ENHC0002461Openafs Enhancement UpdateIt fixes a wide range of bugs, brings a new "vos remaddrs" subcommand to replace the slightly confusing "vos changeaddr -remove" and allows building against newer ncurses libraries.Scientific LinuxScientific Linux 7kmod-openafs-1.6-sl-327-1.6.16-0.226.pre1.sl7.327.x86_64.rpm4104dec3075c58c20e56a86a4a6ef8936010d664912d677a7f24bceaa2861744kmod-openafs-1.6-sl-1.6.16-1.SL72.el7.noarch.rpmb4591da8d0002c94a028210f1b506e58b78201e1f8a6b2e1908835da4cb1e6caENHC0003210Sl 7.4 Openafs UpdateScientific LinuxScientific Linux 7openafs-1.6-sl-1.6.21-274.sl7.x86_64.rpm72bd7451ea238ef89939e5c52e878043a0bda5fb3ba60dcfa9c6535335ae5834openafs-1.6-sl-authlibs-1.6.21-274.sl7.x86_64.rpm0d1b727f42259607ea555ac25cf4b65e56188facc22f30c2a99230bf53130711openafs-1.6-sl-compat-1.6.21-274.sl7.x86_64.rpm8c923e34d9d4a1c32bb8520c402143e7f25e5abf82760185293207b861d27065openafs-1.6-sl-devel-1.6.21-274.sl7.x86_64.rpmd81df32fa95fa955f242beaf8b89262d8c2fe4d44580cb4bf312f826e033e46eopenafs-1.6-sl-kpasswd-1.6.21-274.sl7.x86_64.rpma851c4c1e53b0d7c64ca81ccdc1ebf00f5796713d77c742fb70e3ec04a402449openafs-1.6-sl-krb5-1.6.21-274.sl7.x86_64.rpm69201605c734418895134f1cddc4dfc47cba1b17e9281df9eba3d93bcf1b3b11openafs-1.6-sl-server-1.6.21-274.sl7.x86_64.rpm637b61e05808ec8c02476cf1c8f246bc4ec07405ed94dfe7ccc0cc2a6db80bcfopenafs-1.6-sl-kernel-source-1.6.21-274.sl7.x86_64.rpm04592eae8887475acfa024e02da741c77a5419a5f91d5341929ba0bb1476cbfdopenafs-1.6-sl-plumbing-tools-1.6.21-274.sl7.x86_64.rpm3d401ef01676b1d9bbd6657be3a4465a71e25457b73192406375cc4d850659b5openafs-1.6-sl-client-1.6.21-274.sl7.x86_64.rpmd531b2b577d72e49409249f2c5b4e08c33b147f10619e8d5bde8f5accbd76438openafs-1.6-sl-module-tools-1.6.21-274.sl7.x86_64.rpm962a1f178b759204480bd69535fff369ca72e969b0e8cc809b067c3dafaea9ddopenafs-1.6-sl-authlibs-devel-1.6.21-274.sl7.x86_64.rpm4246f70345377b0a5b608638da3ffda899a3e4d3934e64db7f0924c711490d66kmod-openafs-1.6-sl-693-1.6.21-274.sl7.693.x86_64.rpma78daf0649ad30083e799cbbd5e924a603f3ee18f2db3d10263c892561974575ENHC0004616Sl 7.7 Artwork UpdateScientific LinuxScientific Linux 7sl-logos-70.7.0-1.sl7.noarch.rpm84c525940c491793f6e3fa06f89a406848cc6db70a52b6865c11d9bc8282d6adOPENAFS-SA-2015-007Security Errata Critical: OpenafsThis release fixes the high impact security vulnerability named "Tattletale" The packet paylod of Rx ACK packets is not fully initialized, leaking plaintext from packets previously processed.criticalScientific LinuxScientific Linux 7openafs-1.6-sl-kernel-source-1.6.14-219.sl7.x86_64.rpmb74b3b31366fc027a172ee02d2159b85a41cfdfe546ec0169c063d5655217b1aopenafs-1.6-sl-server-1.6.14-219.sl7.x86_64.rpm467ebed896ab35bbf6c02ab86866ac570c7b8e422d000f4cab8f89884068e757openafs-1.6-sl-module-tools-1.6.14-219.sl7.x86_64.rpm2383bc2e82f2c97c80083b61e87474f6798b562ab4a5d12199af6cb345006ba0kmod-openafs-1.6-sl-229-1.6.14-219.sl7.229.14.1.x86_64.rpm586c577fc41e1589cc1826549ebc666fffad5c942f3df1444aad8b4542a78feeopenafs-1.6-sl-devel-1.6.14-219.sl7.x86_64.rpm9159a2087114016528b21e2ee7712b29de91623a0f56d79bf0b277375bbeccdaopenafs-1.6-sl-1.6.14-219.sl7.x86_64.rpm448783495fa82a081c6c47324147ad6e10c8c5004e752378d70f9a490606de82openafs-1.6-sl-kpasswd-1.6.14-219.sl7.x86_64.rpmbdcd812108e1da40b87de4c4ecb3506f66aa4093cc59d7be4e1263a41bd5eeb0openafs-1.6-sl-authlibs-1.6.14-219.sl7.x86_64.rpm8899e4753dce7448e0bb8bf6139c044a292ec1abf87d14b5c93e1f9d193b99b0openafs-1.6-sl-compat-1.6.14-219.sl7.x86_64.rpm918811e36578237c9ed1a5435771328dd72dfbf8265ce44cfd62c42a08d9fa01openafs-1.6-sl-authlibs-devel-1.6.14-219.sl7.x86_64.rpm1d28108bf00e5aae7d1718ea4c5da9addc875139b2550c0f1fffcaf396a1c647openafs-1.6-sl-krb5-1.6.14-219.sl7.x86_64.rpmca3a076d0630d8acd6e935ef861232ddf8d6e8e71a14d4b449f0edafffbfd5d2openafs-1.6-sl-plumbing-tools-1.6.14-219.sl7.x86_64.rpmde63682aca0e58f6f7bc4bab355c88a54bf22c15fc3068d06216911ef2668502openafs-1.6-sl-client-1.6.14-219.sl7.x86_64.rpm40ab5cbd72eb8db238fafb6a5c942f096d60485f860743f7a0b1ffebedec40f9OPENAFS-SA-2016-001-002Security Errata Critical: OpenafsThis release fixes the vulnerabilities tracked as OPENAFS-SA-2016-001 and OPENAFS-SA-2016-002. OPENAFS-SA-2016-001 (CVE-2016-2860): Users from foreign Kerberos realms can create groups as if they were administrators. OPENAFS-SA-2016-002: Information leakage over the network due to uninitialized memory.criticalScientific LinuxtruetrueScientific Linux 7openafs-1.6-sl-plumbing-tools-1.6.17-234.sl7.x86_64.rpm037cc5a247e1b2b7f47a5b039a1f25d32df574fa7ce3358920e84b57bf54cf0aopenafs-1.6-sl-kpasswd-1.6.17-234.sl7.x86_64.rpme8ce771b6210d9d199153c50b51a34e4d94888bc11484ae7d0f04f3436b0ab9fopenafs-1.6-sl-server-1.6.17-234.sl7.x86_64.rpm22e947b51210e356d9264b31258cb5eb006bfc4c978bf59b9e7a9f97366a23caopenafs-1.6-sl-krb5-1.6.17-234.sl7.x86_64.rpm85c1590d17b9dd0d08799f91e01567c64e1acfaf03c283608f15e8f558429e8eopenafs-1.6-sl-authlibs-1.6.17-234.sl7.x86_64.rpmce2071ca7ce229cdc416117a836a577ce9402b3e35307c5ae570decabfe5ff89openafs-1.6-sl-client-1.6.17-234.sl7.x86_64.rpmf8cac1ae3d5ecccb25dfad3b1b2c926fa673b12855d3d25909483a21f0f775d5openafs-1.6-sl-module-tools-1.6.17-234.sl7.x86_64.rpm1f333ab82c7391bc6f8f69b1c3f67fa490522d4483f6c94763cf97e9bf6c48a7openafs-1.6-sl-kernel-source-1.6.17-234.sl7.x86_64.rpm704ec544e1cf81f7f8f4345705a27947292723a19ab684e064fa446dcb600132openafs-1.6-sl-compat-1.6.17-234.sl7.x86_64.rpm048e7b3651eccbd7a2ce51e4ed151097a6454743b53dd45884b7595b71dc00b3openafs-1.6-sl-devel-1.6.17-234.sl7.x86_64.rpm872c51ee503ddea5cb211685718cc3a3a6f058c3c3321dbba3d1940c5dd378d4openafs-1.6-sl-authlibs-devel-1.6.17-234.sl7.x86_64.rpmf552c2888dae671560db39590853892e0640cf8211d6a30687674c5ed10eee57openafs-1.6-sl-1.6.17-234.sl7.x86_64.rpmd5b68b478ec950df51042e08598d9d623e7bcbd22325995c5bc46feb72735116kmod-openafs-1.6-sl-327-1.6.17-234.sl7.327.10.1.x86_64.rpm1ed46b8b00eaa3c461ed956d180c3d9870d85c89934c7842b052f87e67998aecOPENAFS-SA-2016-003Security Errata Moderate: OpenafsSecurity Fix(es): There are three different kinds of “dead” residual directory entry leaks, each with a different cause: 1. There may be partial name data after the null terminator in a live directory entry. This happens when a previously used directory entry becomes free, then is reused for a directory entry with a shorter name. 2. “Dead” directory entries are left uncleared after an object is deleted or renamed. 3. Residual directory entries may be inadvertently picked up when a new directory is created or an existing directory is extended by a 2kiB page. This happens because the fileserver shares a buffer pool for directories of all AFS users, but does not clear each buffer upon reuse. This is the most severe problem because the leaked information may be from other directories or volumes for which the AFS user is not authorized.moderateScientific LinuxScientific Linux 7kmod-openafs-1.6-sl-514-1.6.20-256.7.514.x86_64.rpm08ae01b591474dd3dab4b6d3a4110db54ba7864613cf6eabaff0171de235190eopenafs-1.6-sl-compat-1.6.20-256.7.x86_64.rpma1f179402f72d058b2879d594ee1a3b84304f2c56085b3762aafcb6aea1f5e32openafs-1.6-sl-authlibs-1.6.20-256.7.x86_64.rpm86dd20c9bde5321d91e6b06201b4f1efdc712e2c20b0ac1e2b02f211b0ffee59openafs-1.6-sl-plumbing-tools-1.6.20-256.7.x86_64.rpm180bec3fdfea0b8d61409595eb4c40234fa7c551b6883ef31e7ec2335c2b30e3openafs-1.6-sl-client-1.6.20-256.7.x86_64.rpm77d3c8fa542261dc40f4078b6395751f4728d1fab251b24ef5d4083432fc9b09openafs-1.6-sl-kpasswd-1.6.20-256.7.x86_64.rpm55366e25bd7ccfdf1103a01eadbcfcff406f3dec2d8e2d882964ae9e41b34ec1openafs-1.6-sl-krb5-1.6.20-256.7.x86_64.rpmd28ccbc5a6658433da0876a68210e52d1cd2f4efcd146d6fa71bdcbe2b9d558dopenafs-1.6-sl-devel-1.6.20-256.7.x86_64.rpm36227d5655b8f6948acdb2f13004a42d77080da2dbfdcc7000fd9709f7338662openafs-1.6-sl-server-1.6.20-256.7.x86_64.rpma8ccbbdd355f1c1dbf8afd07fc22bd3caccc7f43df157c0c1d5ab306e4db9bc8kmod-openafs-1.6-sl-1.6.19-1.SL73.el7.noarch.rpm92bb1de3af453cdbd69228db777846f46ffb8643a78fcd16477e2d5ca2671b15openafs-1.6-sl-kernel-source-1.6.20-256.7.x86_64.rpm5e8a0c63572d3885799a263f24ccb1faef738afcfc8e569b0b085ef8517e4903openafs-1.6-sl-authlibs-devel-1.6.20-256.7.x86_64.rpmf68daa735937f87917337e9773f21d05fe6b130a97feec4da6b123a455dc5de2openafs-1.6-sl-1.6.20-256.7.x86_64.rpm27de2c6e3b70e9c57d5d35f753420e4a611fc6471d84be4cb3c82feb64fef5c6openafs-1.6-sl-module-tools-1.6.20-256.7.x86_64.rpmb96d1c328e53f800da9308beffc2a8a6779c993ef70f47e5a1017aea5595f1c7OPENAFS-SA-2017-001Important: Openafs Security UpdateSecurity Fix(es): * Certain values transmitted in RX ACK packets were not sanity checked by OpenAFS receiving peers, which could lead to an assertion being triggered during construction of outgoing packets on the same connection, resulting in server process crashes or client kernel panics.importantScientific LinuxScientific Linux 7openafs-1.6-sl-1.6.22-278.sl7.x86_64.rpmb1dbfd325c5574fc4cbfbfcea69ceea029eb8e67bd944466e2ebf44302cfb70copenafs-1.6-sl-authlibs-devel-1.6.22-278.sl7.x86_64.rpm7a3447ceb5a19ba65478d58b1d7c60b5877075baca1fef71b633817acdcbdcbdopenafs-1.6-sl-authlibs-1.6.22-278.sl7.x86_64.rpm8473a341939aec3c44f0a42a3db6a240b509f23c36147e3ddd6322f31c990493kmod-openafs-1.6-sl-693-1.6.22-278.sl7.693.11.1.x86_64.rpmde3f0d0a2b8179c10400bf79922ba6c864bb5c7e9fc5aa7ab2539422f0b328b9openafs-1.6-sl-krb5-1.6.22-278.sl7.x86_64.rpm88922716efde76de648d3b55a81923c1a0b32efc37597939a0ad904adc40db1dopenafs-1.6-sl-client-1.6.22-278.sl7.x86_64.rpm5bf2f0842b856b72fc2477fe9d1fede32087f62d6206d86486688df7e8a62c8fopenafs-1.6-sl-plumbing-tools-1.6.22-278.sl7.x86_64.rpmb1bbe6a174d67a71a291a5e70cfc9ab17bfdefbcfd4eda13f3cd0b6ead74b108openafs-1.6-sl-kernel-source-1.6.22-278.sl7.x86_64.rpme82b1f7e44f8f76139d4aa09b643f1c1d164aa870b5a6f17a701f231a3e9e677openafs-1.6-sl-kpasswd-1.6.22-278.sl7.x86_64.rpmc4e3c1e870952148feeaeb3af64eecad9eb624b417e4c8a112a5796f22196fcbopenafs-1.6-sl-compat-1.6.22-278.sl7.x86_64.rpme55c0c1dd8ce53f764565eb4591d559b629a834c36efb50337fb6c1f237be3aaopenafs-1.6-sl-server-1.6.22-278.sl7.x86_64.rpm6c97105cf0e01dc77d7cb8bd053de754b987cdcac752a007054429f8a24d9d38openafs-1.6-sl-module-tools-1.6.22-278.sl7.x86_64.rpm303607b4f648495f5e35b47aa301952a18bc2247bf7a5fc25255fab60252a16bopenafs-1.6-sl-devel-1.6.22-278.sl7.x86_64.rpm176221b579446a96dd062b6913bc4000286f5ea6900846c97857995f0ad20726OPENAFS-SA-2018-001:2:3Moderate: OpenafsThese releases include fixes for three security advisories, OPENAFS-SA-2018-001, OPENAFS-SA-2018-002, and OPENAFS-SA-2018-003. OPENAFS-SA-2018-001 only affects deployments that run the 'butc' utility as part of the in-tree backup system, but is of high severity for those sites which are affected -- an anonymous attacker could replace entire volumes with attacker-controlled contents. OPENAFS-SA-2018-002 is for information leakage over the network via uninitialized RPC output variables. A number of RPCs are affected, some of which require the caller to be authenticated, but in some cases hundreds of bytes of data can be leaked per call. Of note is that cache managers are also subject to (kernel) memory leakage via AFSCB_ RPCs. OPENAFS-SA-2018-003 is a denial of service whereby anonymous attackers can cause server processes to consume large quantities of memory for a sustained period of time. The changes to fix OPENAFS-SA-2018-001 require behavior change in both butc(8) and backup(8) to use authenticated connections; old and new versions of these utilities will not interoperate absent specific configuration of the new tool to use the old (insecure) behavior. These changes also are expected to cause backup(8)'s interactive mode to be limited to only butc connections requiring (or not requiring) authentication within a given interactive session, based on the initial arguments selected.moderateScientific LinuxScientific Linux 7openafs-1.6-sl-server-1.6.23-289.sl7.x86_64.rpm52a3f1342b2ea41cfc05b3e470b8af66b98f86699ff229b67b8b1ed91fa9ad3bopenafs-1.6-sl-plumbing-tools-1.6.23-289.sl7.x86_64.rpm071fb9a3759bf7c1b6b59e84b9090b229ba2f9d15d5179fabbf26fb8ef07afb5openafs-1.6-sl-client-1.6.23-289.sl7.x86_64.rpm700bac1c09a285ed1242173110ed5251fc05c5228aafce46c4f23590535695efopenafs-1.6-sl-authlibs-1.6.23-289.sl7.x86_64.rpm112b445f1357007b9c0642677172c660484c4613a0d45fc5408f4921cfab0d94openafs-1.6-sl-devel-1.6.23-289.sl7.x86_64.rpmc82f463f70502f7a69318e70e49246989f33971ba4b006cdc7409ef230f54684openafs-1.6-sl-module-tools-1.6.23-289.sl7.x86_64.rpmdb893a6714ff00c49814dd2ea79fc8d6807c41763acfb8cc1252ffc32f381503openafs-1.6-sl-compat-1.6.23-289.sl7.x86_64.rpm5559705838ec96eaa13fced2ca9a9a8fd18b65e394a069c21a6c4f0f59db39bfopenafs-1.6-sl-kernel-source-1.6.23-289.sl7.x86_64.rpm4d8fff746a59783c2124cc42870c696e64ef4abc9866efd30fb0512c4481da6bkmod-openafs-1.6-sl-862-1.6.23-289.sl7.862.11.6.x86_64.rpm77403a1e318426cf50593bab56973bdcd7830a15514ba4bc46794b503a40897aopenafs-1.6-sl-krb5-1.6.23-289.sl7.x86_64.rpm975c8b426574462817df309be25bb18378534ae8de9ac753f622456a1279a190openafs-1.6-sl-kpasswd-1.6.23-289.sl7.x86_64.rpm7675ba17f0e13c88080b42da559e492006deec4adf1ab32e72a3c0e762aa8262openafs-1.6-sl-authlibs-devel-1.6.23-289.sl7.x86_64.rpmdcd69e18b70f622fad1302c6221746f693f94f92aa72629fc1c0bd20ff53ab37openafs-1.6-sl-1.6.23-289.sl7.x86_64.rpm1b2f503e29d8ed89c727d6954c44328773661903471f36feb51a435d420182e6RHBA-2022:6572Ca-Certificates Bug Fix And Enhancement UpdateThe ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Annual 2022 ca-certificates update version 2.54 from NSS 3.79 for Firefox 103 (BZ#2099892) * ca-certificates need to add support for signing certs for .NET (BZ#2117796) Scientific Linux 7ca-certificates-2022.2.54-74.el7_9.noarch.rpmd7edb786d191c4fefcb03be72b64bef01cb89aac2e81f77f386986058ba9d30dRHBA-2022:6577Samba Bug Fix UpdateSamba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * Fix possible crash bug in winbind (BZ#2119058) Scientific Linux 7samba-client-libs-4.10.16-20.el7_9.x86_64.rpmcacc282e68d55a8a4df7bdd1d389e5c33ff3eefde6ab7fa892c56f1a03c6d7f8samba-common-libs-4.10.16-20.el7_9.x86_64.rpm2a22d8bf7e49ace37c1836bb6dffc293100d603845800a5a7a00a8934d7307cdctdb-tests-4.10.16-20.el7_9.x86_64.rpmf8d3f5de5d78d57c24f877ab16955ba73987426e386f8ba993cd7c9bc7a3792asamba-pidl-4.10.16-20.el7_9.noarch.rpm09893b38eca1472f8d54d6ae51d1880e4fd68e7a4271cb71d3ae92e73e68ca8fsamba-4.10.16-20.el7_9.x86_64.rpm7ac313df927797c05b41436e42e604cbd43161be21fd68cdd96d0ecae30d9acflibwbclient-4.10.16-20.el7_9.x86_64.rpmc5d60bee506bcb302ece1a17611f829ba892e4220d5c8f9c060ff74fc230eb38samba-common-4.10.16-20.el7_9.noarch.rpm44a6459695c6006ad82c374924f9f42f0666af0ffb5ce60c07c6f4ae970bce53samba-winbind-modules-4.10.16-20.el7_9.i686.rpmdf8572b335939df919a32ef8bff3ca1b55651cc8fe2ea023eac2ca4fde67fa00libwbclient-4.10.16-20.el7_9.i686.rpm19466f49d3d87d055974d9b450b0bfacca1de8a5d7e4a247488f52f48433fb8csamba-client-libs-4.10.16-20.el7_9.i686.rpm735fb48a6b667643771efd8f4082fde5fee9571925e0b6ba0364f444c094a479samba-python-test-4.10.16-20.el7_9.x86_64.rpm84c7a9f5130dd17ef7829c5028c94134cebca4eae40d69d47f2fce2381b58eebsamba-client-4.10.16-20.el7_9.x86_64.rpmabb13fc44bf00e6e8e05a15171a49ad22adf187e18a32c41ec75fa7f9b2048a3libsmbclient-devel-4.10.16-20.el7_9.i686.rpm661414a845a083cac5b3e441a3b4d217b7f90ad66360c013ea11b525fc51d75asamba-winbind-modules-4.10.16-20.el7_9.x86_64.rpm15d8c7f0ed898c85e546550b168b365f6cf730c57f9b9986da2a1a4c29d1eff7libsmbclient-4.10.16-20.el7_9.i686.rpm6f8ce0108a5f7d6346ac6a2aff0a646978840494f6b4a74da36da7fded21c4dblibwbclient-devel-4.10.16-20.el7_9.x86_64.rpmc6e8739d3f7024b2c898c6b7d8ea9e580c0122bc467430c5ea453821822c6bfblibsmbclient-4.10.16-20.el7_9.x86_64.rpmdc1a9465eb7fb4114846196fe2e5c3d33fbc3975f899338b00ca89592e825e26samba-devel-4.10.16-20.el7_9.i686.rpm7a6b86056ceb34ad19d83caefe29f0ba504db426f62aaf5d4da89ec59db0268asamba-libs-4.10.16-20.el7_9.i686.rpm4dd2497954144c5af89e132a94c2108670d0a4c11ca680e0cabe76d4e7502333samba-vfs-glusterfs-4.10.16-20.el7_9.x86_64.rpmf397cc045c0190a87e463e87f86ae18a178e1aae0b5f60c2694a7751c84d3daflibsmbclient-devel-4.10.16-20.el7_9.x86_64.rpm3660a1bebf97db29376d4bbc2c74e9e146d91dc0f9255c9f59f9bec430ba0447samba-winbind-clients-4.10.16-20.el7_9.x86_64.rpm255996be29ce489ef14234d31a7f1bb4db363760379ad326b76900222d95030asamba-winbind-4.10.16-20.el7_9.x86_64.rpm0633bba0bdbe5435adc07edbb268e2961ea1c47533d4926264ed5861f3561ab4samba-test-4.10.16-20.el7_9.x86_64.rpma94585adfd140fc3d138f715ad7c9953a047cd8e750af9ceecd08293f1f375e4ctdb-4.10.16-20.el7_9.x86_64.rpm46a9e0c3831feec611855045a6424b31e7fd60804974f249b613de9fe2ced97dsamba-winbind-krb5-locator-4.10.16-20.el7_9.x86_64.rpm1f076b7c3d04cd7a81c3b287f238b6daf628b3adb75ec1813de275a73e4badacsamba-libs-4.10.16-20.el7_9.x86_64.rpm5a8440321cd0edde5dcd44d28dfe703e734447b3f2af301b009ffe3f85c6fb9dsamba-common-tools-4.10.16-20.el7_9.x86_64.rpm61a4a9c9929462af1d399b9fbf7974f91a67bf8506124f29447d9931c38ccb84samba-python-4.10.16-20.el7_9.x86_64.rpmf3139f49bed0ef0301fc615f023d797cd653216f38a551e6f6e4fa9e4b4d6398samba-krb5-printing-4.10.16-20.el7_9.x86_64.rpm0b38802866912cf2a4cbea96ffa954393582a6de922bb2554ed16975926eec76samba-devel-4.10.16-20.el7_9.x86_64.rpm7e9a75e73ebe7cea8c107131cdd29cc9dc10563c3643388bc6e049002516abefsamba-common-libs-4.10.16-20.el7_9.i686.rpm9dbfa5fd8bb1eb6ed8b84dcd57cd0b1b71c7e20ff7f7ecd44b3b4a6f3866cfdesamba-dc-libs-4.10.16-20.el7_9.x86_64.rpmf5d8689b8fc2b40e39898be7390a5f496ed7f04cd4a2035e0456bb06344a9475samba-test-libs-4.10.16-20.el7_9.i686.rpm91e0191180ab976e905b15cf945888f31ae2a79a3e211d42d366cd23408c416alibwbclient-devel-4.10.16-20.el7_9.i686.rpm6db2d2f59f78e800c9e2e03c678771f064d1afb70b8fe9cf27edc47b94f119e0samba-test-libs-4.10.16-20.el7_9.x86_64.rpmf42aef1f809c15b39b535bd178d6a76df4068d9e4f3cc1ca9f299d6a7d36f482samba-python-4.10.16-20.el7_9.i686.rpm0f6fde71a4536f44b6dc4f43b3733a167fa2a745296da54bf854a7e5565968e2samba-dc-4.10.16-20.el7_9.x86_64.rpmcec3a3e3bf74d55202d85ffb3be0f8c2456381013381e66067f6375101a942ebRHSA-2021:2313Moderate: Samba Security And Bug Fix UpdateSamba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * smb.service stops when samba rpms are updated (BZ#1930747) * samba printing dumps core (BZ#1937867) Scientific Linux 7ctdb-tests-4.10.16-15.el7_9.x86_64.rpm2528a7abd08712c2e83b2d01510bf14e8f036bf31c2adfaa29f9f4ad9aa971d8ctdb-4.10.16-15.el7_9.x86_64.rpm69326f1343382296243313ccb2c28e33cd1f41edd81337f9b06c7f14c92a3417RHSA-2024:3980Important: Flatpak Security UpdateFlatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Security Fix(es): * flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. Scientific Linux 7flatpak-builder-1.0.0-13.el7_9.x86_64.rpm4c3c8ef224b14e51d92d2a517e700660afd223d2e04db12da4dae7d610d20bfeflatpak-libs-1.0.9-13.el7_9.x86_64.rpm1a0e87bb9526df4686c6913d11e7ce6f8ebad3b9c44746906d2467e68ac8ad23flatpak-1.0.9-13.el7_9.x86_64.rpm9fa899d97993d2074421d0d5ea94a2be28bc9a7405a273725d5a4bed03f9d18aflatpak-devel-1.0.9-13.el7_9.x86_64.rpmd27f5cb0fbca6ecc57ac43aaa1b60fac929a3b99463c707edccf33b6e3ddb8a4RHSA-2024:4016Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.12.1. Security Fix(es): * thunderbird: Use-after-free in networking (CVE-2024-5702) * thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688) * thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690) * thunderbird: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696) * thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Scientific Linux 7thunderbird-115.12.1-1.el7_9.x86_64.rpmc02679c8d3641a8061ea08965de7674c5c793a0546570d4b49ec370f87bfae28RITM0891205Important: OpenafsSecurity Fixes: * Fix OPENAFS-SA-2019-001: information leakage in failed RPC output Generated RPC handler routines ran output variables through XDR encoding even when the call had failed and would shortly be aborted (and for which uninitialized output variables is common); any complete packets assembled in the process would be sent to the peer, leaking the contents of the uninitialized memory in question. * Fix OPENAFS-SA-2019-002: information leakage from uninitialized scalars Generated RPC handler routines did not initialize output variables of scalar (fixed-length) type, since they did not require dedicated logic to free. Such variables allocated on the stack could remain uninitialized in some cases (including those affected by OPENAFS-SA-2019-001), and the contents of uninitialized memory would be returned to the peer.importantScientific LinuxScientific Linux 7openafs-1.6-sl-authlibs-1.6.24-290.sl7.x86_64.rpm6f5887f818d41ef20b6ff4d6cb3a46024e52a86dfead62f8aa77ccb61f3aee70openafs-1.6-sl-client-1.6.24-290.sl7.x86_64.rpm89006ed4705a480fc5f899e6c7326fd2fd140f0824c98ac00c1fdddb3e991417openafs-1.6-sl-server-1.6.24-290.sl7.x86_64.rpm8350de2d12be45089e84d23b4290735bc6c06452a9014faf0151292d8998de5dopenafs-1.6-sl-module-tools-1.6.24-290.sl7.x86_64.rpm037c00b5808440bed112b91f2729e274a654835faeb662ce714de45d62e81faaopenafs-1.6-sl-compat-1.6.24-290.sl7.x86_64.rpm6959808badac12f4c3285a9ef94a331af588933e015e78be752ade5379263cc0openafs-1.6-sl-1.6.24-290.sl7.x86_64.rpmc965ad7022e8de31d7a8a5cad828b2820d723a0d7b4908ce39814332b1660b29openafs-1.6-sl-kpasswd-1.6.24-290.sl7.x86_64.rpmd3b934930755dabd732640cf2e63f67f8ac55db7ada2ac7a860d82816b5a4765kmod-openafs-1.6-sl-1062-1.6.24-290.sl7.1062.4.1.x86_64.rpm72b1c824de52ff3c093a2c84480521803d4be7e13c1f4a02f287da52ba7d39b6openafs-1.6-sl-krb5-1.6.24-290.sl7.x86_64.rpmef6f21f2ed5aac083ebd59c22434625744f42ec27d9577e6b853e712ec8b8490openafs-1.6-sl-kernel-source-1.6.24-290.sl7.x86_64.rpm4a808206ca7e0835f17f9842a24e31d3b6dc928900f82838fabf8d17809a1c1eopenafs-1.6-sl-plumbing-tools-1.6.24-290.sl7.x86_64.rpm3885ff49899e4ab65f69647d7404f01f70d553023ed348fd5bd1c11d9781666copenafs-1.6-sl-authlibs-devel-1.6.24-290.sl7.x86_64.rpmd00eeda3a3f8b1903939d7d828cb2fa9fb1e4a0056c5ba0edd9781aec55091bdopenafs-1.6-sl-devel-1.6.24-290.sl7.x86_64.rpme690cf873b434918bb3b5ac380d639ad383f31b2edb9e6e93c4e7c540e03bd35RLSE0001339Sl 7.2The official SL 7.2 releaseScientific LinuxScientific Linux 7yum-conf-repos-1.0-1.el7.noarch.rpm1325d52aee6ecb7d4f6c71750f9053be66026351ee772822b12226f9c601a787SL7.5:selinuxReissue Selinux UtilsThis package resolves the issue.Scientific LinuxScientific Linux 7libselinux-2.5-12.sl7.i686.rpma7e032073e98b240dd8ecdcb487ed2140cd6a2c3653f19226a19452010022f2blibsemanage-devel-2.5-11.sl7.i686.rpmaf9bac6487cc239e4139c6415a9cb14502f658058102bfe6c8b3811deebd9e63libsemanage-devel-2.5-11.sl7.x86_64.rpm469b0d826455781ea9364f2d48220715a21aa19cb4e67d3aa0b6d8d1842da104libselinux-devel-2.5-12.sl7.i686.rpm359e5be500134bf6dce55baba2264210509618d3a8e1eede6a4c6d8703a67f9fpolicycoreutils-sandbox-2.5-22.sl7.x86_64.rpm12a83c5b6883d4b8d512cceaa0b18468a5dd680bb9e840a7e864b9037a4dbe29libsemanage-static-2.5-11.sl7.i686.rpm3e05740408101243b8fff69559fbc85cd3de3bc5adfae68fcdaaa6fbe34637b2libselinux-ruby-2.5-12.sl7.x86_64.rpm742802fef6c57c9e50962fb368b9d47e13e567f347d02c2f67b70340645c5bc0policycoreutils-devel-2.5-22.sl7.i686.rpmb2cc170287161623394a785b24e3520a8bd39e78460ae8082a0c77b5c2a2b444libsemanage-python-2.5-11.sl7.x86_64.rpm070a9e6d6127280afefd00ffc5112569e1b91292245336b0ca5739eee2bb940elibsemanage-2.5-11.sl7.i686.rpm7ed59cb64d931ce3f772e5cea8895a440fa4237da4f5f84952d17819ae4313f9libselinux-python-2.5-12.sl7.x86_64.rpm75495cbcaaf339d1a1d766b1990d9b0b5ff734c66dd0af4d597cf5a5157ce22apolicycoreutils-2.5-22.sl7.x86_64.rpmfd09acaab47c1c0bbb2afd077222e5b89da50145c78128739bef0f2f42387df6policycoreutils-devel-2.5-22.sl7.x86_64.rpm5884e54d22d0548c25df34887488cf03d6b9337bb65abeb0febfe2efab68992clibselinux-devel-2.5-12.sl7.x86_64.rpm8f53812073275cd898f08b575bb6a274d563dd7a02c40403f74bb99f0af86d53libselinux-2.5-12.sl7.x86_64.rpmc430435e5b62f26ab36e7dfec7ecebd1863361fb4e5b0d8a21626f0068098020policycoreutils-newrole-2.5-22.sl7.x86_64.rpm9d50545fe0ed553b53c1239809106685847cef58c7e62c11847259a89e5dde2cpolicycoreutils-python-2.5-22.sl7.x86_64.rpm7f193e44b5c1136ac16b28e8320e1688a64be7a4d948b54f78c35d446fe3ea3blibselinux-utils-2.5-12.sl7.x86_64.rpme49940a2b9a2dc431965ffa59e006c635e72705fb4c756c1924cbc990f09b9bbpolicycoreutils-gui-2.5-22.sl7.x86_64.rpm6a455e91533694bf8b4482089227d96065ced4d2adb7c361fb940293abd007c7libsemanage-2.5-11.sl7.x86_64.rpmd925642fc606989401822d188eaba437a0747b50d64b018b86ecff2ab6b3d82clibselinux-static-2.5-12.sl7.x86_64.rpm78cd6f8a22b4b25bc7aade0271291b3a3eb7f9e1167dd2b60196c3aa82ccd177libsemanage-static-2.5-11.sl7.x86_64.rpmd9b94f28b0d6bf3a002ea6e149b5327296dc949f515125b3c3c6056212097217libselinux-static-2.5-12.sl7.i686.rpm35a13c016be2797bb67f846d619a3423bc5fe6181e705a7be89e017427efa21epolicycoreutils-restorecond-2.5-22.sl7.x86_64.rpmc31f6b51a3872ff9f0699eb586dcd326afde70bd43c48cdc32ce17fe972a7968SL:openafs-1.6.13:securityImportant: Openafs On Sl6.X, Sl7.XAll server platforms * Fix for CVE-2015-3282: vos leaks stack data onto the wire in the clear when creating vldb entries * Workaround for CVE-2015-3283: bos commands can be spoofed, including some which alter server state * Disabled searching the VLDB by volume name regular expression to avoid possible buffer overruns in the volume location server All client platforms * Fix for CVE-2015-3284: pioctls leak kernel memory * Fix for CVE-2015-3285: kernel pioctl support for OSD command passing can trigger a panicScientific LinuxtrueScientific Linux 7openafs-1.6-sl-authlibs-1.6.13-215.sl7.x86_64.rpm19d28559235d1dea654bfa57858d285f9384cf953181f935b311a4b699dd8877openafs-1.6-sl-client-1.6.13-215.sl7.x86_64.rpm8ecc9d304b16a2510c5e8a0678903419800da813310396a26c2e420e3afd8a33openafs-1.6-sl-kpasswd-1.6.13-215.sl7.x86_64.rpm532172fca1580a4eb7e4f2afeb8b99f936a626d7dcdbf9660ac3dd5e33dd2d82kmod-openafs-1.6-sl-229-1.6.13-215.sl7.229.1.2.x86_64.rpmca67f3f8cd13dc0376e673c22448f47f8669042d21aba4e1f7ada67cc424294fopenafs-1.6-sl-module-tools-1.6.13-215.sl7.x86_64.rpma08764a51cc29642dba444b6c65f8e16e7a381d078452ddd918e91b22c67a3a2openafs-1.6-sl-authlibs-devel-1.6.13-215.sl7.x86_64.rpmf9d42721eefc32960618d6ecfc64b6c2f0a63d59d44607ed30767c21be14eb04openafs-1.6-sl-krb5-1.6.13-215.sl7.x86_64.rpmb983b65a93e0e930e5f4df4ea7050be8d29d2062a5b7f2365c6f41b5a440ee24openafs-1.6-sl-devel-1.6.13-215.sl7.x86_64.rpme35dfa0c03a961681956b76768b35eb7a11c0d5e4e9c9f3c6bff45f1d87b8844openafs-1.6-sl-compat-1.6.13-215.sl7.x86_64.rpm4c5b63c44a0705370781a2c3e1c0960e1206b233af24ba4afaca1572a8830efeopenafs-1.6-sl-plumbing-tools-1.6.13-215.sl7.x86_64.rpmb22e9aaec0909498d429656aa9f6cab3ff3ccc26fd78fc38c843fe183e7c844aopenafs-1.6-sl-server-1.6.13-215.sl7.x86_64.rpm6b5d12a4a35cf3e7b303f95e1b77f607cda01c6a9d50c20b1448d153afa039e9openafs-1.6-sl-kernel-source-1.6.13-215.sl7.x86_64.rpm839100260e5017f3528c03ba8c584b7fd43ec2994a29a0943a25f41d6f9a9280openafs-1.6-sl-1.6.13-215.sl7.x86_64.rpm359628c176aa00ac5e533519ba9b0e7f893746384ece7b84b3709d0f3cb8f7b7SL:sl-index:ff38-1Bugfix Sl-Indexhtml For Sl6.X Sl7.XScientific LinuxScientific Linux 7sl-indexhtml-7-3.1.sl7.noarch.rpm1e9b396a45dad3f0ae0b32758fecdd1d262ce52fc375917dd4920cd25362a5feSLBA-2015:0965-1Nss, Nss-Util, And Nspr Bug Fix And Enhancement UpdateThe nss and nss-util packages have been upgraded to upstream versions 3.18, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release.Scientific LinuxScientific Linux 7nss-util-3.18.0-1.el7_1.i686.rpm1486a0641bdcd69793916cfedb4fac843ab1b2db8ae7f4c70de1b6d25ea15cc6nspr-4.10.8-1.el7_1.i686.rpm673f8d41c9279062dd8b3677261a7d4c6629294e6616502e662773fea00e2fa0nss-3.18.0-2.2.el7_1.x86_64.rpmda4b75295a92290c9ed856b7c7560162ed725b4cf3b48ccddf44e1b14f4f568enss-util-devel-3.18.0-1.el7_1.x86_64.rpmaa6ac7b8b93189b884dd4127d1eac3d4c54a8fedc93cfd035a31c444d5b23652nss-util-3.18.0-1.el7_1.x86_64.rpm29ff4563ef8e5f07a7a4fb978001dc72f0cdfe3c4dac98cdb83470c646633210nss-sysinit-3.18.0-2.2.el7_1.x86_64.rpm84b46f3bd974be8c0d230ffb5548204634af28dfb02216064de74beb695c983bnss-devel-3.18.0-2.2.el7_1.i686.rpme5cde1de921ad51eebc98465f2ee5b79c4b450a316b2c4f31538a0a9d4cd1e84nss-pkcs11-devel-3.18.0-2.2.el7_1.x86_64.rpm1085dcf45bb4e02dd64910bd4ed1870fc92c996b7211cb99d462289051979d44nspr-devel-4.10.8-1.el7_1.i686.rpm2cd41c15d555780897a1df1b900fdc9f67460463c3f0af89c78eb58a1beac561nss-util-devel-3.18.0-1.el7_1.i686.rpm5c360e3a77d5f0220dd8cb04201bf22d697ac81e69cce0d18a28af999e3cf377nss-devel-3.18.0-2.2.el7_1.x86_64.rpmff85212ae3c12f6f31bad22291d7acef1bc6919f42c62f503755db92d78dd716nss-pkcs11-devel-3.18.0-2.2.el7_1.i686.rpm0acef2b1db2941be0191728678f593d41e25dc63ff0e210ad2c085bbcb35da78nss-tools-3.18.0-2.2.el7_1.x86_64.rpm38eaf4bbb20146c4cc124c2d9d440472daf65d013c6b42c95a123d80c996ad0enspr-devel-4.10.8-1.el7_1.x86_64.rpm1cbc8b5bb8aa176b52d6c02f4778d9fd20a35428f246dfb8024925c3ee86070cnspr-4.10.8-1.el7_1.x86_64.rpmb53159ae9c35350ae7ad8f3030a83ae1234333bd6d81ff105c2852027f51c667nss-3.18.0-2.2.el7_1.i686.rpm2cc2e5ba7cd69a5197839113cab03d0fefe1fb4a049e41387939e644fa49a28eSLBA-2015:1474-1Python-Chardet Bug Fix And Enhancement UpdateThe python-chardet package has been upgraded to upstream version 2.2.1, which provides a number of bug fixes and enhancements over the previous version.Scientific LinuxScientific Linux 7python-chardet-2.2.1-1.el7_1.noarch.rpmf310c3f74ef16532b90bdc0bed13061b6409536c7b444122314160c6c2249307SLBA-2015:1475-1Python-Requests Bug Fix UpdateThis update fixes the following bug: * When the python-swiftclient utility sent a request with a HHTP header containing upper-case characters, Apache previously rejected the request with a "bad request" error. With this update, the python-requests implementation of case-insensitive dictionary has been fixed, and python- swiftclient now merges headers with different cases correctly. As a result, the described HTTP error no longer occurs.Scientific LinuxScientific Linux 7python-requests-2.6.0-1.el7_1.noarch.rpmb617f6238f3dbef9ede9dcb1c3dc31fde0c555230acb96b0a18055127ba3f4d8SLBA-2015:1530-1Dracut Enhancement Update* Prior to this update, the drbg kernel module was not a mandatory component of the initramfs packages, which caused encrypted hard disk drives to be impossible to decrypt. This update includes drbg in initramfs, and all hard disk drives can now be decrypted as expected.Scientific LinuxScientific Linux 7dracut-033-241.el7_1.5.x86_64.rpmcaaa96826e25c6761ebc2c338bb8a586c219c369cbabdff16dd75ff021e5ab36dracut-network-033-241.el7_1.5.x86_64.rpm4dad528e2905ff5b9b2e8725cafd8c063a2a1483a3df15040d93762a2a8aebc4dracut-fips-033-241.el7_1.5.x86_64.rpmdb6a46d7242822dacb011fc994dbdb0905823968039b5bae5bcd1682bc8a4d8fdracut-caps-033-241.el7_1.5.x86_64.rpm25d81733cfa0977ce01f48e969af6c7075006d6a8fe3ece1b06a4e5c0d959992dracut-config-rescue-033-241.el7_1.5.x86_64.rpm9b5dba57e4b6f8dc8b7fed505fef6198334ff3f9d69c09e213fae9a7d8bd92f9dracut-config-generic-033-241.el7_1.5.x86_64.rpmec4743f73f09db4bc8a2dcc4e0ed1320fd20d2b794f2eb7aca87205765f4df7edracut-tools-033-241.el7_1.5.x86_64.rpm42bf7e14179cdc1361190aa6ee4ca40642cb17ad8afa10430399d6279b01d8bedracut-fips-aesni-033-241.el7_1.5.x86_64.rpmd80e6647d9200382a0af587b61992ae6826ed7b03fa12ac5f80d723dce85086aSLBA-2015:1532-1Python-Urllib3 Bug Fix UpdateThis update fixes the following bug: * Previously, using the text user interface (TUI) to log in to the administrator account of RHEV Hypervisor failed with a Python backtrace. This update makes the "six" module correctly importable under all circumstances, which ensures that logging in to RHEV Hypervisor using TUI proceeds as expected.Scientific LinuxScientific Linux 7python-urllib3-1.10.2-2.el7_1.noarch.rpm8c3c0f67bc9855a6d09a216be36c42a82be4197624b91b66a8fc2de7aa3deb0bSLBA-2015:2082-1Xorg-X11 Bug Fix And Enhancement UpdateThe xorg-x11 library packages, as well as many supporting packages, have been upgraded to newer upstream versions, which provide a number of bug fixes and enhancements over the previous versions: The glew packages have been updated to version 1.10.0. The libdrm library has been updated to version 2.4.60. The libfontenc library has been updated to version 1.1.2. The libICE library has been updated to version 1.0.9. The libpciaccess library has been updated to version 0.13.4. The libSM library has been updated to version 1.2.2. The libwacom library has been updated to version 0.12. The libX11 library has been updated to version 1.6.3. The libXaw library has been updated to version 1.0.12. The libxcb library has been updated to version 1.11. The libXext library has been updated to version 1.3.3. The libXfont library has been updated to version 1.5.1. The libXft library has been updated to version 2.3.2. The libXi library has been updated to version 1.7.4. The libXmu library has been updated to version 1.1.2. The libXpm library has been updated to version 3.5.11. The libXrandr library has been updated to version 1.4.2. The libXv library has been updated to version 1.0.10. The mtdev packages have been updated to version 1.1.5. The pixman packages have been updated to version 0.32.6. The xcb-proto package has been updated to version 1.11. The xcb-util packages have been updated to version 0.4.0. The xcb-util- image packages have been updated to version 0.4.0. The xcb-util-keysyms packages have been updated to version 0.4.0. The xcb-util-renderutil packages have been updated to version 0.3.9. The xcb-util-wm packages have been updated to version 0.4.1. The xkeyboard-config package has been updated to version 2.14. The xorg-x11-proto-devel package has been updated to version 7.7. The xorg-x11-server-utils packages have been updated to version 7.7. The xorg-x11-util-macros package has been updated to version 1.19.0. The xorg-x11-xauth packages have been updated to version 1.0.9. The xorg-x11-xinit packages have been updated to version 1.3.4. The xorg-x11-xkb-utils packages have been updated to version 7.7. The xorg-x11 -xtrans-devel package has been updated to version 1.3.5. This update also fixes the following bugs: * Previously, the libfontenc library did not search for the encoding files in the correct place. Consequently, the luit filter was not able to handle EUC-JP encoding in GNOME terminal. With this update, libfontenc has been patched to properly look for encodings. As a result, luit is now able to handle EUC-JP encoding in GNOME terminal. * Previously, when using a remote gdm session and then running the "ssh -X" command, the following warning was printed: Warning: No xauth data; using fake authentication data for X11 forwarding. Afterwards, X applications started from within the SSH session did not work. With this update, the xauth utility has been fixed to deal with cookies reliably, and running "ssh -X" from within a remote gdm session now works as expected.Scientific LinuxScientific Linux 7libxshmfence-devel-1.2-1.el7.i686.rpmea8c7cd8e2c3451aae3223a84f2ab5dc28eb16b4e93ef52dcbb7f8a9ae0da942libxshmfence-1.2-1.el7.i686.rpmfba6d245c475c9388040236949466f1456ce080eb64a487bc96e999709524f1acompat-libxcb-1.9-1.el7.x86_64.rpm2590c0b71068b18c516e42c79b76e0978c65dcb201d6b5ad54f9c907192851decompat-glew-1.9.0-7.el7.i686.rpma28971a10e3e7406d3ead747ecc56bf4d61103973c017a509c8057bb152e5f85glew-1.10.0-5.el7.x86_64.rpm29b19e08f995ed9e45714681131d24d65bf4e5e474d96a350643bbbfd4ce8fbdglew-devel-1.10.0-5.el7.i686.rpm59e43702d291254362485fc67046e2c2aefafc839eaffbe4f14e82db6e7037f0compat-libxcb-1.9-1.el7.i686.rpm5288d943786224438446da7d55f1962c83021a7e7ecd5e8623804760c93fbe84compat-glew-1.9.0-7.el7.x86_64.rpm289ed9e47de7340c1ded8e704ec4ef486d8268cc436b3615d57c6172dd587e36glew-devel-1.10.0-5.el7.x86_64.rpmb0db13778501b5779dc5fe54adfcc2209cf841ef3f67088793c895b20c2aec7elibxshmfence-1.2-1.el7.x86_64.rpm51c560c38d4cbdb8d6457c3e3e148a74d337d18c045a1ce4bc2ebd4f9d30b2f0libGLEWmx-1.10.0-5.el7.i686.rpm04d43e24a5ae859a2a8ca4b342f4ce656ba2dac0912ebfb8ea5c659922c0b01clibGLEW-1.10.0-5.el7.x86_64.rpm73fb69cb22aa35e2bb2e42c228ddf40ca369304f1d607094de890f67ab952273libGLEW-1.10.0-5.el7.i686.rpmf0d246822c8bb638e0a6f01fea57cb4e86fbb4578f2aa043be2398d11e1f1bf1libxshmfence-devel-1.2-1.el7.x86_64.rpm59c54a7bfda4db7f1dda4f2c7451ab1a5aeb07b7aa2e1ac3af23a39afeae128flibGLEWmx-1.10.0-5.el7.x86_64.rpm0c420668ac6e045e60d58335f787b94a75e8257aaa7ed93010c79b57f0fffaa4SLBA-2015:2091-1Dracut Bug Fix And Enhancement UpdateThis update fixes the following bugs: * In the initramfs, the Dynamic Host Configuration Protocol (DHCP) client script for renewing leases did not update the lifetime of the IPv4 address. As a consequence, the IPv4 address could expire for very short lifetime settings, and the network connection failed. Now, the new DHCP client script updates the IPv4 address lifetime. * If the DHCP server did not provide an IPv4 address lifetime, the DHCP client script in the initramfs did not set up the network correctly. Consequently, there was no network connection in the initramfs. Now, IPv4 address lifetime information is handled correctly. * Due to a bug, the initramfs exited after a successful download of a live image, and the download of the live image was retried for every network interface. Now, the script only exits on error, and the live image is downloaded only once. * The fstab file in the kdump initramfs contained the file system check flag for NFS mount points. As a consequence, the fsck flag for the NFS mount points was tried without any consequences. This has been fixed. * The iSCSI connection script did not wait for all interfaces to be up before connecting to the iSCSI targets in the initramfs. As a consequence, a connection timeout for the iSCSI targets occurred, and the system boot took an excessive amount of time. Now, the script in the initramfs waits for all interfaces to come up before trying to connect to iSCSI targets. * The hyperv_keyboard kernel module was not included in the initramfs. Consequently, the user could not enter the password for encrypted disks on Hyper-V Gen2 virtual machines. The hyperv_keyboard kernel module is now included in the initramfs. * Long-lasting modprobes could be killed in the initramfs if the initramfs switched root. As a consequence, the actions of the modprobe scripts were canceled. Now, the initramfs waits for any udev events to be finished before switching root. * Network interfaces were configured on "add" and "change" udev events. Consequently, the default gateway was lost in the process. With this update, the default gateway setup is no longer lost. * Due to bugs in the initramfs network setup functions, a duplicate IP address was assigned to an interface without a link connection. As a consequence, the installer set up this configuration as the default configuration. Now, no IP addresses are assigned to network interfaces without a carrier link. * When starting the Scientific Linux installation and appending the "ip=ibft" installation option on the kernel command line, the installation failed early and entered dracut emergency mode. Now, installation no longer fails. In addition, this update adds the following enhancements: * With this update, it is indicated that a duplicate IPv4 address was specified and it is not assigned to other interfaces, which prevents problems with duplicate IP addresses during installation from occurring. * This update adds a number of cryptographic kernel modules that load on an IBM System z machine if started in FIPS mode, and ensure that the machine satisfies FIPS requirements. * This update adds a kernel command-line argument to bind an IP to a network interface with a specified MAC address. As a result, dracut now supports specifying the network interface name with "enx[MAC]" in the "ip=" argument.Scientific LinuxScientific Linux 7dracut-tools-033-359.el7.x86_64.rpm58603737f5e7f58ea6e44d697a818756e16dd01878e07ec01642e404043042d6dracut-fips-aesni-033-359.el7.x86_64.rpmdff5c18ecb2e74bfaca406cede5ec5cffc401610bbeda823e8342067081054d8dracut-033-359.el7.x86_64.rpm1c2228fe9b334c559c7530cab65a5e00725506dca932f0a6945308f64ef8ca12dracut-fips-033-359.el7.x86_64.rpm8543ce25157f9876f82859835f154d3c9e08c52729493678d715e8b51a2bcfa2dracut-caps-033-359.el7.x86_64.rpmb19a5a2b3ade3c8bcab2b8c0ad3390ceef732186c54c23e329ae9ada6d739271dracut-config-generic-033-359.el7.x86_64.rpmd8d6766d6ed02261607fbb90cb0149d49e7fbe6eb361dac8bf79c7e53ace806cdracut-config-rescue-033-359.el7.x86_64.rpma8f3e3365a91e3245773e7fb4c41f34d460017a7cecd01deaab5a8f3215a7306dracut-network-033-359.el7.x86_64.rpm6e82966bd71f383f5dc8784381e4b56c7841587ebe7e7d960f616c6ac4dbd993SLBA-2015:2092-1Systemd Bug Fix And Enhancement UpdateThe system must be rebooted for this update to take effect.Scientific LinuxtrueScientific Linux 7systemd-libs-219-19.el7.i686.rpm51392e20a05a291ff58d7090c412d3d37cbbecfd65628080a08c2feca919e4d7libgudev1-219-19.el7.i686.rpm59bb4cdccbc69381026c65b11e231c0eaf9fc60cfddc48384552ae2f51af5817libgudev1-devel-219-19.el7.i686.rpm1197e1a334eb57af6a8751bbdc5a95956901f6a1944121b3a01093d1b6594005systemd-devel-219-19.el7.x86_64.rpm1cb3d33ccc2f3be83686d11b0594ba1607cf0195354c9c92cca3bdb3dd5d16ffsystemd-libs-219-19.el7.x86_64.rpmd165187e40851e4c681fa6682753bfc3a05a74e66503771071a878a0a95b2e47systemd-journal-gateway-219-19.el7.x86_64.rpm099ce4fec7b4eb9527cb10c313aebee58504c08906d8b76cd3c7213abce1c376systemd-resolved-219-19.el7.i686.rpm1ce1dd607d2f2066d8832eb49e6c7084c84b69ac38510c8e81fd5c080fd5ee3bsystemd-219-19.el7.x86_64.rpm31dc2fc680022814140808ead28d8fddf7f645f73dc69e2154d4c3b2ec73ec8flibgudev1-devel-219-19.el7.x86_64.rpm8a51f14c977370596ce33a55787265d4bd9027abc1711976bc84b08eddc41326systemd-networkd-219-19.el7.x86_64.rpm72d3fe52765a5f77001e83b0dc7e17874dc8b508377cb8e4962cc352cdc3a2acsystemd-sysv-219-19.el7.x86_64.rpma452930b3e676caf4116449a525929e5a1b593506658e02b3b921fdbbbb1e3e3systemd-python-219-19.el7.x86_64.rpmef478e7fa191d06fb531bb322d2ee889c5e4286f9c3ca7af57545230fbd5b528systemd-resolved-219-19.el7.x86_64.rpm73d68873598eb889d101d7f4a777e442bfd9911938c926445bdd8fea2c8df8c4libgudev1-219-19.el7.x86_64.rpm3ecc7126efe58c58c438e2fe7c7c9240a399ae42d2567a140cc5cb6e64012c12systemd-devel-219-19.el7.i686.rpm490d772f3a865011863c25957ad0a48605e77fde5c9a620e5270cc7bd1fa390dSLBA-2015:2097-1Abrt Bug Fix And Enhancement UpdateThis update fixes the following bugs: * Before this update, the abrt-merge-pstoreoops command merged files in ascending order in the /sys/fs/pstore/ directory, though the contents of those files were arranged in descending order. Consequently, the merged files were inconsistently ordered. This bug has now been fixed so that the files are ordered correctly when merged. * Previously, there was a bug which caused ABRT to log unnecessary and repeated information in the systemd journal. This bug has now been fixed and ABRT no longer adds this unnecessary information. * Previously, the documentation in the /etc/abrt/plugins/CCpp.conf configuration file regarding the MakeCompatCore option was incorrect. This bug has been fixed and /etc/abrt/plugins/CCpp.conf now contains an accurate explanation of the MakeCompatCore option. In addition, this update adds the following enhancement: * ABRT can now be configured to generate a backtrace without writing a coredump file to the disk. This can save time when working with processes which have allocated large blocks of memory. This feature can be enabled by setting the "CreateCoreBacktrace" option to "yes" and the "SaveFullCore" option to "no" in the /etc/abrt/plugins/CCpp.conf file.Scientific LinuxScientific Linux 7satyr-python-0.13-12.el7.x86_64.rpm56fd59b632f31ebd5e06340b57918fad12d098d64dbe2d21434e99c8b6a54a92satyr-0.13-12.el7.i686.rpmfe12ae79e2e0a6e46c171d43f02a46db321066daf028d5865301fff261c88346satyr-0.13-12.el7.x86_64.rpmf0c6cc6b65c4dda36a62582edef14365e1259c3d8d34b4405a9f1e006d5672efsatyr-devel-0.13-12.el7.x86_64.rpmf6c7ba9f8af9e6ca0a9e97760381a931c2761ac530f5627424e0ab277f7d3447satyr-devel-0.13-12.el7.i686.rpmf3b017b6fb0ecc8ab50d4ebc3928da0e38c25d378aba2b1bb47d86d73cd03552SLBA-2015:2105-1Libnl3 Bug Fix UpdateThis update fixes the following bug: * Previously, connecting to a Netlink socket could fail due to a local port being already in use. There were also restrictions about the number of socket instances that could be created. A patch has been applied to and the connection can now be established as expected.Scientific LinuxScientific Linux 7libnl3-devel-3.2.21-10.el7.i686.rpmc067e0df209103dfc172e25a29d2be3518b3bfc53666d4b8fbdb04d9c3dba4b1libnl3-3.2.21-10.el7.x86_64.rpmb1c05228f1435bedff6bb3a8c7804ae07c8adb0199c88cd91a377f66344637bflibnl3-devel-3.2.21-10.el7.x86_64.rpm30cdc0edea6025a43a4a859b5c51441ed7b707f6b5b7794b9519c90c262f1571libnl3-doc-3.2.21-10.el7.x86_64.rpm80801f9e1d1efb37a9d732e418616da92842c546081c2f905d80aba11c2afc2flibnl3-cli-3.2.21-10.el7.i686.rpmaef6f2be00e79e6a3116b1fd967ab40aa045e32d52bb3c382d5edcc1d8633e01libnl3-3.2.21-10.el7.i686.rpm0d243c733029dd6aaf6692932d9c57b2f748924081c301fc34b4a87bef74a5f0libnl3-cli-3.2.21-10.el7.x86_64.rpm7daa3504c47f69cb45cf72a66f8dd309fa69355844c9bc1de0d63cde998a5ba2SLBA-2015:2106-1Desktop Core Libraries Bug Fix And Enhancement UpdateThe upower packages have been upgraded to version 0.99.1. The libsoup packages have been upgraded to version 2.48.0. The pulseaudio packages have been upgraded to version 6.0. The gvfs packages have been upgraded to version 1.22.4. This update fixes the following bugs: * Previously, the default dbus session bus configuration provided a very large limit to the maximum number of allowed open file descriptors. Consequently, logging in to a graphical environment as the root user caused the maximum number of open file descriptors to be set to a large value. This fix changes the dbus session bus configuration to provide a lower limit to the maximum number of open files, and the root user now has a limit of 1024 open files descriptors, when logging in to a graphical environment. * During an unmount operation, new requests were executed on another thread, which made private GNOME virtual file system (GVFS) backend structures accessible. As a consequence, GVFS backend terminated unexpectedly because private structures were cleared in the meantime. Also, in some cases, Nautilus crashed in this scenario. This update makes sure new requests are blocked and returns an error message while unmount is being executed. As a result, GVFS backends are now unmounted properly. * Previously, the GNOME Desktop Virtual File System (GVFS) trash implementation did not take access permissions into consideration when creating file monitors for mount points. Consequently, file monitors were polling files without read access permissions, preventing AutoFS mount points from expiring. With this update, the trash implementation no longer creates file monitors to monitor files without read access permissions, and AutoFS mount points can now freely expire. * GNOME virtual file system (GVFS) volume monitor previously did not verify whether an optional callback function was provided when ejecting a drive using an invalid pointer. This caused client applications, for example Totem, to terminate unexpectedly when drives were being ejected. Currently, GVFS volume monitor verifies whether the callback function is provided, and client applications no longer crash in this situation.Scientific LinuxScientific Linux 7upower-devel-0.99.2-1.el7.i686.rpm713224a734b184f24725139d1fb71e807f34eea542cf97e1aef5522336df068egvfs-fuse-1.22.4-6.el7.x86_64.rpm99733cd205afa1736b3028a3dc46a548acffe76d9ee8237c4373cacd67fb497eupower-0.99.2-1.el7.i686.rpm2b6070b0dfce9167a37d190d97ecd4430d4fe5d5caca3f734a45251628270014upower-devel-0.99.2-1.el7.x86_64.rpm26326bf09a653d2283c514fdfd06e49dcc45ed76338bc44f7c261f29b1091e96gvfs-afp-1.22.4-6.el7.x86_64.rpm01e14c03cbe6653aa871730f9c53289b48fa72715c2196f6e538eb8764f808e3compat-libupower-glib1-0.9.20-1.el7.x86_64.rpmc22dabda3e79be6d9da206c7c12085332900e00992a483e8df078cde5ae151f8gvfs-1.22.4-6.el7.x86_64.rpmbb3846eb021d5dacbd49f4401e1e6680f003a5653f186e7a4116689c9c02b946gom-0.2.1-3.el7.i686.rpmdb1b1fd6bcf76c8daa090a36d371e185c2e26f321e96e29dc33e6aeaa73e9b99gom-0.2.1-3.el7.x86_64.rpm9dfd647cf74f12d3dc626e2c8d9362018b7fab1417556946f9480cbc556c0ecbgvfs-afc-1.22.4-6.el7.x86_64.rpmf979282ee7bedb7542bfef25141b85a069e11cbadb24dc7417763af04cfabc5egvfs-devel-1.22.4-6.el7.x86_64.rpm30fbee25029a0e815eafd10d720af4d01f76a6694bb40ab22a6a867af15903e6upower-devel-docs-0.99.2-1.el7.noarch.rpmec36dc5a508106bea8409d67aa5ee12004015c2ff0d1147c4573b8c61549a6fagom-devel-0.2.1-3.el7.i686.rpm43fb39cd88861c30a6a70b627ffda21cf55b600233a3e3daac85f0eb6778fd36gvfs-devel-1.22.4-6.el7.i686.rpm41bed3c54b474d9ac2ea493b871313b1dd1e0e3ff45f9a335ada17e02c82a99egom-devel-0.2.1-3.el7.x86_64.rpm8d01ef7abf485656eb28dbf758b1c59c588c64b2deeff107acdcf816e27b26cegvfs-mtp-1.22.4-6.el7.x86_64.rpm13da8e148e4e6d7663035b5c48cfe135c72da9658e311385e269aaea5cb2847cgvfs-archive-1.22.4-6.el7.x86_64.rpm0af77fd45c1653480477fd3e8d029da0835d93586cf355ac1dafbcd39dceddacgvfs-gphoto2-1.22.4-6.el7.x86_64.rpm0319861a582492df4cac5e5e3023da859dfad03b13e29b8587de87e65e60201dgvfs-1.22.4-6.el7.i686.rpm02a31168127d090c372bb5cc012b9c271b612d7fdf75e99f5cbc8f7c78e911aagvfs-goa-1.22.4-6.el7.x86_64.rpmc5dc08df5306b17b55159bfc5ceee5c3880383ba49cd0a74662a713f88b05299gvfs-smb-1.22.4-6.el7.x86_64.rpma86c876e15c8e935d491871936fb8aad78efd8688549648d2f07cf6f984b5e1fupower-0.99.2-1.el7.x86_64.rpm4784477a621a534ca795409987bc8ab5cc52323ef1fdd30c0faa3f683c17f99fcompat-libupower-glib1-0.9.20-1.el7.i686.rpm47a94f934ba7a8bf56e0d48b65d908d6fd30d93e2d7a2c471dcfbaf987e75ab9SLBA-2015:2116-1Gtk+ Bug Fix And Enhancement UpdateThe orc packages have been upgraded to version 0.4.22. The atk packages have been upgraded to version 2.14.0. The cairo packages have been upgraded to version 1.14.2. The pango packages have been upgraded to version 1.36.8. The gdk-pixbuf2 packages have been upgraded to version 2.31.1. The gobject-introspection packages have been upgraded to version 1.42.0. The glib-networking packages have been upgraded to version 2.42.2. The dconf packages have been upgraded to version 0.22.0. The gtksourceview3 packages have been upgraded to version 3.14.2. The json- glib packages have been upgraded to version 1.0.2. The webkitgtk3 packages have been upgraded to version 2.4.9. The glibmm24 packages have been upgraded to version 2.42.0. The harfbuzz packages have been upgraded to version 0.9.36. The libxklavier packages have been upgraded to version 5.4. The glib2 packages have been upgraded to version 2.42.2. The gtk2 packages have been upgraded to version 2.24.28. This update also fixes the following bugs: * Previously, GTK+ was treating frame times from _NET_WM_FRAME_DRAWN and _NET_WM_FRAME_TIMINGS as local monotonic times, but they are actually extended-precision versions of the server time. This was causing rendering stalls when using GTK+ applications remotely. With this update, frame times are converted to monotonic times when the X server and client are not running on the same system, and GTK+ applications can be used remotely without rendering stalls. * Previously, the glib2 packages were rebased to a version that deprecated the g_memmove() function. As a consequence, libgsf failed to build from source. This update replaces g_memmove() with memmove(), thus fixing this bug. * Prior to this update, the Python plug-in for GDB did not work with the version of GDB in Scientific Linux 7.1. As a consequence, GDB returned error messages when debugging glib2 applications. This update applies an upstream fix to use newer GDB APIs, and the Python GDB debugging aid for glib2 applications now works as expected. * The glib2 utility previously returned confusing warning messages when programs added GObject properties after the class was initialized. The functionality of adding a property after the class was initialized has been added back due to backward compatibility concerns, and error messages on properties thus no longer appear. * When selecting a file in the "Add attachment" window, Evolution previously terminated unexpectedly with a segmentation fault. This update fixes the gtk_tree_row_ref_deleted() function causing this bug, and attaching a file no longer leads to a crash. * Previously, the CUPS back end checked an incorrect port to connect to remote printers. Consequently, fetching printer information failed and the "Print" button became insensitive. This update makes sure CUPS checks the correct port, thus fixing this bug. Users of GTK+ are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.Scientific LinuxScientific Linux 7json-glib-devel-1.0.2-1.el7.i686.rpmf712ea3fc81edacf2713074b34d044cea7db1146c4256cc30cc79754db339381atk-2.14.0-1.el7.i686.rpm6c13b19b7fcffd54a6496c61d7e535d4b04fcc55ff46431c5d02e03318ed7616glib2-2.42.2-5.el7.x86_64.rpm74c3a5417c7b8a5cad44ce9c8c86637039a1dd83cfa0ef16037131162d66ddf8pango-devel-1.36.8-2.el7.x86_64.rpmd04226f1f87764983c09a051b481b1c1135cdeb95e2a8365b743afc3cd7cc10cjson-glib-devel-1.0.2-1.el7.x86_64.rpme6afe66d709bef27bfeaa34eb10ac5d99e1929b1403bb3168340b0d1e0699f6dglib2-fam-2.42.2-5.el7.x86_64.rpmaabd094052b50a65f07fce3716808c5bb37eb0301d82089085795e2e9888bbe2glib2-2.42.2-5.el7.i686.rpm3e34600f6a15f513798dbc1950d7e071977343b96d3491d936bcd35116140e81gtk3-immodule-xim-3.14.13-16.el7.x86_64.rpm6cedd88be554e06fa4b52ac9f69e2c0eeff82334058336513341b32a3e2465d1cairo-gobject-1.14.2-1.el7.i686.rpm04676f0920c2cc358388f5e6cc79b9c6d7261bd761bb4c1cbd8a3a38a796f952cairo-devel-1.14.2-1.el7.i686.rpm345a6c779653293c54f691373158f0a9ef2d403f94403225269d71b1ef64eec5gdk-pixbuf2-devel-2.31.6-3.el7.x86_64.rpm63a9c5951d2576d49da35a7abb4517d3f3e1a5e7c4ab61ef902ddabed44c069bcairo-gobject-devel-1.14.2-1.el7.i686.rpmf83ba619f5f56c3d585746543d3789fc3cf7e759dbfd4e063ad800ebd216b6fcglib2-devel-2.42.2-5.el7.x86_64.rpmfad0d3e25a047b9114e0e7e0089099fe3669bc0ab740487585eac691cdb43265gtksourceview3-devel-3.14.3-1.el7.x86_64.rpmab748b90a95db8ee40998d1be453bed2cb2d7e23dc1a2684604766ebf0fa47c8gobject-introspection-devel-1.42.0-1.el7.x86_64.rpmb4cbe45fc796348877068b017ef3f4e5fb6ea1e691b9a5320b3e818509c8db30glib2-devel-2.42.2-5.el7.i686.rpm3860bb94d4fcf69593f54e68b7327ba0577cbe88408fce480222ac859db13011pango-1.36.8-2.el7.i686.rpm552c3c820e81ab7a878a6bc7e7dd9db3a476cddcd6d046bad0b232cbb54e306fjson-glib-1.0.2-1.el7.x86_64.rpm2cdf0d241cae0bf59b18eb2b44a49cf325327f8e983cfe7d0e3759fb241cd38dglib2-doc-2.42.2-5.el7.noarch.rpm470707e00ac198b38677448752c459c0afba683420a5b35d8f7941697a543093gtksourceview3-3.14.3-1.el7.x86_64.rpm1da724f9913d346be4db2dea372e8f2ffdcf7f3749bb39728d92b8de053de497atk-devel-2.14.0-1.el7.x86_64.rpmf807723c995947d3d64d1d5f72f91babf3eac46f52797a731462c4c802141921atk-2.14.0-1.el7.x86_64.rpm165b5f51bf64ac73d6f6120536a1c6ccfb5d99241e96c6dedaff986dc77dc0d6mozjs24-devel-24.2.0-6.el7.x86_64.rpmc81b6c39fa9ed29a9a14b7a23e7e6b04bd0fb01333b4387939c667c90a26747eatk-devel-2.14.0-1.el7.i686.rpm4de984fbf69ca86fad269484f92c0f3b8b40e969609e79a0b112347b1b64255agtksourceview3-devel-3.14.3-1.el7.i686.rpm492fc1cca4fdb7f2cfe76843826744a9359e932e5a9e058f0f7497e6d89e9008libxklavier-5.4-7.el7.i686.rpm293a35525f88cd10b9816529a3db3333b962136d3bd92e60261fbbe4c5fff7bdcairo-tools-1.14.2-1.el7.x86_64.rpma6cf3d20d0fef5f8ee74668ee3fdb3694ee4e06a69540064134db692f3881c7egtk3-immodules-3.14.13-16.el7.x86_64.rpmd7594278d6e1aa60e84e5af1d08a1be759a723564e3cb3b9b0ceafcaa43429d9pango-devel-1.36.8-2.el7.i686.rpmf93a5bb3b835cc96236f3fb1905a00c9c9ac0423c7048e781043c138eff6b754cairo-gobject-devel-1.14.2-1.el7.x86_64.rpm1deac514dc8e088e327bfb450a73e4ee58cbea82058cb65e8ae2f21c4335c21cgobject-introspection-1.42.0-1.el7.i686.rpmb91074f8818e201919909c364f9e8d6e7a2348929d74d2496e894e5d0fc9297dgdk-pixbuf2-devel-2.31.6-3.el7.i686.rpm5301a1357a9d492c6af8da28e835c7b72ce587c96b71fd78301d2a36a9220f0bgobject-introspection-1.42.0-1.el7.x86_64.rpm5431fb1864024f7fd4474cf58059f33b615f45d93cd8ab39fb1d319337009ea2gdk-pixbuf2-2.31.6-3.el7.x86_64.rpm84c3b997d23f682e82d8f3ebaedf6bb478a8a460c8508bfd6c10d9709b87b361json-glib-1.0.2-1.el7.i686.rpmfd43a897f9029862d4bb446c3413189346eb5e87dcbf56af29f364240968d6cfgtk3-devel-docs-3.14.13-16.el7.x86_64.rpm8a5a13e55a6368d41eacd021b80c4ddb94b945ba6abd4237a515f886a2a51c21cairo-tools-1.14.2-1.el7.i686.rpmc096f6fdc9e01673493a12dcee0dc75ec8702dea3b036af11f8a12bdd8854da2libxklavier-devel-5.4-7.el7.x86_64.rpm30865ebb2703189841e44db243bd000cd94280860523c2b8c5805c1f02fac481gtk3-devel-3.14.13-16.el7.x86_64.rpm1c4414b89adbf157bcd0613c352066972bc815ce088a8cf8b18584a7bc610f49gdk-pixbuf2-tests-2.31.6-3.el7.x86_64.rpm99021f16486456d34451eabdfc745f9c956e1aec3a72593032cca981f2f83e9fmozjs24-devel-24.2.0-6.el7.i686.rpm44bf5d54de210accdfa3a0c5570d7f74f489ea8d2b3bdf6bccaf7afcbf656453libxklavier-5.4-7.el7.x86_64.rpm1bcdb92aef4f1a276dbef036b91a00a0704f0cdef24858176b3e0a2ae75db2ccpango-tests-1.36.8-2.el7.x86_64.rpmc6a567df985c4279389dbe813e74482a6366df75298143ad48395503577ae849gdk-pixbuf2-2.31.6-3.el7.i686.rpm36a1d959e1a49a33e44eab59addb8633d19b7f9a6363a7c1fd65c7ddf7a08a91mozjs24-24.2.0-6.el7.x86_64.rpmd6c3000c0148ca9cb7132414f332e95b3c77952d9c8ae5379d000b83c07e1e12mozjs24-24.2.0-6.el7.i686.rpmbc6f2b69a0b78e6ac425f648b689d8132afc61be8cfaabb7d4665b452acecbadcairo-1.14.2-1.el7.i686.rpm3f575276df292053ed2f9cb13b6ff0049038499bfe5ab5ed3b53aca4b891a0f5gtk3-devel-3.14.13-16.el7.i686.rpm057fa04237c8a9db069ad861106bebdda3edb2e3eaf2323beb6ac70bcb4d8c04libxklavier-devel-5.4-7.el7.i686.rpmea8ba683a0ab966e2aa169763a3ed44bcf138b9f6cee4caa10354c858dde2aaacairo-1.14.2-1.el7.x86_64.rpm36e9e60108262fad225f7031d830676b0c87bad9fb991045ba47ca584a9c22f9gtksourceview3-3.14.3-1.el7.i686.rpm70c639c8c7fb77f56dad325665c9b905d72d6587f16f7341d6f137d33ec989f1gtk3-3.14.13-16.el7.i686.rpme3e8cd1978c8404ac239157c788c32c4b96bedd3490449e678d4d23ae88618f1cairo-gobject-1.14.2-1.el7.x86_64.rpm4a7daba27527657c8ff453739113f58520dbfa13c99d0a9e0ec9a5bb5ea7afc6gtk3-3.14.13-16.el7.x86_64.rpm7dc529057e36a8fe71ec2ed8e4ece69d039fc1ff1bf962a3c39fd11fb14e837ccairo-devel-1.14.2-1.el7.x86_64.rpmba5fa80f792532d6057a9dbba4e901558295b40028105be8ff3f0d9af93e30e4pango-1.36.8-2.el7.x86_64.rpm1ac1ce1a19aaf100ccbaf5bfd1db3a043b17549c37b38a61c007ca2ef103b093SLBA-2015:2119-1Kmod Bug Fix And Enhancement UpdateThe kmod packages have been upgraded to upstream version 20, which is required for upgrading the systemd package and which also provides a number of bug fixes and enhancements over the previous version. This update also fixes the following bug: * Before this update, when managing symbolic links used by kernel modules, the kmod tool caused inconsistencies between the file system and the state expected by RPM by incorrectly deleting a number of directories. Consequently, a warning message was displayed when RPM was used to remove or upgrade a kernel package. With this update, the faulty operation has been fixed. As a result, RPM no longer displays warning messages about missing directories in this circumstance.Scientific LinuxScientific Linux 7kmod-libs-20-5.el7.x86_64.rpm5295adc12f27315b90d78810d279a6eba5bb0864aa673e38c2a2a4f89e0dce8akmod-devel-20-5.el7.x86_64.rpm1772df97c91d63d6d222edfb7fea090d5b38721f2c03d7610e6cd84db01890c4kmod-libs-20-5.el7.i686.rpm86aa7f243b86f26f168f4d2ef350366cb663c3e7d7a56851c550f26587f7b69dkmod-devel-20-5.el7.i686.rpm7f10db2af968b12ec2a519fb48fa5e881b706a13786657e9526403fdc1d82275kmod-20-5.el7.x86_64.rpmb9e42755e46f63be1eef0ef59405fe7a1a8409cfcd9de4f57db3dbbbc43e1541SLBA-2015:2133-1Python-Augeas Bug Fix And Enhancement UpdateThe python-augeas package has been upgraded to upstream version 0.5.0, which provides a number of bug fixes and enhancements over the previous version.Scientific LinuxScientific Linux 7python-augeas-0.5.0-2.el7.noarch.rpma22997ee5337c14d68f58e6769e6867f7a768a246769ae1ec09c0c0689e0efdcSLBA-2015:2134-1Initscripts Bug Fix UpdateThis update fixes the following bugs: * Due to a change in behavior of the grep command, the resolv.conf file was always deleted. The underlying source code has been modified to and the intended behavior has been restored. * Previously, the values of the kernel.shmmax and kernel.shmall parameters, which were set in the /usr/lib/sysctl.d/00-system.conf file, were too low. As a consequence, some applications, such as SAP, could not function properly. The unsuitable overrides have been removed, and the kernel defaults, which are sufficiently high, are now used. * Previously, the /usr/sbin/restorecon utility could be missing on the system, but the import-state tool used it. As a consequence, import-state failed. If the restorecon relabeling operation is unavailable, attempts to fix SELinux using restorecon are avoided. * Previously, when an initscript service terminated unexpectedly, the default setup for SysV initscripts in systemd caused systemd to report the service state as active (exited). As a consequence, the service status command returned with a zero exit code even if the service was dead. With this update, when a service is in the active (exited) state, the service command now correctly reports it as dead.Scientific LinuxScientific Linux 7initscripts-9.49.30-1.el7.x86_64.rpm870bc1b12c0c58c0a2cb653b7a86cec4c21609b99083e15afc22957c59036462debugmode-9.49.30-1.el7.x86_64.rpm1f61df5ed3b2bd6eabfc03f151875d0fa93f0b81e4c8c70973fb3323873cd847SLBA-2015:2157-1Control-Center Bug Fix And Enhancement UpdateThis update also fixes the following bugs: * Due to insufficient permissions granted, the user was allowed to join a domain during the initial setup. Consequently, a cryptic error message was displayed when trying to join the domain. This update provides an adjustment of the Polkit policy to authorize gnome-initial-setup to join domains, and users can now successfully join Active Directory domains from gnome-initial-setup. * Previously, insufficient ordering constraints in start up services caused AccountsService to access users from the nsswitch utility before nsswitch was fully available. As a consequence, autologin could malfunction at start if it was configured for a network user account. This update ensures correct ordering of the AccountsService with nsswitch services by using the "Before=nss-user-lookup.target" dependency in the AccountsService systemd unit file, thus fixing this bug. * Due to resource leaks that caused signals to be called when the related "Settings" panel was closed, control-center terminated unexpectedly with a segmentation fault. This bug has been fixed within the rewrite of gnome- bluetooth helper libraries, and control-center no longer crashes in the described scenario. In addition, this update adds the following enhancements: * Previously, a remote session of desktop sharing was created without any user confirmation or password access. A new feature for the Vino VNC GUI has been implemented to offer the user the ability to restrict desktop sharing options. * This enhancement update introduces On Screen Display, showing the layout of the tablet buttons and the action shortcuts associated with them. On Screen Display is multihead and left-handed orientation aware. * When searching in the "add printer" dialog, the search now starts immediately after the user stops typing. With this update, there is no need to confirm the search demand. * This update adds support for geocode-glib and geoclue2 that allow geocoding, reverse geocoding, and geolocation in Scientific Linux.Scientific LinuxScientific Linux 7gnome-online-accounts-devel-3.14.4-3.el7.x86_64.rpmf76dbb20ce8d40092c1e5438fb2d0ac95772acde69714f12ece00f0c742933f9control-center-filesystem-3.14.5-8.el7.x86_64.rpmc12477311a5563943d89e7ada9aaf4a92db9922ad9cb6b850bc3e8310436e672geoclue2-2.1.10-2.el7.i686.rpm2094156bd987189928bc4ecf264e70942ea992eb3492daed332633a3d462ae64geoclue2-2.1.10-2.el7.x86_64.rpm0d19113b245434b7dfca364af84f071bb022d6acc8b29ab95679f95bab8bb36bgeocode-glib-devel-3.14.0-2.el7.x86_64.rpm4ef416be7f39057a6dc14d112f4c2bc7868e6b6d5a1e96e8d59203dea975b02agsettings-desktop-schemas-3.14.2-1.el7.i686.rpm5ad3460cdb3dc6989ca3a46a6e258aecd5d2d7e8d61053296624b50b2e1799f9gnome-online-accounts-devel-3.14.4-3.el7.i686.rpm2b4bb2be0d93fbd2df7312fb130f348930292369a00e86ae6c73bb1d34259fc8gnome-settings-daemon-3.14.4-9.el7.x86_64.rpmd708a788126052b1b490f78f3f39da37bf01237d213e5cfb13a453e541027fa1gnome-desktop3-3.14.2-2.el7.x86_64.rpm528294060f7d1823bb7464cc1a5ec9ed3ab386d49fe8023473f1f1156f5288f7gsettings-desktop-schemas-devel-3.14.2-1.el7.i686.rpmaeb068cc6ca96ea3c41d95075968b27d3461154ad98499f09a2c7acfafaed275gnome-settings-daemon-3.14.4-9.el7.i686.rpm0b5c6ce5f6203e71965456f712fc31164324c24c27e4ef45696aa963ff8917d0geoclue2-devel-2.1.10-2.el7.x86_64.rpm133118b265563a24bbdf5637709d6df30cfd92371cb4868e30c971ef582a979bcontrol-center-3.14.5-8.el7.i686.rpmb0319df543a3617b275cdcf768cf165cb09304af3b1d132e7290c1145d7d3337geocode-glib-devel-3.14.0-2.el7.i686.rpmdc69cf2e888eb36c970085e6f5dfb3f9d82bf387562c779d3e4be46095622807gnome-initial-setup-3.14.4-5.el7.x86_64.rpm1c90e25fcae880062a2ba5c429dcbffb4d3fae38f8a95a27a5d1b36421f8d6begnome-online-accounts-3.14.4-3.el7.i686.rpm7317bb22d7ee3e665639bc7b40492c149097e7ff68ff52f9186930baa6a4a5cegnome-online-accounts-3.14.4-3.el7.x86_64.rpmddd3dd8fbcc73179e2fa48298ddda4480d25fe3d47b284645a9007d917b72ef7geocode-glib-3.14.0-2.el7.i686.rpmbe999bbd4e4a1c54eb9129abe3334f054bf04b464003f8c9c1980c2f872b7a9bgnome-desktop3-devel-3.14.2-2.el7.i686.rpm3dbe56332a16ca022b2c499d399fc1a94a924ebd765e06797ba06cb4a7cd9a00geocode-glib-3.14.0-2.el7.x86_64.rpmd91bad4d243f1ab349935ceb103c852c85f66830b778fdddfe32f84e9feeb2edgnome-settings-daemon-devel-3.14.4-9.el7.i686.rpmf2d495983c32f19fcb8503279e33287375837db32b7a968b090007bd8db7d7d6gnome-settings-daemon-devel-3.14.4-9.el7.x86_64.rpm3740e197aa20cba498c6bbd88ed569c9c21d2e5d92cbbad4383b428d9f748ae5control-center-3.14.5-8.el7.x86_64.rpm07881066f5613dc0102ccfc8b6b096918a7c62d3257f10a8ff1cecb66d857d21gnome-desktop3-3.14.2-2.el7.i686.rpmdc19089c425d149c13af7b521b9417b063407bd6e2fccf022fb9353312fb7d8egeoclue2-devel-2.1.10-2.el7.i686.rpmcdd55e97c3ea4455a76fd1c3cd9da939f2112b1f92b10bb2d986466f4ed9989agnome-online-miners-3.14.3-1.el7.x86_64.rpmc7078d463f3c46f6d72ce76c90dd8281023d0e0e492bab47ada64e702c51c7fegsettings-desktop-schemas-3.14.2-1.el7.x86_64.rpm66d1dadfd461414eda054ace5b7d37ad0bcfb5e7796d33129676156002d160e1gsettings-desktop-schemas-devel-3.14.2-1.el7.x86_64.rpmcec79dd53acf7aa45d3b894902bab8a1a74ac1cef2a257c63ed1e0184c0b57a5gnome-desktop3-devel-3.14.2-2.el7.x86_64.rpm5abbc62058ba85d972bb8823a3eb5e5d8bbdcc5a2758cdd2f1c71316ba9ab440SLBA-2015:2187-1Nuxwdog Bug Fix UpdateThe nuxwdog packages have been updated to ensure correct operation on Power little endian architectures. This update fixes the following bug: * When using Red Hat Certificate System version 10, retrieving a stored password with the nuxwdog daemon previously caused the password not to be correctly null-terminated. This update fixes the underlying code, and the password is null-terminated as expected in the described scenario. In addition, it is now possible to use nuxwdog to prompt for passwords for programs or daemons started by the systemd service.Scientific LinuxScientific Linux 7nuxwdog-devel-1.0.3-2.el7.x86_64.rpm2b257c76d105725479929ba864cffd0d2dd4a78d8e4410346ab4fc5eccfbd9a0nuxwdog-1.0.3-2.el7.i686.rpmfa83a2a8012228614bdf8b7ce7f94eb20e69240d91c0b7976ef85f9f3c5e2c71nuxwdog-client-java-1.0.3-2.el7.x86_64.rpm59e22e95c15ef2884cb1560cdf31342d8114b00c047b5ab79f0ad7521e242e60nuxwdog-1.0.3-2.el7.x86_64.rpm966e637d1a23cf022365264cd75fee70617f6aea6c445a29121e431b41b1d379nuxwdog-devel-1.0.3-2.el7.i686.rpm4c47366ad36217ac04d3547871438858a0a4f4b2b0a2f392f7558acca0f0a19cSLBA-2015:2188-1Tomcatjss Bug Fix And Enhancement UpdateThe tomcatjss package has been upgraded to upstream version 7.1.2, which provides a number of bug fixes and enhancements over the previous version. Notably, the getPassword method for the tomcatjss utility has been enhanced to optionally include a counter to track the number of retries, which enables tomcatjss to interact with the nuxwdog daemon and allow multiple retries for a password retrieval.Scientific LinuxScientific Linux 7tomcatjss-7.1.2-1.el7.noarch.rpm009da872f35607703d115a1abc9ed04b745e9670d67dab22dbaced5000f70427SLBA-2015:2191-1Langtable Bug Fix And Enhancement UpdateThe langtable packages have been upgraded to upstream version 0.0.31, which provides a number of bug fixes and enhancements over the previous version. Notably, the Anaconda installer no longer terminates unexpectedly when certain languages are used during the installation. In addition, the Anaconda terminal user interface (TUI) now can use the list_scripts() functionality from langtable, which makes it possible to detect whether the currently selected language can be correctly rendered with the Linux console.Scientific LinuxScientific Linux 7langtable-python-0.0.31-3.el7.noarch.rpm3ef2cb504199b7b934bfddc4e5380615abda57a19c1de6711e3404b6d1b2a9bflangtable-0.0.31-3.el7.noarch.rpma34625d350eaf18eabd684d3651022cef6589dca6af53c57e2d2f025bc86c788langtable-data-0.0.31-3.el7.noarch.rpmef241d24b4c6917dab9caeb5a43491c231aea2cbcee5103561799130b5dc210eSLBA-2015:2195-1Gnome-Bluetooth And Bluez Bug Fix And Enhancement UpdateThe bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Red Hat), and pcmcia configuration files. The bluez packages have been upgraded to upstream version 5.23, which provides a number of bug fixes and enhancements over the previous version. Among others, this release: * merges the hcidump (bluez-hcidump.git) and obexd (obexd.git) projects into the main BlueZ project (bluez.git); * uses standard D-Bus ObjectManager & Properties interface; * introduces new libbluetooth- independent Profile interface; * adds new bluetoothctl command-line tool for interacting with BlueZ; * adds new btmon monitoring tool; * implements general connection establishment procedure with a vastly simplified D-Bus API; * uses INI-style format for all storage files; * introduces the following new Low Energy profiles: Cycling Speed, Scan Parameters, Alert Heartrate, HID over GATT (HoG).Scientific LinuxScientific Linux 7bluez-hid2hci-5.23-4.el7.x86_64.rpm3c61d526aa4b0fa3d241eca13bcb85add0517abebd569f1e498a84d22517be92gnome-bluetooth-libs-devel-3.14.1-1.el7.i686.rpm27121263eaf5dab24904093d1519a46aab48d6827d0831b425b239ed0e68e7bbgnome-bluetooth-libs-3.14.1-1.el7.i686.rpm6e7d77176f46b7bff1c5ecc228dd7bc0372e8d61c1e0754781979e178f1221dagnome-bluetooth-libs-devel-3.14.1-1.el7.x86_64.rpma3969d8620504667f78788a3bfcfa0d6463e2eb20eb63ea0e41c041d988e15d7bluez-5.23-4.el7.x86_64.rpmeedd19c77b76967ab15aa226d1a834ce951e1aaa6da48df38300ed8eaef39dbdgnome-bluetooth-3.14.1-1.el7.i686.rpm963ee6e6a2cb5776556cec501c3a0a36f1398917c2543cb15a21366b1288ca35bluez-libs-devel-5.23-4.el7.i686.rpm54f047c1ae91690551e452c429c049e10e000108ad8b772031664848f6ede77abluez-cups-5.23-4.el7.x86_64.rpme224aae0cb780a3720453911576007871162b339ae23df2ac052fe6fd74088c1gnome-bluetooth-libs-3.14.1-1.el7.x86_64.rpm476c68f465e030d290dfbae87407e85e5009bdc836f04e17ba923562d018d4a1bluez-libs-5.23-4.el7.i686.rpm2d91000907772adb53d8e145fc1c304230d8de56ab54f36b35e0cbd3dc3c62d5gnome-bluetooth-3.14.1-1.el7.x86_64.rpm14d9b6c953d7be0dab68ff90fa2c2bc0c3f1e0e41201181953c7f1a32f395cb4bluez-libs-5.23-4.el7.x86_64.rpm4f83d40a0cae07c77f4105e9a9151dccf0ccb8bcc854a085acd01237a9398ea3bluez-libs-devel-5.23-4.el7.x86_64.rpma122267e10b2aa6c85414f8421bb1f4d3f66191c8039722633c08e152e6fa7e7SLBA-2015:2197-1Libreoffice Bug Fix And Enhancement UpdateThe libreoffice packages have been upgraded to upstream version 4.3.7.2, which provides a number of bug fixes and enhancements over the previous version, most notably: * The possibility to print comments in page margin has been added. * Support for nested comments has been added. * OpenXML interoperability has been improved. * Accessibility support has been improved. * The color picker has been improved. * The start center has been improved. * Initial HiDPI support has been added. * The limitation on number of characters in a paragraph has been raised significantly.Scientific LinuxScientific Linux 7libetonyek-devel-0.1.2-4.el7.x86_64.rpm78c6290722bc1b6e82fef6697ce5779a41840ddf8a3a47b49841bf0915770079libfreehand-0.1.1-1.el7.x86_64.rpm3684bbd493de60839f5382fe7a590a3e20e16b0f57ed8323e23575e32f96c8bbliborcus-devel-0.7.0-6.el7.x86_64.rpmc6ab0b57fa8a5cbc930b1a67b18b58b72b3ef9fd8c9fa8da801f28f64eb7cf3clibodfgen-devel-0.1.4-1.el7.i686.rpm4024d8ddbdacd285e56b0e2e854a53ed0759a8d583c9c2cf18a3fc3137ec9ea9libmwaw-0.3.5-1.el7.x86_64.rpm7729c7d98f761f4ef487eefc3d28594f6df33332770157ff0ec8a0dba4cd2e29libwps-doc-0.3.1-1.el7.noarch.rpm09ada71cebfdf77f462dd598fb6e7c96200cfbe4be21393c881acfd0c0e6e2a6libvisio-doc-0.1.1-2.el7.noarch.rpmc8c91f2915f73c16dec348cc76ecf27e6e3fbc5c422ea623b306389477825d40libetonyek-0.1.2-4.el7.i686.rpm3d1385560ea9398eddfaeb04d83ff437b06cd7439d5dd74e6f1c208fcbe9cccalibodfgen-doc-0.1.4-1.el7.noarch.rpmbcb6406822e01b85457ecc5f5706baca9eb6716e77cd9b940aaf41da53eaa738inkscape-0.48.4-15.el7.x86_64.rpm60cf8119a8d668ec9b16c709472225a725b535795f16fd16a98fdafa386a77c0libfreehand-doc-0.1.1-1.el7.noarch.rpm2ef7e2da90943499934e83ed03f84c493e4037f8733ac8026803eee111d67e9elibwpg-devel-0.3.0-1.el7.i686.rpm4e802c550467f746f6065091f0159ae8366a6475ce1397dec095406da048b658libwpg-tools-0.3.0-1.el7.x86_64.rpm18dadf2d2d05013820e81b68df75ec1bf298d936880242785153f9753065d65clibwpd-0.10.0-1.el7.i686.rpm1f58b7475b90b9ce8c636524c5434b1a75e2671219da6d23f5e4fc2142bb3581liborcus-0.7.0-6.el7.i686.rpm95412e8071759df41ba0a4e5e94f3ada0ea1b601ce7f08134e36fd819d90e91blibwps-0.3.1-1.el7.x86_64.rpmf8fabb065efbd7734160f8ef14b5b787ec7d32790d40a54c0b36b61e0d4f6d12libetonyek-0.1.2-4.el7.x86_64.rpm83a8cc947f522fd97a6b202d3a6734e73a47532a7a37781108a652fc339079e2libmspub-0.1.2-1.el7.i686.rpmd2364eeaf5531f7a506c2898480e354b6e3ebc381026338bb5a3bc85afa8b398libcdr-doc-0.1.1-1.el7.noarch.rpm0b6fd7aafaf657cb0db03f1b12a03e469b0df76c385ff3586107a65dfd44a515libetonyek-doc-0.1.2-4.el7.noarch.rpm9485cd1ca610e693bdfb1463b4a552b46afd3ef0c9e719174f437390acc54afclibvisio-devel-0.1.1-2.el7.i686.rpm386c8add052ac821a71b1c3ce02e3734a9a632ffbe906ee16ef3baf0b34076c0libwpd-doc-0.10.0-1.el7.noarch.rpm76247567fdfa358531d2697a7dab59f9f3cdfe50002b170a7a4f97ca0ed91536libodfgen-devel-0.1.4-1.el7.x86_64.rpm2b6cacbeb51f70ccfb749337411277f66d14a227ba9f16df028933d5967339c4libwpd-devel-0.10.0-1.el7.x86_64.rpm95666fd175e7174a21ebd88bb79e7ec433cb1d418b917e38ae4b175a50d8a838librevenge-doc-0.0.2-2.el7.noarch.rpm62852b22b2b4874f425c51fc1db9326d8272325986b0dcf09439cdc83b94d630libmwaw-tools-0.3.5-1.el7.x86_64.rpmf0f719415609ef82d9d00d3a3f6a91b57fbfb33766af220fa23152f293b3799blibabw-0.1.1-2.el7.x86_64.rpm8b72f9a0494a7038505dfb54d904180c54aa40fdf7375d8a79e0c2fb5a2b9e90libcdr-0.1.1-1.el7.x86_64.rpm0d5b3e9a0895119630cb9cbe32bee49d3cb06729d7cbd9f538fce5097bb98de7libwpd-0.10.0-1.el7.x86_64.rpmcf57ea816c609bb5b9557313e9b4852924436b31f6bc5d182165c406b8e37b5elibwps-0.3.1-1.el7.i686.rpmec76b9d8b48e11fc0593f1f854758ffbf3c7c8d75ef0efd494e292a968e45e3flibvisio-0.1.1-2.el7.i686.rpmd56e0a9e0b43dadc2a9761e1e9bc73ae1affeb3cdea4a259c90f1edb25efae3elibwpg-devel-0.3.0-1.el7.x86_64.rpma938b93aa639928ae4a5c5129f09ac22432b0745a165a7d87c8711150a730811libwpd-devel-0.10.0-1.el7.i686.rpma6365d580282d5c52887441218d979d5a7ab4d68aaac8b54dd6d6f6d10410a96libmwaw-devel-0.3.5-1.el7.i686.rpm66f8ac8b9a614c3b3e8ec25011d0b4393c574e237381418017454725338ad159librevenge-devel-0.0.2-2.el7.x86_64.rpm51f70e0090a3d56e504d764eb46b86a49c66c70c089489deafd8a01e749bc3d3libabw-devel-0.1.1-2.el7.x86_64.rpm128c9e9bd7a9595d5ac09dc56ebb8e67bbefa940cff31f43f9f015c4d03ec0dclibodfgen-0.1.4-1.el7.x86_64.rpm4d4842e11a5908b1a1f725f76e471797a4240a635918bf9aadc1d5c58fe38e09libetonyek-devel-0.1.2-4.el7.i686.rpm0529dbf9ec9b3395521984a1ab7fc8c0bdf26a05d930fb8e75ee47010004b4ealibmwaw-doc-0.3.5-1.el7.noarch.rpm4b66a00562a7229cca63bbccd0696fb80b836867e9008318973ab1872ed00a2clibwpg-doc-0.3.0-1.el7.noarch.rpm9982e6f3a5c8138464b3205b5d0ce8747b15950b33e0382b3761c56123c30a76libabw-devel-0.1.1-2.el7.i686.rpm8daa569fa7d06e0abcd8b9d86eb3b3391a3b52837afb496041e4d864c0461077libfreehand-0.1.1-1.el7.i686.rpmd728fd19224c70097c4631fad42c98eb6342909850edb56e622df081baa22647libwps-tools-0.3.1-1.el7.x86_64.rpme326de75747ddd5a200c3da9243ef4246e58dad571d3b4c963df001f5407a908libcdr-0.1.1-1.el7.i686.rpm3589c84961fa650eb9dbf6a3f5d34fe8396d903b0c326163a59b817283ff5902libabw-doc-0.1.1-2.el7.noarch.rpm9d5ad7fff32543342820a0b976529f5bc70d5d55e8b0a62b1856697954337243libmspub-devel-0.1.2-1.el7.i686.rpmb904b7d2ce610c10edcf9e243b056c762bf61e079f6917362aa74f32ceca62c9libfreehand-devel-0.1.1-1.el7.i686.rpm939354c6ea3a64c5281bb54812a83b924bb38d4a086c347caec3961c84873f76liborcus-0.7.0-6.el7.x86_64.rpm05cac10492b0e5585e08aaa58b741f52d4e4f0889e3289b5c9e71876342bcf0blibmspub-doc-0.1.2-1.el7.noarch.rpm863a34508165df537b02e501e96d08b3013912b403583ca7778a3298016d6338libmspub-0.1.2-1.el7.x86_64.rpm51e65d731cfd892ac8958746c1074dc80be0ec018ad99028320cd00f5ac69385libfreehand-tools-0.1.1-1.el7.x86_64.rpmd7b11d6d6a14b8e3e6a3248cff0c32938a6143c2eca1f59a601afb9cb776a520libwps-devel-0.3.1-1.el7.i686.rpm1a5783e8583172e89f8b59eee997dadf3dac0f259dc99726a5cebcf36052473cliborcus-tools-0.7.0-6.el7.x86_64.rpm93829f833619454ddbeb4b723e4e041084ee46e801abd65af9326e4d55e87819liborcus-devel-0.7.0-6.el7.i686.rpmcc95d1f6def9377f35d0ed480766ce3bc13ca925d1db07aa7c699f3c261e5f7alibwpd-tools-0.10.0-1.el7.x86_64.rpm641bfc5c6c8b755de9f0d71919ba838c0a68a953c0584bb274671b8edc6d08eelibcdr-devel-0.1.1-1.el7.x86_64.rpmdc523ad5678761cfeb8721b64880ea391d185cc015ff9cf0ad2d52071051edc1inkscape-docs-0.48.4-15.el7.x86_64.rpm184d01dc64f2275b2a42449e8a56697d2878764c90ef397527a826eecce9e40blibvisio-0.1.1-2.el7.x86_64.rpm85f2daef34601c88a16aa506c34b3701913b5f4c2896fcd44591c6d469cf1e4blibmspub-tools-0.1.2-1.el7.x86_64.rpm6088705730f885841d8b479063f0455bda204ea8afd391b32800fb8f27e84ab8libmwaw-devel-0.3.5-1.el7.x86_64.rpmdb494f366692ba86b65df6f5db303f95fdd99feb349a6e05e349effa38f42196libmwaw-0.3.5-1.el7.i686.rpme75d748ddd0eb0f7c3c5679b26ce6a1eecd8b7f9a39908073c70df010493e5a8libvisio-devel-0.1.1-2.el7.x86_64.rpm0c523a3f6812205cf533041d4d4eae6e6a52320ec28811064567f0fd2dfe79bblibcdr-tools-0.1.1-1.el7.x86_64.rpmba1d5007f97ba98272a7613ebc610666e2c2d12de15091502920393302e8ff48libabw-tools-0.1.1-2.el7.x86_64.rpm0f698bfb3fd9bde76546a347a2e614f5aa1bbcc5752b19ee11bbfb8651792047libcdr-devel-0.1.1-1.el7.i686.rpm5b20359dd28ad299125caed45be1929ac51af29b9bb7f304a9a133891168cd79librevenge-0.0.2-2.el7.i686.rpm310af565939080818687ca16f4554344bc73d47e8a547e6770712b4100cabb80libodfgen-0.1.4-1.el7.i686.rpmb316a1d51b9c22c1bdcacface1de5c384113112e1a54618c1a6703233ff05465libvisio-tools-0.1.1-2.el7.x86_64.rpm8e0dbdedbcfc500067575ef554a5c4db16e7ff196dde5925ccfdabd062a5a2fdlibwps-devel-0.3.1-1.el7.x86_64.rpm26a9f9f8e62100dd6955e137eee66e2332ba65274405c339cf2bf6a63b1e10e9libabw-0.1.1-2.el7.i686.rpm533bbf5667d2cf03c71872e2c7b81a8328c969b9d1124433579232cb66b74e1binkscape-view-0.48.4-15.el7.x86_64.rpmc64a857838a1e80f9c513483c3e180877ad180e3e4c763db46e51145d8e6d4a8libfreehand-devel-0.1.1-1.el7.x86_64.rpmace7afbd2d3a893ad5dae74fe77d80f0c600e04aab4e468d96b160a2207bfea0libetonyek-tools-0.1.2-4.el7.x86_64.rpmae2208d725a181cd4ff34e1a1147b8fc0a197be94966ebe514a028f7fb6f8a1alibwpg-0.3.0-1.el7.i686.rpm4535eefd0f21aa59d452f9bb1595e2c8d12807ab964105619ba92deb30430dc3librevenge-0.0.2-2.el7.x86_64.rpmf576fa0c47482bbe05ae53d7f4279d2e5a39ac40b41f75434259f387ab7149c7librevenge-devel-0.0.2-2.el7.i686.rpma59d2d738ef885baebac6a42853352a7bcd67d9bd3b0d287a353938016187d4blibmspub-devel-0.1.2-1.el7.x86_64.rpmfb9334afbc23b5d4f3a74c1201923a2c50ad9ddc477bedbbef25a536bb8bcf2dlibwpg-0.3.0-1.el7.x86_64.rpm303aa1c1fb0b2b4ca5457b7d7e4b9460f6264a54c63cd849a64b99399dfc8215SLBA-2015:2211-1Virt-Viewer, Spice-Gtk, And Libgovirt Bug Fix And Enhancement UpdateThe spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. The libgovirt packages contain a library that allows applications to use the oVirt Representational State Transfer (REST) API to list virtual machines (VMs) managed by an oVirt instance. The library is also used to get the connection parameters needed to establish a connection to the VMs using SPICE or Virtual Network Computing (VNC). The virt-viewer packages have been upgraded to upstream version 2.0, which provides a number of bug fixes and enhancements over the previous version. The spice-gtk packages have been upgraded to upstream version 0.26, which provides a number of bug fixes and enhancements over the previous version. The spice-gtk packages have been upgraded to upstream version 0.3.3, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following bug: * When viewing a remote SPICE session in windowed mode and resizing the viewer window to be wider than the virtual screen, the viewer window was automatically resized to fit the screen width, and the resolution of the remote screen was scaled down. This unintentional behavior has been corrected, and in the described scenario, both the viewer window and the resolution of its contents stay unchanged. In addition, this update adds the following enhancement: * With this update, virt-viewer supports SPICE HTTP and HTTPS proxy with basic access authentication. This allows user credentials to be validated at proxy level, and SPICE remote access users thus do not require VPN connection to authenticate.Scientific LinuxScientific Linux 7libgovirt-devel-0.3.3-1.el7.x86_64.rpm2887aa4e869c30dddeedb34b2f667e53dc7e8b6d9b5c40bc029c811af20a5be1libgovirt-0.3.3-1.el7.x86_64.rpmec745aae0eb803f56a037e0134965df74e57e84326af61716723c7b420c6a9b2libgovirt-0.3.3-1.el7.i686.rpm44122d9f447cd689ddc38a9c55e634f3bfdee401fd0adacfce427b47cf7b3818libgovirt-devel-0.3.3-1.el7.i686.rpm7835aaf74acea699d46b13f4bdb19010b34d001be6f06ea5f361ffb98c59612bvirt-viewer-2.0-6.el7.x86_64.rpm399f032e5eeb64021b2034d5d22d5d1ebf0a717ae9979ab3882c75645d6ad773SLBA-2015:2215-1Gnome Utilities Bug Fix And Enhancement UpdateThe vala packages have been upgraded to version 0.26.1. The folks packages have been upgraded to version 0.10.0. The tracker packages have been upgraded to version 1.2.6. The baobab packages have been upgraded to version 3.14.1. The gnome-dictionary packages have been upgraded to version 3.14.2. The gnome-screenshot packages have been upgraded to version 3.14.0. The gnome-system-log packages have been upgraded to version 3.9.90. The gnome-system-monitor packages have been upgraded to version 3.14.1. The inagre packages have been upgraded to version 3.14.3. The vino packages have been upgraded to version 3.14.2. The gnome-font- viewer packages have been upgraded to version 3.14.0. The gnome-calculator packages have been upgraded to version 3.14.1. The brasero packages have been upgraded to version 3.12.1. The file- roller packages have been upgraded to version 3.14.2. The eog packages have been upgraded to version 3.14.2. The cheese packages have been upgraded to version 3.14.2. The gnome-tweak-tool packages have been upgraded to version 3.14.2. The gucharmap packages have been upgraded to version 3.14.2. The gedit packages have been upgraded to version 3.14.1. This update also fixes the following bugs: * Previously, the file-roller archive manager terminated unexpectedly with a segmentation fault after a compressed file was extracted using command- line arguments. The underlying source code has been fixed, and file-roller now confirms by displaying the "extraction completed" dialog, and no longer crashes in the described scenario. * When extracting a large tarball archive, the tracker-miner-fs process previously terminated unexpectedly, displaying this information on the desktop screen. This bug has been fixed, and such error messages are no longer displayed. * On systems with several CPUs, a CPU core sometimes became completely idle. Consequently, gnome-system-monitor stopped counting the number of CPUs when it encountered one with zero load, and thus reported an incorrect number of CPUs. A patch has been applied to query the number of CPUs from the system directly, and the correct number of CPUs is now detected, regardless of CPU load on a particular CPU. Users of gnome utilities are advised to upgrade to all the rebased GNOME packages, which fix these bugs and add these enhancements.Scientific LinuxScientific Linux 7gedit-plugin-colorpicker-3.14.1-2.el7.x86_64.rpm690c27f907bb3658523be0ea9923a58bc031598131ec2a84f0d962d3cf54e112pygobject3-base-3.14.0-3.el7.x86_64.rpm1108ed55c53d48b4f6b401a2417ee052c298402df7cf807523ee8baccc2c600dtracker-docs-1.2.6-3.el7.noarch.rpma1d878609b77d9456a593a0b781ecac4af8db0268e72ff6ea6a6d6c65c32b54dfolks-0.10.1-1.el7.x86_64.rpmb1ae78941cbe6328e1013a5ecdd8abe1b0f11ac1f4d78c78bbf9367d45fd5e96eog-devel-3.14.3-1.el7.x86_64.rpmc6d60930272d08cd40e423c539040014bf67655c6801b272e1cc4fbb15603a29pygobject3-base-3.14.0-3.el7.i686.rpmb61b3cd88ce5f5e56dc0bde0207cc9531990f7fd4ce8e4e8fec7dca2c41c3802file-roller-3.14.2-7.el7.x86_64.rpm458c9d0bce18a80e9ff6f17bf3c4b40a7c591ce3d722d08ae68644826813fd8fgedit-plugin-textsize-3.14.1-2.el7.x86_64.rpme7551beacd61527c1ca175977c7d99da3d2296c1ab028bb24866408ce99b91dcbrasero-libs-3.12.1-2.el7.x86_64.rpme81b0b6fc2c324edf4963178e188d53be3d26ddead53884a0da12329874b4c7egedit-plugin-bracketcompletion-3.14.1-2.el7.x86_64.rpm556bece552fc08e717e42b5852966f58165ac24aff244e077454bfa857732318gedit-plugin-smartspaces-3.14.1-2.el7.x86_64.rpmfaabf20bddb8d718ca1c0044ab37b83d048cc0f18d9eea82257fbc4bb40f19dcbaobab-3.14.1-5.el7.x86_64.rpmb22cf2e8881f6cfd779bdb70cce4ccd935053444e25d0998178ca72242c1db24gedit-plugin-charmap-3.14.1-2.el7.x86_64.rpm53d1ce98c4dd6711d582063d37454e377143fd19ec66078abf70e06e295765aetracker-devel-1.2.6-3.el7.x86_64.rpm6bb4985536c4833573cade6fcee4d482fad2f99797f38134d1652af84df0d372gnome-dictionary-3.14.2-1.el7.i686.rpm5242f2a0463202a3bacfa28fb14f3c61f6f4fb98ad2234db017163a85e3f0a33gedit-plugin-bookmarks-3.14.1-2.el7.x86_64.rpm3994f72f500b2546e4bef36f73a7c0cd49d67baebbb507ccccf5ffdf8468c0a7tracker-1.2.6-3.el7.i686.rpmb123ad1d3a8f8b1dff0378f4d3183adb2810bc48caf996ebaf1be0612b0a7139cheese-libs-3.14.2-5.el7.x86_64.rpmc5e0ac546637e069741f95de1a544c172f233ee7dedadebe17990ec9184258d4gnome-dictionary-devel-3.14.2-1.el7.x86_64.rpm8ea94985d1966f47f39a056551fe9de29bac40213da0c552fd9da945cc0ad021gedit-plugin-joinlines-3.14.1-2.el7.x86_64.rpm128488291d5b79f9150d2a7200c414c1124a5e8ba65cd4cd5068cc1f12e49ebbtracker-firefox-plugin-1.2.6-3.el7.x86_64.rpm07987e927d7bfb3ffc33590bd0bafe6d3aecd45558e077f4893933e84b500fc5brasero-devel-3.12.1-2.el7.i686.rpm2f7b85742f7d8ca927a6f038a1771cf9f46e67296cbadc3f2228f40d5827d5d2gucharmap-devel-3.14.2-1.el7.x86_64.rpm19b303bb6c144fdde223db58985aa81a411cf9e210de7670931c986869683cc9gnome-session-xsession-3.14.0-4.el7.x86_64.rpmfec90f676d6b1969376f4dc22c951b35c1a7405fae2b28acae1ffa81e267606ftracker-devel-1.2.6-3.el7.i686.rpmbf28c5354a2057b50cf3687b881501709c9d3a4d50bd53ceb907275837939d04gnome-session-custom-session-3.14.0-4.el7.x86_64.rpmebb868719bab1a68c956ce3592d26c58f6884d6f924aee2e0e992d032cc4f389gedit-plugin-drawspaces-3.14.1-2.el7.x86_64.rpmdead1a1d31b0c35a21a072560df646b33aa12dd66f1715e69ddca36756d22b99gnome-clocks-3.14.1-1.el7.x86_64.rpmeee986634edbdcfd083365a0d8667793d370a0f7cf791489afdf147e870a1899cheese-camera-service-3.14.2-5.el7.x86_64.rpm38c8d728971111136fe6129f4ca57a3304e2fa455f51d43d6fbb02f0ff2cdc4ceog-3.14.3-1.el7.i686.rpmbb6aab847f5a8d78439bfe8111e9e980dad4c187021f9ce46deef1bc72d397b4gnome-font-viewer-3.14.1-2.el7.x86_64.rpm63d775702bb554b211b399f20c4f77ef75eb6a62ab86d59dca74d7432dcd98bdeog-devel-3.14.3-1.el7.i686.rpmacf888578fe863a7fb1fd4d601c15f737c2eeb09bf2d253e36dd9fbd603a234bfolks-tools-0.10.1-1.el7.i686.rpmc605b78462080716fbad138ffd820a8048ab1a501c2b732a605a8778ba3b97fcgnome-dictionary-devel-3.14.2-1.el7.i686.rpm6ca990d9ec4fd8995facdeb629f316ab6563627ad46185a03a0f673eb2d37991gedit-plugins-3.14.1-2.el7.x86_64.rpm2767f95b3c6887b08f9e01fce0842d2e39efeacfe5670620006f778ceeb26fa6gedit-plugin-commander-3.14.1-2.el7.x86_64.rpm0fe591a0f4a067aced25d1ead2159be4af16f6f1dde794c78fbf47951d10980cfolks-devel-0.10.1-1.el7.i686.rpm36550c28b88f126e0ed0b1a3a6369796d3fcd40318c773f60b9e8d2d3f908218gedit-plugin-multiedit-3.14.1-2.el7.x86_64.rpm8098cd4d2ba8ed6b91faf7330c8014dbc2b0398a0caebf5d67912e628705c417vinagre-3.14.3-1.el7.i686.rpm42ffc9f4affc1d0510125dc7d86568036ecfbe7982a9fe5bdb7f4d6884d69ad7gucharmap-3.14.2-1.el7.i686.rpmec0ee6e56c9279a20a5b6e548e1e10d44ef6b3742c5ad0d4d516a1fbb69a4090brasero-nautilus-3.12.1-2.el7.x86_64.rpmc84ae265cd436dce8d870b4479e903c2c614e6d7a3c686a0f2442800dde36541folks-tools-0.10.1-1.el7.x86_64.rpm82784f202449f2038f6880921f946e5e46dd9b6599d352ade4c328df2a259dabfile-roller-nautilus-3.14.2-7.el7.x86_64.rpm738ea4ec636389499c5d3209f42b431c72e9cf07c3e57786b47076c1a9f6f11bvinagre-3.14.3-1.el7.x86_64.rpm1689bb6de3c8e959f528dfcd8ce0dc6bfbd4c0d66ddb4ab709b71a27fbf6b558gnome-calculator-3.14.1-2.el7.x86_64.rpmb5872116f33db83765af45932eaa0f443edeeeb22f268e3bacffa5fe2d70fd4abrasero-devel-3.12.1-2.el7.x86_64.rpm0af0266e47cf9d65d9353fa52187dbfc22e8d4ec35bd3596a87768da16f59caccheese-libs-devel-3.14.2-5.el7.x86_64.rpmf945763c000ed871fbf19e7dcea0def04806b50ae9a84b54118140c77bf02c97gedit-plugin-terminal-3.14.1-2.el7.x86_64.rpm1c400a7435dcdea465fb81829798a31153f68c9908841eaa06269d55ff3320e0pygobject3-devel-3.14.0-3.el7.x86_64.rpm4906060157eb421b2bf7c3541198466ca41b8b15f03923371336c1f18308ea7bcheese-3.14.2-5.el7.x86_64.rpmbb234bd3729296b4ef78bb278faa2f61096e91b5ce392c2083f90b68929726e4gnome-session-3.14.0-4.el7.x86_64.rpmaa3358e0249df3aac3672ca4cea5e98f9bed0957a511c23931b90e21574ee239gedit-devel-3.14.3-9.el7.x86_64.rpm986262404b232ab0a8fd0869a55c74907d99068c61ee7ee88aa86f6580753310gedit-3.14.3-9.el7.x86_64.rpmb754bb1731852da3455a5824b0e27940482185199e657c8f7cea3a9c5d9c02c3gnome-screenshot-3.14.0-2.el7.x86_64.rpma9a13d7b738e4824354c1bb23c6edd8f86f5f340e0da47f907da80555ca5ec54eog-3.14.3-1.el7.x86_64.rpm8863f4329bf95d0f0f532e30ea4a8dd5fac6bfafbc0b841947b63dfc3669c0c0gedit-plugin-synctex-3.14.1-2.el7.x86_64.rpm7af70968d057b9689d90dad667ca6ec767593402c538458a0bc5ee34cad13913gnome-contacts-3.14.2-2.el7.x86_64.rpmff7bf3cd966f52074f70ff3fe40f68451da3324a97c71797f3830ecacf366ebefolks-0.10.1-1.el7.i686.rpm15c0020cb52dc66c605ea64146c812ad68ab90711babfc4e3704e111af407c72gedit-plugin-wordcompletion-3.14.1-2.el7.x86_64.rpm02b7b1b0589411a031dcea5206cfa5d64245391607828007122e9661494fbc02tracker-preferences-1.2.6-3.el7.x86_64.rpm28b7147fb5a2057becde97eb2ee92724ba6d74062b2ecadceb4a38585c4e3091gedit-plugin-colorschemer-3.14.1-2.el7.x86_64.rpm158424f5dedc5b641afbdbb9215643f11afe70f8117a6c32d2414ab44e882108brasero-3.12.1-2.el7.x86_64.rpm693919d6918766a13270a9e964241d3f7edd812abda7ab9021e345d1bb877440vino-3.14.2-1.el7.x86_64.rpme50a3b5c6bf4d52bc22350e9dec7ff3db12d0b72cac6dcfd7772d79936d95fc4folks-devel-0.10.1-1.el7.x86_64.rpm87776406812e812a06f63019a95cbf2b32c22f0519a6b28f3e69a3b75412de88gedit-plugin-codecomment-3.14.1-2.el7.x86_64.rpm489ec0c45b0f3d91acd988004c9e06e89e72d698613690f0085097880eb89a11gucharmap-3.14.2-1.el7.x86_64.rpmda53c9502004a89ce86ce3f66f02a7367fe56dd9a8fe5f9051f4cddbd0dc22ffgucharmap-devel-3.14.2-1.el7.i686.rpm5668c329e14e5d45674d68d31dea93b15f8394fd416225abe29ce8614b4b809dtracker-needle-1.2.6-3.el7.x86_64.rpm59d1d6b018ebe7316edee8603489649cbfd6a5819bb7b075720173eedb412e02gedit-devel-3.14.3-9.el7.i686.rpm800c155cc46efffb26a97151e7b030c850b9d7617804658a2d2447c4d71f878cgedit-plugins-data-3.14.1-2.el7.x86_64.rpmc95a7fa2617fcae59806f74a1ac335f8555375faf9a32dfb52aa41deffea12eecheese-libs-devel-3.14.2-5.el7.i686.rpm5357a8564837a13f39468f0acb12697f245fc9f1fa892ebd4ed31d4c61d1718cpygobject3-3.14.0-3.el7.x86_64.rpm0ae08efed9c8c207e1420093d46fa40f6b997c5d02fa9cb7a19c118b054b8e4dgnome-system-monitor-3.14.1-3.el7.x86_64.rpm65780e1d08fa7337f301002a33fac43eb0d79268deae73099ddf10bf579757afgnome-dictionary-3.14.2-1.el7.x86_64.rpm7c8014dbe824e0a6e5a90a187cb849c1fb3811cd1ba37db68e99d35fece815eagnome-tweak-tool-3.14.3-2.el7.noarch.rpm52e43373c944d62bf95747cb00ffc57cdd41b805a90adc6d211f396d86d0a331brasero-libs-3.12.1-2.el7.i686.rpmb6dc7d4858b0ebd6c8de6ba96d19aa6962eed5737bf2da05382e945970d48666tracker-1.2.6-3.el7.x86_64.rpmade8f1f2bb9160b90b5215f1e09bc59c6e8772d0d57837da271dcec531f51580cheese-libs-3.14.2-5.el7.i686.rpmfddf9e789407cf2406b017d98dc136cbb4518dc0a0ccf062097ed843c9d0a49agnome-disk-utility-3.14.0-2.el7.x86_64.rpm3e7730fce030bc9816e647bc73f8504a67964a18177ada3c40babaee215d4662SLBA-2015:2216-1Gnome Compositor Stack Bug Fix And Enhancement UpdateThe gnome-shell packages have been upgraded to version 3.14.3. The gnome- menus packages have been upgraded to version 3.13.3. The cogl packages have been upgraded to version 1.18.2. The clutter packages have been upgraded to version 1.20.0. The clutter-gst2 packages have been upgraded to version 2.0.12. The gjs packages have been upgraded to version 1.42.0. The gdm packages have been upgraded to version 3.14.1. The gnome-shell- extensions packages have been upgraded to version 3.14.2. The caribou packages have been upgraded to version 0.4.16. The mutter packages have been upgraded to version 3.14.2. This update also fixes the following bugs: * Previously, the anaconda installer did not honor the "xconfig --startxonboot --defaultdesktop=KDE" line and the machine continued booting in the GNOME session. This bug has been fixed, and the machine now boots with desktop environment set to KDE as expected. * When upgrading to a newer version of gnome-shell, the login banner visibility was previously reduced. This bug has been fixed, and gnome- shell upgrade no longer causes visibility changes. * This update adds the missing option used for starting the Xorg server, "-audit 4", back to the default flags. * This update backports the fix for improper week number calculation in GNOME Calendar. * Under some conditions, multiline login banner text displayed on the login screen was wrapped incorrectly, overflowing the login prompt. This bug has been fixed, and longer texts are now autodetected to enter two column mode when needed. * When the list was long, the login screen failed to show all the users. This update adds a scrollbar so that the list of users is shown as expected and fits the screen. * Previously, the login banner placement checks failed to properly detect text overflow. As a consequence, the banner was displayed incorrectly. With this update, the layout now switches to the "book view" with the login banner on the left when the display resolution requires it. * Previously, the user could not set a long banner message, as the message overflew the login field. With this update longer texts are autodetected to enter two-column mode when needed. * A bug in the GNOME compositor previously caused some visual artifacts on the graphical screen. An upstream mutter patch has been provided to and the mentioned artifacts no longer appear. * Previously, under certain circumstances, the login screen prompted for user name twice, which led to an authentication failure. This bug has been fixed, and the login screen now prompts for password as expected. * If the system was up for a long time, the user was unable to launch applications from the Applications menu. This update fixes the open_new_window() method call in apps-menu extension, and applications are now launched as intended. * In the settings dialog for the Window List extension (gnome-shell- extension-prefs), there is a new check box "Show on all monitors". As a result, the user with multiple monitors has a window list available that shows applications open on all of their monitors. Users of gnome compositor stack are advised to upgrade to all the rebased GNOME packages, which fix these bugs and add these enhancements.Scientific LinuxScientific Linux 7gnome-shell-extension-windowsNavigator-3.14.4-13.el7.noarch.rpmd9750b07798543aec0cc90841209b77886691b306da35e4d51f3903ac7a308f2compat-libcogl-pango12-1.14.0-3.el7.i686.rpm886528eab99600a71a785fe729e1707c502714d7bf1ea40cd6ece0acd5000ef9mutter-3.14.4-17.el7.x86_64.rpm24483f75e693950e8d7002a224419aa1d8d00c719ddebcea325e16445f334899gnome-shell-extension-drive-menu-3.14.4-13.el7.noarch.rpme58fb043d5793f814e6eafb7cb75442b9d385a3ff448999607253297eab3c834clutter-gst2-devel-2.0.12-2.el7.i686.rpmf48f9478205de5eaaa98761af310562afdf9c8606ff49150808f5421e8735f0dgdm-3.14.2-12.el7.x86_64.rpmf20e139029ae92e9974b7d39250ddb58664450902581dd23e4ece619891a66e7cogl-doc-1.18.2-10.el7.noarch.rpma35f4da7b7a7434714efa2c2f1a568ea88ef8144c5a00b87bca08092267d95ecmutter-devel-3.14.4-17.el7.x86_64.rpm7b81a88a805560ca68cd6965476923823873c9f4e03c0549c014d336d4a3c0e3cogl-1.18.2-10.el7.x86_64.rpm100652f9ddc74973db30033f5f0f40e24599750053ddc5e3984938cbaf6c0f20gnome-shell-extension-auto-move-windows-3.14.4-13.el7.noarch.rpm5ce33e7ae8048252ae747094b83e699d8be57a1406cf046814ded82a1716f112gnome-shell-extension-top-icons-3.14.4-13.el7.noarch.rpma3b2545d70e6f6b9f442e85d43d2cd10b0b39932858fc7bbf3e6558b48ad1504gnome-shell-3.14.4-37.el7.x86_64.rpm25c7b50850eb75dd37516b28c53dae28af3ad92bd61b3203db6d2adf811ace19gjs-1.42.0-1.el7.x86_64.rpm0726509a77dc3e5f53f1339f0995f78721a4364305af5c5cd29d61a010a65a91gnome-shell-extension-user-theme-3.14.4-13.el7.noarch.rpmc00e5b2815eb49961cb97794d7c5b7202231a2729ad276c9c56199cb6279b395gnome-shell-extension-apps-menu-3.14.4-13.el7.noarch.rpm54dd2e54a4b28cbc14a758c87cd439631849e4692acc8bdc16899ff7f9361f70clutter-devel-1.20.0-4.el7.x86_64.rpmd3f000a828508b45e094981e0d68e7d32d2cf6840b73cd4740f3c857fbfd02cacogl-1.18.2-10.el7.i686.rpme94ccbc6810c1824a338129a6bceb4753b8df44b82c3785d6cd346d4a35b3058gnome-shell-extension-common-3.14.4-13.el7.noarch.rpm6310fe28547419d29120be2c89be3115fcd82b4cf786650dc0a28f1d8e5a382ecogl-devel-1.18.2-10.el7.x86_64.rpmd64beda4cfc3ecf7fadb123bbdf1f4f44807e3bba6296345e95419f4972eb752clutter-gtk-1.4.4-7.el7.i686.rpmd7391c7736dd7c05d8a7020f05a876431b44403ac6e3d95739af8b6aaef7db8dgdm-devel-3.14.2-12.el7.x86_64.rpmffcfe0507d87755e9ef511fd867bb7d5e7ed016b0d9aecb1147b9ca719906068clutter-gst2-2.0.12-2.el7.x86_64.rpm23969a4f92ecf8d6fdaf5e88fbd6ebf5e7b636c9dd0072563a154d29e43510ebgnome-shell-extension-launch-new-instance-3.14.4-13.el7.noarch.rpm55c5c8c4834b991c93c71557e85ba748516fc0b5eba045b7edee0802043c8ef3cogl-devel-1.18.2-10.el7.i686.rpmc77ad83a2f2984c50fe3cf92e878a4438fa0198334a2b9d52fdfc20939f66e04gnome-shell-browser-plugin-3.14.4-37.el7.x86_64.rpma8640146f2c17b1fcc347a9ff2ec5e697d0d9e2647f020aa2f2c7e75c6f86c06gjs-devel-1.42.0-1.el7.x86_64.rpm2a1950aa6ed447b772f6bd20dc12768d2827d7bef8088cada01a94e5b669392cclutter-devel-1.20.0-4.el7.i686.rpm5ef29b0ebeca1ba71933b20532df1082614784088063ede1ee8fc0552afb082bgnome-classic-session-3.14.4-13.el7.noarch.rpm853f8c8b1c52458c1fcfbb2406d86fa9cea1a6ecd3a2ef52799120d3242f40a5gnome-shell-extension-dash-to-dock-3.14.4-13.el7.noarch.rpm59ed162522ee4c9a6c251e5e0cef42a097fb1f1c41e9737e64a1d03ba9fd9858gnome-shell-extension-native-window-placement-3.14.4-13.el7.noarch.rpm12495d8214ec17a0bddd17df8f23106abf0b3abdb3f5090365edcec78e6dcd21clutter-1.20.0-4.el7.i686.rpm90619d256874aefbfe2782667da9ab30bea2ab83f5a4cbd3331bc59bb774edf7clutter-doc-1.20.0-4.el7.x86_64.rpm7f4f7d03f975ee787897be17b71e4a5f39f6a4dfe5a27e411c34f291ef4a94becompat-libcogl12-1.14.0-3.el7.i686.rpm7378bb31fa3f14afd6fac7c396af7b7f5b6d59e549c90eea14eb2651e513736fgjs-1.42.0-1.el7.i686.rpm74d97ea1fef6a363e02c075b141db4f451975ce056fec47a82a5fe1dde3f2b7fcompat-libcogl-pango12-1.14.0-3.el7.x86_64.rpm2341bbedd4600ec15ed68dfdd8c5dd0def31ec06e6da84f04efcb6298c730e5egnome-shell-extension-window-list-3.14.4-13.el7.noarch.rpmd55b4ecf0681a3a62f6effcd4a7a3a4744fe28342e66d1374e675452ccfebdddclutter-tests-1.20.0-4.el7.x86_64.rpm650f4688df6b56f350f795c57351a89510cde25fea97db0e16e6f0eb6bdcbf8fgnome-shell-extension-screenshot-window-sizer-3.14.4-13.el7.noarch.rpm38a5906b026e59d7ce51aa3a48ecc764d12a7d7104addc85749e21173be1f466clutter-gtk-devel-1.4.4-7.el7.i686.rpm339bf3c1804f0525cb96a995120ab76dcaceb878e2f6937ad47a001012c0af07clutter-gtk-1.4.4-7.el7.x86_64.rpmb27f8b26e2f8708691383571ba96de798309b2e7792be7683f2c2048c43d5337compat-libcogl12-1.14.0-3.el7.x86_64.rpmcd4f74243e18eaca4b82882cd85165057b5b5c84a26329b55e284a0500c85619gdm-3.14.2-12.el7.i686.rpm1518f0ab44a9a23340581d718e3b94a4c82545892a204e7f23e5dc2b025da70dgdm-devel-3.14.2-12.el7.i686.rpm2d47ff79bfbc1f36ddec2ede0583807fcfea772c685460fe8c3384e33dfe839cclutter-gst2-devel-2.0.12-2.el7.x86_64.rpmfea7c65a8e2b51de54c242299d59f862b198450d28776da449f65766a5a178aegnome-shell-extension-panel-favorites-3.14.4-13.el7.noarch.rpmf75b821e9384c51e4dea0377947f418f5c4dc1a89ecf8c57a6b6ebcf78bf9b6egnome-shell-extension-systemMonitor-3.14.4-13.el7.noarch.rpmdbf914367fdee4878d28d568487ee56007cc838dd122b4a38641e525fb38dc33gnome-shell-extension-places-menu-3.14.4-13.el7.noarch.rpm4a5bc0f915dfaadb8b7eb613e16e285a97547d874f909ec4555db35326339c1fgnome-shell-extension-alternate-tab-3.14.4-13.el7.noarch.rpmeacfeaad0f2a12020bb0ba5a74d103e6cc87cc577ec9e565332091c48c08f6ebclutter-gst2-2.0.12-2.el7.i686.rpm04179a2d87996c4e309b8eb9549859949f8768780f0e4655404bbb61a647745cclutter-1.20.0-4.el7.x86_64.rpmb255a56efd880d3e13bd924e73cfc71fd27a19cff9f557d8e049f31b5b95a0d2mutter-3.14.4-17.el7.i686.rpm91e4dd957b255ff97002c803e455e43e9b104c9213780368558da09d22276736mutter-devel-3.14.4-17.el7.i686.rpm7a4b6fc7b0e4bcea47972f9f9044171346493f4cffd613e5a60b8c94fc4277bagjs-devel-1.42.0-1.el7.i686.rpm18b85307ad934ccdc266a1826f9e975598b83d5100a47a11dfa9ed2139b85751gnome-shell-extension-workspace-indicator-3.14.4-13.el7.noarch.rpme026a32a7c8535617fd5319a2f6f7ca7c22b981ef01fa9d5857fbfea2612623cclutter-gtk-devel-1.4.4-7.el7.x86_64.rpm19af8b7c05408e873689bdccab08d32c35b4d9109f29845fde6e8863dfa30dd9SLBA-2015:2219-1Gnome Artwork Bug Fix And Enhancement UpdateGNOME themes and backgrounds provide default appearance for GNOME, the default desktop environment for Scientific Linux. The following packages have been upgraded to the latest upstream releases from the GNOME 3.14 branches: * the gnome-icon-theme packages to version 3.12.0, * the gnome-icon-theme- extras packages to version 3.12.0, * the gnome-icon-theme-symbolic packages to version 3.12.0, * the gnome-backgrounds packages to version 3.14.1, * the gnome-themes-standard packages to version 3.14.2.2, * the abattis-cantarell-fonts packages to version 0.0.16.Scientific LinuxScientific Linux 7gnome-themes-standard-3.14.2.2-2.el7.x86_64.rpmaa1e69dfa7706bec6a55635d6c58aeac71b244b58054d8217ad7889b3995b74fadwaita-cursor-theme-3.14.1-1.el7.noarch.rpm3a3f264a1f078bd70f10c2c3223a0f61dd721e52c1a96ecd891741d0a97ef028adwaita-icon-theme-devel-3.14.1-1.el7.noarch.rpma405ed0bb199aac150ad8a45c47f44dd456de6755fef1c670e0607365ec837c5adwaita-gtk2-theme-3.14.2.2-2.el7.x86_64.rpm0aeb4523cfe46032b407d2d2ea791b7c4b8f1eb54462d34543160434e9b2671dadwaita-icon-theme-3.14.1-1.el7.noarch.rpmbe45f66f0f1337f6bd0427572cdd537ef57267e3c030e5d0d0f505552be2bfb3adwaita-gtk2-theme-3.14.2.2-2.el7.i686.rpma6e957ed79a0517f4eebd5ccfe9c2eea42a73b904f7dbe6021fc69e342c64400gnome-backgrounds-3.14.1-1.el7.noarch.rpm4cef8de0ee1e24631043f0da5dc27cbf8f9e995257bb61a6ff02fe33596e61d6SLBA-2015:2220-1Evince And Poppler Bug Fix And Enhancement UpdateThe poppler packages provide a Portable Document Format (PDF) rendering library, used by applications such as Evince. The evince packages have been upgraded to upstream version 3.14.2 and the poppler packages have been upgraded to upstream version 0.26.2. These new versions provide a number of bug fixes and enhancements over the previous versions. Notably, if launched without specifying a file to open, the Evince viewer now shows a thumbnail overview of recently opened documents instead of a blank window. Also, the "Go to the next page" and "Go to the previous page" buttons are no longer present in the top bar. This update also fixes the following bug: * Previously, the poppler library did not remove headers specific to the Printer Font Binary (PFB) format when converting from PDF to PostScript. As a consequence, the resulting PostScript files were syntactically incorrect. With this update, the headers are removed properly during the conversion, and the resulting PostScript files are syntactically correct.Scientific LinuxScientific Linux 7poppler-cpp-devel-0.26.5-5.el7.x86_64.rpm7c4439aec27ae2b6ed56de1def95713337aa510f5cf1b90fa60688c364354b2fcompat-poppler022-glib-0.22.5-4.el7.i686.rpm5f153497ec2769192d823638d796b9099d186eeb78469059df2ef1a5d8d4c6d1poppler-qt-devel-0.26.5-5.el7.x86_64.rpmce8de643bf31b1907da4109ed564e28f1910533adaadf812d71a71ee380cb96epoppler-devel-0.26.5-5.el7.x86_64.rpm4c7e7174d0f866e8f8030415061ff9b72ff155e491b6346d228c542bafd746d3compat-poppler022-qt-0.22.5-4.el7.i686.rpmaa2f64949a3b44f70c459428205be6b38bd60362b99f2233d289108bee57b547poppler-glib-devel-0.26.5-5.el7.i686.rpmcf47fa5af18c0a0e43fd1b1e824b2b54fe4241eb1793cb13ffece3031514ed56compat-poppler022-cpp-0.22.5-4.el7.i686.rpm686d5028e842782cfdbdfe08d359458159299340adb8f01ecea4fbdea155345eevince-3.14.2-5.el7.x86_64.rpm474eda828871ebfc30d3f3df3cad1c5cd924785de2efa37df9e00677ce9d9f21poppler-demos-0.26.5-5.el7.x86_64.rpme53623a9a16bde93630cb85e70c4718d30c629516d1a0e3adfdef079bd9e7eb6evince-dvi-3.14.2-5.el7.x86_64.rpm166ba7b16f663b1222d223520aff46fec5d475691acfffbf25c55a41b4ce57a9poppler-qt-0.26.5-5.el7.x86_64.rpm0f53700ce056b50f7baa3e54cc8e08d2b96ed76e157a178363dc889ce3ef0bc9poppler-cpp-0.26.5-5.el7.i686.rpmdc22637730b0efb721b4f7e12d3b2217aae60b87ab47e00a2a2a934de513e71dpoppler-glib-0.26.5-5.el7.x86_64.rpme3add336afdab76cc83551678ee6e977d567aca4dd033aa5eaae047a9d757df0poppler-cpp-0.26.5-5.el7.x86_64.rpm2307775a5b629d3a81b3d3de220b2f65906fe3e05ea900c92d69140eb33d4fa5compat-poppler022-0.22.5-4.el7.x86_64.rpm62805d30d775ecbfcfab4997103b2d5c68a1312e89182e6d8a703cdf2751710acompat-poppler022-cpp-0.22.5-4.el7.x86_64.rpma2952e37ea889e48a6aa09bec52aa9592cd7e20cc62d8b13c3f146dcd4a08044poppler-glib-devel-0.26.5-5.el7.x86_64.rpm68f710b5edd9ace838a47347b2c7b4dc78819224395c98007665f14aaac4feb0poppler-cpp-devel-0.26.5-5.el7.i686.rpmc54f83925b0be6ff5fbb02f4887b9011fa309fd583c20db95eb6121895794f95evince-libs-3.14.2-5.el7.i686.rpmae7112542b141aee341124478cd41d9c34b3a276d614228118ddc2c8c4f1c59eevince-libs-3.14.2-5.el7.x86_64.rpm88edace442c9c6e147e13a88f3a13ea09b8e6464afdb1bd80791e6c54641e540compat-poppler022-glib-0.22.5-4.el7.x86_64.rpm23d4af0aaff562e34b3563c26929382e871a15ffc89d33228753207aa9fac7d9poppler-0.26.5-5.el7.x86_64.rpm566958f53a311fc91455532ff6739b1f8f5cc70a6bfdb31b6822f66e413d4d0bevince-devel-3.14.2-5.el7.x86_64.rpm45105de8c8efa7c726f3690b3b9e1a2999ffa8eb299d50e06149a8e5d2ea4aabpoppler-devel-0.26.5-5.el7.i686.rpm6f5ae3ff088d6e7432c367e6f3c1ae025a1652963effeca29c14b0b52c688f7dpoppler-utils-0.26.5-5.el7.x86_64.rpm47b4a12eaf92abc85e79bc499d0ee868173e2760ade85c56f9bb8aec8f632fecpoppler-qt-0.26.5-5.el7.i686.rpmcc237c30a569e7a38d8beb628bda54fac9b7c480990edc0f808d8d72fa251724poppler-qt-devel-0.26.5-5.el7.i686.rpmea5990fcb95ac203635d97c1727e8fa6bc23fb44f956438fade9240635109138poppler-glib-0.26.5-5.el7.i686.rpm30197784777974694cc1ff4e6e6e01a912477f61b0f10809f5ebbc59f7599f06evince-devel-3.14.2-5.el7.i686.rpm81c180088b1fec2ede85a5cedc10b63f26e4580ab87baf64ba3e9ef81cc743b5poppler-0.26.5-5.el7.i686.rpm0b37659248a93d8194a36d1b1c1a564dffceb7b4da228d1ef832ece821637024evince-nautilus-3.14.2-5.el7.x86_64.rpm3a833284e94564586a321272452edf34e0638cd0f6c18f7be5eb6e67ad9f5749compat-poppler022-qt-0.22.5-4.el7.x86_64.rpm6002425e795771a440c7b7c78c68bc27a4703e08986a5c565d168082b198cdd0compat-poppler022-0.22.5-4.el7.i686.rpmb7dcb7554d0f76c453309b4be8f3d61341e4657c1855cebd4d82ac7b9778acc2SLBA-2015:2222-1Bind Bug Fix UpdateThis update fixes the following bugs: * The named(8) man page previously contained outdated information when mentioning system-config-bind not available in Scientific Linux. This update removes this information. * Previously, bind configuration for the logrotate utility used an incorrect path to the systemctl command, which led to the named daemon not being reloaded after the log was rotated. The path to the systemctl command has been fixed, and named is now successfully reloaded in the described scenario. * The bind packages previously installed the tmpfiles configuration file into the /etc/tmpfiles.d/ directory. As a consequence, the administrator's changes made in /etc/tmpfiles.d/ were overwritten on package reinstall or update. This update fixes the bind source code to install tmpfiles into /usr/lib/tmpfiles.d/, and the administrator's configuration changes in tmpfiles are thus preserved on package reinstall or update. * Previously, the nsupdate utility was extracting REALM from the local kerberos ticket if the REALM was not specified explicitly as an option. Consequently, in cross-realm trust scenarios, the REALM was not correct if the update was supposed to be sent to the name server from another REALM. With this update, the REALM detection is determined by GSSAPI if not specified explicitly with an option. * The version of BIND included in Scientific Linux 7 contained a check for SPF records in zone files not conforming to RFC 7208. Consequently, if the zone file contained SPF records, the BIND server or the named-checkzone utility could issue a warning message even though SPF was valid. The check for SPF records has been updated to conform to RFC 7208, and BIND server or named-checkzone no longer issue any incorrect messages. * Due to the limits in the resolver being set too small, the resolver was under heavy load and some clients could receive SERVFAIL response from the server. Internal hardcoded limits in the resolver have been increased to reflect the latest upstream limits. * As Internet Systems Consortium (ISC) decided to deprecate the DNSSEC Look-aside Validation (DLV) registry, the use of DLV registry has been removed from the BIND server default configuration. * When a BIND server was processing a high number of client requests, some of the queries timed out with a SERVFAIL status message from the server. This update increases the values of multiple internal limits, and the described query timeouts thus no longer occur. * Due to the missing DISABLE_ZONE_CHECKING option in the /etc/sysconfig/named file, the user could not disable the zone checking on named start. This update adds DISABLE_ZONE_CHECKING, the functionality of which is to bypass zone validation via the named-checkzone utility in the systemd service file, back to /etc/sysconfig/named, and thus allows to start named with misconfigured zones. * Previously, the /etc/localtime file was copied into the bind-chroot root (/var/named/chroot/) during the installation of the bind-chroot packages. However, Anaconda could not create /etc/localtime before installation, which caused bind-chroot to produce an error message and /etc/localtime was not copied into the chroot root directory. The /etc/localtime file is now bind-mounted on every service start, and if /etc/localtime is not present in the time of package installation, no error message is printed. After installing the update, the BIND daemon (named) will be restarted automatically.Scientific LinuxScientific Linux 7bind-devel-9.9.4-29.el7.i686.rpmed7f1fe74d4c5156d4c4eebd2466267460cefe2b536c7d39026badc07e5f376abind-pkcs11-libs-9.9.4-29.el7.i686.rpm4a678e0a4810a7b771b1b4131efa5bc632c8e716b560b7ff259229cdfa2b69b3bind-9.9.4-29.el7.x86_64.rpm08d7a2b0a76b7c31dc147edd02102e83ee6ad339d983e5df14d8c0eabe29426cbind-chroot-9.9.4-29.el7.x86_64.rpm0a16caf15529f7a0c44e75cdc4c607189b1df627d03ef3542e954312ed958fd5bind-devel-9.9.4-29.el7.x86_64.rpme2209f5d61c477399db7b25ab4c901b931ed4ed6fa1c947542bfdddfe35e22c6bind-libs-9.9.4-29.el7.x86_64.rpm9237b526fa5cdd98151a3b8be94f95c022023c9c10ff786c74bc38613e1eee15bind-pkcs11-9.9.4-29.el7.x86_64.rpm13e2e02d1fdbc687a96fd1f316ffe2b67806f64778e77cbcf491b24281a7227fbind-libs-lite-9.9.4-29.el7.x86_64.rpm96dddb3fffe84af236251fdef597a5486f0fc367d14e36a8dbb54bcffe21a235bind-pkcs11-devel-9.9.4-29.el7.i686.rpm13bf150fa566650314e81aa7ebfb6015e9de6a728a310cb40ae923591308339bbind-license-9.9.4-29.el7.noarch.rpm2f92a034d6e0d5fa863df0a3d97aa089b0d86e9365a95a619d8c2b99b8e905ecbind-sdb-9.9.4-29.el7.x86_64.rpme9052f92c8e9d4873e83297093a05dcdf8cecc3d2c99dc07923130902d9486e7bind-sdb-chroot-9.9.4-29.el7.x86_64.rpm71293adaf43ef1a88db2b5c4ee14eb44fdba550e8e8016b0aa8bc1656b2113c4bind-utils-9.9.4-29.el7.x86_64.rpmf820493669f70639b7a0001077916bdd7f763b880559f76660364f07264c9009bind-pkcs11-libs-9.9.4-29.el7.x86_64.rpm97e7269d39ef5e1699da50fe3327ea81db3482a745d73f62180ae623908400c7bind-pkcs11-devel-9.9.4-29.el7.x86_64.rpm91e122ce4128a1c992da04289e35fecd4a0e73ffc7567872af296a389754614cbind-pkcs11-utils-9.9.4-29.el7.x86_64.rpm2628a44c5934c64b9838b01d248cde25d95da3b0d68067381ba78fc04c585b7bbind-lite-devel-9.9.4-29.el7.x86_64.rpm11be423b29b28ccb5b5e29e0b429d1958bfce7fa4190c9c1e6c3cc9821927642bind-libs-9.9.4-29.el7.i686.rpm2d27273dc9c7f265da9c7add99d8cd306c73b18bce63db7c813ba4fdc41db4f5bind-lite-devel-9.9.4-29.el7.i686.rpm5326bc2b2c9b207abcf314c1cc144b8c7cafcdc7cbc58eac204f131f328339b0bind-libs-lite-9.9.4-29.el7.i686.rpmb4f50fdab67f0cd2c11d0d11a4a17dea09416c4c76073b36d47610330b6fb6b5SLBA-2015:2226-1Evolution Bug Fix And Enhancement UpdateAll running instances of Evolution must be restarted for this update to take effect.Scientific LinuxtrueScientific Linux 