service Stops When Samba Rpms Are Updated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1937867" id="1937867" title="Samba Printing Dumps Core" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1949442" id="1949442" title="Samba: Negative Idmap Cache Entries Can Cause Incorrect Group Entries In The Samba File Server Process Token" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2314-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362) 
* kernel: Use after free via PI futex state (CVE-2021-3347) 
* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648) 
* kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363) 
* kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364) 
* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module 
* SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation 
* netfilter: reproducible deadlock on nft_log module autoload 
* netfilter: NULL pointer dereference in nf_tables_set_lookup() 
* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for "power cap policy equal to 0 watts" 
* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. 
* netxen driver performs poorly with RT kernel 
* gendisk-&gt;disk_part_tbl-&gt;last_lookup retains pointer after partition deletion 
* Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix 
* SL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path 
* SL7.9 - mm/THP: do not access vma-&gt;vm_mm after calling handle_userfault 
* raid: wrong raid io account 
* qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings 
* SL 7.9.z - System hang caused by workqueue stall in qla2xxx driver 
* selinux: setsebool can trigger a deadlock 
* [Hyper-V][SL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V 
 --- 
SL7  x86_64  - bpftool-3.10.0-1160.31.1.el7.x86_64.rpm  - bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm  - perf-3.10.0-1160.31.1.el7.x86_64.rpm  - perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - python-perf-3.10.0-1160.31.1.el7.x86_64.rpm  - python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  noarch  - kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm  - kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">f146169c2e1e2682199b5c6bd03bbe577981645ee5d6b934fd9e1398b794d803</sum></package><package arch="x86_64" name="kernel-devel" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">001620ea5a1a14ea9a67858d93fdf75581592c8fb1b41b955ca9f515cd900840</sum></package><package arch="x86_64" name="kernel" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">33b83b872b03d304dffd44ca8c30ad2ae1b11a7eef719a275521dd71211c6368</sum></package><package arch="x86_64" name="kernel-headers" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">b20c4f7db9b6e2720919e918298cee1a16cde0d8bb7cf6d1e8b8bec836f3551a</sum></package><package arch="x86_64" name="python-perf" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">e3b8261de98a47a78985ee7c714b02bb06d4be508fdcca23466d188ca191cc05</sum></package><package arch="x86_64" name="kernel-debug" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">f43dec0a3daa151b602415f6509ac6b62c604bca386112bc506124a347208b71</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">0a87d41078aad213f57ca583375d11182452104cca0b6c0a889b1183605a791c</sum></package><package arch="x86_64" name="bpftool" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">19bb2ab022c1b5baa08e787b3b0491a830396095772e3535f8410cf775016cbb</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm</filename><sum type="sha256">15a4b566b7e4fb25a5d6f195d3301d27c7d69db5eaddf72dc0db5907a2aa903e</sum></package><package arch="x86_64" name="perf" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">ed9b20cf0449eec46adff1d83a44d964feec09ac1aea06b6eebd432a85ae4e0e</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">4de8770b19792d3525e3a44c54654d8e56a3c66606f4b8f6982673989e65de84</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">2d242882671570f55531142c32916b7679bd8a6c8c8790de86ee3c86ae0c4bb5</sum></package><package arch="noarch" name="kernel-doc" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm</filename><sum type="sha256">4d6aadaec334fc5b5f1cfce3ff588e6af061c3b86948b1201e7b1e282949bcc2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362" id="CVE-2020-12362" title="Kernel: Integer Overflow In Intel(R) Graphics Drivers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363" id="CVE-2020-12363" title="Kernel: Improper Input Validation In Some Intel(R) Graphics Drivers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364" id="CVE-2020-12364" title="Kernel: Null Pointer Dereference In Some Intel(R) Graphics Drivers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170" id="CVE-2020-27170" title="Kernel: Speculation On Pointer Arithmetic Against Bpf_Context Pointer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648" id="CVE-2020-8648" title="Kernel: Use-After-Free In N_Tty_Receive_Buf_Common Function In Drivers/Tty/N_Tty.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347" id="CVE-2021-3347" title="Kernel: Use After Free Via Pi Futex State" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2314" id="RHSA-2021:2314-1" title="Rhsa-2021:2314-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1802559" id="1802559" title="Kernel: Use-After-Free In N_Tty_Receive_Buf_Common Function In Drivers/Tty/N_Tty.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1922249" id="1922249" title="Kernel: Use After Free Via Pi Futex State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930246" id="1930246" title="Kernel: Integer Overflow In Intel(R) Graphics Drivers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930249" id="1930249" title="Kernel: Improper Input Validation In Some Intel(R) Graphics Drivers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930251" id="1930251" title="Kernel: Null Pointer Dereference In Some Intel(R) Graphics Drivers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1940627" id="1940627" title="Kernel: Speculation On Pointer Arithmetic Against Bpf_Context Pointer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1941841" id="1941841" title="[Hyper-V][Rhel-7] Cannot Boot Kernel 3.10.0-1160.21.1.El7.X86_64 On Hyper-V" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2318-1</id><title>Hivex</title><description>Security Fix(es): 
* hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7 x86_64 
hivex-1.3.10-6.11.el7_9.i686.rpm hivex-1.3.10-6.11.el7_9.x86_64.rpm hivex-debuginfo-1.3.10-6.11.el7_9.i686.rpm hivex-debuginfo-1.3.10-6.11.el7_9.x86_64.rpm hivex-devel-1.3.10-6.11.el7_9.i686.rpm hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm ocaml-hivex-1.3.10-6.11.el7_9.x86_64.rpm ocaml-hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm perl-hivex-1.3.10-6.11.el7_9.x86_64.rpm python-hivex-1.3.10-6.11.el7_9.x86_64.rpm ruby-hivex-1.3.10-6.11.el7_9.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ruby-hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>ruby-hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">70ff83bd89b3a516c62a82ca22036e00b35f6d738a21541f6cfb28c336321c50</sum></package><package arch="x86_64" name="ocaml-hivex-devel" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>ocaml-hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">7922ba897f8ba607bf961263e17cea88351ded69ff9ffb523ddc3d7a6f5d5cef</sum></package><package arch="x86_64" name="hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">b4bc08184a6fcbfcf3fc701eae65c5401c847cbf052fed4c5036c7d49efdd443</sum></package><package arch="x86_64" name="perl-hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>perl-hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">927ae1e774035bec849f0847ad3d315c9dfe5c5b859dbf4306b6ac603b45cec7</sum></package><package arch="i686" name="hivex-devel" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>hivex-devel-1.3.10-6.11.el7_9.i686.rpm</filename><sum type="sha256">a3ba7c6fbac4ec4872695e6a866e3e6e6a2f0c9ce3a0086e83fee3c06d9c38be</sum></package><package arch="x86_64" name="hivex-devel" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">774709ff3467b495de350f692372acc34009f17b08ef11a6b2a67cf4501f7dae</sum></package><package arch="x86_64" name="python-hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>python-hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">cd86f76c5c12683ceb78941a9d1af7fd142bfac23d2eb19c789ffd56e416c23a</sum></package><package arch="x86_64" name="ocaml-hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>ocaml-hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">9a4dc3d3fc98a74dc47aba35c26e4c41b17e28e5b0536ff2dcf64c4284a9fb8d</sum></package><package arch="i686" name="hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>hivex-1.3.10-6.11.el7_9.i686.rpm</filename><sum type="sha256">a68119a2bc76e35331c85acf2974fbe9d0c93026c4c64174b1bca8e5fbb465ed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3504" id="CVE-2021-3504" title="Hivex: Buffer Overflow When Provided Invalid Node Key Length" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2318" id="RHSA-2021:2318-1" title="Rhsa-2021:2318-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1949687" id="1949687" title="Hivex: Buffer Overflow When Provided Invalid Node Key Length" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2322-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 x86_64 
qemu-img-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-common-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-debuginfo-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-tools-1.5.3-175.el7_9.4.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7_9.4" src="qemu-kvm-1.5.3-175.el7_9.4.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7_9.4.x86_64.rpm</filename><sum type="sha256">4aa234a0664bcf8dde65870311bce96b737b9220f914667bafe5ea22b5418114</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7_9.4" src="qemu-kvm-1.5.3-175.el7_9.4.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7_9.4.x86_64.rpm</filename><sum type="sha256">e537aa8950b76e2290bc2ae1a8a1d399e59c2423bb14751ad1f6fe5c323dc692</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7_9.4" src="qemu-kvm-1.5.3-175.el7_9.4.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7_9.4.x86_64.rpm</filename><sum type="sha256">c9072966f802b13c51cc26cad520ba4de9a77f2725322d2c18cde51b47f50d0b</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7_9.4" src="qemu-kvm-1.5.3-175.el7_9.4.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7_9.4.x86_64.rpm</filename><sum type="sha256">364a06918e63444100221d6472bbda6129b9b69703f44e360c611d5e55f11106</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29443" id="CVE-2020-29443" title="Qemu: Ide: Atapi: Oob Access While Processing Read Commands" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2322" id="RHSA-2021:2322-1" title="Rhsa-2021:2322-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917446" id="1917446" title="Qemu: Ide: Atapi: Oob Access While Processing Read Commands" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2323-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: information disclosure during the binding of a DN (CVE-2020-35518) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Add new access log keywords for time spent in work queue and actual operation time 
 --- SL7 x86_64 
389-ds-base-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-debuginfo-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-devel-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-libs-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-snmp-1.3.10.2-12.el7_9.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="12.el7_9" src="389-ds-base-1.3.10.2-12.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-12.el7_9.x86_64.rpm</filename><sum type="sha256">bb65147d453338e7cca13421f947e9ebfc5949e1a34e3829745aafa0a071be5e</sum></package><package arch="x86_64" name="389-ds-base" release="12.el7_9" src="389-ds-base-1.3.10.2-12.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-12.el7_9.x86_64.rpm</filename><sum type="sha256">7b3d1df912cf00d8fc800b3f6caf477abfa0325dc1ff603b5a921cdda3c98533</sum></package><package arch="x86_64" name="389-ds-base-libs" release="12.el7_9" src="389-ds-base-1.3.10.2-12.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-12.el7_9.x86_64.rpm</filename><sum type="sha256">d717f396ae302b7ca1392319957a4b31d2c9fa8253000a12ffe78743b8ceaa01</sum></package><package arch="x86_64" name="389-ds-base-devel" release="12.el7_9" src="389-ds-base-1.3.10.2-12.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-12.el7_9.x86_64.rpm</filename><sum type="sha256">fbe5956bda164c7d8b150849c61601a3e104c3d7d63e15b8b3aa773a5da8ced1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35518" id="CVE-2020-35518" title="389-Ds-Base: Information Disclosure During The Binding Of A Dn" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2323" id="RHSA-2021:2323-1" title="Rhsa-2021:2323-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1905565" id="1905565" title="389-Ds-Base: Information Disclosure During The Binding Of A Dn" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1953673" id="1953673" title="Add New Access Log Keywords For Time Spent In Work Queue And Actual Operation Time" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2328-1</id><title>Qt5-Qtimageformats</title><description>Security Fix(es): 
* libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) 
* libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) 
* libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) 
* libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 x86_64 
qt5-qtimageformats-5.9.7-2.el7_9.i686.rpm qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.i686.rpm qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.x86_64.rpm 
noarch qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="qt5-qtimageformats" release="2.el7_9" src="qt5-qtimageformats-5.9.7-2.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtimageformats-5.9.7-2.el7_9.i686.rpm</filename><sum type="sha256">3ae2e559638d0781783b638233cef303a46eaf2dde1f2c7ba68ca6c4db3ab4a3</sum></package><package arch="noarch" name="qt5-qtimageformats-doc" release="2.el7_9" src="qt5-qtimageformats-5.9.7-2.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpm</filename><sum type="sha256">682d1477d439225104ba4f3a5749071cebddefddb4119c83b6d896a4c18d6375</sum></package><package arch="x86_64" name="qt5-qtimageformats" release="2.el7_9" src="qt5-qtimageformats-5.9.7-2.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm</filename><sum type="sha256">4fdab3f7df2e30a71dbc732a5be85d3dfda87518d11f8c37c3defcc6517e00e7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011" id="CVE-2018-25011" title="Libwebp: Heap-Based Buffer Overflow In Putle16()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014" id="CVE-2018-25014" title="Libwebp: Use Of Uninitialized Value In Readsymbol()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328" id="CVE-2020-36328" title="Libwebp: Heap-Based Buffer Overflow In Webpdecode*Into Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329" id="CVE-2020-36329" title="Libwebp: Use-After-Free In Emitfancyrgb() In Dec/Io_Dec.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2328" id="RHSA-2021:2328-1" title="Rhsa-2021:2328-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956829" id="1956829" title="Libwebp: Heap-Based Buffer Overflow In Webpdecode*Into Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956843" id="1956843" title="Libwebp: Use-After-Free In Emitfancyrgb() In Dec/Io_Dec.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956919" id="1956919" title="Libwebp: Heap-Based Buffer Overflow In Putle16()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956927" id="1956927" title="Libwebp: Use Of Uninitialized Value In Readsymbol()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2357</id><title>Important: Dhcp Security Update</title><description>The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient (CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2021-06-14 07:50:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="12" name="dhcp" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">b287c98b390f00cbb5ebc28a9d5389e387cd1b86e3ae24b20c907aa6e80e1811</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">e4c7db95a5e4d4ca0c18209014b43b8c2d0dbcdafe4ca27e5e1c0ef8cc13bb4d</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-83.sl7_9.1.i686.rpm</filename><sum type="sha256">bc9e52b40a91c46f225d2ef5033505d49d1ffbe9ea59353c7b7dc0695aa335ef</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhclient-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">8949ed6e47882dea0ea828752573794a630e70d8760ea7cb03323ceaac492d0e</sum></package><package arch="x86_64" epoch="12" name="dhcp-common" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-common-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">3d5dd700d355b3bdeb1501218cce589e0577778e0760e1814a4072a2cae8729f</sum></package><package arch="i686" epoch="12" name="dhcp-libs" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-83.sl7_9.1.i686.rpm</filename><sum type="sha256">6aa8ea106a32c5eb0beaf64acae8951f4a0a12c7501069e3503d8d9b069db3a9</sum></package><package arch="x86_64" epoch="12" name="dhcp-libs" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">c76788b9c008cf2b5b9542e4cedb2c9cbb5acd81eeae9cbf259cf1687a3566ef</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217" id="CVE-2021-25217" title="Cve-2021-25217" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2357" id="RHSA-2021:2357" title="Important: Dhcp Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2397-1</id><title>Postgresql</title><description>Security Fix(es): 
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- 
SL7  x86_64   postgresql-9.2.24-7.el7_9.i686.rpm   postgresql-9.2.24-7.el7_9.x86_64.rpm   postgresql-contrib-9.2.24-7.el7_9.x86_64.rpm   postgresql-debuginfo-9.2.24-7.el7_9.i686.rpm   postgresql-debuginfo-9.2.24-7.el7_9.x86_64.rpm   postgresql-devel-9.2.24-7.el7_9.i686.rpm   postgresql-devel-9.2.24-7.el7_9.x86_64.rpm   postgresql-docs-9.2.24-7.el7_9.x86_64.rpm   postgresql-libs-9.2.24-7.el7_9.i686.rpm   postgresql-libs-9.2.24-7.el7_9.x86_64.rpm   postgresql-plperl-9.2.24-7.el7_9.x86_64.rpm   postgresql-plpython-9.2.24-7.el7_9.x86_64.rpm   postgresql-pltcl-9.2.24-7.el7_9.x86_64.rpm   postgresql-server-9.2.24-7.el7_9.x86_64.rpm   postgresql-static-9.2.24-7.el7_9.i686.rpm   postgresql-static-9.2.24-7.el7_9.x86_64.rpm   postgresql-test-9.2.24-7.el7_9.x86_64.rpm   postgresql-upgrade-9.2.24-7.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-pltcl" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-pltcl-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">fe84b2c10cc2ffc47245014647c21768c6ff7dbc3d9f0d9ac9e255700474c202</sum></package><package arch="i686" name="postgresql-libs" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-7.el7_9.i686.rpm</filename><sum type="sha256">d6ebaeddc43cc67b36b83283043b378120e53eb79abfc77187671ed411226640</sum></package><package arch="x86_64" name="postgresql-server" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-server-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">3f94ec32306530e799b50ff670aaf6809399d1135a67a516498250689e1c8624</sum></package><package arch="x86_64" name="postgresql" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">f938f0b97b430cbd251a0f036e4214199df561c5dfd2f478143e5edd5bc12283</sum></package><package arch="x86_64" name="postgresql-plperl" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plperl-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">926162483eb35a1d39e1c0e2b56b7c196697ade56bd8fb38870cff629baa3231</sum></package><package arch="x86_64" name="postgresql-test" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-test-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">c28b40c3f00cf23e22de580966ecd38e277a70732a7625e9da129475c056d4aa</sum></package><package arch="i686" name="postgresql" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-7.el7_9.i686.rpm</filename><sum type="sha256">f5515ecf51a202879d66c91312b10c4214cc3995591a34391b472d601aa12775</sum></package><package arch="x86_64" name="postgresql-libs" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">3bf162c4a94a11e0b6ed4a37bf05afd25f7f0281ea35f708b088abff5cfd1c50</sum></package><package arch="x86_64" name="postgresql-docs" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-docs-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">4dd6a639a699788e8a6812c960e672544e99bad708395f8a188704004044347e</sum></package><package arch="i686" name="postgresql-static" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-7.el7_9.i686.rpm</filename><sum type="sha256">7c9e5ef8fb7eff7cb672225f57ed5c8762f3958652a4498f947e119bcc35783e</sum></package><package arch="x86_64" name="postgresql-plpython" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plpython-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">835629aec9a254e10435f3c461b887e2a7f76e5aa91750febadffba0b0da188b</sum></package><package arch="x86_64" name="postgresql-static" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">74afa4f5df7a224a93ccb22c9d8f8e7358c965e69dccae53925f169486c5faf9</sum></package><package arch="x86_64" name="postgresql-upgrade" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-upgrade-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">b9ecb9b5b59a17c92985c06291051d1834f718be392b5c58f3f2aa58a1437173</sum></package><package arch="x86_64" name="postgresql-devel" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">78a04399dfdcc47c4302e4cf573ee64a388a3bb57a39d1ed3fd0647fbf0d6182</sum></package><package arch="x86_64" name="postgresql-contrib" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-contrib-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">d2b36cd2421c1d0cbf6d7d31daf716c8c32478593f4b1d1106cdb15afd8637ce</sum></package><package arch="i686" name="postgresql-devel" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-7.el7_9.i686.rpm</filename><sum type="sha256">dbec064f8fdc17ab8c066186122b31b0648554619f7191ed7705d43596786098</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" id="CVE-2021-32027" title="Postgresql: Buffer Overrun From Integer Overflow In Array Subscripting Calculations" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2397" id="RHSA-2021:2397-1" title="Rhsa-2021:2397-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956876" id="1956876" title="Postgresql: Buffer Overrun From Integer Overflow In Array Subscripting Calculations" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2417-1</id><title>Gupnp</title><description>Security Fix(es): 
* gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   gupnp-1.0.2-6.el7_9.i686.rpm   gupnp-1.0.2-6.el7_9.x86_64.rpm   gupnp-debuginfo-1.0.2-6.el7_9.i686.rpm   gupnp-debuginfo-1.0.2-6.el7_9.x86_64.rpm   gupnp-devel-1.0.2-6.el7_9.i686.rpm   gupnp-devel-1.0.2-6.el7_9.x86_64.rpm  noarch   gupnp-docs-1.0.2-6.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gupnp-devel" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-devel-1.0.2-6.el7_9.i686.rpm</filename><sum type="sha256">7f37ce90a108e6ee1e8079e3721e199777ec5a118f40cf4052e8e8f14021dc4f</sum></package><package arch="i686" name="gupnp" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-1.0.2-6.el7_9.i686.rpm</filename><sum type="sha256">2b8140194eac42849f0413eb49061b72f2bb83a3997b578451c551e39570b21a</sum></package><package arch="x86_64" name="gupnp-devel" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-devel-1.0.2-6.el7_9.x86_64.rpm</filename><sum type="sha256">c5a7092395429e4b142cb998cc71b239d7ba6018b75fe99366f3431b97faeb61</sum></package><package arch="noarch" name="gupnp-docs" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-docs-1.0.2-6.el7_9.noarch.rpm</filename><sum type="sha256">3ad612ae1e816a0cffcfc500d66b0de0598f332d4159db09e9acaab30343318f</sum></package><package arch="x86_64" name="gupnp" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-1.0.2-6.el7_9.x86_64.rpm</filename><sum type="sha256">588c939f7fe4121ee36f425753647b2bee628fcb30a0b919cfd00b1196ecf1fa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33516" id="CVE-2021-33516" title="Gupnp: Allows Dns Rebinding Which Could Result In Tricking Browser Into Triggering Actions Against Local Upnp Services" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2417" id="RHSA-2021:2417-1" title="Rhsa-2021:2417-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1964091" id="1964091" title="Gupnp: Allows Dns Rebinding Which Could Result In Tricking Browser Into Triggering Actions Against Local Upnp Services" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2658-1</id><title>Linuxptp</title><description>Security Fix(es): 
* linuxptp: missing length check of forwarded messages (CVE-2021-3570) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   - linuxptp-2.0-2.el7_9.1.x86_64.rpm   - linuxptp-debuginfo-2.0-2.el7_9.1.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="linuxptp" release="2.el7_9.1" src="linuxptp-2.0-2.el7_9.1.src.rpm" version="2.0"><filename>linuxptp-2.0-2.el7_9.1.x86_64.rpm</filename><sum type="sha256">cd19472fe3908a41310e91a23e649c7c8aa1c93c58af619542a150c80a6286f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3570" id="CVE-2021-3570" title="Linuxptp: Missing Length Check Of Forwarded Messages" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2658" id="RHSA-2021:2658-1" title="Rhsa-2021:2658-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966240" id="1966240" title="Linuxptp: Missing Length Check Of Forwarded Messages" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2683-1</id><title>Xstream</title><description>Security Fix(es): 
* XStream: remote command execution attack by manipulating the processed input stream (CVE-2021-29505) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  noarch  - xstream-1.3.1-14.el7_9.noarch.rpm  - xstream-javadoc-1.3.1-14.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xstream" release="14.el7_9" src="xstream-1.3.1-14.el7_9.src.rpm" version="1.3.1"><filename>xstream-1.3.1-14.el7_9.noarch.rpm</filename><sum type="sha256">4c0d1e279f58b3c5fc61212ae542c273a87ad83e762cf82d968befffc234abc7</sum></package><package arch="noarch" name="xstream-javadoc" release="14.el7_9" src="xstream-1.3.1-14.el7_9.src.rpm" version="1.3.1"><filename>xstream-javadoc-1.3.1-14.el7_9.noarch.rpm</filename><sum type="sha256">5df6f91d53d3443b4aab2e3cf697e3d6a0e734dae4e6adea1b7540c6425285bc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29505" id="CVE-2021-29505" title="Xstream: Remote Command Execution Attack By Manipulating The Processed Input Stream" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2683" id="RHSA-2021:2683-1" title="Rhsa-2021:2683-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966735" id="1966735" title="Xstream: Remote Command Execution Attack By Manipulating The Processed Input Stream" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2725-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) 
* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) 
* kernel: use-after-free in show_numa_stats function (CVE-2019-20934) 
* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668) 
* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* [SL7.9.z] n_tty_open: "BUG: unable to handle kernel paging request" 
* [ESXi][SL7.8]"qp_alloc_hypercall result = -20" / "Could not attach to queue pair with -20" with vSphere Fault Tolerance enabled 
* [SL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP 
* False-positive hard lockup detected while processing the thread state information (SysRq-T) 
* SL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) 
* The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console 
* nvme hangs when trying to allocate reserved tag 
* [REGRESSION] "call into AER handling regardless of severity" triggers do_recovery() unnecessarily on correctable PCIe errors 
* Module nvme_core: A double free  of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). 
* sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! 
* [Hyper-V][SL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed 
* Kernel panic at cgroup_is_descendant 
* [Hyper-V][SL-7]Commits To Fix Kdump Failures 
* IGMPv2 JOIN packets incorrectly routed to loopback 
* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap  [7.9.z] 
* mlx4: Fix memory allocation in mlx4_buddy_init needed 
* incorrect assertion on pi_state-&gt;pi_mutex.wait_lock from pi_state_update_owner() 
 
 --- SL7 
x86_64 bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm 
noarch kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">7d8ecb4acaea932f0c8952ee9af2eacba520a527bfe920b669c922ce4c52d3a9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm</filename><sum type="sha256">d693cdb4cf9f6b10fc9e8ed2d32390fc1d4d1a1874ab6e847afd0829cb96000a</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">d6ae76ca47e20b280316d8ff71851d7c3a20fa3cee111d25aa2a0dd0eff7cbcc</sum></package><package arch="noarch" name="kernel-doc" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm</filename><sum type="sha256">f8e09350909d363258cabab3a793867b6f775381e1653a0be9386ad2bc9daac0</sum></package><package arch="x86_64" name="kernel-debug" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">2aa5e3f4679a1935ddbf5185667ca13e950c2a02f8967b58f681108ca2c06314</sum></package><package arch="x86_64" name="perf" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">fc1a425560686ecd1aeda5561dd9e31caed3feb6d9ac2290016c5f13eecaae62</sum></package><package arch="x86_64" name="kernel-tools" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">417ba353631eb370a626496cf0124bda27d15332b74275b31f4d2b0250fb1396</sum></package><package arch="x86_64" name="python-perf" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">04dd3ebe74791e117d40c57d072cfc09cb1769bcfd9e12019543fc850cb8d73b</sum></package><package arch="x86_64" name="kernel-headers" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">e553a94a8a993338ae132e222b1046da227d9601de7743906d1faea33856aede</sum></package><package arch="x86_64" name="kernel-devel" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">4fb494afeb8ebe56bdd8add70251c529ab5b5772f941d4cd6e79f9033df73acd</sum></package><package arch="x86_64" name="kernel" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">b63017d77d981063372bbc92dc6423e9387c01668ee7c70963ff3d886ee46b19</sum></package><package arch="x86_64" name="bpftool" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">991736f4f2fe98ff1f6740177e2ce530640dc5f9e8f866280f8db303594e1edd</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">b49834e7c0c65269e6ad42c1fc17aa1fdd56d4e7d76bc15bcb1f5d1efe761b4c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20934" id="CVE-2019-20934" title="Kernel: Use-After-Free In Show_Numa_Stats Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" id="CVE-2020-11668" title="Kernel: Mishandles Invalid Descriptors In Drivers/Media/Usb/Gspca/Xirlink_Cit.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033" id="CVE-2021-33033" title="Kernel: Use-After-Free In Cipso_V4_Genopt In Net/Ipv4/Cipso_Ipv4.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034" id="CVE-2021-33034" title="Kernel: Use-After-Free In Net/Bluetooth/Hci_Event.C When Destroying An Hci_Chan" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909" id="CVE-2021-33909" title="Kernel: Size_T-To-Int Conversion Vulnerability In The Filesystem Layer" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2725" id="RHSA-2021:2725-1" title="Rhsa-2021:2725-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824792" id="1824792" title="Kernel: Mishandles Invalid Descriptors In Drivers/Media/Usb/Gspca/Xirlink_Cit.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1902788" id="1902788" title="Kernel: Use-After-Free In Show_Numa_Stats Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961300" id="1961300" title="Kernel: Use-After-Free In Cipso_V4_Genopt In Net/Ipv4/Cipso_Ipv4.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961305" id="1961305" title="Kernel: Use-After-Free In Net/Bluetooth/Hci_Event.C When Destroying An Hci_Chan" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1970273" id="1970273" title="Kernel: Size_T-To-Int Conversion Vulnerability In The Filesystem Layer" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2741-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.12.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in accessibility features of a document (CVE-2021-29970) 
* Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 (CVE-2021-29976) 
* chromium-browser: Out of bounds write in ANGLE (CVE-2021-30547) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - firefox-78.12.0-1.el7_9.x86_64.rpm  - firefox-debuginfo-78.12.0-1.el7_9.x86_64.rpm  - firefox-78.12.0-1.el7_9.i686.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.12.0-1.el7_9.src.rpm" version="78.12.0"><filename>firefox-78.12.0-1.el7_9.i686.rpm</filename><sum type="sha256">5072673f08d52e0ced6ac477f677481000537be1557c181c8d3483adee4f3c43</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.12.0-1.el7_9.src.rpm" version="78.12.0"><filename>firefox-78.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">6bd823c34deaa1a1e06b0c6665122b3dc08984c22bb398d0ebbec8407e00709d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970" id="CVE-2021-29970" title="Mozilla: Use-After-Free In Accessibility Features Of A Document" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976" id="CVE-2021-29976" title="Mozilla: Memory Safety Bugs Fixed In Firefox 90 And Firefox Esr 78.12" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547" id="CVE-2021-30547" title="Chromium-Browser: Out Of Bounds Write In Angle" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2741" id="RHSA-2021:2741-1" title="Rhsa-2021:2741-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1970109" id="1970109" title="Chromium-Browser: Out Of Bounds Write In Angle" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982013" id="1982013" title="Mozilla: Use-After-Free In Accessibility Features Of A Document" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982014" id="1982014" title="Mozilla: Memory Safety Bugs Fixed In Firefox 90 And Firefox Esr 78.12" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2784-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) 
* OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) 
* OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 
x86_64 java-11-openjdk-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-debuginfo-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-debuginfo-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-demo-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-demo-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-devel-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-devel-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-headless-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-headless-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-src-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-src-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">40ed18b4d88296b926addc5f3488e95a532af2616b339fb470ab89efe9b33978</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">ad15ee4fde1e323fd53ad78545605a445f954b03c5f105e5b1277a3a7afde34b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-devel-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">25687ef939eaf8b30fa0c0abbf000d50a7de09a91672fd87c0acc078480323ea</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">d6f8f6df281e2bcb246d37938461a2d8541f5b9288a859dbab42031c82a6c13e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">2cfbae8b8d3476eb614c43a6af638d7bc64cdeeb8dfe3afa59727780cbfc3dbe</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-demo-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">d1c61bdfaf082840c4a026ce0ca27e5060094208f3c94057873b29510fefac34</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-headless-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">580feb4e2aee7dc454c0d87c538e9940ec312de05a735fba275f9a8c8073e486</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">150df06bfcf5cf74bd9f22ae934021ae13d6fcd08072d6384ee375cab8df06dd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">746780768d85f21edc8db369296a7d42784cf171564bf91a58a9abcbf2bd3524</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-demo-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">6184086c04b7d5ae668b69ea271b49b1ff9356adc659f3eadbce14734e4a87b6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-src-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">4d750ffee5def8f1e7d24404502ed102a8d97ebfa149fdd56cf181143601b41b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-devel-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">187524191dca7a5b7755f688d53c427c6adfd6f9ee6e62f30dd05a9c970286ba</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">b6a9d24c04f3d17ad62478855251401aa36facff2e016c9422088886e7f1b9c2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-headless-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">2526e65ef5fe50f6864eaeebbfcc62e9010ec568c8d08efb4a466522cdaab033</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">1dbca9adc5784430935d62f33177b1aa29a37c6e8c592daa40f3af23eca1fcba</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-src-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">2c55847b071127c9c423665e36666ad4b0cc399fa8e157ae742a593d32f26999</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">397dc94ccadf1cc07ed6b9eec704486ee3e120916bf81bf6301f464245b85f13</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" id="CVE-2021-2341" title="Openjdk: Ftp Pasv Command Response Can Cause Ftpclient To Connect To Arbitrary Host (Networking, 8258432)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" id="CVE-2021-2369" title="Openjdk: Incorrect Verification Of Jar Files With Multiple Manifest.Mf Files (Library, 8260967)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" id="CVE-2021-2388" title="Openjdk: Incorrect Comparison During Range Check Elimination (Hotspot, 8264066)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2784" id="RHSA-2021:2784-1" title="Rhsa-2021:2784-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982874" id="1982874" title="Openjdk: Ftp Pasv Command Response Can Cause Ftpclient To Connect To Arbitrary Host (Networking, 8258432)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982879" id="1982879" title="Openjdk: Incorrect Verification Of Jar Files With Multiple Manifest.Mf Files (Library, 8260967)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1983075" id="1983075" title="Openjdk: Incorrect Comparison During Range Check Elimination (Hotspot, 8264066)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2845</id><title>Important: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) * OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) * OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* JDK-8266279: 8u292 NoSuchAlgorithmException unrecognized algorithm name: PBEWithSHA1AndDESede (BZ#1960024)
</description><severity>important</severity><issued date="2021-07-26 16:08:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">259e7edd8a077d3d9ce857d1824f5b35ec233b0e3612791cdd16f353ff338365</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">503e87717a057cf98c785b42ef1384df5b43e070f134568c9763153dfdab5d51</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.302.b08-0.el7_9.noarch.rpm</filename><sum type="sha256">9fb2415f774c0bf1bf64e3ca720709260ba99b60591718237bcfbcf330134281</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-jmods-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">b644e8d999f05d3ed440a9c478aade5487b180429bcfccda9c3d52d58b7c65ea</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-devel-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">6941da52a5e6aeb5a9ca86d8e02521978761a2c026daea27977be3f54b37b769</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">541dfc3f577bd50b00f3f67b7a7ecadfaeabbef5d8016103c289ef48f2dd44c8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">a226ad0efd2ba486b68d189957ded0cfeda686213b2a9dc7cc8c484b476fdb26</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.302.b08-0.el7_9.noarch.rpm</filename><sum type="sha256">4deef6abdb8819c181e3e10bd2bc1435ce2d3ca77b1e543189d7780b4d42cffa</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-jmods-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">2a668ff27d9a45507afe1c7daa7c2115814b968bcf1d54de45261aa379fa2476</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">b66530714e9689b2d24e88327a6116eece12fdfbb14e0a237e28595634cc2643</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">5545de2e2433d0b52c06f627eef8279a858657c96b833013c9c704cbbfd42034</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">e9bca973fbcf25a83c3a27cef032e16a667633b886f58940d0129888264db818</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">a5dd961b429af5889ef9d24cc0c2ca22f97a260e4e2d06d09fec06babd6ddd6e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">0c1e27807db8a30ef27d4000333703e9e134efc0ccd79de0845cf4fdc5db3307</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-src-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">d1251ab40d2373fde3711c8dc81bd3fca599f1bffa6888ec1ab546723259bff1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-src-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">572292710adf20d1d3e3f646d3e469df5e23a2707f6969b99cad7eadba74ae0c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-demo-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">82b8c2cf3276139d9c1e7009866560a1d932d1582c115b8c6ba832eb3a434f0d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-headless-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">313bc9f9712f72a4998b928f92c3061c467de050947f6bb6d354070e7159a3a4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">2fb087a780d001dd55ac9e2193645a69bd55386d1fc74fc3ae9e8d28919f3005</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-demo-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">a87d815fcd33fd6689134ad748c41768af50ed81f886369c84fb7a8ca248a8e8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">1d2354f323d57fe9229b7afa9293317af44c9ba4e5b5b289591ba50eb7e962a7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">d6ae82ec8de7558797b089df7750c7d8043ff0fd895722fadce95d404a16e422</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-static-libs-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">2b750a81c4d4f4daeb1ba6aa6a7deccd4325451b3d5736ad9ad981d8bdf54f7e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">f2f4bf7e53f3bfefdc14a881813f261aae9ecd7b7e65e40ae410beb7ea6e6f40</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-devel-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">95512f993250891c7b8d2bd6a28bce89ef846eac9aab79b6b9548aaeef057d63</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-headless-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">b84bed334da15fc88b6068df346078fe950ec81cf592cee0939e8d4edf4dd106</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">e107bf56f04db02fae2ca8d6c7291540e124e4584ac0b79ece4e20ca22d47139</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">0c476704f8568af73f4fd8241fd3cf6717eb3984305f8da7e27cc0c9e813e1ba</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">c71f143b109dbc85c5c4a2574e09c4cde1039b780420e71eae2ccaceaa7c0764</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">45ab1bf63c939aae68e150fd5c785298bacd2f38655484d1377f65ce487cfa61</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">7f2476266ea1139f00956d3018d57d890711b16f79f7d1522d804bbb1bde309b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" id="CVE-2021-2341" title="Cve-2021-2341" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" id="CVE-2021-2369" title="Cve-2021-2369" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" id="CVE-2021-2388" title="Cve-2021-2388" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2845" id="RHSA-2021:2845" title="Important: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1960024" id="1960024" title="1960024 &#8211; Jdk-8266279: 8U292 Nosuchalgorithmexception Unrecognized Algorithm Name: Pbewithsha1Anddesede" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2845-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) 
* OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) 
* OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* JDK-8266279: 8u292 NoSuchAlgorithmException unrecognized algorithm name: PBEWithSHA1AndDESede 
--- SL7 
x86_64 java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-debuginfo-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.x86_64.rpm 
noarch java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">7f3321a3d27853c3087f2e2bca65e30dcaabcbba6169ac009e11cecbda85b476</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">39f9af7346d534f2002887db9f4ff695de79b3ad2499d212e2a0e45eb9fb92bc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">4cf1b2f740d587ce33a1a07625b21d3eb96a97cb3f66c14776a435fa3af479e5</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9.noarch.rpm</filename><sum type="sha256">28f81e124f6d9bb59da40a64297d73b483a577f19c24f1eeba78d08ca6e03146</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">ed38b6dd0cdd0699af0fd65385edc050199398f3907f853a84a7b243aa4d7f52</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">5e8345b76c0310784eba308e4f94cfb60c33984b23bd62bde384e85997279035</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">b519d21b168768ab0745f0f53f5288f58bbb7f070944c8e7dce3d5a0be6bd5e4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">fe7868ec6c87bbfa14b5dbcb2c0c2f62890dfe9bf9908960fdaad79c3309bc90</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">c421080fae04fe01329bad7393633aecec64a7007bca4156f48610dba07dde8f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">3964f8ce990919fe3aad915412fa4e49987fffd234eefc1564a40b1aace539b8</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9.noarch.rpm</filename><sum type="sha256">9c576e635bfce44eda493bd2d4537d0285dcf6e5ad65ec6921bdb827b568cd56</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">e115f53dc308a75e1993d8ac0442465084d4f7798612b77bc490d389a5f53e61</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">72e7ced455969605907a30370a3ead4e2d3a45236aa28550ceff34ccabda5eac</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">06df563cb9a22f4fb86978044e3ccd7fc77e0045f8d0b6bde77bf762d86ab6ee</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" id="CVE-2021-2341" title="Openjdk: Ftp Pasv Command Response Can Cause Ftpclient To Connect To Arbitrary Host (Networking, 8258432)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" id="CVE-2021-2369" title="Openjdk: Incorrect Verification Of Jar Files With Multiple Manifest.Mf Files (Library, 8260967)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" id="CVE-2021-2388" title="Openjdk: Incorrect Comparison During Range Check Elimination (Hotspot, 8264066)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2845" id="RHSA-2021:2845-1" title="Rhsa-2021:2845-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1960024" id="1960024" title="Jdk-8266279: 8U292 Nosuchalgorithmexception Unrecognized Algorithm Name: Pbewithsha1Anddesede" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982874" id="1982874" title="Openjdk: Ftp Pasv Command Response Can Cause Ftpclient To Connect To Arbitrary Host (Networking, 8258432)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982879" id="1982879" title="Openjdk: Incorrect Verification Of Jar Files With Multiple Manifest.Mf Files (Library, 8260967)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1983075" id="1983075" title="Openjdk: Incorrect Comparison During Range Check Elimination (Hotspot, 8264066)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2881-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.12.0. 
Security Fix(es): 
* Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed (CVE-2021-29969) 
* Mozilla: Use-after-free in accessibility features of a document (CVE-2021-29970) 
* Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 (CVE-2021-29976) 
* chromium-browser: Out of bounds write in ANGLE (CVE-2021-30547) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - thunderbird-78.12.0-2.el7_9.x86_64.rpm  - thunderbird-debuginfo-78.12.0-2.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-78.12.0-2.el7_9.src.rpm" version="78.12.0"><filename>thunderbird-78.12.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">91806481c6fc65fcd2f5ae3c3fff8150b7982eb1f02226c2f8681d50cb369576</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969" id="CVE-2021-29969" title="Mozilla: Imap Server Responses Sent By A Mitm Prior To Starttls Could Be Processed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970" id="CVE-2021-29970" title="Mozilla: Use-After-Free In Accessibility Features Of A Document" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976" id="CVE-2021-29976" title="Mozilla: Memory Safety Bugs Fixed In Firefox 90 And Firefox Esr 78.12" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547" id="CVE-2021-30547" title="Chromium-Browser: Out Of Bounds Write In Angle" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2881" id="RHSA-2021:2881-1" title="Rhsa-2021:2881-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1970109" id="1970109" title="Chromium-Browser: Out Of Bounds Write In Angle" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982013" id="1982013" title="Mozilla: Use-After-Free In Accessibility Features Of A Document" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982014" id="1982014" title="Mozilla: Memory Safety Bugs Fixed In Firefox 90 And Firefox Esr 78.12" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982015" id="1982015" title="Mozilla: Imap Server Responses Sent By A Mitm Prior To Starttls Could Be Processed" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2989-1</id><title>Lasso</title><description>Security Fix(es): 
* lasso: XML signature wrapping vulnerability when parsing SAML responses (CVE-2021-28091) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 
--- SL7  x86_64  - lasso-2.5.1-8.el7_9.i686.rpm  - lasso-2.5.1-8.el7_9.x86_64.rpm  - lasso-debuginfo-2.5.1-8.el7_9.i686.rpm  - lasso-debuginfo-2.5.1-8.el7_9.x86_64.rpm  - lasso-devel-2.5.1-8.el7_9.i686.rpm  - lasso-devel-2.5.1-8.el7_9.x86_64.rpm  - lasso-python-2.5.1-8.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="lasso" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-2.5.1-8.el7_9.i686.rpm</filename><sum type="sha256">98e13a86c7880b2fbe273dfbf02fe9588b53ea0a7308376a53cd6989eda2f856</sum></package><package arch="x86_64" name="lasso" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-2.5.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">cf2896c9af6e17896a050bac5d3866525ed0e43c7f50fd394c1d969edab0acc0</sum></package><package arch="x86_64" name="lasso-devel" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-devel-2.5.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">682530e22a43541c96014fca60914ed9c36f229b28084a66b91e2cc6875ffc50</sum></package><package arch="x86_64" name="lasso-python" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-python-2.5.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">bfefa00287b78344a058232d34d74688113e0715f55b2f550cd5b7989d83c7da</sum></package><package arch="i686" name="lasso-devel" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-devel-2.5.1-8.el7_9.i686.rpm</filename><sum type="sha256">619d5eda91dfad8c51da2b01d131aa662754e2d057ba75501cec5e9e572d32fd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28091" id="CVE-2021-28091" title="Lasso: Xml Signature Wrapping Vulnerability When Parsing Saml Responses" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2989" id="RHSA-2021:2989-1" title="Rhsa-2021:2989-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1940089" id="1940089" title="Lasso: Xml Signature Wrapping Vulnerability When Parsing Saml Responses" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3028-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) 
* hw: Vector Register Data Sampling (CVE-2020-0548) 
* hw: L1D Cache Eviction Sampling (CVE-2020-0549) 
* hw: vt-d related privilege escalation (CVE-2020-24489) 
* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511) 
* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512) 
* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) 
* hw: Vector Register Leakage-Active (CVE-2020-8696) 
* hw: Fast forward store predictor (CVE-2020-8698) 
--- SL7  x86_64  - microcode_ctl-2.1-73.11.el7_9.x86_64.rpm  - microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.11.el7_9" src="microcode_ctl-2.1-73.11.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.11.el7_9.x86_64.rpm</filename><sum type="sha256">88a9b7faaa2f8bcfa45c883d79da8855fedf161b102a41ba91c8e7a8cda723db</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" id="CVE-2020-0543" title="Cve-2020-0543" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548" id="CVE-2020-0548" title="Cve-2020-0548" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549" id="CVE-2020-0549" title="Cve-2020-0549" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489" id="CVE-2020-24489" title="Hw: Vt-D Related Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511" id="CVE-2020-24511" title="Hw: Improper Isolation Of Shared Resources In Some Intel Processors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512" id="CVE-2020-24512" title="Hw: Observable Timing Discrepancy In Some Intel Processors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695" id="CVE-2020-8695" title="Hw: Information Disclosure Issue In Intel Sgx Via Rapl Interface" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696" id="CVE-2020-8696" title="Hw: Vector Register Leakage-Active" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698" id="CVE-2020-8698" title="Hw: Fast Forward Store Predictor" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3028" id="RHSA-2021:3028-1" title="Rhsa-2021:3028-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788786" id="1788786" title="Cve-2020-0548 Hw: Vector Register Data Sampling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788788" id="1788788" title="Cve-2020-0549 Hw: L1D Cache Eviction Sampling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1827165" id="1827165" title="Cve-2020-0543 Hw: Special Register Buffer Data Sampling (Srbds)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828583" id="1828583" title="Hw: Information Disclosure Issue In Intel Sgx Via Rapl Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1890355" id="1890355" title="Hw: Vector Register Leakage-Active" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1890356" id="1890356" title="Hw: Fast Forward Store Predictor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1897684" id="1897684" title="[Rhel-7.9.Z] Re-Enable 06-5E-03 (Skl-H/S, Cpuid 0X506E3) Latest Microcode Updates" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962650" id="1962650" title="Hw: Vt-D Related Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962702" id="1962702" title="Hw: Improper Isolation Of Shared Resources In Some Intel Processors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962722" id="1962722" title="Hw: Observable Timing Discrepancy In Some Intel Processors" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3154-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.13.0 ESR. 
Security Fix(es): 
* Mozilla: Uninitialized memory in a canvas object could have led to memory  corruption (CVE-2021-29980) 
* Mozilla: Incorrect instruction reordering during JIT optimization (CVE-2021-29984) 
* Mozilla: Race condition when resolving DNS names could have led to memory  corruption (CVE-2021-29986) 
* Mozilla: Memory corruption as a result of incorrect style treatment (CVE-2021-29988) 
* Mozilla: Memory safety bugs fixed in Thunderbird 78.13 (CVE-2021-29989) 
* Mozilla: Use-after-free media channels (CVE-2021-29985) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-78.13.0-2.el7_9.src.rpm" version="78.13.0"><filename>firefox-78.13.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">bc41b16a9bca16b2a8ce95bcdc37b7988f20720b9cd4f7c0f2e74ed0bd1803d2</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-78.13.0-2.el7_9.src.rpm" version="78.13.0"><filename>firefox-78.13.0-2.el7_9.i686.rpm</filename><sum type="sha256">d8449a4c77bed4b52ed6429f3ec3079091b241740fd34a67fbf54e789db5c80a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980" id="CVE-2021-29980" title="Mozilla: Uninitialized Memory In A Canvas Object Could Have Led To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984" id="CVE-2021-29984" title="Mozilla: Incorrect Instruction Reordering During Jit Optimization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985" id="CVE-2021-29985" title="Mozilla: Use-After-Free Media Channels" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986" id="CVE-2021-29986" title="Mozilla: Race Condition When Resolving Dns Names Could Have Led To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988" id="CVE-2021-29988" title="Mozilla: Memory Corruption As A Result Of Incorrect Style Treatment" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989" id="CVE-2021-29989" title="Mozilla: Memory Safety Bugs Fixed In Thunderbird 78.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3154" id="RHSA-2021:3154-1" title="Rhsa-2021:3154-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992417" id="1992417" title="Mozilla: Race Condition When Resolving Dns Names Could Have Led To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992419" id="1992419" title="Mozilla: Memory Corruption As A Result Of Incorrect Style Treatment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992420" id="1992420" title="Mozilla: Incorrect Instruction Reordering During Jit Optimization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992421" id="1992421" title="Mozilla: Uninitialized Memory In A Canvas Object Could Have Led To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992422" id="1992422" title="Mozilla: Use-After-Free Media Channels" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992423" id="1992423" title="Mozilla: Memory Safety Bugs Fixed In Thunderbird 78.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3158-1</id><title>Exiv2</title><description>Security Fix(es): 
* exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="exiv2-libs" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-4.el7_8.i686.rpm</filename><sum type="sha256">6e1655bac655b79fcef547510c9571d75eed3867a13c3c1df24e9ebb7f488e88</sum></package><package arch="x86_64" name="exiv2-libs" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-4.el7_8.x86_64.rpm</filename><sum type="sha256">c80106ec40162ef5482829b34e6a1f488a5896145e62988f50069d3a7a3ca99d</sum></package><package arch="i686" name="exiv2-devel" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-4.el7_8.i686.rpm</filename><sum type="sha256">4c33360ef1a27e17ecb897829b29dcc92ede55fed680d7ecae084ecf15a751f5</sum></package><package arch="x86_64" name="exiv2" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-0.27.0-4.el7_8.x86_64.rpm</filename><sum type="sha256">2ad983d2240087ea19daa9c8345c687256c2dfbd767739c4dac6868e3a2800cf</sum></package><package arch="noarch" name="exiv2-doc" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-doc-0.27.0-4.el7_8.noarch.rpm</filename><sum type="sha256">72bbcd2f72146fc524ea043f551cadd8cc7a3b6757fada666865e346171d71a3</sum></package><package arch="x86_64" name="exiv2-devel" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-4.el7_8.x86_64.rpm</filename><sum type="sha256">6a7ed5be881d54c881fdb41359fa7b90c508fef7321cf4f588e72503777795e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31291" id="CVE-2021-31291" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3158" id="RHSA-2021:3158-1" title="Rhsa-2021:3158-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990327" id="1990327" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3160-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.13.0. 
Security Fix(es): 
* Mozilla: Uninitialized memory in a canvas object could have led to memory  corruption (CVE-2021-29980) 
* Mozilla: Incorrect instruction reordering during JIT optimization (CVE-2021-29984) 
* Mozilla: Race condition when resolving DNS names could have led to memory  corruption (CVE-2021-29986) 
* Mozilla: Memory corruption as a result of incorrect style treatment (CVE-2021-29988) 
* Mozilla: Memory safety bugs fixed in Thunderbird 78.13 (CVE-2021-29989) 
* Mozilla: Use-after-free media channels (CVE-2021-29985) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.13.0-1.el7_9.src.rpm" version="78.13.0"><filename>thunderbird-78.13.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a1c089fd6ce1fef0bef27a525a9745cc2d310cf48d4b9483805b199e86ed5eda</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980" id="CVE-2021-29980" title="Mozilla: Uninitialized Memory In A Canvas Object Could Have Led To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984" id="CVE-2021-29984" title="Mozilla: Incorrect Instruction Reordering During Jit Optimization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985" id="CVE-2021-29985" title="Mozilla: Use-After-Free Media Channels" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986" id="CVE-2021-29986" title="Mozilla: Race Condition When Resolving Dns Names Could Have Led To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988" id="CVE-2021-29988" title="Mozilla: Memory Corruption As A Result Of Incorrect Style Treatment" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989" id="CVE-2021-29989" title="Mozilla: Memory Safety Bugs Fixed In Thunderbird 78.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3160" id="RHSA-2021:3160-1" title="Rhsa-2021:3160-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992417" id="1992417" title="Mozilla: Race Condition When Resolving Dns Names Could Have Led To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992419" id="1992419" title="Mozilla: Memory Corruption As A Result Of Incorrect Style Treatment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992420" id="1992420" title="Mozilla: Incorrect Instruction Reordering During Jit Optimization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992421" id="1992421" title="Mozilla: Uninitialized Memory In A Canvas Object Could Have Led To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992422" id="1992422" title="Mozilla: Use-After-Free Media Channels" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992423" id="1992423" title="Mozilla: Memory Safety Bugs Fixed In Thunderbird 78.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3233-1</id><title>Compat-Exiv2-026</title><description>Security Fix(es): 
* exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE7 
--- SL7  x86_64  - compat-exiv2-026-0.26-3.el7_9.i686.rpm  - compat-exiv2-026-0.26-3.el7_9.x86_64.rpm  - compat-exiv2-026-debuginfo-0.26-3.el7_9.i686.rpm  - compat-exiv2-026-debuginfo-0.26-3.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="compat-exiv2-026" release="3.el7_9" src="compat-exiv2-026-0.26-3.el7_9.src.rpm" version="0.26"><filename>compat-exiv2-026-0.26-3.el7_9.i686.rpm</filename><sum type="sha256">9a34a4f44f655124edba74a73224379e4b27c9deb32651cf533c6a61f5086f19</sum></package><package arch="x86_64" name="compat-exiv2-026" release="3.el7_9" src="compat-exiv2-026-0.26-3.el7_9.src.rpm" version="0.26"><filename>compat-exiv2-026-0.26-3.el7_9.x86_64.rpm</filename><sum type="sha256">0033a683cc63d68e7a84dec2d25b02285145f3fb9df32a933ba26d0b87176ee6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31291" id="CVE-2021-31291" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3233" id="RHSA-2021:3233-1" title="Rhsa-2021:3233-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990327" id="1990327" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3234-1</id><title>Compat-Exiv2-023</title><description>Security Fix(es): 
* exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE7 
 --- SL7  x86_64  - compat-exiv2-023-0.23-2.el7_9.i686.rpm  - compat-exiv2-023-0.23-2.el7_9.x86_64.rpm  - compat-exiv2-023-debuginfo-0.23-2.el7_9.i686.rpm  - compat-exiv2-023-debuginfo-0.23-2.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="compat-exiv2-023" release="2.el7_9" src="compat-exiv2-023-0.23-2.el7_9.src.rpm" version="0.23"><filename>compat-exiv2-023-0.23-2.el7_9.i686.rpm</filename><sum type="sha256">234b3ac49dc1dedc349059d07f01a8eabf9899d69b359b6979ecd193a1ebc096</sum></package><package arch="x86_64" name="compat-exiv2-023" release="2.el7_9" src="compat-exiv2-023-0.23-2.el7_9.src.rpm" version="0.23"><filename>compat-exiv2-023-0.23-2.el7_9.x86_64.rpm</filename><sum type="sha256">e99bc81d83364f6f684739c64f04bf3cece758e5bea3d7a2e61ddb943dae32cb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31291" id="CVE-2021-31291" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3234" id="RHSA-2021:3234-1" title="Rhsa-2021:3234-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990327" id="1990327" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3295-1</id><title>Libsndfile</title><description>Security Fix(es): 
* libsndfile: Heap buffer overflow via crafted WAV file allows arbitrary code execution (CVE-2021-3246) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7 
x86_64 libsndfile-1.0.25-12.el7_9.1.i686.rpm libsndfile-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-debuginfo-1.0.25-12.el7_9.1.i686.rpm libsndfile-debuginfo-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-devel-1.0.25-12.el7_9.1.i686.rpm libsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsndfile-devel" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-12.el7_9.1.i686.rpm</filename><sum type="sha256">b3910769e141cfeeab716a19e97939dd241377aaf55821ec9c642af011d0c59c</sum></package><package arch="i686" name="libsndfile" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-12.el7_9.1.i686.rpm</filename><sum type="sha256">5bab9fed88e6b7fc23592c9da41f699d431160f44e271d4f2fb1b1f2865ba15c</sum></package><package arch="x86_64" name="libsndfile" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-12.el7_9.1.x86_64.rpm</filename><sum type="sha256">ac61969886fb56f38f2e298136eeb397bee1a22271feeefdb8aed0fbe2a47fea</sum></package><package arch="x86_64" name="libsndfile-devel" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpm</filename><sum type="sha256">e117477a7875c688069d8b033df530da34e18628510e18d2921cf3760f13ef08</sum></package><package arch="x86_64" name="libsndfile-utils" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpm</filename><sum type="sha256">d15484d0294af5ee8e1392da70f43fa812df27b7c642d79aa0ce936fea1678de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246" id="CVE-2021-3246" title="Libsndfile: Heap Buffer Overflow Via Crafted Wav File Allows Arbitrary Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3295" id="RHSA-2021:3295-1" title="Rhsa-2021:3295-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1984319" id="1984319" title="Libsndfile: Heap Buffer Overflow Via Crafted Wav File Allows Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3296-1</id><title>Libx11</title><description>Security Fix(es): 
* libX11: missing request length checks (CVE-2021-31535) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 
x86_64 libX11-1.6.7-4.el7_9.i686.rpm libX11-1.6.7-4.el7_9.x86_64.rpm libX11-debuginfo-1.6.7-4.el7_9.i686.rpm libX11-debuginfo-1.6.7-4.el7_9.x86_64.rpm libX11-devel-1.6.7-4.el7_9.i686.rpm libX11-devel-1.6.7-4.el7_9.x86_64.rpm 
noarch libX11-common-1.6.7-4.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libX11-devel" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-4.el7_9.i686.rpm</filename><sum type="sha256">4f1dc1fb871116b82794ae3b0432e5ac521ed6811611740cac68e62621e8665e</sum></package><package arch="x86_64" name="libX11" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-4.el7_9.x86_64.rpm</filename><sum type="sha256">805486b69ea140fa070aa6e28a15a8eb5519e592811c4325acd906d695829340</sum></package><package arch="noarch" name="libX11-common" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-common-1.6.7-4.el7_9.noarch.rpm</filename><sum type="sha256">ff2dbbb2c0c4168eb25f248e7952404ca464f7fbd7974343f2412003abeefd84</sum></package><package arch="i686" name="libX11" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-4.el7_9.i686.rpm</filename><sum type="sha256">6ff763fc3c4042a91cdf2b63763bc28f35cea891d46a78da3f6198bfeb148d9d</sum></package><package arch="x86_64" name="libX11-devel" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-4.el7_9.x86_64.rpm</filename><sum type="sha256">6be63062aaaf4e8d6329b503577de87342b48cc2acfe3cd690e80f83f1c465e9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535" id="CVE-2021-31535" title="Libx11: Missing Request Length Checks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3296" id="RHSA-2021:3296-1" title="Rhsa-2021:3296-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961822" id="1961822" title="Libx11: Missing Request Length Checks" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3325-1</id><title>Bind</title><description>Security Fix(es): 
* bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly (CVE-2021-25214) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 
x86_64 bind-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-debuginfo-9.11.4-26.P2.el7_9.7.i686.rpm bind-debuginfo-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-export-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-export-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-export-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-export-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-libs-lite-9.11.4-26.P2.el7_9.7.i686.rpm bind-libs-lite-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-lite-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-lite-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-sdb-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-sdb-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm 
noarch bind-license-9.11.4-26.P2.el7_9.7.noarch.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">0f664c4582d87086632bceea130dad5c9230205974fc1fd51d574d14c36ab72d</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">1cd8a4c5be34e924728330c8921f4c162287c484621027417858c3183977b943</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">40e8e2e47fe864b27bdff476ba1dad290b8b84e1d5e837d5a301928cd4e9b22d</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">99baf1d0b90af916bf4caabeadbbe04b73fd490b2a3d0b0d12dba8142c111475</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">ad423e367926bac84af867f8282f16fc859526a6d503174c675ce8daeb36ff20</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">e5a515e291fab1fa300a30f05511e81411bf61fffd47380944fe4ef5f4693f55</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">0253dfb5a08f373842c240c84f0c1eb9171f2ab8e08eeb5126ed3e70a8871921</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">fa207b6f9321b18c5f525bbb91903bcefa94e530f6c5f17a191925f8cca21681</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">ffb34baf93dc78b8c3204a0dfc3e40e5309b130a02aca8e9884ad591b9fd2b61</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">a6bdf31288be4ca1ee0031c86acb9a40d3258e3d5ba84c431ce77712557534c3</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">b28cab1232e3b1c4c311f24af1f39361f4226651a3061082343f922b856a78b6</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">2cf14f362fac3cec4e32deaa2a6ddbcb64700936117dae0cdbbb64f007552d0c</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">f22a802c9f3559615c63df34546aec823b984569735e37463de73ccbfbe9c868</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">e50f60168b6033107d65d1dc2047d457f4aaa792d2c8ca4435aff8fb3d7f2395</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">99f00d3261d884dc7d8d6ebc32efa082e4187ecddb4ccfcf9231f9ac35560b64</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.7.noarch.rpm</filename><sum type="sha256">422f7a25a275aa9ef9fe2d98e9f90d28648c8e18d6fb337841fd12b2e16a4f44</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">fdee061bae052b6d4d5a92910f14a1633cec37d16509a941cff19cb6e1930ffd</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">034fe87eea2d8b5a2124400aae03a472c9a0d622fb25800e6fbbcd5259e30557</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">193531fe7702ea7dda0cb4ef0d7b32d6a503d4d2a96b684a9b4859207e7e66f7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">229169f1dcd87871c084babd1b0c907de4221b2ec3e89d5083a01689da89a197</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">327434f2010bf6e5d1eff08dcaaaa092d11d21299aa111e62ff028d204436379</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">fc2533dea2c78321b310a83c63524e905b24276818acd9ae171bb5b96cc1efdd</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">69df49b5752140ef781df58fd756fbba32875b4988a055c654dab339bbf8cacf</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">8176d6c537943acedcdfa817652ed8ce382144a789085c0227d8563c6836cb37</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214" id="CVE-2021-25214" title="Bind: Broken Inbound Incremental Zone Update (Ixfr) Can Cause Named To Terminate Unexpectedly" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3325" id="RHSA-2021:3325-1" title="Rhsa-2021:3325-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1953849" id="1953849" title="Bind: Broken Inbound Incremental Zone Update (Ixfr) Can Cause Named To Terminate Unexpectedly" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3327-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555) 
* kernel: race condition for removal of the HCI controller (CVE-2021-32399) 
* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777) 
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) 
* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* SAN Switch rebooted and caused (?) OpenStack compute node to reboot 
* sysfs: cannot create duplicate filename '/class/mdio_bus/ixgbe-8100 
* XFS: read-only recovery does not update free space accounting in superblock 
* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. 
* Backport of upstream patch "net: Update window_clamp if SOCK_RCVBUF is set " into rhel-7 
* Kernel panic in init_cq_frag_buf 
* futex: futex_requeue can potentially free the pi_state structure twice 
* be_poll lockup doing ifenslave when netconsole using bond 
* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() 
 --- SL7 
x86_64 bpftool-3.10.0-1160.41.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.41.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm perf-3.10.0-1160.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm python-perf-3.10.0-1160.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm 
noarch kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm kernel-doc-3.10.0-1160.41.1.el7.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5bcfdad599b44925e1230949969a60903487c392b6e40aa5c2d725271d6f82d3</sum></package><package arch="noarch" name="kernel-doc" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.41.1.el7.noarch.rpm</filename><sum type="sha256">c5910ab8910fff70be6016751415352f55198ccdc8e11735da61c6775f76b8ea</sum></package><package arch="x86_64" name="perf" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">53538846f19e0fecbbfc76ea664e44b0a60c548785d2d331086baf4ef3b998c9</sum></package><package arch="x86_64" name="bpftool" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5115b684a64e594c10a8202c5e951f143eac59a7f75382e2d65c9104202df150</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5a2fc8257aecdaf5d27f57952b69b2b1cd42f8472842e3647c5a3ac9e0ca1e6b</sum></package><package arch="x86_64" name="kernel-tools" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">d250b4cdfb1d8ea7986d3dee2694eb112445103c3fd9f7e633ed1565034b8190</sum></package><package arch="x86_64" name="python-perf" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">d1df2230944d9712346af10fc36e683be7ed322084d36ca609f13f7c15bc4450</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5a2b5d848316fbd08d1315a721b6875c2c9d367307e5b52ed148f2dfdb396b8a</sum></package><package arch="x86_64" name="kernel" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">324b80fdf429db9c8c98848d4d3c5e453165c7fa6e8860df88383454c6f60123</sum></package><package arch="x86_64" name="kernel-headers" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">7929926bcb7e8857a134ae7c4e173c7ff2387cad23370fecf0118c7351b545aa</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5c891a7b590d142e84b1a975f57cc6192bc5e4f116fb485c5b7d1d367822a486</sum></package><package arch="x86_64" name="kernel-devel" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">f16c223fe64df7ea47ff1eed29a0833e150e50412c49e240397c13d1df363847</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm</filename><sum type="sha256">8d9bf7379a529f839def865bd2276337a3154d516043688b9669a388309e171d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777" id="CVE-2020-27777" title="Kernel: Powerpc: Rtas Calls Can Be Used To Compromise Kernel Integrity" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555" id="CVE-2021-22555" title="Kernel: Out-Of-Bounds Write In Xt_Compat_Target_From_User() In Net/Netfilter/X_Tables.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154" id="CVE-2021-29154" title="Kernel: Local Privilege Escalation Due To Incorrect Bpf Jit Branch Displacement Computation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650" id="CVE-2021-29650" title="Kernel: Lack A Full Memory Barrier Upon The Assignment Of A New Table Value In Net/Netfilter/X_Tables.C And Include/Linux/Netfilter/X_Tables.H May Lead To Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399" id="CVE-2021-32399" title="Kernel: Race Condition For Removal Of The Hci Controller" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3327" id="RHSA-2021:3327-1" title="Rhsa-2021:3327-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1897576" id="1897576" title="San Switch Rebooted And Caused (?) Openstack Compute Node To Reboot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1900844" id="1900844" title="Kernel: Powerpc: Rtas Calls Can Be Used To Compromise Kernel Integrity" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1945388" id="1945388" title="Kernel: Lack A Full Memory Barrier Upon The Assignment Of A New Table Value In Net/Netfilter/X_Tables.C And Include/Linux/Netfilter/X_Tables.H May Lead To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1946684" id="1946684" title="Kernel: Local Privilege Escalation Due To Incorrect Bpf Jit Branch Displacement Computation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1970807" id="1970807" title="Kernel: Race Condition For Removal Of The Hci Controller" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1980101" id="1980101" title="Kernel: Out-Of-Bounds Write In Xt_Compat_Target_From_User() In Net/Netfilter/X_Tables.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3336-1</id><title>Sssd</title><description>Security Fix(es): 
* sssd: shell command injection in sssctl (CVE-2021-3621) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Memory leak in the simple access provider 
* id lookup is failing intermittently 
* SSSD is NOT able to contact the Global Catalog when local site is down 
* Missing search index for `originalADgidNumber` 
 --- SL7 
x86_64 libipa_hbac-1.16.5-10.el7_9.10.i686.rpm libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm libipa_hbac-devel-1.16.5-10.el7_9.10.i686.rpm libipa_hbac-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_autofs-1.16.5-10.el7_9.10.x86_64.rpm libsss_certmap-1.16.5-10.el7_9.10.i686.rpm libsss_certmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_certmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_certmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_idmap-1.16.5-10.el7_9.10.i686.rpm libsss_idmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_nss_idmap-1.16.5-10.el7_9.10.i686.rpm libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_nss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_nss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_simpleifp-1.16.5-10.el7_9.10.i686.rpm libsss_simpleifp-1.16.5-10.el7_9.10.x86_64.rpm libsss_simpleifp-devel-1.16.5-10.el7_9.10.i686.rpm libsss_simpleifp-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_sudo-1.16.5-10.el7_9.10.x86_64.rpm python-libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm python-libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm python-sss-1.16.5-10.el7_9.10.x86_64.rpm python-sss-murmur-1.16.5-10.el7_9.10.x86_64.rpm sssd-1.16.5-10.el7_9.10.x86_64.rpm sssd-ad-1.16.5-10.el7_9.10.x86_64.rpm sssd-client-1.16.5-10.el7_9.10.i686.rpm sssd-client-1.16.5-10.el7_9.10.x86_64.rpm sssd-common-1.16.5-10.el7_9.10.x86_64.rpm sssd-common-pac-1.16.5-10.el7_9.10.x86_64.rpm sssd-dbus-1.16.5-10.el7_9.10.x86_64.rpm sssd-debuginfo-1.16.5-10.el7_9.10.i686.rpm sssd-debuginfo-1.16.5-10.el7_9.10.x86_64.rpm sssd-ipa-1.16.5-10.el7_9.10.x86_64.rpm sssd-kcm-1.16.5-10.el7_9.10.x86_64.rpm sssd-krb5-1.16.5-10.el7_9.10.x86_64.rpm sssd-krb5-common-1.16.5-10.el7_9.10.x86_64.rpm sssd-ldap-1.16.5-10.el7_9.10.x86_64.rpm sssd-libwbclient-1.16.5-10.el7_9.10.x86_64.rpm sssd-libwbclient-devel-1.16.5-10.el7_9.10.i686.rpm sssd-libwbclient-devel-1.16.5-10.el7_9.10.x86_64.rpm sssd-polkit-rules-1.16.5-10.el7_9.10.x86_64.rpm sssd-proxy-1.16.5-10.el7_9.10.x86_64.rpm sssd-tools-1.16.5-10.el7_9.10.x86_64.rpm sssd-winbind-idmap-1.16.5-10.el7_9.10.x86_64.rpm 
noarch python-sssdconfig-1.16.5-10.el7_9.10.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sssd-dbus" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-dbus-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">ebb500e796d30ffc9ae912ac078355a34859ccf1d9c9943c71bc45092fd12807</sum></package><package arch="x86_64" name="sssd-common-pac" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-common-pac-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">0f1d572f4ca4496b4a6f74c90afd87bf42b343ff9f79a250754fc95a4af48de8</sum></package><package arch="x86_64" name="sssd-ipa" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-ipa-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">76508a713e696581eb1ee4c0ba6d0d9592f2b556016c9355fbc7bf70996c394f</sum></package><package arch="x86_64" name="sssd-ldap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-ldap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">7fb5e25b4f03d4489ec688e682425380885ba49c76de9e762c8a81eae88fdfc9</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">8cdffd4f636e874abb4110c23062d2ebce093fd02f87da5a87475c850d4604e6</sum></package><package arch="x86_64" name="sssd-kcm" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-kcm-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">7245184b18feab0c075c6ca5d1d5079d2717f7b12750783548737d42b150b642</sum></package><package arch="i686" name="libsss_simpleifp" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">af1a1ac20c407907416e0be39c90ad91aedf44f51b44d33e60c6702d68a06a40</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">bfefb570ae1a9957ca8e43705108387e0a14e3f7f4611f67b813db9c11a701df</sum></package><package arch="noarch" name="python-sssdconfig" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-sssdconfig-1.16.5-10.el7_9.10.noarch.rpm</filename><sum type="sha256">6b4d7c87a9ff71f3b8d1d4067556d7662ab771ac880d3b53f221709398d60844</sum></package><package arch="x86_64" name="sssd-krb5-common" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-krb5-common-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">bd26b00fcbb063337b26d054ad72e0cf9cb0796bed0c3ed6e5ac1eb641cc5bde</sum></package><package arch="x86_64" name="libsss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">4877e9a2a3274b5db35d2999ef1827fb03c941516b9f055c936f0797e659815e</sum></package><package arch="x86_64" name="libsss_autofs" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_autofs-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">34810b9bfaf523bc510c3fde66eacd512f7f44639585db09c2fb5259edf6fc03</sum></package><package arch="i686" name="libipa_hbac-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">48bf468fa6075da60c140bae64400741d3c858f72cb9842f6a58b6683a80e119</sum></package><package arch="x86_64" name="python-sss" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-sss-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">6f0917b948a1f3cdd4653cc8b5cf7286eca4114dad2fb958e4a8f9c434bf7f59</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">ce516026800a8ce723d4cb667c391e353f61fbe2415518d1274210ea72ae79a5</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">9047dbc282b156b53582dc43090e0f8afe87cf64f53ba5525dc26b285f138fd0</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-winbind-idmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">99a3b8b9bff033a5bcdffa7cc798b359778a9e72a882843e4ab56335045499a4</sum></package><package arch="x86_64" name="sssd-common" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-common-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">cc88d2d2ec3ba8cabfd75a9664233edde6b813716e2f9c0ef0c1e181a806473c</sum></package><package arch="x86_64" name="python-libipa_hbac" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">3e2050e95d1f3ebbb8271671852b412420ea280154df550e557cc7f7dec227a3</sum></package><package arch="x86_64" name="sssd" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">15cd608affb1ee07c97297add43aafc5c12fa8cee1d6ad26a618e3d72aaa3291</sum></package><package arch="i686" name="libsss_certmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">379d8186fb9607a0a36cd209d7704770971bea0dd0ef16f3d8fefe992109f4f0</sum></package><package arch="x86_64" name="libsss_certmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">4e025c3b36f5b6f679e88cc79168c081cb78f1f235f10f1e8d37aed8602a634b</sum></package><package arch="x86_64" name="sssd-krb5" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-krb5-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">36a63b1132197ae7bd592a61dfb846cff68e23dcda1cc4623d84200c94d038d8</sum></package><package arch="i686" name="libipa_hbac" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">807c8cc510ed682e3823d46990f8e72acecb1417e972c3e30c168060d13e6e2f</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">de583697d68e9965964e9b776b04b04e5497fb7337c9df6803840102a27239a5</sum></package><package arch="i686" name="libsss_certmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">c84815e08ae58422387429c8933f097cdc4e277f386afcc44bab10a18fb59082</sum></package><package arch="x86_64" name="sssd-ad" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-ad-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">7c1858cf98f7e0c684e8561240fe8b02219b8105a2a6ce8eeca431a157560750</sum></package><package arch="x86_64" name="sssd-libwbclient" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-libwbclient-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">b3fb83eb2abe7d757f8b314a4507a8f738c3d40f6de155254c6feabfe35f2000</sum></package><package arch="x86_64" name="sssd-proxy" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-proxy-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">6d788f7682ea53cead8d82d111cab5a27d60169689d666156f5d2ad7b2cec3eb</sum></package><package arch="x86_64" name="libsss_sudo" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_sudo-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">408a18a3a1ccb71703651ac59e843baaf3085340c36ce4a70cf45103bfb2d2cc</sum></package><package arch="x86_64" name="libipa_hbac" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">73855f072f1a2432c650112e27ca2bd1ed03371c2a2910a23a3b84ba863319d4</sum></package><package arch="i686" name="libsss_nss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">28817330e3e6957966737b5798daa8bfa63a3992552f571539cd15fd298ae433</sum></package><package arch="i686" name="libsss_idmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">11fc647330d60e502d86007060e468d67cff2a79c650936210e1603a791a9220</sum></package><package arch="i686" name="sssd-client" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">379b3eabff1bebbd09397d8b0516cea1c38d05c4e689db04882a8c2019983271</sum></package><package arch="x86_64" name="sssd-client" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">2d916950378d815c659a2d9c847a7ba230752158d2ea248f0c981e110d8d2d76</sum></package><package arch="x86_64" name="sssd-tools" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-tools-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">75cf819b5199bbd7cce944ba7023e307dd27b5fb5e85a0be1a3739f3f5f50e1c</sum></package><package arch="x86_64" name="libsss_simpleifp" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">11cfb2cd085d2dc80886ae324e199be7f5b15dbd244a8526505e875de391782e</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">67e116b5fdfdf6518a66aeb1a31fed3d6ca6c5257244b27f5a3f830011ee0926</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">7e0638a0bcf9fe4ef12289b5ded49df445de1cacb9468952f6ab74433d2352ed</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">0e19ac9b1062ea74de9da9ec9b9563254e29e618e6a5d9ef638827fafa967191</sum></package><package arch="x86_64" name="python-sss-murmur" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-sss-murmur-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">8d3cf5f00e6b887d17584b95d1664335f1d493f4719111f66504e4f365b57cf2</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">525085aee2a090f378c368427732381827fcd95155c317fa4e41b730e19a8fa2</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">9868ad8377d3a7ea59527e8386e69e201eea9b7d4433abe3dee365061863798a</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-polkit-rules-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">15ecfd87feb56508a001d086c9cab4cb011fef0349b3644bfa20aa190c9e2c5b</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">21634c7c16563a1ca96bebeff099b00a9b6cb46712fa13da41aa91dec1bfeed4</sum></package><package arch="i686" name="libsss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">2d7c9988bdb0402e3052117ceccea2bb0f3d6143c34bfacf4c2f4981bc8fe7a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3621" id="CVE-2021-3621" title="Sssd: Shell Command Injection In Sssctl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3336" id="RHSA-2021:3336-1" title="Rhsa-2021:3336-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1964415" id="1964415" title="Memory Leak In The Simple Access Provider" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1968330" id="1968330" title="Id Lookup Is Failing Intermittently" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1975142" id="1975142" title="Sssd: Shell Command Injection In Sssctl" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3338-1</id><title>Hivex</title><description>Security Fix(es): 
* hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7 
x86_64 hivex-1.3.10-6.12.el7_9.i686.rpm hivex-1.3.10-6.12.el7_9.x86_64.rpm hivex-debuginfo-1.3.10-6.12.el7_9.i686.rpm hivex-debuginfo-1.3.10-6.12.el7_9.x86_64.rpm hivex-devel-1.3.10-6.12.el7_9.i686.rpm hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm ocaml-hivex-1.3.10-6.12.el7_9.x86_64.rpm ocaml-hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm perl-hivex-1.3.10-6.12.el7_9.x86_64.rpm python-hivex-1.3.10-6.12.el7_9.x86_64.rpm ruby-hivex-1.3.10-6.12.el7_9.x86_64.rpm</description><severity>low</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>hivex-1.3.10-6.12.el7_9.i686.rpm</filename><sum type="sha256">1caee1ae63b7e789e9e44bbb1cd42157e6cfc808a461b98227f6c107cbd09c5d</sum></package><package arch="x86_64" name="hivex-devel" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">d228ff112d6a9331cbb0ffb928122eb5756419ec3aaee85fdcebc10b6f0e37b6</sum></package><package arch="x86_64" name="ocaml-hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>ocaml-hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">1f3ef43f71673df625ca2714b1cfd8fd96af7bba80cc8d8c01e9cd5b9d3812ff</sum></package><package arch="x86_64" name="hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">42dc380b24339b64af4aa373ec67103bba53f1684c3eeb4c31e852135521d66e</sum></package><package arch="x86_64" name="ruby-hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>ruby-hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">aa2def395f6c510a1eac7868e33809287cd65c0d17d32dcf5784ea47c183cb2f</sum></package><package arch="x86_64" name="python-hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>python-hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">e3904da15f8fc7f82cabcb789626a88699cda81f2a0fd02eaeb9c91139e252f2</sum></package><package arch="x86_64" name="perl-hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>perl-hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">0f51f73587a33aaf290265edb03d75c08b04d3b84f55871129c44fc4334b7050</sum></package><package arch="x86_64" name="ocaml-hivex-devel" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>ocaml-hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">8019f3839747ef54278da82fc0bebc35dd32e461cbb7990ba3c54cb489aca7ba</sum></package><package arch="i686" name="hivex-devel" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>hivex-devel-1.3.10-6.12.el7_9.i686.rpm</filename><sum type="sha256">a3ecd9709faa50747e5115d83097da32e8d473787ef46e0fba22a07cf083738e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3622" id="CVE-2021-3622" title="Hivex: Stack Overflow Due To Recursive Call Of _Get_Children()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3338" id="RHSA-2021:3338-1" title="Rhsa-2021:3338-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1975489" id="1975489" title="Hivex: Stack Overflow Due To Recursive Call Of _Get_Children()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3438-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* [SL 7.8][s390x][DASD]Crash in __list_del_entry, alias_pav_group list corrupt when running dasd_alias_remove_device() 
* EMBARGOED CVE-2021-3715 kernel: use-after-free in route4_change() in net/sched/cls_route.c 
 --- SL7 
x86_64  - bpftool-3.10.0-1160.42.2.el7.x86_64.rpm  - bpftool-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debug-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debug-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debug-devel-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debuginfo-common-x86_64-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-devel-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-headers-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-tools-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-tools-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-tools-libs-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-tools-libs-devel-3.10.0-1160.42.2.el7.x86_64.rpm  - perf-3.10.0-1160.42.2.el7.x86_64.rpm  - perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - python-perf-3.10.0-1160.42.2.el7.x86_64.rpm  - python-perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm 
noarch  - kernel-abi-whitelists-3.10.0-1160.42.2.el7.noarch.rpm  - kernel-doc-3.10.0-1160.42.2.el7.noarch.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-09-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">d54bdec26ae4df8b37939e59e6849e140a44e6b10116ae474f0610f1d67dc5dd</sum></package><package arch="x86_64" name="kernel-tools" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">0536a7838973ea4c7f8a98cbe918932752f68ccff105c5cb9a831b8530780e51</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">3bb0a406631f9d6f4c62895475c8500d34c7662730877d1e58be135a065631e5</sum></package><package arch="noarch" name="kernel-doc" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.42.2.el7.noarch.rpm</filename><sum type="sha256">fc6715e90285c83bf4bfacdd56b2a1290ab2ff4295c6b9947354b817500be560</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">82e800cfca360f81cefd59ca89458c715f091daa55f2f525f17e299544d13f51</sum></package><package arch="x86_64" name="kernel-headers" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">dcc57a5759566c840f2804d055b6aca5173e5ab30c1dce27cc5f0a92354990fa</sum></package><package arch="x86_64" name="python-perf" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">5f67cbf8f2b09ea18a760128f1e73c0df3e407707aaed177cd25529997a944f9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.42.2.el7.noarch.rpm</filename><sum type="sha256">33196a3bce35e239045eaeaa537781170a5753215a4570d261b39d6c98042849</sum></package><package arch="x86_64" name="kernel" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">84b30ca068c91fe02952ba36a0dce83ba0e41c0ff77ebdb0df95ee3f69feaeaa</sum></package><package arch="x86_64" name="kernel-devel" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">411ac1452d7827e069b871ef3a260b1d98506eb9baa22c65cac994e99760f2d8</sum></package><package arch="x86_64" name="perf" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">12bbbe03c2e6eed4a5c5bd5de4d10abe7f59c1733fcd30e1491b77a4d439cad6</sum></package><package arch="x86_64" name="bpftool" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">126127eaeb11dd1e67eff118aebcc7b9606b8d20589fc270ad1a3b7199128a83</sum></package><package arch="x86_64" name="kernel-debug" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">c867dab9d6e5db66d4d046ab28da10a58620cf9ea6df3d1afc75fe089e79f01d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715" id="CVE-2021-3715" title="Kernel: Use-After-Free In Route4_Change() In Net/Sched/Cls_Route.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3438" id="RHSA-2021:3438-1" title="Rhsa-2021:3438-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1993988" id="1993988" title="Kernel: Use-After-Free In Route4_Change() In Net/Sched/Cls_Route.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3494-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.14.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - thunderbird-78.14.0-1.el7_9.x86_64.rpm  - thunderbird-debuginfo-78.14.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-09-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.14.0-1.el7_9.src.rpm" version="78.14.0"><filename>thunderbird-78.14.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">850f8afd9d801282a58ba0918d138946e44798cae9b087bb575ed7673eab6106</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493" id="CVE-2021-38493" title="Mozilla: Memory Safety Bugs Fixed In Firefox 92, Firefox Esr 78.14 And Firefox Esr 91.1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3494" id="RHSA-2021:3494-1" title="Rhsa-2021:3494-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2002119" id="2002119" title="Mozilla: Memory Safety Bugs Fixed In Firefox 92, Firefox Esr 78.14 And Firefox Esr 91.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3498-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.14.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - firefox-78.14.0-1.el7_9.i686.rpm  - firefox-78.14.0-1.el7_9.x86_64.rpm  - firefox-debuginfo-78.14.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-09-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.14.0-1.el7_9.src.rpm" version="78.14.0"><filename>firefox-78.14.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">c35becc58f8d5211ced2d834c117fa17e93125a0fcab7b44d9f8e96dcbeac3d3</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.14.0-1.el7_9.src.rpm" version="78.14.0"><filename>firefox-78.14.0-1.el7_9.i686.rpm</filename><sum type="sha256">5f1d800c81d82afb56f6c64e087f9fec6caebbb16d6d095f223dbc44403b55bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493" id="CVE-2021-38493" title="Mozilla: Memory Safety Bugs Fixed In Firefox 92, Firefox Esr 78.14 And Firefox Esr 91.1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3498" id="RHSA-2021:3498-1" title="Rhsa-2021:3498-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2002119" id="2002119" title="Mozilla: Memory Safety Bugs Fixed In Firefox 92, Firefox Esr 78.14 And Firefox Esr 91.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3791-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.2.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in MessageTask (CVE-2021-38496) 
* Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 (CVE-2021-38500) 
* Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 (CVE-2021-38501) 
* rust-crossbeam-deque: race condition may lead to double free (CVE-2021-32810) 
* Mozilla: Validation message could have been overlaid on another origin (CVE-2021-38497) 
* Mozilla: Use-after-free of nsLanguageAtomService object (CVE-2021-38498) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7  x86_64   firefox-91.2.0-4.el7_9.i686.rpm   firefox-91.2.0-4.el7_9.x86_64.rpm   firefox-debuginfo-91.2.0-4.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="4.el7_9" src="firefox-91.2.0-4.el7_9.src.rpm" version="91.2.0"><filename>firefox-91.2.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">2108beff106b3a505077f48f3daaccbebe0cb5e0580119fbe631427f4a6e8ceb</sum></package><package arch="i686" name="firefox" release="4.el7_9" src="firefox-91.2.0-4.el7_9.src.rpm" version="91.2.0"><filename>firefox-91.2.0-4.el7_9.i686.rpm</filename><sum type="sha256">e75a8f263454f13e27fd080a3ff5eb5355a6cd833f60c361aae5b08c667f5c4a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810" id="CVE-2021-32810" title="Rust-Crossbeam-Deque: Race Condition May Lead To Double Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496" id="CVE-2021-38496" title="Mozilla: Use-After-Free In Messagetask" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38497" id="CVE-2021-38497" title="Mozilla: Validation Message Could Have Been Overlaid On Another Origin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38498" id="CVE-2021-38498" title="Mozilla: Use-After-Free Of Nslanguageatomservice Object" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500" id="CVE-2021-38500" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93, Firefox Esr 78.15, And Firefox Esr 91.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38501" id="CVE-2021-38501" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93 And Firefox Esr 91.2" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3791" id="RHSA-2021:3791-1" title="Rhsa-2021:3791-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990342" id="1990342" title="Rust-Crossbeam-Deque: Race Condition May Lead To Double Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011097" id="2011097" title="Mozilla: Use-After-Free In Messagetask" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011098" id="2011098" title="Mozilla: Validation Message Could Have Been Overlaid On Another Origin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011099" id="2011099" title="Mozilla: Use-After-Free Of Nslanguageatomservice Object" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011100" id="2011100" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93, Firefox Esr 78.15, And Firefox Esr 91.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011101" id="2011101" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93 And Firefox Esr 91.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3798-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: integer overflow in CipherUpdate (CVE-2021-23840) 
* openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-libs" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">d440e6dd5875b7f851b77504780b3d836c6046550d8d21a27057fc172c2e6d7e</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">0896832e03341d76521c42f7b1b2e5353404a29cf1a7e0218e5130549352f670</sum></package><package arch="x86_64" epoch="1" name="openssl" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">625bcddd9f6faea4ca2dd3750620adcc5a77693e36d43026654c853cc40fb95d</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-22.el7_9.i686.rpm</filename><sum type="sha256">b8c85d6360fb785fac3bfc3aaf63442a5257a27325c3426b0d8d9fff2623b3e2</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-22.el7_9.i686.rpm</filename><sum type="sha256">326fe4fe4832c1312b334c1553e1c9623543ee6bbd1beb068276e6b5fa81f8e9</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">4ac584b2648ef5b2947325914d5bc645a4a4a4bc72ffa4f0d7ff4bd7f289da45</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">6d732ebba370c1094b6bbcdfd0baa398c8f6e393d25ea7c5df63ef9e63e48345</sum></package><package arch="i686" epoch="1" name="openssl-static" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-22.el7_9.i686.rpm</filename><sum type="sha256">5a1bd652238c1bf6f4f249c115d9161468e9ff363d5bcd8e0241b5d77c3a1eae</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" id="CVE-2021-23840" title="Openssl: Integer Overflow In Cipherupdate" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" id="CVE-2021-23841" title="Openssl: Null Pointer Dereference In X509_Issuer_And_Serial_Hash()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3798" id="RHSA-2021:3798-1" title="Rhsa-2021:3798-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930310" id="1930310" title="Openssl: Null Pointer Dereference In X509_Issuer_And_Serial_Hash()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930324" id="1930324" title="Openssl: Integer Overflow In Cipherupdate" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3801-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543) 
* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576) 
* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653) 
* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Kernel panic due to double fault with DLM reporting for socket error "sk_err=32/0" 
* "MFW indication via attention" message getting logged frequently after every 5 minutes 
* lpfc fails to discovery in pt2pt with "2754 PRLI failure DID:0000EF Status:x9/x91e00, data: x0" 
* pcpu_get_vm_areas using most memory from VmallocUsed 
* SL 7.9.z [qedf driver] Racing condition between qedf_cleanup_fcport and releasing command after timeout 
* [Azure] SL 7.9 reports GPU/IB topology incorrectly on some Azure SKUs 
* [stable guest ABI]Hot add CPU after migration cause guest hang 
* i40e driver crash at  RIP: i40e_config_vf_promiscuous_mode+0x165 
* [nfs] Performance issue since commit 5a4f6f11951e 
* [kernel] Indefinite waiting for RCU callback while removing cgroup 
 --- SL7  x86_64   bpftool-3.10.0-1160.45.1.el7.x86_64.rpm   bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm   kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm   kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm    perf-3.10.0-1160.45.1.el7.x86_64.rpm   perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   python-perf-3.10.0-1160.45.1.el7.x86_64.rpm   python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   noarch   kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm   kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-headers" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">867fdd6e332efbd4cea7bacdb32374f632ca50f3c27b115367c5bceaf950023a</sum></package><package arch="x86_64" name="perf" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">4ee7937dec998d123d775db2e2a905e3baff41861e97ef4835f4bd7f9b1d139e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm</filename><sum type="sha256">ba563855289df621120ac2ff431b1a133af48779619476660eead751240e58d3</sum></package><package arch="x86_64" name="kernel-debug" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">484a818618e60b5d7cc3bdeb2f7f30cb261533f3eee672e0ab234d71713f7e2a</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">0b3b808b3e34bd6a6a80f40cd0283e05c73143fc8134ba6a05a4204471bbfaf2</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">b86d2bcc3e17d97f11c8b38b05a6c48a62abdca41fa488cbe52c529344d71621</sum></package><package arch="noarch" name="kernel-doc" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm</filename><sum type="sha256">c0adc04226bfa29b938ad285aa99f5f2e153031beca278eb46f94b600e11e7fd</sum></package><package arch="x86_64" name="bpftool" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">525b3f26666c486a0870cb41de14c0ce3da96d1d688c62b63d45b74077bd9222</sum></package><package arch="x86_64" name="kernel-tools" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">b6778bbd766fab3ba47aeaffd8dfec93f818b50cf3bc2777a8f4a04a73fcbcbd</sum></package><package arch="x86_64" name="python-perf" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">6ee9f492b7ac9d6a9572dabbbe6e1ecf0fe2d1e2c7b571078795f900b19bba80</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">923405a988634c32c71fed69171e958b1c0c06b356b2ba0dd5efbef3366c3646</sum></package><package arch="x86_64" name="kernel-devel" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">8e8fee1867e2a9134f4323f10f6986eb549df5f416b503a3169784d72c582209</sum></package><package arch="x86_64" name="kernel" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">f10179e6528536565797b6977ef373f2bcc93de865490fd71c807743026e493b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543" id="CVE-2021-22543" title="Kernel: Improper Handling Of Vm_Io|Vm_Pfnmap Vmas In Kvm Can Bypass Ro Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653" id="CVE-2021-3653" title="Kernel: Svm Nested Virtualization Issue In Kvm (Avic Support)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656" id="CVE-2021-3656" title="Kernel: Svm Nested Virtualization Issue In Kvm (Vmload/Vmsave)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576" id="CVE-2021-37576" title="Kernel: Powerpc: Kvm Guest Os Users Can Cause Host Os Memory Corruption" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3801" id="RHSA-2021:3801-1" title="Rhsa-2021:3801-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1965461" id="1965461" title="Kernel: Improper Handling Of Vm_Io|Vm_Pfnmap Vmas In Kvm Can Bypass Ro Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1983686" id="1983686" title="Kernel: Svm Nested Virtualization Issue In Kvm (Avic Support)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1983988" id="1983988" title="Kernel: Svm Nested Virtualization Issue In Kvm (Vmload/Vmsave)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1986506" id="1986506" title="Kernel: Powerpc: Kvm Guest Os Users Can Cause Host Os Memory Corruption" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3807-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: CRYPT password hash with asterisk allows any bind attempt to  succeed (CVE-2021-3652) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* A plugin can create an index. Even if the index can be used immediately (for  searches) the index remains offline until further reindex 
* In some rare case, a replication connection may be treated as a regular connection and ACIs evaluated even if they should not. 
* A regular connection can be erroneously flagged replication connection 
 --- SL7   x86_64   389-ds-base-1.3.10.2-13.el7_9.x86_64.rpm   389-ds-base-debuginfo-1.3.10.2-13.el7_9.x86_64.rpm   389-ds-base-devel-1.3.10.2-13.el7_9.x86_64.rpm   389-ds-base-libs-1.3.10.2-13.el7_9.x86_64.rpm   389-ds-base-snmp-1.3.10.2-13.el7_9.x86_64.rpm</description><severity>low</severity><release>Scientific Linux</release><issued date="2021-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-devel" release="13.el7_9" src="389-ds-base-1.3.10.2-13.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-13.el7_9.x86_64.rpm</filename><sum type="sha256">aec7abb1ea3f088e1fb0844c076f8a2b3a7f94ad9b2eed3384702f32ba7fa86a</sum></package><package arch="x86_64" name="389-ds-base-libs" release="13.el7_9" src="389-ds-base-1.3.10.2-13.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-13.el7_9.x86_64.rpm</filename><sum type="sha256">9a701e7781a327bcf458ded4c0578fcec25e88ea744a5aaa40e74d5f93596929</sum></package><package arch="x86_64" name="389-ds-base" release="13.el7_9" src="389-ds-base-1.3.10.2-13.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-13.el7_9.x86_64.rpm</filename><sum type="sha256">e5b1cd1a816777e3910d687b4acc55ce2558fbce0e44e41f74223fd315f366a6</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="13.el7_9" src="389-ds-base-1.3.10.2-13.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-13.el7_9.x86_64.rpm</filename><sum type="sha256">138cc1e3a0c9dfa5610aeed6db70927895f5acf90bcf3242054e5fad1caae504</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3652" id="CVE-2021-3652" title="389-Ds-Base: Crypt Password Hash With Asterisk Allows Any Bind Attempt To Succeed" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3807" id="RHSA-2021:3807-1" title="Rhsa-2021:3807-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982782" id="1982782" title="389-Ds-Base: Crypt Password Hash With Asterisk Allows Any Bind Attempt To Succeed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2005399" id="2005399" title="Internal Unindexed Searches In Syncrepl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2005434" id="2005434" title="Acis Are Being Evaluated Against The Replication Manager Account In A Replication Context." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2005435" id="2005435" title="A Connection Can Be Erroneously Flagged As Replication Conn During Evaluation Of An Aci With Ip Bind Rule" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3810-1</id><title>Libxml2</title><description>Security Fix(es): 
* libxml2: Use after free via namespace node in XPointer ranges (CVE-2016-4658) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   libxml2-2.9.1-6.el7_9.6.i686.rpm   libxml2-2.9.1-6.el7_9.6.x86_64.rpm   libxml2-debuginfo-2.9.1-6.el7_9.6.i686.rpm   libxml2-debuginfo-2.9.1-6.el7_9.6.x86_64.rpm   libxml2-devel-2.9.1-6.el7_9.6.i686.rpm   libxml2-devel-2.9.1-6.el7_9.6.x86_64.rpm   libxml2-python-2.9.1-6.el7_9.6.x86_64.rpm   libxml2-static-2.9.1-6.el7_9.6.i686.rpm   libxml2-static-2.9.1-6.el7_9.6.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libxml2-static" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7_9.6.i686.rpm</filename><sum type="sha256">8a59d382b30319d0ff690e40222edb29c738c9ca34cf444404e96aa775067b80</sum></package><package arch="i686" name="libxml2-devel" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7_9.6.i686.rpm</filename><sum type="sha256">aca8e9ea39cb10f330355ffc3f46dff2698f681dfdddda2ecf987339aaa73f66</sum></package><package arch="i686" name="libxml2" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7_9.6.i686.rpm</filename><sum type="sha256">f87f59a8af354ebd01bf4fe2763aa8ad246912a21c096ce4bc27b22f53d1f608</sum></package><package arch="x86_64" name="libxml2-devel" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7_9.6.x86_64.rpm</filename><sum type="sha256">d9968fe93e5c1af2ccbe30d3a4cb1ae2523e454717b0d6dc762d01aacca2547b</sum></package><package arch="x86_64" name="libxml2-static" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7_9.6.x86_64.rpm</filename><sum type="sha256">66674b9b2caa4763602e3e5ae5cc79704358c65ac092fc65bfc153c54aa5a32b</sum></package><package arch="x86_64" name="libxml2-python" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-python-2.9.1-6.el7_9.6.x86_64.rpm</filename><sum type="sha256">8f07c25339c6fde873b15392514b0344ba7b22b46ca088cf46874535e1f906b7</sum></package><package arch="x86_64" name="libxml2" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7_9.6.x86_64.rpm</filename><sum type="sha256">f4c797e76f3851b1071a8583855370125721551c43ccc91477b77c7b06ad401a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" id="CVE-2016-4658" title="Libxml2: Use After Free Via Namespace Node In Xpointer Ranges" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3810" id="RHSA-2021:3810-1" title="Rhsa-2021:3810-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384424" id="1384424" title="Libxml2: Use After Free Via Namespace Node In Xpointer Ranges" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3841-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.2.0. 
Security Fix(es): 
* Mozilla: Use-after-free in MessageTask (CVE-2021-38496) 
* Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 (CVE-2021-38500) 
* Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 (CVE-2021-38501) 
* Mozilla: Downgrade attack on SMTP STARTTLS connections (CVE-2021-38502) 
* rust-crossbeam-deque: race condition may lead to double free (CVE-2021-32810) 
* Mozilla: Validation message could have been overlaid on another origin (CVE-2021-38497) 
* Mozilla: Use-after-free of nsLanguageAtomService object (CVE-2021-38498) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   thunderbird-91.2.0-1.el7_9.x86_64.rpm   thunderbird-debuginfo-91.2.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.2.0-1.el7_9.src.rpm" version="91.2.0"><filename>thunderbird-91.2.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ca7ecb224d07e0dd1409860349eb0eb01188050739568942bf50e43875e78b75</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810" id="CVE-2021-32810" title="Rust-Crossbeam-Deque: Race Condition May Lead To Double Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496" id="CVE-2021-38496" title="Mozilla: Use-After-Free In Messagetask" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38497" id="CVE-2021-38497" title="Mozilla: Validation Message Could Have Been Overlaid On Another Origin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38498" id="CVE-2021-38498" title="Mozilla: Use-After-Free Of Nslanguageatomservice Object" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500" id="CVE-2021-38500" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93, Firefox Esr 78.15, And Firefox Esr 91.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38501" id="CVE-2021-38501" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93 And Firefox Esr 91.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502" id="CVE-2021-38502" title="Mozilla: Downgrade Attack On Smtp Starttls Connections" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3841" id="RHSA-2021:3841-1" title="Rhsa-2021:3841-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990342" id="1990342" title="Rust-Crossbeam-Deque: Race Condition May Lead To Double Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011097" id="2011097" title="Mozilla: Use-After-Free In Messagetask" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011098" id="2011098" title="Mozilla: Validation Message Could Have Been Overlaid On Another Origin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011099" id="2011099" title="Mozilla: Use-After-Free Of Nslanguageatomservice Object" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011100" id="2011100" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93, Firefox Esr 78.15, And Firefox Esr 91.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011101" id="2011101" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93 And Firefox Esr 91.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2013469" id="2013469" title="Mozilla: Downgrade Attack On Smtp Starttls Connections" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3856</id><title>Important: Httpd Security Update</title><description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2021-10-18 06:34:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="httpd-tools" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">9581a172adb312e7e316a2f5ba812b21cdc7464e98af2e92ec9620f12d3bb4c6</sum></package><package arch="x86_64" name="mod_session" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">7c721f5a5df540461d2710cce4802bd4b75820fd70ab4fb6f7d03991a5ef2214</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">6f5b0e6091bd251d553a697848d55e871eb7ca33a2d0ad8d6c3de18536e36b6a</sum></package><package arch="x86_64" name="httpd-devel" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">29ecb6fcc01aba2a3d3a2d341fa19e2975d17fb725e5eaa3496b69cddcc55e97</sum></package><package arch="noarch" name="httpd-manual" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-97.sl7_9.1.noarch.rpm</filename><sum type="sha256">1794f9ab5b5a11081fa9978bdd1af37ccf839681cf4bc003e56399f8458feb65</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">dcd70d4f19c36d40e2a23a2227ba722e869141b9efdfcea1919dc921b3eca1e2</sum></package><package arch="x86_64" name="httpd" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>httpd-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">5fc596869c32f29d76b23ea0cd05e38c7cf75c7b9fa861431268266be6905a2c</sum></package><package arch="x86_64" name="mod_ldap" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">a6adbd702164e543182a0a32f3b1a7f7a4fa75f4e43ec6a8048cc535de40631b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438" id="CVE-2021-40438" title="Cve-2021-40438" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3856" id="RHSA-2021:3856" title="Important: Httpd Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3889</id><title>Important: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) * OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) * OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) * OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) * OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) * OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) * OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) * OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) (CVE-2021-35578) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) (CVE-2021-35586) * OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071)
(CVE-2021-35588) * OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* A defensive security change in an earlier OpenJDK update led to a performance degradation when using the Scanner class. This was due to the change being applied to many common cases that did not need this protection. With this update, we provide the original behaviour for these cases. (RHBZ#1862929)
</description><severity>important</severity><issued date="2021-10-20 18:03:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.312.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">b8e041ae56a3b6f55f91e35e550c91c79a5f7663521a4821b54286b5349d4587</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">185e6681a034b8fb8d4418f512e628f3b385294a5532ece494895abe7551cdfc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">318dd320b0c51f88be77b97acf3d8c0c3aa22e410b3290fee5c7c860196ba162</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">f3f4387ab91c214f9dd86464a31e3414b74492361737b221816178c571941c48</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">fe3fc45668fa2d1e847ee3f529c8016bcf9e0bc66bc60e823b890407369a58b3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">be18bb19a976d1fc42494fcb27a048dd7204bed976708e61d91e3171ae2506f9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-headless-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">97eb31f1ef863866ea004512db55576c813f0d9ca733cdc02c73c15a72c3a264</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">613ca8a7e3e8c2af0b551f7f23b47fe6181517b3925ce98577d40bb76eaa88a0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-devel-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">c12fe1fbe90dcc0bd4be61d229ac2cbd97879d417447bf7f36440318c10d9681</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-headless-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">2eeacab36ce271803ecfc626ed5b1855bfbae454c38aedc1d6c587c4a630267f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">e90a511e21be6f399a142c7c844768cf9cd5fbf3fe7c60eea4ca2a7e3bc31d32</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">0c7554936b512c3be2b5f0072c3f419f5278b7c27a4d9140c049a8f0d9e3c051</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.312.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">6d49108d4429403240621882e8e762435eca92d61ec7ac01c4a7ecc2d3463301</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-devel-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">f86980e699225cd91a39abe0a293a42179db3b72f366266539584c35cda107ca</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-jmods-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">5a5972bf73572ba1ed7673b859557be68d9da5c91c0cd6b97f88e421e8059310</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">2c065ede1975c9b4714b4598a5ba351b0f5798441e3bf526a339f4ea04617faa</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">badbefa4886b2f0e02af3920674721ae6dd20cd40550b38fd6350778949da252</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">8650d36c04fb12c4e51aed57461a16733b7f785a43e2d7905679168cf742c93e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-src-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">90eea65199aaf18e400556e0d11fc55978450bd3cf312b35b5c4630a42a32f83</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">815bda03a742f2b7e1f10b785b398d227fee602872bdea6ea51d143348922521</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">d2ef3fdae6a8002640cd022b6440975cea9f7bd2c5d50ef58609d37cc065a5de</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">944c237e8e0efc48143d3a1f430cd3b3c316e143542a263dde4120d5594a9761</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">2986a8d4690f34dd30e269cce43aeff99afc0f9c0d79794071bdd20840f1a0e0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">06e676bb945720a776d4e3450adc46c75e0bc27e4b9d876a940be5be10633f05</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-demo-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">e07bfd456b04754c02ed825e5dacd707f2ab07351552b940cf8a106122da4901</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-src-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">485a53dcbfce50300ce2b08423f653c90d91f068efcbd527b1d05443be6e758d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">ca5e16a6456f3cb50263ff94a90ac206afddf4a8aeb5ef3a5dc7a467378f61ed</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-static-libs-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">ccbff3e9c5546692b8ca43756439d1837893f6127de9635f490bae72668f7f4a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-jmods-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">6dbb3dca7fa74b6378c7d8c1cb6e589d9c76cf90c4d69375eede2a4d1f32d37b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-demo-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">a9ddfa9caef1859a580fff96b0d152ff2371b203894ea91c8e2eefbf6a20c951</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">87efefa8960f6579e5731b72101f67e7cf282f7f6a43d58b073c60d8f5a947cd</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" id="CVE-2021-35550" title="Cve-2021-35550" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" id="CVE-2021-35556" title="Cve-2021-35556" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" id="CVE-2021-35559" title="Cve-2021-35559" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" id="CVE-2021-35561" title="Cve-2021-35561" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" id="CVE-2021-35564" title="Cve-2021-35564" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" id="CVE-2021-35565" title="Cve-2021-35565" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" id="CVE-2021-35567" title="Cve-2021-35567" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" id="CVE-2021-35578" title="Cve-2021-35578" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" id="CVE-2021-35586" title="Cve-2021-35586" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588" id="CVE-2021-35588" title="Cve-2021-35588" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" id="CVE-2021-35603" title="Cve-2021-35603" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3889" id="RHSA-2021:3889" title="Important: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1862929" id="1862929" title="1862929 &#8211; Scanner Is Slower With Jdk 1.8.0_252 And Above" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3889-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) 
* OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) 
* OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) 
* OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) 
* OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) 
* OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) 
* OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) 
* OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729)  (CVE-2021-35578) 
* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735)  (CVE-2021-35586) 
* OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) (CVE-2021-35588) 
* OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* A defensive security change in an earlier OpenJDK update led to a performance degradation when using the Scanner class. This was due to the change being applied to many common cases that did not need this protection. With this update, we provide the original behaviour for these cases. (RHBZ#1862929) 
 --- SL7 
x86_64 java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-debuginfo-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.x86_64.rpm 
noarch java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">96becc4df530dcbb300a3ee87e56d7d557d982f3a05a6e13bdf0f173c321ab98</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">8053e3d59d91fa2565831d5591d2bea43d763da33cf9d69e8205aa1c2563e506</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">08274409df9aa67ba85ec46e67c03b74360b3553d9b2d66921632e287b145223</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">7e5737cdd00f317e6fe853678e470966df3db388539749132381d3731894ab2f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">27ee4919633d5efccefc730781dc6bf03c1bdd255584f54640513fa3cf2408c5</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">06b10b389e6da269004a11f8c8e7d2c98a931309b739bb16d8bbf2e79031b9ff</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">d1f3f237c4290a03682bb672e5a734917de05866edf597726e1be0ed77c43422</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">e7a0e52a0cc34f69a2c1e8f959fd064ac6770cbbe9114be3efef465def119cc0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">83d558c3b78820fb00cf5ca98fb3763617c578826bd25eb84ab77196ed330d8e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">904e67fa5443bdcc8c1d21217e278c8c4ffd4f9f37e189b7acc46cbc4c514039</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">35d2a9fd1ecb1c7e2c93bbedf92a66bddef3fd81ef5bb8d52264eecb297cee41</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">ac3569fd519415e34c1f9f87bfe90a825a1d2fada013b0e2667aa41a541f2f73</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">75c9b6a586b9e3d8e08bd1a9808ded2153d35a74d9ba19a418473f04fbbfcba7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">dde358379e51deb289aecf16e04be1d2a7d803ae6c6e47b1969ab1cd425a30fb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" id="CVE-2021-35550" title="Openjdk: Weak Ciphers Preferred Over Stronger Ones For Tls (Jsse, 8264210)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" id="CVE-2021-35556" title="Openjdk: Excessive Memory Allocation In Rtfparser (Swing, 8265167)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" id="CVE-2021-35559" title="Openjdk: Excessive Memory Allocation In Rtfreader (Swing, 8265580)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" id="CVE-2021-35561" title="Openjdk: Excessive Memory Allocation In Hashmap And Hashset (Utility, 8266097)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" id="CVE-2021-35564" title="Openjdk: Certificates With End Dates Too Far In The Future Can Corrupt Keystore (Keytool, 8266137)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" id="CVE-2021-35565" title="Openjdk: Loop In Httpsserver Triggered During Tls Session Close (Jsse, 8254967)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" id="CVE-2021-35567" title="Openjdk: Incorrect Principal Selection When Using Kerberos Constrained Delegation (Libraries, 8266689)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" id="CVE-2021-35578" title="Openjdk: Unexpected Exception Raised During Tls Handshake (Jsse, 8267729)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" id="CVE-2021-35586" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8267735)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588" id="CVE-2021-35588" title="Openjdk: Incomplete Validation Of Inner Class References In Classfileparser (Hotspot, 8268071)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" id="CVE-2021-35603" title="Openjdk: Non-Constant Comparison During Tls Handshakes (Jsse, 8269618)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3889" id="RHSA-2021:3889-1" title="Rhsa-2021:3889-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862929" id="1862929" title="Scanner Is Slower With Jdk 1.8.0_252 And Above" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014508" id="2014508" title="Openjdk: Loop In Httpsserver Triggered During Tls Session Close (Jsse, 8254967)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014515" id="2014515" title="Openjdk: Excessive Memory Allocation In Rtfparser (Swing, 8265167)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014518" id="2014518" title="Openjdk: Excessive Memory Allocation In Rtfreader (Swing, 8265580)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014524" id="2014524" title="Openjdk: Excessive Memory Allocation In Hashmap And Hashset (Utility, 8266097)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015061" id="2015061" title="Openjdk: Certificates With End Dates Too Far In The Future Can Corrupt Keystore (Keytool, 8266137)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015308" id="2015308" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8267735)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015311" id="2015311" title="Openjdk: Non-Constant Comparison During Tls Handshakes (Jsse, 8269618)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015648" id="2015648" title="Openjdk: Weak Ciphers Preferred Over Stronger Ones For Tls (Jsse, 8264210)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015653" id="2015653" title="Openjdk: Unexpected Exception Raised During Tls Handshake (Jsse, 8267729)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015658" id="2015658" title="Openjdk: Incorrect Principal Selection When Using Kerberos Constrained Delegation (Libraries, 8266689)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015659" id="2015659" title="Openjdk: Incomplete Validation Of Inner Class References In Classfileparser (Hotspot, 8268071)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3892-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) 
* OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) 
* OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) 
* OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) 
* OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) 
* OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) 
* OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) 
* OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729)  (CVE-2021-35578) 
* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735)  (CVE-2021-35586) 
* OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Previously, uninstalling the OpenJDK RPMs attempted to remove a client directory that did not exist. This directory is no longer used in java-11-openjdk and all references to it have now been removed. (RHBZ#1698873) 
 
--- SL7 
x86_64 java-11-openjdk-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-debuginfo-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-debuginfo-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-demo-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-demo-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-devel-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-devel-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-headless-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-headless-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-src-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-src-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-demo-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">e33b167c32960ebe864e3298c0806fef44326dbf2e60f5fd6de9a64787630e47</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-src-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">605d9de79b1e7b66b8a678a32d3662f6024308b0d8efe4212832a6e3696c990f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">47f96da1d5218fca5cb8492684bc3375eb0562b5d3a2b9d4c04b86be92305609</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-headless-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">cc8f5858a5ef7c4e422c8ac9478b19571d12c9ea62b65b204afba187f834ad3f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">0818aa1117445013eb4f0ad45b312d1e54ac8c922ceffe90e7674a643eea5788</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">fc46580e7be7714628c10b0e0e9fb0ee34b25b3912fa5a599bf77715b069f65b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">bebb84bedcb3c512d2a0bfeeb8b4db7b60ec32b5815d7de7edf819d3b2ffde24</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">f6fdc5145a6147d28ca9a6eba36ce56aac8e01286353c367a91c4cb2b14cbe31</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-devel-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">67fc4f3c7e2f848a74b162d8b863b37d8f7198885a1c0642d27a0bf2e52e1e4b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-src-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">064608eff6a661e8ecd966c80bce8fa37071a8ea30c87741dd144573b073a1d9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">04cdecef944c4d0caec49c21edb6897edeaee502b5aff9086123a3715ff51fd9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-headless-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">378bee12136df9aa9fe80bff862d608232d45449a532cbf404db7357f3314623</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">3d3be31a498e5596c6ec12383fb0cbdbfe7d7577e3ad628f63325b34808717c7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">452cbaf81da20d0b10d5cc951fa527304a7e306f64193c11f9c28c9e60e74c4c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-demo-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">cf3f5bdb45ebfa36350f721c37429c0ec2b0e08e7fb8cd0835ad0b04831c170d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">2657fc9170f55acff762e78c6b324cbcf7671e37196f15cce4046d1d34570290</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-devel-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">1d1b99c75a03c26401710fec1fa91024ab5f78e37a1a21c599ccea4061b052c7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" id="CVE-2021-35550" title="Openjdk: Weak Ciphers Preferred Over Stronger Ones For Tls (Jsse, 8264210)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" id="CVE-2021-35556" title="Openjdk: Excessive Memory Allocation In Rtfparser (Swing, 8265167)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" id="CVE-2021-35559" title="Openjdk: Excessive Memory Allocation In Rtfreader (Swing, 8265580)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" id="CVE-2021-35561" title="Openjdk: Excessive Memory Allocation In Hashmap And Hashset (Utility, 8266097)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" id="CVE-2021-35564" title="Openjdk: Certificates With End Dates Too Far In The Future Can Corrupt Keystore (Keytool, 8266137)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" id="CVE-2021-35565" title="Openjdk: Loop In Httpsserver Triggered During Tls Session Close (Jsse, 8254967)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" id="CVE-2021-35567" title="Openjdk: Incorrect Principal Selection When Using Kerberos Constrained Delegation (Libraries, 8266689)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" id="CVE-2021-35578" title="Openjdk: Unexpected Exception Raised During Tls Handshake (Jsse, 8267729)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" id="CVE-2021-35586" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8267735)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" id="CVE-2021-35603" title="Openjdk: Non-Constant Comparison During Tls Handshakes (Jsse, 8269618)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3892" id="RHSA-2021:3892-1" title="Rhsa-2021:3892-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1698873" id="1698873" title="Warning: File /Usr/Lib/Jvm/Java-11-Openjdk-11.0.Ea.28-7.El7.X86_64/Lib/Client: Remove Failed: No Such File Or Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014508" id="2014508" title="Openjdk: Loop In Httpsserver Triggered During Tls Session Close (Jsse, 8254967)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014515" id="2014515" title="Openjdk: Excessive Memory Allocation In Rtfparser (Swing, 8265167)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014518" id="2014518" title="Openjdk: Excessive Memory Allocation In Rtfreader (Swing, 8265580)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014524" id="2014524" title="Openjdk: Excessive Memory Allocation In Hashmap And Hashset (Utility, 8266097)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015061" id="2015061" title="Openjdk: Certificates With End Dates Too Far In The Future Can Corrupt Keystore (Keytool, 8266137)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015308" id="2015308" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8267735)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015311" id="2015311" title="Openjdk: Non-Constant Comparison During Tls Handshakes (Jsse, 8269618)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015648" id="2015648" title="Openjdk: Weak Ciphers Preferred Over Stronger Ones For Tls (Jsse, 8264210)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015653" id="2015653" title="Openjdk: Unexpected Exception Raised During Tls Handshake (Jsse, 8267729)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015658" id="2015658" title="Openjdk: Incorrect Principal Selection When Using Kerberos Constrained Delegation (Libraries, 8266689)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3956-1</id><title>Xstream</title><description>Security Fix(es): 
* xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39139) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39141) 
* xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* (CVE-2021-39144) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39145) 
* xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39146) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration (CVE-2021-39147) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator (CVE-2021-39148) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* (CVE-2021-39149) 
* xstream: Server-side request forgery (SSRF) via unsafe deserialization of  com.sun.xml.internal.ws.client.sei.* (CVE-2021-39150) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39151) 
* xstream: Server-side request forgery (SSRF) via unsafe deserialization of  jdk.nashorn.internal.runtime.Source$URLData (CVE-2021-39152) 
* xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39153) 
* xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39154) 
* xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler (CVE-2021-39140) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7  noarch   - xstream-1.3.1-16.el7_9.noarch.rpm   - xstream-javadoc-1.3.1-16.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xstream-javadoc" release="16.el7_9" src="xstream-1.3.1-16.el7_9.src.rpm" version="1.3.1"><filename>xstream-javadoc-1.3.1-16.el7_9.noarch.rpm</filename><sum type="sha256">721d4a42d6144450ca7a9d9a3346ea70c1c2cd3e659be4498547a45c905ad650</sum></package><package arch="noarch" name="xstream" release="16.el7_9" src="xstream-1.3.1-16.el7_9.src.rpm" version="1.3.1"><filename>xstream-1.3.1-16.el7_9.noarch.rpm</filename><sum type="sha256">18234f1e80c5362d2f18e4c98af1b3ad30f317728f614a810542f5013260471d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39139" id="CVE-2021-39139" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Xalan Xsltc.Trax.Templatesimpl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39140" id="CVE-2021-39140" title="Xstream: Infinite Loop Dos Via Unsafe Deserialization Of Sun.Reflect.Annotation.Annotationinvocationhandler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39141" id="CVE-2021-39141" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Xml.Internal.Ws.Client.Sei.*" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39144" id="CVE-2021-39144" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Sun.Tracing.*" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39145" id="CVE-2021-39145" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapbindingenumeration" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39146" id="CVE-2021-39146" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Javax.Swing.Uidefaults$Proxylazyvalue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39147" id="CVE-2021-39147" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapsearchenumeration" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39148" id="CVE-2021-39148" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Toolkit.Dir.Contextenumerator" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39149" id="CVE-2021-39149" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Corba.*" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39150" id="CVE-2021-39150" title="Xstream: Server-Side Request Forgery (Ssrf) Via Unsafe Deserialization Of Com.Sun.Xml.Internal.Ws.Client.Sei.*" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39151" id="CVE-2021-39151" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapbindingenumeration" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39152" id="CVE-2021-39152" title="Xstream: Server-Side Request Forgery (Ssrf) Via Unsafe Deserialization Of Jdk.Nashorn.Internal.Runtime.Source$Urldata" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153" id="CVE-2021-39153" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Xalan Xsltc.Trax.Templatesimpl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39154" id="CVE-2021-39154" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Javax.Swing.Uidefaults$Proxylazyvalue" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3956" id="RHSA-2021:3956-1" title="Rhsa-2021:3956-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997763" id="1997763" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Xalan Xsltc.Trax.Templatesimpl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997765" id="1997765" title="Xstream: Infinite Loop Dos Via Unsafe Deserialization Of Sun.Reflect.Annotation.Annotationinvocationhandler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997769" id="1997769" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Xml.Internal.Ws.Client.Sei.*" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997772" id="1997772" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Sun.Tracing.*" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997775" id="1997775" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapbindingenumeration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997777" id="1997777" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Javax.Swing.Uidefaults$Proxylazyvalue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997779" id="1997779" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapsearchenumeration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997781" id="1997781" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Toolkit.Dir.Contextenumerator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997784" id="1997784" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Corba.*" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997786" id="1997786" title="Xstream: Server-Side Request Forgery (Ssrf) Via Unsafe Deserialization Of Com.Sun.Xml.Internal.Ws.Client.Sei.*" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997791" id="1997791" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapbindingenumeration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997793" id="1997793" title="Xstream: Server-Side Request Forgery (Ssrf) Via Unsafe Deserialization Of Jdk.Nashorn.Internal.Runtime.Source$Urldata" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997795" id="1997795" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Xalan Xsltc.Trax.Templatesimpl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997801" id="1997801" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Javax.Swing.Uidefaults$Proxylazyvalue" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4033-1</id><title>Binutils</title><description>Security Fix(es): 
* Developer environment: Unicode's bidirectional (BiDi) override characters  can cause trojan source attacks (CVE-2021-42574) 
The following changes were introduced in binutils in order to facilitate detection of BiDi Unicode characters: 
Tools which display names or strings (readelf, strings, nm, objdump) have a  new command line option --unicode / -U which controls how Unicode characters are handled. 
Using "--unicode=default" will treat them as normal for the tool. This is the default behaviour when --unicode option is not used.  Using "-- unicode=locale" will display them according to the current locale.  Using "--unicode=hex" will display them as hex byte values.  Using "-- unicode=escape" will display them as Unicode escape sequences.  Using "-- unicode=highlight" will display them as Unicode escape sequences highlighted in red, if supported by the output device. 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - binutils-2.27-44.base.el7_9.1.x86_64.rpm  - binutils-debuginfo-2.27-44.base.el7_9.1.i686.rpm  - binutils-debuginfo-2.27-44.base.el7_9.1.x86_64.rpm  - binutils-devel-2.27-44.base.el7_9.1.i686.rpm  - binutils-devel-2.27-44.base.el7_9.1.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-11-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="binutils-devel" release="44.base.el7_9.1" src="binutils-2.27-44.base.el7_9.1.src.rpm" version="2.27"><filename>binutils-devel-2.27-44.base.el7_9.1.i686.rpm</filename><sum type="sha256">fb6f39677f4dfcd8081f6c7255d6b3290a7bb59c19bc49777ff53ab5d326d9f8</sum></package><package arch="x86_64" name="binutils" release="44.base.el7_9.1" src="binutils-2.27-44.base.el7_9.1.src.rpm" version="2.27"><filename>binutils-2.27-44.base.el7_9.1.x86_64.rpm</filename><sum type="sha256">f734e06cf2c45618f88fc22efa5888844a886d627cf2c73b505c16287fd0ef3f</sum></package><package arch="x86_64" name="binutils-devel" release="44.base.el7_9.1" src="binutils-2.27-44.base.el7_9.1.src.rpm" version="2.27"><filename>binutils-devel-2.27-44.base.el7_9.1.x86_64.rpm</filename><sum type="sha256">b86b196eb77c5dfcbd607eaea01c7b8cf538def86cc0c047c72004f9fecef54c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574" id="CVE-2021-42574" title="Developer Environment: Unicode'S Bidirectional (Bidi) Override Characters Can Cause Trojan Source Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4033" id="RHSA-2021:4033-1" title="Rhsa-2021:4033-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2005819" id="2005819" title="Developer Environment: Unicode'S Bidirectional (Bidi) Override Characters Can Cause Trojan Source Attacks" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4044-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: Sandbox bypass via recent VFS-manipulating syscalls (CVE-2021-41133) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   -flatpak-1.0.9-12.el7_9.x86_64.rpm  - flatpak-builder-1.0.0-12.el7_9.x86_64.rpm  - flatpak-debuginfo-1.0.9-12.el7_9.x86_64.rpm  - flatpak-devel-1.0.9-12.el7_9.x86_64.rpm  - flatpak-libs-1.0.9-12.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-libs" release="12.el7_9" src="flatpak-1.0.9-12.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-12.el7_9.x86_64.rpm</filename><sum type="sha256">58e3c1f8dd1fa2e042593af0ee4e645190955b33c3399cf72ebb0a2eee668351</sum></package><package arch="x86_64" name="flatpak-builder" release="12.el7_9" src="flatpak-1.0.9-12.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-12.el7_9.x86_64.rpm</filename><sum type="sha256">22067faaaeb7791e013f2978eaa4812a0c98185e7379c24d625cc3669e1c929e</sum></package><package arch="x86_64" name="flatpak-devel" release="12.el7_9" src="flatpak-1.0.9-12.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-12.el7_9.x86_64.rpm</filename><sum type="sha256">1764362a0c1f11a79eeca38eeffc989f49059b37c95500454fda35278377b209</sum></package><package arch="x86_64" name="flatpak" release="12.el7_9" src="flatpak-1.0.9-12.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-12.el7_9.x86_64.rpm</filename><sum type="sha256">9eb7d9ef146c06f180f0b37e746cf2d2237d458853a34eb8f91d5914b96f3fbe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41133" id="CVE-2021-41133" title="Flatpak: Sandbox Bypass Via Recent Vfs-Manipulating Syscalls" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4044" id="RHSA-2021:4044-1" title="Rhsa-2021:4044-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2012245" id="2012245" title="Flatpak: Sandbox Bypass Via Recent Vfs-Manipulating Syscalls" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4116-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.3.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in HTTP2 Session object 
* Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 
* Mozilla: iframe sandbox rules did not apply to XSLT stylesheets (CVE-2021-38503) 
* Mozilla: Use-after-free in file picker dialog (CVE-2021-38504) 
* Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning (CVE-2021-38506) 
* Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports (CVE-2021-38507) 
* Mozilla: Permission Prompt could be overlaid, resulting in user confusion  and potential spoofing (CVE-2021-38508) 
* Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain (CVE-2021-38509) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.3.0-1.el7_9.src.rpm" version="91.3.0"><filename>firefox-91.3.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">d240ca41ca7b893bf6dfe675cc0570479cd65e03efd623d8a49f34eaaa5e3b63</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.3.0-1.el7_9.src.rpm" version="91.3.0"><filename>firefox-91.3.0-1.el7_9.i686.rpm</filename><sum type="sha256">8c6d8cc7b4a69ef5cbd1426523aa2b250928f0c44478c8020e085e6333a1370c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503" id="CVE-2021-38503" title="Mozilla: Iframe Sandbox Rules Did Not Apply To Xslt Stylesheets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504" id="CVE-2021-38504" title="Mozilla: Use-After-Free In File Picker Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506" id="CVE-2021-38506" title="Mozilla: Firefox Could Be Coaxed Into Going Into Fullscreen Mode Without Notification Or Warning" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507" id="CVE-2021-38507" title="Mozilla: Opportunistic Encryption In Http2 Could Be Used To Bypass The Same-Origin-Policy On Services Hosted On Other Ports" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508" id="CVE-2021-38508" title="Mozilla: Permission Prompt Could Be Overlaid, Resulting In User Confusion And Potential Spoofing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509" id="CVE-2021-38509" title="Mozilla: Javascript Alert Box Could Have Been Spoofed Onto An Arbitrary Domain" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4116" id="RHSA-2021:4116-1" title="Rhsa-2021:4116-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019621" id="2019621" title="Mozilla: Iframe Sandbox Rules Did Not Apply To Xslt Stylesheets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019622" id="2019622" title="Mozilla: Use-After-Free In File Picker Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019624" id="2019624" title="Mozilla: Firefox Could Be Coaxed Into Going Into Fullscreen Mode Without Notification Or Warning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019625" id="2019625" title="Mozilla: Opportunistic Encryption In Http2 Could Be Used To Bypass The Same-Origin-Policy On Services Hosted On Other Ports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019626" id="2019626" title="Mozilla: Use-After-Free In Http2 Session Object" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019627" id="2019627" title="Mozilla: Permission Prompt Could Be Overlaid, Resulting In User Confusion And Potential Spoofing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019628" id="2019628" title="Mozilla: Javascript Alert Box Could Have Been Spoofed Onto An Arbitrary Domain" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019630" id="2019630" title="Mozilla: Memory Safety Bugs Fixed In Firefox 94 And Firefox Esr 91.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4134-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.3.0. 
Security Fix(es): 
* Mozilla: Use-after-free in HTTP2 Session object 
* Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 
* Mozilla: iframe sandbox rules did not apply to XSLT stylesheets (CVE-2021-38503) 
* Mozilla: Use-after-free in file picker dialog (CVE-2021-38504) 
* Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning (CVE-2021-38506) 
* Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports (CVE-2021-38507) 
* Mozilla: Permission Prompt could be overlaid, resulting in user confusion  and potential spoofing (CVE-2021-38508) 
* Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain (CVE-2021-38509) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-91.3.0-2.el7_9.src.rpm" version="91.3.0"><filename>thunderbird-91.3.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">4c8ed042fda855710d18116d76d222179772e50d5b378b3830c92bb8ddf6626a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503" id="CVE-2021-38503" title="Mozilla: Iframe Sandbox Rules Did Not Apply To Xslt Stylesheets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504" id="CVE-2021-38504" title="Mozilla: Use-After-Free In File Picker Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506" id="CVE-2021-38506" title="Mozilla: Firefox Could Be Coaxed Into Going Into Fullscreen Mode Without Notification Or Warning" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507" id="CVE-2021-38507" title="Mozilla: Opportunistic Encryption In Http2 Could Be Used To Bypass The Same-Origin-Policy On Services Hosted On Other Ports" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508" id="CVE-2021-38508" title="Mozilla: Permission Prompt Could Be Overlaid, Resulting In User Confusion And Potential Spoofing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509" id="CVE-2021-38509" title="Mozilla: Javascript Alert Box Could Have Been Spoofed Onto An Arbitrary Domain" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4134" id="RHSA-2021:4134-1" title="Rhsa-2021:4134-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019621" id="2019621" title="Mozilla: Iframe Sandbox Rules Did Not Apply To Xslt Stylesheets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019622" id="2019622" title="Mozilla: Use-After-Free In File Picker Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019624" id="2019624" title="Mozilla: Firefox Could Be Coaxed Into Going Into Fullscreen Mode Without Notification Or Warning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019625" id="2019625" title="Mozilla: Opportunistic Encryption In Http2 Could Be Used To Bypass The Same-Origin-Policy On Services Hosted On Other Ports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019626" id="2019626" title="Mozilla: Use-After-Free In Http2 Session Object" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019627" id="2019627" title="Mozilla: Permission Prompt Could Be Overlaid, Resulting In User Confusion And Potential Spoofing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019628" id="2019628" title="Mozilla: Javascript Alert Box Could Have Been Spoofed Onto An Arbitrary Domain" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019630" id="2019630" title="Mozilla: Memory Safety Bugs Fixed In Firefox 94 And Firefox Esr 91.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4619-1</id><title>Freerdp</title><description>Security Fix(es): 
* freerdp: improper client input validation for gateway connections allows to overwrite memory (CVE-2021-41159) 
* freerdp: improper region checks in all clients allow out of bound write to memory (CVE-2021-41160) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freerdp" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">425ec2b695d055f02fad6b19a925aefe72b42a728f5188beca945ea774551522</sum></package><package arch="i686" name="libwinpr-devel" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>libwinpr-devel-2.1.1-5.el7_9.i686.rpm</filename><sum type="sha256">4f0aa642e193199463b076ab85aa95c6471db5c0015ffec54a485eb2df6dce37</sum></package><package arch="x86_64" name="freerdp-devel" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-devel-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">f6315426a81bea92b151c19b92dd73abf7785c2c5f38326a7dd87edf9cebd623</sum></package><package arch="x86_64" name="libwinpr-devel" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>libwinpr-devel-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">623433c0ea6efa7207d361905f8f4f211d28def2609e49c1fbc4745d35594620</sum></package><package arch="i686" name="freerdp-libs" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-libs-2.1.1-5.el7_9.i686.rpm</filename><sum type="sha256">685bc3857c0a1c7357e7ed1e99a2c3943005b17e0f0ad29461b131cb283d3c75</sum></package><package arch="x86_64" name="freerdp-libs" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-libs-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">16ff1cf1e8b791b72f404683e1b09ca183c1b923bfd7a40bde144c0a011097a0</sum></package><package arch="x86_64" name="libwinpr" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>libwinpr-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">77239c60301bfd4569a632c262051c21eec79b1ea830b546779d5084aab7d084</sum></package><package arch="i686" name="freerdp-devel" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-devel-2.1.1-5.el7_9.i686.rpm</filename><sum type="sha256">00fac61464c5480ec91e302fb37991b75d4f2f69bdd93d0fbddd5e29dcf7fdd5</sum></package><package arch="i686" name="libwinpr" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>libwinpr-2.1.1-5.el7_9.i686.rpm</filename><sum type="sha256">3ee37c0c201ef2fe982a344d953ffa8ea29a8c96200396163702500be4efe67a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41159" id="CVE-2021-41159" title="Freerdp: Improper Client Input Validation For Gateway Connections Allows To Overwrite Memory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41160" id="CVE-2021-41160" title="Freerdp: Improper Region Checks In All Clients Allow Out Of Bound Write To Memory" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4619" id="RHSA-2021:4619-1" title="Rhsa-2021:4619-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2016403" id="2016403" title="Freerdp: Improper Client Input Validation For Gateway Connections Allows To Overwrite Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2016412" id="2016412" title="Freerdp: Improper Region Checks In All Clients Allow Out Of Bound Write To Memory" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4777-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx  use-after- free (CVE-2020-36385) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* scsi: ibmvfc: Avoid link down on FS9100 canister reboot 
* crash in qla2x00_status_entry() because of corrupt srb 
* qedf driver: race condition between qedf's completion work task and another work item tearing down an fcport with qedf_cleanup_fcport 
* The kernel crashes in hv_pci_remove_slots() upon hv device removal. A possible race between hv_pci_remove_slots() and pci_devices_present_work(). 
* I/O delays incorrectly handled in the NVMe stack 
* Data corruption in NFS client reusing slotid/seqid due to an interrupted slot</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">c59bd6ad8b0ba335b1a88bffbcf8ef268d3df29a96d7b7b995d30b8c305939de</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">6e4c1d649dde4da6699c3f05acb8e7ef57f58b8e98dd9d3f197804e05169011c</sum></package><package arch="x86_64" name="kernel-tools" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">76e9b04a0a7c47f25152f16f92dd7c8cb609e4558c0616d4f261870ac288b993</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">85effede8b93bcb34e01c1154c8bb0c9aefc896e7cd9c4809290bfde34d14e6f</sum></package><package arch="x86_64" name="kernel" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">aa36c535e415cd33f65a061cdef6ff3fb12a14214d7614ab7cc113412933ff4b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">ae36099deb7aa92ef933e33052f63aa483b8755c5b63b0360840bc48f1914469</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.49.1.el7.noarch.rpm</filename><sum type="sha256">6c4f2476de1b18214e0d474570a7e21b0d4139c347b674cd0b78836ae5320907</sum></package><package arch="x86_64" name="bpftool" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">73b93162d0e202f228b3157df9b278ea9944b817dc7489af189b682b5f0dfd3d</sum></package><package arch="x86_64" name="kernel-debug" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">20261f01313111e42969541ffdb4b19cafd855d6294a3ac64481a5edeb8f2a50</sum></package><package arch="noarch" name="kernel-doc" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.49.1.el7.noarch.rpm</filename><sum type="sha256">82e0747f69c44a4d7b658707d6ee95cbb91f67f734e768d03dec121eec1624aa</sum></package><package arch="x86_64" name="kernel-headers" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">90f2afa509798753be07a36e1c0bca62c2a505ee3f9206d908fadfd437273edf</sum></package><package arch="x86_64" name="perf" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">4620413535aa12eddad10c9fa5e0468cd8a8bb4cd7b0523d27959c47fb896295</sum></package><package arch="x86_64" name="python-perf" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">255a4e7fe3d8b457d6e51b5df869cf53e6c73f383acdd0b1573161541c9c9ee1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385" id="CVE-2020-36385" title="Kernel: Use-After-Free In Drivers/Infiniband/Core/Ucma.C Ctx Use-After-Free" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4777" id="RHSA-2021:4777-1" title="Rhsa-2021:4777-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1974319" id="1974319" title="Kernel: Use-After-Free In Drivers/Infiniband/Core/Ucma.C Ctx Use-After-Free" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4782-1</id><title>Openssh</title><description>Security Fix(es): 
* openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured (CVE-2021-41617) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-11-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openssh-keycat" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-keycat-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">1335e1327219cdfad2139a4e7eaa935f3c4c420449714d6a512d2ad7e6a795bb</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="2.22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.22.el7_9.x86_64.rpm</filename><sum type="sha256">49828810f0d5030b8669f601621777242386c6f46b9bd24b8dd9e4ca8385d786</sum></package><package arch="x86_64" name="openssh-server-sysvinit" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-server-sysvinit-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">27656905c453087fb4326a46ae20f69ad6f7d15dc57ac689aebaa67cc3af2f94</sum></package><package arch="x86_64" name="openssh-askpass" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-askpass-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">75a95101038a61ef81f8bc905cca421e78a765ad8ec724b14df9f60dafa4100f</sum></package><package arch="x86_64" name="openssh-cavs" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-cavs-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">d30c8c5057e3ac699638dc6131d01513da36d2ff21ad586caf8b1db7245f854b</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="2.22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.22.el7_9.i686.rpm</filename><sum type="sha256">9a85d8a27fbec1addee6044fee82166d543cda136dd0f8fc573ca74c5603bab0</sum></package><package arch="x86_64" name="openssh-server" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-server-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">21c4cdb91e7b33fb22d39d57323aabd8e3c4fb3e247c96e350f6524439410552</sum></package><package arch="x86_64" name="openssh" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">09b902fcc03fa2ff326c9f6534af56d52092119319689489dffb5a5712b7c975</sum></package><package arch="x86_64" name="openssh-clients" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-clients-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">b9995430cbc9a2437eceddfaa6d5543cb9cbd27b88a6088bd12e826497f390ef</sum></package><package arch="x86_64" name="openssh-ldap" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-ldap-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">56b9b8f33bd2f38acc39a956c5707e609a788f202e7bb1ef7bb1d94e97f0a875</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617" id="CVE-2021-41617" title="Openssh: Privilege Escalation When Authorizedkeyscommand Or Authorizedprincipalscommand Are Configured" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4782" id="RHSA-2021:4782-1" title="Rhsa-2021:4782-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1999263" id="1999263" title="Frequent Sshd Segfaults" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2008291" id="2008291" title="Openssh: Privilege Escalation When Authorizedkeyscommand Or Authorizedprincipalscommand Are Configured" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4785-1</id><title>Rpm</title><description>Security Fix(es): 
* rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-11-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rpm" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">f7034a7d37716143df45fce93a7db04674d4c0a11744c6eb7350d3e1a60eb9db</sum></package><package arch="x86_64" name="rpm-sign" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-sign-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">2148e0ff7f1fb45bfbe7001dbe9999f9cc16425e4b449ed0f28ea41f97160d4b</sum></package><package arch="i686" name="rpm-libs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-libs-4.11.3-48.el7_9.i686.rpm</filename><sum type="sha256">7c92bfe62ed2e6ef2cb5e34cf60d7b4aa3caf175bba0fe317879b73b083aae0f</sum></package><package arch="x86_64" name="rpm-plugin-systemd-inhibit" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">f3591c4301390b93035418fd9355051df0c9d22533775c0db02f26f09cfeb039</sum></package><package arch="i686" name="rpm-devel" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-devel-4.11.3-48.el7_9.i686.rpm</filename><sum type="sha256">6d05f18d940eead5c800f05dead657010bd1c5a78757f1f01327e008248045a0</sum></package><package arch="noarch" name="rpm-apidocs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-apidocs-4.11.3-48.el7_9.noarch.rpm</filename><sum type="sha256">dc4d8039966f057bf378f252329a1b26c6ed9b5a59a03a821ec82d8bde9747fa</sum></package><package arch="x86_64" name="rpm-build-libs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">e4ab10a468a9fcf6885626b9045f3268ef3701f891ba304325e720ce57edc005</sum></package><package arch="x86_64" name="rpm-devel" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-devel-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">58728c0ff5dbe6ddf05dfe74e314a78fff2c53bad686f11f69bff0b570716884</sum></package><package arch="i686" name="rpm-build-libs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-build-libs-4.11.3-48.el7_9.i686.rpm</filename><sum type="sha256">773c74a13a8be6aa2766b718b53e89e53c3775a190f09a90445d2f137ce8eea8</sum></package><package arch="x86_64" name="rpm-python" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-python-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">6473424fa421cf2f447521a64a754fa76d07ca4d2690ec10f946d50a02507554</sum></package><package arch="noarch" name="rpm-cron" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-cron-4.11.3-48.el7_9.noarch.rpm</filename><sum type="sha256">cc1922c981027ee30335ca2191a223e6f40ecee1aa27e7947e200aba8cac9c80</sum></package><package arch="x86_64" name="rpm-build" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-build-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">bfdfa81bef912c168e7a5e4efdb859656050c1d0919b9a919d4c220eff2a4a06</sum></package><package arch="x86_64" name="rpm-libs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-libs-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">d13ab2c849e7ef85d698c599f8393fe1b58c118eea4106a8822f496de2f3e097</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271" id="CVE-2021-20271" title="Rpm: Signature Checks Bypass Via Corrupted Rpm Package" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4785" id="RHSA-2021:4785-1" title="Rhsa-2021:4785-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1934125" id="1934125" title="Rpm: Signature Checks Bypass Via Corrupted Rpm Package" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4788-1</id><title>Krb5</title><description>Security Fix(es): 
* krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field (CVE-2021-37750) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-11-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libkadm5" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">657875b63fe49b17f6d97ccfbd08597596af7bc12197093ebe1f5da0d1baf3b8</sum></package><package arch="x86_64" name="krb5-devel" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">ecdf5093b38c12d3549c5c3ac6069737e21d8645f28c6a7a47243443f5a9ecf9</sum></package><package arch="x86_64" name="krb5-libs" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">0b5693f5de9bae23654703f65e36c84e2787e104908f8c171faefffd3bf3caec</sum></package><package arch="i686" name="krb5-libs" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-51.el7_9.i686.rpm</filename><sum type="sha256">8c4a640ef705264b41a8b8406ba75dac8812c740b23bacc3cb755b7db5d9e5d6</sum></package><package arch="i686" name="libkadm5" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-51.el7_9.i686.rpm</filename><sum type="sha256">8ecd0dda63f8fdef85f3be10611b669d2dc8f8820c41e51929957203919c59c6</sum></package><package arch="x86_64" name="krb5-server" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-server-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">edbefd5f50c0ab6f8f347753a30e6cabb9e3a9a91e3edb0140a39c295c478976</sum></package><package arch="x86_64" name="krb5-server-ldap" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-server-ldap-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">2736348c2e593224a35ad17d2baba550a0f3f9d925bb28687786378dafabf2ae</sum></package><package arch="x86_64" name="krb5-pkinit" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-pkinit-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">e6ef83a4934b858afe592fb93a7365e981aafa924b55b6d515ce30fdd084bc99</sum></package><package arch="i686" name="krb5-devel" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-51.el7_9.i686.rpm</filename><sum type="sha256">b17db7a9e0d3401fff1a6973e133a3b97a5a42ec6e9f4e54e4533c6d67dd503f</sum></package><package arch="x86_64" name="krb5-workstation" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-workstation-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">518e643fae6225e2a0bf9f417845ac6057b93e97fd4db403cd1264f533781d7e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" id="CVE-2021-37750" title="Krb5: Null Pointer Dereference In Process_Tgs_Req() In Kdc/Do_Tgs_Req.C Via A Fast Inner Body That Lacks Server Field" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4788" id="RHSA-2021:4788-1" title="Rhsa-2021:4788-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1996834" id="1996834" title="Krb5: Null Pointer Dereference In Process_Tgs_Req() In Kdc/Do_Tgs_Req.C Via A Fast Inner Body That Lacks Server Field" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4904-1</id><title>Nss</title><description>Security Fix(es): 
* nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and  RSA-PSS) (CVE-2021-43527) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-12-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nss" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-3.67.0-4.el7_9.i686.rpm</filename><sum type="sha256">8b39d7bbdd0b7c87e89fa90555935b23723b4de00bcb3c620b9244d895da45aa</sum></package><package arch="i686" name="nss-pkcs11-devel" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-pkcs11-devel-3.67.0-4.el7_9.i686.rpm</filename><sum type="sha256">d80c7a1e8ecfa6c65521a83cc7d8145ef3b8cf9624d3ccb14ffb2dd5a7d06b5f</sum></package><package arch="x86_64" name="nss" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">9fa543b38cbcd32000f90732cd5dc04f7e6bddcfeaf65b2e1563f345ed58a0bd</sum></package><package arch="x86_64" name="nss-sysinit" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-sysinit-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">b66372dc9a21d68aeaf19da7827403ad84fa245fa8e22058d891106701661d8b</sum></package><package arch="i686" name="nss-devel" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-devel-3.67.0-4.el7_9.i686.rpm</filename><sum type="sha256">96ac14ca35823c9a4ac7663af959bef6f678a125fd197e01b94d15df2335cfa4</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-pkcs11-devel-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">fd5c09387dabef2c766f98684d44e391053a13a1b9c4bfb7baa704ea908d3431</sum></package><package arch="x86_64" name="nss-devel" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-devel-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">e37be7a62e6a240e35e8b7fb7ac856bcdae43d435bf76244e80e800210210b1e</sum></package><package arch="x86_64" name="nss-tools" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-tools-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">b53f0ac22d348471aaf4297e58721ca11ae4f57122869e47dc1d51bababbcdaf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527" id="CVE-2021-43527" title="Nss: Memory Corruption In Decodeecordsasignature With Dsa Signatures (And Rsa-Pss)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4904" id="RHSA-2021:4904-1" title="Rhsa-2021:4904-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2024370" id="2024370" title="Nss: Memory Corruption In Decodeecordsasignature With Dsa Signatures (And Rsa-Pss)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4913-1</id><title>Mailman</title><description>Security Fix(es): 
* mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) 
* mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) 
* mailman: CSRF protection missing in the user options page (CVE-2016-6893) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-12-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="3" name="mailman" release="30.el7_9.2" src="mailman-2.1.15-30.el7_9.2.src.rpm" version="2.1.15"><filename>mailman-2.1.15-30.el7_9.2.x86_64.rpm</filename><sum type="sha256">a6d403a8414332a58f7713c4db942ad7216a5f34f7c6a7e1d4dcfe28cb8bd819</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6893" id="CVE-2016-6893" title="Mailman: Csrf Protection Missing In The User Options Page" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42097" id="CVE-2021-42097" title="Mailman: Csrf Token Bypass Allows To Perform Csrf Attacks And Account Takeover" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44227" id="CVE-2021-44227" title="Mailman: Csrf Token Bypass Allows To Perform Csrf Attacks And Admin Takeover" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4913" id="RHSA-2021:4913-1" title="Rhsa-2021:4913-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1370155" id="1370155" title="Mailman: Csrf Protection Missing In The User Options Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2020568" id="2020568" title="Mailman: Csrf Token Bypass Allows To Perform Csrf Attacks And Account Takeover" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026862" id="2026862" title="Mailman: Csrf Token Bypass Allows To Perform Csrf Attacks And Admin Takeover" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5014-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.4.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 
* Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536) 
* Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537) 
* Mozilla: Missing fullscreen and pointer lock notification when requesting  both (CVE-2021-43538) 
* Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539) 
* Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541) 
* Mozilla: XMLHttpRequest error codes could have leaked the existence of an  external protocol handler (CVE-2021-43542) 
* Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543) 
* Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545) 
* Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-12-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.4.0-1.el7_9.src.rpm" version="91.4.0"><filename>firefox-91.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">74b34b94c0496a052d766ef75b3959f4f21d66d466f6f73698d6bb9397a1ea3b</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.4.0-1.el7_9.src.rpm" version="91.4.0"><filename>firefox-91.4.0-1.el7_9.i686.rpm</filename><sum type="sha256">47df76129a2edadd96529cb6ecc6a39c43c555f5ec0932f3f345fdca39a68cdd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536" id="CVE-2021-43536" title="Mozilla: Url Leakage When Navigating While Executing Asynchronous Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537" id="CVE-2021-43537" title="Mozilla: Heap Buffer Overflow When Using Structured Clone" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538" id="CVE-2021-43538" title="Mozilla: Missing Fullscreen And Pointer Lock Notification When Requesting Both" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539" id="CVE-2021-43539" title="Mozilla: Gc Rooting Failure When Calling Wasm Instance Methods" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541" id="CVE-2021-43541" title="Mozilla: External Protocol Handler Parameters Were Unescaped" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542" id="CVE-2021-43542" title="Mozilla: Xmlhttprequest Error Codes Could Have Leaked The Existence Of An External Protocol Handler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543" id="CVE-2021-43543" title="Mozilla: Bypass Of Csp Sandbox Directive When Embedding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545" id="CVE-2021-43545" title="Mozilla: Denial Of Service When Using The Location Api In A Loop" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546" id="CVE-2021-43546" title="Mozilla: Cursor Spoofing Could Overlay User Interface When Native Cursor Is Zoomed" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5014" id="RHSA-2021:5014-1" title="Rhsa-2021:5014-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030105" id="2030105" title="Mozilla: Url Leakage When Navigating While Executing Asynchronous Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030106" id="2030106" title="Mozilla: Heap Buffer Overflow When Using Structured Clone" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030109" id="2030109" title="Mozilla: Missing Fullscreen And Pointer Lock Notification When Requesting Both" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030110" id="2030110" title="Mozilla: Gc Rooting Failure When Calling Wasm Instance Methods" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030111" id="2030111" title="Mozilla: External Protocol Handler Parameters Were Unescaped" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030112" id="2030112" title="Mozilla: Xmlhttprequest Error Codes Could Have Leaked The Existence Of An External Protocol Handler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030113" id="2030113" title="Mozilla: Bypass Of Csp Sandbox Directive When Embedding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030114" id="2030114" title="Mozilla: Denial Of Service When Using The Location Api In A Loop" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030115" id="2030115" title="Mozilla: Cursor Spoofing Could Overlay User Interface When Native Cursor Is Zoomed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030116" id="2030116" title="Mozilla: Memory Safety Bugs Fixed In Firefox 95 And Firefox Esr 91.4" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5046-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.4.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 
* Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536) 
* Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537) 
* Mozilla: Missing fullscreen and pointer lock notification when requesting  both (CVE-2021-43538) 
* Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539) 
* Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541) 
* Mozilla: XMLHttpRequest error codes could have leaked the existence of an  external protocol handler (CVE-2021-43542) 
* Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543) 
* Mozilla: JavaScript unexpectedly enabled for the composition area (CVE-2021-43528) 
* Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545) 
* Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-12-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-91.4.0-3.el7_9.src.rpm" version="91.4.0"><filename>thunderbird-91.4.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">6d5614c26c0384912aebe50dc573bc0865fb463afb90ed78e385c01d485f905e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528" id="CVE-2021-43528" title="Mozilla: Javascript Unexpectedly Enabled For The Composition Area" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536" id="CVE-2021-43536" title="Mozilla: Url Leakage When Navigating While Executing Asynchronous Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537" id="CVE-2021-43537" title="Mozilla: Heap Buffer Overflow When Using Structured Clone" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538" id="CVE-2021-43538" title="Mozilla: Missing Fullscreen And Pointer Lock Notification When Requesting Both" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539" id="CVE-2021-43539" title="Mozilla: Gc Rooting Failure When Calling Wasm Instance Methods" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541" id="CVE-2021-43541" title="Mozilla: External Protocol Handler Parameters Were Unescaped" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542" id="CVE-2021-43542" title="Mozilla: Xmlhttprequest Error Codes Could Have Leaked The Existence Of An External Protocol Handler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543" id="CVE-2021-43543" title="Mozilla: Bypass Of Csp Sandbox Directive When Embedding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545" id="CVE-2021-43545" title="Mozilla: Denial Of Service When Using The Location Api In A Loop" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546" id="CVE-2021-43546" title="Mozilla: Cursor Spoofing Could Overlay User Interface When Native Cursor Is Zoomed" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5046" id="RHSA-2021:5046-1" title="Rhsa-2021:5046-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030105" id="2030105" title="Mozilla: Url Leakage When Navigating While Executing Asynchronous Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030106" id="2030106" title="Mozilla: Heap Buffer Overflow When Using Structured Clone" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030109" id="2030109" title="Mozilla: Missing Fullscreen And Pointer Lock Notification When Requesting Both" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030110" id="2030110" title="Mozilla: Gc Rooting Failure When Calling Wasm Instance Methods" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030111" id="2030111" title="Mozilla: External Protocol Handler Parameters Were Unescaped" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030112" id="2030112" title="Mozilla: Xmlhttprequest Error Codes Could Have Leaked The Existence Of An External Protocol Handler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030113" id="2030113" title="Mozilla: Bypass Of Csp Sandbox Directive When Embedding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030114" id="2030114" title="Mozilla: Denial Of Service When Using The Location Api In A Loop" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030115" id="2030115" title="Mozilla: Cursor Spoofing Could Overlay User Interface When Native Cursor Is Zoomed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030116" id="2030116" title="Mozilla: Memory Safety Bugs Fixed In Firefox 95 And Firefox Esr 91.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030137" id="2030137" title="Mozilla: Javascript Unexpectedly Enabled For The Composition Area" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5192</id><title>Important: Samba Security And Bug Fix Update</title><description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717) * samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Backport IDL changes to harden Kerberos communication (BZ#2021428)
</description><severity>important</severity><issued date="2021-12-17 11:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ctdb" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">ca4344699b290998b563050811d67e398006832a01d730ad20eb66ca9aedccc6</sum></package><package arch="x86_64" name="ctdb-tests" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">8c8da384268bf5fccba4ff8f4c52f415a39ff3b3e604d09c753e64e63ed19f0b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" id="CVE-2016-2124" title="Cve-2016-2124" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" id="CVE-2020-25717" title="Cve-2020-25717" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5192" id="RHSA-2021:5192" title="Important: Samba Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2021428" id="2021428" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5192-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717) 
* samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Backport IDL changes to harden Kerberos communication</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-krb5-printing" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">76c22fc6f283b0abb8ce92e3a40f5caf50817a1dfcf37895835e1b5ed36900e2</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">fccd7fac0b4e430d2265335820d03a03444d1e394c6c12895b62940562f6325e</sum></package><package arch="x86_64" name="samba-winbind" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">9a52b6824a9124e6c234bf305315ff6530e5057c88159a3306840461f7c19985</sum></package><package arch="x86_64" name="samba-client" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">83f58f79e439d0f5d99de769d791288e5777785799f835f872bf72a6341ce621</sum></package><package arch="x86_64" name="samba-test" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">58ebd96e52fbc22359938a509237c70a35cd6cedcca2010c4dd62f96fa8acca9</sum></package><package arch="x86_64" name="samba-dc-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">8b8242d3d2b9651ca69ed606b593554940a9da7af796f5e5866f0fda5b911185</sum></package><package arch="i686" name="libwbclient" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">40d1c0855c8259f9bbfd4f2f45b239b79c8d5101f2df884d86853c1abbf6af4b</sum></package><package arch="x86_64" name="samba" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">d3727b6c48f0a4f9d908e8b6e3427846e6a80c5377ef0e40301e5a9e7df0b642</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">e9f03c3e2696c8256a55a620360f0cd4c4a8b1e70b6b7d4e664648685f58c246</sum></package><package arch="i686" name="samba-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">a56816dfaf5e2c393a7679576aeb6cc71251b81d1270e49c1f0f695c5cbe8e3b</sum></package><package arch="x86_64" name="samba-winbind-modules" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">dd3a2f088f535f905a65bea23360486fe6e6a11d2749465eeebbd0ccdc1bfc14</sum></package><package arch="x86_64" name="samba-dc" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">7a05cc305cfdb6a7a873e3293a8e8ecc20f0ce56143be6a169128e274fe98076</sum></package><package arch="i686" name="samba-common-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">40bde39bd1fa9e632258146bb71fa6fa62cb8bc173df3bbfc4fb3814230c232f</sum></package><package arch="x86_64" name="libsmbclient-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">f2900e10160efa1fa6da0fd4cbb2306141c66e646a071c4429432aae2b178992</sum></package><package arch="x86_64" name="libsmbclient" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">d82ae98bd60973a99849a035947c743e3b1bdf17777141b2c91e4015b00d9444</sum></package><package arch="x86_64" name="samba-client-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">59b11d7dca5070f0ab7f07fe1e2d366d35e089ef6fde9e652920bce0784b6a14</sum></package><package arch="x86_64" name="samba-python" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">226f20e710f0dba58f76df93ede8175a3f7218e2a450678dcce302aa7a77568b</sum></package><package arch="x86_64" name="samba-test-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">8b9125573a1c10f278cafe10823e8638d0d6d3fa8721edff72ee250d1745ce7f</sum></package><package arch="x86_64" name="libwbclient" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">11aa4dd9f1070cdccbef45593aa5eb8d11820e0a343f0365224725c2ee6c6052</sum></package><package arch="x86_64" name="samba-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">7451c9daf89660e83e84d2e64c25253c6c1eaa71907a8b9a084dfac0f83d1224</sum></package><package arch="noarch" name="samba-pidl" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-17.el7_9.noarch.rpm</filename><sum type="sha256">006b198f8d806c3728f5028d288a95f9a4929068b54635abc2aa1bb22bd2098c</sum></package><package arch="i686" name="samba-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">20421f25bfb9f83da767bc8bad49e16734ccea5cb08d6be240ecc216c1c13151</sum></package><package arch="i686" name="samba-test-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">d2cea758a40b3c562a7e1701a61791a582d91409b79cdc5bec48a26f4ab4ddba</sum></package><package arch="x86_64" name="samba-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">3cdbb5d29cf8a9de05a3ea1e3ed041f63ace5c469c6214e1a816a6962d9a5f16</sum></package><package arch="x86_64" name="samba-python-test" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">885931f0c44184190ab523e79e44757c7e4994ab059d8d66906a695fecc68691</sum></package><package arch="i686" name="libwbclient-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">a993a893e2c3b713749c49f8fd13e03fe56eb514b45e6b84a7d608baf8248361</sum></package><package arch="x86_64" name="samba-common-tools" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">37508a8a808cd8d930f62f8983ee6ee2e8543745cae73cf163d31fd448aa7906</sum></package><package arch="noarch" name="samba-common" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-17.el7_9.noarch.rpm</filename><sum type="sha256">0a5637aac7e2ebbbb6d8f624450c071ab61caa086eecec041becd1520c4cacde</sum></package><package arch="x86_64" name="libwbclient-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">77f6e67d80e62266c9f6edc5a7c0eb4ac0abc20201b3b0cee0944a0eb661cdfe</sum></package><package arch="i686" name="samba-client-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">91ef15b825a8a5d761cfc6a0ddbf3e48758b34e51feaf904413244d9d7708562</sum></package><package arch="x86_64" name="samba-winbind-clients" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">71b55f6e1c2158774b901d97db832afc225ba2882d88b13945557ae7a2e820da</sum></package><package arch="i686" name="samba-python" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">1c50d68275ae3e786b12ed0941a5c865dbcae209edfc6da0b1c4062fae0671aa</sum></package><package arch="i686" name="samba-winbind-modules" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">0a4d62969165153d51f06cbf88222fa0a88533589740e2e7b6da6a7395b1be82</sum></package><package arch="x86_64" name="samba-common-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">91f4fae3ae01f88dd4c5667b02cbe12fc81ce1878891b1f39708aa228f3ca2a9</sum></package><package arch="i686" name="libsmbclient" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">aea5935636f86272694d14548ee666e2d1eba32ca6bf57b762132eff600405ec</sum></package><package arch="i686" name="libsmbclient-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">d2c8370a21a41827d547e2fb4461cc544a60eb49e696fb1f72367057fe00be37</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" id="CVE-2016-2124" title="Samba: Smb1 Client Connections Can Be Downgraded To Plaintext Authentication" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" id="CVE-2020-25717" title="Samba: Active Directory (Ad) Domain User Could Become Root On Domain Members" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5192" id="RHSA-2021:5192-1" title="Rhsa-2021:5192-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019660" id="2019660" title="Samba: Smb1 Client Connections Can Be Downgraded To Plaintext Authentication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019672" id="2019672" title="Samba: Active Directory (Ad) Domain User Could Become Root On Domain Members" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5195</id><title>Moderate: Ipa Security And Bug Fix Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RHEL 8.6 IPA Replica Failed to configure PKINIT setup against a RHEL 7.9 IPA server (BZ#2025848)
</description><severity>moderate</severity><issued date="2021-12-17 11:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ipa-client-common" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">ba3e65b75de0615b30f31251addbebf9a381c5752ce35c0c8a85890b19805a65</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">8a1a1d7f5a6a84ea98aedaa19e07359a51a29a38e53fcb4cf267c116c5935f31</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">b9172dd5d1dca7fe8e6849ebb3f238b45232c929509e28d9c9e7249fe8a7e1cb</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.10.x86_64.rpm</filename><sum type="sha256">4416f3ec1635682299d01ba62964a7f2eee00c3e1a9e659b724a44935cc91f2a</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">dfa9f7b90e8b4377d664998d7a0a31f0703626732069b265b202764c8ca2af1f</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">0fb158bf0f87a788649c85f3f6ee3c6e56d6139d057da35d182da389253ac3e2</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.10.x86_64.rpm</filename><sum type="sha256">e96afb955b6d688374ff418cd38f41fc4308c48b8b3fa2bd2ec2e00e78be45ea</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">b0562c5297aa37456cdcec9b40950cfadd9daac380e45107705d9b9faa4ac73a</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">d3e8bcdc368785fe79dc0c38fcd468781d6518e60ce4d76b62b2e335f834feb2</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">dcd33ccebd465c4e937987026c0aac5c208598b470112e953f5a7741b41e54f6</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.10.x86_64.rpm</filename><sum type="sha256">a253d56aeba91f49e9be09abdc6d8f19f1798d24adeb6e1d78400025bd5d965c</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" id="CVE-2020-25719" title="Cve-2020-25719" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5195" id="RHSA-2021:5195" title="Moderate: Ipa Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2025848" id="2025848" title="2025848 &#8211; Rhel 8.6 Ipa Replica Failed To Configure Pkinit Setup Against A Rhel 7.9 Ipa Server" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5206-1</id><title>Log4J</title><description>Security Fix(es): 
* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-12-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="log4j-javadoc" release="17.el7_4" src="log4j-1.2.17-17.el7_4.src.rpm" version="1.2.17"><filename>log4j-javadoc-1.2.17-17.el7_4.noarch.rpm</filename><sum type="sha256">7f8dcfcca0c95f2356405ffbe58f163d9ae1e29fe844c9c35cf72582717a9086</sum></package><package arch="noarch" name="log4j" release="17.el7_4" src="log4j-1.2.17-17.el7_4.src.rpm" version="1.2.17"><filename>log4j-1.2.17-17.el7_4.noarch.rpm</filename><sum type="sha256">51f4e6b324089f9d26b9d4c167770f5ae0f9302e00e36a9a1b7db5c7431ca091</sum></package><package arch="noarch" name="log4j-manual" release="17.el7_4" src="log4j-1.2.17-17.el7_4.src.rpm" version="1.2.17"><filename>log4j-manual-1.2.17-17.el7_4.noarch.rpm</filename><sum type="sha256">4ce766ab47665d246a4f108b603d6d797967629d900cf570617727d883ddd1a2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104" id="CVE-2021-4104" title="Log4J: Remote Code Execution In Log4J 1.X When Application Is Configured To Use Jmsappender" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5206" id="RHSA-2021:5206-1" title="Rhsa-2021:5206-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2031667" id="2031667" title="Log4J: Remote Code Execution In Log4J 1.X When Application Is Configured To Use Jmsappender" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0003-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: SProcRenderCompositeGlyphs out-of-bounds access (CVE-2021-4008) 
* xorg-x11-server: SProcXFixesCreatePointerBarrier out-of-bounds access (CVE-2021-4009) 
* xorg-x11-server: SProcScreenSaverSuspend out-of-bounds access (CVE-2021-4010) 
* xorg-x11-server: SwapCreateRegister out-of-bounds access (CVE-2021-4011) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-devel" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">98268e97294e5e61cd5ae9724a60f2d86fdb78bfad8b96a6d4cebe683dc5f506</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">fbd34b80cced270b813bbef467a2d12255003967620e2c28bf4de0741c79225b</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">2e1018a8d0bd51dff6d83ef948418f762c203d239f0020269fee7500538ab40d</sum></package><package arch="noarch" name="xorg-x11-server-source" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-17.el7_9.noarch.rpm</filename><sum type="sha256">7f5af24d0f6249d57137eb7f5f380a7f13c8aa5cfd9a914b8c5eff9df5c764d7</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">fce562c16c7cdf9d0f147b567379b38071b0d934b574fa1d04007d19ddccc0b4</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">efd6b680b414d75f5dee35c343ddf2e3ee2b0587adf5694202a130037cee4454</sum></package><package arch="i686" name="xorg-x11-server-devel" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-17.el7_9.i686.rpm</filename><sum type="sha256">d100a533e292e9d1465d3b4238aaadd6e2075b81b3500f467bb26ae697b23fe5</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">b5e7aa52ca58da7977f27f333a17e9eacfc6fb54dd54d3390556009264f92652</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">983e196d913b2396c61c6ac75d70687482dd096698a372f2f6ece8cd8f1cbeec</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">b01cce56ff3e9feb30957a95d43de3e6e97a9a2181e69dbf4048888095225636</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" id="CVE-2021-4008" title="Xorg-X11-Server: Sprocrendercompositeglyphs Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" id="CVE-2021-4009" title="Xorg-X11-Server: Sprocxfixescreatepointerbarrier Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010" id="CVE-2021-4010" title="Xorg-X11-Server: Sprocscreensaversuspend Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" id="CVE-2021-4011" title="Xorg-X11-Server: Swapcreateregister Out-Of-Bounds Access" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0003" id="RHSA-2022:0003-1" title="Rhsa-2022:0003-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026059" id="2026059" title="Xorg-X11-Server: Sprocrendercompositeglyphs Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026072" id="2026072" title="Xorg-X11-Server: Sprocxfixescreatepointerbarrier Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026073" id="2026073" title="Xorg-X11-Server: Sprocscreensaversuspend Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026074" id="2026074" title="Xorg-X11-Server: Swapcreateregister Out-Of-Bounds Access" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0059-1</id><title>Webkitgtk4</title><description>Security Fix(es): 
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-01-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="webkitgtk4-devel" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-devel-2.28.2-3.el7.i686.rpm</filename><sum type="sha256">2534a83763bd174b50e81a306838d5b1006a9b89f35e76680ee67f4df97cac7c</sum></package><package arch="x86_64" name="webkitgtk4-jsc" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">218df31a4ff2a0a7c341dc484c2c348e8a2205db49147ccd5448a78cb5e6d78d</sum></package><package arch="i686" name="webkitgtk4-jsc" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-2.28.2-3.el7.i686.rpm</filename><sum type="sha256">ef77d62e815cf45cec69e28567cd8079f03beeb766ce1c1d846dafb56a016f2d</sum></package><package arch="x86_64" name="webkitgtk4-devel" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-devel-2.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">6c3714b086b57365575f5ab43c8aa2a05af23e0346f9ec215cb71c79098d07b5</sum></package><package arch="x86_64" name="webkitgtk4-jsc-devel" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">ca992fdc96462b479e549876ac8e275a99e37a6add39225543c90ba2d0e27493</sum></package><package arch="i686" name="webkitgtk4" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-2.28.2-3.el7.i686.rpm</filename><sum type="sha256">eda71bba7578ebc4415bbfd8c43813920c6be2f8bba1fbc14c0d39a8b5c3222b</sum></package><package arch="x86_64" name="webkitgtk4" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-2.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">643bdebe39d488dd7e5e47699ed2d8ae3227bd5f7d2a182385b9c73152180c5e</sum></package><package arch="i686" name="webkitgtk4-jsc-devel" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm</filename><sum type="sha256">0e22c4a0c88f6a07e46cbb0c1b090888a8ceb611667f8cdba8d5f6303987644d</sum></package><package arch="noarch" name="webkitgtk4-doc" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-doc-2.28.2-3.el7.noarch.rpm</filename><sum type="sha256">953e6f26fc29f36acfa9015d8c95a5e41f4cac5622b8b90ce20ddbdfd957da6f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858" id="CVE-2021-30858" title="Webkitgtk: Use-After-Free Leading To Arbitrary Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0059" id="RHSA-2022:0059-1" title="Rhsa-2022:0059-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2006099" id="2006099" title="Webkitgtk: Use-After-Free Leading To Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0063-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704) 
* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322) 
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
*    A gfs2 withdrawal occurs function = gfs2_setbit, file = fs/gfs2/rgrp.c, line = 109 
*    i40e SR-IOV TX driver issue detected on VF 7 - VF connectivity  loose after VF down/up duplicate ACK not sent when expected 
*    [kernel-debug] BUG: bad unlock balance detected! when running LTP read_all  *    Rudimentary support for AMD Milan - Call init_amd_zn() om Family 19h processors 
*    A VM with &lt;=8 CPUs handles all the Mellanox NIC interrupts on CPU0 only, causing low performance 
*    fix _PSD override quirk for AMD family 19h+ 
*    generic_file_aio_read returns 0 when interrupted early with a fatal signal</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">e1b4eb8495df8c8e404e29027bf75bfcf446e9c72f4cdce9e885ad4c0f84c74c</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">fc7930b80c5c957b3c11ca0a8fdc8253b5c592005218c195013b5af27ad52fe0</sum></package><package arch="x86_64" name="kernel-debug" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">b7cbee4f83236379820e3ad7c8c99517ac58062735b6b92fee460df377354e5a</sum></package><package arch="x86_64" name="kernel-devel" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">efe2465efe72478457ad7248132950834a973a31d7e32dd72bd6bb7a5af678d1</sum></package><package arch="noarch" name="kernel-doc" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.53.1.el7.noarch.rpm</filename><sum type="sha256">530aea97981d5feda154cd41631c4a1220b291e183601d7ab2456dae5d5dc721</sum></package><package arch="x86_64" name="perf" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">3bf6fe2ebcdec2cd7c6947ca654995807dbd5079be69a53f4dd4e83bbde2ce4a</sum></package><package arch="x86_64" name="kernel-headers" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">dd7cdc23048dcb8f3deb188047954c6e8a860ec543c1141af80401bcbb544cb9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.53.1.el7.noarch.rpm</filename><sum type="sha256">a4e8fae7b13733df408e4e6b47ed996d16189f5d7fcad211b6cdbc1b3f21dfd0</sum></package><package arch="x86_64" name="kernel-tools" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">72148e3dc5d1b8f06e71978c4d49a61a9afb83ba56f2b1c4528c0fb9d07714ca</sum></package><package arch="x86_64" name="python-perf" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">5a97314cb3e63a379d542f48205763959151da815d6b1663057b2eda47725517</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">d1e6c49f3b347b404269e242437ec0ca7f365b201170769917b0b0cc96a0e02a</sum></package><package arch="x86_64" name="bpftool" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">643ad950e55e74f544c41b24cd7c4a2e1baf65a5802de9e20573f45b31bb27d8</sum></package><package arch="x86_64" name="kernel" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">50fa58d82abc229771879df7ea1c31833d20c8e5648aaca94f796d4454ce47d9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25704" id="CVE-2020-25704" title="Kernel: Perf_Event_Parse_Addr_Filter Memory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" id="CVE-2020-36322" title="Kernel: Fuse: Fuse_Do_Getattr() Calls Make_Bad_Inode() In Inappropriate Situations" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" id="CVE-2021-42739" title="Kernel: Heap Buffer Overflow In Firedtv Driver" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0063" id="RHSA-2022:0063-1" title="Rhsa-2022:0063-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1895961" id="1895961" title="Kernel: Perf_Event_Parse_Addr_Filter Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1949560" id="1949560" title="Kernel: Fuse: Fuse_Do_Getattr() Calls Make_Bad_Inode() In Inappropriate Situations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951739" id="1951739" title="Kernel: Heap Buffer Overflow In Firedtv Driver" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0064-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-01-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">4b7e5233f1ef54c5a49a2e7ef776b6555b7cbb9d2b310f9697923d9b7c7f25fb</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-23.el7_9.i686.rpm</filename><sum type="sha256">93769ab70815d8a8cdc9f8edf4f90ad61eb40cee4bd092b8c89a511d0de01274</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">f3f92393d8ac5d161e7460d7e50d01802e498cfe55855bcc1a7f58bab0580a3a</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-23.el7_9.i686.rpm</filename><sum type="sha256">fb34c957a261788fe6457be8bf0ce1f77c970e8132ab509e1dda887884c7b0d9</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">c39581eaf6d8a28a5b3af447d4a0a83cdf236803fecf60172074131740c9412c</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">e6618c1e128f8765d85a14ea2e693bc8fc06c837542ed5c30d7df96c37104bb7</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">f40c92173b08ccc3db38d78bbeb03120d0b043bbb4deaa2d423b9e981c0490d0</sum></package><package arch="i686" epoch="1" name="openssl-static" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-23.el7_9.i686.rpm</filename><sum type="sha256">5f5d16a031e480a292463d7c1aa64a083d69f8ba617332518b5480af9e558384</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" id="CVE-2021-3712" title="Openssl: Read Buffer Overruns Processing Asn.1 Strings" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0064" id="RHSA-2022:0064-1" title="Rhsa-2022:0064-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1995634" id="1995634" title="Openssl: Read Buffer Overruns Processing Asn.1 Strings" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0124-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.5.0 ESR. 
Security Fix(es): 
* Mozilla: Iframe sandbox bypass with XSLT (CVE-2021-4140) 
* Mozilla: Race condition when playing audio files (CVE-2022-22737) 
* Mozilla: Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738) 
* Mozilla: Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22741) 
* Mozilla: Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22743) 
* Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 (CVE-2022-22751) 
* Mozilla: Leaking cross-origin URLs through securitypolicyviolation event (CVE-2022-22745) 
* Mozilla: Spoofed origin on external protocol launch dialog (CVE-2022-22748) 
* Mozilla: Missing throttling on external protocol launch dialog (CVE-2022-22739) 
* Mozilla: Crash when handling empty pkcs7 sequence (CVE-2022-22747</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.5.0-1.el7_9.src.rpm" version="91.5.0"><filename>firefox-91.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">b24cd7262ae038465b552c404eea1adce86219ff96ba1b00bfde6c71fb4d708f</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.5.0-1.el7_9.src.rpm" version="91.5.0"><filename>firefox-91.5.0-1.el7_9.i686.rpm</filename><sum type="sha256">52541ab3a9f02cf7b7362cb6b02574c833e661eeb9c14539f3811c03c8b83738</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140" id="CVE-2021-4140" title="Mozilla: Iframe Sandbox Bypass With Xslt" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737" id="CVE-2022-22737" title="Mozilla: Race Condition When Playing Audio Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738" id="CVE-2022-22738" title="Mozilla: Heap-Buffer-Overflow In Blendgaussianblur" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739" id="CVE-2022-22739" title="Mozilla: Missing Throttling On External Protocol Launch Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740" id="CVE-2022-22740" title="Mozilla: Use-After-Free Of Channeleventqueue::Mowner" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741" id="CVE-2022-22741" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742" id="CVE-2022-22742" title="Mozilla: Out-Of-Bounds Memory Access When Inserting Text In Edit Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743" id="CVE-2022-22743" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745" id="CVE-2022-22745" title="Mozilla: Leaking Cross-Origin Urls Through Securitypolicyviolation Event" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747" id="CVE-2022-22747" title="Mozilla: Crash When Handling Empty Pkcs7 Sequence" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748" id="CVE-2022-22748" title="Mozilla: Spoofed Origin On External Protocol Launch Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751" id="CVE-2022-22751" title="Mozilla: Memory Safety Bugs Fixed In Firefox 96 And Firefox Esr 91.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0124" id="RHSA-2022:0124-1" title="Rhsa-2022:0124-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039561" id="2039561" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039563" id="2039563" title="Mozilla: Out-Of-Bounds Memory Access When Inserting Text In Edit Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039564" id="2039564" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039565" id="2039565" title="Mozilla: Use-After-Free Of Channeleventqueue::Mowner" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039566" id="2039566" title="Mozilla: Heap-Buffer-Overflow In Blendgaussianblur" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039567" id="2039567" title="Mozilla: Race Condition When Playing Audio Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039568" id="2039568" title="Mozilla: Iframe Sandbox Bypass With Xslt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039569" id="2039569" title="Mozilla: Spoofed Origin On External Protocol Launch Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039570" id="2039570" title="Mozilla: Leaking Cross-Origin Urls Through Securitypolicyviolation Event" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039572" id="2039572" title="Mozilla: Crash When Handling Empty Pkcs7 Sequence" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039573" id="2039573" title="Mozilla: Missing Throttling On External Protocol Launch Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039574" id="2039574" title="Mozilla: Memory Safety Bugs Fixed In Firefox 96 And Firefox Esr 91.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0127-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.5.0. 