7evolution-ews-3.12.11-5.el7.i686.rpm9194cc5cb5d7170081f79247332d2d6ab9366974add8846eb656064cc7d168aeevolution-data-server-devel-3.12.11-24.el7.i686.rpm63e8bb4f1cf3c7c8532847b229caecb2faff0ba7107befd694022be784241092evolution-mapi-3.12.10-3.el7.i686.rpm8b5d701ba742372b5041db740f8ec3eb6f9b5c73128dfd995d836a89d2322f78evolution-ews-3.12.11-5.el7.x86_64.rpm57c51c06cb26e5efd1514f58e1e0df6e897284d6424cbc7dfa462ddb9567aa27libical-devel-1.0.1-1.el7.x86_64.rpm0ecd04a8e40575bea298811adca16b0f3ea6995be5e998d5d884412c608f6c1eevolution-mapi-3.12.10-3.el7.x86_64.rpm2dfe6e36c400a1c4688ecf9fea6de3ad3fafc4cb7e97333773164b0e32528622evolution-devel-3.12.11-15.el7.x86_64.rpm1da3de201045a6c78d6aca46afe8648aff0067d86828eeddf911a35f1174ec7fgtkhtml3-devel-4.8.5-2.el7.x86_64.rpme8b954ee6066da5fb82f84f40dd5efe8ab561413555c97e1f1ee0d3af99992aaevolution-mapi-devel-3.12.10-3.el7.i686.rpmd513850a4e7056dfeb50e08ec4c5e38c0c9e1fe05d03787de171f64f76e4d2bbevolution-3.12.11-15.el7.i686.rpmfc4f19791b19e6d22dabc14acaf3a08df5e8851f751d7f5a57f79edc45246b21evolution-mapi-devel-3.12.10-3.el7.x86_64.rpm00af4739b56fd26cbbc42daaebea2fddd74d296a218433eeba61e397251c9f73gtkhtml3-devel-4.8.5-2.el7.i686.rpm3be9f0bb1cd545be9470d990014c4943c50a1c999c157328582a9fc266640f2aevolution-data-server-doc-3.12.11-24.el7.noarch.rpm6753aaa4095514a11f4a58441c56909ae1ebded88719771ee3a82f9bab962b80libical-1.0.1-1.el7.x86_64.rpm1f4a7c666af0cf37b4103a9ae8653c43dd4665a6279badf703748522770c23daevolution-data-server-3.12.11-24.el7.i686.rpm50936a1f20c354fd7ca961ee85b42ee308404759d979294dc5ca871751e56669gtkhtml3-4.8.5-2.el7.i686.rpm53f6f39db0e9ad8ccad620cbd80e1a3cc80388dc752c6fee009e032ec3d2f161evolution-data-server-3.12.11-24.el7.x86_64.rpm35fb31ea8d36735f610527f9e0aec0f2ea9996969d0c2246da27c4f1b30d0dedgtkhtml3-4.8.5-2.el7.x86_64.rpm77c463f28a152d10f743f990d38eb4d1a0d6522f6d8dc715ec99e5592d325719evolution-pst-3.12.11-15.el7.x86_64.rpm4227bc8571ce3d70e9b170b76010984b0a03d49450723778e1ffe104003ca23fevolution-help-3.12.11-15.el7.noarch.rpm6cd04a92b2038a0729886a72411ebbbe4c6fbec93e505716e406174096d29654libical-devel-1.0.1-1.el7.i686.rpm01814b5c0164727ca063d399360ce98f5540d5eb1611c51e31387adf303e22fflibical-1.0.1-1.el7.i686.rpmccd6cf4c62fae7226708e6f4f76258e96b7ae4c574e554ed07bdb3b6e691a9e1ekiga-4.0.1-5.el7.x86_64.rpma1c3daf507d032f23dc5dd26b175d494f206ff6de728f7ac5d66dbced23f0eb8evolution-3.12.11-15.el7.x86_64.rpmc25c517983c648bcb63f67c8ccc3f46d54f31df5dd8f18cf2680579634f99e0aevolution-spamassassin-3.12.11-15.el7.x86_64.rpmade6e25ab8ea3796df499269c3645af6eb4ab39cdad20fd7022a55ac7c1d70cbevolution-perl-3.12.11-15.el7.x86_64.rpm120f02b835ec14a689083c0117c4bf7bce6932d57d2f91a54c0f4813f59de6e6evolution-bogofilter-3.12.11-15.el7.x86_64.rpm03c2dd99b2989a5c53ad2a295bfb8d82fdb33ea890862433632dfd4df046b9baevolution-devel-3.12.11-15.el7.i686.rpm8b661820cc06bfe0f227e33ac04cc61cb2537e9c42242dbc1a2040d9bdb1bbecevolution-devel-docs-3.12.11-15.el7.noarch.rpm2df901cee4b0e400df5977c0d3ac14f90ad726d00addf1aa103da65f01ccc5f6evolution-data-server-devel-3.12.11-24.el7.x86_64.rpmf2a75669f669b7c0baef4908454b661ef13928e4a145cd75e9bb9f939c6e0c3cSLBA-2015:2227-1Totem Bug Fix And Enhancement UpdateThe totem-pl-parser, grilo, grilo-plugins, totem, libdmapsharing, and gupnp packages have been upgraded to upstream versions 3.10.5, 0.2.12, 0.2.14, 3.14.3, 2.9.30, and 0.20.5 or newer, respectively. The updated versions provide a number of bug fixes and enhancements over the previous versions.Scientific LinuxScientific Linux 7grilo-vala-0.2.12-2.el7.x86_64.rpm9c0612666c8255602a587e09b4643daf8c14038ec78fb412933d7f165afaed5cgrilo-0.2.12-2.el7.x86_64.rpm0fe4a7399d44a8936a8125a37932d3f62cd52d8ea8cb24864530513d4599b92bgrilo-plugins-0.2.14-8.el7.x86_64.rpme2eb317ddd3cb80db267dec7dad2b94e4ea82d3e815c4b878ae5db4c4ec38069libmediaart-devel-0.7.0-1.el7.x86_64.rpm8ffb712c11cb63c9cb95d8a509399792e9e499f443c107cd7691ace542bba675rhythmbox-devel-2.99.1-4.el7.x86_64.rpmaff4605d8e88a3be7fe1868a5ec8831651554cb667f4175d3b74e5278305f2e4grilo-0.2.12-2.el7.i686.rpm8513b23a3ae5895b6bb2bbc80c094c386ac3af95b2e9b67273b36d980ddd7370totem-nautilus-3.14.3-5.el7.x86_64.rpm67fb20db536529c1b97289b648d7d6444bb97463633fd585df49c938c6882fe9grilo-devel-0.2.12-2.el7.i686.rpm38c9797487b4e7c1aab9409816fd4f2b90e0b04428672b4105ce04ac4fad6fb9totem-devel-3.14.3-5.el7.x86_64.rpm8529490cc0f1d5a33fb34cc9f95d8cdcbdf1b24c981360bab0b3e0d6a7933c9atotem-3.14.3-5.el7.x86_64.rpm0ededc51fe8fbfd0716a9fcd5f8824f8237645ac9c18669790555763b8310a41rhythmbox-devel-2.99.1-4.el7.i686.rpm5b2c91c28b4cafb1296f4aa61568b1a7b5bd35d3d0cd4876aac1edadad24fc06rhythmbox-2.99.1-4.el7.x86_64.rpm7c1e8e73d2d8ea706e92b1dfa23d4527669018b3fbe01ebba3a4910126014912libmediaart-devel-0.7.0-1.el7.i686.rpm6481c9e263a3343cfdf4e0b4ad9fdd1527f4c45957ebf656534c3de6e937b979totem-pl-parser-3.10.5-1.el7.i686.rpm0cba603336f4667719334a57e2a4bf3ecf43088cbf6728e28bfe333f4d59e8dftotem-pl-parser-devel-3.10.5-1.el7.x86_64.rpm8890a1c29c96d8ab29e3552963b5acd44e9d083e58f4f3f18fd2f4cebed9dcc8libmediaart-0.7.0-1.el7.i686.rpm28f7396f22aa70c6dea7f8579cefe20adc2727853b8d38335c2d852e00736135totem-pl-parser-devel-3.10.5-1.el7.i686.rpm70339f851a816eec8448a7979d767a86120a3fbb28b84e35cf7fece09432f635grilo-devel-0.2.12-2.el7.x86_64.rpmdc5d0c880d1c73bf135cc4686f8531782a3c5fc91a685f67af848bf03ba168aclibmediaart-0.7.0-1.el7.x86_64.rpm1ce6f4172c6048fb642db9a325753bc46808273418eafb58c26c7af3c011f1betotem-pl-parser-3.10.5-1.el7.x86_64.rpmc28abc9822ad6c3a16e53436d1c77a84fb070f8e1593a6a5e5252a27535bc30fSLBA-2015:2230-1Empathy Bug Fix And Enhancement UpdateThe empathy, telepathy-glib, telepathy-mission-control, and telepathy-haze packages have been upgraded to upstream versions 3.12.7, 0.24.0, 5.16.3, and 0.8.0, respectively. The updated versions provide a number of bug fixes and enhancements over the previous versions. This update also fixes the following bug: * When trying to add a contact that already existed in the contact list, the telepathy-haze connection manager terminated unexpectedly with an internal error. This bug has been fixed, and telepathy-haze no longer crashes in the described situation.Scientific LinuxScientific Linux 7telepathy-glib-devel-0.24.0-1.el7.i686.rpm42bcbd16eb08cd688aed0cdedcb538e3b62f557fb2543258281a28f83021c73ctelepathy-glib-0.24.0-1.el7.i686.rpm33d408c92855189454666250234e7928c7d80df47164896f859384e309266360telepathy-glib-devel-0.24.0-1.el7.x86_64.rpmeced68115b482243cfd84c6050230958e57e215b5bc0c2506fcea7539129e902telepathy-glib-vala-0.24.0-1.el7.x86_64.rpma9098ead389feeaac5b00d1120b5b338ad64509136c1c8bee7a5e56f385fb489telepathy-glib-0.24.0-1.el7.x86_64.rpmf10d9b30455055f1887cd031f862bcff8367444f075688553365567d39203d9eSLBA-2015:2235-1Libgdata Bug Fix And Enhancement UpdateThe libgdata packages have been upgraded to upstream version 3.14.2, which provides a number of bug fixes and enhancements over the previous version. Most notably, this update adds: * Support for the new Google Drive API; * Support for the new Google Calendar API; * Support for the new YouTube API.Scientific LinuxScientific Linux 7libgdata-devel-0.17.1-1.el7.x86_64.rpm0e849ec928cd50b2cde1d13d3bee81db497c8a5715e5c4bcdd80571849bc9055libgdata-0.17.1-1.el7.i686.rpme53b9d3ac4f24ec54b41423c53f5da7521cae21073790b818f447f4466aaa126gnome-documents-3.14.3-2.el7.x86_64.rpma321a5012cbd5b2f4c9ab7054114cd67a9d9d3b110e758447160c4e64accb77blibgdata-0.17.1-1.el7.x86_64.rpm9f99b0bce52231ffc7ac36b18d4179845d7d10e994f3a6d9472abc6afd82a843libgdata-devel-0.17.1-1.el7.i686.rpme9695ad72754a93251edfa99f8f94805dc20af4774b3c1d3d2e8f622fc6be9b3SLBA-2015:2236-1Nautilus Bug Fix And Enhancement UpdateThis update also fixes the following bugs: * When browsing an FTP remote subdirectory of the root, the /usr/bin/nautilus process previously terminated unexpectedly returning the following error message: ERROR:nautilus-bookmark.c:349:nautilus_bookmark_connect_file: assertion failed: (!nautilus_file_is_gone (bookmark->details->file)) Aborted (core dumped) A patch has been provided to and the Nautilus file manager no longer crashes in this situation. * Previously, unmounting a USB drive failed while a file was selected, with the following error message returned: This location could not be displayed This bug has been fixed, and a USB device now unmounts successfully. * Prior to this update, right clicking on an external Hard Disk Drive (HDD) icon on the desktop caused the Nautilus file manager to terminate unexpectedly. This bug has been fixed, and right click now displays a context menu for the icon as expected.Scientific LinuxScientific Linux 7nautilus-3.14.3-7.el7.i686.rpmb7ab8b5e485fe4ee3bdaa673509d83d1689131e131fb42b930b9ba62f51ecfb7nautilus-extensions-3.14.3-7.el7.i686.rpm8744dbceb6ff70bdaf58ac1b357b61001038be68bcf6423c0553133da09897c2nautilus-3.14.3-7.el7.x86_64.rpm05499b0cf36d66e32716970ef23f9bebc4bc7eadffbd9bc609dcf3173ca0adc6nautilus-devel-3.14.3-7.el7.i686.rpm49c209ae650fbfa5799b5ce27bd08b65be4a56a2aa3f15532d3cb8c633b3e4b0nautilus-extensions-3.14.3-7.el7.x86_64.rpm7cfdfdf4ab1e235dbb0e0e90af1a3ad68f3829bb3e0017a3ab09f3c26883bd13nautilus-devel-3.14.3-7.el7.x86_64.rpmba8cf5ca08433dd5814c114843b8713506581518f8131cdf2d7b401ca2708277SLBA-2015:2238-1Gnome-Keyring Bug Fix And Enhancement UpdateThe gnome-keyring, gcr, and seahorse packages have been upgraded to the latest upstream releases from the GNOME 3.14 branches, which provides a number of bug fixes and enhancements over the previous version. The libsecret packages have been upgraded to upstream version 0.18.2, which provides a number of bug fixes and enhancements over the previous version.Scientific LinuxScientific Linux 7seahorse-3.14.1-1.el7.x86_64.rpm37859b3e8e67495a8de983db365130fdacb64d3c344349dacb8dbf98a8d62b60gcr-devel-3.14.0-1.el7.i686.rpm14b34554efc444708190f4d938d8684bed708318f5741bae1391658fb1bce4c3gcr-3.14.0-1.el7.i686.rpm8e31667e938d093bdf6649e8f7c8f3c36c3f58f4de63321291f512cc08a15b5dgnome-keyring-pam-3.14.0-1.el7.x86_64.rpmd7517ebc3a3987ac002e4be52fad167f31427f155ee33b880ce601fcbc83599fgnome-keyring-3.14.0-1.el7.i686.rpm3bc0857d7a04eaaa444c8b21ddb38628d087becb9baa74bf1aff9cca75508505gcr-3.14.0-1.el7.x86_64.rpm2839af8f33abfe36e9b29085486892006a33eaee8c194c8877b61bdd5ebebaccgnome-keyring-pam-3.14.0-1.el7.i686.rpma3fd2d09b1406c8f4303c1b445c8eaa8e6aa7cd57ac4528ef415d0f7f2884b64gnome-keyring-3.14.0-1.el7.x86_64.rpm92a3be5b18d39b30cb9af57e9a1decdb22375e8b1ef8dc1a288dcb65ff61b4aegcr-devel-3.14.0-1.el7.x86_64.rpmbab9f7622bf9ec0775e6576b57b09a9e8fbee765afc5da75b37c0316d250c9faSLBA-2015:2243-1Gnome-Terminal Bug Fix And Enhancement UpdateThe gnome-terminal and vte3 packages have been upgraded to upstream versions 3.14.2 and 0.36.1 respectively, which provides a number of bug fixes and enhancements over the previous versions. This update also fixes the following bugs: * Previously, the failure to track the life time of the gnome-terminal window led to invalid memory access. As a consequence, gnome-terminal- server terminated unexpectedly with a segmentation fault while waiting for clipboard info. This update makes sure the life time of the windows is tracked correctly and that already destroyed windows are not accessed, thus fixing this bug. * Due to the missing dbus-x11 dependency, gnome-terminal failed to execute the "dbus-launch" child process. As a consequence, the user could not use gnome-terminal on a minimal installation. This bug has been fixed, and gnome-terminal now installs successfully. * Prior to this update, gnome-terminal was using invalid GSettings keys to clone and to change a profile. Consequently, gnome-terminal-server terminated unexpectedly with a segmentation fault. With this update, the correct GSettings keys are used, and the aforementioned crash no longer occurs.Scientific LinuxScientific Linux 7vte3-0.36.4-1.el7.x86_64.rpmcc696ab47b91137ef2856bba6bb0685277c771ac548be4523567dcc8e5979897vte3-devel-0.36.4-1.el7.x86_64.rpm13f42f4ca5e9a78f5c768292bab576979fa39cb15d69caff5950554f6fee081dvte3-0.36.4-1.el7.i686.rpme7471e76b2c0eda8f0dd48c853c2d843c198f4eaf8c87d3d9e0038d2630f0de3gnome-terminal-nautilus-3.14.3-3.el7.x86_64.rpm91650fe6a3664e64f0587ca9b829568b58b2cdabf942800fe0b6e081ee2b089dvte291-devel-0.38.3-2.el7.i686.rpm8a24fb77c44b9349292c8e9f422b173bf0dc2a3034618b8cb9a137d15e188b57vte-profile-0.38.3-2.el7.x86_64.rpm431607f94ee854d33bea6469022ee4dba62a2470001de30eeabdfce051b8f972vte291-0.38.3-2.el7.i686.rpmf2fcbf9897810fdc4cbbda09a43f8d6ce7ea1af19fd02e63090cc39dd69880aavte291-devel-0.38.3-2.el7.x86_64.rpm041065b089d6e04d43c311092c51d3b5fa66ece758d1e4e08453dfd8cad6580bgnome-terminal-3.14.3-3.el7.x86_64.rpm18821d89dda1d0b7e92f9f829ea9c85026c6cf592281d23d67a74ea6c9d4347evte291-0.38.3-2.el7.x86_64.rpm2083656c151979b2306937ff2f0f4e833b3858a9c5858e91099cfad5d74c9d04vte3-devel-0.36.4-1.el7.i686.rpm7ff1f8a76b3c373e38dcce0607ca2f651a7a324f1eed14c5ccb1a80225a0ddcfSLBA-2015:2247-1Colord Bug Fix And Enhancement UpdateThis update also fixes the following bug: * Prior to this update, the LittleCMS software library caused various packages to fail to build on the little-endian variant of IBM Power Systems. A set of patches has been applied to and all packages now build on the aforementioned architecture as expected.Scientific LinuxScientific Linux 7compat-libcolord1-1.0.4-1.el7.x86_64.rpm4fb4628f2b8192c243c5610ac8716ac2c1464f4494be34781d8e5c984cb04cc3colord-gtk-devel-0.1.25-4.el7.x86_64.rpme6f39e5734dc8353fb6a39d7a94f34f87e90895f6a6215820af26d3ddbd1b45bcolord-gtk-0.1.25-4.el7.x86_64.rpm2b9e70946360a87df30a993d5ec132d85c6898837e95ca7956595d41dd268346colord-gtk-devel-0.1.25-4.el7.i686.rpm14122e1cdf0bdfd31a08f70fbe4e95fa1c7c323c0ce1d91f886db0cb80a48953compat-libcolord1-1.0.4-1.el7.i686.rpm149bc04e876c84a9d86add59cf73961966987f6995466b847f37a1cb99ceb204colord-devel-docs-1.2.7-2.el7.noarch.rpmbb5d9bff7b8a53da6e35fe411da9a07cab4990b1717a0c0cea3d0d882c5a2501gnome-color-manager-3.14.2-1.el7.i686.rpm23bc95825dd6b3c40a3edadfeba64a66dd5f05d06159f53adc04cfd1b8f753c6colord-1.2.7-2.el7.x86_64.rpm31cfb893da8aceaabba73bc2745e4d271ac49c8c4183311196cb9a3ee0316b62colord-devel-1.2.7-2.el7.x86_64.rpmee8c46ef3e70519d32d8b10b4acb13fbc936bdcc1d5a0fdef0c2ccfbc25b38dfcolord-devel-1.2.7-2.el7.i686.rpm5dc57b307b3b7e8811e6046fa4643719251c0a893e50220799067f10aa4fcf7dgnome-color-manager-3.14.2-1.el7.x86_64.rpmc9f0cd4a18c62128cced9e22c463a7f9d2e446214965779d7f998f83b89d73b7colord-libs-1.2.7-2.el7.x86_64.rpmd9e9101d84057022e3c2a991524d779bf2f802aa41b521b44b2c75d3e2c35cd4colord-libs-1.2.7-2.el7.i686.rpmbf68b99546f1b20a4cc14b93425a82fa7978127ce4aa9fcacab1d26dee6e26dbcolord-gtk-0.1.25-4.el7.i686.rpm25cb7933fe0b1f3f4102ae3570b6548946505149eee86e7064852f5485744c7dcolord-extra-profiles-1.2.7-2.el7.noarch.rpma7164d2a2fccd7d3a6d8a5a46d1159519895dcf251c7759c1d06665e5545ac93SLBA-2015:2249-1Gnome-Weather Bug Fix And Enhancement UpdateThe gnome-weather and libgweather packages have been upgraded to the latest upstream releases from the GNOME 3.14 branches, which provides a number of bug fixes and enhancements over the previous versions.Scientific LinuxScientific Linux 7libgweather-devel-3.14.1-1.el7.x86_64.rpm7810757910ecd4dfa0d1e17176bba32d69d94d7881e5f51ace04fd6abd5331falibgweather-devel-3.14.1-1.el7.i686.rpmbc724f06023573e4905fb8adbd257f3ebc4e1892d36e5a73cdf6f3e7f9425f50gnome-weather-3.14.1-1.el7.noarch.rpm50fb919d74484b942dd3f7077a258642fedb7f4d7b2356a5f868f6134e5452fblibgweather-3.14.1-1.el7.i686.rpmc3babf66af87475dc0a4850ccbba78f55f3a25889330b8e4358bd70ea79ad8e9libgweather-3.14.1-1.el7.x86_64.rpme478cba8d52c43de55af22b4ab16634f165ddeca25af536b386e67ae510a13b0SLBA-2015:2252-1Libvirt-Glib Bug Fix And Enhancement UpdateThe libvirt-glib packages have been upgraded to upstream version 0.1.9, which provides a number of bug fixes and enhancements over the previous version. Notably, the update adds API support for further guest domain configuration options and guest snapshot management.Scientific LinuxScientific Linux 7libvirt-gobject-0.1.9-1.el7.i686.rpm42e617cbcc74cf96d39f99b0fe6cff1563d22cda6434c00f10fdc02c6b9618celibvirt-glib-devel-0.1.9-1.el7.i686.rpmbe2897795e8c9921b16e2b03ead57b2f78ee2041b1cd652ecf28307e13af8955libvirt-gobject-devel-0.1.9-1.el7.i686.rpm8f41c4f2720e5ae14eceabe5355bd5f6cc16e0043808c4d7b556b939444c17b5libvirt-gconfig-0.1.9-1.el7.x86_64.rpm7d092c0ea3fc9201b5c8a9a530ccb242593baadd6ef3eced31dd2de36ce4d13flibvirt-gobject-0.1.9-1.el7.x86_64.rpm9f278a73abfbd628a837f45eb3bef62ff99b22b9c1719948d3a1ff24d2e038c5libvirt-gconfig-devel-0.1.9-1.el7.x86_64.rpm4ed0c29f66f293fcbdc38ffd33d09061abbe4e7ed615742f676ddb2c36c2d6e8libvirt-glib-devel-0.1.9-1.el7.x86_64.rpm228bc0bf9f2b797f4dbc6118a471111d99ed8b8e9f2a0a5933e12b6b9a2061d9libvirt-glib-0.1.9-1.el7.x86_64.rpmabb6820813e41f7db3397aea68896ff83674368411dc38e316b4a39dc7db984clibvirt-gconfig-devel-0.1.9-1.el7.i686.rpm305ff3691da6c3850da99cdb1e75adb191f1ce9e33f469aa0b2d3e9bf70cf3c6libvirt-gconfig-0.1.9-1.el7.i686.rpm66ef230d03235f4efdaa7c41d0402924d51d517cc5590bdd71aded4a9182c3b9libvirt-gobject-devel-0.1.9-1.el7.x86_64.rpmf6e0336575b6dbd21cd9d9473f433e2040e7b57b57b6d661dc0db2c66ed054b2libvirt-glib-0.1.9-1.el7.i686.rpm699208476ff8f5020fdcd5c4220990d9f51b2068cb59571b3b5319b025fbffe0SLBA-2015:2253-1Gnome-Boxes Bug Fix And Enhancement UpdateThis update also fixes the following bugs: * When using the Boxes application with device nodes as main disks, importing libvirt virtual machines (VMs) from the system broker failed and caused boxes to terminate unexpectedly. This bug has been fixed, and VMs are now imported using Boxes successfully in the described scenario. * Due to a bug in Anaconda code, the libosinfo packages did not recognize Fedora 21 Server and Fedora 22 Workstation, which thus could not be set as a distribution while installing a VM. This bug has been fixed, and both Fedora 21 Server and Fedora 22 Workstation can be installed, can boot, and the user can be created properly. * On the guestfish shell, the os-inspect command previously failed to show Windows 8.1 32- and 64-bit ISO files available for installation on the operating systems. A patch has been applied to and os-inspect returns a list of available operating systems as expected.Scientific LinuxScientific Linux 7gnome-boxes-3.14.3.1-7.el7.x86_64.rpm097d7a2b12dfe4ecdeefc2ff9e2ac79fbc399886fd2431cc31455bbbff4ebc1flibosinfo-vala-0.2.12-3.el7.x86_64.rpm1309cc658411cbde558cdc4f27015d60a3f85164bbcc458205f555337ff342c3libosinfo-0.2.12-3.el7.i686.rpm95406beacd1ec85fa5708ddbef2dd798e5b0bd2e96a66ed49f50f6fae794f9aalibosinfo-devel-0.2.12-3.el7.x86_64.rpmea1b7845ab4742e3a0f048837836d8fb7bf8e57b02708268eadaf86a4a4f130clibosinfo-0.2.12-3.el7.x86_64.rpmb8bf6395eff4b479ab6461659ab249c3cdbfb59370d4e9d2170c17e2d5180b94libosinfo-devel-0.2.12-3.el7.i686.rpm4c03180218e3d5d47598d7d16a1fdd330bb7080086849fae60ceb2f66d4b12e2SLBA-2015:2254-1Yelp Bug Fix And Enhancement UpdateThe yelp, yelp-xsl, and yelp-tools packages have been upgraded to upstream versions 3.14.2, 3.14.0, and 3.14.1 respectively, which provides a number of bug fixes and enhancements over the previous versions. Notably, yelp has been visually redesigned and conditional processing capabilities have been extended, including the addition of conditionals for the DocBook schema.Scientific LinuxScientific Linux 7yelp-xsl-devel-3.14.0-1.el7.noarch.rpmc6062218fcd41221e29d5321f1eb72dde8e0635ec93a9ecc189a285377f97a20yelp-libs-3.14.2-1.el7.x86_64.rpma0fb8e7e45a2fb597a3cff192190fb37c5c8557a4b069d6f6a99bcda6e0b3b6dyelp-3.14.2-1.el7.x86_64.rpm16cfdab2bbddbe66179aa5778b54617c3289ed59942609bce10518c640b08072yelp-tools-3.14.1-1.el7.noarch.rpm05ca7e3550e99ded515999ee0e64ec004c3d61927a90c34750bb21c6974f50f3yelp-devel-3.14.2-1.el7.x86_64.rpmaef7957901a08f6afc71fb0592db15a4cb612b87fe0c4ffb3b02c3ddf37f0b79yelp-xsl-3.14.0-1.el7.noarch.rpm30297f66221b57034771c16aaf6c207543728ba3552131dd81f411ad7690db87yelp-devel-3.14.2-1.el7.i686.rpm458c6fa54a8dfb90ccf360a3ef79a94ce20e4cce794976b445d0808f9cb9d8a7yelp-libs-3.14.2-1.el7.i686.rpmb222584f557c48a09e63481acdddf5ba3c020fbb3bd3dd9a8344eabd07b0f68fSLBA-2015:2257-1Gnome Documentation Bug Fix And Enhancement UpdateThe gnome-devel-docs package contains documents which are targeted for GNOME developers. It contains, e.g., the Human Interface Guidelines, the Integration Guide and the Platform Overview. The gnome-getting-started-docs package contains a 'Getting Started' guide that can be viewed with yelp. It is normally used together with gnome- initial-setup.Scientific LinuxScientific Linux 7gnome-getting-started-docs-ru-3.14.1.0.2-1.el7.noarch.rpmcf782a4c9a1edacca55472f2e477bee146272668b7c4734e13749f653124530dgnome-getting-started-docs-3.14.1.0.2-1.el7.noarch.rpme5b702c95f0b58c6bd788502e951863c4866adfb5a0ee578439b9e834678d954gnome-getting-started-docs-pl-3.14.1.0.2-1.el7.noarch.rpm34454c11c5428bea0623255c11ce33bb10159dd6a52eea19ceb62db45b08d465gnome-user-docs-3.14.2-1.el7.noarch.rpma63d2471e53c0e17c003140a761f5d2d43df57b6fbc5aefb4dd456753c95cba0gnome-getting-started-docs-cs-3.14.1.0.2-1.el7.noarch.rpmcc5d7d223d50b0a16dae7bc38dcafeb0bdd2a231befe8a9c2614183094eac20egnome-getting-started-docs-de-3.14.1.0.2-1.el7.noarch.rpm24e17dadb32fca9047c0267450070b22831a88a204164b34bb4275f691ad0ee8gnome-getting-started-docs-it-3.14.1.0.2-1.el7.noarch.rpm3a5f2c092b05eaf741ed010de19650fc224f6f6e8f71c6e8402cb62d2a5e1df5gnome-getting-started-docs-hu-3.14.1.0.2-1.el7.noarch.rpma0ffe658449bd914a4c255f821170165aa2a43e39886f537cb8d3fe2ad2c88dagnome-getting-started-docs-es-3.14.1.0.2-1.el7.noarch.rpmf3c83d6a0ad526b3e0e1604421fae36399b1295c914f603c520007d12bfce34dgnome-devel-docs-3.14.4-1.el7.noarch.rpmb5144c5108b837980face56786235643ab0729c90c5bc657d3184b49de48de86gnome-getting-started-docs-pt_BR-3.14.1.0.2-1.el7.noarch.rpm05e17b299249ad01210f4642888f19dbc1884745d3bdc50ce2b9ceed7fdacf88gnome-getting-started-docs-gl-3.14.1.0.2-1.el7.noarch.rpm880f71c0a1aee20391b200f109acc0046956d2bc04b6c15e9d2efd1ddabce1b1gnome-getting-started-docs-fr-3.14.1.0.2-1.el7.noarch.rpma1a90dfa674829708e90c8bf7235e60800782c515abd3e43f8310bd91525af7eSLBA-2015:2258-1Samba Bug Fix And Enhancement UpdateThe samba packages have been upgraded to upstream version 4.2.3, which provides a number of bug fixes and enhancements over the previous version. Most notably, the "wbinfo -u" and "wbinfo -g" commands now only enumerate the users in their own domain by default. To enumerate all users on all trusted domains, run the "wbinfo --domain='*' -u" or "wbinfo --domain='*' -g" command. This update also fixes the following bugs: * Accessing a printer published in Active Directory (AD) failed with error messages. Now, if Samba fails to find the printer in the Samba registry, it obtains the globally unique identifier (GUID) of the printer from AD and stores it in the registry. The printers work as expected. * When running Samba without the winbindd service, authentication with user name and password sometimes failed. Now, it is possible to run Samba without winbindd, although it is not recommended. * In long-running SMB sessions, re-authenticating sometimes caused the SMB server to terminate unexpectedly. Now, the server no longer crashes during the SMB session setup. Users can re-authenticate and then use the SMB file server as expected. * The windbindd service terminated unexpectedly with a segmentation fault when the alternative domain name was not defined and Winbind was offline. This update defines the values for the alternative domain name as well as certain other settings that were previously not set. Windbind now works as expected in offline mode. * Samba displayed the STATUS_ACCES_DENIED message when the client tried to reconnect after the session expired because of an invalid signing check. Samba now correctly verifies whether signing is required in this situation. Samba no longer displays the message, and the user is allowed to reconnect. * The dfree utility sometimes reported an incorrect amount of free space on a Samba share. Now, the smbd service no longer ignores the block size of dfree, thus fixing the calculation of available space. The dfree utility correctly reports the available space on a Samba share. * The "net ads keytab create" command sometimes terminated unexpectedly with a segmentation fault. Samba has been modified to initialize certain internal structures and free the cursor iterating the keytab. Now, "net ads keytab" no longer crashes. * The users were sometimes unable to access a Samba share that specified identical values for the force user and force group when the "winbind use default domain = yes" setting was used. With this update, the users can access a Samba share in the described situation as expected. * When the "map to guest = bad uid" setting was used, the user was sometimes denied permission to access a share as a guest user. Samba now handles "map to guest = bad uid" as expected, allowing users to access shares as guest users if they are not authenticated. * The Samba files server terminated unexpectedly when the "mangling method = hash" setting was used in the smb.conf file. Samba now fully initializes the hash module, preventing the file server from accessing invalid data structures, and no longer crashes in this situation. * When the user shared an XFS file system with disk quota, Samba displayed incorrect volume size on the client. With this update, Samba correctly displays the disk quota value as the volume size. After installing this update, the smb service will be restarted automatically.Scientific LinuxScientific Linux 7libwbclient-4.2.3-10.el7.i686.rpm765ba7fefc14de507e9c774a67306fc3460fde23bb9a1678200958047e88f085libsmbclient-devel-4.2.3-10.el7.x86_64.rpmbcbd71c250f02f1eb58de6b78f95966ef348b24ae70ac5123b37ba1a20c593b6samba-test-4.2.3-10.el7.x86_64.rpmcfe1e2158c380a41d6157f00d636d71e38e4e1cc6f9c75cf34978d9fd5b37653samba-python-4.2.3-10.el7.x86_64.rpm867b5a129348b30209870392dfef25f78585610ebc6373a9ea224b1594ccfc59samba-client-libs-4.2.3-10.el7.x86_64.rpmef4293d875ee705000feb8e3037285788725a2266babaab67c847aa193e93f9clibsmbclient-devel-4.2.3-10.el7.i686.rpm244aca5fe4c225f68e6752ef245512c9d276c15c15788ef5f2ae69e74734f800samba-common-4.2.3-10.el7.noarch.rpm7b46037fdc262e2d06a89560f185e03d76ce3b4f11bca845cef58da15de505f4samba-4.2.3-10.el7.x86_64.rpme86b092ab7dd823b05985305b0c3f3a27a5eb6076724ba35e322d2303e46783alibsmbclient-4.2.3-10.el7.x86_64.rpmb5417b3cf7f60730f59fbf68213ad448bc3f6f5b9766c7758f5c01174e9da3e3samba-winbind-modules-4.2.3-10.el7.i686.rpm23199a3ac0c12ace9a5ecaff6235de9eed0995f7a4f8678746d0c2d6ca2d7a7dlibwbclient-devel-4.2.3-10.el7.x86_64.rpme29555baea6f3ef10a994cd78bad05d67dbe65fd81c64308fd24ff0aa7b9e0e9samba-winbind-krb5-locator-4.2.3-10.el7.x86_64.rpm55f422933d4299486d042d7051684fd4ec5b6812ad00449d0025baef922de6b3samba-common-tools-4.2.3-10.el7.x86_64.rpmb14a786d804e4c80bdb39a08bcb7b7385f14346d17732d3eceb4a79beafbc4dblibsmbclient-4.2.3-10.el7.i686.rpm49615237d251159f518c8546fbd3b940fed95b5646b6abefd4746c461f1f37e7samba-pidl-4.2.3-10.el7.noarch.rpm42fe528ae5214a464f87a99bb3f43db2d7d8625d8e4e0301d69b396ffe929656samba-winbind-modules-4.2.3-10.el7.x86_64.rpm2f707f0c86ec844ca165b4442c8e006726fdb4425aa52d16e035ec6bb878e71esamba-common-libs-4.2.3-10.el7.x86_64.rpm8b918f53f11e93a8a94d2b21cf7202d2792d2e96191ce6994b94ce9eeadf40aflibwbclient-devel-4.2.3-10.el7.i686.rpmea793a3c759df1fcd7e40b560e5f0a44ae78f9810ffee508a9cea5eea1d94d65samba-test-devel-4.2.3-10.el7.x86_64.rpm902eb3e6a69c9aef4358229c11873a2e8a6d2088558984ddd36423b387940ad0libwbclient-4.2.3-10.el7.x86_64.rpmc3bd8b72701267e1561654f78a145b83c4224e8725ac059f39c91636c8850137samba-dc-4.2.3-10.el7.x86_64.rpm1665f4b5b09bf6869d15a9042d78b6caa8144b1beec4571badcc6a7b8404305fsamba-winbind-clients-4.2.3-10.el7.x86_64.rpm8839dded143bc9f77c9c60d2693abde2567d7ce39a3ac6dd5fac2b5eeb010683ctdb-devel-4.2.3-10.el7.x86_64.rpm8029da8509097a30749e1dfaf5842f4810fcbff2ae2443415e1ee5d7face2617samba-devel-4.2.3-10.el7.i686.rpmcccb0e5ce1af8cc38a460227f60df5a29d7b45327e5ad045ba9a6bc71cc175absamba-test-libs-4.2.3-10.el7.x86_64.rpmcb173ffe1c3d01ea757b98fd195458ddbbc9ca445ea0fe2209b95c368139dd2esamba-client-libs-4.2.3-10.el7.i686.rpm2569c1ec98d22420dca00dec0826ed4c7a250a9efb0a7eb16b5c6ae78f906001samba-libs-4.2.3-10.el7.i686.rpm300795f95d4a8479bb64745f4164361b253544d73c40fc2600cd49516fb5c918samba-dc-libs-4.2.3-10.el7.x86_64.rpm77704c3c7c18b2412928617fd36bf4f62336933643dac367176c298b8344d60bctdb-tests-4.2.3-10.el7.x86_64.rpmb76563b6457a478c6ce423d9eb8de4d83a478ea47aad455fe85251469e7f8cfcsamba-vfs-glusterfs-4.2.3-10.el7.x86_64.rpm8ced3b0ad5768b05e1941b7a7583c27d2f059471b8ab2ea3ab4611fbcf2ddeebsamba-client-4.2.3-10.el7.x86_64.rpm95054c338b6ee2a1aba0c05e2f4aef48c93130c5b8288eed6a06f2ee57c30df3ctdb-devel-4.2.3-10.el7.i686.rpmff61f2a4df8150420da9b0ca48dd73cc6943fa50a82032ab0de7a6ea98cabf66samba-libs-4.2.3-10.el7.x86_64.rpm914d678513b61ab7dd15b87b7f4e72591abd2a21436bc259719cfe45025735f5samba-winbind-4.2.3-10.el7.x86_64.rpmd9a05b1f48009c946ec76717639e3acfbd64e805354bcaf715aad3ec8772e7easamba-devel-4.2.3-10.el7.x86_64.rpm744663a98b7643644e498766d45dd29a7bb296ec7232c2178f94e2a512dfe279ctdb-4.2.3-10.el7.x86_64.rpmc049fb46272d8afaeb3ca35258efe38ed37893ce52889337a1db151fe2d7eed3samba-test-libs-4.2.3-10.el7.i686.rpma5cf9aeb144c3c8a5cb281f223dab303ecf25a9580ed6827432e4bca38c6937bSLBA-2015:2273-1Softhsm Bug Fix And Enhancement UpdateThe softhsm packages have been upgraded to upstream version 2.0.0rc1, which provides a number of bug fixes and enhancements over the previous version. Notably, it adds support for the RSA Optimal Asymmetric Encryption Padding (OAEP) and fixes a number of bugs detected by static code analysis.Scientific LinuxScientific Linux 7softhsm-2.0.0rc1-3.el7.i686.rpm6b744fef0a816801df0e62e618653be39ad6c21e7ca8a27f21d47cde240b8adbsofthsm-devel-2.0.0rc1-3.el7.x86_64.rpm19cd116d638e48c5fdd2b3039a3cc232ab0164670f191b2681ab5231b10a12b6softhsm-2.0.0rc1-3.el7.x86_64.rpm5b4604d009bfa7334dc5ae755ea260ae2bcd4c1bf1f771fc64ee406c386e9e1fsofthsm-devel-2.0.0rc1-3.el7.i686.rpm4c806ac0a89df8df19ce659ed9e48f2d5000c8e48cc70303053f84681fcf1e97SLBA-2015:2276-1Pki-Core Bug Fix And Enhancement UpdateThe pki-core packages have been upgraded to upstream version 10.2.5 which provides a number of bug fixes and enhancements over the previous version, including pki-core support for some of the new IPA features. This update also fixes the following bugs: * The "ipa cert-find" and "pki cert-find" commands previously took an unexpectedly long time to complete when a large number certificates were present in the database. With this update, the default LDAP filter generated by the commands has been changed to "(certStatus=*)" to make the query run by the commands match an existing virtual list view (VLV) index. This prevents the described "ipa cert-find" and "pki cert-find" performance problems. * PKI server stores a copy of the system certificates in each subsystem as a cache. The cache could sometimes become outdated or missing. This update provides a utility to restore the cache data. For detailed instructions on how to check and update the cache, see the following Knowledgebase article: * Due to conflicting certificate mapping, the Key Recovery Authority (KRA) could be authenticated as the PKI database user instead of the subsystem user. Because the PKI database user previously did not have sufficient permissions, key archival operations in some cases failed. In new PKI server installations, the permissions have been corrected. In existing PKI server installations, the permissions must be corrected manually. For detailed instructions, see the following Knowledgebase article:Scientific LinuxScientific Linux 7pki-symkey-10.2.5-6.el7.x86_64.rpmbbc8a4a7f98f43e84d1105a63d3bf7f6e870d5620fbd310005ddaa47cf7a9331pki-server-10.2.5-6.el7.noarch.rpme670633d42ae9dfabf647e7f6a23d935652bd96f7b106c000f1b79fb3c0968a9pki-tools-10.2.5-6.el7.x86_64.rpm7212b49f455b2ecb3176726a15cbc3df1df3044e4d07ea1c83a80eb4e1ea2431pki-javadoc-10.2.5-6.el7.noarch.rpm61c3b66a72310a8efd8404df4c4920622b8dde9a2bce4e4fb4b5a788974092bbpki-base-10.2.5-6.el7.noarch.rpmbf3779878e9dcaa8de94b8f9beb03eb1de62cc9b8a0db50738c8497433278b74pki-kra-10.2.5-6.el7.noarch.rpm6388c7581ff3dabf63516464f0c2952e9c7201fca05254eb22fb5f537abc40depki-tks-10.2.5-6.el7.noarch.rpma50f3148824998dc5964d78fa5375229687ee5423bdd8ff9b0f843033254052bpki-ocsp-10.2.5-6.el7.noarch.rpm41a3ca981c25cd07029e5bcbe381b0867876ad5d4ee897e157fb1646a8248812pki-tps-10.2.5-6.el7.x86_64.rpm7473f9ee21cc1864e53ad7d9d3ec37b4a523d3f6299d9e1d40a50d46528a6bb7pki-ca-10.2.5-6.el7.noarch.rpm44d6704aecc57f431955a4ebd7663ce0f7369ca3d1afe8eda374cc5b8b832785SLBA-2015:2282-1Kde-Workspace, Attica, Bluedevil, And Qt Bug Fix And Enhancement UpdateThe attica packages provide a Qt library that implements the Open Collaboration Services API version 1.4. BlueDevil is a set of components that integrate Bluetooth in KDE. The libbluedevil packages provide a Qt-based library aimed at handling Bluetooth functionality. The kde-workspace packages have been upgraded to upstream version 4.14.8, which provides a number of bug fixes and enhancements over the previous version. The attica packages have been upgraded to upstream version 0.4.2, which provides a number of bug fixes and enhancements over the previous version. The bluedevil and libbluedevil packages have been upgraded to upstream version 2.1, which provides a number of bug fixes and enhancements over the previous version. The qt packages have been updated to ensure correct operation on Power little endian or ARM 64-bit hardware architectures. The desktop must be restarted (log out, then log back in) for this update to take effect.Scientific LinuxtruetrueScientific Linux 7kdepimlibs-akonadi-4.10.5-4.el7.x86_64.rpmda77067737beab751516ea0749650024e886b277b694cb5563a2bbde8c29c71cbluedevil-autostart-2.1-1.el7.x86_64.rpme7c7836a97d446b538137cdb4c6a3de92be800bb44a1947d78b8eb35141adbbckdepimlibs-kxmlrpcclient-4.10.5-4.el7.x86_64.rpm26efe75b6cfe1fc30c03d5e1c274533fd5ee1222e19d400296a0d2409a59dc7dlibbluedevil-2.1-1.el7.i686.rpmae5d78912a8b05ee5f0ef0b8d5e1ce78a800fcda25103b12b13af210bd669ba4bluedevil-2.1-1.el7.i686.rpm12d58e97267044d39da6b5bec742a4dce56b4b8eedbf4b4b754f1ab84ee1aac6libbluedevil-devel-2.1-1.el7.x86_64.rpm545f1f798cf62bcd2833e2e7278bf6537e3f0dca16c232efbe1fdc4fb30922d6bluedevil-2.1-1.el7.x86_64.rpm85669f96240fb69b70ca2aadd4fe9cee9750c55f4eeb1ab3d8e438a7e7ba1198libbluedevil-2.1-1.el7.x86_64.rpma1d5727e99a7847dc847a5eae2dd9f1e198d1e523f3811b9dda7264211c0949bkdepimlibs-devel-4.10.5-4.el7.x86_64.rpm30ede1316717efe3f8f5d3ec2bd200ed3a93a2c68fa9cca2e4a6a33af80ea6e3attica-devel-0.4.2-1.el7.i686.rpm09a7fc33d30c3a9a93138ffc95fe65525a2550f32905572f66a6e3e192b8260bkdepimlibs-kxmlrpcclient-4.10.5-4.el7.i686.rpmf9af60bf343447572f1bbc6e6820cc7e3c08583f3d90d53418154c77bcc0734ckdepimlibs-4.10.5-4.el7.i686.rpm65b8f8b7f77b72352b05eeea5fb48e9a6ee5b63846a039667a8386248369e341kdepimlibs-akonadi-4.10.5-4.el7.i686.rpm2069ee2437c31943d2a37a316b6944719012bab72e6c4c416fe834d579bd36b1attica-0.4.2-1.el7.x86_64.rpm63c5555107e22ffc7a981695e10b7861c9570e17eab55522d4adf61d0c995c56kdepimlibs-devel-4.10.5-4.el7.i686.rpma0a999447b6ce3e8b57d0c6e46a353ae6ec04ca518967196a5b5c7feaaa52b5cattica-0.4.2-1.el7.i686.rpm6c41facbf0b85eb6532fddf4b45cad2e9975100a949321be744afffa9d51ff40attica-devel-0.4.2-1.el7.x86_64.rpm00a496b3bb9ea0eff8c667bc979fe7d00a579edeecfa7c329b15dc170ddde1c7libbluedevil-devel-2.1-1.el7.i686.rpm6eca0841f75f55a3ca26f285c82c3dba8eea41eae7eb6b372370ed5ad9ac1279kdepimlibs-4.10.5-4.el7.x86_64.rpmb530d5504a37d739738630994154c06840ba406beb9ed71423d4c7abac56f8b9kdepimlibs-apidocs-4.10.5-4.el7.noarch.rpm7a42b7c4d342f7e5f9563ecfde0691e35e3a4976d853ba533d48f5e330956acfSLBA-2015:2300-1Selinux-Policy Bug Fix UpdateThis update fixes the following bugs: * Previously, without updated libcap-ng and policycoreutils packages, there was a privilege escalation due to the SECURE_NOROOT bit being used with the seunshare utility. With updated libcap-ng and policycoreutils packages, the PR_SET_NO_NEW_PRIVS bit is used instead to ensure that a process and its children can not gain new privileges. To reflect these changes, SELinux policy rules have been updated. As a result, all sandbox processes for the sandbox commands run within the same specific SELinux sandbox context providing the process isolation for sandbox processes altogether with private mounts of the /home/ and /tmp/ directories. * In Scientific Linux 7, services without their own SELinux policy have the unconfined_service_t SELinux type. However, this type provides only a slight benefit coming with advanced process isolation provided by SELinux. With this update, new SELinux domains for the cgdcbxd and swift-container- reconciler processes have been added. * Previously, SELinux policy for Red Hat Gluster Storage (RHGS) components was missing, and Gluster worked correctly only when SELinux was in permissive mode. With this update, SELinux policy rules for the glusterd (glusterFS Management Service), glusterfsd (NFS sever), smbd, nfsd, rpcd, adn ctdbd processes have been updated providing SELinux support for Gluster.Scientific LinuxScientific Linux 7selinux-policy-doc-3.13.1-60.el7.noarch.rpm4785ea1bfd26e445a3dbcaf56245ad54934e37b461c50dc71e2e7ff49d33b97aselinux-policy-mls-3.13.1-60.el7.noarch.rpm7ca9cac2570c9d7e05fb7fca0a43ea4038fcd70bf44516c3db00c2c45eaac5a0selinux-policy-sandbox-3.13.1-60.el7.noarch.rpm9768a48ce18eda2a8b26bc35cfc1aee6045ca68d233103bcaa0c04b250947563selinux-policy-3.13.1-60.el7.noarch.rpmfcb0a42067052d94f6449330609f6a7a9813e0b9792a792ddb2e6dcf68bb7c95selinux-policy-targeted-3.13.1-60.el7.noarch.rpm7895e8eb9dd384f5d3f9ac4576d40891a9610ea9ccc78f34293a44890d0aef4eselinux-policy-devel-3.13.1-60.el7.noarch.rpmcaa3856a2f37db2c0c6a3ed6026555d4e05727fd2c4343a7101ce483d93d1af7selinux-policy-minimum-3.13.1-60.el7.noarch.rpmb48191e0a794a109dcb3f285c83483ef3c40a550ee5db05f8ea329833f895fbaSLBA-2015:2303-1Opendnssec Bug Fix And Enhancement UpdateThe opendnssec packages have been upgraded to upstream version 1.4.7, which provides a number of bug fixes and enhancements over the previous version. Notably, this update adds the AllowExtraction option, which enables users to generate private keys with the CKA_EXTRACTABLE flag set to TRUE.Scientific LinuxScientific Linux 7opendnssec-1.4.7-3.el7.x86_64.rpm37432ebae32cf323beadcdf9de52720fd23d653931f2b6e21e889c8b616f959cSLBA-2015:2304-1Python-Yubico Bug Fix And Enhancement UpdateThe python-yubico package has been upgraded to upstream version 1.2.3, which provides a number of bug fixes and enhancements over the previous version.Scientific LinuxScientific Linux 7python-yubico-1.2.3-1.el7.noarch.rpmf703d1995c4639dbcf6202ffd6630c263c9de9cd21e951df29234153a70ee191SLBA-2015:2338-1Libtalloc Bug Fix And Enhancement UpdateThe libtalloc packages have been upgraded to upstream version 2.1.2, which provides a number of bug fixes and enhancements over the previous version.Scientific LinuxScientific Linux 7libtalloc-2.1.2-1.el7.i686.rpm71104cecb999314f941b7c2dc9d250e36659cbb9e78b6d8c6808eef829858f1cpytalloc-2.1.2-1.el7.x86_64.rpm5fe13da2dad14d9469ad1fd44c978dd8a518930fb859b672666876e321e5dfddlibtalloc-devel-2.1.2-1.el7.i686.rpmbec5adba2c48ac928ac6270b0e57791692820df7784093ab420fed55e9c5f1dfpytalloc-devel-2.1.2-1.el7.x86_64.rpmb520ccccc1cd234090b7817fe7933c942849d2a19e687ffeff8cb4654f520431pytalloc-devel-2.1.2-1.el7.i686.rpmd8dfdbc378d1b59d595884e90b3d1a4ca94ef49901c3811666c559460f9ca12apytalloc-2.1.2-1.el7.i686.rpm69f0135cdaebed17bc67ea470e1465c97564d37aeee95bebe1f107d9525cc99clibtalloc-2.1.2-1.el7.x86_64.rpmc67e8382cd8e47ff05f0b4f1b474fb8487eb7a7f2552761effe6f605f69b1580libtalloc-devel-2.1.2-1.el7.x86_64.rpm27fccd890b126ffe81285cf8092268241ba6e46ca9bbfcf90a55222fadb54e39SLBA-2015:2339-1Libtdb Bug Fix And Enhancement UpdateThe libtdb packages have been upgraded to upstream version 1.3.6, which provides a number of bug fixes and enhancements over the previous version.Scientific LinuxScientific Linux 7python-tdb-1.3.6-2.el7.x86_64.rpm4d45af9cd15d6f2462bfb38d762e14d407059c413ae2db05b79cacb434a6b9d3libtdb-devel-1.3.6-2.el7.i686.rpm1ab7f572b2cebc033c641e57684ade4e19474113911e406fe3f369784095f7eclibtdb-1.3.6-2.el7.i686.rpmbd73611b8da50d96631aa953c04fc6ed5effdfd5701e3a7cd71ddcafd1eb7e00libtdb-devel-1.3.6-2.el7.x86_64.rpm81b8afbaa6da20812e88362d63d5f873637bab7398634872ca848b4d01cfcb15tdb-tools-1.3.6-2.el7.x86_64.rpm452abb650b476844cfe51fb29a60814675afd54a2db61f4065a08c522d351b7dpython-tdb-1.3.6-2.el7.i686.rpm1695e9816a81f9f696b0769d118436164502f2ff3c9288a682db5d21638eac7clibtdb-1.3.6-2.el7.x86_64.rpmf68eded3fbbd3432899b65500cc1d1f23a5696a92dd8d02353b352df76efc02cSLBA-2015:2340-1Libtevent Bug Fix And Enhancement UpdateThe libtevent packages have been upgraded to upstream version 0.9.25, which provides a number of bug fixes and enhancements over the previous version.Scientific LinuxScientific Linux 7libtevent-devel-0.9.25-1.el7.i686.rpm3f68fb4fce090cbd2ff72540aae962a8c8952aa01fb95c3aee22978446a2ba05libtevent-0.9.25-1.el7.i686.rpmf237ad625cc52d6d3c12eec648e9bdf7c41d54b25a06eee02eee2e710b0d61f6libtevent-0.9.25-1.el7.x86_64.rpma238ed450779651e3354dac84548096bef92ecfeb6604c27b77cb25b8dbf73bclibtevent-devel-0.9.25-1.el7.x86_64.rpm792169d8f2b86fc2421e892fc3fad1296a95ca9dc9a6399e209804a32fddcdb1python-tevent-0.9.25-1.el7.x86_64.rpm0a62d178d59df80ceb6cdb04b6d77142c24737a7e5ccd6f27600ea4c3592bcbbSLBA-2015:2351-1389-Ds-Base Bug Fix And Enhancement UpdateThe 389-ds-base packages have been upgraded to upstream version 1.3.4.0, which provides a number of bug fixes and enhancements over the previous version. Bug fixes: * When multi-master replication was configured, this redundant error message was recorded in the log: NSMMReplicationPlugin - write_changelog_and_ruv: failed to update RUV for unknown The message is no longer displayed. * When the subtree level was deeper than one, Directory Server sometimes did not select the closest above password policy for the target user entry. The bug has been fixed along with the nested Class of Service (CoS). * A helper function to check whether the cache size is valid was resetting the entry and Distinguished Name (DN) cache size to very small values. Now, the helper function provides only the validity check and no longer resets the cache size. * The "No original_tombstone for changenumber" error message was logged unnecessarily when no original_tombstone value was defined. The message is now logged only when necessary. * After the cleanAllRUV task finished, the change log still contained entries from the cleaned rid. Now, cleanAllRUV cleans the change log completely as expected. * The verify-db.pl utility ignored the "-a" option, which specifies the path to the database directory, and instead used the path defined in the Directory Server configuration. The utility now respects "-a" as expected. * When AD users had multiple spaces inside the value of the RDN attribute, synchronizing the entry to the Directory Server failed. Now, the WinSync plug-in works as expected. * A bug in WinSync account synchronization has been fixed. The ntuserlastlogon attribute is updated on the Directory Server side based upon the lastLogonTimestampand attribute in Active Directory. * This update adds scoping to the retrocl plug-in and moves the existing memberOf scoping outside the memberOf global lock. The memberOf and retrocl plug-ins no longer enter a deadlock state when updating multiple back ends at the same time. * Complex filters in a search request did not work as expected. Now, the filter optimization no longer mistakenly ignores certain complex subfilters. * When multiple replica update vector (RUV) updates were skipped in fractional replication, RUV was not updated at the end of the session, and the next session restarted evaluating the same skipped updates. This update prevents the unnecessary replays. Enhancements: * Verifying whether the timestamp of a log is within the start and end times of an event has been improved. The logconv.pl log analysis utility has been improved so that the log report is no longer empty when an event time range does not match the timestamp. * To improve replication throughput, the nsDS5ReplicaWaitForAsyncResults attribute has been added to the nsDS5ReplicationAgreement class. The attribute defines how long a supplier waits for the response from a consumer. Its value is specified in milliseconds; the default is 1 second. * Added the memberOfSkipNested attribute, which accepts the "on" or "off" values, to improve delete performance when no nested groups are present. When set to "on", nested group lookups are not performed during a group delete operation. * A new Nunc Stans event framework to handle multiple simultaneous connections has been added as Technology Preview. The framework allows supporting several thousand active connections with no performance degradation. It is disabled by default. After installing this update, the 389 server service will be restarted automatically.Scientific LinuxScientific Linux 7389-ds-base-devel-1.3.4.0-19.el7.x86_64.rpme1dde38acee387ef77510e36f4b8e4d347aa011dc151cc1d5a3a10794bc6dd7c389-ds-base-libs-1.3.4.0-19.el7.x86_64.rpm0e04ca4c29435cd3d978ccb0cf95b87f70eabd54aa2f04d9ad2661aa6ce1a0b9389-ds-base-1.3.4.0-19.el7.x86_64.rpm357d9fa1ca598b4ba445e3817fe1e7f9394d6dca6e5a783c0d729189f2ffd449SLBA-2015:2364-1Pyparted Bug Fix UpdateUpdated pyparted packages that fix two bugs.Scientific LinuxScientific Linux 7pyparted-3.9-13.el7.x86_64.rpm54b4aa4ad93512bad89df5edfe3bbad4e280a7a2378623fd56102410e3107848SLBA-2015:2365-1Certmonger Bug Fix And Enhancement UpdateThe certmonger packages have been upgraded to upstream version 0.78.4, which provides a number of bug fixes and enhancements over the previous version. In addition, this update adds the following enhancements: * Requesting a certificate during IdM client kickstart enrollment no longer requires certmonger to be running. It is possible to successfully request a certificate in the described situation without certmonger, on the condition that the D-Bus daemon is not running. To use this functionality, set the system bus address to "/dev/null" for the ipa-client-install utility in the kickstart chroot environment: # env DBUS_SYSTEM_BUS_ADDRESS=unix:path=/dev/null ipa-client-install Note that the certmonger service requires a system reboot to start monitoring the certificate obtained in this way. * The certmonger service has been updated to support the Simple Certificate Enrollment Protocol (SCEP). It is now possible to issue a new certificate and renew or replace existing certificates over SCEP.Scientific LinuxScientific Linux 7certmonger-0.78.4-1.el7.x86_64.rpm444a81ca88dcbdc49668b2bafe34bf89aaa2ec7fdad77e9715108fde2e242dacSLBA-2015:2423-1Libguestfs-Winsupport Bug Fix And Enhancement UpdateThe libguests-winsupport packages have been upgraded to upstream version 7.2, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following bug: * Due to conflicting files, it was previously not possible to install libguestfs-winsupport together with the ntfs-3g package. With this update, libguestfs-winsupport has been modified not to contain the conflicting files. As a result, libguestfs-winsupport and ntfs-3g can be installed together as expected. In addition, this update adds the following enhancement: * With this update, libguests-winsupport supports the 64-bit ARM architecture, which allows libguestfs to support Windows images on NTFS file systems.Scientific LinuxScientific Linux 7libguestfs-winsupport-7.2-1.el7.x86_64.rpm6055863e3617659eeb6bbf91d7ba4c623b5dd0b9be7489ab0939c9f2a3213e64SLBA-2015:2454-1Glusterfs Bug Fix And Enhancement UpdateThe glusterfs client packages have been upgraded to upstream version 3.7.1, which provides a number of bug fixes and enhancements over the previous version.Scientific LinuxScientific Linux 7glusterfs-devel-3.7.1-16.sl7.x86_64.rpm7fed8557bd2ecbbffac0b00d87d874ff98b7a4e1e4d22b811e261a07472ed1b5glusterfs-api-3.7.1-16.sl7.x86_64.rpm5395bd462bb3f007e68ba75d715ec810f956dfdc28a26b4d18aa61d42ecf1898glusterfs-rdma-3.7.1-16.sl7.x86_64.rpm7b8bf00e20059b72e9829c9e1dafa364639b7ee428d7370b1d07c0f1335b4b34userspace-rcu-0.7.9-1.el7.x86_64.rpm05f1c9d938230d45aa9ab64754ef786eee17b391b1c4a9fc92534ba4c8843268glusterfs-fuse-3.7.1-16.sl7.x86_64.rpm8a3795f4c96d502b639c2ca44108f23d8e6f77fda87a010c53a2e9cbb5eb09e4glusterfs-client-xlators-3.7.1-16.sl7.x86_64.rpmd57736bb9256def30ea60ef90a91ba3c4a718917efca73c501ded1cf387c99bcglusterfs-server-3.7.1-16.sl7.x86_64.rpmca9d297b639a227e7a5fbe65a0c0dff51eda2a9d0c75d1b5ce5c9dbff1f3ab5aglusterfs-libs-3.7.1-16.sl7.x86_64.rpm07bba22577e6c3ff3e9c80f473638b868649689f7bf897ea00a3607feb1d10a7glusterfs-cli-3.7.1-16.sl7.x86_64.rpmcb898804c66633a8c0157da9d6fbfc48d3a99be65ee8b7b2c5679b86b7a8018duserspace-rcu-devel-0.7.9-1.el7.x86_64.rpm8422c0b69c60e9cd1f5b1bf67d7394802886a14a7eb07cd5dc43c69877e69ac4glusterfs-3.7.1-16.sl7.x86_64.rpm43137f91161f00c3fd1f78c4e5d4c193f8ee60cfa7c704230d72231aaa87e055glusterfs-api-devel-3.7.1-16.sl7.x86_64.rpmb774cf3b3dc17913e92021ba09b5bc6aafa9397ee2b688a776c22e7d88c46319glusterfs-resource-agents-3.7.1-16.sl7.noarch.rpm6a239eb85eb2fffbcc30619a58f4e8c085fe37b74c7ccd2877c8c38c621da579SLBA-2015:2476-1Libqb Bug Fix UpdateThis update fixes the following bug: * The libqb library previously failed when creating sockets if the process ID (PID) number exceeded the character limit. This update increases the maximal length of the CONNECTION_DESCRIPTION field, thus fixing this bug.Scientific LinuxScientific Linux 7libqb-0.17.1-2.el7.1.x86_64.rpm6f7efe3cb7a82a0b9ad71220736b92ad4896d3e35ff05a6c4386c4cadcf529bblibqb-devel-0.17.1-2.el7.1.x86_64.rpmccf08661123b08b609e389b81ed6c3d844a875e611f25438c02cfe781f43e2e8libqb-devel-0.17.1-2.el7.1.i686.rpmb0261dda39bf4c6604f3a490bc15469ea17acb7e81dafc1a7f39ee25c71cd220libqb-0.17.1-2.el7.1.i686.rpm1c6b94babab222dc203d5a3fcff96bc8d1fc1add4269174c287cbecb13dba707SLBA-2015:2562-1Ipa Bug Fix UpdateBugs fixed: * During the renewal of the IdM RA agent certificate, the renewed certificate was already available for use, but the related configuration was not updated yet. As a consequence, if the renewal of another certificate was triggered during the renewal of the IdM RA agent certificate, the renewal could fail with the "Invalid credential" error. Now, the IdM RA agent certificate is properly locked for the whole duration of the renewal. * The IdM KRA agent PEM file was not exported when using ipa-kra-install. Consequently, if KRA was installed after an upgrade from an earlier version of IdM, IdM vault commands failed with an internal error. To the IPA KRA agent PEM file is now exported in ipa-kra-install, and IdM vault commands work in the described situation. * The code path in the KRA installer that created the vault container in LDAP raised an error if this container already existed, for example when installing KRA on a replica. As a consequence, the following untrue error message was returned during ipa-kra-install on a replica: "Failed to load vault.ldif: Command ''/usr/bin/ldapmodify' '-v' '-f' '/tmp/tmpcuO7cy' '-H' 'ldapi://%2fvar%2frun%2fslapd-IPA-TEST.socket' '-x' '-D' 'cn=Directory Manager' '-y' '/tmp/tmp74Y4AY'' returned non-zero exit status 68" The error message was harmless, as an entry in LDAP already existed. Now, no error message is displayed. * Due to a bug, ipa-server-install and ipa-replica-install did not validate their options. A patch has been applied to add the code that calls the validators in installers. Now, ipa-server-install and ipa- replica-install validate their options as expected. * An internal error in the method that cached ipaconfig settings caused the results not to be cached. Consequently, a search for limits stored in LDAP was unintentionally together with every LDAP search operation, and the search operations were thus duplicated. This update fixes the comparison of LDAP connections, and limits are downloaded from LDAP only once for each connection. * Previously, ipa-client-install did not handle Match and other sections in OpenSSH configuration files correctly. As a consequence, OpenSSH configuration files containing Match and other sections were corrupted by ipa-client-install. This bug has been fixed. * An internal error during an upgrade prevented the upgrade process from upgrading forward zones properly. Consequently, original forward zones have been removed, but no new (new-style) forward zones were added. Effectively, all forward zones disappeared. This update fixes internal calls of API, and old-style forward zones are now migrated properly. * Included certificate profiles and CA ACLs were not added during replica installation. As a consequence, certificate issuance failed on Scientific Linux 7.2 IdM replicas created from IdM masters prior to 7.2. Now, certificate profiles and CA ACLs are in place. Additionally, the default CA ACL cannot be deleted. As a result, certificate profiles and CA ACLs are now added if missing when installing a replica regardless of the version of the IdM master. The default CA ACL, hosts_services_caIPAserviceCert, can no longer be deleted, only disabled. * Connection to LDAP was held in a singleton object and creating it locally made it available in the back end. When this behavior was changed, it was not reflected in ipa-cacert-manage and ipa-otptoken-import. Consequently, ipa-cacert-manage and ipa-otptoken-import were unusable because they crashed on every run. This bug has been fixed by connecting to LDAP in back end.Scientific LinuxScientific Linux 7ipa-server-trust-ad-4.2.0-15.sl7.x86_64.rpm17fc516159fa940915f3e01ac08adb12ded2e00a8260cb7d8fc544bdede5e393ipa-server-dns-4.2.0-15.sl7.x86_64.rpmbc22af78461615452121623e7d76ff1f7e42f5f20b393be6174f5bb9a5bda293ipa-admintools-4.2.0-15.sl7_2.6.1.x86_64.rpm9b91e706fa4eb5e1fc21dcad7f792daef9ee1e560ea41aeea17e1d6c253df2b6ipa-python-4.2.0-15.sl7.x86_64.rpmbd62d9c98d361b664eb372997852d7aa1252a507ca6e7820085d0eec8b1c41d8ipa-admintools-4.2.0-15.sl7.x86_64.rpm03053cd954cb9ccd7cb01921997a509d7a99f6e3a2e7a6f71752f033cbbde97aipa-server-4.2.0-15.sl7_2.6.1.x86_64.rpm8bcf6bb23e517900fd67b8d4f4c4ce8f40762f5c4ba07509d7758b027dcb8cbeipa-server-trust-ad-4.2.0-15.sl7_2.6.1.x86_64.rpm55d8b2f15d903334dcb7171cdf9069c160ff69b264b86ec9b829410245e6990bipa-client-4.2.0-15.sl7.x86_64.rpmf2a559c53504dd48e157757fd1bfcdb23e8992fb1388bcbe40fbd171b0354252ipa-client-4.2.0-15.sl7_2.6.1.x86_64.rpm04ce7137a605259f52a70d3ae536d6ca2fe5885f89ab5e24c46f88e7036f14ceipa-python-4.2.0-15.sl7_2.6.1.x86_64.rpm58b430305d0448f10b4ba70b8100c3066ec96e5d6740e8d8771d285ea8e61b22ipa-server-dns-4.2.0-15.sl7_2.6.1.x86_64.rpma5eac104dcd5f98f2225f3907ed4cdd8f723d02ce61560168305f02cecc6a1b4ipa-server-4.2.0-15.sl7.x86_64.rpm81fa7b82737516342bc750f76a00ca0a324d828977e1ced0e0e8ce82d95bf68cSLBA-2016:1445-1Lvm2 Bug Fix And Enhancement UpdateThe lvm2 packages include complete support for handling read and write operations on physical volumes, creating volume groups from one or more physical volumes, and creating one or more logical volumes in volume groups.Scientific LinuxScientific Linux 7lvm2-sysvinit-2.02.166-1.el7.x86_64.rpm4268b9272122692241fd89bc82dc5ed6e63f4cd8a7914d60bf6befe5c388caa4lvm2-devel-2.02.166-1.el7.i686.rpma1b2175114420f84514ae472a8f8c191965d4d33a24b14c92a0eb3b552dbffb9lvm2-devel-2.02.166-1.el7.x86_64.rpmed024e1d927d2099c5fb5b7061c220d732e072a06d702a0a8bfe3c79d49f0443lvm2-cluster-standalone-2.02.166-1.el7.x86_64.rpmf650f9ab1bdcd3f3b5ebef9833b8c54c161fd391fcddb84ff6f15d7595150c40cmirror-2.02.166-1.el7.x86_64.rpm286e4d937bb05c1a00945bb1f641183f3963bf4b4ccb87223b2a8a9f0993fbeedevice-mapper-event-libs-1.02.135-1.el7.i686.rpmba743605721b028e8a854de2c23242d90ab25965b06b54903875708bce605fa7lvm2-libs-2.02.166-1.el7.x86_64.rpmd3c0787bbc028c7be6a5be337ce3967c5a438e20506dca7088618e58114592ccdevice-mapper-event-devel-1.02.135-1.el7.i686.rpm2aa657a82b46359972ed5d7a43860797f8d0e062f5d4f943872a60b9c86651calvm2-2.02.166-1.el7.x86_64.rpm37097e8160c030c848e0ea96e4af4b5af70c7a07fe59ee87763124004ead4e75device-mapper-devel-1.02.135-1.el7.i686.rpm94191588c126142c9d0485111e2e241ea96f1ce40013a7c146d0a7e0568fd178device-mapper-libs-1.02.135-1.el7.x86_64.rpme23c906e0863239e5bda8aae93cd9083402c3bed1b91b55505104332c183bc98device-mapper-libs-1.02.135-1.el7.i686.rpmf6a9e311fdc6fa05af74b7e70549eb5cbe1965ce07a452e4b33e55955beea507device-mapper-event-libs-1.02.135-1.el7.x86_64.rpm6b8300f6120b6a9ca9c7b4a804397446ae200d1b76be3f73c51e76048d433e60device-mapper-devel-1.02.135-1.el7.x86_64.rpm2ba694dc96722cea7284d9cda8b92f556bf57eb273c123c6fbc83439973dab00device-mapper-1.02.135-1.el7.x86_64.rpmefbb5c4a7ee3c33cebc638286ac8cd49c497d48f710c5e9fb400750123f95ed8lvm2-libs-2.02.166-1.el7.i686.rpmead35ebf86a084899b9573b3437d23a306711c88e43cb8f489fedb54ce4ae442lvm2-cluster-2.02.166-1.el7.x86_64.rpmf16a041c6b18cb51b25586a2dc41bf810644242fa42ecfb4970c59cdf48ed6eddevice-mapper-event-devel-1.02.135-1.el7.x86_64.rpm44284cfa81aad9f942c439166873c248867f0da828110d544087445766bc4ae0cmirror-standalone-2.02.166-1.el7.x86_64.rpm2c880f0500e1d10e5eff19c0c9900ca658952a4dc0737c997a0a0431d5e25ed7lvm2-lockd-2.02.166-1.el7.x86_64.rpmf1c33ee1848e3b78a63ceb3495ab84f49e86d91479bfa72fee55508c53385de4lvm2-python-libs-2.02.166-1.el7.x86_64.rpm819e3df546cb8d19baaba5beb2df05dc898873ba328d7303922d7b3f26fb0d5cdevice-mapper-event-1.02.135-1.el7.x86_64.rpmac0d9fe99c79fb768728ffa2d6659b5afcf33b883be9712ef0219bbb1ec24e8eSLBA-2016:1526-1Ipa And Mod_Auth_Gssapi Bug Fix UpdateThe mod_auth_gssapi module is a Generic Security Services API (GSSAPI) authentication module for Apache. It implements an HTTP authentication protocol based on the Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO). This update fixes the following bug in both the ipa and mod_auth_gssapi packages: * Previously, in case of multiple concurrent remote procedure call (RPC) requests of the same principal, a race condition occurred on the IdM server. After the first request finished, it deleted the credential cache (ccache) for the principal. Then, if the second request tried to use the ccache, the attempt failed. For example, this problem could cause two concurrent ipa-client-install operations to fail. With this update, unique ccache names are now used on the server instead of ccache names derived from the principal name. As a result, only one ccache exists for each request, which avoids the described conflicts in ccache names and ensures that multiple concurrent RPC requests on the same principal work as expected.Scientific LinuxScientific Linux 7mod_auth_gssapi-1.3.1-3.el7_2.x86_64.rpmb3e9d39f320e2c09dc8475b6cb2f6eab03999e982fb75211b705e54d7d34933eSLBA-2016:1528-1Sssd Bug Fix UpdateThis update fixes the following bugs: * Previously, the System Security Services Daemon (SSSD) was not closing the socket to the LDAP server in case the LDAP connection request was terminated. In consequence, if SSSD was trying to connect to a remote domain controller (DC) during a service discovery, the LDAP connection code was terminated which led to exhausting system resources. A patch has been applied to the SSSD LDAP connection code to close the socket unconditionally. As a result, the LDAP connection code no longer leaks a socket if the connection request is terminated and works like expected. * When resolving security identifiers (SID), the System Security Services Daemon's (SSSD) libwbclient library returned an error if a single SID could not be translated. As a consequence, the access to Samba shares was denied for the user. A patch has been applied and only permissions that are related to the unresolvable SID are not applied. As a result the user can access Samba shares although some SIDs are not resolvable. * Previously, the ldap_group_external_member parameter had no default value set. As a consequence, the System Security Services Daemon (SSSD) failed to resolve external members of IdM groups during getgr* requests. A patch has been applied to set a default value for the ldap_group_external_member parameter. As a result, resolving external members of IdM groups works in the described scenario.Scientific LinuxScientific Linux 7libsss_simpleifp-devel-1.13.0-40.el7_2.12.x86_64.rpm1a1d1c2b2a680a01c5725b066fa2bc823638d29978eeac037cdc04e24645f99clibsss_nss_idmap-devel-1.13.0-40.el7_2.12.x86_64.rpm483728fd47e392c43db7b45d8f47e3e365e1b5bd20fdbc24098240fd282dbf08libsss_nss_idmap-1.13.0-40.el7_2.12.x86_64.rpmd47bd8688bc0c2f6295a28ee707c5b162fc882a2e0d2630d8ec098c795a26ca1python-sss-murmur-1.13.0-40.el7_2.12.x86_64.rpmddc9711e98fb9ed69e05c6dd2d8e8e1bde23e583b4e347851f41514cdfaa7eaclibsss_nss_idmap-1.13.0-40.el7_2.12.i686.rpm936908881af7fdb64d5864fee7bc10cabba83d5acad10550625ba3bd11342335sssd-ldap-1.13.0-40.el7_2.12.x86_64.rpm85f0c7d171725212068958284217f6d64d326fd711d1ab65bc17c2e458e10884sssd-libwbclient-1.13.0-40.el7_2.12.i686.rpm8718fad490bcebaf77b41a14ddbad3aa37b9ce3c29ad98083d93702476f61971python-libsss_nss_idmap-1.13.0-40.el7_2.12.x86_64.rpmccbebb6abe21efa04649e202724ecd2d1e03227b76c2b8eaef7e254686e423f0python-sssdconfig-1.13.0-40.el7_2.12.noarch.rpm4a3e354fcea58478d4b3c5138aa305a84b77583454c86b984223dedea43dd8d5libsss_nss_idmap-devel-1.13.0-40.el7_2.12.i686.rpm036a8d4a37031c27f298da621bab854b90a516e9f41032070e6063a551a6fe37sssd-proxy-1.13.0-40.el7_2.12.x86_64.rpmbbdb9fbdd8f4bc6ac68f38f1beaa8c5fc1581a877a07e9a9f603663433e7204dsssd-dbus-1.13.0-40.el7_2.12.x86_64.rpm070c7506eca6f59c6e642438a47487c7211f6a80d59ec258263f066a441c7851libipa_hbac-devel-1.13.0-40.el7_2.12.i686.rpmea6d7e4ad627d9421f5186d2301cfe157b7a892b2bf4eab3971ccad6732d069csssd-ad-1.13.0-40.el7_2.12.x86_64.rpme2083c35248a4005ce5c3ec2b1e29678ea3e1ef44c886e3c4255c2a72a4048bdlibsss_simpleifp-1.13.0-40.el7_2.12.i686.rpm26a64b0debf1d3db15f437ce4257a9484dc795d159d45350c774c5693fc6d5bcsssd-libwbclient-devel-1.13.0-40.el7_2.12.i686.rpma9185c690d444d8e74fc210b09e2eaec98c7ff2ec7a5c446380e767d47d1b898sssd-libwbclient-devel-1.13.0-40.el7_2.12.x86_64.rpm5cb7ca01630a0854fcbaa3357a7b0918b4ef715c636ff0c047e346d42636dbe8libsss_idmap-1.13.0-40.el7_2.12.i686.rpm010fc8c008b4bc8e1e5894769cacf10be2d5ae103ce072ee028ff2e37b06516apython-libipa_hbac-1.13.0-40.el7_2.12.x86_64.rpmf3d2e1fc775283e4bede2dd2bcc3c33c571696e5d08c102b0dd5abb6eee5129dsssd-client-1.13.0-40.el7_2.12.x86_64.rpmc75e6bdbb37abc86bd64fef845d9de2c8dce47dc0bcd60c1be735a9a6544fd56sssd-libwbclient-1.13.0-40.el7_2.12.x86_64.rpm52f31961fd386d9c03fb7e36f3d76729e98b9b1e6d02d93e1b1d0ee59df6217asssd-common-pac-1.13.0-40.el7_2.12.x86_64.rpm3a2661b90b3b89ccea276b6dcd650572bdf49973cf8c97bb806b907c0acd33e0libsss_idmap-devel-1.13.0-40.el7_2.12.x86_64.rpm7348520215a96314cb340a93e2d93dd642cbea55c540b17e6327259e7d6815e3sssd-krb5-common-1.13.0-40.el7_2.12.x86_64.rpm0d1f955d01fd7c90515221b8fc1d19d81d2fbaea031503846b0a22c851c46aealibipa_hbac-1.13.0-40.el7_2.12.i686.rpm014728ffd116a09d08e3a684ddb5367a45ac20d6872e71a22cddb440a5618727libipa_hbac-1.13.0-40.el7_2.12.x86_64.rpm9daf9f6b6e225f9b704ec58f43c159e1f1b05e1672cfec05189a576d11ba7be6sssd-1.13.0-40.el7_2.12.x86_64.rpm7f8e7b2931f0e85305e89fd66a8cb95e841875626ee1e940e4d80a1f10bada4fsssd-krb5-1.13.0-40.el7_2.12.x86_64.rpmbe6943317abefe0dcadf58c70843ede0733489bfba905a13e5086ceda52e6671sssd-common-1.13.0-40.el7_2.12.i686.rpmda91403b306cbb299520c7d47d6b27aed713699dab3cc0c3dcb22c8bf1d4a03asssd-common-1.13.0-40.el7_2.12.x86_64.rpm973154a8b01991b9d5c5d62cfdb3204b6e49d703bdf54e973649195a511a4a53libsss_simpleifp-devel-1.13.0-40.el7_2.12.i686.rpm5eb67922f3220aa23bada8c1aef0138f459e67b7e2e9b7c06ed59766bc1da6a8sssd-tools-1.13.0-40.el7_2.12.x86_64.rpm33265c555b09420f4861c41b03ab1568945e2c61aa17c4dd83c762a4ea861fbalibsss_idmap-1.13.0-40.el7_2.12.x86_64.rpmdf54f1fabe2afd961122c5be3384c49eab37198074ff5fc135ef61fe2965cf94python-sss-1.13.0-40.el7_2.12.x86_64.rpmc9b7ca98c4876ba6988ddca600a56c6af19a3c140adb6a98bd1267b24baab002libipa_hbac-devel-1.13.0-40.el7_2.12.x86_64.rpm3cfb7aee91051ca945d2e210ab63ae44fbedaa9d34067fbc066e9d6090c42651libsss_simpleifp-1.13.0-40.el7_2.12.x86_64.rpmd025dc219dac4fa013e7979904ab8e1b670c43192784ad511f5216b5fe6f71e6sssd-ipa-1.13.0-40.el7_2.12.x86_64.rpm0a8de1417efd066722aa18c850e48283c422867def8ecbed61e68185a229c166libsss_idmap-devel-1.13.0-40.el7_2.12.i686.rpm50943788c19b5be75edbb5774792dda13648f52da32bd6faed5f112df72fb103sssd-client-1.13.0-40.el7_2.12.i686.rpm21adf9eaa870078af128e3f9bba12325e5561bf4b2dfc47b862fef4647ac51basssd-krb5-common-1.13.0-40.el7_2.12.i686.rpm7a84f2c032e6561b54660dca50672111620212d7262a4d7dae781349989713f7SLBA-2016:1540-1Slapi-Nis Bug Fix UpdateThis update fixes the following bug: * A previously updated version of slapi-nis introduced incompatibility of the slapi-nis external group-membership with the System Security Services Daemons (SSSD) default_domain_suffix option. As a consequence, the IPA compat-tree got inaccessible because external members of IPA groups could not be resolved during the initialization, and slapi-nis fails to start. A patch has been applied to fix the schema compatibility plug-in to work with SSSD, and slapi-nis is now compatible with the SSSD default_domain_suffix parameter.Scientific LinuxScientific Linux 7slapi-nis-0.54-11.el7_2.x86_64.rpm6b9c8bdf02e7cb95e8547d15734a3cafac9625a265edaf74762c306ce545c42bSLBA-2016:2096-1Tzdata Bug Fix UpdateThis update fixes the following bug: * This update fixes the daylight saving time (DST) date for Palestine. The correct date and time is October 29, 2016 at 01:00.Scientific LinuxScientific Linux 7tzdata-2016h-1.el7.noarch.rpm8e5ef617706782cf67d7e67c4a4b1857b031e178cc155e8c8b9a87ff1e177b4ftzdata-java-2016h-1.el7.noarch.rpma96fc02a93e9d35cb03ff8aa613fc56b0d41d02ad671a61f9e7927a81a4da6d3SLBA-2016:2168-1Python-Blivet Bug Fix And Enhancement UpdateThe python-blivet package contains Blivet, a Python module for examining and modifying storage configuration.Scientific LinuxScientific Linux 7python-blivet-0.61.15.59-1.el7.noarch.rpm662c3400d9f3642f93cf501a7993d6a044c6ff43e8a9a03ca1c27adfb1424f69SLBA-2016:2171-1Kmod Bug Fix And Enhancement UpdateThe kmod packages provide various programs needed for automatic loading and unloading of modules under 2.6, 3.x, and later kernels, as well as other module management programs.Scientific LinuxScientific Linux 7kmod-20-9.el7.x86_64.rpma76ee39e2b5a1be5123d2e5223c117120cc811007d297476c93f8cba3f901b41SLBA-2016:2184-1Pykickstart Bug Fix UpdateThe pykickstart package contains a Python library for manipulating kickstart files.Scientific LinuxScientific Linux 7pykickstart-1.99.66.10-1.el7.noarch.rpm883ae68358dd47889f277b8e436e2af387ea193260c7018a1a66fe100d3ba9e2SLBA-2016:2187-1Yum-Utils Bug Fix And Enhancement UpdateThe yum-utils packages provide a collection of utilities and examples for the yum package manager to make yum easier and more powerful to use.Scientific LinuxScientific Linux 7yum-plugin-upgrade-helper-1.1.31-40.el7.noarch.rpm768514f6657884e60f979417ffa26ad5eecb78e81b7a288ae1c3a81860fca756yum-plugin-priorities-1.1.31-40.el7.noarch.rpmbad6140dd0a37083cc055d23ed76378cc6d41e783c870fb90f967c802791f13ayum-plugin-show-leaves-1.1.31-40.el7.noarch.rpmc3a623daa4fb5b8eec7a211a244953b5490effd3db857fe628a82377152f6743yum-plugin-auto-update-debug-info-1.1.31-40.el7.noarch.rpmc5248be3456c4336d202606e39a3c9f9c15c7e240b73cff830b71d81e4ad17f3yum-plugin-post-transaction-actions-1.1.31-40.el7.noarch.rpmbb746bd6f66ede1873cb31f1540c70f218f5ad60c2400c2e2075824396efbcf9yum-plugin-fastestmirror-1.1.31-40.el7.noarch.rpm750bfc3741fedeb4df9c145bcc22a97b86d385d14d5af93070d376645461554byum-utils-1.1.31-40.el7.noarch.rpm06f4a6950e1323a4316b93bc7b890c3bb4b0468fa5fa9bcda0ae3be943a19195yum-plugin-tsflags-1.1.31-40.el7.noarch.rpme4c0f01e329cc273a3569ed30aae8b449cefdd66d666e3fb878a6b6222dbe99eyum-plugin-tmprepo-1.1.31-40.el7.noarch.rpm51a069b863c6ca8a2a9b761bbb51d7c252532deb71610b5070e5040ae8f6f7ccyum-plugin-verify-1.1.31-40.el7.noarch.rpm0548c39d491dd4e1491a199b7b025f19f1260dd9ff992c263f6c9055a59b255eyum-plugin-changelog-1.1.31-40.el7.noarch.rpm2f9d1845e847f746ccb2a0851b8cc704620e9d7d8a22c37b3df0f92facf18f91yum-plugin-versionlock-1.1.31-40.el7.noarch.rpm2bc03eb5356c6494920f91c487b7efb01213e84f1589c00d3b54b4bbba82acfcyum-plugin-merge-conf-1.1.31-40.el7.noarch.rpmd50bc2d8b3758915405835ba6b8739eff90fcad27c1ce7001dd694109f5c3618yum-plugin-ovl-1.1.31-40.el7.noarch.rpm938474c265acbbb4114f982baa3a12c8534c00d879fb91361a02488a85c61b1cyum-plugin-list-data-1.1.31-40.el7.noarch.rpmde5cb0fe91d30bc60ff380f880c528fba26a0b38d9d6d7fde797a816bf66d2cbyum-plugin-rpm-warm-cache-1.1.31-40.el7.noarch.rpm98a0c4d590cd06a5cb0a64d9f4a8ee3fffabb281e302dce3b84c72dd49df11b2yum-plugin-local-1.1.31-40.el7.noarch.rpm8cd6ac1f5290121ab86a70257fc4992ee3f8c5e8b1ff748116c46da33451815dyum-NetworkManager-dispatcher-1.1.31-40.el7.noarch.rpma99f1c41b18338daff7446b055c821b6cbeac29988deb39fd61d1b075199e962yum-plugin-protectbase-1.1.31-40.el7.noarch.rpm40761c8f8ba1f8bf9582a46750249fc470063939f4878f5bf3449dc2d9430044yum-updateonboot-1.1.31-40.el7.noarch.rpme9333c8123671d0dcb7fc4a0b20db28b7f233b650df3c069baba0aa47f122ae8yum-plugin-remove-with-leaves-1.1.31-40.el7.noarch.rpm87cf5d8b3f716717a2bc62c65375a921773eb625111b6e2ca757f09fa1706d96yum-plugin-filter-data-1.1.31-40.el7.noarch.rpme55b23b22c4a23c669edbc07292ad4646f3daf66c3a9539d56ca588551dcc22eyum-plugin-fs-snapshot-1.1.31-40.el7.noarch.rpm1c497a7b0ccfcfa907cd8c143bed19d86af73a8c6f52059639bb48dd72dcc60dyum-plugin-keys-1.1.31-40.el7.noarch.rpm3c2784298420f6d9cc39d18663c3b7097c68b77b8e13431263ad5c7bdccabb2fyum-plugin-aliases-1.1.31-40.el7.noarch.rpma5d17620f6f44dd36c9a75309e55a48fbac5d1e69e4d4f250434e4aae0dbf12dyum-plugin-ps-1.1.31-40.el7.noarch.rpm9e22027a04032e21020c456afce3b6997baee11133be2e0cb6e6d5a82d01ec23SLBA-2016:2206-1Evolution-Data-Server Bug Fix UpdateThe evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.Scientific LinuxScientific Linux 7openchange-devel-2.3-2.el7.i686.rpm56c174de147b1d3793da6c36dbae5d3d6888976415ac6fcb261ba8d9cf03fd47evolution-data-server-3.12.11-37.el7.i686.rpmb243ccec27c0ccca61cee2ef601e095ce059ff7bb367f6485889898db6be2661evolution-data-server-devel-3.12.11-37.el7.i686.rpm39f057203a09fd056fd9607d21a6fe533107550d798b0e43e96a048c567a4d2fevolution-mapi-devel-3.12.10-5.el7.i686.rpm46da3bbb89ae7c0b3c2c10e1450ad512f9f697702c008a894660a07b82127050evolution-mapi-3.12.10-5.el7.x86_64.rpm0d0b31ea4e22d8af5f0c714c07f11b31894cb041a31f3d8e617ca201106f13b0evolution-mapi-devel-3.12.10-5.el7.x86_64.rpm0e1cb07ce1be9af4607cb0a1a014f2aee363a76ec3943cacfcbe696272e5f512openchange-devel-2.3-2.el7.x86_64.rpm8d838b182affceffef18f2965419db90d844b93476c57f104dba878e46bcfdb4evolution-data-server-3.12.11-37.el7.x86_64.rpm492ccfda38515b4ab5ff168ae243dd04a9d2eec3749db4d18b61361aee03c5d0evolution-mapi-3.12.10-5.el7.i686.rpm5751d680a00df94c5666842d4701ab8c2e9915ede53f1abb16a27785ef230382evolution-ews-3.12.11-9.el7.i686.rpm739089c1d78b1e5c6d15ded5e9c33eac334e56057758b7f87cbdf8f2cb0d4da3openchange-client-2.3-2.el7.x86_64.rpmd51a8fadd4ca693c8501b2604f98cf0642a063f43dd79a0c1cce5209be9bdd97openchange-devel-docs-2.3-2.el7.noarch.rpm983b4c535d0b2e29d989a98727bd419e0492b461d9d4880dc2827ca4c914bcd3evolution-data-server-doc-3.12.11-37.el7.noarch.rpm8348351783c6b7a83fbd0a57e511b325b9b740d346fc38d58462c6e798c56ff9openchange-2.3-2.el7.x86_64.rpm84bbb9e073ff058a1551b7e16c34c20165ba03b9ca1b8fc38c14a85c44031ad9evolution-data-server-devel-3.12.11-37.el7.x86_64.rpmf2a2ec99f5d7c4a66adecf487f1261b4596181ce369d0de2bea382885816f2f0openchange-2.3-2.el7.i686.rpm0adac047ff9056fd8fa98113a609b598012422d0ff089421bf6f71b58ffa1416evolution-ews-3.12.11-9.el7.x86_64.rpm4eac3adc16ab7643e301b971351e3457ff3ba32349ea8eaac2bacc382dedc674SLBA-2016:2211-1Device-Mapper-Persistent-Data Bug Fix UpdateThe device-mapper-persistent-data packages provide device-mapper thin provisioning utilities.Scientific LinuxScientific Linux 7device-mapper-persistent-data-0.6.3-1.el7.x86_64.rpmb28015b74b34b8feacfdef675fc1692ef08c6abeee2c70c26872cba229c6a898SLBA-2016:2228-1Evolution Bug Fix And Enhancement UpdateEvolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.Scientific LinuxScientific Linux 7evolution-3.12.11-22.el7.i686.rpmc2a6a4ab0e6ebe02615b0dd6b5b5f26daee952a280f0ad138e65d4adf3f7033eevolution-perl-3.12.11-22.el7.x86_64.rpmcf214fe4d7873b1e46de05102325120ced7942a05058448559fe9ba12333d719evolution-3.12.11-22.el7.x86_64.rpm69d4e3f35c08280caac4526dc769f52687ccc115734ac2999d7c3879f65238c6evolution-devel-docs-3.12.11-22.el7.noarch.rpm0497f24146ce7257e5fe47e6063486c752a1377e178dd251d18e13d7c61a5c96evolution-help-3.12.11-22.el7.noarch.rpm54fa167579725ff27c1547a0f0d4ffd1d0f2b045a1649b086278f1f679259198evolution-spamassassin-3.12.11-22.el7.x86_64.rpm0db7ba1164990aeb1b0b855404435f00856f9f518944d12d98a43b66738a9dd3evolution-devel-3.12.11-22.el7.i686.rpmba832f399ef47f8a8ba348f1d2b5d36224533f91ccc7604cbbc56fa2f9f0987fevolution-pst-3.12.11-22.el7.x86_64.rpm52df1a8cb221b7b60e17b8d65235eb6ad84769a69217984b160593e663e99b8devolution-devel-3.12.11-22.el7.x86_64.rpme5d9b5f2a5794748c83b86cd17711cbf8d6ada0d78d3ebfcde555f45726c1ed1evolution-bogofilter-3.12.11-22.el7.x86_64.rpm4c01641e17590e8b975222c01b69b2bef21e22b5a5c4df53572e07702b86a81aSLBA-2016:2236-1Kde-Workspace Bug Fix And Enhancement UpdateThe kde-workspace packages consist of components providing the KDE graphical desktop environment.Scientific LinuxScientific Linux 7oxygen-gtk3-1.1.4-5.el7.x86_64.rpm5fda8f59fbfe720f56cc500a86d605d6bcdb44ec40b45bb2f705a0176bfaedf1SLBA-2016:2254-1Nfs4-Acl-Tools Bug Fix UpdateThe nfs4-acl-tools packages provide utilities for managing NFSv4 Access Control Lists (ACLs) on files and directories mounted on ACL-enabled NFSv4 file systems.Scientific LinuxScientific Linux 7nfs4-acl-tools-0.3.3-15.el7.x86_64.rpm873ab34748f50532e49e474fe57593773bf9af10cb3506a0997e0286be69031aSLBA-2016:2257-1Glib2 Bug Fix And Enhancement UpdateGLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.Scientific LinuxScientific Linux 7glib2-devel-2.46.2-4.el7.i686.rpme80b740d698ef6db13548556c4b44b4b326709be63f65daf4bad8e372a70a15dglib2-2.46.2-4.el7.x86_64.rpmf045b9c592e766043ca89027216df0d2620a997da7ec5c3b2dfced3bde39d62eglib2-devel-2.46.2-4.el7.x86_64.rpm926e8081976210b6eec6abcf1ff597aba9548a18368e9b3a7ab11353ae30f474glib2-doc-2.46.2-4.el7.noarch.rpmb19563fe5c8a32ffd36cdbb19ab67d92a73c30021a270a77958ada2a1c86588dglib2-2.46.2-4.el7.i686.rpm1a09e04824ebcb1c731ca13bc9f4db259f817d282e7507edfb2dfdb31d135b76glib2-fam-2.46.2-4.el7.x86_64.rpmc47328893426b289970036cea24e954ceb8199f478ae96f897be07b08f2ef7c5SLBA-2016:2267-1New Packages: Python-NetifacesThe python-netifaces Python module makes it possible to read information about the system network interfaces from the operating system. This update adds the python-netifaces packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python-netifaces-0.10.4-3.el7.x86_64.rpm5ba9903f3c179df166941e5da4a148338397425eb28a96d43c941c3fd91df257SLBA-2016:2276-1Libselinux Bug Fix And Enhancement UpdateThe libselinux packages contain the core library of an SELinux system. The libselinux library provides an API for SELinux applications to get and set process and file security contexts, and to obtain security policy decisions. It is required for any applications that use the SELinux API, and is used by all applications that are SELinux-aware.Scientific LinuxScientific Linux 7libselinux-ruby-2.5-6.el7.x86_64.rpm2c68f79c1319e83490d1ba5aa82c7470b885e01ef421dc70bfe3d94392dc5052libselinux-devel-2.5-6.el7.x86_64.rpm83f2c461c8366e5a0f0850625231da4aaed1bb07b307092b0d19c0d909473927libselinux-2.5-6.el7.x86_64.rpmec512c3d9b7e69d6d749c4446c4296acba5a7bed641b58e4e55c95d8b08b3161libselinux-static-2.5-6.el7.x86_64.rpm5e7b1e83980cc9fa1bf4248ce6e4064357b936f4138ddc08891670cb5c80eb21libselinux-static-2.5-6.el7.i686.rpm4eb73c009497588dd91599268aa23179c95e46b77945cf44a334deeace289810libselinux-utils-2.5-6.el7.x86_64.rpm367c14c9bfe4bd64445329a10237e1793dba9af297c5bebf809513e7f013e77dlibselinux-devel-2.5-6.el7.i686.rpm5e4a2888ea2d17ab911413ca6f9ea8db2a35892c5aa5ffd54c37439de1171015libselinux-2.5-6.el7.i686.rpm47387838549832b5da61db2c93f7efab391aa2fee03264e200566b7ac82b8efblibselinux-python-2.5-6.el7.x86_64.rpm2b1ed48d28ec8ada63f23a2b62583bcfa264a39e1144ce40d0009a526fe083f5SLBA-2016:2285-1Svrcore Bug Fix UpdateThe svrcore packages contain an API library which provides various methods of handling and managing secure Personal Identification Number (PIN) storage. The svrcore library uses the Mozilla NSS cryptographic library. An example of an application which would use svrcore is one that must be restarted without user intervention, but which requires a PIN to unlock a private key and other cryptographic objects.Scientific LinuxtrueScientific Linux 7svrcore-4.1.2-1.el7.i686.rpme4cddad43852e19d722e03251c2689333d993a59cd94cdd82ccf203482a1f63dsvrcore-4.1.2-1.el7.x86_64.rpm262ce0bdb496159c53295ebfec7f00d5d68bb9aa838e5146905353115ce5ae87svrcore-devel-4.1.2-1.el7.x86_64.rpm7de55e2e77ce811c9024ceb3cf31232471aa5004ab2d7739dc76c160c89bb644svrcore-devel-4.1.2-1.el7.i686.rpm3e329f29a0633de53c9e38d12b58fd0e2c4b7d1db9d060332034dbc630aefab9SLBA-2016:2290-1New Packages: Python-IpaddressThe python-ipaddress packages include the functions and classes for handling various tasks related to IP addresses, including checking whether or not two hosts are on the same subnet, iterating over all hosts in a particular subnet, checking whether or not a string represents a valid IP address or network definition, and so on. This update adds the python-ipaddress packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python-ipaddress-1.0.16-2.el7.noarch.rpme1bf5aec44bf5f70d5ccd40504491a04ad7883324cdac2e296977a826c2c6e6fSLBA-2016:2331-1Initial-Setup Bug Fix UpdateThe initial-setup utility runs after installation. It guides the user through a series of steps that allows for easier configuration of the machine.Scientific LinuxScientific Linux 7yum-conf-sl7x-7.1-5.sl7.noarch.rpm95bd9cb414bd4cf325dcb318430e90dbfad32bca90c2546435a5ab0693bb04e4sl-release-7.1-5.sl7.x86_64.rpm50c2da8cbf373e0e44449397def24ad3618675fe6b703d04b1a458bc13fde902initial-setup-gui-0.3.9.36-1.el7.x86_64.rpmf48113ba012a09006e7008db222be6c92ffbd86e28231c887a628bebf2a14924initial-setup-0.3.9.36-1.el7.x86_64.rpmba52b417f9824868d2eb573938e8c00207acae3578762fb36ca0d042b6147fdcSLBA-2016:2356-1Sanlock Bug Fix And Enhancement UpdateThe sanlock packages provide a shared storage lock manager. Hosts with shared access to a block device or a file can use sanlock to synchronize their activities. VDSM and libvirt use sanlock to synchronize access to shared devices or files.Scientific LinuxScientific Linux 7sanlock-python-3.4.0-1.el7.x86_64.rpm66d1496f9f857fc1cefeefc0342b9fa8836c07d8e7a7fc3151e2c0d6896d2a88sanlock-3.4.0-1.el7.x86_64.rpm44f5ff7a64ff251d97b821dbfc672fa29c73b69cb9c3966392e3ec4cf3c5cd78fence-sanlock-3.4.0-1.el7.x86_64.rpm211f5f9904a76c43622429a7683f157367b8fa6230e07b6194f5a6ab5c03eddasanlock-devel-3.4.0-1.el7.x86_64.rpme092a782e223b50cd176635a499e9478c9e0594bedbe55cead0d7f46608b4375sanlock-lib-3.4.0-1.el7.x86_64.rpm534de73e1e1c9df591297a3200bea7adcfc1625f5da8c7ee231bc3af5586df9aSLBA-2016:2374-1Anaconda-User-Help Bug Fix UpdateThe anaconda-user-help package provides content for the Anaconda built-in help system.Scientific LinuxScientific Linux 7anaconda-user-help-7.3.2-1.el7.noarch.rpm2dda8476a241d212a520fb5445ddf2a13423c91b295876003af90a1899ca6e23SLBA-2016:2396-1Pki-Core Bug Fix And Enhancement UpdateThe Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.Scientific LinuxScientific Linux 7pki-javadoc-10.3.3-10.el7.noarch.rpm5c07eff93f2b050490390321850b2b6dcadf3b96c6901544bfb19117d3d0dcd8pki-base-java-10.3.3-10.el7.noarch.rpm8cb95cfd53d8e2e2176d65c3a815d2cad447fb27e3e0f2a02aeb6984c9fc09ebpki-ca-10.3.3-10.el7.noarch.rpmbe4917ccde3e39b8be312454af1acaf9d5e08e21bb8d8cd69b0d2aaa8a889db6pki-tools-10.3.3-10.el7.x86_64.rpm1298b1a831d720c28af14c191b3c4c177649191165ab2c56939b26114cd01468pki-base-10.3.3-10.el7.noarch.rpm2eb37c66259d8b1143783cdcc6c742869565bf4990a7688735f67cb0332dcb84pki-symkey-10.3.3-10.el7.x86_64.rpm03acbe9ee068d220247db0ba3adc5bda8e9a9a486945178dc273f2ea55c9d469pki-server-10.3.3-10.el7.noarch.rpm6aee2c92ab30bcdf9a0763634711d05c4e26e60ffaa406b1542172a4cbdc09a2pki-kra-10.3.3-10.el7.noarch.rpm9e282208b50bd1030c5bb4db05a27416f672a518786b410e7aa46ad5ca91e994SLBA-2016:2397-1Yum Bug Fix And Enhancement UpdateYum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary.Scientific LinuxScientific Linux 7yum-3.4.3-150.el7.noarch.rpme7f4e406da798fb9a2a31de451d9de91f3601f913db774270255a0b1e4952d7eyum-cron-3.4.3-150.el7.noarch.rpm14e9c1d8a1a7609166f3ee4e7215e86b92c4e60a9d102a8575b937b724e84184SLBA-2016:2403-1Jss Bug Fix UpdateJava Security Services (JSS) provides an interface between Java Virtual Machine and Network Security Services (NSS). It supports most of the security standards and encryption technologies supported by NSS including communication through SSL/TLS network protocols. JSS is primarily utilized by the Certificate Server as a part of the Identity Management System.Scientific LinuxScientific Linux 7jss-4.2.6-42.el7.x86_64.rpm6f205c923cbc505f5aeeaa8aa8c1f26a64f745a0bdd4fd0488ac9a94fb81cb54jss-javadoc-4.2.6-42.el7.x86_64.rpm45417eec19adda269a27e3a4a9ba3b502c937e0d1c270cf0da338939b7eca9e2SLBA-2016:2404-1Ipa Bug Fix And Enhancement UpdateIPA (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.Scientific LinuxScientific Linux 7mod_auth_gssapi-1.4.0-1.el7.x86_64.rpm73fcd7b22f68c77bab05f1e76a2e796a86ebbed868fe086ca38cd6cdd08508cdSLBA-2016:2426-1Lcms2 Bug Fix UpdateThe lcms2 packages contain LittleCMS, a small-footprint, speed optimized color management engine in open source form.Scientific LinuxScientific Linux 7lcms2-2.6-3.el7.x86_64.rpm340f91668751a594371d563d2df974528fa10371d51a44edb50904cb0822170elcms2-utils-2.6-3.el7.x86_64.rpm6ad63f9ea6522fd59e960e9b47c2cdd1158fd678c49823f93f7a54b691b8043flcms2-devel-2.6-3.el7.x86_64.rpmef98561c4e4f0f8709b2df7fe9e9b674efc1fa21ddec5d98c81902a28aa00b8elcms2-2.6-3.el7.i686.rpm65c5b84e620f64e5d8a1a29948e3c8100d9efe398c46c3ac625f43c9409c83c5lcms2-devel-2.6-3.el7.i686.rpmed31f61d11c4b68f01008cb6aa62b7d99ba9f427f135a79c8ac1ac2b73390e90SLBA-2016:2431-1Xfsprogs Bug Fix And Enhancement UpdateThe xfsprogs packages contain a set of commands to use the XFS file system, including the mkfs.xfs command to construct an XFS system.Scientific LinuxScientific Linux 7xfsprogs-devel-4.5.0-8.el7.x86_64.rpm78784cae9da81ee9d1966d1e862fe6c4b93617f85385fbb0dfb8a2318528164exfsprogs-4.5.0-8.el7.x86_64.rpmc697a97af07d0c8c43b0fece4fb4e72627bddd3de37f9535e08f6129b0cc088cxfsprogs-4.5.0-8.el7.i686.rpm0903578bfb3e7809dc59bbd7858f59ef42d89f43ce8dcd73497fc156a34e9b17xfsprogs-devel-4.5.0-8.el7.i686.rpme90266cbcbb6619375a73854c4190936097ce8b569e6fed09ef41c0df7fceee1SLBA-2016:2443-1Libusbx Bug Fix And Enhancement UpdateThe libusbx packages provide a way for applications to access USB devices. The libusbx package is a fork of the original libusb and is not compatible with the original libusb-0.1 series.Scientific LinuxScientific Linux 7libusbx-1.0.20-1.el7.x86_64.rpm07047c04474b8c67b5e5c1312fb5b09465905c34893c79ca4d3701900ccfad05libusbx-devel-1.0.20-1.el7.i686.rpmd36fa94b14ade674a5acc4921f161c52d2a5aeca56581d3c9d9a9797b15bdd95libusbx-1.0.20-1.el7.i686.rpme169605eb4c23495398dad95a79f74a2c25d3184e0bf97fd0b3b4eeb55dadc5clibusbx-devel-1.0.20-1.el7.x86_64.rpm66cdd40d3f6b742e3d36f0d0d8be6bb330a3d0343a079e3b03170874f3e9ec10libusbx-devel-doc-1.0.20-1.el7.noarch.rpmc97f9ef907610f2e0f1e83aa6df36294f13995261aa4e7ae6430e01425995538SLBA-2016:2446-1Tomcatjss Bug Fix UpdateThe tomcatjss package provides a Java Secure Socket Extension (JSSE) implementation using Java Security Services (JSS) for Tomcat, an open source web server and Java servlet container.Scientific LinuxScientific Linux 7tomcatjss-7.1.2-3.el7.noarch.rpm87991ab37ca20ddb66986fbe825b4215db12a28c1abf9f573650f6f40ac50ecfSLBA-2016:2460-1Lasso Bug Fix UpdateThe lasso packages provide the Lasso library that implements the Liberty Alliance Single Sign-On standards, including the SAML and SAML2 specifications. It allows handling of the whole life-cycle of SAML-based federations and provides bindings for multiple languages.Scientific LinuxScientific Linux 7lasso-python-2.5.1-2.el7.x86_64.rpm08165d4041742affb6daec0c48bccfa2b0fb0c7791bf86394a745e0605ee05a3lasso-2.5.1-2.el7.i686.rpm1f0c44e5a5d7a1799d868e0c6dd3a0d3579ba202a8e348ef0a0a7abcb90f375classo-2.5.1-2.el7.x86_64.rpm22341161e57e0fcb05f6438fc80156681d17aa44ea39f615b729bf9903918c37lasso-devel-2.5.1-2.el7.x86_64.rpmf5f9fb8a31b828b85f4d4d01874780c5c1f471165c81c5bb256067ceea60f429lasso-devel-2.5.1-2.el7.i686.rpm4cfe6dbf6f1dbdc881ed4414200c2fadbe988a6ea945d970d6d22b5cdb02293eSLBA-2016:2467-1Chkconfig Bug Fix And Enhancement UpdateThe chkconfig utility is a basic system utility that updates and queries runlevel information for system services.Scientific LinuxScientific Linux 7ntsysv-1.7.2-1.el7.x86_64.rpme7cc026bfcffce047e89c77ffc4a49b6b8031127c23cd327429d76e0b5f285afchkconfig-1.7.2-1.el7.x86_64.rpm6e3dbeee8490d07db447cb2771df74ebbcf3779a1ccde8b780a572f4c3f8dc65SLBA-2016:2471-1Slapi-Nis Bug Fix And Enhancement UpdateThe slapi-nis packages contain the NIS server plug-in and the Schema Compatibility plug-in for use with the 389 Directory Server.Scientific LinuxScientific Linux 7slapi-nis-0.56.0-4.el7.x86_64.rpm76b32b30b9a4b80c206b3143251c962ca45e7c7fa053c995b67edc65e32dbd8cSLBA-2016:2473-1Libtalloc Bug Fix UpdateThe libtalloc packages provide a library that implements a hierarchical memory allocator with destructors.Scientific LinuxScientific Linux 7libtalloc-2.1.6-1.el7.x86_64.rpm22ffd203b6b035db10fae894462f4047a8e94ea873c7573b073996290497a5cepytalloc-devel-2.1.6-1.el7.i686.rpmba47ba6e3b55287e3950f53b73587a8736feb4bbe008e5648025f0a72ace663fpytalloc-2.1.6-1.el7.x86_64.rpmed65601c587ab383b2f06ad801e762be4d0dc06fc052e119f1fe1e3262dd5dc7libtalloc-devel-2.1.6-1.el7.x86_64.rpm0a3b80c6ee587f640109492e177d403d0a5d2b466acad0a162c08eff38dd69c9pytalloc-devel-2.1.6-1.el7.x86_64.rpm6812c3c9a87be233f11a157b376026e3852a947d7170f393a5a1d6e2dd328a92libtalloc-devel-2.1.6-1.el7.i686.rpmcba99b821abc38e2e91367d8d4e9ead7a02a84a376bc246ad1f99e471e7ece50libtalloc-2.1.6-1.el7.i686.rpmd09093816286c03f89d947969bb3dd82944f68ae1783e69f5b3e8a8160451d93pytalloc-2.1.6-1.el7.i686.rpma7091ad198257f738be99d13fedf60b85e2cc337b74afade03fbe18520cd2451SLBA-2016:2526-1Clufter Bug Fix And Enhancement UpdateThe clufter packages contain a utility for transforming and analyzing cluster configuration formats. Notably, clufter assists with migration from an older stack configuration to a newer one that leverages the Pacemaker cluster resource manager. The packages can be used either as a separate command-line utility or as a Python library.Scientific LinuxScientific Linux 7clufter-lib-general-0.59.5-2.el7.noarch.rpm6f726576aadbbc458121793f7c87cbcf8b8b90042da06e45f9940ebf3ed030b2clufter-cli-0.59.5-2.el7.noarch.rpmae031e693013f40dab4ea8b865974ccdf8a444aa6d74b0ceaf6ecf713f0fb720clufter-lib-pcs-0.59.5-2.el7.noarch.rpma1562567aae71b8b34a8d269713f5b141323df3b5c6fc75611ddb6af8111f1e6python-clufter-0.59.5-2.el7.x86_64.rpm435b8ba77bda6e98589acabc1500f2cdd5959655294a987b1c5016ae5d168ecdclufter-lib-ccs-0.59.5-2.el7.noarch.rpm1eab156eb7f7ad405f6a97eeea72c738fd9d682849e09ed27ec6034cf7b5dc8aSLBA-2016:2536-1Device-Mapper-Multipath Bug Fix And Enhancement UpdateThe device-mapper-multipath packages provide tools that use the device- mapper multipath kernel module to manage multipath devices.Scientific LinuxScientific Linux 7kpartx-0.4.9-99.el7.x86_64.rpmc89d31793e00b0801c57ad10df8ff39a205006629954df96e475b604b2c449bedevice-mapper-multipath-libs-0.4.9-99.el7.i686.rpm4dd49bcd427fca8b606d4155e2ac160f514102348d34d05250bad6d77a81b168device-mapper-multipath-sysvinit-0.4.9-99.el7.x86_64.rpm729da4268371ff27b7561dfa9a4d704ea5ea495898e03416e7b50f7d6d43acabdevice-mapper-multipath-libs-0.4.9-99.el7.x86_64.rpmff77b989aab87f55e5805bdcd0108e58c47a93274cf3e329d019642a7a6e9a12device-mapper-multipath-0.4.9-99.el7.x86_64.rpm62201499e71a3e8a1e2adf704c04c937321af5c4b55aff91fd3f244d95aa0ceeSLBA-2016:2611-1Selinux-Policy Bug Fix UpdateThis update fixes the following bugs: * Previously, when trying to log into a machine with an Identity Management (IdM) account configured with the SELinux user mapping, and simultaneously running System Security Services Daemon (SSSD) under a user without root permissions, the SELinux denial occurred. With this update, the SELinux policy has been changed and the "sssd_selinux_manager_t" domain is now allowed to manage the dictionaries labeled as "default_context_t". * In Scientific Linux 7.3, the SELinux user space uses the different location for some files, compared to the previous versions of Scientific Linux 7. Consequently, Red Hat Virtualization Host (RHVH) or Red Hat Atomic Host (RHAH) had non-responsive status, in some cases. The migrate script to perform the change from the old modules store structure to the new one is now provided. * Previously, the SELinux policy prevented the GlusterFS volumes the GlusterFS volumes configurated for the Remote Direct Memory Access (RDMA) transport from starting. With this update, a patch has been applied that fixes this bug, and the SELinux denial no longer occurs in the described situation. * Prior to this update, SELinux denied access while creating snapshots and clones in Red Hat Gluster Storage (RHGS). The SELinux policy has been updated, and the Access Vector Cache (AVC) denials no longer occur.Scientific LinuxScientific Linux 7selinux-policy-targeted-3.13.1-102.el7_3.4.noarch.rpm6d517e72f8a2e45a54ef48c2f4afedfd8dc5532d777096d001ca15bcafb61f69selinux-policy-mls-3.13.1-102.el7_3.4.noarch.rpmda3d11ba1fe6c3782a3f47944d469cf3ba38bb26dc36a9bbfce17cba3debeec5selinux-policy-minimum-3.13.1-102.el7_3.4.noarch.rpma2524d7382580a0db87f1a1d7a2e103bd166bc7ce53ef819abfa44345cb047eeselinux-policy-3.13.1-102.el7_3.4.noarch.rpm6c00d5b9a4912a262a05dc538cba51a691d3f41381d45f6818e3ea99f93be023selinux-policy-sandbox-3.13.1-102.el7_3.4.noarch.rpm47137e7f158c6b58b91e63a74c0d91e50505fe12d2fd4466d6311999d84efca5selinux-policy-devel-3.13.1-102.el7_3.4.noarch.rpm45ae58356c3d251596dd21579af365a33a79463fee46c361460903dcc692fe3cselinux-policy-doc-3.13.1-102.el7_3.4.noarch.rpmcc7597d6eb44b076afd25ea8a1d97e02a7c2117a95e8f4d28b4919684c1b5cfaSLBA-2016:2612-1Java-1.8.0-Openjdk Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.Scientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-1.8.0.111-2.b15.el7_3.x86_64.rpmb4c2583a6c87912cb75d6e150b67ab4e72201690322ac502cedb96c3bc251486java-1.8.0-openjdk-javadoc-debug-1.8.0.111-2.b15.el7_3.noarch.rpmdf4bfddc55a5fb2ad8eed9bcabb54e30b2e191ad0db8ccb360591c8fbaac1e11java-1.8.0-openjdk-accessibility-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm6f74f187035e690fb9bae1f64d413ce0e67e44cf223ba011f798dd195e1f20e1java-1.8.0-openjdk-demo-1.8.0.111-2.b15.el7_3.x86_64.rpm6ec4e287ece3af56078b1cbefd9ba4bc92caedaeafb74ae0d2c252cfbaa6f439java-1.8.0-openjdk-javadoc-zip-1.8.0.111-2.b15.el7_3.noarch.rpm072c83aeb5f1ee40669bb4ae5bc9ff7ac1c84eee1f042de6260b2f8548ba969ajava-1.8.0-openjdk-src-1.8.0.111-2.b15.el7_3.x86_64.rpma32aa993948cc2c911d5a33a9bd46e53477505014baf6b8109173b982957b7e2java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.x86_64.rpm336a1d084af893c25f596d250456cd17f5c5975c6ab4f863358a16b348d4b90ajava-1.8.0-openjdk-devel-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm3294fc068436d958e81562ee5dd9a1ef06cc9e174292a47680777e9ff0ef5726java-1.8.0-openjdk-src-debug-1.8.0.111-2.b15.el7_3.x86_64.rpmd7ed4c099477284bf39197fff3a55cc3175ea66386a190edb0d9996bb8bace67java-1.8.0-openjdk-demo-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm56ae1a6fdd0603cefed309c49dc7cc11a29635289a57ce80cf02a6f8993f60a9java-1.8.0-openjdk-javadoc-1.8.0.111-2.b15.el7_3.noarch.rpmb371ac8875d5bce00f7ff06cb18afc68f8d9d088dac8e4599d058ad6a0d06623java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.111-2.b15.el7_3.noarch.rpm95907415d17fb0471a3179054d7a043e18c8c025596eb935bb473e8968b2bdbejava-1.8.0-openjdk-headless-debug-1.8.0.111-2.b15.el7_3.x86_64.rpme360ae24c19bdfd8336534faa82c5ab352967df202e32d57b8c3633b9d817283java-1.8.0-openjdk-devel-1.8.0.111-2.b15.el7_3.x86_64.rpm74e0dc24aa9c2d0fae32659f43f8f8fd2058341a4d1b15764c98cb98205208eajava-1.8.0-openjdk-accessibility-1.8.0.111-2.b15.el7_3.x86_64.rpm2215929f70fa929c5b6a39b60b9f401fb0fd1c3eff0133b0ce3bd7f83004801cjava-1.8.0-openjdk-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm3735833018ad460158362388ee04604489c6c01ac6fec14a523128a7d5fc3117SLBA-2016:2660-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated as follows: * A new time zone Asia/Famagusta has been created, which is a UTC+03 year round time zone. As of 2016-10-30, Cyprus split into two time zones. Northern Cyprus is now in the Asia/Famagusta time zone. * The Pacific/Tongatapu time zone will reintroduce Daylight Saving Time (DST) on 2016-11-06. * The Antarctica/Casey time zone has changed from UTC+08 to UTC+11 on 2016-10-22.Scientific LinuxScientific Linux 7tzdata-2016i-1.el7.noarch.rpm2dc733d7995475afc9e73e924a9698ba5910aca9493051dc9858d14f0658ca35tzdata-java-2016i-1.el7.noarch.rpmc2892bb6fef9b809a56a6a9248533bc2fc6125f0cff64407153e4f2c48f7e8cfSLBA-2016:2879-1389-Ds-Base Bug Fix UpdateThis update fixes the following bugs: * Previously, Identity Management closed the replication connection in the following scenario: The supplier has the "389-ds-base 1.2.11" package installed on Scientific Linux 6 and the consumer runs the 1.3.4 version or newer. Additionally, the supplier sends a custom schema to the consumer, that is a subset of the custom schema of the consumer. If all conditions met, the schema replication failed and as a consequence, no data is replicated. To fix the problem, the schema replication failure event has been changed from "FATAL" to "NOT FATAL". As a result, a failed schema replication process no longer interrupts the data replication. * The Directory Server setup script uses the "host" utility to look up host names and IP addresses. As a consequence, on systems that do not have the bind-utils package installed, the setup script fails. To fix the problem, bind-utils has been added as a dependency to the 389-ds-base package. As a result, the Directory Server setup script no longer fails because of a missing dependency. * When FIPS mode is enabled in the network security services (NSS) database, the token name changes. This prevents the server from reverse decoding the replication manager's password. Consequently, replication sessions using SSL or TLS to a replica server fail. This patch prepares Directory Manager to fix the problem. However, the bug in the nss package will be fixed in a future update of NSS. * Previously, when "acctPolicySubentry" was not set in the "specattrname" parameter of the account policy plug-in, incorrect base distinguished name (DN) was used. As a consequence, the "ns-accountstatus.pl" script incorrectly showed the wrong status for accounts inactivated by inactivity. To fix the problem, the script now uses the existing config entry to obtain the inactivity limit if no "acctPolicySubentry" is set. As a result, the script now shows the correct status. * Previously, when the "Trace function calls" option was enabled in the "nsslapd-errorlog-level" parameter, all attributes were logged into the Directory Server's error log file including attributes containing sensitive information. A patch has been applied to filter out values of sensitive attributes. As a result, sensitive information are no longer written to the log files. After installing this update, the 389 server service will be restarted automatically.Scientific LinuxScientific Linux 7389-ds-base-devel-1.3.5.10-12.el7_3.x86_64.rpmc8d38beb035ed518b7ad67b71320095daf8533acc8144f73496d02971c95e59f389-ds-base-libs-1.3.5.10-12.el7_3.x86_64.rpmfbf210dcaa96e328cba63164cca2202ac3db2a93dc6b8f5c0d8186ef85f903ef389-ds-base-1.3.5.10-12.el7_3.x86_64.rpm4f4ac4c395ad95ca5d6b35930eb700e2206daa2a895c36e50e6ba4ea62fac4dc389-ds-base-snmp-1.3.5.10-12.el7_3.x86_64.rpm61875ef538fc2569371a059d900fe2a3572d1b4adcc8d0accb33f68ed42b1328SLBA-2017:0375-1Selinux-Policy Bug Fix UpdateThis update fixes the following bugs: * Previously, the pkcsslotd module was renamed to pkcs. As a consequence, system update from Scientific Linux 7.0 to 7.3 failed. The SELinux policy store migration process has been fixed to skip the pkcsslotd module, and the failure during the system update no longer occurs. * The System Security Services Daemon (SSSD) code was previously updated, and the daemon started using the setpgid() function to set process group ID (PGID). However, an appropriate rule was missing in SELinux. Consequently, SELinux AVC denials for SSSD occurred. The policy rule for setpgid() has been added to the sssd_t context, and SSSD can now set PGID successfully.Scientific LinuxScientific Linux 7selinux-policy-targeted-3.13.1-102.el7_3.15.noarch.rpm02ec7ac39bfaf1d2636c8672a3cb507a4b71aca55dbd5e33ad97da54e3303defselinux-policy-devel-3.13.1-102.el7_3.15.noarch.rpm518258c69d6434def350c404e5fbaa067483f2e572ead72d545e19685ee9f4e6selinux-policy-doc-3.13.1-102.el7_3.15.noarch.rpm248a1829eb7e44aa6faa2af323d8b389ecc5bca9d505900f81ccc80a505a333bselinux-policy-sandbox-3.13.1-102.el7_3.15.noarch.rpmdb71db1a5302bcf2665ca51be1ba03cb75748d4ed26f92bfc6bdab73e8be8e28selinux-policy-minimum-3.13.1-102.el7_3.15.noarch.rpm78331b251c4c2b4a7f2770077a8198f45bc5d6f5358f72b6c41a12f41955d6d1selinux-policy-3.13.1-102.el7_3.15.noarch.rpm7518683af0c75a5e683b993b97260cef1a477c4c5ed28ecbaf40a747aa8cb265selinux-policy-mls-3.13.1-102.el7_3.15.noarch.rpm478d56ab932b8f107d7830660322e2fa87a4ab32b7c2ce373532c8a0d176a60cSLBA-2017:0385-1389-Ds-Base Bug Fix UpdateThis update fixes the following bugs: * Previously, if the suffix of the "userRoot" default back end was not found in the "nsslapd-suffix" attribute, Directory Server scripts used for registering and unregistering back ends lost the suffix information and failed. A patch has been applied and Directory Server now ignores the empty suffix in the mentioned situation. * Previously, if the cos_post_op() function was called while the back-end database was locked, a deadlock occurred when rebuilding the Class of Service (CoS) cache. Directory Server now rebuilds the CoS cache without requiring the internal lock. As a result, the deadlock situation no longer occurs in the described situation. * Due to a bug, the "shadowExpire" attribute was incorrectly set. As a consequence, expired accounts were able to log in. A patch has been provided and Directory Server no longer incorrectly sets the "shadowExpire" attribute. As a result, expired accounts cannot log in. Additionally, this update now only sets the "shadow*" attributes if the password policy is enabled and the corresponding value is configured. * Previously, if a plug-in operation succeeded, but the operation itself failed and was aborted, the replica update vector (RUV) was in an incorrect state. The change state number (CSN) has been redesigned and now uses a primary and secondary CSN. The primary CSN is associated with the main operation. Other internal operations, including the ones called from the plug-ins, use the secondary CSN. Using the CSN class difference, Directory Server no longer generates an inconsistent state in the RUV in the described situation. After installing this update, the 389 server service will be restarted automatically.Scientific LinuxScientific Linux 7389-ds-base-libs-1.3.5.10-18.el7_3.x86_64.rpm340680c9e97c9f44944d452221e97d154fbf29e8e90ab894da04ea89eb16cfe2389-ds-base-devel-1.3.5.10-18.el7_3.x86_64.rpm57b3f38f11c884424d252651b273fc9208fc32ed84618295622bb12b491048a1389-ds-base-1.3.5.10-18.el7_3.x86_64.rpmcd0dd6cf39623ce3f4ec51fac13d70f2aaddec6b711be8ef6f20915891c59800389-ds-base-snmp-1.3.5.10-18.el7_3.x86_64.rpm16c530e0e3e36210884def58739b2492a3ffc6a6c81be1423b8eac94a446f78eSLBA-2017:0389-1Pki-Core Bug Fix And Enhancement UpdateThis update fixes the following bugs: * Previously, entry Update Sequence Numbers (USN) were parsed as bounded integer values. This caused the server to fail to start in cases when the USN exceeded 2147483647. With this update, USNs are parsed as unbounded BigInteger values, and the server now successfully starts if USNs exceed this value. * The IPv4-specific "127.0.0.1" loopback address was previously used in the default server configuration file as the default AJP host name. This caused connections to fail on servers which run in IPv6-only environments. With this update, the default value is changed to "localhost", which works with both IPv4 and IPv6 protocols. Additionally, an upgrade script is available to automatically change the AJP host name on existing server instances. * Prior to this update, ECDSA certificates were issued with a NULL value in the "parameter" field. These certificates were not compliant with the RFC 5758 specification which mandates this field to be omitted completely. This bug has been fixed, and ECDSA certificates are now issued without the "parameter" field. * The issuance date of a certificate is retrieved from the "dateOfCreate" attribute in the LDAP certificate record. When migrating from an existing CA, if an entry was not initially created or if it was not updated during database import, the issuance date could be displayed incorrectly in both the web-based user interface and on the pki command line. Two new parameters have been added to pkispawn to avoid this problem: "pki_ca_signing_record_create", which accepts boolean values and defaults to "True", and "pki_ca_signing_serial_number". When the first parameter is set to False, the certificate record with the serial number defined in the second parameter is removed before the end of the pkispawn configuration phase of the installation. Consequently, when the LDIF data is imported, the entry for the CA certificate is imported with the correct values, and the problem no longer occurs. In addition, this update adds the following enhancement: * This update adds the "tcp.keepAlive" parameter to the CS.cfg configuration file. Use this parameter to configure the TCP keepalive option for all LDAP connections created by the PKI subsystem. The parameter takes a boolean value, and is set to "true" by default.Scientific LinuxScientific Linux 7pki-base-10.3.3-17.el7_3.noarch.rpm203816cbd445907a25130b091effc2511d41b8042c2415f2776a7524b184d868pki-server-10.3.3-17.el7_3.noarch.rpm4a0a7571de9bb1935e9ed5ddecba6df64dcbd429ed2bae31c27501c214b55d66pki-ca-10.3.3-17.el7_3.noarch.rpmd09d4e531720b0ecfb3d28243ef539ed1c6644961e95b16f06af37b189fe4cf8pki-kra-10.3.3-17.el7_3.noarch.rpm739a29139ce5fd9114d839b299b9ea37197f406814a2160555cd120770bef3a9pki-base-java-10.3.3-17.el7_3.noarch.rpm14342cdd75f2f21cbf0d03559933af7aabb069351af09c66f9cfab77453b35abpki-tools-10.3.3-17.el7_3.x86_64.rpm07b4ea5bc6243424d1e2fb3556a509a0b0ed9d25c8a80e8109a976ee7bd3285fpki-symkey-10.3.3-17.el7_3.x86_64.rpm63775aefe61692b368860b5f609bd548bc6b0635378e7f7d29cad186645abd4dpki-javadoc-10.3.3-17.el7_3.noarch.rpma0b035efcc12afda7a9ba8b99380ed3ca9dd1cdc0c4a5a89154fb2046d5a2b45SLBA-2017:0472-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated as follows: * Mongolia no longer observes DST. * The Magallanes Region of Chile has moved from a UTC-04/-03 scheme to UTC-03 all year. Starting 2017-05-13 at 23:00, the clocks for the Magallanes Region will differ from America/Santiago. To accommodate for this change, the new America/Punta_Arenas zone has been created. * The zone1970.tab file has been added to the list of files to be installed with the tzdata packages installation.Scientific LinuxScientific Linux 7tzdata-2017a-1.el7.noarch.rpmc573d85361162f9c951053616a6b32bb78a3dda3da39a4fbcc1e75bd5bf9fef9tzdata-java-2017a-1.el7.noarch.rpm4cbe5187112021693e30f62f101efed4086be69619a1f678f8309d4d78d2a35aSLBA-2017:0823-1Selinux-Policy Bug Fix UpdateThis update fixes the following bug: * Prior to this update, an SELinux rule for Open vSwitch (OVS) was missing. As a consequence, during boot time, while running SELinux in enforcing mode, the ovs-ctl script was not allowed to run the hostname and ip commands. The missing policy rule has been added, and OVS is now able to configure itself properly during boot time.Scientific LinuxScientific Linux 7selinux-policy-targeted-3.13.1-102.el7_3.16.noarch.rpmf0149202940da99d95ff41b4f5a189684f8fe93fb7dda721412d62b184b980cfselinux-policy-doc-3.13.1-102.el7_3.16.noarch.rpmc7f8b7b241293555ddf4f44f836b4f36d7e9a4510470acfcd5481c073e594264selinux-policy-devel-3.13.1-102.el7_3.16.noarch.rpmc93dab3a451a82375dc837e3540978a649309bd7f4ad5805fee1cd40a6b45d16selinux-policy-sandbox-3.13.1-102.el7_3.16.noarch.rpmb3f9257b36cf882d7bd9af3f861ded990465bf8eeb616fde9d1eeeb801093ce6selinux-policy-mls-3.13.1-102.el7_3.16.noarch.rpmc5c9c5c75711935076d66117d4017fdf5ae312965b1438bae45fda84e7f863c8selinux-policy-3.13.1-102.el7_3.16.noarch.rpm2fc35cac2cd29ef1b35baa88c823cbf79ec5c05ffac2e8ee1636d0e41fa93de8selinux-policy-minimum-3.13.1-102.el7_3.16.noarch.rpmc77ae5aaa7a1bea2002d73bba83d54cf6293c82e71875ba257ebf90e57589797SLBA-2017:0839-1Tzdata Enhancement UpdateThis update adds the following enhancement: * Haiti began daylight saving time (DST) on March 12, 2017.Scientific LinuxScientific Linux 7tzdata-java-2017b-1.el7.noarch.rpmb972cfa2c89e8188e6a4d87563bd6130c5f66f6b162356eca907396468ff70e4tzdata-2017b-1.el7.noarch.rpmc94f61baac0d8b8e2779a789c892ceed04711d88af3113093babbe2d23832de7SLBA-2017:1436-1Rpcbind Bug Fix UpdateThis update fixes the following bug: * Prior to this update, the rpcbind utility terminated unexpectedly on start. A patch has been applied, and rpcbind now starts as expected.Scientific LinuxScientific Linux 7rpcbind-0.2.0-38.el7_3.1.x86_64.rpm8c0e692d587bed4a9b2621cd350438676e63005b3a81ce3a468f3345e73077d1SLBA-2017:1849-1Virt-Viewer Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libgovirt-devel-0.3.3-5.el7.i686.rpmc650cbfe0f79ecf4a4d86f5794f200617a7d8df469eabbe978efbce8031a940aspice-gtk3-devel-0.33-6.el7.x86_64.rpma886fbfe7afe4514ce1b0133bdc525212311d8425aca6cc0ff74598a77edbe94libgovirt-devel-0.3.3-5.el7.x86_64.rpm33611fe062815f38274ffa251ef928b693fbf1545cf5d12d57e5941a18316569libgovirt-0.3.3-5.el7.x86_64.rpm35c67b9cf59ee879e9de522ae3aff89a66a96b0adcfeb2a5f8142ecb1ecb064ausbredir-devel-0.7.1-2.el7.i686.rpm6a821d0f00c5d89dd24287404f9c482bfd63fbc610fab8b48308d486e7c89f18usbredir-devel-0.7.1-2.el7.x86_64.rpm7ceb94f32a91f7f25ff567d93573039c31d08a15abf13d4d64efd207bb57b869spice-glib-0.33-6.el7.x86_64.rpm181571351a4982aa7e22db7737c2e4d8593f6b72365c8b937a9d87da351a0c99spice-glib-devel-0.33-6.el7.x86_64.rpm59fc9b96189016014a8b8ce4dcbf88d09e7af581ea77ddd835920ec45b7390dbspice-gtk-tools-0.33-6.el7.x86_64.rpm03bdeb85348585c8a805aa830b21815992954843d11525471face16e24c0d659spice-glib-devel-0.33-6.el7.i686.rpmf9c6699e9da0ee007a35e08ffb89a2535d6662196a18dba564bd03b1407dd7a9spice-gtk3-devel-0.33-6.el7.i686.rpm9a3194172646b938b8acf56723d982967733bc65b378ea84aec31d00af12b3e8virt-viewer-5.0-7.el7.x86_64.rpma4df44da9ce016db08a88ab76d2f4b6681d215ef6f9241ac2d0a7e7021d15850usbredir-0.7.1-2.el7.x86_64.rpm3b03904702f7ce46e157a1cba8d455060695f1e7677031c78437efa099622965spice-gtk3-0.33-6.el7.i686.rpm25259987e3e8da7d73b039147b3878e07e03c46d2ab42e6fd726cfee2faaf465usbredir-server-0.7.1-2.el7.x86_64.rpme971ab5d95df88bbcc9a525fe9b3dd12d02443024cc881ebbeced933d832aab0spice-gtk3-0.33-6.el7.x86_64.rpm7547865f4ad42e20ced4b4c18cf5f437ba6693c8cc1164f0b677c79b22471c43spice-gtk3-vala-0.33-6.el7.x86_64.rpm516f6882ff85988260db68a83cd91b0d9317e7386851af8f5643986183739d8blibgovirt-0.3.3-5.el7.i686.rpmfeb82e47b9c124ac482035cda04d7259be8123ba1b5b5b1a5b55959ec789e5d9spice-protocol-0.12.12-2.el7.noarch.rpmcd1cc7974dd52ffd90b759b78fc0135774d6df2ce4306ed22ecc983d3bbb7452spice-glib-0.33-6.el7.i686.rpm420c985f0b8df457c67b0e7c9b51e4376c8158adfbaa803f2ef51c8a0497caabusbredir-0.7.1-2.el7.i686.rpm4e273df0bcb5a929e229e57810186cf485e12020b268094284f9438496ced9aeSLBA-2017:1857-1Libnfsidmap Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libnfsidmap-0.25-17.el7.x86_64.rpm05e38bcccb8a8e0fa6c7e384794fed11cb93592137433ea3cb8ce2d53c55dbaclibnfsidmap-devel-0.25-17.el7.x86_64.rpmfcc6d651877eacee386c6605a2e874abba248a91bb92122ae4debe87324e8e85libnfsidmap-devel-0.25-17.el7.i686.rpm81c87556fe0136d4ba504ee8637b42574518424551b820da8ac27dad0ec9e458libnfsidmap-0.25-17.el7.i686.rpm5b2d2ee439ef994c3b3507e266d27d46fc1140c006326d498953afdd290f85c8SLBA-2017:1861-1Selinux-Policy Bug Fix UpdateScientific LinuxScientific Linux 7selinux-policy-sandbox-3.13.1-166.el7.noarch.rpmf5e0374d01dc57edfb37664db16db1f1f35bed42e4257815cf1273fffc0b1121selinux-policy-targeted-3.13.1-166.el7.noarch.rpm9d14708360df93e53f3a0a649b4c5f7c7c2a51a0b5cc126134328d47624d5591selinux-policy-devel-3.13.1-166.el7.noarch.rpmfade7c17fdf0b09b3980d749807a794fee8fc1dbfa6515e4dbe469c19c669c1cselinux-policy-minimum-3.13.1-166.el7.noarch.rpmfa1cc1d5b3309be7d15cfbd91ddfa940e6822f8a0cf8778d6e727a1a7c11c601selinux-policy-doc-3.13.1-166.el7.noarch.rpm48fda297e7b7714679fdb22cd2ba8d15c56bd96cf9d29d774b21c6b8c57e03d7selinux-policy-3.13.1-166.el7.noarch.rpm2acd2eccaf0c868225a2e891ebf5e124491db8e0924e0f60dbad3c5bb9240886selinux-policy-mls-3.13.1-166.el7.noarch.rpmf437a9cfe9e305748cb215385d69aaca3e98dc0aa19295d2f62b8e0fbd4cbd0eSLBA-2017:1866-1Spice Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7spice-server-0.12.8-2.el7.x86_64.rpme7c5bd0d02a3ebf89324066adf36a02cdfac06c16b991b912936845c14318545spice-server-devel-0.12.8-2.el7.x86_64.rpme9349a9b176f2c5f80f3563877c9877c48229f92d9ce46fab627bdd4367817dcSLBA-2017:1891-1Krb5 Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7krb5-workstation-1.15.1-8.el7.x86_64.rpme80fde04f77929ac0f1da098af4cf2496035c539d79b5c1cb656f44cec3b83b7krb5-server-1.15.1-8.el7.x86_64.rpmd1bab7fca6275a803d8b254cdd612cb2969a28ead284ce692cca22fc58c84f44krb5-libs-1.15.1-8.el7.i686.rpmb60f260b89df6a29c150cff4fb75ff98682fedc703ccb0909119590a76424471libkadm5-1.15.1-8.el7.i686.rpm259e700583950d31e74a693f7d18600d6f041329ef4fe9a31386d7a92a4ef71bkrb5-devel-1.15.1-8.el7.x86_64.rpm2a3b5cd6a133c5f926a38acef0a97dd1504a21851bb597525fe01e81e9df92aekrb5-devel-1.15.1-8.el7.i686.rpm9d634bb97ad6c7fbdd4ff4950cece15fbb82233d1cc4e35f74f7de00f288a1cekrb5-libs-1.15.1-8.el7.x86_64.rpma9f60e98ede285cf65abd7aa906749f5e5f503961e7f0ef861e9d6af0e471910libkadm5-1.15.1-8.el7.x86_64.rpm2e869ced64fcdd80a4c2e03c63a9c7eaa05bea41c56b2040295611c3576fbd6akrb5-server-ldap-1.15.1-8.el7.x86_64.rpm37a5d3e336bb0eaa532cef0ede2ec301336d8b1aac9243339262a388a3a2754dkrb5-pkinit-1.15.1-8.el7.x86_64.rpm75fe8b44d6a96afde112c4432a6c21553dbdd2f4cab25d2663de65232228126aSLBA-2017:1905-1Xorg X11 Server And