Security Fix(es): 
* Mozilla: Iframe sandbox bypass with XSLT (CVE-2021-4140) 
* Mozilla: Race condition when playing audio files (CVE-2022-22737) 
* Mozilla: Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738) 
* Mozilla: Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22741) 
* Mozilla: Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22743) 
* Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 (CVE-2022-22751) 
* Mozilla: Leaking cross-origin URLs through securitypolicyviolation event (CVE-2022-22745) 
* Mozilla: Spoofed origin on external protocol launch dialog (CVE-2022-22748) 
* Mozilla: Missing throttling on external protocol launch dialog (CVE-2022-22739) 
* Mozilla: Crash when handling empty pkcs7 sequence (CVE-2022-22747)</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.5.0-1.el7_9.src.rpm" version="91.5.0"><filename>thunderbird-91.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">3cb0a76f2c45fa9cd11c3b908892dfb10fd1f7030c243a18fe0b6e92849b3352</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140" id="CVE-2021-4140" title="Mozilla: Iframe Sandbox Bypass With Xslt" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737" id="CVE-2022-22737" title="Mozilla: Race Condition When Playing Audio Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738" id="CVE-2022-22738" title="Mozilla: Heap-Buffer-Overflow In Blendgaussianblur" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739" id="CVE-2022-22739" title="Mozilla: Missing Throttling On External Protocol Launch Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740" id="CVE-2022-22740" title="Mozilla: Use-After-Free Of Channeleventqueue::Mowner" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741" id="CVE-2022-22741" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742" id="CVE-2022-22742" title="Mozilla: Out-Of-Bounds Memory Access When Inserting Text In Edit Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743" id="CVE-2022-22743" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745" id="CVE-2022-22745" title="Mozilla: Leaking Cross-Origin Urls Through Securitypolicyviolation Event" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747" id="CVE-2022-22747" title="Mozilla: Crash When Handling Empty Pkcs7 Sequence" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748" id="CVE-2022-22748" title="Mozilla: Spoofed Origin On External Protocol Launch Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751" id="CVE-2022-22751" title="Mozilla: Memory Safety Bugs Fixed In Firefox 96 And Firefox Esr 91.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0127" id="RHSA-2022:0127-1" title="Rhsa-2022:0127-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039561" id="2039561" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039563" id="2039563" title="Mozilla: Out-Of-Bounds Memory Access When Inserting Text In Edit Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039564" id="2039564" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039565" id="2039565" title="Mozilla: Use-After-Free Of Channeleventqueue::Mowner" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039566" id="2039566" title="Mozilla: Heap-Buffer-Overflow In Blendgaussianblur" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039567" id="2039567" title="Mozilla: Race Condition When Playing Audio Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039568" id="2039568" title="Mozilla: Iframe Sandbox Bypass With Xslt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039569" id="2039569" title="Mozilla: Spoofed Origin On External Protocol Launch Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039570" id="2039570" title="Mozilla: Leaking Cross-Origin Urls Through Securitypolicyviolation Event" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039572" id="2039572" title="Mozilla: Crash When Handling Empty Pkcs7 Sequence" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039573" id="2039573" title="Mozilla: Missing Throttling On External Protocol Launch Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039574" id="2039574" title="Mozilla: Memory Safety Bugs Fixed In Firefox 96 And Firefox Esr 91.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0143</id><title>Important: Httpd Security Update</title><description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-01-18 08:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_session" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">f6d50a70e34d90f430a16387e36ce6c3c58fe33c52432ccfc433c32203ade455</sum></package><package arch="noarch" name="httpd-manual" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-97.sl7_9.4.noarch.rpm</filename><sum type="sha256">8a49f246b504b1bd850314a39faadadeaef3a6cfe23bb67c6774d71e3c5fb8e7</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">b0fd2d6d5a89ba32d563573c3bb8be4c58e28e13e3eed53052af8899509aa4ff</sum></package><package arch="x86_64" name="httpd-devel" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">bd85ba1c0745e459eef961ae53126bb0796a3235ca3dd6539f089add38513004</sum></package><package arch="x86_64" name="httpd-tools" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">4c7abdd81e62ca20befa0591ebeff2685f0aa76633a726a99e56fc7bd005b062</sum></package><package arch="x86_64" name="httpd" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>httpd-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">f2be60c4f22fff3a82e3b7d590f13ec8ccc695bdfbe7f949bd74d0bcf76ae197</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">19c13172d628ab4ee8f43bbe35b7bcfcc2f7eaa13ce09c7699f0652025fe5ba1</sum></package><package arch="x86_64" name="mod_ldap" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">f2d94441192f13f6930c986ef6b676ff097f35f978363b34e63829aaba93855a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691" id="CVE-2021-26691" title="Cve-2021-26691" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798" id="CVE-2021-34798" title="Cve-2021-34798" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275" id="CVE-2021-39275" title="Cve-2021-39275" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790" id="CVE-2021-44790" title="Cve-2021-44790" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0143" id="RHSA-2022:0143" title="Important: Httpd Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0162-1</id><title>Gegl</title><description>Security Fix(es): 
* gegl: shell expansion via a crafted pathname (CVE-2021-45463) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gegl-devel" release="19.el7_9.1" src="gegl-0.2.0-19.el7_9.1.src.rpm" version="0.2.0"><filename>gegl-devel-0.2.0-19.el7_9.1.i686.rpm</filename><sum type="sha256">1026ad809317760b0d4aabbe6b6e860534b665a242954df648017d26425f395a</sum></package><package arch="i686" name="gegl" release="19.el7_9.1" src="gegl-0.2.0-19.el7_9.1.src.rpm" version="0.2.0"><filename>gegl-0.2.0-19.el7_9.1.i686.rpm</filename><sum type="sha256">b1f3ba7fcda7b41faeac20f54e467969a03dff3c82d44d92e0b84c0b659c1140</sum></package><package arch="x86_64" name="gegl" release="19.el7_9.1" src="gegl-0.2.0-19.el7_9.1.src.rpm" version="0.2.0"><filename>gegl-0.2.0-19.el7_9.1.x86_64.rpm</filename><sum type="sha256">ef02317437aeae99e92e18ccacfeaf9171450113cc41ba989318f5fcc0c41436</sum></package><package arch="x86_64" name="gegl-devel" release="19.el7_9.1" src="gegl-0.2.0-19.el7_9.1.src.rpm" version="0.2.0"><filename>gegl-devel-0.2.0-19.el7_9.1.x86_64.rpm</filename><sum type="sha256">b6ac02e80d0cc53efc5d041e39652cef7a249221c39f729b7b8cd0d63ff85226</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45463" id="CVE-2021-45463" title="Gegl: Shell Expansion Via A Crafted Pathname" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0162" id="RHSA-2022:0162-1" title="Rhsa-2022:0162-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2035383" id="2035383" title="Gegl: Shell Expansion Via A Crafted Pathname" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0204</id><title>Moderate: Java-11-Openjdk Security Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) * OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) (CVE-2022-21277) * OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) * OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) * OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) (CVE-2022-21291) * OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) * OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) * OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) * OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) * OpenJDK: Array indexing issues in LIRGenerator (Hotspot,
8272014) (CVE-2022-21305) * OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) * OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360) * OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) * OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) (CVE-2022-21366)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2022-01-28 09:29:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-devel-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">54e94a49f94c000311fd8d9e5b97e53301facf3f4124087671061204158dd262</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">22abc18d93f07f90e6b42ddbd5093a801bf7e3f3015e8cd27f3c4e26c0da2eb7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-headless-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">a2a1d79c7ddac04304f1eca9f9d18c82864f1870988c40e6528c4f9bf46d9b68</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-demo-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">3a4aea36b0f4e25a3ed5cf94e0f7386ab5f1d45e3823fec31de7e02212022fad</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">4f2b655d843d01abe1db3f8e10e173d042dcb42d4bcbafbf32069ccf6cc12dad</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">250e0a7cad249a45617d83f6b5150b91cc908568fa58912282ccbf9e3614298d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">7a2935078143afd2685722413322ae84fb00eeb85c730ffaf5d8132439a0cae2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-headless-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">30a6882e26f722d5d52e51dfb475f44d6dd7c05e6ccc7be976994b6269a724d0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-demo-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">6369689fb71d5d00ec0736c4462b02d19376b3085ba45a70f2186224f30002d8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f040b3fff3cadbf5bba46359793f047aceec610db6b246d2d1495b575976b0c4</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">f74f241d8001846ea41a74f6e4fe447e3c5040739edfa4bede9d73a4e2acc064</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">96de0c2dc0c8db1c3b6d05d1d88021884e87016f30990a68b5081ae3a2dd34a2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-src-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">5afd5e147596a1d9397956bf9721329089d28bc928fdd47a1459ae4b6a3b6b5e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">3fc46c2e0fbdb37e4e798254d1c5ed4d35d14efaea3c20a9401283ea9b068303</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-jmods-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">2fc773b81c442f071e6ed161ff9836373741bf1ac45102c9a2c006d9c48b6641</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-src-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">e9ea555722da53401eb1acedccb6cee5093ffe0d923a857b4de4d4be2c090fee</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">428130bcc2525c6a036bbaf6da0788720b6e75aada9a50fcafe91585b4f28244</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.322.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">fed1d5416135665f0d365e53c2821753658b58496601de12afe92b96e502b314</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">01d5ba12a84abfa92dc7a4bc18d4a833cc125ae5b52c5d8c3bf66e9347bb54f8</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.322.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">91ded251200a705eb4c072c2044612331cd229e820328e0045319633269d704a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">ffead4c176d93aee9b77b4da35a516af4023a7ef83a1167d681970b9e1c1d1ce</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-jmods-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f86af909cc2f526fe18fd6535390085ec139b66b88863946cacb8e6ad68dbde7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-src-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">d08459c9eb22b8e5f9be6a280c5df29f72ad16bf6f83f22897aaabbea136e05b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f5e40ddaf84a7b9a91c9f819c7dd2af4ad5254788ef00c3e83dfba35eaeb80a7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-src-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">4360d60400c097e9d840cd55ee4b32828b82afe859bd0acd2738aed6548b4839</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">44511b6ecb9daf9acc9d5e84a68d5ba9f06302ca652ae1f507c84e04a43edb75</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">106283358485a57311aa90a8b37fad25d1dd72f71a528ff64872f51ce8d27d32</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">419bd98f1f9c77fc6e63f6eff664dc3af238fcbf6916d4952c111e441f341af7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-devel-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">4fa67312ed6440d3808caf8bd033c095c3126c02c12ca3c8126e958b256550ab</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">fdbd1738c7a9a66b53d2744428dd69a7ff9129a8caa52042fa2ed080b1a7e705</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">be5ac853436da737779d848c36be1cdae8aa926fad8d6540b5b4b77f929652a2</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" id="CVE-2022-21248" title="Cve-2022-21248" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" id="CVE-2022-21277" title="Cve-2022-21277" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" id="CVE-2022-21282" title="Cve-2022-21282" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" id="CVE-2022-21283" title="Cve-2022-21283" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" id="CVE-2022-21291" title="Cve-2022-21291" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" id="CVE-2022-21293" title="Cve-2022-21293" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" id="CVE-2022-21294" title="Cve-2022-21294" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" id="CVE-2022-21296" title="Cve-2022-21296" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" id="CVE-2022-21299" title="Cve-2022-21299" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" id="CVE-2022-21305" title="Cve-2022-21305" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" id="CVE-2022-21340" title="Cve-2022-21340" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" id="CVE-2022-21341" title="Cve-2022-21341" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" id="CVE-2022-21360" title="Cve-2022-21360" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" id="CVE-2022-21365" title="Cve-2022-21365" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" id="CVE-2022-21366" title="Cve-2022-21366" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0204" id="RHSA-2022:0204" title="Moderate: Java-11-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0204-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) 
* OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) (CVE-2022-21277) 
* OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) 
* OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) 
* OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) (CVE-2022-21291) 
* OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) 
* OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) 
* OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) 
* OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) 
* OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) 
* OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) 
* OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) 
* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756)  (CVE-2022-21360) 
* OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) 
* OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) (CVE-2022-21366) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-devel-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">cc0889f63874783c1587cdb2920dae9c9b22b654208212411a6675c559ae85bd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">77bd8cd3cb7b00b03f86de7d2ba8c94733b0cd0058cc898d318c83c6f2b3067e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">5144866cf38908fa899127f174a67b3913a2b873291b355067e0896da8eb4fe0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-demo-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d19bdc3ab44387fbce45f62c463221c9788c0c63d0f9eea7a2bdb7eae77ad7cc</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-src-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">d6bf474547d1334de8d7640fc5126470cd0f84c08c92e2b005df87158e7dad39</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-jmods-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">52c47aeb85a00884f332349ad60e14bcfd2967dbf35901b99caa91a9c8874941</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f2f7478230baa8b5a9dc38d0e718632d861b42d60326bccbcef0d80145ad246e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">ce7b0ad4461acf10115acbecf082ea2475952fd27c71530cf08d55d195153d3e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-demo-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">8f0a47867262db56e7790a717dd1ada48ae630a58e63875fdbafcbd99ce10b74</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-static-libs-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">75db03a8a5647d9c9327f479714bc74dfad20c0002ad9409ceab1e0c0ad09388</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-headless-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">bbf237389b53489037deab07f4eb170225ef1b113b38f7d175f9f5345ff792d9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-headless-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">c69384d43f8be73c756b6b45ed9efdc142fc792d5988b8a7a7f2d81749e21768</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-src-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">50eb4249160603431d7aab5d83df8bb7408102070f1e7f6b7b87c9cae987644b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">9459fcb48519274800a15bc286399d160a55ac9e4a14504ddc677e6cdca22371</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">4100a9da94044e8a26c6fbbb8a155fcb3d346a0b999817f744a566e83af271dd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-jmods-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">18e806660adc56368b07783d1dc706fc1574144c5a3c469baf58414b03134389</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-devel-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d93618065592c206d65b10e92606933f6436cc175d919bf380acd07614d589d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" id="CVE-2022-21248" title="Openjdk: Incomplete Deserialization Class Filtering In Objectinputstream (Serialization, 8264934)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" id="CVE-2022-21277" title="Openjdk: Incorrect Reading Of Tiff Files In Tiffnulldecompressor (Imageio, 8270952)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" id="CVE-2022-21282" title="Openjdk: Insufficient Uri Checks In The Xslt Transformerimpl (Jaxp, 8270492)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" id="CVE-2022-21283" title="Openjdk: Unexpected Exception Thrown In Regex Pattern (Libraries, 8268813)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" id="CVE-2022-21291" title="Openjdk: Incorrect Marking Of Writeable Fields (Hotspot, 8270386)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" id="CVE-2022-21293" title="Openjdk: Incomplete Checks Of Stringbuffer And Stringbuilder During Deserialization (Libraries, 8270392)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" id="CVE-2022-21294" title="Openjdk: Incorrect Identityhashmap Size Checks During Deserialization (Libraries, 8270416)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" id="CVE-2022-21296" title="Openjdk: Incorrect Access Checks In Xmlentitymanager (Jaxp, 8270498)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" id="CVE-2022-21299" title="Openjdk: Infinite Loop Related To Incorrect Handling Of Newlines In Xmlentityscanner (Jaxp, 8270646)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" id="CVE-2022-21305" title="Openjdk: Array Indexing Issues In Lirgenerator (Hotspot, 8272014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" id="CVE-2022-21340" title="Openjdk: Excessive Resource Use When Reading Jar Manifest Attributes (Libraries, 8272026)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" id="CVE-2022-21341" title="Openjdk: Insufficient Checks When Deserializing Exceptions In Objectinputstream (Serialization, 8272236)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" id="CVE-2022-21360" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8273756)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" id="CVE-2022-21365" title="Openjdk: Integer Overflow In Bmpimagereader (Imageio, 8273838)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" id="CVE-2022-21366" title="Openjdk: Excessive Memory Allocation In Tiff*Decompressor (Imageio, 8274096)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0204" id="RHSA-2022:0204-1" title="Rhsa-2022:0204-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041400" id="2041400" title="Openjdk: Unexpected Exception Thrown In Regex Pattern (Libraries, 8268813)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041417" id="2041417" title="Openjdk: Incomplete Checks Of Stringbuffer And Stringbuilder During Deserialization (Libraries, 8270392)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041427" id="2041427" title="Openjdk: Incorrect Identityhashmap Size Checks During Deserialization (Libraries, 8270416)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041435" id="2041435" title="Openjdk: Insufficient Uri Checks In The Xslt Transformerimpl (Jaxp, 8270492)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041439" id="2041439" title="Openjdk: Incorrect Access Checks In Xmlentitymanager (Jaxp, 8270498)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041472" id="2041472" title="Openjdk: Infinite Loop Related To Incorrect Handling Of Newlines In Xmlentityscanner (Jaxp, 8270646)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041479" id="2041479" title="Openjdk: Incorrect Reading Of Tiff Files In Tiffnulldecompressor (Imageio, 8270952)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041491" id="2041491" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8273756)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041785" id="2041785" title="Openjdk: Integer Overflow In Bmpimagereader (Imageio, 8273838)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041789" id="2041789" title="Openjdk: Excessive Memory Allocation In Tiff*Decompressor (Imageio, 8274096)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041801" id="2041801" title="Openjdk: Incomplete Deserialization Class Filtering In Objectinputstream (Serialization, 8264934)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041831" id="2041831" title="Openjdk: Incorrect Marking Of Writeable Fields (Hotspot, 8270386)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041878" id="2041878" title="Openjdk: Array Indexing Issues In Lirgenerator (Hotspot, 8272014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041884" id="2041884" title="Openjdk: Excessive Resource Use When Reading Jar Manifest Attributes (Libraries, 8272026)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041897" id="2041897" title="Openjdk: Insufficient Checks When Deserializing Exceptions In Objectinputstream (Serialization, 8272236)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0274-1</id><title>Polkit</title><description>Security Fix(es): 
* polkit: Local privilege escalation in pkexec due to incorrect handling of  argument vector (CVE-2021-4034) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="polkit" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-0.112-26.el7_9.1.i686.rpm</filename><sum type="sha256">a51c58a015ba9d4a24cd2892eff98c88780bc2faf647d7a2de964503062c9a9a</sum></package><package arch="x86_64" name="polkit-devel" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-devel-0.112-26.el7_9.1.x86_64.rpm</filename><sum type="sha256">9f5b87876726dd6f3222308cf4d835c0ea59184d38f0a6b9d63e7c31230f0e95</sum></package><package arch="x86_64" name="polkit" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-0.112-26.el7_9.1.x86_64.rpm</filename><sum type="sha256">68203be229c1f9cda0901c099d1c83d467c440273aeca0477beae5f4837bc9ce</sum></package><package arch="i686" name="polkit-devel" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-devel-0.112-26.el7_9.1.i686.rpm</filename><sum type="sha256">927f01258ae72316036787ef5c597fa6ab4b4d3b52f1d2a2247ccf1819f9dc84</sum></package><package arch="noarch" name="polkit-docs" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-docs-0.112-26.el7_9.1.noarch.rpm</filename><sum type="sha256">e60511f118ae805d5d7cb82c8a852b55454d27a21407581e71db6420d58adf90</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034" id="CVE-2021-4034" title="Polkit: Local Privilege Escalation In Pkexec Due To Incorrect Handling Of Argument Vector" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0274" id="RHSA-2022:0274-1" title="Rhsa-2022:0274-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2025869" id="2025869" title="Polkit: Local Privilege Escalation In Pkexec Due To Incorrect Handling Of Argument Vector" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0306-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) 
* OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) 
* OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) 
* OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) 
* OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) 
* OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) 
* OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) 
* OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) 
* OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) 
* OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) 
* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756)  (CVE-2022-21360) 
* OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-01-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">9fc1c228bfdd6cd91ee00a1b85521b0bd9a1703c25bf371a3e170520718b254e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">04dc751224ddbbdfbf53fcc13646051e88de5a92cf81f9621ac4d26bd51adca4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">d0d1db385d79c24b153a5e378d3557637b3262336aa5c670577218a9e1b07b79</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">3f9d342530e385ac09c2bccf9994f13b797fa7245a284d16e77cd44482175e00</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">cac72660b95e7de372e9c8863d0d577f6e66b21b019847201a6975aba535fc7c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">b6f8d11f1467b3341d0c1790239571e32e512cc2f9f57033a77c00984940715f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">c54c45e92dd9370bd5ec2cf4b94f9c4c2c5c8b23d4d460fc13e9312df9ec2f9d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">abf6d38551de0d1441ff30ed1e5770c5f9402423d2c42944e003942abd8748aa</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">d5fd399710a732268bba30410c30f68613bfdd0abdd174ddba84f2084c36ebb4</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">1474e8e84cd3edee131374d943d7c5aaa650d46f2fbf2679902f1ee849009900</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">ea1964a5ac6c3ce7d23c0379adf67af3b9a6b324186b6f5a77c03dc41ea7e955</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">a138a9ff6d0a204d4954e21ce9bbfffe6cbc71cdfab9b7254ea8a1519ed38892</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">8930e7312515fb1b8ec206e11be265caf82649d498f28a7bd2664f7668cbfd79</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">b0d2892f5361e65f6cf19ed8e55b374bca09237b7ffb47788dc94db5ed46d584</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" id="CVE-2022-21248" title="Openjdk: Incomplete Deserialization Class Filtering In Objectinputstream (Serialization, 8264934)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" id="CVE-2022-21282" title="Openjdk: Insufficient Uri Checks In The Xslt Transformerimpl (Jaxp, 8270492)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" id="CVE-2022-21283" title="Openjdk: Unexpected Exception Thrown In Regex Pattern (Libraries, 8268813)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" id="CVE-2022-21293" title="Openjdk: Incomplete Checks Of Stringbuffer And Stringbuilder During Deserialization (Libraries, 8270392)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" id="CVE-2022-21294" title="Openjdk: Incorrect Identityhashmap Size Checks During Deserialization (Libraries, 8270416)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" id="CVE-2022-21296" title="Openjdk: Incorrect Access Checks In Xmlentitymanager (Jaxp, 8270498)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" id="CVE-2022-21299" title="Openjdk: Infinite Loop Related To Incorrect Handling Of Newlines In Xmlentityscanner (Jaxp, 8270646)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" id="CVE-2022-21305" title="Openjdk: Array Indexing Issues In Lirgenerator (Hotspot, 8272014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" id="CVE-2022-21340" title="Openjdk: Excessive Resource Use When Reading Jar Manifest Attributes (Libraries, 8272026)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" id="CVE-2022-21341" title="Openjdk: Insufficient Checks When Deserializing Exceptions In Objectinputstream (Serialization, 8272236)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" id="CVE-2022-21360" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8273756)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" id="CVE-2022-21365" title="Openjdk: Integer Overflow In Bmpimagereader (Imageio, 8273838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0306" id="RHSA-2022:0306-1" title="Rhsa-2022:0306-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041400" id="2041400" title="Openjdk: Unexpected Exception Thrown In Regex Pattern (Libraries, 8268813)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041417" id="2041417" title="Openjdk: Incomplete Checks Of Stringbuffer And Stringbuilder During Deserialization (Libraries, 8270392)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041427" id="2041427" title="Openjdk: Incorrect Identityhashmap Size Checks During Deserialization (Libraries, 8270416)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041435" id="2041435" title="Openjdk: Insufficient Uri Checks In The Xslt Transformerimpl (Jaxp, 8270492)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041439" id="2041439" title="Openjdk: Incorrect Access Checks In Xmlentitymanager (Jaxp, 8270498)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041472" id="2041472" title="Openjdk: Infinite Loop Related To Incorrect Handling Of Newlines In Xmlentityscanner (Jaxp, 8270646)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041491" id="2041491" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8273756)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041785" id="2041785" title="Openjdk: Integer Overflow In Bmpimagereader (Imageio, 8273838)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041801" id="2041801" title="Openjdk: Incomplete Deserialization Class Filtering In Objectinputstream (Serialization, 8264934)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041878" id="2041878" title="Openjdk: Array Indexing Issues In Lirgenerator (Hotspot, 8272014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041884" id="2041884" title="Openjdk: Excessive Resource Use When Reading Jar Manifest Attributes (Libraries, 8272026)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041897" id="2041897" title="Openjdk: Insufficient Checks When Deserializing Exceptions In Objectinputstream (Serialization, 8272236)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0328-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution (CVE-2021-44142) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Fix CVE-2020-25717 username map [script] advice 
* Fix Kerberos authentication on standalone server with MIT realm</description><severity>critical</severity><release>Scientific Linux</release><issued date="2022-01-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-vfs-glusterfs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">df8d1340cb4aa6914bb9ea7874070288a8d22c55f39d645ad86ba5a31c259e2b</sum></package><package arch="x86_64" name="samba-common-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">ff89d32684ee759c454ef11b51ff31d4ab44179d46d5283cbf646999d16b2886</sum></package><package arch="x86_64" name="samba-winbind" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">fab6ec8990130ff39e6b8f98593599f42697a5438d68800968033b83cc51e308</sum></package><package arch="i686" name="samba-client-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">663812b7dfd973fdeb6b74305cf08921d5e8335ed5017c3df59727ebd535ea1e</sum></package><package arch="x86_64" name="samba-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">e0097d987e2824450c7a11ac3fa532ab06135fd15f38220e2dfaf8f077f038eb</sum></package><package arch="x86_64" name="ctdb" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">f2202e2e9b18f5f5f4811a7c13559b3ac8af727e7527cb65d40c3e56e4dc8c0d</sum></package><package arch="noarch" name="samba-pidl" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-18.el7_9.noarch.rpm</filename><sum type="sha256">f8e815f2673098975c445e25da7c9888356919b0f110f82a04eb99f8e829b91a</sum></package><package arch="x86_64" name="samba-winbind-clients" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">5d7f29a95b57203ec49238bd369911af9b72ba82f75a0622ea6163b35f3314b5</sum></package><package arch="x86_64" name="samba-client-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">73b297084b805368e9667009be2b75c17b73ad7f1f506494a49df3d35109a3be</sum></package><package arch="x86_64" name="samba-test" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">f7e01fd00edc4d62cd42ae41951abf4757e5ad7a1c1ed285a327907171b2ff11</sum></package><package arch="x86_64" name="libwbclient-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">bc9aa7dbffea68c98acbc88351a6327dc9ca500eb6a2479120737e1f96bd2ec2</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">a2bd52f053cd2c036687eebc3ea642bfc33aa5a38ab6f2cd55da9210d8d5516f</sum></package><package arch="x86_64" name="samba-common-tools" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">3f52d9d7e060e7b709f26c6293aba4e0ef9d9bdadb5603dd61099716d381aaa9</sum></package><package arch="x86_64" name="samba" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">ced360cb043b91623e67bee09549903842831c2eede707e98d8ae900796afb51</sum></package><package arch="noarch" name="samba-common" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-18.el7_9.noarch.rpm</filename><sum type="sha256">32f942ee5738af20289aabd52b423162b6bd093c6be041a7071238080853b8e4</sum></package><package arch="x86_64" name="samba-krb5-printing" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">01fc3a9e1c9a12f830b114d85d160f26074e02dd715a312951a1e2e5a57dc324</sum></package><package arch="x86_64" name="ctdb-tests" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">aa2e4e9aa51f6c1a5f3d4d911af3af5dce1f7d9e9baf676c7e5dd49b8790b0a7</sum></package><package arch="i686" name="samba-winbind-modules" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">875867d34e244fe641fff4e423d80b07242a8114b964f46d8557ff456311269d</sum></package><package arch="i686" name="libwbclient-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">68d0c23f13c12c8c6f6a7b10575d1bad11b066bcf4b365a1a0431c771418402c</sum></package><package arch="x86_64" name="samba-test-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">a9b7a9efd81714e4c1dc7138b23388da7c3b85057317bcb52cbea650c5720897</sum></package><package arch="i686" name="libsmbclient" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">52006ab895f07fa144f6caf9f0108d798dc7686e992b97dc18c0a110b2f2f489</sum></package><package arch="x86_64" name="libsmbclient-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">a6116873071d0e0e1a93f92da747594440df1661bab383785ab65bc054e78c8e</sum></package><package arch="i686" name="samba-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">fc07d27a24cfb4bf3fa270fffe46819d19b7e4e847365548d7a6b7ec278da24a</sum></package><package arch="x86_64" name="samba-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">ca6c55ccd41e72fed93e81bbc6fdde14ea7e8346f8fc14c7801372dba2104e65</sum></package><package arch="x86_64" name="samba-python-test" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">e6e02517c726e3d2c1b20b65f6d57c118d87f6af0d28492ede3bbbbef4c7ed40</sum></package><package arch="i686" name="libsmbclient-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">8a522401f34868ed4780b40edfc1b2fa187e1edf154c390de8b9cba7be2074b1</sum></package><package arch="x86_64" name="samba-winbind-modules" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">0910ecae72d725b7e82afd842ef1fa185e4dc42011571109c4c238d91f97c8a5</sum></package><package arch="x86_64" name="samba-python" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">1110731afb343bcb0a24bb1093644864edd9c95fd2405668431271396b824fc3</sum></package><package arch="x86_64" name="libwbclient" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">93c751bd215072f74bea32450991e179972a893d22670d3aa7734a20f8e284a4</sum></package><package arch="i686" name="samba-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">822f845e292c216299de5833eeee71b674544aa92d36be06aa9a0f5c7d5abe4d</sum></package><package arch="i686" name="samba-common-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">358abe0a4f3d1cccee4cbfdba14e4b8e9f9b249b3be50719522a14fb86e950d0</sum></package><package arch="x86_64" name="samba-dc-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">4e068894c52502219475e5eedff3ebafcb87de6e24b7d19b5f2a442fd8f0210e</sum></package><package arch="x86_64" name="libsmbclient" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">ade34f32e8b4638566cad1850941da3d52909303b61d17d40757a1f1b2d6e5c4</sum></package><package arch="i686" name="libwbclient" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">b18a8ec1660612b3ad53037f8ac744ee63d2b8a9ad2c26af2d6ed8e1b0c56b77</sum></package><package arch="i686" name="samba-python" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">d15237e0febd8fb7c185f336f4e8c1b4b5bf46db636e83fa5289b928c9ed0fb8</sum></package><package arch="i686" name="samba-test-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">2e289467abbb34185c8560a26d2cf8e48172772b3ebfd21da6cb9bbe7db22633</sum></package><package arch="x86_64" name="samba-client" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">4ae012ffc048270196283c083ddc37e49cb6867ac416c766017cbb2518edc18e</sum></package><package arch="x86_64" name="samba-dc" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">e1085bfc77c7780cde712c509a36e2fedc60a70f6c10f8a7b92c77b2baf3211c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142" id="CVE-2021-44142" title="Samba: Out-Of-Bounds Heap Read/Write Vulnerability In Vfs Module Vfs_Fruit Allows Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0328" id="RHSA-2022:0328-1" title="Rhsa-2022:0328-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2034800" id="2034800" title="4.10.16-17 Regression For Idmap_Nss Due To Missing Patch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2036595" id="2036595" title="Authentication With Kerberos Realm Not Working After Update To Samba-4.10.16-17" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2046146" id="2046146" title="Samba: Out-Of-Bounds Heap Read/Write Vulnerability In Vfs Module Vfs_Fruit Allows Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0442-1</id><title>Log4J</title><description>Log4j is a tool to help the programmer output log statements to a variety of output targets. 
Security Fix(es): 
* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305) 
* log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307) 
* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE </description><severity>important</severity><release>Scientific Linux</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="log4j" release="18.el7_4" src="log4j-1.2.17-18.el7_4.src.rpm" version="1.2.17"><filename>log4j-1.2.17-18.el7_4.noarch.rpm</filename><sum type="sha256">9a9f3a9c0c0b3c903b3eaba362782c65a7fe0960c03569ceb943974feb8dc6a0</sum></package><package arch="noarch" name="log4j-javadoc" release="18.el7_4" src="log4j-1.2.17-18.el7_4.src.rpm" version="1.2.17"><filename>log4j-javadoc-1.2.17-18.el7_4.noarch.rpm</filename><sum type="sha256">b7bce1f231766d0932ad8e7a33358ec1e403446a4c9397b9c9420d4ca87605e6</sum></package><package arch="noarch" name="log4j-manual" release="18.el7_4" src="log4j-1.2.17-18.el7_4.src.rpm" version="1.2.17"><filename>log4j-manual-1.2.17-18.el7_4.noarch.rpm</filename><sum type="sha256">461d220a1b053f5423d08f9200f10c970665b4c01c355772b0494ab003236f85</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23302" id="CVE-2022-23302" title="Log4J: Remote Code Execution In Log4J 1.X When Application Is Configured To Use Jmssink" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305" id="CVE-2022-23305" title="Log4J: Sql Injection In Log4J 1.X When Application Is Configured To Use Jdbcappender" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23307" id="CVE-2022-23307" title="Log4J: Unsafe Deserialization Flaw In Chainsaw Log Viewer" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0442" id="RHSA-2022:0442-1" title="Rhsa-2022:0442-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041949" id="2041949" title="Log4J: Remote Code Execution In Log4J 1.X When Application Is Configured To Use Jmssink" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041959" id="2041959" title="Log4J: Sql Injection In Log4J 1.X When Application Is Configured To Use Jdbcappender" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041967" id="2041967" title="Log4J: Unsafe Deserialization Flaw In Chainsaw Log Viewer" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0473-1</id><title>Aide</title><description>Security Fix(es): 
* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="aide" release="13.el7_9.1" src="aide-0.15.1-13.el7_9.1.src.rpm" version="0.15.1"><filename>aide-0.15.1-13.el7_9.1.x86_64.rpm</filename><sum type="sha256">363dd087939f8af0acae1ac7e23f6450d17e61db25f0b1ba7fc788c90b4c8c9c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417" id="CVE-2021-45417" title="Aide: Heap-Based Buffer Overflow On Outputs Larger Than B64_Buf" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0473" id="RHSA-2022:0473-1" title="Rhsa-2022:0473-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041489" id="2041489" title="Aide: Heap-Based Buffer Overflow On Outputs Larger Than B64_Buf" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0514-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.6.0 ESR. 
Security Fix(es): 
* Mozilla: Extensions could have bypassed permission confirmation during update (CVE-2022-22754) 
* Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 (CVE-2022-22764) 
* Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable (CVE-2022-22756) 
* Mozilla: Sandboxed iframes could have executed script if the parent appended elements (CVE-2022-22759) 
* Mozilla: Cross-Origin responses could be distinguished between script and  non-script content-types (CVE-2022-22760) 
* Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages (CVE-2022-22761) 
* Mozilla: Script Execution during invalid object state (CVE-2022-22763) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.6.0-1.el7_9.src.rpm" version="91.6.0"><filename>firefox-91.6.0-1.el7_9.i686.rpm</filename><sum type="sha256">006aa93e30bbb3f0008e6d0e66fd76bae445f9cceee651b211fc41064485b986</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.6.0-1.el7_9.src.rpm" version="91.6.0"><filename>firefox-91.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">02ae80929123f01f3766ad291f6c2fe454e161bf31ecb8405a78b352d9d5e857</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754" id="CVE-2022-22754" title="Mozilla: Extensions Could Have Bypassed Permission Confirmation During Update" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756" id="CVE-2022-22756" title="Mozilla: Drag And Dropping An Image Could Have Resulted In The Dropped Object Being An Executable" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759" id="CVE-2022-22759" title="Mozilla: Sandboxed Iframes Could Have Executed Script If The Parent Appended Elements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760" id="CVE-2022-22760" title="Mozilla: Cross-Origin Responses Could Be Distinguished Between Script And Non-Script Content-Types" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761" id="CVE-2022-22761" title="Mozilla: Frame-Ancestors Content Security Policy Directive Was Not Enforced For Framed Extension Pages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763" id="CVE-2022-22763" title="Mozilla: Script Execution During Invalid Object State" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764" id="CVE-2022-22764" title="Mozilla: Memory Safety Bugs Fixed In Firefox 97 And Firefox Esr 91.6" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0514" id="RHSA-2022:0514-1" title="Rhsa-2022:0514-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053236" id="2053236" title="Mozilla: Extensions Could Have Bypassed Permission Confirmation During Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053237" id="2053237" title="Mozilla: Drag And Dropping An Image Could Have Resulted In The Dropped Object Being An Executable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053238" id="2053238" title="Mozilla: Cross-Origin Responses Could Be Distinguished Between Script And Non-Script Content-Types" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053239" id="2053239" title="Mozilla: Frame-Ancestors Content Security Policy Directive Was Not Enforced For Framed Extension Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053240" id="2053240" title="Mozilla: Script Execution During Invalid Object State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053242" id="2053242" title="Mozilla: Sandboxed Iframes Could Have Executed Script If The Parent Appended Elements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053243" id="2053243" title="Mozilla: Memory Safety Bugs Fixed In Firefox 97 And Firefox Esr 91.6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0538-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.6.0. 
Security Fix(es): 
* Mozilla: Extensions could have bypassed permission confirmation during update (CVE-2022-22754) 
* Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 (CVE-2022-22764) 
* Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable (CVE-2022-22756) 
* Mozilla: Sandboxed iframes could have executed script if the parent appended elements (CVE-2022-22759) 
* Mozilla: Cross-Origin responses could be distinguished between script and  non-script content-types (CVE-2022-22760) 
* Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages (CVE-2022-22761) 
* Mozilla: Script Execution during invalid object state (CVE-2022-22763) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.6.0-1.el7_9.src.rpm" version="91.6.0"><filename>thunderbird-91.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">4cb3af64b351c65ca34d5fdd03c25ef419d792314f77aa5e8f6f9fc14bd12537</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754" id="CVE-2022-22754" title="Mozilla: Extensions Could Have Bypassed Permission Confirmation During Update" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756" id="CVE-2022-22756" title="Mozilla: Drag And Dropping An Image Could Have Resulted In The Dropped Object Being An Executable" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759" id="CVE-2022-22759" title="Mozilla: Sandboxed Iframes Could Have Executed Script If The Parent Appended Elements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760" id="CVE-2022-22760" title="Mozilla: Cross-Origin Responses Could Be Distinguished Between Script And Non-Script Content-Types" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761" id="CVE-2022-22761" title="Mozilla: Frame-Ancestors Content Security Policy Directive Was Not Enforced For Framed Extension Pages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763" id="CVE-2022-22763" title="Mozilla: Script Execution During Invalid Object State" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764" id="CVE-2022-22764" title="Mozilla: Memory Safety Bugs Fixed In Firefox 97 And Firefox Esr 91.6" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0538" id="RHSA-2022:0538-1" title="Rhsa-2022:0538-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053236" id="2053236" title="Mozilla: Extensions Could Have Bypassed Permission Confirmation During Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053237" id="2053237" title="Mozilla: Drag And Dropping An Image Could Have Resulted In The Dropped Object Being An Executable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053238" id="2053238" title="Mozilla: Cross-Origin Responses Could Be Distinguished Between Script And Non-Script Content-Types" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053239" id="2053239" title="Mozilla: Frame-Ancestors Content Security Policy Directive Was Not Enforced For Framed Extension Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053240" id="2053240" title="Mozilla: Script Execution During Invalid Object State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053242" id="2053242" title="Mozilla: Sandboxed Iframes Could Have Executed Script If The Parent Appended Elements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053243" id="2053243" title="Mozilla: Memory Safety Bugs Fixed In Firefox 97 And Firefox Esr 91.6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0609-1</id><title>Python-Pillow</title><description>Security Fix(es): 
* python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) 
* python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-pillow-sane" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-sane-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">761ee37e931defd45f9d59ca37e3faf94f054114e2a73c335d20318a23c484a9</sum></package><package arch="x86_64" name="python-pillow-doc" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-doc-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">2620c143a4a87bd90be2f59117c2af3fc51383790dca3e0887c226cdbda8a851</sum></package><package arch="i686" name="python-pillow-devel" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">d249271ef57c9faae7cffe852c28a837b96ae8f6d1b4e330c1b9792f869adf53</sum></package><package arch="x86_64" name="python-pillow-tk" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-tk-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">8bc1039d9b77f4fd8c40f8b4a8dc0c4d1959420b8fd45beeb7ed77855c53268a</sum></package><package arch="x86_64" name="python-pillow-qt" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-qt-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">ca4d0a62c0744041d7f27f56718b6d7b22a22aecfa795edc5a968ed7e508e41d</sum></package><package arch="i686" name="python-pillow" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-23.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">f24f8203b4277f2c132fa1c7259c7f537836f050dd5a5b7b5c1267fac1d3e9a1</sum></package><package arch="x86_64" name="python-pillow-devel" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">c10b296e79d6f98eecd23df8d0ab59797f6aaac7bb30bdc005023e234b01ed65</sum></package><package arch="x86_64" name="python-pillow" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">60975a21b14fe34186e2217332ed40acd52bcb74f73d679fd61f81041a9d70bd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816" id="CVE-2022-22816" title="Python-Pillow: Buffer Over-Read During Initialization Of Imagepath.Path In Path_Getbbox() In Path.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817" id="CVE-2022-22817" title="Python-Pillow: Pil.Imagemath.Eval Allows Evaluation Of Arbitrary Expressions" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0609" id="RHSA-2022:0609-1" title="Rhsa-2022:0609-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2042522" id="2042522" title="Python-Pillow: Buffer Over-Read During Initialization Of Imagepath.Path In Path_Getbbox() In Path.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2042527" id="2042527" title="Python-Pillow: Pil.Imagemath.Eval Allows Evaluation Of Arbitrary Expressions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0620-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use after free in eventpoll.c may lead to escalation of privilege  (CVE-2020-0466) 
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920) 
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155) 
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330) 
* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942) 
* kernel: out of bounds write in hid-multitouch.c may lead to escalation of  privilege (CVE-2020-0465) 
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564) 
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573) 
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Kernel with enabled BERT does not decode CPU fatal events correctly 
* SL 7.9 - Call trace seen during controller random reset on IB config 
* Infinite loop in blk_set_queue_dying() from blk_queue_for_each_rl() when another CPU races and modifies the queue's blkg_list 
* NFS client kernel crash in NFS4 backchannel transmit path - ftrace_raw_event_rpc_task_queued called from rpc_run_bc_task 
* SELinux is preventing / from mount access on the filesystem /proc</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bpftool" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">4ddf7ebc316baa4753d705cc370c3345d8e2e3cea217dc81cf612a8ba3f92af2</sum></package><package arch="noarch" name="kernel-doc" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.59.1.el7.noarch.rpm</filename><sum type="sha256">946c0d5fcb9b4946fd34699fb2ef587e861ec95bc4468acce0c7422eb10425d5</sum></package><package arch="x86_64" name="kernel-tools" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">e747d7f2f10bff1b2ca5b681279af5885c2bb1d05885c2e98b9b6ccace3d3a03</sum></package><package arch="x86_64" name="kernel-headers" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">a22a4b3e94f5b811f45bf3495d738f76e4496f5ce9330f9720e19cab12fa77c0</sum></package><package arch="x86_64" name="kernel-devel" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">6e1694a9954433eabc31e5ce15ffbb9c21ff17193421ae9bb3cb180ed1b88e34</sum></package><package arch="x86_64" name="python-perf" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">82a02931a29454361303ab1ba2c02f228f0f17bf17b57b56343a8f6cab755296</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">463f7dda5c55c053351b111748e0bcfee9f51c9ea91ad6a93d3e43ce32563911</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.59.1.el7.noarch.rpm</filename><sum type="sha256">13ffd6cfe031fa7b7ce1e900387a4a4ba21b9c079f01e6c7727b8a1154fd2504</sum></package><package arch="x86_64" name="kernel" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">60245e7c95ddaa01b92e933a97e4a19b14691634789b4da69df74ef7f7ca3e03</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">82baafb6336e0df2607de6c8cae06e5f156a0468672396aae71a1d3c2e320016</sum></package><package arch="x86_64" name="kernel-debug" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">f3d5d25fdcfeeeb70b7f01ee947bf0905277a88b74fc90cd2218a08f9879f0cd</sum></package><package arch="x86_64" name="perf" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">05f73fd3364bb8792508c37d2a3c449f175e11e27884d797aacfcdba9495655b</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">32309a82faf074334032b78dc644203d3d8cca45cb372d5b3b780391248a4504</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465" id="CVE-2020-0465" title="Kernel: Out Of Bounds Write In Hid-Multitouch.C May Lead To Escalation Of Privilege" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466" id="CVE-2020-0466" title="Kernel: Use After Free In Eventpoll.C May Lead To Escalation Of Privilege" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920" id="CVE-2021-0920" title="Kernel: Use After Free In Unix_Gc() Which Could Result In A Local Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564" id="CVE-2021-3564" title="Kernel: Double Free In Bluetooth Subsystem When The Hci Device Initialization Fails" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573" id="CVE-2021-3573" title="Kernel: Use-After-Free In Function Hci_Sock_Bound_Ioctl()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" id="CVE-2021-3752" title="Kernel: Possible Use-After-Free In Bluetooth Module" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" id="CVE-2021-4155" title="Kernel: Xfs: Raw Block Device Data Leak In Xfs_Ioc_Allocsp Ioctl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" id="CVE-2022-0330" title="Kernel: Possible Privileges Escalation Due To Missing Tlb  Flush" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942" id="CVE-2022-22942" title="Kernel: Failing Usercopy Allows For Use-After-Free Exploitation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0620" id="RHSA-2022:0620-1" title="Rhsa-2022:0620-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920471" id="1920471" title="Kernel: Out Of Bounds Write In Hid-Multitouch.C May Lead To Escalation Of Privilege" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920480" id="1920480" title="Kernel: Use After Free In Eventpoll.C May Lead To Escalation Of Privilege" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1964139" id="1964139" title="Kernel: Double Free In Bluetooth Subsystem When The Hci Device Initialization Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966578" id="1966578" title="Kernel: Use-After-Free In Function Hci_Sock_Bound_Ioctl()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1999544" id="1999544" title="Kernel: Possible Use-After-Free In Bluetooth Module" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2031930" id="2031930" title="Kernel: Use After Free In Unix_Gc() Which Could Result In A Local Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2034813" id="2034813" title="Kernel: Xfs: Raw Block Device Data Leak In Xfs_Ioc_Allocsp Ioctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2042404" id="2042404" title="Kernel: Possible Privileges Escalation Due To Missing Tlb  Flush" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044809" id="2044809" title="Kernel: Failing Usercopy Allows For Use-After-Free Exploitation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0621-1</id><title>Openldap</title><description>Security Fix(es): 
* openldap: assertion failure in Certificate List syntax validation (CVE-2020-25709) 
* openldap: assertion failure in CSN normalization with invalid input (CVE-2020-25710) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-02-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openldap-clients" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-clients-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">05df5e99db0edc47544d7e762ad1ccc43a9e553280b133221c5bd62d14fe880d</sum></package><package arch="x86_64" name="openldap" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">e9a2d83f26076ad4562fa60d1ae142d084bfdb8aa51f48827d6934385a26f72b</sum></package><package arch="x86_64" name="openldap-devel" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">97dd2cd507f6de48745ebc747fc1f4ef66077ec5b94c4052d0653c3ecfda9cba</sum></package><package arch="i686" name="openldap" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-2.4.44-25.el7_9.i686.rpm</filename><sum type="sha256">c09a5ae95c62121ac6673698e840713a44a367e395133e28ab063689d6ab80cd</sum></package><package arch="x86_64" name="openldap-servers" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-servers-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">80759d70873b2db68b01b5378b4959847eed52f08191d3ac7adc649b860fdac0</sum></package><package arch="i686" name="openldap-devel" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-25.el7_9.i686.rpm</filename><sum type="sha256">e7b7ce9bd1c91af747a625b85f9d9a3b92ad3db0145c679b6fa2094563a0edac</sum></package><package arch="x86_64" name="openldap-servers-sql" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">0177d423dfdf9c911c709ed276d8a2fac763c9e586977f47df64187a75f64803</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709" id="CVE-2020-25709" title="Openldap: Assertion Failure In Certificate List Syntax Validation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710" id="CVE-2020-25710" title="Openldap: Assertion Failure In Csn Normalization With Invalid Input" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0621" id="RHSA-2022:0621-1" title="Rhsa-2022:0621-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899675" id="1899675" title="Openldap: Assertion Failure In Certificate List Syntax Validation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899678" id="1899678" title="Openldap: Assertion Failure In Csn Normalization With Invalid Input" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0628-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: double-free of the virtual attribute context in persistent search (CVE-2021-4091) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* CSN generator can adjust wrongly the local and remote offsets used to generate a CSN</description><severity>low</severity><release>Scientific Linux</release><issued date="2022-02-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="15.el7_9" src="389-ds-base-1.3.10.2-15.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-15.el7_9.x86_64.rpm</filename><sum type="sha256">ce77ae886569507d3d8a636881b4e0227124bb4ac73d40eac1f2a1966385e86f</sum></package><package arch="x86_64" name="389-ds-base-libs" release="15.el7_9" src="389-ds-base-1.3.10.2-15.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-15.el7_9.x86_64.rpm</filename><sum type="sha256">ba9bb484a4c7dc68b007a7f520720b47331b793f36702702197405dbd144ca71</sum></package><package arch="x86_64" name="389-ds-base-devel" release="15.el7_9" src="389-ds-base-1.3.10.2-15.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-15.el7_9.x86_64.rpm</filename><sum type="sha256">9dfdde8db3f0283a5d345af8176577a6fec3f27a965a496675311bf7424936de</sum></package><package arch="x86_64" name="389-ds-base" release="15.el7_9" src="389-ds-base-1.3.10.2-15.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-15.el7_9.x86_64.rpm</filename><sum type="sha256">8101f7625070f12f155e4c6d7f4cd2807d5b8e32274999474c2c41b1c5ef2eaf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4091" id="CVE-2021-4091" title="389-Ds-Base: Double-Free Of The Virtual Attribute Context In Persistent Search" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0628" id="RHSA-2022:0628-1" title="Rhsa-2022:0628-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030307" id="2030307" title="389-Ds-Base: Double-Free Of The Virtual Attribute Context In Persistent Search" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2049812" id="2049812" title="Fix Csn Generator To Limit Time Skew Drift" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0666-1</id><title>Cyrus-Sasl</title><description>Security Fix(es): 
* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="cyrus-sasl-sql" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-sql-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">4a40ab6db225cb6ad07f8544edd60c2aee43d0d380300527cd9e9721b1aa5655</sum></package><package arch="i686" name="cyrus-sasl-gs2" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-gs2-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">b54b9528ae53f5495721c5f2c8adbebe1f1d1757fa21cb0997471353766c3b31</sum></package><package arch="i686" name="cyrus-sasl" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">967339b9fcb7b6167797be3b72d0d4ac420e9b86fe1cac909ad8c90007e11fef</sum></package><package arch="i686" name="cyrus-sasl-scram" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-scram-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">44780aad3b57cae08e6c6f2589d1dadd74ae23126c71398eb4e7c0dcf4661b1f</sum></package><package arch="i686" name="cyrus-sasl-md5" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-md5-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">54625b5af7df520aa30ec4be91f88aa4f021b99b420d85da3b0616076dd98ec3</sum></package><package arch="x86_64" name="cyrus-sasl-plain" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-plain-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">c4ab1f09bb0e4a614871d5c4266e4d18ae88d3df3d57c15772abe292c23d30aa</sum></package><package arch="i686" name="cyrus-sasl-ldap" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-ldap-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">eea9f5dcf16322f440e908b8ff15b291d0d39e817c42673dae424714e236531d</sum></package><package arch="x86_64" name="cyrus-sasl-gssapi" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-gssapi-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">a83b5a1977b9c7b3538b2d3b624a9bdff4f7c505dcf42a0c31fb95aefd07aca0</sum></package><package arch="i686" name="cyrus-sasl-ntlm" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-ntlm-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">ccc7f7145072c2a6b4b86fc3df68c3763801dfcc27186be6ab680e26920dbc0b</sum></package><package arch="i686" name="cyrus-sasl-plain" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-plain-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">6b94a459b9b883c37968d0f20fb8600ba428e4ccfdf66d797b0a56a3b4083963</sum></package><package arch="x86_64" name="cyrus-sasl-scram" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-scram-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">a1ddbd0a6fd6f2e074c3df9a2c124bda9d81b9d7d605b0dd8805c215c9ae78db</sum></package><package arch="x86_64" name="cyrus-sasl" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">c0788227ddc4b5349fd59d2c921669ff2943c5a5b26986440b5d1f61b4c8ad16</sum></package><package arch="i686" name="cyrus-sasl-sql" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-sql-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">8904a5ee533579ee4ca9881e15f251c6de2eb088fcbace9481a4ad7adb46377d</sum></package><package arch="x86_64" name="cyrus-sasl-lib" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-lib-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">2aba1129ef910065dc0a8e69295d1ad6bcd5b1f97ff2e3ac3f3be667594a3363</sum></package><package arch="x86_64" name="cyrus-sasl-devel" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-devel-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">0230c24753ea28baaaab7ff9b4f2dd408029bf893ea6aefab59034f0d2c5cf3f</sum></package><package arch="x86_64" name="cyrus-sasl-gs2" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-gs2-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">31a2440a98e41391a5fbab60a833229fa2e70ecaae47167d83359eeaa8b9a48e</sum></package><package arch="i686" name="cyrus-sasl-lib" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-lib-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">4853a8c3bdbd9490959789e6a00ef507002c7d2c16d8867c64dbc95fb0f7d430</sum></package><package arch="i686" name="cyrus-sasl-devel" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-devel-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">b30208f1a17274345596864583a4697e3110646204022787474b3351697d666c</sum></package><package arch="x86_64" name="cyrus-sasl-ntlm" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-ntlm-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">7d64db4096bcc01a8587a9d5aa2f22616c979dbeba0e1294b9345628a704ac5f</sum></package><package arch="i686" name="cyrus-sasl-gssapi" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-gssapi-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">4bec982ea813540557f0a52138f8b3e09698020541719c8e783ad57eeacfcf3e</sum></package><package arch="x86_64" name="cyrus-sasl-ldap" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-ldap-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">fa614ba1acea9591194c1a17162400866c22b9f4a231e45166d352f0907915d6</sum></package><package arch="x86_64" name="cyrus-sasl-md5" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-md5-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">c4202509cdb3a97da1c6aa221566733f33c1afc61e8c1067d5ad1f4c4bb6d742</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" id="CVE-2022-24407" title="Cyrus-Sasl: Failure To Properly Escape Sql Input Allows An Attacker To Execute Arbitrary Sql Commands" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0666" id="RHSA-2022:0666-1" title="Rhsa-2022:0666-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2055326" id="2055326" title="Cyrus-Sasl: Failure To Properly Escape Sql Input Allows An Attacker To Execute Arbitrary Sql Commands" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0824-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.7.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485) 
* Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486) 
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code  execution (CVE-2022-25235) 
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) 
* expat: Integer overflow in storeRawNames() (CVE-2022-25315) 
* Mozilla: Use-after-free in text reflows (CVE-2022-26381) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383) 
* Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384) 
* Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387) 
* Mozilla: Temporary files downloaded to /tmp and accessible by other local  users (CVE-2022-26386) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Firefox 91.3.0-1 Language packs installed at /usr/lib64/firefox/langpacks  cannot be used any more</description><severity>critical</severity><release>Scientific Linux</release><issued date="2022-03-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="3.el7_9" src="firefox-91.7.0-3.el7_9.src.rpm" version="91.7.0"><filename>firefox-91.7.0-3.el7_9.i686.rpm</filename><sum type="sha256">17a6c0c6940f2d8c32861a0fc4523fd49af44c0790833f5ecef02ac63dd6a45d</sum></package><package arch="x86_64" name="firefox" release="3.el7_9" src="firefox-91.7.0-3.el7_9.src.rpm" version="91.7.0"><filename>firefox-91.7.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">96d651cc95589c55f2343d3ecd7a126c34b8e500a6666c5633ca1071f58c1547</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" id="CVE-2022-25235" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" id="CVE-2022-25236" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" id="CVE-2022-25315" title="Expat: Integer Overflow In Storerawnames()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" id="CVE-2022-26381" title="Mozilla: Use-After-Free In Text Reflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" id="CVE-2022-26383" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" id="CVE-2022-26384" title="Mozilla: Iframe Allow-Scripts Sandbox Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" id="CVE-2022-26386" title="Mozilla: Temporary Files Downloaded To /Tmp And Accessible By Other Local Users" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" id="CVE-2022-26387" title="Mozilla: Time-Of-Check Time-Of-Use Bug When Verifying Add-On Signatures" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485" id="CVE-2022-26485" title="Mozilla: Use-After-Free In Xslt Parameter Processing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486" id="CVE-2022-26486" title="Mozilla: Use-After-Free In Webgpu Ipc Framework" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0824" id="RHSA-2022:0824-1" title="Rhsa-2022:0824-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030190" id="2030190" title="Firefox 91.3.0-1 Language Packs Installed At /Usr/Lib64/Firefox/Langpacks Cannot Be Used Any More" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056363" id="2056363" title="Expat: Integer Overflow In Storerawnames()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056366" id="2056366" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056370" id="2056370" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061735" id="2061735" title="Mozilla: Use-After-Free In Webgpu Ipc Framework" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061736" id="2061736" title="Mozilla: Use-After-Free In Xslt Parameter Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062220" id="2062220" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062221" id="2062221" title="Mozilla: Iframe Allow-Scripts Sandbox Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062222" id="2062222" title="Mozilla: Time-Of-Check Time-Of-Use Bug When Verifying Add-On Signatures" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062223" id="2062223" title="Mozilla: Use-After-Free In Text Reflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062224" id="2062224" title="Mozilla: Temporary Files Downloaded To /Tmp And Accessible By Other Local Users" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0850-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.7.0. 
Security Fix(es): 
* Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485) 
* Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486) 
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code  execution (CVE-2022-25235) 
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) 
* expat: Integer overflow in storeRawNames() (CVE-2022-25315) 
* Mozilla: Use-after-free in text reflows (CVE-2022-26381) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383) 
* Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384) 
* Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387) 
* thunderbird: Crafted email could trigger an out-of-bounds write (CVE-2022-0566) 
* Mozilla: Temporary files downloaded to /tmp and accessible by other local  users (CVE-2022-26386) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-03-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-91.7.0-2.el7_9.src.rpm" version="91.7.0"><filename>thunderbird-91.7.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">86ae44e13f4bd6644c5f83d8e7149c802629dad4f6a1110dbb096a7fdcd2a9e9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0566" id="CVE-2022-0566" title="Thunderbird: Crafted Email Could Trigger An Out-Of-Bounds Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" id="CVE-2022-25235" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" id="CVE-2022-25236" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" id="CVE-2022-25315" title="Expat: Integer Overflow In Storerawnames()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" id="CVE-2022-26381" title="Mozilla: Use-After-Free In Text Reflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" id="CVE-2022-26383" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" id="CVE-2022-26384" title="Mozilla: Iframe Allow-Scripts Sandbox Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" id="CVE-2022-26386" title="Mozilla: Temporary Files Downloaded To /Tmp And Accessible By Other Local Users" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" id="CVE-2022-26387" title="Mozilla: Time-Of-Check Time-Of-Use Bug When Verifying Add-On Signatures" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485" id="CVE-2022-26485" title="Mozilla: Use-After-Free In Xslt Parameter Processing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486" id="CVE-2022-26486" title="Mozilla: Use-After-Free In Webgpu Ipc Framework" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0850" id="RHSA-2022:0850-1" title="Rhsa-2022:0850-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2055591" id="2055591" title="Thunderbird: Crafted Email Could Trigger An Out-Of-Bounds Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056363" id="2056363" title="Expat: Integer Overflow In Storerawnames()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056366" id="2056366" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056370" id="2056370" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061735" id="2061735" title="Mozilla: Use-After-Free In Webgpu Ipc Framework" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061736" id="2061736" title="Mozilla: Use-After-Free In Xslt Parameter Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062220" id="2062220" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062221" id="2062221" title="Mozilla: Iframe Allow-Scripts Sandbox Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062222" id="2062222" title="Mozilla: Time-Of-Check Time-Of-Use Bug When Verifying Add-On Signatures" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062223" id="2062223" title="Mozilla: Use-After-Free In Text Reflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062224" id="2062224" title="Mozilla: Temporary Files Downloaded To /Tmp And Accessible By Other Local Users" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1045</id><title>Important: Httpd Security Update</title><description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-03-24 18:33:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="httpd" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>httpd-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">0be74a09f7461ff46cf66401b9db4e4f429b1d4c55952455a8a7a012b728b7c5</sum></package><package arch="x86_64" name="httpd-devel" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">60c899c7fb2088fb25771d3a18c096b7e85fa343a21f99fde105751d5a78d593</sum></package><package arch="noarch" name="httpd-manual" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-97.sl7_9.5.noarch.rpm</filename><sum type="sha256">53b457c68db12d30eacfe372d40554be842ac10db5568f6576574b28cb6b17d0</sum></package><package arch="x86_64" name="httpd-tools" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">b7000fea8dd4c7ddfbcbf98b95ae7e20330fac2554404d59f1dae79ca3d7010c</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">61b42447228c8c4f96ca083fa8874f87393f20064bc6cd7702d5f287107eefc9</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">d03ed63db929825bd4f0f81df35f02c5cc4ad1a05c7693b42b125a8062a69e08</sum></package><package arch="x86_64" name="mod_ldap" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">b01bda47f0ad5df1efa995409759bdaddba56709ca2790177a1a6aa5758086e2</sum></package><package arch="x86_64" name="mod_session" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">6f9b6c8d39161243b4d782e6b55549de922d0e2d4a56d057373bb28a5577206c</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720" id="CVE-2022-22720" title="Cve-2022-22720" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1045" id="RHSA-2022:1045" title="Important: Httpd Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1066-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-03-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-devel" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">0cd7ba148b371e943111ce6eaafbd00eb24c265bbea3545e4cd8f77a4ae0f51a</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-25.el7_9.i686.rpm</filename><sum type="sha256">fb9d5a2a4777a3570d2826570ce98f67c3e75b01d06a859c7d6521ee75d229f8</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">7a90aa94a06406b97cb00a55e2ecfbafb31d9967e76907ec7ad4f954a7f573cb</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-25.el7_9.i686.rpm</filename><sum type="sha256">e9318045f52dc83193ff047b76fee6f3d06ee2092cd7d6752fdb1a7577be3f42</sum></package><package arch="x86_64" epoch="1" name="openssl" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">da8f28a2c9b1940ce0ee2c745cda3f2774bcf3a426350a26903f29b40b9b2fc9</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">e58ebf01a83537b5b6979be59b9bad2552b07874b4ad317037287dbc9e127fd4</sum></package><package arch="i686" epoch="1" name="openssl-static" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-25.el7_9.i686.rpm</filename><sum type="sha256">2c9af1aa25ed8e8d12035e176bd3bb1648e3ae05903620f768fd41c83a3cbc27</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">9f0061c22cec08a203b08ecc08351efa083a2a438c995b153ae072748bad5263</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" id="CVE-2022-0778" title="Openssl: Infinite Loop In Bn_Mod_Sqrt() Reachable When Parsing Certificates" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1066" id="RHSA-2022:1066-1" title="Rhsa-2022:1066-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062202" id="2062202" title="Openssl: Infinite Loop In Bn_Mod_Sqrt() Reachable When Parsing Certificates" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1069-1</id><title>Expat</title><description>Security Fix(es): 
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code  execution (CVE-2022-25235) 
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) 
* expat: Integer overflow in storeRawNames() (CVE-2022-25315) 
* expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960) 
* expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) 
* expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) 
* expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) 
* expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) 
* expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) 
* expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) 
* expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) 
* expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-03-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="expat" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-2.1.0-14.el7_9.i686.rpm</filename><sum type="sha256">db2260a5a84c3b7184b5bc609698720947e449b84b89688dabf5254d2cccfd5b</sum></package><package arch="x86_64" name="expat" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-2.1.0-14.el7_9.x86_64.rpm</filename><sum type="sha256">5257fbac66b901d8eb514bbc0d61e19302e6e789bf5666bed2840c6fdad50bab</sum></package><package arch="i686" name="expat-devel" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-14.el7_9.i686.rpm</filename><sum type="sha256">91bc2f24c563682181148502aeee7002e20d1745a3fda375947d0b68298e6f9c</sum></package><package arch="x86_64" name="expat-devel" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-14.el7_9.x86_64.rpm</filename><sum type="sha256">7a36b0bcb1c2ea46cf6c80ffe6d0f37a8767d514bfa2c8fdd27828766f1db9d5</sum></package><package arch="i686" name="expat-static" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-14.el7_9.i686.rpm</filename><sum type="sha256">d92b1587b263f4e350840712870cce1abf384381120b621f913f6d5dbb426c56</sum></package><package arch="x86_64" name="expat-static" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-14.el7_9.x86_64.rpm</filename><sum type="sha256">09fb4769dc9a2d5d253ffddaab86e4eccc87bb0b9fc7a551f5e0a68ea04526c6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960" id="CVE-2021-45960" title="Expat: Large Number Of Prefixed Xml Attributes On A Single Tag Can Crash Libexpat" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143" id="CVE-2021-46143" title="Expat: Integer Overflow In Doprolog In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822" id="CVE-2022-22822" title="Expat: Integer Overflow In Addbinding In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823" id="CVE-2022-22823" title="Expat: Integer Overflow In Build_Model In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824" id="CVE-2022-22824" title="Expat: Integer Overflow In Defineattribute In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825" id="CVE-2022-22825" title="Expat: Integer Overflow In Lookup In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826" id="CVE-2022-22826" title="Expat: Integer Overflow In Nextscaffoldpart In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827" id="CVE-2022-22827" title="Expat: Integer Overflow In Storeatts In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852" id="CVE-2022-23852" title="Expat: Integer Overflow In Function Xml_Getbuffer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" id="CVE-2022-25235" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" id="CVE-2022-25236" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" id="CVE-2022-25315" title="Expat: Integer Overflow In Storerawnames()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1069" id="RHSA-2022:1069-1" title="Rhsa-2022:1069-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044451" id="2044451" title="Expat: Large Number Of Prefixed Xml Attributes On A Single Tag Can Crash Libexpat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044455" id="2044455" title="Expat: Integer Overflow In Doprolog In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044457" id="2044457" title="Expat: Integer Overflow In Addbinding In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044464" id="2044464" title="Expat: Integer Overflow In Build_Model In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044467" id="2044467" title="Expat: Integer Overflow In Defineattribute In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044479" id="2044479" title="Expat: Integer Overflow In Lookup In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044484" id="2044484" title="Expat: Integer Overflow In Nextscaffoldpart In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044488" id="2044488" title="Expat: Integer Overflow In Storeatts In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044613" id="2044613" title="Expat: Integer Overflow In Function Xml_Getbuffer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056363" id="2056363" title="Expat: Integer Overflow In Storerawnames()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056366" id="2056366" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056370" id="2056370" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1198-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in RDMA listen() (CVE-2021-4028) 
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Adding new kernel entry in grub configuration file only after generation of new initramfs 
* Cannot mount DFS shares on SL7 
* SL7.9 - zcrypt DD: Toleration for new IBM Z Crypto Hardware 
* kernel panic at skb_free_datagram_locked on 3.10.0-1160.45.1.el7 
* Lots of tasks are getting stuck in I/O wait waiting on the buffer_head locked by the task that is busy shrinking slab for freeing pages - 3 patches to fs/buffer.c 
* [SL 7.9 Bug] x86/platform/uv: Add more to secondary CPU kdump info 
* REGRESSION System panicking in __kmalloc+0x94 from a freelist issue introduced by a block patch. 
Enhancement(s): 
* SL7.9 - kernel: Add support for CPU-MF counter second version 7</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">406efbc3cf0166a399a7d123eed3829f0305f3888628008d5f289e23f55434ba</sum></package><package arch="x86_64" name="kernel-debug" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">80cd64455bb40e7230c5834ba674fd80d234e6325414d1543edf005b294e1eb5</sum></package><package arch="x86_64" name="kernel-headers" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">517ce9e691730d5103e7ebeb16e7d616d639f3412a4166060d58155d06914b65</sum></package><package arch="noarch" name="kernel-doc" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.62.1.el7.noarch.rpm</filename><sum type="sha256">472ce233645dedc0eebab070fbf54bae4b5148b689de439d1d25334317906ea1</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">61998c4bdf5a790273293189b472775556b614d1a70988f5d81351674a1ace67</sum></package><package arch="x86_64" name="kernel-tools" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">303b2a8f6f95bc0b6637d696f898944f6c027bfb04037d268485220bc1c94045</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">c85e6501cee65b1a7867aad8fc811600b899f71817e88c6369e8d15b949f42dd</sum></package><package arch="x86_64" name="python-perf" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">e63786d546be238c2b8da96134eb0cedf37afae465088eec5b916e839cc1d102</sum></package><package arch="x86_64" name="kernel-devel" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">958f9f19d97851d8cb365895dc33e57e8611f9101896ae8f0485bd687711505d</sum></package><package arch="x86_64" name="perf" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">189d3795653adaada253018e99cdf4046cbdf6e4cb50fec91aee8c705b1c9fe1</sum></package><package arch="x86_64" name="kernel" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">5f4b87416f08fe2293227436c3860a7b2ba649264a9c16c0113bb22067048556</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.62.1.el7.noarch.rpm</filename><sum type="sha256">775ad768127a77f40b4feeeaffeff7bce31181bb02dedca2e3d3f02090e693f1</sum></package><package arch="x86_64" name="bpftool" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">e87ae6fa8c463e8a14daa06961a93b0f67bf3d0114b5293a66376a79d7827672</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028" id="CVE-2021-4028" title="Kernel: Use-After-Free In Rdma Listen()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" id="CVE-2021-4083" title="Kernel: Fget: Check That The Fd Still Exists After Getting A Ref To It" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1198" id="RHSA-2022:1198-1" title="Rhsa-2022:1198-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2027201" id="2027201" title="Kernel: Use-After-Free In Rdma Listen()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2029923" id="2029923" title="Kernel: Fget: Check That The Fd Still Exists After Getting A Ref To It" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1284-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.8.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097) 
* Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281) 
* Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289) 
* Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196) 
* Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282) 
* Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285) 
* Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713) 
* Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.8.0-1.el7_9.src.rpm" version="91.8.0"><filename>firefox-91.8.0-1.el7_9.i686.rpm</filename><sum type="sha256">9daf2e0220ee23c0eb4357894ba156262a6e09e3109e488ba28530e5f63b3b26</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.8.0-1.el7_9.src.rpm" version="91.8.0"><filename>firefox-91.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">e8b3036efd6a8b939ed121e073fb065f3518b7c43761e4d4610afd5f829b7422</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" id="CVE-2022-1097" title="Mozilla: Use-After-Free In Nsstoken Objects" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" id="CVE-2022-1196" title="Mozilla: Use-After-Free After Vr Process Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" id="CVE-2022-24713" title="Mozilla: Denial Of Service Via Complex Regular Expressions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" id="CVE-2022-28281" title="Mozilla: Out Of Bounds Write Due To Unexpected Webauthn Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" id="CVE-2022-28282" title="Mozilla: Use-After-Free In Documentl10N::Translatedocument" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" id="CVE-2022-28285" title="Mozilla: Incorrect Aliasset Used In Jit Codegen" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" id="CVE-2022-28286" title="Mozilla: Iframe Contents Could Be Rendered Outside The Border" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" id="CVE-2022-28289" title="Mozilla: Memory Safety Bugs Fixed In Firefox 99 And Firefox Esr 91.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1284" id="RHSA-2022:1284-1" title="Rhsa-2022:1284-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072559" id="2072559" title="Mozilla: Use-After-Free In Nsstoken Objects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072560" id="2072560" title="Mozilla: Out Of Bounds Write Due To Unexpected Webauthn Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072561" id="2072561" title="Mozilla: Use-After-Free After Vr Process Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072562" id="2072562" title="Mozilla: Use-After-Free In Documentl10N::Translatedocument" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072563" id="2072563" title="Mozilla: Incorrect Aliasset Used In Jit Codegen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072564" id="2072564" title="Mozilla: Iframe Contents Could Be Rendered Outside The Border" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072565" id="2072565" title="Mozilla: Denial Of Service Via Complex Regular Expressions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072566" id="2072566" title="Mozilla: Memory Safety Bugs Fixed In Firefox 99 And Firefox Esr 91.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1302-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.8.0. 
Security Fix(es): 
* Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097) 
* Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281) 
* Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289) 
* Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196) 
* Mozilla: OpenPGP revocation information was ignored (CVE-2022-1197) 
* Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282) 
* Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285) 
* Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713) 
* Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.8.0-1.el7_9.src.rpm" version="91.8.0"><filename>thunderbird-91.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a8f369bab052fd85ca6c24f4845174873218547a34eca1081b7d1f7fbfd54a8e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" id="CVE-2022-1097" title="Mozilla: Use-After-Free In Nsstoken Objects" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" id="CVE-2022-1196" title="Mozilla: Use-After-Free After Vr Process Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" id="CVE-2022-1197" title="Mozilla: Openpgp Revocation Information Was Ignored" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" id="CVE-2022-24713" title="Mozilla: Denial Of Service Via Complex Regular Expressions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" id="CVE-2022-28281" title="Mozilla: Out Of Bounds Write Due To Unexpected Webauthn Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" id="CVE-2022-28282" title="Mozilla: Use-After-Free In Documentl10N::Translatedocument" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" id="CVE-2022-28285" title="Mozilla: Incorrect Aliasset Used In Jit Codegen" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" id="CVE-2022-28286" title="Mozilla: Iframe Contents Could Be Rendered Outside The Border" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" id="CVE-2022-28289" title="Mozilla: Memory Safety Bugs Fixed In Firefox 99 And Firefox Esr 91.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1302" id="RHSA-2022:1302-1" title="Rhsa-2022:1302-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072559" id="2072559" title="Mozilla: Use-After-Free In Nsstoken Objects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072560" id="2072560" title="Mozilla: Out Of Bounds Write Due To Unexpected Webauthn Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072561" id="2072561" title="Mozilla: Use-After-Free After Vr Process Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072562" id="2072562" title="Mozilla: Use-After-Free In Documentl10N::Translatedocument" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072563" id="2072563" title="Mozilla: Incorrect Aliasset Used In Jit Codegen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072564" id="2072564" title="Mozilla: Iframe Contents Could Be Rendered Outside The Border" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072565" id="2072565" title="Mozilla: Denial Of Service Via Complex Regular Expressions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072566" id="2072566" title="Mozilla: Memory Safety Bugs Fixed In Firefox 99 And Firefox Esr 91.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072963" id="2072963" title="Mozilla: Openpgp Revocation Information Was Ignored" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1440</id><title>Important: Java-11-Openjdk Security, Bug Fix, And Enhancement Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.15.0.9). (BZ#2047531)
Security Fix(es):
* OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-04-25 15:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-jmods-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">6454698240bf2414d9a427d50bfc9066d1309fdcbe3ce9fa46c08a34531f9bbd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">8fa1db6e7c41fa21f266379f8373d0b5adc94af525b0575000f9170a7897a208</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-demo-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">d61e76b91d98389d1d69d1f777395aee32f352d27aa5f69c3639b96170927768</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">98d063dd81a3e10cd455c9d22c4dc9842526ea4739341844b058af143868df19</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">6d2bd0cca07b5da3a949c5ab58b8051ef22f9135c194bf6fda871c55252c2f07</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.332.b09-1.el7_9.noarch.rpm</filename><sum type="sha256">0b4e7241ab25be75d62adfd35cf567580d3d778a707cc2c392baad4c0de5d283</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">8d0531bfee4d52a9205fcbe8c1e3910652d26957d10214d8dc1720242cc418cb</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-src-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">c9862419593933f057e7e52a04628c31a91afce54ca20a94e75eb7d8bd4a0c4e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">a98dbfd8c7b4aa2d34e972234a01c35ec374d4a01453b24030c1e5700c1acbd7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-headless-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">7ab27c142f078cd661ad9bc2986a25b0e965ed9c6c2954c9b727a4a57b770a70</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">a3536da9d95f234070c5588f129862e6f76e115ab6b9be0e0ed7abae77a491de</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-headless-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">91e1ca80adf9e1c006a587215b8360444486c64e21a21595cd9570ee112d0e18</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">5c9a44c800e5518d218e575dd86612f06ec48a06d1a192896b8ad93b5432c46f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-devel-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">44882dc9edf6502327ae1d7483c4c5e94eaadef140eab876563e545cf588ef69</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">8f5bb8aedb103c83eb41e2cd01541e3745b3ce1c2d18a5fb4c96004573354d46</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">790a422311f4bf7e96ab4f70596e3b15081723e03c10ea5c91be361f32dd00c3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">865c25db988d67ea0239d79eff5574b232513b88c54e86fde9768de3420f9849</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">7ec8ac0d1a0ade3c045fdb70e701cdedaed51839fc794a6cb646da9d2b62542d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-src-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">a5f11cb569cd225057fbf7d36db853276edbdfdc8d4e95f8a3eb45dd816ede0c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">bab1d9c934572ad5e702d3f290c5c3be3db749006e8a4f19023d1d3b43195706</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-demo-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">55b5258d010f86e7ef8ad2a49179e102cd71c4c281fba741c65ee9d72290c800</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">3c2d12a6fde5807197875fa4f3abab4b4b71c2fbedeebc8b74fa5a929612c5a7</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.332.b09-1.el7_9.noarch.rpm</filename><sum type="sha256">2fbc92e494e095f0bd519994a99ff2dfdef3fc82db35669b1e868e8797c27de2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">9a27c396f5c20920f4e3b2135d207f022048ac7d2c8e92a7cc7045804a36ff0a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">bf12e7ca8f7d3ee8b42c8fea4863251f25fd0688e622119a9e2d164965268b03</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">29a58554a3c82b76a03f260483b39de964ed2434f54de298b631d7291f5f760a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-devel-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">e6070418b3a57822693d1ba54ab0835d412b97de8f31738d137e1a8affd67c06</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">5c4c150e5d70ef3e359f5cc3c001dd34c5aaa52972b76db6c0cf7f99c09e1480</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-jmods-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">f79e6a2d077080d73e3d2e89419e063fed74e795be7eb14bd794be7b6251727f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">1be91c9ffdaf54ab97c3e8ca6e8f8cc761d71df030821976129d0b975e8fff74</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">1d5c0b1629cd24b0ef8772abd047e970432905649620632b32b5b45f33f397d8</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" id="CVE-2022-21426" title="Cve-2022-21426" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" id="CVE-2022-21434" title="Cve-2022-21434" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" id="CVE-2022-21443" title="Cve-2022-21443" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" id="CVE-2022-21476" title="Cve-2022-21476" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" id="CVE-2022-21496" title="Cve-2022-21496" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1440" id="RHSA-2022:1440" title="Important: Java-11-Openjdk Security, Bug Fix, And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2047531" id="2047531" title="2047531 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-04, 11.0.15) [Rhel-7]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1440-1</id><title>Java-11-Openjdk</title><description>The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.15.0.9). 
Security Fix(es): 
* OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) 
* OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) 
* OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) 
* OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)  (CVE-2022-21443) 
* OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">dde57732b2c43cf4fdab923ca25a26111486754cfef4b0b7ca9ae4bcc59c8f03</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">dcf924eeb44ba991e6d0ffdc06e5f8ae80a9fefa7034a3c4866cf7a56ef3c8e3</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-jmods-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">29225e443a09ceaff69bc83a0172c0287a57389bdfb51b9f19e612e440bbc71a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-jmods-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">37e80356b5ec3561aa58ed22a4c8d39eaffc5111a7931dc05f8879fc880c2f66</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-devel-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">d13851971149cf7063229db1256e4079cd602a757bdc196b01db2a3eaf888f61</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">f941c1ab71d54b68b3cd2560fd5340cba62675deeffa9fac9cb2f663de30c5cd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-demo-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">b5babd89afc050fb8e0be904f5fc61c9d551ed427a72d4a77d367e415776704d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">54de3796cc3eb5b01d2b60bcc97b9c8fcf29dcc4a70a8c7031fe6f55cc0f8ec6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-src-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">3bdef62cb5951dfd6d4561608d29e54e027eb399227e9d066e8ea0a7da7feb73</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-headless-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">85b1c49c7c73aa8d4fd021959cbe18c3ee1cdbc75268a0e7b212f1852f0db2d7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-src-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">89d22efd78517f02dbf39aea0f45dfa8d261012bd910d7059012cd53fc6ce28b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-headless-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">187b0eeca1aa3710529d42aec35f95d4cb2a0dadf7089b297512c4cc604a213c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">b78a1c26e55cc35b94e51b14ef910876e24a17e7ddd20f0a9bd230ae6e72f3a1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-devel-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">7fcf28f2386c7cab99c5bfba993434b55e925ac83db8d627ccbcad6dfeff416f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-static-libs-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">abd20afa7d4d5874006ad51aafa8bb71c41048ac8be43642c5913d0f9f007bc7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-demo-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">fd618325e092d5dbe7ad7e7e7c3178a8335f1d2c1d9a9fc05962f6703df8648c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">43425d585ac388ff95d0d6bcd4d5a80b9c13c0d6df3756a31d89fa50920fe4d9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" id="CVE-2022-21426" title="Openjdk: Unbounded Memory Allocation When Compiling Crafted Xpath Expressions (Jaxp, 8270504)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" id="CVE-2022-21434" title="Openjdk: Improper Object-To-String Conversion In Annotationinvocationhandler (Libraries, 8277672)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" id="CVE-2022-21443" title="Openjdk: Missing Check For Negative Objectidentifier (Libraries, 8275151)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" id="CVE-2022-21476" title="Openjdk: Defective Secure Validation In Apache Santuario (Libraries, 8278008)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" id="CVE-2022-21496" title="Openjdk: Uri Parsing Inconsistencies (Jndi, 8278972)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1440" id="RHSA-2022:1440-1" title="Rhsa-2022:1440-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075788" id="2075788" title="Openjdk: Unbounded Memory Allocation When Compiling Crafted Xpath Expressions (Jaxp, 8270504)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075793" id="2075793" title="Openjdk: Missing Check For Negative Objectidentifier (Libraries, 8275151)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075836" id="2075836" title="Openjdk: Improper Object-To-String Conversion In Annotationinvocationhandler (Libraries, 8277672)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075842" id="2075842" title="Openjdk: Defective Secure Validation In Apache Santuario (Libraries, 8278008)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075849" id="2075849" title="Openjdk: Uri Parsing Inconsistencies (Jndi, 8278972)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1487-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) 
* OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) 
* OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) 
* OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)  (CVE-2022-21443) 
* OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">2fe3ed816e42aacabe3ccbe30a458b41470ed1419f25c24f07ea37c2faf16ed5</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">3203b6dee98f8021866c807ba0389dcaa94cafdc001720e86135d61b1a826b4a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">913f70c9c5bfb2b4c63dffc455ee70363bca51fed32a63bc552c3686c1f9c34f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">1a08683eeb8f7d7245725793b3ccc5011b5feb349ad97a59b6c1a0e096d56abc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">c8caa6d338c2691c4c131f970d3a3bafbc26d9445e85f57ca905fa0635c2dbbf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">7555bf4db79a8e019a6757b8b3f7ade934a602a05f711d0ffbf0d17991047a1c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">a911a1eb974b106334d39bd84e8394b666788f50805e0b0bb675cf086a5e860e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">2d032b3722bef7b4fcc6722509f7c105c742079e69ed5a2ab9bce66e7d870c22</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9.noarch.rpm</filename><sum type="sha256">4e216459910b462af79016c6fe77c7d44608501de95f10dd93bebc4968ad96e0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">25e1e8033161283a58f8deaa404326d267095868935d1d9bb839a38c004046a7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">46fa43016dca217f7f31aec060edb30aaabaa1f50ae8a70ec3ec0508cb7d8aa7</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9.noarch.rpm</filename><sum type="sha256">65ba24f4ef25a4833d1a39799602766dc85b2c018c8928d31ab4a2001c59b578</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">8b035e58f6ea351ea93babda6b4925d6cfe96b5e169f9548028831c8042ad0c1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">982688a1575aa0bf1f4c1adaf81c61564d7a2dea3bd7394bcbccc2f8a6997719</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" id="CVE-2022-21426" title="Openjdk: Unbounded Memory Allocation When Compiling Crafted Xpath Expressions (Jaxp, 8270504)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" id="CVE-2022-21434" title="Openjdk: Improper Object-To-String Conversion In Annotationinvocationhandler (Libraries, 8277672)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" id="CVE-2022-21443" title="Openjdk: Missing Check For Negative Objectidentifier (Libraries, 8275151)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" id="CVE-2022-21476" title="Openjdk: Defective Secure Validation In Apache Santuario (Libraries, 8278008)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" id="CVE-2022-21496" title="Openjdk: Uri Parsing Inconsistencies (Jndi, 8278972)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1487" id="RHSA-2022:1487-1" title="Rhsa-2022:1487-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075788" id="2075788" title="Openjdk: Unbounded Memory Allocation When Compiling Crafted Xpath Expressions (Jaxp, 8270504)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075793" id="2075793" title="Openjdk: Missing Check For Negative Objectidentifier (Libraries, 8275151)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075836" id="2075836" title="Openjdk: Improper Object-To-String Conversion In Annotationinvocationhandler (Libraries, 8277672)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075842" id="2075842" title="Openjdk: Defective Secure Validation In Apache Santuario (Libraries, 8278008)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075849" id="2075849" title="Openjdk: Uri Parsing Inconsistencies (Jndi, 8278972)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1541-1</id><title>Maven-Shared-Utils</title><description>Security Fix(es): 
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="maven-shared-utils" release="4.el7_9" src="maven-shared-utils-0.4-4.el7_9.src.rpm" version="0.4"><filename>maven-shared-utils-0.4-4.el7_9.noarch.rpm</filename><sum type="sha256">635ca492b99ed733728a56d3d5882fc5a367ffcae2bcd0e5730ecba596d48a99</sum></package><package arch="noarch" name="maven-shared-utils-javadoc" release="4.el7_9" src="maven-shared-utils-0.4-4.el7_9.src.rpm" version="0.4"><filename>maven-shared-utils-javadoc-0.4-4.el7_9.noarch.rpm</filename><sum type="sha256">71ba926f15d5118380601b4e3c13e09b1aa51462571713302735e558c25aeb62</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29599" id="CVE-2022-29599" title="Maven-Shared-Utils: Command Injection Via Commandline Class" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1541" id="RHSA-2022:1541-1" title="Rhsa-2022:1541-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2066479" id="2066479" title="Maven-Shared-Utils: Command Injection Via Commandline Class" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1703-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.9.0 ESR. 
Security Fix(es): 
* Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909) 
* Mozilla: iframe Sandbox bypass (CVE-2022-29911) 
* Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914) 
* Mozilla: Leaking browser history with CSS variables (CVE-2022-29916) 
* Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917) 
* Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.9.0-1.el7_9.src.rpm" version="91.9.0"><filename>firefox-91.9.0-1.el7_9.i686.rpm</filename><sum type="sha256">2848a8eb37faa0aa648b62965b19fa466dc4968ed927d3545154545215d52e98</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.9.0-1.el7_9.src.rpm" version="91.9.0"><filename>firefox-91.9.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">c11a6c9ed11495d188649eb84f2251a15dbf86228fce394a8c8b9fd278ddb811</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" id="CVE-2022-29909" title="Mozilla: Bypassing Permission Prompt In Nested Browsing Contexts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" id="CVE-2022-29911" title="Mozilla: Iframe Sandbox Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" id="CVE-2022-29912" title="Mozilla: Reader Mode Bypassed Samesite Cookies" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" id="CVE-2022-29914" title="Mozilla: Fullscreen Notification Bypass Using Popups" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" id="CVE-2022-29916" title="Mozilla: Leaking Browser History With Css Variables" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" id="CVE-2022-29917" title="Mozilla: Memory Safety Bugs Fixed In Firefox 100 And Firefox Esr 91.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1703" id="RHSA-2022:1703-1" title="Rhsa-2022:1703-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081468" id="2081468" title="Mozilla: Fullscreen Notification Bypass Using Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081469" id="2081469" title="Mozilla: Bypassing Permission Prompt In Nested Browsing Contexts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081470" id="2081470" title="Mozilla: Leaking Browser History With Css Variables" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081471" id="2081471" title="Mozilla: Iframe Sandbox Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081472" id="2081472" title="Mozilla: Reader Mode Bypassed Samesite Cookies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081473" id="2081473" title="Mozilla: Memory Safety Bugs Fixed In Firefox 100 And Firefox Esr 91.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1725-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.9.0. 
Security Fix(es): 
* Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909) 
* Mozilla: iframe Sandbox bypass (CVE-2022-29911) 
* Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914) 
* Mozilla: Leaking browser history with CSS variables (CVE-2022-29916) 
* Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917) 
* Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912) 
* Mozilla: Speech Synthesis feature not properly disabled (CVE-2022-29913) 
* Mozilla: Incorrect security status shown after viewing an attached email (CVE-2022-1520) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-91.9.0-3.el7_9.src.rpm" version="91.9.0"><filename>thunderbird-91.9.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">806c8e4eebfcbbae90a9ac8a9d27e401ae2e6bc8bd1e64d871a4c55478605cc9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" id="CVE-2022-1520" title="Mozilla: Incorrect Security Status Shown After Viewing An Attached Email" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" id="CVE-2022-29909" title="Mozilla: Bypassing Permission Prompt In Nested Browsing Contexts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" id="CVE-2022-29911" title="Mozilla: Iframe Sandbox Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" id="CVE-2022-29912" title="Mozilla: Reader Mode Bypassed Samesite Cookies" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" id="CVE-2022-29913" title="Mozilla: Speech Synthesis Feature Not Properly Disabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" id="CVE-2022-29914" title="Mozilla: Fullscreen Notification Bypass Using Popups" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" id="CVE-2022-29916" title="Mozilla: Leaking Browser History With Css Variables" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" id="CVE-2022-29917" title="Mozilla: Memory Safety Bugs Fixed In Firefox 100 And Firefox Esr 91.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1725" id="RHSA-2022:1725-1" title="Rhsa-2022:1725-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081468" id="2081468" title="Mozilla: Fullscreen Notification Bypass Using Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081469" id="2081469" title="Mozilla: Bypassing Permission Prompt In Nested Browsing Contexts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081470" id="2081470" title="Mozilla: Leaking Browser History With Css Variables" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081471" id="2081471" title="Mozilla: Iframe Sandbox Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081472" id="2081472" title="Mozilla: Reader Mode Bypassed Samesite Cookies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081473" id="2081473" title="Mozilla: Memory Safety Bugs Fixed In Firefox 100 And Firefox Esr 91.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2082037" id="2082037" title="Mozilla: Incorrect Security Status Shown After Viewing An Attached Email" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2082038" id="2082038" title="Mozilla: Speech Synthesis Feature Not Properly Disabled" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:2191-1</id><title>Gzip</title><description>Security Fix(es): 
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gzip" release="11.el7_9" src="gzip-1.5-11.el7_9.src.rpm" version="1.5"><filename>gzip-1.5-11.el7_9.x86_64.rpm</filename><sum type="sha256">31892df32fdf2c1c290d6e2f41169b2cd56ddbf8bb2635c07416c00979a4d59f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" id="CVE-2022-1271" title="Gzip: Arbitrary-File-Write Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:2191" id="RHSA-2022:2191-1" title="Rhsa-2022:2191-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2073310" id="2073310" title="Gzip: Arbitrary-File-Write Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:2213-1</id><title>Zlib</title><description>Security Fix(es): 
* zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="zlib-static" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-static-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">59fbd7dba8ac257ebd36d9e43a3f1416134e2034c3c64053397dbe35092f29b1</sum></package><package arch="x86_64" name="minizip" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>minizip-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">2e4eacbb6adc7522697701ef62afef3212274d563cf10b9e556fe8e2eb341577</sum></package><package arch="i686" name="minizip-devel" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>minizip-devel-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">c8243e2e7c06b397b7d8f8f5f6c0baa8b8a83a37618e96d4ee46974a0648dabe</sum></package><package arch="i686" name="zlib-static" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-static-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">6edb526f889c296e32c1573d68fe243759299b4a8bd2a0b7a29328695ae05769</sum></package><package arch="i686" name="minizip" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>minizip-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">cedb4974fde50c300966cefb68799eca467fa942ae921647be90c1e11a3df00f</sum></package><package arch="i686" name="zlib-devel" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-devel-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">ce8da1a1626e6648d5557d6566ebc67e0c2b61e841c2c501e15f7bd867bb3236</sum></package><package arch="x86_64" name="minizip-devel" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>minizip-devel-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">f9cb6bb4c9f5556c891e8eb177f3b35dbc5dd20ad58256f93e4e2a9a9bea0614</sum></package><package arch="x86_64" name="zlib-devel" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-devel-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">ecb3672456577e44acfee7cb131be9acb9781ba1433f4e1fadb18f7d6dcd700c</sum></package><package arch="x86_64" name="zlib" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">4a4de3032bfcef31be4e2cb07dc924293521d9ce6500d17c45e618af7d3f725a</sum></package><package arch="i686" name="zlib" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">e2a8ad745347fbfb35c38b8084fa7d8918c8affc9387f5a45f9e60c32279597d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" id="CVE-2018-25032" title="Zlib: A Flaw Found In Zlib When Compressing (Not Decompressing) Certain Inputs" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:2213" id="RHSA-2022:2213-1" title="Rhsa-2022:2213-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2067945" id="2067945" title="Zlib: A Flaw Found In Zlib When Compressing (Not Decompressing) Certain Inputs" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4642-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* kernel panic in mlx5_ib driver SL/CentOS 7.9 VM 
* [SL-7.9] Get Call Trace about "kernel/timer.c:1270 requeue_timers+0x15e/0x170" on specified AMD x86_64 system 
* kernel NULL pointer dereference while calling dma_pool_alloc from the mlx5_core module 
* Rhel 7.9 NFS Clients takes very long time to resume operations in an NFS Server failover scenario 
* perf stat shows unsupported counters for Intel IceLake cpu</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">e35107177f0d41b11598d0eb6b700fcb26220351f583b2b7f5822f6e8c3362d6</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">c1c6d696b1cf50d8c90b8fc28de93bb4281a51a243e473fa57f0bcfe6868b343</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">9f3f654ab1782eebfee4bdfa9ef84640016992e36a13770aae9d8e3a91d9f05f</sum></package><package arch="x86_64" name="kernel-headers" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">69d183d419048a8f44a63d9c6ecefdc9c66a024a3fd1a977a52242a10d9a6c94</sum></package><package arch="noarch" name="kernel-doc" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.66.1.el7.noarch.rpm</filename><sum type="sha256">fb8d00a98dbf8ad64df3c2fc3bd71875f16f26f4bb63d75569f3b23119e1cf82</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.66.1.el7.noarch.rpm</filename><sum type="sha256">7f4a207a45581b1089c7584be3d0e47920eaa1daf4259f06c2f224b5ee6b89d4</sum></package><package arch="x86_64" name="kernel-devel" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">335d8182f93343fe1c06d24c240894cce9ff2641ae03e4be023af248320211b0</sum></package><package arch="x86_64" name="kernel" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">f9b73f3c142bad4396ca930a46fb0a9936ea56f78daee78c5a5567eef626765d</sum></package><package arch="x86_64" name="python-perf" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">d4df399b78ab27a497b8ba2cdda2b6c2429c137b5b75c0e9e7b7dda9aa1f7f5c</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">8213bb277061bfe1bd0374654b7af0c9bbe1fc417794613469281c45e94ad21a</sum></package><package arch="x86_64" name="kernel-tools" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">ba2389506b7fdd928f026feeaa2e7c45f63e70a263360669cd5246259d9b9c22</sum></package><package arch="x86_64" name="kernel-debug" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">6d3e4617ed58016b72c8c1e794509f65512f2895935e7d5228b82fe0544f18dd</sum></package><package arch="x86_64" name="bpftool" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">ce07c0edcf1471992df12486aaab0ac6c59c962c91ec2488f8080eb5527c2895</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" id="CVE-2022-0492" title="Kernel: Cgroups V1 Release_Agent Feature May Allow Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4642" id="RHSA-2022:4642-1" title="Rhsa-2022:4642-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2051505" id="2051505" title="Kernel: Cgroups V1 Release_Agent Feature May Allow Privilege Escalation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4729-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.9.1 ESR. 