Drivers Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7xorg-x11-drv-libinput-devel-0.25.0-2.el7.x86_64.rpmfc18fc209b60d7d6685a87ee12e7b21d893a4b5aa6b02028159528afd11c3846xorg-x11-drv-qxl-0.1.5-3.el7.x86_64.rpmc23634cbc394c2962adfa9697e81fa5adb6a7192074502ab60b3cba50c23b369xorg-x11-drv-nouveau-1.0.13-3.el7.x86_64.rpm5a41d9214cd69a8f8935420e45e9720b62d9a8fadeeac8fb0351204b119304ebxorg-x11-drv-void-1.4.1-2.el7.x86_64.rpm18c165c62ec4c976bf88ee7f9de50472c2c8d9ee4bf90142573a9b0820b91e29xorg-x11-server-devel-1.19.3-11.el7.i686.rpmdc20850710553451478cbd3f2b65d9c7593fc98e9462dda1ba5e308cce8dec1cxorg-x11-server-devel-1.19.3-11.el7.x86_64.rpmc169c1016c5502aa73019aaf22f325e944b74f4e30eebf88541ddbcd0ec2fbafxorg-x11-drv-fbdev-0.4.3-25.el7.x86_64.rpmb3eebc10e4b36a8b8c907d4acdef9cc8e0f602e71090a387cbcd816c9d2f2728xorg-x11-drv-ati-7.7.1-3.20160928git3fc839ff.el7.x86_64.rpm601c50821b358a58e5dcccda9526311fbb08203afc78aeb1315bb276476e9208xorg-x11-drv-mouse-devel-1.9.2-1.el7.x86_64.rpm86b4e60944d97f901980eb478f7c77462508bcbdc021ffe835670ae80f07d202intel-gpu-tools-2.99.917-26.20160929.el7.x86_64.rpm62a8b57003031fdbcac6c76cc855e5202589fc44dd78c5f9ccdfc53575180613xorg-x11-drv-intel-devel-2.99.917-26.20160929.el7.i686.rpmafd1aa1ee7db74b55dc4617675dc21b4c13e5c1279ee28e091b22320e2f79c5exorg-x11-drv-v4l-0.2.0-47.el7.x86_64.rpmc6948ee06d68d7b34a7eb587cc31c4709014bb6f19418c95c1f0fc9e51c4a41bxorg-x11-server-Xnest-1.19.3-11.el7.x86_64.rpm86aa21f9554be40120258302ff85cee07e1fc012726c51c161ecda9745e910e2xorg-x11-drv-libinput-devel-0.25.0-2.el7.i686.rpmd900bd73215a4ebf40a8378ab814658ee36677f7a80fe092882c8ee36a24c2cexorg-x11-drv-evdev-devel-2.10.5-2.1.el7.x86_64.rpme4d4c86c9cbbb57d95c8f539e2caf7d6cc8c0e75185eea65cb998c8d939749bdxorg-x11-drv-synaptics-devel-1.9.0-1.el7.x86_64.rpmaed1cf3d868b25a70abd3ce0075e4425fe4570fb6b0be9fee4fd351c58f78df9xorg-x11-drv-wacom-devel-0.34.2-2.el7.i686.rpm6ea85f59d29f16fada83e2049c2cad7adafd0bcb3274e1aaf9957799d771a4e6xorg-x11-drv-wacom-0.34.2-2.el7.x86_64.rpmdc4d2e7e40f5a0ea1fad2d7e27bbab70345c6dfe2f113e5ebea679d19fa030a5xorg-x11-drv-mouse-devel-1.9.2-1.el7.i686.rpma38d98d6645ea6150968fb21340e6fb2863924bbf6ff45dbfcafdca2f7852a8cxorg-x11-server-Xvfb-1.19.3-11.el7.x86_64.rpmfe62651fea0a8ad2fbce629f9dd85808a8d64001722c92101e9a7470dcbbcfb2xorg-x11-server-Xdmx-1.19.3-11.el7.x86_64.rpmebda813f26515391f2936c75595afe71f19bfecc0ca49162d32cb6653e49120cxorg-x11-drv-synaptics-1.9.0-1.el7.x86_64.rpmae7998d71f29a935aaaa2194d16164a6b67428e03c60c5692c0411d04e976baexorg-x11-drv-dummy-0.3.7-1.el7.x86_64.rpmdd78a78955b7d44c0a77ac8f706957a6e78263f2ae7462b240f60c08093ec8a7xorg-x11-drv-intel-2.99.917-26.20160929.el7.x86_64.rpm227117cbeeed58c5773fe95adffb64ffc73a8bed80aaa56c584f60a8690ddabdxorg-x11-drv-openchrome-devel-0.5.0-3.el7.i686.rpm863b0cbce5bc34e5e4086e1c051c82200556d0c1b10c2f1c219fda201b2d750axorg-x11-drv-vmmouse-13.1.0-1.el7.x86_64.rpme8e1df0ac9c711058fe7c37a3771df546ce791a3ec1a52666be30d458d9f5687xorg-x11-drv-intel-devel-2.99.917-26.20160929.el7.x86_64.rpmfc1d83a3c30be58b8da689dc8cd660eeac3232fd98a7c2dc38a436ea5444bf6dxorg-x11-drv-evdev-devel-2.10.5-2.1.el7.i686.rpm3fe476503c2fb24aae8cff326dd4de618979c4ecf83aaf02997c39bbaaf0451dxorg-x11-server-common-1.19.3-11.el7.x86_64.rpmdb15fc14c7322bd6a19fda0633bad1aec4faf030c5f9d8c21242faea2d8c37dexorg-x11-drv-openchrome-0.5.0-3.el7.x86_64.rpm25d93f77e87cf86359ca344a2a20be54f0626c14c8922a36c8aa64efdbee66b3xorg-x11-drv-keyboard-1.9.0-1.el7.x86_64.rpm26fb82c2a9394f96a1b5204e1227dcccdb9126f7c0c34fcb3c3e62df5c30b9b8xorg-x11-server-Xorg-1.19.3-11.el7.x86_64.rpm17ba568792b148b3cbb4e54c0fec87621103e7eb82f8db20e2c57a45dc271965xorg-x11-drv-wacom-devel-0.34.2-2.el7.x86_64.rpm5d8672396621e2ccbdb8a490240c1223739962a74ca8f2f7b1e8f2c88b9a69faxorg-x11-drv-libinput-0.25.0-2.el7.x86_64.rpmd163868aeea8a447afb40ba9031a1ce268a53621dc939ecd9103444d5298f35dxorg-x11-drv-vmware-13.2.1-1.el7.x86_64.rpm3b6165c981a23d49ad66d217369e2eafcc0f1872116ec040733015154f2ba09exorg-x11-drv-intel-2.99.917-26.20160929.el7.i686.rpmdd4e29e59849a81f0dd27deec763cea7cc7bbd871d071cdb22881a65d1152195xorg-x11-server-source-1.19.3-11.el7.noarch.rpm37b35991a3c01e56cbd1c5604de0c01e84ca8e4f2d94143e00e3daa212da598fxorg-x11-server-Xephyr-1.19.3-11.el7.x86_64.rpmad5f7c642a929a701a6dd3c0812c9ccf188c3d4d671c0d1e3f9c41e638aefbafxorg-x11-drv-openchrome-devel-0.5.0-3.el7.x86_64.rpm2145db0f43ca630bc09d6e42d804a63d93b4629ccfcb9714c9ab2239531e326dxorg-x11-server-Xspice-0.1.5-3.el7.x86_64.rpmd982c6e113324c9dec41bd64a51d7c045687617955f1dcaadee83370a86e16ecxorg-x11-drv-vesa-2.3.2-25.1.el7.x86_64.rpm0f9b752620b3ec034a1a5a462ed5a2140dc42fab9d818f1e43196ebe7cfe2bdaxorg-x11-drv-evdev-2.10.5-2.1.el7.x86_64.rpm2a137b6a680e6a4f3fe5d158bb0f8d6f7d274450212e80805108d9246557d019xorg-x11-drv-openchrome-0.5.0-3.el7.i686.rpmf52dd425195ecc6245b5f393049a9df371a037dbca8b970a2b14cf6f0986a01exorg-x11-drv-synaptics-devel-1.9.0-1.el7.i686.rpm71e266f5285b5eefc9b89f60a2072b28bb0229592889a6f95fd267a805a34b26xorg-x11-drv-mouse-1.9.2-1.el7.x86_64.rpmbbd4ae0a721ffd7f1c8893005e288d923fe67e3c353f2df097ed1250ec3b9928SLBA-2017:1929-1Openssl Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7openssl-devel-1.0.2k-8.el7.i686.rpm0d0226e4a5cc0cd544259648d92d54328d7bf206a2620f361c89380c25d45010openssl-1.0.2k-8.el7.x86_64.rpmf7798a9de27c2ebea95917d9e64f03e62abd960d0afb01c10254dac53e0a6088openssl-static-1.0.2k-8.el7.x86_64.rpmd18d739cf161cc0f6eaad5532d2aa569c9cab7a457beac882b84b9867ca5ee3eopenssl-devel-1.0.2k-8.el7.x86_64.rpma9fe642863bfe4576ae76459593ebc04ddbb48be141427ee13a12638e9ab9f56openssl-libs-1.0.2k-8.el7.i686.rpmf3871b377b37238878c2c4c4906ba04e4b0a8e36f12a4332cf8bf911db12f966openssl-perl-1.0.2k-8.el7.x86_64.rpm07ff32411f19463dc2a58c1e547b9b8b3681fee0eb2aa7b8c6b9c77f7ad0338fopenssl-static-1.0.2k-8.el7.i686.rpm0e8202a52452cef75d2021d54c8912ccbd5e9446f59a1062526309c82a1cb387openssl-libs-1.0.2k-8.el7.x86_64.rpm160188e10a38ef218f5e5f8dcdf900142788fcab7e55c0a69457c2b3068a5219SLBA-2017:1945-1Python-Dns Bug Fix UpdateScientific LinuxScientific Linux 7python-dns-1.12.0-4.20150617git465785f.el7.noarch.rpmd415353168bc4ac61eb2a486f5c7b6c5dd9110b2c79ac5353ab2734dbfe027e3SLBA-2017:1960-1Linux-Firmware Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7iwl4965-firmware-228.61.2.24-56.el7.noarch.rpm381f89e0a1c79318ed929b7c6c14c5fb1e15657ff8c938c8083fda49da224339iwl3160-firmware-22.0.7.0-56.el7.noarch.rpmf18fa000682e10263ff337a7b7978336cb3cb64b5ef84e4327c47159d0c2a2dfiwl3945-firmware-15.32.2.9-56.el7.noarch.rpm3d93c9c7f5aee25248d3a18c05d9f032b13ae70e9a498cd842f040ab04ceeed8iwl7265-firmware-22.0.7.0-56.el7.noarch.rpmf895b65c3d006f97932f8d50773123b3be5de9b898fb676a21b394726607713eiwl1000-firmware-39.31.5.1-56.el7.noarch.rpm070c678ad927164ffc74d7e6ef598ab2476caa8e84e4fdcaa0833bbf87b8679aiwl5000-firmware-8.83.5.1_1-56.el7.noarch.rpm1e7fbf4eb0dbb82582091c6aba2bf237cd02d26519e2b4bad5b1775149e4254ciwl100-firmware-39.31.5.1-56.el7.noarch.rpm550a5c13952ed9c0c84abbd73f32e4cfd81a1d35ad0815fca192447f5fcdb092iwl135-firmware-18.168.6.1-56.el7.noarch.rpmb148438b1306e4d86fdddbe55e0d5f95cec8588639835043e065765943e8c127iwl2030-firmware-18.168.6.1-56.el7.noarch.rpm4645cf850a9b4d844516fc967e020e117cbd4bd3b8e730b73350d9b3737b2388iwl6000-firmware-9.221.4.1-56.el7.noarch.rpm77a8ffa754f85bfdb9344703b4e6ef79a81ab7a9fed322e0f3365d49d382a9bciwl6050-firmware-41.28.5.1-56.el7.noarch.rpm5b87d9405ffef7028001e5765a059ef7658201c06efb53d43e18c448a82f7b25linux-firmware-20170606-56.gitc990aae.el7.noarch.rpm45bcdf49ee2e9034e6d8bfe6bca8902c3f1ac934b90897220cf880b1f9b5b1d0iwl105-firmware-18.168.6.1-56.el7.noarch.rpm03bf7c8078109955ca43bb4efb4404d0bf76e50c29baf70161810340f302aa1fiwl2000-firmware-18.168.6.1-56.el7.noarch.rpma275929a7dcdc533e9693dc4b64bbacae34bc81c2f5595df74e486dd947a22c8iwl5150-firmware-8.24.2.2-56.el7.noarch.rpm4a457bddefa30c692754f631495b2599bfc0fa485d1060759c1d3114e775cdadiwl6000g2a-firmware-17.168.5.3-56.el7.noarch.rpmfa44a37d9d717fac8ce2e778dffcf66810a39c25c8001f930e8159a99e342843iwl6000g2b-firmware-17.168.5.2-56.el7.noarch.rpm3732a3b5252f5ab7871edfea56ce5c774d371044ea6a78c2c4548ff93b36ad22iwl7260-firmware-22.0.7.0-56.el7.noarch.rpm03525569b34a780c273811769894dcdaec56c0fb9220b059bbe000db871d79a0SLBA-2017:1974-1New Packages: Http-ParserScientific LinuxScientific Linux 7http-parser-devel-2.7.1-1.el7.x86_64.rpm87a498fe0763196cd10f49e952da9aa463b8abeb8db51e74b7f707d4aeaefe46http-parser-2.7.1-1.el7.x86_64.rpm0b8fc08ff0938dc906ea797bd5f994c235d931b0126b68f40b4fda952f4dbe1bhttp-parser-devel-2.7.1-1.el7.i686.rpm61556013e30887eb4cf9e4723af249d49bd83f5e15f2acc36c59e0dd260c71d5http-parser-2.7.1-1.el7.i686.rpmb275b82080d31fb5675f803dcff4fe1bed386e9dfbb3382a1e5bd57261eea188SLBA-2017:1988-1New Packages: PulseaudioScientific LinuxScientific Linux 7webrtc-audio-processing-0.3-1.el7.i686.rpm5523fbc33e1545790e65d29d48d339c480011e90bb749529ad83af63670c1599pulseaudio-gdm-hooks-10.0-3.el7.x86_64.rpm6bcc1414f833c09ae8512cd5230f000cbe3f19f91170e681d9ab1b0ff63e2401pulseaudio-libs-glib2-10.0-3.el7.x86_64.rpmfca0a28c4f8acd5a117b6a742b027643eb81856de822d41c3dd462deda28491dpulseaudio-libs-10.0-3.el7.x86_64.rpmd70d74835dae5680c1f4022b6eb26e8c660c6f2d495234f86051bec4840e53f5pulseaudio-libs-10.0-3.el7.i686.rpmd91dd9fc1a6fa0d4257681864c066225fa636de523fac17585d3828d43db7ea5pulseaudio-10.0-3.el7.x86_64.rpmdc96df2bf1f002c06ec8db56014f9fb7255289228b59e398b6878ddec103e5f4pulseaudio-module-gconf-10.0-3.el7.x86_64.rpm4e7e0980b9a2dade650bc9a5b7b2617f4478d20f6b6b1b78d95e811beab66ca7pulseaudio-module-bluetooth-10.0-3.el7.x86_64.rpm42cca9211a94be4c61337f53985c5031a67cd901bc0700ad894465662f293ec9gsound-1.0.2-2.el7.i686.rpm45e1878e755960d11d483b39c42d4e8fdcdc6a1332b7a9588574823d58cc3a13pulseaudio-libs-devel-10.0-3.el7.i686.rpm54efb1f3d3b7bb730a0dc14bc730d27bd12e9698eb49acba6a30a102ff0610a5pulseaudio-module-x11-10.0-3.el7.x86_64.rpm318ce01ccbd0b526743671858033d05e4f1ff504cc72f902838c861cb8e892begsound-1.0.2-2.el7.x86_64.rpme08153ba2fd57dc22954130e804c0781fdad80ec60b5ccb0b9859f72f794fd86webrtc-audio-processing-devel-0.3-1.el7.x86_64.rpm91465a3648c83b3b83d8b8baf3d4856d108c552bfa11276f4a926bc7b2338e76webrtc-audio-processing-0.3-1.el7.x86_64.rpm862ae19bb33a0bae9c435229d6dae0c08c16044acb950853707eabb76aef9d97gsound-devel-1.0.2-2.el7.i686.rpma44d31deccae830681ea70e0c67fd7f246446a59ec4cd8712b68e45e1015558cpulseaudio-module-zeroconf-10.0-3.el7.x86_64.rpm12e6786e6b2a25388aa50dbdfefa62ce160cca34b94c8d61a120a3a8622a116epulseaudio-qpaeq-10.0-3.el7.x86_64.rpm128c1f1cae14920ec134310ff0264f4f8a76ab7447bac66b3ddc20a117be084cgsound-devel-1.0.2-2.el7.x86_64.rpm38d90da6245f892db73e16aa4d89fa760e9a580e7ce4c10cb31aadeb414dae9bpulseaudio-libs-glib2-10.0-3.el7.i686.rpma21d287bbc927e180232b3a2e859b309d7c73b9ba9613b214a6bd328c7979f08webrtc-audio-processing-devel-0.3-1.el7.i686.rpm54dbd0afed7b3586ff79817e05c952e77b946b7244342629bdab24d4623edefapulseaudio-esound-compat-10.0-3.el7.x86_64.rpm926eb038c320191d2d056c7fa4b90c8a26b683263c8a2d125f57d1580194afd8pulseaudio-utils-10.0-3.el7.x86_64.rpma3af78d58337a3a0df7c241d9d509bdf9d0c47d56d8e725848ad234b36a71867pulseaudio-libs-devel-10.0-3.el7.x86_64.rpmc6b04ba0c279c5c536f7cbf82c2cc185d28b334554d5dcd39095839a49f7722dSLBA-2017:1998-1Webkitgtk+ Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7webkitgtk4-2.14.7-2.el7.i686.rpma93f8c4601cadfed9e958299a1e0e6e49fab7d2a248e6ebb0a7b2e8638f83b63webkitgtk4-plugin-process-gtk2-2.14.7-2.el7.i686.rpmd81431bf252390ef5159c1588c18716a6b32f51504bb27371904a744b3757d7cwebkitgtk4-jsc-2.14.7-2.el7.i686.rpm4cf2b4692b782ba617cdcf57b54b0e6b67173bef9a7c9e8053adc23ae42e7739webkitgtk3-2.4.11-2.el7.i686.rpm3234a5c4eed9e50a3c7e6bb9ab303be9f33be597e95fe1d7394f11aebb22b4f0webkitgtk4-2.14.7-2.el7.x86_64.rpmdab4856a2f2f44ec327e1cacb24ed8141420fd5ba754e2ff115f190329d2b87cwebkitgtk4-doc-2.14.7-2.el7.noarch.rpm6468d7635973a4f3ca06a40a69b41e6aca5bde196e178a1a16d7cfa3d9104337webkitgtk4-devel-2.14.7-2.el7.i686.rpm9227943d65a8ff2ff0a4b58bd353e0dc1c63c73b9c0d589a7a7ef57c036e922dwebkitgtk3-doc-2.4.11-2.el7.noarch.rpm912e54ebeeedb6d259849cabafda2f0ebe12269be421e019b11f1f643a0d108dwebkitgtk4-jsc-devel-2.14.7-2.el7.i686.rpm4dcad35eb2fea97eaefa33c409b9d949a3e14ec5999cc128394e3fa29e86b175webkitgtk4-jsc-devel-2.14.7-2.el7.x86_64.rpm607c09b12d3bf70533799e72ebf0eee42f87116383cb9e5fa903bdd721918b23webkitgtk4-jsc-2.14.7-2.el7.x86_64.rpm397a81048328dbee73f96185a23a5edf762bc5df8eded19c046bbc195bb74754webkitgtk4-devel-2.14.7-2.el7.x86_64.rpm73c2b8efd0e40d10195c37369c5507177857b9a4da7c111d9e6c4b7ba705935ewebkitgtk3-devel-2.4.11-2.el7.x86_64.rpmeadaa156efa0f8373bf2bddad72d0f7dc40b19024a49b524b513209397e233d1webkitgtk4-plugin-process-gtk2-2.14.7-2.el7.x86_64.rpmb6d443d8e74ad272ab90c6d012caf9ac22cea3c623d8b030a2de39b4f91a2d69webkitgtk3-devel-2.4.11-2.el7.i686.rpma0609d5a999100657a1c702245b867dd119fbaae22adc6a1551eefa8f16a9089webkitgtk3-2.4.11-2.el7.x86_64.rpm6dee3645b03e19036b807480b3a1f35068cd9b167a9b079234d48c8b16d1457bSLBA-2017:2005-1Vinagre Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7vinagre-3.22.0-8.el7.i686.rpm0217b2edb1c42a0fe4f7a0094eacf7dfef6f54a34f0b9b2b38041ba50ade20f7vino-3.22.0-3.el7.x86_64.rpm9a1784e1d5dbd8663c98b14ce42ae85346b2ced176761a71f79239db2ae5617bvinagre-3.22.0-8.el7.x86_64.rpm8476790c7d111f495e551924460e0c4cd23f9d3eb56647c3bb0182cb3595fb28SLBA-2017:2030-1Xorg Utilities Bug Fix UpdateScientific LinuxScientific Linux 7xorg-x11-server-utils-7.7-20.el7.x86_64.rpm15dd662905e04eb13b6831a7b60d37c6a4e6fed55e19134d4085dbc183b9a645xorg-x11-utils-7.5-22.el7.x86_64.rpm9a499eca9a67f2e3e361f9d729dd32ff6b42873b3812202ab263eb23e287d0cdxorg-x11-apps-7.7-7.el7.x86_64.rpma7074c5c3ee3ed1bdbf9219203a073fb85f6fd5caf948f021a9778108601c633SLBA-2017:2033-1Gssproxy Bug Fix UpdateScientific LinuxScientific Linux 7gssproxy-0.7.0-4.el7.x86_64.rpm4fffb51b30dcf6a465a8cb65684f619f95d17ef46f27e4b41e23e3414f42da48SLBA-2017:2057-1Gnome-Contacts And Libchamplain Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libchamplain-0.12.15-1.el7.i686.rpm896affa525a271770b6d287ab53bf39608592d7ed935da12f5e795d8f83bd745libchamplain-gtk-0.12.15-1.el7.x86_64.rpm9bdfc18d20f5c6b568db38c6d51612d84136af12e31e0d22923a0c28889d94b8libchamplain-gtk-0.12.15-1.el7.i686.rpmdbf2da264b1f2b8333c7ef979ca4465049cdb15f45d8acd04bbce06c91a0f886gnome-contacts-3.22.1-1.el7.x86_64.rpm63e3c7c69828f6c5b90d5dfa1c6f415d72d857804e01ad848e325a285df3b96clibchamplain-devel-0.12.15-1.el7.i686.rpmf01991ba27bc1f3c637991d9dfcc3484c3c63fb9bbe8db75ed53fc84da7e1ed5libchamplain-0.12.15-1.el7.x86_64.rpm2a25faa73ca326259ed2ca8ec389fd1d7567096b0f413189174a57391fb52120libchamplain-devel-0.12.15-1.el7.x86_64.rpm400f1373c3a0edec5000c81dacc53524d08ab497b6a20e4ff8a3351b67db0488libchamplain-demos-0.12.15-1.el7.noarch.rpm1f5eea971f5e28c0ffdcc2a03e2fd19d28586f1f847f02c635e10e685e0e972cSLBA-2017:2066-1Evolution Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7evolution-data-server-devel-3.22.7-6.el7.x86_64.rpmb595bc57f1c943ec06d887f90f5a8ce4b293bcb58a971c97edb58bc66a0e82b1evolution-data-server-tests-3.22.7-6.el7.i686.rpmf0c5394e205a540ba0d8f5451e579d2af9fdaed09cbfb67fefe92b67ae0f33edevolution-devel-3.22.6-10.el7.i686.rpm231c451fe073808daf31a13e6bb20b3181ee9f8cfb37e05a95262a189d215a81evolution-data-server-3.22.7-6.el7.i686.rpm1ec0de1afc363b87c50e8e792dfb824d6b0f672bebcef67f5a5b6202de382aefevolution-mapi-devel-3.22.6-1.el7.i686.rpmd58fe2ce74d5d3380c5a122a22bb3f69bd06d527d58c8c0a60d029f060a07993evolution-mapi-3.22.6-1.el7.i686.rpm735d5ea14d1b266a01cf86c7b10d6c40ccd42b401f55a4950770ce2050e295f6evolution-bogofilter-3.22.6-10.el7.x86_64.rpm08d0feb1567de0b48fae6a625f32a937a69eb1813254eace54dec2b47b1ff384evolution-data-server-doc-3.22.7-6.el7.noarch.rpmd6bcc6d909869617f0b8a1d56632cb167a494db87654cf42d6fec621d0602d57evolution-data-server-devel-3.22.7-6.el7.i686.rpme2e47cd49a597ae6661079a3d8933ac8399a66172cdd28ade7b5970fdb7eacddevolution-data-server-tests-3.22.7-6.el7.x86_64.rpma10a78fb95e08f76d2c322c76f75759078c64e012046a822dfa8bb45a34f8b05evolution-3.22.6-10.el7.i686.rpm1b6e35ddb55ee32ea1656fc59c52c59191210d4a4a4aa6dc04a6c0d644a319cbevolution-devel-docs-3.22.6-10.el7.noarch.rpmeffded9eff457b6ea23a997e4164fc4ec057356f3ac23ede236327ca018bd9d5evolution-mapi-devel-3.22.6-1.el7.x86_64.rpm08e66bdb5a88578b95ada9675b4ffa82290472133dc154266719b6ae292430d4evolution-data-server-perl-3.22.7-6.el7.x86_64.rpm188964a0f609ced4b7ca1901d1bd8ac1008ba3a1d2655502ef7e14bafbe7577clibcryptui-devel-3.12.2-1.el7.x86_64.rpm7b7e244e0c24ce026ac069c0212836ba2e79fb6404dcd9ef1d12aec8fd503fccevolution-mapi-3.22.6-1.el7.x86_64.rpmc79e43605e51023b5bf4095fd84dfe92354d956c2e5e8ba0ccf4e7f0c1a52487ekiga-4.0.1-7.el7.x86_64.rpm73d8896774960d58a9ca36e1eae6ddd9f70a7d7e1c3fe47e3f800b2c4ea6599fevolution-ews-3.22.6-6.el7.i686.rpm4aead100a337e1f587dc11c099bfc3618529a5a7297a001d68b59e8efbdb0868libcryptui-3.12.2-1.el7.i686.rpm16de50a1a220d2a709c8ecb88c0b752a405017899078b66449d5ff302b85d618evolution-ews-3.22.6-6.el7.x86_64.rpm7b6a4b60818dc02bd5304e49097f5121cbf031f0ce73d1873e685fd74e7ab278libcryptui-3.12.2-1.el7.x86_64.rpmc88e972d910ec744f20846cc1741cddd439703d60ca9c15beeeaa022e5cecc7devolution-devel-3.22.6-10.el7.x86_64.rpm65f1a8d89c149d1cb2e7fe55f7040f97d52f54895c31091224a2ce30f149d26devolution-data-server-3.22.7-6.el7.x86_64.rpm45d639081fee593263bb2a2e579eef6f0d8e98a6d6b501f4e560ef67beb98cfeevolution-perl-3.22.6-10.el7.x86_64.rpm3c047e9a86db6054dd50c648736edba1f4a8e8ec0d7b07d9297958d03146d982evolution-3.22.6-10.el7.x86_64.rpm54742b2e6e07a230db035d7cdcdf59f5bad69aa5859a13e43b39f51590522530libcryptui-devel-3.12.2-1.el7.i686.rpm772a9e8f61cdf0d8350d64b316385abaa386548f3a0eea4cd44806993e9271a0evolution-help-3.22.6-10.el7.noarch.rpm3db5c1f9417bb6f067abd7306e951b0569702742277b1f1b37ca9a62119a5698evolution-spamassassin-3.22.6-10.el7.x86_64.rpmf96653787b4b3ba6bc6070a6256b61d7b0adef1b686678b35ef315a9bce4b634evolution-pst-3.22.6-10.el7.x86_64.rpm6b2ea6e12bc3e509cdcabf073e6ad3d27e8f0a1948df9f0a4c162b34aa223facSLBA-2017:2076-1Dracut Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7dracut-033-502.el7.x86_64.rpm3e9a8eaad3f0e280f4fbcea860c1831411d42b301457a4aa4b586277b7e75ffbdracut-network-033-502.el7.x86_64.rpm58ef49aec9dea8e2486fd940901fc23fd81811f513765575b6e9975deeddeac5dracut-caps-033-502.el7.x86_64.rpm4c27d3afd4fb4433100b206457a6ae812831d19b579ef83994bc3221001b4520dracut-fips-033-502.el7.x86_64.rpm45054cd0b642d339f4df28def50c1e0fadc8922c46f6e2b449768d35eb3da9f7dracut-tools-033-502.el7.x86_64.rpmffac90c00536305a975f4a2ef695f087659d7680cc7d28df8c348cef581cf48bdracut-fips-aesni-033-502.el7.x86_64.rpm257cd24262166de9dfc6375acc7c409c47c82bcfcc4f8c5551e72e15309c6ad6dracut-config-generic-033-502.el7.x86_64.rpm85e179d2856446746a697f0cf5f4817fda466eaf3d851ffbc08803545521e651dracut-config-rescue-033-502.el7.x86_64.rpm5645183fd1e3f39f2c00ee3cc41e8c8f7d0b18db658a55c5ed7a7a18e01ce909SLBA-2017:2079-1Tomcatjss Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7tomcatjss-7.2.1-6.el7.noarch.rpm4b50989b5c1325ff43f0b2bdca503eaca46559925d06a4f1f9f8a17fa57d7da6SLBA-2017:2081-1Empathy Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7folks-0.11.3-1.el7.x86_64.rpm6bc304cfcaa3f19059e27cff5d30213b1d20edd7d9c75fde45bc101bbcaca528folks-devel-0.11.3-1.el7.x86_64.rpma4f94e2735f17650f40c9fa4af28b1d7f5106fe2975a406ec61b3763618015f9empathy-3.12.12-4.el7.x86_64.rpmc3af3bf6ff946d0a02449b47a8ab25581985092818cc73f98995e9198be6d802folks-tools-0.11.3-1.el7.x86_64.rpmbc4ed9951f8ee54be35772ae720e48034a06ee36fc2b1228a369cca0a99eff4cfolks-devel-0.11.3-1.el7.i686.rpm6b0562c7db17af47a0b06db32119d06267261d88aa37f00161cb5168a8a1ad96folks-tools-0.11.3-1.el7.i686.rpm226a8a254b48c90facd63d09bd35e412f93b15dd23eb1f191497b35bccfbb1cafolks-0.11.3-1.el7.i686.rpme533dd58e340a239aca8d6c1a69caede27572e67170746537481cd0d2765892eSLBA-2017:2086-1389-Ds-Base Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7389-ds-base-devel-1.3.6.1-16.el7.x86_64.rpm0b81228c110692c35b61bfda90804c6e396417bd712c3b08ebe17337640947b6389-ds-base-libs-1.3.6.1-16.el7.x86_64.rpm4bc41f80eaffaaaf8466788adc5f1fef5a6098d6de2739e2914293f65ce7a2bb389-ds-base-snmp-1.3.6.1-16.el7.x86_64.rpm11705cd74f17d87080cb31811c0ecb4057b08163e2955d4d3025779744bb7e18389-ds-base-1.3.6.1-16.el7.x86_64.rpm519e79d836a88dd5ef501d559754f734170eeb80ee7b25ed90fc19aad3ff534aSLBA-2017:2087-1Svrcore Bug Fix UpdateScientific LinuxtrueScientific Linux 7svrcore-4.1.3-2.el7.x86_64.rpm94e168a3aefbaa693138755809d589de54a10d1d4cb05ada699f4484c6f9f0besvrcore-devel-4.1.3-2.el7.x86_64.rpmc5170130d1149bc499ce5cf3c149f53f9d9da3694112372bf3c0ab7a469b0d04svrcore-4.1.3-2.el7.i686.rpm08e0976bea3c73e7dd65e78b24c46e0331296f4568f83917ad1ad5684f4b5abbsvrcore-devel-4.1.3-2.el7.i686.rpm2757d2c10afa4d712cfef1bc7f82c7ce315d841660526a4b13eae186f02612b1SLBA-2017:2090-1Jss Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7jss-javadoc-4.4.0-7.el7.x86_64.rpm2eb5ec838dd0fa6682fef96255ea295cf0debf2d4054ae7acf6b2dbdd70853fbjss-4.4.0-7.el7.x86_64.rpm478b285cf696b94cfc014bddda99755c7d9ef6c137f12e29de3f02972ed6c91aSLBA-2017:2092-1Libmediaart, Tracker, Compat-Libmediaart0 Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7tracker-1.10.5-4.el7.x86_64.rpm39f246487ec605adf1f00188b6a4af6e662538fa5313f605b475019d546f2c0dtracker-preferences-1.10.5-4.el7.x86_64.rpm96833e718822f4e079924b2022e2315e4a7d363428ef520f26195c448578dae9compat-libmediaart0-0.7.0-1.el7.i686.rpm793da379edaf3f25e808a60e7130d6157f0e5931b5c8f9fca53f1a68ca39e344libmediaart-tests-1.9.1-1.el7.x86_64.rpm2ba2c896fe4595c1e2b7394d25706cac27d4762956557969c76dce17418d1e7dtracker-needle-1.10.5-4.el7.x86_64.rpm1bdc4558958b7f78a5cb4e621de32386afce75cee9c1562d246a970e89d97fb0libmediaart-1.9.1-1.el7.x86_64.rpmbaebc439c026e2147338d5af96fe1ffd3a79cdfa0314841661ee2b21644bcf4atracker-devel-1.10.5-4.el7.x86_64.rpm888d20fe0b8d6d3766fc78d38bf8c33df79793c976581a74758dab35e0f1cec9libmediaart-devel-1.9.1-1.el7.x86_64.rpm32ad78a1ee874aa50a967be54176131413150c77b7859c722cf2118ea833f439tracker-1.10.5-4.el7.i686.rpm3049f13205396a53a5f8d45076ec609b58faf2496d0df0c3c90399dd8cdb494dlibmediaart-1.9.1-1.el7.i686.rpm27cc27721dad244b6aaf6412c99ca1e5f5cd25d2161865bec7d056450454b52dtracker-docs-1.10.5-4.el7.noarch.rpmf8ccd13e3aa0633ca6658e3682139a09f2f4d85a2136d8c2dd13774e978004adlibmediaart-devel-1.9.1-1.el7.i686.rpm0b2cad665844613309ded9ee05e5b4ae9e4b5b1aa6e282e5c6eb02e3ec8e36fdcompat-libmediaart0-0.7.0-1.el7.x86_64.rpm890acff3e67a2307453d9f0d5a2dedd5555163ebd6a4cbb8ea858f0826a3aa83tracker-devel-1.10.5-4.el7.i686.rpmf1c4d8a1087cbe6b5ee50c92924bf44d85779a604a2b698c8301db93e14f60cbSLBA-2017:2096-1Control-Center, Accountsservice, Gnome-Settings-Daemon, Libgnomekbd UpdateScientific LinuxScientific Linux 7control-center-3.22.2-5.el7.i686.rpmfa2759dadb4dcb6011126109b8280dd9ec61dadf4a83233f39ed756d3b42212baccountsservice-libs-0.6.45-2.el7.i686.rpmd3323ade912973e350a9abba9720795d694977670af0de5bd65c9a2644609399gsettings-desktop-schemas-3.22.0-1.el7.x86_64.rpmc90c2435590692ad9b2b796028a665a91155fb015f5f004f889e2ca2b7bfebceaccountsservice-devel-0.6.45-2.el7.i686.rpm9fd751ee7798e49c9aa2b1efbb2bbf98e2362fe20de1eeb4b45cf3b09a2e78ddgnome-bluetooth-3.20.1-1.el7.x86_64.rpm68ea26bb76c58e8d3d311d2e94d1048b28b835b4852a91e0611fc04a0bd0e67clibgnomekbd-devel-3.22.0.1-1.el7.i686.rpm706b925f55ffc6c495edc3e4507f8ca0d27a8cf92e0931a08bb22266f2a4d07cgnome-settings-daemon-3.22.2-5.el7.i686.rpm31dec109593861ae32d790b9dca14eea1ad7014f5262dd73b09777dda9c7a237gnome-desktop3-devel-3.22.2-2.el7.x86_64.rpmfc248f4fc716bd7b61e9aab472e3f4a19df247c664340ed9b9e7dc72948e55f6gnome-desktop3-3.22.2-2.el7.x86_64.rpm1e8213f36a496ef713c4434d2455c165451103aef6d583b7382f558999e7c18agnome-bluetooth-libs-3.20.1-1.el7.x86_64.rpme5d8a9a9cbce1e6916f1d6c2967a4dcaac56055f8f39b0427ff065b14ec311c6gnome-desktop3-tests-3.22.2-2.el7.x86_64.rpmb268e711f3afadb8086e0e76ac276c0f45336c0cdc0eaaae0455467d9de1458egnome-settings-daemon-devel-3.22.2-5.el7.x86_64.rpm9220ef4af59957fc5da6f397d754659c3a096c955be84495b4fc05fbd72540becompat-gnome-desktop314-3.14.2-1.el7.x86_64.rpma11bb6ea7aaca9144b97b2703d18553b861c238379e95b3afb0b69d0c8580affgsettings-desktop-schemas-devel-3.22.0-1.el7.i686.rpm180b8b3c60ffc857306d4ab60ec8dbd5ddeb5ac55cc643e97dea2cf6c4ba7f5dcontrol-center-filesystem-3.22.2-5.el7.x86_64.rpmaafcfb7f59ab6fa9cb5ce55d8e41356086e19eaea7139390411186fd106ca623gnome-bluetooth-3.20.1-1.el7.i686.rpmb44782415d32ed0c500af9a6ca704dac50c6c67d561f7002396b21ac88051b95gsettings-desktop-schemas-3.22.0-1.el7.i686.rpmdbd331ae7648c6c10b55d94f17c4ce8c18e1bf6df4f3a3bdc871bfb32547c48fgnome-settings-daemon-devel-3.22.2-5.el7.i686.rpm57231321fa530126840f145eb55ebfcbec0861841ce8aefcf444ab19f3f952f4gnome-bluetooth-libs-devel-3.20.1-1.el7.i686.rpmfba3ffdd0b66cf1f47ca2b8763c2896f4bb8c1d39e2636442c34a78e5b9935feaccountsservice-libs-0.6.45-2.el7.x86_64.rpm052b4a4bbf79de6d3e6de5af48bdddcf5e6ff35b35ed4ea942fe74b95a3ec73dgnome-bluetooth-libs-3.20.1-1.el7.i686.rpm489310110465340de4ee61543ea969ef2bf6d018edf5519b7ef359484966f891libgnomekbd-3.22.0.1-1.el7.i686.rpmc4975e8c396b9a4649b48aa869e453074e20e9934d7dd965c2f80c0d0040046acontrol-center-3.22.2-5.el7.x86_64.rpm6828d63ab336f6e40e9567b0a3eb423588268f61c9dce202d907019ea746d6f7libgnomekbd-3.22.0.1-1.el7.x86_64.rpmbb94fda3e305d00d25cb2447f47d702965d0a230d74b8a094ba42e57d8ac1ec2gnome-settings-daemon-3.22.2-5.el7.x86_64.rpm2adaccbeb8f37908a222331430079b7b5e865a443e0dcfc37c45fa01835e437bgsettings-desktop-schemas-devel-3.22.0-1.el7.x86_64.rpm0930435012857e865ef7b3503b1622c6e007f0e2e11ebdd656c09867e7e0f0e6compat-gnome-desktop314-3.14.2-1.el7.i686.rpme8e9a155ca6710372b29bdaaface42c3069aeabe067be01005c52e6ebb59d732gnome-bluetooth-libs-devel-3.20.1-1.el7.x86_64.rpm38536ecced86ff0d9888022e884daf7ec57b5bb12ae2de7322d1d3999776ce05gnome-desktop3-3.22.2-2.el7.i686.rpm2895062684b8b46929ab71873624bd5bc3236a47d0ce4a1a3a9e1369e2681dbdgnome-desktop3-devel-3.22.2-2.el7.i686.rpm55c0cd9d0768b1723cf42367c2d13ad4a3ccb15a8ab344246d5fb67a810a817eaccountsservice-0.6.45-2.el7.x86_64.rpmd8e28a635ca01c45fea3795d507b2cf22cd105336b84b027e2ced85285b01b76accountsservice-devel-0.6.45-2.el7.x86_64.rpmab99603c90ee1bfb2dfc126a7c62baf84b958cd47fd144f8b9b391084479cb2clibgnomekbd-devel-3.22.0.1-1.el7.x86_64.rpma9f663eca46485d1d6a3b95a71d384aae3e128311526636b2794b453e8922362SLBA-2017:2098-1Gnome-Shell-Extensions, Gnome-Shell, Mutter Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7gnome-shell-extension-drive-menu-3.22.2-10.el7.noarch.rpm54094cb45b413924bac24b92fd2ae5534075b35059de83f0f51fdc3fdeaf4d7fgnome-shell-extension-native-window-placement-3.22.2-10.el7.noarch.rpm993fd8b0f52b69ebd3b85315239f1ec50f1eeb232622fb682e3c1a0c5c78c161mutter-devel-3.22.3-11.el7.x86_64.rpm6c1e3afe1e77de2d56bcb4c99910daff3f935d76922be95310c54edb32658fc6gnome-classic-session-3.22.2-10.el7.noarch.rpm8b78de3e3f0c64afbf17a11563f4a44aeeffc71386f9d1ca22ac197562c2c97egnome-shell-browser-plugin-3.22.3-17.el7.x86_64.rpm38d73761ddc4a44f38a7659928508f6281be142562d997841cdc78bf1a31ee36gnome-shell-extension-screenshot-window-sizer-3.22.2-10.el7.noarch.rpmd7614dc8b25c963b1f74f19009bab03883f7f3e71a49532edc13b3410a9d7a5bgnome-shell-extension-panel-favorites-3.22.2-10.el7.noarch.rpm560cc0a409d1ed0a31a4042be1623ec9a7308c331b54d59830dc9f750c8d5436mutter-3.22.3-11.el7.i686.rpma86b52e3e10de1ac1efa633b4fbcdc585f98ac1993737bd6a05810386cb289eagnome-shell-extension-window-list-3.22.2-10.el7.noarch.rpmcc45639f2280ececbe8ad70cb2c2000593f7e67b672c940a5b7913645b0ce486gnome-shell-extension-auto-move-windows-3.22.2-10.el7.noarch.rpm100ee1831888994ad95321a6c462df2f50c8806eb5a6d72b268fb91f56254cfcgnome-shell-extension-places-menu-3.22.2-10.el7.noarch.rpma4c4a4491e9ee7ea8e233bd586cefe2599e2729f72df343e935b240501659891mutter-devel-3.22.3-11.el7.i686.rpm6006087b823f8cecade6bba103d0bb898c05588a383af31fc1cca7af0ee1ded2gnome-shell-extension-alternate-tab-3.22.2-10.el7.noarch.rpm975c9eb8c0d7aa4eb54751e79beb2c292e3acdfd47b86471876b296e26aefb58gnome-shell-extension-systemMonitor-3.22.2-10.el7.noarch.rpm3616c5f6a8bdaa5c99a3f90fc7f96284903b7230b5fcd70937aa0af14b2b555cgnome-shell-extension-windowsNavigator-3.22.2-10.el7.noarch.rpm6d46e3bbfc050c2f88baf5ce82c12e86098f37b20b32ef3afeb20d26f5e3dcdegnome-shell-extension-top-icons-3.22.2-10.el7.noarch.rpm4cec06a572e5a049fe9043e262317a7b514da7964735463eb4c4d81cfa0c5713gnome-shell-extension-dash-to-dock-3.22.2-10.el7.noarch.rpmd6c964f362801a0f4b7ecf5cb4ba2e93d454b7b270ba36061ec624441dd3dbeagnome-shell-extension-user-theme-3.22.2-10.el7.noarch.rpm7841db5ac01f82b4091b8e0affda409fd26557b3a05ded608fa0e727b60debafgnome-shell-extension-launch-new-instance-3.22.2-10.el7.noarch.rpm553ed579527e6d57800e26c6906b8177413527ceb1e47d771cd5134f81f326f8mutter-3.22.3-11.el7.x86_64.rpm29c0f6bdc679e92d44ce74e7419f4c7d61b4832472586794ad4761a3c6e82327gnome-shell-extension-apps-menu-3.22.2-10.el7.noarch.rpme1a9d7f2c814f8bab4d15586d7f5c6d7cbff2681ed56172e765c04b114b20137gnome-shell-extension-workspace-indicator-3.22.2-10.el7.noarch.rpm78931dbd78c83dac8631e7440aa01f99be53e0ae415c8b1830e3b09f250cccccgnome-shell-extension-updates-dialog-3.22.2-10.el7.noarch.rpm018d0552e1d78d760d17e6f10c77ccdff42caa64c3603edeb6fe77e6e69c31c0gnome-shell-3.22.3-17.el7.x86_64.rpmd764b305ee37a54167eea3070ce69cf9658d1c8df03291951bdcac7cf0ee4da8gnome-shell-extension-common-3.22.2-10.el7.noarch.rpmb5a9ce05bf262f608aec86596a164f647d95fe7b78dbf27113860e7503fdfccdSLBA-2017:2100-1Gtk+ Bug Fix UpdateScientific LinuxScientific Linux 7gtk2-devel-docs-2.24.31-1.el7.x86_64.rpm481721377789957dd0c6b2da97a88d10031e1e6379cd954b4c40f7d988fba3aapango-1.40.4-1.el7.x86_64.rpm59e3250bf4b477cb48ec4dc67fe09eb2f38d2cc7437d0b1ea01024250dcecb1fgtk3-immodule-xim-3.22.10-4.el7.x86_64.rpm66fef05f6789746197e2d1ad13025e3d20359d349f2c0dc6a09c7b2e206605cecairo-tools-1.14.8-2.el7.x86_64.rpm3572354a18c3b0a4853188f6153e4b88d5334d6f2c562d8b981390f0c88a6b9fat-spi2-core-2.22.0-1.el7.x86_64.rpmdcd2b7cb1d7882db7595dada512f86a4ff7fa99987fd6bca9b43a868ca1345b5atk-devel-2.22.0-3.el7.i686.rpm727fb7064aefb4f981e1bf3adf56dc2c62eff9fc622fb9539abbab13cf87b069pango-tests-1.40.4-1.el7.x86_64.rpm8e459077256fd9f06a30c1e34cf636cc016eb79c30741561daec9444af872b75glib-networking-tests-2.50.0-1.el7.x86_64.rpm2009c282af9f873cf0634dd84d8802adfe44d86b45f336d46f362d72e1f24b4bgdk-pixbuf2-devel-2.36.5-1.el7.x86_64.rpme1aec48681101d5af20d8e8ae16a96b0eeb3599c0c7b7e138efad548d64e523eat-spi2-core-devel-2.22.0-1.el7.i686.rpm2062efc807e40962f4e30b369bf95f9d26403feaceac3da10c8006e01547d90fharfbuzz-devel-1.3.2-1.el7.x86_64.rpm90e3ff66a74e9b13fa121869d12714c2712cd21bc5406cffd76e952d63bb6d8ejson-glib-1.2.6-1.el7.x86_64.rpm14200668823ae38cae9fb34c1ddb250f7bbd963b19994f9b14e2a05c99524720harfbuzz-1.3.2-1.el7.x86_64.rpme3fb50c8d970cb450c0e800c340361434f2df12788b64f7ccb7d2d549553a31agtk2-immodule-xim-2.24.31-1.el7.x86_64.rpmec4e52c5e4eb2a8579e1eb634a83f75d670652b30cba9f93904a3f82b9087c5aglib-networking-2.50.0-1.el7.x86_64.rpmef039bf264d4c43a070c1187e0fc6902f2d4d5ae5a14a98da10d5009da1dd30bgtk3-3.22.10-4.el7.i686.rpmc9c86400828516c49f889bc23a0ab13bc785fc5bdf4ec6e09044575be8debfebat-spi2-atk-devel-2.22.0-2.el7.i686.rpm1f8883bd44cdd6815c5a70f9c25125d20b2f8ac77b55e2e355da54de9dd8f07cglib2-2.50.3-3.el7.i686.rpm2adfabba66752898874a2748a484794b52499fd24b0d8bc95db26d09349c304egtk3-tests-3.22.10-4.el7.x86_64.rpm8a5d5ee0ebcb45fb598d2af25d0ab00a671ac5bdb9fe007936ca6f05179238fegdk-pixbuf2-2.36.5-1.el7.i686.rpm983fbc556f52266abcd210907efe30b71f7e3d37fc9a0edb2d34d70c02cc280eat-spi2-atk-2.22.0-2.el7.i686.rpm9a663fd70191c96fa10bd55c37f2d46007116f92b7e5ee74f5192defa41e4c5ejson-glib-tests-1.2.6-1.el7.x86_64.rpm8bb995e0f70b7ea9629edf2212ee80f8518bf4777d1c6363ad63eaa9393bdf38pango-1.40.4-1.el7.i686.rpmcffba90c0847f0320a06b4b26e0844d21c61c44bf33598bea9531c8820544813gtk2-devel-2.24.31-1.el7.x86_64.rpma9ec18972e03a9d37f84e361c1d6859a370e93692b6680c11c4a9621b4a4fc25json-glib-devel-1.2.6-1.el7.x86_64.rpmc1e97bcf828493b41cdfdda1fbb8b8972715d0a7ce7ffb44252c59f5b50145dbgdk-pixbuf2-2.36.5-1.el7.x86_64.rpmffeec13b397ed1b1b499989aa0b2b31e92337b700c97f3b817fe8c9fbebe9711gtk2-2.24.31-1.el7.i686.rpm5f231b0d0763260006953c40fd1a9b40fe8516ad465a9d0cb2df0f756811add5pango-devel-1.40.4-1.el7.i686.rpma0357fade657a714a0b1d0ef8d0ab8613a93126d5e9f9ec444a91e84d0bbf999cairo-gobject-1.14.8-2.el7.x86_64.rpm66768b69f7d116c2b0cb50b8f172ee1a90934e7714084e34c97c3b28a8f0441catk-2.22.0-3.el7.i686.rpm5840688062c680948843ddf616d5e08603d611152c032ca9c9b0ffecbeeadd10harfbuzz-devel-1.3.2-1.el7.i686.rpm9d204e33233ca6320be609e7e71f52b202fd975d658ec83ad8cb203bd9f658e0cairo-devel-1.14.8-2.el7.x86_64.rpm935ea0938bef76e21588d99e6903d28a67d274cb1ed5e3113f38340401ba01d6cairo-1.14.8-2.el7.x86_64.rpm9ae48a0656cd31adba7c86e7f26fda258ecbfcb9eb9f12f2a8ef3eda8c00612agdk-pixbuf2-devel-2.36.5-1.el7.i686.rpm1098f8e26c28f09654941ec523e5dec478a1e631f2802118ba39080bb9f94f41pango-devel-1.40.4-1.el7.x86_64.rpm51000e4c58e978d09059fb58be2f6c8b42f58de76258460c31f0bd8b02e2b299json-glib-devel-1.2.6-1.el7.i686.rpmef588d23a2bd73a14b35f0796e2e60d8d072264ddae306be50212f6e4037f591cairo-tools-1.14.8-2.el7.i686.rpm844a006204c0b01e99d2c28e376140cbdc64214fb04a61770c67002b09e5ff81pyatspi-2.20.3-1.el7.noarch.rpm06abe897eab945fdb6ecf3a2cb737f2c613d6f53b4444751379380d65c90cbaaglib2-2.50.3-3.el7.x86_64.rpm00b30668bf8c66bd98a12cc623c6b753705f0cca29a3ad09d2da63a8f7b5c1fegtk2-devel-2.24.31-1.el7.i686.rpm1743de1130a57929723e0974f5c408a53336620d80c6aca39ba2311f3f8fe436at-spi2-core-devel-2.22.0-1.el7.x86_64.rpm8681d06949a18f477540e855284706348083e00b8f85314acaa6620fc187029fgtk-update-icon-cache-3.22.10-4.el7.x86_64.rpmce0ea1b4c4204b281a899fa610fd68533f87d19440131190813115b2570a8780gtk3-devel-docs-3.22.10-4.el7.x86_64.rpm7a16633af76dabbddd37136fdf788d2c0b079e5be5d16f9a7e6acee08a661141cairo-1.14.8-2.el7.i686.rpm838c554e9210aca63f892837a297e64b58e358ef1e28df6b66b3f53fb6bf39f9glib-networking-2.50.0-1.el7.i686.rpm29c1f1ce5102be69e2b374648f817186dd3bb65e093a43145833f1a13d336ca5at-spi2-atk-devel-2.22.0-2.el7.x86_64.rpm3fe666ee84fcde30d4157be7acaa3b8b91ad16b2981e44f83051fc9f9d5fe67aatk-2.22.0-3.el7.x86_64.rpm7a02397c8d207c00c64c574b9b7196e2d2465e1c0fc17b0a6be101ec54430982cairo-gobject-devel-1.14.8-2.el7.x86_64.rpm74f3e33669f7943942b955ca032f3c0fc7e9f451ed36d4c1a5b4a84d4fce17f7gtk2-2.24.31-1.el7.x86_64.rpmc07bdb5b124099dce02f8c5d7604470a70536a041eef8ff889e3bd6f271e7fbfat-spi2-core-2.22.0-1.el7.i686.rpm663d2ccbbee2c73ab56432cbe2f47ff017bd97811be836fe1aa6efb574d56ad4cairo-gobject-devel-1.14.8-2.el7.i686.rpm1bdaa148c161f5a22f9e55f8a56affb75c5ce31ca40f2da000ff475d90cd41e7harfbuzz-icu-1.3.2-1.el7.x86_64.rpmfd54fdadb6c3f665fef3badbbddb4618e8e8c225ba436b66ef8dbf76e7e982acglib2-static-2.50.3-3.el7.i686.rpm17c78a4d37ce155716f7482645387f2c5d2494885ca01a94c17669d1df5c8a97json-glib-1.2.6-1.el7.i686.rpm906bce98a6c8f32a25a460c2ec66040473e6fe9146d21067ff57f9b2737daa24glib2-doc-2.50.3-3.el7.noarch.rpm383d9d71a25056a11796084d55164f927f5c104b9d41f74a91b7ce7ddf2cfaf3atk-devel-2.22.0-3.el7.x86_64.rpma24a92707608e77b5c99c72a6a8972ce471ebf4082241fbfba27dee9e3f64cb2gtk3-immodules-3.22.10-4.el7.x86_64.rpmece5099cd40c0d88f9785b1c5e1e60b7f7d8791a0efb0b3050ac9608ac9221f0gtk2-immodules-2.24.31-1.el7.i686.rpm8c939164f71ec38dfbea9c6526d703de651c34191305e387419cfaad1f2b4128gtk3-3.22.10-4.el7.x86_64.rpm82a3adf294bae2b6ec25143ca6d30604c6a5da5603cac24bb4afd18a28ba9676gtk3-devel-3.22.10-4.el7.x86_64.rpm38adfb64d882ae769f8d00b8f32f01457df6dd15d39c742254dc6254b0473e15glib2-tests-2.50.3-3.el7.x86_64.rpma97d18b9450d1f960bacad083fe246e8ff7fd1cf17d199695a883c0e03147716gtk3-devel-3.22.10-4.el7.i686.rpm85f0f57a55dc88549fcb4e95622760ecf0792ad2c68ad80608054122f277ab99at-spi2-atk-2.22.0-2.el7.x86_64.rpmdb477b28d2a890bf9fd67bcd509a95361ddd23253febea19342ce335b72e196cglib2-fam-2.50.3-3.el7.x86_64.rpmd2ce8762abb09baa66d784d7dda94a6e4c87915984efa74f4d3bef1564adfb5eglib2-devel-2.50.3-3.el7.i686.rpmadd43e0f9b4c612e704cf137267055630447c10217ea7a1a68e2f2d4592409f3cairo-devel-1.14.8-2.el7.i686.rpmd0fa10a5fd42f14b52817f64d57f801e1370b1505a6b0f02de420845773cf50ccairo-gobject-1.14.8-2.el7.i686.rpm6c0f5c6ae7ac27956c5bc2499d17759e6e66e278fc6773a4e30d88affea6ed20gtk2-immodules-2.24.31-1.el7.x86_64.rpm1ac702af8b4034188440a2daf4ca65b4bb1bef886de3dc73662d2d6dfcc9f3f4gtk2-immodule-xim-2.24.31-1.el7.i686.rpmd34636679547909e6176a33d87477cd21441921c90472780ab0b75cc32d79aabglib2-devel-2.50.3-3.el7.x86_64.rpm55f0730c2ac8bf7be01296e591b257182006ec4d1edfae12155a3f31cb940695harfbuzz-icu-1.3.2-1.el7.i686.rpmbcb71348b0649e64a38f89eed4aba77d2c771dda74c1db545ade7cbf97abaa61harfbuzz-1.3.2-1.el7.i686.rpm3a630ce5537aaf8d27252fe7a970dd1e14220d95ed7f25f20c3a5063240a0960gdk-pixbuf2-tests-2.36.5-1.el7.x86_64.rpm8c090f9eac0561b8e1951930715223c0eab9cecfe9cdfb7a9713b4edb5a94864SLBA-2017:2104-1Gnome-Themes-Standard Bug Fix UpdateScientific LinuxScientific Linux 7adwaita-cursor-theme-3.22.0-1.el7.noarch.rpmef5400d1f8c1016c349909f768a0fb1af5f7c3890f1a5f78fd387af81b92729dgnome-themes-standard-3.22.2-1.el7.x86_64.rpm518ded811c456e50c2abdacce94f9faf5f40643c54120b1c965f13d8751470fdadwaita-icon-theme-3.22.0-1.el7.noarch.rpmfc0dbda1122f4726d4c13eda399a57727e3e10cfda0525c6a0813d276979a597adwaita-gtk2-theme-3.22.2-1.el7.i686.rpmefb97a1b614aa5d07df1f87c9831fb812cb7490f81fa555de664a5623d6048c3adwaita-gtk2-theme-3.22.2-1.el7.x86_64.rpmd0604fed6526cd269fc94fb86155ec596bf6c7c2dd31ea811db23c3104f57767adwaita-icon-theme-devel-3.22.0-1.el7.noarch.rpm51bf7e3e9b7017c3f0d6996936bedfee938be0a8d4a7c59dcaa736f78384a6a1SLBA-2017:2106-1Gtkmm Bug Fix UpdateScientific LinuxScientific Linux 7gtkmm30-3.22.0-1.el7.x86_64.rpme4be1db825de42d1df1acae67f4b8e8b17d6e3e0ce5653546825c2f5ad9cba59gtkmm30-devel-3.22.0-1.el7.i686.rpm4970b1117530e6a95a9a23260b1b31e876d18c99d80d93f2b86a3e0119e1be90glibmm24-devel-2.50.0-1.el7.x86_64.rpmc2ca207bdf044b5c60e6fdc8f598aeef8f9c59420845758e38e2e804989e4eccatkmm-2.24.2-1.el7.i686.rpmca42a2531a8e83e9fec0127d45ae13f0a8068eeb6365ac935ee4be90aed6f6a6gtkmm24-devel-2.24.5-1.el7.i686.rpmcdfaa805c12ee6ecba377e72f5b48431ba3b97f8600c81404430d57d74db30beglibmm24-devel-2.50.0-1.el7.i686.rpm7efb256b3df3d513b6a77cd4e725fa3491d60317442f54320a04363be26f61fegtkmm30-3.22.0-1.el7.i686.rpm6c0d0c5be14ba8a02418dbcb7ae4270f9382bea355dbde5aec0386e87040ba3ecairomm-devel-1.12.0-1.el7.i686.rpm02a2d46520ee1e97ac1d996cf9ecdd4180e020d5b7c431f81592b3a8c7eeb2e9libsigc++20-doc-2.10.0-1.el7.noarch.rpm8bc3bb6275d3e8ef98d96ce8c1f9cba7e697a72f6eb0c4ab189a2ae3a581bbf1glibmm24-2.50.0-1.el7.x86_64.rpm7b1d2364ae92dbb477f1206ea71482c4eba431ca1ab6f509e608185bfb1c2266pangomm-2.40.1-1.el7.i686.rpmefeea05a4796b8b0743830c7548e3cb1ff78a0b518bd16a4165c95ed9fe4ec30pangomm-doc-2.40.1-1.el7.noarch.rpm884ca5878ea7470756ce4972c96e190f69a3ec02e3c028e4d952c5ea70de1d91atkmm-devel-2.24.2-1.el7.i686.rpm843036d999e48c4b4923ba1ef15c96afee629e9e8aa556089756591e0e5657d0atkmm-2.24.2-1.el7.x86_64.rpm33a4df6fe55056121722b055ed81bbed8fb4d2f225c439c86f620a7d63cadbafcairomm-doc-1.12.0-1.el7.noarch.rpm63fdee3dabb06c22b7a5ce52db7b1adc434abe112af9ca4327330e7724cfeb72cairomm-1.12.0-1.el7.x86_64.rpm4d142e6b18925c1509f9f7783d2d654e2472a9d3d0e53d36c39b0182342594d9pangomm-devel-2.40.1-1.el7.i686.rpm18574fe61cdb17f6792ea5e837ff9311a6cc8c5974b2c877eb43773ed390464ccairomm-1.12.0-1.el7.i686.rpm6d139b1a37504ba87e8c5b92c8b49de15b86d5839f30bdeb5772c5ffae15038batkmm-devel-2.24.2-1.el7.x86_64.rpmcc62ea4913190730ca501c0035d34911a6095fe3c790260a0f22f41bca476165gtkmm24-2.24.5-1.el7.i686.rpm744d475fdf353da8a114ed7d6aa37b1d7eb92159a6a829ec62805205334cf913libsigc++20-devel-2.10.0-1.el7.x86_64.rpmac02a2cb937e13339095755e491d795ae195dc78b01f2562def6f4dbc08e5f9bgtkmm24-docs-2.24.5-1.el7.noarch.rpmb6538bdb9bc3c8601dae7a70105a8277b4da665a4d4ee8dc89fd77d0c7ccf6f3cairomm-devel-1.12.0-1.el7.x86_64.rpm3efc54c4bd67c60d97d2aa6552722d62fc82ded6e75f19fd6c4d5bb4d4a7c117glibmm24-doc-2.50.0-1.el7.noarch.rpme9f2840d31918436af1593bd26c733651f43fc0c09f2e324bfe70d3196bda000pangomm-2.40.1-1.el7.x86_64.rpmefee4e5d235407bbbc19f7a9ecf7eff6ce7234eb44c1d7f813af79ea0747921clibsigc++20-devel-2.10.0-1.el7.i686.rpmff7311950d7f86f6228069519e97fa9fa1f0f81aab9ca5cbd4296123a7db95e4libsigc++20-2.10.0-1.el7.i686.rpmd9e7e2585a73d7b4b81aebeaf5ac74d795061fc279b5b5fb8b339916fbd26f24gtkmm30-doc-3.22.0-1.el7.noarch.rpmc9cf5bf55655c58e58f8f9638ab687eb445d39ceadb83275bb26fa71a5b89263atkmm-doc-2.24.2-1.el7.noarch.rpmf4568aba10c059a12df4b532fafa98279e1e4a17233743403e8200229286a20elibsigc++20-2.10.0-1.el7.x86_64.rpm90eaf4e65c7f39509ea7624425091987292cade99108a30873c97f6036294ae4pangomm-devel-2.40.1-1.el7.x86_64.rpm254c93003da67f767725d9180e489f48b422fdee0167975836f69192c880c67agtkmm30-devel-3.22.0-1.el7.x86_64.rpmaacf4b6e01e06c54e96707db324aefc34a7bd4a0dd4c76c74e64ec8f3b0c3419gtkmm24-2.24.5-1.el7.x86_64.rpm78d1b419ea1265c260e2abec4744c297960eec29bf25d27e59d0e9b1382d101aglibmm24-2.50.0-1.el7.i686.rpmee0c82fbb19550b3597661de6a1fab52a20fa2c81ec111a3e5c6851e6b57a842gtkmm24-devel-2.24.5-1.el7.x86_64.rpm9cc677906c52a90309d64b19f86af175c6add78285bebac45689a7bfc343555aSLBA-2017:2108-1Colord Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7colord-devel-1.3.4-1.el7.i686.rpm778efa4433e460e3b72b3102ee9b2b4055ba75c71541f27480d897bdf2f10ba6colord-devel-1.3.4-1.el7.x86_64.rpmef3446b32156594a3b39f454261a7608c7076a82d2ed58c6ad3edbd7aa8fbe94colord-1.3.4-1.el7.x86_64.rpmd08ac3e5dfc112bdcb51dfd43456b35852d5403fbc7c4c5d8ae0cd19c287416fcolord-libs-1.3.4-1.el7.i686.rpmd8e09addbea709c8bc8210e7ef9f4bd6b18ff238dfc9283f76550e7a23adf4e7colord-devel-docs-1.3.4-1.el7.noarch.rpmd34e05453213430bd1e831531d7d138b866caa37aff5186f8468549b39f72ea7colord-libs-1.3.4-1.el7.x86_64.rpmb4b62fe303d264a5567f3aba52de9fdf781919804cfa3b8d0d147e8f270212a4libgusb-0.2.9-1.el7.x86_64.rpme8be8a9bb1590ec79f2661154638af4ca57981ab824712b693ddc841741ff479libgusb-devel-0.2.9-1.el7.x86_64.rpmb1865d51b0cb877c55c407635475d4777d404746b8cb74b2d79ed027d79ad49fcolord-extra-profiles-1.3.4-1.el7.noarch.rpmbd2468fa80ae97ef93f8ee6d80fae770d0a7f4e1b6db8ca12b04e36221b7d03alibgusb-devel-0.2.9-1.el7.i686.rpmb528077f33ef6f3c980742c1a2ac8b07f9f41c47dec8f6857903a75f576ea412libgusb-0.2.9-1.el7.i686.rpm043b0dc8f7cf848dcdf6ad71a22aa0d310a52118bd02adc4ea0ec0839b0018f3SLBA-2017:2113-1Libosinfo, Osinfo-Db, And Osinfo-Db-Tools Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libosinfo-1.0.0-1.el7.x86_64.rpmff0ba973282010debc045626e3a689f562074772dadd2f573f492efd29cbb65clibosinfo-devel-1.0.0-1.el7.i686.rpm98b6fc6b84c4eb71c05d26ef4dff0630d52bc6e98cd8e9e22513fed5b9f3b017libosinfo-1.0.0-1.el7.i686.rpme44a683f7e8de7d65f371a33cdf3342047571dfae0bdcdcd05fd9dc4f75add10osinfo-db-tools-1.1.0-1.el7.x86_64.rpmb3b9ae0c4d964ce368250309173f54bc060fe4b4d912e14b3dcae866f18fcbd2osinfo-db-20170423-2.el7.noarch.rpmc091b060906f451bd617f9e88107be8f2e47fcdd90cfca94024b88ccdb03fd38libosinfo-vala-1.0.0-1.el7.x86_64.rpma55cc41519650d460421f89665707b9b576e4af81cd22c1e207917647e9114bdlibosinfo-devel-1.0.0-1.el7.x86_64.rpmc5b9f575221ae833323945352278a6c4b95a34a6364798bd9e30d32705c58f7bSLBA-2017:2118-1Gettext Bug Fix UpdateScientific LinuxScientific Linux 7gettext-devel-0.19.8.1-2.el7.x86_64.rpmeb5387a6194e14193bc236187ca28ba8530c7f10cacbed594b415cd6b6adb311gettext-0.19.8.1-2.el7.x86_64.rpma3e3b52655e05ec6afe3aa268098de31eb1b42399678453361042f6d3241f29dgettext-common-devel-0.19.8.1-2.el7.noarch.rpmd172104d29128012310c26306166953e2bdfc648438b5f87ecf22946723587f2gettext-devel-0.19.8.1-2.el7.i686.rpm4ff52defa211e9acedd3de0283a014fe0d6a7109da93f44457008ac41340f6e6gettext-libs-0.19.8.1-2.el7.x86_64.rpmfc066515192555ed76f8d36a941706afb822a243f320419616f9e697fb4276dbgettext-libs-0.19.8.1-2.el7.i686.rpm05a25490f19da95bb027048a55d4959fd95860da9638240fa8deba0cc74e58b4emacs-gettext-0.19.8.1-2.el7.noarch.rpmcff25653e6225feb543c2be51ef399d878a60d6faf39a8f8be1e1e6d0a763f1cSLBA-2017:2124-1Gnome-Boxes Bug Fix UpdateScientific LinuxScientific Linux 7gnome-boxes-3.22.4-4.el7.x86_64.rpm107344b0a356ba7e038b45aab2be01b4e66d490e1c349d3bc9a6e7ecf36e6e7bSLBA-2017:2129-1Custodia Bug Fix UpdateScientific LinuxScientific Linux 7python-custodia-0.3.1-4.el7.noarch.rpm4ebc58c13804cf0c39bdebc8fc1c43a529e672add979337bbd71509b802dfb21python-custodia-ipa-0.3.1-4.el7.noarch.rpm308304af155981d851a12fb7528405453b25ce78812ed93211c707d14836fb6acustodia-0.3.1-4.el7.noarch.rpmd6ee1fb2ab20a51dcb2e186b4899026c3381c4de162a66fd71fa3e87affc1c49SLBA-2017:2130-1Gnote Bug Fix UpdateScientific LinuxScientific Linux 7gnote-3.22.1-1.el7.i686.rpm833ce2c7ea4c6e07647bb00133ce43ab83fe2db4eeb57da11efb8516a79b8e2fgnote-3.22.1-1.el7.x86_64.rpm279b990112700202e6113425a1bfe60992dad5a54146fe6d6be81bc7830c9f28SLBA-2017:2132-1Gnome-Calculator Bug Fix UpdateScientific LinuxScientific Linux 7gnome-calculator-3.22.3-1.el7.x86_64.rpmc10155ef7445c19210bfad85e94d25caa7f428857aad52aabe067b562faf2fe2SLBA-2017:2134-1Gnome-Clocks Bug Fix UpdateScientific LinuxScientific Linux 7geocode-glib-3.20.1-1.el7.i686.rpmd5e643c2c36264c7f1c1d7b435015147c922b38660d79a94633f3c84d7d57368geoclue2-2.4.5-1.el7.i686.rpma40036a639eb8a9315191552f97f7ce13f2cd1708130af5357619bad83ffab73geoclue2-libs-2.4.5-1.el7.x86_64.rpm7302fc64d0ebaadd417fdbc0e24242d96947b6241217e14e6d26333714e86069geocode-glib-3.20.1-1.el7.x86_64.rpm9b8224f900c271fab95f92a3eaf3a71dee23bf35ada0037af35b1f6c5663c6dageoclue2-2.4.5-1.el7.x86_64.rpm6143d90148e3273e771c066bb535ae1107600c9c5b76721735ccdae266799fbegeoclue2-devel-2.4.5-1.el7.i686.rpm496be0f7e6d7987b6907b64cef69edb7e6964992fca509b2ab61745ff524b14egeocode-glib-devel-3.20.1-1.el7.i686.rpm3956d61fa3c2969767d1480f29b9fdb1460efad05c3a9308b306fec331244236geoclue2-devel-2.4.5-1.el7.x86_64.rpm51779f167f88a6d418c3e2671294fe3f9969a72b731536ef8aa148145d83f011gnome-clocks-3.22.1-1.el7.x86_64.rpmb0c33ad10da6da6c210c241cef68c3fc1c3e7ba5a21c3d66cf375f3f7492e4f0geoclue2-demos-2.4.5-1.el7.x86_64.rpmdd8a65906edaa6a036eabe0f7a49166c56f839562d87b2cf0f623781b1ba7f5cgeoclue2-libs-2.4.5-1.el7.i686.rpm71fe3409f0d025d86c639d0d50ea133a42746c0444007f80ab4521732490faf6geocode-glib-devel-3.20.1-1.el7.x86_64.rpm038c7854dbaf1ebd318c58ad1b77bd84d33bbb5a2768754e9076c84f20b264a2SLBA-2017:2136-1Gnome-Dictionary Bug Fix UpdateScientific LinuxScientific Linux 7gnome-dictionary-devel-3.20.0-1.el7.i686.rpmee6d25fba165c5974ee55c93cbcd4f5e4f623fdce9d826d402af0b9ce2f36035gnome-dictionary-3.20.0-1.el7.i686.rpm18709887e1baa6363648156da553e49d2b913195574714cafb398aeb4eeabee2gnome-dictionary-3.20.0-1.el7.x86_64.rpm5f502f4a31c871e7d21221e5c308b2debc09958b111d5da4283da4e5fc2a58f4gnome-dictionary-devel-3.20.0-1.el7.x86_64.rpm1a344d154a141ec3a9a058a15367a806217dab0ac9e0237d61d784ad283603fcgnome-dictionary-libs-3.20.0-1.el7.i686.rpmbc5be29356a331fecbd81caef0364abac3c3fbad0febc02e5d61e6e64a50b937gnome-dictionary-libs-3.20.0-1.el7.x86_64.rpmf50db80cb8ffca27305828db5134561e8e0039d134aa2513516e8c056d324567SLBA-2017:2137-1Nautilus Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7nautilus-devel-3.22.3-3.el7.i686.rpm1f2e256beea209d6b6f2fc396b2598559ad2451575456e13ed1bcf5ae9bcc1e7libgphoto2-devel-2.5.2-5.el7.x86_64.rpmcaf34fba397c713d06441a8a8fa9c6cc03d1dcf37689eb50e1b6e1c171a5ed2dlibgphoto2-devel-2.5.2-5.el7.i686.rpm80196ba7d07d2e076d316b44deb2c525c814b9babc270d99393ad32b2817a498gvfs-smb-1.30.4-3.el7.x86_64.rpmd8ee30236a8e1de8f97961ba63dcf772dbd4235d915cc1edab72871103106503libplist-python-1.12-3.el7.x86_64.rpmd7623dbfd7ca7df1bdd53b6e38cdc4f16b06b162bde6c272063b45313bc28741nautilus-sendto-3.8.4-1.el7.x86_64.rpme80f5a803b5db52cf0a229301437c10a3382baae0f6b5d10919b2909ad033fe6nautilus-3.22.3-3.el7.i686.rpm1289f773fe1fac23d4a24d8a75987201fb6ca0bf7bb62da101c527b2cfd9cd83gvfs-devel-1.30.4-3.el7.i686.rpm374984624a2f0cc18502f3b1c22bc03a8889c5c84317df72974885f79e8d73f4libgphoto2-2.5.2-5.el7.x86_64.rpm7b8ec1e35b66e231596d0b1dd80d958aecb66e00c122d45bbe6dd40b0a8d0203nautilus-devel-3.22.3-3.el7.x86_64.rpm486977d499edc165156a88b5185b8041352fc3f18041d3ed7333b40d893703e8gvfs-goa-1.30.4-3.el7.x86_64.rpmcf77535378a229f2025e0f16da23cfecf0468ae203855ce80cc4186636102c0dnautilus-3.22.3-3.el7.x86_64.rpm74000268ef85ef308b089e0e0d3f26b671c8418827ce900c13bd717687ccdf8dlibusbmuxd-devel-1.0.10-5.el7.x86_64.rpm4448dc5a48a7ba2d303c2bcd02e986c16393438caf0675c616a7dd7a20ada11bgvfs-tests-1.30.4-3.el7.x86_64.rpmfc43a82fae0758fc690bed979059acbf5801db61d3e65c1ce0e38bd20bc0ec15gvfs-fuse-1.30.4-3.el7.x86_64.rpmca09f092be3b525d6d878560cfcfd0e322fbb37c1d1670a9fb371b64940cd70agvfs-devel-1.30.4-3.el7.x86_64.rpm0116838db6308219e4a4569d2c9df22e885df0eedb11fb60bb240a3a7159b569gvfs-1.30.4-3.el7.i686.rpme5025c1228bc1b37a78ec4ea087e8c16979aad0ba086cc75de0840680e43ebadgvfs-gphoto2-1.30.4-3.el7.x86_64.rpm501eaa23c29eff4ca531ea71d824c780194e92ee95474d2ba7fd688c18fb6d2agvfs-1.30.4-3.el7.x86_64.rpmb75589ff8c56db3989086905879e29934094a0932c137a305100ef3abe60468fgvfs-afc-1.30.4-3.el7.x86_64.rpm40e10b4cbdad8d9f0ed1609d66c111cb93a0e338a64dc2c52b615f7e88cd93bausbmuxd-1.1.0-1.el7.i686.rpm57038b434770525c84ef9ad7e94e0fbb8aa6f72412487089873d693a68f44c7clibimobiledevice-devel-1.2.0-1.el7.i686.rpm8d37bc0beaa109ea745585f8308934a5b75de3e5d29ab910fda29835ff99afa7libgphoto2-2.5.2-5.el7.i686.rpm792fc831d88b2e0f0269c58b4e4d3298082d107b3059d12073f3daa36e6555b8gvfs-client-1.30.4-3.el7.i686.rpm8e645b299b2745787f45ff739b418541307725a7b3c3a8599b22fbee9e56589clibplist-1.12-3.el7.i686.rpmf59dad72da195f6a69bb2ee45e7e7425fb247270c0cbb4aeef2ddbf8f766a312libimobiledevice-1.2.0-1.el7.i686.rpmf66b824e6590c8deab53db2fb844ba3c6fdd6f7b36c72e285816354b916a6de1usbmuxd-1.1.0-1.el7.x86_64.rpm4bcea177d1eb3f55ff8f6ce7c9f13ee0ba4520e78974e93fe429a877d53be9c4libimobiledevice-devel-1.2.0-1.el7.x86_64.rpm1907b4b2d2c17193b365e2a762ebb64ab58ba18fa34efa1baf10e459318de814gvfs-client-1.30.4-3.el7.x86_64.rpm40839b22b0df02be7268538f6a39f62deb8ca85b830dab06917623f74ee32e5elibusbmuxd-devel-1.0.10-5.el7.i686.rpmd2f42dbad958a105914cccec0a58f6cfe3ac524549a683d599376bbba3a12f54nautilus-extensions-3.22.3-3.el7.x86_64.rpmef2370c5b48de8443433ddcae27fb71faaf3223a905ee447abfdd563426d927clibplist-1.12-3.el7.x86_64.rpm8262f06a3ae7fb19cc1c0f70aa71b839a88e36630bc0d5239a7fb0267777ac84libimobiledevice-1.2.0-1.el7.x86_64.rpm729ee925ba0065d178530312a29c34516b207522ba44d26ceea025f87d7da14dlibimobiledevice-utils-1.2.0-1.el7.x86_64.rpm5ad03a84021bd27fa5972671f4d7b377e740803770daa930cd3d58bb36a8fa79gvfs-archive-1.30.4-3.el7.x86_64.rpm0fe4f8c5443c2719ca24dca3360dca02e269a84396898f06d2519aa4d06556bblibusbmuxd-1.0.10-5.el7.x86_64.rpm70964990507e6f734875a169536780cfcc316d23462577b01ae2b33c5d999f50nautilus-extensions-3.22.3-3.el7.i686.rpm2a091609e4f1d7242cd8db17634e83d06ec23ff26d9c398230638e8d61bf5435libplist-devel-1.12-3.el7.i686.rpm0458ddc0bd2d42b9bf7a4c160981a1757773d1e0bfffec56bfb0daa7f7dfd553gvfs-mtp-1.30.4-3.el7.x86_64.rpm8c12c266dc3dca5bce17a80ab318b2ec00d2d92cc2165fe6af85cc7c91a86033libusbmuxd-utils-1.0.10-5.el7.x86_64.rpmb08ade6a00bc9be702abf188628aa58280d59ec5a763a2c7c4a2ed0b103e9a06gvfs-afp-1.30.4-3.el7.x86_64.rpm0442632b78eb273ef46aefa9925b8b8a39fac579ba6c32926cc1d6008cf96a6elibplist-devel-1.12-3.el7.x86_64.rpmb4a5145198974bd0ee7d17935fed5f748d3efd1fd25538562ca755f05ba27a11libimobiledevice-python-1.2.0-1.el7.x86_64.rpm9e8258b7ed16eede8eeb8f282cab51637290701ded9288ede917781ffa15b100libusbmuxd-1.0.10-5.el7.i686.rpm6af3d7c6cc913ab1dddaaf938f7c2fd1b99ea574b4eea419d25471e6a0f83ccfSLBA-2017:2138-1Gnome-Tweak-Tool Bug Fix UpdateScientific LinuxScientific Linux 7gnome-tweak-tool-3.22.0-1.el7.noarch.rpm8682354a4e7d1c2a146dac7f64d690b357e46f04768b469defaaad496d09f93dSLBA-2017:2139-1Gnome-Font-Viewer Bug Fix UpdateScientific LinuxScientific Linux 7gnome-font-viewer-3.22.0-1.el7.x86_64.rpm838421f7e0faa41c327b4a8d200e6d300fede15a8ff2c653118762e0c0424c26SLBA-2017:2143-1Gnome-Disk-Utility Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7gnome-disk-utility-3.22.1-1.el7.x86_64.rpmf39cb99d92a695cf19e75ca3d748513cdcc5f282cccbee70eb8ac84c4c4d8598SLBA-2017:2147-1Zenity Bug Fix UpdateScientific LinuxScientific Linux 7zenity-3.22.0-1.el7.x86_64.rpm54cd7ebaa3f7077c8c0e3e6e73fc964b0b7da23ebb4c7d10c7fe095082fea760SLBA-2017:2153-1Upower Bug Fix UpdateScientific LinuxScientific Linux 7upower-0.99.4-2.el7.x86_64.rpm303706697b3190972a4498b4e8e981283f2e62559a8b875d56026a730e1d908aupower-devel-0.99.4-2.el7.i686.rpmb227ad698f6fc3d7a8b8024bdead3f7e0c4959ab6d53e70aefe14a7773362f8aupower-devel-docs-0.99.4-2.el7.noarch.rpmb89c9cdda108c9eb67ec6044c69c11467da8f948ae7adeff0ef7f252ae91cb97upower-0.99.4-2.el7.i686.rpm01c44767ca21a5a7aaeb192d6075e370e2fb234fa319b68904de1566483b5522upower-devel-0.99.4-2.el7.x86_64.rpm8478eed23a7be451f38b6f491c47332d1740fd7ec963e4bdefd76e437045e5bbSLBA-2017:2167-1Libmspack Bug Fix UpdateScientific LinuxScientific Linux 7libmspack-0.5-0.5.alpha.el7.i686.rpm1b620ee1ed986c5d20a93135e138b760cdf85298245e3aac5b7d9492ea74e33elibmspack-devel-0.5-0.5.alpha.el7.i686.rpm242f72d35b7ab8958f986cb907cb40ccb0535cb3bd04503974d8246dd01978aflibmspack-0.5-0.5.alpha.el7.x86_64.rpmaa5a67baabbd6208f07607dfff9a1e1e453efb1a4914fbdad1ff6e84924eabfflibmspack-devel-0.5-0.5.alpha.el7.x86_64.rpm6e00c058790619578352c699343b682668fd3c5f1d1f0e174788f71ac168e2e1SLBA-2017:2233-1Nfs-Utils Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7nfs-utils-1.3.0-0.48.el7.x86_64.rpm92b14d5e9052f3d459f0b2b94d461add6553c162800185f2e02116b7abbdb6ccSLBA-2017:2240-1New Packages: Python-OauthlibScientific LinuxScientific Linux 7python2-oauthlib-2.0.1-8.el7.noarch.rpmebfaaf6536f7e8d8c1eaacc1ca697f8a07afb410540cd486e9790531b29d5569SLBA-2017:2242-1New Packages: Python-Requests-OauthlibScientific LinuxScientific Linux 7python2-requests-oauthlib-0.8.0-5.el7.noarch.rpm11b5433486a12c51bb1188e537f40e464a77048ec5ac62a46481526b5eccdeeeSLBA-2017:2257-1Oxygen-Gtk Bug Fix UpdateScientific LinuxScientific Linux 7oxygen-gtk-1.2.0-6.el7.noarch.rpm649d2df5fe738a9207d97faf4601e5da9ad3fe9440c89548862e899e41a4ede7SLBA-2017:2269-1Python-Gssapi Bug Fix UpdateScientific LinuxScientific Linux 7python-gssapi-1.2.0-3.el7.x86_64.rpm37b33363827da7add381f3bccc394a8e9453973d55b5af9b34e44bf1d096d88fSLBA-2017:2270-1New Packages: Python-JsonpatchScientific LinuxScientific Linux 7python-jsonpatch-1.2-4.el7.noarch.rpm31ec47955cae7a492be5176dd7fbce6dba1b5533d4905e1904ae38288cdb7500SLBA-2017:2274-1New Packages: Python-PrettytableScientific LinuxScientific Linux 7python-prettytable-0.7.2-3.el7.noarch.rpmbe8bb14aa1372b779d56b82dc877aff043d2c2de2cff58d5c73f7f541f4e85abSLBA-2017:2279-1Sanlock Bug Fix UpdateScientific LinuxScientific Linux 7sanlock-lib-3.5.0-1.el7.x86_64.rpm204fc09310aadd5beea4869a4f1bf4e88305d70ee1955499eb00c83d4c0be1f6sanlock-python-3.5.0-1.el7.x86_64.rpm30a74dc486e51651f2b3bfda5a0422e006b631003d8718767a1380422b23a2a9fence-sanlock-3.5.0-1.el7.x86_64.rpmd5cf08481e2dc637dae39667c10ffed2958bbe4c94d3b9c9cf06da9c58ee2c8bsanlock-3.5.0-1.el7.x86_64.rpmfe074c727d81350b33f8db8ade4a6e476174edd12216900da10e4b911244e353sanlock-devel-3.5.0-1.el7.x86_64.rpm1849d632ececa744e0de4fd61699a172cce6fc63e2c5535cfcdf1f21adb4f21cSLBA-2017:2300-1Kexec-Tools Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7kexec-tools-anaconda-addon-2.0.14-17.el7.x86_64.rpmc562bcca932cb7e7fec1f78d4cd751d1e0aee66f53df4e6b08ac4049adbd547bkexec-tools-eppic-2.0.14-17.el7.x86_64.rpm32e094fbb435b5c60ab5e533cad565f6b831c17511efc5468cad37a3e60a6db9kexec-tools-2.0.14-17.el7.x86_64.rpmb01811a15cc93ac170c9f92dcea975a55c8760c874ab4b40edd50dfafde72383SLBA-2017:2302-1Dconf Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7dconf-0.26.0-2.el7.i686.rpmb20ede4e12c6f9cc71095b0269d453fefa2cc1c0483f703ec1b1452555fdcdebdconf-0.26.0-2.el7.x86_64.rpm5123d3ce69d48b90c7f102fe812b969ee6c13e646589727aec0b3e600913282bdconf-devel-0.26.0-2.el7.x86_64.rpm943105aeacf10ad860813c8d12b9a09a6d126a5dacad2876174eba9cdd13c8addconf-devel-0.26.0-2.el7.i686.rpme1e995533cc4641accc3c5bd45eb3a116c157b5f2f2e281263ce1bfad56e8633dconf-editor-3.22.3-3.el7.x86_64.rpmbbc1dcf7403747ac891e08a1127ef9914910fef4687975b0b56c73d8ece60c78SLBA-2017:2310-1Gnome-Online-Accounts And Libgdata Bug Fix UpdateScientific LinuxScientific Linux 7gnome-online-accounts-devel-3.22.5-1.el7.i686.rpma5534ba1dfbae446cae27829270421bae8f83cb53c14be800f1e0ed23d49d4ablibgdata-devel-0.17.8-1.el7.i686.rpm8ffe67b85ae8e1f212b958294cd40c31589574a5de458c497f80659f4f860e55gnome-online-accounts-3.22.5-1.el7.i686.rpmf760b5c7b86a5ec056337438970a1d4139dd4f6a6f74d0988c4522441840a4b5libgdata-0.17.8-1.el7.x86_64.rpm549e3ca03b9d24ab250eb3828a2d0dd4ec211889be26c4c4693a4903f03eaba5gnome-online-accounts-devel-3.22.5-1.el7.x86_64.rpm3105477d1b11fa8f9d11b4edc9f2a00ed5cfbb25a19ebd792283ba7550b50157libgdata-devel-0.17.8-1.el7.x86_64.rpm8400c46dfd401a56afd79399342ece0236689b77a3ba8e8f1ec2ee824c456853gnome-online-accounts-3.22.5-1.el7.x86_64.rpmeb1dae8a08187a861d91187c819c7fa91eb426e5d832ab9241d115333ded7632libgdata-0.17.8-1.el7.i686.rpm58442b4b268e058344d128fdcd401ed58ce761e0d56955af92780316544d99b0SLBA-2017:2311-1Cheese Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7cheese-camera-service-3.22.1-1.el7.x86_64.rpmbd5d12a6ba637122106dc3c0027db835d54c3ed9d9f96524ef10d6529fc5a9c1cheese-libs-devel-3.22.1-1.el7.x86_64.rpmdab2334195d66442f6e5886b5b7c43eef414f1f8116fd24e837b0ab9fe80a267clutter-gst3-devel-3.0.22-1.el7.x86_64.rpm230bd8693f64e2eec05721aebdfbd7c53cfb9352fabdeee53822564052188660clutter-gst3-3.0.22-1.el7.x86_64.rpmdac11355acd1f3560fb10176c51832385cf845999919f43f7d70e3884547849dcheese-libs-3.22.1-1.el7.x86_64.rpm367fb993996dd0b3494c4a88dc7608ef3b7d623496449e2cfe8ab326936758e3cheese-3.22.1-1.el7.x86_64.rpm2b3f26d240435873a4e2da355253efd22f42364170f8634f3ad15afb8a45b52ccheese-libs-devel-3.22.1-1.el7.i686.rpm3f6a839f59c2f4f10b7f2196cf5c79fbb2946e442c9913a2f5077cfc053b6316clutter-gst3-3.0.22-1.el7.i686.rpmea79396e47352229c4463a188f33d665280d44a15291cf60c66c83b59bc4d708compat-cheese314-3.14.2-1.el7.i686.rpme5516ab2d5deab4299acb501027d2a1880fc18d4256cb6c8f73f405a41058498cheese-libs-3.22.1-1.el7.i686.rpm7d53d9f691687e4f2960ef935081025d57331f50438fdaa85f1a762aa8c2e721compat-cheese314-3.14.2-1.el7.x86_64.rpm43cb801bc17b58053ac9d42d415680965a2fa37cefb63d427502c30b709bf615clutter-gst3-devel-3.0.22-1.el7.i686.rpm5c0e9d06ac09530e5e208c908b4b4e1ba93da0794e02382dbb19e0d1cb02395dSLBA-2017:2312-1Gnome-Documents, Gnome-Online-Miners, Libgepub Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libgepub-0.4-1.el7.i686.rpm491b63b03d42e1c00b29c57d7236b963401a819181b703e14346ec5e2937dc87gnome-documents-3.22.2-5.el7.x86_64.rpm0b15b77ce606a45453dfb6575e157a4a82f1cbcd7f99000d152a867d594542dagnome-documents-libs-3.22.2-5.el7.x86_64.rpmec7fa699806111ab07bd640ecfb40e85cfff841014bd44757edece9c5180605agnome-online-miners-3.22.0-2.el7.x86_64.rpmf5f21af794cfdc49ed141cc2a082e11ad02c2ef1b865f49135f606d70db64363libgepub-0.4-1.el7.x86_64.rpm0c951732b673c7c9ab9e2ff6d4ebf5cbb3a37b0fe5847702023f76ba5a8035bblibgepub-devel-0.4-1.el7.x86_64.rpmaf33839c8e342f84667c360a1b4ecd827f1469528a224c24f4545140d3d49a26libgepub-devel-0.4-1.el7.i686.rpm630da8dcfc7fcebde28bcb6dde14fb36161216bc0ce376911ba94f7033da92a7SLBA-2017:2313-1Gnome-Terminal And Vte Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7vte291-devel-0.46.2-1.el7.i686.rpmf54ff19b2141ada6407f0e56e692cc8095e1275e7619f73ea8a842ca6b092392gnome-terminal-nautilus-3.22.1-2.el7.x86_64.rpm63b5bc35a9169bf0413f14ce16410d876cf24ca4120428d46e2c128a64dab438vte291-0.46.2-1.el7.i686.rpm6e0227a1c4e8b706db0f7d1391931925fb4a3b9108f8707c83d3f02c3d1fb901vte291-devel-0.46.2-1.el7.x86_64.rpmdfc2fe211148b13d8d9149cfa3a6239e2e6f060b3334550a136aadc3572a53d7vte-profile-0.46.2-1.el7.x86_64.rpm04535152440ab24d6e83120a586435947dc143e267650316ef2888e79e08ed8fgnome-terminal-3.22.1-2.el7.x86_64.rpm51aa846132e0b387fd9a93208bffcae4dacdd5c8bc959353ea7148bdf8fcff02vte291-0.46.2-1.el7.x86_64.rpmb42af8a626dde6b20e1448f8b8adf33dba5f54a8da5a3346ea82c8d62fb62a8bSLBA-2017:2315-1Rhythmbox, Gom, Grilo, Totem, Libdmapsharing, Compat-Grilo02 Update* Bookmarks * Euronews * Filesystem * Flickr * Freebox * Gravatar * iTunes Music Sharing * Jamendo * Last.fm * Local Metadata * Metadata Store * Pocket * Podcasts * Radio France * Shoutcast * The Guardian Videos * Tracker * VimeoScientific LinuxScientific Linux 7libdmapsharing-2.9.37-1.el7.i686.rpmb996ae6bebdb3a4fee719675789c4f80dcf4f383e659d687aac3a5beb7b2f93dtotem-pl-parser-3.10.7-1.el7.i686.rpm4f1eda2864e4d015daa8c1dad3a4bef67047e3aed92f8e4110d541a476387f2arhythmbox-devel-3.4.1-1.el7.x86_64.rpma70ab5c44788d5eb7c1a4a7b7a6f6de012a3708b11d88aae2a7015412bdf5aaelibgpod-devel-0.8.2-12.el7.i686.rpm29a86c61c6a98f8eabf477782f9d80207af68b8144fe37333a2b9ed30787d0e9gom-0.3.2-1.el7.x86_64.rpm7757f14dbeadcc26abac1181b126ce2fb5c3e2410fee3f5372d9e405618791d2libgpod-0.8.2-12.el7.i686.rpm01416540fd1d300c9ff37af168901635a25539442355a1fad62ca9b99cd7c73flibdmapsharing-devel-2.9.37-1.el7.i686.rpm2eccd2b4f0a079f367abd0781dec534ba51553b32cddab183c4c85946d94f0c4libgpod-devel-0.8.2-12.el7.x86_64.rpm71ae559b9b863e22ea3a730c7836c8a78cd2a1384ca83b28c804040b41c09d80grilo-devel-0.3.3-1.el7.i686.rpmb2f462c972fbccd4fa672de5cacebd044df81f3ace8562b01157ef93fee3da9alibgpod-doc-0.8.2-12.el7.x86_64.rpm6c10310fe7b8ad5da0a23e615be270c90353115e3028d08d291d960c4928089bcompat-grilo02-0.2.12-1.el7.i686.rpm8379ab4abb3803a6e24158e6db8770f394f2b47180c1b87c48f9a495aea47a2fgom-devel-0.3.2-1.el7.i686.rpm01ad7db1fd6d80dcb58f0f9fd263f861e09874521195c8166aa06b627de11785totem-3.22.1-1.el7.x86_64.rpm8b945158ffc96ec07c8bfa2ed9485a92ae5d11d568dc8ead01efe05d0f105f26libgpod-0.8.2-12.el7.x86_64.rpm5d3e5d520ad49497b1f5664dc296aeccddca3731a2e78c0a150f70b888d0f905grilo-0.3.3-1.el7.i686.rpm19df84e9638319014b2f468b045398a3f0e2aaedc383bd1b269263b6c4f71bbcgrilo-0.3.3-1.el7.x86_64.rpmb76501da13b038aa9a91002da12e9d8fd45ff457f8fb8f81d18cce322e459704python-gpod-0.8.2-12.el7.x86_64.rpm31ffd0633ba52f7a5a18354a5c43025322799befa5eff6049b92f47b71b82a27rhythmbox-devel-3.4.1-1.el7.i686.rpmdf29528975135600cf03870d3904c09624221068eb29574a7963e10e176bae34gom-0.3.2-1.el7.i686.rpm18598b7c0794290c2890151ba10034886f890e93e4a41ed36f95a3fa2ad4f575totem-pl-parser-3.10.7-1.el7.x86_64.rpmc26d7fedc29308123a8b89279b5f8c9e32edf21c8f5411baa8ee07a611b29aa0totem-devel-3.22.1-1.el7.x86_64.rpm86c70dd082130420e964aca5e31f7b8c5460bbd5e546a287d2525574f113b519totem-pl-parser-devel-3.10.7-1.el7.x86_64.rpm74929a3a5e46d391477aee3908e171e098d972e9ef6c883228b5ae16544037b3grilo-plugins-0.3.4-1.el7.x86_64.rpmf8ff6a99fb36191f6038e165f68c016b6ac182002f05c5958135e27269092c6ftotem-pl-parser-devel-3.10.7-1.el7.i686.rpm24f512f5d9869565e7d0bd92d700c2abe88416a5608e7fd8290a77fd35be5942libdmapsharing-devel-2.9.37-1.el7.x86_64.rpm856019f9ca495506406bd1731784a0199f92f0ffd399ff5f03f159b0e83a22d4rhythmbox-3.4.1-1.el7.i686.rpm8f693a97f3e01be066afa01a5ca554f5e215bec9374d0102339f71cfbca4644bgrilo-devel-0.3.3-1.el7.x86_64.rpm56a55e926050bbb51b911a9343b5f999cc0495b9061a538af0b34d20d4efca9etotem-nautilus-3.22.1-1.el7.x86_64.rpm155382772d61ba7e9e2a29b2eedd72bb52b5e9863a62e921ffca911eb707d5b8rhythmbox-3.4.1-1.el7.x86_64.rpm09e5da91bbf82ac244ad00ced3cd7fde5600ba4fdda163fe4fe8c21baa577571compat-grilo02-0.2.12-1.el7.x86_64.rpmdb16ef66a84f272118c51a198f7b5f4701f1024c4eb7e70edbbad0773f73ea7egom-devel-0.3.2-1.el7.x86_64.rpm5618d269d5f32f800fbbc55e99de6c3db2c2dc189072a916acfc0b17d7fc1e29libdmapsharing-2.9.37-1.el7.x86_64.rpma56bdfebe31fa57f8c64837c301c1bd893fbf7c7a7eb4a51b4dc805b95cfcaadSLBA-2017:2317-1Yelp, Yelp-Xsl Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7yelp-devel-3.22.0-1.el7.x86_64.rpm57fec7d9470094a375c14fa5baa67cf2445f2c13559713ab3ee770a58699baa0yelp-xsl-3.20.1-1.el7.noarch.rpm44eb4ebecb3d07b5e334b16279905131802a92a671bf250942946f1c32d3d44dyelp-libs-3.22.0-1.el7.x86_64.rpme9c83110ae7f5cb3724e94d275903f42212273d3c298a4f89773ac990c43339eyelp-libs-3.22.0-1.el7.i686.rpmfe722642d7b3be74a8d6413674d7082afba1e4a5c650f515a4522ec59a84092fyelp-3.22.0-1.el7.x86_64.rpmd1b6d01042b2e25166ac37a1a3d9b6b641d4d717cf5e7989025f31285b48859fyelp-xsl-devel-3.20.1-1.el7.noarch.rpm792c8c28b32eea775c5117919258b3c54bbfd5ac688edee8b8568c1c542aa7cfyelp-devel-3.22.0-1.el7.i686.rpm749474567c53bcfba92a511bb8d75dda311535c87a2b5b08bc3505d1d999ec8aSLBA-2017:2318-1Gnome-Initial-Setup Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7gnome-initial-setup-3.22.1-4.el7.x86_64.rpm4fc7ff969fac7adbbd036fecf5205c8cd11de5be5e3d12803e57bcd82088a058SLBA-2017:2325-1Bind Bug Fix UpdateScientific LinuxScientific Linux 7bind-pkcs11-libs-9.9.4-51.el7.x86_64.rpma618300ddf63d27f4de0027af5438017dacfd4bd84860d0e2f6f3a81a3e1f551bind-utils-9.9.4-51.el7.x86_64.rpm81e372effafaf00ec4a23ee3093a8eae897d9faf847946db0685058d8a88f874bind-sdb-chroot-9.9.4-51.el7.x86_64.rpm4c4e5cf47d77cfdc47cde6524f59d7186a93f418fca5b787d10076309b2bf333bind-lite-devel-9.9.4-51.el7.x86_64.rpm21824cec97bfce03c5a9f49e13cc4d54d51ce5c867b15cdd55fd2bd392ab7cc3bind-pkcs11-libs-9.9.4-51.el7.i686.rpme537b3dd2beca4758512b721d3dabe131b9378c77c5aa6bca964d9010e07c58fbind-license-9.9.4-51.el7.noarch.rpm1deea3ad0d1c13cd629b0480eafbe6256523cd035bdd140a3d2a02253eb8947bbind-pkcs11-utils-9.9.4-51.el7.x86_64.rpmfe98d8a6cb9587309cf67452874d452ab2425e17f6f8c8c32a37f4095477a76bbind-sdb-9.9.4-51.el7.x86_64.rpm8bb2537c9054ad72092c2c4dc39f50fa34262351b2f75d8be3491dcd3a56d855bind-devel-9.9.4-51.el7.i686.rpm8e56022a4397340dbfb7145b69087db7d58fd4584ddf2a04e8e1a64701255fa4bind-libs-9.9.4-51.el7.x86_64.rpm9b48a017e960ea54afd17540f8d7bc6720374530e5f968f7ca4fd7800faa171dbind-pkcs11-9.9.4-51.el7.x86_64.rpmba4d9fc2294aa7ddd63f9ef24dd15b3a0030e3ee2745f896b058032d0fa38455bind-devel-9.9.4-51.el7.x86_64.rpm19eb6f22eda852c13af9835a34e83e08e1806573a2e505a39664be934958cef2bind-libs-lite-9.9.4-51.el7.x86_64.rpm6b3af81b6fb8c556f4ca8893978568c9502e2067dc6b00bcaaf5caf9f35ffda1bind-pkcs11-devel-9.9.4-51.el7.i686.rpm9c9f431a3325f083693768cc7685677f50e606c550d9c3a831a2c95b9fd412fabind-pkcs11-devel-9.9.4-51.el7.x86_64.rpm4d188feed5aff5c365d811bdecceb423fa2ccf6069bf9d8deb5dfe09b6cccb38bind-lite-devel-9.9.4-51.el7.i686.rpm70d660a6f20fd1a52f094d42564ac4e3b73d6b9b15cd841520180aa0059f6d6bbind-chroot-9.9.4-51.el7.x86_64.rpm6a0688c99da327d09301819f6295003d09b82e7f1a979692cf2d17d48df652c5bind-libs-9.9.4-51.el7.i686.rpm421d471a563dab4f7c9edd29c924b80b82afef3c7a25430f428c61a94ba0c73cbind-9.9.4-51.el7.x86_64.rpm5e73efd87261309ed5970deaa47f7b9dcc450bfb6fc801c1dc6104f0e8789425bind-libs-lite-9.9.4-51.el7.i686.rpm733f347c171227540a882b7be799c090e61356917bd3298cc95824f673555e4fSLBA-2017:2327-1Ipa Bug Fix Update* Previously, when installing IdM replica, the installer incorrectly set the location and permissions of temporary directories. The IdM management framework requires these temporary directories to operate correctly. As a consequence, after rebooting the newly configured replica, the services tied to the management framework did not work and displayed non-specific error messages. To the installer now additionally adds a drop-in configuration file that re-creates the directory structure after rebooting. As a result, the IdM replica continues to work correctly after reboot.Scientific LinuxScientific Linux 7ipa-server-4.5.0-21.sl7.x86_64.rpmd2e8c39a44ffbe1dbe101907ba698641fb8e306a9ef81017146083385be0548aipa-server-trust-ad-4.5.0-21.sl7.x86_64.rpm9fef177f50f1e5226e8c93eefbe5a9269afe5d761d26ed4c1dc9c89d68e8ef32ipa-client-common-4.5.0-21.sl7.noarch.rpmb1cdf44adcad8e9cc90be70a621cf632c764308858042e4eead6c2b0be95d7e4ipa-server-dns-4.5.0-21.sl7.noarch.rpm3a589e94aab7eae80940f558ab13008dd46bf9589d8d7c4e2ff3a057773ed465ipa-python-compat-4.5.0-21.sl7.noarch.rpm14e1dd948ac778515d85157c52d92f22f3e6d5febef897a2d2a4f1cd26c010c6python2-ipaserver-4.5.0-21.sl7.noarch.rpm4e77aba23a226cc4f4a7aff2fa16b108f90178ffcde4542430af6ab67260af45python2-ipalib-4.5.0-21.sl7.noarch.rpmb218f547268e24f02e488f189602733dd616f3d10eb952ccaf43bd38a1b920dfipa-common-4.5.0-21.sl7.noarch.rpmcfae18e6e9d7c47b652a80a219840c725d86ce903cf99f42b500c5dec39df364ipa-client-4.5.0-21.sl7.x86_64.rpm2522ed6ca42591c35fe8bef470e634625d9b07731ea9a097bbd5d59cd09dc690ipa-server-common-4.5.0-21.sl7.noarch.rpm96b9614b25317c62f8a2caee3ad7b1ea955831101c1c67c5e21d12239b19fa85python2-ipaclient-4.5.0-21.sl7.noarch.rpm23330438add614b42617156b29eec4598df1f11f95bb3d0bd4a0eaf6b5c0ef22SLBA-2017:2330-1Bind-Dyndb-Ldap Bug Fix UpdateScientific LinuxScientific Linux 7bind-dyndb-ldap-11.1-4.el7.x86_64.rpm36a78ff2c57e5ac10f54f1d4e2d91ca580c32d7fd9b802bfa3fe191f5f81dcefSLBA-2017:2921-1 Selinux-Policy Bug Fix UpdateScientific LinuxScientific Linux 7selinux-policy-minimum-3.13.1-166.el7_4.5.noarch.rpmd921f9891f2de6dc25803e0fa0f22f22e347a974e8abb674bf228bfc41fcb383selinux-policy-doc-3.13.1-166.el7_4.5.noarch.rpm18069deb3600f92012c10fb7f8cf49d9b751d9df03f3c042d8e89bca96037a7fselinux-policy-sandbox-3.13.1-166.el7_4.5.noarch.rpm1f365fcc4ee5e61c8e90d97aa532af3bba7d5870f0a3852e542617f10e47eef9selinux-policy-mls-3.13.1-166.el7_4.5.noarch.rpm6eeb9ba72dfed33233355c3a9128dda168e9eef27d5c00a23ea4a694372bc670selinux-policy-devel-3.13.1-166.el7_4.5.noarch.rpm9ae0f0e207cc11ef51584f62ed6b4a45fdd573b9bb976fd0fa397c0e1d212a9dselinux-policy-3.13.1-166.el7_4.5.noarch.rpmed052a6a983d07c1450d8b9ec452a4a8421c5abe492b6a5b075ed3d24c2e402eselinux-policy-targeted-3.13.1-166.el7_4.5.noarch.rpm73b124e31e32c1172fe63b4d42cc2d96770c482b70c91898fff3e532bd6a6e01SLBA-2017:3305-1Selinux-Policy Bug Fix Update* In Scientific Linux 7.4, an SELinux allow rule for the keepalived utility was missing. Consequently, an SELinux denial occurred when keepalived had been run. With this update, the missing rule has been added, and keepalived is now working with SELinux in Enforcing mode. * Prior to this update, the /var/log/pacemaker directories for the Pacemaker cluster resource manager were labeled as cluster_var_log_t. Consequently, an SELinux denial occurred when containerized Pacemaker tried to access the /var/log directory. An exception labeling the /var/log/pacemaker/bundles/ directory with the var_log_t label has been added, and Pacemaker is now able to map logging correctly with SELinux in Enforcing mode.Scientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-166.el7_4.7.noarch.rpm04fb38c53fdacd31d50ad230be6dcf6524731e721e2b8ca9949ebabc0faa6e0fselinux-policy-3.13.1-166.el7_4.7.noarch.rpme09ed729f888a6b26616f4bdddf504db222bb7f26b34c300320fb1739c7234e5selinux-policy-doc-3.13.1-166.el7_4.7.noarch.rpm92e076e5ede9e2f2191826979d352a533302e18c5ca9e3d1d8989733ab37b223selinux-policy-sandbox-3.13.1-166.el7_4.7.noarch.rpma3417d061e4374637bf531f9ad66471159f1bec467e4a545b9a603bf6163af39selinux-policy-mls-3.13.1-166.el7_4.7.noarch.rpm093111ea7e62dd2e428c7426ad1f096e2d27639a74d32ca8044084790de3993cselinux-policy-minimum-3.13.1-166.el7_4.7.noarch.rpm0e28d6e7f78cc6a0ae630d36deaf08829b0566db1e75a838ec1bfe307d7310a5selinux-policy-targeted-3.13.1-166.el7_4.7.noarch.rpme320461f68a0eadfd4686e7fac286b8df0d759aa71ef2271bbbda356c33e09d1SLBA-2018:0042-1Dracut Bug Fix UpdateScientific LinuxScientific Linux 7dracut-tools-033-502.el7_4.1.x86_64.rpmb4c4d0b23dd8fdc3ae6b08b25ee25d82fbb4911631f029ac1592f2c6ba3d5dcadracut-fips-aesni-033-502.el7_4.1.x86_64.rpm5dfe1a94623e98b4af339247a231ea40f6e5b47d62000e2bcae14e9d2868bc49dracut-033-502.el7_4.1.x86_64.rpm96f45d9922675712515ca1b16b6c95ed2f2118e9dfe406849a19acc549687feedracut-caps-033-502.el7_4.1.x86_64.rpmdf739f5a7dc5173c9d97a7a5dd3450990fbe03d7f4f629f564b510e98e472c3edracut-config-generic-033-502.el7_4.1.x86_64.rpmb23e6a2db580ffac709d33f80af359c4e066699daea5c235757311b5ab4dab5adracut-config-rescue-033-502.el7_4.1.x86_64.rpm15cabb88d8954e5cf52d581c3f4d4f74c38b51ce81b1c50e9589ff31b02f2363dracut-network-033-502.el7_4.1.x86_64.rpmc69b5cba14906bbe78384b6690b8c6e857db0455ddbca341282373d90b5cac04dracut-fips-033-502.el7_4.1.x86_64.rpm10ba679ac08d575145e489d126184bed7d386179e7d669e6d73a3f9f944a9599SLBA-2018:0410-1Selinux-Policy Bug Fix UpdateScientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-166.el7_4.9.noarch.rpm76345b5198da20b4a7745df9f4c7e599080d162c8a236565f9b9ea42d79d5584selinux-policy-targeted-3.13.1-166.el7_4.9.noarch.rpmc1a720cccd8d0ca8660b2c681ef02be6873c0f3e83bc14b6f261450bcc2c5381selinux-policy-minimum-3.13.1-166.el7_4.9.noarch.rpm5a3ebcc563348d4c4c2ef7fdbfffef2d10588f18e59b0092118e42544e24ff76selinux-policy-3.13.1-166.el7_4.9.noarch.rpm9e7600c55a88859d537e1da29061f87a5dc352787d7a7782d47f2d547077128dselinux-policy-sandbox-3.13.1-166.el7_4.9.noarch.rpm4acdcb439ad7c7b6f27a00b1bb86650f849d4350d68a038d1db1ff69dd4f7e26selinux-policy-mls-3.13.1-166.el7_4.9.noarch.rpmf94357b319e72c3197a7e5c5268dec31ca87c146d1a39d79dc63fa12578b3ca0selinux-policy-doc-3.13.1-166.el7_4.9.noarch.rpm239dedd8d20c3ac27e9fb386b11a735d65dbdfb5cc9cad984f28a32ee4d98657SLBA-2018:0597-1Tzdata Enhancement Update* The Antarctica/Casey time zone has been changed from UTC+11 to UTC+8.Scientific LinuxScientific Linux 7tzdata-java-2018d-1.el7.noarch.rpmc020936b156c04e5688a84ea234bd74f0ea683a28ccf87d2b2b3fe1ec414cf36tzdata-2018d-1.el7.noarch.rpm0902bf03c5d351e238fd8781280418c93b941bd86d8d8aad92f9f61a79feb572SLBA-2018:0671-1Anaconda Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7anaconda-user-help-7.5.3-1.sl7.noarch.rpm42f9d1feb4048e05879ddbb2db7a7b9360bdeca80a64fec32a9e874e12956b7eSLBA-2018:0682-1Qt Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7qt-devel-4.8.7-2.el7.x86_64.rpma1771b8cfbcbb61562f0de96d9ef361b5f19998f7221c23494b32eb7e40dd90dqt-x11-4.8.7-2.el7.x86_64.rpmb5ef3b421834b2fac7424870567881ee804a5ea46c08232d901968a1edae6d28adwaita-qt4-1.0-1.el7.x86_64.rpm908fa39f0e6046e03327ae34aa084a4f8f970c07291c027c5a0c2b20190cd88aqt-devel-4.8.7-2.el7.i686.rpm5827c014abb49560d74f0400ab1489a6164df68b0c6c0f2bbd5fd3f919dc90a6qt-4.8.7-2.el7.i686.rpm0859757b6c3495e86965fb1fb9e9c616de89eec51c81035a4d2d00bb06d4ce63qt-4.8.7-2.el7.x86_64.rpm3c3170edd9d229af361542e7e9bbc68261bd9027c47cdb397190bf01b9a962e0highcontrast-qt5-0.1-2.el7.x86_64.rpm35634fd2ec96e4b649abe325a66e92e108a80fdfe4020ec4e92fc6fee9fc31e3qt-odbc-4.8.7-2.el7.i686.rpm2d0a87d727b82fb7b3ea952d4064a354262c11b2d138f011f8ccabb0c6f9512eqt-config-4.8.7-2.el7.x86_64.rpm8378fe731ba7ac1087a6a1f29c0db90835b94c934545f4e81d578e9877e21167adwaita-qt5-1.0-1.el7.x86_64.rpmb625e3c48972b64bf16868b2be067178abd038415f9b49ae597393ecbcf43838highcontrast-qt-0.1-2.el7.x86_64.rpmef6376e08287ba27713a348d325893f2f1f2cf9315bfdf3bcdce65b13d5a5060adwaita-qt5-1.0-1.el7.i686.rpm796b20e056a2b23971a932987df4d581bdc3a54114576e6d4fd334bf6ae37400adwaita-qt-1.0-1.el7.x86_64.rpm97ff9d6effb2090f8d55f6275f859f22b7c0d226f6de3a0cc2d5f85b0012f9deqt-demos-4.8.7-2.el7.x86_64.rpmf0ae0f4a35d9c0b8433f3d3ce5abd0efb564ed15b0b8e586976be78324b44826highcontrast-qt5-0.1-2.el7.i686.rpm23c74f152f155c55d1ab51b5a5d06ff9871a30939fb312946c4d86fbbe83b3f3qt-mysql-4.8.7-2.el7.x86_64.rpm477576c71d135b92973461224ceb10bb905f92b9eb3aea074dd1eee45b82c3c9qt-postgresql-4.8.7-2.el7.i686.rpm27b5a3343e36f56db0e6c0fb67ad1e6ed51ecde08a107cb0a93de60d8c06b683qt-doc-4.8.7-2.el7.noarch.rpmdc8e099093573a1a38b4cfd41d9d10d69d893fb306e1e94304be9d9291ad6d0eqt-odbc-4.8.7-2.el7.x86_64.rpm8f28ba2fd5974fbfd018bec8d0aff2157374e555f880dd22ae0fc531bd306fd3qt-x11-4.8.7-2.el7.i686.rpm95f74386baccbcc6078c7b8c6317da6f2ec817fae285c72aad81de1fa03782c1adwaita-qt-common-1.0-1.el7.x86_64.rpm71d31aed369e2b6ab3d5d545de6f8136f8563bba2431648cb7c7c5c28e09d5d9qt-devel-private-4.8.7-2.el7.noarch.rpmd43f6494305b2aa70d74ac805126a33d1c837910012f561784361452577ae33ahighcontrast-qt4-0.1-2.el7.i686.rpmc393ec577fcbed516a38b896c93883404dc16b20392f89bfa07201f25c896846qt-qdbusviewer-4.8.7-2.el7.x86_64.rpmfe44e38758f57f4559d0d77d72fa7aae29ece9ffc2e5a8d3cba9e2828273d67cqt-examples-4.8.7-2.el7.x86_64.rpm4ebd186b9f62129dd977f1e33e5f65998b7b63615748fb27af0a5fce66894935qt-mysql-4.8.7-2.el7.i686.rpm5f631ccc50537772421d00f86fdfad632723b7cbbd7ea92fc60f3d233822d1e9qt-qvfb-4.8.7-2.el7.x86_64.rpm1cd78fad17a0bccfeef4e87d26dfa4e1c3d5a92dc46a5bc96a2849f1d02360bbqt-postgresql-4.8.7-2.el7.x86_64.rpm0c316a1b8d1e344495310fc52093b909d85a3f3fd3bc8554df809d9d64b98b61qgnomeplatform-0.3-3.el7.x86_64.rpmfed8583fce57b39a3bb957a348a95122e051e64a2452231ce4136ef616488c16adwaita-qt4-1.0-1.el7.i686.rpmbcb0bb6f07a86348c56acaf7be042e36fcd2a6d8ec731633a019607022b2ad4aqt-assistant-4.8.7-2.el7.x86_64.rpm04433f84d8a8f8587db256dd2fcd8e0ddfbf6fa69ea007164e56a5c596417af6highcontrast-qt4-0.1-2.el7.x86_64.rpmbd5912c2f98bb715c2443db04431c3bc711a88e3af9609552dbebf57bb069b8cSLBA-2018:0685-1Exiv2 Bug Fix UpdateScientific LinuxScientific Linux 7exiv2-devel-0.26-3.el7.x86_64.rpmed21fdde1e1494b1458fec66506a8d3eefcbeeacdc09cdda22e5b27b5e63e937python2-gexiv2-0.10.4-4.el7.x86_64.rpmadc0708fe7aca014cd1716cce0cc03f91b208844ae500b46a995a6d7727e5902libkexiv2-4.10.5-4.el7.x86_64.rpm89e8123053666e38069473577f19089f71f73e7f54f1c6f0a3dccbe40014f300exiv2-0.26-3.el7.x86_64.rpm2388316712e693e22603ae73e33d63db47d695b08516ff6b2d158e48e7bdd928libkexiv2-4.10.5-4.el7.i686.rpmd00093e1e674a05551fd36bd990ddce5113a01cecf614852feb014dc121277b7strigi-libs-0.7.7-13.20120626.el7.x86_64.rpmd585e5316445679ee9887660724eff2c22136600ed9ae0002bab57b066a3960dnepomuk-core-4.10.5-6.el7.x86_64.rpm60e0c8c1569c63f2db59cd42b8cc8d62ec9a42ebb8698c11e5d7db84c504b515nepomuk-core-libs-4.10.5-6.el7.i686.rpma4f1c52addfa9963d5b3e95e3097c93293e017153b7e6da12ff0c831ed5731a3libkexiv2-devel-4.10.5-4.el7.x86_64.rpm7baeaf9ea5157606bab6606ae088dfe2f963385c391047d8d1fe44202e8bf134gwenview-4.10.5-5.el7.x86_64.rpm36b60dad89144080e7b50760ce9c46be50a098f20e6a4ec3b5289ab96b3625e8gnome-color-manager-3.22.2-2.el7.x86_64.rpm5d13249b72a1b9e7551865214e2994497afe8e79673dedccf2130d95259b72d9nepomuk-core-libs-4.10.5-6.el7.x86_64.rpmf71ecbcf96b89e5942000aaddbbf1c5b9399eff3a8b670119b822e8abc261958exiv2-devel-0.26-3.el7.i686.rpm8b997b210273218ca79d72bf9562133bd46244e3d1572812da356b2e14102ad5strigi-0.7.7-13.20120626.el7.x86_64.rpm78a9b18c7db57089a928a10db0a595cf9b15bc16621a4afee9a4e03bb26dfd1elibgexiv2-devel-0.10.4-4.el7.i686.rpm87c6695e2243f1c3b0fe93395a52d096f3cef8da72a3e350937871462398bd28gnome-color-manager-3.22.2-2.el7.i686.rpm930f24acf3fcf1096f344f8ab791df763028830cc4d17e67f55e216987dca2d4strigi-devel-0.7.7-13.20120626.el7.i686.rpm4659e324a15d0072f5278e839d9baa186c864895149768265f8cbdc6ac7326falibgexiv2-devel-0.10.4-4.el7.x86_64.rpm8041539907e0fa50a13e3f6ec65b091f8dd8afadc32d753d1947be0a5c5c01a5nepomuk-core-devel-4.10.5-6.el7.i686.rpmc6e677e61d4c7360213fba1a4e95ca9e5f4eac4318ef6692731b7e8ab8cf9126exiv2-libs-0.26-3.el7.i686.rpmb8a9978feb12f16d2f05f85ff30c0c124851e1ded0c267e01a693617f49b9b0estrigi-libs-0.7.7-13.20120626.el7.i686.rpma4b62f48ca4fabb9b80bdbd4ca0be94eb53dac8a9071574bbe63189eb7c1f1fblibgexiv2-0.10.4-4.el7.i686.rpmd7630ee8fda486b41aa1ce299d9414cd76e1f80d35305055d99ad4181c163780gwenview-libs-4.10.5-5.el7.x86_64.rpmab8016500deab6759e22bdb0508b24fe121667b41e446fd3da17cd35c87e6103exiv2-libs-0.26-3.el7.x86_64.rpme397f5eb9a756d521fa6b47d7d43644ca533590db7f7a5e71e8a59c323b8e2ecexiv2-doc-0.26-3.el7.noarch.rpma22e305086d26196f962c1fa0e3d73ebe4c92d7082e8c867926f121419286ee4nepomuk-core-devel-4.10.5-6.el7.x86_64.rpm3c93635352b10c4b672606258d4114979645aa6268afcd2a53e89e0d28267ee8libgexiv2-0.10.4-4.el7.x86_64.rpm17cf176b40c95d872336be356adc38bab28eef3b1283a664255a6c0fa85e5a18gwenview-libs-4.10.5-5.el7.i686.rpm8a896898b6ba680b9b59b5951a1fbd267f089a80a34a172b90f7439d031e475blibkexiv2-devel-4.10.5-4.el7.i686.rpm28c6c66847a93799311ed9c9ecad23f7373ca44c679f65f072566d01efd5d6aastrigi-devel-0.7.7-13.20120626.el7.x86_64.rpmd874352f1e16a8fbe19dd33a5a68e3d779a110a8f454a3e4ded25dcf9d459a85SLBA-2018:0710-1Qt5 Libraries Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7qt5-qtwebchannel-examples-5.9.2-1.el7.x86_64.rpmde8426afbf4866cdec7c6559d7fa13d5f649b84df652182d66b6a9162d769c4fqt5-qtsvg-devel-5.9.2-1.el7.i686.rpm28bf6711ffa501a9a3e60fb4ffa7d9158b43ae4ced2366ccaec9fc45552212adqt5-qtmultimedia-5.9.2-1.el7.x86_64.rpm304413f98e2f9c21eb66627fbd96311ccdf5f5e59fa0d27ae67e34c74052f739qt5-qtdeclarative-examples-5.9.2-1.el7.x86_64.rpm3acd525654a4b8f6e2ddf9089363b65f1cc35b4c30bacc923d118808373ccab7qt5-qtserialbus-devel-5.9.2-1.el7.x86_64.rpm85963dcac543b76fa5fdccb4e47f1b1181d0062009e2027097e1b96f0b3af2b1qt5-qttools-common-5.9.2-1.el7.noarch.rpm65fe117d876256ef64bc448dcfc466f5ac311853f0f1d847b35820f6fe2a49aeqt5-qtconnectivity-5.9.2-1.el7.i686.rpm8ae21e673bef44170a34564e47b5901c9d575d901f9a272e5a9b95a8d25939deqt5-qtlocation-5.9.2-1.el7.x86_64.rpm35dd5a18f17f5edcf39b7fd9b6bd7f674ea33a19b04468fff6b29051aee559bfqt5-qtwebchannel-devel-5.9.2-1.el7.x86_64.rpmf5fb89ec8aa980b4879041be8ad9e3ab2a83fe9efe1bd0ed321b248b592132a3qt5-qtsvg-5.9.2-1.el7.i686.rpm1e961be9a572847d5eca0f7a4c57ee6ff1165423b66e57360b2a5d9fe885b359qt5-qtx11extras-5.9.2-1.el7.i686.rpm1fbdcac9c93e3462ac7b71bfb124b1578d31fa83ec8418ecccf96cbf25129714qt5-qtx11extras-5.9.2-1.el7.x86_64.rpm6edaa31f04060d25cc4ed2dd6fd9c06d4a1c60d526178adf57fce9e00b192fa6qt5-qtdoc-5.9.2-1.el7.noarch.rpm1cc32b74a21cf62b6c04f941d49821720ee1e27b0df68d28d46abcf8a5c4a360qt5-qttools-libs-help-5.9.2-1.el7.x86_64.rpm45174027c7c914b33077b775e0e1db9a5f5af9511617faa6d0c6bd5e768c2f22qt5-qtbase-devel-5.9.2-3.el7.x86_64.rpm78e66bbccff54471cd90090554f60fac5d5fbb80cbbfb65f2a3970bd493a822cqt5-qtimageformats-5.9.2-1.el7.x86_64.rpm379001ae46c744076ccf16d6a41cd4c1a3bdabd25381f764fee7c76d3aa49530qt5-qttools-devel-5.9.2-1.el7.x86_64.rpm221d22f2f770c3dfef8b95ecef153438798541b835748649be98f6eb7f2a05ddqt5-qtbase-examples-5.9.2-3.el7.x86_64.rpm1d0904c6e7976e4818880c406398cb55bd32bed15248f9bec607009bf4a0c31cqt5-qt3d-doc-5.9.2-1.el7.noarch.rpm1484a9339550c8fc079fcaffe71e9289f48a83993b5a7e37f3bcfab8cf787195qt5-qtmultimedia-examples-5.9.2-1.el7.i686.rpm6f6731027407da83a22a4485acbdbfdcf7c040a9a6d974289fd1cb4f649a066eqt5-qtimageformats-doc-5.9.2-1.el7.noarch.rpm53534abc68bbd6278e481b2740d51581960efebf772976f5d3c0caff80c2b935qt5-qtbase-doc-5.9.2-3.el7.x86_64.rpme6469937798114a10bbc0a05e8d865cb0b6432d473d60d922da8d5e29823b611qt5-qtbase-odbc-5.9.2-3.el7.x86_64.rpmb0cb86f683967b34d5b077ccd40449ab3272dda2de7653ce206cc38ed030e8dbqt5-qt3d-examples-5.9.2-1.el7.x86_64.rpmbea7540e058146a8a255988993d136bd9de363c80de6b32b62fb494e3a3ec713qt5-qt3d-5.9.2-1.el7.x86_64.rpm900073c58c6edf3085532e25fc765d3901d1b9ea7c72232751d8b238785af403qt5-qtwebchannel-doc-5.9.2-1.el7.noarch.rpm555c87aefacab075269841862880cafd974cba2d41d5c8e208a04a8afe61be05qt5-qtx11extras-doc-5.9.2-1.el7.noarch.rpme80bff60e23c74c569985c9d33a980681852abf8083bc2a7f16ce24be882f5b7qt5-qtconnectivity-devel-5.9.2-1.el7.x86_64.rpm92ae6880c560328c7a0c0f3d46a347b29a32abe757d757412c892af817d1e13aqt5-qtscript-5.9.2-1.el7.x86_64.rpm5fcf226a517eaae2c63645f8e7970c15a6c38f759191e8f0c9937588d63ff492qt5-qtquickcontrols2-devel-5.9.2-1.el7.x86_64.rpmbbccbf19a023537126d178933ece6681c3fa02491e3a8f091e8ad482eaf121efqt5-qtwayland-5.9.2-1.el7.x86_64.rpmc6fa425e09deda75c0abd2dbdd9175baf259631af0309b8a61a96288a9ea0ac0qt5-qtdeclarative-devel-5.9.2-1.el7.x86_64.rpm022244b6a8e34cce2599112ccc3f951161ea75386f6cf28f54d5b03e5e2b432dqt5-qtxmlpatterns-doc-5.9.2-1.el7.noarch.rpma3c591fb8707796fd999bd8ad9a95c032306a356a3b8885c77a5571834cfc06eqt5-qtbase-static-5.9.2-3.el7.i686.rpmcefe53bee3e829a3420ce770296ba9002bc31c37106f95d5489ce6e03587257bqt5-qtwebchannel-devel-5.9.2-1.el7.i686.rpmf6141e7aaab5338d8e9fd89f80043cfac668f607316f6189117a1fa862e87873qt5-qttools-doc-5.9.2-1.el7.noarch.rpme20a70d5ae76880d64906fb7f0760cc7bc51d69615760304cdd54ccd0c281cc4qt5-qtsensors-examples-5.9.2-1.el7.x86_64.rpm01695ff4290b14b49ccfee6ed6f0be6562ca77b9598746489d8eb2b4afef19b8qt5-qtsvg-doc-5.9.2-1.el7.noarch.rpm2d2d675e025540760b2d61eceeaa2714009ea9bd47f88af419f25847d0c9462aqt5-qtbase-devel-5.9.2-3.el7.i686.rpm7bc352fc57ab1eb900be814d083a5a1c237b2d91d12f50caa47ca0ddc1c96209qt5-qtmultimedia-5.9.2-1.el7.i686.rpm55aa10bf8a39b1995d84c66ae0407a30e1baf735950785568a3b86e46e2a9388qt5-qtlocation-examples-5.9.2-1.el7.x86_64.rpmbdc7d8de4e5ddea93182bfe2fe41ec1223efd517d5402def63fbf2481fa8499cqt5-qtscript-examples-5.9.2-1.el7.x86_64.rpm3de9719f206342712845110dc55a12fa21429fbd61b0db0317e88dae2136ad30qt5-qtbase-gui-5.9.2-3.el7.x86_64.rpmffac86d0a75d27e9000330f549100a768983e6003851463266d85210e8f6525aqt5-linguist-5.9.2-1.el7.x86_64.rpm549fb6597bc8e8405c360d5caa4f3c632d60e381b52eb974036ef7d74b7696d8qt5-qtcanvas3d-examples-5.9.2-1.el7.x86_64.rpma30f744c213a2672549deeae0a19b4b868757755c88d48b6d52c251374e7e518qt5-qt3d-5.9.2-1.el7.i686.rpmd499b41887874c38e8fed8d34e234665676c360ad71271fd81bed080d6cca782qt5-qtenginio-1.6.2-2.el7.i686.rpmc5d4bb7fc7643e0fa06f71de41acd1105f9c313684973e828a8e842847c9c91eqt5-qtwebchannel-5.9.2-1.el7.i686.rpm938fdb75364edb7a2f227b5f54ead787e1605c544db3f8375ef2ba8635e22fb9qt5-qtserialbus-5.9.2-1.el7.x86_64.rpmf22fb804e00fed520b987e757dc9a626452a589cb2276ab6edb59455f136f383qt5-qtwayland-devel-5.9.2-1.el7.i686.rpm75fa21af3dba73592f00b27aa1db31f7db04d6debf4de8ff22bd9466dd66e32eqt5-qttools-devel-5.9.2-1.el7.i686.rpm341a8f177b517546305a34cb2976b11889ede0e974826e2566844f66f52563bbqt5-qttools-libs-designercomponents-5.9.2-1.el7.x86_64.rpm96f5dc620e9bc3c3415031fe70d47bcb40b80c3abd5f574b282521518dd501e5qt5-qtenginio-devel-1.6.2-2.el7.i686.rpmb3e2cf57b90b2e5ff2d19a3716eb17ca6a9d45b6e189297f2071a7bf1b1771b5qt5-qtgraphicaleffects-doc-5.9.2-1.el7.noarch.rpm7286095cf2bf7354a75e41bcface13d36c5bf67c93b4111b160b67cc053c0b21qt5-qtbase-mysql-5.9.2-3.el7.x86_64.rpmb0ecad2cf4ceb199410a6b397e1c3ce14d394dddc9b270cec994a378ca43e112qt5-qtbase-postgresql-5.9.2-3.el7.i686.rpm866fb88bb3e48e46e28fd305f26ce0ccf1b0324ed0719300e591fc3b6f429d72qt5-qtquickcontrols2-5.9.2-1.el7.x86_64.rpm8c47192ee13982ebe5eb36e6c21f4f618304b3050e19956f463db0ef4904cdd1qt5-qtquickcontrols-examples-5.9.2-1.el7.x86_64.rpm4658b07b288f534224ce0931fcafd233d6ef6b9cdc23bf05351f4cdddeaa19d7qt5-qttools-libs-designer-5.9.2-1.el7.x86_64.rpm881fb1c56b886adcf002234881cdee619fe3f9b20c40d26b65027b2221b14111qt5-qtwayland-examples-5.9.2-1.el7.x86_64.rpmccb22a2838b6aa7cfc819fee940f8927824ff4fb31e23a3f03379376b5c910c8qt5-qtlocation-devel-5.9.2-1.el7.x86_64.rpmc104467714a75e82fe92182430c80689044e0e393963aa052756394f74166e5bqt5-qtx11extras-devel-5.9.2-1.el7.i686.rpma838d276c0d6b241fbe5defea3b579b8365b80ab511dfce931d3f8d79f3b24abqt5-qtconnectivity-doc-5.9.2-1.el7.noarch.rpm735ee04c8ebd234b48324526f8346124e4ccb115e9cce5b2fdf1e4916e0d98a9qt5-qtserialport-5.9.2-1.el7.i686.rpm2f7b1c3340230bd78ea6abf1ea21eae3b9d675e523e2464885ef9f89656cb7dfqt5-qtwebsockets-devel-5.9.2-1.el7.i686.rpmde5d6f5448a4687cfdf86bc048c9d786842e846f4b3aa6ed826810f46e9c06c2qt5-qtenginio-devel-1.6.2-2.el7.x86_64.rpm991c13294c2d403aab9ae39cd0450bbed76676aa8e49ad40c05fab85bc535909qt5-rpm-macros-5.9.2-3.el7.noarch.rpmf414f0ad8d3c873f3db321cde9b4231e339ce713dc273f14029ca02a3f89eff0qt5-qtbase-mysql-5.9.2-3.el7.i686.rpm5d519966bd9f52f54099dbd5146a5415f8459fa8cea21c336004946c3aea763bqt5-qtwebchannel-5.9.2-1.el7.x86_64.rpm5f1b934210cb4fa33ff9ac249a843e37f882c434a8dfae4835a17a0159bc16a9qt5-qtbase-static-5.9.2-3.el7.x86_64.rpm262872b9bc34b07b20e180c0dfe2206bd1abb87246abf5d81322bb98dffd223fqt5-qtwayland-devel-5.9.2-1.el7.x86_64.rpm187c2839b456bf7156638c7b77767e89f9b82621a9452ac9501bc6764d2c9433qt5-qtmultimedia-examples-5.9.2-1.el7.x86_64.rpm57f1df776424783f3684de252961790a7a108e5efe4921856c5cca8db5b38643qt5-qtbase-5.9.2-3.el7.x86_64.rpmfa17c8b081911d4323203b7faafcb6f8d673a49560c3c17e545c19707ef8a622qt5-qtscript-devel-5.9.2-1.el7.i686.rpmd4eeb5365dab15e1015900b145517feb577cf78271a878c2536b05eeed00c25cqt5-qtquickcontrols-5.9.2-1.el7.x86_64.rpm0de862fede658e9903a68650696646fb6c9e79bcb053886c9bc5474bbc82dfc2qt5-qtserialport-examples-5.9.2-1.el7.x86_64.rpm0a5576d04b1324b182170c1ca68aad56d85c1aaa27e71b65315e0eb077f9e4c1qt5-qtlocation-doc-5.9.2-1.el7.noarch.rpm25488a938104500db17fa3b4b4b265ec38fe96223e80d164de9dcaf7929f1cebqt5-qtbase-gui-5.9.2-3.el7.i686.rpm568ad8950ef45bca3ff95b0d94d181e9d3a4e03ead26596219dd4bd22e51d96fqt5-qtxmlpatterns-examples-5.9.2-1.el7.x86_64.rpme3cb9e7505b2f4c307d00aba62166c1cebadb36348ee4604fcb9ec9d70e0177dqt5-qtsensors-5.9.2-1.el7.i686.rpm410f7335771457f4b2ef29840b7e12fb4eb0b595cbcc80fbd677006b70bd6af4qt5-qtwebsockets-doc-5.9.2-1.el7.noarch.rpm777ad5398b2e96dfa48a642fab5eba1a64e5d78e6273a681ac69522d80ab1133qt5-qtwayland-doc-5.9.2-1.el7.noarch.rpm8c4a5da80b9fe94e2f7f3cbf6b077fef8d554ae32b6f7a6afc7d3871dfb3b683qt5-qtquickcontrols-doc-5.9.2-1.el7.noarch.rpm2ac3039e97202ce0fda30184ccb6ba1f7ba646277490a6793db48afbfb26a4b4qt5-qtmultimedia-doc-5.9.2-1.el7.noarch.rpmf3d565be05948b6f4818cd71445b5908d671feeeb4ed94fc4ac8bb71ba07bcf2qt5-qtmultimedia-devel-5.9.2-1.el7.i686.rpm1a43759b4182dcf51e05e93d309b120f3f5385820c898304f36164d1908a75fdqt5-qtbase-5.9.2-3.el7.i686.rpm96222cfd5b7870c5da0f4bc10d4fb8bdecc1e29a77f41395e4028c71ceadc830qt5-qt3d-devel-5.9.2-1.el7.x86_64.rpm6bf3e232c68cd7ff408f31ba9a7104aa1e4cbffce9fd9175f0085468c30db585qt5-qtimageformats-5.9.2-1.el7.i686.rpm6deabc5fae07bbe8daa6d5c631a9e45e8b7e6d4d50bd19d710a16f22d03ca6eaqt5-qtxmlpatterns-5.9.2-1.el7.x86_64.rpm068dcd0523bd6bed878e57e6b28030a579dcead071fbb0a2894ee557f98b7f7fqt5-designer-5.9.2-1.el7.x86_64.rpmbe9042e3d09af2898fa055716cc21e7877fb029baff6af3b1ca007125f1ef9a0qt5-qtserialport-devel-5.9.2-1.el7.x86_64.rpmc8113cf89cef84e85de38aa88d0f46c5dee53c47a3bfb40bb770c733bfbb46ccqt5-qtsensors-5.9.2-1.el7.x86_64.rpm81fbe834b4ae27d61e50bb2df3894e992c7393fd44601cd8eaf2379be7d3f9c4qt5-qtlocation-5.9.2-1.el7.i686.rpm378383186a3f540f87c3f7686e2ee42452150066793f7db5d1626e2c4909c673qt5-qtx11extras-devel-5.9.2-1.el7.x86_64.rpm0d6a6129a356b7ed1e175cb4f8c47aa2557f13355a99ccc267289a9aa629babeqt5-qtmultimedia-devel-5.9.2-1.el7.x86_64.rpm7601a21862e856e2d72f8ac36d5b3e7297465ab5738b0f55cf0e6e20e85a25a6qt5-qttools-libs-designercomponents-5.9.2-1.el7.i686.rpm065eec124f6df28c33d578877f0e4e2f5c42bdf7515a566d561d3ba0977574f1qt5-qttools-libs-designer-5.9.2-1.el7.i686.rpmc93cfee96a0b61b1962fccc05cf1dfe63b66d5f4edf89bc23f5cb5bb23e9aef5qt5-qttools-5.9.2-1.el7.x86_64.rpm4ce5d204878c67b4d1176e31b56419120dda0218637b6819506e2368d72dac0fqt5-qtconnectivity-examples-5.9.2-1.el7.x86_64.rpm4e89b8e46b2ff5961eb3a737156380e43598ccaefdd851d3971303dac4a3020bqt5-qtenginio-examples-1.6.2-2.el7.x86_64.rpm55f4be6b174b75ae195fb213351150513774240991be8adc960709514a930cd9qt5-qtwebsockets-5.9.2-1.el7.x86_64.rpmc989e9c154cb277aad4d3d3859c7a4082e6553fe7fd16d1b9016e8fe2d63c4f4qt5-qtdeclarative-static-5.9.2-1.el7.x86_64.rpm6c04f525e0d4b90c8f229823959462ddc67b0d194673a135aab9b07269e57286qt5-qdbusviewer-5.9.2-1.el7.x86_64.rpm22c1e409c3f2c836f9e0e1251af6ecbe30242ecdf533159cdb144ab889dda898qt5-qtwebsockets-devel-5.9.2-1.el7.x86_64.rpmaa05d2edcb476ceff42b0feee15e718d222b6269b61a2c0b43c9d446f00cccf6qt5-qtquickcontrols2-examples-5.9.2-1.el7.x86_64.rpm98e2b99afc4527a8ec7b0c280394474cb6823de55876853c0c0b2ece400d7e9cqt5-qtquickcontrols2-doc-5.9.2-1.el7.x86_64.rpm12ba62ed3d39e2d7c82958f976441b5106a49f548ca09e3f96dac21ff34fcfccqt5-qtscript-devel-5.9.2-1.el7.x86_64.rpm3d41109c09d63ccba66cbf6c4a803a41c025c372a735ab3ff4e772d7e31cb55eqt5-qtconnectivity-5.9.2-1.el7.x86_64.rpm6ebf1d74125564a2fcf403b35744d282d0bb7ff612436ff336b33b8fdb0fbd29qt5-qtbase-common-5.9.2-3.el7.noarch.rpm060b050f1f86aa96b68fe4685b78aac9e14192c3e17cb54764b2c61c68c117caqt5-qtsvg-examples-5.9.2-1.el7.x86_64.rpmdc3acddcabafd33ddf3c009813db3251c3c12d1c6507e7506ad61eb5c2566466qt5-qtxmlpatterns-devel-5.9.2-1.el7.x86_64.rpm5e87a82e4b389c52350083a8a907785315f655982d99b09262551d6232ea1abfqt5-qttranslations-5.9.2-1.el7.noarch.rpmf868fa010ce53ff6e4a1320894cc500903d4be40cee038c3f887e5cd9b0c8ebaqt5-qtxmlpatterns-5.9.2-1.el7.i686.rpm44d42e09bc99ce52b6d9e7f45229c6fbc882dbed5b4850f0ad24916e527d3244qt5-qtsvg-5.9.2-1.el7.x86_64.rpm2555fd470c9806c3e017c84e75d1ffa60521062cf5349199f7eb7a8b31b00c06qt5-qtsvg-devel-5.9.2-1.el7.x86_64.rpm1a99e2db24b892141fb20677d17cd7c11d3071cb26834a5ddcf81280f5c3d29bqt5-qtgraphicaleffects-5.9.2-1.el7.x86_64.rpm84744cb4cf9b6a1d6237e4340343f645e3593c2cd128a7dc15dd25c2b4560f38qt5-qtserialbus-examples-5.9.2-1.el7.x86_64.rpme61da0147f152b42366a194fc41e710ec3b4831f5b4ef979aa69bf12c441dd6fqt5-doctools-5.9.2-1.el7.x86_64.rpm1d759c4631883913fad127cbfe388dc1511bf9cc9702389973fa8f14b13f5e21qt5-qtdeclarative-5.9.2-1.el7.x86_64.rpm918bf40cececf38cb597b20661b57064fe09d6669b1e8e1397031429b4edb3dcqt5-qtenginio-1.6.2-2.el7.x86_64.rpm338232f690a6253d1dbb9ea3c0a2a46fc96ddfb30e06893d88de17c840eb1792qt5-qttools-static-5.9.2-1.el7.i686.rpm15cae988e3f34ece319095765e788b0e454c7f391283e960089139b725b1bcabqt5-qtsensors-doc-5.9.2-1.el7.noarch.rpm265a5b00dc7800615e03d857cd1a0ebbdb3fa8ef93ec5bee9c10f9d68c8cec13qt5-qtlocation-devel-5.9.2-1.el7.i686.rpmfc984180a4a03e272c5505f107cff8879b5b6593e1cbb470c513c79ddbd57e44qt5-qtserialport-doc-5.9.2-1.el7.noarch.rpm3bd570688474de6087ed4ae2511d600ea2e309f3e7d26724c6b2784a9a9eb180qt5-qtsensors-devel-5.9.2-1.el7.i686.rpm43d938a931568d753d2170b1edaf52101837fd0f27637d2e4195b186ea2109dbqt5-qtdeclarative-static-5.9.2-1.el7.i686.rpm988614217aed683d72bafc2f0c32b47dba14c09b1286842f60bbaee1805607f5qt5-designer-5.9.2-1.el7.i686.rpm3d3c370325e68f78510e819faefa4f0a19a45271e9f8b069d81538c60a34d0fbqt5-qtbase-postgresql-5.9.2-3.el7.x86_64.rpmd012fb48652ed3ddf756afc13dbe0f7d0de18d83dad1a4a1689ac770a1b361adqt5-qtcanvas3d-doc-5.9.2-1.el7.noarch.rpmd1fa1d87b9229b91f590a544a1a9803542ba3fd845e7965af5509bbc1b2fc938qt5-qtscript-5.9.2-1.el7.i686.rpmf0e5b87f1f5dea38fe0f116bb75fd002fa248f3b16e2a6b962448303040c1f00qt5-qtcanvas3d-5.9.2-1.el7.x86_64.rpm7fa4f2ae83a1fdb4b14232522e360dae3bf91ff75846a28b887fc25a51827006qt5-qt3d-devel-5.9.2-1.el7.i686.rpmbefde6c862a59adf6e14901d62f51a673fd32d12f715e0e06e044c9f89e02b72qt5-qtsensors-devel-5.9.2-1.el7.x86_64.rpm8116351ff50d4b3844c5f3a1c9abbd53a79f7fb7ef9fa22d86ee04e32055e513qt5-qttools-static-5.9.2-1.el7.x86_64.rpm2912292dce1245faaf58bb7dec14a6826328d18071e9c699c9fca51adb5d9ea4qt5-qtserialport-devel-5.9.2-1.el7.i686.rpm65b940b101a687df3885295e51026b80081519f1fddb309f2af382b9c585a4d0qt5-qtxmlpatterns-devel-5.9.2-1.el7.i686.rpme1808965db9e113f8506efc0886b8eea169d50e00c7f56b32712a79f7676e5e6qt5-qtwayland-5.9.2-1.el7.i686.rpmbfe560a56c8d622e03d5e3ffb292d1b2851122ad1f0a425477642ba7e9811defqt5-qtdeclarative-devel-5.9.2-1.el7.i686.rpme20cca5e90e6110ab46c0f3d6d73e904a7ec4238608e09d51e8151d89904f166qt5-qtenginio-doc-1.6.2-2.el7.noarch.rpm7d1368cd9852c2263478ab3f29599672004cbec1a2876f310356f3f02e2bb361qt5-qtwebsockets-5.9.2-1.el7.i686.rpme1ae40b9c601c4b187fc5018deadb2f5ebf1174912f43901c32c7df61b05e5d0qt5-qtdeclarative-doc-5.9.2-1.el7.x86_64.rpm0ce2cc54033cfb8efd08b8c6ebb7e4bfd5c8adb51deded5d04da9627083b6f7dqt5-qtserialbus-doc-5.9.2-1.el7.noarch.rpma5ab4ebc3fb08a64731e9955c06ed3fd22c399a9f395519a989beeb747e17e34qt5-qtdeclarative-5.9.2-1.el7.i686.rpm7819b6b72106b9cbebb52106dbd273f8737a208536df2592614354f24b064a82qt5-qtbase-odbc-5.9.2-3.el7.i686.rpmab2f50d0b0324439d12b2a96f2bd5112b866bc813219a6524d0e453316264253qt5-qtscript-doc-5.9.2-1.el7.noarch.rpm6f1cbbe51cb15a23e806cdfbaf57c2c47fdb13a683d20317dc7926598a7c69a4qt5-qtsensors-examples-5.9.2-1.el7.i686.rpmb87026eebecac4580722a351843898cb26b31fa48fc2d290bbd343237fb9344dqt5-qtwebsockets-examples-5.9.2-1.el7.x86_64.rpmb8a76154f0aae311b14b027ae592563a48bc17698d0446f21a6ad14356120968qt5-qttools-examples-5.9.2-1.el7.x86_64.rpm3806388fa16a248f2123922e0aad95bcd23155cd97556e89ad6d126097620c2cqt5-qttools-libs-help-5.9.2-1.el7.i686.rpmdf98037f9e8aaa892ec170ff659ffa0ae7f43a30029d8f7693bbcb0366aea257qt5-assistant-5.9.2-1.el7.x86_64.rpmf714a658a78694aad9d6cef571d6aa6ce4d4161fae71b72f82787c50335594e1qt5-qtconnectivity-devel-5.9.2-1.el7.i686.rpm85318d1264965f286862ebe4651ec3fa25a7eb3fa74081f82f670be7669a9802qt5-qtserialport-5.9.2-1.el7.x86_64.rpm9e2b1e016bb8ae5d54797132ef99aa1b4661fc927db2b88f2ffe33b17b367c16SLBA-2018:0713-1Xorg-X11-Xinit Bug Fix UpdateScientific LinuxScientific Linux 7xorg-x11-xinit-session-1.3.4-2.el7.x86_64.rpme21be9fb3a474a35d4acace1ad4e6280f16d484b8b5ab9144d68b7ffe7b12560xorg-x11-xinit-1.3.4-2.el7.x86_64.rpm8a44987ae17f9459819e83d7eaabbbb7f4a0d92e13d713694aa9477a073be339SLBA-2018:0729-1Python-Virtualenv Enhancement UpdateScientific LinuxScientific Linux 7python-virtualenv-15.1.0-2.el7.noarch.rpm48ae8255677bcfceeb543bc2a25b361bb52b338e4dd054df58144ec4de56c769SLBA-2018:0736-1X.Org Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7xorg-x11-server-source-1.19.5-5.el7.noarch.rpmbd15ffa91b76c84b051d0d34c72d926ff60b1b7e5bf7f0e90d38f8c285a42e43xorg-x11-server-Xorg-1.19.5-5.el7.x86_64.rpme6d5dbdefe5d8b7ef05fbfcbe186c508e9150dd71bb76258e236b28b13f3bf1aintel-gpu-tools-2.99.917-27.20160929.el7.x86_64.rpmc6c5e708f24198562d206394b93890428c67e410496ec493142c758610aa2642mesa-libgbm-17.2.3-8.20171019.el7.i686.rpmedb3a9cd8996f992245286b6d90939b0463d28c83e959023b09860fb6075d23bmesa-libxatracker-devel-17.2.3-8.20171019.el7.i686.rpm5434156b4aac8f276a8e88c879380869d528c8576483d9c226e7dd41bed8cfe2libdrm-2.4.83-2.el7.x86_64.rpm37cde9ea11b52120818e30d645ae63d9d3477e0504135f34ba1269c66399186emesa-libOSMesa-17.2.3-8.20171019.el7.x86_64.rpm67d03273981f046d4451b7194854fa52986fe3ff669303ed18d3678ed99a58ffxorg-x11-server-devel-1.19.5-5.el7.i686.rpm8af856eb77165c44337d3e2c19ed2607d994dbd2057063187f705850c1ea7aafmesa-libwayland-egl-17.2.3-8.20171019.el7.x86_64.rpm5da049ec25004c78cc7894492f5e0b85d2af971127329ad56cf6463f377b2ca0mesa-libwayland-egl-devel-17.2.3-8.20171019.el7.x86_64.rpm1c2f30b7a62abca84ddd1183afb5be307a7cb84984a801938f43754cbeb587b2xorg-x11-drv-intel-devel-2.99.917-27.20160929.el7.i686.rpm10c7ff6873ae3b4c39df7685da2667ce5c80f22e2b04876847d6636130d4e901xorg-x11-drv-intel-2.99.917-27.20160929.el7.i686.rpm21673d5be8d2e9c05a51480749590931e2cae9de8d1c47496726e336f68a6184mesa-libGL-17.2.3-8.20171019.el7.x86_64.rpm42b3cfeed4d26a086f8b9af3f7f0f152adac30041ec21b60b77633037b7789b5mesa-vdpau-drivers-17.2.3-8.20171019.el7.x86_64.rpmfb8f2f8b7c4c1df5ffc92c28f60e9b871cfb37bbd7a7e188d627b5624e848388mesa-libOSMesa-17.2.3-8.20171019.el7.i686.rpmfc8ce68c30c83b808f8ee0c2558645557c3f73392ec8703e2d2b704b45d66058mesa-libGL-17.2.3-8.20171019.el7.i686.rpmb7ed9a009990102d0a006379e4eaf88b9930a726ccf829cf106122b2bdd7f815xorg-x11-drv-wacom-devel-0.34.2-4.el7.x86_64.rpmc6758fe7e8f46cb7fca97cffc80b19f59d2bdbefcbb8443beba680b436fb0071mesa-libgbm-17.2.3-8.20171019.el7.x86_64.rpm2bb73ddc7c7b6e9396714c8fe1576c8118edfe7fc5cd983dafe5367c9829cb34mesa-libwayland-egl-devel-17.2.3-8.20171019.el7.i686.rpm173b7540350a6ee8f038f2cf7e5a76faa1c67f8d9a285ead6b39ab591c3362cdmesa-libGLES-17.2.3-8.20171019.el7.i686.rpm49246a447656fc3e627524ae0dc0661b716f933ef34d8ad84da395a8e545b5a7mesa-libxatracker-17.2.3-8.20171019.el7.i686.rpm6f669a70cbdd3b3725b443cbd7d94caf635bf472689f87f8dcdad6b138f552dbmesa-libGL-devel-17.2.3-8.20171019.el7.x86_64.rpm421d9cfef03ce45b13ff2afd3a2e3497f354f5caff6f517209a23e150acd3384mesa-libglapi-17.2.3-8.20171019.el7.x86_64.rpmf569f4837c06bac08186be8e26d32750c8db6e8c59f81b35f5f65cd4c68237a7xorg-x11-server-Xephyr-1.19.5-5.el7.x86_64.rpm757e7afdad896d68bfcad1fa88e098e682ded50d4e43060db4ffbe01399db877mesa-libGLES-17.2.3-8.20171019.el7.x86_64.rpm5e0d224e41a9cdb96505a714b8409cc8dab3f9ef74b6af9c11d4754cf62c0899xorg-x11-drv-ati-7.10.0-1.el7.x86_64.rpmdfb2b551988b7082006771bcc101f2b9409150e15f0e29c0e1a035cd57a07afbmesa-filesystem-17.2.3-8.20171019.el7.x86_64.rpmf7e85b04264118708ed628af78f992c26c1283cd4f61d225706ca2a4cdf6aa51mesa-libEGL-devel-17.2.3-8.20171019.el7.i686.rpm77b3eb0a79c0ae69164b352316a18798132c1510461ceb1cff375744240dc232mesa-dri-drivers-17.2.3-8.20171019.el7.x86_64.rpm5f32a0ff2668b72760d5cca84009679d49b33a648ca35cb130921c4b415f7a31mesa-libEGL-17.2.3-8.20171019.el7.i686.rpm20622400e104657956997eea5205c2e7ab4dfdc4534d3a3dad8e990271fdaf52mesa-libgbm-devel-17.2.3-8.20171019.el7.i686.rpmf59dc460817d8c7d46ac1c571f94ac7f8785eea7fe39f42ab4d7da2b7dcbc7edlibdrm-devel-2.4.83-2.el7.i686.rpm0ba69524998de0dbace16c51c75e1e63722b9f1a74838c273557635b1603836elibdrm-devel-2.4.83-2.el7.x86_64.rpmc9ba70f8789db7d1e9bbe2aaae082163987f3ad4c7de3bd93215dc5fb8e555c7mesa-libGLES-devel-17.2.3-8.20171019.el7.x86_64.rpmc8e86d249e4d83175c8e5204bd8caca82be72eb33d30746e0cd9d3bd3cb4fcb2xorg-x11-server-Xdmx-1.19.5-5.el7.x86_64.rpmdf53d90decbc22fb8df8320da3add79bbec7c3a989ed058275a1234bc9e062c1xorg-x11-drv-intel-2.99.917-27.20160929.el7.x86_64.rpmca7a2689e0fa2e767f1c25544fc026e006d9e4c5454e497949e4cc6ca22fd9famesa-libGL-devel-17.2.3-8.20171019.el7.i686.rpm9b7ebbe52c4fd692f7da8c4924825dbb9a26f33d6dbc8979d40ce11e605d4a0emesa-libEGL-17.2.3-8.20171019.el7.x86_64.rpm1c864e8b8c51f32dc63c4a3c9780a04b63c3d9b82227ee7f6b5eea3bf24512aamesa-libGLES-devel-17.2.3-8.20171019.el7.i686.rpm316dd829e07f53bac2813c64b1290081c81022a2771a4379f8643a203f3e5d80mesa-libOSMesa-devel-17.2.3-8.20171019.el7.x86_64.rpm7d34be14d2a4c2e9f47b91e9e5e523ffac5df8c0afa2559d4e2e71d429a426c2mesa-vulkan-drivers-17.2.3-8.20171019.el7.x86_64.rpma2f8f611b52040e20086fb8dee0b514dfba2de8ae67a1dfee4c7a4d0434285b9mesa-libxatracker-devel-17.2.3-8.20171019.el7.x86_64.rpm36ce04219fd5130179f8aed8deb9802a9ccedb6c72f36eae95e4a9c6876f66c7libdrm-2.4.83-2.el7.i686.rpmd03350585a14706bf3161df5475a7fbf90487836dccf0555a36e8068c7223788xorg-x11-drv-wacom-devel-0.34.2-4.el7.i686.rpm8d7d3f2004690819cada2322708e7e3ced771cf666de161b64046fc263d45261xorg-x11-drv-intel-devel-2.99.917-27.20160929.el7.x86_64.rpm30ea14dc332665ed3f96ac36f31ede9504dd8ae52e0d74d3124743bcd533a6d6xorg-x11-server-Xnest-1.19.5-5.el7.x86_64.rpm9f7d42b8802f2047905d7a4b5e675ad303afb139120be59b27ea34b58d158ea8mesa-libwayland-egl-17.2.3-8.20171019.el7.i686.rpmb6d08712f78c1a56ef933d27ee84a900e1760b43bb37f877e97c94e400197b9fxorg-x11-server-Xvfb-1.19.5-5.el7.x86_64.rpm1cf02189f240dd02d77a20e98db55afe1950e99208f97ca59d6d46b3e9024bb7mesa-libOSMesa-devel-17.2.3-8.20171019.el7.i686.rpm1b089c7f0c0f9112ac991081a7f99348f33642e751ab895b660bfc172b153233mesa-libglapi-17.2.3-8.20171019.el7.i686.rpm1ba092d4509833a23d173421a2303ffb1542a75f2e5dbf754d41e77af3542dfcmesa-libgbm-devel-17.2.3-8.20171019.el7.x86_64.rpm1794e8ddc5181e35e633a328efce46147dfb497ad1e408f3819545b020a03b35mesa-libEGL-devel-17.2.3-8.20171019.el7.x86_64.rpm911af2d65add4e71a6b909bddc13e750b8d3363c9d873d0653b3b988be5a65b2mesa-filesystem-17.2.3-8.20171019.el7.i686.rpmc93558eb75a825d81de4dff48a11841d868dc6e07c5928c6c03826a31686cc73xorg-x11-server-common-1.19.5-5.el7.x86_64.rpma3140292c734a405f95a417b9226b59ddcb8bc3b38dae213162917e906de92damesa-libxatracker-17.2.3-8.20171019.el7.x86_64.rpm0b3855940bec5796485091d6ee7faf0803235c860d9d08fab1f4b9ca84a8c432xorg-x11-server-devel-1.19.5-5.el7.x86_64.rpm715f0f914176762f4b235423f5d940116b47f2b76a44df83f36d3856202585d0drm-utils-2.4.83-2.el7.x86_64.rpm8663365f5cfd1df315635533f8ed43ce6bcc05a13de615cc732c3fc3fa802313mesa-dri-drivers-17.2.3-8.20171019.el7.i686.rpm014185c53c1cfe74ba3207db08fe7323d4143e6b200e86facd28616498b987e5xorg-x11-drv-wacom-0.34.2-4.el7.x86_64.rpm057cb295d21c190c84e22c06a0e4c5839d474f47a002204e269a188d039952ebxorg-x11-server-Xwayland-1.19.5-5.el7.x86_64.rpmab6eaa5189b57ff3f74627283cc77d385f63b527c4a321e3818a1ee6f82ed897SLBA-2018:0751-1Libreoffice Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libreoffice-help-bn-5.3.6.1-10.el7.x86_64.rpm794e706b3393b35b3ebe1b5da96149d397b90327bbe929205173c4ba137db4eaautocorr-da-5.3.6.1-10.el7.noarch.rpmfdf0bd4306972b4139b50faf9d62cf779c4781a7357b0eee1c8d941ab06d5fbclibreoffice-langpack-zh-Hans-5.3.6.1-10.el7.x86_64.rpm9f1142f292f607f13e4bdfb4bd344457d9d111b0571f9b9bff3066f6fafc1677libreoffice-help-sv-5.3.6.1-10.el7.x86_64.rpm18493d56959e7c27433cdc3bf52cae0fe2125527b767ef98b4087388aca0040clibreoffice-help-ta-5.3.6.1-10.el7.x86_64.rpm650ae74dcd50f06f5add786b1b252995f2fd7f1b90d33caf6d339fc508b6a14flibreoffice-help-he-5.3.6.1-10.el7.x86_64.rpm158299d509391fbbe46314ae3eed2fda683073ac4ff366d4523336c2d2e708e3libreoffice-help-dz-5.3.6.1-10.el7.x86_64.rpm211495226f0ec9f5de6d394e5b49931f4739960c86de05399250477a2461da23libreoffice-postgresql-5.3.6.1-10.el7.x86_64.rpm847e400820763067402d30f4b1e7373f96796653c130001dc9ba9f08a75b0396libreoffice-langpack-ve-5.3.6.1-10.el7.x86_64.rpmf8934ff96dc8f959d6bdc28c81f7388e046b2630dfb4d2bf3a17d3174e0812a2libreoffice-help-ru-5.3.6.1-10.el7.x86_64.rpm2ee9e04d9b4016e6372451e87b2d4f2855c1d5c1d786d101b88b1761ee25ba88libcdr-devel-0.1.4-1.el7.x86_64.rpmd525661012b614548c8bf8964a97d82d0287d45fa39397addce11ccb60a5e36dlibreoffice-langpack-hi-5.3.6.1-10.el7.x86_64.rpm9762c47bc6b3ba37514c61fdbf2934ec4f4414b61d1d0b82b89b28767a8eba95libreoffice-langpack-st-5.3.6.1-10.el7.x86_64.rpm301992590eae39f3f8310fb6ea89c77c20113f9504ce190e24f8e6be27cf510dlibreoffice-help-hi-5.3.6.1-10.el7.x86_64.rpme912b08c6e90d8f1f56621cdbeed2b4b4a781eb5c7961b1b4b7f1fefc07dd4bblibreoffice-langpack-da-5.3.6.1-10.el7.x86_64.rpm2b90c94cc4c131f0e510e5a84e7d6b84c4c62a168be40cd4a490dce43b9cb3eflibreoffice-x11-5.3.6.1-10.el7.x86_64.rpmd1eb5f5aab3f8aafc848f31250d66311df0d52bef45e2ff530d4946c6a23854flibreoffice-langpack-bn-5.3.6.1-10.el7.x86_64.rpm1877cf9c2c91eba83c1ffab2e65a5bf400df7726d5eabff5d6aee63bbc064dc1libreoffice-langpack-cs-5.3.6.1-10.el7.x86_64.rpme9e9c35e8f55a64347b2fb343ff4d5a91d4d8200db49f48179f49a3c6e4e3783libwps-devel-0.4.7-1.el7.i686.rpm22104b4b1e48f168281b0db0e9724278ae9ff94ddaa14f256cf567ae1b1304c6libetonyek-tools-0.1.7-1.el7.x86_64.rpm159f5188f735e400ae67ef90e456143014f69ecbc9b11853875d6195b6aa66f5liblangtag-gobject-0.6.2-1.1.el7.x86_64.rpm0471ae81dd41bc75615a556f642ba1a81bb9c2f80d96453bb17f6116b03ed928autocorr-vi-5.3.6.1-10.el7.noarch.rpmadb55a37652437bb1a38b0c38523ecd1f2d4ae2998209d589dee326c7fa6a1a7libwps-tools-0.4.7-1.el7.x86_64.rpm6272a1dc3bd1095a003c19266cc32f7ccaf0bf1a35824d8e43427466fc7d75f1libreoffice-langpack-pt-PT-5.3.6.1-10.el7.x86_64.rpmf991d8d3586307bf1720e9b190bb650335ae6565d85afdb632330a966d325f5elibreoffice-help-hu-5.3.6.1-10.el7.x86_64.rpm2fe15953ef08b74b6b3dd700f46da55efdb457f7e9cb588ff56917d4c9b28c12libreoffice-langpack-ga-5.3.6.1-10.el7.x86_64.rpm00ecc2f3d5c14f846b1621e4782610b48cc4b91a789c4abe290271bc2d6d9150autocorr-tr-5.3.6.1-10.el7.noarch.rpmec2e04140e78e94816cacc5986e750b82610f847d22f8f6403e7769bf95d901dlibreoffice-bsh-5.3.6.1-10.el7.x86_64.rpm280c2e74cbca4c4d1b57bbdaca8db0e1836bd1cc439abf4e2393075e249356d4autocorr-it-5.3.6.1-10.el7.noarch.rpm9d97177b2f526312e5620fa456ca5231ec6e7cc8376186a975181acdb80c32f7libreoffice-langpack-eu-5.3.6.1-10.el7.x86_64.rpm76922668769f6dee4327c72f35472201f8534a725ab7187a93e136d4aa576e04libetonyek-devel-0.1.7-1.el7.x86_64.rpmca60353ffac3adc42c730976ee1ad35ddf2f0956e7dd16a322f8681a7eba0ab7libvisio-0.1.6-1.el7.i686.rpmf574ac37f8a884cd5d7d97f8934e2164da17d1e844859aa19afb6b194e460a7blibreoffice-langpack-sv-5.3.6.1-10.el7.x86_64.rpm6b3651225f26fce2d9b29c6ca81c83f6175c72e18b27facd58603d03c4e45ee0libreoffice-help-el-5.3.6.1-10.el7.x86_64.rpmd7d360136b281e071c1758fcc01d5756f34495eaf0f2ddb905ccfee266c6d36flibreoffice-langpack-tr-5.3.6.1-10.el7.x86_64.rpm0947c1877b3eab831c18a629973ef85961a58a1f7d33d3496b520df3bb971043libreoffice-langpack-te-5.3.6.1-10.el7.x86_64.rpm32363921126716b3a5a0ea711407286a2a21012c26c3ba6affe3ec922509bf4alibreoffice-help-es-5.3.6.1-10.el7.x86_64.rpmdd8dce8484e5c9d8c0ca626f0a2bce67aaf103de7f34f3dd68cd96586011dbeelibvisio-tools-0.1.6-1.el7.x86_64.rpm14061c3f5e17851ddf1a8512f29a2e6728b0a5e9abd90669cdc2289952457f52libreoffice-langpack-bg-5.3.6.1-10.el7.x86_64.rpm39f4e50cdddc834f43e4ac960ff23f97f5f745767ba392d59c3a2bc3ccb911d7libreoffice-opensymbol-fonts-5.3.6.1-10.el7.noarch.rpme3c809da85022a5eea853db0f2d7e3b2a4422dcf0055ed68bb9a4c240c281df6libreoffice-data-5.3.6.1-10.el7.noarch.rpma638b9d1145e59e008d39c27a9cdcc0b3fa420c16443b3f8b14a93d47015daceautocorr-de-5.3.6.1-10.el7.noarch.rpm81326c670ae58535f0429ec410ce0c3d8de78af267296bb3c705727aed02377flibcdr-devel-0.1.4-1.el7.i686.rpm7c6d4e19919949cd7eeda49a6aabd8f5651c3033689d719fe0bf357f033859e5libreoffice-langpack-pl-5.3.6.1-10.el7.x86_64.rpm84845f2cea33db80a883fa836232b3651ca2b39045870b5ef4161c8fa7738e4clibreoffice-langpack-or-5.3.6.1-10.el7.x86_64.rpm0f0e4d848591e6316910f429811ba23d34875b71256b4c807934c6d221d21606libreoffice-langpack-si-5.3.6.1-10.el7.x86_64.rpm398e2eaed316ea88897121da70d0a1838bab404fe2fa89647488c23eeb87763bliblangtag-devel-0.6.2-1.1.el7.i686.rpm1776f7627fbdce61233bbc7fd801ba6fa59c7535cf10c5aaa86c35ef62b7dfa6libreoffice-langpack-mr-5.3.6.1-10.el7.x86_64.rpmd408946a4df2aca5d8f826855a5809fcbe62c817d85fd68a87a579cfa6497661libreoffice-langpack-et-5.3.6.1-10.el7.x86_64.rpmdc224cca9104d5606b7f4ddbd595d97ad8c2fd7357ca6415d155105bb223dd2clibreoffice-help-ja-5.3.6.1-10.el7.x86_64.rpm9fa8121c4fe6e7450fbfa8aa4e85005a0d6d2d0465918c63eccca16f23a71e33libzmf-0.0.2-1.el7.x86_64.rpm9b72ce6d8cf7291e3b24a39202a04111e73b0bbf13e7c543140cacfdec4a0f46libreoffice-math-5.3.6.1-10.el7.x86_64.rpm2f4438283eb8378174fc923fd1ceba1a54a2ec181719de2a6e286d5c90a1d106libreoffice-writer-5.3.6.1-10.el7.x86_64.rpmae1d9a47d693d1ccf5a1beba0e8a548b895130d6eacea1cc310a4bb4da703296libreoffice-langpack-kn-5.3.6.1-10.el7.x86_64.rpmcb3a60dc3f44e111402942db4a24acbe11327bec342b54fa0753578697b48362libreoffice-help-ro-5.3.6.1-10.el7.x86_64.rpm38089d0ae0194e57308b5bded17f32e8757a3c908c0cf8f27a7b324b592911d5autocorr-hr-5.3.6.1-10.el7.noarch.rpm57999d822e23a47f31447e49467c9e35f209b9eb113d7058b43dbffaeff408bdlibreoffice-langpack-sr-5.3.6.1-10.el7.x86_64.rpm01c4ec380bd632947a080e1646e05775feb137999cc05d527feca6f002b71228liborcus-devel-0.12.1-2.el7.x86_64.rpm5d1a233790e7855253f6a5a01cf2dad165ebae5a14391f5bfe2a13ca8454b305libzmf-doc-0.0.2-1.el7.noarch.rpm30571fd15fe8123d4497bc3961026df5320f29fbf6b48fee135e648b69956bf8libreoffice-langpack-es-5.3.6.1-10.el7.x86_64.rpme50e9ec03ae86eeeeaab3b2049ce737d211dab7445ab0f608e9233de77d26ff0liborcus-0.12.1-2.el7.x86_64.rpm5a5aa01027e187238e347af1fbd0b148728100f52c75cbc46e06fc2127f9f084libreoffice-langpack-nl-5.3.6.1-10.el7.x86_64.rpm0356410eac8a2ed08069180e1c49887231c50be97839933852cbd731f358022aliblangtag-gobject-0.6.2-1.1.el7.i686.rpm4230c332d6e7bb4c3146f0966790f1221d0cf3ab7ade033b63079bfbf4773990libreoffice-gtk3-5.3.6.1-10.el7.x86_64.rpm03403e3cda70f144988641db7248d3adafd5142b7fc45ddf06d5129293d2f16clibreoffice-help-hr-5.3.6.1-10.el7.x86_64.rpm1c05a431167204d4e35b7e8389436733560778e17d38c3987957747501104feclibreoffice-langpack-fi-5.3.6.1-10.el7.x86_64.rpm264284fb79897a0d08fc0da48567e9e9e5051156cfba2594fcd61fe25ef827a6libreoffice-langpack-br-5.3.6.1-10.el7.x86_64.rpm68f12d54ed1c087957999f232a74cae6da1f7c9087169ef087b68564bc9a6ae1libreoffice-langpack-ta-5.3.6.1-10.el7.x86_64.rpm01f25c25c3a05a19905d376c67719eb8fdaecb8a5315703279bea15f985e2773autocorr-ga-5.3.6.1-10.el7.noarch.rpmb4d6f3f26293af6e691c70be0b34c4188fedc4143de93ed0649874af5be72d23libreoffice-langpack-nr-5.3.6.1-10.el7.x86_64.rpmd971fffd8e68a361858760fc3bad8ef0f2bb9ec743f3ac2f33f556cef5e7b59alibreoffice-langpack-de-5.3.6.1-10.el7.x86_64.rpm05482cb416e1b0a5e11508127e2ee30efec0e4f3d91691bc274c34eb4f52f058libetonyek-0.1.7-1.el7.i686.rpmf81f2c53e37106ff6135dfff8e457d878de1542669aaaf2a902f59b4e5040906libreoffice-langpack-zu-5.3.6.1-10.el7.x86_64.rpmbf9a953cda9fe0f7163aeade7fbfafcf6b2338a507e3fe5efc6cabec28a47fb8libreoffice-help-pt-BR-5.3.6.1-10.el7.x86_64.rpm159f4abe6e3d201e1291bc495b2035fdde8084ca19d83091cced288612adc697libreoffice-help-et-5.3.6.1-10.el7.x86_64.rpmcfa9bf291691aa5ac1a6eb9a6b736366bf057ca2639bc3cc8ddc279032858a57libstaroffice-doc-0.0.4-1.el7.noarch.rpmafb67b20f0f1394b90cf36a2ed89fbeb3e5ce243e255b3d860413c6d61f57c66autocorr-nl-5.3.6.1-10.el7.noarch.rpm9bbfb5db7d5c89a8222b6e96580a337d60c82ffa0a78662ef92e8e80f24b2860libreoffice-graphicfilter-5.3.6.1-10.el7.x86_64.rpmf4a0d85fcf5c769ad2926cc6a0bf36675e0d096c2707369dd7d975705a0c7101libreoffice-sdk-doc-5.3.6.1-10.el7.x86_64.rpm8794c5a5ad0dc72520224a59ca0ab7216218bbf66d722d4f6d186d221c69a3adlibreoffice-langpack-pt-BR-5.3.6.1-10.el7.x86_64.rpm8e2caebcaf435e1443feb82b76b6711cd9678fbd265b0f7a700aba3a4dac9c8elibreoffice-help-sk-5.3.6.1-10.el7.x86_64.rpm31d495b196e2cdf3f38fbc365449dfd2275a86d57cb37a5c61c8dcf6213cdc23libreoffice-help-bg-5.3.6.1-10.el7.x86_64.rpm6dc2f004420d8c9507f2a4192f516d29877199669376198d22b8cb0f17083133libreoffice-officebean-common-5.3.6.1-10.el7.noarch.rpm001c3dfd5f60decd40e82df23df05ab94035b20b98dcd39ad16eefbab01dc9e0libreoffice-langpack-ss-5.3.6.1-10.el7.x86_64.rpm2acd9f667ea7e9bc41d211e1ab2d965afefe076303277625205f7e3c9094b0f9libreoffice-langpack-id-5.3.6.1-10.el7.x86_64.rpmec8ac0b45ffd36ae0bde596153966b1edec5fef1aace875077a382d098749896libreoffice-glade-5.3.6.1-10.el7.x86_64.rpm2b02080cafb05a736abe87388eff80a344431507151648b037715d6e5611c84alibreoffice-help-nb-5.3.6.1-10.el7.x86_64.rpm0af2d3f2d452e9aaa3a96ce73a89e62e77597bf3e870400f4d95682125e04be0libreoffice-langpack-th-5.3.6.1-10.el7.x86_64.rpm8527788ddea6b500ef27d930d29c46bf6d3c78c1f28e5bedac236b7723022290libstaroffice-tools-0.0.4-1.el7.x86_64.rpm6e1f2317eb3fe03a8d06994ed68096b07f60d893d4aa5fbc56031651b18137fclibetonyek-0.1.7-1.el7.x86_64.rpmd7ea0845220e18318e8ab55cbc930440c74a5174ea3c98f2a7a08223eaa1e9d1libreoffice-help-uk-5.3.6.1-10.el7.x86_64.rpmbca67e5719f64a5293009e0e78f6bb6100ae9618ab0b8213146266902fb2e85elibreoffice-help-id-5.3.6.1-10.el7.x86_64.rpm7e99418202a1a25d82c945167ba303ccde41b6ab9726eff938e18b226f560135libreoffice-langpack-af-5.3.6.1-10.el7.x86_64.rpmc6dfe48917c2adc70757fdcab0daf67f7ecf669102cff3cfe96f2ef23861c1e9libreoffice-langpack-hu-5.3.6.1-10.el7.x86_64.rpm5f2ef5ae9af923af3352012bb6facf0b54d9736ec6669d0fd134c5400dfc53f5libreoffice-ure-5.3.6.1-10.el7.x86_64.rpmd6a1fb94e5e7c8baf71a711f95f7f182ba20dc8517c42e6e92c2438c79adbfd3liblangtag-doc-0.6.2-1.1.el7.noarch.rpm3ce76f8838933c247fa0dadd1801810fadb888ae12210e58999877d3fd07c20elibreoffice-langpack-gl-5.3.6.1-10.el7.x86_64.rpme0a045aece7752126df92bbabb31fe882e9a9a648c5eecc839a0c2756c7a3203autocorr-sl-5.3.6.1-10.el7.noarch.rpme3d2d778bed9396d2feb907dd02804e0c149dde166e53db591ae09b231677f20libreoffice-langpack-el-5.3.6.1-10.el7.x86_64.rpm3e65326d9a81bc6d34832a4d6e9a32383f57b732529d750d8ee3156a1470a0ceautocorr-cs-5.3.6.1-10.el7.noarch.rpm84b3595b688bb816d7557fe68d6e1bd6edde2294289615ae8735c947749fe7d0libreoffice-librelogo-5.3.6.1-10.el7.x86_64.rpm0400400eeaa62d225b104a6a7d3e661ed8191f8c754aabb62c216d02e78432aflibreoffice-help-gl-5.3.6.1-10.el7.x86_64.rpme7b6edfd257df980e8e496b1af496a2c7d95db2d78f33e11b5a740cd657100a3libreoffice-help-pt-PT-5.3.6.1-10.el7.x86_64.rpmcb5cd525a7a36d1010b73595afc9797a7db489839f5cb068e775ed79f878901blibreoffice-help-fr-5.3.6.1-10.el7.x86_64.rpm6f80ce69060eabcc1c1aa3df6393b2ae92fc73473fe046d564b16901967b83eclibreoffice-5.3.6.1-10.el7.x86_64.rpmb579c8c32d1b49c589de72846b0216aa0e46e23d785c18d34a51b36d86ca5839libreoffice-help-ko-5.3.6.1-10.el7.x86_64.rpm17983a732b8e1af00a7eb7bd0c9b8638888e8db7015e894e3f4bf01764075de9libreoffice-help-de-5.3.6.1-10.el7.x86_64.rpm811b2a224f4103fd1d2bb92079ae1a48adf988c9ff6bac53a397deb3690d1651autocorr-ca-5.3.6.1-10.el7.noarch.rpm0a0ca10b3262fcca180130546f0d262916874234e85321c9aa86ae79f8127f84libreoffice-wiki-publisher-5.3.6.1-10.el7.x86_64.rpm92698ec6b1fdf34bf543b1483b217e2a585a32e0706ddbdcddbeaaa621b367e8libreoffice-langpack-ar-5.3.6.1-10.el7.x86_64.rpm89d95eb8ef3ee7667b35b0bb06fe3e30665fb6a16f0b725b3b97edd07ec4b437autocorr-pl-5.3.6.1-10.el7.noarch.rpm96700d981845fcdb9b932b22f0c2c02b810e8c202664d89559c24d21760887e4libreoffice-ure-common-5.3.6.1-10.el7.noarch.rpm25837fc0e27c5b5eaba547fc57829431ee6d36b7688ced46c56ebd9c5a8a947dlibreoffice-pdfimport-5.3.6.1-10.el7.x86_64.rpm794d4a5017218a61aa2e4142b07d30dcc99c272d1dcf59c3f0edd4367219d73blibreoffice-langpack-it-5.3.6.1-10.el7.x86_64.rpmfd33504c26a680d768a0e06a4a80bd2d3064dfe80b645ff4b2244decc75fc416autocorr-lb-5.3.6.1-10.el7.noarch.rpm12aec6e915d0801d342d58a6c0044f2861013c30fcce29ec1a663c8e413bdf45libreoffice-langpack-lv-5.3.6.1-10.el7.x86_64.rpm68310da77ae3cc9298953f9ed2f60b6d42407af1e6cbb65401e49c882fc578a7libreoffice-langpack-gu-5.3.6.1-10.el7.x86_64.rpme7edff89afbf92f22f5253bdaf048a740f7f2cd3288a7d09535213acd2dd0273libwps-devel-0.4.7-1.el7.x86_64.rpm917e4e4d1c4ad0b33f87ad26f6e334578fcd48cb5ed2227311f76f121a6d1e03libreoffice-langpack-ja-5.3.6.1-10.el7.x86_64.rpma785ac4c88c7f38babb2761ab60c4b1c9ddc6411a63ff0d16124d355beb4113alibreoffice-langpack-kk-5.3.6.1-10.el7.x86_64.rpmd7e776530b76ea4d065d5a9c45827444ac266e65502cea75f378739d77853397mdds-devel-1.2.3-1.el7.noarch.rpmbe55f7a43f61d1e68c1a0806ee3b892317682299bd2a9b8a37ff9a8e142f5baeliborcus-doc-0.12.1-2.el7.noarch.rpmf3bf18a72acee9a376b29f9a25e3cf9ffe1649dbf98c1fea0d5d48c39064f160libreoffice-help-fi-5.3.6.1-10.el7.x86_64.rpm7dca51d2e8f765f1b357e6df34d1f48d146d6a2377b8ba112ce7b7592b729606autocorr-fr-5.3.6.1-10.el7.noarch.rpm30ea58e139e132febac7f7e61e9b29a175d584edc6dda4104bba4f0be1e4fd95libreoffice-langpack-cy-5.3.6.1-10.el7.x86_64.rpmcd1c48550d5b84951c7a00a0cc50bdf8101fbc44433189c0a08f9fe47836b43clibcdr-tools-0.1.4-1.el7.x86_64.rpm8b9e51ca2eedf9bb98947989ab4c35aae7a95f6b3f013252fae901d2571f7ce6liblangtag-0.6.2-1.1.el7.x86_64.rpm59fcff40a02f0d8265751e7bc2dbdeb9daaffb29c2a9521c47e46bbe8355b973liborcus-tools-0.12.1-2.el7.x86_64.rpma9de0b131588e68ed0a7e61b8111f709beb00621001835e3c73dccd118e067dblibzmf-tools-0.0.2-1.el7.x86_64.rpmaa7f269509d002927b93761b854e820160bd83dcfac0f548af4b10d314556c22libreoffice-langpack-ca-5.3.6.1-10.el7.x86_64.rpm5e6f2a56bd8521b2ca6c994db31e1f6acf4fde68fef9690b15ddbbca18f3d6faautocorr-sk-5.3.6.1-10.el7.noarch.rpm3ba2acfd55574f639cfda7de555426e9e6d950e9295fba096f0d7278d9876bc4libreoffice-help-si-5.3.6.1-10.el7.x86_64.rpmc1730c59fb17aecbad121e6ddd106318254983caca4b49dc44a42fee0ccd9505libwps-0.4.7-1.el7.x86_64.rpm76cbb5a98612ba3dc7d56183f2d0b2be9d3dd0ccc203f45446b98088c12be352autocorr-es-5.3.6.1-10.el7.noarch.rpmd14bdf2a3b3f29a5c5747948ca0382ff22ee9ab35f28932a0428e82b06ed771dlibreoffice-langpack-hr-5.3.6.1-10.el7.x86_64.rpmc3a4318c8d172fb2ec5527eab1b4064e4c91015ec27fee78db24032f0a1916e4autocorr-lt-5.3.6.1-10.el7.noarch.rpm1cd0c52351142d1d1717666fee158f715bb93a7d881fdbac7c57e606c10d4317liblangtag-0.6.2-1.1.el7.i686.rpm491240d879960bfafb134f2f43f1754ac3d3025e973040b90356fa6a847a4c37libreoffice-help-tr-5.3.6.1-10.el7.x86_64.rpm7f8c1c25b807540bd795950716b18535896f25d6b7e0566b1877984bce2c6d01libreoffice-langpack-he-5.3.6.1-10.el7.x86_64.rpm0238c29b4c8a1aff416446435d60416a7ec5b4eeaf6c17abd6cc07e69a72676dautocorr-ro-5.3.6.1-10.el7.noarch.rpme04b339ac63def40adbc64a6e1dc1af829604de964680e3fea020274443564d1liblangtag-devel-0.6.2-1.1.el7.x86_64.rpmcc5a72134108b6f3bcf9056028e94c635823bef5619603f8fa6b150bef1f5712libreoffice-officebean-5.3.6.1-10.el7.x86_64.rpm6b376255026be140e8b75f36b7ff2c8774eacefe2252b0298e6f3a63ab207c4dlibreoffice-help-cs-5.3.6.1-10.el7.x86_64.rpm028b9887809e72ac26817f034070a9110503e713e60cf637bf7d30675aec1fc7libreoffice-langpack-sl-5.3.6.1-10.el7.x86_64.rpmeff3da31df3f8b1bc1e5966dd7c5fbe08e72efa93e423e722b609451533dfcc4libvisio-0.1.6-1.el7.x86_64.rpmefb4b48d32df3f20e0e3124f5243fc03f878820c9a50e3e0e45337bfe3d0c636libreoffice-langpack-ts-5.3.6.1-10.el7.x86_64.rpm71d3fc0d0142305761a947ccf7ae823672522d46a0efa79aec01956822f2cabdlibreoffice-ogltrans-5.3.6.1-10.el7.x86_64.rpmf6119c09abc2ed20edd54b0b999d1a3380c96d34ada9d3d11cd3d4f1c4d52de8libreoffice-nlpsolver-5.3.6.1-10.el7.x86_64.rpm2b378a6dcd87df2b6c4df34fa75049201d9e71e1e4d52bf1499b1e3098ccd5d8libreoffice-langpack-nso-5.3.6.1-10.el7.x86_64.rpm04b7ee42f4a99b7d2d8a274c7c8a39d468f804f8dcdbe75ba65f830333b3fdc8libwps-0.4.7-1.el7.i686.rpme9c9d02c6abbbbcb3559d8b0e457fb17d06a4c62c3aa6aead9f85ca6d3b7e5b0libcdr-doc-0.1.4-1.el7.noarch.rpm029dec54d456cc1f98f4ebedcf4e9d26cc5675b4179a615800abf052e28c9e9elibreoffice-gtk2-5.3.6.1-10.el7.x86_64.rpmf4b3918c1ec55055016ac6fc651dcd173f4f9aac973c1f69b0e0d019f96db8ddlibreoffice-langpack-tn-5.3.6.1-10.el7.x86_64.rpm2ac2bdb9cc0aa04b76e45629b25f593610458253eea8b7f14f69633f7b039ea3libreoffice-impress-5.3.6.1-10.el7.x86_64.rpmec8fef361b791ab1d55ab7fa04bb2a5732ad1667285cbb0b931fefc27dc51d92libreoffice-langpack-nn-5.3.6.1-10.el7.x86_64.rpm4b33d0a13af453449b724b7aa6c752fbe6777a04544601ae8793c367bcb70704autocorr-ru-5.3.6.1-10.el7.noarch.rpma8b042e4f3d8f20605816f8176e68ef5a835d3a916d53ff634c64f36e6e51676libreoffice-pyuno-5.3.6.1-10.el7.x86_64.rpm692277c53eabb31af678f8c6585feae8dd538455c8468a038b605c087a7eea6flibreoffice-help-eu-5.3.6.1-10.el7.x86_64.rpm37950e36e4ef1c9413334863f6bddccc8a21c43f085f69874e68546ac4406bfalibreoffice-langpack-sk-5.3.6.1-10.el7.x86_64.rpm7bffc5b495fe23ab1d6c9c4e28f8da9407edb7231f87d9bc29dd49111557b24clibreoffice-langpack-en-5.3.6.1-10.el7.x86_64.rpm386bb671750d0ad617bd6d6c7757786cdf388a7b08ef0da8c5a6c594296ab860libreoffice-help-lt-5.3.6.1-10.el7.x86_64.rpmeb1dff70ed3a0c8a77d6a91bfb46e1fb0f2cb3a47e39359f19cfed2db6fd2d95libreoffice-help-ar-5.3.6.1-10.el7.x86_64.rpme7dff92bc81c30b2a183cd479a9cef01e33fdaa4bfe9f7143bc70569ab3e93aeautocorr-is-5.3.6.1-10.el7.noarch.rpm337e27ca8f7a9abee285f3b5a397efd75a668a4a63a7413543660c1f818f7678libreoffice-langpack-uk-5.3.6.1-10.el7.x86_64.rpm57ab99d6b914388e7d5a72b22f349b3b45ad72601909f71c821413c4bdd0fc11libreoffice-langpack-mai-5.3.6.1-10.el7.x86_64.rpm814295b88d17969dd546eeef573a886152a75577248726ec0e5cdc60f46b1d2clibreoffice-help-zh-Hans-5.3.6.1-10.el7.x86_64.rpm898597b1876a0b08e4caa5b3bfa9fd81a94b20e5b8544b99a4b1e5a2e0ad22fblibetonyek-doc-0.1.7-1.el7.noarch.rpmfe13ea66fdf80938ebf2b1dbd515a18cdc75203855a96ca37e385b65198b3547libreofficekit-devel-5.3.6.1-10.el7.x86_64.rpm186a7ead3132478959da07739a679e44bb3824095500f261fff838a4178c8703liborcus-devel-0.12.1-2.el7.i686.rpm26383435b33dd8767af78933cb39446ee4d4e12fcaeef9f4d5b4a219b89fda8eautocorr-pt-5.3.6.1-10.el7.noarch.rpm08854f2188be7bbf644cbc1702a7c260ec3470e281321c1db1da3fde3de45811autocorr-fi-5.3.6.1-10.el7.noarch.rpm570668e0b30469032583d23508492574cc7419df28adfb0f280e06f8e5e974b0libetonyek-devel-0.1.7-1.el7.i686.rpm00ff7c76a82019bab395658fdbf4acb65700b1561c21cd8621c037892fe63e4flibreoffice-calc-5.3.6.1-10.el7.x86_64.rpmd4cab9e5a834aae262e9862c136d6482b861a2a1c517c911b12b74b90f9f4f36autocorr-ja-5.3.6.1-10.el7.noarch.rpm52e516bd38c43df4d0268f417f3d853b64309340abef2388534f9351ce0b5b2bautocorr-mn-5.3.6.1-10.el7.noarch.rpm57a801e615df10d45897beff5a7f840e3fa6bec5605e56432cab194de2188b20libreoffice-langpack-fr-5.3.6.1-10.el7.x86_64.rpm1d75f9614bb787c026cac0d2100e03bffd20198291e1200dbd92f8d7ec789b9elibvisio-doc-0.1.6-1.el7.noarch.rpmafef9cdfb17e696af4daf204f714c3bdc0c31e5424948db9bd297fa7bba866c0libreoffice-xsltfilter-5.3.6.1-10.el7.x86_64.rpm828203c5c9864da6b749765f8884ae1baebbb5d6dfb3dbf5b165210368485af8libreoffice-langpack-ml-5.3.6.1-10.el7.x86_64.rpmdd7eb6a2aa41a233d257d65d50b8b4dc92a88a8849a745335ffbee87ba1b3aa2libreoffice-langpack-ro-5.3.6.1-10.el7.x86_64.rpm77f1e2978adf0692ffa48f2d25230e22e8321de2c77ce8a657962e555a905536libreoffice-help-gu-5.3.6.1-10.el7.x86_64.rpm4d748238775f20aa8531886b64d83124e1ab611e869755823e8bfd422b8ff55flibreoffice-help-da-5.3.6.1-10.el7.x86_64.rpme235b8ee3862e9fa118c570c5595dab6758d1555c4f73023a5f4c3e7f42288f3libreoffice-langpack-nb-5.3.6.1-10.el7.x86_64.rpmdb7bb47d3467651f91c967b61286176aab6c1e2319ec2dd4fd41fe06bd660b8clibreoffice-base-5.3.6.1-10.el7.x86_64.rpm69c10a03a7a68e8b2dbd97ef2fbaf5221e9f1aae2bf85a1b7f9d3668b93b7292autocorr-en-5.3.6.1-10.el7.noarch.rpm5da5a5f8dbac553bbe4e11265e1c83dede6be05427e2ef1ef8d16147fa124514libwps-doc-0.4.7-1.el7.noarch.rpm195f7d718599d10780e661574cbc25d7bac87c1f25ce52d475e2785a74b16c14libreoffice-help-zh-Hant-5.3.6.1-10.el7.x86_64.rpme8f113b23dce007c9ed5c61f2f783a5f8e8f60fd51a280eca4375157ea6ef311libzmf-devel-0.0.2-1.el7.x86_64.rpmfd85f0736601cf852ee0b97a5ee93d25aecb9b688e3be4d0ba6239de5f54fcf4libreoffice-langpack-fa-5.3.6.1-10.el7.x86_64.rpm649a633bb8333829df9ec2b29adaeb859212397e71cbfced0ac40f80ec13f375libcdr-0.1.4-1.el7.x86_64.rpm31742f435f5cac80e58dd6c282698a034a35cde9b2ec3bcc155cdf10806f5ab0libreoffice-langpack-dz-5.3.6.1-10.el7.x86_64.rpm605454ca16ccf814bad369d785719d3a7b0cf19bd854287504ed3d030897bacblibreoffice-gdb-debug-support-5.3.6.1-10.el7.x86_64.rpm566575c3453f17baa1bd8c7a51866b4a5cdd4b01603dd53f423c7a6b42ff8eefautocorr-sr-5.3.6.1-10.el7.noarch.rpm80fad3efc7de35bda8ae97780ffdeb6906ed99019bd4faa682c1d1748da0c3ddliborcus-0.12.1-2.el7.i686.rpm716c9852851e36ea398e1fe61bab09e85b9c5a122d5b07164e60d5c9c95f96dalibreoffice-filters-5.3.6.1-10.el7.x86_64.rpmd26dd6e32a8ccf499710e68fe3861003f4a8606784735801b89ae69de9fb0dbdlibreoffice-help-nl-5.3.6.1-10.el7.x86_64.rpmde356eef3dd4e8924351767f9b701b1a2e78b4bcae42de22bd798e33f5b905f7autocorr-af-5.3.6.1-10.el7.noarch.rpm0a970dccfba2f62e7d65c1f778a7880de93f14d547bcbefc4fe19fc3e812ed6elibreoffice-draw-5.3.6.1-10.el7.x86_64.rpme3b4d51769299a2c53c4f2694536dd0a54bdbbb6ec7b4ed05fd1fb582b368ca8libreoffice-rhino-5.3.6.1-10.el7.x86_64.rpm687ebfeddc01c10c85eb9c353fe7fed9472a69631b82b5e3c245830dcfc55f4eautocorr-ko-5.3.6.1-10.el7.noarch.rpm1e21c7322d53d51039669cc7596c746d99da0b796f0abd9ad73eecdf879de32elibreoffice-help-ca-5.3.6.1-10.el7.x86_64.rpm5d6b0c18bc1eadf0d60aac0a2547aab4b49360414f1f7ea189da962f3e5664e0libcdr-0.1.4-1.el7.i686.rpmc998ee8841566f6a9d136036c5f187347e4f995059cd08b0327d2f684d10b312libreoffice-help-nn-5.3.6.1-10.el7.x86_64.rpm55baa8c2104b0ce893508e23f7ad0e2b262093f42ab49d6712590b5e80a7cc66libreoffice-emailmerge-5.3.6.1-10.el7.x86_64.rpm6a93d3c3c7832b544808d6d0af8104ffa5a50eddce64ccea6404c96f5664f3c5libreoffice-langpack-zh-Hant-5.3.6.1-10.el7.x86_64.rpm40eafd308a7fb418ccb65cc60e32ff6de531d5fab04d149dc585521b85f32c92libreoffice-langpack-as-5.3.6.1-10.el7.x86_64.rpm4073a5621e23643a2f96e49891a66c9a493a83dd49b47f794d76c356a9db3a4blibreofficekit-5.3.6.1-10.el7.x86_64.rpm686e228f45094ad2230f14849e715918fe5f2a99fdb7e59231b59c84a07976d6libreoffice-langpack-xh-5.3.6.1-10.el7.x86_64.rpm01607106265178fd9afdc54b94ea1e39642ccb8d442ecee968170e3b7eb58f99libreoffice-help-lv-5.3.6.1-10.el7.x86_64.rpme737cf1d5ac566edd2e9d35b6c6c4fbc4ec32a1f34e91863389a619ebe9d8330autocorr-hu-5.3.6.1-10.el7.noarch.rpmd29908b6ed1a19ee66d5bbfc3add600b4600d2415f619c971dc58f586f232cedlibreoffice-langpack-ru-5.3.6.1-10.el7.x86_64.rpm4ccb0c0525cd9c78abde0058bc0f6fadc6f4eb8ca36085538182e6929554a499libvisio-devel-0.1.6-1.el7.i686.rpm7accdb937eb93568a16a9792a809485aa0e25777f1d76bfe95bb25bb7df1430flibreoffice-langpack-lt-5.3.6.1-10.el7.x86_64.rpm8582ba515a8563f0e97a60e94c0b7280527aeb44085c41f6873af4b19ae15e24libreoffice-help-sl-5.3.6.1-10.el7.x86_64.rpm237dc5587d49ef2850ec07a90a4886e334e3e1f161650b40104e13cad04215daautocorr-bg-5.3.6.1-10.el7.noarch.rpma77f57bc4c3f5e8c9dfa1e30660b71c2c37f8385ac6673f1044f9c99fe73b53elibreoffice-sdk-5.3.6.1-10.el7.x86_64.rpm6af1602fa234011411571deb5782d166e4354adb65796eba40aa4fdb928da982autocorr-zh-5.3.6.1-10.el7.noarch.rpm9c00fe10be95f7cf81fd3fb471745e59c644d7d450bf76fec06d9b99c1ea100flibstaroffice-0.0.4-1.el7.x86_64.rpm1d2cd1be79f37f559e444c5fb4ce3596bb26f9d23352bb2f69cf8060a6965d34autocorr-sv-5.3.6.1-10.el7.noarch.rpm2e215b4f05f3e9dc9c735d8c253f6606343204498de28c3f7569c4ae8d54103alibreoffice-help-it-5.3.6.1-10.el7.x86_64.rpm6cd548a16a1c6653cd59e8460c44edf462528e0557994fae6893b880a59a7736libreoffice-help-pl-5.3.6.1-10.el7.x86_64.rpm89e110c8d6f0c7dc395bf2760d163f7cce96df96624ea628a52f50fa4e5b954flibreoffice-langpack-ko-5.3.6.1-10.el7.x86_64.rpm6677cc7522b2f9a633ae573fa24d30a9a38121efbf8e9a518212c0610981f1fblibreoffice-core-5.3.6.1-10.el7.x86_64.rpme3bf64305d570e4ca6fef217680fec7a3aac51b61029697a0b5fb09662db2b98libvisio-devel-0.1.6-1.el7.x86_64.rpmd4ab93188983edc2d0577f1bfc6a29d12c3d68748b455bc30f1256827dfeb7b5libstaroffice-devel-0.0.4-1.el7.x86_64.rpm230b4ebc30dec8585030d2c7f3fc1f16f93ad9484f8603e2998f4baa4be58b0dautocorr-fa-5.3.6.1-10.el7.noarch.rpmedb96fbbf7821c929084b70c7c8d5f7543d6c0d3efb67802b98d6d6b589e7801libreoffice-langpack-pa-5.3.6.1-10.el7.x86_64.rpmeea824f048301c81f4f9c4d3744abb70dcab98c9b69ebbf0137819f068722599SLBA-2018:0764-1Libsepol Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libsepol-static-2.5-8.1.el7.x86_64.rpm2097477fe940b1bcf22d42ca4741fbadcb5775ab398783aca74b285641c28b5dlibsepol-static-2.5-8.1.el7.i686.rpmbdf9fbea535a0ed21f3cd22841760b541e5e4c0061419296e03f8e10b7612932libsepol-devel-2.5-8.1.el7.x86_64.rpm72a2616e157fec9bc40fcf3a1d8ed0085fb0f985071711f93bed7721244e25eblibsepol-devel-2.5-8.1.el7.i686.rpmc006d4a7bfca9049a7550d0e8b7fa1d3360ccb19c17c9499325ec409bc024975libsepol-static-2.5-8.1.sl7.x86_64.rpmd3cae6f9428529231b7603df1096f74f5d86c77d2d7cb82c1ed055e74b3ac735libsepol-devel-2.5-8.1.sl7.x86_64.rpm2e140a4109bbba687b5f50833730d5a49e5f744efe5185dc28141ad8bacf3eb7libsepol-2.5-8.1.el7.i686.rpm020cad9e207951681385be74636c46c3bac5f8492ea0149bf093a7e64b43ce1dlibsepol-static-2.5-8.1.sl7.i686.rpm17b018cf1ea5eb835f9fb83d5568789163721a785c780d5ca2319f9fc0a3ee5clibsepol-devel-2.5-8.1.sl7.i686.rpm7789fa2800a6cbac8c6c3af4719b0735b618c1fb036df936e8f9280b034518d8libsepol-2.5-8.1.sl7.i686.rpmf3a173380c27646923d378224d7f03c8998e0fd89e68c1cc44464e993648e261libsepol-2.5-8.1.sl7.x86_64.rpmd3fd29eb8f563ef0498c9ca764cb17559711536da03ef9ccf16cfe82fcd55f94libsepol-2.5-8.1.el7.x86_64.rpm2c420bf228deca0b91ca6e20d4804a3d5ef9bae0e9da911444ef1a962346a243SLBA-2018:0765-1Dbus