Security Fix(es): 
* Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution (CVE-2022-1529) 
* Mozilla: Prototype pollution in Top-Level Await implementation (CVE-2022-1802) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>critical</severity><release>Scientific Linux</release><issued date="2022-05-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.9.1-1.el7_9.src.rpm" version="91.9.1"><filename>firefox-91.9.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">80d46609a8cb319359dc3b90af371283b148cd4a302a84bd648bf361c9c9aea0</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.9.1-1.el7_9.src.rpm" version="91.9.1"><filename>firefox-91.9.1-1.el7_9.i686.rpm</filename><sum type="sha256">341d17218763d9e521c93047f4952bfec6d6c04b14f9ee0a68fa7349fb40c0e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" id="CVE-2022-1529" title="Mozilla: Untrusted Input Used In Javascript Object Indexing, Leading To Prototype Pollution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" id="CVE-2022-1802" title="Mozilla: Prototype Pollution In Top-Level Await Implementation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4729" id="RHSA-2022:4729-1" title="Rhsa-2022:4729-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2089217" id="2089217" title="Mozilla: Prototype Pollution In Top-Level Await Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2089218" id="2089218" title="Mozilla: Untrusted Input Used In Javascript Object Indexing, Leading To Prototype Pollution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4730-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.9.1. 
Security Fix(es): 
* Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution (CVE-2022-1529) 
* Mozilla: Prototype pollution in Top-Level Await implementation (CVE-2022-1802) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>critical</severity><release>Scientific Linux</release><issued date="2022-05-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.9.1-1.el7_9.src.rpm" version="91.9.1"><filename>thunderbird-91.9.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">cdc32e32092757a426f9207dcc7a53db29fa5b0ed6c7fe4fe65314f3cefa263e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" id="CVE-2022-1529" title="Mozilla: Untrusted Input Used In Javascript Object Indexing, Leading To Prototype Pollution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" id="CVE-2022-1802" title="Mozilla: Prototype Pollution In Top-Level Await Implementation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4730" id="RHSA-2022:4730-1" title="Rhsa-2022:4730-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2089217" id="2089217" title="Mozilla: Prototype Pollution In Top-Level Await Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2089218" id="2089218" title="Mozilla: Untrusted Input Used In Javascript Object Indexing, Leading To Prototype Pollution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4803-1</id><title>Rsyslog</title><description>Security Fix(es): 
* rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rsyslog-snmp" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-snmp-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">e3b0542fcbf988eefd3b6ec087cdc45c6c1d06f14f3be8bade5e4f1c7e417672</sum></package><package arch="noarch" name="rsyslog-doc" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-doc-8.24.0-57.el7_9.3.noarch.rpm</filename><sum type="sha256">72657e2cc5db25197b8f643d0203f53eacd2005e6b211e2317675382eba39e4f</sum></package><package arch="x86_64" name="rsyslog-libdbi" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-libdbi-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">966ee3885d60b27edf283acd40da8dcb43f82fdf2e4b85775808e4b8c01a91a1</sum></package><package arch="x86_64" name="rsyslog-pgsql" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-pgsql-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">432a8f1b6e2be0243afc23f667afa34872e02b7b9f961628c3236a7b055798af</sum></package><package arch="x86_64" name="rsyslog-elasticsearch" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-elasticsearch-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">fcd136bc321c3355d226340c99e3966a302f34476f045f5224335f637d397567</sum></package><package arch="x86_64" name="rsyslog-relp" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-relp-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">8d3db0683773333cd93c29adbc38376f2d4b47539b0e573028504b08227ea593</sum></package><package arch="x86_64" name="rsyslog-gnutls" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-gnutls-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">dbf02a5d0fc4e537ba4efc857f2665213c6d3dc3b84c5f62b6c3ad8978d8464a</sum></package><package arch="x86_64" name="rsyslog-udpspoof" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-udpspoof-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">5a6260ae1d9c425f4d0e094e01ceaec7a20afea7464ddd37219ce2d86bd42e06</sum></package><package arch="x86_64" name="rsyslog-crypto" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-crypto-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">35077c3289d295a5cc412a627a2b361607dd36c687b16a2bacdb2b21dc2e4f8a</sum></package><package arch="x86_64" name="rsyslog-mmnormalize" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmnormalize-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">644b8ec956e3eaf20423f42b6d09c3a84f1bb42e71e37bd362e0d61c078e75be</sum></package><package arch="x86_64" name="rsyslog" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">79a351c99a2feaa59d46d57843b73a33626af0b2e0c02e36b4d1433b854eb632</sum></package><package arch="x86_64" name="rsyslog-mmkubernetes" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmkubernetes-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">00a56045395dda8d104195a547d518a18fbbb6b03cf23b40a1184906eef1ca51</sum></package><package arch="x86_64" name="rsyslog-mmjsonparse" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmjsonparse-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">46edf8d0738f0a3f00cf1a2780d87e0c6f0bcadc90cd137ecfc30e86571fd90c</sum></package><package arch="x86_64" name="rsyslog-gssapi" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-gssapi-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">af9469c429db2f02c98a5491498b5eeba67965d937b0accd39b9d6cb868dab10</sum></package><package arch="x86_64" name="rsyslog-mmaudit" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmaudit-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">04c51d5cf3f33a846a9791cd706b8f717e28c9d6d49c3ddf46901600b0250b60</sum></package><package arch="x86_64" name="rsyslog-mysql" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mysql-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">a9b52a799cc93dc6d8a1d9f9a194ab5e3dddc39cf22bdb4345a3b0d92c532bb7</sum></package><package arch="x86_64" name="rsyslog-kafka" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-kafka-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">88d2d81c4c6f9f0eecb5f904d4ffbe92f99cf545734a558e3b44642c1185dd87</sum></package><package arch="x86_64" name="rsyslog-mmsnmptrapd" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmsnmptrapd-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">111275aab2b392d0e2100b7b793077752a97d9753336c6bb69b6cc7692137d6a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903" id="CVE-2022-24903" title="Rsyslog: Heap-Based Overflow In Tcp Syslog Server" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4803" id="RHSA-2022:4803-1" title="Rhsa-2022:4803-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081353" id="2081353" title="Rsyslog: Heap-Based Overflow In Tcp Syslog Server" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4870-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.10.0 ESR. 
Security Fix(es): 
* Mozilla: Cross-Origin resource's length leaked (CVE-2022-31736) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738) 
* Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740) 
* Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741) 
* Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747) 
* Mozilla: Querying a WebAuthn token with a large number of allowCredential  entries may have leaked cross-origin information (CVE-2022-31742) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.10.0-1.el7_9.src.rpm" version="91.10.0"><filename>firefox-91.10.0-1.el7_9.i686.rpm</filename><sum type="sha256">2c73cfaf9b93a6e35b7206601d3a4f4d633b93e520ced5f8479a6eaacad266e1</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.10.0-1.el7_9.src.rpm" version="91.10.0"><filename>firefox-91.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">f439b4056dcf344e92989d85360bc52336ce8ec8f3c89db5ab19f2b3688e3b3e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" id="CVE-2022-31736" title="Mozilla: Cross-Origin Resource'S Length Leaked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" id="CVE-2022-31737" title="Mozilla: Heap Buffer Overflow In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" id="CVE-2022-31738" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" id="CVE-2022-31740" title="Mozilla: Register Allocation Problem In Wasm On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" id="CVE-2022-31741" title="Mozilla: Uninitialized Variable Leads To Invalid Memory Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" id="CVE-2022-31742" title="Mozilla: Querying A Webauthn Token With A Large Number Of Allowcredential Entries May Have Leaked Cross-Origin Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" id="CVE-2022-31747" title="Mozilla: Memory Safety Bugs Fixed In Firefox 101 And Firefox Esr 91.10" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4870" id="RHSA-2022:4870-1" title="Rhsa-2022:4870-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092018" id="2092018" title="Mozilla: Cross-Origin Resource'S Length Leaked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092019" id="2092019" title="Mozilla: Heap Buffer Overflow In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092021" id="2092021" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092023" id="2092023" title="Mozilla: Register Allocation Problem In Wasm On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092024" id="2092024" title="Mozilla: Uninitialized Variable Leads To Invalid Memory Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092025" id="2092025" title="Mozilla: Querying A Webauthn Token With A Large Number Of Allowcredential Entries May Have Leaked Cross-Origin Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092026" id="2092026" title="Mozilla: Memory Safety Bugs Fixed In Firefox 101 And Firefox Esr 91.10" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4891-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.10.0. 
Security Fix(es): 
* Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email (CVE-2022-1834) 
* Mozilla: Cross-Origin resource's length leaked (CVE-2022-31736) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738) 
* Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740) 
* Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741) 
* Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747) 
* Mozilla: Querying a WebAuthn token with a large number of allowCredential  entries may have leaked cross-origin information (CVE-2022-31742) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.10.0-1.el7_9.src.rpm" version="91.10.0"><filename>thunderbird-91.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ba4945587137c1e9dc2da7e1bc1c6993113a8dac1a2b1af76a9b473672c62f6b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" id="CVE-2022-1834" title="Mozilla: Braille Space Character Caused Incorrect Sender Email To Be Shown For A Digitally Signed Email" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" id="CVE-2022-31736" title="Mozilla: Cross-Origin Resource'S Length Leaked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" id="CVE-2022-31737" title="Mozilla: Heap Buffer Overflow In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" id="CVE-2022-31738" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" id="CVE-2022-31740" title="Mozilla: Register Allocation Problem In Wasm On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" id="CVE-2022-31741" title="Mozilla: Uninitialized Variable Leads To Invalid Memory Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" id="CVE-2022-31742" title="Mozilla: Querying A Webauthn Token With A Large Number Of Allowcredential Entries May Have Leaked Cross-Origin Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" id="CVE-2022-31747" title="Mozilla: Memory Safety Bugs Fixed In Firefox 101 And Firefox Esr 91.10" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4891" id="RHSA-2022:4891-1" title="Rhsa-2022:4891-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092018" id="2092018" title="Mozilla: Cross-Origin Resource'S Length Leaked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092019" id="2092019" title="Mozilla: Heap Buffer Overflow In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092021" id="2092021" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092023" id="2092023" title="Mozilla: Register Allocation Problem In Wasm On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092024" id="2092024" title="Mozilla: Uninitialized Variable Leads To Invalid Memory Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092025" id="2092025" title="Mozilla: Querying A Webauthn Token With A Large Number Of Allowcredential Entries May Have Leaked Cross-Origin Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092026" id="2092026" title="Mozilla: Memory Safety Bugs Fixed In Firefox 101 And Firefox Esr 91.10" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092416" id="2092416" title="Mozilla: Braille Space Character Caused Incorrect Sender Email To Be Shown For A Digitally Signed Email" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4930-1</id><title>Python-Twisted-Web</title><description>Security Fix(es): 
* python-twisted: possible http request smuggling (CVE-2022-24801) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-twisted-web" release="8.el7_9" src="python-twisted-web-12.1.0-8.el7_9.src.rpm" version="12.1.0"><filename>python-twisted-web-12.1.0-8.el7_9.x86_64.rpm</filename><sum type="sha256">45f5bb7fea6902e35eae90d069a93ba49ba7a7c8b0d7c6f2a34eca6fe131ad25</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24801" id="CVE-2022-24801" title="Python-Twisted: Possible Http Request Smuggling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4930" id="RHSA-2022:4930-1" title="Rhsa-2022:4930-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2073114" id="2073114" title="Python-Twisted: Possible Http Request Smuggling" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5052-1</id><title>Xz</title><description>Security Fix(es): 
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xz-lzma-compat" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-lzma-compat-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">178be34e860e9391f07fb01816dc05a79e1d95a398f26b2c998d0ab621a3d073</sum></package><package arch="x86_64" name="xz-libs" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-libs-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">c07f0cf3977e760679b6626d88a5d1b88ca2540ac6659c3fac74da5802341b2e</sum></package><package arch="i686" name="xz-devel" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-devel-5.2.2-2.el7_9.i686.rpm</filename><sum type="sha256">c3af6af75d9eb8a997dbf96539b8e37a276a8a0ffbcfef2f939c6a06fd427277</sum></package><package arch="x86_64" name="xz" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">6e66b5705a7befffe0701195106d9d9638602fe7a80d54eaf4c8d1ffe1a694f8</sum></package><package arch="i686" name="xz-compat-libs" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-compat-libs-5.2.2-2.el7_9.i686.rpm</filename><sum type="sha256">ed52b79ebc47ec936fe2e8e2e44dbe888f3707ed6067f473b3b0a9d052a08823</sum></package><package arch="x86_64" name="xz-devel" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-devel-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">c17801a5adcda0f76ceaa856dad0568a25406374520a3b96f926c24c5a265e58</sum></package><package arch="x86_64" name="xz-compat-libs" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-compat-libs-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">50573e4a0c567e0c6000a558a5bcab49ffe16fba1444253b351a628eddefe282</sum></package><package arch="i686" name="xz-libs" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-libs-5.2.2-2.el7_9.i686.rpm</filename><sum type="sha256">4d87b16c5e91c6169ef120acd7f925bc140876fafc133af49bc086c190652862</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" id="CVE-2022-1271" title="Gzip: Arbitrary-File-Write Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5052" id="RHSA-2022:5052-1" title="Rhsa-2022:5052-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2073310" id="2073310" title="Gzip: Arbitrary-File-Write Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5162-1</id><title>Postgresql</title><description>Security Fix(es): 
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-docs" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-docs-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">785f51347d3f6b380a212837cb270c0a462763304285d9b5438448c697e15cc4</sum></package><package arch="x86_64" name="postgresql-libs" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">59a4789756e0cb29822cf7c8eedf629e9a67e43b2f7fdc5ace1c9e7fab1f80b1</sum></package><package arch="i686" name="postgresql-static" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-8.el7_9.i686.rpm</filename><sum type="sha256">19a07b567067664944f2a8aa7df574c970184b11ff0949579e157421cdc9cbf0</sum></package><package arch="x86_64" name="postgresql-static" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">46f46125b8d1815a091900c4fd80a0c838a8b68206c399563ceb3f43b871bb78</sum></package><package arch="x86_64" name="postgresql-upgrade" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-upgrade-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">725c7494ff796b3c5e721187771a2307352f91738e5133e33f50b808b0086158</sum></package><package arch="i686" name="postgresql-libs" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-8.el7_9.i686.rpm</filename><sum type="sha256">59efe390ae8c13b421732a56cac09f26690d633efe1e8259bfda1a3f1b9ddfe3</sum></package><package arch="x86_64" name="postgresql-test" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-test-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">288f93adc82232378274a624afc629b402d6c4c006626541c72b9a59371c424d</sum></package><package arch="x86_64" name="postgresql-plpython" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plpython-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">163973d9e3846607713d6a2ace3e29a9c00ae46a46253a9f27f59c85baf77f15</sum></package><package arch="x86_64" name="postgresql-pltcl" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-pltcl-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">e18690e1d0d9ed6c6818e4198375da98920ad266acc9ec7e7f7b80a7672bde27</sum></package><package arch="i686" name="postgresql-devel" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-8.el7_9.i686.rpm</filename><sum type="sha256">22a34c80bc19cdf540fb3a0900201c5cf18863efa3f38199343f68896bf238f0</sum></package><package arch="x86_64" name="postgresql-server" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-server-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">2214e31cdf76b0bb8a399a80ba4662ee4381140c1ea62320bf50df2b2791cacf</sum></package><package arch="x86_64" name="postgresql-plperl" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plperl-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">d0df9bbf5eb5e754c22643007a07ccddaecc7096edfc03c2be248f79d3d004cf</sum></package><package arch="x86_64" name="postgresql-devel" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">bd33822d9eab3ceb26128fb525db894fd6a9bdae21371c94d3db6ffdebb7f006</sum></package><package arch="i686" name="postgresql" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-8.el7_9.i686.rpm</filename><sum type="sha256">a9e3e531f3c674b2e4ddf3502b6c32d4d2950af50c050ef968c76de7c353d803</sum></package><package arch="x86_64" name="postgresql-contrib" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-contrib-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">273899f72e24eb777a82216f169a06d18ff1c6c48f0e29b154863757c5bf84c9</sum></package><package arch="x86_64" name="postgresql" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">2d2e7d29446e98fabe696c38228d61c6ac6e18ce1c0a79776cc4cef11974b3d0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552" id="CVE-2022-1552" title="Postgresql: Autovacuum, Reindex, And Others Omit &quot;Security Restricted Operation&quot; Sandbox" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5162" id="RHSA-2022:5162-1" title="Rhsa-2022:5162-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081126" id="2081126" title="Postgresql: Autovacuum, Reindex, And Others Omit &quot;Security Restricted Operation&quot; Sandbox" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5232-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729) 
* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* XFS inode cluster corruption 
* sock: sock_dequeue_err_skb() needs hard irq safety 
* libceph: fix potential use-after-free on linger ping and resends</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-doc" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm</filename><sum type="sha256">1d77baa3d81ea83477d62c49e015be49732465ccd422059db318efc757ae8ecb</sum></package><package arch="x86_64" name="bpftool" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">7b066f7a2dc6af9f4b4060613ecd118b217cf11f81913b38bf5a654015dbde5c</sum></package><package arch="x86_64" name="kernel-headers" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">4f556e1061c61af28b9174b25e07f65c43819121efcec015882d984e8b49602d</sum></package><package arch="x86_64" name="kernel-devel" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">4db12f15fab31a6a5df99c09f89b5c62e83290fd0a61ac8ce5f9ee5e8a497421</sum></package><package arch="x86_64" name="kernel" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">3214a01be7fda555894dc93053890a4100c0aa1c4886e7842ab7cfed376144bb</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">d7e26d24d3a734275e8bc9ade31b1ae3adee803dd46db10d57b6d85660494a00</sum></package><package arch="x86_64" name="kernel-debug" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">ce17a9c6466362c175e0bddc060062332de9e637d4caafe8cc983a0a1e8be3c3</sum></package><package arch="x86_64" name="kernel-tools" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">2750f1392b10f38d70e95e3d8a78ab25c2518d9ca45d85bd30f300db19593d81</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">41aae026c1a9b1193e21d29b67d9c83918da3d7d027d6727b85a9c04c391c7a3</sum></package><package arch="x86_64" name="python-perf" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">1910321931f2f0a442171a982d11ef4f6be5450336c0eac6287f89f65c267cae</sum></package><package arch="x86_64" name="perf" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">2e5767fc21747cc1001ad9293110f8fa39ea33383d025c625bc65a026ba6166c</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">72dd92debffef227aee347e7b48b4bd26a8154b7ccdefab4a2ded440a376859e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm</filename><sum type="sha256">76398d724a76043908976a33be347fffb46febcf045b39309fde9250498c8d91</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" id="CVE-2022-1729" title="Kernel: Race Condition In Perf_Event_Open Leads To Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966" id="CVE-2022-1966" title="Kernel: A Use-After-Free Write In The Netfilter Subsystem Can Lead To Privilege Escalation To Root" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5232" id="RHSA-2022:5232-1" title="Rhsa-2022:5232-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2086753" id="2086753" title="Kernel: Race Condition In Perf_Event_Open Leads To Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092427" id="2092427" title="Kernel: A Use-After-Free Write In The Netfilter Subsystem Can Lead To Privilege Escalation To Root" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5234-1</id><title>Python-Virtualenv</title><description>Security Fix(es): 
* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-06-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-virtualenv" release="7.el7_9" src="python-virtualenv-15.1.0-7.el7_9.src.rpm" version="15.1.0"><filename>python-virtualenv-15.1.0-7.el7_9.noarch.rpm</filename><sum type="sha256">e91998c8834ef7665475ce23d9b11eab0bdc361c2c595c7bfd57fe9b5b07c32f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916" id="CVE-2019-20916" title="Python-Pip: Directory Traversal In _Download_Http_Url() Function In Src/Pip/_Internal/Download.Py" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5234" id="RHSA-2022:5234-1" title="Rhsa-2022:5234-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868135" id="1868135" title="Python-Pip: Directory Traversal In _Download_Http_Url() Function In Src/Pip/_Internal/Download.Py" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5235-1</id><title>Python</title><description>Security Fix(es): 
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) 
* python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) 
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-06-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-devel" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">3d67098ab806f5b36a32ad07f418c0c3f336177fecd3e69332aa47bc841b6a38</sum></package><package arch="x86_64" name="python-test" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-test-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">9ca0cb5713f710cfc4281aca00b03121ceb3897e17d7ec58aa7f16223533b1e8</sum></package><package arch="i686" name="python-libs" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-92.el7_9.i686.rpm</filename><sum type="sha256">722f37223adac9b05f452755a17f11db6e32a48fba2e9792e205b81b20544032</sum></package><package arch="x86_64" name="python-debug" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">15793b35b8d9dd822f51a7b2890c5dd76e634259ba7abf19e7e9ad88d9976c66</sum></package><package arch="x86_64" name="python-tools" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">119abd1b66cb24e612fc399c80af7c5040169ac2078bac8446f57f81061f2ecc</sum></package><package arch="x86_64" name="tkinter" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">75ff0121c4b61bdb679b3d1f5464a924ab6ba3e304da49651d948c557741b1b6</sum></package><package arch="x86_64" name="python" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">d1d50f02f72bf047ef8fff0a6150e0eeb1eaee72a27fdf8ab41acb42f10b6915</sum></package><package arch="x86_64" name="python-libs" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">a9b403e98099f7e6ff63ac8e5712b378ec290ce13c7357fe1704c302bac41f4b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116" id="CVE-2020-26116" title="Python: Crlf Injection Via Http Request Method In Httplib/Http.Client" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137" id="CVE-2020-26137" title="Python-Urllib3: Crlf Injection Via Http Request Method" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177" id="CVE-2021-3177" title="Python: Stack-Based Buffer Overflow In Pycarg_Repr In _Ctypes/Callproc.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5235" id="RHSA-2022:5235-1" title="Rhsa-2022:5235-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883014" id="1883014" title="Python: Crlf Injection Via Http Request Method In Httplib/Http.Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883632" id="1883632" title="Python-Urllib3: Crlf Injection Via Http Request Method" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1918168" id="1918168" title="Python: Stack-Based Buffer Overflow In Pycarg_Repr In _Ctypes/Callproc.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5239-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918) 
* 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Log the Auto Member invalid regex rules in the LDAP errors log. 
Enhancement(s): 
* RFE - Provide an option to abort an Auto Member rebuild task.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-06-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-libs" release="16.el7_9" src="389-ds-base-1.3.10.2-16.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-16.el7_9.x86_64.rpm</filename><sum type="sha256">2b6f8fd9d6c2d5d6a400605ebb49e89a22b1b307288eb098908b1cad691b2e17</sum></package><package arch="x86_64" name="389-ds-base-devel" release="16.el7_9" src="389-ds-base-1.3.10.2-16.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-16.el7_9.x86_64.rpm</filename><sum type="sha256">d226bedc44c7f9d2cf5192e322e7e0a9cd1656c3b68aa8973ec6ed482f9264e5</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="16.el7_9" src="389-ds-base-1.3.10.2-16.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-16.el7_9.x86_64.rpm</filename><sum type="sha256">748b47079f3d10641d78e5f1e3e63bc24b6e874fab0706073bc364f561147ab0</sum></package><package arch="x86_64" name="389-ds-base" release="16.el7_9" src="389-ds-base-1.3.10.2-16.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-16.el7_9.x86_64.rpm</filename><sum type="sha256">0ed083ae9c6791c4b9eee5fb1eb5e7cd1b22a74f433b86a1c7975cda5e9afcbb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0918" id="CVE-2022-0918" title="389-Ds-Base: Sending Crafted Message Could Result In Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0996" id="CVE-2022-0996" title="389-Ds-Base: Expired Password Was Still Allowed To Access The Database" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5239" id="RHSA-2022:5239-1" title="Rhsa-2022:5239-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2018153" id="2018153" title="Rfe - Provide An Option To Abort An Auto Member Rebuild Task." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2055815" id="2055815" title="389-Ds-Base: Sending Crafted Message Could Result In Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2064769" id="2064769" title="389-Ds-Base: Expired Password Was Still Allowed To Access The Database" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5479-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.11 ESR. 
Security Fix(es): 
* Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468) 
* Mozilla: Use-after-free in nsSHistory (CVE-2022-34470) 
* Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479) 
* Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484) 
* Mozilla: Undesired attributes could be set as part of prototype pollution  (CVE-2022-2200) 
* Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744) 
* Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472) 
* Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-07-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-91.11.0-2.el7_9.src.rpm" version="91.11.0"><filename>firefox-91.11.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">5e83f5f9e9a731890b9ba7d60465f40904736502213b1f154fd5e104105844be</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-91.11.0-2.el7_9.src.rpm" version="91.11.0"><filename>firefox-91.11.0-2.el7_9.i686.rpm</filename><sum type="sha256">6ff4fc0a21fa4e5fa5f25bc3c28d56596b6699302f3d9bc0ae2c5671b679e254</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" id="CVE-2022-2200" title="Mozilla: Undesired Attributes Could Be Set As Part Of Prototype Pollution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" id="CVE-2022-31744" title="Mozilla: Csp Bypass Enabling Stylesheet Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" id="CVE-2022-34468" title="Mozilla: Csp Sandbox Header Without `Allow-Scripts` Can Be Bypassed Via Retargeted Javascript: Uri" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" id="CVE-2022-34470" title="Mozilla: Use-After-Free In Nsshistory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" id="CVE-2022-34472" title="Mozilla: Unavailable Pac File Resulted In Ocsp Requests Being Blocked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" id="CVE-2022-34479" title="Mozilla: A Popup Window Could Be Resized In A Way To Overlay The Address Bar With Web Content" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" id="CVE-2022-34481" title="Mozilla: Potential Integer Overflow In Replaceelementsat" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" id="CVE-2022-34484" title="Mozilla: Memory Safety Bugs Fixed In Firefox 102 And Firefox Esr 91.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5479" id="RHSA-2022:5479-1" title="Rhsa-2022:5479-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102161" id="2102161" title="Mozilla: A Popup Window Could Be Resized In A Way To Overlay The Address Bar With Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102162" id="2102162" title="Mozilla: Use-After-Free In Nsshistory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102163" id="2102163" title="Mozilla: Csp Sandbox Header Without `Allow-Scripts` Can Be Bypassed Via Retargeted Javascript: Uri" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102164" id="2102164" title="Mozilla: Potential Integer Overflow In Replaceelementsat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102165" id="2102165" title="Mozilla: Csp Bypass Enabling Stylesheet Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102166" id="2102166" title="Mozilla: Unavailable Pac File Resulted In Ocsp Requests Being Blocked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102168" id="2102168" title="Mozilla: Undesired Attributes Could Be Set As Part Of Prototype Pollution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102169" id="2102169" title="Mozilla: Memory Safety Bugs Fixed In Firefox 102 And Firefox Esr 91.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5480-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.11. 
Security Fix(es): 
* Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468) 
* Mozilla: Use-after-free in nsSHistory (CVE-2022-34470) 
* Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479) 
* Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484) 
* Mozilla: Undesired attributes could be set as part of prototype pollution  (CVE-2022-2200) 
* Mozilla: An email with a mismatching OpenPGP signature date was accepted as valid (CVE-2022-2226) 
* Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744) 
* Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472) 
* Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-07-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-91.11.0-2.el7_9.src.rpm" version="91.11.0"><filename>thunderbird-91.11.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">518b25f63fd9c1898cf7dbc477faf7330e4eeca94bbfaf5ce71233c8b0f46c1e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" id="CVE-2022-2200" title="Mozilla: Undesired Attributes Could Be Set As Part Of Prototype Pollution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" id="CVE-2022-2226" title="Mozilla: An Email With A Mismatching Openpgp Signature Date Was Accepted As Valid" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" id="CVE-2022-31744" title="Mozilla: Csp Bypass Enabling Stylesheet Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" id="CVE-2022-34468" title="Mozilla: Csp Sandbox Header Without `Allow-Scripts` Can Be Bypassed Via Retargeted Javascript: Uri" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" id="CVE-2022-34470" title="Mozilla: Use-After-Free In Nsshistory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" id="CVE-2022-34472" title="Mozilla: Unavailable Pac File Resulted In Ocsp Requests Being Blocked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" id="CVE-2022-34479" title="Mozilla: A Popup Window Could Be Resized In A Way To Overlay The Address Bar With Web Content" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" id="CVE-2022-34481" title="Mozilla: Potential Integer Overflow In Replaceelementsat" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" id="CVE-2022-34484" title="Mozilla: Memory Safety Bugs Fixed In Firefox 102 And Firefox Esr 91.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5480" id="RHSA-2022:5480-1" title="Rhsa-2022:5480-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102161" id="2102161" title="Mozilla: A Popup Window Could Be Resized In A Way To Overlay The Address Bar With Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102162" id="2102162" title="Mozilla: Use-After-Free In Nsshistory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102163" id="2102163" title="Mozilla: Csp Sandbox Header Without `Allow-Scripts` Can Be Bypassed Via Retargeted Javascript: Uri" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102164" id="2102164" title="Mozilla: Potential Integer Overflow In Replaceelementsat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102165" id="2102165" title="Mozilla: Csp Bypass Enabling Stylesheet Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102166" id="2102166" title="Mozilla: Unavailable Pac File Resulted In Ocsp Requests Being Blocked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102168" id="2102168" title="Mozilla: Undesired Attributes Could Be Set As Part Of Prototype Pollution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102169" id="2102169" title="Mozilla: Memory Safety Bugs Fixed In Firefox 102 And Firefox Esr 91.11" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102204" id="2102204" title="Mozilla: An Email With A Mismatching Openpgp Signature Date Was Accepted As Valid" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5542-1</id><title>Squid</title><description>Security Fix(es): 
* squid: DoS when processing gopher server responses (CVE-2021-46784) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.7" src="squid-3.5.20-17.el7_9.7.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.7.x86_64.rpm</filename><sum type="sha256">dbff6ab9c250e0f10dfca230a5f1170d86e8144eb1dd96909b41e1183ee5ecc0</sum></package><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.7" src="squid-3.5.20-17.el7_9.7.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.7.x86_64.rpm</filename><sum type="sha256">000c8e8e89638b9035378a053890a009bf1912fce759f517f212187470ddb2b5</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.7" src="squid-3.5.20-17.el7_9.7.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.7.x86_64.rpm</filename><sum type="sha256">ab738d32e426a0b2aa73cb8c5d479f25edb1c03e00afda9adcc0cf661cf02b43</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46784" id="CVE-2021-46784" title="Squid: Dos When Processing Gopher Server Responses" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5542" id="RHSA-2022:5542-1" title="Rhsa-2022:5542-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2100721" id="2100721" title="Squid: Dos When Processing Gopher Server Responses" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5687</id><title>Important: Java-11-Openjdk Security, Bug Fix, And Enhancement Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2083258)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-08-01 10:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-jmods-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">ff485a031b7358e9a603019431d11ad49fe1c191b651a1ab4a966f3254434a36</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-src-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">35b009867aeaec41a4101189c975ab32f52b96997c04179577e204fa7c953041</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">8fc0bd4b7300cd42b8c60f8301d2262a0e6ea85ca55bbc6191f423f8202351df</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-src-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">3e5b6dde1167f229003f25a94346f478c7386e8578b31da25f85940331851b92</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">c0b7fa4b587e7c76e5b652246d91f417d05c21d031489d5f776db52c4554f81f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">7c81e27141ef3886d8a41bc2d856be63ac236f2aa11c4782382e82d44ce2c221</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-demo-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">78fab0f72db34591ffdf639cdbe2205b7d7838e039c3a6132953943c67894bfb</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">c3ae470cc832c94dc93002679fe56a85f31e5988fafff3fa00b23e4c520d16b9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-static-libs-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">58260f8e9843800aa31099c7e4f7a6aa74597a915271959fc300c78fef0825d6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-devel-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">ead1acfec0163bef28a3971805467b337155d5ba67064a613dab2424f187a02c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-demo-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">9c83e1948e56b5044f88c9a04eef39f63ec956fc54f29b023c752b62f71f73fb</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-jmods-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">08d96bdd9b4331466d1c58221053dd24927fd80259e9e2cdc3edbf4c06b9e061</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-headless-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">07d0d9aedd58dc4d0bc84278ce0304fa2611a20ccc953e0719b2af733f5c95d1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">f6277b5d6d7a9a104aa48ff42821bba76d39ea8109ca0ef184dd602386fdddec</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-headless-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">37cafdda08da3a1ea4dad7b80777489a1e4f6117b828b5100e289e33088700c0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">94355e3db0d1eeb216c439c8794e367d054b3c0f110445a51e122ff51efbe2b1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-devel-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">3ab693276932133e379fdf8b4ba7d90d26dc330d6c7dd75a6fc03b150e18bd45</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" id="CVE-2022-21540" title="Cve-2022-21540" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" id="CVE-2022-21541" title="Cve-2022-21541" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" id="CVE-2022-34169" title="Cve-2022-34169" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5687" id="RHSA-2022:5687" title="Important: Java-11-Openjdk Security, Bug Fix, And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2083258" id="2083258" title="2083258 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-07, 11.0.16) [Rhel-7-9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5687-1</id><title>Java-11-Openjdk</title><description>The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). 
Security Fix(es): 
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) 
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) 
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-demo-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">8611c379545049fb5145af947ade98d6a34982bc6b1bd6fdc81b844cbcb69d6a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-headless-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">144ea8e27c84507fcd45e26a346bceeb42afa3b2d10cc491ca6a313ad72d87fe</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-static-libs-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">4bb7d26c567fe11f583ff82d4e213651a0add391dc89c7ded87d18acabba77ec</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-demo-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">0dfbe0a0574ac807f4e74809bb73dad28f577fdd6f077cee0bb6aabd5dafaa3b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">31ab6b80b64db525f4350f5e232a4ad566c0a79970861d8029ea611644c5771f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-src-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">dceaf6b3fa5f11e3c3090f103adc39c32ab3b78e19e0a0ec82e56054a2ae28ad</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-headless-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">55746417c54be47dd7809c30d000e0b7df9c025cc5350cd3ded8aac7a7c27033</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">b16c911001ad580f4c2eca21d0924a8baade689e538df738b7f5e9c9f4253005</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-jmods-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">820cfd6ee3b4b8a3d26cd3492a4774099272260bd0d18dd554c2f131c707ac84</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">1e4d28d9a9842eca02530b1c5663a51a039fc5e5e6920b447097fde9621ee2af</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">a9676e773f4ab904e6df5340fd3ddebb1bd7150ade2b0dd4a3d6e48d83ad3203</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-devel-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">30ecf4fca91c24ce852ef7d2c7f0ffe7d3c0cc2267a92963cfe5e3105225d811</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">aac17aa4e1897cc09e6e0e34dc6dfc05075cb0a119889610763865b5eb7c814d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">404c5774f8f9163e381965ffc6e739616efae6c6fa8a6bff1bc09627535c3c73</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-devel-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">db9ed77efbe929b28e593e4a21d6dded7aea5e80c7c9757c4e6d1fabe0c35720</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-src-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">cb1b49986b19897e0457f122762c3a018f006826fc0b1270fe1e82c804c5c5f6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-jmods-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">c962abaf22b4a395efaf424f8c79ef7676507c16265a1f7253bfdcf794360ea2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" id="CVE-2022-21540" title="Openjdk: Class Compilation Issue (Hotspot, 8281859)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" id="CVE-2022-21541" title="Openjdk: Improper Restriction Of Methodhandle.Invokebasic() (Hotspot, 8281866)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" id="CVE-2022-34169" title="Openjdk: Integer Truncation Issue In Xalan-J (Jaxp, 8285407)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5687" id="RHSA-2022:5687-1" title="Rhsa-2022:5687-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108540" id="2108540" title="Openjdk: Class Compilation Issue (Hotspot, 8281859)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108543" id="2108543" title="Openjdk: Improper Restriction Of Methodhandle.Invokebasic() (Hotspot, 8281866)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108554" id="2108554" title="Openjdk: Integer Truncation Issue In Xalan-J (Jaxp, 8285407)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5698</id><title>Important: Java-1.8.0-Openjdk Security, Bug Fix, And Enhancement Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2083257)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-08-01 10:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">dd552247cc20b81cab5abc2ac39dc17703d58a53732fa2f6e0f11c51b8d1de95</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">5cfe245f019d5fc6308312b6a2c36a5b3816add572af41e5c6da2630b2a9bc9a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">2d94cbaab9b7bf560be85fef61cec7970813cbcfb23a6293de86d10ffee052d0</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.342.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">eab54a41190cafaef99ff3f6d5539734a6c151d3868f78a326b549940284c43f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">e283c2ea3701cd6b330e1fb6c469a58905becb4687d6ddca1fdfcf5b6e24a173</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">5dede49755fef443561ec1294d59dddef1e977661dc8965744ea5b3eadaa82f7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">fb412993684366151cc44711dd03669a328a34a78c0a6672f94f1a3f48e7dd8b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">e1592b2fdef08f1ac87ecb4356fe1a6667cc9a310a5eff04bc97fb67bead7846</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.342.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">49142f39946bf7ab738aeeeb04d894615267f95b7dc83a735c1aa75531c95599</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">4d87c03704812f5de6e21624549dfee758efd582b6161854c671bb5c4671f2ff</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">5ff4ae53a07a78eeca4ad20043caa10fb4f5ce90b73a6e102d2870d3a13fcf9a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">3fb8a14a48644a420ec20fd27537402eca63522a85023ab13bbcede16dc384ad</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">ff4d3843ce0896b873094b65d95ca7aecf1343ba1c948dbafa02de065c951154</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">e1bdd17a0490037142cdb6ae84a6ff45766880d6cb7e147f74b7ae01788f652d</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" id="CVE-2022-21540" title="Cve-2022-21540" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" id="CVE-2022-21541" title="Cve-2022-21541" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" id="CVE-2022-34169" title="Cve-2022-34169" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5698" id="RHSA-2022:5698" title="Important: Java-1.8.0-Openjdk Security, Bug Fix, And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2083257" id="2083257" title="2083257 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-07, 8U342) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5698-1</id><title>Java-1.8.0-Openjdk</title><description>The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). 
Security Fix(es): 
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) 
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) 
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">4ab7f27a38f56298c39e246c94d702d582ea7461cd0cda84ae19d6898080d863</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">4f5e91bda435dd90919ffa87bf89fdac660a7581c552c0c1a6e8bc8b729c694a</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">6e2bfd3f96c12846a098b7d01b6114c64b868638c083814e5a57facae46d4081</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">866c8ff926d25e5c119c13292f2bac934bb3e02a9b821123efdd85dd3b263135</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">b4006d90a56f38c63ef8522c0c97ad8a5963d5e50107985f0f758e39e03f5c27</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">6b3829da94a98f6ad1e9e4224796bf108eb0f15f1b6fea2a7be9cfd0b559767e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">7dabfb17f9d0efe22785ddeff0450c86fc99e0942e254911f3424cbaa1040dfd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">42b430ea26f1ca194196526b12c4dbac2d646081c4572cdcfc35e184fd9f491b</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">8ccac8e0148f92f0c7f079a592c2a7e62644b42c26d0c61b3b93b1c22454868e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">1fb56095e0db3a565698ac3a02327db2940983beb6cc358373da4dab1ef91c70</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">943ac0fd188f796e44f4173e92e2e6b7bfd67d0597bf42234b17463b1cd62a02</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">f25db7168bce97ee6e42b1605467a84b4aea3418c88cdf10131b453f9c700968</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">37005280cc568854374742f1509d56437f8e4a07ada84ab33b6eff370523036c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">ebfc9595270935485aa68afb4085c59d07730d26b097e9a9149993c98f89af98</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" id="CVE-2022-21540" title="Openjdk: Class Compilation Issue (Hotspot, 8281859)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" id="CVE-2022-21541" title="Openjdk: Improper Restriction Of Methodhandle.Invokebasic() (Hotspot, 8281866)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" id="CVE-2022-34169" title="Openjdk: Integer Truncation Issue In Xalan-J (Jaxp, 8285407)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5698" id="RHSA-2022:5698-1" title="Rhsa-2022:5698-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108540" id="2108540" title="Openjdk: Class Compilation Issue (Hotspot, 8281859)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108543" id="2108543" title="Openjdk: Improper Restriction Of Methodhandle.Invokebasic() (Hotspot, 8281866)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108554" id="2108554" title="Openjdk: Integer Truncation Issue In Xalan-J (Jaxp, 8285407)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5773-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.12.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 (CVE-2022-2505) 
* Mozilla: Directory indexes for bundled resources reflected URL parameters  (CVE-2022-36318) 
* Mozilla: Mouse Position spoofing with CSS transforms (CVE-2022-36319) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.12.0-1.el7_9.src.rpm" version="91.12.0"><filename>thunderbird-91.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">25a5d69dab2c0d6e34baffa70a62cbf18dbce647a17972984ee25af215b4a716</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2505" id="CVE-2022-2505" title="Mozilla: Memory Safety Bugs Fixed In Firefox 103 And 102.1" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" id="CVE-2022-36318" title="Mozilla: Directory Indexes For Bundled Resources Reflected Url Parameters" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" id="CVE-2022-36319" title="Mozilla: Mouse Position Spoofing With Css Transforms" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5773" id="RHSA-2022:5773-1" title="Rhsa-2022:5773-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111907" id="2111907" title="Mozilla: Mouse Position Spoofing With Css Transforms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111908" id="2111908" title="Mozilla: Directory Indexes For Bundled Resources Reflected Url Parameters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111910" id="2111910" title="Mozilla: Memory Safety Bugs Fixed In Firefox 103 And 102.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5776-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.12.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 (CVE-2022-2505) 
* Mozilla: Directory indexes for bundled resources reflected URL parameters  (CVE-2022-36318) 
* Mozilla: Mouse Position spoofing with CSS transforms (CVE-2022-36319) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="2.el7_9" src="firefox-91.12.0-2.el7_9.src.rpm" version="91.12.0"><filename>firefox-91.12.0-2.el7_9.i686.rpm</filename><sum type="sha256">e807c37430e440a90e53af5e3858b6d52894389f35fa4361859e909c484328e8</sum></package><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-91.12.0-2.el7_9.src.rpm" version="91.12.0"><filename>firefox-91.12.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">ef66827a15fe99c87e24c7685945c40f106fa61acab0287487d7d79a8482bd4f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2505" id="CVE-2022-2505" title="Mozilla: Memory Safety Bugs Fixed In Firefox 103 And 102.1" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" id="CVE-2022-36318" title="Mozilla: Directory Indexes For Bundled Resources Reflected Url Parameters" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" id="CVE-2022-36319" title="Mozilla: Mouse Position Spoofing With Css Transforms" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5776" id="RHSA-2022:5776-1" title="Rhsa-2022:5776-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111907" id="2111907" title="Mozilla: Mouse Position Spoofing With Css Transforms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111908" id="2111908" title="Mozilla: Directory Indexes For Bundled Resources Reflected Url Parameters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111910" id="2111910" title="Mozilla: Memory Safety Bugs Fixed In Firefox 103 And 102.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5905-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) 
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xorg" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">f198d70d27d6f20b08719a5d875253fc44f9ea11146514d27c98c6ab8c12ee7a</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">6b9a477b42d0bf923e2e2cfd4dce74d98748caa2f83b94a587514bc46102bf2c</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">6e5c93deb4573a33358916269db7b17a0df2403364718318c5afe97b2806bc9c</sum></package><package arch="i686" name="xorg-x11-server-devel" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-18.el7_9.i686.rpm</filename><sum type="sha256">7aaefe51552cc5d7a9e2d6d51f58a94df47648dff8b4cefa9353ef3f54f1a813</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">fcb5709e9084537571247640566e2680616a5db70de7491bd83278358e22a64d</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">546ecc8a110ab6d2c1d3b0362e1ffd9dd0ac923bed363397d560eeab0f72b7c2</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">f8c10d3f4bfb44128472809afe964e52451f3b4534c0438ad07aeadd2e0e8356</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">29f5d4a1af552ddb0093c15683f86e51d39d9a055bfc5209ba2a26200449b8d7</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">a409484eb5a91f441cf24a219a3e24fb4a51587b5bf18385001d912889178772</sum></package><package arch="noarch" name="xorg-x11-server-source" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-18.el7_9.noarch.rpm</filename><sum type="sha256">ec086e923e6853c3f484c456df0a9428b87748d4c26a3b10befb8b5716219d86</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319" id="CVE-2022-2319" title="Xorg-X11-Server: X.Org Server Procxkbsetgeometry Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320" id="CVE-2022-2320" title="Xorg-X11-Server: Out-Of-Bounds Access In Procxkbsetdeviceinfo Request Handler Of The Xkb Extension" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5905" id="RHSA-2022:5905-1" title="Rhsa-2022:5905-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2106671" id="2106671" title="Xorg-X11-Server: X.Org Server Procxkbsetgeometry Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2106683" id="2106683" title="Xorg-X11-Server: Out-Of-Bounds Access In Procxkbsetdeviceinfo Request Handler Of The Xkb Extension" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5937-1</id><title>Kernel</title><description>Security Fix(es): 
* Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123) 
* Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) 
* Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* SolarFlare sfc spurious TX completion 
* Page allocation failure on cryptsetup open 
* The kernel-rt crashes where one task is indefinitely looping in __start_cfs_bandwidth() with the cfs_b-&gt;lock spinlock being held 
* While using PTimekeeper the qede driver produces excessive log messages 
* The kernel crashes due to a GPF happens in mutex_spin_on_owner(). The known RDMA/cma bug that was introduced with a patch from upstream commit 722c7b2bfead is the possible cause. 
* Running LTP testcase creat09 fails showing related  to 'cve-2018-13405' 
* Crash when releasing inode which was on unmouted superblock</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-08-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">eb6c6858ee108768f74cbf482648a1d7c1468dfd9c6c14df31c4faea745a3aaf</sum></package><package arch="x86_64" name="kernel-tools" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">737ff7b8680df3b857d3386e5e33fb441444da64f4bfe0e9996d943dcee11bdb</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">028e5f26d6cb86bc95b0a0583c97a367cd71cbf05b6115ec3aad3dff4c792aba</sum></package><package arch="x86_64" name="kernel-headers" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">ae37ab166a3132528ba33a244f4de1a9f8644f0df5d3ff424056c0df935046d5</sum></package><package arch="x86_64" name="perf" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">2ae7ad41b3cacbc8e843a4e3a0c6a2289ab9046e72cb3de23cdeb21488cdacd6</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">96b836848019f779069f10177b6d425f351526684bbadcda46e1cc06aa2b006b</sum></package><package arch="noarch" name="kernel-doc" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.76.1.el7.noarch.rpm</filename><sum type="sha256">d102f7c09caf2f06e44a067310247b90109993c49a4f5fe2756ef40119c67723</sum></package><package arch="x86_64" name="kernel" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">ef75240138a948d9fdc8669cf50f5ca70e48f2a9217acd6559577ca782b666fa</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">d15c22331aa7656ad2f356b252b861f88a176d7a883bfa1c69c4e3098475777a</sum></package><package arch="x86_64" name="python-perf" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">b054c8924feb65a2322d77acaac5203839c1217149ece08fc0b5da3c618a60b4</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.76.1.el7.noarch.rpm</filename><sum type="sha256">f05cd8f070add9cd4fc3e2dde0412e2e6f220d5c7bdc8a37e377e49c41637f11</sum></package><package arch="x86_64" name="bpftool" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">bc87496d4e290c092d76890042f67cd51705320c826f03086ed3fabf4b4cb29d</sum></package><package arch="x86_64" name="kernel-debug" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">10ebee491b5390dfd3a729a6195825d8dd9809bf8287f9cb321ebede65329e78</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" id="CVE-2022-21123" title="Hw: Cpu: Incomplete Cleanup Of Multi-Core Shared Buffers (Aka Sbdr)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" id="CVE-2022-21125" title="Hw: Cpu: Incomplete Cleanup Of Microarchitectural Fill Buffers (Aka Sbds)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" id="CVE-2022-21166" title="Hw: Cpu: Incomplete Cleanup In Specific Special Register Write Operations (Aka Drpw)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5937" id="RHSA-2022:5937-1" title="Rhsa-2022:5937-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2090237" id="2090237" title="Hw: Cpu: Incomplete Cleanup Of Multi-Core Shared Buffers (Aka Sbdr)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2090240" id="2090240" title="Hw: Cpu: Incomplete Cleanup Of Microarchitectural Fill Buffers (Aka Sbds)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2090241" id="2090241" title="Hw: Cpu: Incomplete Cleanup In Specific Special Register Write Operations (Aka Drpw)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6160-1</id><title>Systemd</title><description>Security Fix(es): 
* systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="systemd" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">2b08ea19b057824d23fbcee8bb677679b7502f5b0b0cd38d60b7547ede2616e5</sum></package><package arch="x86_64" name="systemd-resolved" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-resolved-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">e8fb0512bc5b5c66a605062cd97348245d57219d59f0fd14c5c12715017fe90e</sum></package><package arch="x86_64" name="libgudev1-devel" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>libgudev1-devel-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">c7f3267ae4feb20d1d39d56a84a392e357db2ee1b34a6af2a7f7ffde61d30330</sum></package><package arch="i686" name="systemd-resolved" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-resolved-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">17ccc70a4c6b0fd4e36f601dda974f4c5f0d9c9da5cb3c348c54ee0039e5c5a3</sum></package><package arch="i686" name="libgudev1" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>libgudev1-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">a813ab9e45be45a76c35df5060d6a236e18fd15fb13b2dd55ebc4f48a87f2b47</sum></package><package arch="x86_64" name="systemd-libs" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-libs-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">3ed557aa85228f94cf8edce8c2bc89de8768a9ef050ee9928d68e6306501df1d</sum></package><package arch="i686" name="libgudev1-devel" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>libgudev1-devel-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">3d2423fe28b482163248e160f4a471838e8c0a4f40308e6325cee4e2b4184e30</sum></package><package arch="x86_64" name="systemd-python" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-python-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">621c4981bdbb67e3c0183a129cd2a51c36d6fa7b7940ed5ae3326fdf2d43bb06</sum></package><package arch="i686" name="systemd-devel" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-devel-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">2c5fc64cb5b0cb6df919385209c89eea049576a44a733ce2db2a119af579a726</sum></package><package arch="x86_64" name="systemd-networkd" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-networkd-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">774a53e5c24bc4ffbfa971d0686081c94f071eb3922e882ae90c82740f6c26df</sum></package><package arch="x86_64" name="systemd-sysv" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-sysv-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">3f89049498d61702206987358b0093989b9e8a226f794f03c941ede6b11b49d3</sum></package><package arch="x86_64" name="libgudev1" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>libgudev1-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">02046f2acce4d5b8942b5e44d1fc5055a9e0e0f36e8463f3b17bc1a0155f4976</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-journal-gateway-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">d00824b3b9831e98c7a22512c63df9e320b7ab2769d49159dba45f99c212d93c</sum></package><package arch="i686" name="systemd-libs" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-libs-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">48338899941ad604d5b84c5610d198837179fde1a03eb8301038ba704c2bcb45</sum></package><package arch="x86_64" name="systemd-devel" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-devel-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">791e864b91024b15cba4e60eea597d4261f1926cd7c8f7a24e8158d8a15ba699</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526" id="CVE-2022-2526" title="Systemd-Resolved: Use-After-Free When Dealing With Dnsstream In Resolved-Dns-Stream.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6160" id="RHSA-2022:6160-1" title="Rhsa-2022:6160-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2109926" id="2109926" title="Systemd-Resolved: Use-After-Free When Dealing With Dnsstream In Resolved-Dns-Stream.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6169-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.13.0. 
Security Fix(es): 
* Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) 
* Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) 
* Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) 
* Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) 
* Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.13.0-1.el7_9.src.rpm" version="91.13.0"><filename>thunderbird-91.13.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">6d85633aab8f9d5e33b46d20c0cb450d8b929292c3d4ec57f5cc9c4b9e1ca949</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472" id="CVE-2022-38472" title="Mozilla: Address Bar Spoofing Via Xslt Error Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473" id="CVE-2022-38473" title="Mozilla: Cross-Origin Xslt Documents Would Have Inherited The Parent'S Permissions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476" id="CVE-2022-38476" title="Mozilla: Data Race And Potential Use-After-Free In Pk11_Changepw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477" id="CVE-2022-38477" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104 And Firefox Esr 102.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478" id="CVE-2022-38478" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104, Firefox Esr 102.2, And Firefox Esr 91.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6169" id="RHSA-2022:6169-1" title="Rhsa-2022:6169-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120673" id="2120673" title="Mozilla: Address Bar Spoofing Via Xslt Error Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120674" id="2120674" title="Mozilla: Cross-Origin Xslt Documents Would Have Inherited The Parent'S Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120678" id="2120678" title="Mozilla: Data Race And Potential Use-After-Free In Pk11_Changepw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120695" id="2120695" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104 And Firefox Esr 102.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120696" id="2120696" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104, Firefox Esr 102.2, And Firefox Esr 91.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6170-1</id><title>Rsync</title><description>Security Fix(es): 
* rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rsync" release="11.el7_9" src="rsync-3.1.2-11.el7_9.src.rpm" version="3.1.2"><filename>rsync-3.1.2-11.el7_9.x86_64.rpm</filename><sum type="sha256">0c488dacb9f63cc2330889b3748f363389f63ac0c34cad4588f23ef4afe550be</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154" id="CVE-2022-29154" title="Rsync: Remote Arbitrary Files Write Inside The Directories Of Connecting Peers" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6170" id="RHSA-2022:6170-1" title="Rhsa-2022:6170-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2110928" id="2110928" title="Rsync: Remote Arbitrary Files Write Inside The Directories Of Connecting Peers" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6179-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.13.0 ESR. 
Security Fix(es): 
* Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) 
* Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) 
* Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) 
* Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) 
* Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.13.0-1.el7_9.src.rpm" version="91.13.0"><filename>firefox-91.13.0-1.el7_9.i686.rpm</filename><sum type="sha256">81039b2e705fbc6fb6c4ef61fcc0fc13592fb7a778009b300b41befb5500b044</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.13.0-1.el7_9.src.rpm" version="91.13.0"><filename>firefox-91.13.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">098f44ada05d0d9010b129d6c9f3b00921b8b94b3568a4b550bc6cbd07339c37</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472" id="CVE-2022-38472" title="Mozilla: Address Bar Spoofing Via Xslt Error Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473" id="CVE-2022-38473" title="Mozilla: Cross-Origin Xslt Documents Would Have Inherited The Parent'S Permissions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476" id="CVE-2022-38476" title="Mozilla: Data Race And Potential Use-After-Free In Pk11_Changepw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477" id="CVE-2022-38477" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104 And Firefox Esr 102.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478" id="CVE-2022-38478" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104, Firefox Esr 102.2, And Firefox Esr 91.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6179" id="RHSA-2022:6179-1" title="Rhsa-2022:6179-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120673" id="2120673" title="Mozilla: Address Bar Spoofing Via Xslt Error Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120674" id="2120674" title="Mozilla: Cross-Origin Xslt Documents Would Have Inherited The Parent'S Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120678" id="2120678" title="Mozilla: Data Race And Potential Use-After-Free In Pk11_Changepw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120695" id="2120695" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104 And Firefox Esr 102.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120696" id="2120696" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104, Firefox Esr 102.2, And Firefox Esr 91.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6381-1</id><title>Open-Vm-Tools</title><description>Security Fix(es): 
* open-vm-tools: local root privilege escalation in the virtual machine (CVE-2022-31676) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-09-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="open-vm-tools" release="3.el7_9.4" src="open-vm-tools-11.0.5-3.el7_9.4.src.rpm" version="11.0.5"><filename>open-vm-tools-11.0.5-3.el7_9.4.x86_64.rpm</filename><sum type="sha256">2c7a540c07f75bbde969aab6fcd7643af51af971b6f2e604e30160fdf66c102b</sum></package><package arch="x86_64" name="open-vm-tools-devel" release="3.el7_9.4" src="open-vm-tools-11.0.5-3.el7_9.4.src.rpm" version="11.0.5"><filename>open-vm-tools-devel-11.0.5-3.el7_9.4.x86_64.rpm</filename><sum type="sha256">ff5657209dd6cdfe32980b90cd40eb61d77c1f1fd633a53137d8429890940660</sum></package><package arch="x86_64" name="open-vm-tools-desktop" release="3.el7_9.4" src="open-vm-tools-11.0.5-3.el7_9.4.src.rpm" version="11.0.5"><filename>open-vm-tools-desktop-11.0.5-3.el7_9.4.x86_64.rpm</filename><sum type="sha256">3736617d4ffbbee600bb2b187c796ea5a2e976c42a51bdc11310520b2a493cc7</sum></package><package arch="x86_64" name="open-vm-tools-test" release="3.el7_9.4" src="open-vm-tools-11.0.5-3.el7_9.4.src.rpm" version="11.0.5"><filename>open-vm-tools-test-11.0.5-3.el7_9.4.x86_64.rpm</filename><sum type="sha256">ae6fb0521fdab2fd20a14ffb493fd0e72863d59051fe1d16f2bacd95df27ec89</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31676" id="CVE-2022-31676" title="Open-Vm-Tools: Local Root Privilege Escalation In The Virtual Machine" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6381" id="RHSA-2022:6381-1" title="Rhsa-2022:6381-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2118714" id="2118714" title="Open-Vm-Tools: Local Root Privilege Escalation In The Virtual Machine" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6710-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.3.0. 
Security Fix(es): 
* Mozilla: Leaking of sensitive information when composing a response to an  HTML email with a META refresh tag (CVE-2022-3033) 
* Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959) 
* Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960) 
* Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962) 
* Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked (CVE-2022-3032) 
* Mozilla: An iframe element in an HTML email could trigger a network request (CVE-2022-3034) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to  denial-of- service attack (CVE-2022-36059) 
* Mozilla: Bypassing Secure Context restriction for cookies with __Host and  __Secure prefix (CVE-2022-40958) 
* Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956) 
* Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-09-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-102.3.0-3.el7_9.src.rpm" version="102.3.0"><filename>thunderbird-102.3.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">5c158e57590300fc7fdc7642fadd46a5c062d8f1d3f5aaf87fc01b93f3110114</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3032" id="CVE-2022-3032" title="Mozilla: Remote Content Specified In An Html Document That Was Nested Inside An Iframe'S Srcdoc Attribute Was Not Blocked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3033" id="CVE-2022-3033" title="Mozilla: Leaking Of Sensitive Information When Composing A Response To An Html Email With A Meta Refresh Tag" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3034" id="CVE-2022-3034" title="Mozilla: An Iframe Element In An Html Email Could Trigger A Network Request" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059" id="CVE-2022-36059" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To Denial-Of-Service Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40956" id="CVE-2022-40956" title="Mozilla: Content-Security-Policy Base-Uri Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40957" id="CVE-2022-40957" title="Mozilla: Incoherent Instruction Cache When Building Wasm On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40958" id="CVE-2022-40958" title="Mozilla: Bypassing Secure Context Restriction For Cookies With __Host And __Secure Prefix" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40959" id="CVE-2022-40959" title="Mozilla: Bypassing Featurepolicy Restrictions On Transient Pages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40960" id="CVE-2022-40960" title="Mozilla: Data-Race When Parsing Non-Utf-8 Urls In Threads" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40962" id="CVE-2022-40962" title="Mozilla: Memory Safety Bugs Fixed In Firefox 105 And Firefox Esr 102.3" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6710" id="RHSA-2022:6710-1" title="Rhsa-2022:6710-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2123255" id="2123255" title="Mozilla: Remote Content Specified In An Html Document That Was Nested Inside An Iframe'S Srcdoc Attribute Was Not Blocked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2123256" id="2123256" title="Mozilla: Leaking Of Sensitive Information When Composing A Response To An Html Email With A Meta Refresh Tag" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2123257" id="2123257" title="Mozilla: An Iframe Element In An Html Email Could Trigger A Network Request" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2123258" id="2123258" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To Denial-Of-Service Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128792" id="2128792" title="Mozilla: Bypassing Featurepolicy Restrictions On Transient Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128793" id="2128793" title="Mozilla: Data-Race When Parsing Non-Utf-8 Urls In Threads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128794" id="2128794" title="Mozilla: Bypassing Secure Context Restriction For Cookies With __Host And __Secure Prefix" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128795" id="2128795" title="Mozilla: Content-Security-Policy Base-Uri Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128796" id="2128796" title="Mozilla: Incoherent Instruction Cache When Building Wasm On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128797" id="2128797" title="Mozilla: Memory Safety Bugs Fixed In Firefox 105 And Firefox Esr 102.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6711-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.3.0 ESR. 
Security Fix(es): 
* Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959) 
* Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960) 
* Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962) 
* Mozilla: Bypassing Secure Context restriction for cookies with __Host and  __Secure prefix (CVE-2022-40958) 
* Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956) 
* Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-09-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="6.el7_9" src="firefox-102.3.0-6.el7_9.src.rpm" version="102.3.0"><filename>firefox-102.3.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">16dfa4174101455cbdf4db85f950a31f77d7a7a7cf9fbb71aa501b68d60b6a48</sum></package><package arch="i686" name="firefox" release="6.el7_9" src="firefox-102.3.0-6.el7_9.src.rpm" version="102.3.0"><filename>firefox-102.3.0-6.el7_9.i686.rpm</filename><sum type="sha256">a90f01eb2e7fb81dada4d449816efb77b1bb64bffdf4774ddc2be5a93ff8d340</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40956" id="CVE-2022-40956" title="Mozilla: Content-Security-Policy Base-Uri Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40957" id="CVE-2022-40957" title="Mozilla: Incoherent Instruction Cache When Building Wasm On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40958" id="CVE-2022-40958" title="Mozilla: Bypassing Secure Context Restriction For Cookies With __Host And __Secure Prefix" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40959" id="CVE-2022-40959" title="Mozilla: Bypassing Featurepolicy Restrictions On Transient Pages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40960" id="CVE-2022-40960" title="Mozilla: Data-Race When Parsing Non-Utf-8 Urls In Threads" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40962" id="CVE-2022-40962" title="Mozilla: Memory Safety Bugs Fixed In Firefox 105 And Firefox Esr 102.3" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6711" id="RHSA-2022:6711-1" title="Rhsa-2022:6711-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128792" id="2128792" title="Mozilla: Bypassing Featurepolicy Restrictions On Transient Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128793" id="2128793" title="Mozilla: Data-Race When Parsing Non-Utf-8 Urls In Threads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128794" id="2128794" title="Mozilla: Bypassing Secure Context Restriction For Cookies With __Host And __Secure Prefix" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128795" id="2128795" title="Mozilla: Content-Security-Policy Base-Uri Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128796" id="2128796" title="Mozilla: Incoherent Instruction Cache When Building Wasm On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128797" id="2128797" title="Mozilla: Memory Safety Bugs Fixed In Firefox 105 And Firefox Esr 102.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6765-1</id><title>Bind</title><description>Security Fix(es): 
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177) 
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">8c8e95e6cc3d13d0a60fed32d2eb4c01f58f23a44d1ea1e09269db25a19f4b7d</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">c3c174c51b49054fc568a401d3333d3f72d60eb844202e128a35d9f0cab01f6c</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">452a47e1a5c85d5284ca3f3e624f93f3030863d7c1a716ec87f17c07d71bc3b0</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">38640fd00904a57efd528c2c076063e966d23cc216db15d22ed891140254393d</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">a0032d922ee1ad824ece7bee12589cef936bea052cf91695a46f4d29d48d6950</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">e7245226cdf1bf2a601cfc69cd381ce021c02992837e33a08f03e0289d423f29</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">11614018e6fd0121a286ff84626820225434594f97ef7f85c052a069f293a302</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.10.noarch.rpm</filename><sum type="sha256">f46466f6f10683fea611257b1f00763bd3f9441b97de721c19ff378e9104c901</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">262677c264df05452a69e4ef29c3b8b7136538cbde5e230c7c35518b233819f0</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">b50a3aa1d2f5d7ecf431a390f9d95312f338c75c847f9be2e3ce68616b9bae5f</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">886b312819904b985a31a29c6186a922989129eab0a7d539381e01dee30876a7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">3f00161ab3c26341c8ab2d1bd5a22440d71ec8908dc5ed389f963a4050321ead</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">83aa7de54f47a6e325acc11254c9c3f447811ac6ec120e214288e278d72eff6c</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">46d8f6e86bf934a2a672fae81dc95c4652b050b2a98dd17b7e4d282992199671</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">9b4f8ba068b3891a277d4e4615ca3f8c882bad7fc9094d902267527fbf3c0b8e</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">3397207eef4b4b8230eb35d39e553433e864226d0f7dc4b0c8ecfa934e41c71d</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">214fd14b0d5694ca4ef19425be5f88df6e324ad67f5f416ff037ebfdba6cb2cc</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">63caf82f0c27722f3bcae22df946bb32b1042778da5ba76ce4f064abfa8d687a</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">1043d386988aa361c430fc5bcf99f0e719c54e69c93b9b97dfafdb46f874b3d6</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">7b348a7112ff4e203e64deec4f3d72909188f2302ab758dc02062c2d8f9e884e</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">f1713f6bb470b0d7457202d39cd42bb0d03db2b75ab696e5ee3eb58d714a7226</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">08fd5980cfa071b0029fcdc029d63ce1ca3649ef4a73d96a15a8a005ccfa9183</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">59d79cc06227b29ff85aad74c80d32ecf96007b4cf44413fc92d94beb89b51e6</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">49ff2ab782cd64e6e4716f6fd496983a988cbe706f2edb2e903a3ea0b9184396</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177" id="CVE-2022-38177" title="Bind: Memory Leak In Ecdsa Dnssec Verification Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178" id="CVE-2022-38178" title="Bind: Memory Leaks In Eddsa Dnssec Verification Code" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6765" id="RHSA-2022:6765-1" title="Rhsa-2022:6765-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128601" id="2128601" title="Bind: Memory Leak In Ecdsa Dnssec Verification Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128602" id="2128602" title="Bind: Memory Leaks In Eddsa Dnssec Verification Code" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6815-1</id><title>Squid</title><description>Security Fix(es): 
* squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.8" src="squid-3.5.20-17.el7_9.8.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.8.x86_64.rpm</filename><sum type="sha256">c80eba4f4ea195535460958b789906d52c7dca95daf9b548071db9c6edb70a45</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.8" src="squid-3.5.20-17.el7_9.8.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.8.x86_64.rpm</filename><sum type="sha256">f5822f2cb2c244fb13fc93edc60a914c70a7e9f764dd7558f0e676e6cfd06275</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.8" src="squid-3.5.20-17.el7_9.8.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.8.x86_64.rpm</filename><sum type="sha256">41e3aa29f321f1a3db9d6b6b48288842b2e41f3f75a1640d0fa9cbfd0fca8ef7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41318" id="CVE-2022-41318" title="Squid: Buffer-Over-Read In Sspi And Smb Authentication" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6815" id="RHSA-2022:6815-1" title="Rhsa-2022:6815-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2129771" id="2129771" title="Squid: Buffer-Over-Read In Sspi And Smb Authentication" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6834-1</id><title>Expat</title><description>Security Fix(es): 
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="expat-devel" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-15.el7_9.i686.rpm</filename><sum type="sha256">6d734ec2dfb8d067b0ed9e0044f6ef41e53fb641f894c40f01b89b2257ed032e</sum></package><package arch="i686" name="expat" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-2.1.0-15.el7_9.i686.rpm</filename><sum type="sha256">9d0a2ee25f9603e4c03758b57ad0bfcb35d6578381841c4235ff2ba9c8415dbe</sum></package><package arch="x86_64" name="expat-devel" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-15.el7_9.x86_64.rpm</filename><sum type="sha256">1a55d904f7411d5734a35309c82dd5ef4d5f906ecb198aaccac3ba57c32cd8b2</sum></package><package arch="i686" name="expat-static" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-15.el7_9.i686.rpm</filename><sum type="sha256">2b51ea7bea1db7ec6ffe364e0e55f7483eeb02d2f8a0600bc4fc5ac14f12a70e</sum></package><package arch="x86_64" name="expat" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-2.1.0-15.el7_9.x86_64.rpm</filename><sum type="sha256">342e80ce03829aa81d520b4d1765e109818f6341d410bc9e4f6a2fdbc2909fef</sum></package><package arch="x86_64" name="expat-static" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-15.el7_9.x86_64.rpm</filename><sum type="sha256">c5e62aa01f2a9979cde445da233c0ce980eb6d2124036f0f3e83246ed36c80d0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" id="CVE-2022-40674" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6834" id="RHSA-2022:6834-1" title="Rhsa-2022:6834-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2130769" id="2130769" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6997-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.3.0 ESR. 
Security Fix(es): 
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="7.el7_9" src="firefox-102.3.0-7.el7_9.src.rpm" version="102.3.0"><filename>firefox-102.3.0-7.el7_9.i686.rpm</filename><sum type="sha256">e0034b680c6c69752f77043e773d5f536fd2346d3e56ad571c76cdd058167e88</sum></package><package arch="x86_64" name="firefox" release="7.el7_9" src="firefox-102.3.0-7.el7_9.src.rpm" version="102.3.0"><filename>firefox-102.3.0-7.el7_9.x86_64.rpm</filename><sum type="sha256">4881290a113ee0c15753bc4b63202747fcc727620c5089ba94fd2b563cfc69c9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" id="CVE-2022-40674" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6997" id="RHSA-2022:6997-1" title="Rhsa-2022:6997-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2130769" id="2130769" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6998-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.3.0. 
Security Fix(es): 
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="4.el7_9" src="thunderbird-102.3.0-4.el7_9.src.rpm" version="102.3.0"><filename>thunderbird-102.3.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">94b25799df156b6c9c081860f77acd08ce9c5579d31716471499eed12aa9892a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" id="CVE-2022-40674" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6998" id="RHSA-2022:6998-1" title="Rhsa-2022:6998-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2130769" id="2130769" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7002</id><title>Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 8u352) (BZ#2130371)
</description><severity>moderate</severity><issued date="2022-10-21 09:05:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">d56beb31d4ce3cb40cf06a3da3e78ecd7188dc0ef89bbeedb94fc05c0da906cc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">95a8274eacb0e615ccba63bfbe4f25693e055dee17e4c21aed7978ac968b5afb</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.352.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">6e34c23528db17618c9dd959117bb35918d8f396ab75fe755a6c734c75e7c2da</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">1be77c0923180bb6caffdaa7116b170fc598c54a75b6e745b6896909ba4e42b0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">094e338d13280eafaa2a1d56c0f5adf1d3f81d8d1d598ed6c3040a4ecc5cd17a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">a7c2844adb412d23f0d44e2406a02168ad616ab6782ab507b23e4d630a4658da</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">4bfda19ee57fc0edbd38c9fb1dbfa2dcbd1acc677d17dea82b097a8dead97ce4</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">4c8ef6112e9d00d3c6897a771b2774d74c339bbf0f83958034f4d72d835cd2d8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">dc22f9c7db829153bef1e0f454e626f978408ef1d954b33a4725accf8f502246</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">6efff0a7e6bf24d99c9292a1fab2cff2f82e77dcf81c55fa22b52b16117b5542</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.352.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">5c369b93e91db39be0f766c413578e7144f0d877463e12c8ed344fb2659ae60c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">eb968d4f78a6de548c383fc6057ce11701ee12320697f918a3d3c36db9c1a8b2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">3a8ef487dc22dee957cb88c32af7efce732327055257cba68d755bd424e1c661</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">393037559109238206721f2850b69dbfdc4d63c4b5e2049aff4a6c4593ea3120</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" id="CVE-2022-21619" title="Cve-2022-21619" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" id="CVE-2022-21624" title="Cve-2022-21624" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" id="CVE-2022-21626" title="Cve-2022-21626" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" id="CVE-2022-21628" title="Cve-2022-21628" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7002" id="RHSA-2022:7002" title="Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2130371" id="2130371" title="2130371 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-10, 8U352) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7002-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) 
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) 
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) 
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 8u352)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-10-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">236fc0b6fe5e63a031d98dad0282a0005276e6457b19792171ae5751c4893b88</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">5527a326f0fca48935071a78978625a171fbfa130ac8b939a086a633a8e9eb7f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">41b5cd44eeaf21dddc7a8fcab47c64a450d31c421149160feac0d58851312e23</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">2260ae4a9e1b4fbdc73d15c0eb9a3dcfed10e6602ba22c01363528045e961b90</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">005d42f99b2171c26982cc7d7311934935a2d5ef23bd81e748c826b7a70de691</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">a9bf6ced787401b1a48a4b41f761037e5e24b17ad998f1b2069c7b505a083177</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">34c31532c398cfcf388c394b3470d8cd2074534ee132f770cd1080c685bd2094</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">7c587708770b27a9d455b30e4f3118d410595e4a047187a377f94a272a742edf</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">00123b9b7145ddc44227277d96a63acd537f393cd5183070bfb01762289c2419</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">5154bc849ea4faebc2df3ec151a2fff7e579d7bc8a0d6a92bc7ac3916e8eea85</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">d723f61e6ce4a05c6683286586fb847941cafacb422bb68c40f35346c7b8e638</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">f2bba7fd17da0be94b52d99e7efa8b27dbf3fa40e964595c6cdb331544f0a2ed</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">045324cf39dd8d58706f6c90b421bbfe82dfbf1fa1bb614becf94af1bc5598fa</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">a85d45511bcc33ddbb1351d215ec9e16b644ecd45a8ef08c6c927cd4c8284f88</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" id="CVE-2022-21619" title="Openjdk: Improper Handling Of Long Ntlm Client Hostnames (Security, 8286526)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" id="CVE-2022-21624" title="Openjdk: Insufficient Randomization Of Jndi Dns Port Numbers (Jndi, 8286910)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" id="CVE-2022-21626" title="Openjdk: Excessive Memory Allocation In X.509 Certificate Parsing (Security, 8286533)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" id="CVE-2022-21628" title="Openjdk: Httpserver No Connection Count Limit (Lightweight Http Server, 8286918)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7002" id="RHSA-2022:7002-1" title="Rhsa-2022:7002-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133745" id="2133745" title="Openjdk: Improper Handling Of Long Ntlm Client Hostnames (Security, 8286526)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133753" id="2133753" title="Openjdk: Excessive Memory Allocation In X.509 Certificate Parsing (Security, 8286533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133765" id="2133765" title="Openjdk: Insufficient Randomization Of Jndi Dns Port Numbers (Jndi, 8286910)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133769" id="2133769" title="Openjdk: Httpserver No Connection Count Limit (Lightweight Http Server, 8286918)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7008</id><title>Moderate: Java-11-Openjdk Security And Bug Fix Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) (BZ#2130373)
</description><severity>moderate</severity><issued date="2022-10-21 09:05:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-demo-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">9b30e0b4114447ecba9284f9f8bdc7a7fad055bd25fa4d0f940b2445b6a19073</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">3d3a96485558332be7609acf9e84226055ff1d14905e59a943ea18cbab036696</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-demo-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">9c23f12f9a5495a548e1c9459308e84b9e9bc0ba240fa1dc77ea08baf93b2e62</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-devel-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">c794784018586395306109eb35a4e7a2b0af066a1c512f075ad22511bcc300c4</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">0b5a939ef30c149d7c8bc37d653dba5e91cc9800a95b7105afb9d53461fc42ef</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-jmods-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">1f9d95412225790c9ee7352e4f91df4e7802ba3277c8d8dd51b1739db7ad3664</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-headless-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">d885ab7433ac56582a23b9ecd7d23131073867860a272dd26173cf376f16f65e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">65a4fae1ca173d02255c130907fcd50e78168bc5bc4135e20df69177bd56c619</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-devel-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">a887b2c3dd2ffe619fdd61c8fb2ddc15918bda4b3ecdd06aace9b65e7f335952</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">49bf2f5320e238c6aae952f0a51052ed5e6759fc81e272117e30c0e39b6ad55b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-src-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">906dbfba89f53fba9d831aef188204c768faea406c5c6cac748650a2acd5b2dd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-src-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">be16072fc3b3928b5e29e9ac8de897e345b1e7c05bc5a3653394f190a516a935</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-static-libs-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">d220f2012589f2cb3f6a2a35c2d450e9d046810cdfad7162041dbac644ee5a24</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">873e1f41f194c4720c8b728c6fdca7682b625710ee7b6335f64734b3c5937f49</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">01ed2ea371ef11fd32780c19716eb34a3b66e3eaf3a493095e65bf86f69521c5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-jmods-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">9f96cafc43c20dab9078c4fff5050241c0a92b28af68e4fab5160bed79580a44</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-headless-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">26122d4e60e887d73eb597edad58173f18d3ca9cc960670b3ba34cfc89627058</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618" id="CVE-2022-21618" title="Cve-2022-21618" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" id="CVE-2022-21619" title="Cve-2022-21619" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" id="CVE-2022-21624" title="Cve-2022-21624" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" id="CVE-2022-21626" title="Cve-2022-21626" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" id="CVE-2022-21628" title="Cve-2022-21628" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399" id="CVE-2022-39399" title="Cve-2022-39399" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7008" id="RHSA-2022:7008" title="Moderate: Java-11-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2130373" id="2130373" title="2130373 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-10, 11.0.17) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7008-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS,  8286077) (CVE-2022-21618) 
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) 
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) 
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) 
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) 
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-10-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-headless-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">2e2f4282ea556b93790aa1f19bba98323f97261add22e01175952f7b54180271</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-devel-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">c6dac67cc14997f8bdd2dd3f7c17a5356cf1dfd544c537e4a4cb1be83e411dc5</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-demo-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">a70dbda492c78313c14a7a84828fc160b387bb1a1ea3ebfc2901e4a1ada2c63c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">d68cb771bd42bb1114ef6559d8f7a51c2fd9e2ef435ad5a94dcb10744af7837f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">b68bc607c222aa7323545ccb3262e624a17ad28dd04cfe4f0575a0cd6a14b905</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-devel-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">15ab7a5216ed7697b80152e664dad4c0118228e2efbe7fde553627ef5d0fe1d6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">897a35cd9ecd8fe3605aeb9f800e834335b04aeeb756419b111fa6910fdbf20a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-src-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">4e1a6147713db1f4fafbd879be92ce02a46966b7dbf0474b43eed85ffbb4bdb7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">85858b751048b26cad16d92415828e9468ee5835840e547c549c00e31fade5d3</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">79f01ac42da78f71404bcac3d62dcc7c6f3d60100a33b8e1eff91f9c25d75210</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">5f7eb56248f3f5eb23975d3b7bae6acb884bcc24aeab2c6d51c80277274f28e8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">28fc66558d2ba55d75d14e50f8816694f309cb296e8ac95a22655364e2a0c176</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-src-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">5b6289d4a8c6cfb1938a28dc1a42b9849c012856d101f1ee0e69e621a979d06d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">f3eba0997d80fd02f0641cb91ef9d3e79154b864cb8ec725b3468e6772c85942</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-demo-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">bc21f6281a4762c1b3a272002479649491b01a68954c3962d4c7a75c38390c5c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">de645229b378ac294b1976bb731ce4336a91191ebb1573bb8f042b109397b583</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-headless-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">bbb34fc805b6ee57991a015d7ae9bbfd4de8f6f6685a0a5a6e8dafee0f0e24a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618" id="CVE-2022-21618" title="Openjdk: Improper Multibyte Conversion Can Lead To Buffer Overflow (Jgss, 8286077)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" id="CVE-2022-21619" title="Openjdk: Improper Handling Of Long Ntlm Client Hostnames (Security, 8286526)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" id="CVE-2022-21624" title="Openjdk: Insufficient Randomization Of Jndi Dns Port Numbers (Jndi, 8286910)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" id="CVE-2022-21626" title="Openjdk: Excessive Memory Allocation In X.509 Certificate Parsing (Security, 8286533)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" id="CVE-2022-21628" title="Openjdk: Httpserver No Connection Count Limit (Lightweight Http Server, 8286918)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399" id="CVE-2022-39399" title="Openjdk: Missing Sni Caching In Http/2 (Networking, 8289366)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7008" id="RHSA-2022:7008-1" title="Rhsa-2022:7008-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133745" id="2133745" title="Openjdk: Improper Handling Of Long Ntlm Client Hostnames (Security, 8286526)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133753" id="2133753" title="Openjdk: Excessive Memory Allocation In X.509 Certificate Parsing (Security, 8286533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133765" id="2133765" title="Openjdk: Insufficient Randomization Of Jndi Dns Port Numbers (Jndi, 8286910)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133769" id="2133769" title="Openjdk: Httpserver No Connection Count Limit (Lightweight Http Server, 8286918)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133776" id="2133776" title="Openjdk: Missing Sni Caching In Http/2 (Networking, 8289366)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133817" id="2133817" title="Openjdk: Improper Multibyte Conversion Can Lead To Buffer Overflow (Jgss, 8286077)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7069-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.4.0 ESR. 
Security Fix(es): 
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs  (CVE-2022-42927) 
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) 
* Mozilla: Denial of Service via window.print (CVE-2022-42929) 
* Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.4.0-1.el7_9.src.rpm" version="102.4.0"><filename>firefox-102.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">0642373afde8eacc9aeeb43c40c54bcf7c9f3749c7a1a8ea40e35825d201482e</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.4.0-1.el7_9.src.rpm" version="102.4.0"><filename>firefox-102.4.0-1.el7_9.i686.rpm</filename><sum type="sha256">9acb24fcb2dfe02086a689c5392f6c45d84459580fd79b2d14ce0993dc21d96c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927" id="CVE-2022-42927" title="Mozilla: Same-Origin Policy Violation Could Have Leaked Cross-Origin Urls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928" id="CVE-2022-42928" title="Mozilla: Memory Corruption In Js Engine" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929" id="CVE-2022-42929" title="Mozilla: Denial Of Service Via Window.Print" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42932" id="CVE-2022-42932" title="Mozilla: Memory Safety Bugs Fixed In Firefox 106 And Firefox Esr 102.4" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7069" id="RHSA-2022:7069-1" title="Rhsa-2022:7069-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136156" id="2136156" title="Mozilla: Same-Origin Policy Violation Could Have Leaked Cross-Origin Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136157" id="2136157" title="Mozilla: Memory Corruption In Js Engine" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136158" id="2136158" title="Mozilla: Denial Of Service Via Window.Print" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136159" id="2136159" title="Mozilla: Memory Safety Bugs Fixed In Firefox 106 And Firefox Esr 102.4" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7086-1</id><title>Pki-Core</title><description>Security Fix(es): 
* pki-core: When using the caServerKeygen_DirUserCert profile, user can get  certificates for other UIDs by entering name in Subject field (CVE-2022-2393) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-10-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-server" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-server-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">09524799484444a63b913868881e250af4f0119140f1ca99fc6c4fbc468cac6b</sum></package><package arch="noarch" name="pki-kra" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-kra-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">f76d979333f8434d23757f3b6e1bb28343747049e0a10cb5252ebcfe5462802c</sum></package><package arch="noarch" name="pki-base-java" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-base-java-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">794c5cb52ab984ec7528d71a07eb08a8e2d93ef75e10ebf594d4c42cb40b248b</sum></package><package arch="noarch" name="pki-javadoc" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-javadoc-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">167f14b76c2519a957b28c4c1104739f821a2f2943f3b31f34437ebcd68f8bf9</sum></package><package arch="x86_64" name="pki-symkey" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-symkey-10.5.18-23.el7_9.x86_64.rpm</filename><sum type="sha256">49a97d887f18cea8d21db6e43d88473304c72347ec23df948a7058b2922e07c9</sum></package><package arch="x86_64" name="pki-tools" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-tools-10.5.18-23.el7_9.x86_64.rpm</filename><sum type="sha256">fd9f9a6b2d9168cf15bba41c981c54459bce435098ec52d0c4827685bcb01ea7</sum></package><package arch="noarch" name="pki-base" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-base-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">953ae5767d157d431e1c9bb90cd2151636d8e605ec23df90789c96372f8602dd</sum></package><package arch="noarch" name="pki-ca" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-ca-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">02068486401ee6b5051a65921893a41da030562b0a46be4f00fbd004f9119515</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2393" id="CVE-2022-2393" title="Pki-Core: When Using The Caserverkeygen_Dirusercert Profile, User Can Get Certificates For Other Uids By Entering Name In Subject Field" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7086" id="RHSA-2022:7086-1" title="Rhsa-2022:7086-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2101046" id="2101046" title="Pki-Core: When Using The Caserverkeygen_Dirusercert Profile, User Can Get Certificates For Other Uids By Entering Name In Subject Field" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7087-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Import may break replication because changelog starting csn may not be created</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-10-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base" release="17.el7_9" src="389-ds-base-1.3.10.2-17.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-17.el7_9.x86_64.rpm</filename><sum type="sha256">944f95622365738fafccebbf63316eac7d691e3e470ee9fc33d68fdba098b14f</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="17.el7_9" src="389-ds-base-1.3.10.2-17.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-17.el7_9.x86_64.rpm</filename><sum type="sha256">d8d451f7a840ad2daf7160514343a7d0803e7f24b76086999548e5715fe5b085</sum></package><package arch="x86_64" name="389-ds-base-devel" release="17.el7_9" src="389-ds-base-1.3.10.2-17.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-17.el7_9.x86_64.rpm</filename><sum type="sha256">6ec4b181ba625b39344fcbd044793356d3549213cbf7e94806dd06fc38d84a17</sum></package><package arch="x86_64" name="389-ds-base-libs" release="17.el7_9" src="389-ds-base-1.3.10.2-17.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-17.el7_9.x86_64.rpm</filename><sum type="sha256">77db2d2adfa7d50b05eb1f3eb8f39fb488d0a6b36121d361057dff940ebd85d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2850" id="CVE-2022-2850" title="389-Ds-Base: Sigsegv In Sync_Repl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7087" id="RHSA-2022:7087-1" title="Rhsa-2022:7087-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2113056" id="2113056" title="Import May Break Replication Because Changelog Starting Csn May Not Be Created" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2118691" id="2118691" title="389-Ds-Base: Sigsegv In Sync_Repl" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7088-1</id><title>Libksba</title><description>Security Fix(es): 
* libksba: integer overflow may lead to remote code execution (CVE-2022-3515) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libksba" release="6.el7_9" src="libksba-1.3.0-6.el7_9.src.rpm" version="1.3.0"><filename>libksba-1.3.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">7e11e6a81df1d6272e17a03009a28d7943a6cabd68bf3a923c6d89ead0769d2f</sum></package><package arch="x86_64" name="libksba-devel" release="6.el7_9" src="libksba-1.3.0-6.el7_9.src.rpm" version="1.3.0"><filename>libksba-devel-1.3.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">673f0822ba542ac61ce573dca842da2c6661e75fb2de30e86bad51cb7a6237e3</sum></package><package arch="i686" name="libksba-devel" release="6.el7_9" src="libksba-1.3.0-6.el7_9.src.rpm" version="1.3.0"><filename>libksba-devel-1.3.0-6.el7_9.i686.rpm</filename><sum type="sha256">07a063e3cc370de7bb840c75e0f4ee06e5c777a7c18b843916c71c484ca8e943</sum></package><package arch="i686" name="libksba" release="6.el7_9" src="libksba-1.3.0-6.el7_9.src.rpm" version="1.3.0"><filename>libksba-1.3.0-6.el7_9.i686.rpm</filename><sum type="sha256">533730773bb7dfd38472b7e70e42eb7e2ffd62449d70aeca13d4019900e8f8b8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515" id="CVE-2022-3515" title="Libksba: Integer Overflow May Lead To Remote Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7088" id="RHSA-2022:7088-1" title="Rhsa-2022:7088-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135610" id="2135610" title="Libksba: Integer Overflow May Lead To Remote Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7184-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.4.0. 