Bug Fix UpdateScientific LinuxScientific Linux 7dbus-x11-1.10.24-7.el7.x86_64.rpm2f406ce4cab43f7b6c50cc1ebf62ffdc2ccde856bc4d9af6cb545f5d499053f8dbus-doc-1.10.24-7.el7.noarch.rpm8e935af1bbb194393256427425df4aaa1df75105d7e68e4123e82f568b4f92b2dbus-libs-1.10.24-7.el7.i686.rpm630c9b5de938887841e7480c2ed0635cf9266abf037ef3766335d5287b66312cdbus-devel-1.10.24-7.el7.x86_64.rpm4f85f7a09fdf48194d43a32a5f9a4bcbc129a1b14fb7112604749c1db031225fdbus-tests-1.10.24-7.el7.x86_64.rpm34e29be02ed6f88f98fbd227e16fd81e293efc063c38fd36e3a3360ad7221872dbus-devel-1.10.24-7.el7.i686.rpm6bf303ffb13ddb3a941ec0559a2fc095af1919405f1ae876fc3a5dfdf307ff25dbus-1.10.24-7.el7.x86_64.rpm947d606daff319dd69ec314b594ec1ac5a3531db40806563f04cc04d3216d7dfdbus-libs-1.10.24-7.el7.x86_64.rpm4dfef42e8f4f90c057a00d18f2acac00c2949ee82b2e86159bcb908425b809c1SLBA-2018:0770-1Gtk3, Gdm, Gnome-Shell, Gnome-Session Update, New Packages: Wayland* This update adds the new wayland packages as a Technology Preview. For information on scope of support, see the Technology Preview Features Support Scope document.Scientific LinuxScientific Linux 7wayland-doc-1.14.0-2.el7.noarch.rpm53b9bd06d93d5ca3ee78d3119fa3eea820327f22021ab4a07690b1ddd2de3e67libwayland-cursor-1.14.0-2.el7.i686.rpma4b72af5e604411d7902420bb15f07e2cccc4e6cf0c1f57d1e544ca6da08c455wayland-devel-1.14.0-2.el7.i686.rpm8c1765e90873d04ccf6bb02cf8469aa4c628827a991ee2229ff0ba6ccb7ac6cclibwayland-cursor-1.14.0-2.el7.x86_64.rpm19cb6e2bab55a12b078ae6283bebe906d0ee206fd4998faf0ae4647272673977libwayland-client-1.14.0-2.el7.x86_64.rpm0866f314dd9645dc8c9750dbd151fad001f14b9f6cbaa64b867f04b913bb165fwayland-devel-1.14.0-2.el7.x86_64.rpmaaa13924b48cfb20d59dc43692a0a0991b65afded1ae8c6c654f1ab80f22743clibwayland-server-1.14.0-2.el7.i686.rpmf49394e65e39ac6eed472562b767488d0d89c0e19da1b46ce330999655ca63aflibwayland-server-1.14.0-2.el7.x86_64.rpmfca088f34481e9558cb3f83b9a01f07929f20a59a3aaa2c2a6edeca668766dc2wayland-protocols-devel-1.10-1.el7.noarch.rpmae64de93d83b5a390f71856386b7b2aa3578dd87fee13ea7be757c2f3d961495libwayland-client-1.14.0-2.el7.i686.rpm02897ba3c6ee264bd6fb46895169bfa38b82c35e4e06065346baf5e417b07718SLBA-2018:0799-1Kmod Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7kmod-devel-20-21.el7.x86_64.rpm939e779b551382a00697c13dee815b9fcf43e35939b6da90c5a214698bc69f49kmod-20-21.el7.x86_64.rpmb13a9e18bcb7a71855e237086355e4fcc6d9e992f7d7d7181285e3d605bb2d4ckmod-devel-20-21.el7.i686.rpm8133ca55b5239173caa8b5c439dd4187753e4690da8fe68145b9b5fafaa44e6dkmod-libs-20-21.el7.x86_64.rpm40eb14c78d4c6afb5d784675019cbabcecbc9777a9fc6b06b3f7ef740f69b0d4kmod-libs-20-21.el7.i686.rpm65799fb7f8063b5e914d3f2e563c48d394a80a7e6c465131c1a3b2689556d898SLBA-2018:0802-1Spice Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7spice-protocol-0.12.13-2.el7.noarch.rpm4acd1ecda8470e42cd3bbd99257477301c48217205c88d022cb5bb526dfe42a0SLBA-2018:0868-1Udisks2 Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7python2-bytesize-1.2-1.el7.x86_64.rpm22d2434e48a838a38bb0651e808c12be7a394e7b02ded9a83e4765c8ba25b33clibbytesize-1.2-1.el7.i686.rpm0899aa5c74d65c7d91a4a427902ca14689a47c35cffefc5c28bd95aac8d3de26libbytesize-devel-1.2-1.el7.i686.rpm995f2863da23117559cd0f96d74a1676b3df0729074cf2bb560aa0f32a889e9clibbytesize-1.2-1.el7.x86_64.rpmff6aeafa84188f6fafb84ec06a09371ffdf79606e3dc2f9e09ea21d40fa8c06clibbytesize-devel-1.2-1.el7.x86_64.rpma2bc9b7ca4fdf18c393080d7fe900b2ba243f3a2d34dca29e6464dc63b11781dSLBA-2018:0877-1Rpm Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7rpm-build-libs-4.11.3-32.el7.i686.rpm0f3e840fcb5d2956c2f6c624f203d060195566bdafcc46b87cb6051a533f2153rpm-libs-4.11.3-32.el7.i686.rpmb21d8f0175ff215ddf89d78ddd72ad78d7065707e0cfbb8914c060eca0315015rpm-build-4.11.3-32.el7.x86_64.rpm27b0bcc0ef9d31af0750b4563213933123cf9644c251aa8f05f1842515d0e068rpm-cron-4.11.3-32.el7.noarch.rpm8fbbdf4c9fa6ce997642930bcb985e04aea34af1ca1543b9a502c063f1dc196brpm-plugin-systemd-inhibit-4.11.3-32.el7.x86_64.rpm23a9ca9ca49faa093f3e9098027a527e5ff3aef10e190ef948e96ef4b7de30d1rpm-libs-4.11.3-32.el7.x86_64.rpm539b08841e5115f598f4177b11db570c022844e575d6dd0e6c7fbcd54e856d07rpm-python-4.11.3-32.el7.x86_64.rpm48267ce23b07d86b5d5a45a04b0807e443cc388f0efef8cd68312417ff6befacrpm-devel-4.11.3-32.el7.x86_64.rpm3cfe7821a6a30b77564734c72afc09bbcedf4fb39ba1b2f3eb9cb4d4e7f8d857rpm-sign-4.11.3-32.el7.x86_64.rpm2eb35ccdc98ac31428099d95b7f7e21c39a63df3cab1cb305c4cd71e7b7c8d20rpm-devel-4.11.3-32.el7.i686.rpm07f44b1e4273c862b2c05a8b367c1e057d8eee30e0bc55c48b4ed762356aad04rpm-apidocs-4.11.3-32.el7.noarch.rpm364a86cd03008d832ed16bc8dfde19fe511c7398893c293be8091b300138886frpm-build-libs-4.11.3-32.el7.x86_64.rpmb79f7abc1733ee3825253f6e276a356eb1a150c1d8ceda8f24a5a4c2375a2597rpm-4.11.3-32.el7.x86_64.rpm83af6db65631e2938f7bb63d3ddbe52c931553b81beab10f141f72eaea630c61SLBA-2018:0886-1Libtdb Bug Fix UpdateScientific LinuxScientific Linux 7tdb-tools-1.3.15-1.el7.x86_64.rpmab0ea810e78f4f1621137d44e2cbc7cf2a7c33e3161c32d0811a7afd1fe99afelibtdb-devel-1.3.15-1.el7.x86_64.rpmf000736ca3f8d9a47ee7bbf0fc66f04f38a7f56228b2fffb52c38f7a7a229de8libtdb-devel-1.3.15-1.el7.i686.rpmc60c190e1cfb6a561eedcca3f42fb282c22acfcc686b231972c00cb80a7fb70apython-tdb-1.3.15-1.el7.i686.rpmc2db3616f3b624a2667c6560e9a79b8e356f0ce95d83dfc70624985ca44dc484libtdb-1.3.15-1.el7.i686.rpma414941a10aced682f06b181d8230d9f1c5356f6d2074de090df8dd975db99a9python-tdb-1.3.15-1.el7.x86_64.rpm1abbdd6cbaaf2db1c59c7ae9f403f89170f4017f9d17e796f3afdc74a60dc1c5libtdb-1.3.15-1.el7.x86_64.rpm890110f40151b296458bfdf45d40407dbdba04d763b67e844cfe3a7bb012ccebSLBA-2018:0899-1Ldapjdk Bug Fix UpdateScientific LinuxScientific Linux 7ldapjdk-4.19-5.el7.noarch.rpm7dbef5ffb520f7f58424e25542822407b98a56d3a7f624df63ea9149856e1162ldapjdk-javadoc-4.19-5.el7.noarch.rpm39ab1955f33a3033bfe6835e71263bc812f18cd18d635a0e6e2bb27866fe9e5aSLBA-2018:0903-1Libselinux Bug Fix UpdateScientific LinuxScientific Linux 7libselinux-devel-2.5-12.el7.x86_64.rpmf59d98b44de34554881ed44fd3bcf386970a866f97f99f252224f6b15ccd13d4libselinux-static-2.5-12.el7.x86_64.rpmdf0d8bebc00722f5a2b49100a142cda2a2e352d5c3061400e24ed4e42a857f50libselinux-python-2.5-12.el7.x86_64.rpme2650ad150a196ffcc0953dbdb9dbc0c32a23b94508999caa0e6c91067ca11f6libselinux-devel-2.5-12.el7.i686.rpmde512d984c2927ce0a637265ea2bb03a6209fbafeccdefc081152da5910970d3libselinux-ruby-2.5-12.el7.x86_64.rpm78867c8a68604dd89409281dcfa630b73befedd441edd74d672ddec193b2f971libselinux-static-2.5-12.el7.i686.rpm1a7977cd9a3212525e24755f9bac3b9755d47416aae7e836351c94af6b9d2228libselinux-2.5-12.el7.i686.rpm4e1b017d9ace1d146f19a44118e93390d90791320e74f3ae7d42c1649f5fb41elibselinux-2.5-12.el7.x86_64.rpm9d3b657855024ff71beeec0fb72f8b8ddd523c14fea5ab432004588bf3ddb8balibselinux-utils-2.5-12.el7.x86_64.rpm150dba389bf075e490f370be09de6e6f42949bf79520d6914d140a958e41a176SLBA-2018:0905-1Libsemanage Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libsemanage-2.5-11.el7.i686.rpmf9b72db23456e91c802e908525fa5d76ded29a4019644a62966e00a11892acb7libsemanage-devel-2.5-11.el7.x86_64.rpmfb500a0bf02802a32dec294837494a44d15a6d32feac4aa09196b3e5c4f500b1libsemanage-2.5-11.el7.x86_64.rpm62b6da53ed3a96fbd234a5aedda3ead054d5085c74f3d6f7863ea38d4f2b18a5libsemanage-python-2.5-11.el7.x86_64.rpm7e826c3a20c2ac17e7ac27b8ab13e4ecb54d4ca1ab09b8f55c950e8ca333e4falibsemanage-static-2.5-11.el7.i686.rpm699d32fab5f8e71a938162e04b7b2ad812f60e6696823ef26932dc1dbe58ec70libsemanage-devel-2.5-11.el7.i686.rpmd23728593f8437a637f12624038526307c21db22a9863b41b77697c4fc026ad2libsemanage-static-2.5-11.el7.x86_64.rpmfbbc47fc47c3627d002ae5a57e0a10944eb948fe52cbebed41259d9c2133a68bSLBA-2018:0916-1Setools Bug Fix UpdateScientific LinuxScientific Linux 7setools-3.3.8-2.el7.x86_64.rpm10c2d2fbbd727fd7fdf7c57e3bff7b1dbc3c0bf11f3d51cd01ee77e7c9fc80c0setools-libs-3.3.8-2.el7.x86_64.rpmdb0112b2bba61ae780d4b869f19fca2032e5a8bb861b69cb8bf636142ac70fdesetools-console-3.3.8-2.el7.x86_64.rpma32d2010dd47a625f3dbe6f1e45cf102eb31468ce5a06807996075b8b54c793dsetools-libs-3.3.8-2.el7.i686.rpm1d76d204435810820079a2510d5fbad48cbaba4de8ee18a5dee7e19badedb12asetools-gui-3.3.8-2.el7.x86_64.rpm12c1303a7bfb3214ff035fcdbffca8d47f3f60d349779a2ebe22f11343725648setools-devel-3.3.8-2.el7.i686.rpm978a4ff5cfe060154d797c9e249a1622fa0925028af72afbead81cd7043101e8setools-libs-tcl-3.3.8-2.el7.x86_64.rpm197d9bf051b156ae9e2293b630b18a462890f6dbbd237f1ae576842e5dda3657setools-devel-3.3.8-2.el7.x86_64.rpm123372bf05b2eb7b391c17d1e30ae8476915840cc67756e2c798db848bc2de76SLBA-2018:0935-1Nss-Pam-Ldapd Bug Fix UpdateScientific LinuxScientific Linux 7nss-pam-ldapd-0.8.13-16.el7.i686.rpm329874b902b04a255913b2f5e09bd00ac8bf10ca61738d5297145f6115262c4anss-pam-ldapd-0.8.13-16.el7.x86_64.rpm030531e0f11ace18ad86267ea25758623e63f42240d5bdf276a3f656b2f95a28SLBA-2018:0957-1Python-Netaddr Bug Fix UpdateScientific LinuxScientific Linux 7python-netaddr-0.7.5-9.el7.noarch.rpmfaa9723b03d6d5367d4cf505367ce083b495eb1581bd98884b5bc790dc2f4a81SLBA-2018:0971-1Nuxwdog Bug Fix UpdateScientific LinuxScientific Linux 7nuxwdog-client-perl-1.0.3-7.el7.x86_64.rpm5f1079550de630bb63ce26d0f4f2c632c24c30750e0206861090ed37716fc0dbnuxwdog-1.0.3-7.el7.i686.rpmbf3154841aa168844e672aa300aea10cd3213c0f268c121f13bf34e7f1cf0075nuxwdog-client-java-1.0.3-7.el7.x86_64.rpma8112943001d4415fa3f544e5279fab11064b84c6fda88d34b09173bc3a88084nuxwdog-devel-1.0.3-7.el7.x86_64.rpmafd9bc5add7bac8bde2b6d8abcb6972656b75ebe03f2d0b6f5546b1ca5122315nuxwdog-1.0.3-7.el7.x86_64.rpmf67e4a87ff5791881e6ef695842060cab2965421c42dee5c8d572204d4141fe9nuxwdog-devel-1.0.3-7.el7.i686.rpm1288132c687ba230afe2b87e8f8c9f4b70414038dc8c183b255820fd3cd1a323SLBA-2018:1059-1Selinux-Policy Bug Fix Update* Prior to this update, a rule for the Snapper module was missing in the SELinux policy. Consequently, the snapperd daemon was not able to unmount a file system. With this update, the missing rule has been added to the selinux-policy packages, and snapperd is now able to unmount a file system with SELinux in enforcing mode.Scientific LinuxScientific Linux 7selinux-policy-sandbox-3.13.1-192.el7_5.3.noarch.rpm245d2bc6b2585dd90b0c0fd8048c778e3f3dfee0af3eff011aa85d393dbb98c4selinux-policy-devel-3.13.1-192.el7_5.3.noarch.rpm7d3057b58e4c4f659ab97cc2ce0a18175cc57e7eb2df82df0f2bed6d60deb04cselinux-policy-minimum-3.13.1-192.el7_5.3.noarch.rpmb53a93685bd3684a91c8297f61982ce8ee36ddef0833c5851776ed73dfc913b9selinux-policy-targeted-3.13.1-192.el7_5.3.noarch.rpm458ed222a80ad401934612441ecafdfbe877bf130ea4988b2443f57e50531f11selinux-policy-mls-3.13.1-192.el7_5.3.noarch.rpmd251e6a67d63ef7c543c6f26390de4255468303c32729da98706296e4f67fc32selinux-policy-doc-3.13.1-192.el7_5.3.noarch.rpm6f036054db119803dd713d5cd0e0bca891c00a5b55636901dd54418cffc29af5selinux-policy-3.13.1-192.el7_5.3.noarch.rpm1498d2c04a43c6430baa3a480639cc7f7f5af6aad25a5a09ff7014d6c96b8035SLBA-2018:1276-1Copy-Jdk-Configs Bug Fix UpdateScientific LinuxScientific Linux 7copy-jdk-configs-3.3-10.el7_5.noarch.rpmca07c882253764becf23d5e861c3557beb73252e4e0116a9cd36099bef4a36efSLBA-2018:1339-1Tzdata Enhancement Update* In this update, the upstream project now defaults to using the "vanguard" data implementation which includes negative DST offsets. However, we are continuing to provide the "rearguard" format for data which does not use negative DST offsets to provide better compatibility with existing tools. We intend to transition to the "vanguard" data implementation in the future.Scientific LinuxScientific Linux 7tzdata-2018e-3.el7.noarch.rpmcebba6c918562b8b32aaac0f4b313318ae4248dfa4359d3b40d916e35e87f27btzdata-java-2018e-3.el7.noarch.rpm0cb52d5381c538ef77efe148ef364849a22d533716ea5d5435e1ea637431a4b7SLBA-2018:1989-1Jss Bug Fix UpdateThis update fixes the following bug: * Previously, the ECDSA with SHA* signature Algorithm ID in Java Security Services (JSS) allowed for NULL parameter. As a consequence, the certificates did not conform with RFC 5758. The problem has been fixed. As a result, JSS works as expected.Scientific LinuxScientific Linux 7jss-4.4.0-12.el7_5.x86_64.rpm1b263bf56a21d617b81b8ca81cbbee366ddf34f774ed253408160750d5d4f09bjss-javadoc-4.4.0-12.el7_5.x86_64.rpmda76fcba9567c7ddecfb0f6150313795715dad487c00b88d4c1ae4ba610dac91SLBA-2018:3018-1Certmonger Bug Fix UpdateScientific LinuxScientific Linux 7certmonger-0.78.4-10.el7.x86_64.rpm07d03af80be7f2c0946166ec6cddfb1b26ff838b5243bb82a870c0445a9cb7f0SLBA-2018:3035-1Anaconda Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7anaconda-gui-21.48.22.147-1.sl7.x86_64.rpmcc31e73e1350b4549891cfcde760f9ea2deb0b8e825d7ac017fa2971652a51fbanaconda-core-21.48.22.147-1.sl7.x86_64.rpmc5c244ff00f24158c4ca0930a6a3b37cb47bc22455c59e9e265fb4ad6dd3308fanaconda-widgets-devel-21.48.22.147-1.sl7.x86_64.rpmb1a41d9e1a2430d544dfe61f04b3498e96bac124fee33e9ec01fa10babbd5129anaconda-widgets-21.48.22.147-1.sl7.x86_64.rpm40f09f0a319df1105fb9c5951f591e782201d21217ca7d35ac25b068a347da92anaconda-dracut-21.48.22.147-1.sl7.x86_64.rpm3b887f4814a482e941c4dd83d8345d5b992392eeb2b2e103ee2b7b1402f2a775anaconda-21.48.22.147-1.sl7.x86_64.rpm0c5c493dc4b329e59c4eb3b5fcb9f99db75fe6f0066b842a75b010540a77dcd4anaconda-tui-21.48.22.147-1.sl7.x86_64.rpm6eb21f270483024125cbb3c990980f37f10d8e4a1f743db724e487a6b2311879SLBA-2018:3053-1Libldb Bug Fix UpdateScientific LinuxScientific Linux 7libldb-devel-1.3.4-1.el7.i686.rpmf0a03ff0c8f8182b0ff98e11229ce12764c07e476124e6ce40c262f1d5bb3486pyldb-1.3.4-1.el7.x86_64.rpm911ea1c8e8bd3676f62d7b2aef1a64252f4808c50b0a2e9bcc417c299bdc394blibldb-1.3.4-1.el7.i686.rpm929031f37550440baea8f8e5f32c74bf165a8b92b10156407eaa9fcbef977d28libldb-devel-1.3.4-1.el7.x86_64.rpm8c6df38e77ec42c9acad410d4083c5e45b7f1277b6a10670d087cd1047c399b8pyldb-1.3.4-1.el7.i686.rpm2e3e68a1356a16dbb4a28517a743b48f51e768e52dc41e55eaea6fab9a5ed961ldb-tools-1.3.4-1.el7.x86_64.rpm01bf1af242fd06947a389cedd1ad5d2807a5029f30020a1616ef62ef0a954d6alibldb-1.3.4-1.el7.x86_64.rpme654d5f0d7b6db9561e35566c89355f4577feede455b503cb8347d83b82d2bdepyldb-devel-1.3.4-1.el7.x86_64.rpm58424b3718aa537415f59ef293a6881057017b4757290af30803a0dfc134720fpyldb-devel-1.3.4-1.el7.i686.rpmb667baa29627a17ff041c8ed3532f7fc0ddd65be3d542c5048d6c3ecc2e9ab4fSLBA-2018:3077-1Libsepol Bug Fix UpdateScientific LinuxScientific Linux 7libsepol-static-2.5-10.el7.x86_64.rpm6914733d6ce9daa42e4b2fe72afb8b4e7a8d7cdebd07714c69e1436aa0eb22b0libsepol-static-2.5-10.el7.i686.rpm2b6df625838b59276d23e2eb0ebf9cb11ca4737cf7b6748724589e56a434e65dlibsepol-devel-2.5-10.el7.i686.rpme36635c4e8aba14d6144afb007f33e43a236d60bcd8dcc0748a89ee72712b564libsepol-2.5-10.el7.i686.rpm7b1e9b61ac3dbe6934b030b58e90f289333ea9136444556f23b5362688adc137libsepol-2.5-10.el7.x86_64.rpmd9d361483251f55599125a437f53218e625a72bc5f5f9fa86cdc28ca2bef8843libsepol-devel-2.5-10.el7.x86_64.rpmee1d6129bdc8cf12ea09bb38afcdad29adf2252fda1d478fecf649b95e52a840SLBA-2018:3078-1Sane-Backends Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7sane-backends-devel-1.0.24-12.el7.i686.rpm49652f365722cae39f6e0859814ceacecdfb84b040d70d08e90834b34fba26bfsane-backends-drivers-scanners-1.0.24-12.el7.i686.rpmc8bbcd48c77d780d645ea9506d4ca3268ce6812fa6e42d846fb4eec98f49a352sane-backends-devel-1.0.24-12.el7.x86_64.rpmff42ed07fb777bc0f9fd492147c359d686201275135fc5b73b305fe520e23ef3sane-backends-drivers-cameras-1.0.24-12.el7.x86_64.rpme4574151318c79cd83fcccb805555899e8608ab0851df5b8a2b06964325c0887sane-backends-drivers-scanners-1.0.24-12.el7.x86_64.rpm62673df58e1aa3c93d1a49802c7ade4a9e6ad4bbcf5fedc1fddec90306a07e38sane-backends-libs-1.0.24-12.el7.i686.rpm876cec0f128082992f12d7d341bd0993217863db06a18be831127d0cbd12cf28sane-backends-drivers-cameras-1.0.24-12.el7.i686.rpm8dd3e220397f348cb2f8d652f472da2f41f1c9ecc0d764d290f2d8230f6976afsane-backends-1.0.24-12.el7.x86_64.rpm620edec6344cbd8ed78f2f7f59f1a586c25e796dd26ee2548ff94209b38759a2sane-backends-doc-1.0.24-12.el7.noarch.rpm8cd657bed8166e8840956af02f153e1abad1b21eaeed17a610fc3d979efb7381sane-backends-libs-1.0.24-12.el7.x86_64.rpm382171e3082c6c38119612c2b900e52f68dbb1794f449c293b204614c49035a7SLBA-2018:3084-1Libselinux Bug Fix UpdateScientific LinuxScientific Linux 7libselinux-ruby-2.5-14.1.el7.x86_64.rpmd600fbf1d2e4c6af90faf1835cbc49e531a02435706a35491c1b75fbf8e834b4libselinux-devel-2.5-14.1.el7.x86_64.rpm1942a8ff6cee06178ffa7ea68104915e977a82ab7a83374def2c110fcb0f99fclibselinux-utils-2.5-14.1.el7.x86_64.rpmbc9bd2e47a059397cf87ee9c4ec74cf23b890a86f5b5f6e16370f369105af74blibselinux-python-2.5-14.1.el7.x86_64.rpmc2f456c5cb8105dd2717e89e12ee4c0b064291da2c3c621c642c89f8dabff88blibselinux-2.5-14.1.el7.i686.rpm54e7c2f7705ca040af396fac97b799212d362ebc315158e35266d2223e77d780libselinux-static-2.5-14.1.el7.i686.rpm38648717a4a0ebd1a47c3d3d8e8e89c7f2960cfce1d1be098c98d3156b02068blibselinux-static-2.5-14.1.el7.x86_64.rpm377da9fb29e4be1d4f433e51f4d2d6435d529e1501c7cebd4ada3ecadc3bb54elibselinux-2.5-14.1.el7.x86_64.rpme9701910e9dc7c4b5f173978f3cb8879b3b26286b0abe5843fba0de5c1198bd3libselinux-devel-2.5-14.1.el7.i686.rpma389a779f0719f647bd00acd3f75cd20c71ea30eb4b857d0224c45c4e12aa289SLBA-2018:3088-1Libsemanage Bug Fix UpdateScientific LinuxScientific Linux 7libsemanage-2.5-14.el7.x86_64.rpm56266e2b40fb52a079c95636bf5e0f23d651a3bb60b55c71e60810007a314cdelibsemanage-static-2.5-14.el7.x86_64.rpm4e1b77b4d608fd1fb696d19ab48cb5422a9005e180f3e673392adbfdb34ea24clibsemanage-static-2.5-14.el7.i686.rpm2c5f2f18c9ca47aea2615e4c4f4d7953442085c0df42c87de66f2493666cfa06libsemanage-devel-2.5-14.el7.i686.rpm995490631249345db9a809e4983df78da5676fc96e4bf86b13a165c5aae8896clibsemanage-2.5-14.el7.i686.rpmff3484d5288ea0a8bd98c740bd45b065833c7c318bb3d68dd520eabcaef209aclibsemanage-devel-2.5-14.el7.x86_64.rpm3274d7d47864e339c34472a824facf9b2f232b82c290cae960386b660faeac8alibsemanage-python-2.5-14.el7.x86_64.rpm3f85683b6caecf4995eb6311d3560cf1de24586fc0a626c2df5628f6441361f5SLBA-2018:3091-1Setools Bug Fix UpdateScientific LinuxScientific Linux 7setools-devel-3.3.8-4.el7.i686.rpm023ab145c0d3b1d35a57097f772014a6d29b8eb886efba168799f759deb5c185setools-libs-3.3.8-4.el7.x86_64.rpmf99f30e4053f7f425761c2391ce15b8761e2bc0ef394f2b3a126f8cab2bd525bsetools-libs-3.3.8-4.el7.i686.rpm90793a1fb96779fd5f8e08f882f20e8e956d82da1db7f567abbebdb8cf639c23setools-devel-3.3.8-4.el7.x86_64.rpm490c2e4886ad1fe928a6290752b80df627109f3fc7ecf67ea1dfb7c4e7790fd0setools-3.3.8-4.el7.x86_64.rpm991cd06d55f7bb3be771aab1d2bdeb5421a5819337c81793bae252173717c28esetools-libs-tcl-3.3.8-4.el7.x86_64.rpm86e46157df566b391340d8db3dcbd37fe15ddb296a89e388a4f7c8da98af2001setools-gui-3.3.8-4.el7.x86_64.rpm3e50fd93271551bd5930c4de99620d66a717cb796e82515f649cf2a7565ea21csetools-console-3.3.8-4.el7.x86_64.rpm50874908f3c4ec3b99cc2215d00bd44c8717afaec606191c935b845dee3ad69aSLBA-2018:3094-1Vdo Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7vdo-6.1.1.125-3.el7.x86_64.rpmd407a33cd4a56ada8ae12e69585410e216f14771fcc2845c04ea7a512f3d5a23kmod-kvdo-6.1.1.125-5.el7.x86_64.rpm4a2d38447081a894438eca1317e7d8fe47de73a6664b312ee5de7e3ee0c3733aSLBA-2018:3098-1Policycoreutils Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7policycoreutils-devel-2.5-29.el7.x86_64.rpm62a937a25e9071ed21516c6765c7a8b0b5d0dc73296d986f60d62a76091ce1a7policycoreutils-restorecond-2.5-29.el7.x86_64.rpmf0c276132d98b656724dc1e7415ab32d5a32eb0dbe859065e0fbd5ae0e1f0ba6policycoreutils-2.5-29.el7.x86_64.rpmcf131bce8fe5f59cc0bfe1f446d4fb2a7098d9e26c4a3b38fcc3eddb340a5b79policycoreutils-sandbox-2.5-29.el7.x86_64.rpm5e677ef4687c0d452e910d41d33805609e2799a766de82323d4099d63179a766policycoreutils-devel-2.5-29.el7.i686.rpm6482967946b340ea67bfd398d8939115902ec754d9ce2503dc56fc8d2e4830f3policycoreutils-newrole-2.5-29.el7.x86_64.rpmc4d2265c95d2bad9473bbfd5dfa5a00aa4dfeb5d8e6c17dcd5ce196ae1d1d69cpolicycoreutils-python-2.5-29.el7.x86_64.rpmb5d465d78ab96342236f400c5e73075692968aeedba85d0c12b2e4b784456fc3policycoreutils-gui-2.5-29.el7.x86_64.rpm89ead09a968f37b1484a83f9a9b6bb8699e877bf371468af7e2d76b9e5161ffbSLBA-2018:3099-1Checkpolicy Bug Fix UpdateScientific LinuxScientific Linux 7checkpolicy-2.5-8.el7.x86_64.rpmab76d5d3f7b5713747da2f04d2660e9877c93565859926208e1077acd0a1cf82SLBA-2018:3111-1Selinux-Policy Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7selinux-policy-3.13.1-229.el7.noarch.rpm53b1dfec382144e100ead95576bee7a5db6c460f7224de23ecd8e1110bb26e34selinux-policy-devel-3.13.1-229.el7.noarch.rpmc7e71e95bfb58f1677a134b2ab282fbd74c0ec98f9194113f1dbb7c59d973694selinux-policy-doc-3.13.1-229.el7.noarch.rpm5c3a33b1e1e13e5637fa22df0cfc6cc0b68262750d89477d36c40f621661d0d7selinux-policy-targeted-3.13.1-229.el7.noarch.rpm074a3cf4aee88e83964711c4f4dc1371cfe21146a4bf0e5421c7c91058d78789selinux-policy-mls-3.13.1-229.el7.noarch.rpmfab58f074fdab01d6443ca5c78c158724d3e843232182064f4f6f21b1de8cc24selinux-policy-sandbox-3.13.1-229.el7.noarch.rpm91f63d5bd45dfd35b725c050586571b2e88291f745d4901bd12fc17692387e16selinux-policy-minimum-3.13.1-229.el7.noarch.rpmc20c4438ae7c039f6383bd7b3299f26a08ac206c8326d374f0a9e7508556486dSLBA-2018:3119-1Linux-Firmware Bug Fix And Enhancement UpdateScientific LinuxtrueScientific Linux 7iwl3945-firmware-15.32.2.9-69.el7.noarch.rpmed879e0fd2bb46a909fd32359bffd6d64a0f27696265c6c6f2f9c540d952961fiwl6000g2b-firmware-17.168.5.2-69.el7.noarch.rpm7fbc6a08dbc2b3871922189a13591b7a6959b5460eafeb97b4e8330d30b7c602iwl7265-firmware-22.0.7.0-69.el7.noarch.rpmd7dbe3be898a24989a934da539834409e28ba977eef0b4202c71dece556a59c7iwl100-firmware-39.31.5.1-69.el7.noarch.rpm7a50fda0ade266a549fb8189d0343ff717a7eccb5ea5ea48f4b3830f8f5906a5iwl6000-firmware-9.221.4.1-69.el7.noarch.rpmb6cc20a4840ff37f006465321fae4a6c53b1a26418b1a6f40386921d04014abdiwl6050-firmware-41.28.5.1-69.el7.noarch.rpm94f03907165e454c9662ce2371b72423619fbd29c14c47b3ef58b7a3120e5be9iwl4965-firmware-228.61.2.24-69.el7.noarch.rpmbae20900f3dcb6bc0d1579888ff2f25367428f1ecfe86e57c1b59a6843f96494iwl135-firmware-18.168.6.1-69.el7.noarch.rpm3657d4219460a4cfe159e7d1c4acb45a9719d4a834c1d957e0514fc7c6c54014iwl5150-firmware-8.24.2.2-69.el7.noarch.rpm8d50c4e13584dc0acb80cfb1771a1bc08c91d3099345367d775bcb6c43ff6694iwl105-firmware-18.168.6.1-69.el7.noarch.rpm7393b8c1c3b2223cb4937b7fb6821284c59f86c104e0f602363fd5af1a291bf5linux-firmware-20180911-69.git85c5d90.el7.noarch.rpm74685bd4fa26b55e242a155973ff4be3285163d972ae160fd2b4fdf54ec373e8iwl2030-firmware-18.168.6.1-69.el7.noarch.rpmb7d8b3fae2528309e60945c05bb0863d0070cdb08fe6af0358aba7ff31cef3c8iwl7260-firmware-22.0.7.0-69.el7.noarch.rpm01dc9fc872cddc0831fe0499139cc7aab31fbe398199492fec60354b930ba603iwl1000-firmware-39.31.5.1-69.el7.noarch.rpmcdbdc852e3c6025c6719260a10bb1bba6806593fda75b34cdc609532b9afbc1ciwl5000-firmware-8.83.5.1_1-69.el7.noarch.rpm7e81492cd69bd41a2617272619e915c0ec57436980fd009b919a71d40c0682bdiwl2000-firmware-18.168.6.1-69.el7.noarch.rpme7ee7bf23fac82488ecec18aa673eb716677d3e6d32442856db1ae0406f17fe0iwl6000g2a-firmware-17.168.5.3-69.el7.noarch.rpm31348692cdb085c7e44138d6ed560fdcdd94e6a143952c8df876facf41f1b89eiwl3160-firmware-22.0.7.0-69.el7.noarch.rpmb87c09be386a483e3ed09eb9f98d1414a8eded2515bdafd8abbc8d7842cf8f6dSLBA-2018:3123-1Python-S3Transfer Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7python-s3transfer-0.1.13-1.el7.noarch.rpm94c4acb447f3c4f5b0b7c64f0aa8e1c35389b4a28915ae70a54c90b51c839f00SLBA-2018:3124-1Python-Boto3 Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7python-boto3-1.4.6-5.el7.noarch.rpmab7b47c606639371efd13dd592cb426252f9c7d0f9ca590cc4a6688f5631fc3cSLBA-2018:3160-1Ding-Libs Bug Fix UpdateScientific LinuxScientific Linux 7libpath_utils-devel-0.2.1-32.el7.i686.rpmfddec707e075300ef26d09606007fc681ba4e8e3765ded5ab7bc12d8db5c2b66libini_config-1.3.1-32.el7.x86_64.rpmd158dc00c3dd2b717b4c93c508d3529ec7af0e674b328878c16ed013d2ed1cfclibini_config-devel-1.3.1-32.el7.x86_64.rpm0adb92226545fcb9479639a961aefab3d5ca6031885fbdc5c9b8928e1c25099dlibcollection-devel-0.7.0-32.el7.i686.rpm079e78887385d4983297bc946a5ca1a39fb43c64bfdf2765bd7984fb6e30af2elibref_array-devel-0.1.5-32.el7.i686.rpm1cc9bf073c4b9ccf470b2ca1e82a5156b5332be9145df0f7e8c02a30775b4437libdhash-devel-0.5.0-32.el7.i686.rpmec4d4c13501046db18518b9ffa9a49965b5daaf143374b2b102ef90a274b5657libdhash-0.5.0-32.el7.i686.rpm74f66387878ac180d4ff009c199cbc8b53ffdb0497d18d3d1ee038ab4749b236libref_array-0.1.5-32.el7.i686.rpm12e0ed95d4c78d5a1d7d2f06b283d8886fbf097afb948553459348af14ce1b63libini_config-1.3.1-32.el7.i686.rpm079469d3f3928e17e4c2b2935cd611bd8fc4751ed82ecf272b4d265450fee2d8libbasicobjects-0.1.1-32.el7.i686.rpme5a8b867c63d89c45ad66978c3600144d5322484bbcdf1248369ec48102a7e45libcollection-0.7.0-32.el7.x86_64.rpm561d9dadfd4f6ed0bf1a880212515939d1cb0b0d470709a31c164d50509c75ablibdhash-0.5.0-32.el7.x86_64.rpm6ae27cc1d76de7eb2d83e44167fd2a86a91115e26b33db0ede20a3bf32315583libcollection-0.7.0-32.el7.i686.rpm05c21dd1bfbcc702f8680894ce141728d7a3be1de12917dca12165df2f8ae758libcollection-devel-0.7.0-32.el7.x86_64.rpm8f98fc629bbc82ebf27ad52a3a4746c15d544be93e03ed06acd3e8b61de77046libref_array-devel-0.1.5-32.el7.x86_64.rpm8807db32aae70ad79c17c208994f91e80ef24e2a45b246916696f4be7a7c68eflibbasicobjects-0.1.1-32.el7.x86_64.rpm28dcdfc925a1a7561726aade00b01595095a0c2213408144235159c64182441blibpath_utils-devel-0.2.1-32.el7.x86_64.rpm0d8b4c6480c24b608d358349918e31ea9f5c2e47699246e8ffdb384e70c7c465libpath_utils-0.2.1-32.el7.i686.rpm72aab9cf9d159dd5c8f41b7d1cd4ad7c2ae92974117c339a6def48ed6a0f020alibbasicobjects-devel-0.1.1-32.el7.i686.rpmd757fa386123abc17785a2717e9429c5975be117da444c8ca2132c8aaf5626delibref_array-0.1.5-32.el7.x86_64.rpm06c8183188dd5d9eba52048e387fce0f70f80cbb6b5dcb2e6a987471797c197flibpath_utils-0.2.1-32.el7.x86_64.rpm75566a4c7145b891a44a1d57e848387f0cc45a3e94adb258706d6057d16fa655libdhash-devel-0.5.0-32.el7.x86_64.rpm5caf696f1c475b0ace376d9bd4ef88369dcf927507c01edee3e71b4d2ec3e206libini_config-devel-1.3.1-32.el7.i686.rpm14be63b894aa62fab7b897e966592f49f7a078d76caa9caf5a7c47fe73c30496libbasicobjects-devel-0.1.1-32.el7.x86_64.rpmac45cf9e2a5d1bb85249629100217f5a469e711537ea8b5f5c426838f30abec5SLBA-2018:3165-1Libsmbios Bug Fix UpdateScientific LinuxScientific Linux 7smbios-utils-bin-2.3.3-8.el7.x86_64.rpmc07fd09323d195a79d57f5df8727b6e89ef4116ebf274cf5dcc9b5a6e94c3078libsmbios-2.3.3-8.el7.i686.rpmd6edc4043661f60e207efac880ea8528ab17bd53c4b35f226881ddbd05c42ec5smbios-utils-2.3.3-8.el7.x86_64.rpm4673ccb9c2ec6b7859148a6b46e7aecd9ced5c568b0360cfd7f4840131773004libsmbios-devel-2.3.3-8.el7.x86_64.rpm6a6e4d80b59d120168cf170f68b19f657e9e38dd2a5ccdebec8d54d16f5b5beclibsmbios-devel-2.3.3-8.el7.i686.rpm6a4b80193e02eb080c80fcca7e92b19bd61e6c24772f65dcf2514edfe63a652flibsmbios-2.3.3-8.el7.x86_64.rpmd10515d8ee236186b1b51ffa49fa72841f15dad2087afcd7e3a913b8fa5694bcsmbios-utils-python-2.3.3-8.el7.x86_64.rpm59bd12333de51f0919139fc783dfeabda8f214896bb25e7f3143f62f03ea4e42python-smbios-2.3.3-8.el7.x86_64.rpm63f7e2df5f3bb4082b73d2b5cd6a507cfca261c033629780aa4f3145015432deSLBA-2018:3187-1Ipa Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7ipa-server-dns-4.6.4-10.sl7.noarch.rpmc69645a6a868ea43b32315e95f72462070d37dcf1e887c6e17be7349e7853cc0python2-ipaclient-4.6.4-10.sl7.noarch.rpmef7bcee8068a25f1308589542a81a53d55adac4927f5217f6c5de48e99451052python2-ipaserver-4.6.4-10.sl7.noarch.rpmc8be861e87295a283fa22f6d47003afce2d1af53daa6f03ff03aa5e339baf146ipa-client-common-4.6.4-10.sl7.noarch.rpm4e6cf298061e5aed0eb602d3389189d0663f630d77b48e23b3fcdac8457938d3ipa-common-4.6.4-10.sl7.noarch.rpmffc44619859dc1067e65fd3a5ffa169784ce1c1c8acfa9a13e887385c1fe8840ipa-client-4.6.4-10.sl7.x86_64.rpm63afedc270d7d87d751df8a0f5b36650022614697a9f07da0f62fcb8ba8b3095ipa-server-4.6.4-10.sl7.x86_64.rpm5960a1d7d4767a1f5fd38ca4f7d3dc20c3af39416a48e16570ef500ccb28670bipa-server-common-4.6.4-10.sl7.noarch.rpm6c5515c110bf4721a85e4a8d817428f8aa93deacd06042001723a884fc9a930cipa-python-compat-4.6.4-10.sl7.noarch.rpmef8fe99e266e9c22da5d4f46ee65d0fcbe3c164feff09e90089b29dafedf14b8python2-ipalib-4.6.4-10.sl7.noarch.rpmce2cd40ede08761d8f145c0acdeb34851295b8a420235e214eee2c8a5df8aca5ipa-server-trust-ad-4.6.4-10.sl7.x86_64.rpm19ac4ae69f5a4d6a279a8ba393d8c8b0f3abf2e43a54a2f4262edcdd72450096SLBA-2018:3189-1Ceph-Common Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7librados2-10.2.5-4.el7.x86_64.rpm9829955db89efe6be2cd6a57545c678eff4279af1eebe41c24017fe6ecb06815librados2-devel-10.2.5-4.el7.x86_64.rpm1dd37684313e42cdf915b4f37ae75d704d4e14a2e53da22d7bc96aca9003cc6cpython-rados-10.2.5-4.el7.x86_64.rpmbfc8a3b4f092bfca61b96490a41c16c14508aacbdab3a6a316c3e4890fb492d2python-rbd-10.2.5-4.el7.x86_64.rpm639b8cc020b95fc68c2ad5eee3325ba0e950e0b82f82057c7f981ebcf26bfbdbceph-common-10.2.5-4.el7.x86_64.rpm32633c773bee0d0eb0078ea76c7093c17660453c0926c1b5b548ef1359a1b71flibrbd1-devel-10.2.5-4.el7.i686.rpm3198c58793a09182e8770f72a6247933f8318daec3f4ff38de801067e3abdbb4librados2-10.2.5-4.el7.i686.rpmf4ea606f9f079836f32d0c4184be7c666c3a453cd549a006fa092f2418f2d6f5librados2-devel-10.2.5-4.el7.i686.rpmc7b474c7bbdaf8be16b3cda94a745afb00dd9e50a2b556b9e5e224afd9458a9flibrbd1-10.2.5-4.el7.i686.rpm4a63e43b7fed285bb97ed2af3847760a97aa1350111816e61709c830e512098flibrbd1-10.2.5-4.el7.x86_64.rpm1891ea6bcfb6dc1b08b3400b6721f0d061050f9e9be3671bd6b141f57586d224librbd1-devel-10.2.5-4.el7.x86_64.rpme4d47c1725b5bab49307f509c2eec68857cde8404b70886cc4bfec4af07acfe8SLBA-2018:3196-1Ndctl Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7daxctl-libs-62-1.el7.x86_64.rpm62bb59a3dd9c522631cc36446f258384bb4dddf7d4fd8fc3925614c57b4120c9ndctl-libs-62-1.el7.i686.rpm5a32133c30a70d05bbed18c39e1830ede53eaf56d0470be1a79fb5d42baa4bb5ndctl-devel-62-1.el7.i686.rpmd0eb5af9161f3311b39e08ed858b81a9053090675f306fb59f0c2d7beabceab3daxctl-devel-62-1.el7.x86_64.rpm0f6219e0a571463b31faa51174da9b85bf8ed3f0630dd719417169e9e7fad34dndctl-62-1.el7.x86_64.rpm799d32a23644bb69ea6772331aeff6aae8fc1c1a1c94b1ce8e5a777efa26de71daxctl-libs-62-1.el7.i686.rpm577b86c8825d3df040a4d0c7128301ab991ee68830ee73e1be22332978d84e5bndctl-devel-62-1.el7.x86_64.rpm4749b596fcddf4ecbe3403ea57448eeb773b6b26351474c04c5e09172d39eaa8daxctl-devel-62-1.el7.i686.rpmd4a5d2abd765fbb04ec0b4d892d7f9c58d786560cb160976a35b243a8526e071daxctl-62-1.el7.x86_64.rpm7bb1af1c412a15177216c69a826f0460866019939d801e93817187e7263db9b6ndctl-libs-62-1.el7.x86_64.rpm1e100a1a2906ac26ef4ce466e7acb9ef30ddd63e1853973a59013ab3a764c4e4SLBA-2018:3218-1Pykickstart Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7pykickstart-1.99.66.19-2.el7.noarch.rpm771ce58511fdb97fb82e1bb5cfa45c9aab3f116a8195ef31c61c9451e8ff6fc6SLBA-2018:3239-1Cryptsetup Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7cryptsetup-python-2.0.3-3.el7.x86_64.rpm0eb6750f397087d457853f183581753c4ca2c5ad1f731a8cda25cccac02c37a8veritysetup-2.0.3-3.el7.x86_64.rpm28c66235af50169acd55b472596cd81ebb1bff86eb338ffc81298b6d6604536ecryptsetup-libs-2.0.3-3.el7.i686.rpm2d79e1d34d4470df69435238fe4e7ebb796081699609d5adf2efd4f7e5921fc8cryptsetup-libs-2.0.3-3.el7.x86_64.rpmff8be7536edd0cda0569f071d5ad5c33cffaf0d93650aca713cd9e422b92e634cryptsetup-devel-2.0.3-3.el7.i686.rpmba83dd867ba39d412155ff5ada77914437907274980ae48f567391a7c9d6b682cryptsetup-reencrypt-2.0.3-3.el7.x86_64.rpma3e424280ca4dc7286562404de66ee12b53a43db14ea08c3bad5545973ee7819cryptsetup-2.0.3-3.el7.x86_64.rpma2b6aec2bdab2f72c8e05b988bcbf885f2ea8c18936ab2c37c534d5cc74b187acryptsetup-devel-2.0.3-3.el7.x86_64.rpmb1bdacb8ae34bd07fd055a61b105aeecff78d02db4a1ffecf420154af2f76057SLBA-2018:3247-1Libblockdev Bug Fix UpdateScientific LinuxScientific Linux 7libblockdev-swap-devel-2.18-3.el7.x86_64.rpm603e66adab0b6584c6006a8f293ab9bbd675325628546d0949fb3061ec25d57blibblockdev-mpath-2.18-3.el7.x86_64.rpm89bfe275f13883af6b38c3e9f133c101e662abfa8598bfe60da3b6a9118823e6libblockdev-utils-devel-2.18-3.el7.x86_64.rpm3358d14cd526f0181bb3ab0cdd5ba2b250aa813c62848c1b8ca7d530baef5158libblockdev-lvm-devel-2.18-3.el7.x86_64.rpm243d98e39cf0ac0f3f41b604eeea1fdb3cb078af9e185621ec04c4865f2b99a6libblockdev-kbd-devel-2.18-3.el7.x86_64.rpm7ac065b4a653b43406f073335607c25b0775777166e5cb41916f8c7d0544d5eblibblockdev-part-devel-2.18-3.el7.x86_64.rpma065b76d11ae5e25f2bf26f5bd14c12d324b2357b6cfecd041241b14d9d2594elibblockdev-crypto-2.18-3.el7.x86_64.rpm733ccfdec13744b8d59eccfcbe8924fbf611778072eccd2cda585c18e26a7567libblockdev-utils-2.18-3.el7.x86_64.rpmc46bee3beb72cc2f7e8e3958763457271e81c921b68bbae6cd2a4c76cf5e4dedlibblockdev-loop-2.18-3.el7.x86_64.rpm8e69233dfc3be19c67d905ecfb891cbd006b46527e9408d2008b1430684f82delibblockdev-devel-2.18-3.el7.x86_64.rpmc4c7bd39f576f5a7a14ac2dde4ac28f9d68f72fc49cf3df2c118bbed6cb4bceclibblockdev-plugins-all-2.18-3.el7.x86_64.rpm57ae3f9a4695a7f6d6b07c0815e47b7b875371403e2ca2d0afb42435a8d6f957libblockdev-mdraid-devel-2.18-3.el7.x86_64.rpm8c39ee5db36d8af0757dc6a64afd61c6ebeaaab351f8a5720ea851847cac04c8libblockdev-nvdimm-devel-2.18-3.el7.x86_64.rpmaef373e8a9b3c8712134dee2b19244d2b2820ee8e4c1bf5fb35e6ab01628bda0libblockdev-btrfs-2.18-3.el7.x86_64.rpm95f894b120596e2e98876d7483ba0d6e57d575b31da334cffa568dcf723b4895libblockdev-loop-devel-2.18-3.el7.x86_64.rpm9314232b4f45472001c07e98a6aff88348d1269c71c8280a64e5320797f7cd33libblockdev-btrfs-devel-2.18-3.el7.x86_64.rpm617d14ba8a2948d6946037e8f2e6ed79c4b087cb225fb447c6d359f39fcb41cdlibblockdev-fs-devel-2.18-3.el7.x86_64.rpm459021e925de78608fdc1cf6f067a8ba791217404c46a1bf4494ecdeef94ec4clibblockdev-vdo-devel-2.18-3.el7.x86_64.rpm0dc7b89eb868806a27cab9230a75eb6132e4a595f9be4a1eb033a36bd276b42alibblockdev-part-2.18-3.el7.x86_64.rpmb696489035be6e568d14db15aad37c23d3abce6b494e6ae8196608c73b08208blibblockdev-lvm-2.18-3.el7.x86_64.rpmf2b6cc7d458bbe7645ee2d77f37bd50d4c3766e8ffd8824eef4886d1c881b12dlibblockdev-crypto-devel-2.18-3.el7.x86_64.rpm7346352f46ca8f8fed97f65ba46b1ad4bec168ece610bffc3cc60773d22a4150libblockdev-dm-2.18-3.el7.x86_64.rpm94aa11c6898d40ba2affc5c72cc5c6be2577253e84a4d293a2cc194c31bd3d32libblockdev-swap-2.18-3.el7.x86_64.rpmfaf0d9f8415cb2798d47fe711a32b97d5a920ef9078332d5b0980fb56cf412c4libblockdev-dm-devel-2.18-3.el7.x86_64.rpm9f8d8d6dfb1e84a0718d93964cf41349b95ad26f2b805a48a99aa608422f48a5libblockdev-mpath-devel-2.18-3.el7.x86_64.rpme849491254b2b8e1b59aee1e046501d8e04ddb83ff5ee2b75655740e4da24db1libblockdev-kbd-2.18-3.el7.x86_64.rpmcc6c1aa50900eff16fa2cf3217983fd7fa75202a638fb2fddbd60552afebcd26libblockdev-mdraid-2.18-3.el7.x86_64.rpma87ad8b8fb8b924c23516bab95399a7a9c68cd809071d26f34e8f61d586f34aclibblockdev-vdo-2.18-3.el7.x86_64.rpm74cbd33c5953554ffee6601dd19200d8d73b122183bc35a5c2bb8acc5bd77855libblockdev-fs-2.18-3.el7.x86_64.rpm3e8d629006b96ac31dd35519a29d2df6786750bcfc74318d4fec4e78ef4bcd7alibblockdev-2.18-3.el7.x86_64.rpmcc1100099a0293c81ff109bbc68270da622df3f738d4beb84bd77939e8ed5f12python2-blockdev-2.18-3.el7.x86_64.rpmee4fcb79c3223da4321fe81a9b4b2ae447b4bbde1af004483f9b858c67bcaa40libblockdev-nvdimm-2.18-3.el7.x86_64.rpm62fcd868c66658a21e2f2125c20a3970fc3f5884d000ff5e3ac9065c56eb4780SLBA-2018:3270-1Python-Blivet Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7python-blivet-0.61.15.72-1.el7.noarch.rpm054aafb4101cd1feba2191f2e7fa538b872193aa9cad1ed05c88c6771201a52dSLBA-2018:3271-1Udisks2 Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7udisks2-iscsi-2.7.3-8.el7.x86_64.rpmbdff5dcb07ac097225c40ec8f32db9dc9e55335ba87b948db4b7ed10e585dd70libudisks2-2.7.3-8.el7.i686.rpme46c905e730b98000df6fd7dfb5c7fb2acd17b5566873aae3d650e3c3736dd91udisks2-2.7.3-8.el7.x86_64.rpmde6ac39ef76f0b22cd574bd158e7afb9a8d0025420e18303901a71213b215088libudisks2-devel-2.7.3-8.el7.x86_64.rpm0c29deeb54bda6f6ebd95d8fe9ccd6974771aee1df1ede901185175676b055eaudisks2-lvm2-2.7.3-8.el7.x86_64.rpm6279438b91e9e3e864d99189cd09a2bc7261bacd2f7ec66bf832255aa6ea2ffflibudisks2-2.7.3-8.el7.x86_64.rpm645d97d1a9efced0418a44356ca1bce4d9003e2c3b0c69387df7c1e71e341d07libudisks2-devel-2.7.3-8.el7.i686.rpm56753841efa19312b20e24d13bd0fffbc39487ff59b228cef4e001f094a8c7c4SLBA-2018:3329-1Nuxwdog Bug Fix UpdateScientific LinuxScientific Linux 7nuxwdog-devel-1.0.3-8.el7.i686.rpm75f7713856a5f0aeeb13013f010f790e48321b7b964939028ebc7e2dcf5a3136nuxwdog-client-perl-1.0.3-8.el7.x86_64.rpm6f7349cb103f60b7a1a882c67484fc580f6d3865355b9b9f6aef5bac7b219187nuxwdog-1.0.3-8.el7.x86_64.rpm623b373ed9c0f6d0ac3109324946d4d11f0824604a76a75160ecc9c8e03f670anuxwdog-1.0.3-8.el7.i686.rpmf57f4d3a95a33da2b1962debaa944a082072e287b4b3df439a4689146e279bf0nuxwdog-client-java-1.0.3-8.el7.x86_64.rpmc7d55b5f898ea3fd850a4f77ce4b765f28392fea5c3743a94f7c3bff01aece2bnuxwdog-devel-1.0.3-8.el7.x86_64.rpm93b8f986097f6aba68a135aa0689128d8750b3e8140764e6a7cd8685b95857dfSLBA-2018:3340-1Selinux-Policy Bug Fix Update* Prior to this update of the SELinux policy, rules that allow user domains to use generic pseudoterminal interfaces were missing. As a consequence, the I/O logging function of the sudo utility did not work for SELinux-confined users. The missing rules have been added to the policy, and the I/O logging function no longer fails in the described scenario.Scientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-229.el7_6.5.noarch.rpm048059f8cb027baa5387f4f66fcfa8c8d56c150bafc87a3b659a2999c659a11cselinux-policy-sandbox-3.13.1-229.el7_6.5.noarch.rpm00b35e73c67aa00e176c116f3619794773634c0a739f77e9a7bdac099b400827selinux-policy-targeted-3.13.1-229.el7_6.5.noarch.rpm1d548981075af2a6975010c019138b6bf710ca34f83f192888430e382096d6f2selinux-policy-doc-3.13.1-229.el7_6.5.noarch.rpm3d6c6f44b7dd0de7a30ab26d3ccd267d0d9a20ad16926a94875d053fc5fffb76selinux-policy-mls-3.13.1-229.el7_6.5.noarch.rpm766547b29ab7d47df30420e0bcb5d6aeccbf7b43f856a3b12bd8ce419fb9a9bdselinux-policy-minimum-3.13.1-229.el7_6.5.noarch.rpm0e13eda8667b81166a3f4b6538b10f0f21e233f174a5ab476d12b99acebd2e0bselinux-policy-3.13.1-229.el7_6.5.noarch.rpma4482e90c279b9ad1d9c678e8d21564da888a3e515e60ec318e834d7d2f9d1f4SLBA-2018:3348-1Tzdata Enhancement Update* The Pacific/Fiji time zone will end Daylight Saving Time (DST) on January 13, 2019 rather than January 20, 2019. * Most regions in Chile will end Daylight Saving Time (DST) on the first Sunday in April, 2019.Scientific LinuxScientific Linux 7tzdata-2018f-2.el7.noarch.rpma296b902763d0b7acfbead21cb21a4c9e01e825bc1b2324e41a604563ba759fctzdata-java-2018f-2.el7.noarch.rpm2ff30b6108e6dd2946627980ce4269004e67c066b5fbcbf3be75e77c8d9d04abSLBA-2018:3454-1Tzdata Enhancement UpdateScientific LinuxScientific Linux 7tzdata-2018g-1.el7.noarch.rpm9cff26eb8b25723083a96d1b4d5132f559730955e788054fe931899f9864212ctzdata-java-2018g-1.el7.noarch.rpm60e988ad90a1fabefeb4077c643af4dd623276ae0308c52acd39ca05fea45defSLBA-2018:3664-1Selinux-Policy Bug Fix Update* Previously, rules that allow the "sysstat_t" domain to read the /var/log/audit/ directory were missing in the SELinux policy. As a consequence, SELinux denied processes while registering a Red Hat Virtualization Host (RHVH) system to the Red Hat Virtualization Manager (RHVM). With this update, the missing rules have been added to the policy, and SELinux denials no longer occur in the described scenario.Scientific LinuxScientific Linux 7selinux-policy-3.13.1-229.el7_6.6.noarch.rpm66499baf191f64cc1006612eadb3a0778ae9efbc8b93c4c02091b98e451363f1selinux-policy-devel-3.13.1-229.el7_6.6.noarch.rpmfb9e0b2999595ed57e80b8ca654cc494e77fb88e648b2d897c3fce859a904d60selinux-policy-minimum-3.13.1-229.el7_6.6.noarch.rpm37bc92439c7b04d5f6f95edba8d4873160bb91081c68310b792c24326c0263bcselinux-policy-targeted-3.13.1-229.el7_6.6.noarch.rpmda0360686a2946348397dfbcc1949340e6fde91555a6f1612448c01724e27997selinux-policy-doc-3.13.1-229.el7_6.6.noarch.rpmc570dccb5d42f95a4ab09192b6544a44eaf370b4339cc010d1cb4e54f0e234c5selinux-policy-mls-3.13.1-229.el7_6.6.noarch.rpmab8480e2697c09e5248318480ad6608071a26ea9fd6d775ca985f6ffa551a3easelinux-policy-sandbox-3.13.1-229.el7_6.6.noarch.rpma0eb8d601c3b9911d04fefe47365bf6e9643edbd2853183f7e1635d17fcd1029SLBA-2019:0037-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated to version 2018i, which addresses recent time zone changes. Notably: * Africa/São Tomé and Príncipe changed from UTC+01 to UTC+00 on January 01, 2019. * Asia/Qyzylorda, Kazakhstan changed from UTC+06 to UTC+05 on December 21, 2018. * A new time zone, Asia/Qostanay, has been created because Qostanay, Kazakhstan did not transition with the Asia/Qyzylorda change. * America/Metlakatla, Alaska will observe Pacific Standard Time (PST) for this winter only. * Updates to Asia/Casablanca have been implemented based on a prediction that Morocco will continue to adjust clocks around Ramadan. * Changes to Asia/Tehran have been made based on predictions for Iran from 2038 through 2090.Scientific LinuxScientific Linux 7tzdata-java-2018i-1.el7.noarch.rpm9e0ccc63bc1e6dc3028327b66b0f27f828b73f890c27929cf0b9d6b5653eaceftzdata-2018i-1.el7.noarch.rpma94fbf60982380d77cd5ce879efe67ceb8a9f56ebe8244ba39fe49ca6a2c172fSLBA-2019:0167-1Tomcatjss Bug Fix UpdateScientific LinuxScientific Linux 7tomcatjss-7.2.1-8.el7_6.noarch.rpmca23777f95eb5e725840af37969906146faa8ac1809845420711727f08309d76SLBA-2019:0183-1Krb5 Bug Fix Update* Previously, Scientific Linux 7.6 build of the krb5 system increased compliance with FIPS-140. As a consequence, certain previously permitted configurations that were prohibited by FIPS-140 stopped working. with this update, the changes have been reverted, because krb5 only needs to work in the FIPS mode, not be FIPS compliant. As a result, SL 7.6.z should work in the same way SL 7.5 did. Please note that Scientific Linux 8 does not support these configurations at the moment.Scientific LinuxScientific Linux 7krb5-server-ldap-1.15.1-37.el7_6.x86_64.rpmf8c9aa8652d725090b984769ed4e84b13b285713adf246a35f397e493a76f4e3krb5-pkinit-1.15.1-37.el7_6.x86_64.rpme388ad5862111ee13fcb808ec9f0baf0a69662b7b4b74e67946dbc3c4998d12bkrb5-workstation-1.15.1-37.el7_6.x86_64.rpm129b7d5dd39653aa2ea5ed47af30a222816e305fc97069e6149707b8730f4ee0krb5-server-1.15.1-37.el7_6.x86_64.rpmc563570beb2975822f6d9b2e2140d7f893093042d7df883f52ad911b349a031fkrb5-libs-1.15.1-37.el7_6.i686.rpm917a02c146e14522fca59a07b64ad5d002ccb21c794e464a3b888fd215194048libkadm5-1.15.1-37.el7_6.i686.rpm6c6af741ce1e689b3323b0a9ca29ff1fd89788743723aa610fdfd944219ea9a9libkadm5-1.15.1-37.el7_6.x86_64.rpm20260fea19d97ff48781bdb0099c6a796f36749d682e144a95febed87d6294a0krb5-devel-1.15.1-37.el7_6.x86_64.rpmfa99b78cd2634311dec2b04de4113ae5cb0126abab82616d6f3f6045e12909eckrb5-devel-1.15.1-37.el7_6.i686.rpmce82641f71e895347c095adbaab41955cb767462e7055917481a9d06b16c437akrb5-libs-1.15.1-37.el7_6.x86_64.rpm54be70a9863437ec0d6a87875c22a92a1ce446341d3eb2b27f9e6d4930c27f16SLBA-2019:0689-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated to version 2019a, which addresses recent time zone changes. Notably: * The Asia/Hebron and Asia/Gaza zones will start DST on 2019-03-30, rather than 2019-03-23 as previously predicted. * Metlakatla rejoined Alaska time on 2019-01-20, ending its observances of Pacific standard time.Scientific LinuxScientific Linux 7tzdata-java-2019a-1.el7.noarch.rpm2731206a1abd2e3a7d980dc32f2deb143f5f43eae317ed00b50c29d9df12e984tzdata-2019a-1.el7.noarch.rpm355e009151006b634c77846009aba128388f366bced47a3a7a0e08773256a546SLBA-2019:1703-1Tzdata Enhancement Update* The 2019 spring DST transition for Palestine occurred on March 29, not March 30.Scientific LinuxScientific Linux 7tzdata-2019b-1.el7.noarch.rpmd3436e875cac36e8bcf40497e187a468ba7ce73acc64ddc8c363c9bbe500ab95tzdata-java-2019b-1.el7.noarch.rpme9bdde794ed5c29ae7ea1d943634249f6f65c99778006bb1932482bf28912637SLBA-2019:2044-1Gnome Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libkdcraw-4.10.5-7.el7.i686.rpme854d106a5c834be45845d382c6a7bed0a5a45971386dbec9f8e87de204e2f50libkdcraw-devel-4.10.5-7.el7.i686.rpm86821c3afc927141490a210bb5994f2f0711e32ff15b106979738a1a0ea1f4c2shotwell-0.28.4-2.el7.x86_64.rpm3cf236264134a646e7585022be12452ad2a7d3ccb0eabeff573bc26f48fa9b00libkdcraw-4.10.5-7.el7.x86_64.rpmfeff07dd01af764cf0f592ee5a0ad623d9085e3c7dec333d0f9183b8a0f72ea5libkdcraw-devel-4.10.5-7.el7.x86_64.rpmd8e0b4a8057651d2e9a967ab756146a75599184615aa1c34ed4e96b5606a21feshotwell-0.28.4-2.el7.i686.rpm7392d0d111394eb4d26b292cb0ff2e269c390af910726837aa42b753abe2cf15SLBA-2019:2064-1Libstoragemgmt Bug Fix UpdateScientific LinuxScientific Linux 7libstoragemgmt-udev-1.7.3-3.el7.x86_64.rpm512e8db6c7591852a0b06b5ac4ac9a6e25018c0f277517eb1f38bd09f8412a30libstoragemgmt-devel-1.7.3-3.el7.x86_64.rpm3e197c90cee9b5716c00394af3adbf2b1ceb54d7eaf0f3dc5ff67e76b68d28balibstoragemgmt-smis-plugin-1.7.3-3.el7.noarch.rpm526ee62cd3a968692423e330e7f2f338d01b04b84a963038568dae867b2ac395libstoragemgmt-devel-1.7.3-3.el7.i686.rpmc44560d58a682ffc6150bb2279198fd8e26f5b71a53ffdff40cfe5cb0cd3aec4libstoragemgmt-nstor-plugin-1.7.3-3.el7.noarch.rpmd8fdb1e13f2875bada7fdf36d07cbad00f4207a5abf84b693af9cc583b966fa3libstoragemgmt-local-plugin-1.7.3-3.el7.noarch.rpmd817be2343694b433241f6de2981f571c201661fdbc6cc20fbf4bdb30071aedelibstoragemgmt-1.7.3-3.el7.x86_64.rpmd5b43e017887b27fe0792b6eafe58eee5c5a4e1bbe803a037be622ce78eb7084libstoragemgmt-python-1.7.3-3.el7.noarch.rpmdd1b921630423848e85f956aa9aec0bbeafba6b33c85d306f4200ab92e71a25elibstoragemgmt-targetd-plugin-1.7.3-3.el7.noarch.rpm416ee5dfd7d803a40bdd63dce4f86cc740231b40f56131e19cc03622ea549f4blibstoragemgmt-python-clibs-1.7.3-3.el7.x86_64.rpm706d86fddb6aad743d6bb84b26dfc594ec61bcdaf3e3b7ba479877d01857108elibstoragemgmt-netapp-plugin-1.7.3-3.el7.noarch.rpm65214c0ba3ccda168dbfdacad9d26b12d8c044e90395cc0cc46f0684a56ef603libstoragemgmt-megaraid-plugin-1.7.3-3.el7.noarch.rpm32ad977aade18a5670ba110858f678b3d19234d80aed8647b0279c5988442eb3libstoragemgmt-arcconf-plugin-1.7.3-3.el7.noarch.rpm2bd2d69059ce49b8bbe4e61e645b4baa00c0b5459be4320f60e7e5e51313ba96libstoragemgmt-nfs-plugin-clibs-1.7.3-3.el7.x86_64.rpm0c48ce22414134ed567ac96a94646f9628740202d802ffb7acc17c2c31e079eclibstoragemgmt-1.7.3-3.el7.i686.rpm1e4059693022c5c6640b8b6f940afd90997ab23b555d5b798f0855966aead33blibstoragemgmt-hpsa-plugin-1.7.3-3.el7.noarch.rpm604a0aa27fdbb394e595a4ad3c6a1cff96090bbdf95653af01fb7b5e9e74dc5alibstoragemgmt-nfs-plugin-1.7.3-3.el7.noarch.rpmd64db63084cb8c1b67410cc3d1ad873059cf29314cd3278f7af1767edc87f6eeSLBA-2019:2083-1Qgnomeplatform Bug Fix UpdateScientific LinuxScientific Linux 7qgnomeplatform-0.3-5.el7.x86_64.rpm4ab53c707b8292a49aebb2cd5594eb23037d10c91863047635e94a9d13b91122qgnomeplatform-0.3-5.el7.i686.rpmf73484daea8bd76d0f9ef3f66b903dbe11b07dae83f7b01dbc3a780abb8e5928SLBA-2019:2100-1Rdma And Stack Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libpsm2-compat-11.2.78-1.el7.x86_64.rpm201903bf9e6914a1ec4799f553d9bd4334239188b179d9b627d8b369d12cfaf9compat-openmpi16-devel-1.6.4-10.7.2.el7.i686.rpmb89bf320cd1bba6a9ea681a799386fa4d047be8b7835d9a7ab9f9b16c06ad7a3compat-opensm-libs-3.3.15-3.el7.x86_64.rpm9bfd1142ca027ce7699c11921e7bdf4a474c529a4297e79e76c32a7ba3b08722openmpi-devel-1.10.7-5.el7.x86_64.rpm287840f81dc9a3b99ef129915f42cead8a2b06cfc537bb41d4dee067348e5010libfabric-1.7.0-1.el7.i686.rpmd025b2f95721ed02c1ba287a0f9ae89bacaf0d9418b41ad613e06a74c0c425f6compat-openmpi16-1.6.4-10.7.2.el7.x86_64.rpmf7bb6de271831703638cbd078d9466b1612ea55e41459a3a57d1cca872c04832opensm-static-3.3.21-2.el7.i686.rpm3fd7c0c4851cd534a56f27f633005e7baf7f15477f7ee7aead4ab422026bd20clibfabric-1.7.0-1.el7.x86_64.rpm28ea9e99108872eaf8ef519ec48b204ddc6091367afa5f497a515b2f0f02fd9copenmpi3-devel-3.1.3-2.el7.i686.rpmbe1d01cccb8c272a115f94697eedf28c31ccb30cf8bd95cefc4f18b22f7c43fdopenmpi3-3.1.3-2.el7.i686.rpmd42a86e851b5bab260b6e227efdace1daba61a2c6f5f080b1be942ac0ca1f475opensm-devel-3.3.21-2.el7.i686.rpm662b26c3b73674fd68ab7c1614657b5411a07f4009007f75d7d68ad3e13dfe09libpsm2-devel-11.2.78-1.el7.x86_64.rpm409832b9bda98bd1d4f13e798a2d3a8b8115666a81633ab05c8ae7844dae18a8compat-openmpi16-devel-1.6.4-10.7.2.el7.x86_64.rpmfea87251607aaf00878b132b9f16b896031346680ce309bcfcacce7722750bb0libfabric-devel-1.7.0-1.el7.i686.rpm3810e53e3de31cbd71973485365d063b90ded1519008a90fdc673804bfc7c217ibutils-libs-1.5.7-14.el7.i686.rpm4e1fdf40d4bd65e645d3ee03ebe9f620a7c18946ef17fbf184d8896b0465981bopenmpi-1.10.7-5.el7.i686.rpm96b6b5adebaabcc75e5aa7e0a9a1efb6c164dcbef731eeb8de0a4cc07f467fcalibfabric-devel-1.7.0-1.el7.x86_64.rpm8771a3f59c27f5ade454369416bad33d63675a028f548bbf4edf08d0bf5d80f3opensm-3.3.21-2.el7.x86_64.rpma7bb92ecbe0ccf174204d0a3327b3121adcab295b0ce54a0c04afea1fd6dcc40ibutils-1.5.7-14.el7.x86_64.rpm6fb396f05e1f637c276349430f5c24df16f5ec080a0162b99d4618596dcca930openmpi-1.10.7-5.el7.x86_64.rpmafef957b29b87fbd8b6c9530302df2f1c284b2dce53776e030f9e789b539c52dopenmpi3-devel-3.1.3-2.el7.x86_64.rpm82d4e4c670e068d06bc083e5cf4141104a6205e86470b39944275432a99c74f7compat-openmpi16-1.6.4-10.7.2.el7.i686.rpm529c358e79418eb7c939596321c9c5c716ed1f8a2ed8a54829ec84303b83ce50opensm-static-3.3.21-2.el7.x86_64.rpm0b488f28e77c4c984bf253f84c4bf3db55309986dfabe1474bbec21c0bf663a3opensm-libs-3.3.21-2.el7.i686.rpma9946c04fe43af5303590d1b8d892eb078dd48acaf303e08f10c361bb6b1eb03openmpi3-3.1.3-2.el7.x86_64.rpmbb184f29e53a90100614c9711f66deb9246954f88cda7c9484779b81ecfa51c1ibutils-devel-1.5.7-14.el7.x86_64.rpmc0b343a6adfab38fd9b1fcc9eb4a9f3d2510c9fcbeea728ecf1af2d6ad7a2627opensm-devel-3.3.21-2.el7.x86_64.rpma96c1f4256c774056223949919e6d55ebc6d4d3ca8dd84bffff641ab78d2b824ibutils-libs-1.5.7-14.el7.x86_64.rpmefdc80d9120172ab71c1b0a3291cd11c371427a194b21f0cf008b8fc8e1fba28openmpi-devel-1.10.7-5.el7.i686.rpm0a329d26c069dabf530e14485092d25235a5c0a0d094b096ecf371f26e4a2d17libpsm2-11.2.78-1.el7.x86_64.rpm85b045867d8d69c9406d38f788155b9b13ffbc729f665dc0d9180b4f4a3c60a3opensm-libs-3.3.21-2.el7.x86_64.rpm959234c8a5c0e8b6a2adcb469499c94af5358c1df9c29296efbd57118c2a9139ibutils-devel-1.5.7-14.el7.i686.rpmff3165253407ede96f55a736fc597c833cb6229369e52b21d1efbe2a765c9bf3compat-opensm-libs-3.3.15-3.el7.i686.rpmcfa132fcbdd58b95729ea533b4beebb55613ce4cbceac6b5c9c25367b195df25SLBA-2019:2107-1Llvm-Private Bug Fix UpdateScientific LinuxScientific Linux 7llvm-private-7.0.1-1.el7.x86_64.rpmaed704e1be4abe86f92f15d6db78e1495251a74cf56eb3f632224928a0f53260llvm-private-devel-7.0.1-1.el7.x86_64.rpm2d211bf0346c792990edc6827d12e2fab61275b92307f72fd358696e740753c6llvm-private-devel-7.0.1-1.el7.i686.rpma167bf41553925bd84717cde9e11549013667da44b5e37441e27b7e54626072ellvm-private-7.0.1-1.el7.i686.rpm8c77b75b25a3b788d9fd9246cfdc7e6c73d186d096b06cc5dc26d858abd0c2b1SLBA-2019:2144-1Compat-Libgfortran-41 Bug Fix UpdateScientific LinuxScientific Linux 7compat-libgfortran-41-4.1.2-45.el7.x86_64.rpm01576b5fa0c2cb04b28f7995fa60765895339067476afb9820ba5e55c44130bccompat-libgfortran-41-4.1.2-45.el7.i686.rpm9820e13d0d93cc747b29c65935bd0b3b35adbf1c631dc179ac9f71bb40ea439fSLBA-2019:2146-1Python-Rpm-Macros Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7python-srpm-macros-3-32.el7.noarch.rpm2b3afc3399639a9ea2aa3e1ea4a1d3a26b68774d05610ac998e339799738c2d9python2-rpm-macros-3-32.el7.noarch.rpma1716f66e41b546de6e62c951aa52e7031381f29f38bc0120fb48b04aef527a5python-rpm-macros-3-32.el7.noarch.rpm5e582562081f13d7efc1391c19509803ed58bd33cd9ca7a3dc89da1fc0b52dcepython3-rpm-macros-3-32.el7.noarch.rpm82c2e86ef85fa8b7d030ddb872fe461a84037109befd20e4959638efe8633c28SLBA-2019:2195-1Bind-Dyndb-Ldap Bug Fix UpdateScientific LinuxScientific Linux 7bind-dyndb-ldap-11.1-6.el7.x86_64.rpmd9d034e7d69930023056524093855e51c6e9fb96d05f30ff053a3c59b11aae90SLBA-2019:2198-1Scap-Security-Guide Bug Fix UpdateScientific LinuxScientific Linux 7scap-security-guide-doc-0.1.43-13.sl7_7.noarch.rpmf25b6ede00cc937bde81bd7096c3a8fb50d689ca21f21425a05764e57da22c41scap-security-guide-0.1.43-13.sl7_7.noarch.rpm06bbee1345c58ad9a7f21ef814b1eddc3b09d198b87ea86f202635826bf91c06SLBA-2019:2228-1Pki-Core Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7pki-base-java-10.5.16-3.el7.noarch.rpme62bd49288dbe394a8f5a64d26c181ffc88e8acec8d939680234eb1ff1c91c19pki-tools-10.5.16-3.el7.x86_64.rpmac9483c5c9e3f7d5f7c599b58a4f0b358f0a2120a5b8f851fb0dfbd7c34b203cpki-symkey-10.5.16-3.el7.x86_64.rpmbf1a0b95ad04744f91f383ecaa24049c3fc68aa98cde39dd5a7170cbb18e97c8pki-javadoc-10.5.16-3.el7.noarch.rpm101f11be61218a2b11adb1031d8c6458c3b799f0fcf4cc10d65e27f864b84d07pki-ca-10.5.16-3.el7.noarch.rpm3f2148690fe5ad8cec88d954ddca2b0080e0fbb759df3ae7ba449ec02b920e38pki-server-10.5.16-3.el7.noarch.rpm67c904e85e56df5370bbb293b561b5d3ec87934f3965b4c6a7f5f75ce34112e2pki-base-10.5.16-3.el7.noarch.rpme04e8aaeace93fec4e8748285380160270619608fac2e7d4d6e36149a7582269pki-kra-10.5.16-3.el7.noarch.rpm112318d9e922e9c3f8f7633bc1ef5af9521c96d5a882e3f35101185d4c005f0eSLBA-2019:2234-1New Package: Adobe-Mappings-CmapAll users who require adobe-mappings-cmap are advised to install this new package.Scientific LinuxScientific Linux 7adobe-mappings-cmap-devel-20171205-3.el7.noarch.rpm091b2685be7ea465d06f0a0918e454d29b0734962376c4dcf79687e447660998adobe-mappings-cmap-deprecated-20171205-3.el7.noarch.rpm59b5e032e9da6e5eae0919b71f2c9aee70d9e87612887671d3037eafd84f0086adobe-mappings-cmap-20171205-3.el7.noarch.rpm29abb5030459b75f5c9bfa1a1c9f0722ef7d220ffa38deb3bfe1ee89c961d61bSLBA-2019:2235-1New Package: Adobe-Mappings-PdfAll users who require adobe-mappings-pdf are advised to install this new package.Scientific LinuxScientific Linux 7adobe-mappings-pdf-20180407-1.el7.noarch.rpm6cca064bb7c9bc2fefa399afe49bacf902eacfce37fcb701b1d45f23fed7b28aadobe-mappings-pdf-devel-20180407-1.el7.noarch.rpm312e7630478d8abf12cf59b2ba1df5bd1e32504f59eca70e58ca1cf848a885abSLBA-2019:2236-1New Package: Urw-Base35-FontsAll users who require urw-base35-fonts are advised to install this new package.Scientific LinuxScientific Linux 7urw-base35-fonts-common-20170801-10.el7.noarch.rpm1a73e7035f7c0f43a813e42deacba4afa592f6e185dcdb15523535809681332curw-base35-fonts-20170801-10.el7.noarch.rpmf685be2f5e3b07d9c32b5752f69e81a641581fe7de87925209f64ba3b64ffc4furw-base35-bookman-fonts-20170801-10.el7.noarch.rpm2515d06faf24097f8da059e9e503ae05fb06409d15160d0d07b5a5fd19471d66urw-base35-z003-fonts-20170801-10.el7.noarch.rpmfca2bf3b92dc906e639dab9c656786d8e5a5fe642e3ba90dbb662b549a715c9durw-base35-d050000l-fonts-20170801-10.el7.noarch.rpm46ee054337fdb51390e3da8352ade4302189f5d486c10a813c7679eb72e1da2aurw-base35-nimbus-sans-fonts-20170801-10.el7.noarch.rpm820c07f4da410e70d0d73203f162143ef150a7ee0b0968eacdaad1eb5591fb1curw-base35-gothic-fonts-20170801-10.el7.noarch.rpm8b84c732768c2969db7300d9f0ade946b5a109bb1e4388de6771a17b0bd269b2urw-base35-c059-fonts-20170801-10.el7.noarch.rpm17bebfd8e13a612ec8aaf37d6d43c155496cc52a8acebf3eca211c601afd8db4urw-base35-nimbus-roman-fonts-20170801-10.el7.noarch.rpm137720abcbcd1726d15b8f36834cdb452649380ddc0b0a2be56f48062a69eec0urw-base35-standard-symbols-ps-fonts-20170801-10.el7.noarch.rpm041e850e7b649b1041fd0cdc0d1cc17cf60db5779ee988adfa5976aa983012cdurw-base35-fonts-devel-20170801-10.el7.noarch.rpm1fb9c9eaf819198f3bea11f2219ae390954bab6e91b2d1b6c29bb417857f09d9urw-base35-nimbus-mono-ps-fonts-20170801-10.el7.noarch.rpmae3a987dd2acbc77e69e74f4b5b2b5eece9a1f55db19c8b5ba52901df707d40furw-base35-p052-fonts-20170801-10.el7.noarch.rpm1e79cb5b05498a34f059ca4cdc4d59cb162ddde3132a1fb0b8a37a381b67dc30urw-base35-fonts-legacy-20170801-10.el7.noarch.rpmeaf98259619a6fac07b30dd22baa52eab68b144dcac9f016a1fb0b1385d1c000SLBA-2019:2341-1Openscap Bug Fix UpdateScientific LinuxScientific Linux 7openscap-scanner-1.2.17-4.el7.x86_64.rpme59d78e8a591c99975084d799215fbbc80d8fff07206ae07051d2c04b4e07676openscap-engine-sce-1.2.17-4.el7.x86_64.rpmd1f33b40613a191e7b2e53341971f903b8b809b785e071f481a5e862eb2d2d64openscap-engine-sce-devel-1.2.17-4.el7.x86_64.rpm4f52b3f5f9ec896deb0f5c514e82ee1964eda1d69abd5bfad9d07197a290fe77openscap-1.2.17-4.el7.i686.rpm90e8aaa70fb89d58b068a2fdec73c2a985381c31b46e4a0e6654476652f51ebfopenscap-utils-1.2.17-4.el7.x86_64.rpmaa6fe9389bc5b0c3d3a3d6632fa9caddf20c0063f22f6eaf79dbc51db3d03e0fopenscap-devel-1.2.17-4.el7.x86_64.rpm0beb7095bd8713c5f1aa0c5d7a3c2eb462e7903591ef8eded035fbbac1f151afopenscap-devel-1.2.17-4.el7.i686.rpm6da51ad4de35df9b91f9775c6ee4cd918f2dfe8f4c3651216c6c7d4217b98ca7openscap-1.2.17-4.el7.x86_64.rpm9795ce698d4dfbe2f04e68b3040a8b51df341e98c08009d4d8ad4ae1ae5e6c43openscap-engine-sce-devel-1.2.17-4.el7.i686.rpma7ad6546ba63dc2906879e3921cf2796e902245c255d975720009bfd2c9996a5openscap-extra-probes-1.2.17-4.el7.x86_64.rpm44e9e019d6e6045f7c107e11eb4fa51e63d449a92adcba23cde05fa48054dbadopenscap-python-1.2.17-4.el7.x86_64.rpm1f894a63a7efa3170a1c248f0d5c6d62cd8fd41364054635d0a9eebf56ad6314openscap-engine-sce-1.2.17-4.el7.i686.rpma16a43e476ddc8b3fff02c9bdc0dd8c85f6b70756af59fd12b9b3fd6fd78490eopenscap-containers-1.2.17-4.el7.noarch.rpm24e48e3d60fc2c41c2bcdbf7297b126c6a251fb2d526fb1879836d40ea9e8d86SLBA-2019:2350-1New Package: Compat-Exiv2-026This update adds the compat-exiv2-026 package to Scientific Linux 7.Scientific LinuxScientific Linux 7compat-exiv2-026-0.26-1.el7.i686.rpmd9d8853d3466c52b93b0aca7dddcff3c9c8d17b60315287742f118ae6feb556acompat-exiv2-026-0.26-1.el7.x86_64.rpm9d513b6fbda6a6d24045dfcf50b05a0953e4910549bf24d61943a0c9ce939b0eSLBA-2019:2355-1Selinux-Policy Bug Fix UpdateThis update fixes the following bug: * avc errors reported when using sbd fencingScientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-252.el7.1.noarch.rpmfa669426199fc0220d157ab5b6f267f3d0760946a26db2c3308d51f88c22ea71selinux-policy-doc-3.13.1-252.el7.1.noarch.rpm21eadd6dc1e6f58cf657f863981f3abd9d2e04d1009d62e91f5122bc18d45cf4selinux-policy-targeted-3.13.1-252.el7.1.noarch.rpm8fa15bbdfae5fd9f9241e449ae05dbd5f1bc6a3f8f2d16666f66c39c50a5e089selinux-policy-mls-3.13.1-252.el7.1.noarch.rpm651b0bbd9557c5bad41d3cae6bcc8165fc8584838a7b2eb97a50b7b0429adccaselinux-policy-minimum-3.13.1-252.el7.1.noarch.rpm1c6b98ef50cdb95c03092c9ad7b2f7ca7f863d18a8241f17bdb42c153418375dselinux-policy-3.13.1-252.el7.1.noarch.rpm98f82227c3863abc00ea3e6041b50e95328a1de0f1da69a79f17b8b63eae976fselinux-policy-sandbox-3.13.1-252.el7.1.noarch.rpm0dbbdc4b51e811a936eacb82a513dc23ef01a54eaf3eac62f2990c78eb9a706bSLBA-2019:2871-1Tzdata Enhancement UpdateThe tzdata packages have been updated to version 2019c, which addresses recent time zone changes. Notably: * Fiji will observe the daylight saving time (DST) from November 10, 2019 to January 12, 2020. * Norfolk Island will start to observe Australian-style DST on November 06, 2019.Scientific LinuxScientific Linux 7tzdata-2019c-1.el7.noarch.rpm2aed8f444cc16c1a7c2033e0b94afb7868a8dd2b547f8c9a07ffbdd75967fa52tzdata-java-2019c-1.el7.noarch.rpm25ea4f06b9de07be4a69e4641b69eb39029d49dfa6bd453a717b6a6bcdf15897SLBA-2019:3062-1Kpatch Bug Fix UpdateThis update fixes the following bug: * kpatch: clarify that "kpatch unload" isn't supportedScientific LinuxScientific Linux 7kpatch-0.6.1-5.el7_7.noarch.rpm248170e30031314538f11da067205704744e821a40df4b4deba4f958da3b25a1SLBA-2019:3982-1Selinux-Policy Bug Fix UpdateThis update fixes the following bug: * AVCs seen on "fuser" when "tmpwatch --fuser ..." is used as a system cron jobScientific LinuxScientific Linux 7selinux-policy-doc-3.13.1-252.el7_7.6.noarch.rpm65ff701326e363fcacfc65d6ce5a80af991c3ba9362abd8fbf1e292b7243d725selinux-policy-targeted-3.13.1-252.el7_7.6.noarch.rpm05180e34b1952b23bc88e61dad1155a0892605d7e87f36135bd4288a3f159c97selinux-policy-devel-3.13.1-252.el7_7.6.noarch.rpm7f20544af0535ca7cc09eb415be4736adfb2f41ee91f284f93213b7d734dc9d3selinux-policy-3.13.1-252.el7_7.6.noarch.rpm86b5f248b85caa826d8e564e1d18fdb4919f015c0d2f48b522394f2cd3c54311selinux-policy-minimum-3.13.1-252.el7_7.6.noarch.rpm42431e2c31afb2a1c93ce9297cf295103294fc658d7bcfae3efa561fe36e6988selinux-policy-sandbox-3.13.1-252.el7_7.6.noarch.rpm8020318fb1ee7cc88ab8a932bbca9bc4aa40ec17c08822ecb4b4629642220444selinux-policy-mls-3.13.1-252.el7_7.6.noarch.rpm3b5a1995a7c0f173b3c5c79b7a6de0709826175d470ed92478ebada108171473SLBA-2020:0991-1Libtalloc Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libtalloc-devel-2.1.16-1.el7.i686.rpma98926e7cf0376ec2ca75db51c964aa900e3ae1fe69e04a9d1fee08f2fe6ea72libtalloc-2.1.16-1.el7.x86_64.rpm2da1603b64a260885615e3589386be9f9941c5c3d1b3d31f77a4c2275a3d0b6epytalloc-2.1.16-1.el7.x86_64.rpmc6862e9c3ab8939dddae843fc610653aa0e6f803e82493ab700c080e1cb0da00pytalloc-2.1.16-1.el7.i686.rpm22828299404e989ddf87ab406a3dadda02f2a852f8f7664d0ae2e5983d837ac5libtalloc-2.1.16-1.el7.i686.rpmfb69cccc4077d4915453e6feb35f56e5b77283b699bc1792c04c237aba344af1pytalloc-devel-2.1.16-1.el7.i686.rpmecf6f5126434bd87f16417a44d562dac3932d41df43fbaf83bad2dc75433af4fpytalloc-devel-2.1.16-1.el7.x86_64.rpm3796e011aae01468a4cc1080dfd545cc7e5bb1eb38ba1de4abd3edbf1c393ba2libtalloc-devel-2.1.16-1.el7.x86_64.rpmef554ef7cafb18aef7ca04d8f401090a31e59a79f2e891cccd0fc335f51a218dSLBA-2020:1001-1Libtdb Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7tdb-tools-1.3.18-1.el7.x86_64.rpm571d522d63620a132ebf6b615453f887ea4d256f45204e19eab80ff30d7af734python-tdb-1.3.18-1.el7.i686.rpm50bee6db25486d21add75cd4ec70aba9ddf1c94b0c9558fcce9db4626419393bpython-tdb-1.3.18-1.el7.x86_64.rpmc8805e391f94da88276eb660d646d5470bf441192d3150c761a9b61a3dd71c69libtdb-devel-1.3.18-1.el7.i686.rpm58be27ba7d8f74087fc106838de89bb97d8162085983ca03e69526f5df86dbb7libtdb-1.3.18-1.el7.x86_64.rpm148868a33a99c530b598589256ae5596f47da6e1f5d444cb98ad0afc871f1544libtdb-devel-1.3.18-1.el7.x86_64.rpm9ab0b0c83c5209d07f8982c6d08d8394f43e97fa7265528e918374da68cc5360libtdb-1.3.18-1.el7.i686.rpm482b7ef769828f728c2bd39249ba8291516643c0641b02ca64533c3fed0866e3SLBA-2020:1012-1Bcc Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7bcc-devel-0.10.0-1.el7.x86_64.rpm4914a980e6f9b92cf98d80aabf7bb7e87ffc4c66f9f89e6b79f138bca8ef847epython-bcc-0.10.0-1.el7.x86_64.rpm7e50bf01dba9aaeee79ac762ec2d192db08dab2ff958764d11c35d610494ed04bcc-tools-0.10.0-1.el7.x86_64.rpm182f51dc408fcb82875d80410ce35a54aa062e689c3cc4c80c882bdc5d20edd8bcc-doc-0.10.0-1.el7.noarch.rpmb402475b9480e8e1660e7965606a56376c8c23e0e6055fbf5c1b3e6619711b5dbcc-0.10.0-1.el7.x86_64.rpm66e814087bf69fdfdbe152521646a017129c65dbe514b2162b4ba84046e6a37fSLBA-2020:1030-1Nuxwdog Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7nuxwdog-devel-1.0.5-1.el7.i686.rpm7a5d595a260d23e2d1a15f5398edd5df496ab336eb49721116b172c3fba5ff82nuxwdog-devel-1.0.5-1.el7.x86_64.rpmf2d745e465bb96dfda42838ca95a9e7b3f55b46ba8e33dd002e27670a59d097dnuxwdog-1.0.5-1.el7.x86_64.rpm888f7b5e5f08b841b62876eaa8872c224e81ad9d9de081a945c63dca1e8091c3nuxwdog-client-perl-1.0.5-1.el7.x86_64.rpm43699a9166fadff4e6fcad822777d3abd027c54b77f1b28f1bab70a6ea160279nuxwdog-1.0.5-1.el7.i686.rpm406750ff3ab35401faf838b44209ece9bca6f87e27c2cfdca5f5e272dcff48fcnuxwdog-client-java-1.0.5-1.el7.x86_64.rpmbdd13dd32cf2a75bef793291cdd67b1e717b5412a2322942b4fd61e61f11dad5SLBA-2020:1038-1Glusterfs Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7glusterfs-fuse-6.0-29.sl7.x86_64.rpm7577618930b287706dfd2e4755ed30ba27d895b19fd21117f139d60e0ac92861glusterfs-resource-agents-6.0-29.sl7.noarch.rpmf3bced8a363247633563c1b7eb88da93f04752e51ce5932511a048bba80acf4cglusterfs-geo-replication-6.0-29.sl7.x86_64.rpmfba9cf990d557dd7c06cf95b76609a4b627377bd5632fd56a506c5034aac4121glusterfs-api-devel-6.0-29.sl7.x86_64.rpm6a87b2f402cf0ec23bdbeb1db9282a5a639aac090237022bc599b4afecb78b59glusterfs-server-6.0-29.sl7.x86_64.rpm6398a553d2bc216e853fa4a6b6b99c650076e96b1d9f08bea90c6790b6fa06a3glusterfs-rdma-6.0-29.sl7.x86_64.rpm1a47229b8de276bb6939b93f7a6f3747a599498f63e63c52e1e30cbcab5da5c8glusterfs-6.0-29.sl7.x86_64.rpm36f41c262247ded5b9597a793c07c20dbb45df06cddc1b18546bd50b2c66bc0bglusterfs-api-6.0-29.sl7.x86_64.rpm37df7d89ba07246418a0bfc89993a829ee0f8fd4e701a74e59f9bad2b9d542cdglusterfs-libs-6.0-29.sl7.x86_64.rpm6e7368c5d7de3b77767187267ee4c69f147e5c7e8140d809c29fd2f18174a4c9glusterfs-client-xlators-6.0-29.sl7.x86_64.rpm446f3025e4a925e63528998fd33a3a0b1c46885a20441ba8a4bf882cfd2a533bpython2-gluster-6.0-29.sl7.x86_64.rpm13b8d7e408319169ca7703631246c5840139973787dec5685529d105537961d6glusterfs-devel-6.0-29.sl7.x86_64.rpm6229cb2f52700df46f323bfdaa36f5ba381ba7dd40160d1bb24e8bc3f01c2defglusterfs-cli-6.0-29.sl7.x86_64.rpm5b57babd5811bf3cf5029015a9c7b8934ff88216d64de66481fbdc43bd915013glusterfs-cloudsync-plugins-6.0-29.sl7.x86_64.rpmb1437cefc49c69541059d74db54cb16c0782a8eeb24a982868d0d6b89db9de94glusterfs-events-6.0-29.sl7.x86_64.rpm735dbce6751c700e7a3eb8240db6deb96bb5014ec387b590a0b0044ee280cae2SLBA-2020:1056-1Libtevent Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libtevent-0.9.39-1.el7.x86_64.rpm07adeafab452983bae66a5b81321271a28426c20c9cc557f5463a87aa44a80edlibtevent-devel-0.9.39-1.el7.i686.rpmb8786f5696f25ff3d141b48d4f15ba3ab6add2d895943d06f0befada4185e278libtevent-0.9.39-1.el7.i686.rpmd6138c1ad3ccec3e01ba8838ac30502352988291b408661eb6b6475e8eee341elibtevent-devel-0.9.39-1.el7.x86_64.rpm52ec549fedb3b205ac00332951a34f4f7682bc514c0b08e7bb7f040528c33141python-tevent-0.9.39-1.el7.x86_64.rpm69a608b41dd0ec2d684ce916352f8b5320bc341bfb9181a6d768f234c60ec29cSLBA-2020:1073-1Tomcatjss Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7tomcatjss-7.2.5-1.el7.noarch.rpmc612860830a18587c3ba8c7183f5410390a24ae58b740115e01967a203664871SLBA-2020:1083-1Ipa Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7python2-ipalib-4.6.6-11.sl7.noarch.rpm10a9fa1010a1e3cd2edcbed601fdb4ae144f05da8592fe11c1cec2492ee3d798ipa-server-common-4.6.6-11.sl7.noarch.rpm3fdead3dfe03fb2fa147257a6a6c28b580998519fd43565e9ddd2feadd2fed9dipa-client-common-4.6.6-11.sl7.noarch.rpm6df989b4940a925d7d284ed6a3e66374259c15a7bc9a02b2d52b308b2d42c185ipa-client-4.6.6-11.sl7.x86_64.rpm738130e18b24dfe02d91e666924417d8e9ae47570f125ef4ac980a7fbde70fd3ipa-server-dns-4.6.6-11.sl7.noarch.rpm6c108edd0827ca167c9d5f2a49091b7feebe2ac4c6de96e4ac59bbd419dfa64epython2-ipaclient-4.6.6-11.sl7.noarch.rpm1d968a4cc0f4946172e7c9789058c6ce650b2cb4e5d94a93ae546465e9f428b9python2-ipaserver-4.6.6-11.sl7.noarch.rpmf8c16c14764c1ea1de5288800f22af97cd8059b866bc0246d2b9196d10cc69b8ipa-server-trust-ad-4.6.6-11.sl7.x86_64.rpme51b3250fac0b152a600c2fbb9b494bc1ad939fe8bb4c16ce6b621bcf9a03a06ipa-common-4.6.6-11.sl7.noarch.rpm50a93f6b4220130eec236e2db732a5c5112c487b40def6d033314d86fc761760ipa-server-4.6.6-11.sl7.x86_64.rpm64999ded44313501fd9218568f349cea6316ea5afdca6c3c825823187531429eipa-python-compat-4.6.6-11.sl7.noarch.rpm5071d18831bba1e3b6800ad8240cd1b550337c5fc94b6669acd35531a276733bSLBA-2020:1098-1Libblockdev Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libblockdev-lvm-devel-2.18-5.el7.x86_64.rpm87f56a4b78471c6321fbb6f695c94226cd3daf9bb27cda307104e417de5aa57dlibblockdev-part-devel-2.18-5.el7.x86_64.rpm4de94252128d2859aab9c7db5caa17bd5d9306b5aa5c19fd09e011ed7624f332libblockdev-vdo-2.18-5.el7.x86_64.rpm9e85ac1f5a2e68fa0252c2bf4085ef9af680f197838df8650df73e5a5ffb9304libblockdev-lvm-devel-2.18-5.el7.i686.rpm5e0ff5ae21a2e7c2819f0d099a9265fcf23a28866806c573eb4d9d9d1797af16libblockdev-part-devel-2.18-5.el7.i686.rpm6cac8be467cd8d6779ae916d42c49247be60ad8593a2d8b6aa2a7c6860ef2d61libblockdev-crypto-devel-2.18-5.el7.x86_64.rpmdd57368a94dcf86b464abe6cc02759b6f985dc1853befaf5ca6254b6466c3abalibblockdev-nvdimm-2.18-5.el7.i686.rpm06fea248aaee92046fd9be56bdbab9b37013e008f98051b84b212c6c6411a3a5libblockdev-swap-devel-2.18-5.el7.i686.rpmd1daa5f616e12bddae77a52dd4657729dc847baae3f696a95e599f4dd9b102dclibblockdev-mpath-2.18-5.el7.x86_64.rpm7795c2f3c9b99d183d6634cbb1b2d6a7bf6503ca607f70a75e42a194505c1f2alibblockdev-dm-devel-2.18-5.el7.i686.rpm69bb367d7158eff505d09e292d1b49a906b7f84ac666dc93da66d02b73355539libblockdev-fs-2.18-5.el7.x86_64.rpm4c184bd9c04e8a312d314ec37c8b24fdcce9078505ea378f9861c668272422ealibblockdev-fs-devel-2.18-5.el7.i686.rpme75f6bcf78dd5644723d6d0c7e3117bd57b3d7d32270a60cfdf123fe7ba47fa3libblockdev-mpath-devel-2.18-5.el7.i686.rpma159b3a7750681aabd2c696fbbd5ce1deebebe88860f284c469673af9d6f9c7elibblockdev-swap-2.18-5.el7.x86_64.rpmf8b5b35f3dbf2a5c3d2323876dd8c79002050bf91d7fbabb6edda4dfd9b5734elibblockdev-2.18-5.el7.i686.rpm19537dd3699bb7f160358aeec85c1d11195774053eb89dc53a7852585632c410libblockdev-utils-devel-2.18-5.el7.i686.rpm43c3a4fa5edfec0ec3b636a117fe6224792b1c7e34b50db86093c081e9bf8be3libblockdev-lvm-2.18-5.el7.x86_64.rpm4be75d8b3c5a61b9ac5891b48e2aef546bc04111e00350573f433bf34070f116libblockdev-nvdimm-devel-2.18-5.el7.x86_64.rpm649218abb4b5e5acaffd3d11be658399104ced6e85d8c53fc23509935db04354libblockdev-part-2.18-5.el7.x86_64.rpm031aaf9af92d8ce6deb2da3bcca95986847f3d9e6ea7efe864e308382c795b99libblockdev-mdraid-devel-2.18-5.el7.x86_64.rpm260e276d172d7059eb7c25b99e7fe9ffa9b0551c1505e8eba8cbc7de00ea4f9alibblockdev-mdraid-2.18-5.el7.i686.rpm714c633d578db20c0295103851f20113db9406c4275329a4b495f36d04bb6c9flibblockdev-fs-devel-2.18-5.el7.x86_64.rpma36ec2cd0e25f82acb2518dff50e98d09570e97ab7b46796ee245ebcd83cfec6libblockdev-vdo-devel-2.18-5.el7.x86_64.rpmed7fb7f87b353df35c399f6baf19860a355cee9740531ce2252e82ced5da5de2libblockdev-utils-2.18-5.el7.x86_64.rpmbd6dfd48540fdf99b17b462bc27499a2100e7c2f79f0feae671ae668ccfd9c1blibblockdev-devel-2.18-5.el7.x86_64.rpmae81f4d2a731b36db9a7d8db4a8a5af22d7779748f6b649c2bbed67c09caed8dlibblockdev-dm-2.18-5.el7.i686.rpm473d883cecf3c6935830f305209d535aa06b9acff057e7c30ce4798ea88d0b4blibblockdev-mpath-devel-2.18-5.el7.x86_64.rpm04f2ee52cf19d9f49ab5e8e4c9aae414cfbcf7666f9f5bbed600eeb21bacd8b9libblockdev-mpath-2.18-5.el7.i686.rpm5c56d570e69330eebdca63494fac22ca49371a1df2f8319f5180605f742bb495libblockdev-btrfs-devel-2.18-5.el7.i686.rpm7d099bbb69be16a9a1eea10f14365be1a3b963edde268ba14e5633f9f215c7b7libblockdev-swap-2.18-5.el7.i686.rpm7014fb0747c9ba598a3519298e9b280adf96acbf7274389a8d02055d35f899b4libblockdev-fs-2.18-5.el7.i686.rpma92ebcc0e66c3e90006635abb9950586d3abdc8b74fa6c7fd7512e8a985ef245libblockdev-dm-2.18-5.el7.x86_64.rpm2c6f9c29f9d7092a9a11418d0bb192d2c8461a8c23d028906e758d56031eb5fflibblockdev-loop-devel-2.18-5.el7.x86_64.rpm2489ebd2d6714192ee9fd43163686a32916036b296485b2d2e317736e1575b0alibblockdev-dm-devel-2.18-5.el7.x86_64.rpm815493e0bfe6174de6047550e8af0520fb5b33f9756ce4acddcc4aab4c67e67alibblockdev-lvm-2.18-5.el7.i686.rpma31002cc66bf8df5046c5ad0de424d5716c59d20f9b52daaed43a3063be1271fpython2-blockdev-2.18-5.el7.x86_64.rpm7213b4a9db922a22314a8f60a50de641c1082da8fd7e9700e74c10da90bd6eeblibblockdev-2.18-5.el7.x86_64.rpmfacdc8ed2a383cb6e804aa6748066ab7538a4e10cb68a7365b49b74a04a09585libblockdev-part-2.18-5.el7.i686.rpm4063b08465737a677db55066af37f71e759fe2ccbbe0c916d7c9b4a84bd59dd3libblockdev-swap-devel-2.18-5.el7.x86_64.rpm09355a77a3dc7cd721ece009ef6279d6389d999e1457625cb811421a5bb8d0e4libblockdev-crypto-devel-2.18-5.el7.i686.rpm68357e4106a541bc11d5c67b1f286ba901da875ce083891fae940b7dd836e57alibblockdev-mdraid-2.18-5.el7.x86_64.rpm8d2968b488c32eb5e092e42e67ca76f480e3337c7dd03c6b58c0c6db4c48f12blibblockdev-utils-2.18-5.el7.i686.rpm7780c98ea2752bdb862d64b3957fc311a6a94d176bed772411b944f8f6d1b343libblockdev-crypto-2.18-5.el7.x86_64.rpm9e8c95558b0b705b1d93b66e8a4690be8c6d26e961bd5bf652678fd651764bd3libblockdev-crypto-2.18-5.el7.i686.rpm936a815a32259d181a4dc96bbb8a8df72cb553962703321bec4d7fc8db1c0984libblockdev-loop-devel-2.18-5.el7.i686.rpmba78bf4b240a6a45e63b6ec65dfff6684cf911d173d28a31d8590b55a82c38eelibblockdev-btrfs-2.18-5.el7.i686.rpm84a8f6f4274b9c32f02703bb8fc732f3c0023486835445bae0a7370ee74e4cc1libblockdev-loop-2.18-5.el7.x86_64.rpm732fbe59336b9cf67e93ec6753d4c6a55adb12d3b738d4a74a693c45122e63e1libblockdev-kbd-2.18-5.el7.i686.rpm2e695f9ebff02c46d73cecb712ea268062c622700b59de9525cd6d41bf506064libblockdev-utils-devel-2.18-5.el7.x86_64.rpm425c336195ddfeff458c778e69c4a0e5e256778ae55560f0b121521ba0f5c545libblockdev-devel-2.18-5.el7.i686.rpmf137548051f95bb8261e109f4879c363fd146a4df4c48eb1a0276527218bb895libblockdev-kbd-devel-2.18-5.el7.i686.rpm0c64ee3a83b5235ddd7b75b7d09a812f93b57ed446ba11196cf9803e283f25balibblockdev-nvdimm-devel-2.18-5.el7.i686.rpm2c69a579cf1091e9e8b31469d50e57cf7bd649ed221a6ee2c7b219922b3cab1flibblockdev-btrfs-devel-2.18-5.el7.x86_64.rpm0e427685393a5161a09ebe90a8d534edbecebffd3716a0dee5d0fd6a9fbda96elibblockdev-mdraid-devel-2.18-5.el7.i686.rpma79cedc914211fde2eab0c2a0cf07a9aa96ec7b924b6d56935bd0903c937da71libblockdev-kbd-2.18-5.el7.x86_64.rpmda292b5979d8bff5d6b20e5de91ac62f47492d7390364966955324b169af7cd7libblockdev-kbd-devel-2.18-5.el7.x86_64.rpm10278e2f346a5b4baae79314ac8dec5d7855e8b5c776925467a2b8189a0092b8libblockdev-loop-2.18-5.el7.i686.rpm3189a8d60c5145ac8fce3b200701a90f4d77b38a0a70b9b1224981439bc43a58libblockdev-plugins-all-2.18-5.el7.x86_64.rpm95fab152ac3334b58b77fb1db204938fdfbfb24226a36f99aa6f81d4ce85c79flibblockdev-btrfs-2.18-5.el7.x86_64.rpm9e9bd9f8c03dc47f75920d70ab76432466abc2bf0667605c3353ecc953bfb3a0libblockdev-nvdimm-2.18-5.el7.x86_64.rpm49ccd8daf3a78b101898e3233e17c440f597c99128bcfe6b90c2869647060c50SLBA-2020:1105-1Vdo And Kmod-Kvdo Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7kmod-kvdo-6.1.3.7-5.el7.x86_64.rpm66a4cb37e3feadea748d85322a787430018def0f3d1268788c455e7ee25943d6vdo-6.1.3.4-4.el7.x86_64.rpm43715263c3d8d5e5311d2377efd26184667d2c7e913dce542f57ef6fdd04c5ccSLBA-2020:1154-1Nfs-Utils Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7nfs-utils-1.3.0-0.66.el7.x86_64.rpm6f149c1a542a438828823c4beea9c8586402a03e1a973a551528a2e8903a9897SLBA-2020:1982-1Tzdata Enhancement UpdateThe tzdata packages have been updated to version 2020a, which addresses recent time zone changes. Notably: In Morocco (the Africa/Casablanca time zone), daylight saving time starts on 2020-05-31 instead of on 2020-05-24. Canada's Yukon region (the America/Whitehorse and America/Dawson time zones) changed to a year-round UTC-07 time on 2020-03-08. The America/Godthab time zone has been renamed to America/Nuuk.Scientific LinuxScientific Linux 7tzdata-java-2020a-1.el7.noarch.rpm669adb9c38cf19e0a6927d67d63921cc074c44a004cc853a98a148b3964ab3fftzdata-2020a-1.el7.noarch.rpme3408dd82c51df8101216dce2cc2a4ac0757a80d95390db6cd2031e372919bbdSLBA-2020:2662-1Selinux-Policy Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * Nagios/nrpe no longer allowed to check mail queueScientific LinuxScientific Linux 7selinux-policy-doc-3.13.1-266.el7_8.1.noarch.rpm66c77252389e0ad284c9e4b3f5f16ada69dea1ccfd086cb81461d82258f3ee7fselinux-policy-3.13.1-266.el7_8.1.noarch.rpm7030b3132be3700e7ea6cee104b81813d46b5e96d17f6e57b4b9df01d1f9d61fselinux-policy-mls-3.13.1-266.el7_8.1.noarch.rpmaf35a987fd3383ec2a469b9b85206ca8d49e44aca0f83ea4288b10742f7e98d5selinux-policy-minimum-3.13.1-266.el7_8.1.noarch.rpm803fc78199485f14ee354c724d026783ed49fda34413e0da2977803c251faa11selinux-policy-targeted-3.13.1-266.el7_8.1.noarch.rpm7e06967b2d42f96c52f257cdf6476d99808853e0d4479f2d452d87f2e86948a2selinux-policy-devel-3.13.1-266.el7_8.1.noarch.rpm869c1d1377f718666448a2e475ccded680758fe87735cb59b08ae5f58e2af63bselinux-policy-sandbox-3.13.1-266.el7_8.1.noarch.rpm8ad9144c37917688807f089fc60e2b3e3bd5c4570414ad01c94ba03531931f80SLBA-2020:3265-1Shim Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * Fix crash on some systems during boot up.Scientific LinuxScientific Linux 7shim-unsigned-ia32-15-8.el7.x86_64.rpm925f47111dd10b1902e268618733805a7e133e9028655be775ed9605e6333731shim-unsigned-x64-15-8.el7.x86_64.rpmcf7d4b671310a5f320876f7916fd3434463ca9292be1c834489d3529e5a3d0d1SLBA-2020:3904-1Sssd Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libsss_simpleifp-devel-1.16.5-10.el7.i686.rpmb6ad09cd762f7c0f9d31aeb021c80f3deb28150434a7ba2ebf2075194901e8c7python-libipa_hbac-1.16.5-10.el7.x86_64.rpmbfb5c319c528fb4a438ca756b55bfcf5b3437e72d040b4bc71c9e4ba776f110dsssd-krb5-common-1.16.5-10.el7.x86_64.rpm94075fad1ed400d85fede47d3430fd92c30a52cf9fdda56dbf6be393bfe4cf56libsss_certmap-devel-1.16.5-10.el7.i686.rpmef30bd623ce6771df6aa383cda4124ace90ce726e8e3481fc5e61e643c105c4elibsss_certmap-devel-1.16.5-10.el7.x86_64.rpm71c4e59346c4971c2691239d58f3ce8518f5db9ebdcd951ee7c37e440f27a9bdsssd-client-1.16.5-10.el7.i686.rpm4f8617434e11247650ffb0ce727e3f5038b587c12d2635330f054d7a7a1f77f5sssd-libwbclient-devel-1.16.5-10.el7.i686.rpmff4f2f781dd34237de3e565049fdbf751b03fc77f41a729b82d9907fd6afb6f9libsss_nss_idmap-devel-1.16.5-10.el7.x86_64.rpmcee913763ba7c946da161254194d4813cafa7e22521e9c777a068d87089d95d9sssd-common-1.16.5-10.el7.x86_64.rpmb00a2e0101ae1ce0dfe47eb0789a75f37ffa6fec6bbb482e13e17cf9656b6490libsss_simpleifp-devel-1.16.5-10.el7.x86_64.rpmac3491913ea9478a5743b02fc9f2b21d61a2540db4df0426c2a8b8544ec59f24python-sss-1.16.5-10.el7.x86_64.rpmcea1a8153fe4dc35563a5191b7182b8181113efa89653742b23d6e65c3473eaepython-sss-murmur-1.16.5-10.el7.x86_64.rpm1d817c0758ce55eba4693073589512c7abb8002dc1a7fadcbdd0a46ac7bfcec8sssd-proxy-1.16.5-10.el7.x86_64.rpm6c0eedb41607c1e7c089250258d295716ed0dba4394ddf5e99f87b4042a1a1aalibsss_nss_idmap-1.16.5-10.el7.x86_64.rpm7de43beef8408f3adea65aa52d68999eb41e8be477f5f4a61bbaf77958bd45a0libipa_hbac-devel-1.16.5-10.el7.i686.rpm230c3396a490f480e3166912f9baefb94171a242703db84c77e9829021cfe7fdlibipa_hbac-1.16.5-10.el7.x86_64.rpm8f07b60bb80ec160a01ac2fa139605099154ef161aa616e8f2b82ffb8ecbe0c5sssd-polkit-rules-1.16.5-10.el7.x86_64.rpm1380cbfd195f71ff2850774e9443be5067ee2a7287741ac43d78c2b491a98bd6libsss_nss_idmap-1.16.5-10.el7.i686.rpm6272c5ce9d04babaa08ba323936e82e2fcae39df41b237e5923206f931e2c369libsss_autofs-1.16.5-10.el7.x86_64.rpm0d89e298936f270ab1711cae70d43e5455cb6bc7e12bc9b7a3525b2ebf0e1082sssd-common-pac-1.16.5-10.el7.x86_64.rpmd6a3586ae72b0ffe472615b009618cd8b3ecc704a736baf920eb8a646862a7b5sssd-krb5-1.16.5-10.el7.x86_64.rpm5aadcd7a4b722450ab2e7f293f8e951c1209eb90e2fcd83c6f949ca19d21c466sssd-kcm-1.16.5-10.el7.x86_64.rpm8d5f30e1f1ed1440239cd912fb101f9112909a1385da61a71cb4073f92a7f539sssd-ipa-1.16.5-10.el7.x86_64.rpm748cde649eb550a724b4261401b29fad1e2c21c4123497d1f80bd2dd0eaec406libsss_certmap-1.16.5-10.el7.i686.rpm2ba1adc110b1fe52315431ce7e168f62fbc777708083caf59c24453b7759fa5dlibsss_nss_idmap-devel-1.16.5-10.el7.i686.rpmc26f6ee86a4dcea5d06a3c7a62075a3c96a8178346176c2b77bde6bafae034edsssd-client-1.16.5-10.el7.x86_64.rpm7e12ee2d7c78991cc66c43562cb663158192413f3a065a6ade10aecd736477e5sssd-1.16.5-10.el7.x86_64.rpm7c177b59ca9993ed13a5ebfd0284261feb600b83c905469bcfd4806929ece70dlibsss_idmap-1.16.5-10.el7.i686.rpm8df4148e9b940c311035310320c561513b76698bf6f59d25f4f687310c1a0c46sssd-libwbclient-devel-1.16.5-10.el7.x86_64.rpm2774474c57023faba365973c87890d09b433f4703185681d4ac33199ee9d7d52libsss_idmap-1.16.5-10.el7.x86_64.rpm46927507311208d6f890916295b1fe2f188a33a9b31b69aa09a1b00efcfd7c27libsss_simpleifp-1.16.5-10.el7.i686.rpm40430368c1f2f2dd32efb263f2a0d0063952f0d6faa436faf7ba4c0475c6478dlibsss_sudo-1.16.5-10.el7.x86_64.rpmcabb426062d8ee3fc4ec3fdd43706417ef64b3604605d9efe1ae6559c9768194sssd-dbus-1.16.5-10.el7.x86_64.rpmed5989c76b9a6b84461a2b827a4cb311bb0aba4de34997486afcdbe16455f55dlibipa_hbac-1.16.5-10.el7.i686.rpm1ec8549c97feae0e23c0f8ba6908769abef1599dae5a1d1cf3e88f0ba852f3e7libsss_certmap-1.16.5-10.el7.x86_64.rpm5977fb5991f46125ea4b8a1c218b1570543bc389518110ed4cd14336443b023alibsss_idmap-devel-1.16.5-10.el7.i686.rpm06c942ed290379ec4ef526b04628bde59fcc799dd82cdbcd1203be7b99e743f6sssd-ad-1.16.5-10.el7.x86_64.rpm27c1e64d5a2fa00752b78a1f330d336c23d6a1f2c34010c09aaf8650f7bc81eepython-libsss_nss_idmap-1.16.5-10.el7.x86_64.rpmbfc4726d4b72440e527bb8c92d79de9b00f4069ca0edc3ef8b82f1e0fcd33e53sssd-ldap-1.16.5-10.el7.x86_64.rpmc70e67210e2a11b6c07f7f6ce409977ba623a8bcc924adf92d36d475ddb7ddf6sssd-tools-1.16.5-10.el7.x86_64.rpm48e11e1de67d905e4fbd5840b018b4dacb1d1c3ae9e515d52541145b69d1bd86libsss_idmap-devel-1.16.5-10.el7.x86_64.rpm7af4431d59f5b89ef70447dadefe647df67aff10b6b97bc831f8220b237ebe6esssd-winbind-idmap-1.16.5-10.el7.x86_64.rpmd3bbccaf0c4a33abd594aeb9da9042fde0399ad9b1844edc6987529074d02861libsss_simpleifp-1.16.5-10.el7.x86_64.rpm2000b33f01b9a0f2c89cdc72f984eb68f173b0f509c226b76e18b09b02c26d9bsssd-libwbclient-1.16.5-10.el7.x86_64.rpmbc96272fa09064f0185ca371bcf124578864bdbbae8107826bdb4c3e5f21aebblibipa_hbac-devel-1.16.5-10.el7.x86_64.rpmcb62befff8b7761a9468259a6e920b172ebc74026bc14870096e26321a0572a5python-sssdconfig-1.16.5-10.el7.noarch.rpm51ba1016cdb1060babab5efb9631e32153eb613dd33c812ba50ac5a1ca85739bSLBA-2020:3909-1Scap-Security-Guide Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7scap-security-guide-0.1.49-13.sl7.noarch.rpmed1530365ae6c625a79c06864835f0af3db3bd80f989cb62d0d315646ecba957scap-security-guide-doc-0.1.49-13.sl7.noarch.rpm355d05da740b6bf25b55801b1b52b87ac9df389c19b6e5aa7e8bc5586bcef65aSLBA-2020:3914-1Openscap Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7openscap-devel-1.2.17-11.el7.i686.rpm5f16a3af77db983ac3a0f5c17a5664f0252f129caf1a54f2e189a549331dc770openscap-python-1.2.17-11.el7.x86_64.rpm5adbaa50cbc340d9d8ad54704c8b5fbc58d49a4eeca65983f161ab014601b4bfopenscap-extra-probes-1.2.17-11.el7.x86_64.rpm90ce2ded320b9ba224b241f5a84c8ee3393ac380899755e165b92000ed0b9380openscap-engine-sce-devel-1.2.17-11.el7.x86_64.rpmdd39e29e3c6413d14e4c945164f0db6c16272fa7c33aec47a01a97e2f7cb5925openscap-1.2.17-11.el7.i686.rpmc1bef430a1cbb4947078fb8367ebe6b97d55a6f2bc080f0894e3c958cf23e892openscap-engine-sce-1.2.17-11.el7.i686.rpm4db722c7ef92a16b04ed9b46367dbad108bc23db12b13fae36666366d5fc2408openscap-scanner-1.2.17-11.el7.x86_64.rpm84a0793e05b3055291d75259a7a43200e42b30c237ddb33d858ed1df04519418openscap-engine-sce-1.2.17-11.el7.x86_64.rpm7cca309204759e1dcdd6c129a541b28d16067f00120ee0c4c81c54a5d050f2f0openscap-utils-1.2.17-11.el7.x86_64.rpma76dd94183111f060ee049c919c6bbf4ac99ef7a8fac2431c0921af9f3c76780openscap-devel-1.2.17-11.el7.x86_64.rpm8a2160ba8b1f0cc260177a418cc9bbe9cc3da2a712f07ec78de15ccf12f5b262openscap-containers-1.2.17-11.el7.noarch.rpm81f96ef394b91625ce5216521944902389300695be8c3da85e0b37f6750ad391openscap-engine-sce-devel-1.2.17-11.el7.i686.rpm954c57cefbd274046e95f0f9e35f3dfe674f203dc4e3b39bda46d72343963f72openscap-1.2.17-11.el7.x86_64.rpm0c7ebd8f421b7471c3a5442eb6b9d48abc9c10941349130d6720dfc1ea269f27SLBA-2020:3925-1Selinux-Policy Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-268.el7.noarch.rpm6f9e1e4c8beeca7c1d9e661ab2ae35f6ecb6a53b0cdc3ee4ba421a44552e2bf4selinux-policy-3.13.1-268.el7.noarch.rpmac85f9475feb4c91f58d886a500196603e8436d4846ae4f92c139b48a47569e1selinux-policy-sandbox-3.13.1-268.el7.noarch.rpm959a2efd8d68e27b2dfe4019beac808c07176b399e4d1fa395436719e7c2f030selinux-policy-mls-3.13.1-268.el7.noarch.rpme71dde05a3abfb984e13302667dabc14a114da914f7b8adc31070bbe11ef84d9selinux-policy-minimum-3.13.1-268.el7.noarch.rpmbd08f54777b5f6991f4956c0321c542c80bcbaf0aa914d5035c2a5980a23be4aselinux-policy-doc-3.13.1-268.el7.noarch.rpm1d0a6325ec4552c2a148378b529c6e1b2e542f4f5ec459768c1a8a151c6bf4easelinux-policy-targeted-3.13.1-268.el7.noarch.rpm53087bdf24d08cd7310a9037f7d3767c473bde3c75318084f6a9036b3e2fccfdSLBA-2020:3938-1Jss Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7jss-4.4.9-3.el7.x86_64.rpm100a543a99455b3593ff688cb43e28b179ae8dcd189096979852c03872bead93jss-javadoc-4.4.9-3.el7.x86_64.rpm4e137c200d7f44c21a2e4a5642c37bac068805f42e3dc56c48a898cb7f014c19SLBA-2020:3961-1Gssproxy Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7gssproxy-0.7.0-29.el7.x86_64.rpm3675d375a146d150b5fb0aaed6a9b4ad4e0574c737e77e4cebb8449dfa586ee4SLBA-2020:3990-1Mesa Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7mesa-libGLES-18.3.4-10.el7.i686.rpm41b45b56bfa5930bf6a3c679ca594ec3a966da8f5216b794f1102553a4dc4864mesa-khr-devel-18.3.4-10.el7.i686.rpmc85f4b5a8ad57bde4a5a089911989e7ab3dd653f96868b1653d63b1af4812cebmesa-libGLES-18.3.4-10.el7.x86_64.rpm79794d4968a5f72fcbe19138a774dc18cfad04e5cfb875bc5acbcf5abbb64c74mesa-libgbm-devel-18.3.4-10.el7.x86_64.rpmbc0105a5f0f598340aeb5d02fe846572a7914c819c13110dcda30d743b2b58c0mesa-vdpau-drivers-18.3.4-10.el7.i686.rpm0c043f6b4c530b251f59d3ae79475ea475bd2d7c6bcf8a36a6b1f90f08187300mesa-libGLES-devel-18.3.4-10.el7.x86_64.rpmf96a30b81d462af6bb0a2c9787cbd998c357aa53aa91e26c04d1ed2a99377879mesa-libxatracker-18.3.4-10.el7.i686.rpm1daafe96d0b1b72716947243bb4391eb5f1e1b3eff336552330c6edcbadce7bdmesa-libglapi-18.3.4-10.el7.x86_64.rpm26c2b1f2976e5fd7617c0fd53e0c0fe6f80569f1920ae0d45d834fc496e78f51mesa-vulkan-drivers-18.3.4-10.el7.i686.rpm9b7e191ab94d033b8e2757a97e7973da180ff3434edf6f5c7e43e5be3cc93238mesa-libGL-devel-18.3.4-10.el7.x86_64.rpmc3f4e9e29548909283ee1d61cb5efedf81b5d2da148b20c555aff5e379992f30mesa-khr-devel-18.3.4-10.el7.x86_64.rpm0dfae6c8b5f70289b624b8aea5607a6ecc711ffa17a0509562210d298afdb9f3mesa-libOSMesa-18.3.4-10.el7.x86_64.rpm388697bc4c4f6f35465ab9722efd32098b561c77066f3d51b6e955def6c6f781mesa-dri-drivers-18.3.4-10.el7.x86_64.rpm066a833a964b516df838faaba5b827b06895c645c1bc8503d6c670204a13284fmesa-libEGL-devel-18.3.4-10.el7.x86_64.rpm64ad09b0b632ab255b990f4d680fe04f7c3eb30c2175e9212f507f378b418f48mesa-libOSMesa-devel-18.3.4-10.el7.i686.rpm262347f806287bba6b9d6fda186e2e9934352059f09eec5106bcf43b413fa33dmesa-dri-drivers-18.3.4-10.el7.i686.rpm2d1a64a7c9fead5feb9d16246d6e7d0c49f70008da11c80a226f504bedb28e24mesa-libGLES-devel-18.3.4-10.el7.i686.rpm10b4387ca836295b14b3f06fd0adf567ab3420b5ee68f0985b2dea52dfc0779dmesa-libgbm-18.3.4-10.el7.i686.rpm3004a5009e8aa50d641126acb450397eff4235ee9a92e62376583c41c661389bmesa-libxatracker-18.3.4-10.el7.x86_64.rpm00112f5405635a25c888d837e579cc619f5d38cbffbe45429a7aa36b84508807mesa-libEGL-18.3.4-10.el7.x86_64.rpmfe5fe2947b1fbeb80d1d2e072108df41f981ea0c267482362fedb4ff77c1c95bmesa-libxatracker-devel-18.3.4-10.el7.i686.rpmfd8477fbe2e619c309abe7011b4f1544c40a446a3267bf5d9f72713246ef00femesa-vdpau-drivers-18.3.4-10.el7.x86_64.rpm764ce6fbd92b18856ee9322db9426a5666ab448dacf4a741e60e823e5e7b44cfmesa-libGL-18.3.4-10.el7.x86_64.rpmab274b94ac80af76c948c29b20541897e6789ebf7484e7f3f8d66342fdf9a011mesa-filesystem-18.3.4-10.el7.x86_64.rpmd53c74ecb12d5916f1890868e86f729f1e19582d09f0649ec2e7580d66ed6362mesa-libgbm-18.3.4-10.el7.x86_64.rpmd7b656c429f154db0885d0edd57e0a7720c26e37fb12ada34d692515e8430eb5mesa-libGL-18.3.4-10.el7.i686.rpm5ac49f3393ec87c6b089b2cba390df5c778ce547c073454316c0fe87c224b69bmesa-libglapi-18.3.4-10.el7.i686.rpm9f8f448ea0cc2d2f5629f7d6400ea34d5bf3c985d2f7446920a72074a5856b32mesa-libGL-devel-18.3.4-10.el7.i686.rpm5aa9001775ce4a2c5720e80f57d33be287e9286fe3fc771d5d09f0795854247bmesa-filesystem-18.3.4-10.el7.i686.rpmc072a0a8caa2ff2ed30ba75d45d30cc55ffb1c4b51074c698df36f7bd073e470mesa-libEGL-devel-18.3.4-10.el7.i686.rpm1c19628db4b3e3f47b6bef6996f1a4bcc24d58cfced9591a76cde5c2afe9ee70mesa-libxatracker-devel-18.3.4-10.el7.x86_64.rpm3262c507521b2b0b0c7f337a964cccf89a9b7ee7261de0cd5f86bfcce66d904bmesa-libOSMesa-devel-18.3.4-10.el7.x86_64.rpm240ba79f360e197a848a9cfa1a80812f25e929215953b5a2e8cafe123877a074mesa-libOSMesa-18.3.4-10.el7.i686.rpm4ec4c5964661a7f4a2bee627560eab424b4372a4e9ab3013ad4fea08332f0bd0mesa-vulkan-drivers-18.3.4-10.el7.x86_64.rpmb9079ff60ce2179710b8fda6c157380b65c3e5f88bc61eca514c17cc24ae0bf9mesa-libEGL-18.3.4-10.el7.i686.rpmd4be5fd3df3465dba0227523c6b527da5e1427df1cd532e9f57a79721fbee997mesa-libgbm-devel-18.3.4-10.el7.i686.rpm890d72575971988fc9647778e9d577c6c96c99e5ee03e945dd82953813b51982SLBA-2020:4045-1Shim Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7shim-unsigned-ia32-15-9.el7.x86_64.rpmeb5461acd44f5c417de7bac321eb8b4c6740f0aa141957e3a716e9cfda8b4843fwupdate-12-6.sl7.x86_64.rpm4fa835008eaba7ecd258a12a50c7edc2c262dc91b9f57ef7ab0b68a3f230e5cfshim-ia32-15-11.sl7.x86_64.rpmc7666614ad7283b1c36eb793c49b3b93b626d77401fdd99494a2ec20f8c722f0fwupdate-devel-12-6.sl7.x86_64.rpm9c2ce6e2180c22510fde878ad56abfcacdcf6e7fc1e4fcb8433d06826a5aa096mokutil-15-11.sl7.x86_64.rpmd30740543fd917ca84498aaae16dc3ae1e02dc0e435557bd2b1a79ea70683ac2fwupdate-efi-12-6.sl7.x86_64.rpm18eafdb03a82cbea9831d61b934bca5e521c92f02831b9d85bd409d159b3eb02shim-unsigned-x64-15-9.el7.x86_64.rpmac97d4bbc89cbe4a2867a15b4c5a80b238032fc96f20a097f8ab5eea1826a5f8fwupdate-libs-12-6.sl7.x86_64.rpmbee8d631ee0009cd3fec3b278011294aff1ea944c5ba0a4c404bd008b46f68d0shim-x64-15-11.sl7.x86_64.rpm717fb66d267e396cd41eab8585900e45a2b457a95afd82bd20a461b81c53d6c8SLBA-2020:4046-1Grub2 Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7grub2-efi-x64-cdboot-2.02-0.87.sl7.x86_64.rpm26f1493108bcf32bcb33ce424772e962c86d311a24695fd87dd4291bf432bb51grub2-efi-ia32-cdboot-2.02-0.87.sl7.x86_64.rpm293f8036a24e2e14d29bc0daafbff547bb3c96b38173fed1465cfc346a512683grub2-tools-minimal-2.02-0.87.sl7.x86_64.rpm9654a6edd1745435bf775e6bef3c9a49e476381564c420919d10a65da8e3d770grub2-pc-2.02-0.87.sl7.x86_64.rpm6817637dc99e043a6e591f4b7e9fd1449085d3cebfaba565bb7a21b199da87f1grub2-tools-2.02-0.87.sl7.x86_64.rpm5ca499bac3cc7f39168d4d6dc3440a2942278d213aca164cdec039727fbf97b6grub2-pc-modules-2.02-0.87.sl7.noarch.rpmb941d64d188dfa6d10000be0ee58870eac7bf1a2ac311859c090f7c393266c6agrub2-efi-x64-modules-2.02-0.87.sl7.noarch.rpmf067e1ce69f25cdbe8673cb80d9f3c16eae49fac7029d20388baa149dc0e3fbbgrub2-2.02-0.87.sl7.x86_64.rpm467add357c1a4bccb041d872365fa84fcdf72cdf83bc172377ff167c6bb91de1grub2-efi-x64-2.02-0.87.sl7.x86_64.rpm34f05e3a10f2fd1572df65eb075d02d5edccec1c6c761933c49ffa55b0255e7fgrub2-common-2.02-0.87.sl7.noarch.rpmd4a7df3ae98c2a5817e531af29c5525f47ac123d13df835760448d77d22040begrub2-efi-ia32-modules-2.02-0.87.sl7.noarch.rpm0c3359bb8b97ef527f9ef247bee46e3f991f6458ab0622ed9442933b5a9dd036grub2-tools-extra-2.02-0.87.sl7.x86_64.rpm0848767975cfdf7f5e942e607355ac050f3e272baaf9d499ad8982bc4438541bgrub2-efi-ia32-2.02-0.87.sl7.x86_64.rpme802633c2d6655fcdcfdc3d6c75cf853ba51733c06d6425115a7016c374ea80fSLBA-2020:4180-1Kernel Bug Fix UpdateThis update fixes the following bugs: * kernel: scsi: ses: don't ask for diagnostic pages repeatedly during probe * OVS drops secondary SCTP connection * Unable to insert 'i10nm_edac.ko' EDAC kernel module on JVL after CPU upgraded * File corruption when a 1 MB (or bigger) file is pulled from a container running memory mapped AF_PACKET TX ring * [mlx5] kernel crash at mlx5e_encap_take() The system must be rebooted for this update to take effect.Scientific LinuxtrueScientific Linux 7kernel-abi-whitelists-3.10.0-1160.2.1.el7.noarch.rpmee38276592d03247c195503a3a84bb788acf4f2375852d5e37e53aa10e5e14eckernel-headers-3.10.0-1160.2.1.el7.x86_64.rpm305ee7b1e141efb86dad88ce8f64d891d4499515a0b86cc2492a7afe7354f2cckernel-tools-3.10.0-1160.2.1.el7.x86_64.rpm47e102d549470ebe722222c158bf8bbe23ce7edaa9f6dbcf3ac2522f29f4f841kernel-tools-libs-devel-3.10.0-1160.2.1.el7.x86_64.rpm05238fa7733a2854c8da926c1cfc153aefeb49566288f67f02062c65d3f5d183kernel-debug-3.10.0-1160.2.1.el7.x86_64.rpm5134deda0899e9a38e7e47fd0e23fe5b02271f2c23fc669bc6716c59f0a46170kernel-3.10.0-1160.2.1.el7.x86_64.rpmf64734816b193587747ba3f6f37cef54cb714507a9a60de8dcd9de5e30f6174bkernel-debug-devel-3.10.0-1160.2.1.el7.x86_64.rpm12e0cf4a6ac5e1725da5c23f45471c5137290387f7dc775f1a3ab186307231cbbpftool-3.10.0-1160.2.1.el7.x86_64.rpmcbd170a26667e7100abca4aabfa06d0d24d6bd8ab65264cfb8e8e767de442a5ckernel-devel-3.10.0-1160.2.1.el7.x86_64.rpm72a1ee6bb71ce33bc004874f657bbdb022ac6f31d44a5f9b87164617d4693673python-perf-3.10.0-1160.2.1.el7.x86_64.rpmddca29711b7c5250cc0031df2c682dc3642d51de1ba6b31c4d3fee300d97abdekernel-tools-libs-3.10.0-1160.2.1.el7.x86_64.rpm542cbe64be29e0eee7ba6662f92806774a6f86524e5857bb9ebe2a35d9cb552dkernel-doc-3.10.0-1160.2.1.el7.noarch.rpm367bf3076424250e2b5a936305fd9d34309323521cbc12c90ccd88ec4f96a989perf-3.10.0-1160.2.1.el7.x86_64.rpme1e87432d6037c047a0c13b2fa71288d378d6cf91d2cd94f3d7298c4b980c1a1SLBA-2020:4282-1Tzdata Enhancement UpdateThe tzdata packages have been updated to version 2020b, which addresses recent time zone changes. Notably: * Yukon timezones represented by America/Whitehorse and America/Dawson will change time zone rules from -08/-07 to permanent -07 on November 01, 2020, not on August 03, 2020, contrary to what was in the version 2020a. * The most recent winter(+08)/summer(+11) transition for Casey Station, Antarctica was on April 04, 2020 at 00:01. * Obsolete pacificnew, systemv, and yearistype.sh files have been removed from the distribution.Scientific LinuxScientific Linux 7tzdata-2020b-3.el7.noarch.rpmbae5d3ba085cab34024698659c79a9f30feb14b936052f6a4e1ad4af87ac9ce0tzdata-java-2020b-3.el7.noarch.rpme2e2a484a6f1ee84161056075eb83c7c1fb9608b45fb487cfa3ccf4623f5629cSLBA-2020:4329-1Tzdata Enhancement UpdateThe tzdata packages have been updated to version 2020d, which addresses recent time zone changes. Notably: * Fiji starts the daylight saving time (DST) later than usual on December 20, 2020, rather than the predicted November O8, 2020. * Palestine will end summer time on October 24, 2020 rather than the predicted October 31, 2020.Scientific LinuxScientific Linux 7tzdata-java-2020d-2.el7.noarch.rpme86d66eb32256341996577a3468858f80ccc4b9e24f0049daf6bb64f596d23e6tzdata-2020d-2.el7.noarch.rpm32dcd49fca4845c52d8522bcd6ee06a92751dbd5bf2f8449c49d779f56716432SLBA-2020:5017-1Openscap Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * Huge memory leak in probe_rpmverifyfile * OpenSCAP doesn't take advantage of gzip compression when downloading remote content.Scientific LinuxScientific Linux 7openscap-engine-sce-1.2.17-13.el7_9.x86_64.rpm26a432b346c85143df5fdde282d9c47924e375ed738a6d801c45e1889c8bfbb0openscap-engine-sce-devel-1.2.17-13.el7_9.i686.rpm55deefdf2b8baccf6dcfe7257b32da1358ffad07cf45c4774b6d2da7f42958f4openscap-scanner-1.2.17-13.el7_9.x86_64.rpm88b70d5aff9e78052b1ef48e3ef10e440554a5c0306783325f1f213c1b5f2de1openscap-containers-1.2.17-13.el7_9.noarch.rpmc1ace00cb7cc2d0d459c60346f512dd63fc382408c65f15647f43f0fd262d2cdopenscap-devel-1.2.17-13.el7_9.x86_64.rpm64a29549d82f9078cb03fd0e266169dcfbab9789a34103b1a314a26944eec89aopenscap-utils-1.2.17-13.el7_9.x86_64.rpmb589b72959da4539156217de78bc14092ecd190bf5d5b9959e6850117fe6124dopenscap-engine-sce-devel-1.2.17-13.el7_9.x86_64.rpm3adb46260adf0b3729fb688454a01a951bef015104991962f74a481da3628919openscap-extra-probes-1.2.17-13.el7_9.x86_64.rpm3d8d218227e06c86640e9048c0727f9448126b03d50998f86968af7a7fba4e02openscap-devel-1.2.17-13.el7_9.i686.rpm6611815a691ea4ef9286b3dbe25ca75872e61dd1b821777aa27898bc7e926549openscap-python-1.2.17-13.el7_9.x86_64.rpm9eda95b4bf068a4dd42578893cec8d34023919dcc2d6d1e5f43e9ae2e04c3f3bopenscap-1.2.17-13.el7_9.x86_64.rpm0f431fc0de2d54d27ef73e8763305530fdafe7e75e8d14971ef6d6dd456740ecopenscap-engine-sce-1.2.17-13.el7_9.i686.rpm02a2970fe161c63ce93bba1e1800f38b3e7bf320f728029a7a08e948297071d7openscap-1.2.17-13.el7_9.i686.rpme172cb1bfb4d2cb42fdf435dbc33fce6ffb9db9419388628508591f6d41530f3SLBA-2020:5027-1Selinux-Policy Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * [SL-7.9]- Selinux policy need to be updated for RHGS to fix permission issues * Selinux prevents nss from creating directory inside the certs directory.Scientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-268.el7_9.2.noarch.rpmbf544dffd42e2c80a47b65fbfb4490df371130b42ec4467e85b20839b3ffb0d0selinux-policy-doc-3.13.1-268.el7_9.2.noarch.rpmff9576077bc32507c027488b37dc29449d1687a5859e8c9dd6183804f2f65cd8selinux-policy-minimum-3.13.1-268.el7_9.2.noarch.rpm4c4425d26098ce827f3d90fb9055b74ad86caaf510c5786578f15f3e97a9ad42selinux-policy-sandbox-3.13.1-268.el7_9.2.noarch.rpmd30d91abee991346cbe1e380d0ec23b629bfe2e39cdaf821f892963542506751selinux-policy-mls-3.13.1-268.el7_9.2.noarch.rpma7e1b16a3019fe3300dafdd834094cc64b70668c4afb1e2a448a5afe3774a0b2selinux-policy-targeted-3.13.1-268.el7_9.2.noarch.rpmb55b489fad47589263e056c0967fb2386b7504d965aff36c7beb7a936e3cb5e7selinux-policy-3.13.1-268.el7_9.2.noarch.rpm57914f4194867a8f2455b8d04689c9b5b7f83402a400a1ec5183b01ff64d8533SLBA-2020:5032-1Python-Blivet Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * Not closing the fd if blivet fails to read the deviceScientific LinuxScientific Linux 7python-blivet-0.61.15.76-1.el7_9.noarch.rpm4ae70a3b7c5aa57c7c8b891f6d4cd92afd4f8e708e75955cbc5e3414fabcc366SLBA-2020:5451-1Scap-Security-Guide Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * The "DISA STIG for Scientific Linux 7" profile in the SCAP Security Guide has been updated to the latest version V3R1. This update adds more coverage and fixes reference problems. The profile is now also more stable and better aligns with the SL7 STIG benchmark provided by the Defense Information Systems Agency (DISA). You should use only the current version of this profile because the older versions of this profile are no longer valid. The OVAL checks for several rules have changed, and scans using the V3R1 version will fail for systems that were hardened using older versions of SCAP Security Guide. You can fix the rules automatically by running the remediation with the new version of SCAP Security Guide. WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first. The following rules have been changed: CCE-80224-9:: The default value of this SSHD configuration has changed from "delayed" to "yes". You must now provide a value according to recommendations. Check the rule description for information about fixing this problem or run the remediation to fix it automatically. CCE-80393-2:: xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon CCE-80394-0:: xccdf_org.ssgproject.content_rule_audit_rules_execution_restorecon CCE-80391-6:: xccdf_org.ssgproject.content_rule_audit_rules_execution_semanage CCE-80660-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setfiles CCE-80392-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setsebool CCE-82362-5:: xccdf_org.ssgproject.content_rule_audit_rules_execution_seunshare CCE-80398-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage CCE-80404-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh CCE-80410-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_crontab CCE-80397-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd CCE-80403-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp CCE-80411-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_pam_timestamp_check CCE-27437-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands CCE-80395-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd CCE-80406-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postdrop CCE-80407-0:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_postqueue CCE-80408-8:: xccdf_org.ssgproject.content_rule_audit_rule s_privileged_commands_ssh_keysign CCE-80402-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit CCE-80401-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo CCE-80400-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su CCE-80405-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_umount CCE-80396-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_unix_chkpwd CCE-80399-9:: xccdf_org.ssgproject.content_rule_audit_ru les_privileged_commands_userhelperScientific LinuxScientific Linux 7scap-security-guide-doc-0.1.52-2.sl7_9.noarch.rpma76226596f9cf1af0cf1fb7a48a9bd48b064fb4ea543aa8bf5672aad2b08c5bcscap-security-guide-0.1.52-2.sl7_9.noarch.rpmc3f704db0ab1790e4b3b80c95b321134d3fd4bef2ad363890a0892ff8f12a9d2SLBA-2021:0013-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated to version 2020f, which addresses recent time zone changes. Notably: * Europe/Volgograd will change from UTC+04 to UTC+03 on December 27, 2020.Scientific LinuxScientific Linux 7tzdata-2020f-1.el7.noarch.rpmc37375a99001e0ec3742ba21f8b5a51f2034945b5b7e54a211166c3e76ad451dtzdata-java-2020f-1.el7.noarch.rpm8539392e7e8de6c9aecd029b448821e59301400a279fd44b232bc6f76473cfccSLBA-2021:0276-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated to version 2021a, which addresses recent time zone changes. Notably: * South Sudan will change from UTC+03 to UTC+02 on February 1, 2021.Scientific LinuxScientific Linux 7tzdata-java-2021a-1.el7.noarch.rpm665540ad82981076b64025f9f7818c8e13241edc37cc0917f95d810de3efdccdtzdata-2021a-1.el7.noarch.rpme4e436444c61697321d0ce5167151f9c6997ad25cbb4f76b349d4096c59d127aSLBA-2021:1383Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * [RFE] Add ANSSI-BP-028 to SSG (Minimal, Intermediary and Enhanced Levels) (BZ#1497415) * Remove deprecated follow argument from Ansible remediations (BZ#1890111) * Rules of type Service Disabled do not have clear description on which actions the user should take (BZ#1891435) * Latest RHEL7 STIG (V3R2) is not present in latest version of scap-security-guide. (BZ#1921643) Scientific Linux 7scap-security-guide-doc-0.1.54-3.sl7_9.noarch.rpm5a48575cc47a52dd21176c83682cf6d2b6e69970bd2f7569345a06e0ec89b86bscap-security-guide-0.1.54-3.sl7_9.noarch.rpm490f4f763d6c2bf415fa620bde6d30e05157b264820ed1e75c62f520297a507aSLBA-2021:2803Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * Update ANSSI-BP-028 High level profile (BZ#1955180) * Update rhel7 DISA STIG profile to v3r3 (BZ#1958789) * dconf_gnome_login_retries remediation results in error and breaks dconf configuration file (BZ#1967566) * Add STIG variant for GUI installations (BZ#1970131) Scientific Linux 7scap-security-guide-0.1.54-7.sl7_9.noarch.rpm8584a00307740e79f24152cf8b271df7208391b14b97be9e8822560e49e0deb5scap-security-guide-rule-playbooks-0.1.54-7.sl7_9.noarch.rpmed957b3e66f6be580be168f954918d6951e1a392d9adc7585299604e799b4825scap-security-guide-doc-0.1.54-7.sl7_9.noarch.rpm1fb811204dae05a886079d275760ae5ca800b6dd46b9bb4d384e1b2a99e676fbSLBA-2021:3326Gvfs Bug Fix And Enhancement UpdateGVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. Bug Fix(es) and Enhancement(s): * memory leak in gvfs-udisks2-volume-monitor (BZ#1944813) Scientific Linux 7gvfs-archive-1.36.2-5.el7_9.x86_64.rpm1aca23e2697140a6da45b00779021a5b231a22b372bcc3edab121535d926fb40gvfs-fuse-1.36.2-5.el7_9.x86_64.rpm0434109b9834c6c9f679d7458edd323cc168a42c0c326e32cdeecb44cef57ee0gvfs-gphoto2-1.36.2-5.el7_9.x86_64.rpm11560e5bbd54521ea0e6bca0318491d2b8673269f5d4fdc9c084e67c90273e47gvfs-afc-1.36.2-5.el7_9.x86_64.rpmafc98b4b4e1ac910f4abefffaf5cf30cb0b545709e78fa080fa79ba7f258ed33gvfs-tests-1.36.2-5.el7_9.x86_64.rpmc4f5fa9a22e86bec97bb0afd34278b0631e8c84d6dbcdb266469105fd0cca994gvfs-client-1.36.2-5.el7_9.i686.rpmae3ea04777b15e748e136d4348277956668010867cb6a6fdb656ff397497801egvfs-devel-1.36.2-5.el7_9.x86_64.rpm50886aff29128c7b0486408a3b5dd822e447fb844d03755370c2c5a151dcef9egvfs-goa-1.36.2-5.el7_9.x86_64.rpm8a74d5afc3a4679e176ccc0dd4ac8142f23d75065afef64ed61368b3fdb7f559gvfs-client-1.36.2-5.el7_9.x86_64.rpm9ea4e39482d284454fc7ff5b2256de153dd924e105c3400370510a1689922337gvfs-smb-1.36.2-5.el7_9.x86_64.rpm8d525cd93e3ea2a99271db99f09ad4d564cb9e886613805250d55be1ad9a936dgvfs-afp-1.36.2-5.el7_9.x86_64.rpm2b7bd38e06c8d0a25e04a78ebb8d92536aa223b8d39954f117dd48e4155bb4a2gvfs-mtp-1.36.2-5.el7_9.x86_64.rpm6b2a6a73ad2c7d30b771ba301e2652e2dde4f927f70f54bc64e7fe05f162633cgvfs-1.36.2-5.el7_9.x86_64.rpmdeda765e131121c287f623ddef5a409121c54a309045dfbc75169e2da558ffb1gvfs-1.36.2-5.el7_9.i686.rpm3f349a1203324c6f5455398298324f6820f42183960f4c215f9ea981b3dc0df2gvfs-devel-1.36.2-5.el7_9.i686.rpm7a4f19f435a83650765bc7d3568d477bf165fd943c5ec2d3b3db02a753181914SLBA-2021:3790Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2021c, which addresses recent time zone changes. Notably: * Samoa does not switch to the daylight saving time (DST) in 2021. (BZ#2007732, BZ#2007785, BZ#2008251, BZ#2010126, BZ#2010127, BZ#2010312) Scientific Linux 7tzdata-java-2021c-1.el7.noarch.rpmce1f65142b07a7c2f539e818e24356a5ababcfa788fe29d9410d9ebb9ea1080ctzdata-2021c-1.el7.noarch.rpm39eb52d8920c1d74883252f632751e5fee35f70add925cbee7199855ace9e2c9SLBA-2021:3793Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement UpdateNetwork Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Integrity protection is not active on all database fields (BZ#1879933) * NSS sometimes causes CURL deadlocks (BZ#1896808) * yum gets deadlocked/hung up (indefinitely) waiting for urlgrabber-ext-down (BZ#1909150) * Recursive locks observed in nss-3.53.1 (BZ#1909261) * Need to rebase to NSS 3.66 for Firefox 91 Release [RHEL 7.9] (BZ#1966816) * NSS cannot use SQL databases created by specific versions of NSS (BZ#1978433) * Inconsistent handling of malformed CertificateRequest messages [rhel-7.9z] (BZ#1980046) Scientific Linux 7nss-devel-3.67.0-3.el7_9.x86_64.rpm2c0f670ad48cb9ba882fdfeacdc869245ff97cb2320eb484022798efa965a473nss-devel-3.67.0-3.el7_9.i686.rpm87fd30874b2b8b6ea451e0478c5ab0f71c3357ac0524e5197f2d9171912b34d3nss-softokn-freebl-3.67.0-3.el7_9.x86_64.rpmab996e4b9cdc0e5c0495805a72d005f6bcf3e6c1b7c9f1df9c1c91b85e1ec57fnspr-devel-4.32.0-1.el7_9.i686.rpme36ace0b56dfefa947060cb4e2390383264e9d6a1c072b832cb55c35b11b8b94nss-softokn-devel-3.67.0-3.el7_9.x86_64.rpm7beddb7631518604b4e3cff8364e1ab5daff98ecae28da3b679247b241026a1cnss-util-devel-3.67.0-1.el7_9.i686.rpme2619a570f375cc27050a73e1be344665a8ec0cd78341148a74adfdbeb382b47nss-softokn-freebl-devel-3.67.0-3.el7_9.x86_64.rpm9bc2727ee996d4b8b416648ccbcc7aa3959454c3dadb7b35c6921ba4ddb73a0dnss-util-devel-3.67.0-1.el7_9.x86_64.rpm649f82efb3ff7a7b30bbb14bafad86e6003fe023b4de9813ed2525a61ee801fbnss-softokn-freebl-devel-3.67.0-3.el7_9.i686.rpme6ad52307f29b631f9c6bdb14fd5436628349a751beab2462a2b72bf55dee53bnss-util-3.67.0-1.el7_9.i686.rpmf9f20cb196069ff6fc17ded3d73b7631d948cfcfd718565148b7459eb0a3639cnss-tools-3.67.0-3.el7_9.x86_64.rpm82b5608db91380a02c78ba181395f8263fa772615f25d2dddf58193b096bac18nss-softokn-devel-3.67.0-3.el7_9.i686.rpmd1a9c51ad1cc93aa7cdef20cd6c93bf5d1da6ff3520ad02419b6f83b7cd54af2nss-3.67.0-3.el7_9.x86_64.rpmeda6cfbb071aab353de25677b3b0e107b5ad7e3f59951407bd45450effc0d453nss-pkcs11-devel-3.67.0-3.el7_9.i686.rpm6da92c396cd6ce357ecfb3faf406ee21f61118003201c1c15997a242b4425999nss-softokn-freebl-3.67.0-3.el7_9.i686.rpm1d42d82366258ade1c349216ae1f9b90526982e2e2961cec7657a2114e1a5426nss-softokn-3.67.0-3.el7_9.x86_64.rpmf71e7ed72ba31abcb53eb5f0c3203e03eaafe5d7f248cd8abbf9603288dedebdnss-pkcs11-devel-3.67.0-3.el7_9.x86_64.rpm298b690f8d2735e8fe7b477ecd2defaab30edfd913e692635636320c4201f4d4nspr-4.32.0-1.el7_9.i686.rpm58b6fb3d52922d32614c80d2e4376e4bfa7cdd632cf8529cbae89ec994874dc9nss-3.67.0-3.el7_9.i686.rpm237b8d5deabaeee02c7336476b9136567cbd8f5234849d5672d36f4e98f3e894nspr-devel-4.32.0-1.el7_9.x86_64.rpm6489403e07ebd577f870a4568713fbbbb883e5a59a7d8ffe4635d32a84e02ec3nss-util-3.67.0-1.el7_9.x86_64.rpm7eafc5254ebcce4f3ed8e5a99677e1a6c714789347e30e1a288b47fac43cbf5enss-softokn-3.67.0-3.el7_9.i686.rpmec1f4772a2e82eaaf1e00b556efdf57a3d602819fb2ed1fe813d72cbe3895f71nss-sysinit-3.67.0-3.el7_9.x86_64.rpm02f8ef2ecaa45b41bbb4ac0debc3d8cddf92bd8f4c975dc8d01b3074f1c83003nspr-4.32.0-1.el7_9.x86_64.rpm8f352f7a82a458922db56d82dc8d63d1b6e66069cf73a7f4a56e790945c58bd0SLBA-2021:3800Ipa Bug Fix And Enhancement UpdateRed Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * extdom: LDAP_INVALID_SYNTAX returned instead of LDAP_NO_SUCH_OBJECT (BZ#2000261) Scientific Linux 7ipa-server-trust-ad-4.6.8-5.sl7_9.9.x86_64.rpm95cad1c2465c7cd71b6931c1e54f48dab469d3bd75a26743d3edddadaa08c6efpython2-ipaserver-4.6.8-5.sl7_9.9.noarch.rpm41e0b47432858828cc2106f9874b762fdb184614a04f4726a4236dc8fa4dd7aapython2-ipaclient-4.6.8-5.sl7_9.9.noarch.rpma0c91e360b47fb9f3c9642044c349d3b6985bde9261712151d1e2c37705c5bcdipa-client-4.6.8-5.sl7_9.9.x86_64.rpmef17cc21eec485fbe0692bc7a7590be3248479273a74a5545c4c59ac43483971python2-ipalib-4.6.8-5.sl7_9.9.noarch.rpm84d4c7cf560d79075edc1a42b6c9ddc5fa12d371ccf80d15f662efd1d209fd4cipa-python-compat-4.6.8-5.sl7_9.9.noarch.rpme4e7127bb63d889f2044cd811cff7a8d141a6f20110f919ca2332852b4e3a301ipa-server-4.6.8-5.sl7_9.9.x86_64.rpm62d0456d32a15daea2e8aed6b63d3fe97c75f82f5f11465be5331e7d25765316ipa-server-common-4.6.8-5.sl7_9.9.noarch.rpm67bc072b25687f470b5ff797415ec5e7cc911d1d31cded229a95d80450c34015ipa-client-common-4.6.8-5.sl7_9.9.noarch.rpm80f987c27a87872d59c18c0b4d98af6629791fab56c1e5c97d36a7944bb8a069ipa-common-4.6.8-5.sl7_9.9.noarch.rpmda28eee5f08704830533dcbfbe02070114d97443c679e331e87133a799f511f4ipa-server-dns-4.6.8-5.sl7_9.9.noarch.rpm6a032b03a786c53d33b95aa6f53af6c35d69b76cb6a1d25ff429b638c357b431SLBA-2021:3804Pki-Core Bug Fix And Enhancement UpdateThe Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System. Bug Fix: * ipa: ERROR: Request failed with status 500: Non-2xx response from CA REST API: 500 (BZ#1958788) Scientific Linux 7pki-ca-10.5.18-17.el7_9.noarch.rpmf13c8a17bd7ad06b0ff1a7f99c4d952ce8c3d27a8439ba4b821557a3246286d7pki-javadoc-10.5.18-17.el7_9.noarch.rpm9fb683639d340b9802f01086cdb14ef026bbb4f243f14240b5b1dc4ca5fbf903pki-tools-10.5.18-17.el7_9.x86_64.rpm3761340e411df2efeb62821c5fb549f3d0ca5765d3a67dc7dbdcc874cfdc96fapki-base-java-10.5.18-17.el7_9.noarch.rpm293585ab40dfbecb575e73bd5834c00225d9b0168c02aad8d9852451198debccpki-symkey-10.5.18-17.el7_9.x86_64.rpmcfad3f2a0cba4a572bfa4ed7cb7de3336c7e25dd6a44237a7c12e1e2c862445epki-base-10.5.18-17.el7_9.noarch.rpm9a69fd8ca9191ce9765dca7e90ac0d7676e0457eb56f3bbf662f528aff23200apki-server-10.5.18-17.el7_9.noarch.rpm3e0bc224483605ed81901ddbbaf0ab507896add15347603bdc55710f5c9714edpki-kra-10.5.18-17.el7_9.noarch.rpma53dd9436b90bdfca04f79ee43c97898bcfe380022b4edfe07745b6933ecf1b4SLBA-2021:4003Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2021e, which addresses recent time zone changes. Notably: * The Pacific/Fiji timezone has suspended daylight saving time (DST) for the 2021/2022 season. * The 'zic -r' command now marks unspecified timestamps with "-00". * Palestine will end daylight saving time (DST) on October 29, 2021 at 01:00, rather than the predicted October 30, 2021. (BZ#2015242, BZ#2015246, BZ#2016369) Scientific Linux 7tzdata-java-2021e-1.el7.noarch.rpm9d885a3f4ea1b9ee78acda35303ce6d7ddc39c5414ff955017dabaa410d9b371tzdata-2021e-1.el7.noarch.rpm502a8d632f40de778a2c065bd63517e81f6afd7354c9188b9872859877f35a34SLBA-2021:4780Openscap Bug Fix And Enhancement UpdateThe OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * Report shows "pass" while command output shows "fail" items (BZ#1858502) * Memory leaks in probe_file (BZ#1861793) * oscap dies with segfault when using --stig-viewer option and latest XML file from DoD (BZ#1911999) * probe_file consumes all the RAM of the system (128GB) (BZ#1932833) * Ansible playbooks for profiles have duplicate variable definitions (BZ#1944683) Scientific Linux 7openscap-utils-1.2.17-14.el7_9.x86_64.rpm3d799ea31e47c7922e5cfe2fbbf4686e570d0a127189ea8e806604ffb3a74298openscap-1.2.17-14.el7_9.i686.rpmbc4661a363dab8a8c703267149be0e9218834cec03de3c7b9243f2de476c8afbopenscap-engine-sce-1.2.17-14.el7_9.i686.rpm1bc26a17f1599a69c7104b9a7f02b833edbb7a3d9efe3b62e439813a1f4b39c7openscap-1.2.17-14.el7_9.x86_64.rpmbd74786e781b5514f67db81b5a657b47b2c804fb640fb1dc6481d3d1692c383eopenscap-devel-1.2.17-14.el7_9.i686.rpm1a127768c1bd492614f5bdbd5318f52cf7eafedfcdd910557915a00bcaf45a29openscap-engine-sce-devel-1.2.17-14.el7_9.i686.rpma17c9d9cc19b0a06f3d8ea7164f329b2c113e6a9ffd91a4386568ee3a6818e6fopenscap-scanner-1.2.17-14.el7_9.x86_64.rpm37f640cc29d3c6e8915c6041e8d9b4df67db84e701148845bc09bddb2f9bce79openscap-devel-1.2.17-14.el7_9.x86_64.rpm7094e2f5a6e417455d4bc02eb74f68e4b91b5239492dfd64fb32162c0c5b4f8eopenscap-engine-sce-1.2.17-14.el7_9.x86_64.rpm3a0a404fa4b80b779631cfeab831338037a2a4f23652bf1cbd92d28b96fb6951openscap-engine-sce-devel-1.2.17-14.el7_9.x86_64.rpm4ce5595b4468787dc8e5ab4b62438002307e760a34f8e8241ba2122a68a3166fopenscap-python-1.2.17-14.el7_9.x86_64.rpmf405937b54e1ebb9762fcc33aa9f922e79a92c243bf92fbf46955187a02eb93fopenscap-extra-probes-1.2.17-14.el7_9.x86_64.rpm90c44cabcea4e43996ec4a90e757d7a294f2b0b5fc5b4a1604ef1b3ad1fc0cbaopenscap-containers-1.2.17-14.el7_9.noarch.rpm78fa0b4b21a1a3642d66229f016c2db3e7dd37fa25972a201d264a4689c8d479SLBA-2021:4781Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * xccdf_org.ssgproject.content_rule_package_MFEhiplsm_installed does not properly check for SELinux (BZ#1944297) * Insights does not use latest benchmark for CIS compliance (BZ#1953787) * Ansible remediations of 3 dconf_gnome related rules don't work properly (BZ#1976123) * Update rhel7 DISA STIG profile to v3r5 (BZ#1996678) Scientific Linux 7scap-security-guide-0.1.57-4.sl7_9.noarch.rpm34b51c5bc4b0fdcb126de54e516c912ae49536a750759fa5eb10b185df31f716scap-security-guide-rule-playbooks-0.1.57-4.sl7_9.noarch.rpmf9f68aa9f3fb47b03571e50bacf7d612945de926bf71212d965d2de3a973bb7escap-security-guide-doc-0.1.57-4.sl7_9.noarch.rpmb7c847545012d13dfdffe57a3189942a91879a02fae26daf176ef346382ee2f9SLBA-2022:0156Openssl Bug Fix UpdateOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Bug Fix(es): * httpd fails to start with double free after updating to openssl-1.0.2k-23.el7_9 (BZ#2039993) Scientific Linux 7openssl-perl-1.0.2k-24.el7_9.x86_64.rpmd1aebf2a5bc3c316d2c83ac2356bda30edc90f0bcfea12880457f2253793ac2aopenssl-static-1.0.2k-24.el7_9.i686.rpm802945ef14687804c65a5ab6575c29d1283ece79cda956a1404b811ae8edd1daopenssl-devel-1.0.2k-24.el7_9.x86_64.rpm39dc3f28c58da872fb5cfe9b993755e4b9e8e2d524d5a7c1b9707b59833830a7openssl-devel-1.0.2k-24.el7_9.i686.rpm74bacb9457163a747581bf48c74b83077f3522b3ac5b9d5bc6bdf70f29903ea7openssl-static-1.0.2k-24.el7_9.x86_64.rpm7c9b4e1adb114e8aa1863aadfe9def96e5c024e2a2b1384e35db36f8c9bfcd27openssl-libs-1.0.2k-24.el7_9.i686.rpm46836801d59aeab63ec927592fc2441705d340b49b08e6f3d6c5727a457537a5openssl-1.0.2k-24.el7_9.x86_64.rpmb2ab8b852aade7509bb4b1b3653143efdecc58c50fd9abeb3b0cb9893332fcdeopenssl-libs-1.0.2k-24.el7_9.x86_64.rpm1082492dc5c94ea8089e3109cadc6719b4dc557ce6588c4e890a2331a583c660SLBA-2022:0701Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * Update RHEL7 DISA STIG profile to V3R6 (BZ#2049532) Scientific Linux 7scap-security-guide-rule-playbooks-0.1.57-6.sl7_9.noarch.rpm6cfae01e405036fc6c9bc1dad1f1b2af3cf0b0d0a3527f39a267908754069cf7scap-security-guide-doc-0.1.57-6.sl7_9.noarch.rpm3ccacefd6ea02017cec03049ebeab09181953aed25356068f40ca92f92fb8531scap-security-guide-0.1.57-6.sl7_9.noarch.rpm4df0bc8bcdcc1bea9da053779deef090e5f179f6b302c0d6d54efdef352b3a69SLBA-2022:1032Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022a, which addresses recent time zone changes. Notably: * In Palestine the daylight saving time (DST) starts on March 27, 2022, not on March 26. * The zdump -v command now outputs better failure information. * This update provides fixes for a code that read corrupted TZif data. Scientific Linux 7tzdata-2022a-1.el7.noarch.rpm2bd81e7c3b4b394094d0ff8d122a291ca35556608f8141093ea7aaac2b16c70etzdata-java-2022a-1.el7.noarch.rpm151cfed56b482c8d1befbb66f69fe3839eee9334e1c283fbb3f6d3da36531141SLBA-2022:4647Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * McAfee packages not detected properly by the RHEL7 rules (BZ#2066321) * Update RHEL7 DISA STIG profile to V3R7 (BZ#2079217) Scientific Linux 7scap-security-guide-doc-0.1.57-8.sl7_9.noarch.rpm408202f740301c34e37133d0bba9c8c79e27ea0366a76dfedd262f2bc63d5cebscap-security-guide-0.1.57-8.sl7_9.noarch.rpm208aebc50b47c17f0d0a4753624c24b0fd4ed743c6fac58bcd0d48ce3ab528fdscap-security-guide-rule-playbooks-0.1.57-8.sl7_9.noarch.rpma7d8dfb326f66727f85327ebe37848008a74d7f20797a6ece46466ad90686083SLBA-2022:6138Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022c, which addresses recent time zone changes. Notably: * In Chile (the America/Santiago time zone), the daylight saving time (DST) starts on September 11, 2022 instead of September 4. Scientific Linux 7tzdata-2022c-1.el7.noarch.rpm2526692b84bdac51c09de6cee75a9740d154f258e3f1ad4e7c7539b537c5a510tzdata-java-2022c-1.el7.noarch.rpmdb8d6f0b1278aa4cdec8aa873f85d6fc25e37b02c372b78b01922680ef29c6f9SLBA-2022:6576Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * Align RHEL 7 STIG profile with DISA STIG Benchmark (BZ#1967950) * content_rule_audit_basic_configuration enforces using default buffer size (8192) for audit, which isn't always suitable on busy systems (BZ#1993822) * Rule file_permissions_sshd_private_key fails after kickstart installation (BZ#2021258) * Update source of CVE data in data stream (BZ#2028432) * Remove PCI-DSS-centric XCCDF Benchmark from scap-security-guide (BZ#2038165) * Update RHEL7 DISA STIG profile to V3R8 (BZ#2112939) * Rebase scap-security-guide in Red Hat Enterprise Linux 7.9 to latest upstream version (BZ#2116359) Scientific Linux 7scap-security-guide-rule-playbooks-0.1.63-1.sl7_9.noarch.rpmf52637667eb5a2187f932a8a5a05586283f500d28d628501fcd653d4d25edec8scap-security-guide-doc-0.1.63-1.sl7_9.noarch.rpm94a85061d97a42f352b1f371ac22a05bec5536c421266a08e6361b5360d91890scap-security-guide-0.1.63-1.sl7_9.noarch.rpmdac6ee364834b698e57df24a4eccb73de0db2fe69172681f54532edaf4bfa706SLBA-2022:6712Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement UpdateNetwork Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Import of PKCS#12 files with Camellia encryption is not supported (BZ#1462297) * Rebase nss to 3.79 for Firefox 103 ESR (BZ#2064364) * NSS sometimes causes hang for customer application (BZ#2066679) * Rebase nss-util to 3.79 for Firefox 103 ESR (BZ#2093506) * Rebase nss-softokn to 3.79 for Firefox 103 ESR (BZ#2093507) * Rebase nspr to 3.79 for Firefox 103 ESR (BZ#2093508) * update-ca-trust fails with /usr/bin/p11-kit extract calls getting aborted (BZ#2096268) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097811) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (nss) (BZ#2097842) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (nspr) (BZ#2097904) * curl segfaults (BZ#2103706) Scientific Linux 7nss-sysinit-3.79.0-4.el7_9.x86_64.rpm717eea39d2aa9e9184975eeed842014f45b14c444f53f59de786621ab7ed2734nss-softokn-devel-3.79.0-4.el7_9.i686.rpm5476523c29380f539332b29dc5309a868c2ff52a91096115d6028f6137883294nspr-4.34.0-3.1.el7_9.i686.rpm7dbdc6ee9f0f8f77fb4b7bcd7ac52016207b3edab103060b5d61050a9c3570d2nss-softokn-freebl-3.79.0-4.el7_9.i686.rpma353095c518f10d49c7e80ea897ad387b21e25854313d534075b7b5f2f6465d2nss-3.79.0-4.el7_9.x86_64.rpm13b925723c08f99571a2097f97ee70a74fda215aee270a4c8e620242d73ee852nss-util-3.79.0-1.el7_9.i686.rpm8d197cc06e73cbe55bfd20060eacc65685601555f77dc85568f5bb490e83fe3anss-softokn-devel-3.79.0-4.el7_9.x86_64.rpm2ca839847c5550bc4f5ddf11e3535fa8e46b0943ac3a65f9b89ca157da090d26nss-softokn-3.79.0-4.el7_9.x86_64.rpm167f0a4aeb1c09264bb4ef61f7a6c59de588e06a08195ab7b3e67e52aa2cd101nspr-devel-4.34.0-3.1.el7_9.i686.rpm5402ff5f1241395f94fb3e604641b0b68ca43d1d61a08cf7f806e075df949132nspr-devel-4.34.0-3.1.el7_9.x86_64.rpm55e256f8ae60657b3a61612b1991bb4981554b794c75335970a7cb2595f4b6c1nss-util-3.79.0-1.el7_9.x86_64.rpm3142083148f43ab008bce4419a7289209620b024ee7091fa8a9d73a379f56451nss-util-devel-3.79.0-1.el7_9.x86_64.rpm6dcaeaf3e23cd6e103685d1ec84ff38d94c89e7d600bd14b87211b7390f2e222nss-tools-3.79.0-4.el7_9.x86_64.rpm1713aec9855779538668e46177c7e738d0a0892ac2078dd0c538cf154cbb3b3dnss-devel-3.79.0-4.el7_9.x86_64.rpm63584668c447eb2c6b01095d7f6aba35b6a09dac00efaee4964d5c9f0fcfe0ednss-pkcs11-devel-3.79.0-4.el7_9.x86_64.rpm9b0f709efaf08e35bb9eac6973c3d433a4b011a42b860954588e1599105d1d41nss-devel-3.79.0-4.el7_9.i686.rpm590e47b59ca6cd7241939955196bf27599dde733c01a0fc20a52c5b4861206f1nss-softokn-3.79.0-4.el7_9.i686.rpm72187c2f765bb749d6088a6446d14bbd7ba12da8774af35b2deb35d35b2abae8nss-pkcs11-devel-3.79.0-4.el7_9.i686.rpm1c83452ff7cc28a33974a11b8e12dea9218f1fd01f632307b37241a6ddf60e12nss-util-devel-3.79.0-1.el7_9.i686.rpmfff77c933cf38500888db2bf93fc4340097877874490438b3418897cc0937cb5nss-softokn-freebl-devel-3.79.0-4.el7_9.x86_64.rpmdb7bbda5be560f602b5594716e7b92829d1f1c41bd9b428eb44f00a44559b9ecnspr-4.34.0-3.1.el7_9.x86_64.rpm48b4e6653da1eb4229713d7c9241bc50f81a9d67f2a7e2e14e94d24251b331e0nss-softokn-freebl-3.79.0-4.el7_9.x86_64.rpmc911e5c946a25f1b2a978735330881ecfafd5b1f7f805b1584c866aaa076046bnss-3.79.0-4.el7_9.i686.rpmee4b3aed756beb4b69e7cf12635c63492af12edb727fc74b29f0f2ef39291190nss-softokn-freebl-devel-3.79.0-4.el7_9.i686.rpm561cba4e0ccb895de95856af3ce838de7cfabafcf6db99c36e4d74f2b4243173SLBA-2022:6827Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022d, which addresses recent time zone changes. Notably: * Palestine will transition to daylight saving time (DST) on October 29, 2022 instead of October 28, 2022. * Europe/Uzhgorod and Europe/Zaporozhye are moved to the 'backzone' file. Scientific Linux 7tzdata-2022d-1.el7.noarch.rpme29657e0ab4a9adfc968a48499f95dabe2c9b1b55b91307237bd9ef79589f1d5tzdata-java-2022d-1.el7.noarch.rpmaa8c2791f3c77330bdde1873e5dc9aa039495379b9e49c9bd539636e1453cc3dSLBA-2022:7067Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022e, which addresses recent time zone changes. Notably: * Jordan and Syria cancelled the daylight saving time (DST) transition planned for October 28 2022 and will remain at time offset of +03:00 from the coordinated universal time (UTC) permanently. Scientific Linux 7tzdata-2022e-1.el7.noarch.rpmbb921010ac58172a3a2ded25bde14eeb0b515ba6faef765dea2efb1e10e7256dtzdata-java-2022e-1.el7.noarch.rpmf964a856c27ee43d19659d570924fc1cfe1104b018c8e052165488217e60b08dSLBA-2022:7404Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Scientific Linux 7tzdata-java-2022f-1.el7.noarch.rpm419a66f43a09d2d55dad85fe19134693e98ea63126303accf356fbe0d2cb977etzdata-2022f-1.el7.noarch.rpm2f62960f7056adb2aa0c6f6aa3da568a6588baae81dc6de89e438d64258c0078SLBA-2022:8785Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. Scientific Linux 7tzdata-java-2022g-1.el7.noarch.rpm68f3b82080120841f4ad82d719ee4570f9fa63177d69fde1ba0aa173448abcf2tzdata-2022g-1.el7.noarch.rpmbb123b23987cd20416556db907bd9564418cfa6e78e9ed20f3a719a4eadc32a7SLBA-2023:1094Openscap Bug Fix And Enhancement UpdateThe OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * Potential invalid scan results in OpenSCAP. (BZ#2111041) Scientific Linux 7openscap-engine-sce-devel-1.2.17-15.el7_9.i686.rpmda53f46a4c67f90b223ab07a1f586c1eba98630e728315fc0f32a28834c7c960openscap-engine-sce-1.2.17-15.el7_9.x86_64.rpm9eaffc2d4b0b1066f9fd6c24e4d8e060ead83958d736cc3079b4ed8ede000bbdopenscap-devel-1.2.17-15.el7_9.x86_64.rpmb51ca8653da9180796ccb42b29054f561c6e56bc9c4d0b56d9a4d7d36006399bopenscap-scanner-1.2.17-15.el7_9.x86_64.rpmf0261e7d1cfa92d6fe9e9abd07b22a07067312cdf0390f6a4b4240ed6e6e9545openscap-containers-1.2.17-15.el7_9.noarch.rpm501eb0d76ddd27ce2d3915947213e39cea80ebe499dc423ab3b590fcd88606b2openscap-engine-sce-devel-1.2.17-15.el7_9.x86_64.rpm2d1d4ce394f8c1b0afc66d49d335f168cab5bbd3f96425edf8698f5e2aa0de9bopenscap-python-1.2.17-15.el7_9.x86_64.rpma7d7997bc2aa8a38b5eb3b000c0b4fa96150a9658f55c84651cd6127f2bcc37fopenscap-extra-probes-1.2.17-15.el7_9.x86_64.rpm204a8cba807ba67c41efda5b48f0a2d2e7e0ff5a15688e3cbd3ad2e687735fa7openscap-utils-1.2.17-15.el7_9.x86_64.rpmdc2c0db93642b89ee53df753654d9314ae61eaeaf111f35c2d43780482928c45openscap-1.2.17-15.el7_9.x86_64.rpmc7927ed6542837c5713897ed63c49d7bbdc10e4b4713ae7a018d41c1f55d847fopenscap-engine-sce-1.2.17-15.el7_9.i686.rpm799ee42a178599fb8fabccbcb8d18289129dcd4654b8de0445f1d033046f9931openscap-1.2.17-15.el7_9.i686.rpmcfc2f5c78d541ba22f88885b732a1b652d64d330709a388aa72647fb622cb13bopenscap-devel-1.2.17-15.el7_9.i686.rpm2af9e67de95817b3a9afba1fde15e4e09e71ba5d8356417d8753ec55bd66b846SLBA-2023:1099Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2123284) * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2123367) * Update RHEL7 DISA STIG profile to V3R10 (BZ#2152657) * Rebase SSG to latest upstream version in RHEL 7.9 (BZ#2158410) * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2170038) Scientific Linux 7scap-security-guide-rule-playbooks-0.1.66-1.sl7_9.noarch.rpm8c896e9b2af0229b23afe8b3b521d6edecf8f758349df435ed63be14bb9a19c5scap-security-guide-0.1.66-1.sl7_9.noarch.rpm51c20f7783a416005f490dd4757723c285cbc4574923a141e6549a56996d089cscap-security-guide-doc-0.1.66-1.sl7_9.noarch.rpmc77812f9eba2fa7464fd7744d0cd653deb1014d23ec906498f320863a2c2121bSLBA-2023:1491Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2023b, which addresses recent time zone changes. Notably: * Egypt will reintroduce daylight saving time (DST) from April through October. * Morocco will observe DST from April 23, 2023 instead of April 30. * This year, Palestine is delaying the start of DST. * This year, Lebanon is delaying the start of DST until April 20. Scientific Linux 7tzdata-2023b-1.el7.noarch.rpma6eecba20da600ff330d091e2cf2a518e167cb6a256bb05c7c460e3e52e0b380tzdata-java-2023b-1.el7.noarch.rpma3326ac04c1bf1f60a6717458e915ce1d654bc263f8c2f8d0828b38f77898feeSLBA-2023:1534Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2023c, which addresses recent time zone changes. Notably: * The changes added for Lebanon in tzdata-2023b have been reversed. This update reinstates the DST change for Lebanon effective March 25. Scientific Linux 7tzdata-java-2023c-1.el7.noarch.rpmd7986e88f5938d15b2cdb0725f9baa8d5d795f83fde52f1732b3412f4448ed15tzdata-2023c-1.el7.noarch.rpmdb1001e6ec93cfa2f1804ca3e89c41cfa944eb81bdff04df3383ca1d3ba15529SLBA-2023:1991Shim Bug Fix And Enhancement UpdateThe shim package contains a first stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Bug Fix(es) and Enhancement(s): * Shim refuses to boot the system when TPM event logging fails. (BZ#2002648) * Shim loops indefinitely processing certificates when space in mok is smaller than certificate size. (BZ#2007084) Scientific Linux 7shim-unsigned-ia32-15.6-3.el7.x86_64.rpm28cad241c3839168fa5f00d1f4c70a73860eb8bb2c0e4640b3ae258c33622d5fshim-unsigned-x64-15.6-3.el7.x86_64.rpmd4e013392e4e29f8a7d58bb378abd82acb48084535a350ca8a90e591371a6403mokutil-15.6-3.sl7.x86_64.rpmd8932c49f75ea8f4f398e9eeaa80eef43d3f8e48cb174d8da9ef754a43db7cffSLBA-2023:4598Firefox Bug Fix UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Bug Fix: * Updating Firefox to 102.14.0 prevents all pages from loading. (BZ#2230023) Scientific Linux 7firefox-102.14.0-3.el7_9.i686.rpm8a33ccae5f36446832cdebfee806a98620b32eb271ffa4913d5dbf57cd9cd8c0firefox-102.14.0-3.el7_9.x86_64.rpmca47117b220a0bbd5c8083dada38c466ccff34032000a9c2cdd83be018c5bcccSLBA-2023:4599Thunderbird Bug Fix UpdateMozilla Thunderbird is a standalone mail and newsgroup client. Bug Fix: * TLS broken for POP3 and SMTP connections. (BZ#2229981) Scientific Linux 7thunderbird-102.14.0-3.el7_9.x86_64.rpm950ffadc0560f6aee5fc3c3f0202ebd7023c4bc086bbbfb7af5e05fa99f89d59SLBA-2023:4824Scap-Security-Guide Bug Fix UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es): * Update ANSSI BP-028 in RHEL7 to v2.0 (BZ#2155793) * openscap shows IPv6 as enabled even if it is disabled (BZ#2210276) * Rebase scap-security-guide in Red Hat Enterprise Linux 7.9 to latest upstream version (BZ#2221694) * Remote resource referenced from datastream is missing https://access.redhat.com/security/data/oval/com.redhat.rhsa-RHEL7.xml.bz2 (BZ#2223817) Scientific Linux 7scap-security-guide-0.1.69-1.sl7_9.noarch.rpmf127d4b826901e47d24dc9a99c48f66343f06f7d8a2090a14bd23c4fac296b0bscap-security-guide-rule-playbooks-0.1.69-1.sl7_9.noarch.rpm6b6f66cddc9c2482a484b76671b21ae1e39d264deca43657ab958a269f01eaadscap-security-guide-doc-0.1.69-1.sl7_9.noarch.rpm74e0ee0a5e07d64aa98a46657247ec14c067dc34caa2ea2cbc40b6d52f3d2518SLBA-2023:5478Nss And Nspr Bug Fix And Enhancement UpdateNetwork Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.90), nss-softokn (3.90), nss-util (3.90), nspr (4.35). (BZ#2211859) Scientific Linux 7nss-pkcs11-devel-3.90.0-2.el7_9.x86_64.rpm833cd6c91d1a08aa3ebe685b7aea647ce01d5a1ffb483ec74587013cdcd51ad8nss-softokn-devel-3.90.0-6.el7_9.x86_64.rpme6a5c1b405b29c400e4f2d2f24853391ecb784004266e870c50e85090e570412nss-pkcs11-devel-3.90.0-2.el7_9.i686.rpm6fd9b7e03da8401e9b539f86845c53c9206853efc5b8aa081fbf7d4e9a1e57fanss-softokn-devel-3.90.0-6.el7_9.i686.rpmb00a9b8bf9847ca51a49f00b861d392d6f0f3d6b9230072a10a760e7014897e1nspr-devel-4.35.0-1.el7_9.x86_64.rpm3ec2bf3d3161853724c484fea24801c07e9d5e62428b300c5fdeafb7a4d75ce3nss-devel-3.90.0-2.el7_9.i686.rpme0a5d74373fb9ca4da0adf92664deae1f36e575acc5b7a3789b24aed50b95548nss-softokn-freebl-3.90.0-6.el7_9.x86_64.rpma9b91349cf9aff0bd4bcd70493ddbf1e17e67977c72865b1d0c6f79898778c38nspr-4.35.0-1.el7_9.x86_64.rpma8e5282a90fa724da81caf2f08726b6ef455b2249b9232d455db53a784dd92acnss-util-3.90.0-1.el7_9.x86_64.rpm7cf1a5b624097801b794c4c63213821ba51c841f207b6706ab173add0abb3759nss-sysinit-3.90.0-2.el7_9.x86_64.rpm2c506d27cf3ef2869f5aa4c98bc9fc7cc57cfc6ceb333dfad8102c1a24e1df1bnss-softokn-freebl-devel-3.90.0-6.el7_9.i686.rpm5160dd7b34539accf4e74613c5645d6999a9367c1e04fad393c8426a31876929nss-util-devel-3.90.0-1.el7_9.i686.rpm6bf03cc81b4f1241c7611802a7c7f27279e6be39ceb3f1892024fb1fd54c3fe8nss-softokn-freebl-devel-3.90.0-6.el7_9.x86_64.rpm047aa93f55583f55c64b2592ba7b00f67b106f93540b1b6b0c08bba1bd1b0f10nss-softokn-3.90.0-6.el7_9.i686.rpm18241dca1d91129301c8556a8b62ffefb6a424b5db11c601fe0462ca61d34f85nss-3.90.0-2.el7_9.x86_64.rpm1648b5a87b74c820c9aed6eb6a1d10d1498a2bbd6976445cf34be8c657a3b32fnss-softokn-3.90.0-6.el7_9.x86_64.rpmc384ccf712d2130439a9fe5c98f3d0d73b3b0b8e603927073425a7f65197294enss-softokn-freebl-3.90.0-6.el7_9.i686.rpmfb670a39ad0ac44f9739100ef1eb8fe3dbb82c9ca6d4e874598e5597997c8a1anss-3.90.0-2.el7_9.i686.rpmd6b591087318537794a40f4dc5921268e0467eb57ccf341a78aaa01aff79228bnss-util-3.90.0-1.el7_9.i686.rpmfa85b3c8810ce262d235b22bbb0e4ede00c0aecca5772ffb60129a8c7c3b8dd1nss-util-devel-3.90.0-1.el7_9.x86_64.rpm2df03fb85e1abc6dcd8cceca2311aaa12c2c60dcc42c2228a70031b4d4f61915nss-devel-3.90.0-2.el7_9.x86_64.rpm144718bcc1de8e2e2d3933fdc91e926a0451b51102c883d7ebbc7a3ba8584519nspr-4.35.0-1.el7_9.i686.rpme7517a5cb57ad2758aa5cd91085301e4b16ae5cfe3b2e2d03cfdab3d5134f3e9nspr-devel-4.35.0-1.el7_9.i686.rpm210cdbbea75730caea5849bb61ec1926957562090f3e4259b68810f2c0070449nss-tools-3.90.0-2.el7_9.x86_64.rpm0d827bd967e29c6c8012e7cf1de16fa724ba482f60039dd2578c26519e5b45e2SLBA-2023:5620Microcode_Ctl Bug Fix And Enhancement UpdateThe microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20230808 release, which addresses CVE-2022-40982, CVE-2022-41804, and CVE-2023-23908. (BZ#2223994) Scientific Linux 7microcode_ctl-2.1-73.19.el7_9.x86_64.rpm547fb7118701708094c3b5c00ffe046269ed859553dbf86cf402c5302828f3c2SLBA-2024:0350Net-Snmp Bug Fix UpdateThe net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es): * net-snmp: fix a crash triggered by wrong passphrase (JIRA:RHEL-2882) Scientific Linux 7net-snmp-devel-5.7.2-49.el7_9.4.i686.rpmc658da0ffb451524e8fc09eadad31e74ce67eab1d7a25030959b1a41ba9763c1net-snmp-5.7.2-49.el7_9.4.x86_64.rpmc1e7bb09e847ce3bb6c454756a753a7d4d4dad85c7906763daa6306c56563480net-snmp-agent-libs-5.7.2-49.el7_9.4.i686.rpme1810e0e60ef8ff20aa9bd2dde94c85b892ec99d28be6aeac23e789a8c71a6e0net-snmp-devel-5.7.2-49.el7_9.4.x86_64.rpm8ec73a83612f455a74445026b1cd2daa1dfea073c7c8c2d124a3ec0af77468f2net-snmp-agent-libs-5.7.2-49.el7_9.4.x86_64.rpm671aae63d47d6e21cb4352f75ad02f588ffa53700a552842d721ab4ac3de261enet-snmp-perl-5.7.2-49.el7_9.4.x86_64.rpmba1aaf9cc68fe79d17116b8d9c12c19c8e92bf8a264baf936cb628d71e34ea88net-snmp-libs-5.7.2-49.el7_9.4.i686.rpm89c86951e7ec026c2d82738ca5c9e597ab13002e329a31e39ea7710144063363net-snmp-libs-5.7.2-49.el7_9.4.x86_64.rpm5e27b4aa992324800c76d1fad361a54d1a9d667a281fd98f24830a68c5db564enet-snmp-gui-5.7.2-49.el7_9.4.x86_64.rpm332d57d5e8b8be75894169db2389a1b5d15a86f1d8653de1449baff44b8c043bnet-snmp-sysvinit-5.7.2-49.el7_9.4.x86_64.rpmbb3fb2524a52f113142385015bd9636ef9dd05293bb0bdaf0e3194d63528b110net-snmp-utils-5.7.2-49.el7_9.4.x86_64.rpmf41bfd2bedb28d96c91a6426110db9c28e5d468234adb2a3c8c1b2d0c3fbfa36net-snmp-python-5.7.2-49.el7_9.4.x86_64.rpm77eebfe70b4d96f9e590e535bb09c068d3100e7a465e306fb0f266a9a2ec6426SLBA-2024:0762Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2024a, which addresses recent time zone changes. Notably: * Kazakhstan will transition from UTC+6 to UTC+5 on March 1 2024. * Palestine will transition to the daylight saving time (DST) a week later than previously predicted. Scientific Linux 7tzdata-2024a-1.el7.noarch.rpm269866c2e28a43307abef7ef8968f108fbf18c61bc4da8b5fdf9cbf83425c9c6tzdata-java-2024a-1.el7.noarch.rpm2fbe19464f1e459fda37277248976644b1e9de5afd43ccf1c60472a896b94548SLBA-2024:0987Scap-Security-Guide Bug Fix And Enhancement UpdateFor detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section. Scientific Linux 7scap-security-guide-0.1.72-2.sl7_9.noarch.rpmb16440341a0b9327f3148a5ba31d74ced89f48a9706a5a62d4bf199041026f0dscap-security-guide-rule-playbooks-0.1.72-2.sl7_9.noarch.rpm9c4b957b491174811c87df2dbccc1a326f8f405d95700a2cd1bd53ebbc8fadc7scap-security-guide-doc-0.1.72-2.sl7_9.noarch.rpmc28c2c7bb50773bc3f4d71efd4dd7cc7da4a1c6aad6221ce3aeae71538c68166SLBA-2024:1274Fence-Agents Bug Fix And Enhancement UpdateThe fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Scientific Linux 7fence-agents-heuristics-ping-4.2.1-41.el7_9.8.x86_64.rpm6e56f8d888db37626adf4a5cf03fa719f0d9c3ef25efd0075f1663040facf774fence-agents-lpar-4.2.1-41.el7_9.8.x86_64.rpm638d58d089706a31d2be0c25025bd35e01e7a9278ede03309aa6b85e944d5ea5fence-agents-vmware-rest-4.2.1-41.el7_9.8.x86_64.rpma871063f9cce3bcc66cd3cf2ac25c9d70bf602e25bb921155dab40ea1781c8d2fence-agents-apc-4.2.1-41.el7_9.8.x86_64.rpmd7ea45cebf43de8427192eccad9ecda108c7fd10ceeb278435d18460b45d6c50fence-agents-apc-snmp-4.2.1-41.el7_9.8.x86_64.rpm6e2a06f356530081982acb223a1c2be6a48bf5baed4bcfd3104b7edf13b39334fence-agents-ilo-moonshot-4.2.1-41.el7_9.8.x86_64.rpm6a6ad2c66b11c9cdf2ddea5bbe82370d9b6b164708b9bb7dbf9d1dac1cb7c98efence-agents-ifmib-4.2.1-41.el7_9.8.x86_64.rpmf4a1666e35f1265dd53678906f6609c66f520382785b8e1031e0dcc3a934883ffence-agents-aws-4.2.1-41.el7_9.8.x86_64.rpm729d3d4b42073cdf02f841c8576d5fad1fd8a19a3564a22769d8f85c6eb086cffence-agents-bladecenter-4.2.1-41.el7_9.8.x86_64.rpm5b60eb76228587229ca3d8e5d4d0ea90e486cba8783f40e04d11665ffa514a30fence-agents-ipmilan-4.2.1-41.el7_9.8.x86_64.rpm5395bbaa7a5fb8a4da8f5653520324c9aa9900fd809ad450cc1ebacffd3c68bbfence-agents-intelmodular-4.2.1-41.el7_9.8.x86_64.rpmb0615c8baf5e9497ae674cda01e793c1d1fc2287aa785c2167c8d820a2b152d9fence-agents-cisco-ucs-4.2.1-41.el7_9.8.x86_64.rpm45916e68682a06cd43ddc70f88be74f3127bdb259999e8f37596f9e71a60188ffence-agents-ibmblade-4.2.1-41.el7_9.8.x86_64.rpm093720a4cf018a240f7b3cfdf9980be6bd71ae0deb28f17c54057a497312b51efence-agents-wti-4.2.1-41.el7_9.8.x86_64.rpmc6e1df867d64b9d8c575cdc5c8f20d521fe9a480035b6efe13abab6b75d61671fence-agents-vmware-soap-4.2.1-41.el7_9.8.x86_64.rpmad313e2f86f7f9f15a30074797454e54402bdc725710b1e4d3da594ccc86572dfence-agents-ilo2-4.2.1-41.el7_9.8.x86_64.rpm1a31a065be1222982bb005b03e7bff8eeb2050ac501c0e2111029ba51597e615fence-agents-common-4.2.1-41.el7_9.8.x86_64.rpm24fea275d60c79dce58a7176383cad072cf7c8e473d3a5ed72fda27b240c3f5bfence-agents-brocade-4.2.1-41.el7_9.8.x86_64.rpmf74ccc9a9ccabc9bc94afebdaf1a5437409e45caa7dd4a6222fce6dcd87771f8fence-agents-ipdu-4.2.1-41.el7_9.8.x86_64.rpm88090b817eeace0a716c473bed7160a08270a41126dba116dd8a12841e13134bfence-agents-eps-4.2.1-41.el7_9.8.x86_64.rpm03180c0590e56a549fcaba9758a0b02f3f7e61aba1dde1b1b98ecc4d326ebfe6fence-agents-hpblade-4.2.1-41.el7_9.8.x86_64.rpm0db1dbfebaa6b67cdaba3e67577b527b64e56698eaea4cf2a589d0df79168460fence-agents-kdump-4.2.1-41.el7_9.8.x86_64.rpm6f026bb6d5cb6dd57133c3569200c8ec9ed027fcbd5ee5307cef771a6abd9292fence-agents-rsb-4.2.1-41.el7_9.8.x86_64.rpm7bebb8c1064787a555a4469ff40e48554d16918a871eb16b671974aa13595ab1fence-agents-emerson-4.2.1-41.el7_9.8.x86_64.rpm3007100b95d7d09f310dce9b0c25925888df5ccb168c662b8275b29834eb2f76fence-agents-ilo-ssh-4.2.1-41.el7_9.8.x86_64.rpm8d7480844b7751c1187271ea7625d3e8c5a400ed5233bb15cba956a7793e31aefence-agents-cisco-mds-4.2.1-41.el7_9.8.x86_64.rpm2d56dca534bc0d47cbf0005dfa7f06aa5db6f605aa404644d40cabe02382d7bcfence-agents-amt-ws-4.2.1-41.el7_9.8.x86_64.rpm44ddedeb3c563db97154db842d530ee79dd8722bfdb79cd38a6a47abb617bdf3fence-agents-redfish-4.2.1-41.el7_9.8.x86_64.rpm9e536929558a3814dc846afef01a0f62e69f42a7fa076dbfcc28a7a56a42198efence-agents-gce-4.2.1-41.el7_9.8.x86_64.rpm00c3412047b847277ecc5f83e6780032d98ae9542573b634509d9fedba40254dfence-agents-rhevm-4.2.1-41.el7_9.8.x86_64.rpm44d71a555f1ec4e61d0a5429eafba7110715373e8c9f50cc1e983dea5f820e99fence-agents-sbd-4.2.1-41.el7_9.8.x86_64.rpm65d81bacfec1b46c22c11750fc9f71c068c11979a038189cf443c66726b6e133fence-agents-compute-4.2.1-41.el7_9.8.x86_64.rpmbe05fc5bf2b2a646e9002fb0c6ed1addb25de9770e84e58e32629068cfc97702fence-agents-virsh-4.2.1-41.el7_9.8.x86_64.rpm64f37eb5102cb2d5d582cef7a63e7e0b15948d75854fdc957bb34f870bc7fa13fence-agents-mpath-4.2.1-41.el7_9.8.x86_64.rpm5565c5379ce59d1b14416c2451fb3378584a774e5389109fb9d2037ae638217dfence-agents-aliyun-4.2.1-41.el7_9.8.x86_64.rpmf4422b189daadf84e733ea25db0584641130f12dfc81367fa0cbf9e84235a25cfence-agents-scsi-4.2.1-41.el7_9.8.x86_64.rpmdd41cac9d96fd46b02b5cc93ec0ef4679c1a81764123f52134f9a5269efd832dfence-agents-ilo-mp-4.2.1-41.el7_9.8.x86_64.rpmfb3c799dde831fd12ff6ba60173548d714ca0efe70b2dd78a77c675b0f4d31f4fence-agents-rsa-4.2.1-41.el7_9.8.x86_64.rpm1e475576002fd26c9356e09caa762ca00dc258d81774a0fb014ed4b8a23f7eb6fence-agents-all-4.2.1-41.el7_9.8.x86_64.rpm55862915cc9ceee1964cf8abe31bfff5ec229b4775a0c96f9f98ffa73f9b35eafence-agents-drac5-4.2.1-41.el7_9.8.x86_64.rpma508fb4976a9d173c6d4bfa170ac15e6430deebc08fee08b25012a237dee4948fence-agents-eaton-snmp-4.2.1-41.el7_9.8.x86_64.rpm514ccd0b7f308a16c1eb0ecf498ef88312dc0360ac546574b469e09db0f8ed08fence-agents-azure-arm-4.2.1-41.el7_9.8.x86_64.rpm70007684834fe70c8880f3d5c9370e618dc11ec0117a42898c52831007704510SLBA-2024:1276Resource-Agents Bug Fix And Enhancement UpdateThe resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment. Scientific Linux 7resource-agents-aliyun-4.1.1-61.el7_9.20.x86_64.rpme841523b6d12bfb7e7bf38dbce2dc0dbc0dd3aeca1c9cfe8de269ea3736577f0resource-agents-gcp-4.1.1-61.el7_9.20.x86_64.rpm92053d13004094b1d5f374d585c4b055e4de5d81c36fe8af96d84849ac02ed17resource-agents-4.1.1-61.el7_9.20.x86_64.rpmc7814974ccf16878f7a15f38101bd8cfc432a27b11ff3e7a5a316a7dd68c966bSLBA-2024:3624Scap-Security-Guide Bug Fix And Enhancement UpdateFor detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section. Scientific Linux 7scap-security-guide-0.1.73-1.sl7_9.noarch.rpmf725062f860358a91f914178fa656fdc5b24aca28abacc677b3afad32a8193ccscap-security-guide-doc-0.1.73-1.sl7_9.noarch.rpma8e3d73c8d75b9e04ad93839e41198cd845560d7a2493c8596cbb20191324217scap-security-guide-rule-playbooks-0.1.73-1.sl7_9.noarch.rpm60111515946d2e2906b7a22343ba156c79722b74490f3df1c8268f3604240e28SLEA-2015:1796-1Java-1.8.0-Openjdk Enhancement UpdateThis update adds the following enhancement: * java-1.8.0-openjdk has been updated to version u60b27. The update includes general bug fixes to improve and enhance the OpenJDK 8u releases. All running instances of OpenJDK Java must be restarted for the update to take effect.Scientific LinuxtrueScientific Linux 7java-1.8.0-openjdk-accessibility-1.8.0.60-2.b27.el7_1.x86_64.rpmf752460b180146ce28b7f56a6435b5026b0913adb6c550a28362b7bbb0b182d2java-1.8.0-openjdk-1.8.0.60-2.b27.el7_1.x86_64.rpm0735cd50a6a2a9ee1e1debf97be591ddddcd703fd13df0bf36dffc56bcb44b03java-1.8.0-openjdk-demo-1.8.0.60-2.b27.el7_1.x86_64.rpm316c9aaf29f5ce846e6fd759bff1dddfe3e7e994bae5857b8cbe31c90917594ejava-1.8.0-openjdk-javadoc-1.8.0.60-2.b27.el7_1.noarch.rpm3a0f37698b2f5b48d6e7c9e7ca624bad347a7992933bba8840730219b9628fb6java-1.8.0-openjdk-headless-1.8.0.60-2.b27.el7_1.x86_64.rpm692efe1f128e07ce67984c85385e524550769c8bdd18b0a409b87b4eb74837fdjava-1.8.0-openjdk-src-1.8.0.60-2.b27.el7_1.x86_64.rpm3c7df50822a177b0b7e181b8f1482ab292a0842a18f767fe5d8c96fe7fbe1f84java-1.8.0-openjdk-devel-1.8.0.60-2.b27.el7_1.x86_64.rpmf4fd234b6f7aac0970c6d210997dd39960e2cbd43d39cdd5e7e911deb4623957SLEA-2015:1863-1Tzdata Enhancement UpdateThe tzdata packages have been upgraded to upstream version 2015g, which provides a number of enhancements over the previous version. Namely: * Turkey's 2015 fall-back transition is scheduled for November 8, not October 25. * Norfolk moves from +1130 to +1100 on October 4, 2015 at 02:00 local time. * Fiji's 2016 fall-back transition is scheduled for January 17, not January 24. * Fort Nelson, British Columbia will not fall back on November 1, 2015. Also, British Colombia has effectively been on MST (-0700) since it advanced its clocks on March 8, 2015.Scientific LinuxScientific Linux 7tzdata-2015g-1.el7.noarch.rpmceb21e6f5b157974f78be7e302eccd0d4ce450fe9c0477d944056fcd8e80230atzdata-java-2015g-1.el7.noarch.rpmc90563f3fb4f5d32cd9be5f1fa893bd6b45f7154de950f760668fb065cdf15ebSLEA-2015:2094-1New Packages: LibsolvThe libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. This enhancement update adds the libsolv packages to Scientific Linux 7.Scientific LinuxScientific Linux 7libsolv-tools-0.6.11-1.el7.i686.rpm97221bde74d712fe2fefbaa91885300e5a78ab3fb98010a48c4b2ce68d878889libsolv-0.6.11-1.el7.x86_64.rpm7724f5fd1d516871be73b65b597cf00a6e6375096bcf311723fccfe82bb1305alibsolv-devel-0.6.11-1.el7.x86_64.rpmb4beecbf2b5e6a66f7873d8c60f0947cf2458ca23c5a215d7c3bb88915c946c1libsolv-test-0.6.11-1.el7.x86_64.rpmbaf63aaaf98f8cab7a0443de64735ae0aa8854d5c6d6288fa8d59c39a131fa82libsolv-0.6.11-1.el7.i686.rpme200f64346b42f830c3e2e4efda6ff85d7a457c823fb5c12838cbfcfd1e1b155libsolv-tools-0.6.11-1.el7.x86_64.rpm5986436508b78527fd79d243ed32e2036addc1502b60ced1acacf38fcc7ac95clibsolv-devel-0.6.11-1.el7.i686.rpm0956e460d636a316a66d33196b21cd8cddfd4a4ecbee4b7073ef08861c139406SLEA-2015:2123-1Linux-Firmware Enhancement UpdateThis update adds the following enhancements: * With this update, the Intel Snowfield Peak wireless adapter is supported. * The cxgb4 firmware has been updated to version 1.13.32.0 so that it now supports the Chelsio T4 and T5 adapters. * This enhancement adds support for the Omni-Path Architecture (OPA) firmware.Scientific LinuxScientific Linux 7iwl5150-firmware-8.24.2.2-43.el7.noarch.rpm9c6c880be8e1771180d8feb5474db7095a1254c2e61d318afe996f9dfc8ab6adiwl135-firmware-18.168.6.1-43.el7.noarch.rpm3c53edc3a966edb087c797e0fac5f0beb2d61129f71b72b3404a5b07645e8ef6iwl105-firmware-18.168.6.1-43.el7.noarch.rpm7601da349f8032eef6368b1e939a327686c4911b03fc8a441f9dcd8d4711eb45linux-firmware-20150904-43.git6ebf5d5.el7.noarch.rpm0b4c06b67c33e5c62faa98b69724fc89173ab756369b25c8996d7f517d2b0417iwl100-firmware-39.31.5.1-43.el7.noarch.rpm2c03e60940975bcebffcdc537dc1297aca14453992b1230b6a56b6518b801cc2iwl7260-firmware-22.0.7.0-43.el7.noarch.rpm3b8ec5665842e65b1f93981be9295bc7b4a28c326c309588f3fb271194dae5b2iwl2030-firmware-18.168.6.1-43.el7.noarch.rpma9b388878e180909526cccbf6dc5c614730b86b59e3b50bf22219465dee161fbiwl6000g2a-firmware-17.168.5.3-43.el7.noarch.rpmbbe65e2113558db8a8373591134aed9223592270ee2daf18c4924c5f6d61c5abiwl3160-firmware-22.0.7.0-43.el7.noarch.rpm1eebbb39d6d45bab2a4d112f8447539b6d447ac52df8005e9a01e0555f6b9156iwl5000-firmware-8.83.5.1_1-43.el7.noarch.rpmc61b1b31e70a64d79edc4d6b6609d0366f733f57a38ac750388303eddff87673iwl6000g2b-firmware-17.168.5.2-43.el7.noarch.rpmf9e618ba57b0e278a95836fb1c2a84206f19c6c659288f4cfff311285d2aa420iwl3945-firmware-15.32.2.9-43.el7.noarch.rpm17fca181ebf347965f2f8407bc1e18839e9228922f8bd6a9bc55b5039f6e96f3iwl6050-firmware-41.28.5.1-43.el7.noarch.rpm21696b19ceecf2365cc862af65258be3790899b8a62453dcfc2fed55f6d7a5e5iwl1000-firmware-39.31.5.1-43.el7.noarch.rpmab656d080966ef258155b1dd2f3e8150e5c8d083f08e9c394399b42b12eea2b6iwl4965-firmware-228.61.2.24-43.el7.noarch.rpm7e2e4670ca0234bc4345fcdea639ef8f6130f4658382ecfa7c1f19d6826d83f9iwl6000-firmware-9.221.4.1-43.el7.noarch.rpmd139cc5358fff195f206084a5186571e824154c019c97ede16823f61d042dd84iwl2000-firmware-18.168.6.1-43.el7.noarch.rpma1d23a03c1465f750e448e4f3feafc2fe2c42989a9c6593e15b03de245b006aciwl7265-firmware-22.0.7.0-43.el7.noarch.rpmaa4e326e3817b983fff954de7b0e4c6224e17cbf7e647786fa866ae0f97a3144SLEA-2015:2139-1New Packages: Gnome-SoftwareThe gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. This enhancement update adds the gnome-software packages to Scientific Linux 7. The gnome-packagekit and PackageKit packages have been upgraded to upstream version 3.14.2. and 1.0.6 respectively, which provides a number of bug fixes and enhancements over the previous versions.Scientific LinuxScientific Linux 7compat-libpackagekit-glib2-16-0.8.9-1.el7.i686.rpm9348dbcec9d9b90fc463d22661e224b9aba34279f2670ff8c082b1ae4cc2d7acPackageKit-glib-1.0.7-5.sl7.x86_64.rpme2b16719c6e6b062d23986066f16500eece71b8bc5764638db23ca65b00d7ae7PackageKit-glib-devel-1.0.7-5.sl7.i686.rpm7d6519d4be1e85fd60e5e1a4e383e1dcca4ecc43a3985aaea3d7e9077ff5817ePackageKit-browser-plugin-1.0.7-5.sl7.x86_64.rpm8132253b701f00ad9188023e9735e6b1b6657ad86de9ee6fc36e17a0434a91a6librepo-devel-1.7.16-1.el7.i686.rpm6d4a2ba40331c57c45adaa8427d6cf658888fd54d513d31189eb642482c45df4PackageKit-hif-1.0.7-5.sl7.x86_64.rpm092eaff8af3e128dc5d69d01f87265f5eff3bb4b72f4c536d05319dbc5107af7PackageKit-gtk3-module-1.0.7-5.sl7.i686.rpm294af2b4ad98d86b099b3f54d0247d9209b3456f6f5aa5d92f537bed29aac08dPackageKit-cron-1.0.7-5.sl7.x86_64.rpm596f87f0f1ea6e6c507d9ff98bff651be67c60b840cd38fc99e19f5c4564b384libhif-devel-0.2.1-2.el7.i686.rpm0055a316f9b5a4143dd6cbc385bf03fbb020237a1b66aaa088e03ab2626f16f1libappstream-glib-devel-0.3.6-1.el7.x86_64.rpm0122694e387b4228131747009cf148d8f78887e057d0be18cf7e93d55f706434librepo-devel-1.7.16-1.el7.x86_64.rpm6199ff0131b9a9a15974ba74bd7cca043e7cbdc2a741124e1820fe7edc825445libhif-0.2.1-2.el7.x86_64.rpm8a96844265041ab518378679129d89dde2db8e37c989e924a7bcd4ad95f15504libhif-devel-0.2.1-2.el7.x86_64.rpm9deaac925c40b279a97c729d96b85f026a10ec5d71b16333950b70353654120dgnome-packagekit-installer-3.14.3-5.el7.x86_64.rpm6e7c23f49dc6b404c2b867d09ebda0fca49210c6f3ccb4572972c3dbb2476d07PackageKit-yum-plugin-1.0.7-5.sl7.x86_64.rpm1fea4d3138196c395e41b98b574617ab2f1560959b131595596052704d130a7clibappstream-glib-0.3.6-1.el7.x86_64.rpma0a7c22a6ba55b08aeb62eabbbdb09d3b1218bb755761d21c391903400a5191dgnome-software-3.14.7-2.el7.x86_64.rpm748a4ec2f393cd2596a13af1fd55d66a37bce65275e4ed2d8a99082b39de4f1flibrepo-1.7.16-1.el7.x86_64.rpm19dd67c6f01e5dd8aa58caa67eaace2e433838efafd61e53c73a40f2ac3e4513PackageKit-1.0.7-5.sl7.i686.rpm91b2931ba921ccf0090405ad65e84efd4fdd37c9bb6145a56a89dba9edf278c0appstream-data-7-6.el7.noarch.rpm478e3e49e5a0e101fca1f8158be337a6e59eb8c89c9931c0f73fa45ce39523d7PackageKit-1.0.7-5.sl7.x86_64.rpm64533cab201f1a7f77bc843641742a056146f40710bd66c87283af02cf04757alibrepo-1.7.16-1.el7.i686.rpm921fedcd4d7d5224888c9403ca9d850c02bf2da49dede4b1d6a73faee5f57386libhif-0.2.1-2.el7.i686.rpm2e74d237a11d54a3f5690225db9485bc620bffbb4c09c095a7367e494179c069libappstream-glib-devel-0.3.6-1.el7.i686.rpm82531424da064527b53e69c30055c173b07ddbc6745d396dd4cbd3063cfde691gnome-packagekit-3.14.3-5.el7.x86_64.rpmd517019a5aa5e58d5713c851f32c750d17b356ea45191ea1c9eb902518194e79PackageKit-gstreamer-plugin-1.0.7-5.sl7.x86_64.rpmf8d04f9bd7309e5584d05b125124cbae707dab4080b7bbb1a1963642b9ccdad1PackageKit-glib-1.0.7-5.sl7.i686.rpmcfad4dfb5b37b3a616efe3cb9d4025eb7d1d1e95a4205cdbf3461a71eee93e68PackageKit-yum-1.0.7-5.sl7.x86_64.rpmbaedd131da758222becb70c578c50964597cffd32417ebbbe254ecae0d8f63faPackageKit-gtk3-module-1.0.7-5.sl7.x86_64.rpm7e99f83006314b3df4b3509b979af098ca9b965b1a4b933f9e6f3e42c932a070PackageKit-command-not-found-1.0.7-5.sl7.x86_64.rpm4accaa53b494055d9115af922722b6132f17696cd196e58e7cccb4527c76eafePackageKit-glib-devel-1.0.7-5.sl7.x86_64.rpm8da7e0300ad19086201cf6fb93dff694308b0b4255b1615952fc6200ef255a09libappstream-glib-0.3.6-1.el7.i686.rpm75f080505480eaa27c7d577821b0a941498b8d61057ad7915f92b6892ace8c8acompat-libpackagekit-glib2-16-0.8.9-1.el7.x86_64.rpm4c3fd6e1f53d9fba3bdec331a79c099643200b0d9b43a116340124f97b547c65gnome-packagekit-updater-3.14.3-5.el7.x86_64.rpme4d6b2d75022e2f45c8d216d2aa7698a860cb8faa5e77b9aa12081ad69e8982cSLEA-2015:2166-1Python-Six Bug Fix And Enhancement UpdateThe python-six package has been upgraded to upstream version 1.9.0, which provides a number of bug fixes and enhancements over the previous version. Also, the docker-python package requires this new version.Scientific LinuxScientific Linux 7python-six-1.9.0-2.el7.noarch.rpm75481ec3139920b648fe88b553a5a6fbcc8c38eebb8b38bc03103dc2e8e95540SLEA-2015:2167-1New Packages: HawkeyThe hawkey packages include a library providing simplified C and Python API for the libsolv library. This enhancement update adds the hawkey packages to Scientific Linux 7.Scientific LinuxScientific Linux 7hawkey-0.5.8-2.git.0.202b194.el7.i686.rpm59bf6c8268c9cffab0f95fd4b109d6c84f68a24f069bf241b440c7ed0350f5c0hawkey-devel-0.5.8-2.git.0.202b194.el7.x86_64.rpm46a30000f9c6ffee2a31d359f8200ed70ae8b1700c18107a693ecb7c30c35f52hawkey-0.5.8-2.git.0.202b194.el7.x86_64.rpmf6860e7db5033c3b4c27aa996aa754909e727165f79df6de1fe00d0b484193d0hawkey-devel-0.5.8-2.git.0.202b194.el7.i686.rpme9702ed4ee41b7d3535a2a2b7d2f0dc114968b5eb5ec9503bf2847892f412313SLEA-2015:2221-1Gstreamer1 Bug Fix And Enhancement UpdateThe gstreamer1 and gstreamer1-plugins-* packages have been upgraded to upstream version 1.4.5, which provides a number of bug fixes and enhancements over the previous version. Notably: * GstDeviceMonitor for device probing, for example, for listing all available audio or video capture devices, has been added to gstreamer1 as a replacement for GstPropertyProbe from version 0.10. * New and improved security features have been added for RTSP (Real Time Streaming Protocol), RTP (Real-time Transport Protocol), and HTTP protocols. Support for Multimedia Internet KEYing (MIKEY) has been provided to the RTSP client. In addition, Secure RTP (SRTP) can now be easily integrated in the rtpbin plug-in. * The GL library has been merged from gst-plugins-gl to gst-plugins-bad, providing a generic infrastructure for handling GL inside GStreamer. * Support for hardware codecs and special memory types has been improved with bug fixes and enhancements in various plug-ins and base classes, including the v4l2src plug-in. * A new downloadbuffer element has been implemented, which improves the buffering in playbin based applications such as Totem.Scientific LinuxScientific Linux 7gstreamer1-plugins-base-devel-docs-1.4.5-2.el7.noarch.rpm50166ba9b28c34f5dfc861d993ff0b91292b1b5212cbcf36586e3fed355224adgstreamer1-plugins-base-1.4.5-2.el7.x86_64.rpm117f4b2d51e84255ce7a96f58bf7e933a71298ca04a227c654973948b418a72dgstreamer1-plugins-base-1.4.5-2.el7.i686.rpm5ab682635d14a5376f9c57600c829d2dfe152bfee79213cb3a1377cf52c98925gstreamer1-plugins-base-devel-1.4.5-2.el7.i686.rpmdc5515cc4ee47f92e8d1723786f86a995476af2cc6477dc05925a1b18fcbda34gstreamer1-plugins-base-tools-1.4.5-2.el7.x86_64.rpm6aab4ec62e065b2f85f622f32b9b05812c3e9ad2b6d41e79b5953825afae9565gstreamer1-plugins-base-devel-1.4.5-2.el7.x86_64.rpm52abd1fcf3bea526ecc4dc748b07928af301c2d3e8a54ebf4c1ff54930ca6471SLEA-2015:2242-1New Packages: Mod_Auth_GssapiThe mod_auth_gssapi module is a Generic Security Services API (GSSAPI) authentication module for Apache. It implements an HTTP authentication protocol based on the Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO). This enhancement update adds the mod_auth_gssapi packages to Scientific Linux 7.Scientific LinuxScientific Linux 7mod_auth_gssapi-1.3.1-1.el7.x86_64.rpm77ec2d6f3d57c0adde8396b11a522f5f24b9d4776bcfb1562120668843193a8eSLEA-2015:2264-1Texlive Enhancement UpdateThe texlive packages have been updated to ensure correct operation on Power little endian and ARM 64-bit hardware architectures. This update also adds the following enhancement: * The texlive packages now support the MetaPost utility for creating graphics in scalable PostScript.Scientific LinuxScientific Linux 7texlive-tex-svn26689.3.1415926-38.el7.noarch.rpm4121a659515308781c65862fcc0d96fc76bf1f561bada27194d4cd35bff36f64SLEA-2015:2275-1New Packages: LibtimezonemapThe libtimezonemap packages contain a time zone map widget for the GTK+ toolkit. The widget displays a world map with a highlighted region representing the selected time zone, and the location can be changed by clicking the map. This enhancement update adds the libtimezonemap packages to Scientific Linux 7.Scientific LinuxScientific Linux 7libtimezonemap-0.4.4-1.el7.x86_64.rpm76bfb2acbf114067cd658e408b13a4ab08aa6de9375eba3ab095546c5da4237flibtimezonemap-devel-0.4.4-1.el7.x86_64.rpm5d281d3f529332b77179b048f128cbc583166dbb2bcef82a5ebc31993f58a422libtimezonemap-0.4.4-1.el7.i686.rpmd278444ca201b06737c2f26b1ee7ee998697a87c563592d92e41daf5741dbb20libtimezonemap-devel-0.4.4-1.el7.i686.rpm0934eb3e03088ea10dcf4eff140f664b1d4cb9d04f1432aa13f3e28d5a576dd2SLEA-2015:2281-1New Package: Python-NtplibThe python-ntplib package provides the ntplib Python module that offers a simple interface to query Network Time Protocol (NTP) servers. It also provides utility functions to translate NTP fields' values into text. This enhancement update adds the python-ntplib package to Scientific Linux 7. All users who require python-ntplib are advised to install this new package.Scientific LinuxScientific Linux 7python-ntplib-0.3.2-1.el7.noarch.rpmaea6d74cc088e00057e30b55bb4302cadb91188420d5fefc0f336273b2788b8dSLEA-2015:2292-1New Packages: LibunwindThe libunwind packages contain a C API to determine the call chain of a program. This API is necessary for compatibility with Google Performance Tools (gperftools). This enhancement update adds the libunwind packages to Scientific Linux 7. As a result, QEMU-KVM can now use the tcmalloc utility, which provides a significant performance improvement in I/O operations per second.Scientific LinuxScientific Linux 7libunwind-1.1-5.el7.x86_64.rpm9eb5e97d2e737b90018303be92f90dc90b7a68b421c112e5a7eb09ce5be4215elibunwind-devel-1.1-5.el7.i686.rpmf4a7e568a5a66178426269f350d629256be0e88de8c5a5b26d76072924797ad6libunwind-1.1-5.el7.i686.rpm70b77eaf07ee275b857385d5f3b2773b24b80b8a1eab44f3cd48196daa752f4blibunwind-devel-1.1-5.el7.x86_64.rpm61ec25e1112a5971326666355494b251eccde10bdbd50e6103b2571337a7a960SLEA-2015:2293-1New Packages: GperftoolsThe gperftools packages provide a collection of performance analysis utilities that includes a multi-threaded implementation of the malloc() function. The collection works well with threads and the Standard Template Library (STL), a heap checker, a heap profiler, and a CPU profiler. This enhancement update adds the gperftools packages to Scientific Linux 7.Scientific LinuxScientific Linux 7gperftools-2.4-7.el7.x86_64.rpmc172c4ce674ffcd7e75589bae6c68f951cf92125e53ef83aed581a6f14bcf3f9gperftools-libs-2.4-7.el7.i686.rpm692745d0205932f6b4b26ff95d9af0f4b5ce51280effb198b9940dcf3fb71d0bpprof-2.4-7.el7.noarch.rpm656a7a4bf03ebec9d53cb49e3a46b2b0d15c8ea09d4b60bab1340661cdce9b67gperftools-devel-2.4-7.el7.i686.rpme2275d23af64d4788e3f606bf6c50c8cdd1bd6303f14e97b79a2487226c398dbgperftools-devel-2.4-7.el7.x86_64.rpm808a7ad615ab19ee5de13ba551242ebbd9168e0d8ccad5b23cf4919cc7a769d7gperftools-libs-2.4-7.el7.x86_64.rpm207822e91ccecb39b52ee4edb55ae174258ae4d7a111ecccadf20cb8c8389463SLEA-2015:2296-1New Package: Python-KdcproxyThe python-kdcproxy package contains a Python 2.x Web Server Gateway Interface (WSGI) module, which serves as a proxy for KDC requests over HTTP by following the Microsoft Kerberos KDC Proxy Protocol (MS-KKDCP). This enhancement update adds the python-kdcproxy package to Scientific Linux 7. Note: If you have the python-kdcproxy package already installed on your system, such as from the Extra Packages for Enterprise Linux (EPEL) repository, you must restart the httpd service for the changes in this updated version to take effect. All users who require python-kdcproxy are advised to install this new package.Scientific LinuxScientific Linux 7python-kdcproxy-0.3.2-1.el7.noarch.rpmb81711f83c002e50efc908334b9c14ef67140c3f4be1a2aed98de497821afe92SLEA-2015:2297-1New Package: Python-CherrypyCherryPy is an object-oriented web framework based on the Python programming language. Creating web applications with CherryPy is similar to creating any other object-oriented Python utility or application. This enhancement update adds the python-cherrypy package to Scientific Linux 7. Note that python-cherrypy is only supported when used with the Ipsilon identity provider service included in the ipsilon packages. All users who require python-cherrypy are advised to install this new package.Scientific LinuxScientific Linux 7python-cherrypy-3.2.2-4.el7.noarch.rpm70c79d37785881ef9407e357171ae1c1335cee632663e6cd40b68a66dbfd83adSLEA-2015:2299-1New Package: Python-Enum34The python-enum34 package contains a module that defines two enumeration classes which can be used to define unique sets of names and values: Enum and IntEnum. The module also defines one decorator, "unique", which ensures that only unique member names are present in an enumeration. An enumeration is a set of symbolic names (members) bound to unique constant values. This enhancement update adds the python-enum34 package to Scientific Linux 7. All users who require python-enum34 are advised to install this new package.Scientific LinuxScientific Linux 7python-enum34-1.0.4-1.el7.noarch.rpmf60f61f65c66304d1e811747782fdb837c166478acbc0aafb177337567916626SLEA-2015:2301-1Bind-Dyndb-Ldap Bug Fix And Enhancement UpdateThe bind-dyndb-ldap packages have been upgraded to upstream version 8.0, which provides a number of bug fixes and enhancements over the previous version. Among others: * LDAP schema has been extended with the "UnknownRecord" attribute. As a result, unknown record types can now be stored in LDAP using generic syntax according to RFC 3597. * Pointer Record (PTR) synchronization has been improved in several ways. New PTR records now inherit the TTL value from the respective A/AAAA records. The SERVFAIL error is no longer returned to clients if A/AAAA record update succeeded but PTR record synchronization failed because of misconfiguration; such errors are now only logged. PTR record synchronization has been reworked to reduce the probability of race condition occurrences. * LDAP rename for DNS records using the MODRDN operation is now supported. Note that renaming of whole DNS zones is not supported and will lead to errors. * Data changed in LDAP while the networking connection to the server was unavailable are now refreshed properly. * Crashes caused by object class and Distinguished Name (DN) format mismatch have been fixed. * Compatibility with BIND 9.9.4 has been improved. * Documentation and schema have been fixed and improved. The doc/schema.ldif file is now properly formatted as LDIF and contains instructions for OpenLDAP and 389 Directory Server.Scientific LinuxScientific Linux 7bind-dyndb-ldap-8.0-1.el7.x86_64.rpm04561cc6006c19421b23712fb2fc90a8bbcb0adcaebcd18c998f6bd4baf2d72bSLEA-2015:2302-1New Packages: Python-SqlalchemySQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. This enhancement update adds the python-sqlalchemy packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python-sqlalchemy-0.9.8-1.el7.x86_64.rpm975d988f991995cdcc1063ae799269f81d221066c0ec67fbb7d2ae0c62035fbaSLEA-2015:2320-1New Package: Python-PlyThe python-ply package contains a straightforward Python Lex-Yacc (PLY) implementation, which provides most standard Lex-Yacc features, including support for empty productions, precedence rules, error recovery, and support for ambiguous grammars. This enhancement update adds the python-ply package to Scientific Linux 7. All users who require python-ply are advised to install this new package.Scientific LinuxScientific Linux 7python-ply-3.4-10.el7.noarch.rpm53b9b3be36b1889a2fb90b9e3fd4d2fc454dccfd1eca746ec1cb5344ada90873SLEA-2015:2331-1New Package: Python-PycparserThe python-pycparser package contains a complete parser for the C programming language and an Abstract Syntax Tree (AST) generator written in Python. The module can be easily integrated into applications that need to parse C source code. This enhancement update adds the python-pycparser package to Scientific Linux 7. All users who require python-pycparser are advised to install this new package.Scientific LinuxScientific Linux 7python-pycparser-2.14-1.el7.noarch.rpm52945ee9717bd77e370cb8bc8131755ac464b66de668d78925dc25a9e5659b22SLEA-2015:2332-1New Packages: Python-CffiThe python-cffi packages contain a foreign function interface (FFI) for Python, which provides a convenient and reliable way of calling existing C code from Python. This enhancement update adds the python-cffi packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python-cffi-doc-0.8.6-2.el7.noarch.rpm6f97d856621e90956847415221ba54a2fa999732d471d95eef2efefee6ec6648python-cffi-0.8.6-2.el7.x86_64.rpm9e10e6f7b944d7302636cd4b99499cfa7cc58478c9890ae73a6cb6cf9680e8e8SLEA-2015:2333-1New Packages: Python-CryptographyThe python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers. This enhancement update adds the python-cryptography packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python-cryptography-0.8.2-1.el7.x86_64.rpmf9a0444f09b08668952254c4d2a1e11aa8530707d1f0e43866cb25eaec9dfe56SLEA-2015:2335-1New Packages: Dleyna-ServerThe dleyna-server packages provide dLeyna-server - a service for discovering, browsing, and searching Universal Plug and Play (UPnP) and Digital Living Network Alliance (DLNA) Digital Media Servers. This enhancement update adds the dleyna-server, dleyna-connector-dbus, and dleyna-core packages to Scientific Linux 7.Scientific LinuxScientific Linux 7dleyna-connector-dbus-0.2.0-1.el7.i686.rpm2af92888b947bc4eeb8d24dfe54085d6433fe6886ecbeb45e7dbd394324a692edleyna-connector-dbus-devel-0.2.0-1.el7.x86_64.rpm02fecd6400afc3f0b39adc7e019a56fc744ac1ad965258c0ef9a0c275bad1f9cdleyna-core-0.4.0-1.el7.x86_64.rpm2a393ff54d50873ad24b202507e9fbf6a8312e69722dce4b51536c4b77de5ff7dleyna-core-devel-0.4.0-1.el7.x86_64.rpm4ca2fa1142b8e8a26be2721cf14033c1f07d2e638a0d24511788370f25787caadleyna-connector-dbus-devel-0.2.0-1.el7.i686.rpm16e636aaa643b072d87e1698302179abefdc42cf4166a09052110f0dd47450a2dleyna-core-0.4.0-1.el7.i686.rpm0d3852dca68541ef880d782da766a745a22e2903806617c4614c994cb2f52f0cdleyna-connector-dbus-0.2.0-1.el7.x86_64.rpmb99f9d87f60647704abb56f53b45b1faff271ee9c512e87cae9de375a54344b3dleyna-server-0.4.0-1.el7.i686.rpmf24d7a1a5b451c8ce6c98a02eb07636d18ffd2791ff4163969cd2faae9278e01dleyna-server-0.4.0-1.el7.x86_64.rpm306cfe4bb248413d9bd4b757023ae31717828945d18d364f93d83e94ceeb2ad2dleyna-core-devel-0.4.0-1.el7.i686.rpm43476efbc6ea82061ceb2d1ff6b365ada7aa242d921150585536b1c77c76a0d8SLEA-2015:2449-1New Packages: LibmspackThe libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft. This enhancement update adds the libmspack packages to Scientific Linux 7. As a result, it is now possible to use the Guest OS Customization functionality in VMware products that are dependent on the deployPkg plug- in of open-vm-tools.Scientific LinuxScientific Linux 7libmspack-devel-0.5-0.4.alpha.el7.x86_64.rpm7cd99c90a1bc632fbf56c00758d42827d8e1a315da2c7e78dad71d20752bc5felibmspack-0.5-0.4.alpha.el7.x86_64.rpm7262d203fe8a4bd5021b8e8a7034a0e4f90eaa0e9f285d4e93dba36d69f76aa9SLEA-2015:2453-1New Package: Python-JsonpointerThe python-jsonpointer package contains a library to resolve JavaScript Object Notation (JSON) Pointers in Python. This enhancement update adds the python-jsonpointer package to Scientific Linux 7. All users who require python-jsonpointer are advised to install this new package.Scientific LinuxScientific Linux 7python-jsonpointer-1.9-2.el7.noarch.rpm1019b6ebf0a5747ee17596caf0e58c5daa8291a66a2c844a673477ddb24a9eb5SLEA-2016:0154-1Tzdata Enhancement UpdateThe tzdata packages have been upgraded to upstream version 2016a, which provides a number of bug fixes and enhancements over the previous version, notably: * Prior to this update, an incorrect assumption was made about the daylight saving time (DST) in the America/Cayman time zone this year, which was reflected in the code. The mentioned time zone will not have DST this year. To the previous change has been reverted. * The Asia/Chita time zone switches from +0800 to +0900 on 2016-03-27 at 02:00. This change has been implemented. * The DST predictions for the Asia/Tehran time zone for the year 2038 and later are now March 21 00:00 to September 21 00:00. This premise has been implemented. This update also fixes the following bug: * Starting from 2027, the Java timezone generation tool would incorrectly calculate the Africa/Casablanca time transitions. This bug has been fixed, and the tool will calculate these transitions correctly. In addition, this update adds the following enhancement: * At present, in Scientific Linux 6, the /etc/localtime file is not preserved across package updates even when it is a symbolic link. This tzdata version contains preparatory work to support preserving /etc/localtime across package upgrades if it is a symbolic link. Currently, this change is inactive, and the time zone must still be configured through /etc/sysconfig/clock. The change will be supported by a future glibc update.Scientific LinuxScientific Linux 7tzdata-2016a-1.el7.noarch.rpmd1b6d5fadb3e0842dd6955e5f9e33716f964c7136be9f55496aa4d5ca31bca69tzdata-java-2016a-1.el7.noarch.rpmeb9583ff25f6ec9d4285857f0f7b995d30f8541328368074abb5a0248f22868aSLEA-2016:0463-1TzdataThe tzdata packages have been upgraded to upstream version 2016b, which provides a number of enhancements over the previous version, notably: * This update introduces a number of new time zones for several regions in the Russian Federation, which will switch time on 2016-03-27 at 02:00 local time: - The Europe/Astrakhan time zone for Astrakhan Oblast, which will switch from UTC +03 to +04. - The Europe/Ulyanovsk time zone for Ulyanovsk Oblast, which will likely switch from UTC +03 to +04. - The Asia/Barnaul time zone for Altai Krai and Altai Republic, which will likely switch from UTC +06 to +07. * This update takes into account that the Asia/Sakhalin time zone will switch from UTC +10 to +11 on 2016-03-27 at 02:00 local time. * This update takes into account that Haiti will not observe the Daylight Saving Time (DST) in 2016. * This update takes into account that Palestine's spring-forward transition will happen on 2016-03-26 at 01:00 local time, not 00:00.Scientific LinuxScientific Linux 7tzdata-java-2016b-1.el7.noarch.rpme38f3509f2f10f201126525265302c312d403e9214325716c3d8908683a8faf3tzdata-2016b-1.el7.noarch.rpmfab59d2d39b8c68485b23355fb690453ea2ab684dc97172604ae69d3c3480e50SLEA-2016:0517-1TzdataThis update adds the following enhancement: * This update takes into account that Azerbaijan will no longer observe Daylight Saving Time (DST), and that Chile changes from permanent DST to seasonal DST.Scientific LinuxScientific Linux 7tzdata-2016c-1.el7.noarch.rpm5ca6662996c7558b5daeb3966193fcacaccb1c0fd4996bffaf7d4d5219a306cdtzdata-java-2016c-1.el7.noarch.rpmdd29c99b84508c3e37ada374c44e723b9b806b94d2005edce0fc8835a6ac47adSLEA-2016:0683-1TzdataThis update adds the following enhancements: * Asia/Magadan will switch from UTC+10 to UTC+11 on April 24, 2016 at 02:00. * America/Caracas will switch from UTC-0430 to UTC-04 on May 01, 2016 at 02:30. * New zone Asia/Tomsk, split off from Asia/Novosibirsk. It covers Tomsk Oblast, Russia, which will switch from UTC+06 to UTC+07 on May 29, 2016 at 02:00.Scientific LinuxScientific Linux 7tzdata-java-2016d-1.el7.noarch.rpmb2d1af29776f2186da9e34e6e2fdc71fa4bc56b9d8fb1bb794444ac2b55c69e3tzdata-2016d-1.el7.noarch.rpma49f76844b0779508f3df16dbdac7aeda20542264547478a6a4073d1eb9c6abfSLEA-2016:1982-1Tzdata Enhancement UpdateThe tzdata packages have been upgraded to upstream version 2016g, which provides a number of enhancements over the previous version, notably: * This update takes into account that Turkey will not transition out of the DST (+03) time zone on 2016-10-30. * A new leap second will be added on 2016-12-31 23:59:60 UTC, as specified in the IERS Bulletin C 52.Scientific LinuxScientific Linux 7tzdata-java-2016g-2.el7.noarch.rpm694a9bdb4e0e3fde537be730a323da172ed43a07548f70803a73a201012d71aftzdata-2016g-2.el7.noarch.rpm30151827b816cb0af8dfe951c238b4ef2e2b33cda358353c0de5ab0da10414bbSLEA-2016:2053-1New Packages: Kmod-Qed, Kmod-QedeThe kmod-qed packages contain the QLogic FastLinQ 4xxxx Core Module. The kmod-qede packages contain the QLogic FastLinQ 4xxxx Ethernet Driver, which adds official support for the qede devices. The PCI IDs supported by these packages are 1077:1634, 1077:1636, 1077:1644, 1077:1654, 1077:1656, 1077:1664, 1077:1666. The kernel modules delivered by this erratum have been made available as part of the Red Hat Driver Update Program, which provides updated kernel modules that add support for selected devices in advance of the next Scientific Linux minor update release. We strongly recommend that these kernel modules be only used when it is necessary to enable the specific hardware mentioned in this erratum. Partners and customers should continue to use the driver that is shipped in the latest Red Hat Enterprise Linux kernel for all other devices that require this driver.Scientific LinuxScientific Linux 7kmod-qede-8.7.1.20-1.el7_2.x86_64.rpm02b24a34f7e1438ebbfe621ed4e1c2d5b976aa7664e789d1ed639d724f37fbc5kmod-qed-firmware-8.7.1.20-1.el7_2.x86_64.rpm399aca7f7c5b161f2f11f32725e36fe763382017538b28db6e8a86e45c2dcd1ekmod-qed-8.7.1.20-1.el7_2.x86_64.rpm3ae4237cbbd46a57423510277cc202e2af43650a81791ccfe0bc990f5a6054f5SLEA-2016:2154-1Supermin Bug Fix And Enhancement UpdateSupermin packages provide a tool for building supermin appliances. Supermin appliances are tiny appliances, usually around 100 KB in size, which get fully instantiated on-the-fly in a fraction of a second when a user need to boot one of them.Scientific LinuxScientific Linux 7supermin5-5.1.16-4.el7.x86_64.rpm24536f92d99613b5f4dbb1ae809d07ef8aeb15faea3da92ec9ddd9ee96d769ddsupermin5-devel-5.1.16-4.el7.x86_64.rpm3b79361aedbb99a4471a8712856dbe45538ae9fd4b290adda14b81b0f60df791SLEA-2016:2158-1Anaconda Bug Fix And Enhancement UpdateThe anaconda packages contain parts of the Anaconda installation program that allows reconfiguration and advanced installation options.Scientific LinuxScientific Linux 7anaconda-widgets-devel-21.48.22.93-1.sl7.x86_64.rpmfbaac78620e30591feb6afc2ae8cbef6c00c0c5c4f7d60731d0b586719b9f6d3anaconda-21.48.22.93-1.sl7.x86_64.rpm010e2d9fb411e9ebd091376b6e7e32875a760f1cbfe85011f19b68b24bafb36danaconda-core-21.48.22.93-1.sl7.x86_64.rpm4365a6057e0504ec95c071392c9023aeda4645efb7fab5b1b2b4252e4c0cfb46anaconda-tui-21.48.22.93-1.sl7.x86_64.rpm90b612245c820fe4a5b0a6090e8a57dd5bbea699cc28132794a3110de829150fanaconda-widgets-21.48.22.93-1.sl7.x86_64.rpm0309de9f22893ae027263af58738d550c7fc82dd2c80eb0aaf3e01517a8fc9d5anaconda-gui-21.48.22.93-1.sl7.x86_64.rpmcc8e315cc524c2cfb2ac6c13536c8382a2a8ca07289c611dfa6d528a396d7e21anaconda-dracut-21.48.22.93-1.sl7.x86_64.rpme554315124d8b74fb6113f5d5ecbc4b1cd97f89809b3c121d36dabbd187fcac5SLEA-2016:2266-1New Packages: Python-JwcryptoThe python-nss package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards. This update adds the python-jwcrypto packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python-jwcrypto-0.2.1-1.el7.noarch.rpm417092a578e07c32ede756e1be49573e7d95a4a79d884e333cb65fd5411b3e14SLEA-2016:2275-1Libsepol Bug Fix And Enhancement UpdateThe libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings).Scientific LinuxScientific Linux 7libsepol-devel-2.5-6.el7.x86_64.rpm20521c9d8101064b6ad03161af2f097376c4f57beb1c183697dabdb30176a466libsepol-devel-2.5-6.el7.i686.rpm0c2ba74e82081611aa781465bfe1a1f8ffec261ab3b5e95ea4038600f3af72b0libsepol-2.5-6.el7.i686.rpm3769cd7f52014b4dcf237f68d3c6c3f633c155bed2c77d39e7b7dc155ce1dc84libsepol-static-2.5-6.el7.x86_64.rpmc002e016071f777818691bcb5ddcffa41970bbb9d993f75911e8eb8d37bfea30libsepol-2.5-6.el7.x86_64.rpm7cfdc35f20f1370aebc966f4117dde13973e823c5fa1fd4c9a91e5ed7fcbfa18libsepol-static-2.5-6.el7.i686.rpmaad0ff598e4c0db3c22346931c529ca30e3486d2d5bf0ee9138de432b5558891SLEA-2016:2277-1Libsemanage Bug Fix And Enhancement UpdateThe libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings.Scientific LinuxScientific Linux 7libsemanage-2.5-4.el7.i686.rpm85e1f07c9ff907d55a356300babd6a185a4e3ec88a4c62e11a948ee90d8f4a83libsemanage-devel-2.5-4.el7.x86_64.rpm6686f2b93cc7ec8d89a3c515a0e9829b2d6c396279606cf69815a4cb36d8b27clibsemanage-devel-2.5-4.el7.i686.rpm9fba3f5f4932e4e75c04f49dda22a6fc75fbe7a5640a99d6d32dc188602c639dlibsemanage-python-2.5-4.el7.x86_64.rpm62844290e4dbec4b5623959a533a2c3256efec9f3b13e723b3eafe5de0862705libsemanage-2.5-4.el7.x86_64.rpm1fb1d00ab82aeb3d1afba63bb86900eb12fabb2a746638e366aade98117a06aflibsemanage-static-2.5-4.el7.i686.rpmc2d75c95f59a2bb967233b9cd2a3b7dfa71cb0c47f2b3270025e764fe5563fc9libsemanage-static-2.5-4.el7.x86_64.rpmfc5811fb9553c327a2442a765a91e1ad3b2fa18a1c38d25aff864c48ab44eca8SLEA-2016:2278-1Setools Enhancement UpdateSETools is a collection of graphical applications, command-line utilities, and libraries used for SELinux policy analysis.Scientific LinuxScientific Linux 7setools-libs-3.3.8-1.1.el7.i686.rpm7aa6910b59b13b91175edd90bcdc409bacd0fb3087a1283b3e1ee67ec52fa6aesetools-gui-3.3.8-1.1.el7.x86_64.rpma9032c3749dbce9983b033baf93c57c638350dd8ba671affb46352c21e843f2esetools-console-3.3.8-1.1.el7.x86_64.rpmfbf8dd7bf8cf7942a40ac291e7c556d490893edad81f50fa37c1929d70d7aeb1setools-libs-3.3.8-1.1.el7.x86_64.rpm61fd7863e14728d070e1c1bc0aa38e687c8e766714bc6f3c306bad3dce98e187setools-devel-3.3.8-1.1.el7.x86_64.rpm4230919a025c650e548a71139e06a58b0f2eb514e1b213a27f7ef83ff596ca5esetools-3.3.8-1.1.el7.x86_64.rpme2716e6fcd05dddecbadd553777fa8873646244bf8efb8be870ae80de617eb5bsetools-devel-3.3.8-1.1.el7.i686.rpm0e9c6f0dea816044577126f9ee754dfd8a1234f30e996da28952c6e8c3b40a47setools-libs-tcl-3.3.8-1.1.el7.x86_64.rpm9a26bf524117bd174abf7e363865558ebb5d0fab148d4fba15da245889903cd7SLEA-2016:2281-1Checkpolicy Bug Fix And Enhancement UpdateThe checkpolicy packages contain checkpolicy, the policy compiler for Security-Enhanced Linux (SELinux). The checkpolicy utility is required for building SELinux policies.Scientific LinuxScientific Linux 7checkpolicy-2.5-4.el7.x86_64.rpm7d4337ea5e79aa11a7ac0f06c68b01fd77d9f7066814058cb962d085dbeaa424SLEA-2016:2287-1New Packages: CustodiaThe custodia packages provide a service to manage and distribute secrets for Identity Management (IdM). This update adds the custodia packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python-custodia-0.1.0-4.el7.noarch.rpm2ce8d27559fd8a6ca6f9972b59238c1bee621f47eccbe51a6406c0869904873acustodia-0.1.0-4.el7.noarch.rpm0cbca1ee3b0164b5ed0dbc6db5b2666a9dd10c0a4f5c12a6802764c25f14ae5cSLEA-2016:2288-1New Packages: Python-GssapiThe python-gssapi packages provide a generic security services API (GSSAPI) that is compatible with Python 2 and 3. Identity Management (IdM) uses these packages as a replacement for python-krbV and python- pykerberos, which only support Python 2 This update adds the python-gssapi packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python-gssapi-1.2.0-2.el7.x86_64.rpm8d2e8950d5756517632bbf4a7cab7c567dbc011b3ab6f6bf83202e9ef43182b2SLEA-2016:2308-1New Packages: Python-IdnaThe python-idna packages provide a library to support the Internationalised Domain Names in Applications (IDNA) protocol as specified in RFC 5891 This update adds the python-idna packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python-idna-2.0-1.el7.noarch.rpmfebf6179011674ab519bb434af3ee87787da41a929e0a36e7d1d671e137ee483SLEA-2016:2309-1Rdma Stack Bug Fix And Enhancement UpdateNew libvma packages are now available for Scientific Linux 7. Scientific Linux includes a collection of Infiniband and iWARP utilities, libraries, and development packages for writing applications that use Remote Direct Memory Access (RDMA) technology.Scientific LinuxScientific Linux 7rdma-7.3_4.7_rc2-5.el7.noarch.rpm5de394a19fb4799e1c324d84a7bef1dcc2df4ae616ce36ddc47059232adc18f0SLEA-2016:2315-1Python-Pyasn1 Bug Fix UpdateThe python-pyasn1 package provides an implementation of ASN.1 types (concrete syntax) and codecs (transfer syntax) for the Python programming language.Scientific LinuxScientific Linux 7python2-pyasn1-0.1.9-7.el7.noarch.rpm155553bab82f6ede5178ea75b85b9f6b220d81ff6955e98e9bbe0bf45af374c7python2-pyasn1-modules-0.1.9-7.el7.noarch.rpm977b450f31ecd674ba7e71248e64633fc4a2646faeb47b4a280c701c9a92a2cdSLEA-2016:2317-1Linux-Firmware Bug Fix And Enhancement UpdateThe linux-firmware packages contain all of the firmware files that are required by various devices to operate.Scientific LinuxScientific Linux 7iwl135-firmware-18.168.6.1-49.el7.noarch.rpm5df5ec51e036b1ed282e5a8f1e3f9a1be438070ab7629b42b3e1ba0c56184889iwl6050-firmware-41.28.5.1-49.el7.noarch.rpme7bfc5530ecf9e21d1404b4db1a2db3c47bda3719080c9989162e999c46aab20iwl6000g2b-firmware-17.168.5.2-49.el7.noarch.rpm0c85a35a7fe665872f82c15a90ace56d5c3ba0e2352e16e49e882735bf9ffa29iwl2030-firmware-18.168.6.1-49.el7.noarch.rpm967e5b0604163b9e8e686652f5d15d9ab856e81f25f6deeec29706a31ddee363iwl6000g2a-firmware-17.168.5.3-49.el7.noarch.rpm6aa1fde5cab712b5c349cf74dee394e07347c973501bb699f5dce19d31c9ce4fiwl6000-firmware-9.221.4.1-49.el7.noarch.rpm89c0995c438a6ee6897d28186a13eb6686f832fc991723430d2103808d043e9ciwl2000-firmware-18.168.6.1-49.el7.noarch.rpm2a44d72fc4d44b150fcc97436225204666b7e619d631bb8649c6b40a947f6a66iwl1000-firmware-39.31.5.1-49.el7.noarch.rpm66afeb795b24d506564ea4af7e5eb29adec4527dada49c41ddc1b74985a6343diwl105-firmware-18.168.6.1-49.el7.noarch.rpm71057d48747f816e8da707503e4af17d836838c06cfa132367a1824b2a503d93iwl3160-firmware-22.0.7.0-49.el7.noarch.rpm5bb93aadafef592eb2c9fa3db2ef026033a058da4adfa2a7104ddc023f5cfc4aiwl7260-firmware-22.0.7.0-49.el7.noarch.rpm01e378a794a33b683608e86567afab394b3fadce34b331821ef973ae2c7a5f97iwl7265-firmware-22.0.7.0-49.el7.noarch.rpm4300d0ede7bcec6ae75bc8c734823ffe41922a78abd1f628c0a07b34fd3bab19iwl3945-firmware-15.32.2.9-49.el7.noarch.rpm4591b44cc235f8975a0b3e1dd20b251ce2dae440fb9e5855529c7d666f2911e3iwl100-firmware-39.31.5.1-49.el7.noarch.rpmc9cd2da425384c1bd2128f6388eba53d3896daf0a3b79e33bee0f3b70afe52d6iwl4965-firmware-228.61.2.24-49.el7.noarch.rpm0f864957f8a7efb1d7968961ba036a58bb4237ae44d29409cdda4fd06beeda0elinux-firmware-20160830-49.git7534e19.el7.noarch.rpm6b3b5dd0e7f00d54e6f54d9b2c0d9706e77356689856814611750041e51c6150iwl5000-firmware-8.83.5.1_1-49.el7.noarch.rpm4759169ee9babc68b84719b487f787b630059c77c07424c5fdca437717512d4diwl5150-firmware-8.24.2.2-49.el7.noarch.rpm2ece6b4b4a6abf68a98c9f88ec124ff589af4faf27258723b0b89140e0179bcbSLEA-2016:2371-1Python-Cryptography And Python-Cffi Bug Fix And Enhancement UpdateThe python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers. The python-cffi packages contain a foreign function interface (FFI) for Python, which provides a convenient and reliable way of calling existing C code from Python.Scientific LinuxScientific Linux 7python-cffi-1.6.0-5.el7.x86_64.rpmab6dbc5a2a98ee04df5736cf02e041308aa8e120982ec9e34bc593b1550eca51python-cffi-doc-1.6.0-5.el7.noarch.rpm0efd745003d1748a55ca139323f4809ee5e1c0f405c7806a7edaab29252c494cpython2-cryptography-1.3.1-3.el7.x86_64.rpmc06c26234d705d491feb56764aeecf55b1c9be08c1b1ae0d2adc3393691bbb6aSLEA-2016:2375-1Bind-Dyndb-Ldap Bug Fix And Enhancement UpdateThe dynamic Lightweight Directory Access Protocol (LDAP) back end is a plug-in for BIND that provides back-end capabilities for LDAP databases. It features support for dynamic updates and internal caching that helps to reduce the load on LDAP servers.Scientific LinuxScientific Linux 7bind-dyndb-ldap-10.0-5.el7.x86_64.rpmbaf4659d5770dadb38b44fe41f271b0ae81f12d6b82e5872f7aa63e59a9441c6SLEA-2016:2429-1New Packages: Copy-Jdk-ConfigsThe copy-jdk-configs packages provide a utility script to transfer JDK configuration files between updates or for archiving. This update adds the copy-jdk-configs packages to Scientific Linux 7.Scientific LinuxScientific Linux 7copy-jdk-configs-1.2-1.el7.noarch.rpm69e7fb5531256b03d18f82e04ec8960ba4528597527074184f4526937b081fe9SLEA-2016:2455-1Libecap Bug Fix And Enhancement UpdateThe libecap packages contain the libecap library, which implements eCAP API in C++. eCAP API in C++ is a software interface that allows a network application, such as an HTTP proxy or an ICAP server, to outsource content analysis and adaptation to a loadable module.Scientific LinuxScientific Linux 7libecap-1.0.0-1.el7.x86_64.rpma60d3bf4e48de66c750cbda98c6144c9907bddc257a06bfbff7774ff567aa29blibecap-devel-1.0.0-1.el7.x86_64.rpm9019f4788196aa3176958aa8d52cd6224c3178f527f53d26548bfd0908829b87libecap-1.0.0-1.el7.i686.rpm5ac9589331ffd8015f5f0a6e99e2e479192c180e1567c27dd250b592f9f27bb1libecap-devel-1.0.0-1.el7.i686.rpmdf93b3df4b434722b12cdd06d9db494722d5d432a3b31fd526a94c861e4db9e5SLEA-2016:2476-1Sssd Bug Fix And Enhancement UpdateThe System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.Scientific LinuxScientific Linux 7libsss_autofs-1.14.0-43.el7.i686.rpmfbab7f943e212ecde74ca393f503d6edcb9ba7e03ec6d801b1a5777cf1e2da6bsssd-libwbclient-devel-1.14.0-43.el7.i686.rpm2dd5389a4b0141da4dfb752322e6c0063d3cceb206f3623972828cd939692027sssd-proxy-1.14.0-43.el7.x86_64.rpmf3def88c7f7c8cfbf9c6197155993d205d2554ab4688c5b5eb0e503c462bd77clibsss_autofs-1.14.0-43.el7.x86_64.rpm21b1d4dc4efc5f9d98eb696f5c58d9b880c64c0ee1c5755f678754b24dfb59a0sssd-common-pac-1.14.0-43.el7.x86_64.rpm6fd4d535b7e05cb4a051c988311930443718201383f82bf57b9b83973e4ca11blibsss_simpleifp-1.14.0-43.el7.x86_64.rpmb5c09635b97d547f800a322526a45b0b0e5e1a5a70a7439695b75feea8029aa4libsss_simpleifp-devel-1.14.0-43.el7.x86_64.rpmf36007d578cc8c6138e66b5efc48afaab492623bd6ecb5e1dab9c8ed52d0dcafpython-sssdconfig-1.14.0-43.el7.noarch.rpmfcebd6e61f673b18ed0f2726f5a1285b2ba52fde399af11db24729d6520a2053libipa_hbac-1.14.0-43.el7.i686.rpmc4f4796e8a29cf206b5cee6e408f4ce162fd06f1b97a0219c4c56531cdd30862python-libsss_nss_idmap-1.14.0-43.el7.x86_64.rpmcfcc100474ce30d7e176286498febb4360023de922950c67f91b7ce4d884b116sssd-ldap-1.14.0-43.el7.x86_64.rpma9b2db0df75431664b5886cd05cf9514501ddb8fe47cac353b3b01361f584012sssd-libwbclient-devel-1.14.0-43.el7.x86_64.rpm96db3f5e94307fcf49d050bbdbd5be68b713764d2c6004f0852bb2a823275a37sssd-libwbclient-1.14.0-43.el7.i686.rpm83be01c52132318d9102de341d0904b4602f358b4471fe841c0784290e0a9c4asssd-client-1.14.0-43.el7.x86_64.rpm359784a262c7f3efce4a79c64761c37e494a1a8301f038abe7fc94142a6e6dadsssd-krb5-common-1.14.0-43.el7.i686.rpme9f80d2a1027b2bec91410c61537d937f277d0898f07b5788ed38f93b0508b0dlibsss_nss_idmap-devel-1.14.0-43.el7.i686.rpm0c013bdb144cf75716276c6ecc4a859546a723437cb0906915271e735ce8cf24sssd-ipa-1.14.0-43.el7.x86_64.rpme0fbc6623eba8820d528ff386e6af4668d2e344a372067cf2a7c18c235f800f7sssd-1.14.0-43.el7.x86_64.rpmd5a79207d5e14b9311efffba568365515a991f928ad08d51ab16195937a8eeaelibsss_simpleifp-1.14.0-43.el7.i686.rpm4710f24498cf7b83e5497d013cb7d177168d259a816dda8685b08f1e2cd10ce6libsss_sudo-1.14.0-43.el7.i686.rpm291fb7a076b539240a8a64dbbc5ce09cad0c4bcaa48527d7e935e7d2418708a7libipa_hbac-devel-1.14.0-43.el7.x86_64.rpm77296d1f41479b80521429d276921269e9dc978870ddc3dd677764d9f1278a92sssd-krb5-1.14.0-43.el7.x86_64.rpm19558f18c6829c300e203aaa0857b74af40d3681be759b284a97cfa019b4cdd5sssd-krb5-common-1.14.0-43.el7.x86_64.rpm98d6ab733aba70d3276899071796a2f841725128e4cd3267ea2e7bbd3f32a79dsssd-ad-1.14.0-43.el7.x86_64.rpma467b3cbd528ae6c7596dda7f8be3ad261f879013ad41ff2a7235a8674055239libsss_nss_idmap-1.14.0-43.el7.i686.rpm762eb8456f7cb39853c4d286c163cd3e12988c08d78cb2fa08629ac3e859cb73libipa_hbac-devel-1.14.0-43.el7.i686.rpma87d0b79728644fe365c858c0c4455f6a8c554684b0791a39a8308f24f24f21esssd-common-1.14.0-43.el7.x86_64.rpm99d2d580ca0b85f0b5ef3509e561486080856e31c6f4855a9f41661392a26c39sssd-tools-1.14.0-43.el7.x86_64.rpm27851044de0b89bdcff0bd37f64608e98d5813ee7415b231826eefb39b761b30libsss_idmap-devel-1.14.0-43.el7.i686.rpm982060a96a581a3208b4f3f269ba5958399c827253adce880e966d113d6bb9a1python-sss-murmur-1.14.0-43.el7.x86_64.rpm6c51736ce02f0fc8094059bae54e26cb15cbf372960bcee65bcbfde706b8b492python-libipa_hbac-1.14.0-43.el7.x86_64.rpm0808c4db06094bccf2f6a291e0b10888f094e365d07c62b724eadb1690e48691python-sss-1.14.0-43.el7.x86_64.rpm56b3934b4a98de928d3dcd5f09ca70a90013aa86c7a95ed3d2c03f30defa6d12libipa_hbac-1.14.0-43.el7.x86_64.rpm54f173a067e17fc2c6f4cf9e9e303edd3690852ecef4a3b93511327b438ec304sssd-polkit-rules-1.14.0-43.el7.x86_64.rpm33961e4cc28a06bd7740ddd550c77fe3cbd75300d1c58eebdbfa4a80ca578f18sssd-common-1.14.0-43.el7.i686.rpmccdf512a8660413d7664cbd79ea23c8d1d87a5991587bd55ee977e81cc1c0aa2libsss_sudo-1.14.0-43.el7.x86_64.rpma34bd2c7c6b4797cc7eb70a845a4dbc79216de697935f9af7f4d9284870119f1libsss_idmap-1.14.0-43.el7.x86_64.rpm2a0a52bfbdad44a48aa2e31317333a424beac04fc78249307c3951a181ff0d83sssd-libwbclient-1.14.0-43.el7.x86_64.rpm6f7f76874a1c1eb67dea2f8b72eadd05d5536a0d8dfa55075f1ce8defd8ebfeclibsss_nss_idmap-1.14.0-43.el7.x86_64.rpmf8057ae1aa07c983a83802eeec8e76861bdbf94f23b24880ea07904850cba79alibsss_nss_idmap-devel-1.14.0-43.el7.x86_64.rpm9ca7c3187d4c90b358b23faae1642ada75fae88a0c029f9bdb4ff4e638e14223libsss_idmap-devel-1.14.0-43.el7.x86_64.rpm2bfa7dfcbce4dc7287c25bec5170fc779a7834e29049f1de7a3587c361885c2dlibsss_idmap-1.14.0-43.el7.i686.rpma55f55f8020bdeace5f72dc2368a688d975b417df4bf0c00796181dd69d53505sssd-winbind-idmap-1.14.0-43.el7.x86_64.rpmcfbe7221b4e5c08e532af82661ca91c047a28884c21390a4f441f4e45a2a4265libsss_simpleifp-devel-1.14.0-43.el7.i686.rpmbfe3e6a2962f8c573b96f5299f652c37e349e7724c3a82558bae183f37f26fa6sssd-client-1.14.0-43.el7.i686.rpm21db77faa42f6242e6ac706a5750aa81b0736dabb7f064c255e6283ed93a03fasssd-dbus-1.14.0-43.el7.x86_64.rpmdeca238d335191885d70e053cb7bf3044a7c8dfb53b76453b826d67e320f9134SLEA-2016:2480-1Ding-Libs Bug Fix UpdateThe ding-libs packages contain a set of libraries used by the System Security Services Daemon (SSSD) as well as other projects, and provide functions to manipulate file system path names (libpath_utils), a hash table to manage storage and access time properties (libdhash), a data type to collect data in a hierarchical structure (libcollection), a dynamically growing, reference-counted array (libref_array), and a library to process configuration files in initialization format (INI) into a library collection data structure (libini_config).Scientific LinuxScientific Linux 7libdhash-0.4.3-27.el7.i686.rpm098acabec03af9e79daafbb0466b499c2ff96e0b0629bf45bb55f525f4f1bb4clibbasicobjects-0.1.1-27.el7.i686.rpm0139d332d6cacb123cc2fb2cd5c6b045770baf2d520879c0e413f829f11b1905libref_array-0.1.5-27.el7.i686.rpmc50e99ba95df5d8088cbc70adfc21c1a2b114fe9ad18d0376f37f83ec29f4395libdhash-devel-0.4.3-27.el7.i686.rpm3cd6e7e3b85178336dd1299feacdc2846489e99fff411c3f087c7026eb6ca938libbasicobjects-0.1.1-27.el7.x86_64.rpm4bd12cede502d58d4e813ef707f42bd69c46dca3c560a24c270fb06657ce8cb3libref_array-devel-0.1.5-27.el7.i686.rpm673978478a633fb4759563bfe1fb1f4a03795f164b768cbd8e712098a3a8c3d3libcollection-0.6.2-27.el7.x86_64.rpm6ba902e9e3d86d0d00e6738a3bcfb64f22b28cad169119a610657bdca99a2508libcollection-devel-0.6.2-27.el7.x86_64.rpm78aabc6c50331c144133cf53eb5e7b4c1c0ff42f485c657071b1d9651637b7e8libpath_utils-devel-0.2.1-27.el7.i686.rpm6cd15d073ef45c642583ee02afb1480d2bba070514332b19dea042616adc0421libdhash-0.4.3-27.el7.x86_64.rpm8abcef83b694fb95a912d37c1b8adb9bfca361d8e89263e44e9dcb0e6794aac0libcollection-0.6.2-27.el7.i686.rpm9739455f6ca16e4adc9664d232b022466c277a04614ffc2718b29623a814fe7elibini_config-1.3.0-27.el7.i686.rpm5e713ea7050c85bdce97edf80de15dc34f6628438242fa60588798e205864c6blibref_array-devel-0.1.5-27.el7.x86_64.rpm73afebbf855e7f613d44d140e1fe28efd63cedca165d840cd476cd18cb573dc9libini_config-devel-1.3.0-27.el7.x86_64.rpm1c5a6d8c1213957a8e1cfc6c0fed07b251f23ced9d1e91cd938720d7947f512flibcollection-devel-0.6.2-27.el7.i686.rpma621ec9ac3c2d73edbe6feb60947ba445a1ceae2e81fc19a5eaeca3bbd69fcbblibbasicobjects-devel-0.1.1-27.el7.i686.rpmd999c0c2badee315f465e28ef28319bc16f5e88310a0797267e763efe7cc096dlibdhash-devel-0.4.3-27.el7.x86_64.rpm6180c5023e898034b37efb97ee2d47aed0cdf13fe62be17b01670de03728c716libini_config-devel-1.3.0-27.el7.i686.rpm70bfb0a216b568900857793ffabc6b45579b5f2bed5bd8836463133cb5bcc9d1libbasicobjects-devel-0.1.1-27.el7.x86_64.rpm60d0187b72d346e471e600bbe24a067258f5715419b2b21452f910fabcd6dbcelibpath_utils-0.2.1-27.el7.x86_64.rpm2421769f99fb2457776900f294fec8dc3a2fecc003a834da23d88dda7b629b57libpath_utils-0.2.1-27.el7.i686.rpm858da316f498590acb19f5ec7ebf5cc8ac095a9a260bba7d0abe2ca8d350acf1libini_config-1.3.0-27.el7.x86_64.rpm64a59ee1edf62ab0c50f24b0e41babdd6987ec7b149646613111c6bf7d2237a2libpath_utils-devel-0.2.1-27.el7.x86_64.rpm9bc2ce6feedeabc3a30ddc77e6d6ebc9d0d1255e597387f1601bdecd77c3b10flibref_array-0.1.5-27.el7.x86_64.rpm79cd150ef9965fdf70373c8518081054ff42b5ad2710ee6fa6a0db1334614a77SLEA-2016:2495-1Pciutils Bug Fix And Enhancement UpdateThe pciutils packages provide various utilities for inspecting and manipulating devices connected to the PCI bus.Scientific LinuxScientific Linux 7pciutils-devel-3.5.1-1.el7.x86_64.rpma19de6079f6a64c8c7a0acd1959354ec10fdaa9da46754f34fccdfe70ed48932pciutils-devel-static-3.5.1-1.el7.i686.rpm8b6802d6ca054680018acd7127a41f2ecf581259bd1fee9ed5dd33172f74871fpciutils-libs-3.5.1-1.el7.x86_64.rpmcb624ffc7e062a21c12fbdcc477abda2dbe98bbfc34f2a3fddebb14cc589513apciutils-3.5.1-1.el7.x86_64.rpma5353df28610f5e4ec94f77a26dcf7a9150fcfd789b5eb53b4a3f675f67f44e2pciutils-devel-static-3.5.1-1.el7.x86_64.rpmb2a3a30407d18fdcc9484a340ab30c7729a2ee71fe5bcd734e8b8ef9ae39ea35pciutils-libs-3.5.1-1.el7.i686.rpm1d641da4d32f099c7e2e808a7c5eddfc8718bdfe10e79b5cf968c7895663032cpciutils-devel-3.5.1-1.el7.i686.rpm75d80640cc78873356d94756d63fb0e4d9238b5cf05bb4e73fd1158a258adee6SLEA-2016:2517-1Python-Urlgrabber Bug Fix UpdateThe python-urlgrabber package provides a high-level cross-protocol url- grabber for the Python programming language. The url-grabber allows Python scripts to fetch data using the HTTP and FTP protocols, as well as from a local file system.Scientific LinuxScientific Linux 7python-urlgrabber-3.10-8.el7.noarch.rpm2c5a6b9f899df456b64a1a404f5fb3aedba2e350a725be3b575799b0eee6fb63SLEA-2016:2832-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated as follows: * The Saratov region of Russia will transition from UTC+03 to UTC+04 on 2016-12-04, resulting in a new time zone Europe/Saratov.Scientific LinuxScientific Linux 7tzdata-java-2016j-1.el7.noarch.rpm0cd13356c72d1b545a8224ca3bc02cd15a839c8f413dc08bcaa8302c96da2c7atzdata-2016j-1.el7.noarch.rpm9c102631c626277847fb8718a7ec0aa2744a43d542caa8276f343a42376c9531SLEA-2017:0460-1Nspr, Nss-Util, And Nss Bug Fix And Enhancement UpdateThe following packages have been updated to the latest upstream versions: nspr (4.13.1), nss-util (3.28.2), nss (3.28.2). This provides a number of bug fixes and enhancements over the previous versions. Notable enhancements include: * The NSPR and NSS-UTIL libraries now provide new utility functions. In addition, the libraries have received a variety of bug fixes, including several thread safety problems. * The Next Protocol Negotiation (NPN) extension in NSS has been replaced by the Application-Layer Protocol Negotiation (ALPN) extension. * NSS now supports the Finite Field Diffie-Hellman Ephemeral Parameters (FFDHE) negotiation.Scientific LinuxScientific Linux 7nss-sysinit-3.28.2-1.6.el7_3.x86_64.rpm8797b182e8616aede791f61737eb30aeb78bd7622ab58c73ce19f64c89c3fb54nss-util-3.28.2-1.1.el7_3.i686.rpmd99ccebb61e69ef3d6bee6200e3343b3885c5ceb18975d006f88822573bb6219nss-pkcs11-devel-3.28.2-1.6.el7_3.x86_64.rpm57cc55cb917446a838bb243a2c53b0e9183b5d50ed83a7af02fe8c1db147cf0fnss-util-3.28.2-1.1.el7_3.x86_64.rpmfe55e27d249849944d499983d6040c248df7b6e34c64903a813ac258a9efcfcdnss-pkcs11-devel-3.28.2-1.6.el7_3.i686.rpmfde60fc326a8c47150d5300383b56467292f713b596279170f040081100001cbnss-util-devel-3.28.2-1.1.el7_3.x86_64.rpm26abdbfb8bfdf5ef344b04c2cdb14949893f789b9187e125f23b460e15bc3a41nss-devel-3.28.2-1.6.el7_3.x86_64.rpm55d57bff753161dd3667680e1a43d6c057144b90cbb52347d7f0e781e0c8c6d8nspr-4.13.1-1.0.el7_3.i686.rpm76fe09e6e808fef8c300870a609ae25a7c241622f3a51f73c6bcf08fc64b63a5nspr-4.13.1-1.0.el7_3.x86_64.rpm3c93f030aa7e3d2c9ef0eba88ef611f4a1689c4b8901b131ebb16b4f658d07e1nss-tools-3.28.2-1.6.el7_3.x86_64.rpma44d06ad9a57a0add259dc9da65d4f616cd95ca604b88de30b007c6d721bb24fnspr-devel-4.13.1-1.0.el7_3.i686.rpm13d1674e0ceae896f31c9370f52ff8319e48c40fbe69bc25dedd5185a1022b1fnss-3.28.2-1.6.el7_3.i686.rpm50c9adc5bef2c3cec5b4292e6eb7bedc8c162f967528e3a6690c0572e6d53d25nss-devel-3.28.2-1.6.el7_3.i686.rpmae51deb6b36df9df98e7f2056342db3ad0e03bc842d4d4c03e3530ba8dd30ccfnss-3.28.2-1.6.el7_3.x86_64.rpm133bda80c37fc25b60a513031081d50f05ea34c3fb27780441c018ab25fe32f2nspr-devel-4.13.1-1.0.el7_3.x86_64.rpmf91ed4928e1dc6004a2e6a6f3126a7c02642bd5c8b2dec6a4b7b0d7b7bd5eeacnss-util-devel-3.28.2-1.1.el7_3.i686.rpm9ffa719f7de6b798655bff1126bd3c77c79bbf4bc316931caefe7efd7c712ffcSLEA-2017:1938-1Gnome-Common, Autoconf-Archive Enhancement UpdateScientific LinuxScientific Linux 7gnome-common-3.18.0-1.el7.noarch.rpm702f6c5545fc986b2044fa804eb5be3d4768da112e39f1b850391aad07f7150eautoconf-archive-2017.03.21-1.el7.noarch.rpm60c0626b835e46678fc8160a16b2fe91ffee8a36097e698dddf322a5456d5848SLEA-2017:1940-1Yelp-Tools, Mallard-Rng Enhancement UpdateScientific LinuxScientific Linux 7mallard-rng-1.0.2-1.el7.noarch.rpmdac43d4a420b81aab823be82e7d98a84b87a7a69837b0e53ada75ae0e78fec02SLEA-2017:1946-1Libtalloc Bug Fix UpdateScientific LinuxScientific Linux 7libtalloc-devel-2.1.9-1.el7.x86_64.rpmb3cf509b7106e841cecd51724fa89aad390ea5a2ca679f2082e7ccccf57cd43dpytalloc-2.1.9-1.el7.i686.rpm748dc51aafd6f90208e601975935a02076adcfe8c40d73723bde583e96981651libtalloc-2.1.9-1.el7.x86_64.rpm54d551d2ef7255c423393cb709f9e7a903a63d9dd6bbfb9f713ce62960d54ff0libtalloc-devel-2.1.9-1.el7.i686.rpme7d6a39c91720a0f64cfd5d5ebb6e65bc9b246500cd45e1f5f4dfd15fece4ecdpytalloc-2.1.9-1.el7.x86_64.rpm39e1a43b0f7b789b08780da66a917509a1d5bf47c03567ef474aa33a11d40e0fpytalloc-devel-2.1.9-1.el7.x86_64.rpm724f0bca7fd88a9d54dea094397a66fc6977d8d8a84c083de1acbb1fce65478elibtalloc-2.1.9-1.el7.i686.rpme0d1ea5410e81aac8da07ae928e8c0567a48a6731df1efa787a8b4a83f757c92pytalloc-devel-2.1.9-1.el7.i686.rpmf7f182471ad7b4d1bb1e4fb2fa072f95eb883fbaff7686e0812f9f321981e8ddSLEA-2017:1947-1Libtevent Bug Fix UpdateScientific LinuxScientific Linux 7libtevent-0.9.31-1.el7.x86_64.rpmb70420c3c455ce0905e0625ecc78e299d2a27ab2bfd3bfaec96d8cf1f54063a1libtevent-devel-0.9.31-1.el7.i686.rpmdc94c5b9ad90d5ef78c050e723a5610a48b7eebcfd44acaeb2f36095e7bd3f6apython-tevent-0.9.31-1.el7.x86_64.rpma59ef00f928f0f2a53c9c819f5ad7534990021d4ccf66659096c9aca75b1c0a1libtevent-devel-0.9.31-1.el7.x86_64.rpm365bc96ef3bdd9e5f87aca151907b0d09e0c20e60c04aa0d1e5d6c69e80a92b7libtevent-0.9.31-1.el7.i686.rpm90e3c502a221627688ccb938c24cc32acd6df1be4ae5ae39a19d3b741b49706aSLEA-2017:1948-1Libtdb Bug Fix UpdateScientific LinuxScientific Linux 7python-tdb-1.3.12-2.el7.x86_64.rpmfb4e602acd4e0bef7c89f2d42ed5180e6d69be4cb77a60d3dbb71ef875ab7ef9python-tdb-1.3.12-2.el7.i686.rpm41e1eb80a525958cc9f6744e1a0a61fbbc6095515390fb009705373dbdad8a24tdb-tools-1.3.12-2.el7.x86_64.rpm8a0d839259ce12c40d3fd3fd1ad7be2b1c8885a51b9783ed0df1ff6a7e074ad7libtdb-devel-1.3.12-2.el7.x86_64.rpm629f4ca8a865ae6b8b8558f53efd83ef482797101452720e935a50e56cf17b9flibtdb-1.3.12-2.el7.x86_64.rpma777dc194db46b9900439906a4fda5a08f43592458ac77d0f0f3994290e80332libtdb-devel-1.3.12-2.el7.i686.rpmbd0ddb3f1cdd377ad6263122bb66fe5af370f745e49d11b4f6d98ac0ad3dc0f7libtdb-1.3.12-2.el7.i686.rpm0af73ffa6611695831a95c69643e2b9849250f31c3a551077fe5d10e75692d1fSLEA-2017:1949-1Libldb Bug Fix UpdateScientific LinuxScientific Linux 7libldb-1.1.29-1.el7.x86_64.rpm69cb1784c5a32eb0e14ce322b4405f5d253a4999f643b2a9e955b8d2f3b5c10dpyldb-devel-1.1.29-1.el7.i686.rpm01954de797945fc048d8557aca98a41fcb5eaf6bb09fad3df2094d795b1dc0bfpyldb-1.1.29-1.el7.x86_64.rpm4122261089a23ec0c944174d29ceba75601de87c7e03d5a401b4f9affe4587bdpyldb-devel-1.1.29-1.el7.x86_64.rpm5c38bb198dd900702bba37ea1f38a8baf56d543a22aecb72a2437d64246ee3eelibldb-devel-1.1.29-1.el7.i686.rpm783f8d49534886d1a6b899208c820f7a3210f809ca91495aee0942032743992alibldb-1.1.29-1.el7.i686.rpm6f96cd00c29a8ead672729f89498b2b913b83293350dfc69dc5a162012164f7bpyldb-1.1.29-1.el7.i686.rpm443fb09c3bea7affa5d0443c5552b39627462742ef36cc23489bb6687458aa10libldb-devel-1.1.29-1.el7.x86_64.rpm8f4d75aac60884ec7fe4fe9f70486c37841e503816b9cf04613f83f6c29b458dldb-tools-1.1.29-1.el7.x86_64.rpm24a5817f6965eb6dfeb552922798fa819e3149d1bc9a53a90974de90483f7427SLEA-2017:1977-1Nss Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7nss-3.28.4-8.el7.i686.rpm4ceecc4a0759a4f6776643b58c7d9e43e34e267f0de9d41b4208a008082afb89nss-devel-3.28.4-8.el7.i686.rpm99f7dab2b2620fc3c938a5b3e81fc529161a40d9991ea69bc54a692729dedf7cnss-util-3.28.4-3.el7.i686.rpm17a33f9e6461b03b1929fe5c058ae8eb86695983cf929d035a699703a5181597nss-pkcs11-devel-3.28.4-8.el7.x86_64.rpm859e47e3024d8d13a033339aedc4bc63294622e3e4ad5dfa3d308dbb7c27343fnss-devel-3.28.4-8.el7.x86_64.rpme41935e9e3b5b8bffcf41142406e01cd4ccd72de0702f2c207593bb8118cccebnss-softokn-freebl-3.28.3-6.el7.x86_64.rpm1651d922c1e33d7460505b9f5e14ac82a26cd1ddbe8d364157bc80e6d41639bdnss-util-3.28.4-3.el7.x86_64.rpmd7296d0efa0c9ffd7b49857180e7cb09c178f24d8f2276c740234165befa58eenss-3.28.4-8.el7.x86_64.rpm8b597323f5c1eb4958ec1727013900bea970fa31e3be50179f343ca1bd1cd494nss-softokn-3.28.3-6.el7.x86_64.rpm1a7e03493b41ae027d804aa34146f6f0023b39797dbc77135f66a22c42ebfce7nss-pem-1.0.3-4.el7.x86_64.rpm0a43845e85059e0589555c830e451c054fb9a4e98011d9985d4391f37e65371fnss-tools-3.28.4-8.el7.x86_64.rpm97cbff9f71c21dad4b6f5f0c8a7fa686def62d475b481b2fe5b20ec380427454nss-util-devel-3.28.4-3.el7.x86_64.rpmbe279a36338db0df02a7c33558432cf12485ea6d4a44feeb6840c3a01a8f8a0fnss-softokn-freebl-3.28.3-6.el7.i686.rpmfcec52f9e01a916ef04dded0bb4f015635191a2216dd0c7a71c95f3e2b6018b1nss-pkcs11-devel-3.28.4-8.el7.i686.rpm3decf5cc9ee3e6ca560d8f0118b784cb5ec2d97cdd90a043794319abc5516e2bnss-util-devel-3.28.4-3.el7.i686.rpm632a013c447ea92bcf799a2c39804148460dbefdccee37a55bb462072771f2acnss-softokn-freebl-devel-3.28.3-6.el7.x86_64.rpm32b4a248ce1b843d5ae00602c0d0f9d0548cafdf3fdc8de286305e2e368ad2f3nss-softokn-freebl-devel-3.28.3-6.el7.i686.rpmc490e18bb43ec569fcac6bcda6f63027965c1c2dd209147824f3f110d25655b3nss-pem-1.0.3-4.el7.i686.rpm4caa7a29148aebe88bcfd7e1265fd9305e0609dfc529a40d725bcb56c76ca03enss-softokn-devel-3.28.3-6.el7.x86_64.rpm180425152b2c56fb7f0718d5c01d0ff298ae03ec9b27920c3e224398b3ef57a4nss-softokn-3.28.3-6.el7.i686.rpme8d296e02813d24ed640ae87665a10fc7828146b5c0919937aa42116a67ac530nss-softokn-devel-3.28.3-6.el7.i686.rpmc2a0795c792b67061443ecfcfa5b74dde0706fcd728cf557001dd12714c0afa0nss-sysinit-3.28.4-8.el7.x86_64.rpmea78c2cfd9032f3c5f5ab7e83e2093614e8c4e61adfc5f078e82b826f37550c6SLEA-2017:1981-1P11-Kit Bug Fix UpdateScientific LinuxScientific Linux 7p11-kit-devel-0.23.5-3.el7.i686.rpm5cd13449e20a9c18cf2e37126c9ad175f825547ba73f00d63776eb528e8e6912p11-kit-0.23.5-3.el7.x86_64.rpm8dc8739a4cda3c1b626585a7afa75a3860618937fbab1d2fdbc01429cc0b4b7fp11-kit-trust-0.23.5-3.el7.x86_64.rpm52caa07848cb5d26e3d997ac3fa9e5b6da457a426f43f920dc8798e68e0da1c6p11-kit-doc-0.23.5-3.el7.noarch.rpm0ad65f7fceff613d3556808dac0909592cc9561246408de76a708dac14787151p11-kit-devel-0.23.5-3.el7.x86_64.rpm434badbaad17e5d827a9c90f636a3c2ba783d00d74448c19f97e55e2437e47c0p11-kit-0.23.5-3.el7.i686.rpm1ba7b67a554d8e58594171bbc6e13ca4253012f44b6af5aaf81f36dae506985fSLEA-2017:2025-1New Packages: Perl-Perl4-CorelibsScientific LinuxScientific Linux 7perl-Perl4-CoreLibs-0.003-7.el7.noarch.rpm9f0a3e5bff2cc81cd1c4d088d374f6e8fa6b7ce460891cb25c8953ef5264b2aeSLEA-2017:2059-1Clutter And Cogl Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7cogl-devel-1.22.2-1.el7.i686.rpmb99ce326ea0948ae2dfc0d12c6196959b4f74736cbe35973856a62052e021ebaclutter-gtk-1.8.2-1.el7.i686.rpmfcd8199b11463dba1e698add4e900374c886ac4f9072572b2f8097d68507aa9cclutter-devel-1.26.0-1.el7.x86_64.rpm0a09102218c284a331a61658653d467b2c7b5a131a1062d30b70db6eefdc2843clutter-1.26.0-1.el7.x86_64.rpm2ebfbcb7823c86dae26c741afad31471da0b939a381cf61820642781154c0adaclutter-tests-1.26.0-1.el7.x86_64.rpma8388d5380543b1f41648ed0fa190d01bf9439a71fabb77d1033797a7b4f1ab1cogl-1.22.2-1.el7.i686.rpm3f4d39e6987fa83d64b04b50e8f9edbf12817f38d0cd9adaeb7f14662bfd43caclutter-devel-1.26.0-1.el7.i686.rpm62ff98f2724abc06caeab7ad19e67dd4c586022147bb4ba8515d6b561b754175cogl-devel-1.22.2-1.el7.x86_64.rpmcd31c99a996faca2d2417987b2901985d852f40aeb7e018bdd95b13a91b24a66cogl-tests-1.22.2-1.el7.x86_64.rpm19958c51ed90327e5ea132d74457cf65271c71e76f87cb2e52393e922881ba04clutter-gtk-1.8.2-1.el7.x86_64.rpmf7fe8e32b461cbb8b64afdfe866018bb503ca9a0074d93b41191dcf72ba9da5cclutter-doc-1.26.0-1.el7.x86_64.rpm52bf9f40409fd80c0b802694f41aa51a52c64e233925933738ca72cb3b74c6a7clutter-1.26.0-1.el7.i686.rpm6bf62067b29d7f406f9aadf4685e459944ee9e04b3efe0ffa6320e41928c9621cogl-1.22.2-1.el7.x86_64.rpm5e6c756c6d84e0754cc9573db343a8f93b60ea384806555f7a714f55741e90d5clutter-gtk-devel-1.8.2-1.el7.i686.rpm442e9ef2e130c845e2749ce14c8f9bd448bc2abbf48129394df79e30b25051feclutter-gtk-devel-1.8.2-1.el7.x86_64.rpmf3a09c1d2c38d459b4ba9971240e1f48447f103104a624bb4e978733aeb1954fcogl-doc-1.22.2-1.el7.noarch.rpmc5bfdbff43ada694e36281dde9b3e98dcdcf951424a679bc9d3165a05e63fcb7SLEA-2017:2071-1Mod_Auth_Gssapi Bug Fix UpdateScientific LinuxScientific Linux 7mod_auth_gssapi-1.5.1-2.el7.x86_64.rpmc9fc776267cf9add294c7473a32b2ca91afc57b93e71aed622a91f1c95c064afSLEA-2017:2074-1Libvirt-Glib Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libvirt-gconfig-1.0.0-1.el7.x86_64.rpm2d253c334cf4e42bac1d61e5e3d47035adc9ee4e5bc52affa6f8f10401fc51e1libvirt-glib-1.0.0-1.el7.x86_64.rpmfc35c4004deb85c95f917b6473c477881d78cbb44e9bcce51c1698ca2ec7d9dclibvirt-gconfig-devel-1.0.0-1.el7.x86_64.rpmc93f2b5db9b10d6b05d3fe446c6ba841b35da3000d914c4aae5c853c1b3b1763libvirt-gobject-devel-1.0.0-1.el7.i686.rpmaec39cd218ffeae59ad56b3ba46c65d007665c0f2cd11a120b7f2a45f8bd003alibvirt-gobject-devel-1.0.0-1.el7.x86_64.rpm544dc8aff9da52f98c9fe11e6f6d0ff0f47f62a94f25cad46a760eef24f821a6libvirt-gobject-1.0.0-1.el7.x86_64.rpmf85428717d387c66729f0e10f3cc572f0d8641f3eba33765c977d0d511585c79libvirt-gconfig-1.0.0-1.el7.i686.rpmd7160bdd0d89d4d7348df12fcc4e000c48c28b5e992bf0e02aa25b2548d4b3a4libvirt-glib-devel-1.0.0-1.el7.i686.rpm22a102fb63e123e6382812aff53ea467c1b46530cd224118928b54f243f45230libvirt-gobject-1.0.0-1.el7.i686.rpmf791ee526ca5b26edaa489e15e5ed54f4e4ba30907910787fa061019e2bf4973libvirt-glib-devel-1.0.0-1.el7.x86_64.rpma5d4511da12d90e7ffd206da92c2c12065cffbe03f180aaa2ba1a9bbd46e8e00libvirt-glib-1.0.0-1.el7.i686.rpm5c095b900ccc9ee1ed48d79998f1bc55af41e1a392fb3b73f2d318361392b93elibvirt-gconfig-devel-1.0.0-1.el7.i686.rpm8dac780b6e66edc55f281e64087e3af9b7e23e699d56a6dca2b1b2c060378d38SLEA-2017:2111-1Pcre2 Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7pcre2-10.23-2.el7.x86_64.rpm128b278845aa8e34e278460b7005b550d2784c72a85e76f45ddb5a67a72d1e98pcre2-devel-10.23-2.el7.x86_64.rpm617075c0a37f1e575d1f7d51e1754c4d1d4de31975832d415bc3d61b82416f59pcre2-static-10.23-2.el7.i686.rpmc5804cef24478a4258a69b9d96e9eb4de8a2456703a9e782046cdec244e39ea7pcre2-utf16-10.23-2.el7.i686.rpmc36d2d0763a8a36f0c5b1521247316b429135d4b63b47401faca984274c468cepcre2-utf32-10.23-2.el7.i686.rpmfdb1da51566d1ec25c9d3984b3caa9ec630a20052a7a8284b7cdd41211630a91pcre2-10.23-2.el7.i686.rpm70d23c4f7de6bb23ce6f552e3a9402ae67e78d700066efc67555e363ef587371pcre2-devel-10.23-2.el7.i686.rpmd77423e4c10a7a235be1455bfe41d7cda355ad3f7131a0d0f3a59ee1f36c2e60pcre2-utf16-10.23-2.el7.x86_64.rpmacefda3c890b0ad2c4278668494b2c3373ebb4bd1150c40870be47266fc3165cpcre2-utf32-10.23-2.el7.x86_64.rpm6602592a905d87d3f82b746cb00d680f49c341c76bccd47b039fb8276a039d9fpcre2-static-10.23-2.el7.x86_64.rpm1b41bdfeef372d07ace107fb8ff54d83592c347d3af5f47d5d748090e5f025bepcre2-tools-10.23-2.el7.x86_64.rpm22af5caccfa6ab9adce0fa986bfe7fbe7da3ff29fe6494f2355f1acde7352834SLEA-2017:2115-1Mod_Lookup_Identity Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7mod_lookup_identity-1.0.0-1.el7.x86_64.rpm8c4ec310fb56416a6a3840fa0d551715c42a684b245ef1ce651e368a799b74aeSLEA-2017:2122-1Python-Cryptography Bug Fix UpdateScientific LinuxScientific Linux 7python2-cryptography-1.7.2-1.el7.x86_64.rpm3b6eeba3ebb53720f3f0ce82a3690136196b2020b30737e0b03f05785e5404d5SLEA-2017:2123-1Desktop-File-Utils Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7desktop-file-utils-0.23-1.el7.x86_64.rpmf6e84e905b6b0d59926b73431955f0af7b1a38a58fc7df1defa9f3a4eab3696bSLEA-2017:2125-1File-Roller Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7file-roller-nautilus-3.22.3-1.el7.x86_64.rpm5fe6903917523147f3085d4f3f80a7a895f83d74881cd4ef462e05f820aff075file-roller-3.22.3-1.el7.x86_64.rpm388eb1303de475a1e06e35705ee67d3ab0bacdf0c8a420fe1b948ab25e65cc93SLEA-2017:2131-1Gedit Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7gedit-devel-3.22.0-3.el7.x86_64.rpm85c96d97d7f0d5b43c8bed2641d89a25c93370826650f7588add9f4a41e7431clibpeas-loader-python-1.20.0-1.el7.i686.rpm207a85a064b1a77055f484ad18e2c4bea5b736e2ae716cb025d1aa0dabac2a87gedit-plugin-multiedit-3.22.0-1.el7.x86_64.rpm6d52b35ef2fba97f86683c467a5c58ff66b77d9ea40e8332e57f41d8ff840bedgedit-plugin-colorschemer-3.22.0-1.el7.x86_64.rpmc49aa8d48ecb0769a602dda437bb9a84bf215b0c73abc9721f27e2bca3ed9e0clibpeas-devel-1.20.0-1.el7.x86_64.rpme24cc55a79155f5e2f229fa4313c733543cb32a4109991a90bc30c591fbb9ad3gtksourceview3-devel-3.22.2-1.el7.x86_64.rpm781abad3210d9dd7015595bec94aaaac0c00ceb26c933c6b4b4236374b2155bcgedit-plugin-codecomment-3.22.0-1.el7.x86_64.rpme7921d487d1784135b4321f0c198c9eae20aa55edd58341d573505c3b62f84f3gedit-plugin-synctex-3.22.0-1.el7.x86_64.rpmfa32cd5586aeef5493366414fb2da225b067ffdad1cce63bf2abe1e2dca0df39gspell-doc-1.2.3-1.el7.noarch.rpm90735a24dcfb4d8cf6782ea525770783f868152248dd550468a6106427fe62ddgedit-3.22.0-3.el7.i686.rpmf30e0d38c026e786af5c1916289de26fdf9e8c5052e706a174a3e6024050e31bgedit-plugins-3.22.0-1.el7.x86_64.rpme768d4a5905156eb81ea09356848618d4401696506cd4288048decc63e9afbdagedit-plugin-wordcompletion-3.22.0-1.el7.x86_64.rpmc3c4453801e3a4298b2d096ffa6d984c4c1163b37dff1cedde5641cecb8b6910gtksourceview3-tests-3.22.2-1.el7.x86_64.rpm71363ff4833a5fe9fd389f8d1525b8ec214bcba2ea12ad70fd967eb30b7ade08libpeas-gtk-1.20.0-1.el7.i686.rpm0004c8489f7bc1eb90f2ddfae1f079272a92b123e17020fb237da9ac842b70f9gedit-plugin-textsize-3.22.0-1.el7.x86_64.rpm4284e8fd8ba819951637ac8a8e0df8940253332d9c84c56d47952eb349e51672gspell-devel-1.2.3-1.el7.i686.rpm78ab86638b8242d32aa30263dd9fdbd4f4e1c2903960bd9cfc372f2ce0cbcad1gtksourceview3-3.22.2-1.el7.x86_64.rpmb4b358be6045ecd433ed8ef58663a9fdac0113986334cfaab750b7edcbd56de1gedit-plugin-charmap-3.22.0-1.el7.x86_64.rpm312c61322c31133ccda44097f57daea44325cffb104f12bacca0ad7091f5f62egedit-plugin-bookmarks-3.22.0-1.el7.x86_64.rpm0b2f55435574cf2088bc29ae7c02f115aed349dbf52e57acd5a3f6cb7d17dea1libpeas-gtk-1.20.0-1.el7.x86_64.rpmbec2035f8a3910cef0508388ea4edf97a9aa39d1c5a06e2ef14e23e932efa355gspell-1.2.3-1.el7.i686.rpm448571f5cef0886be8097df2e45d3b23b308c8d24a5e2d36ad0c066c001de808gtksourceview3-devel-3.22.2-1.el7.i686.rpm55b573215aa005ed7020fb9bbb87fe4e21b7e06ebfb74c3539c19c0af4e06f9agspell-devel-1.2.3-1.el7.x86_64.rpmc1b5ab81c7378afbc19295694dcff9feecf45f2ef6bdf960881399144c119035gedit-plugin-terminal-3.22.0-1.el7.x86_64.rpm1a146ca15d22ede328130a82c13d645d60b7a89c0dcb3d5a44d11203eaf91247libpeas-loader-python-1.20.0-1.el7.x86_64.rpm68e6b8915bcaaff800491f1a0aadc4e0a60dd792ce195a958c3445ac87ee39f8gedit-plugin-colorpicker-3.22.0-1.el7.x86_64.rpme6b004f16e01b132871865b7c29fb6ecfbcb86d40f397ea76bd80e83e9e49ba2libpeas-devel-1.20.0-1.el7.i686.rpme703589f0daf12c7de94a18b19f75d005653d90049b21e2bfb87b555c4e79a76gedit-3.22.0-3.el7.x86_64.rpm7d7a367769d521188f28ba465119124d54fe62145ade1957f5a4bde40cddcd1egspell-1.2.3-1.el7.x86_64.rpm666914996ef8066fc3ffcc18c5d0ae3bc31c187308a333559efbdd7ba8cd9ab1gedit-plugin-findinfiles-3.22.0-1.el7.x86_64.rpmbe1ccd8e6fd25f2969f62bafec27c515fe1fd02059b068819b8dc3d3140cdea2gedit-plugin-commander-3.22.0-1.el7.x86_64.rpm93cd8bbd57a9e6d40e060514d1463984f93c5b14822c335d7d15ee47794d94cagtksourceview3-3.22.2-1.el7.i686.rpm35cf5d4c7b34d098fb4bfbc8bca3d92a0bd492014088e2d4dc05222792ecaa7dgedit-devel-3.22.0-3.el7.i686.rpm9d6e1bb30c3557e6ce0c969b68f0f38cac801a43482e4fa352d2003c5eeaef67gedit-plugin-bracketcompletion-3.22.0-1.el7.x86_64.rpm41e2981f21d2fb9cb4551bfcfa668962ec2d1c1b89554cbbb2dcebf69fb76226gedit-plugin-joinlines-3.22.0-1.el7.x86_64.rpm5d57afe891994042cd5800906d33d4beb1fee0ed7b710503454b25c29f57f277gedit-plugins-data-3.22.0-1.el7.x86_64.rpmdf282ec6835b93d33dcc1ffe01673b6635fb07f16a76b7e8fb4013ae9cb0b810gedit-plugin-smartspaces-3.22.0-1.el7.x86_64.rpmac174da8df76efd6135da66596debb5502e8bfffb18e54e36d24ef1d00b6e240libpeas-1.20.0-1.el7.i686.rpm8276da87d36a53b13812b0b16b04bce65e91099de8bf9822f5a9d7d94bccf087gedit-plugin-drawspaces-3.22.0-1.el7.x86_64.rpm2016f66d11685d6d46f92f0066dcbddc92f32d7590ed5c9d7447cf29fb248ca5libpeas-1.20.0-1.el7.x86_64.rpm824380040cc7e45c5c540efa7a02b16d4a0af53674a9dcd068270b916d2a27d6SLEA-2017:2133-1Gnome-Weather Bug Fix UpdateScientific LinuxScientific Linux 7gnome-weather-3.20.2-1.el7.noarch.rpmdd1a79a0e5effffad3c2e0cefb160e08bf81e4393eecc4a405157ab5005eb968libgweather-devel-3.20.4-1.el7.i686.rpm8c972c49013ca8006ce27810137bf51919905625cfebf7a0979c268b9233d661libgweather-devel-3.20.4-1.el7.x86_64.rpmfb6fb97b0f8fce06bcfff19ed1fcfbba9292a98d667c8db6ae902be0850e3d2flibgweather-3.20.4-1.el7.i686.rpm110e670c7d403fcdafc5f609b9108e075e9def0602fb30f963a18e281198f0b5gnome-weather-tests-3.20.2-1.el7.noarch.rpm2474976ccf2fdd06521c67e6601a1c349813e0a2faf50bc3fec8c1b0bd7a72f1libgweather-3.20.4-1.el7.x86_64.rpmbf21245359843bcb960b71b40157bc907747d1bf7fed6c52d6a2e0f32357719fSLEA-2017:2140-1Gnome-Packagekit Bug Fix UpdateScientific LinuxScientific Linux 7gnome-packagekit-installer-3.22.1-2.el7.x86_64.rpmbc90912ccfa333336e98ebbf8b6d7b37edd86ef5f9266ce49bfcd0029213b229gnome-packagekit-3.22.1-2.el7.x86_64.rpm30c179f570e4c341a3407a254aac8d437a08a8e6b7b13cb1ff76c2dd0e89ef3cgnome-packagekit-common-3.22.1-2.el7.x86_64.rpm933a8b65dab8f355ac7960f60921be7e196b98e8d13fa5e5e972c62758a30d7fgnome-packagekit-updater-3.22.1-2.el7.x86_64.rpmbaa0dab5f509323b07f15fd9c1ec1249453854146c084ab8ab68c59afebe2ebaSLEA-2017:2141-1Gnome-Screenshot Bug Fix UpdateScientific LinuxScientific Linux 7gnome-screenshot-3.22.0-1.el7.x86_64.rpm91692e7fbcda789edc034fc1b6a42340fdefde6623fc720a5432b32fe6add4feSLEA-2017:2142-1Devhelp Bug Fix UpdateScientific LinuxScientific Linux 7devhelp-libs-3.22.0-1.el7.x86_64.rpm3fe41f1f752dd16c0312a9f83535091f2f00da012da9b5dc57974ab7aad25f55devhelp-libs-3.22.0-1.el7.i686.rpm59da2452f8812da30e4121675768aa7481a9e9ecd4d44c4f0ac145bfb84773c7devhelp-3.22.0-1.el7.x86_64.rpm0ecf0ba2ddda7b1c9c93e1a7dfe5b51b574d44bfbb7637213cb774753c64b46edevhelp-devel-3.22.0-1.el7.x86_64.rpm535a697d308f6d95ce5a4340d89095e0c0b8409b5a0e6c6fa084fefef3534606devhelp-devel-3.22.0-1.el7.i686.rpm9d3518077fcd96cd6f6034d942abef3d92b02910805d47342119a22842a7b3a7devhelp-3.22.0-1.el7.i686.rpm579708b4c64f5205b4860f2dd0f52b6291dd341e2030be5eaa1cf3538bf4efe8SLEA-2017:2146-1Libsoup Bug Fix UpdateScientific LinuxScientific Linux 7libsoup-devel-2.56.0-3.el7.i686.rpm09b55995b95d3b1ef84659b82557c5a55743416ac926b10fd15f1c83fb6b11dblibsoup-2.56.0-3.el7.i686.rpmbc559cf8baaa56557b63e93dd7148f489a6694604dded32b317e8d30dcc3fe03libsoup-2.56.0-3.el7.x86_64.rpmd0c168223802f30273b21423e5e9425830b20667855c31060d9960dd80fd2e03libsoup-devel-2.56.0-3.el7.x86_64.rpm7fb36f925a30481a1f871bc02d4aad1856c9d0651deb071f6583c66de68c5c98SLEA-2017:2148-1Gnome-Color-Manager Bug Fix UpdateScientific LinuxScientific Linux 7gnome-color-manager-3.22.2-1.el7.i686.rpmf1d70383a31e834c765d6f62f34e01669de0c0a0c81429ab25ba3d7fc15d7a63gnome-color-manager-3.22.2-1.el7.x86_64.rpm12faf052007b17c8f756838058dbf8a14a0d2d3e57d0ab2a3fc44f53eb0f35fdSLEA-2017:2149-1Gjs, Gobject-Introspection, Pygobject3 Enhancement UpdateScientific LinuxScientific Linux 7gobject-introspection-1.50.0-1.el7.x86_64.rpmb3db3914e6a9655f78075ba6e0ce0c53b047dade766eb80b430ececd06afd0a6gjs-devel-1.46.0-1.el7.i686.rpm8a279edb05d4ecbdf0c0fb527b2e449547570bef7d580125bf96109066b26ca7gjs-1.46.0-1.el7.x86_64.rpmb249a5c65f330914c2b930d06af57084de6136b7da3cbadfcdd054351d36fd6egjs-1.46.0-1.el7.i686.rpm01d947892beca65a0ecd1dcf75287e940588c34a1a9a5b0a3ee7019f6acd455egobject-introspection-1.50.0-1.el7.i686.rpm4fdff810f0877ce575fce5925a1be45ba74df31aa8f6cfdb744e11d66a8ec952python-gobject-3.22.0-1.el7.x86_64.rpmdb3391ba13ae56a63c149a853343ca0cc8e3c5157659ac198f93c856544b1985python-gobject-base-3.22.0-1.el7.x86_64.rpmc56d62313fda2eb6637f5ba4c0f224f2152472b1332556fe14c316f8b74d47e9pygobject3-devel-3.22.0-1.el7.x86_64.rpmc166d77bf33800fad99b994085c7c014628e2c0df4a6e1d3ad68b36509621112gjs-devel-1.46.0-1.el7.x86_64.rpmab933e53844ee9cd9b07df2cd7d3c23280c587b5db6f7c85fd263e70282e77bcgobject-introspection-devel-1.50.0-1.el7.x86_64.rpm178baafdd66f29e262984c423aea1fc7110aa34a14cc897a8928454fa03cea24SLEA-2017:2150-1Gnome-Backgrounds Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7gnome-backgrounds-3.22.1-1.el7.noarch.rpme888c125c01cf27d6daf728c1f655f3e1e10f10721521f5354a3c7ee97d005f0SLEA-2017:2152-1Gnome-Devel-Docs, Gnome-Getting-Started-Docs, Gnome-User-Docs UpdateScientific LinuxScientific Linux 7gnome-getting-started-docs-ru-3.22.0-1.el7.noarch.rpmae6242febe1c89c2beb706d032976868b3c554d507e43211e4d28ebaf31ad0bcgnome-getting-started-docs-es-3.22.0-1.el7.noarch.rpmc4dad7ea10a932a1dab69d3112a2a6935fc834790af7be3035feccf72d65e27egnome-getting-started-docs-cs-3.22.0-1.el7.noarch.rpmb2ce908dd04e08a20bc77c86412c3e11588eb235b374405542251048b5b1e4b5gnome-getting-started-docs-gl-3.22.0-1.el7.noarch.rpm8817dab201f666d926eb3272f6badec23d0711c7980f2c4e5b1e61de4cbf2716gnome-getting-started-docs-de-3.22.0-1.el7.noarch.rpmaccc50d1b6b3641cdc42a1f179ac2e05b5765ce368d01172474afa882c231d8cgnome-getting-started-docs-hu-3.22.0-1.el7.noarch.rpm10606bf631ecfb848bd802346cf5af97c011d85f0a176f4c0e1a56bd161dd327gnome-devel-docs-3.22.1-1.el7.noarch.rpm178a364a397869a86766661f0b2f948e183fd5eb922c517ac426db18a8445191gnome-getting-started-docs-pt_BR-3.22.0-1.el7.noarch.rpm98dd5906df54add0fb0537738212568b6fc004d3aa7cb0be8e3f88f4cf06358cgnome-user-docs-3.22.0-1.el7.noarch.rpm39e16143af5eecf7187dc4cc9246c4427273fc2ab494d3ab7e47c49e9ddf5024gnome-getting-started-docs-fr-3.22.0-1.el7.noarch.rpm6cc54e53453c51758a6e6df193f1310585a8dccd97ce076886ce55ffab902648gnome-getting-started-docs-it-3.22.0-1.el7.noarch.rpm963d7b975785f50f58cddc0dfe9b0cec57a08cae9611de0d34ead4604be7ddedgnome-getting-started-docs-pl-3.22.0-1.el7.noarch.rpm3bcc77be5bd1f09ff7a0705701a6560ae1379065f8c76f607d1a520887223734gnome-getting-started-docs-3.22.0-1.el7.noarch.rpm5f98899876f5defef8eba1938b9d4cc920be29f948f9ee42528ff84053872339SLEA-2017:2159-1Gnome-Keyring Bug Fix UpdateScientific LinuxScientific Linux 7gnome-keyring-3.20.0-3.el7.i686.rpme05e01b25db50ff859f98ad8c9a0ba2a52972985ec7aea4a0fe953919337057alibgnome-keyring-devel-3.12.0-1.el7.i686.rpm46ebc8ae7e1dab3e4a2efd9f464c850e67d138d930d770c2536e9361f947b65bgnome-keyring-3.20.0-3.el7.x86_64.rpm9396582a2aa182a23aa9a7c2902e2e93809a9127790567516ac576628ccb7c0clibgnome-keyring-3.12.0-1.el7.i686.rpm6848c74efde68f66edb12ac2260f0bf5bbd6c6c5aa9ed0534b0f329e7bb250dblibsecret-devel-0.18.5-2.el7.x86_64.rpmfafbb108690d5667d3fcc8267f11ca2c7a1a52ba130d00f67b9760cf4be8732flibsecret-0.18.5-2.el7.i686.rpm0402501ac6ce28951548a8be7d2f0224fdfb7babfe26aa1219a774be0b7bd252libgnome-keyring-devel-3.12.0-1.el7.x86_64.rpm7cc366fd231d142454fd6ea6daea0a65d00f0b99211319970c8e2d0b1a5e68bblibgnome-keyring-3.12.0-1.el7.x86_64.rpmda2ab0329b7dd205730bd96051c022881c79caa18a4724251fa31db1dad0d51fgnome-keyring-pam-3.20.0-3.el7.i686.rpma9a682dc1b09ae83d2c2d548f43b28f0b04a1ae07502a5031ae1369f0d301a19gnome-keyring-pam-3.20.0-3.el7.x86_64.rpm4b4a0d14cb04ed949f670d680cb0c4eb82e3f9b42d7aa5e6923f4198807c402flibsecret-0.18.5-2.el7.x86_64.rpm445c0509ff4f62396d3bdebab94abbd91d38ff30fa6c094d1d72d4eed74b9251libsecret-devel-0.18.5-2.el7.i686.rpm1938f6ca0fdb5b5fcbb48f84d57b5d6a5f7a7d27b5decb80479d400923e274f1SLEA-2017:2290-1Copy-Jdk-Configs