Security Fix(es): 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) 
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs  (CVE-2022-42927) 
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) 
* Mozilla: Denial of Service via window.print (CVE-2022-42929) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.4.0-1.el7_9.src.rpm" version="102.4.0"><filename>thunderbird-102.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">751d9af64cbed054e4ce9d25ba8de957cfca2e6b6bbc6e583f6bb7e955e8e702</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39236" id="CVE-2022-39236" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To A Data Corruption Issue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39249" id="CVE-2022-39249" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To An Impersonation Attack By Malicious Server Administrators" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39250" id="CVE-2022-39250" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To A Device Verification Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39251" id="CVE-2022-39251" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To An Impersonation Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927" id="CVE-2022-42927" title="Mozilla: Same-Origin Policy Violation Could Have Leaked Cross-Origin Urls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928" id="CVE-2022-42928" title="Mozilla: Memory Corruption In Js Engine" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929" id="CVE-2022-42929" title="Mozilla: Denial Of Service Via Window.Print" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42932" id="CVE-2022-42932" title="Mozilla: Memory Safety Bugs Fixed In Firefox 106 And Firefox Esr 102.4" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7184" id="RHSA-2022:7184-1" title="Rhsa-2022:7184-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135391" id="2135391" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To A Data Corruption Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135393" id="2135393" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To An Impersonation Attack By Malicious Server Administrators" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135395" id="2135395" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To A Device Verification Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135396" id="2135396" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To An Impersonation Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136156" id="2136156" title="Mozilla: Same-Origin Policy Violation Could Have Leaked Cross-Origin Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136157" id="2136157" title="Mozilla: Memory Corruption In Js Engine" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136158" id="2136158" title="Mozilla: Denial Of Service Via Window.Print" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136159" id="2136159" title="Mozilla: Memory Safety Bugs Fixed In Firefox 106 And Firefox Esr 102.4" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7186-1</id><title>Device-Mapper-Multipath</title><description>Security Fix(es): 
* device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="device-mapper-multipath-libs" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-libs-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">c0417cd8fbd8cf0ebb675b89fe1472401299dbe36f3fe4832a6fd6f3d4820ee3</sum></package><package arch="x86_64" name="device-mapper-multipath-devel" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-devel-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">fe3b267788d109ff4f28777fcc00dafaa6669cae749057415a1194fe94cabeec</sum></package><package arch="x86_64" name="libdmmp-devel" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>libdmmp-devel-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">30ca5556be8eab6e7c22d594443e7627ddc1d414751cad4b31556d244787ce56</sum></package><package arch="x86_64" name="device-mapper-multipath" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">55013cb7881446aa95631dfd591cde64b649c7a1b91c942d131bc49e117c0ff1</sum></package><package arch="x86_64" name="kpartx" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>kpartx-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">0df134d6cc6152e6ee502a0590a4f10aeaabd870624486bcd1ecf804d0376e01</sum></package><package arch="i686" name="libdmmp-devel" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>libdmmp-devel-0.4.9-136.el7_9.i686.rpm</filename><sum type="sha256">7d73ab67bd157e7d42989546fe383af91118f2bb5afa94b5ac0ca82ce2d6d9b2</sum></package><package arch="x86_64" name="libdmmp" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>libdmmp-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">859220b7a7116671fa883778eb026c73853085eb18dcdf85d37c6f13904a8b9b</sum></package><package arch="i686" name="libdmmp" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>libdmmp-0.4.9-136.el7_9.i686.rpm</filename><sum type="sha256">df30e350eaf3d5d7eff406c4e548aea30732ea9564ea84403018876c810e2664</sum></package><package arch="i686" name="device-mapper-multipath-libs" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-libs-0.4.9-136.el7_9.i686.rpm</filename><sum type="sha256">16b497a2a5748f83372ecd97c9a53caf6a56c5136e039a3ec351c7ac6074fa26</sum></package><package arch="x86_64" name="device-mapper-multipath-sysvinit" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-sysvinit-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">125e697568c384f2b0e8b1e81a067b11d599fe7a078c7ac2347729e66a6b21e6</sum></package><package arch="i686" name="device-mapper-multipath-devel" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-devel-0.4.9-136.el7_9.i686.rpm</filename><sum type="sha256">be0f0cbdc39232617d8f56ea6b5c387a8e7a5fdc378e8379553adcca324e81f0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41974" id="CVE-2022-41974" title="Device-Mapper-Multipath: Authorization Bypass, Multipathd Daemon Listens For Client Connections On An Abstract Unix Socket" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7186" id="RHSA-2022:7186-1" title="Rhsa-2022:7186-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133988" id="2133988" title="Device-Mapper-Multipath: Authorization Bypass, Multipathd Daemon Listens For Client Connections On An Abstract Unix Socket" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7337-1</id><title>Kernel</title><description>Security Fix(es): 
* a use-after-free in cls_route filter implementation may lead to privilege  escalation (CVE-2022-2588) 
* RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900) 
* Branch Type Confusion (non-retbleed) (CVE-2022-23825) 
* Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) 
* Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* lpfc panics in lpfc_els_free_iocb() during port recovery 
* mlx5 reports error messages during shutdown then panic with mce 
* Kernel panic due to hard lockup caused by deadlock between tasklist_lock and k_itimer-&gt;it_lock 
* fix excess double put in nfs_prime_dcache</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug-devel" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">371b608b0e17311b77cbb5c189256e34e26616d68e63c2377d3cf2fff2738f6c</sum></package><package arch="noarch" name="kernel-doc" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.80.1.el7.noarch.rpm</filename><sum type="sha256">8ebb2c2be13c520a0bc08dd36c7d3f6986cb16e3999e3ef5e1a0405227ebaf19</sum></package><package arch="x86_64" name="perf" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">a45033d911a9951c719cbe1aff04fcf2216b4196f99c28010beb30b26f3366cb</sum></package><package arch="x86_64" name="kernel-tools" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">2d77fae8e1d3117d2bd2d48cbc79b5c3dcbf58c48a6f8b9be6a2681eee9d2806</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">4a71676849293f3c9f03b00e00d398df59415f2b4b2b146f74ae8f5583d347ef</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">aac2543f8b404cc85519fca1c32a189b44db191d78a4d19345e5b2963c531436</sum></package><package arch="x86_64" name="python-perf" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">059abb1c94a1beb4ff872ca8ea2dc9faf621c414a90dcfedfa5922eabf27bebe</sum></package><package arch="x86_64" name="kernel-devel" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">ddbdb5dffbf590e495a3f442dac24a81a3cc0ae681eb42fe5853a68d2ea2b6b0</sum></package><package arch="x86_64" name="kernel-debug" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">dccc8cb1637b56a31daafec03d0f5618c74aa0c35c407136d3c447b661adf7fc</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.80.1.el7.noarch.rpm</filename><sum type="sha256">0f478084fd9a6ac71bdfe4f6a6d68c360817fe8b8875cfc733e46165b5230a67</sum></package><package arch="x86_64" name="kernel" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">334bf15c70cbd6233c3b86e566248a9996c9e25a541f91113f6bc278a09ccf45</sum></package><package arch="x86_64" name="kernel-headers" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">e1b1fb5a43dba7bdcc17a379221e8dfe0084b0a62bf19934dd34a293e0cd6565</sum></package><package arch="x86_64" name="bpftool" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">5b1549f366029a1777a0a1672a63ecb1070ceef48b309f5f3315442f9c000764</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23816" id="CVE-2022-23816" title="Hw: Cpu: Amd: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" id="CVE-2022-23825" title="Hw: Cpu: Amd: Branch Type Confusion (Non-Retbleed)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" id="CVE-2022-2588" title="Kernel: A Use-After-Free In Cls_Route Filter Implementation May Lead To Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" id="CVE-2022-26373" title="Hw: Cpu: Intel: Post-Barrier Return Stack Buffer Predictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" id="CVE-2022-29900" title="Hw: Cpu: Amd: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" id="CVE-2022-29901" title="Hw: Cpu: Intel: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7337" id="RHSA-2022:7337-1" title="Rhsa-2022:7337-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2090226" id="2090226" title="Hw: Cpu: Amd: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2103148" id="2103148" title="Hw: Cpu: Intel: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2103153" id="2103153" title="Hw: Cpu: Amd: Branch Type Confusion (Non-Retbleed)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2114849" id="2114849" title="Kernel: A Use-After-Free In Cls_Route Filter Implementation May Lead To Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2115065" id="2115065" title="Hw: Cpu: Intel: Post-Barrier Return Stack Buffer Predictions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7340-1</id><title>Php-Pear</title><description>Security Fix(es): 
* Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) 
* Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) 
* Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-11-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="php-pear" release="23.el7_9" src="php-pear-1.9.4-23.el7_9.src.rpm" version="1.9.4"><filename>php-pear-1.9.4-23.el7_9.noarch.rpm</filename><sum type="sha256">03d25f58bd03ae554728125a505e13150c6f9bc8eae411c41dc195bb34099c22</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28948" id="CVE-2020-28948" title="Archive_Tar: Allows An Unserialization Attack Because Phar: Is Blocked But Phar: Is Not Blocked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28949" id="CVE-2020-28949" title="Archive_Tar: Improper Filename Sanitization Leads To File Overwrites" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36193" id="CVE-2020-36193" title="Archive_Tar: Directory Traversal Due To Inadequate Checking Of Symbolic Links" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7340" id="RHSA-2022:7340-1" title="Rhsa-2022:7340-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1904001" id="1904001" title="Archive_Tar: Allows An Unserialization Attack Because Phar: Is Blocked But Phar: Is Not Blocked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1910323" id="1910323" title="Archive_Tar: Improper Filename Sanitization Leads To File Overwrites" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942961" id="1942961" title="Archive_Tar: Directory Traversal Due To Inadequate Checking Of Symbolic Links" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7343</id><title>Important: Pcs Security Update</title><description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
Security Fix(es):
* rubygem-rack: crafted requests can cause shell escape sequences (CVE-2022-30123) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-11-03 08:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pcs-snmp" release="3.sl7_9.3" src="pcs-0.9.169-3.sl7_9.3.src.rpm" version="0.9.169"><filename>pcs-snmp-0.9.169-3.sl7_9.3.x86_64.rpm</filename><sum type="sha256">390b97770cab2e1374c50ec3619000ebb7872e23a8419e960c92041cfff00a83</sum></package><package arch="x86_64" name="pcs" release="3.sl7_9.3" src="pcs-0.9.169-3.sl7_9.3.src.rpm" version="0.9.169"><filename>pcs-0.9.169-3.sl7_9.3.x86_64.rpm</filename><sum type="sha256">f8d9e60d0aa9c4ead385ae3725133bd8e1593e67285fa304ad0fc02bc6e3ef31</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358" id="CVE-2019-11358" title="Cve-2019-11358" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" id="CVE-2020-11023" title="Cve-2020-11023" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123" id="CVE-2022-30123" title="Cve-2022-30123" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7343" id="RHSA-2022:7343" title="Important: Pcs Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8491-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c (CVE-2022-3550) 
* xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c (CVE-2022-3551) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-devel" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">3e3432461e7d3bc68549c1872fde8eac9e22004155b343f0d5e98e0a96a6debd</sum></package><package arch="i686" name="xorg-x11-server-devel" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-19.el7_9.i686.rpm</filename><sum type="sha256">0fd6387e097cf045b57e24a56d2da4afee38e756dc8ed403e95263f6356547e0</sum></package><package arch="noarch" name="xorg-x11-server-source" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-19.el7_9.noarch.rpm</filename><sum type="sha256">9023b819fdd94631d36f8be6c4c146489ca13e1134cb7e713d0846a2190816f6</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">24376753e027a21ae6fa8e7b389c76538157ed9e06b64e44fc9b89a99fc6c10b</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">d0fcf4663345dc9465ef599962e37c0682546d1e76426a1e946245c0910ab558</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">9ceb862a8744affd6ac8c2d38d756324460ad2cfe084621de13c075aad9590e2</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">5618774205f6014628aeee0dcf61781f52a0f265211147dffb51967c92942fdc</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">0e1d8fbdd9864e1c01862fa15e6d601e0b230ee758da7838f905cf728054aed5</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">aef148d20647d6392ce3a307b6305368d22ba19d28efb86fe15f1a90f02466a6</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">3472ac91cc88a2b629fb6dc03cee388c9e0d7bb8d3e476526b7074480d663b2b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550" id="CVE-2022-3550" title="Xorg-X11-Server: Buffer Overflow In _Getcountedstring() In Xkb/Xkb.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551" id="CVE-2022-3551" title="Xorg-X11-Server: Memory Leak In Procxkbgetkbdbyname() In Xkb/Xkb.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8491" id="RHSA-2022:8491-1" title="Rhsa-2022:8491-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2140698" id="2140698" title="Xorg-X11-Server: Buffer Overflow In _Getcountedstring() In Xkb/Xkb.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2140701" id="2140701" title="Xorg-X11-Server: Memory Leak In Procxkbgetkbdbyname() In Xkb/Xkb.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8552-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.5.0 ESR. 
Security Fix(es): 
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) 
* Mozilla: Fullscreen notification bypass (CVE-2022-45404) 
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) 
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) 
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) 
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) 
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) 
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) 
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) 
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) 
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) 
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) 
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.5.0-1.el7_9.src.rpm" version="102.5.0"><filename>firefox-102.5.0-1.el7_9.i686.rpm</filename><sum type="sha256">fbfdecd9b75c9285060bf545f775eec9d54c680f703ee44634b2d6892b5b62c6</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.5.0-1.el7_9.src.rpm" version="102.5.0"><filename>firefox-102.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">d9246fd451ec95c47e1faae3b828827c1a897d3a0447c57b2a79e744347c42d4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403" id="CVE-2022-45403" title="Mozilla: Service Workers Might Have Learned Size Of Cross-Origin Media Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404" id="CVE-2022-45404" title="Mozilla: Fullscreen Notification Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405" id="CVE-2022-45405" title="Mozilla: Use-After-Free In Inputstream Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406" id="CVE-2022-45406" title="Mozilla: Use-After-Free Of A Javascript Realm" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408" id="CVE-2022-45408" title="Mozilla: Fullscreen Notification Bypass Via Windowname" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409" id="CVE-2022-45409" title="Mozilla: Use-After-Free In Garbage Collection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410" id="CVE-2022-45410" title="Mozilla: Serviceworker-Intercepted Requests Bypassed Samesite Cookie Policy" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411" id="CVE-2022-45411" title="Mozilla: Cross-Site Tracing Was Possible Via Non-Standard Override Headers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412" id="CVE-2022-45412" title="Mozilla: Symlinks May Resolve To Partially Uninitialized Buffers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416" id="CVE-2022-45416" title="Mozilla: Keystroke Side-Channel Leakage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418" id="CVE-2022-45418" title="Mozilla: Custom Mouse Cursor Could Have Been Drawn Over Browser Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420" id="CVE-2022-45420" title="Mozilla: Iframe Contents Could Be Rendered Outside The Iframe" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421" id="CVE-2022-45421" title="Mozilla: Memory Safety Bugs Fixed In Firefox 107 And Firefox Esr 102.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8552" id="RHSA-2022:8552-1" title="Rhsa-2022:8552-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143197" id="2143197" title="Mozilla: Service Workers Might Have Learned Size Of Cross-Origin Media Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143198" id="2143198" title="Mozilla: Fullscreen Notification Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143199" id="2143199" title="Mozilla: Use-After-Free In Inputstream Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143200" id="2143200" title="Mozilla: Use-After-Free Of A Javascript Realm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143201" id="2143201" title="Mozilla: Fullscreen Notification Bypass Via Windowname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143202" id="2143202" title="Mozilla: Use-After-Free In Garbage Collection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143203" id="2143203" title="Mozilla: Serviceworker-Intercepted Requests Bypassed Samesite Cookie Policy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143204" id="2143204" title="Mozilla: Cross-Site Tracing Was Possible Via Non-Standard Override Headers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143205" id="2143205" title="Mozilla: Symlinks May Resolve To Partially Uninitialized Buffers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143240" id="2143240" title="Mozilla: Keystroke Side-Channel Leakage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143241" id="2143241" title="Mozilla: Custom Mouse Cursor Could Have Been Drawn Over Browser Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143242" id="2143242" title="Mozilla: Iframe Contents Could Be Rendered Outside The Iframe" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143243" id="2143243" title="Mozilla: Memory Safety Bugs Fixed In Firefox 107 And Firefox Esr 102.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8555-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.5.0. 
Security Fix(es): 
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) 
* Mozilla: Fullscreen notification bypass (CVE-2022-45404) 
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) 
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) 
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) 
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) 
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) 
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) 
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) 
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) 
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) 
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) 
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.5.0-2.el7_9.src.rpm" version="102.5.0"><filename>thunderbird-102.5.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">aa6b87752deb674efc6faf9d021e36523a29be598aba27f9627d9118f480c8aa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403" id="CVE-2022-45403" title="Mozilla: Service Workers Might Have Learned Size Of Cross-Origin Media Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404" id="CVE-2022-45404" title="Mozilla: Fullscreen Notification Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405" id="CVE-2022-45405" title="Mozilla: Use-After-Free In Inputstream Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406" id="CVE-2022-45406" title="Mozilla: Use-After-Free Of A Javascript Realm" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408" id="CVE-2022-45408" title="Mozilla: Fullscreen Notification Bypass Via Windowname" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409" id="CVE-2022-45409" title="Mozilla: Use-After-Free In Garbage Collection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410" id="CVE-2022-45410" title="Mozilla: Serviceworker-Intercepted Requests Bypassed Samesite Cookie Policy" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411" id="CVE-2022-45411" title="Mozilla: Cross-Site Tracing Was Possible Via Non-Standard Override Headers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412" id="CVE-2022-45412" title="Mozilla: Symlinks May Resolve To Partially Uninitialized Buffers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416" id="CVE-2022-45416" title="Mozilla: Keystroke Side-Channel Leakage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418" id="CVE-2022-45418" title="Mozilla: Custom Mouse Cursor Could Have Been Drawn Over Browser Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420" id="CVE-2022-45420" title="Mozilla: Iframe Contents Could Be Rendered Outside The Iframe" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421" id="CVE-2022-45421" title="Mozilla: Memory Safety Bugs Fixed In Firefox 107 And Firefox Esr 102.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8555" id="RHSA-2022:8555-1" title="Rhsa-2022:8555-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143197" id="2143197" title="Mozilla: Service Workers Might Have Learned Size Of Cross-Origin Media Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143198" id="2143198" title="Mozilla: Fullscreen Notification Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143199" id="2143199" title="Mozilla: Use-After-Free In Inputstream Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143200" id="2143200" title="Mozilla: Use-After-Free Of A Javascript Realm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143201" id="2143201" title="Mozilla: Fullscreen Notification Bypass Via Windowname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143202" id="2143202" title="Mozilla: Use-After-Free In Garbage Collection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143203" id="2143203" title="Mozilla: Serviceworker-Intercepted Requests Bypassed Samesite Cookie Policy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143204" id="2143204" title="Mozilla: Cross-Site Tracing Was Possible Via Non-Standard Override Headers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143205" id="2143205" title="Mozilla: Symlinks May Resolve To Partially Uninitialized Buffers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143240" id="2143240" title="Mozilla: Keystroke Side-Channel Leakage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143241" id="2143241" title="Mozilla: Custom Mouse Cursor Could Have Been Drawn Over Browser Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143242" id="2143242" title="Mozilla: Iframe Contents Could Be Rendered Outside The Iframe" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143243" id="2143243" title="Mozilla: Memory Safety Bugs Fixed In Firefox 107 And Firefox Esr 102.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8560-1</id><title>Hsqldb</title><description>Security Fix(es): 
* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="hsqldb-demo" release="15.el7_9" src="hsqldb-1.8.1.3-15.el7_9.src.rpm" version="1.8.1.3"><filename>hsqldb-demo-1.8.1.3-15.el7_9.noarch.rpm</filename><sum type="sha256">52afec8b8d834a50847f845c3d07024d94af6ecde1019872ddfd1b8f7ae27ca6</sum></package><package arch="noarch" epoch="1" name="hsqldb-manual" release="15.el7_9" src="hsqldb-1.8.1.3-15.el7_9.src.rpm" version="1.8.1.3"><filename>hsqldb-manual-1.8.1.3-15.el7_9.noarch.rpm</filename><sum type="sha256">d37aa571bfe6d88ad8c91d832ce9b4681a923db382482dd0c616e245e37ed2c2</sum></package><package arch="noarch" epoch="1" name="hsqldb-javadoc" release="15.el7_9" src="hsqldb-1.8.1.3-15.el7_9.src.rpm" version="1.8.1.3"><filename>hsqldb-javadoc-1.8.1.3-15.el7_9.noarch.rpm</filename><sum type="sha256">a27b384f2e00296902b1a0fc4191f3ba7316a3fafd968e944e37f19a4d7151f6</sum></package><package arch="noarch" epoch="1" name="hsqldb" release="15.el7_9" src="hsqldb-1.8.1.3-15.el7_9.src.rpm" version="1.8.1.3"><filename>hsqldb-1.8.1.3-15.el7_9.noarch.rpm</filename><sum type="sha256">227ca9d80bccfb61a5790605ed02ff16da540572df48e3705884964262444a56</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41853" id="CVE-2022-41853" title="Hsqldb: Untrusted Input May Lead To Rce Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8560" id="RHSA-2022:8560-1" title="Rhsa-2022:8560-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136141" id="2136141" title="Hsqldb: Untrusted Input May Lead To Rce Attack" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8640-1</id><title>Krb5</title><description>Security Fix(es): 
* krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="krb5-libs" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-55.el7_9.i686.rpm</filename><sum type="sha256">1f711a5526449ed91253280ae45242d477b1abc458cc6d2cbac38ad0ae33cf20</sum></package><package arch="i686" name="libkadm5" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-55.el7_9.i686.rpm</filename><sum type="sha256">88bb67fe414e2b7cb835e8232d313bf8ca0a6cfeb75b7e572f7752d8edec8c64</sum></package><package arch="x86_64" name="krb5-server-ldap" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-server-ldap-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">fdd36b73b8525fafedd6d7583da11d48fed0c3152cb1f6781efc425b05152380</sum></package><package arch="x86_64" name="krb5-devel" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">7c2e5c8e65ee6cc4042785a0ed36f99435254246f07260981f47b848921e61f2</sum></package><package arch="x86_64" name="krb5-server" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-server-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">5c22318fd10f1e807a87454ab210b4f1c3e5681fb931becfd7a866a37476808a</sum></package><package arch="i686" name="krb5-devel" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-55.el7_9.i686.rpm</filename><sum type="sha256">0a98cd60d216e78afb2bfd8c25bf46c2aeeaa1b4412b3000c702a8c4db02bf32</sum></package><package arch="x86_64" name="krb5-pkinit" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-pkinit-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">67b71dd1972f73c992e99e75c2204ca00ebc4d6979e0f833c9c14125ff4b7229</sum></package><package arch="x86_64" name="krb5-libs" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">94051fb415c683c99563089edd3efdc1c89803c3a5dd6a5d552d6fc0e302e3f7</sum></package><package arch="x86_64" name="libkadm5" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">09c4105398d0ebfda101c5733482baba1a78c10c09214d066630e4b93b368142</sum></package><package arch="x86_64" name="krb5-workstation" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-workstation-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">632e08ca81c5804305ea37d3a31eb3043c022e5f3f5477ad7dfd0fa39ee52e83</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" id="CVE-2022-42898" title="Krb5: Integer Overflow Vulnerabilities In Pac Parsing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8640" id="RHSA-2022:8640-1" title="Rhsa-2022:8640-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2140960" id="2140960" title="Krb5: Integer Overflow Vulnerabilities In Pac Parsing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8799-1</id><title>Pki-Core</title><description>Security Fix(es): 
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pki-symkey" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-symkey-10.5.18-24.el7_9.x86_64.rpm</filename><sum type="sha256">3763d3b06fa5adf88b1d856ec6e4df9ca072e85bb4c81802e242f92a276ff808</sum></package><package arch="noarch" name="pki-base-java" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-base-java-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">dec3a16ca4abc10365d37dd7f5b56d884f68dbd6daf866b94879a8791d0a7e07</sum></package><package arch="x86_64" name="pki-tools" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-tools-10.5.18-24.el7_9.x86_64.rpm</filename><sum type="sha256">0ab55652836140beb57a6c63f61647209cab3de7150476eb35cc8dadbb914db0</sum></package><package arch="noarch" name="pki-base" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-base-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">18901f2122cb5943d0653f02b4c62053e7f560ed6ea4b756c5423076d84d3234</sum></package><package arch="noarch" name="pki-server" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-server-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">56e94336222080a7ff07384101ee0283b3bd10c37c4f2a80c0829109bdad74ba</sum></package><package arch="noarch" name="pki-kra" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-kra-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">f9f6a70b5fce40e571b34548f86c5a4c3396d08b883a8cc489278f380a075b20</sum></package><package arch="noarch" name="pki-ca" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-ca-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">2e0f47fdb4abae43cd3dfed8b80839aa1d2a766c0251406381fe380f81392d07</sum></package><package arch="noarch" name="pki-javadoc" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-javadoc-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">e5f1fc8f795dc8659b0e65e19d84f650ff31d2784ff1fe8a16f794d5ec3b3847</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2414" id="CVE-2022-2414" title="Pki-Core: Access To External Entities When Parsing Xml Can Lead To Xxe" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8799" id="RHSA-2022:8799-1" title="Rhsa-2022:8799-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2104676" id="2104676" title="Pki-Core: Access To External Entities When Parsing Xml Can Lead To Xxe" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8900-1</id><title>Grub2</title><description>Security Fix(es): 
* grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">99f13a06930fd8354a1ce96c33a6259dc91161f7b09891410980dc420ccabe97</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">c2dcf0ed508fe4acc3f214e50869ff48cf0886c74714a2577e2b67d762855fc2</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">5918876ca7da16670b153194d5a341cb7761ae6492372e7072ddbdcbaa42b5a8</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">f30b3c3195f950bd75b2d21900762fcea27dab83ae1e850266e2850f25457554</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">4cd257f520e9638b7cb458d48fd0d283e107960078011156a3a8f36c9974390f</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">9c6b61af8090eac77335eb6d8ba3ad60833940748bdf74b499bb951f9894f65a</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">71306d978b90994b31c82c9d7f9b4af1f9ebbe05b1359243d83f10b9ee71c6cf</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">4ab89cd7a4d82eb2be1409e571f0e0f0f84c29a5a46305d549fcdac72816dbe2</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">ae59cc1a85e6dbfbef53c30ebefb1e2fbc1ecf5ea64dd5e219acdadc8d54d936</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7_9.11.noarch.rpm</filename><sum type="sha256">be8001b8070d239f5aa659ba3935f0f12f041c36098d269c6d3d646e3d909995</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7_9.11.noarch.rpm</filename><sum type="sha256">dde4f7b829f72d95ab2c64758b3984d14e513648d5e16960635f19b9dc224db0</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7_9.11.noarch.rpm</filename><sum type="sha256">d7305826250898110bd4c2b6011ec147aa73f2c34cb7264f62528928a896b020</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7_9.11.noarch.rpm</filename><sum type="sha256">797f457079572c3ba99445cb9db9c3650c7144d48d2f65ded3f11256a3524432</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28733" id="CVE-2022-28733" title="Grub2: Integer Underflow In Grub_Net_Recv_Ip4_Packets" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8900" id="RHSA-2022:8900-1" title="Rhsa-2022:8900-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2083339" id="2083339" title="Grub2: Integer Underflow In Grub_Net_Recv_Ip4_Packets" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8958-1</id><title>Bcel</title><description>Security Fix(es): 
* Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="bcel" release="19.el7_9" src="bcel-5.2-19.el7_9.src.rpm" version="5.2"><filename>bcel-5.2-19.el7_9.noarch.rpm</filename><sum type="sha256">e0cca685fe9940435681041174b6a4030eb581bc4e5308f7b587e3d4d1a0beff</sum></package><package arch="noarch" name="bcel-javadoc" release="19.el7_9" src="bcel-5.2-19.el7_9.src.rpm" version="5.2"><filename>bcel-javadoc-5.2-19.el7_9.noarch.rpm</filename><sum type="sha256">7a618a7aa2a41af5da430d391a804277066289904fbe29cd4ea8fd0354b7774f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42920" id="CVE-2022-42920" title="Apache-Commons-Bcel: Arbitrary Bytecode Produced Via Out-Of-Bounds Writing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8958" id="RHSA-2022:8958-1" title="Rhsa-2022:8958-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2142707" id="2142707" title="Apache-Commons-Bcel: Arbitrary Bytecode Produced Via Out-Of-Bounds Writing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:9072-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.6.0 ESR. 
Security Fix(es): 
* Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) 
* Mozilla: Use-after-free in WebGL (CVE-2022-46880) 
* Mozilla: Memory corruption in WebGL (CVE-2022-46881) 
* Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) 
* Mozilla: Use-after-free in WebGL (CVE-2022-46882) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.6.0-1.el7_9.src.rpm" version="102.6.0"><filename>firefox-102.6.0-1.el7_9.i686.rpm</filename><sum type="sha256">e520550281c9f7c97655685cc5ab1c53c4a4958a2cba6c34d6294d78b179cbeb</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.6.0-1.el7_9.src.rpm" version="102.6.0"><filename>firefox-102.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">aa5d2fc2abac7f2b6755b0d75ad9e00a5b88aa7f311c0f4be1cb30c09bf76cc0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872" id="CVE-2022-46872" title="Mozilla: Arbitrary File Read From A Compromised Content Process" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874" id="CVE-2022-46874" title="Mozilla: Drag And Dropped Filenames Could Have Been Truncated To Malicious Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878" id="CVE-2022-46878" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.6 And Thunderbird 102.6" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880" id="CVE-2022-46880" title="Mozilla: Use-After-Free In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881" id="CVE-2022-46881" title="Mozilla: Memory Corruption In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882" id="CVE-2022-46882" title="Mozilla: Use-After-Free In Webgl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:9072" id="RHSA-2022:9072-1" title="Rhsa-2022:9072-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153441" id="2153441" title="Mozilla: Arbitrary File Read From A Compromised Content Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153449" id="2153449" title="Mozilla: Drag And Dropped Filenames Could Have Been Truncated To Malicious Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153454" id="2153454" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.6 And Thunderbird 102.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153463" id="2153463" title="Mozilla: Use-After-Free In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153466" id="2153466" title="Mozilla: Memory Corruption In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153467" id="2153467" title="Mozilla: Use-After-Free In Webgl" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:9079-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.6.0. 
Security Fix(es): 
* Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) 
* Mozilla: Use-after-free in WebGL (CVE-2022-46880) 
* Mozilla: Memory corruption in WebGL (CVE-2022-46881) 
* Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content (CVE-2022-45414) 
* Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) 
* Mozilla: Use-after-free in WebGL (CVE-2022-46882) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.6.0-2.el7_9.src.rpm" version="102.6.0"><filename>thunderbird-102.6.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">42b9264f75fcbd01966a937d569bd365f98c1c7bf4d83596b2bda5b8f060f137</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414" id="CVE-2022-45414" title="Mozilla: Quoting From An Html Email With Certain Tags Will Trigger Network Requests And Load Remote Content, Regardless Of A Configuration To Block Remote Content" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872" id="CVE-2022-46872" title="Mozilla: Arbitrary File Read From A Compromised Content Process" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874" id="CVE-2022-46874" title="Mozilla: Drag And Dropped Filenames Could Have Been Truncated To Malicious Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878" id="CVE-2022-46878" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.6 And Thunderbird 102.6" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880" id="CVE-2022-46880" title="Mozilla: Use-After-Free In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881" id="CVE-2022-46881" title="Mozilla: Memory Corruption In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882" id="CVE-2022-46882" title="Mozilla: Use-After-Free In Webgl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:9079" id="RHSA-2022:9079-1" title="Rhsa-2022:9079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2149868" id="2149868" title="Mozilla: Quoting From An Html Email With Certain Tags Will Trigger Network Requests And Load Remote Content, Regardless Of A Configuration To Block Remote Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153441" id="2153441" title="Mozilla: Arbitrary File Read From A Compromised Content Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153449" id="2153449" title="Mozilla: Drag And Dropped Filenames Could Have Been Truncated To Malicious Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153454" id="2153454" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.6 And Thunderbird 102.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153463" id="2153463" title="Mozilla: Use-After-Free In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153466" id="2153466" title="Mozilla: Memory Corruption In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153467" id="2153467" title="Mozilla: Use-After-Free In Webgl" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0045-1</id><title>Tigervnc</title><description>Security Fix(es): 
* xorg-x11-server: X.Org Server XkbGetKbdByName use-after-free (CVE-2022-4283) 
* xorg-x11-server: X.Org Server XTestSwapFakeInput stack overflow (CVE-2022-46340) 
* xorg-x11-server: X.Org Server XIPassiveUngrab out-of-bounds access (CVE-2022-46341) 
* xorg-x11-server: X.Org Server XvdiSelectVideoNotify use-after-free (CVE-2022-46342) 
* xorg-x11-server: X.Org Server ScreenSaverSetAttributes use-after-free (CVE-2022-46343) 
* xorg-x11-server: X.Org Server XIChangeProperty out-of-bounds access (CVE-2022-46344) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tigervnc" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-23.el7_9.x86_64.rpm</filename><sum type="sha256">dd3017d51e87041cf20c76409022f16c604d3db82fea92764bea0ddf3064c1b1</sum></package><package arch="x86_64" name="tigervnc-server" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-23.el7_9.x86_64.rpm</filename><sum type="sha256">8ba2077105eacdd811c769c72a7a9834e55b37f61af9aa7a754fe0f5349b81d8</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-23.el7_9.x86_64.rpm</filename><sum type="sha256">1ba07a8cbf1e41a0a31c664a7bcdb64fb1a5c15aaf675dfbee04f9eeadb76ed1</sum></package><package arch="noarch" name="tigervnc-license" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-23.el7_9.noarch.rpm</filename><sum type="sha256">d4918406587f5ee86cb34b02ced600c4cebc2d49094803a34f912ac6eca5f403</sum></package><package arch="noarch" name="tigervnc-server-applet" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-23.el7_9.noarch.rpm</filename><sum type="sha256">3ce399d5291dfe9f6ea5866ca916bcc44ba1327dffe7d42ff380a8f88cc519f5</sum></package><package arch="x86_64" name="tigervnc-server-module" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-23.el7_9.x86_64.rpm</filename><sum type="sha256">f749036b2eec25233c9739ba858271abbc5c050abba51fb05efa087350fc4b77</sum></package><package arch="noarch" name="tigervnc-icons" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-23.el7_9.noarch.rpm</filename><sum type="sha256">e06f8c903c7c8f2a55c2d691f7635c0450f53b242cc4ca08b2e927dc07d534c4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" id="CVE-2022-4283" title="Xorg-X11-Server: X.Org Server Xkbgetkbdbyname Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" id="CVE-2022-46340" title="Xorg-X11-Server: X.Org Server Xtestswapfakeinput Stack Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" id="CVE-2022-46341" title="Xorg-X11-Server: X.Org Server Xipassiveungrab Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" id="CVE-2022-46342" title="Xorg-X11-Server: X.Org Server Xvdiselectvideonotify Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" id="CVE-2022-46343" title="Xorg-X11-Server: X.Org Server Screensaversetattributes Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" id="CVE-2022-46344" title="Xorg-X11-Server: X.Org Server Xichangeproperty Out-Of-Bounds Access" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0045" id="RHSA-2023:0045-1" title="Rhsa-2023:0045-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151755" id="2151755" title="Xorg-X11-Server: X.Org Server Xtestswapfakeinput Stack Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151756" id="2151756" title="Xorg-X11-Server: X.Org Server Xipassiveungrab Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151757" id="2151757" title="Xorg-X11-Server: X.Org Server Xvdiselectvideonotify Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151758" id="2151758" title="Xorg-X11-Server: X.Org Server Screensaversetattributes Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151760" id="2151760" title="Xorg-X11-Server: X.Org Server Xichangeproperty Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151761" id="2151761" title="Xorg-X11-Server: X.Org Server Xkbgetkbdbyname Use-After-Free" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0046-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: X.Org Server XkbGetKbdByName use-after-free (CVE-2022-4283) 
* xorg-x11-server: X.Org Server XTestSwapFakeInput stack overflow (CVE-2022-46340) 
* xorg-x11-server: X.Org Server XIPassiveUngrab out-of-bounds access (CVE-2022-46341) 
* xorg-x11-server: X.Org Server XvdiSelectVideoNotify use-after-free (CVE-2022-46342) 
* xorg-x11-server: X.Org Server ScreenSaverSetAttributes use-after-free (CVE-2022-46343) 
* xorg-x11-server: X.Org Server XIChangeProperty out-of-bounds access (CVE-2022-46344) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-common" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">79d53e5d5cb651278f2afcb1294f9b7f02c9247a3adaca45560400fc0b570f88</sum></package><package arch="i686" name="xorg-x11-server-devel" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-21.el7_9.i686.rpm</filename><sum type="sha256">b225aa56a8ca3c634abadd18923c8556e372e00b4f2048ef8e8d024f00048859</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">3b2ce032e3823928c8c7b39a8f3485b7f98ff75c1d93d5522b13f387742cbcc1</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">b2b56bdddd55759d19fe1cda40eef9a558d83177e52e4d4febb2674bd11183c4</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">d55a20b8c13216c9b26bbf8bfa3968a8ec696e167a952acd479fc8c88a25a143</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">31d5dcfa4b14c22d9148fc0343746d4e468c267bbc21e3beb4b573c099e60c48</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">579384683f9a00c1f779d2d356627975bbffb7fb22b45183c7cd129615eeccd5</sum></package><package arch="noarch" name="xorg-x11-server-source" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-21.el7_9.noarch.rpm</filename><sum type="sha256">51c813defbae680877830c3caba839f053ef6b7004088f7358c28d288113e7c5</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">a47e375d2cf9f34c2ccc30d20c6f94d619c492ccc51715729c75b314e3f58d67</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">18862f831a03ed2aefa268c9c5bbdce8b7b977d0010a4d6a2f547d37b1c2e861</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" id="CVE-2022-4283" title="Xorg-X11-Server: X.Org Server Xkbgetkbdbyname Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" id="CVE-2022-46340" title="Xorg-X11-Server: X.Org Server Xtestswapfakeinput Stack Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" id="CVE-2022-46341" title="Xorg-X11-Server: X.Org Server Xipassiveungrab Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" id="CVE-2022-46342" title="Xorg-X11-Server: X.Org Server Xvdiselectvideonotify Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" id="CVE-2022-46343" title="Xorg-X11-Server: X.Org Server Screensaversetattributes Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" id="CVE-2022-46344" title="Xorg-X11-Server: X.Org Server Xichangeproperty Out-Of-Bounds Access" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0046" id="RHSA-2023:0046-1" title="Rhsa-2023:0046-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151755" id="2151755" title="Xorg-X11-Server: X.Org Server Xtestswapfakeinput Stack Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151756" id="2151756" title="Xorg-X11-Server: X.Org Server Xipassiveungrab Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151757" id="2151757" title="Xorg-X11-Server: X.Org Server Xvdiselectvideonotify Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151758" id="2151758" title="Xorg-X11-Server: X.Org Server Screensaversetattributes Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151760" id="2151760" title="Xorg-X11-Server: X.Org Server Xichangeproperty Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151761" id="2151761" title="Xorg-X11-Server: X.Org Server Xkbgetkbdbyname Use-After-Free" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0195</id><title>Moderate: Java-11-Openjdk Security And Bug Fix Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) (BZ#2150192)
</description><severity>moderate</severity><issued date="2023-01-23 09:39:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">4fcccdefc071d921599a1e7c4bc3a4f5fa074bef39e0504866e93dc5f91f2531</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-demo-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">5721c7753a72eac303fe3255b37283d95fcd94c7376c2d4ebbeeedff3a096af1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">51b99f58322d567cddd042efbc869f373b52e933383e45a66c97ae8cc45e1f63</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-headless-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">6a258f5f2f99e2e656619c7f5f3b6b7f2023b8f901c0a0334873b94fdc941b29</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">7bceae79f301a98f2b175728c26b4dc0ddd2049e5aba176fe774f0afd219a1ae</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-src-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">8ad97a2c2b6319d5cc2fcb597087eaa62c042f2225f2217708cab3fa727c7744</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">42e0fc8733f5c586bb78b49b5a2de5bd09258b51af47a92b6e8712bf03ba76d1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-demo-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">52fe117f3dc1637a5bce91dbbbf262cb3426d5ba229fdb5be195fb49de0dead5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-static-libs-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">46ada50a9aa614b885d0dd4a7015ee5d1fb06d7f490904fa30e1ce6957236953</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-devel-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">2c9d49a68aa09f02258351c91f555f6b0211de901645235f7d0f31f232115963</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-headless-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">b3f024c8c0309215dd310fdc7d20f9e854ff1793fcd79f7cbdf51565a692ccbd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-src-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">ce46f933757568cd5b7eba35845c701fcc3e4ed15e922ded40398265ee427211</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">3c359c9afd7dfd0a006e9b23d4ad5f1036df5508873b104ab0f05b5b5bbc60fa</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-jmods-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">bce1e0dc45399bdbee0b5b70b9596f99c175ca68a14454e8de229887bdfbff18</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-devel-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">1872c8712dccd991aa136cce3c2e86875a3b2643acc896bec68c3b083507125e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-jmods-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">1915fcb1e7116b4b935440e911a85d10923bd50e9c924c70aeaea617e26ab15c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">88c6d0144ec63fe83ba7762cd6bb68ba4d04c150859d27d78d0a1c5858b78b4b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" id="CVE-2023-21835" title="Cve-2023-21835" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" id="CVE-2023-21843" title="Cve-2023-21843" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0195" id="RHSA-2023:0195" title="Moderate: Java-11-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2150192" id="2150192" title="2150192 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2023-01, 11.0.18) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0195-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) 
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-01-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-demo-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">3bc1d3cae89a9b43428bc5b056d83be87f802edd3b625132919a4179e3636b00</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">f843f7100c0e05db141e5711b463151f6f84edc518e26801f642781dadadca7c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">748d1bbacd06da97f2aee6b4cc956921ed77d1686c9ecc216e3fbefdc764d37b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-static-libs-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">842ad0e3202d29c2ab7d4a0da2ffd7ad60553b79dbc38a04e365248634c6de44</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">8962445f55696819dfe7c47f475c2b53cc0d96e5ff73bc5d645d6b61edbb7deb</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-devel-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">135f5bac306fd312a6d7a5ed81c4922953d0ef8b2459fd5df8ce47ef3e275595</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-headless-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">954bed46277a5d12619ace7f32279515c2a98ffda3733e187797f19460113d75</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">1977afedf027ab6b36f6bb4701372b22ed6891ccb86921ec144da42de29f9a09</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-demo-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">bdeda4ae3c3d1558414becfd75b3df7cef33576f702a1a1d3997c638d07b75fa</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">1e1ee682659151ffc7e9622e46fc4a5385da0c847855c692fb300b454fe95038</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-src-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">61e30fd23ae2c3e0fbbb70ee6995a7e608dd52710ded594d9ea8b9ff71f6dff2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">1b9d27cbbe2e7a6823e56922b743ce76e738da8af3281699337a61f2df134024</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-src-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">973dea4ab545a00f6aac1ce0b55b22df5a5bbb2d9071f77ce4b98f0ea0997a7c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-jmods-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">b89892b3f9e18cd038d05dd81498d044c33b301dc2e42bf4a8a7e9eef50d4d9a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-headless-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">271de5dce775c818dd0b07bb8f270955529619164be4339e950d85d38733b777</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-jmods-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">27e633ba219e5a22027e01f848a8a16d84316b68f7cd97929c42fce46a887983</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-devel-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">145f8da2a5bc486a8421b1e7cb57363db2e0f2b18f9349f21546ce6b8312f0af</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" id="CVE-2023-21835" title="Openjdk: Handshake Dos Attack Against Dtls Connections (Jsse, 8287411)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" id="CVE-2023-21843" title="Openjdk: Soundbank Url Remote Loading (Sound, 8293742)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0195" id="RHSA-2023:0195-1" title="Rhsa-2023:0195-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2160421" id="2160421" title="Openjdk: Handshake Dos Attack Against Dtls Connections (Jsse, 8287411)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2160475" id="2160475" title="Openjdk: Soundbank Url Remote Loading (Sound, 8293742)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0203</id><title>Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) (BZ#2150191)
</description><severity>moderate</severity><issued date="2023-01-24 14:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">d67f5f2319f6ff0a3b5de8d2d807ee5c67e926c7a8dcacaf2e28e8e9bc6b2238</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">c43fcee935ee49480526fac1e2080c2036252474816bd997f9ec6418f4add8e9</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">17fab252cbef0c6091cc5b79ee41edf7247454269c7672890c234175a9eb1f03</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">8a61d12f78f3795ac2cf62406286a5f37c7deead7dd6c3a02dd4c1e889ef8900</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">394b99e5dad56c6b475922a65576ff8f622be890d773b2f61800985c335daae3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">59b237e3ae54ab4415241c247e5d3d42a352e2b81960c848cd8ec07d91fe1fb3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">eafcc7b9ea13057aec5c7b0ebe6f10882c24d023883a27a2e2509bef8e8e1179</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">8b9addb29a05d1fd51e24843f9c9ff233ffefa529185561466b7c7d5f244b5e2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">ef2f54dfcec1be271424d6a3a0a362c9a3af74a93f52ef43402d1912c781729b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">af40a2cfda64966d5a427c2eea862ea30d618567d401078c4c0c448bf9432df6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">51112771c749d39cf0184f0bb26636af59c40d88eee15751b02ce8f719f10a37</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.362.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">5fbd504305174e6bfb203b14e45aa9fee36c3da9f73d7c810733d9600fcdda54</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.362.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">cea11c3b85836b654b96bf42c4a8d3325d4d9db3c17277871f917965165aec3a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">d23676057675490f4089eab52482b9cd0e7878e5a2f3cf9c9d113207478d0751</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" id="CVE-2023-21830" title="Cve-2023-21830" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" id="CVE-2023-21843" title="Cve-2023-21843" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0203" id="RHSA-2023:0203" title="Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2150191" id="2150191" title="2150191 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2023-01, 8U362) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0203-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) 
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">05b6ccceb390b74f5a4dfc27aa6f6100d7bce12dc245e3c52e0ccc7fe1d642bf</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">d7b36f402fb5e3cb164069a19de48997180a7acbf656960bb8395de371279098</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">653e348b4a040d8fade666eb0133836bd40c9973dd7ff739b24337dfbdc2c892</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">febf86745e38c1a80182668de2e367ad6870206ed182ff455aa67cea0a450222</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">752180dbb579f396c985a1d7de2f8b79440096ebe4240c8b16a011eeab0557bc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">e5eeba85072f8947cb295251e39a59f2387fb3bdcb75fab7446b3319262313d6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">591856a5e8fa2aca76194cf466f2c7a8e0ee74bea747b9a9618e4b5b51b24ab7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">8502fc7913dce12d4b6782a1b1bd06573cf1e0f3b87026a84fbf391584632705</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">4c48921b8d693ebe70aea1f02ad0281c6bf7ad5343dd8286014421164bc60053</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">8b4df27fdadbb0e8f1d2d251fbbe1659a597ab959926c96a03963d71d1631039</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">29e7e96ad8580b7ad6a47a627b381b7af105f9d1ffd99ed38cb9eae25ccc3768</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">165e46dc7a8d05f83a894dd20c23d60abc3c1887ecfa1c5254049ff044d73fc0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">4c06915a71f9f8f77fc3224a3befd6978484aa94fa0fbc6fc388db7463a24e22</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">77908458f8b22121d9d5d237ba5df39a2d013502b35c14bb51f7efecb23c2159</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" id="CVE-2023-21830" title="Openjdk: Improper Restrictions In Corba Deserialization (Serialization, 8285021)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" id="CVE-2023-21843" title="Openjdk: Soundbank Url Remote Loading (Sound, 8293742)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0203" id="RHSA-2023:0203-1" title="Rhsa-2023:0203-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2160475" id="2160475" title="Openjdk: Soundbank Url Remote Loading (Sound, 8293742)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2160490" id="2160490" title="Openjdk: Improper Restrictions In Corba Deserialization (Serialization, 8285021)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0291-1</id><title>Sudo</title><description>Security Fix(es): 
* sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo-devel" release="10.el7_9.3" src="sudo-1.8.23-10.el7_9.3.src.rpm" version="1.8.23"><filename>sudo-devel-1.8.23-10.el7_9.3.x86_64.rpm</filename><sum type="sha256">b509e056243c05835de134363455b1f06feb4a168d8589a349ba2c8e83eddd47</sum></package><package arch="x86_64" name="sudo" release="10.el7_9.3" src="sudo-1.8.23-10.el7_9.3.src.rpm" version="1.8.23"><filename>sudo-1.8.23-10.el7_9.3.x86_64.rpm</filename><sum type="sha256">cac42c69a281a8b043ad8439ea382ef1189f033ae73996f6ee04a369fd8db073</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809" id="CVE-2023-22809" title="Sudo: Arbitrary File Write With Privileges Of The Runas User" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0291" id="RHSA-2023:0291-1" title="Rhsa-2023:0291-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2161142" id="2161142" title="Sudo: Arbitrary File Write With Privileges Of The Runas User" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0296-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.7.0 ESR. 
Security Fix(es): 
* Mozilla: libusrsctp library out of date (CVE-2022-46871) 
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) 
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) 
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) 
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) 
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) 
* Mozilla: Fullscreen notification bypass (CVE-2022-46877) 
* Mozilla: Calls to &lt;code&gt;console.log&lt;/code&gt; allowed bypasing Content Security Policy via format directive (CVE-2023-23603) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.7.0-1.el7_9.src.rpm" version="102.7.0"><filename>firefox-102.7.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">11b23f5cd514cc8129706f30b58ad4a5ff362d3ef32d278e706ec529245f2128</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.7.0-1.el7_9.src.rpm" version="102.7.0"><filename>firefox-102.7.0-1.el7_9.i686.rpm</filename><sum type="sha256">6dcb5e50c1d0aeda1e6b048bb06d3b39cc58c23a5c108108eaefc4fe586d4027</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871" id="CVE-2022-46871" title="Mozilla: Libusrsctp Library Out Of Date" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877" id="CVE-2022-46877" title="Mozilla: Fullscreen Notification Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598" id="CVE-2023-23598" title="Mozilla: Arbitrary File Read From Gtk Drag And Drop On Linux" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23599" id="CVE-2023-23599" title="Mozilla: Malicious Command Could Be Hidden In Devtools Output" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601" id="CVE-2023-23601" title="Mozilla: Url Being Dragged From Cross-Origin Iframe Into Same Tab Triggers Navigation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602" id="CVE-2023-23602" title="Mozilla: Content Security Policy Wasn'T Being Correctly Applied To Websockets In Webworkers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603" id="CVE-2023-23603" title="Mozilla: Calls To &lt;Code&gt;Console.Log&lt;/Code&gt; Allowed Bypasing Content Security Policy Via Format Directive" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605" id="CVE-2023-23605" title="Mozilla: Memory Safety Bugs Fixed In Firefox 109 And Firefox Esr 102.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0296" id="RHSA-2023:0296-1" title="Rhsa-2023:0296-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162336" id="2162336" title="Mozilla: Libusrsctp Library Out Of Date" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162338" id="2162338" title="Mozilla: Arbitrary File Read From Gtk Drag And Drop On Linux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162339" id="2162339" title="Mozilla: Malicious Command Could Be Hidden In Devtools Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162340" id="2162340" title="Mozilla: Url Being Dragged From Cross-Origin Iframe Into Same Tab Triggers Navigation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162341" id="2162341" title="Mozilla: Content Security Policy Wasn'T Being Correctly Applied To Websockets In Webworkers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162342" id="2162342" title="Mozilla: Fullscreen Notification Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162343" id="2162343" title="Mozilla: Calls To &lt;Code&gt;Console.Log&lt;/Code&gt; Allowed Bypasing Content Security Policy Via Format Directive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162344" id="2162344" title="Mozilla: Memory Safety Bugs Fixed In Firefox 109 And Firefox Esr 102.7" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0377</id><title>Important: Libxpm Security Update</title><description>The libXpm packages contain the X Pixmap parser library.
Security Fix(es):
* libXpm: compression commands depend on $PATH (CVE-2022-4883)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-01-24 14:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libXpm-devel" release="2.el7_9" src="libXpm-3.5.12-2.el7_9.src.rpm" version="3.5.12"><filename>libXpm-devel-3.5.12-2.el7_9.i686.rpm</filename><sum type="sha256">b198deb123820a78c48009ba17ad5cbd90c0c33aa6bb09c392370a38599b7ae3</sum></package><package arch="x86_64" name="libXpm" release="2.el7_9" src="libXpm-3.5.12-2.el7_9.src.rpm" version="3.5.12"><filename>libXpm-3.5.12-2.el7_9.x86_64.rpm</filename><sum type="sha256">df039c15386f0ccaf4d4ecec2af6f54b1d698240cadbf324d7327d67ec92f365</sum></package><package arch="x86_64" name="libXpm-devel" release="2.el7_9" src="libXpm-3.5.12-2.el7_9.src.rpm" version="3.5.12"><filename>libXpm-devel-3.5.12-2.el7_9.x86_64.rpm</filename><sum type="sha256">60c812c275867820f98e75f4b0067b0b5ab76e52b5f95ecf26a2831b8e97a6e8</sum></package><package arch="i686" name="libXpm" release="2.el7_9" src="libXpm-3.5.12-2.el7_9.src.rpm" version="3.5.12"><filename>libXpm-3.5.12-2.el7_9.i686.rpm</filename><sum type="sha256">2f0d3e0e9abe5bb42ef048af825a38deda1b5ead99875ab9e4f2063a51766714</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883" id="CVE-2022-4883" title="Cve-2022-4883" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0377" id="RHSA-2023:0377" title="Important: Libxpm Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0399-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) 
* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prevent unnecessary resets - Avoid leaving shost-&gt;last_reset with stale value if EH does not run 
* i40e: Request to backport upstream commit 2e5a20573a92 
* disable VMA-based swap-in readahead on PowerPC</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.83.1.el7.noarch.rpm</filename><sum type="sha256">98e7e92cd04b875945fd4cb335412bf8c24a4e439ce39aabc1d795c46c4298d5</sum></package><package arch="x86_64" name="perf" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">d33cbb5d8ad58c6e4c876a306ec93179871e9a2a84123c97d3793b0a8404dbe9</sum></package><package arch="x86_64" name="kernel-debug" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">1a49e659075919d95f7ebd2fd2bc6689cb2f475d1274496c971e44e0899014c1</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">6c11f35cc47ff1a43b18c0506fabc9a3f3d3b0b2f5c8c15470c443c7828450e9</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">1366cd9ad0a75cb819e32ab8e99f2e59afe5fa863832725e38334f2a1c8af63d</sum></package><package arch="x86_64" name="kernel" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">03e614e31ff2f223881b8542d50a59e0360117c66c4663fea606ad019dc574ac</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">ace7dd6fc95f571358580c4a373531a643070b7b59571908ea809c31dca21b76</sum></package><package arch="noarch" name="kernel-doc" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.83.1.el7.noarch.rpm</filename><sum type="sha256">863a86b1705c39a0d3f84cadcc501337fd023cfc5cf517d71611b513a24100af</sum></package><package arch="x86_64" name="bpftool" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">ad4a6345606050446ad16b770f6d3d27852dda942ddfd3a0f06c0b2f551f89d0</sum></package><package arch="x86_64" name="kernel-devel" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">6e0ef358ba023ff734894a30f88fa4cbf5d4a0639c70323c8881bb083a2dc6e7</sum></package><package arch="x86_64" name="kernel-tools" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">7d96c648f1ecdb2a7a013c40c3eb09397ab8d091ad9a1edebff4a55348d0a1a0</sum></package><package arch="x86_64" name="kernel-headers" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">0b6671b29f4ad5264592b71ad0eddc45a9ae36cf0b6f270e02743487c3fa0bda</sum></package><package arch="x86_64" name="python-perf" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">68b80d5f1ee488ce0fe8bf9e7f6d996325fe03c11fa6180f2491c6daa84d0920</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26401" id="CVE-2021-26401" title="Hw: Cpu: Lfence/Jmp Mitigation Update For Cve-2017-5715" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964" id="CVE-2022-2964" title="Kernel: Memory Corruption In Ax88179_178A Based Usb Ethernet Device." type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0399" id="RHSA-2023:0399-1" title="Rhsa-2023:0399-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061700" id="2061700" title="Hw: Cpu: Lfence/Jmp Mitigation Update For Cve-2017-5715" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2067482" id="2067482" title="Kernel: Memory Corruption In Ax88179_178A Based Usb Ethernet Device." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0402-1</id><title>Bind</title><description>Security Fix(es): 
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) 
* bind: processing large delegations may severely degrade resolver performance (CVE-2022-2795) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">eb7454c91c0c0229c5c42b7b39da752e86f3a8d3178430deb6a1b44c96881f8d</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">0f56a8eb01c837fa298d23a19ab0440f1c384d578326e75deb4f079ab3d879e1</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">ab10c3e78d6034f2aaa0c8b4ebf6d7be3407f1357101e822c318cf17ea861d63</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">1eb2074549612b1cff2a28627e5f3b2a4d236566d5adaa99b4674405697d2598</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">ab7659bf414b34d38f29bb3c339e7ef7227ab6029c09aea0d9796f3b16617074</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">f4a664d35029d85dd179c384f40480a3428f7812dc5451815f570169ad5772b6</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">1ced88f817c5c9b837c0f30d5716d0170451c17cb76f2aafae9f38ec7d4eb2b7</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">043c7ab8699a0c632fbcf86503a81e396117e945c9b688fbc3dd8ebf74bf130a</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">bc654c846cc7b0cf207acabf543674bb337c2d00834b8a1642d20f1f876c7913</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">4da9b800ab814fad0c507e1fbbcd24e87046e12f6a114208a20735d11ca050dd</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">6cb479ea7e8351c0e798e4bba3b420e8f8527767c75c387558d04ccc176131fb</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">bd749319924fd015a69e9e0b46bbe2f1372885887dcae418439f0ac76ce4c217</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">8d3f4431c5eeca4e4d989d494d1e9fa35e5315c146e2ee097b18e46d125ac0a2</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">776572692e3ee2fa60f1b3ec56e69ee16c4229730f7845cbc3fa135dab5c3c91</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">329962f999d5f845da95aaac1b0236c6c12ab50763a353458b0563949e9241cb</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">b388afda1b0ac50faedaaa336b839370c6edc9e37fc2bf2e444f8ffdd839e878</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.13.noarch.rpm</filename><sum type="sha256">f9aef2500b2b1ed6c3206607d73157246a3b0ea6fda944b02706154b00b4e979</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">a2a4d81888ef9d2d40a9925b76a4810877a2d2c652f56690282bdea89262089c</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">4e09efb17c23f9971cf3c42854c641011561dace108198a272befdfefe2ebace</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">4003d60867abb79d5c6e609204461ae25f64ccd2b1fd3738b72b12b440325bcc</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">a6ec6b932f762a7869a3550209b49a275b111bf37ee2995818965911c54deb94</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">46774dcafc058b1dd4cfc9a640d0d0a446467d300bcee59a7bda88a1b53e8c01</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">34830638859ee62e60bc47dda6f0383455e839436448de55706892203e9fd909</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">42ca2439d41c12224fb12b8bda8ef7a3e260ceb64d79f0b6054eaec655cc7644</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220" id="CVE-2021-25220" title="Bind: Dns Forwarders - Cache Poisoning Vulnerability" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795" id="CVE-2022-2795" title="Bind: Processing Large Delegations May Severely Degrade Resolver Performance" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0402" id="RHSA-2023:0402-1" title="Rhsa-2023:0402-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2064512" id="2064512" title="Bind: Dns Forwarders - Cache Poisoning Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128584" id="2128584" title="Bind: Processing Large Delegations May Severely Degrade Resolver Performance" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0403-1</id><title>Sssd</title><description>Security Fix(es): 
* sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters (CVE-2022-4254) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* smartcards: special characters must be escaped when building search filter</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsss_nss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">16bc4d0557dde9b46a1c9897345a621b49b790c90c07141860cfc9e93df55ee2</sum></package><package arch="x86_64" name="libipa_hbac" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">529d2d8d22c5c0b309ba3e79c1e410e0fcfc53987eb9322c862b6840a8675584</sum></package><package arch="x86_64" name="sssd-ldap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-ldap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">84b915877ab3a0f4fd324e69005f330e06b2a0e8f5787a2d0bba23d2b76ca9b2</sum></package><package arch="x86_64" name="sssd-ipa" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-ipa-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">8e8ec7152e1511103ce96db1be110b5010660c65698b467c470a980b0af99201</sum></package><package arch="x86_64" name="sssd-client" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">2fdc8cec74266f2a85a55c6d3b6b0307458d0a20476e5749c76aef33c6151225</sum></package><package arch="i686" name="libipa_hbac" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">ec9e2f79eb49a0a505bc4258a16c40fdb4513d3ee2a915987ad1dbcb12a32a4a</sum></package><package arch="x86_64" name="sssd-krb5-common" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-krb5-common-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">d7b2acb1b193cfdfdca7c54d169497cd58ee5e57e76980ed7868446d8b90cfda</sum></package><package arch="i686" name="libsss_nss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">8759698f9478c1aeb33c8ea981a0a6439202f6066cdb70c2682e1100320cbb42</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">4fbb6253c7180e83a4b2bb828bd2a6cd24014d28a0055d2fcfc2fb5fc706f78c</sum></package><package arch="x86_64" name="libsss_certmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">388a3fc9d5274d70d776671716eb893b82d5e832890dae1d7ba2cf2d0484f3fc</sum></package><package arch="i686" name="libipa_hbac-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">56cb20370288a226781598ee1d8dd41707ba4d2e6374a2b2a4505d2302357279</sum></package><package arch="x86_64" name="sssd-tools" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-tools-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">255fd956b96970e4286710242848e4e2ea03d870037cdcfb4eb601449a82a13e</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">5cb5f1d47f0a70fb927abe487e444b4bdc44504b78e7be135573e6800a33c3b6</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">af6072ecffe9de1b96a4a2d046fde800d16199ed23fa9a5562fafd798ba0d812</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-libsss_nss_idmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">a39774f4d0d89e596fa26fdd71180c15fc10f775827c9111f0ef263bfbda2393</sum></package><package arch="x86_64" name="python-sss-murmur" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-sss-murmur-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">938cc193a64aae61f740e346a6cc07d91159b2bd59beb7e708126467fa3f9ae0</sum></package><package arch="x86_64" name="libsss_sudo" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_sudo-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">dd638f04c9746d12804f8f6832b0d7ba71bbbf274bea2c9e47208bba79340e8d</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">36c1eaaa24852833dc15e6e2d9001115d52559f8216da22719195690cbb84937</sum></package><package arch="x86_64" name="libsss_simpleifp" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">18c60954981fe89a687102c7ade27f8460765feb6a5dc041b1af83a2b4559bce</sum></package><package arch="x86_64" name="sssd-common-pac" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-common-pac-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">e7d7f28cfe133469d32a76816d268647e82f76efcc19bf23c656497e1ca0b219</sum></package><package arch="i686" name="libsss_certmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">e13ef52f86fd527281433977507ec7c903aa1509fc320351a8333674b0296ae3</sum></package><package arch="i686" name="libsss_simpleifp" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">f9c666658668dd42ba5dc5d4a6d5cd92c1fd810366eebfaa8d213fc523e85374</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-winbind-idmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">3f7f3f823469bc5e778a4a7d7c8f78fe28de7ab4f08ef9e4e18e0d2c3a4d3671</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">5b0b124649901239d68533cd1160d197a6664fba2b04a6e577b271a1ff520458</sum></package><package arch="x86_64" name="python-libipa_hbac" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-libipa_hbac-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">1268d17249eabc1d72f4f7d4e532006684674dd6e1ddb7fb61f27eb5925e1cee</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">d110b98cc9817c35bb3de61a1d32a7d730f929d01030553b2c9cfd185d8882e1</sum></package><package arch="x86_64" name="sssd-ad" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-ad-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">917491496fe70b0202e6f01082eadc5e8f1a995664b299843c829cc6dcfd6f77</sum></package><package arch="i686" name="libsss_idmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">388765451b6fe56a237844e7bf42c6b96e04ed258ee5db463defffc2a96fa39b</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">348326d8bac6c34c68273d1e15767b70bbb787dc04b2928ebfc3e3f00409ef39</sum></package><package arch="i686" name="libsss_certmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">b69296ad05824787abe7334c0802db70c802318dbc071fed8e0e1f2103c17738</sum></package><package arch="x86_64" name="sssd-libwbclient" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-libwbclient-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">91f4a3ad5d10e03c211e30e14045c82c014392c9e3a4e8340a736662f4955792</sum></package><package arch="x86_64" name="python-sss" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-sss-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">20e31c810deb0e0829a6b056f2952375a95bbd973af4acba096a481902c2a263</sum></package><package arch="x86_64" name="sssd-dbus" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-dbus-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">b76094d7cc0b6c9d867a24911850af375df7342d2d5027fa01aad2a1831e8932</sum></package><package arch="i686" name="libsss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">fc62a7d175109d6eac959a24e9c66eac882b75e167c102b169f0167c5053e1bf</sum></package><package arch="x86_64" name="sssd-krb5" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-krb5-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">fad79434fd51546a0fbee2de76ce712bfa0688711c140b1dc07c9a8c0b64c782</sum></package><package arch="x86_64" name="libsss_autofs" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_autofs-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">c94c5b0f3138667df29e2276c9953e660d6fae4084fee8c13de93d44c1ce243b</sum></package><package arch="i686" name="sssd-client" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">19a7dc1be7ab7889c11f1bb537e695576a8ddaad71b6a98494dff5b95320734b</sum></package><package arch="x86_64" name="sssd-common" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-common-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">fba7a3b126e91c9453e4dab4e6d664e867f750f02852cc9ea52727d81a0d47b5</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">39e740f102af4b6235a1428d0985cf18cbc14301443b4efdcbc587d897d3ee97</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">d4967b404147f7103003cd1d643edeea8b827e201cae7e5df4e7320e25f6c381</sum></package><package arch="noarch" name="python-sssdconfig" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-sssdconfig-1.16.5-10.el7_9.15.noarch.rpm</filename><sum type="sha256">d9917b941c40b174fe3288f491f5a5c27432162520eee3e9802d08c5906bdc22</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-polkit-rules-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">612d622be4d58ea8063b0f9fae21db3e244b111bb3b1cebc3d6b0de80893c6be</sum></package><package arch="x86_64" name="libsss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">67a758c68ca0ad65538bedcefb3878c38a204eec2805bcd3766399204f22f60d</sum></package><package arch="x86_64" name="sssd-kcm" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-kcm-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">c1ba20a5876ef78cd463c30044c1f803c7c4a6522934f7593eb61e0d60f8dbfd</sum></package><package arch="x86_64" name="sssd-proxy" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-proxy-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">3e0a62b4beb3d82c57a1b105f5e3a2b331cb6e33d45e87beaf7c2c6da1e7c078</sum></package><package arch="x86_64" name="sssd" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">b7915ce2844a91d5c646615b010658b2441d16532459bea87c6c18669f83ee9f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4254" id="CVE-2022-4254" title="Sssd: Libsss_Certmap Fails To Sanitise Certificate Data Used In Ldap Filters" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0403" id="RHSA-2023:0403-1" title="Rhsa-2023:0403-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2149894" id="2149894" title="Sssd: Libsss_Certmap Fails To Sanitise Certificate Data Used In Ldap Filters" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0456-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.7.1. 
Security Fix(es): 
* Mozilla: libusrsctp library out of date (CVE-2022-46871) 
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) 
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) 
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) 
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) 
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) 
* Mozilla: Fullscreen notification bypass (CVE-2022-46877) 
* Mozilla: Calls to &lt;code&gt;console.log&lt;/code&gt; allowed bypasing Content Security Policy via format directive (CVE-2023-23603) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.7.1-1.el7_9.src.rpm" version="102.7.1"><filename>thunderbird-102.7.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">f8eb0f48dc455b82381081db3cba0b2c75a0d885b8582ab5b17e418aa4d3ba27</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871" id="CVE-2022-46871" title="Mozilla: Libusrsctp Library Out Of Date" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877" id="CVE-2022-46877" title="Mozilla: Fullscreen Notification Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598" id="CVE-2023-23598" title="Mozilla: Arbitrary File Read From Gtk Drag And Drop On Linux" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23599" id="CVE-2023-23599" title="Mozilla: Malicious Command Could Be Hidden In Devtools Output" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601" id="CVE-2023-23601" title="Mozilla: Url Being Dragged From Cross-Origin Iframe Into Same Tab Triggers Navigation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602" id="CVE-2023-23602" title="Mozilla: Content Security Policy Wasn'T Being Correctly Applied To Websockets In Webworkers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603" id="CVE-2023-23603" title="Mozilla: Calls To &lt;Code&gt;Console.Log&lt;/Code&gt; Allowed Bypasing Content Security Policy Via Format Directive" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605" id="CVE-2023-23605" title="Mozilla: Memory Safety Bugs Fixed In Firefox 109 And Firefox Esr 102.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0456" id="RHSA-2023:0456-1" title="Rhsa-2023:0456-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162336" id="2162336" title="Mozilla: Libusrsctp Library Out Of Date" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162338" id="2162338" title="Mozilla: Arbitrary File Read From Gtk Drag And Drop On Linux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162339" id="2162339" title="Mozilla: Malicious Command Could Be Hidden In Devtools Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162340" id="2162340" title="Mozilla: Url Being Dragged From Cross-Origin Iframe Into Same Tab Triggers Navigation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162341" id="2162341" title="Mozilla: Content Security Policy Wasn'T Being Correctly Applied To Websockets In Webworkers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162342" id="2162342" title="Mozilla: Fullscreen Notification Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162343" id="2162343" title="Mozilla: Calls To &lt;Code&gt;Console.Log&lt;/Code&gt; Allowed Bypasing Content Security Policy Via Format Directive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162344" id="2162344" title="Mozilla: Memory Safety Bugs Fixed In Firefox 109 And Firefox Esr 102.7" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0530-1</id><title>Libksba</title><description>Security Fix(es): 
* libksba: integer overflow to code executiona (CVE-2022-47629) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libksba-devel" release="7.el7_9" src="libksba-1.3.0-7.el7_9.src.rpm" version="1.3.0"><filename>libksba-devel-1.3.0-7.el7_9.i686.rpm</filename><sum type="sha256">eb11ecb88f45499e516fc9e39454fc4ba8fae8176cb3dce87bf18faab092f0a0</sum></package><package arch="x86_64" name="libksba-devel" release="7.el7_9" src="libksba-1.3.0-7.el7_9.src.rpm" version="1.3.0"><filename>libksba-devel-1.3.0-7.el7_9.x86_64.rpm</filename><sum type="sha256">132171720846a1714489518d30207780d5c838a872d48d262b805519d967b8bd</sum></package><package arch="x86_64" name="libksba" release="7.el7_9" src="libksba-1.3.0-7.el7_9.src.rpm" version="1.3.0"><filename>libksba-1.3.0-7.el7_9.x86_64.rpm</filename><sum type="sha256">f4ed855d1c9f63d62bdc83eb52442a7350bd5202af24fded086e59ebee4b677d</sum></package><package arch="i686" name="libksba" release="7.el7_9" src="libksba-1.3.0-7.el7_9.src.rpm" version="1.3.0"><filename>libksba-1.3.0-7.el7_9.i686.rpm</filename><sum type="sha256">7e5903cb864a99118df2cb87a56afcb8a7cb92feb4a5c9480748323a2cb32752</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629" id="CVE-2022-47629" title="Libksba: Integer Overflow To Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0530" id="RHSA-2023:0530-1" title="Rhsa-2023:0530-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2161571" id="2161571" title="Libksba: Integer Overflow To Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0600-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.7.1. 
Security Fix(es): 
* Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.7.1-2.el7_9.src.rpm" version="102.7.1"><filename>thunderbird-102.7.1-2.el7_9.x86_64.rpm</filename><sum type="sha256">a3d1eadfa0d5aa89a22b7885e85c547dd7cf96d832158506919f52bbaa19c73a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430" id="CVE-2023-0430" title="Mozilla: Revocation Status Of S/Mime Signature Certificates Was Not Checked" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0600" id="RHSA-2023:0600-1" title="Rhsa-2023:0600-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2166591" id="2166591" title="Mozilla: Revocation Status Of S/Mime Signature Certificates Was Not Checked" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0675-1</id><title>Tigervnc And Xorg-X11-Server</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. 
Security Fix(es): 
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege  elevation (CVE-2023-0494) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tigervnc-server-minimal" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-24.el7_9.x86_64.rpm</filename><sum type="sha256">ec701a0f8060564f5fa9b234242f61975328a64589a23ec4b85ceaa9771a13ff</sum></package><package arch="x86_64" name="tigervnc-server" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-24.el7_9.x86_64.rpm</filename><sum type="sha256">6aa9ebde340d047d4bb706b83dd28cd6e8e46bf5d0eb54d18709a4ba11d386cc</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">f107aadb4473d707bd74c370f8b2f70af9211609c2f2ca64bd31913946f5bf70</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">04dfa49a820630082a4de59f0b63b9ede317888a4a402388cd2011fe72aa1154</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">0e34f2713da8012f8f2843474faeb2c7815a3c3fef7d8af01eeb8c4986f7c6b5</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">40b038aea93bb116a76856958fb9e757a0873c454edce402c48fe248c320fe2a</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">b9e16048bd8c405251a93c584bc5c873bb527d29e2543447fab2403870734950</sum></package><package arch="noarch" name="tigervnc-icons" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-24.el7_9.noarch.rpm</filename><sum type="sha256">9f0328e2dbec5856c753c1d131e04d04d5a54b76d76d0125a89bc8a56747b824</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">8694f038496e5948c3a3783ab51176edef29d8d95296ef79e3a5eb686ae2adbe</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">2c8c222a89dc9210b033711127ff969b3f2736e74b92bf24bcc4fc37c6d6fe6d</sum></package><package arch="i686" name="xorg-x11-server-devel" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-22.el7_9.i686.rpm</filename><sum type="sha256">a7529527d02d8baa8ebc8f416af1e48201c10b85225714068a80945799233b08</sum></package><package arch="x86_64" name="tigervnc-server-module" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-24.el7_9.x86_64.rpm</filename><sum type="sha256">bd0288bb6da3f80c87d9dda13a62173ff0173a96693015cd8f4885bc16c2ac34</sum></package><package arch="noarch" name="tigervnc-server-applet" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-24.el7_9.noarch.rpm</filename><sum type="sha256">b17d08a619cffba382ede4c812adc1d4788651daae8cdb25c2fd90982d8cc2c0</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">8a1c4e5f7e823dfd628bcc73ee45c65382b0fc7f92bf0e76c24197ba79348334</sum></package><package arch="noarch" name="tigervnc-license" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-24.el7_9.noarch.rpm</filename><sum type="sha256">6fe8f2e3641dd29b7d3e9d68132f5e885a7801e0ee1d9123718b320655d6ac27</sum></package><package arch="noarch" name="xorg-x11-server-source" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-22.el7_9.noarch.rpm</filename><sum type="sha256">d92e9b25809b714f3f04f31f7eb8b49e26d3002dacd39d7f0e9b337f15b632e3</sum></package><package arch="x86_64" name="tigervnc" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-24.el7_9.x86_64.rpm</filename><sum type="sha256">c17da119f457426264bb1dab2c7feb6d4f81f6b5dd406f66f3b178fa9cc93ae0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494" id="CVE-2023-0494" title="Xorg-X11-Server: Deepcopypointerclasses Use-After-Free Leads To Privilege Elevation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0675" id="RHSA-2023:0675-1" title="Rhsa-2023:0675-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2165995" id="2165995" title="Xorg-X11-Server: Deepcopypointerclasses Use-After-Free Leads To Privilege Elevation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0812-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.8.0 ESR. 
Security Fix(es): 
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) 
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) 
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) 
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) 
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) 
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) 
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) 
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) 
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) 
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) 
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-102.8.0-2.el7_9.src.rpm" version="102.8.0"><filename>firefox-102.8.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">a3877ec0d3d9b26a2d922f57130ad636c80eaad56ac034af6a842d93be7f7fbf</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-102.8.0-2.el7_9.src.rpm" version="102.8.0"><filename>firefox-102.8.0-2.el7_9.i686.rpm</filename><sum type="sha256">6758c75f205d4e4c74069d30d41135040e340c0941cd2aa36d065b46bb22e491</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" id="CVE-2023-0767" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728" id="CVE-2023-25728" title="Mozilla: Content Security Policy Leak In Violation Reports Using Iframes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729" id="CVE-2023-25729" title="Mozilla: Extensions Could Have Opened External Schemes Without User Knowledge" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730" id="CVE-2023-25730" title="Mozilla: Screen Hijack Via Browser Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732" id="CVE-2023-25732" title="Mozilla: Out Of Bounds Memory Write From Encodeinputstream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735" id="CVE-2023-25735" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737" id="CVE-2023-25737" title="Mozilla: Invalid Downcast In Svgutils::Setupstrokegeometry" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739" id="CVE-2023-25739" title="Mozilla: Use-After-Free In Mozilla::Dom::Scriptloadcontext::~Scriptloadcontext" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742" id="CVE-2023-25742" title="Mozilla: Web Crypto Importkey Crashes Tab" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743" id="CVE-2023-25743" title="Mozilla: Fullscreen Notification Not Shown In Firefox Focus" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744" id="CVE-2023-25744" title="Mozilla: Memory Safety Bugs Fixed In Firefox 110 And Firefox Esr 102.8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746" id="CVE-2023-25746" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0812" id="RHSA-2023:0812-1" title="Rhsa-2023:0812-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170374" id="2170374" title="Mozilla: Content Security Policy Leak In Violation Reports Using Iframes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170375" id="2170375" title="Mozilla: Screen Hijack Via Browser Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170376" id="2170376" title="Mozilla: Fullscreen Notification Not Shown In Firefox Focus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170377" id="2170377" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170378" id="2170378" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170379" id="2170379" title="Mozilla: Invalid Downcast In Svgutils::Setupstrokegeometry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170381" id="2170381" title="Mozilla: Use-After-Free In Mozilla::Dom::Scriptloadcontext::~Scriptloadcontext" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170382" id="2170382" title="Mozilla: Extensions Could Have Opened External Schemes Without User Knowledge" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170383" id="2170383" title="Mozilla: Out Of Bounds Memory Write From Encodeinputstream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170390" id="2170390" title="Mozilla: Web Crypto Importkey Crashes Tab" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170391" id="2170391" title="Mozilla: Memory Safety Bugs Fixed In Firefox 110 And Firefox Esr 102.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170402" id="2170402" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0817-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.8.0. 
Security Fix(es): 
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) 
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) 
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) 
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) 
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) 
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) 
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) 
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) 
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) 
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) 
* Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP  (CVE-2023-0616) 
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.8.0-2.el7_9.src.rpm" version="102.8.0"><filename>thunderbird-102.8.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">84f11997de0cca1fbbb42d12ae5ab748e6a2b12da62075e83ff0313820b63696</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616" id="CVE-2023-0616" title="Mozilla: User Interface Lockup With Messages Combining S/Mime And Openpgp" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" id="CVE-2023-0767" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728" id="CVE-2023-25728" title="Mozilla: Content Security Policy Leak In Violation Reports Using Iframes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729" id="CVE-2023-25729" title="Mozilla: Extensions Could Have Opened External Schemes Without User Knowledge" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730" id="CVE-2023-25730" title="Mozilla: Screen Hijack Via Browser Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732" id="CVE-2023-25732" title="Mozilla: Out Of Bounds Memory Write From Encodeinputstream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735" id="CVE-2023-25735" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737" id="CVE-2023-25737" title="Mozilla: Invalid Downcast In Svgutils::Setupstrokegeometry" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739" id="CVE-2023-25739" title="Mozilla: Use-After-Free In Mozilla::Dom::Scriptloadcontext::~Scriptloadcontext" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742" id="CVE-2023-25742" title="Mozilla: Web Crypto Importkey Crashes Tab" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743" id="CVE-2023-25743" title="Mozilla: Fullscreen Notification Not Shown In Firefox Focus" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744" id="CVE-2023-25744" title="Mozilla: Memory Safety Bugs Fixed In Firefox 110 And Firefox Esr 102.8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746" id="CVE-2023-25746" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0817" id="RHSA-2023:0817-1" title="Rhsa-2023:0817-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170374" id="2170374" title="Mozilla: Content Security Policy Leak In Violation Reports Using Iframes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170375" id="2170375" title="Mozilla: Screen Hijack Via Browser Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170376" id="2170376" title="Mozilla: Fullscreen Notification Not Shown In Firefox Focus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170377" id="2170377" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170378" id="2170378" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170379" id="2170379" title="Mozilla: Invalid Downcast In Svgutils::Setupstrokegeometry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170381" id="2170381" title="Mozilla: Use-After-Free In Mozilla::Dom::Scriptloadcontext::~Scriptloadcontext" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170382" id="2170382" title="Mozilla: Extensions Could Have Opened External Schemes Without User Knowledge" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170383" id="2170383" title="Mozilla: Out Of Bounds Memory Write From Encodeinputstream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170390" id="2170390" title="Mozilla: Web Crypto Importkey Crashes Tab" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170391" id="2170391" title="Mozilla: Memory Safety Bugs Fixed In Firefox 110 And Firefox Esr 102.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170402" id="2170402" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2171397" id="2171397" title="Mozilla: User Interface Lockup With Messages Combining S/Mime And Openpgp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0978-1</id><title>Git</title><description>Security Fix(es): 
* git: gitattributes parsing integer overflow (CVE-2022-23521) 
* git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="git" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-24.el7_9.x86_64.rpm</filename><sum type="sha256">b26c2f0f9afecaae81c7a39acc8f66dfaa9b6d2e49f58370d1fa43425ab328bd</sum></package><package arch="noarch" name="git-instaweb" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-instaweb-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">5cbf8d6cd4c5f1ca050dcd4c99fbd2d7a90861ed38de876cc168ff0019cb08b8</sum></package><package arch="x86_64" name="git-daemon" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-24.el7_9.x86_64.rpm</filename><sum type="sha256">edca8227e635ecf93dfeeff500d4314b8271777dbda7a4c5e0df88d87c66b773</sum></package><package arch="noarch" name="perl-Git-SVN" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">66077fc18291ae304da279d1f97ed77a1306bcc07629cbf9bfe5fa8f24525a46</sum></package><package arch="noarch" name="emacs-git" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">c9a516c4f2cc89e203a84a70ce903cdb388014a187d43a178bd163f78e454942</sum></package><package arch="noarch" name="git-cvs" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">fa461440d71427a33bed73c62219fc4d2c1e37b73a3141e82a773c037d20dae5</sum></package><package arch="noarch" name="git-gui" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">5d2c34d5b8486e3b27d65917b33fe782b5a858375fc1b0cb093ee114cbd04214</sum></package><package arch="x86_64" name="git-gnome-keyring" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-gnome-keyring-1.8.3.1-24.el7_9.x86_64.rpm</filename><sum type="sha256">33829bca4c6cf3140c450f2ec4a8bfa8d6a9b7fc0d7ecbaa68ad73be9fc9d37f</sum></package><package arch="noarch" name="git-p4" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">30fc2f9f292da5a4e7ee3ce8ca7baef2911973d72c856e81763596d3758208e8</sum></package><package arch="x86_64" name="git-svn" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-24.el7_9.x86_64.rpm</filename><sum type="sha256">2cb056134b6bf424851bf959c25e17968f87dac0995c4faf5d09c4389f971a97</sum></package><package arch="noarch" name="git-hg" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">ffd7e91f163eaedf85059bf5ac67d4ffae3414f915f891a4b1ab0fdf18c655e8</sum></package><package arch="noarch" name="git-email" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">67ef252f653719b74cb97466d1aab0f27249c1748ef5ced8337696376b5b39fd</sum></package><package arch="noarch" name="perl-Git" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">17f47c2a2714359e706cabb37c903cf05449cc6538a9698bd63635f09889d4c9</sum></package><package arch="noarch" name="emacs-git-el" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">99de28fe34035a00e4e9f90dc525e53058ea287ce4d1bbae965f044f73cd33bc</sum></package><package arch="noarch" name="git-bzr" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">b58ab51d4051ea420f870ecb5fb3f399a77cdccbd2066e06cdf87136255e5d9b</sum></package><package arch="noarch" name="git-all" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">bd063bcbd94dcfaaf21fa3fce44019ecb9e49baefbad3f82846c5b018678159e</sum></package><package arch="noarch" name="gitk" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">512cf3658af83e990041688730807c342d960053723e696fdceee8c635b0d509</sum></package><package arch="noarch" name="gitweb" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">e0e2d826925d442e35ea871ca3bc35a2e82aa2df5f09c48a80b18e9b86badf81</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521" id="CVE-2022-23521" title="Git: Gitattributes Parsing Integer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903" id="CVE-2022-41903" title="Git: Heap Overflow In `Git Archive`, `Git Log --Format` Leading To Rce" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0978" id="RHSA-2023:0978-1" title="Rhsa-2023:0978-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162055" id="2162055" title="Git: Gitattributes Parsing Integer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162056" id="2162056" title="Git: Heap Overflow In `Git Archive`, `Git Log --Format` Leading To Rce" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1090</id><title>Important: Samba Security Update</title><description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-03-07 10:48:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ctdb" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">fddfbde281170a2350208c846e02cb2f735ee2da692388dfe592d3b6f2221315</sum></package><package arch="x86_64" name="ctdb-tests" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">0586c7e2c9783848bfc7fd8d069049645fcb9addf7f29a3405028b6f8fa6f8ce</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023" id="CVE-2022-38023" title="Cve-2022-38023" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1090" id="RHSA-2023:1090" title="Important: Samba Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1090-1</id><title>Samba</title><description>Security Fix(es): 
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided  (CVE-2022-38023) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="samba-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">500ff04ad16fa32c36af15b5e3c1b80492ddb2605c8831333fe699144e1b5585</sum></package><package arch="i686" name="samba-common-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">3a506031708a60521c1ce26d7b25b7d33f871448efee490754aaa11f238bf6c5</sum></package><package arch="i686" name="samba-test-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">aa14ab7a6819597c7179bf43a2612e93e65cdf60b588a47c90c5f69fc3a0a01e</sum></package><package arch="x86_64" name="samba-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">fb4328a23ff9c6f3f1338e8ab0b640f49b135346019b3bf09ce2b9c125282814</sum></package><package arch="x86_64" name="samba-client" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">9817baee22eb3d09944be83b09843d8c5c0002914ba9dde8184f3ceedecfd53e</sum></package><package arch="i686" name="samba-winbind-modules" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">fd638a33e01ee122966a262131400c851d4b2cb82898af5ed06cbae1e88de1aa</sum></package><package arch="x86_64" name="samba-winbind" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">eb8c266f6f5019fc5b2c600965b45d57087e8d635aa5952361e28edb3ebaccdc</sum></package><package arch="x86_64" name="samba-dc" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">2c381f7d0617036e73e5636546c62c420822537f69456921c6adab74ad4cb3f0</sum></package><package arch="x86_64" name="libwbclient" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">645fc6268dcb2bed6534f8e588b76b142e19a03a8e99db58fab3962305542881</sum></package><package arch="x86_64" name="samba-dc-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">162e40109413dc22aa30db63c52aca3cd022e563f8813efe5afbb1ec654c1bbe</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">3ccc9f9326d8b4602a3ef3e389f23d593140ad6dda7893ead58d258aa2ed35ab</sum></package><package arch="x86_64" name="samba-client-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">7570e96a1288f733237327dc3da948701b33ec973a909820d25f28864a63127e</sum></package><package arch="i686" name="libwbclient-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">4006301818a57799b4760db07835dfa52580c8ed26037adff4a8f7fa12750105</sum></package><package arch="x86_64" name="samba" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">2259a55556e9766fcc56db5372bf17847a469ee86031509c485a20e6926d9c78</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">2fbe9e1eeab8b46c0a07951c9de7af55591df294d580fbc4f35b622750ab5c54</sum></package><package arch="noarch" name="samba-common" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-24.el7_9.noarch.rpm</filename><sum type="sha256">599601a6ec8dbd3ea3f75be569b375fb9854c9c06123c08d9e4f36869e83f17a</sum></package><package arch="x86_64" name="samba-common-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">7da197a0d57e411be6d6b01650265d280532834d8a384a544f3c5660b7bbe626</sum></package><package arch="x86_64" name="samba-test-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">fad10520ae3cc31e6aa868f6385b027985464857673faaf5490291b40bde0843</sum></package><package arch="i686" name="samba-python" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">fc81d3283b08cf0a13ee1a3dc32c648956df0d797e19dc438229706f80874e9d</sum></package><package arch="i686" name="samba-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">ece27d16977a89a859fb38d509053ef6487ccd79f432777da058a9ed83f2115c</sum></package><package arch="i686" name="samba-client-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">e284f006353619c61dc1b3995028031745e0c51ab673aac7df9d47af3ffeab58</sum></package><package arch="i686" name="libsmbclient" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">36482c21714fff9ecea78bfd9b60f4818a077034f7ae65d7975a0d1305988565</sum></package><package arch="i686" name="libsmbclient-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">0ed2103a8eb2ee8ae24bc01c4a16685ac33614bb0ae0db7f22e6ed515fd6d335</sum></package><package arch="x86_64" name="libsmbclient" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">38054eae1a74d2b95eeb8896b5985b5b6d7a189724c60d2a2d29b5fe2fd4a350</sum></package><package arch="x86_64" name="samba-python" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">70674e86b6f31bad41417cefb7aaa003a98dfc3700094b1767d5c6336c80c664</sum></package><package arch="noarch" name="samba-pidl" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-24.el7_9.noarch.rpm</filename><sum type="sha256">60e72d724b225ce033d0c9ab75ece967b47edceb53f35338a94d8e5bf3dd44e2</sum></package><package arch="x86_64" name="samba-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">481f7fdb19fa20bbbdaace15be52182a64ea6017bad6c8a3e7073c0477d659bb</sum></package><package arch="x86_64" name="samba-python-test" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">ee6083c33c8dea339c7dfdbcea143aa161f3efbab2c5b7605a4be8ec853f2667</sum></package><package arch="x86_64" name="samba-winbind-modules" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">794419b4cdfaddb314cfe6da06baa77bf8b2de66a2405373276d8b4a9283b1ac</sum></package><package arch="x86_64" name="samba-test" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">a95cfb5c67cb83fa714c978bc63bb89c4558c29c5d33ab551e8a9f447a24516f</sum></package><package arch="i686" name="libwbclient" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">b4b4c731d0e5e3c42bb147a1f50523d98b0fba7418f05feeb1e60803e4cbb852</sum></package><package arch="x86_64" name="samba-winbind-clients" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">8c48cc5d15e8aa111c148bd4654ee35ef9d477e89b3f8b70659c58500d1a4a89</sum></package><package arch="x86_64" name="libwbclient-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">f5cfea82a73d3008884adeeb93d6b6e82a67a0c69f6ccedf3a9d72e2152a2b0e</sum></package><package arch="x86_64" name="samba-krb5-printing" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">4597f10df0c826ef51647d1bc615be93c0616512ecaf577ecc51aa7c4cd4b7a8</sum></package><package arch="x86_64" name="libsmbclient-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">0b6dd455d26f75fe2b0015e954e9a9f7d40adc1511e366d64bd70694d1dc4232</sum></package><package arch="x86_64" name="samba-common-tools" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">5e105eee330f72edd154260e9b5abaeaff92e26a8c7bbf599a0d5943ebc1788c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023" id="CVE-2022-38023" title="Samba: Rc4/Hmac-Md5 Netlogon Secure Channel Is Weak And Should Be Avoided" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1090" id="RHSA-2023:1090-1" title="Rhsa-2023:1090-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2154362" id="2154362" title="Samba: Rc4/Hmac-Md5 Netlogon Secure Channel Is Weak And Should Be Avoided" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1091-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) 
* kernel: use-after-free related to leaf anon_vma double reuse (CVE-2022-42703) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Regression - SAS3416 card works on SL 7.7 and below, does not work on SL 7.8 or 7.9 
* use-after-free in sctp_do_8_2_transport_strike 
* SL7.9 - [Regression] Kernel test failed during CPU polarization test - lscpu, chcpu - LPAR 
* SL 7, block: Crash in blk_mq_rq_timed_out() when dereferencing NULL request-&gt;q pointer 
* qla2xxx: Qlogic double completion races during error handling are still not fixed and this will also  be a SL8+ exposure 
* kernel 3.10.0-1160.80.1.el7.x86_64 on Xeon E55xx crashes upon KVM startup 
* Guest's time jumped forward by 12 minutes _after_ live-migration completes (in 30 seconds) 
* SL7: target crashes if a malicious initiator sends a logout immediately after a login command 
* SL7.9 - LTP testcase creat09 fails related to 'CVE-2018-13405' and 'CVE-2021-4037`</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">2994a6e723cfacabd813dac1ea31a94b3d7335b015d5d9f5bb91dc450ca04154</sum></package><package arch="x86_64" name="kernel-headers" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">f0fabded1573afeafbdea88dabaa33d9a5b25eb6a2e8da0b0741d98b82ee39cd</sum></package><package arch="x86_64" name="bpftool" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">bd2b9606716ea103edfeade341a514508e78e2ebb20de46917c58714075b19a8</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">18196694a675b25665410c3c9d44a2e98d1ca5bd946987e609612e8cfbdaa3e7</sum></package><package arch="x86_64" name="python-perf" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">fa3a944b73812f9848fd6a8a3f5db3bad17e75c3964713e8358f699734a3cd58</sum></package><package arch="x86_64" name="kernel-devel" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">847e8c99f83ffa5657b05ef11a8200d47838d7625d4daaae8176b24efc86c852</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.88.1.el7.noarch.rpm</filename><sum type="sha256">3e5a1430d717b710a581e948c0be5a661f549ba1dffb627801476755b4df5ca8</sum></package><package arch="x86_64" name="kernel" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">5c64944b3c8e0a4b1b489a49fae4eca1e0e11230199314410617969ceea45b7c</sum></package><package arch="x86_64" name="kernel-debug" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">23b0e945e1397bfc990f1f366e451335a0934428a9149bc85d47fae479dc9bf5</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">7675927d96955b743696d9e8314b6f78d61132e2e7b916df89a67d4f497f88df</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">32cd28ab0db8bea7fab5947760340fce5ac55dcf5ed47134de5501479e5e82ad</sum></package><package arch="x86_64" name="kernel-tools" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">86e80c491ce804d47f821e7ea6aa2ebc03421f81a13821e0fd94708e34a345b3</sum></package><package arch="noarch" name="kernel-doc" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.88.1.el7.noarch.rpm</filename><sum type="sha256">ba8643984b51511422db80b0ce8a7c820c0d691c260480f7e6e245f4de156a53</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703" id="CVE-2022-42703" title="Kernel: Use-After-Free Related To Leaf Anon_Vma Double Reuse" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378" id="CVE-2022-4378" title="Kernel: Stack Overflow In Do_Proc_Dointvec And Proc_Skip_Spaces" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1091" id="RHSA-2023:1091-1" title="Rhsa-2023:1091-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133483" id="2133483" title="Kernel: Use-After-Free Related To Leaf Anon_Vma Double Reuse" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2152548" id="2152548" title="Kernel: Stack Overflow In Do_Proc_Dointvec And Proc_Skip_Spaces" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1093-1</id><title>Pesign</title><description>Security Fix(es): 
* pesign: Local privilege escalation on pesign systemd service (CVE-2022-3560) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pesign" release="11.el7_9" src="pesign-0.109-11.el7_9.src.rpm" version="0.109"><filename>pesign-0.109-11.el7_9.x86_64.rpm</filename><sum type="sha256">818e3c6565f79af164f8deb035916daf2318eda8901ce99140df3d0f6cbc9fd3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3560" id="CVE-2022-3560" title="Pesign: Local Privilege Escalation On Pesign Systemd Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1093" id="RHSA-2023:1093-1" title="Rhsa-2023:1093-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135420" id="2135420" title="Pesign: Local Privilege Escalation On Pesign Systemd Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1095-1</id><title>Zlib</title><description>Security Fix(es): 
* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="zlib" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">b906a4671893fe9fcf39156ba4033ba9bcd43627435e8b82217568f5d3b997d5</sum></package><package arch="i686" name="minizip-devel" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>minizip-devel-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">28334f56db86508ed18a210c742977186328cae7b5472f6f12d4808b65b8192c</sum></package><package arch="x86_64" name="minizip-devel" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>minizip-devel-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">6ab923ac4a54450364d194e1cedac2302f3c78a3f7d7c7560eb26a03b2565c59</sum></package><package arch="x86_64" name="zlib-devel" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-devel-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">bc81ee36a9b0f222e5fca10b578453b8e6981ed0868012df60ab15105629244d</sum></package><package arch="i686" name="zlib-static" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-static-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">520f6ed819c571b365246297f7f7beef2d9d9db1f424556aad8844cefc98eb8e</sum></package><package arch="x86_64" name="zlib-static" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-static-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">328f1fe6e08399d03326a68f542ad89ddcb416dfabf1757c67ee372a4c6a8d71</sum></package><package arch="i686" name="minizip" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>minizip-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">7620d3f8bd2161803e83754acde308b4b76f47fd13b7a35f4d14973e89b363c1</sum></package><package arch="i686" name="zlib" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">4ebd12869bda437316581c42b39b035604ff470992e069d213283e17b7f3acff</sum></package><package arch="i686" name="zlib-devel" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-devel-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">949c7905f39fc96d1c159336a55f1c0e9e22efe2ed5584cb759e7206750f80b3</sum></package><package arch="x86_64" name="minizip" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>minizip-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">afc722f2c605a07221685863675ef9f6607275561c1a95ecd42aeea6d157c357</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434" id="CVE-2022-37434" title="Zlib: Heap-Based Buffer Over-Read And Overflow In Inflate() In Inflate.C Via A Large Gzip Header Extra Field" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1095" id="RHSA-2023:1095-1" title="Rhsa-2023:1095-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2116639" id="2116639" title="Zlib: Heap-Based Buffer Over-Read And Overflow In Inflate() In Inflate.C Via A Large Gzip Header Extra Field" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1332-1</id><title>Nss</title><description>Security Fix(es): 
* nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-devel" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-devel-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">34ce3134bee9eb51fe1920ee90371c3f8580d7acd476b5fdea6cf12bd7600ec0</sum></package><package arch="x86_64" name="nss-tools" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-tools-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">0d669b9c5f62827ce1be6a066d8f5ab4881ecb66c4e37940865e839b6f386029</sum></package><package arch="i686" name="nss-devel" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-devel-3.79.0-5.el7_9.i686.rpm</filename><sum type="sha256">a19367f29460d9ca333423ed010bc7bd5cc91c05ce4ffaa8affc9e190e2a9b86</sum></package><package arch="i686" name="nss" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-3.79.0-5.el7_9.i686.rpm</filename><sum type="sha256">ee56b00c8b952b66513a703df2001a2cb80a22f8a70b9e09b7005c756220d4c2</sum></package><package arch="x86_64" name="nss" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">f2520c6f279918a8a25d0af46886654a0fee295452dc01d2b314e0fd78b6fb4f</sum></package><package arch="x86_64" name="nss-sysinit" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-sysinit-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">d15a95b44c4bf2c0539039b14df3f1144bb6b0ed81735081b3ee6e623d4322ea</sum></package><package arch="i686" name="nss-pkcs11-devel" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-pkcs11-devel-3.79.0-5.el7_9.i686.rpm</filename><sum type="sha256">1c017b19a750ad2def22e07bd3316737c87d2e82808a8b929203e91ed8583767</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-pkcs11-devel-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">ddfe69109a54ff7b19f4751269ccaeb77bd7defa8b4aa0f975056110c82dbafe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" id="CVE-2023-0767" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1332" id="RHSA-2023:1332-1" title="Rhsa-2023:1332-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170377" id="2170377" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1333-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.9.0 ESR. 