Bug Fix UpdateScientific LinuxScientific Linux 7copy-jdk-configs-2.2-3.el7.noarch.rpm6b494c4783144ff75e4810bcd3e0d5c6158cb40f70647393b65538c28aa5f269SLEA-2017:2294-1Sssd Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libsss_nss_idmap-devel-1.15.2-50.el7.x86_64.rpmff0d9caaf609078447afec19410731f6507d5c6a4e67cea4a5513dbd5588d768libsss_sudo-1.15.2-50.el7.x86_64.rpm7fcdc6aaa9893348f92f72091484fab631291da1987642745f7abf98ff2fe19csssd-common-pac-1.15.2-50.el7.x86_64.rpm4c7b600e7456cce40e75ef075e4329c93b34ba7345c5369eea57ca934db0861blibsss_nss_idmap-devel-1.15.2-50.el7.i686.rpmf81c33c775dd9cb9814cf1206eff8f2abeb712a95173ab10f9525e5f55f3490asssd-proxy-1.15.2-50.el7.x86_64.rpm1ae04d070a86048df083a03b1c9033d6b558f6f43fa89af824344fe2284b5a72python-sss-murmur-1.15.2-50.el7.x86_64.rpm3738165b9b2fb6bfc07d77c36e889897218dd3b48998f5933100b54810d2a1delibsss_nss_idmap-1.15.2-50.el7.x86_64.rpm6a15afef86d17c76cb9fd93dd115de74611ffd7cb1b33f66d7138d401ea7938bsssd-polkit-rules-1.15.2-50.el7.x86_64.rpmb92347bcad2318f0bd969bd778130ff82605bd9c0c07608f30b824082ead6a3blibsss_simpleifp-1.15.2-50.el7.x86_64.rpm08a5e41329568257ea4b40b8519e62f23ecfe3fdfb25216f5924f6d554e28c2bpython-sssdconfig-1.15.2-50.el7.noarch.rpmcde8f69052756c50a3cd7a752191c81380782004e3791b8fd55d00fe1a38eea8libipa_hbac-1.15.2-50.el7.i686.rpm40836af15a24537bcb205cd531096c2ba4c2213160ec5c84b0f32c8d5c0a2c17libipa_hbac-devel-1.15.2-50.el7.i686.rpmb51f131724016aa8dce5e725682e59e182016f45e623713fed1cbf384d7f38b4libsss_autofs-1.15.2-50.el7.x86_64.rpm14ef9d1ec3c38cb7539fde8e820ecf86b50c56b557fe668d14eda9d9b98065b2sssd-ipa-1.15.2-50.el7.x86_64.rpmcd1d46ef7d9bd1369144c1b5c8eecc934674ee088fd40452d9dae17378b02523sssd-client-1.15.2-50.el7.x86_64.rpm11766198151da0e59971df4fa2bd4b94b19615fee228757485c87591c7eec50dlibsss_nss_idmap-1.15.2-50.el7.i686.rpm5cb7de3b616d8556023144b6fced79cfc4762dd0b291ec99c7604b0ca200b21clibsss_certmap-1.15.2-50.el7.x86_64.rpm524a73fc26bc6e84c2270d8d1e23e73509d4f004d6f4d782142ce3e3ba2746cbsssd-libwbclient-devel-1.15.2-50.el7.i686.rpme378813cbe4647c00744e82f556ea41cfa8cafaa143bd1567e28a01ce5310354sssd-1.15.2-50.el7.x86_64.rpm4958e25811b1113a4a3313b07a3411b1e78cf1abb1d3dd083354814d71b4819dsssd-winbind-idmap-1.15.2-50.el7.x86_64.rpme7ac5fcd7184c323728dca3bbff87b57135cc7368bd63a60b0d6b734133b678csssd-ad-1.15.2-50.el7.x86_64.rpm78f0afb6172821cf60341f57c2532a84554a4a67e0f26a1fbfc85e6ffa783f45sssd-libwbclient-1.15.2-50.el7.x86_64.rpm427520b048dfcadcc72944693ba2a0765ee0de8761214715b36881b385ca7464sssd-ldap-1.15.2-50.el7.x86_64.rpmde4298c7a70b30dc0ad6e63e0d5788f6fbd1db1790b40ccc012660cd06c74010libsss_certmap-devel-1.15.2-50.el7.x86_64.rpmc09a47ffa024d297b38ceb1a279b91796481f63ca98979b45df8bd66ace29201libsss_idmap-1.15.2-50.el7.i686.rpm45fc9aaa0635c1f580e30f3c51223ca64752c076360b60204f25a4307458f987sssd-common-1.15.2-50.el7.x86_64.rpme7a038d4ab2de06c4ee85e925bca9e47c22ddd44774f224170f6dcc92c8c5f2elibsss_simpleifp-devel-1.15.2-50.el7.x86_64.rpm6f45793cfdcdd45fdaf59d5cf16fd8d48b8b7169a5296dc00cc930b41955a075libsss_simpleifp-devel-1.15.2-50.el7.i686.rpmecb0f6ccedb2971cb65734b9eac698330fb1289d71c7212f7b965e7dd288052cpython-libsss_nss_idmap-1.15.2-50.el7.x86_64.rpm1d1dbb529a537e2c807100762b55ac91daf3e26a536c1d84514a123d5d746c00sssd-tools-1.15.2-50.el7.x86_64.rpmff5803665d9f31622467f209328ff3f485b5dfef81f7de1c56c9934a38a461f4sssd-dbus-1.15.2-50.el7.x86_64.rpmcdc4e391cea765b058f248bfcdf6f5fd708a2565f5da528f59d5c8a800b8c4b1sssd-krb5-1.15.2-50.el7.x86_64.rpmd8b6f018fcf59345066409456605d64fc5d0d8b34cb10e8a23eebae4e4c27a17python-sss-1.15.2-50.el7.x86_64.rpma71a471bb08cb066a504b51b8ef5cea1eebf06b703e089cc9abbe089b932076flibsss_idmap-devel-1.15.2-50.el7.x86_64.rpmd344d7d9b10b62eacc2503756d60c464c40460847691f42e041c30aabaf3304flibsss_certmap-1.15.2-50.el7.i686.rpm3d0366cb4492075321ef5becbe406eb00b46b5a995d313aa89af5d0c5fbc95bclibipa_hbac-devel-1.15.2-50.el7.x86_64.rpm8f1c68d6e1c996c1a0df6f92a5891e34adf3409abd9d95e362e2b3d103a5e320sssd-client-1.15.2-50.el7.i686.rpm711722c1866d59cb2dbb5fc9a7d7214f4a30194c95645baf1ef618595fe90d65python-libipa_hbac-1.15.2-50.el7.x86_64.rpm54498302453d36a632c97d6903362a9cb769089f67f58744348e39c99ae2977asssd-krb5-common-1.15.2-50.el7.x86_64.rpma0e87f047c0daf588189859e21019820bec0cdbb2f9e84215c72a0bb738b6dc2libipa_hbac-1.15.2-50.el7.x86_64.rpm2b528b8fc9bf9e1725cee36c62a5ad10515590d789122eb3913fcc0bf038d15flibsss_simpleifp-1.15.2-50.el7.i686.rpmfa7ed30de2e1d9acd93bb5cee288efe4970a092297194451a1f176ba1075f02dsssd-libwbclient-devel-1.15.2-50.el7.x86_64.rpma401fdeef74165d0d79fc427c224bd7e9860501d83c0a4bd1eacb01c1a3fabcelibsss_certmap-devel-1.15.2-50.el7.i686.rpmafb9271487e7b7335063090f045deb825d08ca0c2fc99eeaae487edf86748601libsss_idmap-1.15.2-50.el7.x86_64.rpme2a78d04e77d75c09d18e115d9093a2b47387290d9fc525a53c083f7bb118c01sssd-kcm-1.15.2-50.el7.x86_64.rpmb4e2d2aca628e31e9da264fa39938bed47389bfd930315dfa8b505d8abb4d573libsss_idmap-devel-1.15.2-50.el7.i686.rpm2dcccba9f53621c40e2387e456a69948d09e0a9fff32285b73660c401336eab8SLEA-2017:2303-1Gnome-Software, Libappstream-Glib, Packagekit, Libsolv, Gcab UpdateScientific LinuxScientific Linux 7libsolv-devel-0.6.26-1.el7.x86_64.rpmac226f1cc36510df902a662d8eb2c749baa5312f902555ed3a3753e55d961fe7libappstream-glib-devel-0.6.10-1.el7.x86_64.rpm0f1e01ac4072008db77c59883555f318882c42d738479b09ccfc212335e60cb6PackageKit-glib-1.1.5-1.sl7.i686.rpm98b1ec2863641b293940958cd021de750422be3707880349a309a75734c15217libgcab1-0.7-3.el7.i686.rpmdbd4f232ed38d6cb278fc8b396ffee12ffa4627b69ca48451052a757b752fbbblibappstream-glib-devel-0.6.10-1.el7.i686.rpm1212c6f990db85e8631a67f9105a6b6afd6993147d8d6d22fe3954dde686f97fPackageKit-1.1.5-1.sl7.i686.rpmd591f775c0503bd0d5c7de53b60bd05b172368cf1e8857314c1d1f5c9f426a2dlibsolv-demo-0.6.26-1.el7.x86_64.rpm0850eab74d1178e8ee507fdc4a22ad0eae16d0b69fad6228665fff5c59fb23a9PackageKit-cron-1.1.5-1.sl7.x86_64.rpma1254e2e4e45cd481fc2978bf3ccef893ae92d32e5282c66360a3ad8b8643936PackageKit-gtk3-module-1.1.5-1.sl7.i686.rpmb73150a2add056eb4cbce7c289606f020e1353895908a11b490ec243d419db5blibgcab1-devel-0.7-3.el7.i686.rpm6ca2c5335255a8f29426aaba744cf3b20f11605af7936f4b4dcd9e89b79c1a53gnome-software-3.22.7-1.el7.i686.rpm0881a6be0a7ee5c7d071b3916a8452e558c0f7a9cf5d5d9c71cb8e7b2e21a850libgcab1-0.7-3.el7.x86_64.rpm1c5dd50543e39996d7a3679c05f3593e320a96b14aaad69e444184a78d7cf339libappstream-glib-0.6.10-1.el7.x86_64.rpm3dd331db299b7186c4fb5d4cfa5cd63b956c7f9d98c84805f4bc22b89f74538clibsolv-tools-0.6.26-1.el7.x86_64.rpmdda132f9ed8abbe8254f85b4abdd0dfac5def6eaae7673eb0af652a0dfcb6e29PackageKit-glib-devel-1.1.5-1.sl7.i686.rpmb21496d6fe87ee72d4d17045fcdefab02ceb058f9870cc0a980b0f3d82510a70libappstream-glib-builder-0.6.10-1.el7.x86_64.rpmbc929ad733656a4397ac83b570c73c7ed2cf6ee3d073ee8647c2574c22b8a285PackageKit-yum-plugin-1.1.5-1.sl7.x86_64.rpm9f20f67c0fe9fa86106410ea5232a523a6733be05935fc838be28982503d91aelibsolv-0.6.26-1.el7.i686.rpm8825e9b72803805f04ad44aac0cc3b7fd1932a41ee52b118c168ad421b447ffflibsolv-0.6.26-1.el7.x86_64.rpm95447f7069c5c8f61a308bc6533ca438202b10bedc449a5961c314b404740e95gnome-software-3.22.7-1.el7.x86_64.rpm6c9da9af19dc4fdbe1a755c399f629347f7623827e8eab6d674a997c34673d4fPackageKit-command-not-found-1.1.5-1.sl7.x86_64.rpmd8a87827d150d7f552b7642fc9ecde132c972e3e7d94c2e20c633e132ebba969libappstream-glib-builder-devel-0.6.10-1.el7.x86_64.rpmfd6ccf47681607edea0752d6e781a54d7fb17d9d9e28bcbe3db7afe64b3a2d6fgnome-software-devel-3.22.7-1.el7.x86_64.rpm6b0a6bbc85cf78a7b8c853397292f929b9a6be78def8764dd2cd6302e1fc8a8aPackageKit-glib-1.1.5-1.sl7.x86_64.rpm29bf1f864fbc77a3086ae8fccdd6dd6b88cf3ef8a1db4c111b401436823ebad6PackageKit-gtk3-module-1.1.5-1.sl7.x86_64.rpm0ef635534bf83dd25881fa91ea414ef6c32c1cfb6d6a55ef21aee1385d7132a8libsolv-devel-0.6.26-1.el7.i686.rpme9116549ff17a331ed241f8c8f5ca6d8c88d5f0ed9b5e1b95b021cbecef493b8PackageKit-1.1.5-1.sl7.x86_64.rpmc0e71d01e71be1666e0cd9909ffc228b209c4dbd1b0d77f61e037683bbaf55daPackageKit-gstreamer-plugin-1.1.5-1.sl7.x86_64.rpm7fc47aa3bb76e6b86b4af96de50b5bc3058b8090c28f93cdea765c24907e444clibappstream-glib-builder-devel-0.6.10-1.el7.i686.rpm32acda2180f5e206594822a497067763324751b816899680e54a2455c7fc7ae6libappstream-glib-builder-0.6.10-1.el7.i686.rpmb50d1200a8d36f3dec2c3c2ede9154df8ed1743cf7ff9346a76e9758b7ac0e61libsolv-tools-0.6.26-1.el7.i686.rpm798185ae2b4275708e4fac917752dcc6ed836a5d72b578f230c0ab8b2965272alibgcab1-devel-0.7-3.el7.x86_64.rpmc11c2367046d039b235ba39f0bf8cdc0d396b633a45673f85c2cb08bc767954aPackageKit-glib-devel-1.1.5-1.sl7.x86_64.rpm11fd7201873b91fb663ef5532fa699d0e42f8be8c8bf4010aac46e9f9dba99c2PackageKit-yum-1.1.5-1.sl7.x86_64.rpm4ec46d2a0221490460098e08fca4cb613780fe8f133205453b7a0e297590cbf4gcab-0.7-3.el7.x86_64.rpm3a5af36d669bc7ea8f25493ff6e68625078acd12781c02b944d918323ee1e90alibappstream-glib-0.6.10-1.el7.i686.rpmc79f2893691e08957025d2551e52b18c6f0ce7b2dbfeafbd758aec284e14bae9gnome-software-devel-3.22.7-1.el7.i686.rpm3bbf17d51c9411909390ec0e3b3e2d23844984adecd2d3c98de009a1e69877c8SLEA-2017:2305-1Gnome-System-Monitor Bug Fix UpdateScientific LinuxScientific Linux 7libgtop2-devel-2.34.2-1.el7.i686.rpm0dc55f95d71c6a6bb0f2508d8ff854a46d41b49466d826ee7d40913be4413050libgtop2-2.34.2-1.el7.x86_64.rpm61185eda96505eaac6340c6572e789bc92f2d888e1a4a641fc99118d6f1982a4libgtop2-devel-2.34.2-1.el7.x86_64.rpm69ec15ec1d9e9c2993c2dc38aa8fd318be8284666e349f8770238f1b6eeba994baobab-3.22.1-1.el7.x86_64.rpmb88c20f61f9059f91b56657616c05688a2c68df9713f85205bfe424206604b0blibwnck3-3.20.1-1.el7.x86_64.rpmfebac954632c0ff71f89d1058590fd29e4f91c8abb314802bcb6ba45619e9522gnome-system-monitor-3.22.2-2.el7.x86_64.rpm97c86dce91f80349699d62e6d508f99549dd9715b6cd5d58116041fa80428d01libwnck3-devel-3.20.1-1.el7.x86_64.rpmeaae6836937d1a8335d32a2072559688e38ffcf5098ad1046afb6c59289bfb81libgtop2-2.34.2-1.el7.i686.rpm05dc2538df296b161a26d4260c1eb650c94b6cc9a34c0ac9bb0a771fb96e2328libwnck3-devel-3.20.1-1.el7.i686.rpm02b4f7c81f283fe6adbee79e86993b18aa7952185036a71b262aff7f8cd6961clibwnck3-3.20.1-1.el7.i686.rpm6dd4e85c170cc2a6f3f943645cde0c80fbb7fe195187603d2953318b10054722SLEA-2017:2309-1New Packages: Flatpak, Xdg-Desktop-Portal, And Xdg-Desktop-Portal-GtkScientific LinuxScientific Linux 7flatpak-0.8.7-1.el7.i686.rpmdae3e925b49b6c1ea3730255deb8aa306f8b6347587877b0a1e765c2427058c4flatpak-devel-0.8.7-1.el7.x86_64.rpmfc04edbf1952fb8ee9755a5751d642d6ba6a7fafb8bc3c530452345bac229384xdg-desktop-portal-0.5-2.el7.i686.rpmb752701ed39fde60251f6e70a825194c405f8476ffbf98fb57246083f06e2f9bxdg-desktop-portal-0.5-2.el7.x86_64.rpm247d87b74a714d248fda21157a613467b41a9f3b089e1e27a98f33333b47308eflatpak-devel-0.8.7-1.el7.i686.rpm368b704e4e0ed32e9822a25b275ab15f170e560ffca8d53f6913ce90bead0233flatpak-builder-0.8.7-1.el7.x86_64.rpm7d7473da56239a9cb0da4fce9d17222ed9e125adf457ffe9f92649a242012179xdg-desktop-portal-devel-0.5-2.el7.i686.rpme9a0a45044185be3a3c0381521dd36ce857336e5a0de5472a9fa034fc2ddd424flatpak-libs-0.8.7-1.el7.x86_64.rpm362b8674a71ddf3403e85ceaf759d59a44bb9f39c642184b644b2062b74c6201xdg-desktop-portal-devel-0.5-2.el7.x86_64.rpm3e9648c49d1f3b353f06d65764488eef71a83e6d9640d93fe00be1e33590c6efxdg-desktop-portal-gtk-0.5-1.el7.x86_64.rpm4d9b432d086f03a1713ac7245740db3518e171e5860e4b1cb740864a2c8db295flatpak-libs-0.8.7-1.el7.i686.rpm18a046cbf995f29348f3597cbfe72101ff1aee64d9cadfa5b471437055a9682dflatpak-0.8.7-1.el7.x86_64.rpmf2097506d280ba3bbdf8757947f5102acfff2174ba1e2054096b38500c1fd542SLEA-2017:3052-1Tzdata Enhancement Update* Sudan will switch from UTC+03 to UTC+02 on November 1, 2017. * Tonga will no longer use DST (Daylight Saving Time). This change takes effect on November 5, 2017. * Fiji ends DST on January 14, 2018 instead of January 21, 2018. * Namibia, on September 3, 2017 will switch from UTC+01 with DST to UTC+02 around the year. This change takes effect on April 1, 2018. * On March 11, 2018, the Turks and Caicos Islands will change from UTC-04 to UTC-05 with US DST starting on March 11, 2018. Effective change date is November 4, 2018. * tzdata now includes two text versions of the time zone data: the "tzdata.zi" and "leapseconds" files.Scientific LinuxScientific Linux 7tzdata-java-2017c-1.el7.noarch.rpm4e7e37f24708b371f2f48992346fead7c377f6b03f51559e00ca28f64d1b5525tzdata-2017c-1.el7.noarch.rpmf2d413522a0768368bf84e8e0808039f40a284085bef11c244cac03e9e0a20c5SLEA-2018:0232-1Tzdata Enhancement Update* Brazil's Daylight Saving Time (DST) will start on the first Sunday in November. * Support has been added for the "-t" option for the zic utility. This enables the user to put the configuration link in the specified file instead of the standard location.Scientific LinuxScientific Linux 7tzdata-java-2018c-1.el7.noarch.rpm343788fb7298de725337652830f21f4ca0ec30f0093e4466324c142cb9b00a87tzdata-2018c-1.el7.noarch.rpm443617283ca4794d77c7f388df1e9759e8550315cc34fb137347a4f198a61b43SLEA-2018:0679-1Nspr, Nss, And Nss-Util Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7nss-softokn-3.34.0-2.el7.x86_64.rpm121910777345d1cfe58baf0c2c045b2f099889949cd1ac7bfd57409e7a47a062nss-softokn-devel-3.34.0-2.el7.x86_64.rpm131ee83989f938e7c41b86be717be34eec6022d9024a7b4e62438fd0d0d9ad89nss-softokn-freebl-3.34.0-2.el7.i686.rpm66c872521324665106a6a32b88e121781775bf5f52cff6f83fcf46b475b83b49nss-util-devel-3.34.0-2.el7.x86_64.rpm20de7f55208bbbad794c7beb61fd4e6904e29a1a6573edfb715338a650303bbcnspr-devel-4.17.0-1.el7.x86_64.rpm072c7318639aadda664277c7579ce74204422e722722994d67cc46e5191d5626nss-util-devel-3.34.0-2.el7.i686.rpm265ccabd6a8b02189f8a6b6ed76cea6aee071e85242eb829de5101d061f97dfbnss-util-3.34.0-2.el7.x86_64.rpmc6b4d865eb89b9c54a00a10b3826beec8566ff36334edbe5851a06ef9c75e833nss-softokn-freebl-3.34.0-2.el7.x86_64.rpm2329cd2813d7c0ae273aa3f351d1c8d6976679c4fc160c8b29b8571ff7cf1e7cnss-3.34.0-4.el7.x86_64.rpmf5949de194f5cc08b18ad6fa7ae004179628d44d83a633b4ef35d95d9a264a71nspr-4.17.0-1.el7.i686.rpm213e6bf284b1c0fc5bb1b9e18006afa9dee36be534cf0bb74e4e76b908864305nss-softokn-freebl-devel-3.34.0-2.el7.x86_64.rpm15831d2bf1275acac654cdffaa97d3f70f99c6716b1a565e8b54f3702885ddd3nss-devel-3.34.0-4.el7.i686.rpm3ec5e5a433f1104a474317e25f37bf71243304afc2ffc7753a8731c6993fc046nss-softokn-3.34.0-2.el7.i686.rpm01a3de820cf399885f956912620f775e70a8b9315f12774362280948de4207denss-pkcs11-devel-3.34.0-4.el7.x86_64.rpmd861a5d5481bfc284c531d016c9634ba61bf57564ac942791a2ac774c5b6a589nss-softokn-devel-3.34.0-2.el7.i686.rpm0e8466c1834a0d839f1924e469d0e80552462b3114dce19f5634174c60b20429nss-util-3.34.0-2.el7.i686.rpmd177eff2a61a24e33dfd0ef7ade7fc7c2b3eab6070c7ed819c01811a3c8ac9e2nss-tools-3.34.0-4.el7.x86_64.rpm0c200b12bffb4e615251342e1f10eb49397153213be1f1aa2cbf5f1a76cd018anss-pkcs11-devel-3.34.0-4.el7.i686.rpm7b765697427a39cc8161a96ae6fa2090a645ddfe82d4ce89871ec54f04df5db5nspr-4.17.0-1.el7.x86_64.rpm321c948296eaf41ae75527a6b2cb20320a652cd33486d68e0ff5cc95c227add8nss-devel-3.34.0-4.el7.x86_64.rpm126c4043c7b238ae42798234fb3749fe7c91d8f5d45924a29691246d2d645e75nss-sysinit-3.34.0-4.el7.x86_64.rpm5ecfd2c7741f93b6fca33179ef7e9e414c3ee509ba70576ec966654711272ea5nspr-devel-4.17.0-1.el7.i686.rpmb6e55a317b9eff3a0b0253ac741de038b9827ef012c0008d64e3e7da8d533c14nss-3.34.0-4.el7.i686.rpm9e6ef43090b947a562f04f285474065ac7014b8237f4ba827f8d96e2b4f7f954nss-softokn-freebl-devel-3.34.0-2.el7.i686.rpmfb04fdc22e37ee449c384a91f5df86c5503fad6dfdfc0ccb30699d4b7ce900c0SLEA-2018:0694-1Libpcap Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libpcap-1.5.3-11.el7.i686.rpm8ab26b05811bb9bec00298890d26710d93cbd165cb64f596edaba8293e26dbbalibpcap-1.5.3-11.el7.x86_64.rpm39d26db047552317f0f2219f8c063dc4c3265f88df0985f3517119a447287236libpcap-devel-1.5.3-11.el7.x86_64.rpm0b987864201eb73dd25baacb7f3d94b7c3b538a6d0081e536293a0ca515368d9libpcap-devel-1.5.3-11.el7.i686.rpmeabfe2200a038cd8b314c66cde61a288587f3a918ee12a46b88e9459ec9231adSLEA-2018:0740-1Ocaml Enhancement UpdateScientific LinuxScientific Linux 7ocaml-4.05.0-6.el7.x86_64.rpm6af8e9111139cfb3303253ebe1f182c4b4b9d59351a3754cd8053630dc737982ocaml-emacs-4.05.0-6.el7.x86_64.rpme740c8943cdeaf3c62594e94cd1b3ba5e3e3f81d1f96d25a72606f80442a2d3aocaml-ocamldoc-4.05.0-6.el7.x86_64.rpmb7a8c80034e2acf7012eda9f2c29c0e984b17e5105b30d15d13b0e39cbe5efdeocaml-docs-4.05.0-6.el7.x86_64.rpm7c342b08321b493cb0e58c44f5ebf256add4205d3cb2d5944840196fef6f41daocaml-compiler-libs-4.05.0-6.el7.x86_64.rpm3613f4c134d60d6f1bd51c4e3498926591eeff254145b5499b860a5106fa2f3cocaml-source-4.05.0-6.el7.x86_64.rpm0715986e20d4a72714368ec2705ed2bb290af9165d30cda547496b4599dc8159ocaml-runtime-4.05.0-6.el7.x86_64.rpmc7e48494c6e3ca7a7911c2660ea6625c2fcc6426cb0e51a1db021dfb931b405aocaml-x11-4.05.0-6.el7.x86_64.rpmb90c008d39d2c7e631902181ec68cdff3c51e02103ff2dc132082b9a45f9450dSLEA-2018:0830-1Open-Vm-Tools Bug Fix UpdateScientific LinuxScientific Linux 7open-vm-tools-10.1.10-3.el7.x86_64.rpm202ab234b40bb1404139d8b6db7729ddd6031bf2abb190f19c1f0d5e00a2dc4fopen-vm-tools-devel-10.1.10-3.el7.x86_64.rpm34a92b35cb56e507fb4438b4787d34b64279166fe52be1d422446f833b79396eopen-vm-tools-desktop-10.1.10-3.el7.x86_64.rpm4ac8ba64a1c7cda3ef48ad2eb05feb9cc2c826a5bea0594524bf74c86f788443SLEA-2018:0836-1Libgphoto2 Bug Fix UpdateScientific LinuxScientific Linux 7libgphoto2-2.5.15-1.el7.x86_64.rpmf1f35b14d37869ec79733c32b67b90e139e26785a6958622a4b4f84d5984c550libgphoto2-2.5.15-1.el7.i686.rpm7e6bd48ed5173e1752c630e25aad32c181e23df25d99c395581d392dde8e32b9libgphoto2-devel-2.5.15-1.el7.x86_64.rpmca51719e75f96bbdf3991b71138cc36226dd3a8a0b8b44c7677b24f571214d07kamera-4.10.5-5.el7.x86_64.rpm5b2f448c2621c91b0f6325357afe21a26ced1af13e677a6fdc8cd8eca9d76494libgphoto2-devel-2.5.15-1.el7.i686.rpm1fb4b0bd5cad9f943d7c1932f0ade19d6f7c9e58ef61dac17ec205959b90591aSLEA-2018:0865-1New Packages: Lz4Scientific LinuxScientific Linux 7lz4-devel-1.7.5-2.el7.i686.rpm5362dd4a8bfbb4013edfed7936581bd98343e4ded07be993ced7979b66b1cadclz4-static-1.7.5-2.el7.x86_64.rpm08198b52303238f773fb2704e7cbfa1721f52bb874cf1402b030353daf9b691flz4-devel-1.7.5-2.el7.x86_64.rpmcdd9c205dbd5b2585b04b83b6ed9685c2aed556f4d703b66710ca79e30853a71lz4-static-1.7.5-2.el7.i686.rpm3d9b8d2350b0698a883b6cd9225741983e46508a74dc5df3e9609040d3c5e468lz4-1.7.5-2.el7.i686.rpmb71b987edc16f6603fd612e88f5574f787501da7fc3c89f5592f84b67aa018cblz4-1.7.5-2.el7.x86_64.rpm59b0339f4a0c9e960a6c87f2131ecfe66806ecf0872e6b95e54a4d74028c3715SLEA-2018:0867-1Redhat-Rpm-Config Bug Fix UpdateThe redhat-rpm-config package is used during the build of RPM packages to apply various default distribution options determined by Red Hat. Also, redhat-rpm-config provides a few Red Hat RPM macro customizations, such as those used during the building of Driver Update packages.Scientific LinuxScientific Linux 7redhat-rpm-config-9.1.0-80.sl7.noarch.rpm6f70aaf6a2b7d8d35963fc3be2ac276a03ab5f156a7d589003ab66e4c431e4adSLEA-2018:0874-1Linux-Firmware Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7iwl5150-firmware-8.24.2.2-62.el7.noarch.rpm2ec21d2ae0ea3f35f6224316b3f89dd9f12bfbe13d0784596aef1ae3fe5f6be0iwl2000-firmware-18.168.6.1-62.el7.noarch.rpm39b143a2826e869998990af57c83f5b92d68afc1447b161b5c6610d02a488c98iwl100-firmware-39.31.5.1-62.el7.noarch.rpm458ffa8e168b4533deacbeb67e9a5edb065759a8f0eaf9723e69b88a573bb720iwl7265-firmware-22.0.7.0-62.el7.noarch.rpm1cd4227b893e19552008cbc7cbda4af2506e02a35fc46e722143abdf19d54906iwl7260-firmware-22.0.7.0-62.el7.noarch.rpme935c4742d99d73cde737d04920eca243713d7db4ae7ab31e408c5833c5c7f77iwl6000-firmware-9.221.4.1-62.el7.noarch.rpm61485a041374a4f3ac36681474e90d37ed6c2aaeb15872e393297b601a359ad6iwl5000-firmware-8.83.5.1_1-62.el7.noarch.rpmde8cb31ee76e0b648cf55ecc51e513a89b62338c82ef566db75983b246f4946fiwl3160-firmware-22.0.7.0-62.el7.noarch.rpm678b6319968f08deb2d7f26dc09c3b2457db5442d81cf21d737a4607fc1666fciwl1000-firmware-39.31.5.1-62.el7.noarch.rpm025864be1e175a08929201328253b8301511bc76dc12f5174ea3dd80c9ab20a4iwl135-firmware-18.168.6.1-62.el7.noarch.rpmc3a4324dfcee83909d42e42a9f7401cc5a48ea3a0bf9718371e624db263d4f69iwl3945-firmware-15.32.2.9-62.el7.noarch.rpm743aea328262d81fea3739c5bcf21294c8def725d772cf33427e0357a4707dd6iwl6050-firmware-41.28.5.1-62.el7.noarch.rpmac676d09e7d5840ed1c6584453f4df08ece58b3a0c97b34f380ac503ddc94038iwl6000g2b-firmware-17.168.5.2-62.el7.noarch.rpm4844fcefb02259652d341cf3855e1dcd5e7aef8e0037a3b5befca14571f9ed0diwl4965-firmware-228.61.2.24-62.el7.noarch.rpm1eb2b49ee606007c89b5e462ff605de3b02394d893d8b46270deb7f9377d442alinux-firmware-20180220-62.git6d51311.el7.noarch.rpmfdf6516361fcbfba3892663c8d31ff1a4a7ca60f53c20cfb40160d8deaa0724aiwl105-firmware-18.168.6.1-62.el7.noarch.rpm2aa3df0f75e5defb9508199c5f43675047468f57f0c7b38972f62741a3c4abaeiwl2030-firmware-18.168.6.1-62.el7.noarch.rpm60705f9750b671e6619dc9b13aa7fdae3d2e8aff96e86e815525135275a703a1iwl6000g2a-firmware-17.168.5.3-62.el7.noarch.rpm50e5c96781f62b6b22fd7b26180ab1c91f26fe30c44ea155e6488be2f1913baaSLEA-2018:0890-1New Packages: Mpg123Scientific LinuxScientific Linux 7gstreamer1-plugins-ugly-free-1.10.4-3.el7.i686.rpmaad5cd55da33ccb5213b7b871144d7bac7795f45d2bc5f8dbfd0123ff97ed63empg123-devel-1.25.6-1.el7.x86_64.rpm848a5ba47b957b376fec221f8d814ebe7bfe28a177e5b5f85dbb0edc8f877916gstreamer1-plugins-ugly-free-devel-1.10.4-3.el7.i686.rpmfa05fdc6313f52d3b117770bb9714485ad730880e5d9317988a30f544c5bee0ampg123-devel-1.25.6-1.el7.i686.rpm1af33100c91ab9a24c2ca4f504755a0f1e5927a2bff0a61a11438476e6c86c2cgstreamer1-plugins-ugly-free-1.10.4-3.el7.x86_64.rpmbd9e4c63ee83a5232d2ba19f95bc15a0d219a2fc4fc22a16a4b24233874c467cgstreamer1-plugins-ugly-free-devel-1.10.4-3.el7.x86_64.rpm3dfac47891df4687f43d92ab5254e17ac4829d73382813dfe734c4737fb5e975mpg123-libs-1.25.6-1.el7.i686.rpmb1192eafddba53d6400c993d5696dcb385598d02ce38ecaf38fe0a2ee012ba3dmpg123-1.25.6-1.el7.x86_64.rpm730ef471fc97d881425f1fdd34ec2b1bcc34847ea61625bde1f86bf70fb17e84mpg123-plugins-pulseaudio-1.25.6-1.el7.x86_64.rpm9967767098309d5445c295a7da65994e47a3c97eafa020597259184f9539bea7mpg123-libs-1.25.6-1.el7.x86_64.rpmbb50f6ed862731f22ebc005044beba6c8cd482074699284708e360a355b46b03SLEA-2018:0894-1Llvm-Private Bug Fix UpdateScientific LinuxScientific Linux 7llvm-private-5.0.0-3.el7.i686.rpmce9a50f55f3b9fa4f0171afbfb51aa913fc4a6cc6c3c57143cb1fb434fee289bllvm-private-devel-5.0.0-3.el7.i686.rpme63be5e5165b7a39faa105e5473ced1cc64b07864a98e1c3f761d9f9fe7cf4b7llvm-private-devel-5.0.0-3.el7.x86_64.rpmfdd5e9da66051dcf09fa9ded1b65d9567c0cd5f49fd19ab4c47b3ca988103ce1llvm-private-5.0.0-3.el7.x86_64.rpmb1a64dcc29ba6c9c9ff05705b616482993827cbd07b31ebdf993d4ec90d0da73SLEA-2018:1031-1New Packages: Python-IsodateScientific LinuxScientific Linux 7python-isodate-0.5.4-8.el7.noarch.rpmaa24870c3637ba78650d9e06b05a0520e696529a4ab90786f635e23a733d00a2SLEA-2018:1032-1New Package: Python-JwtScientific LinuxScientific Linux 7python-jwt-1.5.3-1.el7.noarch.rpm3e90b9d0015012df89c88f2e1ef6defb041047afc97a036a27d32c29213f45a4SLEA-2018:1376-1Nspr, Nss-Util, Nss-Softokn, And Nss Bug Fix And Enhancement Update* The nspr packages have been upgraded to upstream version 4.19.Scientific LinuxScientific Linux 7nss-util-3.36.0-1.el7_5.x86_64.rpmf287602e907de480b4e945a8de2ec06831f1eaa9984b463fc18c2880d135f9a1nss-util-3.36.0-1.el7_5.i686.rpm5c1b9d3c5718f5a995ffd86b94704c64c28e97aae5602712e5372a02124a5496nss-sysinit-3.36.0-5.el7_5.x86_64.rpm40b53ec4afe52d43f5fe88b86f50013f9be2dd75010f72d35710567eb1ae5bb4nspr-4.19.0-1.el7_5.x86_64.rpm54eae8421d7029c75559e78c2720654ef8081d3fcd3e5d67721d2b84994ad735nss-softokn-freebl-devel-3.36.0-5.el7_5.i686.rpmaa07d2954d2f1214a201c4b252255fccfab0e3b53070b8f638dd36f5c1854abfnss-softokn-3.36.0-5.el7_5.i686.rpm49f78448342408ac78b61f7b61383187879e9ff46ca3bb5ba1e0bd1dc33c6760nss-softokn-devel-3.36.0-5.el7_5.i686.rpm32344b97b5a8efa338671ec41b6d22da53a4709c69c239226746b570ed3ec70fnspr-devel-4.19.0-1.el7_5.i686.rpmd9d38f1e727c1773e96a580e539cbe4aabb005d3fec5ba17f81365d4e714187dnss-util-devel-3.36.0-1.el7_5.x86_64.rpmbabc31b34ac38e5e7614b4a002a0dbc48364d3a009d277520f62fd3fbf409a7enss-devel-3.36.0-5.el7_5.x86_64.rpmc795eaf51dca313c115bad5fad264965b192e948b1dd7016d315dc758e9fbd72nss-util-devel-3.36.0-1.el7_5.i686.rpm04ef419ca197595150ce5f2698ae277bc5a8463210784608b604f13a83e31d3dnss-softokn-freebl-3.36.0-5.el7_5.x86_64.rpm5bc50153c42028c45060c1dbf9c535228443568b3e5c3ffb8e0ed8293b4d358anss-softokn-3.36.0-5.el7_5.x86_64.rpmc908b72ec503161a40292eb684e2aae92b32986d20b0b0351810bf4afe0c0ea0nss-devel-3.36.0-5.el7_5.i686.rpm2f120dddf23fca37bd8cb9e6e7df189f02d6134915e26e59c436dffab81da02bnspr-4.19.0-1.el7_5.i686.rpm322552f695442dac0c417f60f1ee12522d85e021398d85dd6e0c91b1dd84cf27nspr-devel-4.19.0-1.el7_5.x86_64.rpm412e7ef7598ec1183cfbc5eea164c7ab52d1bc7369a2d5c82e7e2b4f291e681fnss-softokn-freebl-devel-3.36.0-5.el7_5.x86_64.rpm2b77fb46485a686e680da3a8da90f7168360a9014e51068361bfab2d3e988332nss-pkcs11-devel-3.36.0-5.el7_5.i686.rpmd660b206fc5b94d1f8a6a8f42e4bab265e407cd2f701148c8991572865135f82nss-softokn-devel-3.36.0-5.el7_5.x86_64.rpm3593246f689eba998b13558efc5480ee452b26c0459a50cba4bd5ca31f8fe4ffnss-softokn-freebl-3.36.0-5.el7_5.i686.rpmd0288618da287486c2db041e8ed35d0e3a2efcb5fc65b82ac27196e8c7815b71nss-3.36.0-5.el7_5.i686.rpmb692971233c4f0592cee13ca122849be45e2c1f393295a09503e6393d1b1b3f1nss-pkcs11-devel-3.36.0-5.el7_5.x86_64.rpm4daa7aaafe2555c492f445bc33a4842f102b5339312118046669f8bd5ab6f649nss-3.36.0-5.el7_5.x86_64.rpm1e091cc94ece0d386ccef9ddc06e75253cb097aa0c1decdd2b532974c5acb529nss-tools-3.36.0-5.el7_5.x86_64.rpm71a5d9886c7db37881568f127b87861e930da5057228f9be1bc6efbed42469caSLEA-2018:1581-1Microcode_Ctl Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7microcode_ctl-2.1-29.2.el7_5.x86_64.rpmde36a7ccf7f6f1a9c4e28bac6ef5efc1a5b4b5f2a39b6ac02d5a7aba8da97d35SLEA-2018:3033-1Llvm-Private Bug Fix UpdateScientific LinuxScientific Linux 7llvm-private-6.0.1-2.el7.i686.rpmd39ba92fa0e9af2208cbb071e949b5af0519661b02205d28a82c9a0ba73a696bllvm-private-devel-6.0.1-2.el7.x86_64.rpm7b6364e9ca7ae4dbc967dcf1aa534fb8eec5f97d0928373a28dca7ae86401ad1llvm-private-6.0.1-2.el7.x86_64.rpm1f1bbe4ca189777c8e040e0131936d1bea33f7dce2c4a19fa1a970c16febe06dllvm-private-devel-6.0.1-2.el7.i686.rpm28c221de683190c774f06e9d007cea14b9efcd10cc40dc595ca82dbaee608e87SLEA-2018:3044-1Libtalloc Bug Fix UpdateScientific LinuxScientific Linux 7libtalloc-devel-2.1.13-1.el7.x86_64.rpm93e66de8a9051d8d853b2b44c1d0b3108263708add4a1e5b0345b1f9305fdfa7libtalloc-devel-2.1.13-1.el7.i686.rpmbacb0e15b59b29010680195cba9f9ffedb2d81175b274a8fac1a4482ec36bce9pytalloc-2.1.13-1.el7.x86_64.rpme379f7139623fc07dcce09087499e9d2812bb3f2cc6e5590667620040ff948a3pytalloc-devel-2.1.13-1.el7.i686.rpm8b1885d57b2e110a6650de35528a2bfe6837a1b34aff56f28c73e2a4847c13e1libtalloc-2.1.13-1.el7.x86_64.rpm07e98925bd856f9a7cf8046cdbb6775c2e1698d774bd87edd855f5f69375f318pytalloc-devel-2.1.13-1.el7.x86_64.rpm5a31299b793b423da5963153acb9897511acc9977059f38f593fe8cbdd75179clibtalloc-2.1.13-1.el7.i686.rpm45125793992f636da22c12639c1741241856789936626f84921eca08e193fb66pytalloc-2.1.13-1.el7.i686.rpm0121fe6eafff5bed06b2d8437d3e2ab424bd71273ebbedbc38707f7e714c44beSLEA-2018:3049-1Libtevent Bug Fix UpdateScientific LinuxScientific Linux 7libtevent-devel-0.9.36-1.el7.i686.rpm8658e6153f4d16f6012d156ebb5ae8194efeb337a99d60d12e5b402e49e2c7ecpython-tevent-0.9.36-1.el7.x86_64.rpmd222e26b17fcf7480b6cd5c7306ee12a6bb13bbb23219e34e82c7df108102d2dlibtevent-0.9.36-1.el7.x86_64.rpm26633ed0e64fdde7ec814e5f50dc48f0e87e601b0513f30760fd623966792b72libtevent-devel-0.9.36-1.el7.x86_64.rpmf540b3a76f5763220cc6196eab45b96e01404e466663004396a82cdea49b930elibtevent-0.9.36-1.el7.i686.rpm96d4edeb474b6f217aa951a7f713507591b4cc3f346a342ee52df93c7bf18812SLEA-2018:3135-1Rsyslog Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libfastjson-0.99.4-3.el7.i686.rpmda2cfb5fcd1d276f28b30cc5131be94d401d6285daad511b8461519a5f449e39libfastjson-devel-0.99.4-3.el7.x86_64.rpm4e5b77e4a0969304deea0d9e4bdb86c2f99e598c439c24d00bf6b75b4ba693aaliblognorm-devel-2.0.2-3.el7.i686.rpmcb68faa36d3758738a3e5b63465e1db077cf1ee3ac20837483af8f1afdaba879libfastjson-0.99.4-3.el7.x86_64.rpmb7ea3733fcc7735a559926780885fab9beaeb9df3485b20e1cb3116f1e5b77e3librdkafka-0.11.4-1.el7.x86_64.rpm6c24e8916101f3899e3ce824a1a39918d0f2b490d9a73ecdf85541dc1aefbcedliblognorm-2.0.2-3.el7.i686.rpm0770b3e6645a21f01f7228d716a883d08d3c4925ec4499041c790ea2547d6519liblognorm-devel-2.0.2-3.el7.x86_64.rpmd6f2048265900a272a1e885341aa8c166b28b58e5e375778f59e8fb09f555187liblognorm-doc-2.0.2-3.el7.x86_64.rpm62bb589a7ce591bd22208494e234a485d8107613bd209a0a9fb559329e278750librdkafka-devel-0.11.4-1.el7.x86_64.rpm711d3290314a9f931a84ea19e04d5ccef3371c4f5322c4f85effc43652ff9565librdkafka-0.11.4-1.el7.i686.rpm2c3e87c90de46df88f709bc03aaa9e993957378bd6c42278d87ef0ed1e207fa4liblognorm-2.0.2-3.el7.x86_64.rpmbfc00f98b93b168076c9f9c7bf37b78fd3264ca1548ef9372964c708be555b60librdkafka-devel-0.11.4-1.el7.i686.rpm5a0af3bd28dd70a010a7ce4497857d3657f327a8096623e112c250d6dff51240libfastjson-devel-0.99.4-3.el7.i686.rpmafa3a3722965c85e20bf81bfb023aec5d375cebe1a3d3a0c68879bdaa33d718cliblognorm-utils-2.0.2-3.el7.x86_64.rpm514edd4a427fe97252e8e990fd29b7aba7cf107dbecf56402568fbd3341b81d2SLEA-2018:3161-1New Packages: Python-Subprocess32Scientific LinuxScientific Linux 7python2-subprocess32-3.2.6-13.el7.x86_64.rpmdf36bd834f616be655f312caf89d3dbfab1ae3504831acbac64ce54126eeb0feSLEA-2018:3162-1New Package: Python-Futures Scientific LinuxScientific Linux 7python2-futures-3.1.1-5.el7.noarch.rpm4e0ef859dfed0b29cc9a41a9413cdf5e6cf74976f8c840e67dd5101fdefe1d35SLEA-2018:3164-1Efivar Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7efivar-36-11.el7.x86_64.rpm125c8b23096ce561ad4c39c3ad68fb4f1368c7306cd272f851e533716b13661fefivar-libs-36-11.el7.x86_64.rpma55163fe75a3492e89710b4d37f60afb57397e2394542ec696c4b38eeb81d155efivar-devel-36-11.el7.x86_64.rpmdb8261814335cae75c709038b02e776264c8e786dec8ace34fb831a3ab77f5deSLEA-2018:3171-1Efibootmgr Enhancement UpdateScientific LinuxScientific Linux 7efibootmgr-17-2.el7.x86_64.rpmeb12be2456e5e55b55c77c604e42665aeda5994085818b518eae66391a89bccdSLEA-2018:3185-1Gnu-Efi Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7gnu-efi-utils-3.0.8-2.el7.x86_64.rpm4b96c0e1f57202df4069d3c0e9a5124a28dbd70f48fbf921dc5ebe84af346cf9gnu-efi-3.0.8-2.el7.x86_64.rpmddb5161322c440488007716c97de0f3dbff932d9d0d3dd8cd0360d81faf3d987gnu-efi-devel-3.0.8-2.el7.x86_64.rpmb49d18665e547e5588ebfb5845a7fb6719c07e1b90a7db87c8faa1aa604bf699SLEA-2019:1210-1Microcode_Ctl Enhancement UpdateThis update adds the following enhancement: * The Intel CPU microcode has been updated to the latest upstream version to mitigate CVE-2018-12126, CVE-2018-12126, CVE-2018-12126, and CVE-2019-11091.Scientific LinuxScientific Linux 7microcode_ctl-2.1-47.2.el7_6.x86_64.rpmcc1dfbc5bd107925854f47c0d30f8346cc3ce73ded3f6e32a220b85cdcd85205SLEA-2019:2089-1Libtevent Bug Fix UpdateScientific LinuxScientific Linux 7python-tevent-0.9.37-1.el7.x86_64.rpma19805f4912358f434e5ab7485c55e7e5bffd96841bb54042a11278db3dd2e5blibtevent-0.9.37-1.el7.x86_64.rpmb812067ca114682b822ae4843675e1aaaf5c2c2df8a8f90170bbc3a66d15d25dlibtevent-devel-0.9.37-1.el7.i686.rpm0ef440f15815de159163caca7154e65349c286e31a6421de56afcbbd730b63e9libtevent-0.9.37-1.el7.i686.rpm420a44e9f8d0960bbfc86612b539b7ec1121fae5646dd4da25cc7415dc45441flibtevent-devel-0.9.37-1.el7.x86_64.rpme09ff59c3dc41a33bb3b083b8583947de1245c402c28a78893bebd9700ad38afSLEA-2019:2185-1New Packages: Python3This enhancement update adds the python3 packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python3-3.6.8-10.el7.i686.rpm7eced73b1bc289757efff3f7a4506928f00873625c4f02a7d509c2e3ebc76627python3-3.6.8-10.el7.x86_64.rpm0e1f2ed25cfd6c967730b0b31b367c42e7f0c358e85e17a1dffbc9f46b377adepython3-tkinter-3.6.8-10.el7.i686.rpmccb93ae4c1398bdd757036db184019a93a155915c357b494e801b3157abf313epython3-test-3.6.8-10.el7.x86_64.rpmc28c789b8b177b330cad5da06a72561d5bc89ad687a64b1417988188493c864cpython3-debug-3.6.8-10.el7.i686.rpm844d073015d8f3f65f4fbbe8b528c8eb8b55b1cada78f78f94cb5c6fd3060e23python3-wheel-0.31.1-4.el7.noarch.rpmbc4622be1ed2e62ff1254c7dd4eddc4ec2dd568cb8e3344d013540ee2c72a418python3-libs-3.6.8-10.el7.x86_64.rpm5fcd811833b81c5751c10b22d4f6b899438fb1eecd6c790ff84dbe0b7158d3c2python3-idle-3.6.8-10.el7.x86_64.rpm7262db1fab04cc90c9b34b4f5e4382bebc8993034fbe18f14f25f41a4ff06221python3-devel-3.6.8-10.el7.i686.rpmcf97c11e4415073830a8cac9e15f57a3f455ff4147dff715e42f9fd236f14f6dpython3-libs-3.6.8-10.el7.i686.rpm7066426c62d11ba7eeeb86eee2ad95485d1ea19395b55e0f5583685edc9a50ccpython3-devel-3.6.8-10.el7.x86_64.rpm20537fd79fbef40fbb0d1afeda1cf999cdfd4898072db1723262f6f39fe1539apython3-idle-3.6.8-10.el7.i686.rpmd6eb3e5bac8b4f0840bbd2134f1dcf762df514c94ba0c196ca1866cee0aab352python3-test-3.6.8-10.el7.i686.rpm16536aeea75e91705634288a27290aeaae540d39a650d388982ac2a9611e0a8fpython3-tkinter-3.6.8-10.el7.x86_64.rpm05c561000a29c7f9a94887678d22a02ed353c16f79edeaad4908bb50ce9dce16python3-debug-3.6.8-10.el7.x86_64.rpm58a588be705506e17e9714fdba14258786fd878e15fe3e587fca1e1e8bc31b03SLEA-2019:2186-1Python3-SetuptoolsScientific LinuxScientific Linux 7python3-setuptools-39.2.0-10.el7.noarch.rpme68119b88286632cae95b2b8689b460575fc976183fce8391293c766200794c0SLEA-2019:2187-1Python-PipScientific LinuxScientific Linux 7python3-pip-9.0.3-5.el7.noarch.rpm17bad2f75b7844f37ad5808e3c4827bd07473657328efc70c02c83e15ea9cc86SLEA-2019:2212-1Python-Rpm-GeneratorsScientific LinuxScientific Linux 7python3-rpm-generators-6-2.el7.noarch.rpm9bf54a89f4e8982025f5165e8a1543f6d035574c2304a2b4c9cfe3c3632a9850SLEA-2019:2270-1Openjpeg2 Bug Fix AndScientific LinuxScientific Linux 7openjpeg2-tools-2.3.1-1.el7.x86_64.rpm7555935b0fdf42cf8bba7b7b40bdcc662f66a8e9961df862a0879e5238210ccfopenjpeg2-tools-2.3.1-1.el7.i686.rpme3b84f080a1c9c55710a94000939ef6e5c5700f27c161da155d30761fb6764b5openjpeg2-devel-docs-2.3.1-1.el7.noarch.rpm410aa4acd2f0a84c10412324e3f6de0ade3e9d1670177b93b09911a5b2d243a3openjpeg2-devel-2.3.1-1.el7.i686.rpmc3cbea41896f0b652241aba058c089b9efa509f68a5dff529e30f527b60c4485openjpeg2-2.3.1-1.el7.i686.rpme902144a9f34975cd95d295d561739d208ee24402618f5da91feb51e7727247aopenjpeg2-devel-2.3.1-1.el7.x86_64.rpm1a371d5a62f87b1fb589772abd0ec709d709fb61fef8307557e0b785c38aee6fopenjpeg2-2.3.1-1.el7.x86_64.rpm01a99c07fd675aa6c61ba33e6dd88c422cd6680e80ed042d5744c347f2721c25SLEA-2019:2279-1New Packages: UcxThis enhancement update adds the ucx packages to Scientific Linux 7.Scientific LinuxScientific Linux 7ucx-1.4.0-1.el7.x86_64.rpm99084531fe40d583eb5ef0828401c7cf0552b9a3136c5f4f084c212b5377417cucx-static-1.4.0-1.el7.x86_64.rpm2f9a10838e0cbaca6190cdc5a2a4044f37e2d5dc72ae73ee0e80d9ddf1c4828cucx-devel-1.4.0-1.el7.x86_64.rpmfecb6557b460d46748f32a0e9c0a811374b57b76ebdd36ef03834ae1ab4f9464SLEA-2019:2323-1Python-AdalScientific LinuxScientific Linux 7python-adal-0.6.0-1.el7.noarch.rpm1ae7ea0cffad288486e131a7a3fef849001b7ce5e0a048b93169153bae40419eSLEA-2019:2324-1Python-MsrestScientific LinuxScientific Linux 7python-msrest-0.5.4-1.el7.noarch.rpmeb3fb38801d51a8df29e7a92dc0b4d05a3eadd11b2e0e3436cf2522413db2729SLEA-2019:2325-1Python-MsrestazureScientific LinuxScientific Linux 7python-msrestazure-0.5.1-1.el7.noarch.rpm40dc42bb0f00b2592a956d9cc8f3945e3b8044cd9d11e564f40912b68206ad21SLEA-2019:2326-1Python-Azure-SdkScientific LinuxScientific Linux 7python-azure-sdk-4.0.0-1.el7.noarch.rpm16e2a20fb3f1e1fd3a690bb47a90e9733c24c3930d47314b3dc57b842bee2983SLEA-2023:7283Microcode_Ctl Bug Fix And Enhancement UpdateThe microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20231009 release, which addresses CVE-2023-23583. (RHEL-3920) Scientific Linux 7microcode_ctl-2.1-73.20.el7_9.x86_64.rpm5923cdb7d020178f9cbd103fcf7ca35481fb5db52ccfeb2fd18940c86ee0a80fSLSA-2015:0642-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-0836, CVE-2015-0831, CVE-2015-0827) An information leak flaw was found in the way Thunderbird implemented autocomplete forms. An attacker able to trick a user into specifying a local file in the form could use this flaw to access the contents of that file. (CVE-2015-0822) Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. After installing the update, Thunderbird must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7thunderbird-31.5.0-2.el7_1.x86_64.rpm7f4c6941c1e26bd21c25669ffd82ed379bab00784d4b42987515cd0b2a976ccfSLSA-2015:0672-1BindA flaw was found in the way BIND handled trust anchor management. A remote attacker could use this flaw to cause the BIND daemon (named) to crash under certain conditions. (CVE-2015-1349) After installing the update, the BIND daemon (named) will be restarted automatically.moderateScientific LinuxScientific Linux 7bind-9.9.4-18.el7_1.1.x86_64.rpmedc828372143fe36bebd8c9693db9ce915d07b5a77bb191d58957506054b515fbind-sdb-9.9.4-18.el7_1.1.x86_64.rpm19285b14112b9460a8fb7b8856ce36955d3fc0e3bcc0cf524b2469e4e8f7f6cebind-devel-9.9.4-18.el7_1.1.x86_64.rpm885f94e2b3e6c5e21ccfe7f90f4b15045b4819a511952739538ef183e2af47f2bind-sdb-chroot-9.9.4-18.el7_1.1.x86_64.rpm41da68e686fe006a9df34975f03150de0bcf42cfa3466434a4dc694bbac5508fbind-utils-9.9.4-18.el7_1.1.x86_64.rpmbdb9bac03867a2e187813e5cda232aa597269f368b100a16c6bb4e8556e83473bind-devel-9.9.4-18.el7_1.1.i686.rpm590db44d5aa11a6584360bdf753c0bc9f8571194c10313fc05947a755d71f166bind-libs-lite-9.9.4-18.el7_1.1.i686.rpmbe445c288eac767c2100578b201642e2c3f06ab3f2ac4507e897b2d712ce0256bind-license-9.9.4-18.el7_1.1.noarch.rpmc5dcf28dca49327e47221ee440bdc36763317dbb2b6a39b12036aca24a3e28d6bind-lite-devel-9.9.4-18.el7_1.1.i686.rpm2d4ef05d88de8736310693f55e4338c3eb64edc832cbc4ed856293e0adc83476bind-libs-9.9.4-18.el7_1.1.i686.rpme8eb30ffbcb14c062a7deaa2431e533172696c3a779cec99cf90b603ec3496b1bind-libs-9.9.4-18.el7_1.1.x86_64.rpm8464bc133fd41d696f1171fcc9e4c400bca3edefdb17a83a154c125079a15c4fbind-lite-devel-9.9.4-18.el7_1.1.x86_64.rpmde00221af4fd5c4dca42493a51ac3f78003ae50d3ec3535a7d9a01d22befa34dbind-chroot-9.9.4-18.el7_1.1.x86_64.rpm3e9c2620ce8a5b7ea6f0f7b414d2195d45feec81e58fff3386f6ae510ac1d639bind-libs-lite-9.9.4-18.el7_1.1.x86_64.rpm66e3db4edf14ef84dc8f119c947f72c3a23109946d8fdd05e2da43d0db2e8f4aSLSA-2015:0696-1FreetypeMultiple integer overflow flaws and an integer signedness flaw, leading to heap-based buffer overflows, were found in the way FreeType handled Mac fonts. If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2014-9673, CVE-2014-9674) Multiple flaws were found in the way FreeType handled fonts in various formats. If a specially crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, possibly, disclose a portion of the application memory. (CVE-2014-9657, CVE-2014-9658, CVE-2014-9660, CVE-2014-9661, CVE-2014-9663, CVE-2014-9664, CVE-2014-9667, CVE-2014-9669, CVE-2014-9670, CVE-2014-9671, CVE-2014-9675) The X server must be restarted (log out, then log back in) for this update to take effect.importantScientific LinuxtrueScientific Linux 7freetype-devel-2.4.11-10.el7_1.1.x86_64.rpm238b964fb302abe4fe03a3ef0071f3dd2960d12d0c48a3e5a6425670b4758d72freetype-demos-2.4.11-10.el7_1.1.x86_64.rpm55fdd93f611b824c8f220f69f37724d5094ecc86f3151a577e3888c96156e4f6freetype-2.4.11-10.el7_1.1.i686.rpm68e2b8bc14fbb971d8a8cac82dc58cd535081ddce883420124ff9752ca620da0freetype-2.4.11-10.el7_1.1.x86_64.rpm279d7fa397b457ca32133289e47c35dfe2e315001cfd199e4dc865f2d054295dfreetype-devel-2.4.11-10.el7_1.1.i686.rpmde0c3a8644dcb5fc38d55ddeee3b61efd5fe4f7bb32edcc5fbf3855fa93664c1SLSA-2015:0700-1UnzipA buffer overflow was found in the way unzip uncompressed certain extra fields of a file. A specially crafted Zip archive could cause unzip to crash or, possibly, execute arbitrary code when the archive was tested with unzip's '-t' option. (CVE-2014-9636) A buffer overflow flaw was found in the way unzip computed the CRC32 checksum of certain extra fields of a file. A specially crafted Zip archive could cause unzip to crash when the archive was tested with unzip's '-t' option. (CVE-2014-8139) An integer underflow flaw, leading to a buffer overflow, was found in the way unzip uncompressed certain extra fields of a file. A specially crafted Zip archive could cause unzip to crash when the archive was tested with unzip's '-t' option. (CVE-2014-8140) A buffer overflow flaw was found in the way unzip handled Zip64 files. A specially crafted Zip archive could possibly cause unzip to crash when the archive was uncompressed. (CVE-2014-8141)moderateScientific LinuxScientific Linux 7unzip-6.0-15.el7.x86_64.rpmce55306f68cb97557d65b2391f7ab0b97d9209a899941ee656dffe9f718ab0e3SLSA-2015:0716-1OpensslAn invalid pointer use flaw was found in OpenSSL's ASN1_TYPE_cmp() function. A remote attacker could crash a TLS/SSL client or server using OpenSSL via a specially crafted X.509 certificate when the attacker- supplied certificate was verified by the application. (CVE-2015-0286) An integer underflow flaw, leading to a buffer overflow, was found in the way OpenSSL decoded malformed Base64-encoded inputs. An attacker able to make an application using OpenSSL decode a specially crafted Base64-encoded input (such as a PEM file) could use this flaw to cause the application to crash. Note: this flaw is not exploitable via the TLS/SSL protocol because the data being transferred is not Base64-encoded. (CVE-2015-0292) A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. A remote attacker could use this flaw to cause a TLS/SSL server using OpenSSL to exit on a failed assertion if it had both the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293) A use-after-free flaw was found in the way OpenSSL imported malformed Elliptic Curve private keys. A specially crafted key file could cause an application using OpenSSL to crash when imported. (CVE-2015-0209) An out-of-bounds write flaw was found in the way OpenSSL reused certain ASN.1 structures. A remote attacker could possibly use a specially crafted ASN.1 structure that, when parsed by an application, would cause that application to crash. (CVE-2015-0287) A NULL pointer dereference flaw was found in OpenSSL's X.509 certificate handling implementation. A specially crafted X.509 certificate could cause an application using OpenSSL to crash if the application attempted to convert the certificate to a certificate request. (CVE-2015-0288) A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. An attacker able to make an application using OpenSSL verify, decrypt, or parse a specially crafted PKCS#7 input could cause that application to crash. TLS/SSL clients and servers using OpenSSL were not affected by this flaw. (CVE-2015-0289) This update also fixes the following bug: * When a wrapped Advanced Encryption Standard (AES) key did not require any padding, it was incorrectly padded with 8 bytes, which could lead to data corruption and interoperability problems. With this update, the rounding algorithm in the RFC 5649 key wrapping implementation has been fixed. As a result, the wrapped key conforms to the specification, which prevents the described problems. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.moderateScientific LinuxtrueScientific Linux 7openssl-libs-1.0.1e-42.el7_1.4.x86_64.rpmba2f92c8f56e0a901d37ad24d3ae847ddcc0155a985e1548b57b9bdc898d1c0bopenssl-1.0.1e-42.el7_1.4.x86_64.rpm69fd9855be56e859041a9018ae2ba552b465c53995e08c77b18cc60dd7ddf249openssl-devel-1.0.1e-42.el7_1.4.i686.rpme1c79649e18d9c4ac23f5a32db12a0310e0b92de6a56e6fec02da619a3a38190openssl-static-1.0.1e-42.el7_1.4.x86_64.rpmc1ddb723dd3f481357fb1606d11e4e5b4d03a0589520ac301a5c32dcd1e7d03fopenssl-static-1.0.1e-42.el7_1.4.i686.rpm41eb32bba5954119eacfe23963bcd5a030ee2291d9ff5859dfccf061c7127903openssl-devel-1.0.1e-42.el7_1.4.x86_64.rpm3d51cd2243cfa676ac905d27e6fe11709378c3a008b9c40bae0a0671151b2930openssl-libs-1.0.1e-42.el7_1.4.i686.rpm87eda8ab6d07e8abb09734180db89df4bcc139910911403e6f6417e653965a54openssl-perl-1.0.1e-42.el7_1.4.x86_64.rpm88fc8cd2e0cd548e5ea26b7b269ab06c43f0dbc5bfc1f00cfa666e34c3d89e2cSLSA-2015:0718-1FirefoxTwo flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0817, CVE-2015-0818) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-31.5.3-3.el7_1.i686.rpm97b58a4769a312da085f58632285462a097cfc9737ee953288033518396a1e78firefox-31.5.3-3.el7_1.x86_64.rpm38def6262aab83707b1028d0667246e329d935e7ff02a6900d3e88399751c852SLSA-2015:0726-1Kernel* It was found that the Linux kernel's Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the (u)verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-8159, Important) * A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1421, Important) This update also fixes the following bugs: * In certain systems with multiple CPUs, when a crash was triggered on one CPU with an interrupt handler and this CPU sent Non-Maskable Interrupt (NMI) to another CPU, and, at the same time, ioapic_lock had already been acquired, a deadlock occurred in ioapic_lock. As a consequence, the kdump service could become unresponsive. This bug has been fixed and kdump now works as expected. * On Lenovo X1 Carbon 3rd Gen, X250, and T550 laptops, the thinkpad_acpi module was not properly loaded, and thus the function keys and radio switches did not work. This update applies a new string pattern of BIOS version, which fixes this bug, and function keys and radio switches now work as intended. * During a heavy file system load involving many worker threads, all worker threads in the pool became blocked on a resource, and no manager thread existed to create more workers. As a consequence, the running processes became unresponsive. With this update, the logic around manager creation has been changed to assure that the last worker thread becomes a manager thread and does not start executing work items. Now, a manager thread exists, spawns new workers as needed, and processes no longer hang. * If a thin-pool's metadata enters read-only or fail mode, for example, due to thin-pool running out of metadata or data space, any attempt to make metadata changes such as creating a thin device or snapshot thin device should error out cleanly. However, previously, the kernel code returned verbose and alarming error messages to the user. With this update, due to early trapping of attempt to make metadata changes, informative errors are displayed, no longer unnecessarily alarming the user. * When running Scientific Linux as a guest on Microsoft Hyper-V hypervisor, the storvsc module did not return the correct error code for the upper level Small Computer System Interface (SCSI) subsystem. As a consequence, a SCSI command failed and storvsc did not handle such a failure properly under some conditions, for example, when RAID devices were created on top of storvsc devices. An upstream patch has been applied to fix this bug, and storvsc now returns the correct error code in the described situation. The system must be rebooted for this update to take effect.importantScientific LinuxtrueScientific Linux 7kernel-3.10.0-229.1.2.el7.x86_64.rpm3ac68024d4a26672fd376af546f4e1c51dca47b1f1c190d45b2f8c7d0e249f74kernel-tools-3.10.0-229.1.2.el7.x86_64.rpm8abf65126d82220a07c3b4e6d9a301960a8f108ec12bd88e2ab590b6a53195afkernel-headers-3.10.0-229.1.2.el7.x86_64.rpm3e04ddca0709eb4f3996501620f6e3088431597f272b23a9abdbf8773aeb7a56kernel-debug-3.10.0-229.1.2.el7.x86_64.rpmda01f25ef811becb684e81fd1d007c87e0908653a1427a946fcb4a9bee78f7a6kernel-debug-devel-3.10.0-229.1.2.el7.x86_64.rpma8bbf9a48cf273fd7d75dc764f5b982ac877d03073f75e39e4c12dc0071e4867kernel-abi-whitelists-3.10.0-229.1.2.el7.noarch.rpmedf7dd603e43dce20b2100e766a839c84c03aa9bc1558f5f54d81645336d8bcbkernel-tools-libs-3.10.0-229.1.2.el7.x86_64.rpm2a2ae6f36e023466e4f2d472826abbd843160fed56452033e3e3b60c7bc886bcpython-perf-3.10.0-229.1.2.el7.x86_64.rpmc9dc6150caa3f3dcb6ce73d77ad31f02d5614ff09328a53c8c409d84f973d7d7kernel-devel-3.10.0-229.1.2.el7.x86_64.rpm19d8d2395e4f2972e910c71dfaee55bd809850497ded1dd2e80f556cf97b020fkernel-doc-3.10.0-229.1.2.el7.noarch.rpm84b0a1c22a2f3170b4fa2fcc85ce0f6676fe33d27096dc2ca5fbfe63a85c48a0kernel-tools-libs-devel-3.10.0-229.1.2.el7.x86_64.rpm54088733e6e0c173081aaed42146927e5f5f5b3e2005c660148d66c28d7e331fperf-3.10.0-229.1.2.el7.x86_64.rpmd990075aaa43912b57aba49116ef46c4c5d015bb1a0ba6627181f91555759993SLSA-2015:0728-1Ipa And Slapi-NisThe ipa component provides centrally managed Identity, Policy, and Audit. The slapi-nis component provides NIS Server and Schema Compatibility plug- ins for Directory Server. It was discovered that the IPA extdom Directory Server plug-in did not correctly perform memory reallocation when handling user account information. A request for a list of groups for a user that belongs to a large number of groups would cause a Directory Server to crash. (CVE-2015-1827) It was discovered that the slapi-nis Directory Server plug-in did not correctly perform memory reallocation when handling user account information. A request for information about a group with many members, or a request for a user that belongs to a large number of groups, would cause a Directory Server to enter an infinite loop and consume an excessive amount of CPU time. (CVE-2015-0283) This update fixes the following bugs: * Previously, users of IdM were not properly granted the default permission to read the "facsimiletelephonenumber" user attribute. This update adds "facsimiletelephonenumber" to the Access Control Instruction (ACI) for user data, which makes the attribute readable to authenticated users as expected. * Prior to this update, when a DNS zone was saved in an LDAP database without a dot character (.) at the end, internal DNS commands and operations, such as dnsrecord-* or dnszone-*, failed. With this update, DNS commands always supply the DNS zone with a dot character at the end, which prevents the described problem. * After a full-server IdM restore operation, the restored server in some cases contained invalid data. In addition, if the restored server was used to reinitialize a replica, the replica then contained invalid data as well. To fix this problem, the IdM API is now created correctly during the restore operation, and *.ldif files are not skipped during the removal of RUV data. As a result, the restored server and its replica no longer contain invalid data. * Previously, a deadlock in some cases occurred during an IdM upgrade, which could cause the IdM server to become unresponsive. With this update, the Schema Compatibility plug-in has been adjusted not to parse the subtree that contains the configuration of the DNA plug-in, which prevents this deadlock from triggering. * When using the extdom plug-in of IdM to handle large groups, user lookups and group lookups previously failed due to insufficient buffer size. With this update, the getgrgid_r() call gradually increases the buffer length if needed, and the described failure of extdom thus no longer occurs.moderateScientific LinuxScientific Linux 7ipa-admintools-4.1.0-18.sl7_1.3.x86_64.rpmda784eaf96e0fc508454f9a2c73b4e5ae0ebdeb586ad18b66be8cb3c209b9c8eipa-server-4.1.0-18.sl7_1.3.x86_64.rpm7f1f34feca606fa2d7c7bf45c895ca26437df66d7f1f57723a12cf3b48845f2fslapi-nis-0.54-3.el7_1.x86_64.rpm3da15c79ebd8d3d86d42f31293c32896fad32eb021b0d97d97d5e3b18ff85f7aipa-python-4.1.0-18.sl7_1.3.x86_64.rpm2a2e0ec629c57d217d1df2881a2c87e6b511af4beb9879d25a7e39d79d9f79a7ipa-client-4.1.0-18.sl7_1.3.x86_64.rpm54fa6f863d586a10e681cc9513bc2cd2a5ffe595cf3027e927fc0779c0a5bd6bipa-server-trust-ad-4.1.0-18.sl7_1.3.x86_64.rpm296bdfa03a47c8dff5e802eab06bd4806626011a293d9f6289b05dc6582ff7fdSLSA-2015:0729-1SetroubleshootIt was found that setroubleshoot did not sanitize file names supplied in a shell command look-up for RPMs associated with access violation reports. An attacker could use this flaw to escalate their privileges on the system by supplying a specially crafted file to the underlying shell command. (CVE-2015-1815)importantScientific LinuxScientific Linux 7setroubleshoot-server-3.2.17-4.1.el7_1.x86_64.rpm2805e538011d7b0c6cec90d01472c2471be7b8fe57ab88a4377bc7ba238d2bf5setroubleshoot-3.2.17-4.1.el7_1.x86_64.rpm247974e9648ba74971f3ff27a500fc27c511110744db8470cbeb67f77a7f2958SLSA-2015:0749-1Libxml2It was discovered that libxml2 loaded external parameter entities even when entity substitution was disabled. A remote attacker able to provide a specially crafted XML file to an application linked against libxml2 could use this flaw to conduct XML External Entity (XXE) attacks, possibly resulting in a denial of service or an information leak on the system. (CVE-2014-0191) The desktop must be restarted (log out, then log back in) for this update to take effect.moderateScientific LinuxtruetrueScientific Linux 7libxml2-devel-2.9.1-5.el7_1.2.x86_64.rpm072bd3bf6559be66fe4abebfdc86135153c743c9eaa309387541c9e3584ad528libxml2-2.9.1-5.el7_1.2.x86_64.rpm9119aeb05f90f2bf580a0092c0ca9390b5165f98843c965ccd50580bea1a731elibxml2-devel-2.9.1-5.el7_1.2.i686.rpmde3c5a087d04b5db67f5c20a0da2b3bf3d804f517185c5d87d173e675feebd6clibxml2-2.9.1-5.el7_1.2.i686.rpma74a8269add1d70172ca777d6bcd645fd57fc0a0f9b4d52ca975fc708d486747libxml2-python-2.9.1-5.el7_1.2.x86_64.rpmb93a545a82b57558ffd76194141abdd4806ba50d2cf3d57f58e74217802f6361libxml2-static-2.9.1-5.el7_1.2.i686.rpma6118a8caf5509f8c0e198f2608c3974f30987ee65f3b6c8037ca525ea8e5535libxml2-static-2.9.1-5.el7_1.2.x86_64.rpmf51d82c204f89b24f880f9f6340d62d97b411a57769b395ed78ef62aacef7914SLSA-2015:0750-1PostgresqlAn information leak flaw was found in the way the PostgreSQL database server handled certain error messages. An authenticated database user could possibly obtain the results of a query they did not have privileges to execute by observing the constraint violation error messages produced when the query was executed. (CVE-2014-8161) A buffer overflow flaw was found in the way PostgreSQL handled certain numeric formatting. An authenticated database user could use a specially crafted timestamp formatting template to cause PostgreSQL to crash or, under certain conditions, execute arbitrary code with the permissions of the user running PostgreSQL. (CVE-2015-0241) A stack-buffer overflow flaw was found in PostgreSQL's pgcrypto module. An authenticated database user could use this flaw to cause PostgreSQL to crash or, potentially, execute arbitrary code with the permissions of the user running PostgreSQL. (CVE-2015-0243) A flaw was found in the way PostgreSQL handled certain errors that were generated during protocol synchronization. An authenticated database user could use this flaw to inject queries into an existing connection. (CVE-2015-0244) If the postgresql service is running, it will be automatically restarted after installing this update.moderateScientific LinuxScientific Linux 7postgresql-contrib-9.2.10-2.el7_1.x86_64.rpmdba3e4028b97f456cd76681401607310fe8accff5004756fe02faf36fefbdfb3postgresql-docs-9.2.10-2.el7_1.x86_64.rpm5aa72d47ce59513d716c1c241158ed98a2a73584cc763430687770702abfa3e3postgresql-devel-9.2.10-2.el7_1.x86_64.rpmb655df912f72b80d4f09c5dd924644be76e9d95d4e4cf723c3177cb48a5e73b2postgresql-plperl-9.2.10-2.el7_1.x86_64.rpm3f82580d752e915daad822fc4db0bb8f0d345cab10f13dc215a1b1c2d1da01f4postgresql-9.2.10-2.el7_1.i686.rpm76ff7fb2b479008ed03a03601d95e8eaad702ec20b57b089512226523878ae41postgresql-libs-9.2.10-2.el7_1.x86_64.rpm8b5044faad4c380b724535c877a1b6b5a07a48776e1032dbd0b52b881e18ec27postgresql-plpython-9.2.10-2.el7_1.x86_64.rpmc588dfa05dcf8f9556e59ca806d6a7bef617d22adc111bcbbf582e2d54e6b816postgresql-upgrade-9.2.10-2.el7_1.x86_64.rpm1aa99503623d85d041e9ae528f05679970c8bca759bf268358747b2822e2996cpostgresql-test-9.2.10-2.el7_1.x86_64.rpm0fc191a18e362381543e3c374deffed99e4aa75692d02059bd53a6f79fd028depostgresql-9.2.10-2.el7_1.x86_64.rpmbaa571b9eb6c9316ed23cb767cac40d0bdc4b6a6ab5276bed9ae74e70628431cpostgresql-libs-9.2.10-2.el7_1.i686.rpm97e35e34684368f731211654f59855bd3ba1e58bc44a43869aa49593524a442fpostgresql-server-9.2.10-2.el7_1.x86_64.rpm00eac2686aeffbaf7be00b63f895acefe9ee32da2d00cc9551b25f1a2a8c8232postgresql-devel-9.2.10-2.el7_1.i686.rpm68ca9b5c62cd49aed0b3c0d72c771754df60a0f417df4f7c5ec2e1a59cb81c12postgresql-pltcl-9.2.10-2.el7_1.x86_64.rpm2c27edf79ffbb3fe736aa8619442b1d19bd868cb7a58e9d1e071c511c3dbb7b3SLSA-2015:0766-1FirefoxSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0813, CVE-2015-0815, CVE-2015-0801) A flaw was found in the way documents were loaded via resource URLs in, for example, Mozilla's PDF.js PDF file viewer. An attacker could use this flaw to bypass certain restrictions and under certain conditions even execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-0816) A flaw was found in the Beacon interface implementation in Firefox. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (CSRF) attack. (CVE-2015-0807) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-31.6.0-2.el7_1.x86_64.rpm3275fc143bc876c97626cd9ebc9a6d07a898850c6eb963dbbab16482561fe8e5xulrunner-31.6.0-2.el7_1.i686.rpm2db26550c2837f75a19d0dfe30f735dabf2644a4ce922ff77b7746683030276exulrunner-devel-31.6.0-2.el7_1.i686.rpm13fdec9eed16617e98350e402870eeee94bfc3c981b7a2365daef637111a6eb9xulrunner-devel-31.6.0-2.el7_1.x86_64.rpmebc3e14513358d53fbaa2718fd583c32c1d473a07053ed33d105d71be1140686xulrunner-31.6.0-2.el7_1.x86_64.rpm0a748ec484d61455bee7c86b3583bbc214e8962914989d4ef0b45c6ce029f946firefox-31.6.0-2.el7_1.i686.rpmaccef961be92a3ef9eaa187d7fec6da733e7275678c51fc5f8a0c27bb9f0fd26SLSA-2015:0767-1FlacA buffer overflow flaw was found in the way flac decoded FLAC audio files. An attacker could create a specially crafted FLAC audio file that could cause an application using the flac library to crash or execute arbitrary code when the file was read. (CVE-2014-9028) A buffer over-read flaw was found in the way flac processed certain ID3v2 metadata. An attacker could create a specially crafted FLAC audio file that could cause an application using the flac library to crash when the file was read. (CVE-2014-8962) After installing the update, all applications linked against the flac library must be restarted for this update to take effect.importantScientific LinuxtrueScientific Linux 7flac-1.3.0-5.el7_1.x86_64.rpmd588e0543febd248c187bf41581efa5bbf057c736c2d48ad50f95ee97d88ff6cflac-libs-1.3.0-5.el7_1.i686.rpm612dcd995c19550b935e83684b46179d39903914f53f610b0e511b0e7c66eb69flac-devel-1.3.0-5.el7_1.i686.rpm7662a6ef73bb2fba7726e0e3b72750381246347d213c6cf1ae4588607222ec92flac-libs-1.3.0-5.el7_1.x86_64.rpm19db40970dff90e66f3c6ca86103349578bf0e1abd6d8e408dcba72242954619flac-devel-1.3.0-5.el7_1.x86_64.rpm287bcf9e416d4ec77fd6ec29d5221d3b0ca8192294068c9091390f6d599ba26aSLSA-2015:0771-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-0813, CVE-2015-0815, CVE-2015-0801) A flaw was found in the way documents were loaded via resource URLs. An attacker could use this flaw to bypass certain restrictions and under certain conditions even execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-0816) A flaw was found in the Beacon interface implementation in Thunderbird. A web page containing malicious content could allow a remote attacker to conduct a Cross-Site Request Forgery (CSRF) attack. (CVE-2015-0807) Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. After installing the update, Thunderbird must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7thunderbird-31.6.0-1.el7_1.x86_64.rpmac060f7127a00ae84cd1f5cb0611256a125120f1f02db5469d1a582a67ad8e5fSLSA-2015:0797-1Xorg-X11-ServerA buffer over-read flaw was found in the way the X.Org server handled XkbGetGeometry requests. A malicious, authorized client could use this flaw to disclose portions of the X.Org server memory, or cause the X.Org server to crash using a specially crafted XkbGetGeometry request. (CVE-2015-0255)moderateScientific LinuxScientific Linux 7xorg-x11-server-source-1.15.0-33.el7_1.noarch.rpmba518b0044890d6ec28639140b495387c7b41e22c24e4ed1356e8f476310f113xorg-x11-server-Xephyr-1.15.0-33.el7_1.x86_64.rpma92c08e7e9522b8ae6f0b401064c144c620aa7623eb1a6491b5114b67703616exorg-x11-server-common-1.15.0-33.el7_1.x86_64.rpm4b1920331ea51b2a6f509d452423c1cee592e9de24163260ac091dd7e1df59c7xorg-x11-server-devel-1.15.0-33.el7_1.x86_64.rpma63abb6d30a560b779e1c6d929f9809fa8bc64aca7271ed363366f60adbac569xorg-x11-server-Xorg-1.15.0-33.el7_1.x86_64.rpm29bcd151a10af8a47362d919fbe79207cbb80d81bbf2be3595a3e6a64f6d73c2xorg-x11-server-devel-1.15.0-33.el7_1.i686.rpmc46ef829f36ffa93670d4f57be3153a4fdc2f76b29b37ccc0060a31c411b316fxorg-x11-server-Xnest-1.15.0-33.el7_1.x86_64.rpmc1fdf5ead66e8451a0eedf7115d5670c6a43c1f5cb5bb4236e89e4e7e7dd8ec1xorg-x11-server-Xdmx-1.15.0-33.el7_1.x86_64.rpmfbda35ddc75b45d9aff9a62b9339faea1fbfb1a63a74d576c2de23d2015d817bxorg-x11-server-Xvfb-1.15.0-33.el7_1.x86_64.rpmed178e94a5d77978034ac293136cdce0314fd5d3783255dbad4b54d1fdf2006eSLSA-2015:0806-1Java-1.7.0-OpenjdkAn off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0460) A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. (CVE-2015-0488) A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0477) A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. (CVE-2005-1080, CVE-2015-0480) It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. (CVE-2015-0478) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. All running instances of OpenJDK Java must be restarted for the update to take effect.criticalScientific LinuxtrueScientific Linux 7java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el7_1.x86_64.rpm44f19121c38d3c37a9d401eacc2efe323b043a30daaeb3897f3469e685fc95cbjava-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el7_1.x86_64.rpmf3bbfd664185e0e583492bc122227d2efd8aad4344cf439d5ef4113e4c1a2496java-1.7.0-openjdk-accessibility-1.7.0.79-2.5.5.1.el7_1.x86_64.rpm62178cd1bc81aa219e18894f622823544e7590b2bec4b966e73428900267f99ejava-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el7_1.noarch.rpme4c6f510d481ec35a2038a9317e756f24f8acc51d5cd088a28c83ee4a26bbbb9java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el7_1.x86_64.rpma36bdc03a3cd3289be1eeaceb9d85ec15b9f9ae907bd6b46e08a20d674c78cefjava-1.7.0-openjdk-headless-1.7.0.79-2.5.5.1.el7_1.x86_64.rpma149e6ae086f65a3c6b1466c4cd4f8f83aeaf32f377914e0c8801554f11eb1fajava-1.7.0-openjdk-1.7.0.79-2.5.5.1.el7_1.x86_64.rpm7ec66b3176f65a7d513504817f2659aa2e40a50d5a8bfc86fc04239ecce1cf5fSLSA-2015:0808-1Java-1.6.0-OpenjdkAn off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0460) A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. (CVE-2015-0488) A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-0477) A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. (CVE-2005-1080, CVE-2015-0480) It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. (CVE-2015-0478) All running instances of OpenJDK Java must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el7_1.x86_64.rpmd9f99c837af1a6bd013a37d5b1529f817f26715d75cfd077e305e02b389e14acjava-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el7_1.x86_64.rpmde726ecd7a5d35635b31ef2ec97434d083fec2ab8ec00cf4b24b315aeeee7469java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el7_1.x86_64.rpm1ef2803d4bfd284d2ab6b327f8d187b323acead2a6babd21e4470ae98db187ffjava-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el7_1.x86_64.rpmfd64a80cb8ea24bc8a39c3678669b1283dd982955524605449e6f0adc037d595java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el7_1.x86_64.rpme5aac6843324841b66126d3bd0fe715b45d09e9d87615e22ec49b290c4b637e4SLSA-2015:0809-1Java-1.8.0-OpenjdkAn off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2015-0469) A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. (CVE-2015-0460) A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. (CVE-2015-0488) Multiple flaws were discovered in the Beans and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-0477, CVE-2015-0470) A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. (CVE-2005-1080, CVE-2015-0480) It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. (CVE-2015-0478) All running instances of OpenJDK Java must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1.x86_64.rpm741a7e0f144c405cc75c0df2083e65aaa5d7499924c55ab9962c8ccf77aa054fjava-1.8.0-openjdk-1.8.0.45-30.b13.el7_1.x86_64.rpmd83247c9f98b6ab34b95fc51f2518240626e6380b9902a6fa7a7c8b41e3b6533java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1.x86_64.rpma44c7fa6a5281e3b530c9127b4b91297a830a62a5657fccb10f67c78dfcf3b35java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1.noarch.rpm144da2c69ac4fd8a05319a57c59003449e7b9dea79a1800e44177e5bad20734ejava-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1.x86_64.rpmde08e6272d372ba6fade9bc30ef19c229035dc8600aee52a272885ec8fd18d5djava-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1.x86_64.rpmd51ae80a0d5cc60f61b821e9ade794da9be7fb78833d4ba44d8d825cef57fac3java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1.x86_64.rpm4848510aa6fe6d80764d9d234bab4a3a8a004644962e62b21f5df73d65d66f0fSLSA-2015:0895-1Important: 389-Ds-Base Security UpdateA flaw was found in the way the Directory Server performed authorization of modrdn operations. An unauthenticated attacker able to issue an ldapmodrdn call to the directory server could use this flaw to perform unauthorized modifications of entries in the directory server. (CVE-2015-1854) After installing this update, the 389 server service will be restarted automatically.importantScientific LinuxScientific Linux 7389-ds-base-1.3.3.1-16.el7_1.x86_64.rpm461ef8457460e3de9691119b555b573937d380e7dbba645414b3bd378622f1fd389-ds-base-libs-1.3.3.1-16.el7_1.x86_64.rpm56d2844740d61feda5675bb827c458834f3921bf90e882f815b17a272959ac71389-ds-base-devel-1.3.3.1-16.el7_1.x86_64.rpm402eccb85049d91e4978967421960571a677401108073a5cffebdc32b96594c9SLSA-2015:0980-1PcsIt was found that the pcs daemon did not sign cookies containing session data that were sent to clients connecting via the pcsd web UI. A remote attacker could use this flaw to forge cookies and bypass authorization checks, possibly gaining elevated privileges in the pcsd web UI. (CVE-2015-1848) This update also fixes the following bug: * Previously, the Corosync tool allowed the two_node option and the auto_tie_breaker option to exist in the corosync.conf file at the same time. As a consequence, if both options were included, auto_tie_breaker was silently ignored and the two_node fence race decided which node would survive in the event of a communication break. With this update, the pcs daemon has been fixed so that it does not produce corosync.conf files with both two_node and auto_tie_breaker included. In addition, if both two_node and auto_tie_breaker are detected in corosync.conf, Corosync issues a message at start-up and disables two_node mode. As a result, auto_tie_breaker effectively overrides two_node mode if both options are specified. After installing the updated packages, the pcsd daemon will be restarted automatically.importantScientific LinuxScientific Linux 7python-clufter-0.9.137-13.el7_1.2.x86_64.rpmb60c9f9583b4c367d4b1aa5eaa307292e46e4e30d60bb0953bce9fa60c975582pcs-0.9.137-13.el7_1.2.x86_64.rpm744abc2115eab007ba710186a80c9272909f9031feaf2b6e108cf9e4d9f5a1b0SLSA-2015:0983-1TomcatIt was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service. (CVE-2014-0227) After installing this update, the tomcat service will be restarted automatically.moderateScientific LinuxScientific Linux 7tomcat-jsp-2.2-api-7.0.54-2.el7_1.noarch.rpm55a18da006b2f80687e82a01731bdb7f65c5e2079712e4b19d5877e1e1442256tomcat-webapps-7.0.54-2.el7_1.noarch.rpm21370e227c2388e07806dbea57d3814d0a56a14c115a69ff94d2936345b4ef37tomcat-7.0.54-2.el7_1.noarch.rpmb174e22ecf65241d23486a1b71c9338ec3b3eaee79df03163c1914df24674f79tomcat-admin-webapps-7.0.54-2.el7_1.noarch.rpme3fada52f9daa627aa993fc0c3d2436de8938caa4d56c9e86ba09a2c89f633b3tomcat-lib-7.0.54-2.el7_1.noarch.rpme8f514568e3d5470baff2e24fc2287131321a352e4df177a157ed978c7511331tomcat-servlet-3.0-api-7.0.54-2.el7_1.noarch.rpm3b6b850356ce8fb916b846e6e7eea8206e7a0f0d56d74394e79c53558eb2be18tomcat-docs-webapp-7.0.54-2.el7_1.noarch.rpm0691bda0b563fa4f54e4f92f5e88e9309cde619933e49f1d7d8278de535c01a4tomcat-el-2.2-api-7.0.54-2.el7_1.noarch.rpm50c55fb1acb9d274df464066534b25fb8445464bae1d05ab8ef7a962897453fdtomcat-jsvc-7.0.54-2.el7_1.noarch.rpmc6589055659c9fc053c3e0a5c2e376cd840ae50a0c0e9b0db5003bc6dc189b71tomcat-javadoc-7.0.54-2.el7_1.noarch.rpm934bd89ae62ebabe6b7ca9ce3773b1cfff6f4f67055f167cae4e477fa42fe079SLSA-2015:0986-1Kexec-ToolsIt was found that the module-setup.sh script provided by kexec-tools created temporary files in an insecure way. A malicious, local user could use this flaw to conduct a symbolic link attack, allowing them to overwrite the contents of arbitrary files. (CVE-2015-0267) This update also fixes the following bug: * On Atomic Host systems, the kdump tool previously saved kernel crash dumps in the /sysroot/crash file instead of the /var/crash file. The parsing error that caused this problem has been fixed, and the kernel crash dumps are now correctly saved in /var/crash. In addition, this update adds the following enhancement: * The makedumpfile command now supports the new sadump format that can represent more than 16 TB of physical memory space. This allows users of makedumpfile to read dump files over 16 TB, generated by sadump on certain upcoming server models.moderateScientific LinuxScientific Linux 7kexec-tools-2.0.7-19.el7_1.2.x86_64.rpmeafd6ab098eb215818c8731b6d30663d52847ddc996cb4cacc34510a8f38f7c5kexec-tools-anaconda-addon-2.0.7-19.el7_1.2.x86_64.rpm5128e0c0a185b79f977364957b328a27a4efe01a20cca4929050931e196c09a6kexec-tools-eppic-2.0.7-19.el7_1.2.x86_64.rpm6810ddb3778ea6118700562d467c9e17c10a9d5db4a3b7498228e8cdd401bb6cSLSA-2015:0987-1Kernel* A buffer overflow flaw was found in the way the Linux kernel's Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AEC-GCM mode IPSec security association. (CVE-2015-3331, Important) This update also fixes the following bugs: * Previously, the kernel audit subsystem did not correctly track file path names which could lead to empty, or "(null)" path names in the PATH audit records. This update fixes the bug by correctly tracking file path names and displaying the names in the audit PATH records. * Due to a change in the internal representation of field types, AUDIT_LOGINUID set to -1 (4294967295) by the audit API was asymmetrically converted to an AUDIT_LOGINUID_SET field with a value of 0, unrecognized by an older audit API. To fix this bug, the kernel takes note about the way the rule has been formulated and reports the rule in the originally given form. As a result, older versions of audit provide a report as expected, in the AUDIT_LOGINUID field type form, whereas the newer versions can migrate to the new AUDIT_LOGINUID_SET filed type. * The GFS2 file system "Splice Read" operation, which is used for the sendfile() function, was not properly allocating a required multi-block reservation structure in memory. Consequently, when the GFS2 block allocator was called to assign blocks of data, it attempted to dereference the structure, which resulted in a kernel panic. With this update, "Splice read" operation properly allocates the necessary reservation structure in memory prior to calling the block allocator, and sendfile() thus works properly for GFS2. * Moving an Open vSwitch (OVS) internal vport to a different net name space and subsequently deleting that name space led to a kernel panic. This bug has been fixed by removing the OVS internal vport at net name space deletion. * Previously, the kernel audit subsystem was not correctly handling file and directory moves, leading to audit records that did not match the audit file watches. This fix correctly handles moves such that the audit file watches work correctly. * Due to a regression, the crypto adapter could not be set online. A patch has been provided that fixes the device registration process so that the device can be used also before the registration process is completed, thus fixing this bug. * Due to incorrect calculation for entropy during the entropy addition, the amount of entropy in the /dev/random file could be overestimated. The formula for the entropy addition has been changed, thus fixing this bug. * Previously, the ansi_cprng and drbg utilities did not obey the call convention and returned the positive value on success instead of the correct value of zero. Consequently, Internet Protocol Security (IPsec) terminated unexpectedly when ansi_cprng or drbg were used. With this update, ansi_cprng and drbg have been changed to return zero on success, and IPsec now functions correctly. * Due to a failure to clear the timestamp flag when reusing a tx descriptor in the mlx4_en driver, programs that did not request a hardware timestamp packet on their sent data received it anyway, resulting in unexpected behavior in certain applications. With this update, when reusing the tx descriptor in the mlx4_en driver in the aforementioned situation, the hardware timestamp flag is cleared, and applications now behave as expected. The system must be rebooted for this update to take effect.importantScientific LinuxtrueScientific Linux 7kernel-debug-3.10.0-229.4.2.el7.x86_64.rpm2c7396c2ee42d68fd82bc70d9c08ffa2c39ed5ce386f324cf493fc27cc948335kernel-tools-libs-devel-3.10.0-229.4.2.el7.x86_64.rpmb5d3572c7351bdd9ddf79ac242385976d5fd2c052909bf7b2a9f8fc42c5726aakernel-tools-libs-3.10.0-229.4.2.el7.x86_64.rpma7535c9406e1ac72f4e5b9c600dec01a00335e2225212569d0680e1fcf9739acperf-3.10.0-229.4.2.el7.x86_64.rpm72f31bc0fc0152a0d4701b12b2eef2e76746e54ff351205de438ea54a17a9f0akernel-devel-3.10.0-229.4.2.el7.x86_64.rpma5c50a8bb194c5418abca08bf324cba3686e1eeef0a5110f0cecc643714e341epython-perf-3.10.0-229.4.2.el7.x86_64.rpm5e3b6995018a9a97c5e541e4d2ab66b76bbd673e544deb287ede816ef0fd6c7dkernel-abi-whitelists-3.10.0-229.4.2.el7.noarch.rpm50d0c79e909d6a5d1ad9297944872fa104764d3713d6cc51d6dd2a53b33eec9fkernel-3.10.0-229.4.2.el7.x86_64.rpm60b87e418cfd60e9829c279187d6a6972de63cc05919c16df2c5777d5a05a715kernel-debug-devel-3.10.0-229.4.2.el7.x86_64.rpma33059579a8a104d5aeef31e9750d1ce47245a135386c25e9821a559e5525f28kernel-headers-3.10.0-229.4.2.el7.x86_64.rpmc044266ca292f58e3f28b500c75d5c4b45f94ac08d78534709c5b08d6957dcc4kernel-doc-3.10.0-229.4.2.el7.noarch.rpmd25d857a88f3b717ea6356c846dc63dd2e81f11c59ab63230f1c2780546a24c5kernel-tools-3.10.0-229.4.2.el7.x86_64.rpm21c5634f66d6a008ad63f71ffd8743f4efeb7e58aa239ce2969fc2b508780d29SLSA-2015:0988-1FirefoxSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2708, CVE-2015-0797, CVE-2015-2710, CVE-2015-2713) A heap-based buffer overflow flaw was found in the way Firefox processed compressed XML data. An attacker could create specially crafted compressed XML content that, when processed by Firefox, could cause it to crash or execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2716) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.0-3.el7_1.i686.rpm156cb70d0d96c354601805f31124b355b1256ee9849021d856853874ff58c213firefox-38.0-3.el7_1.x86_64.rpm2e902588be4a7828d438ce15ca7b614dd79986724c74b12d472ad0c808db56e2SLSA-2015:0999-1Qemu-KvmAn out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller (FDC) handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest. (CVE-2015-3456) After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.importantScientific LinuxScientific Linux 7libcacard-devel-1.5.3-86.el7_1.2.x86_64.rpmd5a76324effd30b0292eae860bcd95f3c1efc6b8cba25461327da759a103a10aqemu-kvm-tools-1.5.3-86.el7_1.2.x86_64.rpm1ed0ec16753cff354a5aab2da3f86f74b0ef2db459f374bcee3b111743a2a753qemu-img-1.5.3-86.el7_1.2.x86_64.rpmf8204a6392d32dbcfe4dda92eddb117dec4de388e381c7d935dd6712e021d410qemu-kvm-1.5.3-86.el7_1.2.x86_64.rpmc24dc87b422610b2351222211f3f0a336837f8489bd1c05900cf85ca84b8182blibcacard-1.5.3-86.el7_1.2.i686.rpm547f73b0178ca3d62292020d28f1b61a2f0b6ec8f2610ad515edd8a7cc2b8b2flibcacard-tools-1.5.3-86.el7_1.2.x86_64.rpmc4a9c38d7090b60852bd4d847f608279a8708c2e10a6d95add009c436c7bcf52qemu-kvm-common-1.5.3-86.el7_1.2.x86_64.rpmd067de95a7000fa28cfdc9bdb6b4a87f7bdcd09a24f20357f37a78f0ab420c61libcacard-1.5.3-86.el7_1.2.x86_64.rpm80fcc9309289419d6a131eba85d1acd9d64a3ef594ffe7b77b874ea33dea91a4libcacard-devel-1.5.3-86.el7_1.2.i686.rpm3f9cb76e98b180767ed7829bdab559a60db3db4a4c2911a173819b9bf7c9c757SLSA-2015:1012-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-2708, CVE-2015-2710, CVE-2015-2713) A heap-based buffer overflow flaw was found in the way Thunderbird processed compressed XML data. An attacker could create specially crafted compressed XML content that, when processed by Thunderbird, could cause it to crash or execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-2716) Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed.importantScientific LinuxtrueScientific Linux 7thunderbird-31.7.0-1.el7_1.x86_64.rpm45cf3c5d7caf27465084054fdad17590e8de5da1fdda36d7a5da56437ba07ec8SLSA-2015:1072-1OpensslA flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.moderateScientific LinuxtrueScientific Linux 7openssl-perl-1.0.1e-42.el7_1.6.x86_64.rpmcd1b6a50e0236e5e87ee1dfc0fcb021a4350cbbabb17782f1108bea2a560dc52openssl-static-1.0.1e-42.el7_1.6.x86_64.rpmb2b7456384ad2cbb132de9e1d972558743aba45d92720a78bab261326740246copenssl-libs-1.0.1e-42.el7_1.6.i686.rpm283112c08a6df278b62c61c8066a582d0a6e6c2d62fe8e09bef742d50cf76761openssl-libs-1.0.1e-42.el7_1.6.x86_64.rpma4d0f51018200d0b84ff6e784ae9f3ecd1fd8cb0be8fb26ca7879380948241ebopenssl-1.0.1e-42.el7_1.6.x86_64.rpm954dcba41454564b78d356d450ce2f1978b983cb79910cdc392a9670ec648a77openssl-devel-1.0.1e-42.el7_1.6.x86_64.rpme2ff03a542f01894623d4aba95016d5d2220670cf33017b8436b64a847a74754openssl-static-1.0.1e-42.el7_1.6.i686.rpma76501604682f824117ea4b28690bfd918a8a8fc5d7b0ae33d0edec9e54da41dopenssl-devel-1.0.1e-42.el7_1.6.i686.rpmb151991c3b95f6fabeef44b83ba5b7c7739c7339bd61c8bee675b74ecb92a757SLSA-2015:1083-1AbrtIt was found that ABRT was vulnerable to multiple race condition and symbolic link flaws. A local attacker could use these flaws to potentially escalate their privileges on the system. (CVE-2015-3315) It was discovered that the kernel-invoked coredump processor provided by ABRT wrote core dumps to files owned by other system users. This could result in information disclosure if an application crashed while its current directory was a directory writable to by other users (such as /tmp). (CVE-2015-3142) It was discovered that the default event handling scripts installed by ABRT did not handle symbolic links correctly. A local attacker with write access to an ABRT problem directory could use this flaw to escalate their privileges. (CVE-2015-1869) It was found that the ABRT event scripts created a user-readable copy of an sosreport file in ABRT problem directories, and included excerpts of /var/log/messages selected by the user-controlled process name, leading to an information disclosure. (CVE-2015-1870) It was discovered that, when moving problem reports between certain directories, abrt-handle-upload did not verify that the new problem directory had appropriate permissions and did not contain symbolic links. An attacker able to create a crafted problem report could use this flaw to expose other parts of ABRT to attack, or to overwrite arbitrary files on the system. (CVE-2015-3147) Multiple directory traversal flaws were found in the abrt-dbus D-Bus service. A local attacker could use these flaws to read and write arbitrary files as the root user. (CVE-2015-3151) It was discovered that the abrt-dbus D-Bus service did not properly check the validity of the problem directory argument in the ChownProblemDir, DeleteElement, and DeleteProblem methods. A local attacker could use this flaw to take ownership of arbitrary files and directories, or to delete files and directories as the root user. (CVE-2015-3150) It was discovered that the abrt-action-install-debuginfo-to-abrt-cache helper program did not properly filter the process environment before invoking abrt-action-install-debuginfo. A local attacker could use this flaw to escalate their privileges on the system. (CVE-2015-3159)importantScientific LinuxScientific Linux 7abrt-tui-2.1.11-22.el7_1.x86_64.rpm58d7c1759c0b302dcec185c8940918d79f6d20f243d3a5fb2f31504609f2ef49libreport-devel-2.1.11-23.sl7.x86_64.rpm530d4751ce0a1edcb8ec1c91f650982bf35698d914d293d0523ccd071e81dde3libreport-gtk-devel-2.1.11-23.sl7.i686.rpm2b838398f4f1619be725cfbe72c5464d61dc453e5e556ee052daa67f5659a2b1libreport-python-2.1.11-23.sl7.x86_64.rpm9d54244c503ebe69e6f43652b074ca63b76272dfb29ef066117303b271d2ddc3abrt-addon-ccpp-2.1.11-22.el7_1.x86_64.rpme1b2e3e5463320fccc9fb7f5e94053f02b9433280a7c4b37a040813bd6e949felibreport-2.1.11-23.sl7.i686.rpm5b46eca12972b65c063b79836d6102fda37872ea126d96bf4d7460267c7b0d57libreport-filesystem-2.1.11-23.sl7.x86_64.rpm2db9a012ff5c041ebb11b2beb0db67794c8a61d96c4a1798af2b3b07a02715e8abrt-python-2.1.11-22.el7_1.x86_64.rpmb3fe5f47243617c5969c70317e1e9af941bac04677daffedcbe115426612bc09abrt-dbus-2.1.11-22.el7_1.x86_64.rpm4fffa9c309db738942677bfe3f06a36db8eb724362b9c33b0fc5b24a5211be96abrt-retrace-client-2.1.11-22.el7_1.x86_64.rpmc1b985db602c72802fc8e6d71e20bd89c00b21cba8fe5e36592777748345191dabrt-addon-pstoreoops-2.1.11-22.el7_1.x86_64.rpm4c5c17da5637b11e64673c30c86be7ea01e9a1fda3ea3aeb639204295fc9560clibreport-gtk-devel-2.1.11-23.sl7.x86_64.rpmbf54a425bd7d2cdd47a66fb717a43d918ddbcf3eec92652b7dad7f627b982eb0abrt-addon-vmcore-2.1.11-22.el7_1.x86_64.rpmcc5d8dcec63fb057a5e0f374198f3230efc1a702a916ff109983939d8390f8c1libreport-rhel-bugzilla-2.1.11-23.sl7.x86_64.rpmb75ab47a52214088682728935ff94d4497719a74f2b2aa4e495ac54f08d3f6fdlibreport-plugin-bugzilla-2.1.11-23.sl7.x86_64.rpmc7ec3da3a204e532a3695af2c2bae5e006b96dde980d54d51e96a6517f454621libreport-web-devel-2.1.11-23.sl7.x86_64.rpm7976add3646433593c51f2a8ceae27f4499e6c66d2adfcf9ed99ccc0dad71478libreport-rhel-2.1.11-23.sl7.x86_64.rpm280ebc47f7a99ce5963adc7c2930adf0142531bf93c7dbb325d0d11a099281a7abrt-gui-devel-2.1.11-22.el7_1.x86_64.rpmb30ff8788f44eb779c3c0f272ce6529b8f99c1b1906392184512ecd47ebc3704abrt-addon-kerneloops-2.1.11-22.el7_1.x86_64.rpm51fe56e50797e05e385c71a8122409982cc2c96dff1868ab59fbccda52906fbelibreport-devel-2.1.11-23.sl7.i686.rpm8600b7668f4a715eecffbb7c50e8f29c49c6929801c6d31250582e5867c4c1a7abrt-console-notification-2.1.11-22.el7_1.x86_64.rpm09a248aed906c834d0b3745c16eaebed44979a3cc32d428e17d34d0b62ee8412libreport-plugin-reportuploader-2.1.11-23.sl7.x86_64.rpme58e7ea040f06a3ea2b86fa0fd2a15b2ffa93253c2523cc32a53be547b9915afabrt-addon-upload-watch-2.1.11-22.el7_1.x86_64.rpm1efab34e881de24a7b12e3b8a2d68f2a6e412eedd4c1a064caa048e69c51813blibreport-2.1.11-23.sl7.x86_64.rpm952b36cabf9391450092d25ff47a97b0dd6e3041c2fca4db8e575580546ac8eelibreport-rhel-anaconda-bugzilla-2.1.11-23.sl7.x86_64.rpm2e207b0335f59fa7854fc15b53ccc56aa28028daf4b672e1db27ff8fbf80bd1eabrt-2.1.11-22.el7_1.x86_64.rpmf3dfca0b09d6213095aa248a85a0805c337c8f9a90de71a29b05d794a2b496b3libreport-gtk-2.1.11-23.sl7.x86_64.rpm4efc6b991fa0a0e740b2b7c4fcbaf7420ce9d886a55747050603d98fd0dee169abrt-desktop-2.1.11-22.el7_1.x86_64.rpm21a82e3bcc5ae48c405c5d787d1c8f0575a4960e6fe99ae75708aada45310e8fabrt-libs-2.1.11-22.el7_1.x86_64.rpm32b44e46941f3141db8a8541345134a903c4c22280c8d8f84f1a6d11cae5cae3abrt-gui-devel-2.1.11-22.el7_1.i686.rpm737df93b830ce89bebe7f1c49a6b813d773003cb6ef334d6d2a35bc021139271libreport-cli-2.1.11-23.sl7.x86_64.rpmad82c3ab7f773ac3d0ca3ae0cf3d9058fde0ac9019634b53bdaccfad64bd1bcaabrt-gui-libs-2.1.11-22.el7_1.x86_64.rpm3a1b8101bcd4945ad125f411917fb93c8a2c2109b74fda681de10bde7e2b3180abrt-gui-libs-2.1.11-22.el7_1.i686.rpm56b2746ab90df90d1f5bb40ce41eb531ca8cd56cf0b9ab14ea820d43a6b40d74libreport-newt-2.1.11-23.sl7.x86_64.rpm6380796cda5be910e9d407aed11d0aec285e56a8b55d0c23fc96b9f488468c87abrt-devel-2.1.11-22.el7_1.i686.rpm68262f2ff354abfa21c1862236f7c13a2a6815afe2c592ce4d27b16439857f79abrt-cli-2.1.11-22.el7_1.x86_64.rpmb9af824374f4f34463e5dc7727a12c03a35e762b9c73be2739907a4cd1c070b9libreport-anaconda-2.1.11-23.sl7.x86_64.rpmcb8c43daa637e1efcaac3cc0ae62ee604e6090029d586aafbbeee1eb93b17033abrt-addon-xorg-2.1.11-22.el7_1.x86_64.rpm86373633c75cdba75fd675a86753e9817a37222b2462b4652dfe400f7e19ff3cabrt-addon-python-2.1.11-22.el7_1.x86_64.rpm7cc2892624a9853d3c5f95a69d2bb77a07433dccfffa0b36df7f7127915f054flibreport-plugin-mailx-2.1.11-23.sl7.x86_64.rpm6027a0af349c582a35e63ebe23af458fe993ebbac9261f214af4d1db135dcf21abrt-libs-2.1.11-22.el7_1.i686.rpm62ea7057ee070ccbf91982c5582904484b238546b257932e921133f495377b64libreport-plugin-kerneloops-2.1.11-23.sl7.x86_64.rpm1cffe89bfd224b1ca03d089e18937083a244c2795b8eb9a11b912096bfc13761abrt-python-doc-2.1.11-22.el7_1.noarch.rpmdff1ceddf33c336c9984d6a66f10047777bc3e28accbb12d4894c50974aad825libreport-web-2.1.11-23.sl7.i686.rpm771a2a198147642b134f70479dff2b3178d8fb0fc07a96e520d54537126865d3abrt-gui-2.1.11-22.el7_1.x86_64.rpm49d27aef9449f3e7b5d9af3a3408af7e2b666be78b6b7ca14d5667e9a412bcedlibreport-compat-2.1.11-23.sl7.x86_64.rpma7cc85e19b03fc20a6816d7e16dec2ef7500ad7210768297959e4f110c781463libreport-web-devel-2.1.11-23.sl7.i686.rpmc081835942d3de4569a91056167430c7e677fe84892685fd0a0c64a5a2d84442libreport-gtk-2.1.11-23.sl7.i686.rpm0cee7d86d549e63d7db08ba72d96b8a66e98f8705091fbc679d1bb9dd0dc55b1libreport-plugin-logger-2.1.11-23.sl7.x86_64.rpm4392f2791759aa6dd0a968c06e1f4de0f7a22196a13cbdb3e4cd60fd270ee309libreport-plugin-ureport-2.1.11-23.sl7.x86_64.rpmdd25e606758d3acf44eebd51ace616239af6d13d156603951af3bbd1b4f2f54clibreport-web-2.1.11-23.sl7.x86_64.rpmc9c90318ec7551b3614c129fcd94a5def984d992d74dcf4f76588b50e19bce3aabrt-devel-2.1.11-22.el7_1.x86_64.rpmd9874f850b8d95589485973d6551b44d9ef5b34102a3bb98b5ab0ebeae03c75alibreport-plugin-rhtsupport-2.1.11-23.sl7.x86_64.rpmf107f3439bd3ccc0d958e7c47eefea7372d78790b7c79cc6706c778311757479SLSA-2015:1090-1Wpa_SupplicantA buffer overflow flaw was found in the way wpa_supplicant handled SSID information in the Wi-Fi Direct / P2P management frames. A specially crafted frame could allow an attacker within Wi-Fi radio range to cause wpa_supplicant to crash or, possibly, execute arbitrary code. (CVE-2015-1863) An integer underflow flaw, leading to a buffer over-read, was found in the way wpa_supplicant handled WMM Action frames. A specially crafted frame could possibly allow an attacker within Wi-Fi radio range to cause wpa_supplicant to crash. (CVE-2015-4142) This update also adds the following enhancement: * Prior to this update, wpa_supplicant did not provide a way to require the host name to be listed in an X.509 certificate's Common Name or Subject Alternative Name, and only allowed host name suffix or subject substring checks. This update introduces a new configuration directive, 'domain_match', which adds a full host name check. After installing this update, the wpa_supplicant service will be restarted automatically.importantScientific LinuxScientific Linux 7wpa_supplicant-2.0-17.el7_1.x86_64.rpm2d4c7dcd7c38b99a11376c8751ea98166840e6e032e14849a6890021f1c2dd24SLSA-2015:1115-1OpensslAn invalid free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could cause a DTLS server or client using OpenSSL to crash or, potentially, execute arbitrary code. (CVE-2014-8176) A flaw was found in the way the OpenSSL packages shipped with Scientific Linux 6 and 7 performed locking in the ssleay_rand_bytes() function. This issue could possibly cause a multi-threaded application using OpenSSL to perform an out-of-bounds read and crash. (CVE-2015-3216) An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List (CRL) could possibly cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2015-1789) A race condition was found in the session handling code of OpenSSL. This issue could possibly cause a multi-threaded TLS/SSL client using OpenSSL to double free session ticket data and crash. (CVE-2015-1791) A flaw was found in the way OpenSSL handled Cryptographic Message Syntax (CMS) messages. A CMS message with an unknown hash function identifier could cause an application using OpenSSL to enter an infinite loop. (CVE-2015-1792) A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash. (CVE-2015-1790) For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.moderateScientific LinuxtrueScientific Linux 7openssl-static-1.0.1e-42.el7_1.8.i686.rpmd803586b2c1e677e8f107b72c9c6ff112e13bdb2cad990f43e660b5b7effb6d4openssl-libs-1.0.1e-42.el7_1.8.i686.rpm27e810fb82340fec4270398821c21ef704485842fb335c473bac67b2bde2e209openssl-libs-1.0.1e-42.el7_1.8.x86_64.rpm26ee236827c5b27265e549e4600b2926f0271213bd9421dc0bf5a305ebd43a51openssl-static-1.0.1e-42.el7_1.8.x86_64.rpm832142994a14859114eaa7905ea7167006521b1bfd7221e2dbbca22013bb1e3aopenssl-perl-1.0.1e-42.el7_1.8.x86_64.rpm79afffa845884a3f5aaa36f3c03cf018ad701e1edf5ea13cfe9d5a41f8c929b3openssl-1.0.1e-42.el7_1.8.x86_64.rpm0e71d1479603714c183bba79864711a6ca3014ce5bbd62fabdd30efc4a18fd0bopenssl-devel-1.0.1e-42.el7_1.8.x86_64.rpm4efb45e999ea132585fec0fb19bfed3c6253b1297869abf055574b9401cd8a21openssl-devel-1.0.1e-42.el7_1.8.i686.rpm657eb690ec0c00edcfc2037357ffdfcdde4832735c4f1105ba867b838716568cSLSA-2015:1123-1CupsA string reference count bug was found in cupsd, causing premature freeing of string objects. An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded which in turn allows the attacker to run arbitrary code in the CUPS server (CVE-2015-1158) A cross-site scripting flaw was found in the cups web templating engine. An attacker could use this flaw to bypass the default configuration settings that bind the CUPS scheduler to the 'localhost' or loopback interface. (CVE-2015-1159) An integer overflow leading to a heap-based buffer overflow was found in the way cups handled compressed raster image files. An attacker could create a specially-crafted image file, which when passed via the cups Raster filter, could cause the cups filter to crash. (CVE-2014-9679) After installing this update, the cupsd daemon will be restarted automatically.importantScientific LinuxScientific Linux 7cups-lpd-1.6.3-17.el7_1.1.x86_64.rpmc9d38417fc699d32619788ae72ac830f014437476c5549b7d8d1fad4336e19afcups-devel-1.6.3-17.el7_1.1.x86_64.rpm1cb1f2ef5898f035218bb01a69519029acb5fe1bcab07e5c825380560fb725cecups-1.6.3-17.el7_1.1.x86_64.rpmcd81677fdb3d57bcefde9e8ff8ad635339bfd712ec2ae54ccd6e4c5743229d2ecups-libs-1.6.3-17.el7_1.1.i686.rpm9d680d789487f48ce85a382d84bedf6f2fee5f02d751b7c039f0ed689fc6c826cups-devel-1.6.3-17.el7_1.1.i686.rpm1cedccbe7165e99ee9efb66b696ee602c7cfe4628c753d74cac514c3886d891fcups-libs-1.6.3-17.el7_1.1.x86_64.rpme51343375ec5bf491089e12531a1e41527832f0bf47911a89d65c89563fe7124cups-ipptool-1.6.3-17.el7_1.1.x86_64.rpm43a21a346493bbb45943aab28c58a57ec8ee758b7421c19f76d21dcb07a6f988cups-client-1.6.3-17.el7_1.1.x86_64.rpm8ab6e6bba86c863c4cc0397c440532bd09b16f92d798ef24ab3dd3b1fadd03f0cups-filesystem-1.6.3-17.el7_1.1.noarch.rpmc27c9bc78e4a75bf93a690bc907289c2f33900dc9b7343f089e02ae7884f65e2SLSA-2015:1135-1PhpA flaw was found in the way the PHP module for the Apache httpd web server handled pipelined requests. A remote attacker could use this flaw to trigger the execution of a PHP script in a deinitialized interpreter, causing it to crash or, possibly, execute arbitrary code. (CVE-2015-3330) A flaw was found in the way PHP parsed multipart HTTP POST requests. A specially crafted request could cause PHP to use an excessive amount of CPU time. (CVE-2015-4024) An uninitialized pointer use flaw was found in PHP's Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_read_data() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application. (CVE-2015-0232) An integer overflow flaw leading to a heap-based buffer overflow was found in the way PHP's FTP extension parsed file listing FTP server responses. A malicious FTP server could use this flaw to cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2015-4022) Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. (CVE-2014-8142, CVE-2015-0231, CVE-2015-0273, CVE-2015-2787, CVE-2015-4147, CVE-2015-4148, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603) It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. (CVE-2015-2348, CVE-2015-4025, CVE-2015-4026, CVE-2015-3411, CVE-2015-3412, CVE-2015-4598) Multiple flaws were found in the way the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened. (CVE-2015-2301, CVE-2015-2783, CVE-2015-3307, CVE-2015-3329, CVE-2015-4021) Multiple flaws were found in PHP's File Information (fileinfo) extension. A remote attacker could cause a PHP application to crash if it used fileinfo to identify type of attacker supplied files. (CVE-2014-9652, CVE-2015-4604, CVE-2015-4605) A heap buffer overflow flaw was found in the enchant_broker_request_dict() function of PHP's enchant extension. An attacker able to make a PHP application enchant dictionaries could possibly cause it to crash. (CVE-2014-9705) A buffer over-read flaw was found in the GD library used by the PHP gd extension. A specially crafted GIF file could cause a PHP application using the imagecreatefromgif() function to crash. (CVE-2014-9709) This update also fixes the following bugs: * The libgmp library in some cases terminated unexpectedly with a segmentation fault when being used with other libraries that use the GMP memory management. With this update, PHP no longer changes libgmp memory allocators, which prevents the described crash from occurring. * When using the Open Database Connectivity (ODBC) API, the PHP process in some cases terminated unexpectedly with a segmentation fault. The underlying code has been adjusted to prevent this crash. * Previously, running PHP on a big-endian system sometimes led to memory corruption in the fileinfo module. This update adjusts the behavior of the PHP pointer so that it can be freed without causing memory corruption. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7php-5.4.16-36.el7_1.x86_64.rpmb7d933651ea6a8a88e9e57b7b46b60d395778e342b867a86d78a57afa151acc5php-mbstring-5.4.16-36.el7_1.x86_64.rpm57f2d110388bc356757f0e1f4db17ffbb15884e448d442d99a1d5064e4c5afc3php-ldap-5.4.16-36.el7_1.x86_64.rpm0c57393d16e1190e8bc801eff6bbaacaf7f367807ff96df0295427e6ffc7d70ephp-enchant-5.4.16-36.el7_1.x86_64.rpm5dcf1b9407613c32f2b77e66e4a1624d20d63366ba6eadb164024c6a2ffca233php-devel-5.4.16-36.el7_1.x86_64.rpmc54ba11b4ae4fb426e561285e2164ee184edb356350c5c816c68272d6ee2c8ecphp-pdo-5.4.16-36.el7_1.x86_64.rpmf4dd52901cd2f7d128a5e83233e421bb57732957fd0e7784dec6e52fc19ec7a2php-snmp-5.4.16-36.el7_1.x86_64.rpm2c4ecd2a7e63d2a6e0b5f745cfa008535d0c4dc1d1efa047fb851b72d7ec9e36php-mysqlnd-5.4.16-36.el7_1.x86_64.rpm09fd9a196fabb8200d37a5d4938cccc52cf53bcaed79ca77421571ffe5874b51php-fpm-5.4.16-36.el7_1.x86_64.rpme5247f7dad9e1441918bbf6c0f40b4306d56698d90425ff04341f99261241800php-dba-5.4.16-36.el7_1.x86_64.rpmd570728ef8d78dd1f70bda5796f7a134997c7530545213d58c42c1c6dd5c4e78php-xml-5.4.16-36.el7_1.x86_64.rpm4339fe7a52f298023e730e410e270da42167f740ac9d826778aa80558855ab01php-process-5.4.16-36.el7_1.x86_64.rpm597e70e606a7e5200ba009b82e1429e729697a76663926dd0f9361ed71e1535dphp-gd-5.4.16-36.el7_1.x86_64.rpmdf8b7bc9d1ff8190669406a4291d975b2634b99d7ae97f5b32c3bfc8ab8789d7php-odbc-5.4.16-36.el7_1.x86_64.rpm8bb386dcc78b3eb55918cf4fc3ff143835782cb2f2ae1d119127f6f4b2f10058php-pgsql-5.4.16-36.el7_1.x86_64.rpmc7a2e02e476441988ffc721da7430734b1015db5a4c62aee525c21d817f0afd9php-cli-5.4.16-36.el7_1.x86_64.rpm2b54a14ae3f32a62f6fb4164548a6b873797c24e5ad6399e7104de8c4875dbf8php-embedded-5.4.16-36.el7_1.x86_64.rpmea86042a91d204e8d349d367f40156bcf781611de6f5cd0f758f355fd6896e67php-common-5.4.16-36.el7_1.x86_64.rpmc0b6497a147dbfcd9c93f36a089f1100109f3cb31783d4785032aee5c65cb1c1php-mysql-5.4.16-36.el7_1.x86_64.rpmd38826989dd177dad8b9c38191c3414774b258a501fe919b665212df70ee7bebphp-bcmath-5.4.16-36.el7_1.x86_64.rpm5c47f3c80bc560f7c735ac1b4d1818ec5483282754c850b50e549c69b0f580fdphp-xmlrpc-5.4.16-36.el7_1.x86_64.rpme39ed10c6d9b8eb9fa83e32e3311aa00ec3fce2a729322cde57f5627434ca9d6php-pspell-5.4.16-36.el7_1.x86_64.rpmf81b797c991ef6d48b16c33676a202b9ec4af792079b06d00eec3f5a73f7b01cphp-soap-5.4.16-36.el7_1.x86_64.rpm58e9d1acaee0036428ebb1cc277174597e2f31c1cf24d6aa2eb96469b360db2bphp-intl-5.4.16-36.el7_1.x86_64.rpm355c544a81aa87179fdd845c5fa28684b6abf58f1e897a8443917b1100cd5f2fphp-recode-5.4.16-36.el7_1.x86_64.rpm0b85053867a77d75bf65aecf300ed772b3d12815d4d330b5d34e2fca16b4eb4eSLSA-2015:1137-1Kernel* It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1805, Important) * A race condition flaw was found in the way the Linux kernel keys management subsystem performed key garbage collection. A local attacker could attempt accessing a key while it was being garbage collected, which would cause the system to crash. (CVE-2014-9529, Moderate) * A flaw was found in the way the Linux kernel's 32-bit emulation implementation handled forking or closing of a task with an 'int80' entry. A local user could potentially use this flaw to escalate their privileges on the system. (CVE-2015-2830, Low) * It was found that the Linux kernel's ISO file system implementation did not correctly limit the traversal of Rock Ridge extension Continuation Entries (CE). An attacker with physical access to the system could use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service. (CVE-2014-9420, Low) * An information leak flaw was found in the way the Linux kernel's ISO9660 file system implementation accessed data on an ISO9660 image with RockRidge Extension Reference (ER) records. An attacker with physical access to the system could use this flaw to disclose up to 255 bytes of kernel memory. (CVE-2014-9584, Low) * A flaw was found in the way the nft_flush_table() function of the Linux kernel's netfilter tables implementation flushed rules that were referencing deleted chains. A local user who has the CAP_NET_ADMIN capability could use this flaw to crash the system. (CVE-2015-1573, Low) * An integer overflow flaw was found in the way the Linux kernel randomized the stack for processes on certain 64-bit architecture systems, such as x86-64, causing the stack entropy to be reduced by four. (CVE-2015-1593, Low) This update also fixes several bugs. Documentation for these changes is available from the following Knowledgebase article: The system must be rebooted for this update to take effect.importantScientific LinuxtrueScientific Linux 7kernel-debug-devel-3.10.0-229.7.2.el7.x86_64.rpm5880927b815af4de2300ab3ad8fa3c64fd06f7a24f37573bb66fe19eab6b5278kernel-tools-libs-devel-3.10.0-229.7.2.el7.x86_64.rpma6e8cd1d99ababb71434dfcb5ec045b2d313dd7b2715867be1ea117967871bccpython-perf-3.10.0-229.7.2.el7.x86_64.rpm10c3f72b6840351d0e3e8b3b98f47c250d0f43171b9d359e3f292a0227bb91bdkernel-tools-libs-3.10.0-229.7.2.el7.x86_64.rpm1ab6f2ab9112ba473ce7cc01e59722ac83f96c0b49a56d50d8d689ae9d460974kernel-devel-3.10.0-229.7.2.el7.x86_64.rpm0d990fbaf6bdca91d9ee97cc962a889bc476e56faa149a58c5aa9d0b6c0aa190kernel-tools-3.10.0-229.7.2.el7.x86_64.rpmf9f3c8e073ca4c0d2ad7616abe87f446cb03a8e36d0d72f2fc8364775da1ec25kernel-3.10.0-229.7.2.el7.x86_64.rpm1e6d8cdb852dccb1dd98b329d5af2f8ddef3abea979e164835ce7652d16a50fekernel-abi-whitelists-3.10.0-229.7.2.el7.noarch.rpm22ae3c3cb868bf5a05f6795507d08684e75c177ee17a29b8f3ef7e0f53840c1fkernel-headers-3.10.0-229.7.2.el7.x86_64.rpm4ec1a3f1a7cc6337debb45974969122a46a035536836d93ad816848c217b8248perf-3.10.0-229.7.2.el7.x86_64.rpm57691543a732468763dd4e2650e0e823cc9a8fb18ec0e64efaad24d82c51623dkernel-doc-3.10.0-229.7.2.el7.noarch.rpm8e3baae565e6cb670f217bc97be01b22b4d467a5048bda59e322b607a34397ebkernel-debug-3.10.0-229.7.2.el7.x86_64.rpm37c43b891e273ccbf4f5dd25ee64f82c9ef89e4888c33bd3bf6adb740259e2b2SLSA-2015:1153-1MailmanIt was found that mailman did not sanitize the list name before passing it to certain MTAs. A local attacker could use this flaw to execute arbitrary code as the user running mailman. (CVE-2015-2775) This update also fixes the following bugs: * Previously, it was impossible to configure Mailman in a way that Domain- based Message Authentication, Reporting & Conformance (DMARC) would recognize Sender alignment for Domain Key Identified Mail (DKIM) signatures. Consequently, Mailman list subscribers that belonged to a mail server with a "reject" policy for DMARC, such as yahoo.com or AOL.com, were unable to receive Mailman forwarded messages from senders residing in any domain that provided DKIM signatures. With this update, domains with a "reject" DMARC policy are recognized correctly, and Mailman list administrators are able to configure the way these messages are handled. As a result, after a proper configuration, subscribers now correctly receive Mailman forwarded messages in this scenario. * Previously, the /etc/mailman file had incorrectly set permissions, which in some cases caused removing Mailman lists to fail with a "'NoneType' object has no attribute 'close'" message. With this update, the permissions value for /etc/mailman is correctly set to 2775 instead of 0755, and removing Mailman lists now works as expected. * Prior to this update, the mailman utility incorrectly installed the tmpfiles configuration in the /etc/tmpfiles.d/ directory. As a consequence, changes made to mailman tmpfiles configuration were overwritten if the mailman packages were reinstalled or updated. The mailman utility now installs the tmpfiles configuration in the /usr/lib/tmpfiles.d/ directory, and changes made to them by the user are preserved on reinstall or update.moderateScientific LinuxScientific Linux 7mailman-2.1.15-21.el7_1.x86_64.rpmf576e855aee9f3e7b6e3b7f34b85d344ae8c84778c87d61b77557a5c7869a019SLSA-2015:1154-1LibreswanA flaw was discovered in the way Libreswan's IKE daemon processed certain IKEv1 payloads. A remote attacker could send specially crafted IKEv1 payloads that, when processed, would lead to a denial of service (daemon crash). (CVE-2015-3204) This update fixes the following bugs: * Previously, the programs/pluto/state.h and programs/pluto/kernel_netlink.c files had a maximum SELinux context size of 257 and 1024 respectively. These restrictions set by libreswan limited the size of the context that can be exchanged by pluto (the IPSec daemon) when using a Labeled Internet Protocol Security (IPsec). The SElinux labels for Labeled IPsec have been extended to 4096 bytes and the mentioned restrictions no longer exist. * On some architectures, the kernel AES_GCM IPsec algorithm did not work properly with acceleration drivers. On those kernels, some acceleration modules are added to the modprobe blacklist. However, Libreswan was ignoring this blacklist, leading to AES_GCM failures. This update adds support for the module blacklist to the libreswan packages and thus prevents the AES_GCM failures from occurring. * An IPv6 issue has been resolved that prevented ipv6-icmp Neighbour Discovery from working properly once an IPsec tunnel is established (and one endpoint reboots). When upgrading, ensure that /etc/ipsec.conf is loading all /etc/ipsec.d/*conf files using the /etc/ipsec.conf "include" statement, or explicitly include this new configuration file in /etc/ipsec.conf. * A FIPS self-test prevented libreswan from properly starting in FIPS mode. This bug has been fixed and libreswan now works in FIPS mode as expected. In addition, this update adds the following enhancements: * A new option "seedbits=" has been added to pre-seed the Network Security Services (NSS) pseudo random number generator (PRNG) function with entropy from the /dev/random file on startup. This option is disabled by default. It can be enabled by setting the "seedbits=" option in the "config setup" section in the /etc/ipsec.conf file. * The build process now runs a Cryptographic Algorithm Validation Program (CAVP) certification test on the Internet Key Exchange version 1 and 2 (IKEv1 and IKEv2) PRF/PRF+ functions.moderateScientific LinuxScientific Linux 7libreswan-3.12-10.1.el7_1.x86_64.rpmaba9da7d9e66840c4e827afc109de1c4082f57e5086c71cf201b514069c7c63cSLSA-2015:1185-1NssA flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in NSS to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. The nss and nss-util packages have been upgraded to upstream versions 3.19.1. The upgraded versions provide a number of bug fixes and enhancements over the previous versions.moderateScientific LinuxScientific Linux 7nss-tools-3.19.1-3.el7_1.x86_64.rpm63be10496e36939d9876e05a7779f6136779b908127d733aa3e07bb7b505396enss-3.19.1-3.el7_1.i686.rpm74c612d23024181dc51b4323d69b125eb47b76d2b8007c3d498614500113259dnss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm6fdab1aef97a843fb39d2ceeed03ab34220515746991752646b6b0936d03f4f3nss-devel-3.19.1-3.el7_1.x86_64.rpm3b1804975518f31e373d8f908d73d3ad18810b2cbb2547227f07cab235fda005nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpme3b9146e1ce1a48dd86530d157a47dfb96d94853079b633afd7cd2e1b65e8c39nss-devel-3.19.1-3.el7_1.i686.rpm04e53dec3a33bc86b97596e2a5868b55200ed45e8e4490b21c5f654f1d7427aenss-util-3.19.1-1.el7_1.i686.rpm42a7bbf8490e85dbef3b52a5b2dde65bac977ac71e67c9c108629905be47e5f6nss-3.19.1-3.el7_1.x86_64.rpm5f90fe3830053a2c9243bfd7783ed53cabfbfb111efcb8f65c9e2a791c3ea6aanss-sysinit-3.19.1-3.el7_1.x86_64.rpm22090072c2761c58b5740d62b1b81382a2d60de4a3529408cae25f0534937f0dnss-util-3.19.1-1.el7_1.x86_64.rpm982deb53e9ac094d835afa20548a028e8648b0d5bb4d1384afd8113c422071ednss-util-devel-3.19.1-1.el7_1.x86_64.rpma0fa5e0310463426da092f84c4f2367db927278631bdcc0a2801682472b5fb72nss-util-devel-3.19.1-1.el7_1.i686.rpmb49e2d5881ffb81acb8030580770a5781c8da5849407f6d08ae36ca29c6106c6SLSA-2015:1193-1Xerces-CA flaw was found in the way the Xerces-C XML parser processed certain XML documents. A remote attacker could provide specially crafted XML input that, when parsed by an application using Xerces-C, would cause that application to crash. (CVE-2015-0252)moderateScientific LinuxScientific Linux 7xerces-c-devel-3.1.1-7.el7_1.x86_64.rpmdf90b744622df06472ad35924428487053807204f3b4c4b58162ff13f1f4ef35xerces-c-3.1.1-7.el7_1.i686.rpmda8b9c79533f4147776c53474e6cb34e185d2213184176a4ccd256b93a936cc6xerces-c-doc-3.1.1-7.el7_1.noarch.rpm305b90092723c4a68056e5a3c23c2e96e8ee4ba1710d5b23e91424dcdde840b4xerces-c-3.1.1-7.el7_1.x86_64.rpm43f205515555c25cd7d0f66512ed6c865678a7040878a0295d8f3f7ef51b4fd8xerces-c-devel-3.1.1-7.el7_1.i686.rpm0452dec97aa218b008b456d07787849d479efda58613c25b2267e5e0f3b868e2SLSA-2015:1194-1PostgresqlA double-free flaw was found in the connection handling. An unauthenticated attacker could exploit this flaw to crash the PostgreSQL back end by disconnecting at approximately the same time as the authentication time out is triggered. (CVE-2015-3165) It was discovered that PostgreSQL did not properly check the return values of certain standard library functions. If the system is in a state that would cause the standard library functions to fail, for example memory exhaustion, an authenticated user could exploit this flaw to disclose partial memory contents or cause the GSSAPI authentication to use an incorrect keytab file. (CVE-2015-3166) It was discovered that the pgcrypto module could return different error messages when decrypting certain data with an incorrect key. This can help an authenticated user to launch a possible cryptographic attack, although no suitable attack is currently known. (CVE-2015-3167) If the postgresql service is running, it will be automatically restarted after installing this update.moderateScientific LinuxScientific Linux 7postgresql-libs-9.2.13-1.el7_1.x86_64.rpmeccd44b065291bd312898fbfb4c2909a058bd0e80c55efebabc0afa028115e55postgresql-9.2.13-1.el7_1.x86_64.rpm705f79f2bc0d4476d1dfa2cceedd867796c6e710e415fb44f603171eb1431872postgresql-plpython-9.2.13-1.el7_1.x86_64.rpmcacf7766936586306f4d6b1fdb5f01519a447d19668ba519e5babdc8dbfbb16apostgresql-devel-9.2.13-1.el7_1.i686.rpm612138027777601269de0fdb143db2778a326538d8c1350e83f254935f5c598cpostgresql-upgrade-9.2.13-1.el7_1.x86_64.rpmdfb65391c738238bbacfc1005813415f1fa124f02cb0569cd6a8a258fa4ebac2postgresql-test-9.2.13-1.el7_1.x86_64.rpmb0627dacd536b52ed9fc75053a87c8fc5ffe08c86c2220a2d534652ee6d15d98postgresql-plperl-9.2.13-1.el7_1.x86_64.rpmb9595c9b75281b1544c7b914ee92a71d9daea46d8b42bc0c4d418270642f6bd3postgresql-9.2.13-1.el7_1.i686.rpmaa8a65b267c06dfd4f6911e470cdafff50303db118db6cf2134b20668595c756postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm892fcf30def233ea588f2829afd99ee8ac724774ab5a9f9c0f55063dd8c61fd6postgresql-libs-9.2.13-1.el7_1.i686.rpm7d0a5b719b38633ddec12d5d7170c5b0563336486d4cf92f4689b9a5e3567c86postgresql-server-9.2.13-1.el7_1.x86_64.rpm0db70b3d2094658576dd395392b70902b09d79101955496738493d58f08f6c72postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm2f84efce0106fc093d59f37965a4dca7223cd66fbc417f95c18531f89d25f0fbpostgresql-devel-9.2.13-1.el7_1.x86_64.rpm3f007aa7c127516c2f779549e80ffac5b997b264b20696faadb93cefe934a664postgresql-docs-9.2.13-1.el7_1.x86_64.rpm4288dfa4970fc7e6d72b827abe514dd9f2c477abddd2f84c43de791e27b5344bSLSA-2015:1207-1FirefoxSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-2724, CVE-2015-2725, CVE-2015-2722, CVE-2015-2727, CVE-2015-2728, CVE-2015-2729, CVE-2015-2731, CVE-2015-2733, CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740) It was found that Firefox skipped key-pinning checks when handling an error that could be overridden by the user (for example an expired certificate error). This flaw allowed a user to override a pinned certificate, which is an action the user should not be able to perform. (CVE-2015-2741) A flaw was discovered in Mozilla's PDF.js PDF file viewer. When combined with another vulnerability, it could allow execution of arbitrary code with the privileges of the user running Firefox. (CVE-2015-2743) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.1.0-1.el7_1.i686.rpm7c898a477455726d54cb68e2e34f09f8f3ad0e67821528525efc3a8c47bd5fbdfirefox-38.1.0-1.el7_1.x86_64.rpmfaf6cda6560532cad9a13acef4f3f19b5c331c4a9f4e549603f32c05f6b629feSLSA-2015:1228-1Java-1.8.0-OpenjdkMultiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) It was discovered that the GCM (Galois Counter Mode) implementation in the Security component of OpenJDK failed to properly perform a null check. This could cause the Java Virtual Machine to crash when an application performed encryption using a block cipher in the GCM mode. (CVE-2015-2659) A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) Multiple insecure temporary file use issues were found in the way the Hotspot component in OpenJDK created performance statistics and error log files. A local attacker could possibly make a victim using OpenJDK overwrite arbitrary files using a symlink attack. Note: This issue was originally fixed as CVE-2015-0383, but the fix was regressed in the SLSA-2015:0809 advisory. (CVE-2015-3149) All running instances of OpenJDK Java must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1.x86_64.rpm1d8c51062ac8df23af7196dd72e2aa0e9eb02fbf6fae2810eae5b2fa012fc767java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1.x86_64.rpmb5869e856ab8e776d7585b6414c6a2af4df38a813eb93db2cd9e68b5c45dddc9java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1.x86_64.rpm22140ab33892c05d6e9eb9686997cb98f888d90782984e7b56fdf517a7ba10aajava-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1.x86_64.rpmee2b17be77373f5cdbe848e0b23bf3db165326d86e2a162dc08d31482cb56252java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1.x86_64.rpmc4fd4c30fe85affc9f07111c54cca7b0c7befb6cdf6c38dd0ea1631879a9f813java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1.noarch.rpm43200aadfc46491ebef98850fee0f89b012410dece5c7c54a19f26b607305703java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1.x86_64.rpmdc831b31d9f77645f9debf0e08f3e48712b88c12e3ae79b298bad405253f55fcSLSA-2015:1229-1Java-1.7.0-OpenjdkMultiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. All running instances of OpenJDK Java must be restarted for the update to take effect.criticalScientific LinuxtrueScientific Linux 7java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm26ef84822c8aec9e62077d1eb964f49f645e0f23dfa256a76fcc396918d51b0cjava-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm67463f18b943764e03d8cafba0e3ac29930c03ce82ed0bbcf35f3096ec8be957java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpmde7a9780eab6a93ab4cfda690ebfa832851c89457c9bd7e95d43280b94c91448java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm1de236582ce05c29e324ddc9795fa821d1287718c0dde29e62ae3b220c2ef2a4java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm2c27a0f0dbfcff9e340b8641d07146f37b8294709606d0259f5506a2107199b9java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpma20531fe214b54a658b436af8993b8b75622bfdf39334156de0b9eb9a8c4e678java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm7b19e08fc02b6e7b4b219011f0ea6b0b5fb53cef13e573b67e0467463cfec0b3SLSA-2015:1443-1BindA flaw was found in the way BIND performed DNSSEC validation. An attacker able to make BIND (functioning as a DNS resolver with DNSSEC validation enabled) resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure. (CVE-2015-4620) After installing the update, the BIND daemon (named) will be restarted automatically.importantScientific LinuxScientific Linux 7bind-license-9.9.4-18.el7_1.2.noarch.rpm84b6ad7f2378054839243a3ad1aa4f9a74e76825b3cabf3a50cd53fa3f4137c2bind-devel-9.9.4-18.el7_1.2.x86_64.rpm91b89c33fb8e6fd48f1046a1473ba268b97595e2bc3f313059489608f312fc9abind-libs-lite-9.9.4-18.el7_1.2.x86_64.rpm18f8b44f1c94830bd563a25093c44089ff5e2003ce088b564c174ed8ff52d39cbind-devel-9.9.4-18.el7_1.2.i686.rpmacc706c0bf0ff02b6b684d0ecb6af0e19ca33a00c968d8c8b01e55cefd2583fabind-libs-9.9.4-18.el7_1.2.x86_64.rpm290863bff0fe35414c2e26a21b3897df9a185d8e3f0ec9de54b52c1742786a3fbind-libs-9.9.4-18.el7_1.2.i686.rpm169c04936fb53d267cc0fb8e435467386bfb27461f8bf47655a8216a0367fb15bind-lite-devel-9.9.4-18.el7_1.2.x86_64.rpmf48c9befe44d76c4d28ed76c2ca7607dbd7b42b6f36662a676c371fda3b03a38bind-libs-lite-9.9.4-18.el7_1.2.i686.rpm81801a4f9bd45d1f9a3ce16d3384fdd4c0b6e5309c53e4c8b6f476020fd4a06ebind-chroot-9.9.4-18.el7_1.2.x86_64.rpmbcc329f71cfac54b86d76203ad7ec3eb79605f1a0b21103e57234d52b6b0079ebind-utils-9.9.4-18.el7_1.2.x86_64.rpmfa3842531f66c4e3b86db08e6b8796114e795bb233da2579d8179eb7537e9108bind-lite-devel-9.9.4-18.el7_1.2.i686.rpm1046d3c17c5dc35edc8e86d5a76a50b1c17a0f60227ce60246cb0b3d8400f9b8bind-sdb-9.9.4-18.el7_1.2.x86_64.rpmb634519c9cb2913c59637cb9dfe4781c387ea9ac4bfa630180d9f4ea7d9ab982bind-sdb-chroot-9.9.4-18.el7_1.2.x86_64.rpm024230d6fabebbcf4ee4b704c3a6232978dd8525fe38ad923fcf70ee4d4f341ebind-9.9.4-18.el7_1.2.x86_64.rpm0fa3f020c77ce9f270c010c78dbd55e6845d923633285dcc7b3af8ca15ff67f4SLSA-2015:1455-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-2724, CVE-2015-2725, CVE-2015-2731, CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740) It was found that Thunderbird skipped key-pinning checks when handling an error that could be overridden by the user (for example an expired certificate error). This flaw allowed a user to override a pinned certificate, which is an action the user should not be able to perform. (CVE-2015-2741) Note: All of the above issues cannot be exploited by a specially crafted HTML mail message as JavaScript is disabled by default for mail messages. They could be exploited another way in Thunderbird, for example, when viewing the full remote content of an RSS feed. After installing the update, Thunderbird must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7thunderbird-31.8.0-1.el7_1.x86_64.rpm0f2da8cea4d22e6cb8e1012850951c0252f25d484aa49fd960fc17e530311321SLSA-2015:1483-1LibuserTwo flaws were found in the way the libuser library handled the /etc/passwd file. A local attacker could use an application compiled against libuser (for example, userhelper) to manipulate the /etc/passwd file, which could result in a denial of service or possibly allow the attacker to escalate their privileges to root. (CVE-2015-3245, CVE-2015-3246)importantScientific LinuxScientific Linux 7libuser-0.60-7.el7_1.x86_64.rpm38bdee35c4e8bc22864f47955ec4517f1a6a68c4031556d91270e9547c1c0df8libuser-devel-0.60-7.el7_1.i686.rpme910dd775baebe11f327c1bdeba628108732c644c8d4349a73b41027749b79d1libuser-0.60-7.el7_1.i686.rpm5362b8da90b3e41a25ab4c63db7e558630d99de143f23c2df6f18948a369abedlibuser-devel-0.60-7.el7_1.x86_64.rpmbcdef639dc7dff637b49d2d10cdcf49a62e37ff1e305586be5a01f502ede232dlibuser-python-0.60-7.el7_1.x86_64.rpm0e9ac622824e7d9af07b35b2e0b13d8d45bd940733564862565825926326bb69SLSA-2015:1507-1Qemu-KvmA heap buffer overflow flaw was found in the way QEMU's IDE subsystem handled I/O buffer access while processing certain ATAPI commands. A privileged guest user in a guest with the CDROM drive enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest. (CVE-2015-5154) An out-of-bounds memory access flaw, leading to memory corruption or possibly an information leak, was found in QEMU's pit_ioport_read() function. A privileged guest user in a QEMU guest, which had QEMU PIT emulation enabled, could potentially, in rare cases, use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. (CVE-2015-3214) This update also fixes the following bug: * Due to an incorrect implementation of portable memory barriers, the QEMU emulator in some cases terminated unexpectedly when a virtual disk was under heavy I/O load. This update fixes the implementation in order to achieve correct synchronization between QEMU's threads. As a result, the described crash no longer occurs. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.importantScientific LinuxScientific Linux 7libcacard-tools-1.5.3-86.el7_1.5.x86_64.rpmcaf985dc9c8b5ed6071b89634d6b72a013b3cb1da2996cf7f910a77572f0cda4qemu-kvm-1.5.3-86.el7_1.5.x86_64.rpm2f5e31820e6464274a754623290f90d0c600a4d4df72399175004886c4682771libcacard-devel-1.5.3-86.el7_1.5.x86_64.rpmf7564cd20f37732f3bc706fc556861ea5a23b9cdf86d42c3c6e82276b67acbc1qemu-img-1.5.3-86.el7_1.5.x86_64.rpme94ad130c88f17290647ed7329d77871f93aac48aa576bbea849922c39193b52libcacard-devel-1.5.3-86.el7_1.5.i686.rpm04027ac1f439d1226ef7f667659edb28cab3f81baa06e666f7b6f10f59b6ca05qemu-kvm-common-1.5.3-86.el7_1.5.x86_64.rpm8d44c2c107a459e5b4198e467b9cd11c6a1fa82d0ea6929d7b37c38eeac56b1elibcacard-1.5.3-86.el7_1.5.x86_64.rpm8c929ce35bea8f2e2e65c8124b0a29cde2834c78e88a87fd628d4b840bdd3f15qemu-kvm-tools-1.5.3-86.el7_1.5.x86_64.rpmab4c6b626a16efb0e1ac47d79126b570d2afa732a6a67e6eab528a650b083615libcacard-1.5.3-86.el7_1.5.i686.rpmac1b83c62b5290cf59272b12a58524e88427bebb93ff26e0bb7a2982bb3eca60SLSA-2015:1510-1ClutterA flaw was found in the way clutter processed certain mouse and touch gestures. An attacker could use this flaw to bypass the screen lock. (CVE-2015-3213) After installing the update, all applications using clutter must be restarted for the update to take effect.moderateScientific LinuxtrueScientific Linux 7clutter-devel-1.14.4-12.el7_1.1.x86_64.rpma7315cda40662a6715b149d3f04ba05eb33b11b61bc787b9eb486850cbbe6347clutter-doc-1.14.4-12.el7_1.1.x86_64.rpm81aec23fcfb8c5799f3bc425393a34832b99fdb0d6892ce5caee6de9f3ba24f7clutter-1.14.4-12.el7_1.1.x86_64.rpma959cc7005a785619f13af20abfd4e6fb83fde0f0f6c12c76efac2e73ed41729clutter-devel-1.14.4-12.el7_1.1.i686.rpmefc735cea7f5e5e2bc907f564a28ae24c613419677e2927cc6428e3a6bf63038clutter-1.14.4-12.el7_1.1.i686.rpm29126a962880ea54bf3056455342fcc9c9f747aa0dbfad47a2479d49256611aeSLSA-2015:1513-1BindA flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) After installing the update, the BIND daemon (named) will be restarted automatically.importantScientific LinuxScientific Linux 7bind-utils-9.9.4-18.el7_1.3.x86_64.rpm8910d4eb52669a9da2e610d584cdf91b28620e6cd0a19eec2e89055fbdbe75d5bind-lite-devel-9.9.4-18.el7_1.3.x86_64.rpm58016f30cceec4fbdb69faacbc68a1e1e8071dd92bf4688a4f6ee39d63cbb800bind-license-9.9.4-18.el7_1.3.noarch.rpm1f5dbf99fd2b636be3baf324cb34ecd8ba38872389961cf667406cc4d2fbed9ebind-devel-9.9.4-18.el7_1.3.i686.rpmd1708bb4e70366e0283a71c0507c1d1efc1d1789b95e0a629f0c6a924d5ce401bind-devel-9.9.4-18.el7_1.3.x86_64.rpm17a1583d59d2c91385607404192861a75d12cad0ed361c938e63a79eeca7f3edbind-sdb-9.9.4-18.el7_1.3.x86_64.rpm126c880567af376eb89cb02398627b2d51126c1479828d671a71e9f740d75d92bind-9.9.4-18.el7_1.3.x86_64.rpmee01033f95c4d46ba08ea9645f8da56a4358c5663954c9904c7a40a5467e71e0bind-sdb-chroot-9.9.4-18.el7_1.3.x86_64.rpme7750c2101e8878bb095152335187fe2ad50d4d431f60ba3c37175f78961a765bind-libs-lite-9.9.4-18.el7_1.3.x86_64.rpma8459c6f085509192e34db8857eaadd0262831beb38b39a776ca2de5943abb68bind-libs-9.9.4-18.el7_1.3.x86_64.rpmb5ef6f4f0cab2bb6ff1ac5c847ebb8c0612a80ee192d957636c2f5dfa9e58f30bind-chroot-9.9.4-18.el7_1.3.x86_64.rpm291b33e0881795b3824bf659afb9767581818c3b3e6d44310cdc5a32f9cefe6dbind-libs-lite-9.9.4-18.el7_1.3.i686.rpm142fdfc586c4c6a9b2ec4a9f678b70a3fad14a2044adf0a1aca5c7a8501e4197bind-lite-devel-9.9.4-18.el7_1.3.i686.rpmbde96f8ed5d22ba5f155a4788c0419a8d1375dfa039698a2774f8d2549b7ce5fbind-libs-9.9.4-18.el7_1.3.i686.rpm83dd0b2f86bce81c2e8e3d445b857af130b73ec35670e56df817979606dcc9a8SLSA-2015:1526-1Java-1.6.0-OpenjdkMultiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them to decrypt all traffic. (CVE-2015-4000) It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) All running instances of OpenJDK Java must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpmdd62e1ef11dbc3b0f2a41d86175356b98a1c8e7a5393fc969888ed5424f93090java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm9d955dadb90fd00792bda347371544108a19af9c4f4c886c35df81ab9461e80fjava-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm9d242e3a48c6d7213b1617c777112853b2f5b441e060ad0cde9da7287dc70051java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm3f1f8e7c741a5097670a52deeb3f1b8dd638fbea2c85b97daa2789b42fa65b77java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm93c50028e5fdb8e1225f0da556965f7bf156d2bd21a3ada7f86b5ce14e8db1cbSLSA-2015:1534-1Kernel* An integer overflow flaw was found in the way the Linux kernel's netfilter connection tracking implementation loaded extensions. An attacker on a local network could potentially send a sequence of specially crafted packets that would initiate the loading of a large number of extensions, causing the targeted system in that network to crash. (CVE-2014-9715, Moderate) * A stack-based buffer overflow flaw was found in the Linux kernel's early load microcode functionality. On a system with UEFI Secure Boot enabled, a local, privileged user could use this flaw to increase their privileges to the kernel (ring0) level, bypassing intended restrictions in place. (CVE-2015-2666, Moderate) * It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system. (CVE-2015-3636, Moderate) * It was found that the Linux kernel's TCP/IP protocol suite implementation for IPv6 allowed the Hop Limit value to be set to a smaller value than the default one. An attacker on a local network could use this flaw to prevent systems on that network from sending or receiving network packets. (CVE-2015-2922, Low) This update also fixes several bugs. The system must be rebooted for this update to take effect.moderateScientific LinuxtrueScientific Linux 7kernel-tools-3.10.0-229.11.1.el7.x86_64.rpmca64b26960fe654a1b00f9f5fb9ddb874213b0f9ef62596b143d8b241c287d9ekernel-headers-3.10.0-229.11.1.el7.x86_64.rpm77898b0fbd81166b0044c15cacc705283a8b8aef00ef438a743c2725e0971938kernel-debug-3.10.0-229.11.1.el7.x86_64.rpmc5f36a143380953f4cea1af480afeab1e58551730512c18ab9dcfbfb0f5032c9python-perf-3.10.0-229.11.1.el7.x86_64.rpm594d6c4647a835cdc0fe40916d3a5a787fbd104871d719f6d377846104227acfkernel-devel-3.10.0-229.11.1.el7.x86_64.rpmbef3b4a99d2434f5de2d76fd6941f7cf1f314e8d5bca48f533e7b69c52438f05kernel-tools-libs-3.10.0-229.11.1.el7.x86_64.rpmf913a825c6d1708c8467e1461ccfd4b11018c01c2d3df1b951b289db30797aa6kernel-3.10.0-229.11.1.el7.x86_64.rpm260982a9cf603ef239509236e70ddbc1f5bbffca1d8887bd3f5b8782c6d62c76kernel-debug-devel-3.10.0-229.11.1.el7.x86_64.rpmcf56b73d9c3464b6f70fbb693fc74ad96ea15b8d0bbce3b558d5aeb423ad6eefkernel-abi-whitelists-3.10.0-229.11.1.el7.noarch.rpm8206ed6b0f9e5fab6d59917330097d20c63329b9240a7d5c8464ccda8e50bd7fkernel-tools-libs-devel-3.10.0-229.11.1.el7.x86_64.rpm7bd22236c6e56e2803d8528a166cfb3238fc832fe6018e30a82fdb86d92a9d00perf-3.10.0-229.11.1.el7.x86_64.rpm0ed90a5f772cce526e0046317902db7b306c215ff3ab00290f69dbe8d284ec5bkernel-doc-3.10.0-229.11.1.el7.noarch.rpmdcaa73597dc4c344c909d4dbb9783721a50c4dc1d62a52bda4fc9567df0b9b67SLSA-2015:1581-1FirefoxA flaw was discovered in Mozilla Firefox that could be used to violate the same-origin policy and inject web script into a non-privileged part of the built-in PDF file viewer (PDF.js). An attacker could create a malicious web page that, when viewed by a victim, could steal arbitrary files (including private SSH keys, the /etc/passwd file, and other potentially sensitive files) from the system running Firefox. (CVE-2015-4495) After installing the update, Firefox must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7firefox-38.1.1-1.el7_1.x86_64.rpm3a7f59e6b64dc64d977983bda6dd622478e132e392e5bbc825653cb1b8a216f7firefox-38.1.1-1.el7_1.i686.rpm024b8e0b909b5510ffc49fe2355636bfee0c50c0fb9b9c1b6b942c770d86eaf2SLSA-2015:1586-1FirefoxSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4473, CVE-2015-4475, CVE-2015-4478, CVE-2015-4479, CVE-2015-4480, CVE-2015-4493, CVE-2015-4484, CVE-2015-4491, CVE-2015-4485, CVE-2015-4486, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4492) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.2.0-4.el7_1.i686.rpm9323665ea53adb2a34e8b8cdb0b8d6a63a1548a1e284e8ca1eb2f46a09586ed1firefox-38.2.0-4.el7_1.x86_64.rpm15fda36ebddc570b473cf6f01be8e682e0b7bf5b8966898b8ec684c62e586647SLSA-2015:1635-1SqliteA flaw was found in the way SQLite handled dequoting of collation-sequence names. A local attacker could submit a specially crafted COLLATE statement that would crash the SQLite process, or have other unspecified impacts. (CVE-2015-3414) It was found that SQLite's sqlite3VdbeExec() function did not properly implement comparison operators. A local attacker could submit a specially crafted CHECK statement that would crash the SQLite process, or have other unspecified impacts. (CVE-2015-3415) It was found that SQLite's sqlite3VXPrintf() function did not properly handle precision and width values during floating-point conversions. A local attacker could submit a specially crafted SELECT statement that would crash the SQLite process, or have other unspecified impacts. (CVE-2015-3416)moderateScientific LinuxScientific Linux 7sqlite-devel-3.7.17-6.el7_1.1.i686.rpm3c8d39894f08976038865b78ee53cc1644d9e6b52b85acd8f8752416fda781aasqlite-devel-3.7.17-6.el7_1.1.x86_64.rpm704c207e15b80e31a17c03b98621e1a6444c11f4332539bf6ea5b46ba406f8b9lemon-3.7.17-6.el7_1.1.x86_64.rpm3fc39af3d2f60a48c41c34ceeec6be77debbd72a16969664721b219c08943c50sqlite-doc-3.7.17-6.el7_1.1.noarch.rpm4d7f0dd4c8dc28c85ed15638d7665e4b676c60d58c6f5a26bbdba0e089f41818sqlite-tcl-3.7.17-6.el7_1.1.x86_64.rpm860c6c527250d2dfa1b193bc852a42a23441b1d9f1c0b05baf64787c1fac1782sqlite-3.7.17-6.el7_1.1.x86_64.rpmf2b2182d992e962bf5b8e59898775328c38f6d0e98b72029a00d5c245fdccb64sqlite-3.7.17-6.el7_1.1.i686.rpm8fc862fad399a5b89f73923aceef50c064bf3d7cf33d5a4e01ee8e8fa463751aSLSA-2015:1636-1Net-SnmpIt was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd. (CVE-2015-5621)moderateScientific LinuxScientific Linux 7net-snmp-sysvinit-5.7.2-20.el7_1.1.x86_64.rpm962b2f84a15af362c8fd86c883faae1dd611f1924b716df746d2f2ed83af0a34net-snmp-5.7.2-20.el7_1.1.x86_64.rpm08e8b29cdca369a19aec69bfac8808f940dbed0bcc2e61560c7231d483230f91net-snmp-gui-5.7.2-20.el7_1.1.x86_64.rpm3993c25f217ee4ddfe95e55699236a7669fd6e980690de08e0d323e92b98f96enet-snmp-agent-libs-5.7.2-20.el7_1.1.i686.rpm42fa7463f68436c100daa851fd62fd0ca71e6c8b7805b970d1ef641d60b1236dnet-snmp-perl-5.7.2-20.el7_1.1.x86_64.rpmdea899f2ec1a0018f0fb380d15faa77e42517422ead8aef9d56b0d85295acac3net-snmp-utils-5.7.2-20.el7_1.1.x86_64.rpmdc0ab614b697297020145e75c75063c5cc5d2f0682e717e7986ee3d5df4094c5net-snmp-python-5.7.2-20.el7_1.1.x86_64.rpm716eee059a6ec8f937b4bf4bf5373962659ee0d0578312e397a6ad5d1efb8e99net-snmp-devel-5.7.2-20.el7_1.1.x86_64.rpme179b727b4421977e2b11ceddcd9b4e94f188e9ffda47fc47a3e6c188b60c699net-snmp-agent-libs-5.7.2-20.el7_1.1.x86_64.rpm4adc5fd5e5e3e2c970a64236aad60e3b7be3ab5735d35b8cf98141095eeee2e3net-snmp-libs-5.7.2-20.el7_1.1.i686.rpm86baba2783f037bfad8a9303022ef0c5fbba211fdc9f3a3be37863d25f26179anet-snmp-devel-5.7.2-20.el7_1.1.i686.rpm7d9bef8b7c265247d6ecf26500ab0c677d9210782121aad728c5eda532b51b62net-snmp-libs-5.7.2-20.el7_1.1.x86_64.rpmeb84be5bfbe7af9ea2d6472a970bdeb6ec8b7561e7d9484415e9809804ec74aaSLSA-2015:1640-1PamIt was discovered that the _unix_run_helper_binary() function of PAM's unix_pam module could write to a blocking pipe, possibly causing the function to become unresponsive. An attacker able to supply large passwords to the unix_pam module could use this flaw to enumerate valid user accounts, or cause a denial of service on the system. (CVE-2015-3238)moderateScientific LinuxScientific Linux 7pam-1.1.8-12.el7_1.1.i686.rpmeb723ddf64f9bca7f812b0f2b4014dcedb91d65aa19c879d036672db93ed62cdpam-1.1.8-12.el7_1.1.x86_64.rpm21801ac931f9476f16d06ca7758ca43bc75cb43e465f79572eb83493ed5d80a2pam-devel-1.1.8-12.el7_1.1.x86_64.rpmfcbadd435961b4c9f19638d8aa170a52762d654db51a262b5b285b13149e5452pam-devel-1.1.8-12.el7_1.1.i686.rpma152c851999a166ab6638c09af4088103b0e92fb6bd2603caa09e729088adfe7SLSA-2015:1665-1MariadbIt was found that the MySQL client library permitted but did not require a client to use SSL/TLS when establishing a secure connection to a MySQL server using the "--ssl" option. A man-in-the-middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server. (CVE-2015-3152) (CVE-2015-0501, CVE-2015-2568, CVE-2015-0499, CVE-2015-2571, CVE-2015-0433, CVE-2015-0441, CVE-2015-0505, CVE-2015-2573, CVE-2015-2582, CVE-2015-2620, CVE-2015-2643, CVE-2015-2648, CVE-2015-4737, CVE-2015-4752, CVE-2015-4757) After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically.moderateScientific LinuxScientific Linux 7mariadb-5.5.44-1.el7_1.x86_64.rpmb7f4e610e0112013d748e92cbe331a62ebd86a4b505213af32f0cf84f92b594amariadb-test-5.5.44-1.el7_1.x86_64.rpm3b86d501955a82ee54ac630598bf168f690c5fe054451995cae1523a73315392mariadb-server-5.5.44-1.el7_1.x86_64.rpm67729f235b737e83b75dd10258a0c4e6cafd34b1f77e2a4b65b4c895361b7415mariadb-devel-5.5.44-1.el7_1.x86_64.rpmae8797ea5c72df2885ae687cc7b27b12ff37ef48924b7ea0e710d33cf5e89fb9mariadb-embedded-devel-5.5.44-1.el7_1.i686.rpmeb4bd6dc2b4c125c631a5bc400c7c35a471dbec89b5b092daafb839a7df3a370mariadb-embedded-5.5.44-1.el7_1.x86_64.rpm53c7cf7facb5d2037cc70fea13e9484ca996b612b2b8ed7748919de250c3b733mariadb-embedded-5.5.44-1.el7_1.i686.rpmccab0898f2f28acb29186ba7054cdede34f1729c2046c0ab0307aba441531143mariadb-embedded-devel-5.5.44-1.el7_1.x86_64.rpm7e0edb7b0ac0f93a48043e74e1f2d9b326fe4a224a84fac1299de27c804fb52emariadb-bench-5.5.44-1.el7_1.x86_64.rpm38990bcdd513a57bcfc1c83eb22b5f98566a260a46ed70ee624ddb902de46d8amariadb-libs-5.5.44-1.el7_1.x86_64.rpmbeef2a3f386ea7d950e496069ed5cc61ecb0ab2fc2e8081a4cebc4697409fdd6mariadb-devel-5.5.44-1.el7_1.i686.rpmff2c899a9e1a875d35380eb09ada4450bb32b78315f693bdbcab08b4bada3217mariadb-libs-5.5.44-1.el7_1.i686.rpm9f691defe6192da29042434fcc089f25cbdfbb34c85e5f9534a596c598fe7a73SLSA-2015:1667-1HttpdMultiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183) It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185) After installing the updated packages, the httpd service will be restarted automatically.moderateScientific LinuxScientific Linux 7mod_ssl-2.4.6-31.sl7.1.x86_64.rpmf8606f4a5823e4b03efe24b22b4a6c1a48a30812179aa417784fc4ac4375a2f0httpd-manual-2.4.6-31.sl7.1.noarch.rpma032d70d0b7e1706bb7127baf6ff72875f81aac58a75193fd630dbd21beaaa12httpd-tools-2.4.6-31.sl7.1.x86_64.rpm97935aaca97ac00e0ce212be22c273d6317d91c258a7c82337c84f44dbd937e5mod_proxy_html-2.4.6-31.sl7.1.x86_64.rpmab3aaa3b00089b2df454b370bc8335cb0a311844fbacd978102f078c0e08aa08httpd-devel-2.4.6-31.sl7.1.x86_64.rpm5b97c8c00f15c0619e4477c425a47a28139e98a2c0af73e8d77b55958f9c3a5chttpd-2.4.6-31.sl7.1.x86_64.rpm09371de5829a379462c35fed4507e1cf68ec7cc27c2b274dff18876645a9d4b1mod_ldap-2.4.6-31.sl7.1.x86_64.rpm339a80e2ad101c8a4c3f7c5fb1eacd61fad3912331aef4a8204268e8615afc62mod_session-2.4.6-31.sl7.1.x86_64.rpm699dd2cadef099056f2e78f77304cd81308b51bf4a37ffb826520e3b3dc3bab9SLSA-2015:1682-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4473, CVE-2015-4491, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489) Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). After installing the update, Thunderbird must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7thunderbird-38.2.0-1.el7_1.x86_64.rpme3cf19fb019341efe8840c7841c20cedd20a969aab4c80dde75b946a69f2543eSLSA-2015:1693-1FirefoxA flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4497) A flaw was found in the way Firefox handled installation of add-ons. An attacker could use this flaw to bypass the add-on installation prompt, and trick the user inso installing an add-on from a malicious source. (CVE-2015-4498) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.2.1-1.el7_1.i686.rpmad62330fb84bf5a807d9326fbc4a71e67980eebfb54247d90cc94170d3d17d39firefox-38.2.1-1.el7_1.x86_64.rpmb6bf3ee41a57554bfe4ecce2ce23f9bd5e3905146334b6c3e9b88888daf9c865SLSA-2015:1694-1Gdk-Pixbuf2An integer overflow, leading to a heap-based buffer overflow, was found in the way gdk-pixbuf, an image loading library for GNOME, scaled certain bitmap format images. An attacker could use a specially crafted BMP image file that, when processed by an application compiled against the gdk- pixbuf library, would cause that application to crash or execute arbitrary code with the permissions of the user running the application. (CVE-2015-4491)moderateScientific LinuxScientific Linux 7gdk-pixbuf2-devel-2.28.2-5.el7_1.i686.rpm3934fc60fc39c0f7d17ac2fc7d3a2e67811d1956040ae95630deaa808af9c8begdk-pixbuf2-2.28.2-5.el7_1.x86_64.rpm6aad5863b8053c2de907e9e978bbc08d18f87ba58d37e4b83bac57da77d328b9gdk-pixbuf2-devel-2.28.2-5.el7_1.x86_64.rpmfcd6ff1bbb52be220baaf532d7c95930ed1ce6a52191292a53c9834f7fc27185gdk-pixbuf2-2.28.2-5.el7_1.i686.rpm9c59da6f7c80441a642ae04c4beee765a3dab21b5e99e5ca309da7cbd5435972SLSA-2015:1695-1Jakarta-Taglibs-StandardIt was found that the Java Standard Tag Library (JSTL) allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution. (CVE-2015-0254) Note: additional configuration may be required: This version uses JAXP’s FEATURE_SECURE_PROCESSING to restrict XML processing. Depending on the Java runtime version in use. Java8: External entity access is automatically disabled if a SecurityManager is active. Java7: JAXP properties may need to be used to disable external access. See http://docs.oracle.com/javase/tutorial/jaxp/properties/properties.html Java6 and earlier: A new system property org.apache.taglibs.standard.xml.accessExternalEntity may be used to specify the protocols that can be used to access external entities. This defaults to “all” if no SecurityManager is present and to “” (thereby disabling access) if a SecurityManager is detected.importantScientific LinuxScientific Linux 7jakarta-taglibs-standard-1.1.2-14.el7_1.noarch.rpmbac3c694cef5181cedc7bd2bd0e782eac75ee1f2f8f50c93b380e5992364b95bjakarta-taglibs-standard-javadoc-1.1.2-14.el7_1.noarch.rpmbf8a39b56a2d81175898bc65816141dc45c86a73b978cb4af8f274554a33d34eSLSA-2015:1699-1Nss-SoftoknA flaw was found in the way NSS verified certain ECDSA (Elliptic Curve Digital Signature Algorithm) signatures. Under certain conditions, an attacker could use this flaw to conduct signature forgery attacks. (CVE-2015-2730)moderateScientific LinuxScientific Linux 7nss-softokn-3.16.2.3-13.el7_1.x86_64.rpm9868681ba756b4f3f24c119c0934a824174d7dcde89591871427d251e9a5c09enss-softokn-freebl-devel-3.16.2.3-13.el7_1.x86_64.rpm5feb38b590c28893fe474895ffde8ffae35309cf0fe701571129a687f71f07cfnss-softokn-3.16.2.3-13.el7_1.i686.rpm315a1e5534d5d52d3a8c7968e2dfb3640e4c1acab951bb2922490feba5eccbe4nss-softokn-devel-3.16.2.3-13.el7_1.i686.rpmc07555281dbc5795c23c8aedcff267e88cae42902188e94a573c0bc6a7d41c98nss-softokn-freebl-3.16.2.3-13.el7_1.i686.rpm7ca128daf7fd6b20d9b437a15fda4e4f391b53ddd0621101d8ee77ab8fbce14dnss-softokn-freebl-devel-3.16.2.3-13.el7_1.i686.rpmcfb002b262e36cc6bfed85403c6a8d4e799136ba25d976ead413489c5ff9dab2nss-softokn-devel-3.16.2.3-13.el7_1.x86_64.rpm24447e6d214f3e47242e8070bfefdac2668ca27705eaaaf605a59df288061000nss-softokn-freebl-3.16.2.3-13.el7_1.x86_64.rpmb9b83ca2f6f6f0eaac0232bd9d8e50f8e8e029409a6c6623aa7b422cf8428f2aSLSA-2015:1700-1PcsA command injection flaw was found in the pcsd web UI. An attacker able to trick a victim that was logged in to the pcsd web UI into visiting a specially crafted URL could use this flaw to execute arbitrary code with root privileges on the server hosting the web UI. (CVE-2015-5190) A race condition was found in the way the pcsd web UI backend performed authorization of user requests. An attacker could use this flaw to send a request that would be evaluated as originating from a different user, potentially allowing the attacker to perform actions with permissions of a more privileged user. (CVE-2015-5189)importantScientific LinuxScientific Linux 7python-clufter-0.9.137-13.el7_1.4.x86_64.rpmfa226a1be34cdbfd7f84e639aab8a41e6adb6fd5cb86cc1e94188d88802b9000pcs-0.9.137-13.el7_1.4.x86_64.rpmf5ae193b0a8b80eb67b3d14159ac95a0d8404f8314c00e1935c4fc4b485ecc1fSLSA-2015:1705-1BindA denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) After installing the update, the BIND daemon (named) will be restarted automatically.importantScientific LinuxScientific Linux 7bind-libs-9.9.4-18.el7_1.5.i686.rpm292d7b53e4af3fae48fca549e7662af8d19bccef79cf2e5fb73f2368da6a7b3abind-libs-lite-9.9.4-18.el7_1.5.i686.rpm00b801d03289f18322b6af127c49e0582c8ef69af96d42105e5a16032d0c4f36bind-lite-devel-9.9.4-18.el7_1.5.x86_64.rpm77b3c698ea48296ede499db822ab7d50ce8eddc976921b5b051a7019dc5020d4bind-utils-9.9.4-18.el7_1.5.x86_64.rpmd94847fc59cb1d89da10c230e5bd0ca207106b2873e0dfcc81a7bbeaf6c1ff3bbind-libs-lite-9.9.4-18.el7_1.5.x86_64.rpmb4da084255c3f2744b17b91b8eda28711be9ec74d07f1b87bbcc5b1b5791d567bind-sdb-chroot-9.9.4-18.el7_1.5.x86_64.rpmfd72182afc8d41d4a0390e6cd5d310c8d2959f8ec7d7e37fe785725d24328d81bind-libs-9.9.4-18.el7_1.5.x86_64.rpm4a4fee6f70e663d87fc3a8f53b94eef719b1417be31b95fce5c0e3565a83932abind-9.9.4-18.el7_1.5.x86_64.rpm76d9e8e436ea92c37d472acd9e33b8172804728c0c6a35646431da5c45ad5c89bind-sdb-9.9.4-18.el7_1.5.x86_64.rpm565eea73eaff5146114c59d7f9be923b50b716e5a635dab64009f9d5fca24d8dbind-chroot-9.9.4-18.el7_1.5.x86_64.rpm43c7aa074679ba3647c2a0cf082cbc823e28489ae0183197d2429636580ac7efbind-devel-9.9.4-18.el7_1.5.x86_64.rpmc9cbd3753a82fcaa0c8e64ada00a67d658c5029c7238bb7b39f4f8bde84cfb91bind-license-9.9.4-18.el7_1.5.noarch.rpme24b495cee0768099cf593f628beffc4cf7eb428afcdce775350dbb7832876a1bind-devel-9.9.4-18.el7_1.5.i686.rpma3924950acbec23ce19b597a022e3847d82498abd0c60047111f80bfbc31e349bind-lite-devel-9.9.4-18.el7_1.5.i686.rpm1fe31f34943f5fcaca9a8f5a1590620640f1e565470489c176ed8d332146bcafSLSA-2015:1708-1LibxfontAn integer overflow flaw was found in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1802) An integer truncation flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with the privileges of the X.Org server. (CVE-2015-1804) A NULL pointer dereference flaw was discovered in the way libXfont processed certain Glyph Bitmap Distribution Format (BDF) fonts. A malicious, local user could use this flaw to crash the X.Org server. (CVE-2015-1803)importantScientific LinuxScientific Linux 7libXfont-1.4.7-3.el7_1.i686.rpma7b6ee5d3b09b396da4d3fc97f127fbdd92e7c87d8d5ed8298401e4c61f31020libXfont-devel-1.4.7-3.el7_1.i686.rpma2a4c442c45d90bf526e4fb7516cad6cdf92d325b341aaa5ba1d1b483cb5e49dlibXfont-1.4.7-3.el7_1.x86_64.rpm98a56c9bcf5a11326dfc3feb4144409747ede3b0097950601a9a0786c1fd32dalibXfont-devel-1.4.7-3.el7_1.x86_64.rpme0d94f45015d896464fbcba7c82d9c0846a4bbac43d539f33e069a18553bfbd7SLSA-2015:1714-1SpiceA race condition flaw, leading to a heap-based memory corruption, was found in spice's worker_update_monitors_config() function, which runs under the QEMU-KVM context on the host. A user in a guest could leverage this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process. (CVE-2015-3247)importantScientific LinuxScientific Linux 7spice-server-0.12.4-9.el7_1.1.x86_64.rpme16cec5bae61f49850b6d702b8257aea3f5d9cecd22f37ecb3221a8feb40f28aspice-server-devel-0.12.4-9.el7_1.1.x86_64.rpmd7dbbddbaed0a008bfa382f06ef80860c10105c532a4f476272eb0bf35878e5bSLSA-2015:1741-1HaproxyAn implementation error related to the memory management of request and responses was found within HAProxy's buffer_slow_realign() function. An unauthenticated remote attacker could possibly use this flaw to leak certain memory buffer contents from a past request or session. (CVE-2015-3281)importantScientific LinuxScientific Linux 7haproxy-1.5.4-4.el7_1.1.x86_64.rpmaf7ff8f428e24511dccde006267a72cbadc0043ec33c80f1ac89944dae59221dSLSA-2015:1742-1SubversionAn assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_authz_svn module did not properly restrict anonymous access to Subversion repositories under certain configurations when used with Apache httpd 2.4.x. This could allow a user to anonymously access files in a Subversion repository, which should only be accessible to authenticated users. (CVE-2015-3184) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.moderateScientific LinuxScientific Linux 7subversion-1.7.14-7.el7_1.1.x86_64.rpma35bc697404d008640d70a7f211939d4c7779b8ff09c36bf9a2c40976065aed4subversion-kde-1.7.14-7.el7_1.1.i686.rpmdf13ed6140c140f8f2b5dc01d6b9d0d108a843a1c9cee542f2fd734cc9e92e16subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm5806bc436df757f35f45b090594b440257ca0b95ea9c82892ce92c64767b0702subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm36499c45efd28a03d3fdeac10b025240621b81e5ea842ad09248a17b2019ffb8subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm6bf106ec9cae8fc540b12fd1c53b9f9e487b3f49188a695bbe4e32f3f31e4489subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm6717ca8f72d61147bf17ae904dc3556366fdac5ccffca0805e7611731a1fc653subversion-libs-1.7.14-7.el7_1.1.i686.rpm1b51495c9108a394bcc84d3dffcc16685f70784b7327282b6119d46e5fbee302subversion-kde-1.7.14-7.el7_1.1.x86_64.rpmd58a75019feb4c42b87f979c5a17b081cfbf6e3af6e46ebd42174d913934f2e6subversion-libs-1.7.14-7.el7_1.1.x86_64.rpme8a44daf54b0f1983c932efb1a8cc4dcd639174e5080e67a31c400635d592df4subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm3ca8f5aa2481af6c40edf443a0ada93212b3dff0206b975abdac8980681401efsubversion-devel-1.7.14-7.el7_1.1.i686.rpmb0f88b3aacc8e795f757c6c977a03cf9809c8876964d958f2f303b27ade7da2fsubversion-ruby-1.7.14-7.el7_1.1.i686.rpm333c8a5084ad6f7394661c8fb31f6bfb8e290b9828684b2b6654e638199d8176subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm98055f35949d0e864c89a78096ab262d1f98109bb288f399a5e18e75270d8d7esubversion-gnome-1.7.14-7.el7_1.1.i686.rpme63f7f0a03ca474e960772c63c90319bc276e93a280682b66bdd4da3bbbcb397subversion-1.7.14-7.el7_1.1.i686.rpm3ed6aa0320d6c836b518c9a43315b0e26a3d1d6ca2b88b5d70d070a70142374amod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm8beee3f6e5ff1452074f8ce7f0e7ae2643b51f9d4c90ba5bf334a8fbb082d1f3subversion-python-1.7.14-7.el7_1.1.x86_64.rpm97d9117f38c3de4a240540df293d8af5eafab56ecdf08d2216ba18715bb04928subversion-perl-1.7.14-7.el7_1.1.i686.rpmb111376c05e4c3eadfc35a5708b4fef9837ef674788b5200c5670a88466158c5subversion-javahl-1.7.14-7.el7_1.1.i686.rpm201786bc93f075c85f2be9c30b47055381f9b73a26d0e2db4b90fe0b613d04e7SLSA-2015:1778-1Kernel* A flaw was found in the kernel's implementation of the Berkeley Packet Filter (BPF). A local attacker could craft BPF code to crash the system by creating a situation in which the JIT compiler would fail to correctly optimize the JIT image on the last pass. This would lead to the CPU executing instructions that were not part of the JIT code. (CVE-2015-4700, Important) * Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. (CVE-2015-5364, CVE-2015-5366, Important) * A flaw was found in the way the Linux kernel's ext4 file system handled the "page size > block size" condition when the fallocate zero range functionality was used. A local attacker could use this flaw to crash the system. (CVE-2015-0275, Moderate) * It was found that the Linux kernel's keyring implementation would leak memory when adding a key to a keyring via the add_key() function. A local attacker could use this flaw to exhaust all available memory on the system. (CVE-2015-1333, Moderate) * A race condition flaw was found in the way the Linux kernel's SCTP implementation handled Address Configuration lists when performing Address Configuration Change (ASCONF). A local attacker could use this flaw to crash the system via a race condition triggered by setting certain ASCONF options on a socket. (CVE-2015-3212, Moderate) * An information leak flaw was found in the way the Linux kernel's Virtual Dynamic Shared Object (vDSO) implementation performed address randomization. A local, unprivileged user could use this flaw to leak kernel memory addresses to user-space. (CVE-2014-9585, Low) This update also fixes several bugs. The system must be rebooted for this update to take effect.importantScientific LinuxtrueScientific Linux 7kernel-devel-3.10.0-229.14.1.el7.x86_64.rpm61ef92587e81578b05245978f3ceaa2f7d4cb03e8c3c05472d2c621bff0353capython-perf-3.10.0-229.14.1.el7.x86_64.rpm753fe9b958e67f1be2768bb536205c251e79027cd53eb87cba66301d06643c2dperf-3.10.0-229.14.1.el7.x86_64.rpm6c5e6cb0a76de8e148830c689bba990a3c2a5f164cdfc727b320bfb0c483ba1fkernel-headers-3.10.0-229.14.1.el7.x86_64.rpmc572e1a79dc128d58b6e9e0d5af508453c646a31aab1774b858f4c6cffe567edkernel-abi-whitelists-3.10.0-229.14.1.el7.noarch.rpm2ddbd187d9b548064f6f18a682c717c6369fe0ac4698d4ce7b9c5847cf0eaeb9kernel-debug-3.10.0-229.14.1.el7.x86_64.rpm44e66b37cd7c9c177f00c929e30ea7a2ba8b0dced3ed3738549d023cafc9d0c0kernel-tools-3.10.0-229.14.1.el7.x86_64.rpmf1603e0418250a9419587867297dfb279b82f08ea56510c174d7f17859a2ed8ekernel-tools-libs-3.10.0-229.14.1.el7.x86_64.rpmba149820b31d39eb2dbd937fb56a5025d2448bc919b4c7f86a459443d67aed3fkernel-debug-devel-3.10.0-229.14.1.el7.x86_64.rpm6ff77176a753ffe6e0bbef0c4acd3d44a21db8e2a2d404f508a66d2cdad036c9kernel-3.10.0-229.14.1.el7.x86_64.rpmcf4db7b46ec66ab8890415cbc40d6e87a6eb51e2e2a266d2a401678b71f7a7eakernel-tools-libs-devel-3.10.0-229.14.1.el7.x86_64.rpm7fe7277c70bd62a6be831ee14957f86d92a8f50c9f7363878e0e7206c26eceaekernel-doc-3.10.0-229.14.1.el7.noarch.rpm3529ff74b240e068f9dce1c554fc82ad14e5d381889e28704aed155b4f0b0e45SLSA-2015:1793-1Qemu-KvmAn information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory. (CVE-2015-5165) After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.moderateScientific LinuxScientific Linux 7libcacard-tools-1.5.3-86.el7_1.6.x86_64.rpmaf1e00c8becc5b332ac8c37b5f11a1f26ff43be662cfaca1b5f287cb0efab447libcacard-1.5.3-86.el7_1.6.i686.rpme81001233984b90502afc585c5e2616229daea2b0d00954f6f9d1cf84c5af219libcacard-1.5.3-86.el7_1.6.x86_64.rpm5475e46e95b59e27d1e230e31bd0783088f92d113c27fd633f7cdd05285074ddqemu-kvm-tools-1.5.3-86.el7_1.6.x86_64.rpm3fe65057306d152fc4f19460870d6c86b5190e4e397386aaf730a65cc5d9781alibcacard-devel-1.5.3-86.el7_1.6.i686.rpmac1f56496167175d472283faa4edae8f72178ac8ac2034a916fad035dfda72d1qemu-kvm-1.5.3-86.el7_1.6.x86_64.rpm6ed5bd238415846016488584483148c361f926de72106bb05c2f0d19981ce314libcacard-devel-1.5.3-86.el7_1.6.x86_64.rpm60c543a9562020aee78dcabb929bb6a26251017e52d2807cd61b41b7ad026ae8qemu-img-1.5.3-86.el7_1.6.x86_64.rpm245a1634f586eff95b64e6e985c3f513b6fb47605beda0459ef63e03e3285897qemu-kvm-common-1.5.3-86.el7_1.6.x86_64.rpm33ff930b59f9739a1314bb060d8e33c7f34223fe6e3c1081efb660b42d945347SLSA-2015:1834-1FirefoxSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4500, CVE-2015-4509, CVE-2015-4510) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.3.0-2.el7_1.x86_64.rpmda52e092f5ee138a84ada97bdcda121a707786201c6da60f8eda190ecd65a3fefirefox-38.3.0-2.el7_1.i686.rpm4afd4607a6dbc273a76ed73e5e254acba89534d66725f40b70c5eb95ba725c62SLSA-2015:1840-1OpenldapA flaw was found in the way the OpenLDAP server daemon (slapd) parsed certain Basic Encoding Rules (BER) data. A remote attacker could use this flaw to crash slapd via a specially crafted packet. (CVE-2015-6908)importantScientific LinuxScientific Linux 7openldap-2.4.39-7.el7_1.i686.rpma9149422289241ab932068d2143c364447f7a0ea050f2841dcb331ccdd28ae03openldap-devel-2.4.39-7.el7_1.x86_64.rpmb8948699c6d7abc36f9704ec1c55127cdf789595add336e109e38d4e20bc89cbopenldap-servers-sql-2.4.39-7.el7_1.x86_64.rpm18e60f148e262080e209092f3fc2139ac85b1036e7dd0b93f91555966f69c9ecopenldap-clients-2.4.39-7.el7_1.x86_64.rpmfe8dd4e76965d2486a367cc687ed8200b25a2b50496911621793f29c87ad4c9aopenldap-2.4.39-7.el7_1.x86_64.rpmc84401a4062ce72b00377014fad6bb0fd79ebfda06da0405dc34dddac322cb59openldap-servers-2.4.39-7.el7_1.x86_64.rpm3dd7bf070ba6c093b970de80b7b7b9995066b7b6dfd5de49793fdd56fbb0bd01openldap-devel-2.4.39-7.el7_1.i686.rpmcbf16d316339428803603805d60d20eed29c36728e9efba834f7edfdaf3b5828SLSA-2015:1852-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4500, CVE-2015-4509, CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180) Two information leak flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to disclose sensitive information or, in certain cases, crash. (CVE-2015-4519, CVE-2015-4520) Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). After installing the update, Thunderbird must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7thunderbird-38.3.0-1.el7_1.x86_64.rpma0d9c086d73989b9a53bb95f70ad43bb13a1419853509ed83ca7a78460690221SLSA-2015:1890-1SpiceA heap-based buffer overflow flaw was found in the way SPICE handled certain guest QXL commands related to surface creation. A user in a guest could use this flaw to read and write arbitrary memory locations on the host. (CVE-2015-5261) A heap-based buffer overflow flaw was found in the way spice handled certain QXL commands related to the "surface_id" parameter. A user in a guest could use this flaw to crash the host QEMU-KVM process or, possibly, execute arbitrary code with the privileges of the host QEMU-KVM process. (CVE-2015-5260)importantScientific LinuxScientific Linux 7spice-server-devel-0.12.4-9.el7_1.3.x86_64.rpm0744aa089f817fdb2fbb830c2aa60e2a7e679ad2daff7c13d98f32e77785fd1espice-server-0.12.4-9.el7_1.3.x86_64.rpm83106c59b885fdb9bbcbb47aed2afe187ad144508e30bb4fe81225a3cdd6397aSLSA-2015:1917-1LibwmfIt was discovered that libwmf did not correctly process certain WMF (Windows Metafiles) with embedded BMP images. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly use this flaw to execute arbitrary code with the privileges of the user running the application. (CVE-2015-0848, CVE-2015-4588) It was discovered that libwmf did not properly process certain WMF files. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly exploit this flaw to cause a crash or execute arbitrary code with the privileges of the user running the application. (CVE-2015-4696) It was discovered that libwmf did not properly process certain WMF files. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly exploit this flaw to cause a crash. (CVE-2015-4695) After installing the update, all applications using libwmf must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7libwmf-lite-0.2.8.4-41.el7_1.x86_64.rpm2b8881b0a9273d30cfb2b87b2b8e66e7dc6f359bfa90f7fd28a57b7b646c1d5flibwmf-lite-0.2.8.4-41.el7_1.i686.rpmcc76825daa40d756d99e2a3f0d8f4a7f9768670dfe0648db33d0cfd731daf801libwmf-devel-0.2.8.4-41.el7_1.i686.rpmb26c5e7bb69d1ba18ab242a4671e004df2d28b9fb7ec7eb57c50c0bca818ab0flibwmf-0.2.8.4-41.el7_1.i686.rpm7b9ffc5c65df6ad0ece105c4a6fc0e8067879b2419ccff302e8203718bcfa868libwmf-0.2.8.4-41.el7_1.x86_64.rpm236c036e2141d82bcdd8f7c7b47a558bc905db1d3271ee3e48efde261a98d215libwmf-devel-0.2.8.4-41.el7_1.x86_64.rpmd86fb0399e41223141a9814ef14d25a83d331a648de02f100c3f09e2b6a01de3SLSA-2015:1919-1Java-1.8.0-OpenjdkMultiple flaws were discovered in the CORBA, Libraries, RMI, Serialization, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860, CVE-2015-4805, CVE-2015-4844) Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2015-4803, CVE-2015-4893, CVE-2015-4911) A flaw was found in the way the Libraries component in OpenJDK handled certificate revocation lists (CRL). In certain cases, CRL checking code could fail to report a revoked certificate, causing the application to accept it as trusted. (CVE-2015-4868) It was discovered that the Security component in OpenJDK failed to properly check if a certificate satisfied all defined constraints. In certain cases, this could cause a Java application to accept an X.509 certificate which does not meet requirements of the defined policy. (CVE-2015-4872) Multiple flaws were found in the Libraries, 2D, CORBA, JAXP, JGSS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806, CVE-2015-4840, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903) All running instances of OpenJDK Java must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1.x86_64.rpm144b2207ffee1eec829cf500744e4759680862b69103005712b0e6023983183cjava-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1.x86_64.rpm259f5b8466d10d84c2d7f74501c94fd0cf1eb93b91c402bd780159a4aef23271java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1.x86_64.rpmb280c51b072114f7bfd4527125012f65bdc8bd5e0d1f4e0ba73f97fa6e4bf834java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1.noarch.rpmdf27f88462ca65574c483a1a95cfa17eb2279c29502353a1fa6caaa1eae2f95cjava-1.8.0-openjdk-1.8.0.65-2.b17.el7_1.x86_64.rpmba170eb2ccebd7f286b343088252ef2978873414fbef8cc77d07a3feffd76f02java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1.x86_64.rpmf7e020b649378e062d6b1f4aed05cbbe20d2ad027f727ce40503563bbe9511e5java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1.x86_64.rpm6e76a7a9ecacd8e6f1173c66245b34b6da4e3d72582825d23e4aa6f3319372c9SLSA-2015:1920-1Java-1.7.0-OpenjdkMultiple flaws were discovered in the CORBA, Libraries, RMI, Serialization, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860, CVE-2015-4805, CVE-2015-4844) Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2015-4803, CVE-2015-4893, CVE-2015-4911) It was discovered that the Security component in OpenJDK failed to properly check if a certificate satisfied all defined constraints. In certain cases, this could cause a Java application to accept an X.509 certificate which does not meet requirements of the defined policy. (CVE-2015-4872) Multiple flaws were found in the Libraries, 2D, CORBA, JAXP, JGSS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806, CVE-2015-4840, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. All running instances of OpenJDK Java must be restarted for the update to take effect.criticalScientific LinuxtrueScientific Linux 7java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1.x86_64.rpm4634adb1d21686958adabd4e5f4f2666f577e868aad39ac757ac98dc66382c70java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1.x86_64.rpm651efdb3bb6c8c644944ee9568336f7c0e289ee1a06968aba9971111329f7dffjava-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1.x86_64.rpm7c34263458159c5bf912e7982af572f82948498624ada67ed3bbdc022debe5e8java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1.x86_64.rpm0c6efb281ac910beaadaddf72f34a443c54650544d6aa13472019ee1a6539255java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1.x86_64.rpm822e3c9bf77391ec4a60b82cd0dd10ddce53fc2ef3cd27977e9c0b3697cac0f1java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1.x86_64.rpme5a4948bfcd13959e336b4c2f9c68a9b22f0925d8647a46609a7d32b9fe6d49ajava-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1.noarch.rpmb0d20420edd120d0aeeca68e6e09a018081ae72a2e05d816c5cceb2d73f9755aSLSA-2015:1930-1NtpIt was discovered that ntpd as a client did not correctly check timestamps in Kiss-of-Death packets. A remote attacker could use this flaw to send a crafted Kiss-of-Death packet to an ntpd client that would increase the client's polling interval value, and effectively disable synchronization with the server. (CVE-2015-7704) It was found that ntpd did not correctly implement the threshold limitation for the '-g' option, which is used to set the time without any restrictions. A man-in-the-middle attacker able to intercept NTP traffic between a connecting client and an NTP server could use this flaw to force that client to make multiple steps larger than the panic threshold, effectively changing the time to an arbitrary value. (CVE-2015-5300) After installing the update, the ntpd daemon will restart automatically.importantScientific LinuxScientific Linux 7ntp-doc-4.2.6p5-19.el7_1.3.noarch.rpma7d380a1f756b57c802f35e1378277f5eb3b8cdb43b540a517e569a8da23cb80ntp-4.2.6p5-19.el7_1.3.x86_64.rpm8c84a14921e1312e93ca109a8ab99301e172fb9e5533d43b512271c5053b0bb9ntp-perl-4.2.6p5-19.el7_1.3.noarch.rpmfa80e6ba26d519e609adaaec93e678ac56b697e36a0f5b798d4c34cd9aa0c882sntp-4.2.6p5-19.el7_1.3.x86_64.rpm6bd6290dbfb32a4045cecd6df64b297f0b15bb968a3948ed4acf3427db3e8a80ntpdate-4.2.6p5-19.el7_1.3.x86_64.rpmf911e906c26a74d150f68de31df454d15ac7ba9e5802f3d26ea4386e16703b6eSLSA-2015:1943-1Qemu-KvmIt was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU. (CVE-2015-1779) After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.moderateScientific LinuxScientific Linux 7libcacard-1.5.3-86.el7_1.8.i686.rpmc85c198c31ee5f1c0c8575081493ae786ac4a03ccafba72d0aff1a93ac4aa7belibcacard-devel-1.5.3-86.el7_1.8.x86_64.rpm76547dfe125b9f98bcf652a603774783f5dd2e8f2b563d9bdf5d42ef96475c21qemu-kvm-common-1.5.3-86.el7_1.8.x86_64.rpm35e58bdc0831ca0616352af5c1d7dd176400d755ca5ba585f1284059fe37513dlibcacard-tools-1.5.3-86.el7_1.8.x86_64.rpme618febd0a5faff1e515a5c1bcb2b02a988e67b4d942220610b8c6c574fe8d3flibcacard-1.5.3-86.el7_1.8.x86_64.rpm69766a32b993e2eeffb6230c648fe1ccb49e5221983c59f8710e1365eac84411libcacard-devel-1.5.3-86.el7_1.8.i686.rpma5af1155649f2076fbaabe1ff582b6abf6200efec4a90d7e94a87296c899dd98qemu-img-1.5.3-86.el7_1.8.x86_64.rpm6679d7e58a0efcd9cef2b71cd4c8203bafc3f838ea9fe613c361a2df221bfd96qemu-kvm-tools-1.5.3-86.el7_1.8.x86_64.rpmd3e4824f36b797c06c13469c38397624347b414ecfc0651fedaa0bfe9c9b98b1qemu-kvm-1.5.3-86.el7_1.8.x86_64.rpm54e6fc22656ceb39ba62b24d8cc65fd8e2b3f4ff41232bb6cc826809832486daSLSA-2015:1978-1Kernel* A flaw was found in the way the Linux kernel's VFS subsystem handled file system locks. A local, unprivileged user could use this flaw to trigger a deadlock in the kernel, causing a denial of service on the system. (CVE-2014-8559, Moderate) * A buffer overflow flaw was found in the way the Linux kernel's virtio- net subsystem handled certain fraglists when the GRO (Generic Receive Offload) functionality was enabled in a bridged network configuration. An attacker on the local network could potentially use this flaw to crash the system, or, although unlikely, elevate their privileges on the system. (CVE-2015-5156, Moderate) The system must be rebooted for this update to take effect.moderateScientific LinuxtrueScientific Linux 7python-perf-3.10.0-229.20.1.el7.x86_64.rpm2d1b8ad1c99fbeddea6a90b0eb5ffa452d83dceb9c245d1d9fc925ad07a4c2e9kernel-devel-3.10.0-229.20.1.el7.x86_64.rpm6c304b891c46f1b1f9362747bac5e05d997e631e788f2562370d3e980a943d21kernel-headers-3.10.0-229.20.1.el7.x86_64.rpm27d8806d30014ae148b070b61bad246b7d55ff93e61154bdc82ecd085b4b8ca5kernel-3.10.0-229.20.1.el7.x86_64.rpm7743e7943329c2e779fbd6a0cb2f50e37cda2939df8bd22b6ecc852308eadfa3kernel-abi-whitelists-3.10.0-229.20.1.el7.noarch.rpmbd3e9d0d154d495c0923700256a43f4f400a39464918a3e3ae4fe2728a90ba9ckernel-tools-3.10.0-229.20.1.el7.x86_64.rpm50bedcb4584aeb821ffb1dd54127025aa4ea29cddfadfaa8690d5001e72e29cfkernel-debug-3.10.0-229.20.1.el7.x86_64.rpm965e0c49aa880d4d82defa3e554d6309ee11e56c7600f22ae80c73c597384327kernel-debug-devel-3.10.0-229.20.1.el7.x86_64.rpme3f6eb0e1181c71944b3eb307c83f23dea4ded2f5205caa2322de644dbc71696kernel-tools-libs-3.10.0-229.20.1.el7.x86_64.rpm778ca2b8ea57e511abf36c51879afe0834b8b4da5dccebf401efa202628b33f3perf-3.10.0-229.20.1.el7.x86_64.rpm98483176d33b8b573827dda313129cf43567a6d65670d3a0ab530f9ad62b7683kernel-doc-3.10.0-229.20.1.el7.noarch.rpm622a02a552ff10220277ee635fa58822eaff6d25ada0d284fa7a0a20a7db4a5ckernel-tools-libs-devel-3.10.0-229.20.1.el7.x86_64.rpm7d9d0a114d80ef766f0a875f3fc59e3fa98ad41cd7568d0f72f78be01b3b271fSLSA-2015:1979-1LibreswanA flaw was discovered in the way Libreswan's IKE daemon processed IKE KE payloads. A remote attacker could send specially crafted IKE payload with a KE payload of g^x=0 that, when processed, would lead to a denial of service (daemon crash). (CVE-2015-3240) Note: Please note that when upgrading from an earlier version of Libreswan, the existing CA certificates in the /etc/ipsec.d/cacerts/ directory and the existing certificate revocation list (CRL) files from the /etc/ipsec.d/crls/ directory are automatically imported into the NSS database. Once completed, these directories are no longer used by Libreswan. To install new CA certificates or new CRLS, the certutil and crlutil commands must be used to import these directly into the Network Security Services (NSS) database. This update also adds the following enhancements: * This update adds support for RFC 7383 IKEv2 Fragmentation, RFC 7619 Auth Null and ID Null, INVALID_KE renegotiation, CRL and OCSP support via NSS, AES_CTR and AES_GCM support for IKEv2, CAVS testing for FIPS compliance. In addition, this update enforces FIPS algorithms restrictions in FIPS mode, and runs Composite Application Validation System (CAVS) testing for FIPS compliance during package build. A new Cryptographic Algorithm Validation Program (CAVP) binary can be used to re-run the CAVS tests at any time. Regardless of FIPS mode, the pluto daemon runs RFC test vectors for various algorithms. Furthermore, compiling on all architectures now enables the "-Werror" GCC option, which enhances the security by making all warnings into errors. * This update also fixes several memory leaks and introduces a sub-second packet retransmit option. * This update improves migration support from Openswan to Libreswan. Specifically, all Openswan options that can take a time value without a suffix are now supported, and several new keywords for use in the /etc/ipsec.conf file have been introduced. See the relevant man pages for details. * With this update, loopback support via the "loopback=" option has been deprecated.moderateScientific LinuxScientific Linux 7libreswan-3.15-5.el7_1.x86_64.rpmd4260510796a542927042a357407291b77da8568d305ecb7d73b2d7fa0e570d2SLSA-2015:1981-1Nss, Nss-Util, And NsprA use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS parsed certain ASN.1 structures. An attacker could use these flaws to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library. (CVE-2015-7181, CVE-2015-7182) A heap-based buffer overflow was found in NSPR. An attacker could use this flaw to cause NSPR to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSPR library. (CVE-2015-7183) Note: Applications using NSPR's PL_ARENA_ALLOCATE, PR_ARENA_ALLOCATE, PL_ARENA_GROW, or PR_ARENA_GROW macros need to be rebuild against the fixed nspr packages to completely resolve the CVE-2015-7183 issue. This erratum includes nss and nss-utils packages rebuilt against the fixed nspr version.criticalScientific LinuxScientific Linux 7nss-util-devel-3.19.1-4.el7_1.i686.rpm4b83be51d0d6180f6725421c5949bcc42b8ed8a920940e18d5ec85412cde369bnspr-devel-4.10.8-2.el7_1.x86_64.rpmadb6ce62a330d2a3282da63649beb1fb43ab5f86df19123939ec1c5261b0f001nss-util-devel-3.19.1-4.el7_1.x86_64.rpm4c6ffb75b9fde02de1ec98335174f86708ec918e90e22404ba62f9e295fff8danss-devel-3.19.1-7.el7_1.2.x86_64.rpmff1a962c29b7b8518e3703e8c0a7a646b6a1b7fc88005ac08a9d7a7b3c5e5087nss-3.19.1-7.el7_1.2.x86_64.rpm9eaaca6b172aa998c684edc3e8770f493c46b5d5e9f6dc8d0b3c191cf6cce223nss-devel-3.19.1-7.el7_1.2.i686.rpm96d2281b6446dc7d6e1e79623e07e2dc59187d240979cfbf93fee22c7da3854cnss-3.19.1-7.el7_1.2.i686.rpm5154822756bb815ed4ccf4a9e889d8d8d989cbd4185ba7190b8f61ec57ca621dnss-util-3.19.1-4.el7_1.x86_64.rpm1c59b2cf005dcbd6f3c4e71942a90674ff2543964c04ae0ccbc426ebad6b6173nspr-4.10.8-2.el7_1.i686.rpmb9761318e780d6ff4ca561209d5aceb39a3cf584d76292bb0893aa7cc65cac3dnss-util-3.19.1-4.el7_1.i686.rpm471e8770ae9144167fdf893940803cbbaa134eb65798d49f333321b85b89ba9anss-tools-3.19.1-7.el7_1.2.x86_64.rpm947af3f447c3bbed4528c4b9852b63c0ff30989568699ac3fd1f823de15f7349nspr-4.10.8-2.el7_1.x86_64.rpm1c09a02c2b3832405ba68ecd78e906e2ceef1a73e253b0bf4b816a17cf1cafcanss-pkcs11-devel-3.19.1-7.el7_1.2.i686.rpm7c9cc2411e1e4defc238e2e5a0439b77516f7d17b979f660c66cb73283c7032cnspr-devel-4.10.8-2.el7_1.i686.rpm4868548992096b7e27a00ce49c689a6ac7aff48e275828876ebf74dc191b36f2nss-pkcs11-devel-3.19.1-7.el7_1.2.x86_64.rpm0f4cbbe9496b2f00b48ad9eeca9e256bf437682824da228592ecbe1b8515a241nss-sysinit-3.19.1-7.el7_1.2.x86_64.rpma41bf4f31adacb3fc32c40a31bdbe6c742617c90b569c250468b2b8c53db0a69SLSA-2015:1982-1FirefoxSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7194, CVE-2015-7196, CVE-2015-7198, CVE-2015-7197) A same-origin policy bypass flaw was found in the way Firefox handled certain cross-origin resource sharing (CORS) requests. A web page containing malicious content could cause Firefox to disclose sensitive information. (CVE-2015-7193) A same-origin policy bypass flaw was found in the way Firefox handled URLs containing IP addresses with white-space characters. This could lead to cross-site scripting attacks. (CVE-2015-7188) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.4.0-1.el7_1.x86_64.rpmf52fc5d68b50e72a1ba9c83aa651382f3cdb024d4652456ff19f54128da23ebafirefox-38.4.0-1.el7_1.i686.rpm9e0b528f847c0153c59763b2dfb728e4a866cb966b6e705c6f67b28ce47e0d2bSLSA-2015:2078-1PostgresqlA memory leak error was discovered in the crypt() function of the pgCrypto extension. An authenticated attacker could possibly use this flaw to disclose a limited amount of the server memory. (CVE-2015-5288) A stack overflow flaw was discovered in the way the PostgreSQL core server processed certain JSON or JSONB input. An authenticated attacker could possibly use this flaw to crash the server backend by sending specially crafted JSON or JSONB input. (CVE-2015-5289) If the postgresql service is running, it will be automatically restarted after installing this update.moderateScientific LinuxScientific Linux 7postgresql-9.2.14-1.el7_1.x86_64.rpm96e7a4394d086cc79e233d93821d7110b7ff82637c086f212ab466f941920ea8postgresql-devel-9.2.14-1.el7_1.x86_64.rpmd671aa32dcf20f5f3b790de47d23ba5bc8288fe528574ac93411466143a06c57postgresql-9.2.14-1.el7_1.i686.rpm872e60515ab0a44fafd66fde0ad556d67f3261bd31a935a814d4459f8515b727postgresql-docs-9.2.14-1.el7_1.x86_64.rpm2bbfd88beb2ac8cdcf5df31b51735ec04ebbe929bbf83eba389cea82b961e47apostgresql-devel-9.2.14-1.el7_1.i686.rpm66747faadb195346e95246b7be7426347cd8349dbec01cd91285b68295f84686postgresql-libs-9.2.14-1.el7_1.x86_64.rpmefc129edfe1250ca4e3b3babe18926c9fb1a6817cfee696807ca7ca15f68a5bfpostgresql-libs-9.2.14-1.el7_1.i686.rpmdc32dd850c013494009e2081b00a25818e37b36355ae4545b5bdba3539f66b70postgresql-plperl-9.2.14-1.el7_1.x86_64.rpmedbcbd54edbb706c51e9b42ca3e1b09e0e0e38a695eac775ac163e0ca256b6b7postgresql-test-9.2.14-1.el7_1.x86_64.rpmfa28687ac91b99a95458a9aa347a2030cb50b9ea55a97c922a7758a91cd7fb4epostgresql-pltcl-9.2.14-1.el7_1.x86_64.rpmbf70a9b47f0b09c7d96069cce29e84a09dd2c4bc77b7c8f25b1a4557a74056dapostgresql-server-9.2.14-1.el7_1.x86_64.rpmac5aab6e474676d9c98c04702a3e88cc47b221e05db43c3347af533d9ba02e01postgresql-contrib-9.2.14-1.el7_1.x86_64.rpmbcb75d4b7395d486ce922e6d34be7b102fe7532fc148b5d744fed8d10cd9d924postgresql-upgrade-9.2.14-1.el7_1.x86_64.rpmf1ab96e2557be911d94c32573bd1be090b15204721e5c242fef79065f35c0515postgresql-plpython-9.2.14-1.el7_1.x86_64.rpmd1e06493a2f1d371054f1636d69a1f2055a87435c4b7d393358a296e2cb022e5SLSA-2015:2079-9BinutilsMultiple buffer overflow flaws were found in the libbdf library used by various binutils utilities. If a user were tricked into processing a specially crafted file with an application using the libbdf library, it could cause the application to crash or, potentially, execute arbitrary code. (CVE-2014-8485, CVE-2014-8501, CVE-2014-8502, CVE-2014-8503, CVE-2014-8504, CVE-2014-8738) An integer overflow flaw was found in the libbdf library used by various binutils utilities. If a user were tricked into processing a specially crafted file with an application using the libbdf library, it could cause the application to crash. (CVE-2014-8484) A directory traversal flaw was found in the strip and objcopy utilities. A specially crafted file could cause strip or objdump to overwrite an arbitrary file writable by the user running either of these utilities. (CVE-2014-8737) This update fixes the following bugs: * Binary files started by the system loader could lack the Relocation Read-Only (RELRO) protection even though it was explicitly requested when the application was built. This bug has been fixed on multiple architectures. Applications and all dependent object files, archives, and libraries built with an alpha or beta version of binutils should be rebuilt to correct this defect. * The ld linker on 64-bit PowerPC now correctly checks the output format when asked to produce a binary in another format than PowerPC. * An important variable that holds the symbol table for the binary being debugged has been made persistent, and the objdump utility on 64-bit PowerPC is now able to access the needed information without reading an invalid memory region. * Undesirable runtime relocations described in SLBA-2015:0974. The update adds these enhancements: * New hardware instructions of the IBM z Systems z13 are now supported by assembler, disassembler, and linker, as well as Single Instruction, Multiple Data (SIMD) instructions. * Expressions of the form: "FUNC@localentry" to refer to the local entry point for the FUNC function (if defined) are now supported by the PowerPC assembler. These are required by the ELFv2 ABI on the little-endian variant of IBM Power Systems.moderateScientific LinuxScientific Linux 7binutils-devel-2.23.52.0.1-55.el7.x86_64.rpm06bdc21fd427e6328997b75bb1c078c7bc05c49fb2a7226c271a0030d7ac5f5fbinutils-devel-2.23.52.0.1-55.el7.i686.rpm1631cecbca3f81d46e0061a8187c0571df65598ffc5ee102351231de1a623c16binutils-2.23.52.0.1-55.el7.x86_64.rpm15c4a294f5ea49dbe856dff04b3597b0765559a858304628653388c9278360beSLSA-2015:2086-1Java-1.6.0-OpenjdkMultiple flaws were discovered in the CORBA, Libraries, RMI, Serialization, and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2015-4835, CVE-2015-4881, CVE-2015-4843, CVE-2015-4883, CVE-2015-4860, CVE-2015-4805, CVE-2015-4844) Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2015-4803, CVE-2015-4893, CVE-2015-4911) It was discovered that the Security component in OpenJDK failed to properly check if a certificate satisfied all defined constraints. In certain cases, this could cause a Java application to accept an X.509 certificate which does not meet requirements of the defined policy. (CVE-2015-4872) Multiple flaws were found in the Libraries, CORBA, JAXP, JGSS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4806, CVE-2015-4882, CVE-2015-4842, CVE-2015-4734, CVE-2015-4903) All running instances of OpenJDK Java must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1.x86_64.rpm27beb861fd446b3e157b54856b56fab34d5be88eec6835e2e411029614880723java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1.x86_64.rpm9e309cc4345b4a378689de28bf750c880d09bd0b8563732385039fa81d7fc420java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1.x86_64.rpm43d2d496e32af3b0a485265d24563f5144d87607f7702409bc0ae333491490b3java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1.x86_64.rpm4546298cfcd58d30fd6953a71067365d8bf3092ad4b8b6059161e5b83bb2caeejava-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1.x86_64.rpmc296f12bed66bf04c9f2f0efc4efcebcab78744bf66a0295e8bfc9851b80e97fSLSA-2015:2088-6OpensshA flaw was found in the way OpenSSH handled PAM authentication when using privilege separation. An attacker with valid credentials on the system and able to fully compromise a non-privileged pre-authentication process using a different flaw could use this flaw to authenticate as other users. (CVE-2015-6563) A use-after-free flaw was found in OpenSSH. An attacker able to fully compromise a non-privileged pre-authentication process using a different flaw could possibly cause sshd to crash or execute arbitrary code with root privileges. (CVE-2015-6564) It was discovered that the OpenSSH sshd daemon did not check the list of keyboard-interactive authentication methods for duplicates. A remote attacker could use this flaw to bypass the MaxAuthTries limit, making it easier to perform password guessing attacks. (CVE-2015-5600) It was found that the OpenSSH ssh-agent, a program to hold private keys used for public key authentication, was vulnerable to password guessing attacks. An attacker able to connect to the agent could use this flaw to conduct a brute-force attack to unlock keys in the ssh-agent. This update fixes the following bugs: * Previously, the sshd_config(5) man page was misleading and could thus confuse the user. This update improves the man page text to clearly describe the AllowGroups feature. * The limit for the function for restricting the number of files listed using the wildcard character (*) that prevents the Denial of Service (DoS) for both server and client was previously set too low. Consequently, the user reaching the limit was prevented from listing a directory with a large number of files over Secure File Transfer Protocol (SFTP). This update increases the aforementioned limit, thus fixing this bug. * When the ForceCommand option with a pseudoterminal was used and the MaxSession option was set to "2", multiplexed SSH connections did not work as expected. After the user attempted to open a second multiplexed connection, the attempt failed if the first connection was still open. This update modifies OpenSSH to issue only one audit message per session, and the user is thus able to open two multiplexed connections in this situation. * The ssh-copy-id utility failed if the account on the remote server did not use an sh-like shell. Remote commands have been modified to run in an sh-like shell, and ssh-copy-id now works also with non-sh-like shells. * Due to a race condition between auditing messages and answers when using ControlMaster multiplexing, one session in the shared connection randomly and unexpectedly exited the connection. This update fixes the race condition in the auditing code, and multiplexing connections now work as expected even with a number of sessions created at once. In addition, this update adds the following enhancements: * As not all Lightweight Directory Access Protocol (LDAP) servers possess a default schema, as expected by the ssh-ldap-helper program, this update provides the user with an ability to adjust the LDAP query to get public keys from servers with a different schema, while the default functionality stays untouched. * With this enhancement update, the administrator is able to set permissions for files uploaded using Secure File Transfer Protocol (SFTP). * This update provides the LDAP schema in LDAP Data Interchange Format (LDIF) format as a complement to the old schema previously accepted by OpenLDAP. * With this update, the user can selectively disable the Generic Security Services API (GSSAPI) key exchange algorithms as any normal key exchange.moderateScientific LinuxScientific Linux 7pam_ssh_agent_auth-0.9.3-9.22.el7.x86_64.rpm4c8a4f008f7e5a9e67335ce9d1cc593403d71e7aeb9be459963711720773c3c9openssh-server-6.6.1p1-22.el7.x86_64.rpm475cc366522d045a664ee1c36cff15d13cfbf2872fff7ff9e39fdab592b8beebopenssh-6.6.1p1-22.el7.x86_64.rpme5cfa6a02ad7112dfb6948db7585dced7529d0165a45acc369c50b214ab263c6openssh-clients-6.6.1p1-22.el7.x86_64.rpmbd5098ee4c13b9efdfd35176bab3d74a48ce28191b10682df00a4682de009ec8pam_ssh_agent_auth-0.9.3-9.22.el7.i686.rpmab4e20bb01adc0f585fb34621d51500027ecf2b3e9edf8476cb77821519e21faopenssh-keycat-6.6.1p1-22.el7.x86_64.rpm98f65efa1502cc278d6c4495f5864594539b522f7d1f431265459a1cc48f8831openssh-ldap-6.6.1p1-22.el7.x86_64.rpm07a96b1945f811d9dc3bdb318814b65ef45faf63e8b71341fc8a3633e9e52fc4openssh-askpass-6.6.1p1-22.el7.x86_64.rpmdb9463f9ff33e43c2060be723747831d805992e984dd62f73b00bb79a9811ddcopenssh-server-sysvinit-6.6.1p1-22.el7.x86_64.rpm202306820452e7108889dad11334af4fb0cd670b931cb64da2f8d9c51288ade7SLSA-2015:2101-1PythonIt was discovered that the Python xmlrpclib module did not restrict the size of gzip-compressed HTTP responses. A malicious XMLRPC server could cause an XMLRPC client using xmlrpclib to consume an excessive amount of memory. (CVE-2013-1753) It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict the sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory. (CVE-2013-1752) It was discovered that the CGIHTTPServer module incorrectly handled URL encoded paths. A remote attacker could use this flaw to execute scripts outside of the cgi-bin directory, or disclose the source code of the scripts in the cgi-bin directory. (CVE-2014-4650) An integer overflow flaw was found in the way the buffer() function handled its offset and size arguments. An attacker able to control these arguments could use this flaw to disclose portions of the application memory or cause it to crash. (CVE-2014-7185) A flaw was found in the way the json module handled negative index arguments passed to certain functions (such as raw_decode()). An attacker able to control the index value passed to one of the affected functions could possibly use this flaw to disclose portions of the application memory. (CVE-2014-4616) The Python standard library HTTP client modules (such as httplib or urllib) did not perform verification of TLS/SSL certificates when connecting to HTTPS servers. A man-in-the-middle attacker could use this flaw to hijack connections and eavesdrop or modify transferred data. (CVE-2014-9365) This update also fixes the following bugs: * Subprocesses used with the Eventlet library or regular threads previously tried to close epoll file descriptors twice, which led to an "Invalid argument" error. Subprocesses have been fixed to close the file descriptors only once. * When importing the readline module from a Python script, Python no longer produces erroneous random characters on stdout. * The cProfile utility has been fixed to print all values that the "-s" option supports when this option is used without a correct value. * The load_cert_chain() function now accepts "None" as a keyfile argument. In addition, this update adds the following enhancements: * Security enhancements as described in PEP 466 have been backported to the Python standard library, for example, new features of the ssl module: Server Name Indication (SNI) support, support for new TLSv1.x protocols, new hash algorithms in the hashlib module, and many more. * Support for the ssl.PROTOCOL_TLSv1_2 protocol has been added to the ssl library. * The ssl.SSLSocket.version() method is now available to access information about the version of the SSL protocol used in a connection.moderateScientific LinuxScientific Linux 7python-debug-2.7.5-34.el7.x86_64.rpmc389287b30ee5b11681f37f7a75ff7046db45cd22d5e045fd4e063b51c9d5243python-tools-2.7.5-34.el7.x86_64.rpm2a20104c41b5de2613732fe191cb690a0d7b03a3d0365575f8ea6927e06ad11dpython-libs-2.7.5-34.el7.i686.rpm18e1887e0c7ac1ae05b503398140708b9d5be025defe2b1dea7d4d20a94952f4tkinter-2.7.5-34.el7.x86_64.rpmbc70c748289750e4e667a7099dd0463549a85debc8135da4f9ec8c680618a76bpython-devel-2.7.5-34.el7.x86_64.rpm01f88f9e9f980a2d5ceb3d93d290183270d4c13660de8c50a34262f9ad826d7bpython-2.7.5-34.el7.x86_64.rpma169372f8b2fe997d0d66ebea0f6ca895c4222cdc96650fbf4771e5315abdc60python-libs-2.7.5-34.el7.x86_64.rpm13b33545e5e2a0d0a4bdad0bd2d8cf61f25e7aee39fd176398547a0c4825a9f6python-test-2.7.5-34.el7.x86_64.rpm6453e0cd36a739a40fd8bc4ebbef6547cfb8b90b0434ca3f8358fa7d69685246SLSA-2015:2108-3CpioA heap-based buffer overflow flaw was found in cpio's list_file() function. An attacker could provide a specially crafted archive that, when processed by cpio, would crash cpio, or potentially lead to arbitrary code execution. (CVE-2014-9112) This update fixes the following bugs: * Previously, during archive creation, cpio internals did not detect a read() system call failure. Based on the premise that the call succeeded, cpio terminated unexpectedly with a segmentation fault without processing further files. The underlying source code has been patched, and an archive is now created successfully. * Previously, running the cpio command without parameters on Scientific Linux 7 with Russian as the default language resulted in an error message that was not accurate in Russian due to an error in spelling. This has been corrected and the Russian error message is spelled correctly.moderateScientific LinuxScientific Linux 7cpio-2.11-24.el7.x86_64.rpm67f7c900912bc98f1e871678b4716be5fa89e22406167529182b53f9290f7a44SLSA-2015:2111-7GrepA heap-based buffer overflow flaw was found in the way grep processed certain pattern and text combinations. An attacker able to trick a user into running grep on specially crafted input could use this flaw to crash grep or, potentially, read from uninitialized memory. (CVE-2015-1345) This update also fixes the following bugs: * Prior to this update, the \w and \W symbols were inconsistently matched to the [:alnum:] character class. Consequently, using regular expressions with "\w" and "\W" could lead to incorrect results. With this update, "\w" is consistently matched to the [_[:alnum:]] character, and "\W" is consistently matched to the [^_[:alnum:]] character. * Previously, the Perl Compatible Regular Expression (PCRE) matcher (selected by the "-P" parameter in grep) did not work correctly when matching non-UTF-8 text in UTF-8 locales. Consequently, an error message about invalid UTF-8 byte sequence characters was returned. To fix this bug, patches from upstream have been applied to the grep utility. As a result, PCRE now skips non-UTF-8 characters as non-matching text without returning any error message.lowScientific LinuxScientific Linux 7grep-2.20-2.el7.x86_64.rpmd86f08f36aff769f0162a6b016b70341173bb711e74c91bb8aa8a15cfc56a660SLSA-2015:2131-3OpenldapA flaw was found in the way OpenLDAP parsed OpenSSL-style cipher strings. As a result, OpenLDAP could potentially use ciphers that were not intended to be enabled. (CVE-2015-3276) The openldap packages have been upgraded to upstream version 2.4.40, which provides a number of bug fixes and one enhancement over the previous version: * The ORDERING matching rules have been added to the ppolicy attribute type descriptions. * The server no longer terminates unexpectedly when processing SRV records. * Missing objectClass information has been added, which enables the user to modify the front-end configuration by standard means. This update also fixes the following bugs: * Previously, OpenLDAP did not properly handle a number of simultaneous updates. As a consequence, sending a number of parallel update requests to the server could cause a deadlock. With this update, a superfluous locking mechanism causing the deadlock has been removed, thus fixing the bug. * The httpd service sometimes terminated unexpectedly with a segmentation fault on the libldap library unload. The underlying source code has been modified to prevent a bad memory access error that caused the bug to occur. As a result, httpd no longer crashes in this situation. * After upgrading the system from Scientific Linux 6 to Scientific Linux 7, symbolic links to certain libraries unexpectedly pointed to locations belonging to the openldap-devel package. If the user uninstalled openldap- devel, the symbolic links were broken and the "rpm -V openldap" command sometimes produced errors. With this update, the symbolic links no longer get broken in the described situation. If the user downgrades openldap to version 2.4.39-6 or earlier, the symbolic links might break. After such downgrade, it is recommended to verify that the symbolic links did not break. To do this, make sure the yum-plugin-verify package is installed and obtain the target libraries by running the "rpm -V openldap" or "yum verify openldap" command. In addition, this update adds the following enhancement: * OpenLDAP clients now automatically choose the Network Security Services (NSS) default cipher suites for communication with the server. It is no longer necessary to maintain the default cipher suites manually in the OpenLDAP source code.moderateScientific LinuxScientific Linux 7openldap-devel-2.4.40-8.el7.x86_64.rpm03936c25ee5e4e08c0be7f6350b556eddd60f507d2b2b59b9fea70fe6b565cf6openldap-servers-2.4.40-8.el7.x86_64.rpm9f5f42f21a79c8e165eacd4ef27ff6d2f83f29920e5091b44f735ef2a631eb85openldap-clients-2.4.40-8.el7.x86_64.rpm3a102109f15384a24b4b81bb8fc6b2c99a71d94d071a6f9753d0950b1c2d1a49openldap-2.4.40-8.el7.x86_64.rpmd7f38e3704f14ac10c621f93b1ffc5bab0dc653956459dc415d8b292ad52b9d1openldap-devel-2.4.40-8.el7.i686.rpmd0e5abc6553c22b682acd6c8b1b53fed41e9f61ba62d8bf6aeba632bc5636806openldap-servers-sql-2.4.40-8.el7.x86_64.rpm96aa8b965faecdf412b1b11ded2f05673f83f64f889ef71fdce40c0c251a8db7openldap-2.4.40-8.el7.i686.rpmccd67ea9a963ce4a7c4bba7fb4b5b7fe7f659e403220f6489a12f3dc655054f2SLSA-2015:2140-7Libssh2A flaw was found in the way the kex_agree_methods() function of libssh2 performed a key exchange when negotiating a new SSH session. A man-in-the- middle attacker could use a crafted SSH_MSG_KEXINIT packet to crash a connecting libssh2 client. (CVE-2015-1782) This update also fixes the following bugs: * Previously, libssh2 did not correctly adjust the size of the receive window while reading from an SSH channel. This caused downloads over the secure copy (SCP) protocol to consume an excessive amount of memory. A series of upstream patches has been applied on the libssh2 source code to improve handling of the receive window size. Now, SCP downloads work as expected. * Prior to this update, libssh2 did not properly initialize an internal variable holding the SSH agent file descriptor, which caused the agent destructor to close the standard input file descriptor by mistake. An upstream patch has been applied on libssh2 sources to properly initialize the internal variable. Now, libssh2 closes only the file descriptors it owns. After installing these updated packages, all running applications using libssh2 must be restarted for this update to take effect.lowScientific LinuxtrueScientific Linux 7libssh2-devel-1.4.3-10.el7.i686.rpm3828e4908a8828f359d35fbcfb565da96256cf53a79e9ab1ad15f6e69b87c4e6libssh2-1.4.3-10.el7.i686.rpm2170239867e792dfa28408c03985c9009694bf623479da56e901d5133e050dfelibssh2-docs-1.4.3-10.el7.noarch.rpm0db73581bd5bc3ae572d2059f6f9e739b097ea49a96e6996e2638f431f13a3e2libssh2-devel-1.4.3-10.el7.x86_64.rpmabaa72c2edd9ce7a36ecf69504cb64ccae9a4a8c0c075bf0d6c68ea6d2eb3e3dlibssh2-1.4.3-10.el7.x86_64.rpm3c49c5a98c2095842f966b20a98e0ea66a2597db5d9d3aa303ff558f12d05c1fSLSA-2015:2151-1XfsprogsIt was discovered that the xfs_metadump tool of the xfsprogs suite did not fully adhere to the standards of obfuscation described in its man page. In case a user with the necessary privileges used xfs_metadump and relied on the advertised obfuscation, the generated data could contain unexpected traces of potentially sensitive information. (CVE-2012-2150) The xfsprogs packages have been upgraded to upstream version 3.2.2, which provides a number of bug fixes and enhancements over the previous version. This release also includes updates present in upstream version 3.2.3, although it omits the mkfs.xfs default disk format change (for metadata checksumming) which is present upstream.lowScientific LinuxScientific Linux 7xfsprogs-devel-3.2.2-2.el7.x86_64.rpmbbf68681544a4f80e20c2103cce665560759fe52288c18e2619f7e8be4be0896xfsprogs-qa-devel-3.2.2-2.el7.i686.rpm390f46c8aa7e8cc6eed1429b395dfc9e985918c350ac6bad6d0714eb2f8c67f5xfsprogs-qa-devel-3.2.2-2.el7.x86_64.rpm10665c939405717845ff6722724ff8db758599c41899fe76d00e0d8faaabf703xfsprogs-3.2.2-2.el7.i686.rpmf735bd2e1b5be0d7e7c47fb07ee49ab9f6b7d06f9867162f03b11cc57eaf3206xfsprogs-devel-3.2.2-2.el7.i686.rpmc9957cbd9b6b84fad27d2399dde12243712f36b10bcd87930eac091234cf36f0xfsprogs-3.2.2-2.el7.x86_64.rpm7bb7445142291303530a4907652769531eb83be4e7fd8483f6732cb81be782b3SLSA-2015:2152-2Kernel* A flaw was found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system. (CVE-2015-2925, Important) * A race condition flaw was found in the way the Linux kernel's IPC subsystem initialized certain fields in an IPC object structure that were later used for permission checking before inserting the object into a globally visible list. A local, unprivileged user could potentially use this flaw to elevate their privileges on the system. (CVE-2015-7613, Important) * It was found that reporting emulation failures to user space could lead to either a local (CVE-2014-7842) or a L2->L1 (CVE-2010-5313) denial of service. In the case of a local denial of service, an attacker must have access to the MMIO area or be able to access an I/O port. (CVE-2010-5313, CVE-2014-7842, Moderate) * A flaw was found in the way the Linux kernel's KVM subsystem handled non-canonical addresses when emulating instructions that change the RIP (for example, branches or calls). A guest user with access to an I/O or MMIO region could use this flaw to crash the guest. (CVE-2014-3647, Moderate) * It was found that the Linux kernel memory resource controller's (memcg) handling of OOM (out of memory) conditions could lead to deadlocks. An attacker could use this flaw to lock up the system. (CVE-2014-8171, Moderate) * A race condition flaw was found between the chown and execve system calls. A local, unprivileged user could potentially use this flaw to escalate their privileges on the system. (CVE-2015-3339, Moderate) * A flaw was discovered in the way the Linux kernel's TTY subsystem handled the tty shutdown phase. A local, unprivileged user could use this flaw to cause a denial of service on the system. (CVE-2015-4170, Moderate) * A NULL pointer dereference flaw was found in the SCTP implementation. A local user could use this flaw to cause a denial of service on the system by triggering a kernel panic when creating multiple sockets in parallel while the system did not have the SCTP module loaded. (CVE-2015-5283, Moderate) * A flaw was found in the way the Linux kernel's perf subsystem retrieved userlevel stack traces on PowerPC systems. A local, unprivileged user could use this flaw to cause a denial of service on the system. (CVE-2015-6526, Moderate) * A flaw was found in the way the Linux kernel's Crypto subsystem handled automatic loading of kernel modules. A local user could use this flaw to load any installed kernel module, and thus increase the attack surface of the running kernel. (CVE-2013-7421, CVE-2014-9644, Low) * An information leak flaw was found in the way the Linux kernel changed certain segment registers and thread-local storage (TLS) during a context switch. A local, unprivileged user could use this flaw to leak the user space TLS base address of an arbitrary process. (CVE-2014-9419, Low) * It was found that the Linux kernel KVM subsystem's sysenter instruction emulation was not sufficient. An unprivileged guest user could use this flaw to escalate their privileges by tricking the hypervisor to emulate a SYSENTER instruction in 16-bit mode, if the guest OS did not initialize the SYSENTER model-specific registers (MSRs). Note: Certified guest operating systems for Scientific Linux with KVM do initialize the SYSENTER MSRs and are thus not vulnerable to this issue when running on a KVM hypervisor. (CVE-2015-0239, Low) * A flaw was found in the way the Linux kernel handled the securelevel functionality after performing a kexec operation. A local attacker could use this flaw to bypass the security mechanism of the securelevel/secureboot combination. (CVE-2015-7837, Low)importantScientific LinuxScientific Linux 7kernel-headers-3.10.0-327.el7.x86_64.rpm7c1602f33e4a484ea911da3fd0b99f02ea39fbfa9cc060a190a6e3f62d2d041akernel-debug-3.10.0-327.el7.x86_64.rpm37aa8147b6053d505192787449ecb6c52ba47db160dad7524a0ff66432890b5ckernel-tools-3.10.0-327.el7.x86_64.rpmfb84de0b6462d7a13893270fc1b83c6e4c00291b557abb1b90c28b9f91245d30python-perf-3.10.0-327.el7.x86_64.rpm64bb23f6a57287e2c1e06f6c0ee04bd060f1bb19c3d1400961187cbf261889f7kernel-devel-3.10.0-327.el7.x86_64.rpmc0e3a4009b4df9376aa040dc4f5e3ba9a80c1d4a85af00155caaaf9b27717b86kernel-tools-libs-devel-3.10.0-327.el7.x86_64.rpm58b889c53f0f54e4fc02bbda44bb15c398359baf6c4c7374c41f5c10dfa46e86perf-3.10.0-327.el7.x86_64.rpm1cbee5053a1b562e8e67c3cbe7e3b690edce14e1ec708196e775f6999a1d97dfkernel-doc-3.10.0-327.el7.noarch.rpmc30bcb909356a0073c383862d9a9593ecbbc0ce9b5196c73301c3f8b3a6fd8f9kernel-tools-libs-3.10.0-327.el7.x86_64.rpm33918bf320bc8ede7208d3f8b211f82d08dc90fd951075356c661dcd261511e0kernel-3.10.0-327.el7.x86_64.rpm37e512a7c50e44241a2902adac68f8edfbf5a6f21e1ad5bf2a7d98465c1872c9kernel-debug-devel-3.10.0-327.el7.x86_64.rpm35f7ef983892929d6efc0ac6a0bb6590ed99956b92c883a4fbc933cfa254ad0dkernel-abi-whitelists-3.10.0-327.el7.noarch.rpm10688a45fd8dee8b26201114b9b140bf47dcf8d206235214d4852c73a3be6493SLSA-2015:2154-7Krb5It was found that the krb5_read_message() function of MIT Kerberos did not correctly sanitize input, and could create invalid krb5_data objects. A remote, unauthenticated attacker could use this flaw to crash a Kerberos child process via a specially crafted request. (CVE-2014-5355) A flaw was found in the OTP kdcpreauth module of MIT kerberos. An unauthenticated remote attacker could use this flaw to bypass the requires_preauth flag on a client principal and obtain a ciphertext encrypted in the principal's long-term key. This ciphertext could be used to conduct an off-line dictionary attack against the user's password. (CVE-2015-2694) The krb5 packages have been upgraded to upstream version 1.13.2, which provides a number of bug fixes and enhancements over the previous version. Notably, this update fixes the following bugs: * Previously, the RADIUS support (libkrad) in krb5 was sending krb5 authentication for Transmission Control Protocol (TCP) transports multiple times, accidentally using a code path intended to be used only for unreliable transport types, for example User Datagram Protocol (UDP) transports. A patch that fixes the problem by disabling manual retries for reliable transports, such as TCP, has been applied, and the correct code path is now used in this situation. * Attempts to use Kerberos single sign-on (SSO) to access SAP NetWeaver systems sometimes failed. The SAP NetWeaver developer trace displayed the following error message: No credentials were supplied, or the credentials were unavailable or inaccessible Unable to establish the security context Querying SSO credential lifetime has been modified to trigger credential acquisition, thus preventing the error from occurring. Now, the user can successfully use Kerberos SSO for accessing SAP NetWeaver systems.moderateScientific LinuxScientific Linux 7krb5-libs-1.13.2-10.el7.x86_64.rpm125f772567e4ae68fcbe0339a3e88b65b5d38ae8c4954ffea9b5e50a52c34ba5krb5-workstation-1.13.2-10.el7.x86_64.rpm995ea8240ca70c48fdf571585769c96e0d22ee7c2c42b15ef00caa23f2f65bf2krb5-devel-1.13.2-10.el7.i686.rpmcbbde5d0081d7c342a00e52427ae97f94f52efa40199b453842fd70ff55c4ab9krb5-server-ldap-1.13.2-10.el7.x86_64.rpm7e6740468a138fe068aaa0ec984a27f5aa933e5cf8be326f727c3674fcc94a64krb5-devel-1.13.2-10.el7.x86_64.rpm3dd6267261100f46ab9f09df091010708724de13a2f64083ea796e98851a7e6bkrb5-pkinit-1.13.2-10.el7.x86_64.rpmde4e1010d3103021179f86c929565b62cc5ecd29245fe7b26386088c7d6b0729krb5-server-1.13.2-10.el7.x86_64.rpm06216b1214bcbb51db7c4e443b60a66d6d2830e14b31c2a7d97816e04a45cc46krb5-libs-1.13.2-10.el7.i686.rpm6b07817790a9f1c61e54dcde59432fcb05477ad1362a596dccbe89c9c17c596cSLSA-2015:2155-7FileMultiple denial of service flaws were found in the way file parsed certain Composite Document Format (CDF) files. A remote attacker could use either of these flaws to crash file, or an application using file, via a specially crafted CDF file. (CVE-2014-0207, CVE-2014-0237, CVE-2014-0238, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487, CVE-2014-3587) Two flaws were found in the way file processed certain Pascal strings. A remote attacker could cause file to crash if it was used to identify the type of the attacker-supplied file. (CVE-2014-3478, CVE-2014-9652) Multiple flaws were found in the file regular expression rules for detecting various files. A remote attacker could use these flaws to cause file to consume an excessive amount of CPU. (CVE-2014-3538) Multiple flaws were found in the way file parsed Executable and Linkable Format (ELF) files. A remote attacker could use these flaws to cause file to crash, disclose portions of its memory, or consume an excessive amount of system resources. (CVE-2014-3710, CVE-2014-8116, CVE-2014-8117, CVE-2014-9653) The file packages have been updated to ensure correct operation on Power little endian and ARM 64-bit hardware architectures.moderateScientific LinuxScientific Linux 7file-libs-5.11-31.el7.x86_64.rpm74b0c9ab691753d75c40b93003eca46aba2e08b3502cb661c3d20ddebacfc94afile-static-5.11-31.el7.i686.rpm4cdd050c0a130579bf0da86aa2f1546e7602533b9fb7cb7f382d0724b0e31633file-devel-5.11-31.el7.i686.rpma92ff267d77a98117814df97fbaea574b81882bf681ae4b1661337de40a16475python-magic-5.11-31.el7.noarch.rpmec800da834010d6171470848b48a5692d7fb96cb299053542b1012eebc03ce8efile-static-5.11-31.el7.x86_64.rpm21ba995857716ea1ae57b7a0ff09391a2685a47b5cf5ef76649247e3a4ff97c2file-5.11-31.el7.x86_64.rpmf13db29db2e758fc855cbab08fdf80249a267d4b1479684d6b78d816a7884d39file-devel-5.11-31.el7.x86_64.rpmfd09a6678ed6df46585a149ccdff017be3e8f22b08c0b7178fe362e83214e0a4file-libs-5.11-31.el7.i686.rpm7967b681530969d00e9c74c1775a7d0e8d29e1da85711139733e4e4d3f92a8faSLSA-2015:2159-6CurlIt was found that the libcurl library did not correctly handle partial literal IP addresses when parsing received HTTP cookies. An attacker able to trick a user into connecting to a malicious server could use this flaw to set the user's cookie to a crafted domain, making other cookie-related issues easier to exploit. (CVE-2014-3613) A flaw was found in the way the libcurl library performed the duplication of connection handles. If an application set the CURLOPT_COPYPOSTFIELDS option for a handle, using the handle's duplicate could cause the application to crash or disclose a portion of its memory. (CVE-2014-3707) It was discovered that the libcurl library failed to properly handle URLs with embedded end-of-line characters. An attacker able to make an application using libcurl access a specially crafted URL via an HTTP proxy could use this flaw to inject additional headers to the request or construct additional requests. (CVE-2014-8150) It was discovered that libcurl implemented aspects of the NTLM and Negotatiate authentication incorrectly. If an application uses libcurl and the affected mechanisms in a specifc way, certain requests to a previously NTLM-authenticated server could appears as sent by the wrong authenticated user. Additionally, the initial set of credentials for HTTP Negotiate- authenticated requests could be reused in subsequent requests, although a different set of credentials was specified. (CVE-2015-3143, CVE-2015-3148) Bug fixes: * An out-of-protocol fallback to SSL 3.0 was available with libcurl. Attackers could abuse the fallback to force downgrade of the SSL version. The fallback has been removed from libcurl. Users requiring this functionality can explicitly enable SSL 3.0 through the libcurl API. * TLS 1.1 and TLS 1.2 are no longer disabled by default in libcurl. You can explicitly disable them through the libcurl API. * FTP operations such as downloading files took a significantly long time to complete. Now, the FTP implementation in libcurl correctly sets blocking direction and estimated timeout for connections, resulting in faster FTP transfers. Enhancements: * With the updated packages, it is possible to explicitly enable or disable new Advanced Encryption Standard (AES) cipher suites to be used for the TLS protocol. * The libcurl library did not implement a non-blocking SSL handshake, which negatively affected performance of applications based on the libcurl multi API. The non-blocking SSL handshake has been implemented in libcurl, and the libcurl multi API now immediately returns the control back to the application whenever it cannot read or write data from or to the underlying network socket. * The libcurl library used an unnecessarily long blocking delay for actions with no active file descriptors, even for short operations. Some actions, such as resolving a host name using /etc/hosts, took a long time to complete. The blocking code in libcurl has been modified so that the initial delay is short and gradually increases until an event occurs.moderateScientific LinuxScientific Linux 7libcurl-7.29.0-25.sl7.i686.rpm8790b95d116d9302496aa9ac0788b8273a2f403e3afd2298023c0eb7cf85494flibcurl-devel-7.29.0-25.sl7.i686.rpme91ce16a1fb77f2e8a33ce58da94c1f9e05679db807068bf4b7898050d958320libcurl-7.29.0-25.sl7.x86_64.rpmc74b72f8bf123961474766e82a35d97c68ed7cccb46fc2a738dca6489bc13e4ccurl-7.29.0-25.sl7.x86_64.rpm6994f1b7a8522df302fae544796f34ae4b174972e076bca8b7078f8a91b82f8blibcurl-devel-7.29.0-25.sl7.x86_64.rpmf053a3fa48cc4010544e84a6a9ec230485f1703bce3a3c23433efc0d4a11c0bcSLSA-2015:2172-1GlibcIt was discovered that the nss_files backend for the Name Service Switch in glibc would return incorrect data to applications or corrupt the heap (depending on adjacent heap contents) in certain cases. A local attacker could potentially use this flaw to escalate their privileges. (CVE-2015-5277)importantScientific LinuxScientific Linux 7glibc-headers-2.17-106.el7_2.1.x86_64.rpm4b2c69e92db0dd1bbbd6ce38645f3680b8b04ca5acb83e263fb76eae8565dc5eglibc-static-2.17-106.el7_2.1.i686.rpm2025e39c5dc2d0e9773740691b87912945cda326aed27097cd8962c1c1daa9ccglibc-devel-2.17-106.el7_2.1.x86_64.rpmcfc7a1d60ab2076d2bc337ad5bf11ddeaae47a841ac83fad3677bd272635efd8nscd-2.17-106.el7_2.1.x86_64.rpmdd287a37fd28de541337d86b8a8080b376204f7198281be67098b462daaee030glibc-static-2.17-106.el7_2.1.x86_64.rpmf8d9f3064ab31aac65d61409e3e36d7568437eb669f48e648b3043a0d24e03f0glibc-2.17-106.el7_2.1.i686.rpmce2bc3c41738757bc04d0a8a5f3960cbaa0bf33a9c595aaa02b1b43c0ca26c0bglibc-common-2.17-106.el7_2.1.x86_64.rpm947d74447e9fad9f3da5a6e7f153cb979da74f485c19154f9abfcf935ab34d88glibc-2.17-106.el7_2.1.x86_64.rpmf88688d42d43f3aa13ba447166077226800f185a24479e1c7e5fa7d24d6de62dglibc-devel-2.17-106.el7_2.1.i686.rpm7c8e8c3e9f98dbdb294bbc6ec5b94a3f19d0e18f4924d547a15ad29b03456172glibc-utils-2.17-106.el7_2.1.x86_64.rpm0319831e97be1802b9ded0fc767b4abd6435f77b4b19071b9d0c199675624315SLSA-2015:2180-7Rubygem-Bundler And Rubygem-ThorA flaw was found in the way Bundler handled gems available from multiple sources. An attacker with access to one of the sources could create a malicious gem with the same name, which they could then use to trick a user into installing, potentially resulting in execution of code from the attacker-supplied malicious gem. (CVE-2013-0334) Bundler has been upgraded to upstream version 1.7.8 and Thor has been upgraded to upstream version 1.19.1, both of which provide a number of bug fixes and enhancements over the previous versions.moderateScientific LinuxScientific Linux 7rubygem-bundler-doc-1.7.8-3.el7.noarch.rpm530b9df9a37e0be6ca1b20a82e1885a913ac281aa0f94ec4cdec5122f65597d1rubygem-thor-0.19.1-1.el7.noarch.rpm91031c894d291e9694d9f93fc1e6ebb6421d473af1abcf85c105fab0827820c0rubygem-thor-doc-0.19.1-1.el7.noarch.rpm8a3a5ece52ab88b2e2bce87ba0228717ad839cc0c9efc968889fd15dcc80d7d8rubygem-bundler-1.7.8-3.el7.noarch.rpm08e2dd135fb3543a9e22452031d8748ebc4174c67e5e2b131e4e817d57df5043SLSA-2015:2184-7RealmdA flaw was found in the way realmd parsed certain input when writing configuration into the sssd.conf or smb.conf file. A remote attacker could use this flaw to inject arbitrary configurations into these files via a newline character in an LDAP response. (CVE-2015-2704) It was found that the realm client would try to automatically join an active directory domain without authentication, which could potentially lead to privilege escalation within a specified domain. The realmd packages have been upgraded to upstream version 0.16.1, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following bugs: * Joining a Scientific Linux machine to a domain using the realm utility creates /home/domainname/[username]/ directories for domain users. Previously, SELinux labeled the domain users' directories incorrectly. As a consequence, the domain users sometimes experienced problems with SELinux policy. This update modifies the realmd service default behavior so that the domain users' directories are compatible with the standard SELinux policy. * Previously, the realm utility was unable to join or discover domains with domain names containing underscore (_). The realmd service has been modified to process underscores in domain names correctly, which fixes the described bug. In addition, this update adds the following enhancement: * The realmd utility now allows the user to disable automatic ID mapping from the command line. To disable the mapping, pass the "--automatic-id- mapping=no" option to the realmd utility.moderateScientific LinuxScientific Linux 7realmd-devel-docs-0.16.1-5.el7.x86_64.rpm5b87f65fe4480124fee526de51c7b9ed746333245ba71a7a3e494051c7475e65realmd-0.16.1-5.el7.x86_64.rpm49eb00fc4e8687fa1efa5a65dbab58665d1d51e871c486016a3366a13235a059SLSA-2015:2199-7GlibcIt was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. (CVE-2013-7423) A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1781) A heap-based buffer overflow flaw and a stack overflow flaw were found in glibc's swscanf() function. An attacker able to make an application call the swscanf() function could use these flaws to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. (CVE-2015-1472, CVE-2015-1473) An integer overflow flaw, leading to a heap-based buffer overflow, was found in glibc's _IO_wstr_overflow() function. An attacker able to make an application call this function could use this flaw to crash that application or, potentially, execute arbitrary code with the permissions of the user running the application. A flaw was found in the way glibc's fnmatch() function processed certain malformed patterns. An attacker able to make an application call this function could use this flaw to crash that application.moderateScientific LinuxScientific Linux 7glibc-utils-2.17-105.el7.x86_64.rpmf094124783c2f0d434fae3c806aa263c58da0a2613f7829f405dfbd30b3fddd5glibc-headers-2.17-105.el7.x86_64.rpmd5b8f9263834d85e4aec5f2064842cc1dbb242c302847d9ca6c840067ae136e9glibc-2.17-105.el7.i686.rpmc9e03c5fcf140af9d23deb9c08a5b18892278d586cf2b99ef3492192b4399d9eglibc-static-2.17-105.el7.x86_64.rpmd2ae93be6941acd3f558b825f2ea887d8779b5e35ed819ef155e6eccee1eead7glibc-static-2.17-105.el7.i686.rpm21894ea0d408d0e4491d696be8f6bf694ce09bdf4d067ddc421b6dc36078a5acglibc-common-2.17-105.el7.x86_64.rpm5ce4ac13cea798f06c2d9739704e30efa37f931c815a37a30996110151ae661eglibc-devel-2.17-105.el7.x86_64.rpm2daac18f1112830f663bb1e5025c9404199e820b37ba969a2b606a0cb7c8088fglibc-2.17-105.el7.x86_64.rpm48b3fc644e5fbe5b595ef410a853081a0b7ff84fde8dfc603d333bd68bbe6fe0glibc-devel-2.17-105.el7.i686.rpmd6180f3836e99498ff573e903e3a40f07c54cbe71ac9b8a20fefee1c15d5ba7dnscd-2.17-105.el7.x86_64.rpmb2d442a25047508c3aca4bcfd40215864af4e61a5ad0b5d71979e26a3a2c0651SLSA-2015:2231-4NtpIt was found that because NTP's access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses. (CVE-2014-9298, CVE-2014-9751) A denial of service flaw was found in the way NTP hosts that were peering with each other authenticated themselves before updating their internal state variables. An attacker could send packets to one peer host, which could cascade to other peers, and stop the synchronization process among the reached peers. (CVE-2015-1799) A flaw was found in the way the ntp-keygen utility generated MD5 symmetric keys on big-endian systems. An attacker could possibly use this flaw to guess generated MD5 keys, which could then be used to spoof an NTP client or server. (CVE-2015-3405) A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash. (CVE-2014-9297, CVE-2014-9750) It was found that ntpd did not check whether a Message Authentication Code (MAC) was present in a received packet when ntpd was configured to use symmetric cryptographic keys. A man-in-the-middle attacker could use this flaw to send crafted packets that would be accepted by a client or a peer without the attacker knowing the symmetric key. (CVE-2015-1798) Bug fixes: * The ntpd service truncated symmetric keys specified in the key file to 20 bytes. As a consequence, it was impossible to configure NTP authentication to work with peers that use longer keys. With this update, the maximum key length has been changed to 32 bytes. * The ntpd service could previously join multicast groups only when starting, which caused problems if ntpd was started during system boot before network was configured. With this update, ntpd attempts to join multicast groups every time network configuration is changed. * Previously, the ntp-keygen utility used the exponent of 3 when generating RSA keys. Consequently, generating RSA keys failed when FIPS mode was enabled. With this update, ntp-keygen has been modified to use the exponent of 65537, and generating keys in FIPS mode now works as expected. * The ntpd service dropped incoming NTP packets if their source port was lower than 123 (the NTP port). With this update, ntpd no longer checks the source port number, and clients behind NAT are now able to correctly synchronize with the server. Enhancements: * This update adds support for configurable Differentiated Services Code Points (DSCP) in NTP packets, simplifying configuration in large networks where different NTP implementations or versions are using different DSCP values. * This update adds the ability to configure separate clock stepping thresholds for each direction (backward and forward). Use the "stepback" and "stepfwd" options to configure each threshold. * Support for nanosecond resolution has been added to the Structural Health Monitoring (SHM) reference clock. Prior to this update, when a Precision Time Protocol (PTP) hardware clock was used as a time source to synchronize the system clock, the accuracy of the synchronization was limited due to the microsecond resolution of the SHM protocol. The nanosecond extension in the SHM protocol now allows sub-microsecond synchronization of the system clock.moderateScientific LinuxScientific Linux 7ntpdate-4.2.6p5-22.el7.x86_64.rpmbe064bb26c098d167121dbcd60712d4d07f4648614a8e4ec3d483888a0a492cfsntp-4.2.6p5-22.el7.x86_64.rpm0c2fc1d9401c66bffd8609321bf3b088e930853f01d0df7e22798cab43356f0entp-doc-4.2.6p5-22.el7.noarch.rpme16e72a0d608e0ca732077df70399903a6e4de96f0b7145ab59b6364153b7844ntp-4.2.6p5-22.el7.x86_64.rpm4dca61dc1a5518f3eba768167b682c1f16376fae96de327a7eedc3489f8f97b8ntp-perl-4.2.6p5-22.el7.noarch.rpmbc74d09a4c286019846c0205f3863d6b58b0a17888d69fb609a05fef5ba2ea5cSLSA-2015:2233-3TigervncAn integer overflow flaw, leading to a heap-based buffer overflow, was found in the way TigerVNC handled screen sizes. A malicious VNC server could use this flaw to cause a client to crash or, potentially, execute arbitrary code on the client. (CVE-2014-8240) A NULL pointer dereference flaw was found in TigerVNC's XRegion. A malicious VNC server could use this flaw to cause a client to crash. (CVE-2014-8241) The tigervnc packages have been upgraded to upstream version 1.3.1, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following bug: * The position of the mouse cursor in the VNC session was not correctly communicated to the VNC viewer, resulting in cursor misplacement. The method of displaying the remote cursor has been changed, and cursor movements on the VNC server are now accurately reflected on the VNC client.moderateScientific LinuxScientific Linux 7tigervnc-license-1.3.1-3.el7.noarch.rpma03011e7a2193dc7c32e9042b80a45d11b17bed2b26ef361f043cdbd99c5355atigervnc-server-module-1.3.1-3.el7.x86_64.rpm500408c6e9e3e76ddc4ef76d71b56362639f01e44d5b3d70b1a15e98fb9a0fabtigervnc-server-applet-1.3.1-3.el7.noarch.rpm564c9d3f1e9470a9f68cd6c73c981bafe3cb01b6570c627ab5ee0f0e15a866cctigervnc-1.3.1-3.el7.x86_64.rpm5e967b4abfacc85d3213ba35e3e5f60c07763b72468c055ee64ef1e2cb98a539tigervnc-server-1.3.1-3.el7.x86_64.rpm3f71f17f0ed085d0ff48b1d42db22618f82d86ff190a58a8aaca700d00909eactigervnc-icons-1.3.1-3.el7.noarch.rpm0132aa57d33cbcb4c8a4e37d12d7a85240f17e71f58a7491126d9aaf7f4ec25etigervnc-server-minimal-1.3.1-3.el7.x86_64.rpmceb3472d7b03dbdb5bfa1cb012c0ce168c1753d7c01466820d1a16ea2ac353aaSLSA-2015:2237-3RestIt was found that the OAuth implementation in librest, a helper library for RESTful services, incorrectly truncated the pointer returned by the rest_proxy_call_get_url call. An attacker could use this flaw to crash an application using the librest library. (CVE-2015-2675) After installing the update, all applications using librest must be restarted for the update to take effect.lowScientific LinuxtrueScientific Linux 7rest-devel-0.7.92-3.el7.i686.rpm1980f4f52c91c14b586bd94cd75d4a751b61ca54f9923e14de27fc31738161e2rest-devel-0.7.92-3.el7.x86_64.rpmb584f9d3a0e5da1e082d8318478cef486da8e6730fb83e715b0f8aa481b57cb5rest-0.7.92-3.el7.x86_64.rpm7a74d17e5c6788f4fb223c9f4191ead1c1ae3664cce6dc2f2842c1ee9fefe6b1rest-0.7.92-3.el7.i686.rpm40088ebbd964871bfdfd707fe5904b5197a37cbcaee68f1758876952224728a5SLSA-2015:2241-3ChronyAn out-of-bounds write flaw was found in the way chrony stored certain addresses when configuring NTP or cmdmon access. An attacker that has the command key and is allowed to access cmdmon (only localhost is allowed by default) could use this flaw to crash chronyd or, possibly, execute arbitrary code with the privileges of the chronyd process. (CVE-2015-1821) An uninitialized pointer use flaw was found when allocating memory to save unacknowledged replies to authenticated command requests. An attacker that has the command key and is allowed to access cmdmon (only localhost is allowed by default) could use this flaw to crash chronyd or, possibly, execute arbitrary code with the privileges of the chronyd process. (CVE-2015-1822) A denial of service flaw was found in the way chrony hosts that were peering with each other authenticated themselves before updating their internal state variables. An attacker could send packets to one peer host, which could cascade to other peers, and stop the synchronization process among the reached peers. (CVE-2015-1853) The chrony packages have been upgraded to upstream version 2.1.1, which provides a number of bug fixes and enhancements over the previous version. Notable enhancements include: * Updated to NTP version 4 (RFC 5905) * Added pool directive to specify pool of NTP servers * Added leapsecmode directive to select how to correct clock for leap second * Added smoothtime directive to smooth served time and enable leap smear * Added asynchronous name resolving with POSIX threads * Ready for year 2036 (next NTP era) * Improved clock control * Networking code reworked to open separate client sockets for each NTP server This update also fixes the following bug: * The chronyd service previously assumed that network interfaces specified with the "bindaddress" directive were ready when the service was started. This could cause chronyd to fail to bind an NTP server socket to the interface if the interface was not ready. With this update, chronyd uses the IP_FREEBIND socket option, enabling it to bind to an interface later, not only when the service starts. In addition, this update adds the following enhancement: * The chronyd service now supports four modes of handling leap seconds, configured using the "leapsecmode" option. The clock can be either stepped by the kernel (the default "system" mode), stepped by chronyd ("step" mode), slowly adjusted by slewing ("slew" mode), or the leap second can be ignored and corrected later in normal operation ("ignore" mode). If you select slewing, the correction will always start at 00:00:00 UTC and will be applied at a rate specified in the "maxslewrate" option.moderateScientific LinuxScientific Linux 7chrony-2.1.1-1.el7.x86_64.rpmb6cb1d2c903b6b4d14188a1917b107e6ff48d0e5f4cbe9c6d6e8b2080124097cSLSA-2015:2248-3NetcfA denial of service flaw was found in netcf. A specially crafted interface name could cause an application using netcf (such as the libvirt daemon) to crash. (CVE-2014-8119) The netcf packages have been upgraded to upstream version 0.2.8, which provides a number of bug fixes and enhancements over the previous version.moderateScientific LinuxScientific Linux 7netcf-libs-0.2.8-1.el7.i686.rpmb719d4bbc324e27baf0771afa3037d31062dacb9c3c62849043ddbd2aa360099netcf-devel-0.2.8-1.el7.i686.rpm4f3bb4156391cbe5fa2a94e8c2e48ef7996a32b146f569d5d27ae61faf0daaadnetcf-libs-0.2.8-1.el7.x86_64.rpm651ac6353b3d8efbd84d6993a4e9954e67488ffe3d2fc1acec0c4fa7be41d0dcnetcf-0.2.8-1.el7.x86_64.rpm0725dc1a6fd0fa5fae505ac197d0d4804eceecc773d42ddc1aa67fa791487e6fnetcf-devel-0.2.8-1.el7.x86_64.rpmbe5a762af0e543cc7d2c1a44ed80b7083dd1e592cec338d1ada1e62f15eb01f9SLSA-2015:2290-1PcsA flaw was found in a way Rack processed parameters of incoming requests. An attacker could use this flaw to send a crafted request that would cause an application using Rack to crash. (CVE-2015-3225) The pcs package has been upgraded to upstream version 0.9.143, which provides a number of bug fixes and enhancements over the previous version. * The pcs resource move and pcs resource ban commands now display a warning message to clarify the commands' behavior * New command to move a Pacemaker resource to its preferred node This update also fixes the following bugs: * Before this update, a bug caused location, ordering, and colocation constraints related to a resource group to be removed when removing any resource from that group. This bug has been fixed, and the constraints are now preserved until the group has no resources left, and is removed. * Previously, when a user disabled a resource clone or multi-state resource, and then later enabled a primitive resource within it, the clone or multi-state resource remained disabled. With this update, enabling a resource within a disabled clone or multi-state resource enables it. * When the web UI displayed a list of resource attributes, a bug caused the list to be truncated at the first "=" character. This update fixes the bug and now the web UI displays lists of resource attributes correctly. * The documentation for the "pcs stonith confirm" command was not clear. This could lead to incorrect usage of the command, which could in turn cause data corruption. With this update, the documentation has been improved and the "pcs stonith confirm" command is now more clearly explained. * Previously, if there were any unauthenticated nodes, creating a new cluster, adding a node to an existing cluster, or adding a cluster to the web UI failed with the message "Node is not authenticated". With this update, when the web UI detects a problem with authentication, the web UI displays a dialog to authenticate nodes as necessary. * Previously, the web UI displayed only primitive resources. Thus there was no way to set attributes, constraints and other properties separately for a parent resource and a child resource. This has now been fixed, and resources are displayed in a tree structure, meaning all resource elements can be viewed and edited independently. In addition, this update adds the following enhancements: * A dashboard has been added which shows the status of clusters in the web UI. Previously, it was not possible to view all important information about clusters in one place. Now, a dashboard showing the status of clusters has been added to the main page of the web UI. * With this update, the pcsd daemon automatically synchronizes pcsd configuration across a cluster. This enables the web UI to be run from any node, allowing management even if any particular node is down. * The web UI can now be used to set permissions for users and groups on a cluster. This allows users and groups to have their access restricted to certain operations on certain clusters.moderateScientific LinuxScientific Linux 7pcs-0.9.143-15.el7.x86_64.rpmc87a7496c5cfcab709e549a6f3ed7cfe5eacd29ec4550b2effb8800dd85662bfSLSA-2015:2315-1NetworkmanagerIt was discovered that NetworkManager would set device MTUs based on MTU values received in IPv6 RAs (Router Advertisements), without sanity checking the MTU value first. A remote attacker could exploit this flaw to create a denial of service attack, by sending a specially crafted IPv6 RA packet to disturb IPv6 communication. (CVE-2015-0272) A flaw was found in the way NetworkManager handled router advertisements. An unprivileged user on a local network could use IPv6 Neighbor Discovery ICMP to broadcast a non-route with a low hop limit, causing machines to lower the hop limit on existing IPv6 routes. If this limit is small enough, IPv6 packets would be dropped before reaching the final destination. (CVE-2015-2924) The network-manager-applet and NetworkManager-libreswan packages have been upgraded to upstream versions 1.0.6, and provide a number of bug fixes and enhancements over the previous versions. Bugs: * It was not previously possible to set the Wi-Fi band to the "a" or "bg" values to lock to a specific frequency band. NetworkManager has been fixed, and it now sets the wpa_supplicant's "freq_list" option correctly, which enables proper Wi-Fi band locking. * NetworkManager immediately failed activation of devices that did not have a carrier early in the boot process. The legacy network.service then reported activation failure. Now, NetworkManager has a grace period during which it waits for the carrier to appear. Devices that have a carrier down for a short time on system startup no longer cause the legacy network.service to fail. * NetworkManager brought down a team device if the teamd service managing it exited unexpectedly, and the team device was deactivated. Now, NetworkManager respawns the teamd instances that disappear and is able to recover from a teamd failure avoiding disruption of the team device operation. * NetworkManager did not send the FQDN DHCP option even if host name was set to FQDN. Consequently, Dynamic DNS (DDNS) setups failed to update the DNS records for clients running NetworkManager. Now, NetworkManager sends the FQDN option with DHCP requests, and the DHCP server is able to create DNS records for such clients. * The command-line client was not validating the vlan.flags property correctly, and a spurious warning message was displayed when the nmcli tool worked with VLAN connections. The validation routine has been fixed, and the warning message no longer appears. * NetworkManager did not propagate a media access control (MAC) address change from a bonding interface to a VLAN interface on top of it. Consequently, a VLAN interface on top of a bond used an incorrect MAC address. Now, NetworkManager synchronizes the addresses correctly. Enhancements: * IPv6 Privacy extensions are now enabled by default. NetworkManager checks the per-network configuration files, NetworkManager.conf, and then falls back to "/proc/sys/net/ipv6/conf/default/use_tempaddr" to determine and set IPv6 privacy settings at device activation. * The NetworkManager command-line tool, nmcli, now allows setting the wake-on-lan property to 0 ("none", "disable", "disabled"). * NetworkManager now provides information about metered connections. * NetworkManager daemon and the connection editor now support setting the Maximum Transmission Unit (MTU) of a bond. It is now possible to change MTU of a bond interface in a GUI. * NetworkManager daemon and the connection editor now support setting the MTU of a team, allowing to change MTU of a teaming interface.moderateScientific LinuxScientific Linux 