Security Fix(es): 
* Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) 
* Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) 
* Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) 
* Mozilla: Invalid downcast in Worklets (CVE-2023-28162) 
* Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="3.el7_9" src="firefox-102.9.0-3.el7_9.src.rpm" version="102.9.0"><filename>firefox-102.9.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">a427a7a88bbd42133b1aaaf4008c3fcc07dbad9616aed631c0f49726b156fce8</sum></package><package arch="i686" name="firefox" release="3.el7_9" src="firefox-102.9.0-3.el7_9.src.rpm" version="102.9.0"><filename>firefox-102.9.0-3.el7_9.i686.rpm</filename><sum type="sha256">59d53797253f44aaf180d6cbb4edbcc6eaa79d72c43b37363ecdce3cbdfe6829</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751" id="CVE-2023-25751" title="Mozilla: Incorrect Code Generation During Jit Compilation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752" id="CVE-2023-25752" title="Mozilla: Potential Out-Of-Bounds When Accessing Throttled Streams" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162" id="CVE-2023-28162" title="Mozilla: Invalid Downcast In Worklets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164" id="CVE-2023-28164" title="Mozilla: Url Being Dragged From A Removed Cross-Origin Iframe Into The Same Tab Triggered Navigation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176" id="CVE-2023-28176" title="Mozilla: Memory Safety Bugs Fixed In Firefox 111 And Firefox Esr 102.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1333" id="RHSA-2023:1333-1" title="Rhsa-2023:1333-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178458" id="2178458" title="Mozilla: Incorrect Code Generation During Jit Compilation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178460" id="2178460" title="Mozilla: Potential Out-Of-Bounds When Accessing Throttled Streams" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178466" id="2178466" title="Mozilla: Invalid Downcast In Worklets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178470" id="2178470" title="Mozilla: Url Being Dragged From A Removed Cross-Origin Iframe Into The Same Tab Triggered Navigation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178472" id="2178472" title="Mozilla: Memory Safety Bugs Fixed In Firefox 111 And Firefox Esr 102.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1335-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">2e31d503681d6e51ffe1b515f01f0dc727f815ff16c44c30e151d1369dea38df</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">c77c9e6ac83fe42c8effcc805dec484f68e057d40e2dc5357da3239d6c87596f</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-26.el7_9.i686.rpm</filename><sum type="sha256">29934cbf30d318a3c22bf8df0ee8321131d2dafaf96e68ffce5981c2b7a00dde</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">5fc16fc71da41b06defadfb576ac263d32ec4d632810feaec2c8797ad169d9ba</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">496511b8e774088eb9316cf3f6844619ba665ec80b90e46bd86cf08d75182828</sum></package><package arch="i686" epoch="1" name="openssl-static" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-26.el7_9.i686.rpm</filename><sum type="sha256">79b9820ed1c1acdf7cb580cffbfc22a4da3a575ac4a63a00341a0013206b86e7</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">2bd1f18958c502d555455c93beae0ecbfb201ca20e3a33f94fddf624f95efbc8</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-26.el7_9.i686.rpm</filename><sum type="sha256">05c3ac671b481f99d8127e80e8ef27d40f3d417f7116726e6ad2bf036cd51ee3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" id="CVE-2023-0286" title="Openssl: X.400 Address Type Confusion In X.509 Generalname" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1335" id="RHSA-2023:1335-1" title="Rhsa-2023:1335-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2164440" id="2164440" title="Openssl: X.400 Address Type Confusion In X.509 Generalname" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1401-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.9.0. 
Security Fix(es): 
* Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) 
* Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) 
* Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) 
* Mozilla: Invalid downcast in Worklets (CVE-2023-28162) 
* Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.9.0-1.el7_9.src.rpm" version="102.9.0"><filename>thunderbird-102.9.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">aaef7ae5f3ff0fe550f70ff6757c567713337f61bb126f5909ff9ad5de04e06e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751" id="CVE-2023-25751" title="Mozilla: Incorrect Code Generation During Jit Compilation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752" id="CVE-2023-25752" title="Mozilla: Potential Out-Of-Bounds When Accessing Throttled Streams" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162" id="CVE-2023-28162" title="Mozilla: Invalid Downcast In Worklets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164" id="CVE-2023-28164" title="Mozilla: Url Being Dragged From A Removed Cross-Origin Iframe Into The Same Tab Triggered Navigation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176" id="CVE-2023-28176" title="Mozilla: Memory Safety Bugs Fixed In Firefox 111 And Firefox Esr 102.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1401" id="RHSA-2023:1401-1" title="Rhsa-2023:1401-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178458" id="2178458" title="Mozilla: Incorrect Code Generation During Jit Compilation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178460" id="2178460" title="Mozilla: Potential Out-Of-Bounds When Accessing Throttled Streams" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178466" id="2178466" title="Mozilla: Invalid Downcast In Worklets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178470" id="2178470" title="Mozilla: Url Being Dragged From A Removed Cross-Origin Iframe Into The Same Tab Triggered Navigation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178472" id="2178472" title="Mozilla: Memory Safety Bugs Fixed In Firefox 111 And Firefox Esr 102.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1593</id><title>Important: Httpd Security Update</title><description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-04-04 08:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="httpd-manual" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-98.sl7_9.7.noarch.rpm</filename><sum type="sha256">10e663ffe1d3b93bec8607a8ed2cef51586ae7574113e23ea5b168df1ba5fb7f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690" id="CVE-2023-25690" title="Cve-2023-25690" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1593" id="RHSA-2023:1593" title="Important: Httpd Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1593-1</id><title>Httpd</title><description>Security Fix(es): 
* httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="httpd-tools" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">b6cf4199858267e8f9762451385d46f87e8ceb75bac0b2de7fe032732fb06203</sum></package><package arch="x86_64" name="httpd" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>httpd-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">3d4bc97a92e7c0bb5425a938a84c21101f25b7b53e825193af04e1fd8892d0df</sum></package><package arch="x86_64" name="mod_session" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">1ce891dabde1836b2b362c14de6e3aafdcd7c8d5f6de73e64e7f878ccd7d96a2</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">49f6fa7cfc5629f66b01e3a18ec3e558dc6722839a3766fc7d2cbe4fc1195b63</sum></package><package arch="x86_64" name="mod_ldap" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">6e05444ce8d8bf1e3a91639b23bf7d128e584646f26949bb215f1446e1837820</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">1a650a8e1ea9a7d69c3d00dbeb59bb17e6a5c94df65dcb21cf3714c2859f781b</sum></package><package arch="x86_64" name="httpd-devel" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">ecc06f45c96a7758b84341f2d60318bf7b28ff3b318304a73b4dbeccad3249f2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690" id="CVE-2023-25690" title="Httpd: Http Request Splitting With Mod_Rewrite And Mod_Proxy" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1593" id="RHSA-2023:1593-1" title="Rhsa-2023:1593-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2176209" id="2176209" title="Httpd: Http Request Splitting With Mod_Rewrite And Mod_Proxy" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1594-1</id><title>Tigervnc And Xorg-X11-Server</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. 
Security Fix(es): 
* xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xdmx" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">97bf7b3f2bb37ae6d3e7a4efa36851013f8dc9b4cec489c2764768a14f8a0790</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">5c4766340029b5da5b87e44f14c9ff40b4d7e939beb439ae4fd922ead3a5a401</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">834e599ec8cf47884775633fa718683d390a944447405f8ff7b99ea05aec1f12</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">62f517a3a48adb938f85b62f362149acdd6be710767e7770a46c37215f66a172</sum></package><package arch="x86_64" name="tigervnc" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-25.el7_9.x86_64.rpm</filename><sum type="sha256">04671427d8346c9647f78cbdd0268fa1e5f699536f69d5cee4c769baee9b150b</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">3467bf8a152e43b9bef7a27bd16715c5e3fa540e59fb5a33fb4b6aa4bc6e71b7</sum></package><package arch="x86_64" name="tigervnc-server" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-25.el7_9.x86_64.rpm</filename><sum type="sha256">9a0971a52bce35c9630a41c85f52bffcf44546cfbd79cacb99b735206b946f5c</sum></package><package arch="noarch" name="tigervnc-license" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-25.el7_9.noarch.rpm</filename><sum type="sha256">983db28d51982dbfde3db1e7b05dc7702c97f51977ec27ec7b9d3b55d7761d5b</sum></package><package arch="noarch" name="tigervnc-server-applet" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-25.el7_9.noarch.rpm</filename><sum type="sha256">ebd8ed160da00171c32afe1429bd9d8ceaf34a91af5369bad46fc75d121bb3b2</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-25.el7_9.x86_64.rpm</filename><sum type="sha256">91cf15c11dd54d4faa4450cf63008a4747524ec1cedf6c89ecb9e41b8bcc717f</sum></package><package arch="noarch" name="xorg-x11-server-source" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-23.el7_9.noarch.rpm</filename><sum type="sha256">35176bd63454bd00d5b1f0cf5abca716a2d9027dff58a39a1dab81b73a93b091</sum></package><package arch="i686" name="xorg-x11-server-devel" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-23.el7_9.i686.rpm</filename><sum type="sha256">14244e03dbef775e3f5c6518c5ed08869205d39aa9411935fc4c007f9fc9120e</sum></package><package arch="noarch" name="tigervnc-icons" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-25.el7_9.noarch.rpm</filename><sum type="sha256">f088e39a19cae65c421134424e007808080e02f5479f8c8ab224e3fab6b53aae</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">17d6256f633f77185934d41b63fef31042c96aa996dad9c1e0d65fdf2a861969</sum></package><package arch="x86_64" name="tigervnc-server-module" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-25.el7_9.x86_64.rpm</filename><sum type="sha256">13a0791a7fe89474cd82503b3d573f393f9440dde33dc3e651684b8b25aab271</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">5a14ef83b13c887c9537e214da940725b07ca8b45a50fd17ff63cf4580b45d00</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">e46d1a09f68e8b9c5c3fc265d0444d94ca0247c6f795ade8ffa4e2f3063d3d93</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393" id="CVE-2023-1393" title="Xorg-X11-Server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1594" id="RHSA-2023:1594-1" title="Rhsa-2023:1594-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2180288" id="2180288" title="Xorg-X11-Server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1791-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.10.0 ESR. 
Security Fix(es): 
* MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp 
* Mozilla: Fullscreen notification obscured (CVE-2023-29533) 
* Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) 
* Mozilla: Invalid free from JavaScript code (CVE-2023-29536) 
* Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) 
* Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) 
* Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) 
* Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) 
* Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.10.0-1.el7_9.src.rpm" version="102.10.0"><filename>firefox-102.10.0-1.el7_9.i686.rpm</filename><sum type="sha256">4b88e59f89bd15b2d7dffa6ae1fd994a9adc1906332c85530f2d93a4739498d6</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.10.0-1.el7_9.src.rpm" version="102.10.0"><filename>firefox-102.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">1971c8dd433daf282cc606e06d8148c6771731090d0fd0c3345fcae01055ac8b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945" id="CVE-2023-1945" title="Mozilla: Memory Corruption In Safe Browsing Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533" id="CVE-2023-29533" title="Mozilla: Fullscreen Notification Obscured" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535" id="CVE-2023-29535" title="Mozilla: Potential Memory Corruption Following Garbage Collector Compaction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536" id="CVE-2023-29536" title="Mozilla: Invalid Free From Javascript Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539" id="CVE-2023-29539" title="Mozilla: Content-Disposition Filename Truncation Leads To Reflected File Download" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541" id="CVE-2023-29541" title="Mozilla: Files With Malicious Extensions Could Have Been Downloaded Unsafely On Linux" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548" id="CVE-2023-29548" title="Mozilla: Incorrect Optimization Result On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550" id="CVE-2023-29550" title="Mozilla: Memory Safety Bugs Fixed In Firefox 112 And Firefox Esr 102.10" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1791" id="RHSA-2023:1791-1" title="Rhsa-2023:1791-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186101" id="2186101" title="Mozilla: Fullscreen Notification Obscured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186102" id="2186102" title="Mfsa-Tmp-2023-0001 Mozilla: Double-Free In Libwebp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186103" id="2186103" title="Mozilla: Potential Memory Corruption Following Garbage Collector Compaction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186104" id="2186104" title="Mozilla: Invalid Free From Javascript Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186105" id="2186105" title="Mozilla: Content-Disposition Filename Truncation Leads To Reflected File Download" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186106" id="2186106" title="Mozilla: Files With Malicious Extensions Could Have Been Downloaded Unsafely On Linux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186109" id="2186109" title="Mozilla: Memory Corruption In Safe Browsing Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186110" id="2186110" title="Mozilla: Incorrect Optimization Result On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186111" id="2186111" title="Mozilla: Memory Safety Bugs Fixed In Firefox 112 And Firefox Esr 102.10" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1806-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.10.0. 
Security Fix(es): 
* Thunderbird: Revocation status of S/Mime recipient certificates was not checked (CVE-2023-0547) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to  denial-of- service attack (CVE-2023-28427) 
* Mozilla: Fullscreen notification obscured (CVE-2023-29533) 
* Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) 
* Mozilla: Invalid free from JavaScript code (CVE-2023-29536) 
* Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) 
* Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) 
* Thunderbird: Hang when processing certain OpenPGP messages (CVE-2023-29479) 
* Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) 
* Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) 
* Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) 
* MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.10.0-2.el7_9.src.rpm" version="102.10.0"><filename>thunderbird-102.10.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">1c30a55a7773ed392b56df4f614bf0542653fd91f7a7b5b2a648d2912dd559a9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0547" id="CVE-2023-0547" title="Thunderbird: Revocation Status Of S/Mime Recipient Certificates Was Not Checked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945" id="CVE-2023-1945" title="Mozilla: Memory Corruption In Safe Browsing Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28427" id="CVE-2023-28427" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To Denial-Of-Service Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29479" id="CVE-2023-29479" title="Thunderbird: Hang When Processing Certain Openpgp Messages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533" id="CVE-2023-29533" title="Mozilla: Fullscreen Notification Obscured" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535" id="CVE-2023-29535" title="Mozilla: Potential Memory Corruption Following Garbage Collector Compaction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536" id="CVE-2023-29536" title="Mozilla: Invalid Free From Javascript Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539" id="CVE-2023-29539" title="Mozilla: Content-Disposition Filename Truncation Leads To Reflected File Download" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541" id="CVE-2023-29541" title="Mozilla: Files With Malicious Extensions Could Have Been Downloaded Unsafely On Linux" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548" id="CVE-2023-29548" title="Mozilla: Incorrect Optimization Result On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550" id="CVE-2023-29550" title="Mozilla: Memory Safety Bugs Fixed In Firefox 112 And Firefox Esr 102.10" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1806" id="RHSA-2023:1806-1" title="Rhsa-2023:1806-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2183278" id="2183278" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To Denial-Of-Service Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186101" id="2186101" title="Mozilla: Fullscreen Notification Obscured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186102" id="2186102" title="Mfsa-Tmp-2023-0001 Mozilla: Double-Free In Libwebp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186103" id="2186103" title="Mozilla: Potential Memory Corruption Following Garbage Collector Compaction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186104" id="2186104" title="Mozilla: Invalid Free From Javascript Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186105" id="2186105" title="Mozilla: Content-Disposition Filename Truncation Leads To Reflected File Download" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186106" id="2186106" title="Mozilla: Files With Malicious Extensions Could Have Been Downloaded Unsafely On Linux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186109" id="2186109" title="Mozilla: Memory Corruption In Safe Browsing Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186110" id="2186110" title="Mozilla: Incorrect Optimization Result On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186111" id="2186111" title="Mozilla: Memory Safety Bugs Fixed In Firefox 112 And Firefox Esr 102.10" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186734" id="2186734" title="Thunderbird: Revocation Status Of S/Mime Recipient Certificates Was Not Checked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186735" id="2186735" title="Thunderbird: Hang When Processing Certain Openpgp Messages" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1875</id><title>Important: Java-11-Openjdk Security Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-04-20 13:33:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-demo-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">ca044ee07327b954b4aff68d9abf78d153a77c58f605be2b722e8cabb54ebee0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-jmods-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">df4208141f7ba687db292f880890b548ad5137f1723d26c58d134421dfd3f484</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-src-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">893b77a830554f328e04b4b4175516ae2cecfed146daac80e6d21c01f28fc631</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-demo-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">5ce3e0b5c15c5a458d1ab4b0aed61ebe2ca8f6f5d90183675c3534d3acd7c0a4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-src-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">0521427a43634e0bcb5235a172a09ce2938c3ff33f4d03fe660e33078b9249a2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-headless-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">1bcd0ac8c3c793004a05e1a20a23b19127a964e7ee34ec57570abb2cfd25897a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">3eff7cecbe2e857bec3fdaf3911f021eb8731c6023da45671d315bad6510b25b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-jmods-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">14339f857ef1c2eeb77945e298c3fa4762a10fb16fef2bbe9d8c39ee6304e2e9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">8d3f8771540dc157c943f36685da8ee39f5f8a4fbfb6b9544164a255feab788d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-devel-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">368f46f7268fafdb3c579111305d4f7ec7ec3c1ce938aa01312c9ffa2b8ea772</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-demo-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">966c80b7f3c3e97c3be19ab2e037202e5a530518918897217e55a0d2eda58b5b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">5d3ad55933a600443139b9639e74211c56e605e5dc5ddcd3f34a992c254f57fe</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-devel-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">c945c271b8a7fa135263b37a727bcb633fbad9901a9b253d7feb2a380c0b8bb0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">ce9ed1c9d3076c33543fda913bdea950b7892a007bca45953cc54b34dbd4d7c7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-headless-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">ce7b0839a2ee5e74efd3b5ec54c0456afdd51a5cc82947087b4c4c7b735443b7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">697d64355c9693a6bb54d851d774c842bf46b5da410b241aa89fab6e9b27d86e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">e27543f31898a2b72dc1687122ea3677eceabe93f618d77567dbec358d34cef5</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" id="CVE-2023-21930" title="Cve-2023-21930" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" id="CVE-2023-21937" title="Cve-2023-21937" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" id="CVE-2023-21938" title="Cve-2023-21938" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" id="CVE-2023-21939" title="Cve-2023-21939" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" id="CVE-2023-21954" title="Cve-2023-21954" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" id="CVE-2023-21967" title="Cve-2023-21967" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" id="CVE-2023-21968" title="Cve-2023-21968" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1875" id="RHSA-2023:1875" title="Important: Java-11-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1899-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) 
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) 
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) 
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) 
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) 
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) 
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">e7d7dcca1e81bf498dd349ae60f174446b068ce267e7ad6f503ef9b4954c2fa3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">3da89a9ffafce0f76610f0d5ff3b3ddaaaa7b0602106f6be67a1957f829bd8c6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-src-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">783b5a5ace4eabbc26c765569f31ff4863e83c81b48696a728bf9e4ee4534556</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">d13185ac7d38f202463ddf655a25d02cef85b71d59acbe56ed0f7d40dc70d2c7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-jmods-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">60ffc85fbd4b6440b246fa7f6c7ca08db70bc89dd26c97ce6f2a238b2304944d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">79d88f962c73afceafa92655367a00510eb84da07b69f2e773d60208e62034d5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-static-libs-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">ddeb619b8bb2023b0ebe9bcf192a72ac70be99ce02964f925d14aae0adeda89d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-devel-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">b200923f06dfd3a841c63f1be22c6ee30274787ab0b6ef93865a0531a2796d47</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">1460d071feb21ff6bc669df2c59314a558d6ae377a0129be52b7f722aa21b591</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">f4db844a3283adb1a688769e5489614dcf2a25663a77f0943dadc08676d2a5dc</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-headless-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">2f9282054eaaf1e0966ca3c79fb01604b52b6a736cc18100b48f4f207ac026a1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-src-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">2c449d2a8bc39812577a9fd2179d4d190a242b7544548665792ab1957319326c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">ff4bac6396cc6032ef5235e742d2901140529240aaca67794b38f123b3e55584</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-demo-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">42589b275de9ea6b01352701fa670321f4ff8ab8097a0cf0c939309ef833d45b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-headless-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">b98fefbf36becafb610464da95ed028209814f32571e7edbe9747f7538bd2e91</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-devel-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">47443f3d369fa4eb622bf76975a3c62ad614321efbabaf6319bebf02386aa668</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-jmods-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">285b1cd3daa192966c20725f318f343e0e93f85e370570a5be2f553ac021b397</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" id="CVE-2023-21930" title="Openjdk: Improper Connection Handling During Tls Handshake (8294474)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" id="CVE-2023-21937" title="Openjdk: Missing String Checks For Null Characters (8296622)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" id="CVE-2023-21938" title="Openjdk: Incorrect Handling Of Null Characters In Processbuilder (8295304)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" id="CVE-2023-21939" title="Openjdk: Swing Html Parsing Issue (8296832)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" id="CVE-2023-21954" title="Openjdk: Incorrect Enqueue Of References In Garbage Collector (8298191)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" id="CVE-2023-21967" title="Openjdk: Certificate Validation Issue In Tls Session Negotiation (8298310)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" id="CVE-2023-21968" title="Openjdk: Missing Check For Slash Characters In Uri-To-Path Conversion (8298667)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1899" id="RHSA-2023:1899-1" title="Rhsa-2023:1899-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187435" id="2187435" title="Openjdk: Improper Connection Handling During Tls Handshake (8294474)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187441" id="2187441" title="Openjdk: Incorrect Enqueue Of References In Garbage Collector (8298191)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187704" id="2187704" title="Openjdk: Certificate Validation Issue In Tls Session Negotiation (8298310)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187724" id="2187724" title="Openjdk: Swing Html Parsing Issue (8296832)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187758" id="2187758" title="Openjdk: Incorrect Handling Of Null Characters In Processbuilder (8295304)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187790" id="2187790" title="Openjdk: Missing String Checks For Null Characters (8296622)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187802" id="2187802" title="Openjdk: Missing Check For Slash Characters In Uri-To-Path Conversion (8298667)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1904</id><title>Important: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Native code within the OpenJDK code base attempted to call close() on a file descriptor repeatedly if it returned the error code, EINTR. However, the close() native call is not restartable and this caused the virtual machine to crash. The close() call is now only made once. (RHBZ#2159458)
</description><severity>important</severity><issued date="2023-04-25 08:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.372.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">646768d83d6251c8eedf888f3915c573c053176902179b5f5a69cc8d37b1ebfa</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">806a3a0b17335ea6d9d1b8c53042e8bae1916f06e1ef5400e97827ef34bfb15f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">1bd2264d72db55590781bac0667f09114c7868d31a9353148fb4740b21934245</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">d3cf33cd94a93d63544a4fbf673759b44f22933337b3f3b18ee5b8b81aa33606</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">b1ff189ca269ee49847a9265cf0988dc998b33e92927fcf811f0c61afe6e8ba1</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.372.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">f2aabab9fbc0ef81ca5da7a6ea4e2caa6473df13dd9121e0c021bbfe916fa16b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">4a97194520016f53ff2f66ec138b36bf53ce65cad09bbe01d96bd386e7293861</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">3ca61ef2ecfbce5403113d58ef935a7c8b9b2b95a247ecda8d58dbcd347397e3</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" id="CVE-2023-21930" title="Cve-2023-21930" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" id="CVE-2023-21937" title="Cve-2023-21937" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" id="CVE-2023-21938" title="Cve-2023-21938" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" id="CVE-2023-21939" title="Cve-2023-21939" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" id="CVE-2023-21954" title="Cve-2023-21954" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" id="CVE-2023-21967" title="Cve-2023-21967" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" id="CVE-2023-21968" title="Cve-2023-21968" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1904" id="RHSA-2023:1904" title="Important: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2159458" id="2159458" title="2159458 &#8211; Do Not Restart Close If Errno Is Eintr [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1904-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) 
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) 
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) 
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) 
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) 
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) 
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Native code within the OpenJDK code base attempted to call close() on a file descriptor repeatedly if it returned the error code, EINTR. However, the close() native call is not restartable and this caused the virtual machine to crash. The close() call is now only made once. (RHBZ#2159458)</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">2805bc614336ff529007801b092c3b638899290d57d3ede83686b5af7ecc797d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">3970da71dbb7d4387ffda5541026805c6155773aa068f9aa2c50f7c1635f40ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">1b9c9d2c00fa1860c1a335735c066903dbb2fcb5d535fc757759f4abb3128b24</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">3b0f1a5bb573bbb35d00485b3fd963351cf346d7c39fe4817a8d63c9492fe91c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">21617911170f00001069a2338b7c3b9a5b6dd725074040579da1eb78a80e96a6</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">df2eec75f6a7373e61d2a3b5a1f2b39ce61d77160466ad77bd1e1fcfc27888ae</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">7c1d3c628dc2aa8ba5868c8503584323e6a85cb243ceab78b237eb8a55110a6e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">44c0732528921c3523825792eb390055db12f5f0dfcfc951e29200853e8a2888</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">9fbac8c8d22e94f89554d198252d5e8603d7627e7ef794466d86b2569cd03e5f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">c3ab8dfc60523f0a92429fd8d33a70da029b9de871be58b8a819a10facad0c2e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">4cff91774c6f91e91384e2faf2141154e8f52123e68c7cc5bcd5d996df383a6d</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">5c509a7695f34dc1ca8aa721bd41db8f1768b9cbb5639571b0554c15244c6361</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">0e7b61f122111dd61463033d0391ff4ba07ca13ba4517ceffec740aca8f79454</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">bc2adc4d0f284b275ed81058992d4c4355c126850d61a8ab0a9a66ac4ce08949</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">74da510bb8b01ead3f0dd393642a3632d4de354042276f8759912951838b5540</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">b8f5a08a2517c86193fdff4312d88df661c2d1366d5694d5e8d8dd1f4908cfb4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">d5bfcfe020159faf6beb324035ef036ea4871292bd296df6e5472bb392d31528</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">a2facdb5600ce337d1ade1b1f902d8dd669cdff38f4cfda163c61239ec6b905b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">157a01cf2f7272493df845a357a7c4c1386b1656203880886448576c23ef6775</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">b81940212cfd79f445033cabe563daeb3596757fd22446f6e61df8541562a0cd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" id="CVE-2023-21930" title="Openjdk: Improper Connection Handling During Tls Handshake (8294474)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" id="CVE-2023-21937" title="Openjdk: Missing String Checks For Null Characters (8296622)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" id="CVE-2023-21938" title="Openjdk: Incorrect Handling Of Null Characters In Processbuilder (8295304)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" id="CVE-2023-21939" title="Openjdk: Swing Html Parsing Issue (8296832)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" id="CVE-2023-21954" title="Openjdk: Incorrect Enqueue Of References In Garbage Collector (8298191)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" id="CVE-2023-21967" title="Openjdk: Certificate Validation Issue In Tls Session Negotiation (8298310)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" id="CVE-2023-21968" title="Openjdk: Missing Check For Slash Characters In Uri-To-Path Conversion (8298667)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1904" id="RHSA-2023:1904-1" title="Rhsa-2023:1904-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187435" id="2187435" title="Openjdk: Improper Connection Handling During Tls Handshake (8294474)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187441" id="2187441" title="Openjdk: Incorrect Enqueue Of References In Garbage Collector (8298191)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187704" id="2187704" title="Openjdk: Certificate Validation Issue In Tls Session Negotiation (8298310)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187724" id="2187724" title="Openjdk: Swing Html Parsing Issue (8296832)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187758" id="2187758" title="Openjdk: Incorrect Handling Of Null Characters In Processbuilder (8295304)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187790" id="2187790" title="Openjdk: Missing String Checks For Null Characters (8296622)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187802" id="2187802" title="Openjdk: Missing Check For Slash Characters In Uri-To-Path Conversion (8298667)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1987-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: memory corruption in usbmon driver (CVE-2022-43750) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* NFSv4.1 : state manager loop TEST_STATEID/OPEN</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-04-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug-devel" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">de36d46b2412c28856e2a4670ceab1138e88f088b02f688b09d6a4f47dcd1f2c</sum></package><package arch="x86_64" name="kernel" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">23abdf98822a301faf51002e5cd3df3b237663599b54512bf5b3a704d2133f7e</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">5209696d1b9d02fda70665d0c33b8f42a0c2867c8c091ca0fa7ac187092dc610</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">f912c4a8afbb5370c90d0f75f8ec48eadebda3e00a7c8cb3c812a4004121ec00</sum></package><package arch="x86_64" name="perf" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">1f03dbba96d8c0aacd2c650617f689be28fc8fb500504203c7a6afc7e72f337d</sum></package><package arch="x86_64" name="kernel-devel" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">dc586da04a325769bd63167a147befbe92ef90bf73a3b6c62483a33f3eabe18b</sum></package><package arch="x86_64" name="bpftool" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">f59bfe8f6576b3594181ee0b78c833cebdb4c7ec6f5ea3950a4d863261708de4</sum></package><package arch="x86_64" name="kernel-tools" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">1b51f9afb4bbf819af7e9945ea1bc83859f238da61968c3595e15b9438ef7fd7</sum></package><package arch="noarch" name="kernel-doc" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.90.1.el7.noarch.rpm</filename><sum type="sha256">6c4fd3efe53de4ae2e3efc49baecdca84f4f5bccfa0d7cb2c5e05ef082b42e36</sum></package><package arch="x86_64" name="kernel-debug" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">e391d30656de06da5d4f1f021e84b75e97907824f27654997d7e1b6e6d56006d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.90.1.el7.noarch.rpm</filename><sum type="sha256">c7bf8b4514eb48baae5bf8d71f0f5769459e0e0f2a6ea82b228dbd14afbaae93</sum></package><package arch="x86_64" name="kernel-headers" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">4922ad2e5a87275be7d464a3b2983caf86c777941081f96271a65d66c068018b</sum></package><package arch="x86_64" name="python-perf" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">287afd725862c75b3bc9b5a2a6bd6f032963e86c856224219a7a7ab71d3b7987</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750" id="CVE-2022-43750" title="Kernel: Memory Corruption In Usbmon Driver" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1987" id="RHSA-2023:1987-1" title="Rhsa-2023:1987-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151270" id="2151270" title="Kernel: Memory Corruption In Usbmon Driver" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:2077-1</id><title>Libwebp</title><description>Security Fix(es): 
* Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwebp-tools" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-tools-0.3.0-11.el7.x86_64.rpm</filename><sum type="sha256">69ad43f31cdd66bae7427ae8e7675a2473f8ec82a42d9ccc18f3fb8b147f23bc</sum></package><package arch="x86_64" name="libwebp-devel" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-devel-0.3.0-11.el7.x86_64.rpm</filename><sum type="sha256">d0f7746496279510d8d9349af1eedf768d6a9f6728b052b90c745128df1dc164</sum></package><package arch="i686" name="libwebp-devel" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-devel-0.3.0-11.el7.i686.rpm</filename><sum type="sha256">acc9073bac4c34b94140c41c00723439d7f8bdb27affd320ba2f6c0f6110a03a</sum></package><package arch="i686" name="libwebp" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-0.3.0-11.el7.i686.rpm</filename><sum type="sha256">fde748bfb7fb2f89d217f1ce683817d6111d46d5961c517d98af764ae8598aea</sum></package><package arch="x86_64" name="libwebp" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-0.3.0-11.el7.x86_64.rpm</filename><sum type="sha256">28f595642a9bf838e0c24a74f183e3fe24bb477ecb200018354951c31784f6b2</sum></package><package arch="x86_64" name="libwebp-java" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-java-0.3.0-11.el7.x86_64.rpm</filename><sum type="sha256">15ac95abcbc2b845c4bef4bba6549f898899e7f7c9df1c5eda18011ea7d24406</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999" id="CVE-2023-1999" title="Mozilla: Libwebp: Double-Free In Libwebp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:2077" id="RHSA-2023:2077-1" title="Rhsa-2023:2077-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186102" id="2186102" title="Mfsa-Tmp-2023-0001 Mozilla: Double-Free In Libwebp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3137-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.11.0 ESR. 
Security Fix(es): 
* Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205) 
* Mozilla: Crash in RLBox Expat driver (CVE-2023-32206) 
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207) 
* Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215) 
* Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211) 
* Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212) 
* Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-102.11.0-2.el7_9.src.rpm" version="102.11.0"><filename>firefox-102.11.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">e2c2a1d54b202b045157a98bc48bef2d9e30b1946e632dd97f9d3f1eb32e031d</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-102.11.0-2.el7_9.src.rpm" version="102.11.0"><filename>firefox-102.11.0-2.el7_9.i686.rpm</filename><sum type="sha256">217731f4536be9805e2c725616e4be6b623c1506a35bb55b2086030fcbc2b4e2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" id="CVE-2023-32205" title="Mozilla: Browser Prompts Could Have Been Obscured By Popups" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" id="CVE-2023-32206" title="Mozilla: Crash In Rlbox Expat Driver" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" id="CVE-2023-32207" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" id="CVE-2023-32211" title="Mozilla: Content Process Crash Due To Invalid Wasm Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" id="CVE-2023-32212" title="Mozilla: Potential Spoof Due To Obscured Address Bar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" id="CVE-2023-32213" title="Mozilla: Potential Memory Corruption In Filereader::Doreaddata()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" id="CVE-2023-32215" title="Mozilla: Memory Safety Bugs Fixed In Firefox 113 And Firefox Esr 102.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3137" id="RHSA-2023:3137-1" title="Rhsa-2023:3137-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196736" id="2196736" title="Mozilla: Browser Prompts Could Have Been Obscured By Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196737" id="2196737" title="Mozilla: Crash In Rlbox Expat Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196738" id="2196738" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196740" id="2196740" title="Mozilla: Content Process Crash Due To Invalid Wasm Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196741" id="2196741" title="Mozilla: Potential Spoof Due To Obscured Address Bar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196742" id="2196742" title="Mozilla: Potential Memory Corruption In Filereader::Doreaddata()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196753" id="2196753" title="Mozilla: Memory Safety Bugs Fixed In Firefox 113 And Firefox Esr 102.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3145-1</id><title>Apr-Util</title><description>Security Fix(es): 
* apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="apr-util-ldap" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-ldap-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">e25308894da281c3d546aca086e3a57f0428e8d01bdf83792fe0036da195439b</sum></package><package arch="x86_64" name="apr-util-nss" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-nss-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">7df19e8165bbd56b4351b225ece0d4a43893a10dd5bcbf4acb5db7dba6d4f76b</sum></package><package arch="x86_64" name="apr-util-openssl" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-openssl-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">8a5ece8be05a373617dd4137d523928c8d3a789a142e17b132669e0a80629fb0</sum></package><package arch="x86_64" name="apr-util-odbc" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-odbc-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">6ff109d36706fc3357c18c1b1d96e6b19233ea875101a8a3a7553c35b322f02a</sum></package><package arch="i686" name="apr-util" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-1.5.2-6.el7_9.1.i686.rpm</filename><sum type="sha256">a10bfc1aff922fa7c434500ada8fe75f96726a33e8a55c4e6e71b02885860dcc</sum></package><package arch="x86_64" name="apr-util-mysql" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-mysql-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">ecbec100c816c813f091b250f8d4472ca80d76347e483adc7f48d49aa224e480</sum></package><package arch="x86_64" name="apr-util" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">b9dcf09c4b5bb5cb5c8db172f981b3c8043fd17aac07c4e1aed8af74f7284dbf</sum></package><package arch="i686" name="apr-util-devel" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-devel-1.5.2-6.el7_9.1.i686.rpm</filename><sum type="sha256">77cee88e27df38a0c49fbe92f4b392e924026cf18b9fef8cbe7accdaf2d6de64</sum></package><package arch="x86_64" name="apr-util-devel" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-devel-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">29b315ff9cdfd835b84e0a733d12f6e6bcda0ee7f46ff9aaf9530bea4db0e538</sum></package><package arch="x86_64" name="apr-util-sqlite" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-sqlite-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">9934b4db3804226ad60d97ef34095433b3b413806f877b2eff7fcdee6c4b4e49</sum></package><package arch="x86_64" name="apr-util-pgsql" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-pgsql-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">ccbb8d25374e3a3b0ac4d6a4f53d75abb82e10b611965c16a761907a95e3297b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25147" id="CVE-2022-25147" title="Apr-Util: Out-Of-Bounds Writes In The Apr_Base64" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3145" id="RHSA-2023:3145-1" title="Rhsa-2023:3145-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2169652" id="2169652" title="Apr-Util: Out-Of-Bounds Writes In The Apr_Base64" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3151-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.11.0. 
Security Fix(es): 
* Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205) 
* Mozilla: Crash in RLBox Expat driver (CVE-2023-32206) 
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207) 
* Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215) 
* Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211) 
* Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212) 
* Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.11.0-1.el7_9.src.rpm" version="102.11.0"><filename>thunderbird-102.11.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">83950be333d1640567c94fc1a971c081442598d46e203d365aee10ce5b49e3f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" id="CVE-2023-32205" title="Mozilla: Browser Prompts Could Have Been Obscured By Popups" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" id="CVE-2023-32206" title="Mozilla: Crash In Rlbox Expat Driver" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" id="CVE-2023-32207" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" id="CVE-2023-32211" title="Mozilla: Content Process Crash Due To Invalid Wasm Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" id="CVE-2023-32212" title="Mozilla: Potential Spoof Due To Obscured Address Bar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" id="CVE-2023-32213" title="Mozilla: Potential Memory Corruption In Filereader::Doreaddata()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" id="CVE-2023-32215" title="Mozilla: Memory Safety Bugs Fixed In Firefox 113 And Firefox Esr 102.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3151" id="RHSA-2023:3151-1" title="Rhsa-2023:3151-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196736" id="2196736" title="Mozilla: Browser Prompts Could Have Been Obscured By Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196737" id="2196737" title="Mozilla: Crash In Rlbox Expat Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196738" id="2196738" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196740" id="2196740" title="Mozilla: Content Process Crash Due To Invalid Wasm Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196741" id="2196741" title="Mozilla: Potential Spoof Due To Obscured Address Bar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196742" id="2196742" title="Mozilla: Potential Memory Corruption In Filereader::Doreaddata()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196753" id="2196753" title="Mozilla: Memory Safety Bugs Fixed In Firefox 113 And Firefox Esr 102.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3263-1</id><title>Git</title><description>Security Fix(es): 
* git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652) 
* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="perl-Git" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">c7b6358ffc05927f5d9a35c27857311630ebd75e9ef07749f33777b29b3d3d52</sum></package><package arch="noarch" name="gitk" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">e756ea7f5b1836048bf353e2852378e1d28076550c1e611dbec1753e0c391526</sum></package><package arch="noarch" name="git-email" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">97899af62ee4b49b14b3423aae26390a143e6c3bce6ae55155d2faa133fc486e</sum></package><package arch="noarch" name="git-hg" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">7dbe6883a220246b72b07b0883b4d5cc6a6394d76fdd54ea15ceb7b968c005cb</sum></package><package arch="noarch" name="git-gui" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">294d6e517fc935fa5f592e1e91673aa0016f9d1d8a319ebd4c649f971eeaec3b</sum></package><package arch="noarch" name="git-cvs" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">8010fe9f7a9f769ce948649f91321b0f50c10454b8ea402522e89b05b59681c0</sum></package><package arch="noarch" name="git-all" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">efa5741496687d523e89c33aa496a53e2e81c5f1f739f0890ba0e60fa02915d3</sum></package><package arch="noarch" name="emacs-git-el" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">0ab9001313770b6d4639542725fe6fe273360ba834f514b6d47e19e7a73b85ca</sum></package><package arch="noarch" name="git-p4" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">e22b37264ccb2453f57e7d3f90c9a51f91fc95a312c06e94fffdda160ce0d998</sum></package><package arch="noarch" name="gitweb" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">ccac8cdd7f8d8e0471b9b486349cd02e2c5e8a38dc886d8e3970a784a105c3fe</sum></package><package arch="x86_64" name="git" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-25.el7_9.x86_64.rpm</filename><sum type="sha256">75e09efa67ede28fa48fc303a4b64f88ef0767c7a57862ba207b6c542a8c5129</sum></package><package arch="x86_64" name="git-daemon" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-25.el7_9.x86_64.rpm</filename><sum type="sha256">4a7893c0ccb2136cef96a3a42d1c976c4708baae1006ab0401e236184119f805</sum></package><package arch="noarch" name="git-bzr" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">88099b0b0b0eac62df45f49512eee7277d55011dd5e1ebe315d4482e92118238</sum></package><package arch="noarch" name="emacs-git" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">204e0a02b8a7cb91e7ff10fc3c57ea2e69f3531aa62b2fe30f2a1b7922d0a20b</sum></package><package arch="noarch" name="git-instaweb" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-instaweb-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">3e83eeab3a710c7be5655e2df71272688ff9f0af44b02f2ce1a06bc46bd733d0</sum></package><package arch="x86_64" name="git-gnome-keyring" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-gnome-keyring-1.8.3.1-25.el7_9.x86_64.rpm</filename><sum type="sha256">78438f3c27a923f51e56b7a7b1d3cb53e65697751b833fd7e2f8a8a7a7f98080</sum></package><package arch="noarch" name="perl-Git-SVN" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">5dd193a55fb659b5d314001e1658f8a453cb21ee5e08c6bdd3dd5cacdb018290</sum></package><package arch="x86_64" name="git-svn" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-25.el7_9.x86_64.rpm</filename><sum type="sha256">58d5775c300153c42aaee661185813841751bf363ed31cf0603f16fcd891f5df</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652" id="CVE-2023-25652" title="Git: By Feeding Specially Crafted Input To `Git Apply --Reject`, A Path Outside The Working Tree Can Be Overwritten With Partially Controlled Contents" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007" id="CVE-2023-29007" title="Git: Arbitrary Configuration Injection When Renaming Or Deleting A Section From A Configuration File" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3263" id="RHSA-2023:3263-1" title="Rhsa-2023:3263-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2188333" id="2188333" title="Git: By Feeding Specially Crafted Input To `Git Apply --Reject`, A Path Outside The Working Tree Can Be Overwritten With Partially Controlled Contents" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2188338" id="2188338" title="Git: Arbitrary Configuration Injection When Renaming Or Deleting A Section From A Configuration File" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3481-1</id><title>Emacs</title><description>Security Fix(es): 
* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-06-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="emacs" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-24.3-23.el7_9.1.x86_64.rpm</filename><sum type="sha256">16429ed85d33e15b552460c1b67de5294986c29daaa3d2c348e33ed9b1915302</sum></package><package arch="noarch" epoch="1" name="emacs-terminal" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-terminal-24.3-23.el7_9.1.noarch.rpm</filename><sum type="sha256">e6304cdcc84e2f3b192eb747f376b7c28385031751e7f32ce62087cd4a4cc996</sum></package><package arch="noarch" epoch="1" name="emacs-el" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-el-24.3-23.el7_9.1.noarch.rpm</filename><sum type="sha256">cd07bf3dce1867952ff000c38af14043a31e2e230afd103c843157a81b64c7ce</sum></package><package arch="noarch" epoch="1" name="emacs-filesystem" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-filesystem-24.3-23.el7_9.1.noarch.rpm</filename><sum type="sha256">52c8fb406a8e2b782b38536fe5e61ce36c031c3824cb32ce88b6bd2e9e6562d8</sum></package><package arch="x86_64" epoch="1" name="emacs-nox" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-nox-24.3-23.el7_9.1.x86_64.rpm</filename><sum type="sha256">379d8bbcd19407c44dc6b00af52973afecf4488c0b57609032725948563c02a3</sum></package><package arch="x86_64" epoch="1" name="emacs-common" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-common-24.3-23.el7_9.1.x86_64.rpm</filename><sum type="sha256">77e5977105cc0b7645f5141a684adc2845813a0205881e1d0239961910937217</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48339" id="CVE-2022-48339" title="Emacs: Command Injection Vulnerability In Htmlfontify.El" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3481" id="RHSA-2023:3481-1" title="Rhsa-2023:3481-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2171989" id="2171989" title="Emacs: Command Injection Vulnerability In Htmlfontify.El" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3555-1</id><title>Python</title><description>Security Fix(es): 
* python: urllib.parse url blocklisting bypass (CVE-2023-24329) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">c2b14b2623f7080d71a784a26cc0e0917c121879174aed1d7498702cd5f58e48</sum></package><package arch="i686" name="python-libs" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-93.el7_9.i686.rpm</filename><sum type="sha256">74a2f37e515525613a58e2d2e48cdef939554c6e985b556022f7a2fc3da193ba</sum></package><package arch="x86_64" name="python-test" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-test-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">1c508a26d568ab252f09be0a5a9844febd340580a46f9959c8ea9b7bd643c879</sum></package><package arch="x86_64" name="python-tools" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">a141c7be5f16cb7d79c86a7d217c3c26170f59892f3d8449f155c95ef6bc7163</sum></package><package arch="x86_64" name="python-devel" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">c69106bbfeff385d12c48f00f9111f5e9551607cadaed31f7cea6303c465419c</sum></package><package arch="x86_64" name="tkinter" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">2af896618aad06c74e7d6aa51f936cd1def6ff4c2cdde61ad56f6c07dc53e989</sum></package><package arch="x86_64" name="python-debug" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">6a649dc6a6ed2a55d9dda6498f1f6fc0aea0e9e059c76f1ca4dcec9415f19cc2</sum></package><package arch="x86_64" name="python-libs" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">a9911b8402a76fb873d4f8954d6ad8c3335a940617273561485f7ac44a10f3d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" id="CVE-2023-24329" title="Python: Urllib.Parse Url Blocklisting Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3555" id="RHSA-2023:3555-1" title="Rhsa-2023:3555-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2173917" id="2173917" title="Python: Urllib.Parse Url Blocklisting Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3556-1</id><title>Python3</title><description>Security Fix(es): 
* python: urllib.parse url blocklisting bypass (CVE-2023-24329) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python3" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">eb546d5fe026dc6902621e56f6bc958568a1880997534d56ed5fe6b1f0ba3a1c</sum></package><package arch="i686" name="python3-libs" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">85efb8f32cb59dd05a7a21f48cc2abe7711b7f2f1d19997cf4328a54e7b12d7b</sum></package><package arch="i686" name="python3" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">b403cec0cf4d82052b1f34eab7ee866f48b4a38c847736a878041b92c9274b27</sum></package><package arch="x86_64" name="python3-libs" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">acc5dc6879fcb54764b1982a828c7bd0d818e94ffa4b7656abf8bac9d2311cc0</sum></package><package arch="i686" name="python3-tkinter" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">082e297fda5b60c723bf4d11eaf47f2eaf9ffbf10b10e1809432a722d32e4d28</sum></package><package arch="x86_64" name="python3-test" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">9b4d40db2ba3248732de180ffd339f822c98eaab3dc446a63c83e244d3fdf998</sum></package><package arch="i686" name="python3-idle" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">c3213042d778d496f5b48723f2f16e839754e53017944827b719eba596409007</sum></package><package arch="x86_64" name="python3-debug" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">aeabd980724b1d01314f93ee5368b188ace49f641ced64cb03f50c3daf80463e</sum></package><package arch="x86_64" name="python3-devel" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">06c47f05308ffd3e781f031941cf7e06cc0fd06ffb9dffe8191ab667bf295690</sum></package><package arch="x86_64" name="python3-idle" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">abdbe62fff672d7c8c674af61906edf5de7a1fa2eafcf6ffc991bb4f61c01955</sum></package><package arch="x86_64" name="python3-tkinter" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">3fd7dd673a988c986805ed4ced6f19dc47d44f81aee291626dfcc9ae8f00fb27</sum></package><package arch="i686" name="python3-debug" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">1d9a91b8ff0dda6a911e2cc7d89c7520736632c95fca8785cbd9e7c937f3c62b</sum></package><package arch="i686" name="python3-test" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">d6c13b289c5b6793a34b0b67f88ab0730fb99b111e10adf77ad54e09cbc26358</sum></package><package arch="i686" name="python3-devel" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">ba765447ce9209db237e4814f289ef966e50753d880e591b84ea9dc9eb8b9032</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" id="CVE-2023-24329" title="Python: Urllib.Parse Url Blocklisting Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3556" id="RHSA-2023:3556-1" title="Rhsa-2023:3556-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2173917" id="2173917" title="Python: Urllib.Parse Url Blocklisting Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3563-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.12.0. 
Security Fix(es): 
* Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) 
* Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.12.0-1.el7_9.src.rpm" version="102.12.0"><filename>thunderbird-102.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">3d6ef4a4906929928258405965ed74368e1a192aa83d0105bc4f25fa1f799885</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" id="CVE-2023-34414" title="Mozilla: Click-Jacking Certificate Exceptions Through Rendering Lag" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" id="CVE-2023-34416" title="Mozilla: Memory Safety Bugs Fixed In Firefox 114 And Firefox Esr 102.12" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3563" id="RHSA-2023:3563-1" title="Rhsa-2023:3563-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2212841" id="2212841" title="Mozilla: Click-Jacking Certificate Exceptions Through Rendering Lag" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2212842" id="2212842" title="Mozilla: Memory Safety Bugs Fixed In Firefox 114 And Firefox Esr 102.12" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3579-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.12.0 ESR. 
Security Fix(es): 
* Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) 
* Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.12.0-1.el7_9.src.rpm" version="102.12.0"><filename>firefox-102.12.0-1.el7_9.i686.rpm</filename><sum type="sha256">85dd0bd1ea66050ffc9257d0c70173cc9db885ea8ca48b309c830c62eccb0f7e</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.12.0-1.el7_9.src.rpm" version="102.12.0"><filename>firefox-102.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">b0eda21f63d6600d82d0eea6f78452939b615447a11748b6d3ff9dfca96df831</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" id="CVE-2023-34414" title="Mozilla: Click-Jacking Certificate Exceptions Through Rendering Lag" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" id="CVE-2023-34416" title="Mozilla: Memory Safety Bugs Fixed In Firefox 114 And Firefox Esr 102.12" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3579" id="RHSA-2023:3579-1" title="Rhsa-2023:3579-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2212841" id="2212841" title="Mozilla: Click-Jacking Certificate Exceptions Through Rendering Lag" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2212842" id="2212842" title="Mozilla: Memory Safety Bugs Fixed In Firefox 114 And Firefox Esr 102.12" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3741-1</id><title>C-Ares</title><description>Security Fix(es): 
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="c-ares-devel" release="3.el7_9.1" src="c-ares-1.10.0-3.el7_9.1.src.rpm" version="1.10.0"><filename>c-ares-devel-1.10.0-3.el7_9.1.i686.rpm</filename><sum type="sha256">4810d2e56485882183e34a8ddb72425fc96df44ff0690bc1d0acb024f9cfcc3c</sum></package><package arch="x86_64" name="c-ares" release="3.el7_9.1" src="c-ares-1.10.0-3.el7_9.1.src.rpm" version="1.10.0"><filename>c-ares-1.10.0-3.el7_9.1.x86_64.rpm</filename><sum type="sha256">2767f9710da7c66679b27ee4c75b0eb4430dcb4a9d7d505a2a4a651218216a7e</sum></package><package arch="x86_64" name="c-ares-devel" release="3.el7_9.1" src="c-ares-1.10.0-3.el7_9.1.src.rpm" version="1.10.0"><filename>c-ares-devel-1.10.0-3.el7_9.1.x86_64.rpm</filename><sum type="sha256">c682f4cea6d4ae48a03518f7d4722b960bfb476a6edf9e96e80c3d43606fbe4b</sum></package><package arch="i686" name="c-ares" release="3.el7_9.1" src="c-ares-1.10.0-3.el7_9.1.src.rpm" version="1.10.0"><filename>c-ares-1.10.0-3.el7_9.1.i686.rpm</filename><sum type="sha256">3bd881548e05c652d368e63a5a8e5487da80fb4dc7e9d59e8489f037d8214c1f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32067" id="CVE-2023-32067" title="C-Ares: 0-Byte Udp Payload Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3741" id="RHSA-2023:3741-1" title="Rhsa-2023:3741-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2209502" id="2209502" title="C-Ares: 0-Byte Udp Payload Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3944-1</id><title>Open-Vm-Tools</title><description>Security Fix(es): 
* open-vm-tools: authentication bypass vulnerability in the vgauth module (CVE-2023-20867) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* [ESXi] [SL7] vmtoolsd task is blocked in the uninterruptible state while attempting to delete (unlink) the file 'quiesce_manifest.xml' 
* [ESXi][SL7.9][open-vm-tools] Snapshot of the SL7 guest on the VMWare ESXi hypervisor failed vm hangs</description><severity>low</severity><release>Scientific Linux</release><issued date="2023-06-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="open-vm-tools-devel" release="3.el7_9.6" src="open-vm-tools-11.0.5-3.el7_9.6.src.rpm" version="11.0.5"><filename>open-vm-tools-devel-11.0.5-3.el7_9.6.x86_64.rpm</filename><sum type="sha256">e50c2f59eebd90a27a7c4b05f3ea63a278ef1587a393736a4a46837a2240e6e7</sum></package><package arch="x86_64" name="open-vm-tools-desktop" release="3.el7_9.6" src="open-vm-tools-11.0.5-3.el7_9.6.src.rpm" version="11.0.5"><filename>open-vm-tools-desktop-11.0.5-3.el7_9.6.x86_64.rpm</filename><sum type="sha256">583a5c038ff4273c49f1bbaedd4c4fe343c81f9d4ddffcca1ac64a27cba33b63</sum></package><package arch="x86_64" name="open-vm-tools-test" release="3.el7_9.6" src="open-vm-tools-11.0.5-3.el7_9.6.src.rpm" version="11.0.5"><filename>open-vm-tools-test-11.0.5-3.el7_9.6.x86_64.rpm</filename><sum type="sha256">dd3dbeab07c3601f04fd9276645e4d879bfb2591dbf218106a4679bc3f2d0e8f</sum></package><package arch="x86_64" name="open-vm-tools" release="3.el7_9.6" src="open-vm-tools-11.0.5-3.el7_9.6.src.rpm" version="11.0.5"><filename>open-vm-tools-11.0.5-3.el7_9.6.x86_64.rpm</filename><sum type="sha256">d91ad175421f9064d2b465745ffb5522d929f0ac6931a66fa5c9a45dcd359603</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20867" id="CVE-2023-20867" title="Open-Vm-Tools: Authentication Bypass Vulnerability In The Vgauth Module" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3944" id="RHSA-2023:3944-1" title="Rhsa-2023:3944-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1994590" id="1994590" title="[Esxi][Rhel7.9][Open-Vm-Tools] Snapshot Of The Rhel7 Guest On The Vmware Esxi Hypervisor Failed Vm Hangs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2213087" id="2213087" title="Open-Vm-Tools: Authentication Bypass Vulnerability In The Vgauth Module" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4062-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.13.0. 
Security Fix(es): 
* Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201) 
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202) 
* Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and  Thunderbird 102.13 (CVE-2023-37211) 
* Mozilla: Fullscreen notification obscured (CVE-2023-37207) 
* Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.13.0-2.el7_9.src.rpm" version="102.13.0"><filename>thunderbird-102.13.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">457011a565fd0d609ffafae8889642b0098c1782e64d391a7ec242f940aff6ac</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" id="CVE-2023-37201" title="Mozilla: Use-After-Free In Webrtc Certificate Generation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" id="CVE-2023-37202" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" id="CVE-2023-37207" title="Mozilla: Fullscreen Notification Obscured" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" id="CVE-2023-37208" title="Mozilla: Lack Of Warning When Opening Diagcab Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" id="CVE-2023-37211" title="Mozilla: Memory Safety Bugs Fixed In Firefox 115, Firefox Esr 102.13, And Thunderbird 102.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4062" id="RHSA-2023:4062-1" title="Rhsa-2023:4062-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219747" id="2219747" title="Mozilla: Use-After-Free In Webrtc Certificate Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219748" id="2219748" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219749" id="2219749" title="Mozilla: Fullscreen Notification Obscured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219750" id="2219750" title="Mozilla: Lack Of Warning When Opening Diagcab Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219751" id="2219751" title="Mozilla: Memory Safety Bugs Fixed In Firefox 115, Firefox Esr 102.13, And Thunderbird 102.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4079-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.13.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201) 
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202) 
* Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and  Thunderbird 102.13 (CVE-2023-37211) 
* Mozilla: Fullscreen notification obscured (CVE-2023-37207) 
* Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="2.el7_9" src="firefox-102.13.0-2.el7_9.src.rpm" version="102.13.0"><filename>firefox-102.13.0-2.el7_9.i686.rpm</filename><sum type="sha256">52525c06ded84e0af82ad1bb583015b6dd976b15c200a89929aea7970ebf182a</sum></package><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-102.13.0-2.el7_9.src.rpm" version="102.13.0"><filename>firefox-102.13.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">7d5b42ef904a7638edaf85655b8848a9b55128200dc6514220839294a292259a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" id="CVE-2023-37201" title="Mozilla: Use-After-Free In Webrtc Certificate Generation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" id="CVE-2023-37202" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" id="CVE-2023-37207" title="Mozilla: Fullscreen Notification Obscured" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" id="CVE-2023-37208" title="Mozilla: Lack Of Warning When Opening Diagcab Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" id="CVE-2023-37211" title="Mozilla: Memory Safety Bugs Fixed In Firefox 115, Firefox Esr 102.13, And Thunderbird 102.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4079" id="RHSA-2023:4079-1" title="Rhsa-2023:4079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219747" id="2219747" title="Mozilla: Use-After-Free In Webrtc Certificate Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219748" id="2219748" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219749" id="2219749" title="Mozilla: Fullscreen Notification Obscured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219750" id="2219750" title="Mozilla: Lack Of Warning When Opening Diagcab Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219751" id="2219751" title="Mozilla: Memory Safety Bugs Fixed In Firefox 115, Firefox Esr 102.13, And Thunderbird 102.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4151-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* perf record -ag does not capture user space stack frames on s390x 
* SL7.9 - kernel: handle new reply code FILTERED_BY_HYPERVISOR</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">02fdac07bcfcd70a44e58b2b66eacfb4b878d5021d85e5f6121f77a9328b5667</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">6251a806574027dfd31c399144e35a259a698a3a28c3b2eaa54e6a0f188107f2</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">51a9101328612f9d71fe72c145879aba98a2b5afbdf08e04f5f427f5f3597a1d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm</filename><sum type="sha256">13ddb32f504cbe0194aeead1151afc046b34cace7c5bc5193aed6bea6d4072c0</sum></package><package arch="x86_64" name="kernel-debug" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">acc68d033ea9e974d2f6f2041224aff5f46859c6e45c0b97997949bf6add434d</sum></package><package arch="x86_64" name="kernel-devel" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">d427f4027b89aa13cbc836bcafb6b69a7c335d37b84efc738b9aef1c30395e72</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">acaf931aae56735cabdefc5d99313cac4725e5a2211b19f15562856065856345</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">aa994b7f8e6f91bc84e63169d2c518b4435aef54a487d99b3edea56719ccea1c</sum></package><package arch="x86_64" name="shim-ia32" release="3.sl7" src="shim-signed-15.6-3.sl7.src.rpm" version="15.6"><filename>shim-ia32-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">39185186a7f6cb0cefcc2c1d26d1dda21996afa9106651c290f8c41b0421abea</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">183ae7eb980f05ea13f48d4e2f41c90d34dc8b23817fc19969ca0ef69feb718e</sum></package><package arch="x86_64" name="fwupdate" release="6.sl7_9" src="fwupdate-12-6.sl7_9.src.rpm" version="12"><filename>fwupdate-12-6.sl7_9.x86_64.rpm</filename><sum type="sha256">f05fee0dca5f4736b736d99beec247af393b5f3920e668a98800e582159f24bb</sum></package><package arch="x86_64" name="kernel" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">6ae9d35124a1f80a46ab4f8ad9ad4a4c6237452120f67f04881a22b7cf579e1b</sum></package><package arch="x86_64" name="fwupdate-libs" release="6.sl7_9" src="fwupdate-12-6.sl7_9.src.rpm" version="12"><filename>fwupdate-libs-12-6.sl7_9.x86_64.rpm</filename><sum type="sha256">d01c9c211a1f3d7a0beba4f69ba33a6285d11dbc8477c2a44590600a2644bb2a</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7_9.11.0.noarch.rpm</filename><sum type="sha256">31fe7931059e9be7e6bdad1a83a200f77593f86750de08e65fc1b8af0cc6a34a</sum></package><package arch="x86_64" name="python-perf" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">306970c6e447bbeb126a7e99d4524b45a0cc580e5bdd05b30c60bf497ba1b516</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">646b38c30483557716b7a9addd2326eb8be8c30c972d830094895917b94ee58c</sum></package><package arch="x86_64" name="bpftool" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">94cc896650fb6c867857693598868f7e90d7dff12ea92cb57d97c491e5e61482</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">1f2405d5161a7e40d572c69b539a588a86c5b52608a8040c76236783c25fc617</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7_9.11.0.noarch.rpm</filename><sum type="sha256">dd912b0a96c6f9aac8dd2c44c40a7a57030b9096745740f69fa71baa2e3a2699</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7_9.11.0.noarch.rpm</filename><sum type="sha256">d26326bb671444d05e22b08e86c63b1efb22eb88e56b619103e09c497c8226e0</sum></package><package arch="noarch" name="kernel-doc" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm</filename><sum type="sha256">e917b958908bfe5251fbdee329eea5285e1986be0982e74170ee9beda0630d9d</sum></package><package arch="x86_64" name="shim-x64" release="3.sl7" src="shim-signed-15.6-3.sl7.src.rpm" version="15.6"><filename>shim-x64-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">37566ff2a06fd123d9213bb8a80c355ec75811dcd769220ff04bb2496db58147</sum></package><package arch="x86_64" name="fwupdate-efi" release="6.sl7_9" src="fwupdate-12-6.sl7_9.src.rpm" version="12"><filename>fwupdate-efi-12-6.sl7_9.x86_64.rpm</filename><sum type="sha256">b0363c1d769a27dd112cf4beed6f9537c150bb34e384b45e97e90c2a347d4ee2</sum></package><package arch="x86_64" name="fwupdate-devel" release="6.sl7_9" src="fwupdate-12-6.sl7_9.src.rpm" version="12"><filename>fwupdate-devel-12-6.sl7_9.x86_64.rpm</filename><sum type="sha256">76179cf91bf69a5f79b595984e40b0a455c76f97779731b2280fed8d72eefd6d</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">f1fceb068c5b4818015623b6b3e87d91effa4ec9d972bf8f01efe5212616907e</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="3.sl7" src="shim-15.6-3.sl7.src.rpm" version="15.6"><filename>shim-unsigned-x64-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">bdb026643e0ca5cacf8acb7778bb5dc9b09fe7c866ee8f14ccd1ece10450a61e</sum></package><package arch="x86_64" name="kernel-tools" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">32fdbe756f8ed96b782df457240816cd884b0705447ee0a2c0495b7c7d763830</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">50b51f12a760777c9387ad0e1191da8716f876f3065c894fa52cd0829f8fd131</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7_9.11.0.noarch.rpm</filename><sum type="sha256">d8a8f3c36a67551c955b05eede25d191e50c555f8ac86438772a6db95a0c530d</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">2db99f7c06c5210819d5f9eb42c9abe0b8d9655d0b77f07ef73c4dae95d96175</sum></package><package arch="x86_64" name="kernel-headers" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">dd68286b55ee763dd8fc678c44f263ec5d96c35a4c9fe9786e7cd0cbe153e1ab</sum></package><package arch="x86_64" name="shim-unsigned-ia32" release="3.sl7" src="shim-15.6-3.sl7.src.rpm" version="15.6"><filename>shim-unsigned-ia32-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">2f1541a06e65a2d86848aca2d79f1640955593a7a68eec7a03a5a47d30f3ff76</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">1681e6f273f637765446f401f3eb14c0d731bada9d85f03251efc8804bc51157</sum></package><package arch="x86_64" name="perf" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">0376e3997d60d170fce182e5cf2799f5ecb39f38e863b4913c5a993031e684f5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564" id="CVE-2022-3564" title="Kernel: Use-After-Free Caused By L2Cap_Reassemble_Sdu() In Net/Bluetooth/L2Cap_Core.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4151" id="RHSA-2023:4151-1" title="Rhsa-2023:4151-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2150999" id="2150999" title="Kernel: Use-After-Free Caused By L2Cap_Reassemble_Sdu() In Net/Bluetooth/L2Cap_Core.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4152-1</id><title>Bind</title><description>Security Fix(es): 
* bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">29acbdd8ef76126617364b40e3f2b7329905520c0fc2997cca1943ade2e2f170</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">7b6ad4d11d5f58c4b785a685817819d9887e90dbf5b5ef896f2edfc520d31e44</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">66a6af922faa347aaf91e64655d56f5d5b5e0d92890a2ae56f02c70c4864c95e</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">7e5d0f76854bfcfbe47690bb640b238c30e97e54e939c22322536c9d3f1faab0</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">6ddd097023193aacaa88687e1a4c37c905a7d9941541c80818654a584728e67f</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">a5d4544e806cf573de6fb927d2bb437679f2696a34fa5f792d2b76af32bb0fdb</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">2fb0d462a1b1db1a2725e1e0baf84fb76417bf2856005d9bd57c42907b8f5944</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">9d0985c47e21159f2ecc9df5c8ea8d2d70f5a56bd05aa6ed00ff25b36197c5e0</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">5390ad1a5f2685596965712efe2d275bed051f57873af3ebc42b4c416539c908</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">4a989308307618115dab799fbd00aee4a7f6fe5d19f641b5e77430d452959540</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">2bce489aca7599245223ffae177480f2dc3b14e16c637f40a5a0c0890534a3b9</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">7ff549d1ea4277b8cf04054cc499a2ef031e3bc53062ab740d612d3516fc5a20</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">bb0eaaa881ed826216814d893c4ba525c373dd290e9eb74f24da46f40a43cfc4</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">bae52c0b8227daab9989105f72a3a74c7f75cceabd06b9b47d5bb4971eb6e7ab</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">0b226d71c582c942d56ca8f9a799ebe69c336b8f097905bfb1fdbaa487202bac</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">2846839473093619718e8ea04cd84b4d4f27feb87cfb515d70fa32df7c2d74de</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.14.noarch.rpm</filename><sum type="sha256">718ac5e100a00cf62b780e12da17fbdb95ea1e171c609c2f38db53b9aa319d6a</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">aca48ff6d1d75402d11355ed6f532fef4a349812937782dee155e1eca0610460</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">840cda41fd97e0bc0d1665a201486780fde37112cb891fe0b94062ab0f5714da</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">9029c343cea2748a44100b3b0b89315ab0007e45171f7be07d3d0f50d093003c</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">9bca8849fb777e9b638fcccb73d988d3b34353f26ce5efc93f02b31fb81f1926</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">574c4f30fafb93115de42de08603fa9bd6f0189f2f06247cb806b0cd4de33392</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">e75f71ee6da51243433b0b1e77fbca1b79b3205e1068775255f44eafffc1b966</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">482ef3dbadd5c64e229c46f6548fc0573e6931d61e126f5be2ff411f6a8af5e0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828" id="CVE-2023-2828" title="Bind: Named'S Configured Cache Size Limit Can Be Significantly Exceeded" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4152" id="RHSA-2023:4152-1" title="Rhsa-2023:4152-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2216227" id="2216227" title="Bind: Named'S Configured Cache Size Limit Can Be Significantly Exceeded" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4166</id><title>Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) (BZ#2217708)
</description><severity>moderate</severity><issued date="2023-07-21 08:30:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">7c3395ba0672303eeacd383463317845324c1aac2030233d7fea9558fff90549</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">0acdfddd0a7621da52715ba0b8b239c1f5f0ee2dd1a5c773c835ca249e20bf0f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-src-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">abfdc2d0ba965927ba438926b19bfddef818fa2ca21eac00c883a8503c092d1b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-src-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">2ddc1ee4b77ec9cc6bceb4a1e2ea40fe0f47deb48bfd326e384c36ac9d4e409d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">06ed414d6eb74d917f79c66135606b847e084b887f2e7aaec07907cc1ce898d7</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.382.b05-1.el7_9.noarch.rpm</filename><sum type="sha256">5de760604ddd497ea668ecf2f0f19d63f3d41595ed6ccbed0d890e6840626418</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.382.b05-1.el7_9.noarch.rpm</filename><sum type="sha256">aeb291eb0b50c6df8df73995e0d169b30d8cf97bf536fa903e1482fb69575ee7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">3ff546cd8366a57d4613b8b3329c4002bb5521633b5497eb89a8fa4339cf2073</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">6b4b98b46d82621ea627ea494bcde7a01d57c52f499a3251a2026c7f45e1f5c8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">d5cca96d47139cb3c734101fc7d16eb5da6b8791594b76cc9cb311c0d77b8436</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">bb19016336ad1ffef6ccc598a796d2259b59ba46531c2a4e8ba765475158f440</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">0c8b6ce7646a1b634638dabc81d075cfcb4eddc5f6776f6d7cd2bf7103e358ff</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">1f710135ab14b8921155c51224f1620959c92342f5ed6c4f9e8405eb1fec8ea8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">324fc8fe94286881f47638b6e0fd83bcd142875e7620d79ce20d80bf130ac238</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" id="CVE-2023-22045" title="Cve-2023-22045" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" id="CVE-2023-22049" title="Cve-2023-22049" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4166" id="RHSA-2023:4166" title="Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2217708" id="2217708" title="2217708 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2023-07, 8U382) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4166-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) 
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-07-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">be2517d7192e20c4080fe95929dfae8a9aea42cab14e7e51c138f6c266d5055c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">246498ddacd857113797505382a16215d170259474f568de21cdf337ff0f53ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">9c426e1a4c65a49038792a46eda61db38172a58b637f04a031cb8dc4de8cd1ca</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">b5b7073955ddd948e0c276da88d014744e6e2f2fd6ee40b993eff6af81b8a4fd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">8fea289176fabde82dcb29089c11467714e6a9abf9507fdd3cd6f86f0f658177</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">9ce39f54dfaeec78b581d0b325a8412dd482468778bca0f96a755e38f80736ed</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">bb44623d2ee60580b7a1a7816d0351bd036210246f3e3fee58c3cfe8719eae06</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-javadoc-1.8.0.382.b05-1.el7_9.noarch.rpm</filename><sum type="sha256">b5d809bd49184057cfaa02919c8737f8ae3c3d2a9bdcb764ac4e19bb9c1cf322</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">20fa5eebb058c93de0e25304267aeb15993df86f8e712172fb49e325dd4b2380</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">61ba3d584fa8f470ae66e0853c79997ae4939c3e81ac78e8e782b29cd7143e60</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">e5be3aeb37544ea9645bd3ea4ef068cd56baa4982faba21298ec5db94b461cf1</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-1.el7_9.noarch.rpm</filename><sum type="sha256">93929cce2fa47a2f63ccc5d1e84aa2cb89ffcac2fd09fe915b0e4d2f33145645</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">c9db4e28c818f4caf37c8ebf7d4db06219799d5bc58f51989d93edefd4ffea8c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">ca822420f5631ceffa2d5652b7666c8c2acde9aaae3d32837dc2295c8a4e1716</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" id="CVE-2023-22045" title="Openjdk: Array Indexing Integer Overflow Issue (8304468)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" id="CVE-2023-22049" title="Openjdk: Improper Handling Of Slash Characters In Uri-To-Path Conversion (8305312)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4166" id="RHSA-2023:4166-1" title="Rhsa-2023:4166-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221645" id="2221645" title="Openjdk: Array Indexing Integer Overflow Issue (8304468)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221647" id="2221647" title="Openjdk: Improper Handling Of Slash Characters In Uri-To-Path Conversion (8305312)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4233</id><title>Moderate: Java-11-Openjdk Security And Bug Fix Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036) * OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041) * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193) * OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20) (BZ#2217709)
</description><severity>moderate</severity><issued date="2023-07-21 08:30:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-jmods-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">79edb96529d10ef16a14e2daf18ca1395d47fa641003d863f312355ea68f741e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">4718a60737d866d51134e1997539125b97ffe020138b1154e117738222266221</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">c8be48c9d252511eec2ccf4cd7fc3fcf707e8d216f95966a6d70f958affc667e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">f9ae10bed9a2bf684c6e270d4e7462952312530edc183bd7a0c09962419cba8c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-devel-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">a53b63613af856ef8200398dc244c8afa4d2cff0f22263536599d752979620a6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">bb113cc3ec5a057138fb0938f2778346db9a4855c6c6a4a6b46f3e5bebe2c81e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-static-libs-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">3bb27392b418c7c8899fc2e0856d3088e204b078c4dd1dc42cba2533e6055080</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-src-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">28344a7fd67e264329c9b07f5dcd8610dd66e448e5034ce1cf2fa55fcd234b92</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-src-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">33dc461e2082675b6e346795f300a91acdefa485e9233d3cf39f39b66e1fdae3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-demo-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">8d383e463fb3b251593c23148d5c2ea67bdc3ba64601dd4ee6b8c2c249a85396</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-headless-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">de3b19406174e17155461c16bbb7ab46d6bab3ea373d9314d96cfbb7b5dea026</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-demo-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">e71b46bf3b51c008b27b18cf8f8b4ab68e8fc6698382531f49ff66caebc79586</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">b45ea9aee2c7cbf87cf5e1a036fdaff5fc324eb0625524ea8333725f0c3f585f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-devel-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">27fddb078f6eb1a9cf97d83adca5712bce9b19d61c0f9f261094530b0daac735</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-headless-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">bfd172cc6c3047b7f2eaf10420625983b90ee8e61e0081b2db7b24e80cea299e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-jmods-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">f931e5668f419210f43e2b6024127623b3fd6428cdb9dc043cb0a1aa036ca660</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">20371f5b12456cb60bdeb50594787a9915571aeb4bed66acd480282d857a7deb</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006" id="CVE-2023-22006" title="Cve-2023-22006" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036" id="CVE-2023-22036" title="Cve-2023-22036" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" id="CVE-2023-22041" title="Cve-2023-22041" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" id="CVE-2023-22045" title="Cve-2023-22045" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" id="CVE-2023-22049" title="Cve-2023-22049" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193" id="CVE-2023-25193" title="Cve-2023-25193" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4233" id="RHSA-2023:4233" title="Moderate: Java-11-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2217709" id="2217709" title="2217709 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2023-07, 11.0.20) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4233-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036) 
* OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041) 
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) 
* harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193) 
* OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006) 
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-07-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-jmods-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">6b81768fbdd28e1f6d21396d5c56c492566e171f0b3ba69d6a53c6899d8e7669</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-devel-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">44d5bb2962cf95018188e0e9322f1cb0749559717925095f014860d9a2d52a51</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">181fec129c7d9092535329e8c13b10738f5b458b4bfc8e2b35f3d7a849fbf9e8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">8d254b5dd60cc5ae65759c71124065eebeadf32795a13e6e6b4c19d3453c5734</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-jmods-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">9fd0134a61497cef62d71c58e257c28984fe6754e417330cc4d3f196e800f4a9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">58c77950e50ddc6351ef578222b43c1629ac54bd5dfb8e1739807702af220c16</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-devel-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">0c514dc36635d32c240308ef4dfc2b015bcc3c7223d010cf7ddf81ace4f6c9ef</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">28f51f4e0c1d3b94b428e29c38ff7cde48854235795a347f7bce25e3fc1a011e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-src-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">27a31b28a2db95c6db0a33da9d25fcdf6f29d7a3c8a6c2fbf3a265bebec66a22</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">256fef34638e88b726b4a2f1c25fe1c25f3b9f780bfbf76cd7707df050945ace</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-headless-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">5eee4ef43ef2ae522c24da2c9567c7a10a8e69c762b7388de5a44a094fdc31f4</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-demo-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">e8ccbd4e99b30c1b578777648ae4a22f2925f73051c06ce99f714f6b60bbe707</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-src-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">e4a4b80fd40168ee4be8d2d45724d4732b643a3109f88120835280019c5d1ccb</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">4277755e41d7df46ee4f348b36b869e49d17408bb01b498245bebd9ead246923</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-demo-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">fb47826b6a6845ad11f4df022362b11cc86f8f707603371872e06ecc2a338833</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">07ef48a92d0025a97f2a3ba7d19df6dbc2e00facba809f2d5dba5d74f097473d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-headless-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">8187223a55a7d29c536ef088992487a98eb5d02f73701a501a5b0a5a9973cb4c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006" id="CVE-2023-22006" title="Openjdk: Http Client Insufficient File Name Validation (8302475)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036" id="CVE-2023-22036" title="Openjdk: Zip File Parsing Infinite Loop (8302483)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" id="CVE-2023-22041" title="Openjdk: Weakness In Aes Implementation (8308682)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" id="CVE-2023-22045" title="Openjdk: Array Indexing Integer Overflow Issue (8304468)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" id="CVE-2023-22049" title="Openjdk: Improper Handling Of Slash Characters In Uri-To-Path Conversion (8305312)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193" id="CVE-2023-25193" title="Harfbuzz: Allows Attackers To Trigger O(N^2) Growth Via Consecutive Marks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4233" id="RHSA-2023:4233-1" title="Rhsa-2023:4233-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2167254" id="2167254" title="Harfbuzz: Allows Attackers To Trigger O(N^2) Growth Via Consecutive Marks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221619" id="2221619" title="Openjdk: Font Processing Denial Of Service Vulnerability (8301998)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221626" id="2221626" title="Openjdk: Http Client Insufficient File Name Validation (8302475)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221634" id="2221634" title="Openjdk: Zip File Parsing Infinite Loop (8302483)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221645" id="2221645" title="Openjdk: Array Indexing Integer Overflow Issue (8304468)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221647" id="2221647" title="Openjdk: Improper Handling Of Slash Characters In Uri-To-Path Conversion (8305312)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2223207" id="2223207" title="Openjdk: Weakness In Aes Implementation (8308682)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4326-1</id><title>Iperf3</title><description>Security Fix(es): 
* iperf3: memory allocation hazard and crash (CVE-2023-38403) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="iperf3-devel" release="3.el7_9" src="iperf3-3.1.7-3.el7_9.src.rpm" version="3.1.7"><filename>iperf3-devel-3.1.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">e53c0d01885458be4adac152217cf53d799662878939bc5fc691966f389e2f0f</sum></package><package arch="x86_64" name="iperf3" release="3.el7_9" src="iperf3-3.1.7-3.el7_9.src.rpm" version="3.1.7"><filename>iperf3-3.1.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">10a02c97f06d7be475a801b26dd8e756dbe815448697365a2aadfaa1deb0132f</sum></package><package arch="i686" name="iperf3" release="3.el7_9" src="iperf3-3.1.7-3.el7_9.src.rpm" version="3.1.7"><filename>iperf3-3.1.7-3.el7_9.i686.rpm</filename><sum type="sha256">cfceef3822daabf5924b978c72905b741df7d00aaff0701b93f98cbe3c29aed7</sum></package><package arch="i686" name="iperf3-devel" release="3.el7_9" src="iperf3-3.1.7-3.el7_9.src.rpm" version="3.1.7"><filename>iperf3-devel-3.1.7-3.el7_9.i686.rpm</filename><sum type="sha256">3ec8a3704f101c48bf5e1ebb5799a8c4bbab428be5d54c451cae8049349698cb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38403" id="CVE-2023-38403" title="Iperf3: Memory Allocation Hazard And Crash" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4326" id="RHSA-2023:4326-1" title="Rhsa-2023:4326-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2222204" id="2222204" title="Iperf3: Memory Allocation Hazard And Crash" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4382-1</id><title>Openssh</title><description>Security Fix(es): 
* openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="pam_ssh_agent_auth" release="2.23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.23.el7_9.i686.rpm</filename><sum type="sha256">15137695c53e2f504a6425d916c4e8d918cde6ea488c14a409e5bea6d383234b</sum></package><package arch="x86_64" name="openssh-server-sysvinit" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-server-sysvinit-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">533d76891a4fd3af080647599d3de4aa93943e29dd2ba22e6cb2099e9297fc57</sum></package><package arch="x86_64" name="openssh-server" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-server-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">e49f21aa861a841c7277185e4773533fdf824307c3bd2a190dbf6a4993534f4e</sum></package><package arch="x86_64" name="openssh-clients" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-clients-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">42ff6594a5706664e867dec3f55c7c5f2f781a76387b4b0fbdd61dc761c122cf</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="2.23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.23.el7_9.x86_64.rpm</filename><sum type="sha256">5f5a93beb057f9d2bd3fc6809afa4bde65bc5cf9e2777ff6ad037b47524bb0d9</sum></package><package arch="x86_64" name="openssh-askpass" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-askpass-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">99e3fab2ddbf75dc3fe4eec47c13b108bcc5f86943ae40c64600b06a5ca13894</sum></package><package arch="x86_64" name="openssh" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">46560001f786099f2c23e67c61af9ada89ce46dee0a69c0ab2d9c8fec4928e18</sum></package><package arch="x86_64" name="openssh-keycat" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-keycat-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">c40d827906c9369a9cec60464f73dccca0c426665c52635a716cfdced2f9757b</sum></package><package arch="x86_64" name="openssh-ldap" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-ldap-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">9668bcfc1a63f462660cc217d76fb0cfb95877ffabac224267198051dc9fb002</sum></package><package arch="x86_64" name="openssh-cavs" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-cavs-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">e4eb00f6b5814dad2c715cfb2570de1665b13cddf60578f8a644b88fb470b02b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408" id="CVE-2023-38408" title="Openssh: Remote Code Execution In Ssh-Agent Pkcs#11 Support" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4382" id="RHSA-2023:4382-1" title="Rhsa-2023:4382-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2224173" id="2224173" title="Openssh: Remote Code Execution In Ssh-Agent Pkcs#11 Support" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4461-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.14.0 ESR. 
Security Fix(es): 
* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) 
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) 
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) 
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) 
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) 
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) 
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) 
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) 
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.14.0-1.el7_9.src.rpm" version="102.14.0"><filename>firefox-102.14.0-1.el7_9.i686.rpm</filename><sum type="sha256">46d3174db667a468ed9cb3879dbbefb56ba6a15111095d9f94cf9309b018a57d</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.14.0-1.el7_9.src.rpm" version="102.14.0"><filename>firefox-102.14.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">773c59b1f0ce9ec001ca836d4986d4ec85972700c21e51b94e5f149abd14b401</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" id="CVE-2023-4045" title="Mozilla: Offscreen Canvas Could Have Bypassed Cross-Origin Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" id="CVE-2023-4046" title="Mozilla: Incorrect Value Used During Wasm Compilation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" id="CVE-2023-4047" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" id="CVE-2023-4048" title="Mozilla: Crash In Domparser Due To Out-Of-Memory Conditions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" id="CVE-2023-4049" title="Mozilla: Fix Potential Race Conditions When Releasing Platform Objects" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" id="CVE-2023-4050" title="Mozilla: Stack Buffer Overflow In Storagemanager" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" id="CVE-2023-4055" title="Mozilla: Cookie Jar Overflow Caused Unexpected Cookie Jar State" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" id="CVE-2023-4056" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, Firefox Esr 102.14, Thunderbird 115.1, And Thunderbird 102.14" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4057" id="CVE-2023-4057" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, And Thunderbird 115.1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4461" id="RHSA-2023:4461-1" title="Rhsa-2023:4461-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228360" id="2228360" title="Mozilla: Offscreen Canvas Could Have Bypassed Cross-Origin Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228361" id="2228361" title="Mozilla: Incorrect Value Used During Wasm Compilation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228362" id="2228362" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228363" id="2228363" title="Mozilla: Crash In Domparser Due To Out-Of-Memory Conditions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228364" id="2228364" title="Mozilla: Fix Potential Race Conditions When Releasing Platform Objects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228365" id="2228365" title="Mozilla: Stack Buffer Overflow In Storagemanager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228367" id="2228367" title="Mozilla: Cookie Jar Overflow Caused Unexpected Cookie Jar State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228370" id="2228370" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, Firefox Esr 102.14, Thunderbird 115.1, And Thunderbird 102.14" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228371" id="2228371" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, And Thunderbird 115.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4495-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.14.0. 
Security Fix(es): 
* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) 
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) 
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) 
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) 
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) 
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) 
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) 
* thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417) 
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.14.0-1.el7_9.src.rpm" version="102.14.0"><filename>thunderbird-102.14.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">90d4ca466a0c27ff92aa361e83fef3d2ad2a24f8ea729dc3ec89a46aab27f924</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417" id="CVE-2023-3417" title="Thunderbird: File Extension Spoofing Using The Text Direction Override Character" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" id="CVE-2023-4045" title="Mozilla: Offscreen Canvas Could Have Bypassed Cross-Origin Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" id="CVE-2023-4046" title="Mozilla: Incorrect Value Used During Wasm Compilation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" id="CVE-2023-4047" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" id="CVE-2023-4048" title="Mozilla: Crash In Domparser Due To Out-Of-Memory Conditions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" id="CVE-2023-4049" title="Mozilla: Fix Potential Race Conditions When Releasing Platform Objects" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" id="CVE-2023-4050" title="Mozilla: Stack Buffer Overflow In Storagemanager" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" id="CVE-2023-4055" title="Mozilla: Cookie Jar Overflow Caused Unexpected Cookie Jar State" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" id="CVE-2023-4056" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, Firefox Esr 102.14, Thunderbird 115.1, And Thunderbird 102.14" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4057" id="CVE-2023-4057" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, And Thunderbird 115.1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4495" id="RHSA-2023:4495-1" title="Rhsa-2023:4495-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2225325" id="2225325" title="Thunderbird: File Extension Spoofing Using The Text Direction Override Character" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228360" id="2228360" title="Mozilla: Offscreen Canvas Could Have Bypassed Cross-Origin Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228361" id="2228361" title="Mozilla: Incorrect Value Used During Wasm Compilation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228362" id="2228362" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228363" id="2228363" title="Mozilla: Crash In Domparser Due To Out-Of-Memory Conditions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228364" id="2228364" title="Mozilla: Fix Potential Race Conditions When Releasing Platform Objects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228365" id="2228365" title="Mozilla: Stack Buffer Overflow In Storagemanager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228367" id="2228367" title="Mozilla: Cookie Jar Overflow Caused Unexpected Cookie Jar State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228370" id="2228370" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, Firefox Esr 102.14, Thunderbird 115.1, And Thunderbird 102.14" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228371" id="2228371" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, And Thunderbird 115.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4701</id><title>Moderate: Subscription-Manager Security Update</title><description>The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Red Hat entitlement platform.
Security Fix(es):
* subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2023-08-23 08:36:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="subscription-manager-cockpit" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-cockpit-1.24.52-2.sl7_9.noarch.rpm</filename><sum type="sha256">d4dce8973007bffbdb590385324bb6fd624bdf3bf42f093cc1011ce33043d590</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3899" id="CVE-2023-3899" title="Cve-2023-3899" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4701" id="RHSA-2023:4701" title="Moderate: Subscription-Manager Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4701-1</id><title>Subscription-Manager</title><description>Security Fix(es): 
* subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-08-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="subscription-manager-plugin-ostree" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-plugin-ostree-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">3aef89a2e5aa34e5153b964de89ed8dc97536a4197eca875550277ba3a329df9</sum></package><package arch="x86_64" name="subscription-manager-initial-setup-addon" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-initial-setup-addon-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">d004be8aedd432c0ea079c964d307e81a2899951816394458e645f88c5466994</sum></package><package arch="x86_64" name="python-syspurpose" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>python-syspurpose-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">ac777cf7e2eec23ec0e63b8c373ba4673dfdb5c5667d99d1fee87b23fff2d13f</sum></package><package arch="x86_64" name="subscription-manager-rhsm-certificates" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-rhsm-certificates-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">59bac61f4807e35bfe6ffc7571678a2d01c64c5ac838510fa8f318f58ac36bb1</sum></package><package arch="x86_64" name="subscription-manager-gui" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-gui-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">6fb9aebcc5c57bd532ba287e48d4c86f54096c54d01da06ca6779a2cbc601385</sum></package><package arch="x86_64" name="subscription-manager-rhsm" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-rhsm-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">65df3cd12882609a31cb34e044827a64bb72e46c7f0a99ec5a9b62a36431d403</sum></package><package arch="x86_64" name="rhsm-gtk" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>rhsm-gtk-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">d039aca531355bf6b59cbfe5391109d27d7b4cbf5d60e0c1abbd7b352cf62671</sum></package><package arch="x86_64" name="subscription-manager" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">dc72bb7a68002ce37e74d434c63040b2ee393b29fcf70bdbb4dd9c7a7ccd1570</sum></package><package arch="x86_64" name="subscription-manager-plugin-container" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-plugin-container-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">e9b395154b73f1f202917516bbfa4775d16da753e3ba2ec3deafc44316153c7d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3899" id="CVE-2023-3899" title="Subscription-Manager: Inadequate Authorization Of Com.Redhat.Rhsm1 D-Bus Interface Allows Local Users To Modify Configuration" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4701" id="RHSA-2023:4701-1" title="Rhsa-2023:4701-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2225407" id="2225407" title="Subscription-Manager: Inadequate Authorization Of Com.Redhat.Rhsm1 D-Bus Interface Allows Local Users To Modify Configuration" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4766-1</id><title>Cups</title><description>Security Fix(es): 
* cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="cups-devel" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">7c3cbf4cc374bdfd8015361637a8b8a867b5d1fa69bb7beff755640f23f6c0cc</sum></package><package arch="i686" epoch="1" name="cups-devel" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-52.el7_9.i686.rpm</filename><sum type="sha256">5504cec28cb1a1e19235afb9c2c56e02ba69aff292d6eef5d78f8d969419ce01</sum></package><package arch="i686" epoch="1" name="cups-libs" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-52.el7_9.i686.rpm</filename><sum type="sha256">88297a55377748d2933fc8de089f795e27b3865d49e549e260b3fac7215498c2</sum></package><package arch="x86_64" epoch="1" name="cups-client" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-client-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">95ca623b83f86e463b49c79bbb19ccec5cf0199fa1ed2271a0e9a2f67148c76a</sum></package><package arch="x86_64" epoch="1" name="cups" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">5741a6d72fe6c707106827df879c07eb365b69af9fd6eda0c6234f9136df517e</sum></package><package arch="noarch" epoch="1" name="cups-filesystem" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-filesystem-1.6.3-52.el7_9.noarch.rpm</filename><sum type="sha256">5d1fd0decc17e7916b5d62739789604e57922d2c7b52fd4b12ad62288f188d3f</sum></package><package arch="x86_64" epoch="1" name="cups-ipptool" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-ipptool-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">ad6a544566561c17ed080bcdc740b00c63bc540a587e056c9285079b223826d0</sum></package><package arch="x86_64" epoch="1" name="cups-lpd" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-lpd-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">8e901dc27343fab9c1d7dcc25456b2817c574fd7e5fee0e00f157ce6e0b1621b</sum></package><package arch="x86_64" epoch="1" name="cups-libs" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">0485f21088d13e839a97117b8bdbc2430f5d0d9120cde06179f95bbc56802dff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360" id="CVE-2023-32360" title="Cups: Information Leak Through Cups-Get-Document Operation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4766" id="RHSA-2023:4766-1" title="Rhsa-2023:4766-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2230495" id="2230495" title="Cups: Information Leak Through Cups-Get-Document Operation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4819-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) 
* hw: amd: Cross-Process Information Leak (CVE-2023-20593) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* nf_conntrack causing nfs to stall 
* Request to backport upstream commit 5e2d2cc2588b, 26a8b12747c9, and e98fa02c4f2e for SL 7.9.z 
* Fix soft lockup happens in gfs2_dir_get_hash_table()</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">75fddc94eff778849051cd727cde8d2e2eab9f0dbe25819a1d54dea474ba2419</sum></package><package arch="x86_64" name="kernel-headers" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">9480fa13131dc355affd38b22afae1755613b3600b7dfe14699c4747410c227d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">28326695252bb7d55df1dbaf43cc0761341058093df41ddfb46502f704eeb00b</sum></package><package arch="x86_64" name="kernel-debug" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">fc472728cc201ee91ac0fce414ac4907d6c1ece852952923855f7af882ec7ad9</sum></package><package arch="x86_64" name="perf" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">abce41dd1aee77f661942497306545ac92cb95691348aa373cb66d2ba7ff333e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.99.1.el7.noarch.rpm</filename><sum type="sha256">9e4dfeb66bac590bd33a26a3790dd3dfddf021f04c63cb11861c56569690d705</sum></package><package arch="x86_64" name="kernel" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">823739028f271b72b7c0eb70e840c904a8b2c7fe1a757ebe819051befaac9a4b</sum></package><package arch="x86_64" name="python-perf" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">4a3bc0876b9b50589d39ff0880f73c65154e7a10a4e70b2c23dee84821f34b77</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">60f1ab6f6adb06f4d334331206fa7a46354fb75c8c10b467c569acdcd60356f0</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">7547e301ec4b71ab1cd94b53e76d74b88fcc61a279c782d4e4184374ab2db0ce</sum></package><package arch="x86_64" name="kernel-devel" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">cd25d361321788c310c1156e50d2441ae63062eedaf5210068a9261acff274ed</sum></package><package arch="x86_64" name="bpftool" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">3337d4a5bc9064ab0ff906f5ef8ce2a5f97898ed0755a9d76b507f6797caad8c</sum></package><package arch="noarch" name="kernel-doc" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.99.1.el7.noarch.rpm</filename><sum type="sha256">40076f29ea2adeb4fc645a3173cce4ffbd86b82d3feb16cdb794d8db0df3e4f6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" id="CVE-2023-20593" title="Hw: Amd: Cross-Process Information Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" id="CVE-2023-35788" title="Kernel: Cls_Flower: Out-Of-Bounds Write In Fl_Set_Geneve_Opt()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4819" id="RHSA-2023:4819-1" title="Rhsa-2023:4819-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2215768" id="2215768" title="Kernel: Cls_Flower: Out-Of-Bounds Write In Fl_Set_Geneve_Opt()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2217845" id="2217845" title="Hw: Amd: Cross-Process Information Leak" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4945-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.15.0. 
Security Fix(es): 
* Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573) 
* Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574) 
* Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575) 
* Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577) 
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584) 
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585) 
* Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051) 
* Mozilla: Full screen notification obscured by external program (CVE-2023-4053) 
* Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578) 
* Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580) 
* Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581) 
* Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.15.0-1.el7_9.src.rpm" version="102.15.0"><filename>thunderbird-102.15.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">46e739eeccfcee1be1adafb14c695e142b04362af9b6817cbffaed4730cfd694</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051" id="CVE-2023-4051" title="Mozilla: Full Screen Notification Obscured By File Open Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053" id="CVE-2023-4053" title="Mozilla: Full Screen Notification Obscured By External Program" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" id="CVE-2023-4573" title="Mozilla: Memory Corruption In Ipc Canvastranslator" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" id="CVE-2023-4574" title="Mozilla: Memory Corruption In Ipc Colorpickershowncallback" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" id="CVE-2023-4575" title="Mozilla: Memory Corruption In Ipc Filepickershowncallback" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577" id="CVE-2023-4577" title="Mozilla: Memory Corruption In Jit Updateregexpstatics" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578" id="CVE-2023-4578" title="Mozilla: Error Reporting Methods In Spidermonkey Could Have Triggered An Out Of Memory Exception" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580" id="CVE-2023-4580" title="Mozilla: Push Notifications Saved To Disk Unencrypted" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" id="CVE-2023-4581" title="Mozilla: Xll File Extensions Were Downloadable Without Warnings" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583" id="CVE-2023-4583" title="Mozilla: Browsing Context Potentially Not Cleared When Closing Private Window" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" id="CVE-2023-4584" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 102.15, Firefox Esr 115.2, Thunderbird 102.15, And Thunderbird 115.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585" id="CVE-2023-4585" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 115.2, And Thunderbird 115.2" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4945" id="RHSA-2023:4945-1" title="Rhsa-2023:4945-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236071" id="2236071" title="Mozilla: Memory Corruption In Ipc Canvastranslator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236072" id="2236072" title="Mozilla: Memory Corruption In Ipc Colorpickershowncallback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236073" id="2236073" title="Mozilla: Memory Corruption In Ipc Filepickershowncallback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236075" id="2236075" title="Mozilla: Memory Corruption In Jit Updateregexpstatics" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236076" id="2236076" title="Mozilla: Full Screen Notification Obscured By File Open Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236077" id="2236077" title="Mozilla: Error Reporting Methods In Spidermonkey Could Have Triggered An Out Of Memory Exception" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236078" id="2236078" title="Mozilla: Full Screen Notification Obscured By External Program" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236079" id="2236079" title="Mozilla: Push Notifications Saved To Disk Unencrypted" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236080" id="2236080" title="Mozilla: Xll File Extensions Were Downloadable Without Warnings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236082" id="2236082" title="Mozilla: Browsing Context Potentially Not Cleared When Closing Private Window" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236084" id="2236084" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 102.15, Firefox Esr 115.2, Thunderbird 102.15, And Thunderbird 115.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236086" id="2236086" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 115.2, And Thunderbird 115.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5019-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.15.0 ESR. 
Security Fix(es): 
* Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573) 
* Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574) 
* Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575) 
* Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577) 
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584) 
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585) 
* Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051) 
* Mozilla: Full screen notification obscured by external program (CVE-2023-4053) 
* Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578) 
* Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580) 
* Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581) 
* Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.15.0-1.el7_9.src.rpm" version="102.15.0"><filename>firefox-102.15.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">61891cfbf073416bacb946e6277177b91a65036cbce448a4d9487b556e7962f4</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.15.0-1.el7_9.src.rpm" version="102.15.0"><filename>firefox-102.15.0-1.el7_9.i686.rpm</filename><sum type="sha256">a877db6eca1e072036ca6240b94335741438f65df125fbeb18d97deb9d69bd51</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051" id="CVE-2023-4051" title="Mozilla: Full Screen Notification Obscured By File Open Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053" id="CVE-2023-4053" title="Mozilla: Full Screen Notification Obscured By External Program" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" id="CVE-2023-4573" title="Mozilla: Memory Corruption In Ipc Canvastranslator" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" id="CVE-2023-4574" title="Mozilla: Memory Corruption In Ipc Colorpickershowncallback" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" id="CVE-2023-4575" title="Mozilla: Memory Corruption In Ipc Filepickershowncallback" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577" id="CVE-2023-4577" title="Mozilla: Memory Corruption In Jit Updateregexpstatics" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578" id="CVE-2023-4578" title="Mozilla: Error Reporting Methods In Spidermonkey Could Have Triggered An Out Of Memory Exception" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580" id="CVE-2023-4580" title="Mozilla: Push Notifications Saved To Disk Unencrypted" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" id="CVE-2023-4581" title="Mozilla: Xll File Extensions Were Downloadable Without Warnings" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583" id="CVE-2023-4583" title="Mozilla: Browsing Context Potentially Not Cleared When Closing Private Window" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" id="CVE-2023-4584" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 102.15, Firefox Esr 115.2, Thunderbird 102.15, And Thunderbird 115.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585" id="CVE-2023-4585" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 115.2, And Thunderbird 115.2" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5019" id="RHSA-2023:5019-1" title="Rhsa-2023:5019-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236071" id="2236071" title="Mozilla: Memory Corruption In Ipc Canvastranslator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236072" id="2236072" title="Mozilla: Memory Corruption In Ipc Colorpickershowncallback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236073" id="2236073" title="Mozilla: Memory Corruption In Ipc Filepickershowncallback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236075" id="2236075" title="Mozilla: Memory Corruption In Jit Updateregexpstatics" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236076" id="2236076" title="Mozilla: Full Screen Notification Obscured By File Open Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236077" id="2236077" title="Mozilla: Error Reporting Methods In Spidermonkey Could Have Triggered An Out Of Memory Exception" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236078" id="2236078" title="Mozilla: Full Screen Notification Obscured By External Program" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236079" id="2236079" title="Mozilla: Push Notifications Saved To Disk Unencrypted" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236080" id="2236080" title="Mozilla: Xll File Extensions Were Downloadable Without Warnings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236082" id="2236082" title="Mozilla: Browsing Context Potentially Not Cleared When Closing Private Window" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236084" id="2236084" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 102.15, Firefox Esr 115.2, Thunderbird 102.15, And Thunderbird 115.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236086" id="2236086" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 115.2, And Thunderbird 115.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5191-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.15.1. 
Security Fix(es): 
* libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.15.1-1.el7_9.src.rpm" version="102.15.1"><filename>thunderbird-102.15.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">ba267354f3ea78058c39dc9a97779e0b13a6b2171755048856938aa03992073b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863" id="CVE-2023-4863" title="Libwebp: Heap Buffer Overflow In Webp Codec" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5191" id="RHSA-2023:5191-1" title="Rhsa-2023:5191-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2238431" id="2238431" title="Libwebp: Heap Buffer Overflow In Webp Codec" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5197-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.15.1 ESR. 
Security Fix(es): 
* libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.15.1-1.el7_9.src.rpm" version="102.15.1"><filename>firefox-102.15.1-1.el7_9.i686.rpm</filename><sum type="sha256">85ef44035e869811a3f97325047aea5e33af2c1caabda824e7776c13b5ad9d4e</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.15.1-1.el7_9.src.rpm" version="102.15.1"><filename>firefox-102.15.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">b4551ac8b815861793286454e211a169412783791af0ba5c020e2a9e36f12a88</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863" id="CVE-2023-4863" title="Libwebp: Heap Buffer Overflow In Webp Codec" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5197" id="RHSA-2023:5197-1" title="Rhsa-2023:5197-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2238431" id="2238431" title="Libwebp: Heap Buffer Overflow In Webp Codec" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5217-1</id><title>Open-Vm-Tools</title><description>Security Fix(es): 
* open-vm-tools: SAML token signature bypass (CVE-2023-20900) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="open-vm-tools-test" release="3.el7_9.7" src="open-vm-tools-11.0.5-3.el7_9.7.src.rpm" version="11.0.5"><filename>open-vm-tools-test-11.0.5-3.el7_9.7.x86_64.rpm</filename><sum type="sha256">823f5bcaaa0eb97d719b79e3db244c2dd67d202054be1d9caef4383f73acc19f</sum></package><package arch="x86_64" name="open-vm-tools-desktop" release="3.el7_9.7" src="open-vm-tools-11.0.5-3.el7_9.7.src.rpm" version="11.0.5"><filename>open-vm-tools-desktop-11.0.5-3.el7_9.7.x86_64.rpm</filename><sum type="sha256">6abe1fc243914c55f8b9c4a529ee935f0c75fb9d8249afd6de81c1b72b9c160d</sum></package><package arch="x86_64" name="open-vm-tools" release="3.el7_9.7" src="open-vm-tools-11.0.5-3.el7_9.7.src.rpm" version="11.0.5"><filename>open-vm-tools-11.0.5-3.el7_9.7.x86_64.rpm</filename><sum type="sha256">5a7d14bd74c028a57867ba8c1d1ba693c9dd4a71176b504fe402adceae895764</sum></package><package arch="x86_64" name="open-vm-tools-devel" release="3.el7_9.7" src="open-vm-tools-11.0.5-3.el7_9.7.src.rpm" version="11.0.5"><filename>open-vm-tools-devel-11.0.5-3.el7_9.7.x86_64.rpm</filename><sum type="sha256">b9640d3d9d1264d159ccd03d4dc2a7ebd04170172e455b679e8c2046765becb7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20900" id="CVE-2023-20900" title="Open-Vm-Tools: Saml Token Signature Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5217" id="RHSA-2023:5217-1" title="Rhsa-2023:5217-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236542" id="2236542" title="Open-Vm-Tools: Saml Token Signature Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5461-1</id><title>Imagemagick</title><description>Security Fix(es): 
* ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS (CVE-2021-40211) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-10-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="ImageMagick" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-7.el7_9.i686.rpm</filename><sum type="sha256">88d53e3471be404073aacd2022f843d43aa504f504e01aaa542f1dfce7c30ef4</sum></package><package arch="x86_64" name="ImageMagick-c++" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">f1ef8a6d1457af646a1c6dc6f4c946a41d36b8fc073c2f40982be49691898167</sum></package><package arch="i686" name="ImageMagick-devel" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-7.el7_9.i686.rpm</filename><sum type="sha256">b6bf0c4cc6844c9403adc6d56117609c51ee7422f0d38ee24b914f721b7208a9</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.i686.rpm</filename><sum type="sha256">1935210bdf75f03b17edbea60aafce80c36c751efbd7e710642bb3f47338a94c</sum></package><package arch="i686" name="ImageMagick-c++" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-7.el7_9.i686.rpm</filename><sum type="sha256">2ceb28d62d9233df28ab04ede1331fc5e70c2e1a400e8c179b1a0486b14774d3</sum></package><package arch="x86_64" name="ImageMagick-perl" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-perl-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">fb473c30a12109a02292af2b0109fa82b076c6c1868be07bedc1bb9fb743c208</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">554f282b8a2f8ecda2b76fa9b51b4b9e2121579f5e4ca9ff1aeea6576a298136</sum></package><package arch="x86_64" name="ImageMagick-doc" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-doc-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">e66939f63c2e5a10e45ff7583c0f6a5e66a7f2b92e8cf14ac6ef2a3b552b46d7</sum></package><package arch="x86_64" name="ImageMagick-devel" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">9bd618b50bc740fe658ac25a4e8f4a2d683ccd4104c8c0f84652b388c2b5a03d</sum></package><package arch="x86_64" name="ImageMagick" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">7aed22ca7f0431ae1c663475b14a974c97ff1c8acd8be1903ed9e103c637f3a2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40211" id="CVE-2021-40211" title="Imagemagick: Division By Zero In Readenhmetafile Lead To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5461" id="RHSA-2023:5461-1" title="Rhsa-2023:5461-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2235480" id="2235480" title="Imagemagick: Division By Zero In Readenhmetafile Lead To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5475-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 115.3.1. 
Security Fix(es): 
* firefox: use-after-free in workers (CVE-2023-3600) 
* Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169) 
* Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171) 
* Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176) 
* libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-10-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.3.1-1.el7_9.src.rpm" version="115.3.1"><filename>thunderbird-115.3.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">8cab323b2f5657da63859e1c00c841e58c2d089d5cf0fa15633f5065c28579de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3600" id="CVE-2023-3600" title="Firefox: Use-After-Free In Workers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" id="CVE-2023-5169" title="Mozilla: Out-Of-Bounds Write In Pathops" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" id="CVE-2023-5171" title="Mozilla: Use-After-Free In Ion Compiler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" id="CVE-2023-5176" title="Mozilla: Memory Safety Bugs Fixed In Firefox 118, Firefox Esr 115.3, And Thunderbird 115.3" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" id="CVE-2023-5217" title="Libvpx: Heap Buffer Overflow In Vp8 Encoding In Libvpx" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5475" id="RHSA-2023:5475-1" title="Rhsa-2023:5475-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2222652" id="2222652" title="Firefox: Use-After-Free In Workers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240893" id="2240893" title="Mozilla: Out-Of-Bounds Write In Pathops" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240894" id="2240894" title="Mozilla: Use-After-Free In Ion Compiler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240896" id="2240896" title="Mozilla: Memory Safety Bugs Fixed In Firefox 118, Firefox Esr 115.3, And Thunderbird 115.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2241191" id="2241191" title="Libvpx: Heap Buffer Overflow In Vp8 Encoding In Libvpx" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5477-1</id><title>Firefox</title><description>This update upgrades Firefox to version 115.3.1 ESR. 
Security Fix(es): 
* firefox: use-after-free in workers (CVE-2023-3600) 
* Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169) 
* Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171) 
* Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176) 
* libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-10-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.3.1-1.el7_9.src.rpm" version="115.3.1"><filename>firefox-115.3.1-1.el7_9.i686.rpm</filename><sum type="sha256">7f4e2228d5d9d2949d16d30256d62fd9bf0ba6b0a2e2d47fe78ce28140e53ef0</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.3.1-1.el7_9.src.rpm" version="115.3.1"><filename>firefox-115.3.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">a4a269e22d3ff050ca22f748f613c9a75f87601b4c6f69dd657bb3e7bef41aa0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3600" id="CVE-2023-3600" title="Firefox: Use-After-Free In Workers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" id="CVE-2023-5169" title="Mozilla: Out-Of-Bounds Write In Pathops" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" id="CVE-2023-5171" title="Mozilla: Use-After-Free In Ion Compiler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" id="CVE-2023-5176" title="Mozilla: Memory Safety Bugs Fixed In Firefox 118, Firefox Esr 115.3, And Thunderbird 115.3" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" id="CVE-2023-5217" title="Libvpx: Heap Buffer Overflow In Vp8 Encoding In Libvpx" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5477" id="RHSA-2023:5477-1" title="Rhsa-2023:5477-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2222652" id="2222652" title="Firefox: Use-After-Free In Workers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240893" id="2240893" title="Mozilla: Out-Of-Bounds Write In Pathops" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240894" id="2240894" title="Mozilla: Use-After-Free In Ion Compiler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240896" id="2240896" title="Mozilla: Memory Safety Bugs Fixed In Firefox 118, Firefox Esr 115.3, And Thunderbird 115.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2241191" id="2241191" title="Libvpx: Heap Buffer Overflow In Vp8 Encoding In Libvpx" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5615</id><title>Moderate: Libssh2 Security Update</title><description>The libssh2 packages provide a library that implements the SSH2 protocol.
Security Fix(es):
* libssh2: use-of-uninitialized-value in _libssh2_transport_read (CVE-2020-22218)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2023-10-11 11:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libssh2-devel" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-4.el7_9.1.i686.rpm</filename><sum type="sha256">009dbbbfdc6c1bbc675cce7495a9e81969032fc5c5ae59d06f1e05bd10769440</sum></package><package arch="noarch" name="libssh2-docs" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-docs-1.8.0-4.el7_9.1.noarch.rpm</filename><sum type="sha256">650f40d7ebbeca8d4c1ac5d73e0e22f5a985ad0880700d6681a2bd5ac77d5a87</sum></package><package arch="x86_64" name="libssh2" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-4.el7_9.1.x86_64.rpm</filename><sum type="sha256">6f0a7a53236ae0d600edfd672bc8d32fae6195edefd1680fd75ef358115faf10</sum></package><package arch="x86_64" name="libssh2-devel" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-4.el7_9.1.x86_64.rpm</filename><sum type="sha256">ceafa4b990b4ff47b9232a9544bc5b7396e6d9300a0c4bcdeca6ba4ce1371521</sum></package><package arch="i686" name="libssh2" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-4.el7_9.1.i686.rpm</filename><sum type="sha256">5a3128e54547a71535b164de231c5b3027ed4ca833aab74478d77d773b81b146</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22218" id="CVE-2020-22218" title="Cve-2020-22218" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5615" id="RHSA-2023:5615" title="Moderate: Libssh2 Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5616</id><title>Important: Python-Reportlab Security Update</title><description>Python-reportlab is a library used for generation of PDF documents.
Security Fix(es):
* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-10-11 11:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-reportlab" release="11.el7_9" src="python-reportlab-2.5-11.el7_9.src.rpm" version="2.5"><filename>python-reportlab-2.5-11.el7_9.x86_64.rpm</filename><sum type="sha256">6aa94a449302c953ce792df4055fc1a3f90f43a4331b8f20449ad3cf5b7372ff</sum></package><package arch="x86_64" name="python-reportlab-docs" release="11.el7_9" src="python-reportlab-2.5-11.el7_9.src.rpm" version="2.5"><filename>python-reportlab-docs-2.5-11.el7_9.x86_64.rpm</filename><sum type="sha256">cb7cee39beb801352402cce7e897d37a3dd27f7214894296337b6406712eec8a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19450" id="CVE-2019-19450" title="Cve-2019-19450" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5616" id="RHSA-2023:5616" title="Important: Python-Reportlab Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5622</id><title>Important: Kernel Security And Bug Fix Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609) * kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233) * kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Low memory deadlock with md devices and external (imsm) metadata handling (BZ#1703180) * cifs: memory leak in smb2_query_symlink (BZ#2166706) * bnxt_en: panic in bnxt_tx_int Redux (BZ#2175062) * NFS client loop in BIND_CONN_TO_SESSION (BZ#2219604)
</description><severity>important</severity><issued date="2023-10-11 11:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-perf" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">a575dc41a38b86ba6a5810695c921e7619e1e2f3cc851b7191772556c8445fc6</sum></package><package arch="x86_64" name="kernel-devel" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">2b3eac029ce5cc3ebe613fd987c2cc5755ed4b779f64aff27e1dfdfb8651771c</sum></package><package arch="x86_64" name="bpftool" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">f2ecdcd661c5d2880bc243b18d61eade1612a0fa12d1e2b646f53fc4c481f458</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">955dfd4ad62fbde7414671c80983250683118e07db34d953eb2b2728dacb38ef</sum></package><package arch="noarch" name="kernel-doc" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm</filename><sum type="sha256">5c92588d3271e91f0d85560f158e9b6e7b04446a911c436632f0518e2d136901</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">c8586683d09e71c02c70d426ef7e7968c7685ed3df97d3ae02e6476bac054c26</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">7a4a9eba9ac8bcd99d3892f35744aa1687f3d631a3841e2e8eb62ed0bfd4874e</sum></package><package arch="x86_64" name="perf" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">e13f03ef1dbecc2f0401b1d2d37cf13112668a74de4528e3699c9162e000fce7</sum></package><package arch="x86_64" name="kernel-tools" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">394b4a4157f66ce62e0972a0a55cce0f9d2db44d925e09490d2810081f0b0d5e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm</filename><sum type="sha256">7b4094d89b5e84246ea6c31607f1f362da35b5932c63d97df6dd14b608238b9e</sum></package><package arch="x86_64" name="kernel-debug" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">7ee96c98d694bbd669f5882f922b4b663d951d2fcfe07d7831e4e2e96e9cd8f9</sum></package><package arch="x86_64" name="kernel" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">8456ae2be668b8c01e3404760d5c5c20101fe93cc7e475a9add9e165bcb8744d</sum></package><package arch="x86_64" name="kernel-headers" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">fac89ec17332ba89ae0a8080edf732968ba6e1e16be9254c43f7a771fce7a164</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233" id="CVE-2023-32233" title="Cve-2023-32233" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001" id="CVE-2023-35001" title="Cve-2023-35001" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" id="CVE-2023-3609" title="Cve-2023-3609" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5622" id="RHSA-2023:5622" title="Important: Kernel Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1703180" id="1703180" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2166706" id="2166706" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2175062" id="2175062" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2219604" id="2219604" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5691</id><title>Important: Bind Security Update</title><description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-10-23 17:45:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.15.noarch.rpm</filename><sum type="sha256">1f2d553f8f24279612612680dbafddface901a6d1452b5d34a6ad88af38757f1</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">95f585ef51d565420ddfe4b9dfce1622d3792cbf10af8d2c3f548d9b63d2eb8e</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">58471fb7e9d0ccf639ac4ebeddc9b966a23875505b5bbf4368e9080cf8c0ae39</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">5df9ba6db0f2f8cc95f80fe842f43c409bd92b8c1a2d765ebfe2c0c6d50701ff</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">a168ea75edb8a7b39c15699c8febed2520ea1d99df02fa2d5440beaedaceeaff</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">b32d0d507b984496b55516e0ec02eeae22030905f6ef8b74080722f0adde637b</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">e6650a58dc11021770d67bb32617b4c04540d9df62c721351acc7726ece9d3bb</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">4eed10bb667dfc4971c95d9d93ade897fe93c4e7d221b8393462eee7501e150c</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">a705ea82b76f5ecd7c4632abc398745bad874d9cf14e0a674fe2cb9e1e1d6644</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">ba891837c78bb03773d1b1e143a6769cefab02d2de47807948e69b783a397df4</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">6513a176e8b138a53fceecbe776c3b65ea4f31f8335eb485cb3334f05093fcb6</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">06992c1c6d9fa589d842073956eee1be92738fbd0b353a7e3b67774051cb42d3</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">b10a650abea629a5b6e188287df5a45bc11e4147ea40dd087fe5d7c498183260</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">e1502396e3614ad3a8c7e51b30ad949380482473a8260a9391252c04c20c200e</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">4d7662bc5de69a43871484c65c73012998fb326d2e1cc770fb35ae5fffd5e995</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">35fbd8117dfd541a110aaa5a30912cd15872f4701d9ce9e1e4dad76ad0f6d6bb</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">ff3504db59f1af9765994d69f88c383447c70bf6ba23d3775d061be66e631191</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">1b044d428ce288b1b20083566f75f11524349db9fd060aae6b4ea7df2dc3ff4f</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">6f4720e6664eab7dc8c0b9d43b52c1c577e2bcee1336234ab36079cefb81a7ca</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">076d2419997ecf088330d9c732e699549026def60522c69730109edc94bb4f2e</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">715efff7432a568ce183f654b9f4c69350cd92adaec5bef9ddebb74d29a9de10</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">bfac0bd5c2364efc678b08c266cee4929ec9b582f7c50a80ace8ffb28ac46738</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">51bfe6c18c927b4aa3922c703401d708be836b3bbb7d485f136e374abf132a67</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">9bc7a0fda0b7aad5df7f421582b7fe6f585daf922054aecccb961c1122878d2a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341" id="CVE-2023-3341" title="Cve-2023-3341" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5691" id="RHSA-2023:5691" title="Important: Bind Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5736</id><title>Moderate: Java-11-Openjdk Security And Bug Fix Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 11.0.20 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 11.0.20.1, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true. (RHBZ#2236229) * A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. (RHEL-13217) * The serviceability agent would print an exception when encountering null addresses while producing thread dumps. These null values are now handled appropriately. (JDK-8243210) * The /usr/bin/jfr alternative is now owned by the java-11-openjdk package (RHEL-11320) * The jcmd tool is now
provided by the java-11-openjdk-headless package, rather than java-1.8.0-openjdk-devel, to make it more accessible (RHEL-13227)
</description><severity>moderate</severity><issued date="2023-10-23 17:45:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">852d5ebdda7e6e0a361e70d04a503a6103768771503e8bfd5106681681622faa</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-devel-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">31573a285a0ce978a16cd2c795a604c932b450d1b870ff837c33674d71d21c44</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-devel-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">d5958af0dfdc7c5b371b50cbbc421223629494c767cd923987398b82b7dd5a47</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-jmods-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">83585a3bbadda28e6c98442d96aeb494f16729be4b77d8c9e5d25bbafdf96187</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">65299f6ccbee7059e1542ca7db8d3e8f4885c2e26734d3a3a1ccb76529d2cd64</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-src-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">99a2016d3f40a3ccd73128756b22f143a8b9cfcf585acb5ed46b81468717af8c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-headless-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">2f1424773b3bf97109decbfbce83982ef90361700ca9bcd4e6c483ff7abfdd65</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-headless-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">867892df7b5ab9817c033f87d563690c8decdd9907f0932f66ad4827115b8394</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-devel-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">eef4f88bea160aa6f3c213e3a3f8ffb7505ba8deacbde9871ea272046d1770d9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-jmods-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">2b789ee027e297e9f6070c80624d1710aa44a1186f3d9ea81156ba947af7c62f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">7dd0a1317bb451d71bf25e6898de171800448281ad5865fac3aba2361ab4797e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-src-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">ef60fc8284635089a6a4e90a3daa4f7568066e984c8a935e3b4c7911df3fe7e4</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">73236b4177b331b6182ded512b3964293092c169af420ff89e0d1ea0c0894d5e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-demo-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">83b5369cb37704d4e8c55b13b69c71835e5cc208df9b266211dcff06d9dd8010</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-src-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">3fbd264abeb17ed7058526340788bdd44ed40eee3cd6a3c2d9b66a2dcb3fe4ad</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">ca02127332588becfad797011fbeee87663499d1d05caea52f61697392e69cf8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">c87e82c8da8b407bd91a6b8c354ad494e4866a636fc9d58b6f5b7888279aaa53</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-jmods-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">27fe7c8fa43755c6207dfb71ab365fdba13452d5d08a16b8282eeaaac791eacb</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-devel-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">79d52c2faa70d6c36fe8db4c76d02c669be81949390abb2bbb2eec606adfc1f1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-static-libs-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">cbdd1d4c981960e812db20fc18392044094608c8aa47d1797342dc1fbaf647dc</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-demo-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">17b85cd96008ab269b824ad60eb2387310af37ef49ff057620299647190fd6ca</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f7a2f24c0a950cd6be1535aefb47f15088778c8a20a4323b69874539a109fcf0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-jmods-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">532b08c6ba673d428336e8cad5d42ce0de15065f218a93190949fddf858060ff</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">9b7f0e8d335fd74f8cda722e4cc0e1fc3c7afc98c03dae7b7982cb1fede98301</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">70170123103b1590d4a9330b995f642a10d677ec34ca872adb927d829bdcebbd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">88a4f0f227ded151ac7a1aa4ab1e538f2cc8314eef93b08bc14681e148db3732</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">f5cf09cf91f67fa17b9023ea064e84edb5915a6e5958cfb3450b5a77ac2c9d49</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-src-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">e602c08e8604c159064411ae0655ee92d7b6422abbef5c7a13e27fc2ee92dc8e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">a16956c879fd4befa343beb4eb1af596f2925cdaa0a5b6fb03a364593a9ed314</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-headless-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">0569be2009302b5f1b9d2728285d563a1d031340591b2054384502482a17e1a5</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-demo-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d6469bf88d85c6c3a1e20039bda579eec4957c26e68e223d554cb82bbf0774f7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">451678b8e4f2b5e8f619def5c5b2f079f2e68683c07db695bddccfa0200f0e71</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-headless-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">b9c4db2d2ae4a6d14d207725a0914da14ad214c0ca4081436debbf9441af8011</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-demo-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">6b64894d3055d23192b286d5a29f1dbaa42b94c0639a14aee9e48e6d908067bf</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" id="CVE-2023-22081" title="Cve-2023-22081" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5736" id="RHSA-2023:5736" title="Moderate: Java-11-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2236229" id="2236229" title="2236229 &#8211; Update To 11.0.20.1 Interim Release To Fix Regression In Zip64 Handling [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5761</id><title>Moderate: Java-1.8.0-Openjdk Security Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: IOR deserialization issue in CORBA (8303384) (CVE-2023-22067) * OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. (RHEL-13576) * The /usr/bin/jfr alternative is now owned by the java-1.8.0-openjdk package (RHEL-11319)
</description><severity>moderate</severity><issued date="2023-10-23 17:45:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">6d4e5f1ff90bc3c870c319b24b7cdbd0581bf1884eeee55a3a867103989da885</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">7b531fc824bc53d0abb38ba0e791591b64025ea9089eaa65ff216419a6197b46</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">4b7ee7cb710573dbea4fb24a1c749a2b9434f35bb36626d86a8a59ecc96fdf70</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">8951375cb2e20465100207c6130e226777bfce5762d57b3223467d98f2aedaa7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">0ff901d0c87829836df0499cc8f050a7c78aab35a06ed4bdeb4822feea48ec25</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.392.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">8bde934721aa324b5b9764220e0c1b962de3f0855fe5e23b3a5dbd585bd704e3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">2efe8409b7d03beac4ebd8b78af58260d081ba1ff32fac107cf0ff2d4ead4c67</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">26d16630cfa11ac24776e2b350acda9a0a37b984a14d9fe092f79a94e23e691b</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">634b546eed00b6c45a2840094ba4420ec53b8c3de17c653d20d8a988dc9b84c7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">3c97d5503a057f4f3c9b0f824ba80233b203a547b12643351a388d5cfc8ca5ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">2b7ca53c76ffc6276f180e58660b5ac5001598d6c8065f75813d0623850e353b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">5cd42567e4d7a4f162c012cf15c361cc029ea6600566e5d92133824af9c4cdbc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">c60dba6b1acc4e87d7e438c23c5c580b6eb35568518b8b4e85cd5150ac9aa13b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">79007f62ab4acc856f5c43abe124c3bfaa357cb9a3eddf7a495e20b322a61d54</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">519a0eb6d8b1904eb1654b9d3629bf6602005d4f48cb753c5b3f7f1030d4b0be</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">8bcb60f5f3ae465e3b17b6909719e446f3d8adaba73bfed62cd66c95ec743b91</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.392.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">f4362e1341e135258824db551a80726f36017494058809085f93b2c69db69449</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">4f87d75a902f3896ae48e19f294116d334a09d032d925c4377cebf534b7c3bb0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">d5ed498c8a3b53ec876d437bf2b245542e10de259dd96b786e1d91a0b4229873</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">47777a46061d05d7fc4a847b92468c40a80dcd64e4f8568e50c4cd67eaa60a31</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">ac9c0d53c1758d6d034d7f7239a2880d166ae8826ed99ea84d6ee622894f58e6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">f506e6ef5df5605321d537f68ff40d42d711a6f209d68556661d5e2a3c719eaa</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.392.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">d6086529ae7184f6ec7febbe66827324e584b18ad408731b120628934aab753b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">929ca13dd5b34103354a198b3a1734d85fb4db61b2e3e4f1025a2fc4baefb9c0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">d634bf2b90dd1b8177b18892fdb09d02ba538cf1810c5ec84d01aa5170293661</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">ff953990d41ff63f07054e8d929eb6e417835271f48fa6e9c67eb22bc65928f4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">4083134d733b18d2b411902de71ee6684bdd9f719b2bab0e490ba3810f0e8acb</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">5117393083e60828018763fbccd46a6ec79b4761d11e92c2927edf5a9817a79a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067" id="CVE-2023-22067" title="Cve-2023-22067" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" id="CVE-2023-22081" title="Cve-2023-22081" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5761" id="RHSA-2023:5761" title="Moderate: Java-1.8.0-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6162</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.4.0 ESR.
Security Fix(es):
* Mozilla: Queued up rendering could have allowed websites to clickjack (CVE-2023-5721) * Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 (CVE-2023-5730) * libvpx: crash related to VP9 encoding in libvpx (CVE-2023-44488) * Mozilla: Large WebGL draw could have led to a crash (CVE-2023-5724) * Mozilla: WebExtensions could open arbitrary URLs (CVE-2023-5725) * Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. (CVE-2023-5728) * Mozilla: Address bar spoofing via bidirectional characters (CVE-2023-5732)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-10-30 13:10:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.4.0-1.el7_9.src.rpm" version="115.4.0"><filename>firefox-115.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a2818ee16f2bfb49528f3b587a82a53d82d9f516d64e9f27e4e63949ed6ead0c</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.4.0-1.el7_9.src.rpm" version="115.4.0"><filename>firefox-115.4.0-1.el7_9.i686.rpm</filename><sum type="sha256">c464ce10d380ecde30caa7b063c2748fa296105fd15a56027d421fafe3f01c5d</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44488" id="CVE-2023-44488" title="Cve-2023-44488" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" id="CVE-2023-5721" title="Cve-2023-5721" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" id="CVE-2023-5724" title="Cve-2023-5724" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" id="CVE-2023-5725" title="Cve-2023-5725" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" id="CVE-2023-5728" title="Cve-2023-5728" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" id="CVE-2023-5730" title="Cve-2023-5730" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" id="CVE-2023-5732" title="Cve-2023-5732" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6162" id="RHSA-2023:6162" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6193</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.4.1.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-10-31 10:15:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.4.1-1.el7_9.src.rpm" version="115.4.1"><filename>thunderbird-115.4.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">4f12854f23f8507d9d17cd74099d024209bb120fc19de04179bb106de2b5f4fd</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44488" id="CVE-2023-44488" title="Cve-2023-44488" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" id="CVE-2023-5721" title="Cve-2023-5721" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" id="CVE-2023-5724" title="Cve-2023-5724" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" id="CVE-2023-5725" title="Cve-2023-5725" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" id="CVE-2023-5728" title="Cve-2023-5728" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" id="CVE-2023-5730" title="Cve-2023-5730" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" id="CVE-2023-5732" title="Cve-2023-5732" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6193" id="RHSA-2023:6193" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6802</id><title>Important: Xorg-X11-Server Security Update</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-09 09:26:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xnest" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">8b3af76b71595eafb3bc9e2357ae8f623eb7423afb54d8d73e655cf62dd808ab</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">f9b4df66849c9cc337987ce2622fa0ab9a8c46dda81aefd4d0ea9aa97c307c7e</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">1c89d6eb315ad483c31508533e687d1886a5ac9f57027d6c3c4cb64f2bcedf88</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">dd61c82ae5cdd1ef658d696d111e1924727a8253be6b5905944ae86e34381783</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">85a7f65d174bf3a9d3be9759e63fa4770c1d49af7c2b2e821c07b370e766d381</sum></package><package arch="i686" name="xorg-x11-server-devel" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-24.el7_9.i686.rpm</filename><sum type="sha256">75848218f62955bc8d5de3dea78d57d0c7e8a363d2126c2fa154ee40db68ac9f</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">a7658c5cc062175358e0b62294a8999b0327f5d1f60ff76b58c4684e489fb916</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">b529043f249d8d59b71689536112144a2b460d400e0eabf614db73c2f90c30eb</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">08309adbef8892114d0d25caccb90286fb43ff27a8c8c93d53e71ac76c6b5a93</sum></package><package arch="noarch" name="xorg-x11-server-source" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-24.el7_9.noarch.rpm</filename><sum type="sha256">1846a73cc6684722f4bfcf6da7d2b6658bf132ac87414e2432e8d25b86ca5505</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367" id="CVE-2023-5367" title="Cve-2023-5367" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6802" id="RHSA-2023:6802" title="Important: Xorg-X11-Server Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6805</id><title>Critical: Squid Security Update</title><description>Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>critical</severity><issued date="2023-11-09 09:26:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.9" src="squid-3.5.20-17.el7_9.9.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.9.x86_64.rpm</filename><sum type="sha256">215cd76ccdf876aba2684bea20ee92b1b8e95e92e092dbb9eb2e24cd2d61cb9d</sum></package><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.9" src="squid-3.5.20-17.el7_9.9.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.9.x86_64.rpm</filename><sum type="sha256">d9400d537dffeb41d81419bb5a6de65cceac4c2cfcafcbcc36519e0880e4a60f</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.9" src="squid-3.5.20-17.el7_9.9.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.9.x86_64.rpm</filename><sum type="sha256">693170496ba38a2921ad1cb175cf751dc80ec6fb94e7f444747e6e6aa866cf66</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46847" id="CVE-2023-46847" title="Cve-2023-46847" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6805" id="RHSA-2023:6805" title="Critical: Squid Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6823</id><title>Important: Python3 Security Update</title><description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: TLS handshake bypass (CVE-2023-40217)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-09 09:10:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="python3" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">fdcc1331f8c544a07788a0de89bf6181901458deac5b6eb506282f8637672f5c</sum></package><package arch="x86_64" name="python3-test" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">003c6c9c7020b4c7692c2c1c69cca45f48cf8a3c25e191b468b87bee36d73ca7</sum></package><package arch="x86_64" name="python3-devel" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">44c4e07a148f340dd3fc28d49493897663eb3f715ca54d8bcfaf17b4098106d9</sum></package><package arch="x86_64" name="python3" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">399a05764db67bc42803f45bb1b1b9133ebec0ea4140a6592d811e787f5eafc8</sum></package><package arch="i686" name="python3-tkinter" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">7911bfb953c2e1231eee3b516010f4dbefb5bff7d05dde735b844d64744b0f1b</sum></package><package arch="x86_64" name="python3-libs" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">07b358ba123d2092e863ad59356750f8a6b69242c2941651e6e05f65070ecf1b</sum></package><package arch="i686" name="python3-devel" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">0a91791ffb00ea9c47b1ff8e4611adf9887a58dc50276b6f60770f0cc764fad5</sum></package><package arch="i686" name="python3-idle" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">d7db2cdbb53476bcd10b225cf13884b9c299ef8fb5193a3abbf719e9fcd1e5c5</sum></package><package arch="x86_64" name="python3-debug" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">d9e4f392ed5495d446a99746a8dcb296d542ab66f9b30892168b1ff0a841c1e0</sum></package><package arch="x86_64" name="python3-tkinter" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">cb7dc766ba29afe689685ec4027d4218f2f3741409027162e8b129617942fd08</sum></package><package arch="i686" name="python3-libs" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">4c538f38c63d09975be3e3665a9eb615a5ba026664e6904beebcb6cdad32439f</sum></package><package arch="x86_64" name="python3-idle" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">f20da14ddb766b44e71d481c3d622a541f9d744d2e2f4886e78f3e6fea63706d</sum></package><package arch="i686" name="python3-debug" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">7d01ff505a3b881128ff44ad0e889ac1be03d859366fb033096dfa17438fc063</sum></package><package arch="i686" name="python3-test" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">f751495dad7bae107ae8919706d9e764fdb53654e81a5f33aca49726c6ef2d54</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217" id="CVE-2023-40217" title="Cve-2023-40217" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6823" id="RHSA-2023:6823" title="Important: Python3 Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6885</id><title>Python</title><description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. 
Security Fix(es): 
* python: TLS handshake bypass (CVE-2023-40217) 
--- This content is derived from https://access.redhat.com/errata/SLSA-2023:6885</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-11-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tkinter" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">b5b12bc491c983056da3d1bdf7a91feaa35bfa4efd8a905df65b2b9d575cb3e8</sum></package><package arch="x86_64" name="python-devel" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">7c8420d15e676e7537aa0c3a8583b385f774ca4f3d4b672d9375ad456373beb3</sum></package><package arch="x86_64" name="python-debug" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">6237b6e4118e2a52df74dab852be4a7bdb1939ad74bb4dcd67047203cd1fbdff</sum></package><package arch="x86_64" name="python-test" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-test-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">52990a46e591ce98221560cfe2f7a892b9569c43b81c27e4d5b3ac8cb9711ae8</sum></package><package arch="x86_64" name="python-libs" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">4cc413074240bc16ce253acf8d95c1b13cb2488bb26346231fc3608c3518c367</sum></package><package arch="x86_64" name="python" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">3dc36426859b8749f3533a2417d688a30c7046388dc97788081ee1d3a862fa50</sum></package><package arch="x86_64" name="python-tools" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">92eb690460d473bc548c0e792d41f57cf478f33857589c4f9d3d53abfa40fd30</sum></package><package arch="i686" name="python-libs" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-94.el7_9.i686.rpm</filename><sum type="sha256">1036daab80d95a984294968dd161f04ef98733546f39e22485bdfaa75a905b48</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217" id="CVE-2023-40217" title="Cve-2023-40217" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6885" id="RHSA-2023:6885" title="Important: Python Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6886</id><title>Important: Plexus-Archiver Security Update</title><description>The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.
Security Fix(es):
* plexus-archiver: Arbitrary File Creation in AbstractUnArchiver (CVE-2023-37460)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-13 11:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="plexus-archiver" release="6.el7_9" src="plexus-archiver-2.4.2-6.el7_9.src.rpm" version="2.4.2"><filename>plexus-archiver-2.4.2-6.el7_9.noarch.rpm</filename><sum type="sha256">d4c40b7fcd518ff9c13322420bd4e38055be3009a0bc846abb5e604a27abddce</sum></package><package arch="noarch" name="plexus-archiver-javadoc" release="6.el7_9" src="plexus-archiver-2.4.2-6.el7_9.src.rpm" version="2.4.2"><filename>plexus-archiver-javadoc-2.4.2-6.el7_9.noarch.rpm</filename><sum type="sha256">427b6286b12481cfd22c1f1d8857aee030e72469a4d5e1343b77fd0bf028e2c4</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37460" id="CVE-2023-37460" title="Cve-2023-37460" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6886" id="RHSA-2023:6886" title="Important: Plexus-Archiver Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7279</id><title>Important: Open-Vm-Tools Security Update</title><description>The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.
Security Fix(es):
* open-vm-tools: SAML token signature bypass (CVE-2023-34058) * open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper (CVE-2023-34059)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-17 09:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="open-vm-tools-test" release="3.el7_9.9" src="open-vm-tools-11.0.5-3.el7_9.9.src.rpm" version="11.0.5"><filename>open-vm-tools-test-11.0.5-3.el7_9.9.x86_64.rpm</filename><sum type="sha256">d3c481bf0ca3f463f9c194381f37b1aa29795ae5b2a16d6bf93066b1dcc3e299</sum></package><package arch="x86_64" name="open-vm-tools-desktop" release="3.el7_9.9" src="open-vm-tools-11.0.5-3.el7_9.9.src.rpm" version="11.0.5"><filename>open-vm-tools-desktop-11.0.5-3.el7_9.9.x86_64.rpm</filename><sum type="sha256">a8808cfcef5c51215d5a6859ac8970fece174ce74b28d00b3fdb3b9b4c5fddb7</sum></package><package arch="x86_64" name="open-vm-tools" release="3.el7_9.9" src="open-vm-tools-11.0.5-3.el7_9.9.src.rpm" version="11.0.5"><filename>open-vm-tools-11.0.5-3.el7_9.9.x86_64.rpm</filename><sum type="sha256">d178a2ea870f10652fcbe438a7d80518b3e263596e90e6e3ac78ce786c60162e</sum></package><package arch="x86_64" name="open-vm-tools-devel" release="3.el7_9.9" src="open-vm-tools-11.0.5-3.el7_9.9.src.rpm" version="11.0.5"><filename>open-vm-tools-devel-11.0.5-3.el7_9.9.x86_64.rpm</filename><sum type="sha256">b894408477d4d6e9d7bbf1ac573dd8ce2b91745916e216fa276749d9bb15c816</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34058" id="CVE-2023-34058" title="Cve-2023-34058" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34059" id="CVE-2023-34059" title="Cve-2023-34059" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7279" id="RHSA-2023:7279" title="Important: Open-Vm-Tools Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7423</id><title>Important: Kernel Security Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead (CVE-2023-3611) * kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) * kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208) * hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">2626b9dfed1509c5d518ab7f6c6aafdc2ac1003e85a7a341680dbf082eb675de</sum></package><package arch="noarch" name="linux-firmware" release="81.git78c0348.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="20200421"><filename>linux-firmware-20200421-81.git78c0348.el7_9.noarch.rpm</filename><sum type="sha256">df92d3c5083d8aa8892d0c60397f4e5ed92f19b8e1cb20967370262dc6513906</sum></package><package arch="x86_64" name="kernel-debug" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">529ccc3acba2d1f77afe89b0e91415cf2df73c41a2fc65cf81cd93e6412f4dd2</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">e0d906e1caf586eeb54910cd1ab6941fc9188f6f87644ca7e944614102be189d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">ef9efb4624b6383bf095ea126f9c83db7e2d75c24641d224f821f315e1ce52b9</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">6c01fddfc2f36476e1615b0037ab28f12c8b23d55570d44fd276f09ba30c9806</sum></package><package arch="x86_64" name="python-perf" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">59b5a6771869a09d85d43c7899cdd647e6d6f1a44d252c140747089c1d7c9e6f</sum></package><package arch="x86_64" name="kernel-headers" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">5ade4d77f73184c7baf9df4f1a6bf22a1a19813ebcff5c24561c9631c104611f</sum></package><package arch="x86_64" name="kernel" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">17f6ff299f9ee45086367edcb5312448b91b08287558b87397e3adda04189482</sum></package><package arch="x86_64" name="kernel-devel" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">6dbe2b4a6bbc85bc3526043ccc99b836dc91f22c4f70b35ce9177f908a219f0f</sum></package><package arch="x86_64" name="perf" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">44f8e68a25de3ca31ab898319a0768308bf36a22ebe83aa04855d0f77f572249</sum></package><package arch="noarch" name="kernel-doc" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.105.1.el7.noarch.rpm</filename><sum type="sha256">d9a95a80164f06a428809429fc003aa85748cdcd17e4d2df6d5e56ebe7104470</sum></package><package arch="x86_64" name="bpftool" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">194c7f40dbdce9e5ad2d9e9ac561404c7e38531b1de65216289fefaf22857bf0</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.105.1.el7.noarch.rpm</filename><sum type="sha256">91b1b60b76eed2a552f5780def812b0b560ac6053d08ce4de2f200898c4506f6</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982" id="CVE-2022-40982" title="Cve-2022-40982" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436" id="CVE-2023-31436" title="Cve-2023-31436" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" id="CVE-2023-3611" title="Cve-2023-3611" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" id="CVE-2023-3776" title="Cve-2023-3776" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4128" id="CVE-2023-4128" title="Cve-2023-4128" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206" id="CVE-2023-4206" title="Cve-2023-4206" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207" id="CVE-2023-4207" title="Cve-2023-4207" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208" id="CVE-2023-4208" title="Cve-2023-4208" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7423" id="RHSA-2023:7423" title="Important: Kernel Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7428</id><title>Important: Tigervnc Security Update</title><description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367) * xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tigervnc" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-26.el7_9.x86_64.rpm</filename><sum type="sha256">998439e463a45278039ae8c8d47baeaf104aadf5ae3e203f1e6e63dd74787c64</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-26.el7_9.x86_64.rpm</filename><sum type="sha256">7b1cdc67c45fb5b81f7323467f567268cea46b944ecc148c8fd33ba14cd59cea</sum></package><package arch="x86_64" name="tigervnc-server" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-26.el7_9.x86_64.rpm</filename><sum type="sha256">1d138a871600959bbe9892e61b525cfa71389c2e40afb487bffe47c94cba0450</sum></package><package arch="noarch" name="tigervnc-icons" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-26.el7_9.noarch.rpm</filename><sum type="sha256">ef6956ab3eaa71c40204278fba657f27c0e11df730a3f7847c3c640946ce5e72</sum></package><package arch="noarch" name="tigervnc-server-applet" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-26.el7_9.noarch.rpm</filename><sum type="sha256">996d53bf0fdc75fd9c57dc7de4e7147fc276b8554bad6d70847605d3abcd1565</sum></package><package arch="noarch" name="tigervnc-license" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-26.el7_9.noarch.rpm</filename><sum type="sha256">2aa6154d19d1ed9182e8c3b9d302b06424744ff0679ec404402d90d42ec0dc59</sum></package><package arch="x86_64" name="tigervnc-server-module" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-26.el7_9.x86_64.rpm</filename><sum type="sha256">382433626ff6aebd55f5916957ee588933b97e128b2426a81a0bc9879d476b12</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367" id="CVE-2023-5367" title="Cve-2023-5367" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380" id="CVE-2023-5380" title="Cve-2023-5380" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7428" id="RHSA-2023:7428" title="Important: Tigervnc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7505</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.5.0.
Security Fix(es):
* Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204) * Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205) * Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206) * Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207) * Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212) * Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) * Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.5.0-1.el7_9.src.rpm" version="115.5.0"><filename>thunderbird-115.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">5db75bde8daaf46ff7868d3752016f4d526c9070257c816e496b8b854328f66f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" id="CVE-2023-6204" title="Cve-2023-6204" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" id="CVE-2023-6205" title="Cve-2023-6205" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" id="CVE-2023-6206" title="Cve-2023-6206" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" id="CVE-2023-6207" title="Cve-2023-6207" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" id="CVE-2023-6208" title="Cve-2023-6208" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" id="CVE-2023-6209" title="Cve-2023-6209" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" id="CVE-2023-6212" title="Cve-2023-6212" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7505" id="RHSA-2023:7505" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7509</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.5.0 ESR.
Security Fix(es):
* Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204) * Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205) * Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206) * Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207) * Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212) * Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) * Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.5.0-1.el7_9.src.rpm" version="115.5.0"><filename>firefox-115.5.0-1.el7_9.i686.rpm</filename><sum type="sha256">58b1191d09f569ca50c90861a01fcc770c6b2e028dc183df026135250539e2d1</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.5.0-1.el7_9.src.rpm" version="115.5.0"><filename>firefox-115.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ba1012b0871603647ec5923b92aab013438b1e5103c8071e806fda840e612157</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" id="CVE-2023-6204" title="Cve-2023-6204" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" id="CVE-2023-6205" title="Cve-2023-6205" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" id="CVE-2023-6206" title="Cve-2023-6206" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" id="CVE-2023-6207" title="Cve-2023-6207" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" id="CVE-2023-6208" title="Cve-2023-6208" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" id="CVE-2023-6209" title="Cve-2023-6209" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" id="CVE-2023-6212" title="Cve-2023-6212" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7509" id="RHSA-2023:7509" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7513</id><title>Moderate: Linux-Firmware Security Update</title><description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* hw amd: Return Address Predictor vulnerability leading to information disclosure (CVE-2023-20569) * hw: amd: Cross-Process Information Leak (CVE-2023-20593)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl2030-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">c80b56035c2231f62f39e828347adff98e06df09a972f4abe7ea09ec48259624</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-81.el7_9.noarch.rpm</filename><sum type="sha256">0f34e9c6569a174840bda606a5788431fc09bd24adf91d82b80c4d1f2eb54dd7</sum></package><package arch="noarch" name="iwl135-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">e5e3bab7f8f5589ee6a17eb313d12254953c3c21f63a08826d85ec2020d55284</sum></package><package arch="noarch" name="iwl5000-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-81.el7_9.noarch.rpm</filename><sum type="sha256">fc1ce06c78cdd48debb695745efea63eaad5284f2699eefc719d12c167fb2fd9</sum></package><package arch="noarch" name="iwl7260-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl7260-firmware-25.30.13.0-81.el7_9.noarch.rpm</filename><sum type="sha256">a23ab5114a38337497f7bf572b518395bb7f162859fbdef592c104cacb74004a</sum></package><package arch="noarch" name="iwl4965-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-81.el7_9.noarch.rpm</filename><sum type="sha256">d03d86d600173989e9041041e9a468b2290325fbaf25ffd822609e233931fc8a</sum></package><package arch="noarch" name="iwl6000-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-81.el7_9.noarch.rpm</filename><sum type="sha256">162f3331cb3d5e64a061141c3a9e2f322f6fbb1e12d0b1a9fd931a5a9fee4e16</sum></package><package arch="noarch" name="iwl2000-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">ae840c8717376e1d523b22f2386ec667ca1b635aba1fb6e20ae732da6869d05a</sum></package><package arch="noarch" name="iwl3160-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl3160-firmware-25.30.13.0-81.el7_9.noarch.rpm</filename><sum type="sha256">41525ac7e6724bd4c9ea6831ded4b7866e8af5eaa7d0159d2517aa687d477209</sum></package><package arch="noarch" name="iwl100-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-81.el7_9.noarch.rpm</filename><sum type="sha256">8a7bf5a100adddff48301066d9cf50ba07dc49e8fe3e878c051ea4f2615fb170</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2a-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">723dba92e8f1c1c00498793b267d9c14e7e556ec0e01c597782dd1c8db999ddb</sum></package><package arch="noarch" name="iwl6050-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-81.el7_9.noarch.rpm</filename><sum type="sha256">b4f6feadde05b546328da0e0f2eb3559b34308e6170986220ff367fd99a12f54</sum></package><package arch="noarch" name="iwl105-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">b879c2d7580862a690a51ae3a181e5d5776ac19aa212b674d0f807623a296ee5</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2b-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">600345a505c735c250632a3d57da21b4e200e7a2f44e42edb6d58ab796366391</sum></package><package arch="noarch" name="iwl3945-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-81.el7_9.noarch.rpm</filename><sum type="sha256">face3fe8de08de6afc25fb51bd5b178813993c0a452d2767363b9ac2ae652f71</sum></package><package arch="noarch" name="iwl5150-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-81.el7_9.noarch.rpm</filename><sum type="sha256">1e9c0a37d2b6a5b32105e6b1de05ed59d775eb38340533b2b6c71774c38d6460</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569" id="CVE-2023-20569" title="Cve-2023-20569" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" id="CVE-2023-20593" title="Cve-2023-20593" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7513" id="RHSA-2023:7513" title="Moderate: Linux-Firmware Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7743</id><title>Low: Curl Security Update</title><description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: Use-after-free triggered by an HTTP proxy deny response (CVE-2022-43552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>low</severity><issued date="2023-12-13 08:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libcurl-devel" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.2.i686.rpm</filename><sum type="sha256">498441bce0334939d92470989ef0bf8e02a2083d5797b49d89fc415356ca0cfe</sum></package><package arch="i686" name="libcurl" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.2.i686.rpm</filename><sum type="sha256">c7e5a1ff315c48a648de2d245401e7fec04c6eb5a9b8eb59a726d1e8c90de1cf</sum></package><package arch="x86_64" name="libcurl-devel" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.2.x86_64.rpm</filename><sum type="sha256">b3aa7055b00066c3754a1704e4ef12dae91b8b2e25ab5e8e9d27459db17d0036</sum></package><package arch="x86_64" name="curl" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>curl-7.29.0-59.el7_9.2.x86_64.rpm</filename><sum type="sha256">b1d71a1adf87744cfbd15084b3f7a06e72d51c58118ed7b6224ae5b4505723aa</sum></package><package arch="x86_64" name="libcurl" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.2.x86_64.rpm</filename><sum type="sha256">c52b5493c22bcb5e3b7995c1aebf4ba1b005ac1d65a61f4074146b2b03779792</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552" id="CVE-2022-43552" title="Cve-2022-43552" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7743" id="RHSA-2023:7743" title="Low: Curl Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7783</id><title>Important: Postgresql Security Update</title><description>PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array modification (CVE-2023-5869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-12-13 12:19:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-contrib" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-contrib-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">741a1dae7293037727b600dba20c327722f4b1df3b95c135b03aefcbebd87a3c</sum></package><package arch="i686" name="postgresql-libs" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-9.el7_9.i686.rpm</filename><sum type="sha256">5c4ad860099c03846bee5ca107b5d0f6a2a6e91a82ab2b09bc9f1dee0e44117e</sum></package><package arch="x86_64" name="postgresql-server" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-server-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">10d7427c5a7f618ab4a37ec4235346c5b67e05a6c31907c37a10f657aa028a9c</sum></package><package arch="x86_64" name="postgresql-test" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-test-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">9845a8aaad4bceea3ee21d571fc84ecd3aa61f1308260c42cf0954c4c519a0bd</sum></package><package arch="x86_64" name="postgresql-libs" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">5588f9ad921a40763be94440941d88fceb1d546fc6f7137bfe104067579780dd</sum></package><package arch="x86_64" name="postgresql-docs" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-docs-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">9086c9558b5b164b54dbf963a0237d3bab03a30db662d100adcfb72bd267f211</sum></package><package arch="i686" name="postgresql" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-9.el7_9.i686.rpm</filename><sum type="sha256">a48fad0888f1b99f77b9983c25cf914cedc9362001926489cb57f56b1973b3ba</sum></package><package arch="x86_64" name="postgresql-upgrade" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-upgrade-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">5abaf994b9145b83697a417448faeb7c2c20ddbbaceedc8812cb00ad1700c22f</sum></package><package arch="i686" name="postgresql-devel" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-9.el7_9.i686.rpm</filename><sum type="sha256">6ec387d40f42de7229a454500fd0f493f4956913fa46145a94a2f14ab56fd910</sum></package><package arch="i686" name="postgresql-static" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-9.el7_9.i686.rpm</filename><sum type="sha256">cbb2f795ef8f7fb625aa63da0a311b8e3bd52639d904af9f34460aba44b87460</sum></package><package arch="x86_64" name="postgresql-devel" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">c3fa01e3b69d1d1b5f321eac8f16188fe5eb3ae4964a6a283b9bdff9c1a326db</sum></package><package arch="x86_64" name="postgresql-plpython" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plpython-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">44d0882ae7e3b0682c6b3abd5a980a150f2938d1aa1dae66e1119e429cd09124</sum></package><package arch="x86_64" name="postgresql-static" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">295fc83d94836a9f03421dd47666204ed6588016a9b4bf408d1a48654d1ac0dd</sum></package><package arch="x86_64" name="postgresql-plperl" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plperl-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">4b5f50ad4677c2daccaea86737614f874b91ceaf618230c20994385917400679</sum></package><package arch="x86_64" name="postgresql" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">c902d80d63e50b7a4a56cf08053e31dd8de500fbc8e082238408279fb29b99fc</sum></package><package arch="x86_64" name="postgresql-pltcl" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-pltcl-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">be26b19fd4a14836d1b1c60182ef90ae89674923226c04056ef27806cfb3a7a7</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" id="CVE-2023-5869" title="Cve-2023-5869" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7783" id="RHSA-2023:7783" title="Important: Postgresql Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0006</id><title>Important: Tigervnc Security Update</title><description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377) * xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tigervnc" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-28.el7_9.x86_64.rpm</filename><sum type="sha256">d878ad53279d73a821eef6745e41475a13bf6423283929db83f80053934f9d91</sum></package><package arch="x86_64" name="tigervnc-server" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-28.el7_9.x86_64.rpm</filename><sum type="sha256">4bf2bbb9e4b440fd8038341ae34a1568265ca33bf972538d5ae62c87fcf8bb57</sum></package><package arch="noarch" name="tigervnc-server-applet" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-28.el7_9.noarch.rpm</filename><sum type="sha256">67ceb09f8df51f16ab3fd644f1786a7b852bcb3aa254778657d553de5ba6da21</sum></package><package arch="noarch" name="tigervnc-icons" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-28.el7_9.noarch.rpm</filename><sum type="sha256">a3c23f2b1a100a6c51e6b64162508b88c19f746dd453419871ef026be260547d</sum></package><package arch="x86_64" name="tigervnc-server-module" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-28.el7_9.x86_64.rpm</filename><sum type="sha256">a3860b641fa0d7eab0e113b080bd00faaf4be3d0aa40bdac4931ada911042945</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-28.el7_9.x86_64.rpm</filename><sum type="sha256">f6d8b483b8f323a5d4421ef6ba62d6e49197813c5f80678794eff811746353bf</sum></package><package arch="noarch" name="tigervnc-license" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-28.el7_9.noarch.rpm</filename><sum type="sha256">725cfd357b9e8cc80ab130a699df3de04f5e9f4d928e0b1894aeef8eda1b49ac</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377" id="CVE-2023-6377" title="Cve-2023-6377" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478" id="CVE-2023-6478" title="Cve-2023-6478" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0006" id="RHSA-2024:0006" title="Important: Tigervnc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0009</id><title>Important: Xorg-X11-Server Security Update</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377) * xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:31:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xephyr" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">cee49abea6f49e118f90cc707b18ae33b6dc79604abbca789e699da46987d0dd</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">840305e25a4a9e6849ed74c7c0abe5ff8f18eec807b11356bba40ba959498f2b</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">6d7a7c45531423fa11b19377c136e5b5762df48fa0f7c0fcb47e9ddb26c63a36</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">042254433f043342a8daffc045a0f1baf62ef247337be8a01ecbc28fe0fae13d</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">32e6a01863c31a84c3203c98f3d8c5b75c4b42c18369d2e2002e17ea646d9476</sum></package><package arch="noarch" name="xorg-x11-server-source" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-25.el7_9.noarch.rpm</filename><sum type="sha256">9f08f449f6688a64c204989c7e636b14856398128f86df97b31a841c4c4f01d5</sum></package><package arch="i686" name="xorg-x11-server-devel" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-25.el7_9.i686.rpm</filename><sum type="sha256">89731ae94097e917ae4b164b58a0a9bb7bc739e427f6e5fdfe4347fdcc913ed9</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">57b02626f21e3385750bbd68a73ca20b32fa8b5cd788d343fecd6e7b556c38e2</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">3c3e3412caaef346ee605ffd15be54c3cf9de01db7e37f13c9cd36d9869ad100</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">e2f0a21015a38018eab2cf043f99c0c0dfcac6555a729c866ae1ae4167bef845</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377" id="CVE-2023-6377" title="Cve-2023-6377" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478" id="CVE-2023-6478" title="Cve-2023-6478" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0009" id="RHSA-2024:0009" title="Important: Xorg-X11-Server Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0013</id><title>Important: Gstreamer1-Plugins-Bad-Free Security Update</title><description>GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gstreamer1-plugins-bad-free-devel" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9.x86_64.rpm</filename><sum type="sha256">1c7679ecfb7c3e30c43580ee577edd1f7a4bebced66fa7cc49cf45894f055a02</sum></package><package arch="x86_64" name="gstreamer1-plugins-bad-free" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-1.10.4-4.el7_9.x86_64.rpm</filename><sum type="sha256">98e891ff0ba2d212f81e6fcffe2f6ac670c72919a71da83c6a71dea4663473dd</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free-devel" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9.i686.rpm</filename><sum type="sha256">0422289588e8fbc4fcea0da7706e2b1d7b67f4b1e0ae8f5ac894434016837713</sum></package><package arch="x86_64" name="gstreamer1-plugins-bad-free-gtk" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9.x86_64.rpm</filename><sum type="sha256">b2d48cf4954af8b2f90c0022a13d3e4d6fd0c9244562d721e1131bfe226e9b99</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-1.10.4-4.el7_9.i686.rpm</filename><sum type="sha256">c23b206afed8176086ea06f99b1fd0ce60b41b7fc61fbbc04f903eb0a29df041</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free-gtk" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9.i686.rpm</filename><sum type="sha256">b61e9981b5e312b3704c1e020036b8de4a1707248a2e1ac1587687067a7c2da9</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44446" id="CVE-2023-44446" title="Cve-2023-44446" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0013" id="RHSA-2024:0013" title="Important: Gstreamer1-Plugins-Bad-Free Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0026</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.6.0 ESR.
Security Fix(es):
* Mozilla: Heap-buffer-overflow affecting WebGL &amp;lt;code&amp;gt;DrawElementsInstanced&amp;lt;/code&amp;gt; method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: Potential exposure of uninitialized data in &amp;lt;code&amp;gt;EncryptingOutputStream&amp;lt;/code&amp;gt; (CVE-2023-6865) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in &amp;lt;code&amp;gt;nsTextFragment&amp;lt;/code&amp;gt; (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to &amp;lt;code&amp;gt;VideoBridge&amp;lt;/code&amp;gt; lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected &amp;lt;code&amp;gt;nsWindow::PickerOpen(void)&amp;lt;/code&amp;gt; in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in &amp;lt;code&amp;gt;nsDNSService&amp;lt;/code&amp;gt; (CVE-2023-6862) * Mozilla: Clickjacking permission prompts using the popup transition (CVE-2023-6867) * Mozilla: Undefined behavior in
&amp;lt;code&amp;gt;ShutdownObserver()&amp;lt;/code&amp;gt; (CVE-2023-6863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:31:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.6.0-1.el7_9.src.rpm" version="115.6.0"><filename>firefox-115.6.0-1.el7_9.i686.rpm</filename><sum type="sha256">69c640581c71c0fcbcc844e1c7ab75ce5967a37ef63077b83e49b20fe2262066</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.6.0-1.el7_9.src.rpm" version="115.6.0"><filename>firefox-115.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">4537288ea302f365b22fa97445e724ca45ecdd860cffc10bd515a0bb469ff0d4</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" id="CVE-2023-6856" title="Cve-2023-6856" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" id="CVE-2023-6857" title="Cve-2023-6857" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" id="CVE-2023-6858" title="Cve-2023-6858" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" id="CVE-2023-6859" title="Cve-2023-6859" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" id="CVE-2023-6860" title="Cve-2023-6860" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" id="CVE-2023-6861" title="Cve-2023-6861" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" id="CVE-2023-6862" title="Cve-2023-6862" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" id="CVE-2023-6863" title="Cve-2023-6863" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" id="CVE-2023-6864" title="Cve-2023-6864" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" id="CVE-2023-6865" title="Cve-2023-6865" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" id="CVE-2023-6867" title="Cve-2023-6867" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0026" id="RHSA-2024:0026" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0027</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.6.0.
Security Fix(es):
* Mozilla: Heap-buffer-overflow affecting WebGL &amp;lt;code&amp;gt;DrawElementsInstanced&amp;lt;/code&amp;gt; method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761) * Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in &amp;lt;code&amp;gt;nsTextFragment&amp;lt;/code&amp;gt; (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to &amp;lt;code&amp;gt;VideoBridge&amp;lt;/code&amp;gt; lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected &amp;lt;code&amp;gt;nsWindow::PickerOpen(void)&amp;lt;/code&amp;gt; in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in &amp;lt;code&amp;gt;nsDNSService&amp;lt;/code&amp;gt; (CVE-2023-6862) * Mozilla: Undefined behavior in &amp;lt;code&amp;gt;ShutdownObserver()&amp;lt;/code&amp;gt;
(CVE-2023-6863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:31:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.6.0-1.el7_9.src.rpm" version="115.6.0"><filename>thunderbird-115.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">85c44c0c883e100578a0a631f899fed79f62dbec9ab43577a196f35601ce6491</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" id="CVE-2023-50761" title="Cve-2023-50761" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" id="CVE-2023-50762" title="Cve-2023-50762" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" id="CVE-2023-6856" title="Cve-2023-6856" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" id="CVE-2023-6857" title="Cve-2023-6857" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" id="CVE-2023-6858" title="Cve-2023-6858" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" id="CVE-2023-6859" title="Cve-2023-6859" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" id="CVE-2023-6860" title="Cve-2023-6860" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" id="CVE-2023-6861" title="Cve-2023-6861" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" id="CVE-2023-6862" title="Cve-2023-6862" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" id="CVE-2023-6863" title="Cve-2023-6863" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" id="CVE-2023-6864" title="Cve-2023-6864" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0027" id="RHSA-2024:0027" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0145</id><title>Moderate: Ipa Security Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* ipa: Invalid CSRF protection (CVE-2023-5455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-01-12 08:01:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">d7449b964ca0d93bd691b3924ebd4597c3b8facd93bf8a73d9cf9054d24e9a8f</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">56e0cc913272d59c7bac25811815868a011c1fc23ace80a1dfb2e3b33e7e270a</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">96243f825077947b9477fcc8b7a86ab5c4e9b866cfa4d1dbf347a5f72c5f3eb9</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.16.x86_64.rpm</filename><sum type="sha256">f03862146dd4db15a83b169823cf14d89da885a51ac03510e7a08c5d5b30ac50</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">afcf62d93d9c6a91c28564972d424fe96ecaeeb9ed15257c86cfaa7012870c73</sum></package><package arch="noarch" name="ipa-client-common" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">f2091a24905e839d934bdaf36f89f52383937115fb0d809400ea63c071a3c41d</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">8fea5b8c00ef9078db6c29ef767d003d4a5da6740b0db0d89644e69bb3af8321</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">e2e99bf84ccba419a2df4125eba8aed8e354faa2708417d7700e9d12a8d55e95</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.16.x86_64.rpm</filename><sum type="sha256">da0d5ed9a7a6dfe1a4e0b203e502ae5b9e8e775b3d6cd40ea148201e26240d71</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">9bd9a40c83b465f0f89ca7f784244c957a9c600914737dad342867a9296e32b8</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.16.x86_64.rpm</filename><sum type="sha256">d7f66d4c07be14d31442e011c376c15eeafb0c8133224eeb4d6836e36fcc446f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5455" id="CVE-2023-5455" title="Cve-2023-5455" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0145" id="RHSA-2024:0145" title="Moderate: Ipa Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0223</id><title>Important: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918) * OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952) * OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919) * OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921) * OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926) * OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In the previous release in October 2023 (8u392), the RPMs were changed to use Provides for java, jre, java-headless, jre-headless, java-devel and java-sdk which included the full RPM version. This prevented the Provides being used to resolve a dependency on Java 1.8.0 (for example, "Requires: java-headless 1:1.8.0"). This change has now been reverted to the old "1:1.8.0" value. (RHEL-19630)
</description><severity>important</severity><issued date="2024-01-19 16:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-src-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">dde02384d8965b1b5d6ac02d5562395e8fe7d3f32b169d0b51cc0f2dfb631fbb</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.402.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">7361b0a79cea7ab301e84e9020b9b80196032be58382076647de5d2b948e49f3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">e853059da15e811a901a2457d3f4e76c1b27a5373c129ad9f86bf0eddf06fc49</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">c519dc68deaa751bc3dcbbc630673277ddb8f59797ed806b82fd67e85f786fef</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">620c3d2bb18afd18943ed7b931a59c98ce4e51172dc10098177bb7103f182343</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">52a2a65f175019a84d92d4e7bd10f7d4a2a1620549121bd84bd693877805471e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">e43196032476954d2186cde0d31f0d67a9370dee47e19b264e92180af5a684d6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">c339e64ff249c0a41c74e0d45b4b815bab631775f0e020b764e158578ae46c1b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-src-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">085e1ecffc8fa3229546ab90c2832c853b65822ac6f0fe89e7ebfb780eaf654d</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">9aa443b30c29acafad890abd5905f52b22ba1b164609c1acedfc98b9ce4d5352</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">00ebf212d95b5f39a4d75a7a276972e1d57a8f069205ad78137c2b4234c9fe9c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">74553d6272ba331071b0a8aa47bd77d1b45c025546a41fbe983d2afa1b8706d9</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">889e875141b1f5df42a57d5c71f58a8548998bfb66863a2a03b5d1c5a8ad52d0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">8b162f48db9c44de048a8cfadcf5c0d85378b8ee263bb29bfbc3ab366ca1dae3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">dac003986595c8b61e70b30a52b004ca526cb97e301b427cbed01379cdedb2bd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">68d1d750ab3b071cdbbb360cc5ddc03e0ebadbabcc1f2638539fc1d5956a4313</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">8fb9d89cb92135c8fc87718624113eddd9147d572168cc7d2caab086bd6693f4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">fa1ee407187fa3705573e8fb1c7d2667ff9e0cd286f3c00bb74fcad74cc54d5b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">2eb2056b396149fceec9129c4f5d2384b123f0b519d48435af4f64f3119bcf26</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">eca089b02540431718b5f4ef73a50cece50caac23128e11c39153f3ee3f7ebb1</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">fc441b4c2acf427b4df871fde7a41cdcc91ada1fa9366ea47279e04f1b9bbcf2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">8d37d5dadbd56eefc491794e0a76f2299ab8ae87610534eea0bac073170a5091</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">08934624c43913ef01469cdb07033cb665925dc6b56d56924292e8cc8e584d6f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">15db9a206370da709910dbb60050fc3e3d0a02caaba117531056355b9c0c0c02</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">6d4d26428da44b62bf2a54be4e62df24b42d6c7296d9edd6c637b7bcf5d487fd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">2d2672bbf31410f48b8ea2820549fef9e3f3e7a657a6f11e5d93e68ce947b92a</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">32af6a7462dc10af31dab9f263885d789bbc4584699f3f005605131fd1d83a41</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.402.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">ffc2d73db443bdc8c362d206da1484d0cf3f1563ca371a9c05ef734371ad962d</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" id="CVE-2024-20918" title="Cve-2024-20918" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" id="CVE-2024-20919" title="Cve-2024-20919" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" id="CVE-2024-20921" title="Cve-2024-20921" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926" id="CVE-2024-20926" title="Cve-2024-20926" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" id="CVE-2024-20945" title="Cve-2024-20945" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" id="CVE-2024-20952" title="Cve-2024-20952" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0223" id="RHSA-2024:0223" title="Important: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0232</id><title>Important: Java-11-Openjdk Security Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918) * OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952) * OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919) * OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921) * OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926) * OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-19 16:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-demo-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">95576be2076e94f321be597b82c012c86361c5356cf844f86619cc6dd62c5e53</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-demo-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">b77dab4d298a73238d6e19e59114793eb49ccc4b03f8b3745f88f663a258b461</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-headless-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">1c8872e428cd92d18a092ac69b51494d8b91985e7bc91f71bb692468fe0a2efe</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-headless-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">6d197aafe764af0160b0da23049f3ccc5fdf7770a7dc473499cb49f1877e0556</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">5f505af6d49f833135800b8034e962058f24a2cdc6fd6e2416e6dd1c5a33416a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">44871757e5397e5f0ff59df1eb7d11c5e476976427db8a992bfe76678a5ef976</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">0621d1509b6394e973480a59b6cab842c967101d2f8142acd7992a5835b7abf6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">117319bd032a4ef64d49cb6a3414626071a4db2c0a48675251aa76d58ef0ef45</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">7d94af7086999a9b14e8120cbe8b493fc641a3f9a85ac573050754b086ca4983</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-demo-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">0a870fe20b25057c5548716e32ce90d1cf6b9b48b62ddd5897ff858d015a1241</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-demo-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">f379918409d5321ce1d3e56701ae947f73fd7de655c676ef1ebb481da5dc4d0a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-src-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">4d8de6773a7251746e3e975e65506206690bb5076927eb54b75b4f88586da265</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-headless-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">270bc9bd8a9e1788d554e01da8e07b794033669407fe0dc1b634c4e83abe9016</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">14c0faebea0f99195f73da800562e386075b28e459a8625e3e201d8e63402563</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-headless-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">6f3305d38383c213fd8a31bf5e7e1e16283a81f3742f6eb3bf2767ac8c7f063a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-static-libs-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">b52efc2014e5e6f6d00b9da4f106a7de1d850bf2760d565d8b28636016bc67ba</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">a864487011f9047034551d8e309d9d5ff322b53faf35a191a2288ce5843af83b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-src-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">9e08bbbe35f812b16a16638c2d1fef2f52f8e61e61b2019485ceceac51e22c70</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-devel-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">9042cb7ac96e9b3ee54b2247c2a1460f0a681ba4d518cec61cf4b2faddb8676a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-jmods-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">7fa496f97aeb3506611bc0a20c3d5fa84c17ae51a859d73309f751503ffba7d5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">c4ed4a0b8d0e7c33b78a5c12d4401bb736d56959dd573c5e26515307bb64a057</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">fd710de29dcdf89cf4e6a233122b7f1b405b370f13681049f6783212255b7829</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">9faa8250912a2be04d4498daa3fc0b40eacde1c144076c6837ae5e359414f50d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-static-libs-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">16b90f808a79a23246d661893064bea524dda0549caddd283e53cdc6fe06e110</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">63aa077fca3bd0309ad6339aa8b14d691f4a9b755adf23584a99e68160085564</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-jmods-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">93a3522634768c262c2df5da341d0091fd8fe113222a0ce5ffaded281821fece</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-devel-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">c7dbfe21bc4a71451e335a05a632b07cc1adb551e534c024a5132c93a9a77ce6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-devel-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">ceccfdbf84e12de9260cf94520f64154cdc6d1360fa74a1c89b232487d28280a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-src-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">4f78d38cc22c0000c60437b76a9dd1ace7e0119b374a855849814b98a96d438c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-src-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">61b2000c37c25a6f56e4b7a88453ac8e857d9ed505827d272dee685fb1d498e7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">4febd8135ba4cbcfab1e3fa238eaf5fceb4953c4a302af5d76a0db173b025779</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">9e92a308ae9678956078aa4a638cf58cc7fe992fba72cc9ff3a922dd6a31faa0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-devel-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">f69b67b651639c1296a154fc500e02fc359a0e90c11e825ae415abfcf8ff130e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">0cbc4940043b1c9dded3f2e731211cf11c11667c64c68e2cc825b580799f0525</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" id="CVE-2024-20918" title="Cve-2024-20918" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" id="CVE-2024-20919" title="Cve-2024-20919" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" id="CVE-2024-20921" title="Cve-2024-20921" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926" id="CVE-2024-20926" title="Cve-2024-20926" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" id="CVE-2024-20945" title="Cve-2024-20945" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" id="CVE-2024-20952" title="Cve-2024-20952" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0232" id="RHSA-2024:0232" title="Important: Java-11-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0279</id><title>Important: Gstreamer-Plugins-Bad-Free Security Update</title><description>GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-19 15:21:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gstreamer-plugins-bad-free" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-0.10.23-24.el7_9.i686.rpm</filename><sum type="sha256">46c922e1d24d8284170b98e0f142a0e17802842adc3da065bd8330dd6c081de8</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-0.10.23-24.el7_9.x86_64.rpm</filename><sum type="sha256">0934f97f08c806631a7f63644847e920c09a8f047d70e4dd76a35325a5af8bfc</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.x86_64.rpm</filename><sum type="sha256">1802aadbbbf0087d8e2cce0dea743ecbcfb25e897183784bc0d88b004d3ec389</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel-docs" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-docs-0.10.23-24.el7_9.x86_64.rpm</filename><sum type="sha256">8bb33140410d396a3c1e09e1e7636cfad5641d474c614dc8ee90434eab1ff9e8</sum></package><package arch="i686" name="gstreamer-plugins-bad-free-devel" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.i686.rpm</filename><sum type="sha256">5a20bfc364ce0109eb22d83a993604bbec573e15b5e42800f244dc945aaaeae5</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44446" id="CVE-2023-44446" title="Cve-2023-44446" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0279" id="RHSA-2024:0279" title="Important: Gstreamer-Plugins-Bad-Free Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0320</id><title>Important: Xorg-X11-Server Security Update</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816) * xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229) * xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408) * xorg-x11-server: SELinux context corruption (CVE-2024-0409) * xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885) * xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-22 11:41:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xvfb" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">6778e751e0074379445b1d618d7fb380c5b8271870391f2b1986b1bd1fe67941</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">cd1e3e50fd368947479e8e5a01613c78f88daba8f7e94234e7a486955b0f9c82</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">aa8c44d5d0f90ec0e98953a3b942cbe1f5b3ef92c45406d0567237ab7aa01731</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">85adcaa8f4a114ef75b8f463a7f43cec7a4b0338b5d93d8113ad76b98f8a1647</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">f798bbfc8b5c38c89aa7580f8fcd9736d7fd8ea62cd463bde9226f0a81377da5</sum></package><package arch="noarch" name="xorg-x11-server-source" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-27.el7_9.noarch.rpm</filename><sum type="sha256">b91c387e09a82405d1b5936f85986ce2291a9efad65f4748183f9a74f9dfcdca</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">ea9f77b8cd412fc9783b1337bffef758dfcb3f7c91723c38b1d9489afe87ce20</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">d97635105ed33d28798a218a9f1c3d98e74c9b36553f9b7786954b83e3f66984</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">18d38bc6740bc3142d0035dc752c5df83be63f5fc7378db267c809bfdc988e38</sum></package><package arch="i686" name="xorg-x11-server-devel" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-27.el7_9.i686.rpm</filename><sum type="sha256">217bf7588963dcd2af78b1400a42ec3855b517a4b1add62c3dc961e707cdf8ec</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816" id="CVE-2023-6816" title="Cve-2023-6816" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229" id="CVE-2024-0229" title="Cve-2024-0229" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408" id="CVE-2024-0408" title="Cve-2024-0408" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409" id="CVE-2024-0409" title="Cve-2024-0409" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885" id="CVE-2024-21885" title="Cve-2024-21885" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886" id="CVE-2024-21886" title="Cve-2024-21886" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0320" id="RHSA-2024:0320" title="Important: Xorg-X11-Server Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0343</id><title>Moderate: Libraw Security Update</title><description>LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others).
Security Fix(es):
* LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp (CVE-2021-32142)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-01-23 14:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="LibRaw-static" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-static-0.19.4-2.el7_9.i686.rpm</filename><sum type="sha256">c07f0c388d53ef358304fbf5a890c8ed27ae53ac3562bf722810321531fd361e</sum></package><package arch="i686" name="LibRaw-devel" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-devel-0.19.4-2.el7_9.i686.rpm</filename><sum type="sha256">afe924b0d2eb987ea4ed17a7c86e6ce9a2aaa2203672a0e501e8f4542ce26df2</sum></package><package arch="x86_64" name="LibRaw-devel" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-devel-0.19.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">9be290004a20cff637d7db3a166196299147d69eb4cfb37827fa64eb33766220</sum></package><package arch="i686" name="LibRaw" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-0.19.4-2.el7_9.i686.rpm</filename><sum type="sha256">21fa8b7b6ecf815d8cbcb1a7a3246c238e96be77a9b0fbc6df94b230dd376b04</sum></package><package arch="x86_64" name="LibRaw-static" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-static-0.19.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">2efa6f2fff664a9e8d805395dd44f71dfb756e1fca4e1de635ea410afe69d9fd</sum></package><package arch="x86_64" name="LibRaw" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-0.19.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">2cd76b61d30079714ab546a2d5d8270a6da702c9b19f6b947fec49d03fed2b96</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32142" id="CVE-2021-32142" title="Cve-2021-32142" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0343" id="RHSA-2024:0343" title="Moderate: Libraw Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0345</id><title>Moderate: Python-Pillow Security Update</title><description>The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (CVE-2023-44271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-01-23 14:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-pillow" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">81413d6b0956aff03a592b4b9dda1e107ea340a40c841e9f49fc0b8dcb778a61</sum></package><package arch="x86_64" name="python-pillow-sane" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-sane-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">7df5cda96de4345301564233d4f73210ecc6f5d4774f993730f56f7757b5ba0b</sum></package><package arch="x86_64" name="python-pillow-devel" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">54388931d055924d06b0cd6dd8873d868143563199de035e45c51b6037afd611</sum></package><package arch="i686" name="python-pillow" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-24.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">9f082ca45e31f71798f6cd9e202c15f116b73edcdb1e89449c37c22cecd24e1c</sum></package><package arch="x86_64" name="python-pillow-qt" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-qt-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">754ea3a6ce7134fbc594c534a2a81bf845b369423871c9ad49f9afe6c9782099</sum></package><package arch="i686" name="python-pillow-devel" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">b3a8eb943b033ae352a9449ade64acf785c669c3036d1f0bd7ad5e90e1208ecf</sum></package><package arch="x86_64" name="python-pillow-tk" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-tk-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">f871880a43e6660c4103602b302e99e38455494651f2e6bb410535f45868d30c</sum></package><package arch="x86_64" name="python-pillow-doc" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-doc-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">5d329a9892fb932b1b2024236976baad22bd5ca3d6432851931ec97869baa662</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44271" id="CVE-2023-44271" title="Cve-2023-44271" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0345" id="RHSA-2024:0345" title="Moderate: Python-Pillow Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0346</id><title>Important: Kernel Security And Bug Fix Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: netfilter: potential slab-out-of-bound access due to integer underflow (CVE-2023-42753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* gfs2: kernel BUG at fs/gfs2/lops.c:135 (BZ#2196280) * ax88179_178a 2-6:1.0 (unregistered net_device) (uninitialized): Failed to read reg index 0x0006: -71 (RHEL-6302)
</description><severity>important</severity><issued date="2024-01-24 10:57:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">8ed03cdee3c6f96583e0d7213404eabcc01aea6a0df53bad7b20cb96666838f6</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.108.1.el7.noarch.rpm</filename><sum type="sha256">e199f6b0dda918678870e94fd82b6509db5d1d81c304e2ec7ad19b2a8fbd12c2</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">4d46be2e7f1aea69880cfb02c600953d0f848c3a5ea502388989bd44584e1956</sum></package><package arch="x86_64" name="bpftool" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">5babb17a292aa655c2458056ebb1073456db49e369a7d1f10786a4bcc4acaf86</sum></package><package arch="x86_64" name="kernel" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">8a44907d63ba2c431265cc97f497ed4998d58b0d716422b81ddfd3afbf936ba7</sum></package><package arch="x86_64" name="python-perf" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">0e68ec2adb0238e252e1999ecac0efb5b3bcfa1bf4994bd14f075785357dc109</sum></package><package arch="x86_64" name="kernel-devel" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">43098b52ac40ae5c5f3080ff5a42fc09262e882a822cb5e5947ced3dbdc2c2f4</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">43586f28a7c20ebfba8ae2fcf35a91780bf656a7a7a1207260a8d4b40891ad73</sum></package><package arch="x86_64" name="kernel-debug" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">b8fd50e3df21e313479ea3dbd5a21d07fa1b057b799a1b8ada709fcaceebeb7d</sum></package><package arch="x86_64" name="kernel-headers" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">d7d0b7a0b00169816abd24f0536b7af24067e2f68be53d15db85556474e0b6e8</sum></package><package arch="x86_64" name="perf" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">afa2282ea672e08045f6e7e20b3f52587719e7a0c403ccdfb3ac75513028615b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">1ae9bb5868083ed0ac71b848de353773db99073a37d54e27867400e1dbb9c0a5</sum></package><package arch="noarch" name="kernel-doc" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.108.1.el7.noarch.rpm</filename><sum type="sha256">4cdc3a356924241aae99ad3debebaa1c8e2294e2eb6a86c96c94fe7694ab834f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753" id="CVE-2023-42753" title="Cve-2023-42753" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0346" id="RHSA-2024:0346" title="Important: Kernel Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2196280" id="2196280" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0600</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.7.0 ESR.
Security Fix(es):
* Mozilla: Out of bounds write in ANGLE (CVE-2024-0741) * Mozilla: Failure to update user input timestamp (CVE-2024-0742) * Mozilla: Crash when listing printers on Linux (CVE-2024-0746) * Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747) * Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750) * Mozilla: Privilege escalation through devtools (CVE-2024-0751) * Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753) * Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-30 14:07:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.7.0-1.el7_9.src.rpm" version="115.7.0"><filename>firefox-115.7.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ea22ef001519caa8ff417d9c87f6b375b1082727fcec2747802342a6e993b3b4</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.7.0-1.el7_9.src.rpm" version="115.7.0"><filename>firefox-115.7.0-1.el7_9.i686.rpm</filename><sum type="sha256">07313088232c6184aaa18e6cd5f3a64d0bf5a4373276de8e6b05ec4a1a1c03e6</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" id="CVE-2024-0741" title="Cve-2024-0741" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" id="CVE-2024-0742" title="Cve-2024-0742" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" id="CVE-2024-0746" title="Cve-2024-0746" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" id="CVE-2024-0747" title="Cve-2024-0747" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" id="CVE-2024-0749" title="Cve-2024-0749" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" id="CVE-2024-0750" title="Cve-2024-0750" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" id="CVE-2024-0751" title="Cve-2024-0751" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" id="CVE-2024-0753" title="Cve-2024-0753" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" id="CVE-2024-0755" title="Cve-2024-0755" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0600" id="RHSA-2024:0600" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0601</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.7.0.
Security Fix(es):
* Mozilla: Out of bounds write in ANGLE (CVE-2024-0741) * Mozilla: Failure to update user input timestamp (CVE-2024-0742) * Mozilla: Crash when listing printers on Linux (CVE-2024-0746) * Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747) * Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750) * Mozilla: Privilege escalation through devtools (CVE-2024-0751) * Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753) * Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-30 14:07:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.7.0-1.el7_9.src.rpm" version="115.7.0"><filename>thunderbird-115.7.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a8d93b2a5cfc9fd072a7304a659f1c3fdec5ad7756d516d0fc2b9aa00d0fbb79</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" id="CVE-2024-0741" title="Cve-2024-0741" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" id="CVE-2024-0742" title="Cve-2024-0742" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" id="CVE-2024-0746" title="Cve-2024-0746" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" id="CVE-2024-0747" title="Cve-2024-0747" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" id="CVE-2024-0749" title="Cve-2024-0749" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" id="CVE-2024-0750" title="Cve-2024-0750" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" id="CVE-2024-0751" title="Cve-2024-0751" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" id="CVE-2024-0753" title="Cve-2024-0753" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" id="CVE-2024-0755" title="Cve-2024-0755" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0601" id="RHSA-2024:0601" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0629</id><title>Important: Tigervnc Security Update</title><description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816) * xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229) * xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885) * xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-02-02 08:09:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tigervnc-server-minimal" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-31.el7_9.x86_64.rpm</filename><sum type="sha256">b63f27490a21ca002b9b142c768efef20e9c395d54e892057bb58608cc204fa8</sum></package><package arch="x86_64" name="tigervnc" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-31.el7_9.x86_64.rpm</filename><sum type="sha256">4b100d9b5c7636dfdfdfe41a637d0526490bce975df2325af3d0922939dd67ca</sum></package><package arch="x86_64" name="tigervnc-server" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-31.el7_9.x86_64.rpm</filename><sum type="sha256">ba082c4d938772188057ad42edcce544b2dcecc2a610d34c61c4ee758d772ed3</sum></package><package arch="noarch" name="tigervnc-icons" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-31.el7_9.noarch.rpm</filename><sum type="sha256">07a9abca01452eaa3c9dbfd9c5f9fb66ddcdef37278b8e4443d44e3fe33b27ca</sum></package><package arch="noarch" name="tigervnc-server-applet" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-31.el7_9.noarch.rpm</filename><sum type="sha256">1d4bb14474a252b9009725af3d0853209f7723cdaf3892644aef511b9cb15578</sum></package><package arch="noarch" name="tigervnc-license" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-31.el7_9.noarch.rpm</filename><sum type="sha256">160eddd328e690a5339dd325e0dd8209d4a6cf237f8895dbf0be2052411960a6</sum></package><package arch="x86_64" name="tigervnc-server-module" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-31.el7_9.x86_64.rpm</filename><sum type="sha256">b0ca8ac5f2622ea90ff9de469ead08695c1b43cdcce2779c53ea534521fc95de</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816" id="CVE-2023-6816" title="Cve-2023-6816" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229" id="CVE-2024-0229" title="Cve-2024-0229" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885" id="CVE-2024-21885" title="Cve-2024-21885" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886" id="CVE-2024-21886" title="Cve-2024-21886" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0629" id="RHSA-2024:0629" title="Important: Tigervnc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0753</id><title>Moderate: Linux-Firmware Security Update</title><description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* (RCVE-2023-20592)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-02-09 16:22:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl6050-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-82.el7_9.noarch.rpm</filename><sum type="sha256">bede749692b47135cac3d83f3811deaaa856821d340a49e23c281a4da586f3bc</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2b-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">141487a55bbc7dbdf9f830b07f80cbf8e2d34c75aac27fb2ac98237e6f2ab244</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-82.el7_9.noarch.rpm</filename><sum type="sha256">54b17ad5fd3c9c574dfcefefb2a8834656fdd82cf152caf8b9ba308cebf7d1bd</sum></package><package arch="noarch" name="iwl5150-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-82.el7_9.noarch.rpm</filename><sum type="sha256">b7c434a206a59763ca232a0bb8e49701aa018d93b0d1cc041814e6d94bf50c4b</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2a-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">0d692533b2a5ed4ed28868c7bb8334525076497de50353ad813da6fe07734284</sum></package><package arch="noarch" name="iwl3945-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-82.el7_9.noarch.rpm</filename><sum type="sha256">097176fa2cb3c3f5caf9d1fa228090fd6d5c9dd78f8d212fcdc96ecf711a55cd</sum></package><package arch="noarch" name="iwl135-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">95bfaba9b5653a83e20c9932b2930eb6bda85d510059a5c43cf550a53ae448e7</sum></package><package arch="noarch" name="linux-firmware" release="82.git78c0348.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="20200421"><filename>linux-firmware-20200421-82.git78c0348.el7_9.noarch.rpm</filename><sum type="sha256">a8777329c0b6e715eac602ff58a6429bca76e76ac70603206312441bf247a2ad</sum></package><package arch="noarch" name="iwl7260-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl7260-firmware-25.30.13.0-82.el7_9.noarch.rpm</filename><sum type="sha256">e64a97d5c671efc4fa415bd4c532464a6262f62b1a9fa98a799c03487433ad0d</sum></package><package arch="noarch" name="iwl3160-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl3160-firmware-25.30.13.0-82.el7_9.noarch.rpm</filename><sum type="sha256">af80422a01927bfdb8b5205ef9d97360eaa757c898688dc506466eca6f067406</sum></package><package arch="noarch" name="iwl2000-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">af3ed29b25df5c8a78f4b10a974cdd2ebc5dbfc7a3ee9e2d5ef010fe20851f30</sum></package><package arch="noarch" name="iwl6000-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-82.el7_9.noarch.rpm</filename><sum type="sha256">dc0489d581ae27ffc1ce06e394aab2912de78a3f6f3bce244e7bab0692373006</sum></package><package arch="noarch" name="iwl2030-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">77d06de2dc9b5b81939baafdb9150ec3b9a5f407cb384ee53d17e1d0596d3aa5</sum></package><package arch="noarch" name="iwl5000-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-82.el7_9.noarch.rpm</filename><sum type="sha256">e02af43fa4eead018ef3b96bc5e13b1753bfaad664429845c0aef433765ef060</sum></package><package arch="noarch" name="iwl100-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-82.el7_9.noarch.rpm</filename><sum type="sha256">91f90c313410f56aed94e461a0e925b6df6d91a3a93d1376dbcddc7e7e0fd5ad</sum></package><package arch="noarch" name="iwl4965-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-82.el7_9.noarch.rpm</filename><sum type="sha256">da898bc4b4e3150cf1460c4eeda3405a39f7ce8892e7094414c529d30a296422</sum></package><package arch="noarch" name="iwl105-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">3d0b10f45e5f0c5ae891adcb8584696e241ebe689ac0cfa747f6fccf7a5849ac</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20592" id="CVE-2023-20592" title="Cve-2023-20592" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0753" id="RHSA-2024:0753" title="Moderate: Linux-Firmware Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0857</id><title>Important: Python-Pillow Security Update</title><description>The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* pillow: Arbitrary Code Execution via the environment parameter (CVE-2023-50447)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-02-20 10:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-pillow-tk" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-tk-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">15ae81d0c24e554168f090c91b0bc2b5581f0d142a5bef76c9e770d4a7c29802</sum></package><package arch="i686" name="python-pillow" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-25.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">791474fa898b4d6fa0ebdb548ed5799c07682da9ada08418be98c027169e4f32</sum></package><package arch="x86_64" name="python-pillow-devel" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">0e5b6de2c1553be4d41141f38ee00540dee7f7bac9856cd13e3a5577bc44e79d</sum></package><package arch="x86_64" name="python-pillow-doc" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-doc-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">7913772aeb3a93c0c8f76445b344a0e683bd79d3a9d15080fdb4a08d22c57993</sum></package><package arch="i686" name="python-pillow-devel" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">38a8568a5a6917fed7d4ca98920d155a2a4391e7172ea37054f73fe7c4afdb1e</sum></package><package arch="x86_64" name="python-pillow-sane" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-sane-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">bc9b15bb3548fca39106e1dd305aafcfecdddb850043ac44e12acaa19d73175d</sum></package><package arch="x86_64" name="python-pillow-qt" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-qt-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">4d006721fe89a5c6fa877246ae5304b6c0c98ca697495886f0d15e4cb52d2ace</sum></package><package arch="x86_64" name="python-pillow" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">4e40b851a547086a74959ca0b2a31dfa750e1882e98dd5a8a56534c2f033e53a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50447" id="CVE-2023-50447" title="Cve-2023-50447" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0857" id="RHSA-2024:0857" title="Important: Python-Pillow Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0957</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.8.0.
Security Fix(es):
* Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546) * Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547) * Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553) * Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548) * Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549) * Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550) * Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551) * Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-02-26 13:23:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.8.0-1.el7_9.src.rpm" version="115.8.0"><filename>thunderbird-115.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">b93f4388564d33caa2064835d37d025d08c1b8d66e51e872a3921bc0f40645d6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:0957" id="RHSA-2024:0957" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0976</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.8.0 ESR.
Security Fix(es):
* Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546) * Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547) * Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553) * Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548) * Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549) * Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550) * Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551) * Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-02-26 13:23:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.8.0-1.el7_9.src.rpm" version="115.8.0"><filename>firefox-115.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">19645f18638c73e54e5a9ab313bc9cd6fd7f9324afe5a071c4b777a21e1ad939</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.8.0-1.el7_9.src.rpm" version="115.8.0"><filename>firefox-115.8.0-1.el7_9.i686.rpm</filename><sum type="sha256">f08e3beb43fee16a6bce5a10defd482ad304f42980b9ca9b7be65555bce9fc2a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:0976" id="RHSA-2024:0976" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1249</id><title>Important: Kernel Security And Bug Fix Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* (CVE-2024-26602, ?) * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921) * kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871) * kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment (CVE-2023-38409) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [rhel-7] INFO: possible circular locking dependency detected: store+0x70/0xe0 kernfs_fop_write+0xe3/0x190 (BZ#2161654) * qedf: Reading /sys/kernel/debug/qedf/hostX/stop_io_on_error can cause panic (BZ#2224973)
</description><severity>important</severity><issued date="2024-03-21 08:28:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-perf" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">6219ccf626b63bfab99d033de385dba6b35d64154246c6fd87812ec21e8e9567</sum></package><package arch="x86_64" name="kernel-devel" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">fda8c918fc3432c34e4268978b46c786654968f2a0601c6abdfe2d643733f990</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">203be60922d3278b1b6d9471c79cab6f9bfa2a0fd05b05dc5fdca7042aa6fb6e</sum></package><package arch="x86_64" name="kernel-headers" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">0a74334fadf5e361e000cdfd3914bab8064753102fdf58527a4c1f18e88ed0ea</sum></package><package arch="x86_64" name="perf" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">b5912c34f83560f9865f6f1fba4f654f7eea21409398c0b15be377e95e45cf5b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">791452b00d72645b5e5c89f1f04b9d21efbce3b90009de08924f5b4797d8903b</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">a76baaa0c86b21c117e3b32b9378a3dc132095b00cba8c207c9c0293b4cba73d</sum></package><package arch="x86_64" name="bpftool" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">a734e79d3bc421f931d2d82589a7103260a56804728153892a0411b268848840</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.114.2.el7.noarch.rpm</filename><sum type="sha256">8451aa49628585a9f0906f5104d7d6ba5087251161b07861149fa5a68f34f516</sum></package><package arch="x86_64" name="kernel-debug" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">6d80eb63b24244233b797ebcb16866ce03198e8bd8d097de606bad6f046bac58</sum></package><package arch="noarch" name="kernel-doc" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.114.2.el7.noarch.rpm</filename><sum type="sha256">3d9873984d98e433540c1af5b1d24fed7014cee60c834f5793708a0f651dd30d</sum></package><package arch="x86_64" name="kernel-tools" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">8a07d2f79c4bbcf23b91292c704d658bd4ea30c4d82402774a36dbd95a172f0b</sum></package><package arch="x86_64" name="kernel" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">49c52b78daffac4caa1ac6602573916787864be7bb05d7a94416bfb7544b3922</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896" id="CVE-2022-42896" title="Cve-2022-42896" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38409" id="CVE-2023-38409" title="Cve-2023-38409" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871" id="CVE-2023-45871" title="Cve-2023-45871" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921" id="CVE-2023-4921" title="Cve-2023-4921" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086" id="CVE-2024-1086" title="Cve-2024-1086" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" id="CVE-2024-26602" title="Cve-2024-26602" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1249" id="RHSA-2024:1249" title="Important: Kernel Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2161654" id="2161654" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2224973" id="2224973" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1486</id><title>Critical: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.9.1 ESR.
Security Fix(es):
* nss: timing attack against RSA decryption (CVE-2023-5388) * Mozilla: Crash in NSS TLS method (CVE-2024-0743) * Mozilla: JIT code failed to save return registers on Armv7-A (CVE-2024-2607) * Mozilla: Integer overflow could have led to out of bounds write (CVE-2024-2608) * Mozilla: Improve handling of out-of-memory conditions in ICU (CVE-2024-2616) * Mozilla: Improper handling of html and body tags enabled CSP nonce leakage (CVE-2024-2610) * Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions (CVE-2024-2611) * Mozilla: Self referencing object could have potentially led to a use-after-free (CVE-2024-2612) * Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 (CVE-2024-2614) * Mozilla: Privileged JavaScript Execution via Event Handlers (CVE-2024-29944)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>critical</severity><issued date="2024-03-26 10:07:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.9.1-1.el7_9.src.rpm" version="115.9.1"><filename>firefox-115.9.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">f288a71162f7c339c59ad0bdca178fcb27e415e0866b00db0cd176c57dbd1706</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.9.1-1.el7_9.src.rpm" version="115.9.1"><filename>firefox-115.9.1-1.el7_9.i686.rpm</filename><sum type="sha256">9518d749a87e95259d1331d59693d6a74d7e9eee033f5a31d1676c914155d44b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" id="CVE-2023-5388" title="Cve-2023-5388" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743" id="CVE-2024-0743" title="Cve-2024-0743" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607" id="CVE-2024-2607" title="Cve-2024-2607" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608" id="CVE-2024-2608" title="Cve-2024-2608" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610" id="CVE-2024-2610" title="Cve-2024-2610" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611" id="CVE-2024-2611" title="Cve-2024-2611" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612" id="CVE-2024-2612" title="Cve-2024-2612" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614" id="CVE-2024-2614" title="Cve-2024-2614" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616" id="CVE-2024-2616" title="Cve-2024-2616" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29944" id="CVE-2024-29944" title="Cve-2024-29944" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1486" id="RHSA-2024:1486" title="Critical: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1498</id><title>Moderate: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.9.0.
Security Fix(es):
* nss: timing attack against RSA decryption (CVE-2023-5388) * Mozilla: Crash in NSS TLS method (CVE-2024-0743) * Mozilla: Leaking of encrypted email subjects to other conversations  (CVE-2024-1936) * Mozilla: JIT code failed to save return registers on Armv7-A (CVE-2024-2607) * Mozilla: Integer overflow could have led to out of bounds write
(CVE-2024-2608)
* Mozilla: Improper handling of html and body tags enabled CSP nonce leakage
(CVE-2024-2610)
* Mozilla: Clickjacking vulnerability could have led to a user accidentally
granting permissions (CVE-2024-2611)
* Mozilla: Self referencing object could have potentially led to a
use-after-free (CVE-2024-2612)
* Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and
Thunderbird 115.9 (CVE-2024-2614)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-03-26 10:07:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.9.0-1.el7_9.src.rpm" version="115.9.0"><filename>thunderbird-115.9.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">633ac61bf649cbb0a8af1fe19bf02629b6aa72b06a1f7bc010f3e0191c081bf1</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" id="CVE-2023-5388" title="Cve-2023-5388" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743" id="CVE-2024-0743" title="Cve-2024-0743" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936" id="CVE-2024-1936" title="Cve-2024-1936" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607" id="CVE-2024-2607" title="Cve-2024-2607" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608" id="CVE-2024-2608" title="Cve-2024-2608" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610" id="CVE-2024-2610" title="Cve-2024-2610" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611" id="CVE-2024-2611" title="Cve-2024-2611" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612" id="CVE-2024-2612" title="Cve-2024-2612" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614" id="CVE-2024-2614" title="Cve-2024-2614" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1498" id="RHSA-2024:1498" title="Moderate: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1785</id><title>Important: X.Org Server Security Update</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-12 11:20:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-devel" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">9cd2ecb63df9fb22b407d4985082354910087069eb12747b1a3c8dbd91a376c8</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">36081c9b9c87022032141d87cee179ca1e4bb24b8e3cec5f810f3ab3292b9879</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">ae83d82858bf83da7eb37ddae61f71b588879adba1aee004ba37fa6c2d6d282e</sum></package><package arch="noarch" name="xorg-x11-server-source" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-29.el7_9.noarch.rpm</filename><sum type="sha256">b575bab4e5c503acc122713aa952b48ec27c1f2e2d71abe1d9a7e2e310d01e87</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">75f7bf39ae5ecfa5c37a5fda81409b7a747e3ea195240253b07e5e2fbde9fbde</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">3f71c6f0a460e254f7fa38a4f70022c2c16b0434b7420d55c85b95c33edfe2ca</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">0592fe7d3f6d6942ecef2e6f48163fac7cf59b2d760479fb6110f81b240b650f</sum></package><package arch="i686" name="xorg-x11-server-devel" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-29.el7_9.i686.rpm</filename><sum type="sha256">f7a93733b242167bb472f01c0d7ba503dbfa21a96eca2e2707ab2967e47c3791</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">a8f92d3db45455d068361ebaa8af64275d656af1a44d0d7cf1c3db6e0ed91e53</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">3387269f61804f0b2b7a9606c3a1344123086b21b9ae3e253996b289b54daa30</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080" id="CVE-2024-31080" title="Cve-2024-31080" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081" id="CVE-2024-31081" title="Cve-2024-31081" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083" id="CVE-2024-31083" title="Cve-2024-31083" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1785" id="RHSA-2024:1785" title="Important: X.Org Server Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1787</id><title>Important: Squid Security Update</title><description>Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: denial of service in HTTP header parser (CVE-2024-25617) * squid: denial of service in HTTP request parsing (CVE-2023-50269) * squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285) * squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286) * squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728) * squid: Denial of Service in SSL Certificate validation (CVE-2023-46724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-12 11:20:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.10" src="squid-3.5.20-17.el7_9.10.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.10.x86_64.rpm</filename><sum type="sha256">535a00517c6bfbc2eca005ca05996bec350f327132f69dc9810e100b756d33b9</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.10" src="squid-3.5.20-17.el7_9.10.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.10.x86_64.rpm</filename><sum type="sha256">1e1ad8c5ac62df286ba1a1efb4176f3191425f71477815589b05339e2df1d1a2</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.10" src="squid-3.5.20-17.el7_9.10.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.10.x86_64.rpm</filename><sum type="sha256">5730d09504f1aece6838c90069bffc2f453f55cf5381b7ff8a93a4031c6f26ee</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46724" id="CVE-2023-46724" title="Cve-2023-46724" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46728" id="CVE-2023-46728" title="Cve-2023-46728" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49285" id="CVE-2023-49285" title="Cve-2023-49285" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49286" id="CVE-2023-49286" title="Cve-2023-49286" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50269" id="CVE-2023-50269" title="Cve-2023-50269" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25617" id="CVE-2024-25617" title="Cve-2024-25617" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1787" id="RHSA-2024:1787" title="Important: Squid Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1817</id><title>Moderate: Java-1.8.0-Openjdk Security Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-04-17 09:17:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">dd01fc33cf37f8a54346df5d03f247bc4d1c8065d17be7e0dc44bce99c32630e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.412.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">94cfa62d890d71ee0423d68a84ca416efa73088f89fd28aa08bd254071ea0dc8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">6233de7740a123225cfc809c5dd0ca69df02afbd5c4c3617ab65430c0f91fbb8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">8b7774447a244305f377bfb98fb92dccf701eb683776599a2c434451bed39e4e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.412.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">32bc114411b39d13ebf0af4da7ce0d616d3d468dcb79216083faf5c157b03574</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">d6d71f3df48a3ed75ac0a571754ead18c5bc889da18c3ac6e7cec74bbc25e110</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">4b8f078d24919936a039b9a6a20ae2eb785df559b2768b8bd03f9f2e75cc75ce</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">6929e42135cc5b3160118cca0a986785bcd307dd581a4e9ebf6fde91bb59e5e6</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">b76d6c84c2a51474607dd5b89ad367198739336bf4d0d717fe379a4b107a1194</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">bb8720a43b0770f702a2a69d7eb270cdb045e73007fce293a10345e250c09917</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">88c0c30ef0a8545ceb2fca04440af566161c59dbf80592eaf32fd279a6d96057</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">5523d2b121cb76c5a23a0d7a0dd3e9fd938e5f25a5b398b79077570f0915a36e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">c0a1975cbe1fe4c1361671feeb62ec6b042b7857ffc6c16fdd3a44afe6f7cd99</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">db697d3e8d1962d53c672af785b1660088386812b6283f7e4411faead1501646</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">d3f92ce1c50bcb1f3d2f20321ee32cebcacaccac3d641d2ba4f557c28bc47dc4</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">1e18f402b9c193cdbb34f248883971b11cc93698b212a6939e9a39804a76785c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">502e113cb2543a3a4799877c200a64611d442bb8fffb7bcd44e50689866ce726</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">8a95eeea1fb14c5468160dd9015fd10e7323043f5cdee0eb301e88d8baaa3a6d</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">51d609b53a3edd23c2b078777e77bd319dc039533ad3a208bfb16b3a29af2c38</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">a9d12d3814fde3710d495b3aa7014690427bdf0048df08200fa30df1cc9af6cd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">80e519bed885acf426e7abafe523f22b410a4738b99d422abcad3e1f121f799f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">4c8d2f27d85e9b6b854a7845dfd33dd362e517a68898ff465e7a7fd13eaa80ef</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">86f31659058f688c5d9fb31cb83b1e8a61a0f1609448613d7b58f2aad6025143</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">1894fd71dfa3138964caa76cbbfaf358a833d2897d72d6500ebc32a799320362</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">b61062c1696adf1365012cdb2d60c4557f7b54b96b6b07f3a0c987cb7cad38c3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">dc6dc3d2a74a97e5c60ab5e0175706aa7b0e2f9b8d74159d7965cc12479a1fff</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">fae992f04223ed32dcc4c439a82ab270df358fe5e7f95ca14ea9d6f3b8c9234a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">ec52dc8077894df0b9eafe9b63a0f6478081b8ffc6b5a01cc48aab78106833b8</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011" id="CVE-2024-21011" title="Cve-2024-21011" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068" id="CVE-2024-21068" title="Cve-2024-21068" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085" id="CVE-2024-21085" title="Cve-2024-21085" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094" id="CVE-2024-21094" title="Cve-2024-21094" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1817" id="RHSA-2024:1817" title="Moderate: Java-1.8.0-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1821</id><title>Moderate: Java-11-Openjdk Security Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-04-22 17:37:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">83bf9c4398525ee7235519d471d34273b1eab0a40c397efbb926105051049d04</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-src-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">433671636d3ff2ed55052ae80016a5bf3cc10113b000be4e054d38340c1fa348</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-headless-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">4fcec7872a4167f05a2253652cd1080227bb44714c997916cc428c7dfeb7e72b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">2287b02610b5ca856eef97c4399a7c05098956fe60f54c163b81bbd72d046135</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">76348cd9945afc43080010a400c33dbe2f3caae0a92f79c52e4dd89a660fb45a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-demo-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">4d62abd5413d28dec9654b5538b1a048c9bfa1143edb7b9dfbbfd0027246a157</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">66d7708d57587d0bbb7f3aa5da321a292b9a3ece5bc795f8a93ca187888a4f39</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-headless-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">f54a1040f9ff05f7c90bfd476058e20983715f79fe14e709ecb98fb8dcf8eee6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-devel-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">ddf698e9510fc5f9ebe182220b487f28838d9f0643f0d672f8205d4c081fb571</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-jmods-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">8e8db98b1336dc22e9f6260200f7cf67fe6e41ab873dabe2d6da8233a5af5eb0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">c816cdd66389a18294ccd7d1f7daaf4e76e70c652ab59649ce25c61bff610cf1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-demo-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">256ac25644e7dd3d70c4780b8ab3cbf37551086087ce78b6a20c5189b202f309</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">c4840f9613e6ed3d1e856759f8ae2b64c39dadc5a6a0796a955744b1326c84c0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-src-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">73fcd8c65d03fd78b26fb9a5b37dfde0bb13a7536216b3cddd40d4f4d47401c2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">0a63ee84ae817929cab3f49b5d8695161dba65b7afdaba91c208c647089b0a3d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-demo-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">275f3d258d3d6ec26e355436793272b83dd2333fcf504d9c954e6b5bf68ab735</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">93b23fbbf28a017c1ce8b6adc2d68f6af0707cb664887246c334caa9c194701f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-demo-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">b1b6ee1e6944ff30f1b9fb7115caed23f4763fb38f08db5bd0389715532592a6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">8db4502addde63a3d96670c3a5c036dc93285bd28634f1d10d28d4d0f519295f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-headless-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">b92fafe1e4203272638d4871d2d5c87b17a94af5560426e97deb419dacb882c6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">28d755e9c43b1d35a38ee0be97dc1383047b60341a0f054cca72ba9054d952e3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-devel-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">81c86fe4a514adee5f88ec8459181b1de99df7ed6982e9ed2c8dce31be634357</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-jmods-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">e3893ad0cc9afa1d48812473113d15b0a69b9091e83c1bc1462589fef73b8cc8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-devel-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">b78ba6a368741f19c8d8e34add033eb125d3146948b4e7fd6541b82e1dffbf0a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">42e0262d4474aaf0389974ee13fa2d981e491bbb07683f7b4c6329edf6557d83</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-headless-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">d6ad00980db65031bf41c48fa478db9c382eb95e54302a445595034f1730aa0d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-jmods-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">d8dfa59d0f2dd9a44a3631795e37ab959edcb3877fbf631dc5a9ef2f99a76df6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-devel-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">9c9120e36d54a44510c9d8861582a75d6e6aad532ed4d28f57d2a960448564c9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-src-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">40d48da8a29c49d1fa3e7bfe26af46afc08a5af9feeff7a65050876117edbbc3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">44d581cf158533a72118a6461a310d4da57a5b45aed55b41e97c27a29e277e7a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">7bb1431fad617ee085a71171ba969888296b01db0f3fde4bbbc0178bad08ccce</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">7e33c0ced954204da3edbf3fe83aa47c1a89367b01943da62947679f686e75ca</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-src-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">da5a45e8546769c6a9fb143e6392357a5b7219676762c3314699251c92d6b958</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-jmods-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">c15a40f868117eb65143aef6ce9a4dd5e62a2848fbe4ceef0ad576ae4233329f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011" id="CVE-2024-21011" title="Cve-2024-21011" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012" id="CVE-2024-21012" title="Cve-2024-21012" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068" id="CVE-2024-21068" title="Cve-2024-21068" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085" id="CVE-2024-21085" title="Cve-2024-21085" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094" id="CVE-2024-21094" title="Cve-2024-21094" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1821" id="RHSA-2024:1821" title="Moderate: Java-11-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1910</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.10.0 ESR.
Security Fix(es):
* GetBoundName in the JIT returned the wrong object (CVE-2024-3852) * Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854) * Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857) * Permission prompt input delay could expire when not in focus (CVE-2024-2609) * Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859) * Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861) * Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-18 12:27:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.10.0-1.el7_9.src.rpm" version="115.10.0"><filename>firefox-115.10.0-1.el7_9.i686.rpm</filename><sum type="sha256">7aa2b7e271c8808b35f2e8c47723c3842c4604ae0ebbeec74b2b64f89c658cbb</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.10.0-1.el7_9.src.rpm" version="115.10.0"><filename>firefox-115.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">d474c789af4e006b84209b179f4e0c6be2a1a86df34b65a9c1b4b4944eba55a1</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609" id="CVE-2024-2609" title="Cve-2024-2609" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302" id="CVE-2024-3302" title="Cve-2024-3302" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852" id="CVE-2024-3852" title="Cve-2024-3852" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854" id="CVE-2024-3854" title="Cve-2024-3854" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857" id="CVE-2024-3857" title="Cve-2024-3857" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859" id="CVE-2024-3859" title="Cve-2024-3859" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861" id="CVE-2024-3861" title="Cve-2024-3861" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864" id="CVE-2024-3864" title="Cve-2024-3864" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1910" id="RHSA-2024:1910" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1935</id><title>Low: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.10.0.
Security Fix(es):
* Mozilla: Denial of Service using HTTP/2 CONTINUATION frames (CVE-2024-3302)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>low</severity><issued date="2024-04-22 13:06:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-115.10.0-2.el7_9.src.rpm" version="115.10.0"><filename>thunderbird-115.10.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">3696d5d5fb5df0d910ac63a3812b6b8dcbd4f73d94a8e492276e66cd49d1d3a1</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609" id="CVE-2024-2609" title="Cve-2024-2609" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302" id="CVE-2024-3302" title="Cve-2024-3302" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852" id="CVE-2024-3852" title="Cve-2024-3852" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854" id="CVE-2024-3854" title="Cve-2024-3854" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857" id="CVE-2024-3857" title="Cve-2024-3857" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859" id="CVE-2024-3859" title="Cve-2024-3859" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861" id="CVE-2024-3861" title="Cve-2024-3861" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864" id="CVE-2024-3864" title="Cve-2024-3864" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1935" id="RHSA-2024:1935" title="Low: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1959</id><title>Important: Shim Security Update</title><description>The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547) * shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548) * shim: Out-of-bounds read printing error messages (CVE-2023-40546) * shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549) * shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550) * shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
IMPORTANT: The new shim revokes ALL VERSIONS of GRUB2 before grub2-2.02-0.87.el7_9.14. Therefore GRUB2 MUST be updated to the latest version: grub2-2.02-0.87.el7_9.14 BEFORE or SIMULTANEOUSLY with this shim in order for Secure Boot to continue to work. Failure to update GRUB2 will result in an UNBOOTABLE system.
</description><severity>important</severity><issued date="2024-04-23 13:44:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="shim-unsigned-ia32" release="3.el7" src="shim-15.8-3.el7.src.rpm" version="15.8"><filename>shim-unsigned-ia32-15.8-3.el7.x86_64.rpm</filename><sum type="sha256">e205f2d8305e0b78da2a23ae1ec4d74aab02e8666f7ac0573866fdbf52ca7d5d</sum></package><package arch="x86_64" name="shim-ia32" release="1.el7" src="shim-signed-15.8-1.el7.src.rpm" version="15.8"><filename>shim-ia32-15.8-1.el7.x86_64.rpm</filename><sum type="sha256">f9b40dc9c290d5b52191e1ee291cb54f54bd2decf7caff9846910f154d7a87d3</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="3.el7" src="shim-15.8-3.el7.src.rpm" version="15.8"><filename>shim-unsigned-x64-15.8-3.el7.x86_64.rpm</filename><sum type="sha256">1960322489956f7c9e0fee46c0b1f582aa9f8f421121d9bb40fdee4ef68191bb</sum></package><package arch="x86_64" name="shim-x64" release="1.el7" src="shim-signed-15.8-1.el7.src.rpm" version="15.8"><filename>shim-x64-15.8-1.el7.x86_64.rpm</filename><sum type="sha256">22cbf183fedbf7bd3f9d2d686e657129a007b4d766f3498f6633df7de49997c7</sum></package><package arch="x86_64" name="mokutil" release="1.el7" src="shim-signed-15.8-1.el7.src.rpm" version="15.8"><filename>mokutil-15.8-1.el7.x86_64.rpm</filename><sum type="sha256">c0381e57fd3d566a9d884ed245c28a97fb5db1c6f56b62d93a63077d718a1caa</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40546" id="CVE-2023-40546" title="Cve-2023-40546" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547" id="CVE-2023-40547" title="Cve-2023-40547" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548" id="CVE-2023-40548" title="Cve-2023-40548" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40549" id="CVE-2023-40549" title="Cve-2023-40549" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40550" id="CVE-2023-40550" title="Cve-2023-40550" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551" id="CVE-2023-40551" title="Cve-2023-40551" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1959" id="RHSA-2024:1959" title="Important: Shim Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2002</id><title>Moderate: Grub2 Security Update</title><description>The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-04-24 08:12:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7_9.14.noarch.rpm</filename><sum type="sha256">de553d66e74eb6e3b7291f750da30dbb325c1c4eb33c4503ee423eebfa6049d4</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">5f59ec5b5ba3c614f0f6472378271d2b953a6a574efee9bc5bd3eca363cb01ed</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">108388534ab5669c827705a133cc30f5e1641a6ecfbc597074fe1c98fd198215</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7_9.14.noarch.rpm</filename><sum type="sha256">abb1623323af16e8fd73f12c1dba456f6b92b4a57d94672fc75150a79e8045dd</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">9f04dd1ad4933b1c0e401399052fe39d4c87fa9af4983150928cd5dcc7f4d77f</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">5de060c344853637840847f2dd6643619fb84110543232a75b7bbbff64326da4</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">b0752bb4a2a765df6f934dc5e17464bca7e00f5f5815c029c145afa6986c9641</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">8a17558cb3dc6d0c38515fb2f16fefc7a0e1ed8b825c0f1ee8477bf43adbc06e</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7_9.14.noarch.rpm</filename><sum type="sha256">72fe341a890b11586020e592b63e0ec987d05506b3f1a23b53418e605a7f5d96</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">92183c4ed0632506a9dfa50d34fac96dc53b4ebdb641d69e1f705377fdf5db16</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">516bae7d6c7518b69717c806a9cf27281aee56cfa3e37be492ebdd3c1db09675</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7_9.14.noarch.rpm</filename><sum type="sha256">9c52b9c63bdce728d5bf47d2c8c7a1de03c87359b8da295581efdce3ac56b976</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">926e8500cb90ae1aa6ae3931f1d2990822c04cb72f6a3a68ef2e735796469767</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2601" id="CVE-2022-2601" title="Cve-2022-2601" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2002" id="RHSA-2024:2002" title="Moderate: Grub2 Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2004</id><title>Important: Kernel Security And Bug Fix Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security fixes:
* kernel: use after free in unix_stream_sendpage (CVE-2023-4622) * Kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * kernel: irdma: Improper access control (CVE-2023-25775) * kernel: net/sched: sch_hfsc UAF (CVE-2023-4623) * kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558)
This update also fixes the following bugs:
* NFS client closes active connection (RHEL-22193) * kernel panic at __list_del_entry from smb2_reconnect_server (RHEL-26301) * kernel: race condition when call to VT_RESIZEX ioctl and vc_cons[i].d is already NULL, causing a NULL pointer dereference. (RHEL-28639) * kernel: net/sched: sch_hfsc UAF (RHEL-16458) * kernel: irdma: Improper access control (RHEL-6299) * The message in RHEL 7 ?stack-protector: Kernel stack is corrupted in:? is triggered because perf_trace_buf_prepare() does not verify that per_cpu array perf_trace_buf has allocated per_cpu buffers in it. (RHEL-18052) * [rhel7] gfs2: Invalid metadata access in punch_hole (RHEL-28785) * UDP packets dropped due to SELinux denial (RHEL-27751) * Boot fails with kernel panic at acpi_device_hid+0x6 (RHEL-8721)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-24 08:12:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">85c7c3767f97a197245c84b2d5d239e52a212f765679a2013ff68f6b5660fc0a</sum></package><package arch="x86_64" name="kernel" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">a215bf9176ac171af3703f8c45d6e6621d6f6d2ce4c2ea29341a7493e621608a</sum></package><package arch="x86_64" name="bpftool" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">17c07e3477c895a66bb5c88501f56574d18b9212f014105fb2699c78b52ed894</sum></package><package arch="x86_64" name="kernel-headers" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">1f1abf69033db1dd3be82b519f1fae78b9df2de0ed9ae8ddb293a58726748b72</sum></package><package arch="x86_64" name="kernel-tools" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">e7c74b0039e8ab1b1bbb5ea76ca60ac8fcf39cc7cae5be1c8a2e402d110eb944</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">f679408054e52eef048fa610a3e07716247e545532cc89f912203db8407a7e92</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">5faa45f1201c00caf00a824b5d0bef925ca3036d4cf259aec024b0ce5450c54d</sum></package><package arch="x86_64" name="python-perf" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">88255385c921df551bea5f3d19750b17a2eee06689d6b91a3f89eccf45f89913</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">6a15f0c30a63a29a9fb0bcabab646c9d9ee1b32fd92514e6b5a68a2b1b3e8dc9</sum></package><package arch="x86_64" name="perf" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">cf3cc9c6705a2cbe65cd973ed0addde6d273fcac8437cecf5351a2ffbc98c213</sum></package><package arch="noarch" name="kernel-doc" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.118.1.el7.noarch.rpm</filename><sum type="sha256">9b4424bfbc18595a30c25a73762427674af6836540345ff342cd74a998cb3d1a</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.118.1.el7.noarch.rpm</filename><sum type="sha256">7d8361f62fafbcfaa2d6ec717398c300db78c693c85387ed4351ead083beb4bb</sum></package><package arch="x86_64" name="kernel-debug" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">7a1fb05bbeaaa66ba9f9f65a88b7cfb485dada88626e074b6fccf90b5e194406</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558" id="CVE-2020-36558" title="Cve-2020-36558" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" id="CVE-2023-2002" title="Cve-2023-2002" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" id="CVE-2023-25775" title="Cve-2023-25775" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622" id="CVE-2023-4622" title="Cve-2023-4622" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623" id="CVE-2023-4623" title="Cve-2023-4623" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2004" id="RHSA-2024:2004" title="Important: Kernel Security And Bug Fix Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2080</id><title>Important: Tigervnc Security Update</title><description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents
(CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice
(CVE-2024-31081)
* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-29 08:58:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tigervnc-server-applet" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-33.el7_9.noarch.rpm</filename><sum type="sha256">fdaa2953aba5d18d06f8d606541a1b2ec1b74cfef56f022ee0bc02f60c18889d</sum></package><package arch="x86_64" name="tigervnc-server" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-33.el7_9.x86_64.rpm</filename><sum type="sha256">39886431c1b102e3aef949be9fe7107c0710a22ca042910dfe6462ced503dcb1</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-33.el7_9.x86_64.rpm</filename><sum type="sha256">a9dd08cdddf52dae3391416ea2ee088e60c58672abf9cb11b5c4ac55d735bc47</sum></package><package arch="noarch" name="tigervnc-icons" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-33.el7_9.noarch.rpm</filename><sum type="sha256">fbb4c6d0df2b7888ffdd23d8b5619d0ac83f946c8b39084b08b95cdf80de40fe</sum></package><package arch="noarch" name="tigervnc-license" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-33.el7_9.noarch.rpm</filename><sum type="sha256">194bd13249ee6ad299694362025856b55fe23b4054243b1c4e68abcb55cdbbd9</sum></package><package arch="x86_64" name="tigervnc-server-module" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-33.el7_9.x86_64.rpm</filename><sum type="sha256">d7aa613f092e0e42839c77c6b97cb2a2a75091b3bbd0d42b00ef1cd14817735f</sum></package><package arch="x86_64" name="tigervnc" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-33.el7_9.x86_64.rpm</filename><sum type="sha256">940566e6ba4ba98b4c9ed8c06be7ed68d2471417c41d545b2f6e5854198ede2c</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080" id="CVE-2024-31080" title="Cve-2024-31080" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081" id="CVE-2024-31081" title="Cve-2024-31081" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083" id="CVE-2024-31083" title="Cve-2024-31083" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2080" id="RHSA-2024:2080" title="Important: Tigervnc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2881</id><title>Important: Firefox Security Update</title><description>This update upgrades Firefox to version 115.11.0 ESR.
Security Fix(es):
* firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) * firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) * firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) * firefox: Cross-origin responses could be distinguished between script and
non-script content-types (CVE-2024-4769)
* firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) * firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and
Thunderbird 115.11 (CVE-2024-4777)
</description><severity>important</severity><issued date="2024-05-16 18:43:11" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.11.0-1.el7_9.src.rpm" version="115.11.0"><filename>firefox-115.11.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">55b3f7841e4098f37f5a346f303ee689395bc9be8e5efe3b0e96a1e5ccb54f3a</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.11.0-1.el7_9.src.rpm" version="115.11.0"><filename>firefox-115.11.0-1.el7_9.i686.rpm</filename><sum type="sha256">fcb8f9aa002e42dfc510d097a721581620a8463d40e7b727bff2e5e03f417f29</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367" id="CVE-2024-4367" title="Cve-2024-4367" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767" id="CVE-2024-4767" title="Cve-2024-4767" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768" id="CVE-2024-4768" title="Cve-2024-4768" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769" id="CVE-2024-4769" title="Cve-2024-4769" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770" id="CVE-2024-4770" title="Cve-2024-4770" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777" id="CVE-2024-4777" title="Cve-2024-4777" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2881" id="RHSA-2024:2881" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2913</id><title>Important: Thunderbird Security Update</title><description>
This update upgrades Thunderbird to version 115.11.0.

Security Fix(es):

    firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367)
    firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767)
    firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768)
    firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769)
    firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770)
    firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777)</description><severity>important</severity><issued date="2024-05-20 10:43:11" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.11.0-1.el7_9.src.rpm" version="115.11.0"><filename>thunderbird-115.11.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">f95888eca1b9df9142fbc591b71f10682ab0ffd6264ed25f746e3f2d612ba572</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367" id="CVE-2024-4367" title="Cve-2024-4367" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767" id="CVE-2024-4767" title="Cve-2024-4767" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768" id="CVE-2024-4768" title="Cve-2024-4768" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769" id="CVE-2024-4769" title="Cve-2024-4769" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770" id="CVE-2024-4770" title="Cve-2024-4770" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777" id="CVE-2024-4777" title="Cve-2024-4777" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2913" id="RHSA-2024:2913" title="Rhsa-2024:2913 - Security Advisory" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3304</id><title>Important: Libreoffice Security Fix Update</title><description>LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution (CVE-2023-6185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-05-24 08:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-st-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">b5b2d90f8468a6c8fc833cb41acb323728f26727ebac7a27350abf013cfc35c6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bg-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ef9622f9bd1d4eb951525595543a22050bba30dc1e3d0089bea6fa58065dd567</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-de-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">a3b47cac2b8fb9f3d0f229138c054be941af5c5381759fd1cce395d3f27ac166</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sv-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">25bb9c3bb53e3675929599cb36b225fbee3073d6d44a1af01d4cf9821b3c1a65</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">67f5137567d9ad9d16fb01a97f0c8fd8f17d171e9934bfd17f751675eb113678</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-sk-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">24f444d6954d85cd78c3fb489ce745f252fedcce1ab8892d8b1f5d8bc49ed5aa</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-fi-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">30db863d976679c99cb04ef3c7b435a0736c70b30795e3dba6909028a72f5169</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">bb2257b24f1427cd0565223008ee7e702ff516159428db37349d2610cb37c3e7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ru-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8f82f7a62de024c68b823355e638d6b8f64e351974c45d0d83d1a3372b03684f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-de" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-de-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">80005d57bd471955774fec5d0e74152e3453f581711d2ef418c947727899cabb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-writer-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6d7855be03d7d7b110eeafcb94398cd9c02027580411502df9b8371986b4fbeb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-gdb-debug-support-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2cb747b449861a615682d21f10a6a55152455dc5a3f662c6769b4ca583b506fb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-postgresql-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">459cb7ef55e54282a337cffe2e8118286c4a267d2d253348d9b9c59ab9b40b79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-et" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-et-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">a97a3949effcb6229a2e286d6e1a02d3458134353143dfa5f53b2e524ded6ffe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-da" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-da-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3eaa1fb335f4572b3bb75bbc744805f61fd173248a97384aed2f2c99695c7a71</sum></package><package arch="x86_64" epoch="1" name="libreofficekit" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreofficekit-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">9132367e34cb94680daabaca9391e60997147e2ad4274a5ae752cb695d394882</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-de-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">770e2a95f0cdc63a3a98368378cd40a82e8d8cab2b63851b8a0502b9e2446b58</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ro-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">fb0b63ce7c88d76be88f892e27ce54d77c8b1615e78480007d24dabd833341d0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ta" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ta-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3a9e919d0f16df1ed3c5212d2151a8f1d71a5c81ab6c7f6ec5e5ab4fb527e5f1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ts-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f00644d6bb6ef121a6be50f319bc7267f48a81c43f1026c0a86270e3b6b74fa8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-en-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">01e0851ef4d5e5d558b8830384cc22e7b4485d35dd2ad557f2f418277dcc19a8</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-da-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">503abfb816613a202f375dc0a186b136efbb56583be231d4c47bde605ab2ff2b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fi-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">feb8a5c95863c1607a74cf9f9f8d34b0aac63f0516c7318e4c0636f094a97e29</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nb" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nb-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ccd149e01dbddbd8561581401786f22fb5abf8d17d89ccdbe98fb8e7567ca0e9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ta-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">fc6876fc64f592dbef2a82fcedcb89ff128940d1f1d3efb158cec7d8dfdfb546</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">33f07e83cc97c56b8afb6f778a1d2726549addc0465442ff19a5dbccae35046c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-pdfimport-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d0c3a8418d14b6826a4c4fbcb183b38591e6e7b9e381e25a2a7adcb1eac9ecad</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e8da43cee532d8081c9b6429803b745ef2870a64f3c21ede5df42bbfe4c59152</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-PT" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-PT-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8ec1f5d1872b8993b1e272c5aab60966468c9700a052111915f7f0327d88d841</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-zh-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">9cc018b9c6e5a082f269bbc697500c07efc76b269ce60d0dc2eb311071174349</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-es" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-es-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">995ba00e29d88d777c737afb75a7d72c6a52e6cebf777749fc359c4e2e7394e1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">c34ef81db96a84c9b660d5328a9a1547568c819d286f6e20096bb41a032d805b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-eu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2f9062dc7c74b65d1fe46a6aa16bff321ceef6cdf8709230296b2aa0b90f1edf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nso-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8d40d448b472cf9ebf321e7bb72e9c352281913a7925249b3677f8650d71101f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0b3f57772f97dbd58e94bba840fb36fd0e24e2931be45ab5f977f6eb20491cb9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ko" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ko-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">7a2ec1147fba8a3ec5e7e20e808062f31b5cabfd9762063a29faa8f7b0f76e03</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-uk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">b85f75b2fdefaab2dc7d9717cca1706b118ac8fb7167627feeb249f5cf9ddf34</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e9256b8f39feb3541a0672034d4d310d1bbd973d23cdb977a4cf21b111f0530a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-rhino-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">75732ab688cfa9f7989cacbadd50a0b5174f23b9dbf5f241beb5b8800232e244</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-he-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0692fe12d41bd5b23726291d7d1469bb765abb3dcb9f4bce4f6c33309c406d72</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">5cac849c307b75917fca18076120b5ca54640dedffa241b68af804ee27f1c638</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-pl-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">e43f3b46401a800a651b87d46da09b528d7d5a186cf162e0a550176dd22115ae</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lt" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lt-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f5e99e8e1e3b2ae179f644ec4dfda2548d01a48bd36c9b4f0684b0536eaa0ac0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">952f84efdbdfdac386ed99332b7bae48a7b8362ab556d4b3c6ee8cb37fb1d1ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d1d86d10eab53d20db4f444912c986720d6975803fead8fc0b1ae5354cb35f42</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-xh-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e4d2182982dc57b03a81af5110930d01e8a2bfd0457226049a258b31f8742061</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-sl-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">1a5e3e534c20ed4a998986e5c76b18f5ae726a403b63bd9c348bb5bb07455cbe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk2" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk2-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">835c40cb3c82c537695f4f0560535b6f7351422b17726f8b1d77b789d0cac57c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-emailmerge-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2c58cb593f2e801b523a884e5117defd8eff181fd3a037b2baa3ade8c26a93c2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-filters-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">bee9125a5a79fd5187b4db55de62b35eefea3633f51ebaaaad641c60d5655177</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-cs" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-cs-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">eced567a62efb7becdae271e06bd653ac2982d6d4cbf4eef3e5029ce99e938a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d6c44cae2de2955fc1496abc321fd8c5d1462105e14f363bca7c69546aa0fd92</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-da-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">12b4ece3442cb939c0656517f906c8f84fda97be5a329555806c249c58f8e2e1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-as-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3e13d987ab00908acc8acc301757c292c99a39fee6338cc62e20a3c02ca6cc66</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">35f836a30502d60be98021719b9b0e1b24685e3c00cf5d0c668a95b120086c57</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-bg-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">263fa0cbe9f9c0e1be623195c1e7735ffda6bc58d705c8191ff8f429ba6e4c7e</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ko-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">f0884bafc9de29300689a3114fbfc8ab4836bd65896fc37b9f39f25d90aeec44</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-te-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">a4cad8fba4738a8c92a2721c93676bc60ccbb9767d400a1492c2097f31e005be</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nb-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">4d252c52077a4288157f9d320970da33401a5a01e75a0f82af9741993d2d85a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ve-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">eb589da6e7c4f3654fb12401fde271ce537768915b27b470e9039bad20348b3f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8f006eebe057cc3e00d8fe40be12661d8dcab825f1fa39caa96d8a07329445b0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-uk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-uk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8f6e2a26dd16041ca5bdb463039b6a4ee48896b1abbb2118359b59e9b3d37d4a</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-fa-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">3a22bc47f4d7d964cdd0d40e7c9918b3c6af71b5cefd9fd26204fbfddcaf7c9a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3c2d060d95957da026eedcf0df7fbe78d18f9ff8d8b935f985c9cd4d7afe536c</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ga-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">f87bbbec6c230a2543c8673dee70f84d13c2898857703047c9fa1b547ef42438</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-en-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">0e385e4782a6e3c95d5da3a50811c48d9420ac033626956d5ccfc3004710c1f7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ar-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">5c7cb5980bf2fd2a93526a0c34d31c822b8c95b61289a1fa08c489ec7e4bd974</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8df067fa0f0f155a2517b52a8f39dff9fdf58146ac3b1d4c919deeafd62e3814</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ee199201fb21b69e8e25b9c29526e40ee4bd652e4b9fe6a6c65801be41c079cf</sum></package><package arch="noarch" epoch="1" name="libreoffice-officebean-common" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-common-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">334f80ce2aab0f6c0f33e3f1f2b9bf05f6e0ad655703244ba6e3d4ef97890219</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hans-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ec9274963208072c1f6c4470df6218e8b4ea9ac14737ceff7dd740ae4637085e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-tr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-tr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f5a010af43e703876c4a74f30c3ee7af4a0c3991938ee093998e4f875b9748f6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-BR-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">333d7fbf850c543ac052c68dda2215ba101649262c2806ea36a79adfff503836</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ja" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ja-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">81f10f5b9362393c38f4f74862b43e409ffbba4d54abae792ed40da4b2be054a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-br-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d332519afe269f839027e500eed27758f17f7b4eac67572a6cee419fa23b2a3f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">48854e4dc8f6413a9f690cc09c49b28206647460b08a37a6e33fa57fb9bcbc4a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-it" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-it-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">41b57fac5e159ac5690d69197802663581feedb27870b12c8c82ab2054c82423</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-lb-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">db63268d90efacc2f86247c92ab4c488eb43177c046719bb6584426319e6f24d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ec645e165a51e39ee0435ecdd7a697235e3c9ac9e880837f6c9eeff36ec8a8d9</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-is-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">ff4ef613698619f75c15a019e09c690f64ea2d1a1ebd795f75d3c6262271d589</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk3" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk3-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3687079db1ff18a60b37e231b27bdf87d5d3a7f71fa66c23aef0443ad4525089</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">1fd217d63028a4ef826e52d84c1fd8dad8c5fc3c0c24687bb57fb732e5b2677e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-et-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">288ceb03920fc5f0a86b05912f10672773c2a1fc254875ff2e2beee0cfd6c1dc</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ru-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">25c50dd0bb305a7ece72c2df068c383cdfc037ea996211f31326c2c9c4616b96</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ca-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">21be9612e49226d7289f16ff17af4bc3e1a12631a2508c136be57e66c4be8c0e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-calc-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">1a17f28e96cdde37d2ad0fa5ee0c326f282ce2b88271e9ea79f60d57f2328ad1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ja-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6687646ea51414a2551f2c7a0d744ccfdca6a61697545afd6abd187eae26cdf9</sum></package><package arch="noarch" epoch="1" name="libreoffice-data" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-data-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">00efa97a7fe7c760f897a3cb717062501892d5dc992b3b7038c07035ca53274c</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-mn-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">4b257004d48893b2a2abeeeaaeddbc5c85dcf157d1ae583e3f51ea9f9a7115b0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-id" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-id-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">36716fca79c44542452d4129d51873cf51d0ed9a8ef1d57b7cd5adc4d85f46c5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hant-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">824536c5233463106a41b7b722f583086968eec27528fe875797cb5c7cf51f9c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d78dbe6fc27e8c6548bd63a233a1b730ba4dcc886535395617a20fae00062e0c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-el-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">62d5df20e227175ae561ec2ce7ddd47092664842dbf122f9723b642c08ab4502</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-BR" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-BR-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d2d74225259875f0673655306938564bab0fae9fd84cf62608b3d78359663a22</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">46f22749f99bc1581165da3234e3cb3b1ca323691c86b5fd1c37851ea273aa06</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-tr-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">54183d51af640e75658296d35bb8f066eab608baf98ae60fd1e2baed646ae44e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">74d441b41d8b72166b9f635fc0c57ca0eb0a64a636707e5a32fdcbcd466133ab</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-af-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6110c4ebca1618ddf81ae018ea17daa41f706aef71d980a7234489dee4989739</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0cde7a2b19ddc7fd5e1182cd683be4b8a057a8c7798c52eb3099c4f169b11d9e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mai-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">523b178440946fad18b97182bab88fe329e09b5066e99e2e290eb7cec888733d</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-hr-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">3dfbd19ff767da26f4d39f2bc17138451560210143eb01929feb4c03c37fa572</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-es-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">ba23453b2fc17a40dec5b4369c25cc18c051dd885c686a87fdc31389cb2922d3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-or-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">a5761c8380a85423d4ccfd9f76e9576a3b36ca188d3b049c8572d67eb42caad9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cs-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">1a8c71e08c7ec16b62edac787e5a4811fa0a816d9f93a6fa7b46cd6c8b958770</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-nl-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">6e89ea348468878aa44181b4960d1a000db0a9508f07409cfc497c74beb28b00</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-hu-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">03a142f4d6c65427bee84e6d0c2183368347c16c102f5a1bd502ffb32243f487</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lv-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e3eae24e2368fc10c93aa3c362971ac4de8cfebb765406901df5731a6d941720</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-vi-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">ae4097650f241639b5c19eff8de2aa1a21476787f7827e816652130261870ed7</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-fr-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">d851171b4adec774afb0e2e51cc1bac0bdeb284b1152b8201f7ef1083f6d4238</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ga-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">bd903c8d3132bbb7d6560c03135ee372cdf94191e9c0532f0e93f071573554c8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fa-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">900eeac9034f995c1167ff5d923325719fbfdcc3658a59b30746decad89ca707</sum></package><package arch="noarch" epoch="1" name="libreoffice-ure-common" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-common-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">fea4a0314953a510d994c065168bb8232ef9c8b59ccc51b7812c7d97bc597a7c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lt-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0b07524e0d217876e66e60cf4da6ee8044e2970986a4b292d43eee1b5e45850f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">fcd175d83ea8b1a746990f1122f38c0bca2e24e3c263f2252378d515276f0647</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">34bb7c1405956a5ef18327b95c1ee5f50c3193f56d763463f56a34490a683dcf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-ogltrans-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">08576a8f22c052528909f8c2c353ddac1b7be69eff91b43f774ca5388c61accd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-x11" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-x11-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6b13eb1ba3ec8391015d8f7449445978c3a7dd78e36b832e57a2401a7903eed8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-pyuno-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f5103765444de86e1f0ae5ac0ad0151c8a677276a8040102c2ac60b1dab72a04</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-sv-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">f54dae95768f650fbe80910d4d8fa72ebed2e95279d2b5bc475f6637c4d2dc5a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-impress-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2d83d8093b8a33ac201107a1033384681084230f96c2a0fb3c5c04e6e73bc465</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-core-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e2dbc3f59ac23d790170a212d1ecd32479264af09f8c861d497dbc4bd4b3f99a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-el" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-el-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">52b51d96924f8dda4101302a14e2c5d4235396446bbb83bc649ec96056b6e623</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-id" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-id-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">273ed25018114ade0859ecba406f22f583eb45d97e4c04069da6b36bcf82430e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-PT-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">9c32f7dcb80371360a266b61a8c079b3056068ae280d702a05ce1134060a918b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">40210b470382e6a8e8a735f0f46dbfeed39baddcb4cd42ff28dfbb6d7411e347</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cy-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">c74f06e24587429d98cc8061bef080838afeceb9f7716813418740ebd8273e18</sum></package><package arch="x86_64" epoch="1" name="libreofficekit-devel" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreofficekit-devel-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0a878b76c7266a437493e95de61d472ed74f376777149100fba53a328e75dd89</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e745e70ab7050fd535b37d8519da0c9593a94139c9e932f189937276cb86fba6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6e2085402b65195e469936a84c4e0ada2df03470098fa406ef14cb3d7abebaea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ro-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">c9d2c929ba2e6f77324b8a0d0000286e9d2f5b35cb8672be20580b367e3f7d07</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-he" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-he-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">66ef1a83208d83739a80d830c0784cdf31e1b3adc85b268d53600cdfd8e459b5</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-af-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">9f0aee2ce44078eece54d5efedf9472cdd17e5b721083bd24a68fae7b8077489</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hi-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">10a8d0d0c113f8ed3ea7c7eb8de006e306d4b8125fbc7dbc0c161088466acaf2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sv-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">aae7c8bf2edf349a3121d67bbd605f2d6b47e16b9fc02bff54bd75a1d9260c2c</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-sr-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">eabeb1624e04b2e8e1e4b026c3db53592eafbc89510834ba9358386e8fbb4070</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-lt-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">adc1951c23af6b856d8e53a934536c42f522cc21ff6579c0275579db8c77302b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-nlpsolver-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">7d6c23a3e0b5848db9023e790378fbb7d0f3bad8a1b2eb1df1023dc513da33de</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hi-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">28713067ec261e59919feb54b5daf1f59d89629cb8ebbcc31d69e997642a2b7f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-it-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">68e2261a2d676040bb18a21c6829562ef86f6f9cbc74410f58b80bd9e4b92bf6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3151bae8d9e845b8820b79764f22bd2fa9d6426540586d098077eba36ca9d5e2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pa-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f2df0d8663d1f81b965e1f07f86905fe33316b436161bbfffec1a0e3c6634839</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">dca5a1fe45d1658c1d892adf7f350cd423a7696fd70add7c2852195e8f7291ad</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-graphicfilter-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">b061cbb168be3d761ccec90bacacc8685a405796b5abc8edb8193565b56e4164</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hant" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hant-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">4c1723f66ce9ac592922eda9c8b22365c37037afd020126589f6abf841c9a8d1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ru" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ru-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">bae1548b3606ea5073e3f08868648bdbe8843445fee75b0a2403920b1a1d5501</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ml-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f333b058fab1f284630e34b82048d54f948c7673b8ed7ff2c7ed224aefe0f977</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-xsltfilter-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">23d2b26cdcc91af44ce506930636e784e6f2b2b8c3f5b8152e7fca8698faaf18</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-wiki-publisher-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">fd29596b851b2930224e5f6e17976d821074ac141da6c47ae9091c434a16f990</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ja-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">adbc8344ba0e583dd7bcd01b3831888f371e5c3bf21269cb8a408791051bc82e</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">b3c9af8786aec0e834aa04e420696eb699c249d7c6ae5ec500b000ac6b32170e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e897a412b36520ab68996404bed0c71f8a4153fb957b2a8af8b6aa8d5e086ba9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hans" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hans-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">7be137e30909aae32b7c166c9b0f98c1b4153d97c36400873a7638a8c2670448</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fi-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d0157252bf2cedcc0bb2222319be3c75bb0064b6d84a0789a01db6c65186800d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-librelogo-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">dc83fdcb2f43ca05652f7927cf00cf5f6143438152da7a408bac3fe583081161</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-base-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">887102cc2db652b08fd0f58637b3d369f3473e5153b02f0588a0ee19f3db95d9</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-cs-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">013be391bb6fa2f2ffa93f94dbfa4edd4bfbd491dd9d831e43b8c3479a76d565</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-doc-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">67bc2d543bc622a9d633fe99e1c936b18e06509fbeffdb4594da4b7626ee16a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-dz" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-dz-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0c2a60070ad1da0e058dd41256e27533a983e224bb2887557bec928fbd239dc2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-math-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ab630ec793f92a7f88a219094c8e04cedde06f7bb94cc05d1dce8f2c76c928e4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bg" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bg-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">66b7e7596c7ab3df5f3fd0182811b11837f5e84a0f96febc44857a0a69bcbe73</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-pt-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">d0f87aef7a5feff20056de6819f24b2eb47cd8e396051492b8e74eeb209a7cfe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-si-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">66706e23d5e356fbabbd9b1dd9c69cd5f1f2a0ec0ef8d7bba31cc5a9b55c9c79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ko-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">57379ba16ce0de4f414f07417310bbe575380bed1a5defe9541c2680da83cfe6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-glade-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d75a3342f47bff83ee73c8ea1b59026981c96f5eabf176581448a89a95b264cb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lv-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">231063843eecf371187f6a93f64da1fd64da0be46047094e24df3c84f18e87a1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">66c768f7007f7c7d414b7296ce61e0296937fae21c8a2039c9f63c2e56956991</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ca-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0e4a2ffcb832c103935da256e7d70f9489649921a15c0c19b3590afcef2831ea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-dz-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d6e5eef25576f02eeeb978707eb21b89801b277e69c36ec7867bd831af1d280e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-draw-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8fe78c5ec0028bd7e8a0862c9d4cf290fbf3f61f17b5644e82849ee8ba375ca7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ar" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ar-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">12fe3abfa03244318f8987e03b81a3caafe523b68877ef3edbdc88be7348bcd2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-eu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-eu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2cf8ba3b420635ef922c4cb00f529b801a17d195c54ae12ec4b6251f9a18fecd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">52ef4f9297e0e368c60f0ab98566fc36d9626232fb4f236e3e3ed98709e96654</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-it-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">19a45ccd5f50ed266d11730b04ee76ac2a82d08aaba1934c0fd1e1ac6886ab81</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-bsh-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0b03509e72ea4609309321ec64ff1daf6239cb5159594ade10aa4916fe9f26bc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-si" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-si-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">733aa7715ca452e249242ef23a771ed3ed5a0e5c3c0af55bab664e084ee98699</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-th-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">7a02caf1b3e27b52f981aeeaf0b0fd23e83a9f73df7088d0a3421fca44026bd1</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-opensymbol-fonts-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">c05ffb252ef26f4f92684828b6202a25c5e78218e4ad55c12973406bf1cd3d45</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-es-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">c43335de3d14ae55f043111782317c055cf2cf8cbb5fd533f7c1c83daa2aed35</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ca" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ca-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">89c2d9397d0860f1cb5b554751bbe3f2dafd7334570e85f302bba63cd0d8494b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ro" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ro-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">5be883281076f9071937161c50a136b6553ffb46c4a0a268b0309f952936272f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ss-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">9b1a8e7376040cef9dd8ead12ad46b24787373cac049a6da2aa84a908657ac87</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6185" id="CVE-2023-6185" title="Cve-2023-6185" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3304" id="RHSA-2024:3304" title="Important: Libreoffice Security Fix Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3588</id><title>Important: Glibc Security Update</title><description>The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Out of bounds write in iconv may lead to remote code execution
(CVE-2024-2961)
* glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion
(CVE-2024-33600)
* glibc: netgroup cache may terminate daemon on memory allocation failure
(CVE-2024-33601)
* glibc: netgroup cache assumes NSS callback uses in-buffer strings
(CVE-2024-33602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-06-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="glibc-headers" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-headers-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">843dd0d3534fe6de4d95ad59b4e49ed8ec36148e16a5be1024bd64c62a17db0d</sum></package><package arch="i686" name="glibc-static" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-static-2.17-326.el7_9.3.i686.rpm</filename><sum type="sha256">d39f99534f379dd0ec18247727d0a01ec9251de985d75d9f63f200337cfbebcc</sum></package><package arch="x86_64" name="nscd" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>nscd-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">bc1c535d0db6187e128a5af7965d1346c3cf0492045602b3cb2ecdb083bfed64</sum></package><package arch="x86_64" name="glibc-static" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-static-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">7670b83eefa3e11179becdbcb635147df98cc1c0331612d2b4f2d40317b738e4</sum></package><package arch="i686" name="glibc-devel" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-devel-2.17-326.el7_9.3.i686.rpm</filename><sum type="sha256">bb730c521722df672043b2b40f49625768e9bad4ffd700790e09bd63900d8500</sum></package><package arch="x86_64" name="glibc-devel" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-devel-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">4ab00831127885d667821613eae4e2dbed1d7eebb1287325c0c1fdc4dda42819</sum></package><package arch="x86_64" name="glibc-utils" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-utils-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">7665222bf18b4e0b158a3e9bb6a4da884f20ef0e0c8db284bf10b7c5d0d89c5f</sum></package><package arch="i686" name="glibc" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-2.17-326.el7_9.3.i686.rpm</filename><sum type="sha256">c8c61117617e6794ebadc6510b43c5e721fae3f77a1aea9fbb7e2b6a531e98b5</sum></package><package arch="x86_64" name="glibc-common" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-common-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">6e7f04ad6991bc8f7a6b8fb30137c2ca7760aba5f7d81572a2fb1d0a3cd560a9</sum></package><package arch="x86_64" name="glibc" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">8a4fd18dc3dae3f8f3c6f2595feb00b528d2cc3fd8104e7e8c794f5fff8e1c26</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" id="CVE-2024-2961" title="Cve-2024-2961" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" id="CVE-2024-33599" title="Cve-2024-33599" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" id="CVE-2024-33600" title="Cve-2024-33600" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" id="CVE-2024-33601" title="Cve-2024-33601" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" id="CVE-2024-33602" title="Cve-2024-33602" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3588" id="RHSA-2024:3588" title="Important: Glibc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3591</id><title>Important: 389-Ds-Base Security Update</title><description>389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657) * 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-06-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base" release="5.el7_9" src="389-ds-base-1.3.11.1-5.el7_9.src.rpm" version="1.3.11.1"><filename>389-ds-base-1.3.11.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">4bb008c67054c254644ed9a188102cb4b1b0fd7db5f89b1abd1eaee2e7447aba</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="5.el7_9" src="389-ds-base-1.3.11.1-5.el7_9.src.rpm" version="1.3.11.1"><filename>389-ds-base-snmp-1.3.11.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">2f6a187729fd8008655829d30a03a9815705703d6e6542300457e3c7c01cb463</sum></package><package arch="x86_64" name="389-ds-base-devel" release="5.el7_9" src="389-ds-base-1.3.11.1-5.el7_9.src.rpm" version="1.3.11.1"><filename>389-ds-base-devel-1.3.11.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">c248d741ee208387787d00e8fc5b6495693ccb0ebf51e284d6e4da368a2e4dca</sum></package><package arch="x86_64" name="389-ds-base-libs" release="5.el7_9" src="389-ds-base-1.3.11.1-5.el7_9.src.rpm" version="1.3.11.1"><filename>389-ds-base-libs-1.3.11.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">4243aa3daf6677e330b5d5070f6a23bc08189c76f4c7f7045d6572533a1dfbd5</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2199" id="CVE-2024-2199" title="Cve-2024-2199" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3657" id="CVE-2024-3657" title="Cve-2024-3657" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3591" id="RHSA-2024:3591" title="Important: 389-Ds-Base Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3669</id><title>Important: Less Security Update</title><description>The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors.
Security Fix(es):
* less: OS command injection (CVE-2024-32487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-06-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="less" release="10.el7_9" src="less-458-10.el7_9.src.rpm" version="458"><filename>less-458-10.el7_9.x86_64.rpm</filename><sum type="sha256">7d95fae06c53a8ff59f8d569fe46081129eecf1d791b94d9ff3b6d46c8c9bd04</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32487" id="CVE-2024-32487" title="Cve-2024-32487" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3669" id="RHSA-2024:3669" title="Important: Less Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3741</id><title>Important: Bind, Bind-Dyndb-Ldap, And Dhcp Security Update</title><description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bind-dyndb-ldap provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) * bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-06-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">b044f5a4c39d1dd29ce2ccff898f9ca792351959be1c08b4610acba6a1fe58b9</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">d24c1e0b80bd65c8251468edf20361dce51914038ea58a76b78af3b36dd78f06</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">fcef407deaff523bd33246988e7b8a225328b4b994edd029ab00d44294eaf4cd</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">fce5eb3650a9d7c2521368afbb5e605bc03375bf094563d2cd77d8ca45833e40</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">7239f50fe947c5ac7f39c1a01075306f971286044c9218e9d58f3cc101e0ca08</sum></package><package arch="i686" epoch="12" name="dhcp-libs" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-83.sl7_9.2.i686.rpm</filename><sum type="sha256">e0dff60c3ed7241a26409728873c760de880266ba724ce8142520a1ad5b1fee1</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">0534337fe5307e8d85d0625084b5f624ce304d777f48191c12c50146f66853ee</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">bd5e70a0212accd5936d046ed9fb4c5a8d2dddd4fa7ad8b75af8e091fb5bb8d2</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">8643b0b2c5e2f71c4df53fe6211e994ea852a88f631f910949dbbe2a58ee796c</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-83.sl7_9.2.i686.rpm</filename><sum type="sha256">c3303bca874a8ac6dab1fb338cada5e9a2dbf59fedbe101cf48b2a4d1a5595fe</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">1b8aede2173ffa6bd9289d4bc77a420238c59d11b0ea3d1da9f66045c8e01805</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.16.noarch.rpm</filename><sum type="sha256">3c6cfe6a108e6d941d432f6ebae3078f9325041699498eafc1ad3035185eacc7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">56a99c96032ac99d323a9f83823a4917122ac100ab4bc6e1616cf78ce9f58928</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">c40153a8d482a16f43689a92dd75bb0c130ebd094c294e7981c4f0a2292933c6</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">a8311e89008970b7f435d37d08840003edc0485ca9452f3b9080062f4eec04ca</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">9f9e9992dcbcbd5720ced850ac16d28a0326a39ef42f9669e3e80df4280cd525</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhclient-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">8c2ff2529378c6abf141528f974b617367815d0197f11598a09ac8820edddde4</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">853121aefeeb2034ab53a9ba2fd9767de727d4e93183f3ababf92334c7c38d43</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">321f572da23c12f51a046c20862ecf1d7d0844778c944b9ba1d52e4e17335918</sum></package><package arch="x86_64" epoch="12" name="dhcp-common" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-common-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">53490b53a48f1d43b8016ace88b6fb33690e6d0c2695f9670886c5c9db6dd9fe</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">76cca9b75645f52f5edb6ed39fc5a1d160a5aad3a6970ae56df01dcb84e7260b</sum></package><package arch="x86_64" epoch="12" name="dhcp-libs" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">20f7d3db9eff4dc2ca1e7980bff380be5b4715f98b6bc2d7cfb5320f0f86607b</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">92c35f94753224ecbff8cd57f0dbf638a730c5c1eed246974f29c64e04bbce95</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">bf6c365df6a147fd248a08810bdc4ff6b818bfa957010fca0bbddab55cc9c485</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">3f058a758221e6b4a7fa74f29406c9779766f8f38a9828a1302a45caf9724a30</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">031585ec8dc96c4fd5dfe1ce220340a60a557ae2bf7899df13c5be3d6f5a2ce5</sum></package><package arch="x86_64" epoch="12" name="dhcp" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">834691aae0477a2f149b66ae29c42bd7b3066b4240836acaa5d5ef8719f24d68</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">807f6702ae1bde7cdbb67ff748525b2209ae5497a2947cae53b9d9471758dd83</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">5adaafa30648022229bc65fd33b6676c658482a11aa919f733fa5ac68903656d</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">a78b617d9ea3cc0d893b0ab2c12fb4606e1bec7a1153d6c2174312a57e55f907</sum></package><package arch="x86_64" name="bind-dyndb-ldap" release="7.el7_9.1" src="bind-dyndb-ldap-11.1-7.el7_9.1.src.rpm" version="11.1"><filename>bind-dyndb-ldap-11.1-7.el7_9.1.x86_64.rpm</filename><sum type="sha256">891a2dd866f20045a500b99c2e15b34d8d0f3c71ad6f27a26df9f03d4fabf1d0</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">1ce23641aec877c25ea87627b60d907e1882bf8b51fe4eca4d6f72be97445686</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:3741" id="RHSA-2024:3741" title="Important: Bind, Bind-Dyndb-Ldap, And Dhcp Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3760</id><title>Important: Ipa Security Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* ipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-06-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ipa-client-common" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">7821701b54f781b31921062f9fe63e974a21123e9190ede8f5187a67d586d982</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">91f72ff9818e271628763b73470d0af7890196d4878118288e30b18bd07be825</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">fa2f9dd34d8046319715933616a82e39bae58008145c5c3492de1a296c2e1384</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">068d077c2c07089fe3edecc5e44ff8fb5aa2766136207a0ddb0473bae25ed422</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">8d67fb74ee961ff0b2f415baae48692945350964f9516117a217449423fa4d3a</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.17.x86_64.rpm</filename><sum type="sha256">3b0f0ad7a2147d1f1f10d932152de92d1dcb357df6730254e2e9559580d7733b</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.17.x86_64.rpm</filename><sum type="sha256">36f137526fceb17fe43af9a0ac6eab125cdb4df6c80c7c486ab8c74298d04a31</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">8f54bcec34e770e33290bd3059dc06d38d3f315c93587a5693525c28dfdf5285</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">36c75ccabfcc8b38143e63be8041ee675af3c9cd2f5dabfd72ec0fecda00a3fd</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">f763230923cb440bc060d9ac2280a90d77795a1ee5e26b7b7f06ea8219b6709f</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.17.x86_64.rpm</filename><sum type="sha256">93a87fc0e2212cf1e31ad00298ea392d9ad94739874fad14c04b0f2b7fb6410b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3183" id="CVE-2024-3183" title="Cve-2024-3183" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3760" id="RHSA-2024:3760" title="Important: Ipa Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3939</id><title>Important: Linux-Firmware Security Update</title><description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi (CVE-2022-46329) * hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-27635) * hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-40964) * hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-36351) * hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-38076)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-06-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl5000-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-83.el7_9.noarch.rpm</filename><sum type="sha256">971551d77a561506a1454c441d5127fc64f1e0ad7f40b39072602d9e3b4145d4</sum></package><package arch="noarch" name="linux-firmware" release="83.git78c0348.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="20200421"><filename>linux-firmware-20200421-83.git78c0348.el7_9.noarch.rpm</filename><sum type="sha256">ca8cb0dbabae917a72b4843c4d4f884cc381e8176bd65e0969b3665c96aa8312</sum></package><package arch="noarch" name="iwl135-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">dcf942aa2f2faf0e6a3b6ef4f1052dadc381159cb4ef4629b15c8a54db33feba</sum></package><package arch="noarch" name="iwl7260-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl7260-firmware-25.30.13.0-83.el7_9.noarch.rpm</filename><sum type="sha256">946714c1fa268dbb4e08437b0300a82d7502b214f2fbce77802fa5628d326b13</sum></package><package arch="noarch" name="iwl6050-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-83.el7_9.noarch.rpm</filename><sum type="sha256">9f166724d8478f203194ac63efeab50449daa38d0cd0cc994dddee9511878cdf</sum></package><package arch="noarch" name="iwl3160-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl3160-firmware-25.30.13.0-83.el7_9.noarch.rpm</filename><sum type="sha256">e7177f501675aab4fac5cfc957f315fd4f80df283ee5460f2a95cddcf623a8be</sum></package><package arch="noarch" name="iwl100-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-83.el7_9.noarch.rpm</filename><sum type="sha256">da392ebb2385ed063ab4c8fbd17f3a9396ef72fb9d2a441bd5b4bdd8f6c31b9c</sum></package><package arch="noarch" name="iwl4965-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-83.el7_9.noarch.rpm</filename><sum type="sha256">cd2b70ee45202cacd7ded2c6904c3931cd2f665f4468d19d3046ed9d4b48d699</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-83.el7_9.noarch.rpm</filename><sum type="sha256">b70316faf331baff817139200b7d02fb64bd6f60f7997af330bcd58c619c9367</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2a-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">1b433786cc7bf5829a3993953d376776a484893a76868b102e92de20f58e53d3</sum></package><package arch="noarch" name="iwl3945-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-83.el7_9.noarch.rpm</filename><sum type="sha256">39dfe518a7de51399501c7b8d8d35c6e9dfc54ac4bbfb69128a3cf98f3db34e1</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2b-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">4d77048815d0695d8f291972a83a9aed8b31382cafcab4fbc914a5b5987743f8</sum></package><package arch="noarch" name="iwl105-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">a95c72b8a7a95e1382045ce454596ffeaaa69489565da2965939ae25b857fd49</sum></package><package arch="noarch" name="iwl6000-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-83.el7_9.noarch.rpm</filename><sum type="sha256">4f7099c4686c0a5e23b3a3aba6637a67680ac60ddf0357fcf2325d465d87dda5</sum></package><package arch="noarch" name="iwl2000-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">a6f9f3d124b68eaa5cd65e78dce1cecca07fe5fed3042426dfc5a1db16f30554</sum></package><package arch="noarch" name="iwl2030-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">c9de442c37261b41d340289a80d0a501999d78517f39e35cf3fa4ea9b955a6c5</sum></package><package arch="noarch" name="iwl5150-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-83.el7_9.noarch.rpm</filename><sum type="sha256">9bed3e483a07f2f8106eba69a19f6ef97f370094cec44d03ef022392219a7d5b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:3939" id="RHSA-2024:3939" title="Important: Linux-Firmware Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3951</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.12.0 ESR.
Security Fix(es):
* firefox: Use-after-free in networking (CVE-2024-5702) * firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688) * firefox: External protocol handlers leaked by timing attack (CVE-2024-5690) * firefox:  Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * firefox: Memory Corruption in Text Fragments (CVE-2024-5696) * firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-06-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.12.0-1.el7_9.src.rpm" version="115.12.0"><filename>firefox-115.12.0-1.el7_9.i686.rpm</filename><sum type="sha256">41e8de5dbaf7edd561b02da9f156216c5982e2f4326644467119227a823fdae3</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.12.0-1.el7_9.src.rpm" version="115.12.0"><filename>firefox-115.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">2feb1182f4e9c3847308dc41f7149bbe823c5079ed219674ceec70caf01b8355</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:3951" id="RHSA-2024:3951" title="Important: Firefox Security Update" type="self" /></references></update></updates>