7NetworkManager-glib-1.0.6-27.el7.x86_64.rpmf2aad8fd649c54993c0faf9bd9311a85cb06c0386ee7533243d1d695271b826bNetworkManager-glib-devel-1.0.6-27.el7.i686.rpmb9f26de5b77b46743a9b2cbc2588a61d7dc143066d2065d8688482b6ec30d02dNetworkManager-team-1.0.6-27.el7.x86_64.rpm3293a3e9cc705dc28650ed5147be9716d3e310d0a179b4b6b09b220ebc26e112ModemManager-glib-1.1.0-8.git20130913.el7.i686.rpm9f6100244e26117ec838cb10a44f3596b588397e193b6efe9f88b5e00b824460NetworkManager-libnm-1.0.6-27.el7.i686.rpm46f5111e63831fe17c64a34253a31cc5f54a9faedb13732bb6e4ea5b92be30aaNetworkManager-libreswan-1.0.6-3.el7.x86_64.rpme6a247471b2e006d6583dce84c3b8011afee285d43d848d745391a8a11504eeblibnm-gtk-1.0.6-2.el7.x86_64.rpmfa7664cddff4db7fc0ca2ad6deca41413e8781ac1da48d5f1ec82b818036d79cnetwork-manager-applet-1.0.6-2.el7.x86_64.rpmd4c3c7585a3500da3d256ff4a396f2ade618a29ec5fb8d0367d9a199681ea85dNetworkManager-devel-1.0.6-27.el7.x86_64.rpm4c63c40b7c07253e5353652cee2ebf26e345d1c885abfb3253d9a283acb61ac8NetworkManager-devel-1.0.6-27.el7.i686.rpm285804e687cc42003be7429a3d8714e5ba0864e61acbd3b8d4b244de36c290b8NetworkManager-config-routing-rules-1.0.6-27.el7.x86_64.rpm824dbc750c2a38df4fd7bafb6262ea22833b029b55da3545fe8d68f262acff2cNetworkManager-bluetooth-1.0.6-27.el7.x86_64.rpm02d1403327ac7b68ede4a4b511527da9bb392480c3e72e269d452ec175f85484libnm-gtk-1.0.6-2.el7.i686.rpm76c2f32e994f7a2acac307089484a0f80b74283de07faf94c9f0631e160c3147NetworkManager-tui-1.0.6-27.el7.x86_64.rpme89576f0a68f556ddfc2ffd1b1b817cc165e781410a16d0696f287681650b98elibnm-gtk-devel-1.0.6-2.el7.x86_64.rpm89f78bc838836f0461c666bc8151d70d6b7b29ec3f6b0e2c37430c83345820e5NetworkManager-1.0.6-27.el7.i686.rpm744b57a22b3d68dff9c4e022fe8682f39246e02ef73131b9611df41e1df895a6ModemManager-1.1.0-8.git20130913.el7.x86_64.rpm991942f7f3822c9bb57ab816ba4334416d7081eaa36c6e5c827bb39b241d3878libnm-gtk-devel-1.0.6-2.el7.i686.rpm6a1d1bc98439135a68944254795a730700af8900e285293825c100bbe6283551nm-connection-editor-1.0.6-2.el7.x86_64.rpm9b9cab756a3e892a7b787b10f96fc3e5007a4eec17bbf197124dbfeb4f347d64NetworkManager-libnm-devel-1.0.6-27.el7.i686.rpm38b0e1422400e78c5c7a2b4a13f9d1dcb128694e0add07b8782cb3c82c6d76b3NetworkManager-wifi-1.0.6-27.el7.x86_64.rpmd0640c35ad74ad3c30744d72f2de85ed6df8a25cc0b0e70e770c35f535bc6229ModemManager-vala-1.1.0-8.git20130913.el7.x86_64.rpm99fb85c43ca9749bdc7e54963f79801cab96b65a9cffd4a441dadc7b6f14052bNetworkManager-glib-devel-1.0.6-27.el7.x86_64.rpm3c380bfca8dc12fb3231c283b96dff1125b4e96eacd7205f3dcdeee20e3969f8ModemManager-devel-1.1.0-8.git20130913.el7.i686.rpmaa46a523b3ca4b21d5ee3674b8c4f48a2321c749dfe7ee59fba729d63c36078bNetworkManager-libreswan-gnome-1.0.6-3.el7.x86_64.rpmb7f5dab62477ddb04809c7d48336778666f31919e60e119c16d12186b5a76523NetworkManager-adsl-1.0.6-27.el7.x86_64.rpm2c538897968e4285c1876d2d77140f30670a777177191fe4acb1e9d74db815f8ModemManager-glib-devel-1.1.0-8.git20130913.el7.i686.rpmb2e535254ac5b91b44fc2fb121553e484bb652867ba39d0372722fd4ec4b4352ModemManager-devel-1.1.0-8.git20130913.el7.x86_64.rpme0c9fb8f6b62ed934463248081c2ed2e4b5a76b87c9800178b00fa5e4280558aNetworkManager-config-server-1.0.6-27.el7.x86_64.rpm58ae6586816c89fb470f3a57d2af2358fda9e8b5913901e3723b4fb365a1a944NetworkManager-glib-1.0.6-27.el7.i686.rpmead807c612488656809a769fb1309378c737ee76048fa001a4a7a0cf5040a6ddModemManager-1.1.0-8.git20130913.el7.i686.rpmb4a0cd3ca9ead50fb8b8f46669a9953e582f85e5f1b871194a8ba79bc313a57cNetworkManager-libnm-devel-1.0.6-27.el7.x86_64.rpm9c10b159af40401b3812787ebe640a8af6eeeba1877abab32ff592b73e4fb095NetworkManager-wwan-1.0.6-27.el7.x86_64.rpma9b15e5081daa1e07672cf931d2245bfe7e06223af8dffba9e57e720e28506d1NetworkManager-1.0.6-27.el7.x86_64.rpmda025da5f9ebfdd5aef5e89bd88d348654dae12c2101d871ec1d41e3cc106537ModemManager-glib-1.1.0-8.git20130913.el7.x86_64.rpm9f026da6e9e2af62acaab76ee1e3b1d65bfcfad1d22e9914bd066ff39c7e6032NetworkManager-libnm-1.0.6-27.el7.x86_64.rpmc3fe743cdb31fb3c3ef30da72f3589790d026683669f3f5bfa068c1b7174411dModemManager-glib-devel-1.1.0-8.git20130913.el7.x86_64.rpm077ba44ba7924fff59eb21711d75f950354801aa4d73951fcf5830273cde7793SLSA-2015:2345-1Net-SnmpA denial of service flaw was found in the way snmptrapd handled certain SNMP traps when started with the "-OQ" option. If an attacker sent an SNMP trap containing a variable with a NULL type where an integer variable type was expected, it would cause snmptrapd to crash. (CVE-2014-3565) This update also fixes the following bugs: * Previously, the clientaddr option in the snmp.conf file affected outgoing messages sent only over IPv4. With this release, outgoing IPv6 messages are correctly sent from the interface specified by clientaddr. * The Net-SNMP daemon, snmpd, did not properly clean memory when reloading its configuration file with multiple "exec" entries. Consequently, the daemon terminated unexpectedly. Now, the memory is properly cleaned, and snmpd no longer crashes on reload. * Prior to this update, snmpd did not parse complete IPv4 traffic statistics, but reported the number of received or sent bytes in the IP- MIB::ipSystemStatsTable only for IPv6 packets and not for IPv4. This affected objects ipSystemStatsInOctets, ipSystemStatsOutOctets, ipSystemStatsInMcastOctets, and ipSystemStatsOutMcastOctets. Now, the statistics reported by snmpd are collected for IPv4 as well. * The Net-SNMP daemon, snmpd, did not correctly detect the file system change from read-only to read-write. Consequently, after remounting the file system into the read-write mode, the daemon reported it to be still in the read-only mode. A patch has been applied, and snmpd now detects the mode changes as expected.moderateScientific LinuxScientific Linux 7net-snmp-utils-5.7.2-24.el7.x86_64.rpm6853086a74194ffdf2febef0995f76079b41361e6869b0349977e06d88609a49net-snmp-python-5.7.2-24.el7.x86_64.rpm8d965a06f71d6ce2baeeb19eac5c9cfdacf5d8fade90503c4038242d14946391net-snmp-5.7.2-24.el7.x86_64.rpm96f765fbc24aa8a65bfcf5c2ec1a2619e057f4d01e37d45d88c0faf8bfc00397net-snmp-devel-5.7.2-24.el7.i686.rpm194c46609bb9a9eb61eddf5f706fb0e0abbb1349ed07da1bb328aec0296d6c5dnet-snmp-perl-5.7.2-24.el7.x86_64.rpm71ad41cbdc6226d9c7c5bd425dd1bcbd251ba5ab038185364efc1898b4202033net-snmp-libs-5.7.2-24.el7.x86_64.rpm5cc476f09f8e29d8099ea01392865307a0946118f003ede189d09d85cff09d6cnet-snmp-gui-5.7.2-24.el7.x86_64.rpm38cfea83f021b058bddda8a9321e5007fab00a03ab0c2fab365da606de1fe192net-snmp-libs-5.7.2-24.el7.i686.rpm72dd108d7e31030a83d2508c6675f440f56ad761e050aec2eead2302dd1721f0net-snmp-devel-5.7.2-24.el7.x86_64.rpmf484d6e0afc172a12d016886db1400225effe7e4baba77432c001b1b8f770b66net-snmp-agent-libs-5.7.2-24.el7.i686.rpm929681dae599b78da0bea4e4d0061e2b3af4c14f7fa5e287f917ed7b36d127cfnet-snmp-sysvinit-5.7.2-24.el7.x86_64.rpmf4da699530ab007b91140a0d6692bad6640344b1b535e00ca91cdf8a09caaf0fnet-snmp-agent-libs-5.7.2-24.el7.x86_64.rpm611f92c1eaa346c2ec3ba936ba3b0a46f6d740a39bcbbfb578d48481efdcb484SLSA-2015:2355-1SssdIt was found that SSSD's Privilege Attribute Certificate (PAC) responder plug-in would leak a small amount of memory on each authentication request. A remote attacker could potentially use this flaw to exhaust all available memory on the system by making repeated requests to a Kerberized daemon application configured to authenticate using the PAC responder plug-in. (CVE-2015-5292) The sssd packages have been upgraded to upstream version 1.13.0, which provides a number of bug fixes and enhancements over the previous version. * SSSD smart card support * Cache authentication in SSSD * SSSD supports overriding automatically discovered AD site * SSSD can now deny SSH access to locked accounts * SSSD enables UID and GID mapping on individual clients * Background refresh of cached entries * Multi-step prompting for one-time and long-term passwords * Caching for initgroups operations Bugs fixed: * When the SELinux user content on an IdM server was set to an empty string, the SSSD SELinux evaluation utility returned an error. * If the ldap_child process failed to initialize credentials and exited with an error multiple times, operations that create files in some cases started failing due to an insufficient amount of i-nodes. * The SRV queries used a hard coded TTL timeout, and environments that wanted the SRV queries to be valid for a certain time only were blocked. Now, SSSD parses the TTL value out of the DNS packet. * Previously, initgroups operation took an excessive amount of time. Now, logins and ID processing are faster for setups with AD back end and disabled ID mapping. * When an IdM client with Scientific Linux 7.1 or later was connecting to a server with Scientific Linux 7.0 or earlier, authentication with an AD trusted domain caused the sssd_be process to terminate unexpectedly. * If replication conflict entries appeared during HBAC processing, the user was denied access. Now, the replication conflict entries are skipped and users are permitted access. * The array of SIDs no longer contains an uninitialized value and SSSD no longer crashes. * SSSD supports GPOs from different domain controllers and no longer crashes when processing GPOs from different domain controllers. * SSSD could not refresh sudo rules that contained groups with special characters, such as parentheses, in their name. * The IPA names are not qualified on the client side if the server already qualified them, and IdM group members resolve even if default_domain_suffix is used on the server side. * The internal cache cleanup task has been disabled by default to improve performance of the sssd_be process. * Now, default_domain_suffix is not considered anymore for autofs maps. * The user can set subdomain_inherit=ignore_group-members to disable fetching group members for trusted domains. * The group resolution failed with an error message: "Error: 14 (Bad address)". The binary GUID handling has been fixed. Enhancements added: * The description of default_domain_suffix has been improved in the manual pages. * With the new "%0" template option, users on SSSD IdM clients can now use home directories set on AD.lowScientific LinuxScientific Linux 7sssd-ad-1.13.0-40.el7.x86_64.rpmb26256cdcef67221d0c4407625a537e09fedbcd86ff05b2c47829ebcc926e1cdlibsss_idmap-devel-1.13.0-40.el7.i686.rpm930682bed894cdb004df261bd252b4f85617c89fade4fffbcf3c8e2c9bda6968sssd-ipa-1.13.0-40.el7.x86_64.rpm61601d472a9a772faf800152b84ce2c98c7af75b0ee9587a2651591cc0f2a095libsss_simpleifp-1.13.0-40.el7.x86_64.rpmd5dca43d5eefcf7b405eeee521637eeacd2dd13152481295c30a7687e2ccccd5sssd-libwbclient-1.13.0-40.el7.x86_64.rpm1667a7a7e834904d909923898ef3fb0395ffe7824dc159b164a8eb20755f2c26libsss_nss_idmap-devel-1.13.0-40.el7.i686.rpm743a34fbfb6227991a97e72f409805fe92d593b172ed98d75f2b6f6e7761c1acpython-libsss_nss_idmap-1.13.0-40.el7.x86_64.rpma8dc4ee8e11103e5067e5e68f0edcb8ac07be0a4f143146d3bd51bf5b34d4752sssd-krb5-common-1.13.0-40.el7.x86_64.rpm3ebdf1bcf08df4de75f7d950f61f321fc5d676331519c0470f1a6d999646dd83sssd-common-1.13.0-40.el7.i686.rpmcb2d6f928bc73287cfd98f9946f934e582313246a84161887803446ac2e144aclibipa_hbac-1.13.0-40.el7.i686.rpm2a3e2fa6722ebf604d061fb1314b6baca3e1e982fc2c5bf06667edcd1e205703sssd-client-1.13.0-40.el7.i686.rpm9c3fc7e65b56757ff4aece13bfb322ccb267edd8a4c80e0d8096001cdce86ea5sssd-tools-1.13.0-40.el7.x86_64.rpmdff95399893437c44c3fd5967c1fdf76223b88f017e42a6ed37cd3ea70eaac43libsss_idmap-1.13.0-40.el7.i686.rpm32bd354d68b921385b8c80c93502e46e6ab341cf206280b96eb418e033745b2bpython-sssdconfig-1.13.0-40.el7.noarch.rpm588f5ae008c05dd1787ef77889ef5dc9e12f3adbcfc7668cc060bf5e708c6c2bsssd-libwbclient-devel-1.13.0-40.el7.x86_64.rpm09708bc3d9cf2b9fc5f8653386adaaa2dda66aeb640c938ef566b23f8e9ac9a8libipa_hbac-devel-1.13.0-40.el7.x86_64.rpm98a6b711fc32c05dddb68abca4b1c289d68bc3ac4a313fd5f6c4ff39a0c06f2elibsss_simpleifp-devel-1.13.0-40.el7.x86_64.rpm1e0b3befd8a8faa9ffd2be667876700fad10e1ef9a3c4419fe7982d829fdc0bfsssd-libwbclient-1.13.0-40.el7.i686.rpm701522723f811a233088a2b6dd9b362248f9773ec8d7d1451ecab60554ea25cdlibsss_simpleifp-1.13.0-40.el7.i686.rpmce419827c0dea5ca51e74007904c2bd618e84e37da5657640594d19ce636c76bpython-libipa_hbac-1.13.0-40.el7.x86_64.rpm723e43016afdf9b6a9bdb7d67a580fe9bb75bf9411b90a6b116ab60932006d1fpython-sss-1.13.0-40.el7.x86_64.rpmeb78516739b08a607b890bdf9de9dfb08ebf69c1f23c7f28c0127a9aba5932a0sssd-krb5-1.13.0-40.el7.x86_64.rpmfd9ab5fd7fc2f3c984c54a6fc1121dd6f1f075a7c85da24c5066f5f662011be9libsss_nss_idmap-1.13.0-40.el7.i686.rpmcf51872ed00ca6dbb999f5961d879e6670cc6880f20eff662e35c3fc7b9259felibipa_hbac-1.13.0-40.el7.x86_64.rpm685ae140c9a228e40c8d7f11a57fec4cf27e61f920ad400715eb33ad8e058b11libipa_hbac-devel-1.13.0-40.el7.i686.rpm5b188d85f23babfdc09d2bfa1bf61a51f7cd0271c650a6588ce2ecc09c631d47libsss_idmap-devel-1.13.0-40.el7.x86_64.rpmade100c9e0189bdca623f41a6d99b6312c674b07310a104064d13839553abd34libsss_nss_idmap-1.13.0-40.el7.x86_64.rpm3a8f351de390d5fb40c03e3fcdd9f950656c58d272eb434208a1e9680fee7dd5python-sss-murmur-1.13.0-40.el7.x86_64.rpmd22d625b8b23b887bfbaf9147519e7979df1e9190637b552a3c932701ef9c262libsss_idmap-1.13.0-40.el7.x86_64.rpm5b4025b27130ca1bb8e6bd8f0fe8fb8c9eaaa9c4521c4b3c16835e07bd48a2bfsssd-common-pac-1.13.0-40.el7.x86_64.rpm1872ac08d075fb79c4f35d568d800f7b7ce3fb8d8412557849f6bf2af421e6fesssd-dbus-1.13.0-40.el7.x86_64.rpmf1b738514839b2074753817e2f91c10728ad9aa107a1255473cbe3c277f26bb5libsss_simpleifp-devel-1.13.0-40.el7.i686.rpma7ccc1a783f35876e347e69cab7783e14f3692bded05e4e2a7834a1cab2ec8f7sssd-client-1.13.0-40.el7.x86_64.rpm24d544018c9eabc13b630d2aa96966a42d8e159e536f8e5dcebd94df0b540b4asssd-common-1.13.0-40.el7.x86_64.rpma92cc3bce2bd9a39f5bd665801e316a689373fbad3d79ccebe39e45df6194514sssd-proxy-1.13.0-40.el7.x86_64.rpm237e546801b66dac6dcbd196d53c20c274535e00b2fa601d57a3bd23273bf88csssd-krb5-common-1.13.0-40.el7.i686.rpmcd99d014e89bb24a539f6d7933f18e2fc6f1f048bd53207b62baf6e7750b2110sssd-ldap-1.13.0-40.el7.x86_64.rpm7ed9aa54b01f6e573ae0896b7c4dc8f07f0e82c0aeed572f14627af708aca956sssd-libwbclient-devel-1.13.0-40.el7.i686.rpmfa7226f3275cb3842f7bd31866e0635f545ce323ddcd0f8dec7a1430fd87b23dsssd-1.13.0-40.el7.x86_64.rpm17f08d638968711a2ca498b4e486e9a1a3e3407d1a27478d96ecefaf01c65026libsss_nss_idmap-devel-1.13.0-40.el7.x86_64.rpm3ebd681195c830166a50b97b04d005d7aed4e5267388ec2a9d8f05d8838d0aceSLSA-2015:2360-1Cups-FiltersA heap-based buffer overflow flaw and an integer overflow flaw leading to a heap-based buffer overflow were discovered in the way the texttopdf utility of cups-filter processed print jobs with a specially crafted line size. An attacker able to submit print jobs could use these flaws to crash texttopdf or, possibly, execute arbitrary code with the privileges of the "lp" user. (CVE-2015-3258, CVE-2015-3279) Notably, this update also fixes the following bug: * Previously, when polling CUPS printers from a CUPS server, when a printer name contained an underscore (_), the client displayed the name containing a hyphen (-) instead. This made the print queue unavailable. With this update, CUPS allows the underscore character in printer names, and printers appear as shown on the CUPS server as expected. In addition, this update adds the following enhancement: * Now, the information from local and remote CUPS servers is cached during each poll, and the CUPS server load is reduced.moderateScientific LinuxScientific Linux 7cups-filters-libs-1.0.35-21.el7.x86_64.rpm29914f81f21bdca7dfe6dc38bf097b26d3fdca45d3b93b9d7d54638039ee560fcups-filters-libs-1.0.35-21.el7.i686.rpmd834044bd4280da4b7fc41449e8ccc9bc00bbc20ba5a24712b3892f83a1fa586cups-filters-devel-1.0.35-21.el7.i686.rpm459820fb3a150a969abef3eb181ae43cade996e60416e2b690eab89ebf4987ebcups-filters-1.0.35-21.el7.x86_64.rpm69c386ee64b97c46dc84b42c043b13077cfc9021d6c46557950bf44937aefd80cups-filters-devel-1.0.35-21.el7.x86_64.rpmaa5bbecd30cdf18f2b94a022b8131d616f725ecb5427ac94cc6be73cadb4a220SLSA-2015:2369-1OpenhpiIt was found that the "/var/lib/openhpi" directory provided by OpenHPI used world-writeable and world-readable permissions. A local user could use this flaw to view, modify, and delete OpenHPI-related data, or even fill up the storage device hosting the /var/lib directory. (CVE-2015-3248) The openhpi packages have been upgraded to upstream version 3.4.0, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following bug: * Network timeouts were handled incorrectly in the openhpid daemon. As a consequence, network connections could fail when external plug-ins were used. With this update, handling of network socket timeouts has been improved in openhpid, and the described problem no longer occurs.lowScientific LinuxScientific Linux 7openhpi-libs-3.4.0-2.el7.i686.rpm3bc23014314bbdf0b8e8bc5dcb30740754a818e78c87f1249e22678bd425922aopenhpi-3.4.0-2.el7.x86_64.rpm59079953991c16dad8691b262bb0ca298800b94711e566b9043c9c97d1de97d8openhpi-3.4.0-2.el7.i686.rpm8c799e4113cc950d1de5ce859cb76ab4a0710d1ffc8bb1a8731d4858bca679f9openhpi-devel-3.4.0-2.el7.i686.rpmf5eee375dda8053bd24256faf1ae8a7a0f50f0c3c9b8f048e83b9476c3358c5aopenhpi-libs-3.4.0-2.el7.x86_64.rpm1a59cb7d81e075160611e647f457f972c9f1a086199e868e3314b08dec2fea9dopenhpi-devel-3.4.0-2.el7.x86_64.rpm498af55aea631595fef48e611cbfa6518b983a142ecedec9145ccdbee2e2659fSLSA-2015:2378-1SquidIt was found that Squid configured with client-first SSL-bump did not correctly validate X.509 server certificate host name fields. A man-in- the-middle attacker could use this flaw to spoof a Squid server using a specially crafted X.509 certificate. (CVE-2015-3455) This update fixes the following bugs: * Previously, the squid process did not handle file descriptors correctly when receiving Simple Network Management Protocol (SNMP) requests. As a consequence, the process gradually accumulated open file descriptors. This bug has been fixed and squid now handles SNMP requests correctly, closing file descriptors when necessary. * Under high system load, the squid process sometimes terminated unexpectedly with a segmentation fault during reboot. This update provides better memory handling during reboot, thus fixing this bug. After installing this update, the squid service will be restarted automatically.moderateScientific LinuxScientific Linux 7squid-sysvinit-3.3.8-26.el7.x86_64.rpm03fc86850cec187de5c9aab5db83e4c9415781dd6b8d7ba1bdcb7b9d23f44a7dsquid-3.3.8-26.el7.x86_64.rpma9cea068418305e0ac03b794e87077c2ee5560ef82d8348297c004aadcf60dc8SLSA-2015:2383-1PacemakerA flaw was found in the way pacemaker, a cluster resource manager, evaluated added nodes in certain situations. A user with read-only access could potentially assign any other existing roles to themselves and then add privileges to other users as well. (CVE-2015-1867) The pacemaker packages have been upgraded to upstream version 1.1.13, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following bugs: * When a Pacemaker cluster included an Apache resource, and Apache's mod_systemd module was enabled, systemd rejected notifications sent by Apache. As a consequence, a large number of errors in the following format appeared in the system log: Got notification message from PID XXXX, but reception only permitted for PID YYYY With this update, the lrmd daemon now unsets the "NOTIFY_SOCKET" variable in the described circumstances, and these error messages are no longer logged. * Previously, specifying a remote guest node as a part of a group resource in a Pacemaker cluster caused the node to stop working. This update adds support for remote guests in Pacemaker group resources, and the described problem no longer occurs. * When a resource in a Pacemaker cluster failed to start, Pacemaker updated the resource's last failure time and incremented its fail count even if the "on-fail=ignore" option was used. This in some cases caused unintended resource migrations when a resource start failure occurred. Now, Pacemaker does not update the fail count when "on-fail=ignore" is used. As a result, the failure is displayed in the cluster status output, but is properly ignored and thus does not cause resource migration. * Previously, Pacemaker supported semicolon characters (";") as delimiters when parsing the pcmk_host_map string, but not when parsing the pcmk_host_list string. To ensure consistent user experience, semicolons are now supported as delimiters for parsing pcmk_host_list, as well. In addition, this update adds the following enhancements: * If a Pacemaker location constraint has the "resource-discovery=never" option, Pacemaker now does not attempt to determine whether a specified service is running on the specified node. In addition, if multiple location constraints for a given resource specify "resource- discovery=exclusive", then Pacemaker attempts resource discovery only on the nodes specified in those constraints. This allows Pacemaker to skip resource discovery on nodes where attempting the operation would lead to error or other undesirable behavior. * The procedure of configuring fencing for redundant power supplies has been simplified in order to prevent multiple nodes accessing cluster resources at the same time and thus causing data corruption. For further information, see the "Fencing: Configuring STONITH" chapter of the High Availability Add-On Reference manual. * The output of the "crm_mon" and "pcs_status" commands has been modified to be clearer and more concise, and thus easier to read when reporting the status of a Pacemaker cluster with a large number of remote nodes and cloned resources.moderateScientific LinuxScientific Linux 7pacemaker-nagios-plugins-metadata-1.1.13-10.el7.x86_64.rpmfec48dbc7e67a10829e45b43f25b44c2ce9c7bd84759a643760a795824e7223cpacemaker-doc-1.1.13-10.el7.x86_64.rpm6a68e16ce022bcb114cc4865d26f1bfb044cc7da4f598aae5ed17a97c5896d66pacemaker-remote-1.1.13-10.el7.x86_64.rpmf68e584b4c234388a9bd5f44d0ddd107d20e45d0b3bf80a3e6e5cc995d424364pacemaker-cli-1.1.13-10.el7.x86_64.rpm44ef88e888a7a7e06f7ea6bf169dd3d1b480767ba1b5c0fa6b4310ce9e574efapacemaker-cts-1.1.13-10.el7.x86_64.rpmb3cdaf39db2a066e2b6d7ccbe86a2f7b6c709a8451829bc64cd6d3398f42610fpacemaker-libs-1.1.13-10.el7.i686.rpm059b97ebf0db5ed0260906c92a99b922b33afb6ec59652d78c5a693b19ec95f0pacemaker-1.1.13-10.el7.x86_64.rpm60dd44a8cca4160d1a74da8e261a0d46c2a38b8aeafc442e7984449fba85401dpacemaker-libs-devel-1.1.13-10.el7.x86_64.rpmb0fd0e33e274b37b9ef2ede99f7bf8853940caed07675f5cba08830db05c623fpacemaker-libs-1.1.13-10.el7.x86_64.rpm3032d5fd904273262fb3821d95dd063ba4c53264ba72eaeacafa714a5b8a17a7pacemaker-libs-devel-1.1.13-10.el7.i686.rpma1dfdf7aaa57909b2bfb351d23b473be875e82d512bb7ef99e75b2a2c10b2baepacemaker-cluster-libs-1.1.13-10.el7.i686.rpm7402dece5cb36ea35fe3ac28b1ec328fe259dd296409e07e5eed6edcfd58b84apacemaker-cluster-libs-1.1.13-10.el7.x86_64.rpm840c5079a1778a4943392f9086cb98d8622657c7d475c84752e735ae33d013b2SLSA-2015:2393-1WiresharkSeveral denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. (CVE-2015-2188, CVE-2015-2189, CVE-2015-2191, CVE-2015-3810, CVE-2015-3811, CVE-2015-3812, CVE-2015-3813, CVE-2014-8710, CVE-2014-8711, CVE-2014-8712, CVE-2014-8713, CVE-2014-8714, CVE-2015-0562, CVE-2015-0563, CVE-2015-0564, CVE-2015-3182, CVE-2015-6243, CVE-2015-6244, CVE-2015-6245, CVE-2015-6246, CVE-2015-6248) The wireshark packages have been upgraded to upstream version 1.10.14, which provides a number of bug fixes and enhancements over the previous version. This update also fixes the following bug: * Prior to this update, when using the tshark utility to capture packets over the interface, tshark failed to create output files in the .pcap format even if it was specified using the "-F" option. This bug has been fixed, the "-F" option is now honored, and the result saved in the .pcap format as expected. In addition, this update adds the following enhancement: * Previously, wireshark included only microseconds in the .pcapng format. With this update, wireshark supports nanosecond time stamp precision to allow for more accurate time stamps. All running instances of Wireshark must be restarted for the update to take effect.moderateScientific LinuxtrueScientific Linux 7wireshark-devel-1.10.14-7.el7.x86_64.rpm41cea54b4981f14e0e27dfd44b640781d230bbbd29f8a9f35a05e71f7f08f84awireshark-1.10.14-7.el7.i686.rpm4642147311519ed8e82cee859dc60f06269354d1b2557f2726d3ab1cb1e5e35awireshark-devel-1.10.14-7.el7.i686.rpme82b573677f3ba91c6db8b3f2c19006a5d42c0606d9426c4045a9c59f4034accwireshark-1.10.14-7.el7.x86_64.rpmaafee1fd31a730892d37029729de3c28cfce15c2eb5c907c869202b98bc65685wireshark-gnome-1.10.14-7.el7.x86_64.rpm3893c2a0a17a9d4b76a4b5c2a9628fda3e1a86a5e710ce3aa8389cb39c9ed2ecSLSA-2015:2401-1Grub2It was discovered that grub2 builds for EFI systems contained modules that were not suitable to be loaded in a Secure Boot environment. An attacker could use this flaw to circumvent the Secure Boot mechanisms and load non- verified code. Attacks could use the boot menu if no password was set, or the grub2 configuration file if the attacker has root privileges on the system. (CVE-2015-5281) This update also fixes the following bugs: * In one of the earlier updates, GRUB2 was modified to escape forward slash (/) characters in several different places. In one of these places, the escaping was unnecessary and prevented certain types of kernel command-line arguments from being passed to the kernel correctly. With this update, GRUB2 no longer escapes the forward slash characters in the mentioned place, and the kernel command-line arguments work as expected. * Previously, GRUB2 relied on a timing mechanism provided by legacy hardware, but not by the Hyper-V Gen2 hypervisor, to calibrate its timer loop. This prevented GRUB2 from operating correctly on Hyper-V Gen2. This update modifies GRUB2 to use a different mechanism on Hyper-V Gen2 to calibrate the timing. As a result, Hyper-V Gen2 hypervisors now work as expected. * Prior to this update, users who manually configured GRUB2 to use the built-in GNU Privacy Guard (GPG) verification observed the following error on boot: alloc magic is broken at [addr]: [value] Aborted. Consequently, the boot failed. The GRUB2 built-in GPG verification has been modified to no longer free the same memory twice. As a result, the mentioned error no longer occurs. * Previously, the system sometimes did not recover after terminating unexpectedly and failed to reboot. To fix this problem, the GRUB2 packages now enforce file synchronization when creating the GRUB2 configuration file, which ensures that the required configuration files are written to disk. As a result, the system now reboots successfully after crashing. * Previously, if an unconfigured network driver instance was selected and configured when the GRUB2 bootloader was loaded on a different instance, GRUB2 did not receive notifications of the Address Resolution Protocol (ARP) replies. Consequently, GRUB2 failed with the following error message: error: timeout: could not resolve hardware address. With this update, GRUB2 selects the network driver instance from which it was loaded. As a result, ARP packets are processed correctly. In addition, this update adds the following enhancement: * Sorting of GRUB2 boot menu has been improved. GRUB2 now uses the rpmdevtools package to sort available kernels and the configuration file is being generated correctly with the most recent kernel version listed at the top.lowScientific LinuxScientific Linux 7grub2-2.02-0.29.el7.x86_64.rpm8efd1db4087464e6c75229172c8ea2c72b613f045b2556d0a5265aad116361a8grub2-efi-modules-2.02-0.29.el7.x86_64.rpm3304eb48d4c2a1c9671faf115b19a44fff8bc55f3912dedfcad06188837faf0bgrub2-tools-2.02-0.29.el7.x86_64.rpm89f47d0cbd43ea9870cb6dd4c9e2fd16d9e59282f767ae77ada1dd57ae98ebf1grub2-efi-2.02-0.29.el7.x86_64.rpm80a54df759622312bb305143925eef3e4d80d9e5ad2f70ad011c5eaeb22ca340SLSA-2015:2417-1AutofsIt was found that program-based automounter maps that used interpreted languages such as Python used standard environment variables to locate and load modules of those languages. A local attacker could potentially use this flaw to escalate their privileges on the system. (CVE-2014-8169) Note: This issue has been fixed by adding the "AUTOFS_" prefix to the affected environment variables so that they are not used to subvert the system. A configuration option ("force_standard_program_map_env") to override this prefix and to use the environment variables without the prefix has been added. In addition, warnings have been added to the manual page and to the installed configuration file. Now, by default the standard variables of the program map are provided only with the prefix added to its name. Notably, this update fixes the following bugs: * When the "ls *" command was run in the root of an indirect mount, autofs attempted to literally mount the wildcard character (*) causing it to be added to the negative cache. If done before a valid mount, autofs then failed on further mount attempts inside the mount point, valid or not. This has been fixed, and wildcard map entries now function in the described situation. * When autofs encountered a syntax error consisting of a duplicate entry in a multimap entry, it reported an error and did not mount the map entry. With this update, autofs has been amended to report the problem in the log to alert the system administrator and use the last seen instance of the duplicate entry rather than fail. * In the ldap and sss lookup modules, the map reading functions did not distinguish between the "no entry found" and "service not available" errors. Consequently, when the "service not available" response was returned from a master map read, autofs did not update the mounts. An "entry not found" return does not prevent the map update, so the ldap and sss lookup modules were updated to distinguish between these two returns and now work as expected. In addition, this update adds the following enhancement: * The description of the configuration parameter map_hash_table_size was missing from the autofs.conf(5) man page and its description in the configuration file comments was insufficient. A description of the parameter has been added to autofs.conf(5), and the configuration file comments have been updated.moderateScientific LinuxScientific Linux 7autofs-5.0.7-54.el7.x86_64.rpm9cb171697cab2bd7d7ec7155954bb3190520e903110f6998f30020a3c5a64d01SLSA-2015:2455-1UnboundA denial of service flaw was found in unbound that an attacker could use to trick the unbound resolver into following an endless loop of delegations, consuming an excessive amount of resources. (CVE-2014-8602) This update also fixes the following bugs: * Prior to this update, there was a mistake in the time configuration in the cron job invoking unbound-anchor to update the root zone key. Consequently, unbound-anchor was invoked once a month instead of every day, thus not complying with RFC 5011. The cron job has been replaced with a systemd timer unit that is invoked on a daily basis. Now, the root zone key validity is checked daily at a random time within a 24-hour window, and compliance with RFC 5011 is ensured. * Previously, the unbound packages were installing their configuration file for the systemd-tmpfiles utility into the /etc/tmpfiles.d/ directory. As a consequence, changes to unbound made by the administrator in /etc/tmpfiles.d/ could be overwritten on package reinstallation or update. To fix this bug, unbound has been amended to install the configuration file into the /usr/lib/tmpfiles.d/ directory. As a result, the system administrator's configuration in /etc/tmpfiles.d/ is preserved, including any changes, on package reinstallation or update. * The unbound server default configuration included validation of DNS records using the DNSSEC Look-aside Validation (DLV) registry. The Internet Systems Consortium (ISC) plans to deprecate the DLV registry service as no longer needed, and unbound could execute unnecessary steps. Therefore, the use of the DLV registry has been removed from the unbound server default configuration. Now, unbound does not try to perform DNS records validation using the DLV registry.lowScientific LinuxScientific Linux 7unbound-libs-1.4.20-26.el7.i686.rpmef46da011ed2bc2058df7de1201a71f5a091cac8e066f9d43bc21d5c4115ad6eunbound-python-1.4.20-26.el7.x86_64.rpm894622dccc8563a81a9d17fbf843b437a8dfdcb266533f36a8316bc8a65dc68bunbound-1.4.20-26.el7.x86_64.rpm088d2a14bd8080337ffd8ed44029f0db4181d3eb13c9cccb579a4e8cec0d7309unbound-devel-1.4.20-26.el7.x86_64.rpm87b194d8cfead18af56566264cb7cf175967bdc187c122ab29299759180e5f81unbound-devel-1.4.20-26.el7.i686.rpm52fcb57335e8abe6941f41f8a8519a63e954a158be9d2d40f2c9d7f235920359unbound-libs-1.4.20-26.el7.x86_64.rpm9b47bd259e0c6d2bbc82aa257fc60fb53a01376d38a43dc93ebf5b85239eb00eSLSA-2015:2505-1Abrt And LibreportIt was found that the ABRT debug information installer (abrt-action- install-debuginfo-to-abrt-cache) did not use temporary directories in a secure way. A local attacker could use the flaw to create symbolic links and files at arbitrary locations as the abrt user. (CVE-2015-5273) It was discovered that the kernel-invoked coredump processor provided by ABRT did not handle symbolic links correctly when writing core dumps of ABRT programs to the ABRT dump directory (/var/spool/abrt). A local attacker with write access to an ABRT problem directory could use this flaw to escalate their privileges. (CVE-2015-5287) It was found that ABRT may have exposed unintended information to Red Hat Bugzilla during crash reporting. A bug in the libreport library caused changes made by a user in files included in a crash report to be discarded. As a result, Red Hat Bugzilla attachments may contain data that was not intended to be made public, including host names, IP addresses, or command line options. (CVE-2015-5302) This flaw did not affect default installations of ABRT on Scientific Linux as they do not post data to Red Hat Bugzilla. This feature can however be enabled, potentially impacting modified ABRT instances. With this update Scientific Linux will no longer publish the rhel-autoreport tools.moderateScientific LinuxScientific Linux 7libreport-plugin-kerneloops-2.1.11-31.sl7.x86_64.rpm576fc4cf710626559b814188b653cc747076cf5108f673aa62e212fc50661e51abrt-python-2.1.11-35.sl7.x86_64.rpm8154c09a353e8df35def0af0b8d3bdb719f72e0c86fd8b0ec24d3947af89b269abrt-devel-2.1.11-35.sl7.i686.rpm16e27474d37315c98663346bbfd2ae99dd0e5e747dc7e88d192fb52176f2e2fclibreport-web-2.1.11-31.sl7.x86_64.rpm5fe6c40bf9d03d9e54c0fa9f3f03d435e33afee2577eee7d724d985b55a84149abrt-gui-devel-2.1.11-35.sl7.x86_64.rpm136dee88ad097f95ab539b0d946fffb8a2562c56b84cb1859b8c45de6df98b70libreport-plugin-logger-2.1.11-31.sl7.x86_64.rpme521c7953fc6319dedad7e10dbb9dbb9087c69519690e43e5f33208ea0e21213abrt-devel-2.1.11-35.sl7.x86_64.rpmfc298693b730bb382a18542fcbd79b0e3243861b734ffba4d0edaf0272aba27aabrt-desktop-2.1.11-35.sl7.x86_64.rpm3a374f131f491b7d06ad0d12eca543ac0c68863757d744d7d88b8843f61dd6f0libreport-2.1.11-31.sl7.x86_64.rpm3a21b7aa2496670ec8cd0ab349a07611d532f99e6bd1fb77fb3d1af6fb828936libreport-gtk-devel-2.1.11-31.sl7.i686.rpme14ec6924138b185258015b87ae050d5a12a670b924632ab0d29aeff6e318b78abrt-libs-2.1.11-35.sl7.i686.rpm010aad4baec41593b0d12e885d206105c12a819b3390aa9a1f62bd882a3de108libreport-python-2.1.11-31.sl7.x86_64.rpmc76e912f826777e4b16131b969e89ffd706cbaba743a505e3029ae90ec4185c9libreport-anaconda-2.1.11-31.sl7.x86_64.rpm52b02432ae7dec61f9091e924384c7e3458d828c501e32d36b1c7e7e76098f8fabrt-addon-xorg-2.1.11-35.sl7.x86_64.rpm58e0daad2230a7158becebe43dcd89947524e32d1a14b683655b94f4f079a355libreport-filesystem-2.1.11-31.sl7.x86_64.rpmda0d0eb596b1754ccb49cf4f285c47363bdf4a616976cd69f9c2c497f493f807libreport-rhel-anaconda-bugzilla-2.1.11-31.sl7.x86_64.rpmbcea95b4a39a97622acc52fd47a45516ed1a1837295e6cb3b9be586d4d89b497abrt-dbus-2.1.11-35.sl7.x86_64.rpm1bc8d1789efb8e0234be4e846d83c8bba3d8d7301ef06405aa0e3d8e511596d9abrt-tui-2.1.11-35.sl7.x86_64.rpm5da69875d6920ae0974c2df97b7ca84c8af70afb1295defeb503be2b744d8eadlibreport-devel-2.1.11-31.sl7.x86_64.rpm8a314913f24c999e4e4f646ec17c45c9ad02b2343579cc11f2cfdad7025680d7libreport-devel-2.1.11-31.sl7.i686.rpmfaf190be2d0b618bbc219e9642c51be511d7e8cc977259999f71739bc7fabe10libreport-gtk-devel-2.1.11-31.sl7.x86_64.rpm7924dd7b2c1e507406e86808f96b00945b68862c17101b5a5c5d2c6127b2bb5dabrt-addon-python-2.1.11-35.sl7.x86_64.rpm4fe05f4cc6d456cf87c4ff1f0484bbf9e85d8576e53337e898a3deb7b89305bbabrt-addon-upload-watch-2.1.11-35.sl7.x86_64.rpme255f817098824ff851190da7c7cab56c30d54e793d8f3bd0f09f3400e5664felibreport-plugin-reportuploader-2.1.11-31.sl7.x86_64.rpm8913c77d88dd22e6bc55937804298095cbb278fe18efac09c9b67ca086f56081libreport-compat-2.1.11-31.sl7.x86_64.rpmfe57b4724016ce836e12e1ddbc909e311dcd525b03f2ad0587f4d95224121995abrt-addon-pstoreoops-2.1.11-35.sl7.x86_64.rpm8f25cb5dd923c02a8714e7f60218ba5ecb13a562dc8778769dcbb25e3b55253aabrt-gui-libs-2.1.11-35.sl7.i686.rpmb47f62a5403086b503748632e157052bdec1b618ba4bf1feac88148650689248abrt-gui-devel-2.1.11-35.sl7.i686.rpme53c94088bf0f691cd0be539465923a41495a324a5ea8e5db35eb4a03312716eabrt-libs-2.1.11-35.sl7.x86_64.rpm9f10b492bb24a417791397d3ac22ab2ffaa72098c82cbba736fda0db37db6b81libreport-plugin-mailx-2.1.11-31.sl7.x86_64.rpmbb31c464a4d881f9b4e5f683f520dbf167987e612acb08fd78c05dfa2f04e819libreport-plugin-ureport-2.1.11-31.sl7.x86_64.rpm6ec115671aa3a16765c863048ce2d1e9d3c2bca4ca01c1028c55db10e248f006abrt-2.1.11-35.sl7.x86_64.rpmca57035c3bbc1a5d745d310aaa29e84bcb7208e5832feccbad012298b6f0b9f3abrt-addon-kerneloops-2.1.11-35.sl7.x86_64.rpm4a09fc557cdab6fc58f9d10a487bfa774b997e1b99792876c302a3d2d4a64c11libreport-gtk-2.1.11-31.sl7.x86_64.rpm8ce6ceb564c14e1c4c69670f00b88a1c8c47ddcc358dbf8507f348c649bc887elibreport-rhel-2.1.11-31.sl7.x86_64.rpm498cf7c1a443862dab08e2745556b5f72650c90be18c5db39caee7fec03db625abrt-python-doc-2.1.11-35.sl7.noarch.rpm1bb6d7e02110f89c85fa90dc17ff89872c580288b7bb2847f646092c55a14014abrt-cli-2.1.11-35.sl7.x86_64.rpmb9b867e6f7dcbecbb1696f4989c8fde8a6485465bef959726d9b2bea3a0b386dabrt-gui-2.1.11-35.sl7.x86_64.rpmb032c622ff9a1fd79bd87a3ab288ab7362d395eb04a283237194344fd1c2fc1blibreport-newt-2.1.11-31.sl7.x86_64.rpm7fbd43c5ce869c0aef9a94550d567d62efb6df6c9b6b2d72391d9c59f6d63d5alibreport-web-devel-2.1.11-31.sl7.i686.rpmf442b84967b8e11ba4df9eab762713cb12aeb93b4c98f9eea2f024bbdeafeab0abrt-addon-vmcore-2.1.11-35.sl7.x86_64.rpmcc87618723cac97459d596d4fb5f8f778ca56fad6df0d8141418ba347d5c9494libreport-web-2.1.11-31.sl7.i686.rpmc8cae803534608e267fcf32c609f65dc137ac6336c8b949837b2f4a76f6cd33dabrt-gui-libs-2.1.11-35.sl7.x86_64.rpm3a6af864ae29b86b072bd14019835b3610e71d754290a573e015a66787bc498elibreport-plugin-bugzilla-2.1.11-31.sl7.x86_64.rpm23617c9e55f0dedff15290aac17e0016fd55b7397635a74957762a7d68d26866libreport-rhel-bugzilla-2.1.11-31.sl7.x86_64.rpm750b8ac4af3e02893f55cc3972e66d6e66900424c8f2ab93778e060336c213d3libreport-2.1.11-31.sl7.i686.rpm783b25b1b99de084cf843a39927be41180472a562ef01556574c4e67451418bbabrt-addon-ccpp-2.1.11-35.sl7.x86_64.rpm782979030aedeb02f65838f07f7a5e5e1049aa46b727a88cf7d2beb526ccb2bblibreport-web-devel-2.1.11-31.sl7.x86_64.rpmadf6a406fc1502b6cad99b7bedc81985affcbbb8802314794122c75376a00ddcabrt-retrace-client-2.1.11-35.sl7.x86_64.rpm847046605195928416174cd5dbd2e55b7ad6f7d811900b437d97f428980b9164abrt-console-notification-2.1.11-35.sl7.x86_64.rpm4810469b99e20cace747145d3aae9d171bfee883e01b5cab24384c1b1b6aaf19libreport-gtk-2.1.11-31.sl7.i686.rpm2f8d3052bee481d524c85d35bd7d982df54dfc0b6161fe044dd74ad76928da89libreport-cli-2.1.11-31.sl7.x86_64.rpm30e5050a987d351bc16a395019aa451ee4365772690e24a4e1c13631d09e54d1SLSA-2015:2519-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, CVE-2015-7200) A same-origin policy bypass flaw was found in the way Thunderbird handled certain cross-origin resource sharing (CORS) requests. A web page containing malicious content could cause Thunderbird to disclose sensitive information. (CVE-2015-7193) Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). After installing the update, Thunderbird must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7thunderbird-38.4.0-1.el7_2.x86_64.rpm7105b03aa137e01b41547e5ac8776d4145192ac5867220525c14e7906f270da2SLSA-2015:2522-1Apache-Commons-CollectionsIt was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons- collections library. (CVE-2015-7501) With this update, deserialization of certain classes in the commons- collections library is no longer allowed. Applications that require those classes to be deserialized can use the system property "org.apache.commons.collections.enableUnsafeSerialization" to re-enable their deserialization. In the interim, the quickest way to resolve this specific deserialization vulnerability is to remove the vulnerable class files (InvokerTransformer, InstantiateFactory, and InstantiateTransformer) in all commons-collections jar files. Any manual changes should be tested to avoid unforseen complications. All running applications using the commons-collections library must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7apache-commons-collections-testframework-javadoc-3.2.1-22.el7_2.noarch.rpm2bda28fc808d0d63555362925d2bc550a3f92c3249bcd9cb1752aade9d575cfcapache-commons-collections-testframework-3.2.1-22.el7_2.noarch.rpmb2c6633684de76b941b513a733e34e9d3d1f582a5bee3031a738385c6e988403apache-commons-collections-3.2.1-22.el7_2.noarch.rpm83c2c18006a90151289522af696e1d6700413073b91d930b6795b61345b5933capache-commons-collections-javadoc-3.2.1-22.el7_2.noarch.rpm1876d5239373d3b6cc1ce04a3183703c31bedd0b55dd1d67b065c582fc785d5cSLSA-2015:2550-1Libxml2Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application. (CVE-2015-1819, CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500 CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317, BZ#1213957, BZ#1281955) The desktop must be restarted (log out, then log back in) for this update to take effect.moderateScientific LinuxtruetrueScientific Linux 7libxml2-2.9.1-6.el7_2.2.x86_64.rpm86b749cb0a50927d559d4c389d4deff9e7ba08f431e936432fdc5497d4b02dealibxml2-devel-2.9.1-6.el7_2.2.x86_64.rpm029e8136a04f691f02f9670119840def60c9d2e795a89dddac826e7b8fc9bb1dlibxml2-python-2.9.1-6.el7_2.2.x86_64.rpmae31f852b524e8053cf094074a3aaf4d925a74fa8bd58bbc616ab3f5abd65bcalibxml2-static-2.9.1-6.el7_2.2.i686.rpm8a1653b7a9d9e86a72d47ce24c5b0ca194ff1a68ca6ee672c0ef60c60d0020c8libxml2-devel-2.9.1-6.el7_2.2.i686.rpmc1266d95e1b4fb0100b511b21b1604314984585bd8f9048cdff67c85d9c027e7libxml2-static-2.9.1-6.el7_2.2.x86_64.rpmda0b96ef2df4e39c3226397fc46d09d69d90f61905e9cb14fc0fd7ae827decfelibxml2-2.9.1-6.el7_2.2.i686.rpmdff3cb40e43351418b30c5601de151df3c71f5ce1228b174d9a47b1a188e00e3SLSA-2015:2552-1Kernel* It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) and #DB (debug exception) is handled. A privileged user inside a guest could use these flaws to create denial of service conditions on the host kernel. (CVE-2015-5307, CVE-2015-8104, Important) This update also fixes the following bugs: * On Intel Xeon v5 platforms, the processor frequency was always tied to the highest possible frequency. Switching p-states on these client platforms failed. This update sets the idle frequency, busy frequency, and processor frequency values by determining the range and adjusting the minimal and maximal percent limit values. Now, switching p-states on the aforementioned client platforms proceeds successfully. * Due to a validation error of in-kernel memory-mapped I/O (MMIO) tracing, a VM became previously unresponsive when connected to RHEV Hypervisor. The provided patch fixes this bug by dropping the check in MMIO handler, and a VM continues running as expected. * Due to retry-able command errors, the NVMe driver previously leaked I/O descriptors and DMA mappings. As a consequence, the kernel could become unresponsive during the hot-unplug operation if a driver was removed. This update fixes the driver memory leak bug on command retries, and the kernel no longer hangs in this situation. * The hybrid_dma_data() function was not initialized before use, which caused an invalid memory access when hot-plugging a PCI card. As a consequence, a kernel oops occurred. The provided patch makes sure hybrid_dma_data() is initialized before use, and the kernel oops no longer occurs in this situation. * When running PowerPC (PPC) KVM guests and the host was experiencing a lot of page faults, for example because it was running low on memory, the host sometimes triggered an incorrect kind of interrupt in the guest: a data storage exception instead of a data segment exception. This caused a kernel panic of the PPC KVM guest. With this update, the host kernel synthesizes a segment fault if the corresponding Segment Lookaside Buffer (SLB) lookup fails, which prevents the kernel panic from occurring. * The kernel accessed an incorrect area of the khugepaged process causing Logical Partitioning (LPAR) to become unresponsive, and an oops occurred in medlp5. The backported upstream patch prevents an LPAR hang, and the oops no longer occurs. * When the sctp module was loaded and a route to an association endpoint was removed after receiving an Out-of-The-Blue (OOTB) chunk but before incrementing the "dropped because of missing route" SNMP statistic, a Null Pointer Dereference kernel panic previously occurred. This update fixes the race condition between OOTB response and route removal. * The cpuscaling test of the certification test suite previously failed due to a rounding bug in the intel-pstate driver. This bug has been fixed and the cpuscaling test now passes. The system must be rebooted for this update to take effect.importantScientific LinuxtrueScientific Linux 7kernel-tools-libs-3.10.0-327.3.1.el7.x86_64.rpm5599ec6cb3b7fbee706df4027d314fbf6b975f66f998c21c1f93da1241b9fe9fkernel-debug-3.10.0-327.3.1.el7.x86_64.rpmd74b4eb3069d6a1ac959992f280fae5f787966d07893dca03aa3b070f4742e0akernel-abi-whitelists-3.10.0-327.3.1.el7.noarch.rpm90efb9dedaab6d288510f5376e645b566df2c82588906f9a79a09ef9c340689ckernel-tools-libs-devel-3.10.0-327.3.1.el7.x86_64.rpm306c63ecab001dc53079eb786fbcb7653ef4a7677b8b882b376d9489e4b55fb1kernel-debug-devel-3.10.0-327.3.1.el7.x86_64.rpm1d13306ff7776f49bb5bb9f996dff1254e75a1ae4d90a96bce4a90b8267ad2d7kernel-tools-3.10.0-327.3.1.el7.x86_64.rpm94fb52641c956209e0f2ae42bc1fed8994eb5711ad889be5378888fe57449461kernel-doc-3.10.0-327.3.1.el7.noarch.rpmcfe745e5add46b64f2686b017dbba37860c75fd50cd46bb9d6852e8a26263f82kernel-3.10.0-327.3.1.el7.x86_64.rpmd57fc4ff0dd50e2d4fee4cb70aaca4e61f9a9ced01b2d3e43701185f79555230perf-3.10.0-327.3.1.el7.x86_64.rpm48b7aa1baf6e3e115f9ffb37ce1575fa6a5169de34d637f8a3c44982ce66809fkernel-devel-3.10.0-327.3.1.el7.x86_64.rpm5554c4f427f44659e3ee25db3d1ab4b50017bdca95726be7a1a6bbe81a1b4fc7kernel-headers-3.10.0-327.3.1.el7.x86_64.rpm9679c77d335c3980b89a8f94cca638d99098d93fc0c9bfe0cd77e7b97987d30epython-perf-3.10.0-327.3.1.el7.x86_64.rpm0ca1a8704763750021c7956c0e03d060cfb7e5e10af6c6554ae66756d239836cSLSA-2015:2561-1GitA flaw was found in the way the git-remote-ext helper processed certain URLs. If a user had Git configured to automatically clone submodules from untrusted repositories, an attacker could inject commands into the URL of a submodule, allowing them to execute arbitrary code on the user's system.moderateScientific LinuxScientific Linux 7git-cvs-1.8.3.1-6.el7.noarch.rpmac3c99707f7da0c0ef5cb4c0856621cfb1e851ab4b817eab3e0918add9d3f2fegit-svn-1.8.3.1-6.el7.x86_64.rpma944bbd52f7dfd94359e0c6562eced4604c961194f9571a78f68f5902356bb9fgit-gui-1.8.3.1-6.el7.noarch.rpm62cda65b624ec820805fba7a3769c5b565eaee325cbb8073ad52b06807f66826emacs-git-el-1.8.3.1-6.el7.noarch.rpma1e2a1155dac95001b47d834d159fefee94f0cd12de7668e471e3cd56a5a2df4git-all-1.8.3.1-6.el7.noarch.rpm0fa6369460d9affe3ee23d305f54f13809dcffa102afbdd92fb6cd165e873e25perl-Git-1.8.3.1-6.el7.noarch.rpmeac02decbfe8d641f597d149401c41262a3b1f00ec7adf902e44701f1b25ced6git-p4-1.8.3.1-6.el7.noarch.rpm88a8dc5eb2c63724eb4299b6f71084089131a455206d7253f08e1de7cef06c4cgit-1.8.3.1-6.el7.x86_64.rpm8603a5d0214f5fbd3c12edc1744611128b2d34809ec139e56356828f585006e0git-daemon-1.8.3.1-6.el7.x86_64.rpm3032e7bfd04a29d67f0eb9cfd927d7c25d003871e1c35439adf7545355581e07git-bzr-1.8.3.1-6.el7.noarch.rpm9f13a542d8db3360cf12f91fbd6e814b917493e7f8bf3efd14fe7284bf60b9e4git-hg-1.8.3.1-6.el7.noarch.rpm45a2a1ff460d3ebfebb5b4156d1e0c2ab28693fb6d2aaa82a759576e76895f05emacs-git-1.8.3.1-6.el7.noarch.rpm3cba1f4fff40dcf2773c114808631086d4d7e7b722a9761d7e510bebd185d163git-email-1.8.3.1-6.el7.noarch.rpm5ba15a045f1f20f3901c3290f2d6c0f4b92d1e3758ae047898c1103121dacea8perl-Git-SVN-1.8.3.1-6.el7.noarch.rpm171278028c27fe0c8bdbb9b172513588f4418dfa7a57d126414c5a461cc6fc94gitk-1.8.3.1-6.el7.noarch.rpm65600744991b4323f82ca1a329f9ad091e9b1f14887b41c5aa32804a67607590gitweb-1.8.3.1-6.el7.noarch.rpm9a29d7cecabe6a4f3466b2a7d9631f458f47614f27bd538fc086a574f84efc49SLSA-2015:2595-1Libpng12It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472) An array-indexing error was discovered in the png_convert_to_rfc1123() function of libpng. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image. (CVE-2015-7981)moderateScientific LinuxScientific Linux 7libpng12-1.2.50-7.el7_2.x86_64.rpm8d7b0a51f5c202e9ab87fc85f08b69c45604b2bdf03b88f5a07cf384402fe64flibpng12-1.2.50-7.el7_2.i686.rpm47da969068dbdf63302f5b82ac81621e7064dd7fd1f7ffd49f64be107fc780e2libpng12-devel-1.2.50-7.el7_2.i686.rpm263e02ad92cac2dab8566a11cfa68876456870e828d1b509d23e0055215e14celibpng12-devel-1.2.50-7.el7_2.x86_64.rpm2e171b99323b4f7283bf23e127b3220ddb5b8209d43d9065c8dee14cf324aa44SLSA-2015:2596-1LibpngIt was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472)moderateScientific LinuxScientific Linux 7libpng-static-1.5.13-7.el7_2.x86_64.rpmacfb28e77bdd62f80ab7d0ae0cef25c7b359ca3a0216236dd68891c734109918libpng-1.5.13-7.el7_2.i686.rpm15fbcca6ed2e4fb5a4ad2acec16e5e19060db9610cb78e3e6841b7dcd898453flibpng-devel-1.5.13-7.el7_2.i686.rpm6d68669065de21413272723d276be3a66efa85cce92e0ac1ce4e045b0e2e1d18libpng-static-1.5.13-7.el7_2.i686.rpm3f1543cc02cc3f448e9d1175984ba3e24401ea94c483ac6c97d1884ef90f6490libpng-devel-1.5.13-7.el7_2.x86_64.rpmbaeafcbb83fcabbe1fe23b08559d6db113a8a3c4cf5f6963bd3674b8a7908b18libpng-1.5.13-7.el7_2.x86_64.rpma63e53637b4ac4c45eb37f488d637ac0bd1aa0be1fcff29f6e9479cf2631ce3dSLSA-2015:2617-1OpensslA NULL pointer derefernce flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacked could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication. (CVE-2015-3194) A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195) A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL. (CVE-2015-3196) For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.moderateScientific LinuxtrueScientific Linux 7openssl-libs-1.0.1e-51.el7_2.1.x86_64.rpmc00ca6d336e5c599ddc2b56ad559baf905745a287bdfc2d72b045c0dc9e885d0openssl-libs-1.0.1e-51.el7_2.1.i686.rpm6ac972c2daa38fce5fc555cd1abef20b68b9ec596518c30df15ec1ac882da097openssl-static-1.0.1e-51.el7_2.1.x86_64.rpmf60f13622a633cf624cfa28a4ca08639085093a9be635e0fed528d1c13fd861aopenssl-perl-1.0.1e-51.el7_2.1.x86_64.rpm0588b01e5b76135856fe5230615fa17daa720df7278cfffc9d72d1dba769c927openssl-static-1.0.1e-51.el7_2.1.i686.rpme14435ebb91257235dab504834088356389bb787e618cd50e1d4b73d49583fa3openssl-devel-1.0.1e-51.el7_2.1.x86_64.rpm35233728450b8857fb0dd8bcfe1f2a777e275b9d8f6c9fb46f7cacdb98d2ea9copenssl-devel-1.0.1e-51.el7_2.1.i686.rpm4fa0aa6512ba04058d873d6fa2e4271a1b994d41216643442c2fe358948517b2openssl-1.0.1e-51.el7_2.1.x86_64.rpmba980ce510c4fd6aad3f0c20e0f9d9f12dd543fbd8aaa071d103382f57edc271SLSA-2015:2619-1LibreofficeIt was discovered that LibreOffice did not properly restrict automatic link updates. By tricking a victim into opening specially crafted documents, an attacker could possibly use this flaw to disclose contents of files accessible by the victim. (CVE-2015-4551) An integer underflow flaw leading to a heap-based buffer overflow when parsing PrinterSetup data was discovered. By tricking a user into opening a specially crafted document, an attacker could possibly exploit this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5212) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way LibreOffice processed certain Microsoft Word .doc files. By tricking a user into opening a specially crafted Microsoft Word .doc document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5213) It was discovered that LibreOffice did not properly sanity check bookmark indexes. By tricking a user into opening a specially crafted document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5214)moderateScientific LinuxScientific Linux 7libreoffice-core-4.3.7.2-5.el7_2.1.x86_64.rpmd9fe5bcaf55d0c0d5781dc4c628f3052642ddd9728452b552650b9c225de4856libreoffice-langpack-ga-4.3.7.2-5.el7_2.1.x86_64.rpm34df2889735d3221d8200ed7794c4dcca7783569247b99e41d867d28ac10a0a3libreoffice-langpack-nb-4.3.7.2-5.el7_2.1.x86_64.rpmf67c01a20c93328cc8ec668c536b42318c35f12847d6d290a955a61c98c67129autocorr-af-4.3.7.2-5.el7_2.1.noarch.rpm8fb9b116e8ed9215085ab6ea646300a4bf4a13bde1eb701a9cdf84b6bcf070aalibreoffice-langpack-bn-4.3.7.2-5.el7_2.1.x86_64.rpma5f2b362b678052b3ca1b365cf6004d079d535a80507db1ba053490cf0de23b8libreoffice-langpack-dz-4.3.7.2-5.el7_2.1.x86_64.rpm80ce801158ffcf050ae852894f1b382d28942441def0410acb02e4deae318254libreoffice-langpack-gu-4.3.7.2-5.el7_2.1.x86_64.rpm863cd23dd02e29a4444dca83383cf231f6af4a47f74724cec5ceeae4860c8e77libreoffice-langpack-af-4.3.7.2-5.el7_2.1.x86_64.rpmc6150f3c2e630933bc3c95df1a077ec6a418c90f069605a622712f9e929c3edalibreoffice-langpack-or-4.3.7.2-5.el7_2.1.x86_64.rpmcbe55542cb0eadef5da3984b5b8f1f9663267c9c16d1a11d2cbc1e1f301f0f47libreoffice-ogltrans-4.3.7.2-5.el7_2.1.x86_64.rpm805892c5e0d091d204d1132dd1e0fc9187cadebe253b0f379aaeedaf7049f168autocorr-ru-4.3.7.2-5.el7_2.1.noarch.rpmdcb27dc4c33e640a775d91fc1c8ce9c445f3c412fd203b6a4360475d269baf48autocorr-mn-4.3.7.2-5.el7_2.1.noarch.rpm14418d6e01b9ca7eb1b9f604f678526ff6fd0ba3ded2021608eb15175d413639libreoffice-graphicfilter-4.3.7.2-5.el7_2.1.x86_64.rpm37659b1261e5457df692b0382979fc6a0a1ae0eb21e46f7eebebd165f5067b8elibreoffice-langpack-zh-Hant-4.3.7.2-5.el7_2.1.x86_64.rpmd5dc00b2c22045de1bb7ec6454d9c2829fd459d4dec6ae84181725cb7c2adc3aautocorr-nl-4.3.7.2-5.el7_2.1.noarch.rpmd9378ccacaff4a34e759926f0debde1263092be88fde81bdb5e5b40a3d56ed4elibreoffice-langpack-hr-4.3.7.2-5.el7_2.1.x86_64.rpmb8c7a0b68cf2142333c5ee013f5db882e7a5988cabaa0ce6e9fc982680859ca7autocorr-ja-4.3.7.2-5.el7_2.1.noarch.rpm7bb7dd123d468fb7f7e4a5780dbcc1d0f59fe0fc32db4f9862303ec7e1581769libreoffice-langpack-si-4.3.7.2-5.el7_2.1.x86_64.rpmeb3d774e9b15afed040a02a342ea8522c09ccb4b2e4756d27382e2574ea8cbd7libreoffice-langpack-as-4.3.7.2-5.el7_2.1.x86_64.rpm417387c8f2b441048ecb09283cccea6ade572d2d4256558ee7b0a77d368e3a43libreoffice-langpack-pa-4.3.7.2-5.el7_2.1.x86_64.rpma9595442260840cc75f9619c3ea941a9c0213d350beab125ead75d95d700aa58libreoffice-langpack-eu-4.3.7.2-5.el7_2.1.x86_64.rpm55e01aafd584839cb2efe63078d38472ea0e3680468aa75053e36a07434e76a8libreoffice-langpack-he-4.3.7.2-5.el7_2.1.x86_64.rpmc57086cf3cf67ebbf35df79a4304f34e6fe2fba87ac09be89e3534d17c9a9e10libreoffice-langpack-ss-4.3.7.2-5.el7_2.1.x86_64.rpme8083ac45296b39e791ce179fd5ec31ef75b9fcdc8776776ab0572128eb3e34eautocorr-de-4.3.7.2-5.el7_2.1.noarch.rpm34620c9e311fb99d2c2caa17b987387ef07464adac6b94807230ffdc2a835ebelibreoffice-langpack-sv-4.3.7.2-5.el7_2.1.x86_64.rpm48ec996063284a43a8bf611b511e2c12c5a8d79279e1835d3d4235822c92dd37autocorr-sl-4.3.7.2-5.el7_2.1.noarch.rpm53b17a4ee5a8f45cddafd930e17b1a8fa4d36af277620894cd0ebac0c50d852elibreoffice-langpack-ja-4.3.7.2-5.el7_2.1.x86_64.rpm579314a88d0fd5d567120375d87ee0ee96b9b3d25455e743e7918def0a0160aaautocorr-zh-4.3.7.2-5.el7_2.1.noarch.rpm12bc5f0b732da6fbe1d88b6caa3dbd9ced404ad1eddb0f117ef8c305b5da92falibreoffice-langpack-nr-4.3.7.2-5.el7_2.1.x86_64.rpm574ded4a0eae1af4afbee7f38bfc30965e8c6202db3fa49a3180cf9b3fefc8d9libreoffice-wiki-publisher-4.3.7.2-5.el7_2.1.x86_64.rpm60fb8af5d4645c0fa2663a9449886fea479795a85dbdb5de9d94c764f551c566libreoffice-langpack-pt-PT-4.3.7.2-5.el7_2.1.x86_64.rpma058266da59bce31e72781bfe139c090f1ca34fa0c47d7510a660b1615271d66libreoffice-pdfimport-4.3.7.2-5.el7_2.1.x86_64.rpm2e01cde9c5bc6a374e95abbeea8a87fe2baee1f17a7a687e21a568d44e28a838libreoffice-base-4.3.7.2-5.el7_2.1.x86_64.rpmc4892f71bfab1bf885041dc475a3593ac17b639f5a286b27f81fd0b85d5d338alibreoffice-langpack-ta-4.3.7.2-5.el7_2.1.x86_64.rpm51fe2890758c11d7945679c82c380ac7655a26554ff8c11fbeeb70e22997ad23libreoffice-postgresql-4.3.7.2-5.el7_2.1.x86_64.rpmd1afe2fa0158f75e3765e6531462ae231a946d05abbb1b633c40875f3fcf1c73autocorr-ca-4.3.7.2-5.el7_2.1.noarch.rpm5ee3878a73286a7c5cae88fe7d46f15a761752d3e5d2ae3dcdf89f207980532blibreoffice-langpack-sl-4.3.7.2-5.el7_2.1.x86_64.rpme693d8279b7b1e3695b45a9ee722a59d43860b05f1c0894ffe665fea6d708600libreoffice-langpack-zu-4.3.7.2-5.el7_2.1.x86_64.rpm59613fb71d9bb82f0646465ec701d011e67aad2db8e0ba2173e7d84dbbae2628libreoffice-langpack-tn-4.3.7.2-5.el7_2.1.x86_64.rpmf1e73c73bee6e62e9a9110aad8518d6d3551d0c7789a8dde78080ad0946b1a32libreoffice-langpack-te-4.3.7.2-5.el7_2.1.x86_64.rpm7b07d3526538562a1585a2281b13dbf363d54f565eb400951ead577fc39116dcautocorr-fi-4.3.7.2-5.el7_2.1.noarch.rpm82c71ea43d50c936b274f1d8569b2dc575f0c4e74f158662e478278f79809a25libreoffice-langpack-it-4.3.7.2-5.el7_2.1.x86_64.rpm729be134abd7cc29a7154632ebc4c7e4f0065ad5e4dc56ec6dfef3f3253f5100libreoffice-sdk-doc-4.3.7.2-5.el7_2.1.x86_64.rpm4b0723b4a5ef25a8780ff263c767a9b6e00a51dd29748ee8276dae8b94dbd9f7libreoffice-langpack-ru-4.3.7.2-5.el7_2.1.x86_64.rpmb5a7200c7cf500b70a33889a94dd431cdf477e69e9eee1feb46060b041981b11libreoffice-langpack-st-4.3.7.2-5.el7_2.1.x86_64.rpmde29586e731e7d7cff582ea32d4ad416e41e1dc618211863d970246817d3ed61libreoffice-langpack-br-4.3.7.2-5.el7_2.1.x86_64.rpmc0915005ce2f00b9aac54e2fa67765bc47b9d4db49280fd53119c04b8cd469aclibreoffice-langpack-fr-4.3.7.2-5.el7_2.1.x86_64.rpm2a14c567d61ca537c26df2ceadd20fcb7660975f701155538047710cc9153b5blibreoffice-langpack-et-4.3.7.2-5.el7_2.1.x86_64.rpm2d81021277b37c74dbfd8570bc9cbe1bec2aad0458d41d2364907d7a16eea071libreoffice-langpack-uk-4.3.7.2-5.el7_2.1.x86_64.rpmf668fe6a1d14e9bb507cb082b2b4738dbef5fa804d8a82b5d357b6ad56f94e57libreoffice-4.3.7.2-5.el7_2.1.x86_64.rpm7522738d3a8c600c55decee1b7c8da046bfed52409b06f424b51237a7a1cce81autocorr-da-4.3.7.2-5.el7_2.1.noarch.rpmb85bc87bb185da41338baefe0b918a297d4688110061b1954ba648b3807a6796libreoffice-nlpsolver-4.3.7.2-5.el7_2.1.x86_64.rpmf628cdbeb398eea6d4da8ac74e66e5f19f8774f4970bdc7d2f9dca49b15904cblibreoffice-bsh-4.3.7.2-5.el7_2.1.x86_64.rpmf0a677a8fe60b9a15004fa8aa285a2806338f01b3a08bd522f0cccfc75234985libreoffice-librelogo-4.3.7.2-5.el7_2.1.x86_64.rpm3716885462eedbbe75c670e9e351f7698f128adf35504763520c9f1d32f0c2e4libreoffice-headless-4.3.7.2-5.el7_2.1.x86_64.rpmff0f7c636a536313ff273dce0fdae2c7e573382f002c47c83146a2a70fedeb07libreoffice-langpack-lt-4.3.7.2-5.el7_2.1.x86_64.rpmbeeb90d6600adb5dda47a8faa1b79ddd54d76a1dbb662ea9120794d60aa4760bautocorr-es-4.3.7.2-5.el7_2.1.noarch.rpm5734b99ec6d93ce9b29a297e5d43faddc64cea11ccb6388919f25ada3247740clibreoffice-langpack-gl-4.3.7.2-5.el7_2.1.x86_64.rpm10cc26de3aa1574c1cfbc06c98198834a609ae4f007a17daaef3f0379030ce60libreoffice-langpack-mai-4.3.7.2-5.el7_2.1.x86_64.rpm8ba638b39048e4b744f150f4ee25408d5f40b6f9e76e466b9c2fdf96a437e861autocorr-bg-4.3.7.2-5.el7_2.1.noarch.rpmae5af088ec01746c0e77c36c693292914cbdea1c6a2d888e95a934df36603fd6libreoffice-langpack-ca-4.3.7.2-5.el7_2.1.x86_64.rpm1782ba0f551871880ec4530ca5be85d92c07d5f15d1d5d13eb45fbe6cc82c65clibreoffice-calc-4.3.7.2-5.el7_2.1.x86_64.rpm6d608fb82638fc35edaaeb957e7ef016b5c5442d3355ef3239e878681d37e340libreoffice-langpack-hi-4.3.7.2-5.el7_2.1.x86_64.rpmd872d34a3d20a96ea5e74c54272ecc18d223c2183bc9ffc8a6a6db2e2248932bautocorr-sv-4.3.7.2-5.el7_2.1.noarch.rpmdcd4a97e48dd68335e79eed7327b601011dc8039046c3d38f262facaec65c25dlibreoffice-rhino-4.3.7.2-5.el7_2.1.x86_64.rpm86d60d057588cf42c000e850feafc338ba8957af259b9c52811532e30fbd7da9autocorr-sk-4.3.7.2-5.el7_2.1.noarch.rpm6409e9c13968f692e2da57f2e514ce262fbb229d0fcebe8fca1436f3404346feautocorr-vi-4.3.7.2-5.el7_2.1.noarch.rpm9389c0686a6ec5f65266b8b18dd88aa2e68156dc555571b5072a27aba8644047libreoffice-langpack-ts-4.3.7.2-5.el7_2.1.x86_64.rpmbc85f37d12489750fc5e9ecdb4ad36cd58860d2916450d22b209822c375c336dlibreoffice-langpack-es-4.3.7.2-5.el7_2.1.x86_64.rpmb9f2cfdcbad304064693bfa4a2d052fbb0f237b5851da11f3c12020732e36eaflibreoffice-langpack-cy-4.3.7.2-5.el7_2.1.x86_64.rpm4c58ffb8d6ec4ecd8529a12d760080c6ac49685a29e422083036cb9c0d9d6677libreoffice-langpack-xh-4.3.7.2-5.el7_2.1.x86_64.rpm02285d7ab9cbeb467fee31835ab3f26cf39539d7c2ed234b84c27408f2e4f0c8libreoffice-langpack-ar-4.3.7.2-5.el7_2.1.x86_64.rpmec54ab43590bd0578066cdd332371523383e6d303c15749d2ab3cfd9f1cb8ed7libreoffice-langpack-nso-4.3.7.2-5.el7_2.1.x86_64.rpm938c072c0755139ec2087924f9dcbbec47eef04fc005317c3d95641c0cadd179autocorr-is-4.3.7.2-5.el7_2.1.noarch.rpm3fdbfc5d1ff16bcf3bf412f9bcc27ab29dd86a2d84eea118284ac6e917159ae9libreoffice-opensymbol-fonts-4.3.7.2-5.el7_2.1.noarch.rpme2ab2bf5e7c335c6b246e36e5e42217885f46f27efb7f274b9b7a1162e38647aautocorr-ko-4.3.7.2-5.el7_2.1.noarch.rpmbd51d228ae0b7aa7b2c19718aa1475bfbbd7d75d279b27e0147e424fcf4afc0alibreoffice-langpack-kn-4.3.7.2-5.el7_2.1.x86_64.rpm0258103c157577a322fac7c2f4994d033f6621695c884884e301bb8990483f91libreoffice-langpack-pl-4.3.7.2-5.el7_2.1.x86_64.rpmeb58a9ecfcca0c31c85430e808a63682afb663dedfc213a5a8e1199fbfebcab0libreoffice-draw-4.3.7.2-5.el7_2.1.x86_64.rpmd4be327649bf479f7a819a8e137f1d60d475f61907e3aca2858fb7dc320b31aclibreoffice-impress-4.3.7.2-5.el7_2.1.x86_64.rpmcc5c3bb4f3662326844e651bcbcb020692524882d62f3f5cd1a6950bbe645331libreoffice-langpack-ko-4.3.7.2-5.el7_2.1.x86_64.rpm59c29adcf44b68422b7beb1757aa528b235e811d7a093fcf35f40995c71571fclibreoffice-langpack-hu-4.3.7.2-5.el7_2.1.x86_64.rpma1ead4b2b5f077c7fb2519c73a0d20503bad399240954980d573d50d9e6c6f0elibreoffice-langpack-nn-4.3.7.2-5.el7_2.1.x86_64.rpm3f84ff5d40bacb5da624b94445b8f2d56d23633b4ac752a27f281e4bdd41f68fautocorr-cs-4.3.7.2-5.el7_2.1.noarch.rpmbc0d8faef7c3a01884e0ac5d4e19f04cdf9a96ad5ba263c5007cad7e47d0afedlibreoffice-langpack-sk-4.3.7.2-5.el7_2.1.x86_64.rpme5a93894f8f537f0d02fb1e90c8e003cc68a19104e8b88e18ba4d505d140c876libreoffice-emailmerge-4.3.7.2-5.el7_2.1.x86_64.rpme2745e7a7d7b85705f6d85f9189fe3709a7a59f7972cf4a1f0659f9045e31c07libreoffice-pyuno-4.3.7.2-5.el7_2.1.x86_64.rpme9cfd980797a790f466d3ef4f0ceb5db04b3a4cbdef0fda7269948ee568d12f1libreoffice-langpack-lv-4.3.7.2-5.el7_2.1.x86_64.rpm71966b1f8257eb2b0c039ad92f521e3e80bf9131ced5c1ef70b71a0abeef8428autocorr-lt-4.3.7.2-5.el7_2.1.noarch.rpm44a5a6f97812519d4339ab79a36d9d43e2fc41975ebc29d39a24d5c50c9115balibreoffice-writer-4.3.7.2-5.el7_2.1.x86_64.rpme22a363effda7bb221f7ea7c051654a8a3fcb70edb0c592e19e96819a4f7f9c4libreoffice-langpack-fa-4.3.7.2-5.el7_2.1.x86_64.rpmb4e7ca9a8f430063e8c4b031a268e2422f9e594166f3ec5ade4986010be3614blibreoffice-math-4.3.7.2-5.el7_2.1.x86_64.rpm03e20187e01733b0340bcbeebf3d6789889cfea9cf553e1af3e0653461525baaautocorr-sr-4.3.7.2-5.el7_2.1.noarch.rpm120ecae787793f9f253130d77a32e5bf9e3463797f10683d477572ed599131c1autocorr-fr-4.3.7.2-5.el7_2.1.noarch.rpme6c90f4f8d1d7c4743c8ae014bd7599a58f5474ca7ef4bf823686ad4d303afc7libreoffice-langpack-en-4.3.7.2-5.el7_2.1.x86_64.rpm774bd8a05a82ff369b482dd83fe4488add9ff7c9693f0f92943495526c89f733libreoffice-officebean-4.3.7.2-5.el7_2.1.x86_64.rpm624970dc93b004d8b379d9b4ca4d28e030845ed52d0e8414ddacd64f3138666alibreoffice-langpack-da-4.3.7.2-5.el7_2.1.x86_64.rpm1da5df3473fe6d6dfdb7399aec2615d3a6cbcd7b984b4bcd74062b964e353f1alibreoffice-langpack-cs-4.3.7.2-5.el7_2.1.x86_64.rpm6b181dfe35f8ebfdc3da3787b0ab8838efadac6434379594b587a1e4278c7b25libreoffice-langpack-de-4.3.7.2-5.el7_2.1.x86_64.rpm96ed361f5914d7b57c8bc6c152b8c429d0d5d10ca8ff71872dd05dd823b94eeelibreoffice-langpack-sr-4.3.7.2-5.el7_2.1.x86_64.rpm300b50db6f10b70b31d211172348231c418f3c664e4782d08abe644fd0a41231libreoffice-langpack-zh-Hans-4.3.7.2-5.el7_2.1.x86_64.rpmda1687a83fa1cee6d728876a413971bc09024032611e993155298428c15a5334autocorr-pt-4.3.7.2-5.el7_2.1.noarch.rpm4a4042e1264f2724d15d9f8fd48b61db6f0fa459572414552a7ff3c61e9246c9libreoffice-langpack-kk-4.3.7.2-5.el7_2.1.x86_64.rpmc5d40b860e999690217afe6782e6aeb13b90ea7bdd338c09e522652e44499d14libreoffice-langpack-mr-4.3.7.2-5.el7_2.1.x86_64.rpmea499661825f8031e4709ac43a12c5db650da15ecb94db780087378d16083d15libreoffice-langpack-tr-4.3.7.2-5.el7_2.1.x86_64.rpm5b2a6b9ff1d4601ebe9eec9474e8a2e11dd3500622fa1a5701b3a995c7247a23libreoffice-glade-4.3.7.2-5.el7_2.1.x86_64.rpm374663b34f6355f6777ff0fb22927904567bb56a1c2e084414883192085b7e30libreoffice-langpack-ml-4.3.7.2-5.el7_2.1.x86_64.rpm00268b566ab11076c8ddaac8394b8c109f29d8cdaa3dee56ba50f7b1ca6841c7autocorr-hr-4.3.7.2-5.el7_2.1.noarch.rpm5ce0e60d4839e1475ea10c0b86e0cf56cbe87a47a3aac506fe3a88223e066341libreoffice-xsltfilter-4.3.7.2-5.el7_2.1.x86_64.rpm0fe54e5672632d6b95c7720f13f09497b5877ba3f04b5756a3adec5a03f161b0libreoffice-sdk-4.3.7.2-5.el7_2.1.x86_64.rpmace861b89b0a258fd5a7d1cf335f6ac7fc931b426f0b400472064bd0bc4c5f76autocorr-hu-4.3.7.2-5.el7_2.1.noarch.rpmc45fda769db8cc0a2621d26472b38451a751fcc93b05345e097b937150c0cbc0autocorr-lb-4.3.7.2-5.el7_2.1.noarch.rpmee2470ab890296857d9d9f18696aad1ad9e9944a297ced25059ba020867c47dfautocorr-ro-4.3.7.2-5.el7_2.1.noarch.rpm429a1bc932950323a89975ee06612b5d4865efe719684df7f41f95df4cd805d6libreoffice-langpack-bg-4.3.7.2-5.el7_2.1.x86_64.rpmbb8b4bd4471916b65242bc80075231674e6a2e136a725874818d88f734ffd278libreoffice-langpack-pt-BR-4.3.7.2-5.el7_2.1.x86_64.rpm3870de7eac8b09a3d439d37ff7a09433440a088bcae17078559e1e8670e13923libreoffice-ure-4.3.7.2-5.el7_2.1.i686.rpm11ef77beecdaf47e52c1bab2e56ad082c31a9138459fbfa27842c095787f8d84libreoffice-ure-4.3.7.2-5.el7_2.1.x86_64.rpmc30e00fa300f285c37ba1acd11b0927a02885749f42b4739684d8c191e1c36f9libreoffice-langpack-ro-4.3.7.2-5.el7_2.1.x86_64.rpm12fe2e310ab7fa0cb63c957cfb3007d2484a0876575ea201f0ffe1a5e1bda926libreoffice-langpack-el-4.3.7.2-5.el7_2.1.x86_64.rpm6d3008de48bae76ed12be18c45fa1ee189071849d50aa41bdedb60163d57ef79libreoffice-langpack-th-4.3.7.2-5.el7_2.1.x86_64.rpmcbc626340c5372266d86ddc3ca3f1f01f4856862a1fdabd7d54f6c75326030ddautocorr-pl-4.3.7.2-5.el7_2.1.noarch.rpm268be9f1e831babbd3bdfea93833b6cc4dbc92c8f9683734b157e954a8aeebb4autocorr-it-4.3.7.2-5.el7_2.1.noarch.rpm3ed94dc613a355cb73b9b9d8dfd3f11efb357ef59a637c888fa453888df988dblibreoffice-langpack-fi-4.3.7.2-5.el7_2.1.x86_64.rpma8ac4a5b2adad3322600aecdda36303d95d14779084bc4966be2d2d65a41f19fautocorr-fa-4.3.7.2-5.el7_2.1.noarch.rpm969c33d623ee85ac19d744699814666f6db051e122f6fc56550bee1c3888bed3libreoffice-langpack-ve-4.3.7.2-5.el7_2.1.x86_64.rpma5257e49a6254fef534299bab768ce61e2649b640b069add31eafc49922e411clibreoffice-langpack-nl-4.3.7.2-5.el7_2.1.x86_64.rpmc2504cedb74a3f00bede2f2b73b2d647e53d5e7ed038706dd3446251aa1ed1e1libreoffice-filters-4.3.7.2-5.el7_2.1.x86_64.rpm7cbcaeaa7cdcc8701b0874f4c1b78fb9d625a5ac1ae1c39bd87084e3a2838f5eautocorr-tr-4.3.7.2-5.el7_2.1.noarch.rpm26b3845dc802c362ee5f5c738a80e7d8e829b8caec4586f15b1632dc5cbbdc79autocorr-ga-4.3.7.2-5.el7_2.1.noarch.rpm2571324cd277b743383d20e2df4e2be77b272159152c162e6f8625c3959f9863autocorr-en-4.3.7.2-5.el7_2.1.noarch.rpm195477f407896c758ec0ca7f10494a0867776dc01baa4da1154d57ab97becd6clibreoffice-gdb-debug-support-4.3.7.2-5.el7_2.1.x86_64.rpm7796a79514d4d7cd3e7ba63d125fc08057c41db1908455c0c1843d065835672dSLSA-2015:2623-1Grub2A flaw was found in the way the grub2 handled backspace characters entered in username and password prompts. An attacker with access to the system console could use this flaw to bypass grub2 password protection and gain administrative access to the system. (CVE-2015-8370) This update also fixes the following bug: * When upgrading from Scientific Linux 7.1 and earlier, a configured boot password was not correctly migrated to the newly introduced user.cfg configuration files. This could possibly prevent system administrators from changing grub2 configuration during system boot even if they provided the correct password. This update corrects the password migration script and the incorrectly generated user.cfg file.moderateScientific LinuxScientific Linux 7grub2-efi-2.02-0.33.el7_2.x86_64.rpmbeee71fcfa70c7ff61e90fe454bd697e8ce4c9fcaca3dd4ec5612f7d9494714bgrub2-tools-2.02-0.33.el7_2.x86_64.rpm83263e68bd682fc0f6fe7b15395ee20b33a4d0af866ce190b4c1307233c9ff08grub2-efi-modules-2.02-0.33.el7_2.x86_64.rpm28b34494ef1e485e8ffc85922e8d0d3b59654e0a272e7dde70fccd106abe8656grub2-2.02-0.33.el7_2.x86_64.rpm9265570fbff6887e71fe31bb40f254753a5fcb32c01b98a76c3d637b632dc379SLSA-2015:2655-1BindA denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. After installing the update, the BIND daemon (named) will be restarted automatically.importantScientific LinuxScientific Linux 7bind-9.9.4-29.el7_2.1.x86_64.rpm83e1df8675531d3a696a9c172f6f46cf76bb675c823787426169454ba15919fbbind-pkcs11-libs-9.9.4-29.el7_2.1.i686.rpmbcb5f3fa4c984ed3f7e4ffa0d6503aff7d89f37ea20a78f9e28a6362b16f114cbind-libs-lite-9.9.4-29.el7_2.1.i686.rpm741cedb7892ac9f0d39dd499e59337a3f06ced70085bd303dc281e3dcc81f07dbind-pkcs11-devel-9.9.4-29.el7_2.1.x86_64.rpm7e831ef649afeedba9806e9da4ee39469b0748cd5fe0be0fdeace47bed983d47bind-sdb-chroot-9.9.4-29.el7_2.1.x86_64.rpm9cf8c3059ddb102139af0022bb7f6dcc2a8cb2177340f9bfe4387ad27b9a7ec6bind-lite-devel-9.9.4-29.el7_2.1.x86_64.rpm353c9c0beecaa2532ad9f8ff1dddbbdd49aae6bf342a3eeb3e8cb7faa0cc5e33bind-license-9.9.4-29.el7_2.1.noarch.rpmabd419e398e3751fc013662d47d1c21788fc3e5211f1411aaf7c73c0c4be30bcbind-sdb-9.9.4-29.el7_2.1.x86_64.rpma3e3a0d409395e94612b1176fe867c85788c497d676a3b306eeed670137957a6bind-pkcs11-9.9.4-29.el7_2.1.x86_64.rpm839bfed39ec4267f54a8718074cbce65edb701705a70db447f74132e962ece27bind-libs-lite-9.9.4-29.el7_2.1.x86_64.rpm0d548138f5595335dfd6a4f6142208d8eb9fdd5e006aab98eb6bb54092485a22bind-devel-9.9.4-29.el7_2.1.i686.rpm17bd6b815a1886bb618b0de342c07fc97ba33344b255130faef412adc7b7dac7bind-pkcs11-libs-9.9.4-29.el7_2.1.x86_64.rpm09e3c1156d684fef7282168ae0c98f777c237a4db4afe63394bebb2e6d109818bind-chroot-9.9.4-29.el7_2.1.x86_64.rpme9ab38b4f3767cf4c42f89ceb0b64b8fc15d4a0a041b474e80a18dc96396cab6bind-lite-devel-9.9.4-29.el7_2.1.i686.rpmf8d82b88165de829190c7409b7d14ee0fccba3284b13e1ca70792df4beec35f0bind-libs-9.9.4-29.el7_2.1.i686.rpm317ec3d968b2f1d7fe87eb3efdda66bd1f518be7bf8daee7c5aef497c853e672bind-utils-9.9.4-29.el7_2.1.x86_64.rpm9b6b1b4a70a681fac23e0bc5992faaa1e683936dd99f3216504102afba539d5dbind-devel-9.9.4-29.el7_2.1.x86_64.rpm6392ea3ab777455c031699fe740da8e9fa6794b13b7e2caecebb3ed01adbfbd7bind-libs-9.9.4-29.el7_2.1.x86_64.rpmf146d941eeea97af23d7e33c4bf53c574f6c05faba72bb48dcfbc6d15df9da81bind-pkcs11-devel-9.9.4-29.el7_2.1.i686.rpm320c0628d3f3870d9dccdac7e9133062003e3e9ae5e672f2f84d3930d9f8607fbind-pkcs11-utils-9.9.4-29.el7_2.1.x86_64.rpm3f8a096276dc20f46c9ff6a34b16d2f6ceaa2891f87e60f6d3c590e8d67f5c07SLSA-2015:2657-1FirefoxSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-7201, CVE-2015-7205, CVE-2015-7210, CVE-2015-7212, CVE-2015-7213, CVE-2015-7222) A flaw was found in the way Firefox handled content using the 'data:' and 'view-source:' URIs. An attacker could use this flaw to bypass the same- origin policy and read data from cross-site URLs and local files. (CVE-2015-7214) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.5.0-3.el7_2.x86_64.rpme4acda5b46474cca340995fa06f7fb3ad2b72f148da19671fd74e81da32ebe95firefox-38.5.0-3.el7_2.i686.rpm0fd0d737bbe85743dfcf62880ef2b9ff41dca475246a401612a152a6f74b8009SLSA-2016:0001-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-7201, CVE-2015-7205, CVE-2015-7212, CVE-2015-7213) A flaw was found in the way Thunderbird handled content using the 'data:' and 'view-source:' URIs. An attacker could use this flaw to bypass the same-origin policy and read data from cross-site URLs and local files. (CVE-2015-7214) After installing the update, Thunderbird must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7thunderbird-38.5.0-1.el7_2.x86_64.rpm43678d047aa14b6255443159a5c78ba5ff640abcde7a8f947842e44ed514df61SLSA-2016:0005-1RpcbindA use-after-free flaw related to the PMAP_CALLIT operation and TCP/UDP connections was discovered in rpcbind. A remote attacker could possibly exploit this flaw to crash the rpcbind service by performing a series of UDP and TCP calls. (CVE-2015-7236) If the rpcbind service is running, it will be automatically restarted after installing this update.moderateScientific LinuxScientific Linux 7rpcbind-0.2.0-33.el7_2.x86_64.rpm5fe525d47c4428c13f576153374718bc86f5c328a349d564e9b7de21832022fcSLSA-2016:0006-1SambaA denial of service flaw was found in the LDAP server provided by the AD DC in the Samba process daemon. A remote attacker could exploit this flaw by sending a specially crafted packet, which could cause the server to consume an excessive amount of memory and crash. (CVE-2015-7540) Multiple buffer over-read flaws were found in the way Samba handled malformed inputs in certain encodings. An authenticated, remote attacker could possibly use these flaws to disclose portions of the server memory. (CVE-2015-5330) A man-in-the-middle vulnerability was found in the way "connection signing" was implemented by Samba. A remote attacker could use this flaw to downgrade an existing Samba client connection and force the use of plain text. (CVE-2015-5296) A missing access control flaw was found in Samba. A remote, authenticated attacker could use this flaw to view the current snapshot on a Samba share, despite not having DIRECTORY_LIST access rights. (CVE-2015-5299) An access flaw was found in the way Samba verified symbolic links when creating new files on a Samba share. A remote attacker could exploit this flaw to gain access to files outside of Samba's share path. (CVE-2015-5252) After installing this update, the smb service will be restarted automatically.moderateScientific LinuxScientific Linux 7samba-test-libs-4.2.3-11.el7_2.x86_64.rpm03bc5ce3b14ad80bbab8c98799a3358464e6891cd2c56be2254f78e797235458samba-dc-libs-4.2.3-11.el7_2.x86_64.rpmab6b79a3f045baf3b4016520f2fb5499647b84272c5fabfaa4d6d6098bddc8a4samba-devel-4.2.3-11.el7_2.x86_64.rpma06d3acc2d8ab96a211bd444f264de32c0b5a4f666338c9f7fbd95b1c7e45f92samba-test-devel-4.2.3-11.el7_2.x86_64.rpm71e6e088fdad659bbe3302ae86078be537b8f537ac8c23415ad70bca639f0558samba-winbind-modules-4.2.3-11.el7_2.i686.rpm399ae5100e75d10c43d2ef2bd4a3c1de055722537a9a30d342f603523e5c6557samba-test-4.2.3-11.el7_2.x86_64.rpme92dd34b11099f484932ee6354e98e1d7fb0faa1ed342857a12fdcaa78a5f99csamba-client-libs-4.2.3-11.el7_2.i686.rpm2a0039669b84c4aa34f6bee9fa110bf3d721ad62eaf689067109ec9f9793d461libwbclient-4.2.3-11.el7_2.i686.rpm3da64e426560a302c7623034d794ea73493fdc042da8d41f57a915966986ec27samba-4.2.3-11.el7_2.x86_64.rpm71ee201b2c98913d454036639816e192c2154bb4624c6150f35893a4eec4cfaalibsmbclient-4.2.3-11.el7_2.i686.rpm945ae5e34c020c6e167d4ae35dd672acd8b56e078024ed73607038e5f12a9a21samba-libs-4.2.3-11.el7_2.i686.rpm2357772e01476bbeb2b6e0bf77cb9c4442daa17f1b54711fbf8011374a7f3d05samba-winbind-clients-4.2.3-11.el7_2.x86_64.rpm55db415fc49ad5c6a4db5d2b6ac39826ff7f6a590f4a459c2eb8e2f0101cfc6fsamba-client-libs-4.2.3-11.el7_2.x86_64.rpm013c2342986affab9ffc0d7f232173e5720e2cbefd60e2993c4f49f22b36e4f7samba-winbind-modules-4.2.3-11.el7_2.x86_64.rpm6a263cd104c0f865ce5b5bc9c36f8d76d688c59c9b5e85d6ff3fcbe9b3af7ecflibsmbclient-4.2.3-11.el7_2.x86_64.rpmbaa436bcca187f0a604b6bc9d32415203e19d1de1331f91ae1d3ae19cdcd89c9ctdb-devel-4.2.3-11.el7_2.i686.rpmffbad5b2495d697da2da3ebf32e5b06ee87a1220b20406d0faec52073468935bctdb-4.2.3-11.el7_2.x86_64.rpmd8ee21c4d30dd570a5b9a5519fc13cf37eda5b7a6412008d1730ffd9ba0aa960samba-test-libs-4.2.3-11.el7_2.i686.rpm71f2289ed5f575a1eea50c018208e2070d58a9dd952484643199e6badb18fa32samba-common-tools-4.2.3-11.el7_2.x86_64.rpma7fbab90a5886095225e6abd5556e32fccca00af09abbfd1fed9a9dbd6ef697bctdb-devel-4.2.3-11.el7_2.x86_64.rpm6cf15eead667a2ee0703968a7e83c8d8a781e842f35fa9515a15c4e7ab2c2d23libwbclient-devel-4.2.3-11.el7_2.x86_64.rpm64a68b86abe7feb80161fa8764c8f4a3882d82d73eed96ab5daa743c1687bbfcsamba-client-4.2.3-11.el7_2.x86_64.rpmade56132973d1a15578151191374990cc1ec34c6922420d7c111e9e89da8ef34libwbclient-4.2.3-11.el7_2.x86_64.rpma4c7f1fa6a8d1eca9f229d65852893beab5de7753fab55f33f6d87ee9db9b699samba-common-4.2.3-11.el7_2.noarch.rpm8a1888091133b575b3da4398884264fd792aed4c4626d1dbd25331dde6be545asamba-winbind-krb5-locator-4.2.3-11.el7_2.x86_64.rpm9b29df36998199947781ba520f69fde3814e7982371598c34bf9cf2645edff9cctdb-tests-4.2.3-11.el7_2.x86_64.rpm9d89094b9230fa734f1266f53a66265a149b5e1bdc026fdaa77264f4916d1c2asamba-pidl-4.2.3-11.el7_2.noarch.rpm1c20aa8ef16cf7246e539618fc2bb08fc09a8bb5db52a18cead6f879d949696flibwbclient-devel-4.2.3-11.el7_2.i686.rpm776e9f1e9444762e0cabf1d6bc0215eb1b5163c2dafe332b8a815de6b801d000libsmbclient-devel-4.2.3-11.el7_2.x86_64.rpm22d6e614f17cf9429fbeb0500c497acabec751b369509937c8a1413224da32f8libsmbclient-devel-4.2.3-11.el7_2.i686.rpm2873c3383bcc382b65f5a4dbd470e96e433ea522d69a3a432606ce34e238f33asamba-vfs-glusterfs-4.2.3-11.el7_2.x86_64.rpm8fc97cdbe3c0e8c8bb39b6cbd10531cb80ce650c2a1a37a083c8a7e17c00c4a3samba-dc-4.2.3-11.el7_2.x86_64.rpmce960b11e34ff9f11edbbb56275b501f29cb387666bb940c21db01bdd11d14c9samba-libs-4.2.3-11.el7_2.x86_64.rpma58e6ba629e2b816b7fb07ef7d2c08bea476618562a48e14a35be59ab2bca78dsamba-devel-4.2.3-11.el7_2.i686.rpme001b21bdee801dca563d2b904da401f5cb1f74835c394ac693ff566e6d3f699samba-winbind-4.2.3-11.el7_2.x86_64.rpm5bc62eceb86772a6e3ccc452839d6644cb634f6c8f53946294f15634bc05acd0samba-python-4.2.3-11.el7_2.x86_64.rpm9d739a67522bf070452041b264e8c36157f09cf7ce9e6608f98274e371085d76samba-common-libs-4.2.3-11.el7_2.x86_64.rpm670bff2c346f8fab4f601f5ba32f28a42f7451e2763d1f56ca8a294bf22464daSLSA-2016:0007-1NssA flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) For the update to take effect, all services linked to the NSS library must be restarted, or the system rebooted.moderateScientific LinuxtrueScientific Linux 7nss-sysinit-3.19.1-19.el7_2.x86_64.rpm2ca13ee6eb2206717c95c83d1df76817853111455743eb73678378e93772b83dnss-3.19.1-19.el7_2.x86_64.rpmf5ac6cd653134c3ae35655b18ba0009d0566b90e0ee10028685aa7e455a73b6bnss-tools-3.19.1-19.el7_2.x86_64.rpm13122672e2b9a2a1c6ff1f95ea35539d125e9f12461aba5137822d3921bb2b9fnss-devel-3.19.1-19.el7_2.i686.rpm55b3325933d37d9ee79aa83b2703576747dfa1663eea64c8e4eb36482260e118nss-pkcs11-devel-3.19.1-19.el7_2.i686.rpmc6fa92cb9a919fcdabdbe46bc0130a38a4f1419e4bce7aedbf32a290fe6a8cc8nss-3.19.1-19.el7_2.i686.rpm35628966dba40e1cab8352cc91b213e02719fa8654714af09e1d088b792e8c56nss-devel-3.19.1-19.el7_2.x86_64.rpmdd47c8d73a27cb862645147d45e6e8dfba4f83d98ee5b4e5e5f0c59c2a2978e1nss-pkcs11-devel-3.19.1-19.el7_2.x86_64.rpm97b69381d8ad5dc7a8662a27907a9035847030d7bbe431beca48c45cb045d76aSLSA-2016:0008-1OpensslA flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.moderateScientific LinuxtrueScientific Linux 7openssl-devel-1.0.1e-51.el7_2.2.i686.rpm48133ff6002863fcbe72ab9ad8e94dad328bcc5f01d3e04223c288ac36f051fcopenssl-libs-1.0.1e-51.el7_2.2.x86_64.rpm75cfdb8f3b01d4b83a21daac834cc2607ab3279acd12d2b49c06d6535e98a6caopenssl-perl-1.0.1e-51.el7_2.2.x86_64.rpm567e32ce1e8a63ec664f015e9542702b19aa48502a84b4796c12218c5b87d57dopenssl-1.0.1e-51.el7_2.2.x86_64.rpm6047fb4dcd27ce15bbc26878057f1546e4fcde71b5a0e9de9e3c85821b69ecb1openssl-static-1.0.1e-51.el7_2.2.i686.rpm4b5c1caa8c68b5fd93192dc569eaf5bffa86d8f714f06a2ca61fd13db8d9f7ecopenssl-devel-1.0.1e-51.el7_2.2.x86_64.rpm240f07ca2c762e79a15a73bcdee97a3daee8afe3767846e8f0eb88fd71bea282openssl-static-1.0.1e-51.el7_2.2.x86_64.rpm0b4852c33d4414a45c3b873aeb95212a93832ee44bdbaf02e169f4f23d396e7eopenssl-libs-1.0.1e-51.el7_2.2.i686.rpm050f1d3868dc3cc828b97b4bb3a2172e003fb5b748317e0abeec022fc0eeebafSLSA-2016:0009-1LibldbA denial of service flaw was found in the ldb_wildcard_compare() function of libldb. A remote attacker could send a specially crafted packet that, when processed by an application using libldb (for example the AD LDAP server in Samba), would cause that application to consume an excessive amount of memory and crash. (CVE-2015-3223) A memory-read flaw was found in the way the libldb library processed LDB DN records with a null byte. An authenticated, remote attacker could use this flaw to read heap-memory pages from the server. (CVE-2015-5330)moderateScientific LinuxScientific Linux 7libldb-devel-1.1.20-1.el7_2.2.i686.rpm1a3ed799925ec0112e65babf30a161c1ad93ce2ae4924112ed15c0c20b381d2clibldb-1.1.20-1.el7_2.2.i686.rpmee0380bee18e603b72ff0482fb57f630d5878272c0f876cb823911b11f295681pyldb-1.1.20-1.el7_2.2.i686.rpm662981ab949a28b9f70ff686bc5a9d47c2d3e9973efacfffac0f49c2d7596494libldb-1.1.20-1.el7_2.2.x86_64.rpmd3cbc6ac50fa00e6471d0f2fe6e3a11091d01964b39cfabfafdac390a702c53clibldb-devel-1.1.20-1.el7_2.2.x86_64.rpmd27fce6bd11c9008f85fdb91da889886ea30729286b9f97111f8386a5dc84640pyldb-1.1.20-1.el7_2.2.x86_64.rpm76cde86bae9a4b1dd951ff2d309c39d894f1cddd276f4574efb052156be3aecbpyldb-devel-1.1.20-1.el7_2.2.x86_64.rpm606321fc7c8c5ae834f15185441580f980e02e458397180a20ea0ad7687d2c22ldb-tools-1.1.20-1.el7_2.2.x86_64.rpm87fea4963bb4f563a5965a669a0a203e39d8bfc0e1eb294e0ec056df36116f91pyldb-devel-1.1.20-1.el7_2.2.i686.rpm2df73c126475670b2d1168926ecde176c5b98c8385a3a5ca276af54ddbb40ca6SLSA-2016:0012-1GnutlsA flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) For the update to take effect, all applications linked to the GnuTLS library must be restarted.moderateScientific LinuxtrueScientific Linux 7gnutls-dane-3.3.8-14.el7_2.i686.rpm5142c66a4e95bbb08d8d17a1c4a144ab987dad867f35894b0574f6e7c60efa77gnutls-3.3.8-14.el7_2.x86_64.rpm4e9c0b87b321258a06569b8d4c47b165f99dbadb1076486947c7de71e45c08e0gnutls-c++-3.3.8-14.el7_2.x86_64.rpm3f43f6353954764f668894d51670f144a1546ea72d8b50ad74457892f574cab5gnutls-dane-3.3.8-14.el7_2.x86_64.rpm59017fc0d219d3a62367acb3335adbfe834a34cbc49080f12851492e33439346gnutls-utils-3.3.8-14.el7_2.x86_64.rpmf932b3899bbe2453e4667c1ef3cf75aed844ab271cd9c38577c81e9a36f5e673gnutls-devel-3.3.8-14.el7_2.i686.rpm6307b98c35bb54cf45b0ad7ec6589fc15ca03ee0942e23345031990bf96c31degnutls-devel-3.3.8-14.el7_2.x86_64.rpmd5caa707fef6e1ffc762f4582ec581e72f554e8d68eaf9bad35aca5dd379af12gnutls-3.3.8-14.el7_2.i686.rpmb53e6d745a29ce2ed3e498d79fc42224060a4fb534546e99b52a3d7c43fbe824gnutls-c++-3.3.8-14.el7_2.i686.rpm25ada5aeb7a23ea906f13f6e2120f12035eb9330f72e99f9d7ddc52c4fcdebfcSLSA-2016:0043-1OpensshAn information leak flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory (possibly including private SSH keys) of a successfully authenticated OpenSSH client. (CVE-2016-0777) A buffer overflow flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to execute arbitrary code on a successfully authenticated OpenSSH client if that client used certain non-default configuration options. (CVE-2016-0778) After installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.moderateScientific LinuxScientific Linux 7openssh-clients-6.6.1p1-23.el7_2.x86_64.rpmf253800cea4a070168ea08d867c965fe4162d756970e5ce24ac851de4152ce89openssh-server-6.6.1p1-23.el7_2.x86_64.rpm14f217991d14626da9f9c6f30be068b82e50fff7b003729d1b04c0239662d23copenssh-6.6.1p1-23.el7_2.x86_64.rpm986b0b1c7714899aa0df42362fc5c087a064014069826fdee5a1acd6e4e7f8e2openssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm7b52b3b31bd231dcb0b3f2b17eeff19b6f80fdd253ef66cb07ceb80ba590b7e2pam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm71502302ab64ee9fe975b6f41cfe2afdff7e9be09c5c2867f1626daf40928d74openssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm6b1792446c86fd3f61cce3d477e703944c1112e79507e39f1fb8ae13154336c1pam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm3b37123c8f82cb9da72e2f5f571e92186b855893b9186f081415c9ec06ada3a8openssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm090ad5a65812bdcb7db8d0613d5468f8b3992814e1333e03f1c667502031dd6aopenssh-keycat-6.6.1p1-23.el7_2.x86_64.rpmc1c395448568dc60297040695ab373af7e150f86492f91bffe07b9c042c6b48dSLSA-2016:0049-1Java-1.8.0-OpenjdkAn out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) It was discovered that the password-based encryption (PBE) implementation in the Libraries component in OpenJDK used an incorrect key length. This could, in certain cases, lead to generation of keys that were weaker than expected. (CVE-2016-0475) It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) Multiple flaws were discovered in the Networking and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-0402, CVE-2016-0448) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. All running instances of OpenJDK Java must be restarted for the update to take effect.criticalScientific LinuxtrueScientific Linux 7java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm6f07f712fdd3ab029778ab94280a12f1cededd3a4c36b7d76ac7d5bd20c4ea32java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2.noarch.rpme9df390930deea29f2b0494b294d00fe3b847fe40287b1cd093911abd8ccc248java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2.x86_64.rpmf8eef359e57c4452699a85252d703ccde64d226ebb5ea95c6ecb390b3eb10cfejava-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2.x86_64.rpmbc0bc7ed210213ea9630f7df96e51b66c6009ed148b7c659c922fad3a817916bjava-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm98e769a7d906a1eb7a31a34351c84b61fd7be9378153049d3cf7a7c555d9b24djava-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2.x86_64.rpm812f0e5785d94cbd42368553c1b234206809bd6911175699125b4f41bb1bb6cajava-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.x86_64.rpm5a20a21f74b919ccb215867b0132835908f2eb1f74ebf4615802dfda21b5d134java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2.x86_64.rpmb5f1f35b94faf7ecd9fa7b399a6f6eb95a72f08cd6a5430e5f3e38213ebf5f75java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2.x86_64.rpmc2dcf9515f0821146869c65a0494bd06cfb6f2ace2a6dbc4dc29338d2bdb5cf7java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2.x86_64.rpm0ebf588a28bff0b061285c9c5e7e7f712493ccd2442db8dea1304eebe954070ajava-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm5b9d33813a7d4b74284348580d17b9a047ea7534c5f41f3158b2b199e2dace27java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm1a0ab9231c26189cfabeb376e54b7a83241fbf3f665f3ca854e906595711e2a4java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2.noarch.rpm7154746fe0c9a2409bfb4f024aa391e3a26eefd62da5e8a04f79d0655efe33a2java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2.x86_64.rpm9afc3842a32f4cfbc9a55574d828606e39a2e5a8b0b710156e7adce01967f03bSLSA-2016:0054-1Java-1.7.0-OpenjdkAn out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) Multiple flaws were discovered in the Libraries, Networking, and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4871, CVE-2016-0402, CVE-2016-0448) Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. All running instances of OpenJDK Java must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2.x86_64.rpm2360048af30ad32a5220e092b03a8d845e80e03109907434e4fc6cd94e66b08djava-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2.x86_64.rpmc8064d4c6a5d8cdfc43c501f4b73dd9fa77d63d7e665bc86abd4625b0e343f64java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2.x86_64.rpmc17ec80c0c0352a16bd57aa955b2fff9c77c541101459707153d96343cd39af9java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2.x86_64.rpmb460438e34fe0be615ecdd93743998ad648773d964934e5ab31e26b3fa490a77java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2.x86_64.rpma145e045c98e6f2293ec221c01f8c907c82aa1f1f40e32ddd132bca3411e4e39java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2.x86_64.rpmb96fb2eff4572ad4421f6a1b5c327cb7c796c057dd8451cbc62bde98330fa69fjava-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2.noarch.rpme029815d331aac92132e9a577d4c58546181f37bc11fa7a8d20f6b96ec668766SLSA-2016:0063-1NtpIt was discovered that ntpd as a client did not correctly check the originate timestamp in received packets. A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client. (CVE-2015-8138) After installing the update, the ntpd daemon will restart automatically.importantScientific LinuxScientific Linux 7ntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm0e81604fad06a39ec95add007651f4de39f121f3f12ba092990bec00fa5a791entpdate-4.2.6p5-22.el7_2.1.x86_64.rpmb737b18fbedb18fb8627cd83438b3d1911da440a524c432d27cdc504c5c3cd15sntp-4.2.6p5-22.el7_2.1.x86_64.rpma9e19517615376f6d7344fb96454a7f1e2a2646314aadf58308c1ba8085b7c74ntp-4.2.6p5-22.el7_2.1.x86_64.rpmd4a049aedac2673157d10d4cc5c59eb32adea8231e2cc309dbd6b3d543f38e48ntp-doc-4.2.6p5-22.el7_2.1.noarch.rpmafd96dea8e1a8e9f2dceb4cf79ebcd34518751e155c2ca1f611986001742903aSLSA-2016:0064-1Kernel* A use-after-free flaw was found in the way the Linux kernel's key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2016-0728, Important) The system must be rebooted for this update to take effect.importantScientific LinuxtrueScientific Linux 7kernel-tools-libs-3.10.0-327.4.5.el7.x86_64.rpme57ee34748d4a9c0a6366dc5b2fe0b3eecbcbd8952e6ce9824909de2a79bd8d0kernel-debug-devel-3.10.0-327.4.5.el7.x86_64.rpma1823ccb22d369c088b3dcebdf58f3733b31e895cb620af101cba8ffa24ecd28kernel-tools-3.10.0-327.4.5.el7.x86_64.rpmf013a9b514873364df2054f326a3ea8cbd2d5ef234b04c90760d6916f443e11fkernel-debug-3.10.0-327.4.5.el7.x86_64.rpmcca774f5e42d319dbba312e9e03c47b7898fb64e4724b1b00705af253f76a727kernel-tools-libs-devel-3.10.0-327.4.5.el7.x86_64.rpmb3c9f250ff37af48411caea56091e968574e23da331ab3ad8ce19f5fbb34e0d5kernel-doc-3.10.0-327.4.5.el7.noarch.rpm19d331f753eae36ecf126100e467006dd317178c97aae74367b65c1b985dcaecperf-3.10.0-327.4.5.el7.x86_64.rpm932da44e216d6b6ce80dc0d2785804438279912e7890b206078516b4efb2b75akernel-abi-whitelists-3.10.0-327.4.5.el7.noarch.rpm4e8bce137d7a0ec94a6ecd2e952035af796baa0709513ccd26e670cd97bca664kernel-headers-3.10.0-327.4.5.el7.x86_64.rpm9d50a7ec26e02fbb217ce424ee920a7889f761e3de0a45764d0a3d3946f19873kernel-3.10.0-327.4.5.el7.x86_64.rpm4f9989ffd007e21ef1469b36e9204646d848b18e7d82b0c12b660d92fd6317bdpython-perf-3.10.0-327.4.5.el7.x86_64.rpma9a5ada5f11855b094d696fddb8e363b5f75355bca8f37b1d8bfa4e28ef4244bkernel-devel-3.10.0-327.4.5.el7.x86_64.rpm93b2b37a7d2b66f6a1943581bad31aabf1ddfc1dfb3ae367e10fa7c8ea50f663SLSA-2016:0067-1Java-1.6.0-OpenjdkAn out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) Multiple flaws were discovered in the Networking and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-0402, CVE-2016-0448) Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. All running instances of OpenJDK Java must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el7_2.x86_64.rpm4de0b0cf19558e842460467446aa66dbd428f5d93c44574014a00b6fb772abcfjava-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el7_2.x86_64.rpmfccdb7d04258a5b25db60ad08429c7c14dac3d191a0e27a2e88b11181ed1e39fjava-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2.x86_64.rpm6cf13852bd930c6ceae93d4fbc75cd1878769828a9771c812018ddcbeba16d89java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el7_2.x86_64.rpm767b957bef0146c3858da033bdc69039aec278cd79327f44a5e8541d6e340767java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el7_2.x86_64.rpm46212997c8a4dfb0a499adc1a98f2982b973725e2eee6f755a96bc9f01540cbeSLSA-2016:0071-1FirefoxSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1930, CVE-2016-1935) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.6.0-1.el7_2.i686.rpm221b0fef5f001aaf6c3d74d42fa57d1e91703cbca06ed35ef4bc42cda954433dfirefox-38.6.0-1.el7_2.x86_64.rpm967f18769149dd68a3f5a21bb003a1eb2d54469a2b47f15479a41cd76018998fSLSA-2016:0073-1BindA denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash. (CVE-2015-8704) After installing the update, the BIND daemon (named) will be restarted automatically.moderateScientific LinuxScientific Linux 7bind-libs-9.9.4-29.el7_2.2.i686.rpm54c878e9076ca2efd7bf148db45dea4fe8805bd5f8b2bcec570866de73c42d43bind-chroot-9.9.4-29.el7_2.2.x86_64.rpm6b5479555cf5192408fd2a5dd956bd680149c0b6c80e2dd6eb2f2230c9ce0a60bind-9.9.4-29.el7_2.2.x86_64.rpmf27bbef0beed3f6b264da3f5935c7ba19e62462ee9086629304f10d0b14f019cbind-pkcs11-devel-9.9.4-29.el7_2.2.i686.rpm4f69654317343aa44c85d6ae7fd67e66c92de9664b65a0d2e76b73f9ff099fc8bind-pkcs11-devel-9.9.4-29.el7_2.2.x86_64.rpm42cdf2f6552f347a1365d390c6fe0a606ea1062f9bbd5ec808d94c15d3589d58bind-sdb-chroot-9.9.4-29.el7_2.2.x86_64.rpmd0fabb666ce90fffe3e4abcfe982706b3db3403948f07fe7e931a5a4ac88ba8bbind-libs-9.9.4-29.el7_2.2.x86_64.rpm13834493ae5413bffdb87a57236a0796e2ea2bb970715cbd2ce9fc1b2af3f550bind-lite-devel-9.9.4-29.el7_2.2.x86_64.rpm26dc3062c0b698b43057c40ca6eb78e6c82a307223109bb05301101972894019bind-pkcs11-9.9.4-29.el7_2.2.x86_64.rpmaaf6a0195bc1725a41fd9075d1615d47a084dbe439116d8c0a5df141d40ba136bind-devel-9.9.4-29.el7_2.2.i686.rpma251807f283513a2250867a27518cd93c4010e57ea4ed8d999320fb0ae6a8abbbind-devel-9.9.4-29.el7_2.2.x86_64.rpmfddfc0197f09dd6c73a2ad504d64141009a9516093b452b72c38620d91b79508bind-pkcs11-utils-9.9.4-29.el7_2.2.x86_64.rpma2f65e9ff818ce349ba5d838b119596dfdd81067d54bfb59ee1da72b8d0f88a6bind-utils-9.9.4-29.el7_2.2.x86_64.rpm56c0680a8a970a8ce4b7fa0fd2f1a52966a171b9501b8374493a2073668665b9bind-license-9.9.4-29.el7_2.2.noarch.rpmc57fbfb34739eb4a687e28ec4fd522138b428758942522563bdfb23c2fa37af9bind-lite-devel-9.9.4-29.el7_2.2.i686.rpmbb36a14fc8853d7afdc344c2789b0b3653e8c54a69dac31531db0a1fed668a91bind-sdb-9.9.4-29.el7_2.2.x86_64.rpma5757dfc0b8d2456b816cc8ca90dc6fa1f2c5c942dba58ef29c586113760f3e5bind-pkcs11-libs-9.9.4-29.el7_2.2.i686.rpm5db942bfcd8a62618324c48d675cc228e21b49d66e81ab7466664094f995aa5cbind-libs-lite-9.9.4-29.el7_2.2.x86_64.rpmd91a1a5402c787a021848896dabb384bd4944e412410e8c34e3e78e5fceeee32bind-pkcs11-libs-9.9.4-29.el7_2.2.x86_64.rpmcf1861d14a8aedc0d7a3f7e96c8db1082d7bf56f55b2217108ab5aad5d4b3734bind-libs-lite-9.9.4-29.el7_2.2.i686.rpm783bbd0fb7e8ac755f534d5f809be7f9d00271ba9bc2dfa353e18e9f2602a450SLSA-2016:0083-1Qemu-KvmAn out-of-bounds read/write flaw was discovered in the way QEMU's Firmware Configuration device emulation processed certain firmware configurations. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance or, potentially, execute arbitrary code on the host with privileges of the QEMU process. (CVE-2016-1714) This update also fixes the following bugs: * Incorrect handling of the last sector of an image file could trigger an assertion failure in qemu-img. This update changes the handling of the last sector, and no assertion failure occurs. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.importantScientific LinuxScientific Linux 7libcacard-1.5.3-105.el7_2.3.x86_64.rpmc306af338d268ac3245cf8d795b36fa674c71bd580da435fd7e4738d3e096859libcacard-tools-1.5.3-105.el7_2.3.x86_64.rpm48b583906470080d6378859517cf81390ffa7ebe1e92662bcbd6d39afab61548libcacard-devel-1.5.3-105.el7_2.3.x86_64.rpmdef736bec400629e30b7835ed15a1e8c82a7bd9670466e7c73aeb788404d1ba6qemu-kvm-1.5.3-105.el7_2.3.x86_64.rpmedba00f8a9a5b1903c33f8c787a537b38ad26fcd4456c701c95a0d7fe1d19968libcacard-1.5.3-105.el7_2.3.i686.rpm230eee66083ab4da53a7e4c2431f17da6057f2735f80a8e02b3027cb6f42208aqemu-img-1.5.3-105.el7_2.3.x86_64.rpm49c0ef9373ea7f5b07c81ebb55fecc3d3b05e8ed213d44f1434a798076523f93qemu-kvm-tools-1.5.3-105.el7_2.3.x86_64.rpm2431f487cd3d0767e8225d552b7baf529e2ecf49559523096a49204157aec8c9qemu-kvm-common-1.5.3-105.el7_2.3.x86_64.rpmbc7568c878a8e09a70400dbb14ef7397c912a1bf1dd1ec1b8cb5ec3b6285b410libcacard-devel-1.5.3-105.el7_2.3.i686.rpmb8f11c93ba6fc0268b1838da177bb65021d0823729657e39964f38ab6f5b7454SLSA-2016:0176-1GlibcA stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module. (CVE-2015-7547) It was discovered that the calloc implementation in glibc could return memory areas which contain non-zero bytes. This could result in unexpected application behavior such as hangs or crashes. (CVE-2015-5229) This update also fixes the following bugs: * The existing implementation of the "free" function causes all memory pools beyond the first to return freed memory directly to the operating system as quickly as possible. This can result in performance degradation when the rate of free calls is very high. The first memory pool (the main pool) does provide a method to rate limit the returns via M_TRIM_THRESHOLD, but this method is not available to subsequent memory pools. With this update, the M_TRIM_THRESHOLD method is extended to apply to all memory pools, which improves performance for threads with very high amounts of free calls and limits the number of "madvise" system calls. The change also increases the total transient memory usage by processes because the trim threshold must be reached before memory can be freed. To return to the previous behavior, you can either set M_TRIM_THRESHOLD using the "mallopt" function, or set the MALLOC_TRIM_THRESHOLD environment variable to 0. * On the little-endian variant of 64-bit IBM Power Systems (ppc64le), a bug in the dynamic loader could cause applications compiled with profiling enabled to fail to start with the error "monstartup: out of memory". The bug has been corrected and applications compiled for profiling now start correctly.criticalScientific LinuxScientific Linux 7glibc-2.17-106.el7_2.4.x86_64.rpm9b73f1b48aab63c4339fcbf11feaacedd65f5c137b78a845d0f64356b31c6446nscd-2.17-106.el7_2.4.x86_64.rpmd51f0234cafd2f76c2053a834a87ab8a143fd88eae654c8cb5d699fd894c6082glibc-devel-2.17-106.el7_2.4.i686.rpmfd0456c25566a6697194bfa82b84aeb8e6e0b420b2f6542d3c111e09861c0a8cglibc-2.17-106.el7_2.4.i686.rpm78dfaf71ae239757e929b1c224384b9688b930ee04c6d3e403b8468cca3dc72aglibc-common-2.17-106.el7_2.4.x86_64.rpm393929472219c87d8a4fcd0ff421021e30c45dcb6db48b0b1131cd9b586dab8aglibc-static-2.17-106.el7_2.4.i686.rpmfbabc752bdf35bceb009889399eabe831a2ac97f4d81b1c59623098b165f88e9glibc-headers-2.17-106.el7_2.4.x86_64.rpm93cf31f57be6da3538b490bda48e340c8ff29bafe394a03ae8fb8ec2bb358fd5glibc-static-2.17-106.el7_2.4.x86_64.rpm9154c254ac8a177087ff4061128480118d01f60f1b721f9e48f07e55ef775946glibc-utils-2.17-106.el7_2.4.x86_64.rpm8ecceae6fafee7555886e8cafdd5d7b70df53a6b319762e44691db7e27cf194dglibc-devel-2.17-106.el7_2.4.x86_64.rpmf05dd5f583572a3b85a7e60f1d31e24adabea40c03b23ffbfc0c76e2a53c14d3SLSA-2016:0185-1Kernel* It was found that the Linux kernel's keys subsystem did not correctly garbage collect uninstantiated keyrings. A local attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-7872, Important) * A flaw was found in the way the Linux kernel handled IRET faults during the processing of NMIs. An unprivileged, local user could use this flaw to crash the system or, potentially (although highly unlikely), escalate their privileges on the system. (CVE-2015-5157, Moderate) This update also fixes the following bugs: * Previously, processing packets with a lot of different IPv6 source addresses caused the kernel to return warnings concerning soft-lockups due to high lock contention and latency increase. With this update, lock contention is reduced by backing off concurrent waiting threads on the lock. As a result, the kernel no longer issues warnings in the described scenario. * Prior to this update, block device readahead was artificially limited. As a consequence, the read performance was poor, especially on RAID devices. Now, per-device readahead limits are used for each device instead of a global limit. As a result, read performance has improved, especially on RAID devices. * After injecting an EEH error, the host was previously not recovering and observing I/O hangs in HTX tool logs. This update makes sure that when one or both of EEH_STATE_MMIO_ACTIVE and EEH_STATE_MMIO_ENABLED flags is marked in the PE state, the PE's IO path is regarded as enabled as well. As a result, the host no longer hangs and recovers as expected. * The genwqe device driver was previously using the GFP_ATOMIC flag for allocating consecutive memory pages from the kernel's atomic memory pool, even in non-atomic situations. This could lead to allocation failures during memory pressure. With this update, the genwqe driver's memory allocations use the GFP_KERNEL flag, and the driver can allocate memory even during memory pressure situations. * The nx842 co-processor for IBM Power Systems could in some circumstances provide invalid data due to a data corruption bug during uncompression. With this update, all compression and uncompression calls to the nx842 co- processor contain a cyclic redundancy check (CRC) flag, which forces all compression and uncompression operations to check data integrity and prevents the co-processor from providing corrupted data. * A failed "updatepp" operation on the little-endian variant of IBM Power Systems could previously cause a wrong hash value to be used for the next hash insert operation in the page table. This could result in a missing hash pte update or invalidate operation, potentially causing memory corruption. With this update, the hash value is always recalculated after a failed "updatepp" operation, avoiding memory corruption. * Large Receive Offload (LRO) flag disabling was not being propagated downwards from above devices in vlan and bond hierarchy, breaking the flow of traffic. This problem has been fixed and LRO flags now propagate correctly. * Due to rounding errors in the CPU frequency of the intel_pstate driver, the CPU frequency never reached the value requested by the user. A kernel patch has been applied to fix these rounding errors. * When running several containers (up to 100), reports of hung tasks were previously reported. This update fixes the AB-BA deadlock in the dm_destroy() function, and the hung reports no longer occur. The system must be rebooted for this update to take effect.importantScientific LinuxtrueScientific Linux 7kernel-3.10.0-327.10.1.el7.x86_64.rpm0fe3b27738c063db242cee970a9cf9f9f3b38c76ad77eb1a9d3885bf35058543perf-3.10.0-327.10.1.el7.x86_64.rpm3fa858402c3b7b1bd657b1cf494edde6f993e1457e7efb5cb07fcc1dd24267f2kernel-debug-3.10.0-327.10.1.el7.x86_64.rpmfc9fb7e7afbfcfbf46b89ed70740ceb202a5d585056cca1af12260c1f912d3e7kernel-devel-3.10.0-327.10.1.el7.x86_64.rpma9d352ccbbf7a78af3ce1b65749fd69f13869be8ab5a5ab8fb91cbb392cdb34dkernel-tools-libs-3.10.0-327.10.1.el7.x86_64.rpm760217929f0f82a7c559ae5714d3c3a4626f48987a603e34a59f3eda8099d8fapython-perf-3.10.0-327.10.1.el7.x86_64.rpm0064ff6c587eeaa507b462643e0abde5d4edcaac4048736fd917dc0e5ae0387ckernel-abi-whitelists-3.10.0-327.10.1.el7.noarch.rpm4e3d76fb937cd5c9667b666beffe72116c19d4baebb4fa53f732a2b637aafb40kernel-debug-devel-3.10.0-327.10.1.el7.x86_64.rpm337e88bd64f4bd48a9efa4cf328a855e636899f936c24d5d817296ea6ae050ddkernel-tools-3.10.0-327.10.1.el7.x86_64.rpme0fad38c9f70eb8f19c088a455e66c1dae798ef51cd9e8aabc11690515f4fa44kernel-doc-3.10.0-327.10.1.el7.noarch.rpmf9115fcf7805cf26ed3b4260004d169899a0217189a451269a24b369cbd72055kernel-tools-libs-devel-3.10.0-327.10.1.el7.x86_64.rpmfc94c91a37aea7685e09120e549cf3b600399fbc38c1087463ae53cdf08574b7kernel-headers-3.10.0-327.10.1.el7.x86_64.rpmfee4e9370e692a179dd3f4805c42c7a5a44c9fa1639bf9b71e24ca1e50ebc591SLSA-2016:0188-1SosAn insecure temporary file use flaw was found in the way sos created certain sosreport files. A local attacker could possibly use this flaw to perform a symbolic link attack to reveal the contents of sosreport files, or in some cases modify arbitrary files and escalate their privileges on the system. (CVE-2015-7529) This update also fixes the following bug: * Previously, the sosreport tool was not collecting the /var/lib/ceph and /var/run/ceph directories when run with the ceph plug-in enabled, causing the generated sosreport archive to miss vital troubleshooting information about ceph. With this update, the ceph plug-in for sosreport collects these directories, and the generated report contains more useful information.moderateScientific LinuxScientific Linux 7sos-3.2-35.el7_2.3.noarch.rpm2230af0b96815103abe088c3c52d51be1e47d9393c805c62946d347a9d7d3fa1SLSA-2016:0189-1PolkitA denial of service flaw was found in how polkit handled authorization requests. A local, unprivileged user could send malicious requests to polkit, which could then cause the polkit daemon to corrupt its memory and crash. (CVE-2015-3256) The system must be rebooted for this update to take effect.moderateScientific LinuxtrueScientific Linux 7polkit-docs-0.112-6.el7_2.noarch.rpm7e967b8df63ebd26e51a16b5fb06a422be26d4f54d67cd244c5775c880c78592polkit-devel-0.112-6.el7_2.i686.rpm592b8d6aaa3deac3d4fda67e91c3268936b1cedb276aba182d6f26a64eb2f408polkit-0.112-6.el7_2.x86_64.rpmf3f0c8da5f3987da756293fb329a7f0adfc3f50fafb6fe91e344da617640fed4polkit-devel-0.112-6.el7_2.x86_64.rpm312f6ba7fe07b76b031bbef07d20f89da807f0af36d20087e7238009c729dea1polkit-0.112-6.el7_2.i686.rpm4737fc1bcbf6472313414d4a22fea38d243979eff20f419b80ef4815ccdea232SLSA-2016:0197-1FirefoxMultiple security flaws were found in the graphite2 font library shipped with Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1521, CVE-2016-1522, CVE-2016-1523) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.6.1-1.el7_2.x86_64.rpmdc08181b145f3e89be7b1763edf922c2f68196d34c4964c6ab237e502f9e2492firefox-38.6.1-1.el7_2.i686.rpmb78664a1f86a097cb96d04e4af00ba2168e49c3b03af1923bba47aa9621998feSLSA-2016:0204-1389-Ds-BaseAn infinite-loop vulnerability was discovered in the 389 directory server, where the server failed to correctly handle unexpectedly closed client connections. A remote attacker able to connect to the server could use this flaw to make the directory server consume an excessive amount of CPU and stop accepting connections (denial of service). (CVE-2016-0741) This update fixes the following bugs: * Previously, if a simple paged results search failed in the back end, the simple paged results slot was not released. Consequently, the simple paged results slots in a connection object could be accumulated. With this update, the simple paged results slot is released correctly when a search fails, and unused simple paged results slots are no longer left in a connection object. * Previously, when several values of the same attribute were deleted using the ldapmodify command, and at least one of them was added again during the same operation, the equality index was not updated. As a consequence, an exact search for the re-added attribute value did not return the entry. The logic of the index code has been modified to update the index if at least one of the values in the entry changes, and the exact search for the re-added attribute value now returns the correct entry. * Prior to this update, when the cleanAllRUV task was running, a bogus attrlist_replace error message was logged repeatedly due to a memory corruption. With this update, the appropriate memory copy function memmove is used, which fixes the memory corruption. As a result, the error messages are no longer logged in this scenario. * To fix a simple paged results bug, an exclusive lock on a connection was previously added. This consequently caused a self deadlock in a particular case. With this update, the exclusive lock on a connection has been changed to the re-entrant type, and the self deadlock no longer occurs. * Previously, an unnecessary lock was sometimes acquired on a connection object, which could consequently cause a deadlock. A patch has been applied to remove the unnecessary locking, and the deadlock no longer occurs. After installing this update, the 389 server service will be restarted automatically.importantScientific LinuxScientific Linux 7389-ds-base-libs-1.3.4.0-26.el7_2.x86_64.rpmb5531b1c33d16017bbcdd124a8319283993d7aec36bccb35cf2d22ef268dd395389-ds-base-devel-1.3.4.0-26.el7_2.x86_64.rpmfd214c9ffbaea18fec80be5aedead535d99f28e96b1b62e2a60c24137a94bba8389-ds-base-1.3.4.0-26.el7_2.x86_64.rpm6f17fbb0de8e345725c57943020ced3b764aadcafe7279cc8ba9c487d2288844SLSA-2016:0258-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1930, CVE-2016-1935) After installing the update, Thunderbird must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7thunderbird-38.6.0-1.el7_2.x86_64.rpmbe5753497886dcc50dbdb4567dc94ed7d17f6dd52b41b67979f5294ef3bface3SLSA-2016:0301-1OpensslA padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. This cross-protocol attack is publicly referred to as DROWN. (CVE-2016-0800) A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that have been disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. (CVE-2015-3197) A side-channel attack was found that makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture. An attacker who has the ability to control code in a thread running on the same hyper-threaded core as the victim's thread that is performing decryption, could use this flaw to recover RSA private keys. (CVE-2016-0702) A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash. (CVE-2016-0705) An integer overflow flaw, leading to a NULL pointer dereference or a heap- based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code. (CVE-2016-0797) For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.importantScientific LinuxtrueScientific Linux 7openssl-libs-1.0.1e-51.el7_2.4.x86_64.rpmf860344bb0172cb399191695a0a071b15875dab349985ce5b281ad05e6297d29openssl-perl-1.0.1e-51.el7_2.4.x86_64.rpm8b028f3ec82f5ff80a856a16dcfd6f5ef85210cfd0e7ebac2837874bbf3d0d5copenssl-libs-1.0.1e-51.el7_2.4.i686.rpmd0398bc829ea160458fbe6cba703d157d7aeb74aa3406c812afbd1c7cdfb828copenssl-devel-1.0.1e-51.el7_2.4.x86_64.rpmdb9f9715d20b805cf010422d5dc85fb645cd5eae2a5401988dc25a31c5ee3ba7openssl-static-1.0.1e-51.el7_2.4.i686.rpm73687e91885ddb0f9c96ac4ed03df6e92a4129dc2d5624db62c095cd432de43eopenssl-devel-1.0.1e-51.el7_2.4.i686.rpm75581efb5cfd8cc7bb2ab57d9fe2f23ae630fa1656575835158a309b8c083851openssl-1.0.1e-51.el7_2.4.x86_64.rpm0843d1de797a996ebd49ef59bfe8ecf8e67e34ac3021c1348d82ea17f515e20aopenssl-static-1.0.1e-51.el7_2.4.x86_64.rpm900c78f4a6a967e35189d4a256df074bf1c1883780e5fd7add7e991ebbdf08b9SLSA-2016:0346-1PostgresqlAn integer overflow flaw, leading to a heap-based buffer overflow, was found in the PostgreSQL handling code for regular expressions. A remote attacker could use a specially crafted regular expression to cause PostgreSQL to crash or possibly execute arbitrary code. (CVE-2016-0773) If the postgresql service is running, it will be automatically restarted after installing this update.importantScientific LinuxScientific Linux 7postgresql-plpython-9.2.15-1.el7_2.x86_64.rpm287f490657f80427405109693855b8d7916eb7f437dac6a68efe889ca9e18215postgresql-plperl-9.2.15-1.el7_2.x86_64.rpm2d639591b0e4b93b5941a39f46be286b141410943c74980a5dd7ee5ff6ee307fpostgresql-server-9.2.15-1.el7_2.x86_64.rpm7505cf709f325510102d3729c186cddc2c396eeb1f8231ea957efd5d2aa0a6f2postgresql-test-9.2.15-1.el7_2.x86_64.rpm9b70010a28fc5cec068cb877797774f66a323301bda84c6df50a3be74f1ba1e6postgresql-contrib-9.2.15-1.el7_2.x86_64.rpm7343e9c9fd73c78f343dab4b65855046213ba921ee93f5171eef660fb4473f6fpostgresql-9.2.15-1.el7_2.i686.rpmaf8390a2969ed094c4041d71c24db8e7df009f39548de30bd6a4e93ce488cbd5postgresql-9.2.15-1.el7_2.x86_64.rpm386e0d370bd668d222c73ade34ebf5a8e3e25b300faa1ecb926f25c4981ee2a1postgresql-devel-9.2.15-1.el7_2.x86_64.rpm19b055cca3442157497ea49803fb68b91ec63df4d2c54f7b2b52cf2a3cf33e8fpostgresql-docs-9.2.15-1.el7_2.x86_64.rpm5af664c45499db69c1ceafa9414a9de6d6a10b82bc3deec53a6d7f12f8fdeeabpostgresql-pltcl-9.2.15-1.el7_2.x86_64.rpmfaefd5b9c68d21f504bf3305a1382503ea5515a902407ae3edea7404b5c4ab0apostgresql-devel-9.2.15-1.el7_2.i686.rpmaf6e38fb32f264a388c15c3dd14f85d52e8ba4894261dae8d58267a85ed585b9postgresql-upgrade-9.2.15-1.el7_2.x86_64.rpmc23de557cbefe21203815eff561bd1b3ed0280a454cc2f14eaf28506cc7ffeadpostgresql-libs-9.2.15-1.el7_2.i686.rpmb474568f28902bdee9679cb8138593597aa7f639607161dad6a66d80cb543c7apostgresql-libs-9.2.15-1.el7_2.x86_64.rpmc913be1ee1611211ecde904b1d82f40f7444381a16654a987bcc773bc093fe14SLSA-2016:0370-1Nss-UtilA heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2016-1950) For the update to take effect, all applications linked to the nss and nss- util library must be restarted, or the system rebooted.criticalScientific LinuxtrueScientific Linux 7nss-util-devel-3.19.1-9.el7_2.i686.rpmf0f033ae198ac42e6cb2af50387a69a15d5876ec5ea9d45d87ec315c59d8df8bnss-util-3.19.1-9.el7_2.x86_64.rpm0e9bb69662d165d08bda9dfe20912cf89ee578c3ff57a461d8eb1fdb083c86canss-util-devel-3.19.1-9.el7_2.x86_64.rpmd2b0b49b00620e83ee9259ccf2b8e0894da6f4629a6970f6b2bf8a1879289320nss-util-3.19.1-9.el7_2.i686.rpmfbd9a82d5ee35a0bb4283c67e11c3d71f509f4b251cf0f224e76fc5e83dd57a0SLSA-2016:0372-1Openssl098EA padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. This cross-protocol attack is publicly referred to as DROWN. (CVE-2016-0800) It was discovered that the SSLv2 servers using OpenSSL accepted SSLv2 connection handshakes that indicated non-zero clear key length for non- export cipher suites. An attacker could use this flaw to decrypt recorded SSLv2 sessions with the server by using it as a decryption oracle.(CVE-2016-0703) It was discovered that the SSLv2 protocol implementation in OpenSSL did not properly implement the Bleichenbacher protection for export cipher suites. An attacker could use a SSLv2 server using OpenSSL as a Bleichenbacher oracle. (CVE-2016-0704) Note: The CVE-2016-0703 and CVE-2016-0704 issues could allow for more efficient exploitation of the CVE-2016-0800 issue via the DROWN attack. A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. A remote attacker could use this flaw to cause a TLS/SSL server using OpenSSL to exit on a failed assertion if it had both the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293) A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that have been disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. (CVE-2015-3197) For the update to take effect, all services linked to the openssl098e library must be restarted, or the system rebooted.importantScientific LinuxtrueScientific Linux 7openssl098e-0.9.8e-29.el7_2.3.x86_64.rpmb828e85c2ef68986b60491926435a82078f3fe7259fb9ebeecef337dadf174f2openssl098e-0.9.8e-29.el7_2.3.i686.rpmce3fafbf8d231d2b0981810d705c3cea815fd15d1dacfb4ed69aae54df77b623SLSA-2016:0373-1FirefoxSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1952, CVE-2016-1954, CVE-2016-1957, CVE-2016-1958, CVE-2016-1960, CVE-2016-1961, CVE-2016-1962, CVE-2016-1973, CVE-2016-1974, CVE-2016-1964, CVE-2016-1965, CVE-2016-1966) Multiple security flaws were found in the graphite2 font library shipped with Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802) After installing the update, Firefox must be restarted for the changes to take effect.criticalScientific LinuxtrueScientific Linux 7firefox-38.7.0-1.el7_2.x86_64.rpm0e759b86c693060a68826d23746ea887291a12ca39f8590c1418efbd58a8836ffirefox-38.7.0-1.el7_2.i686.rpm6d6b5fcd3d22171a098f695699815d5da5df0f42a36b663744f13ea3891673efSLSA-2016:0428-1Libssh2A type confusion issue was found in the way libssh2 generated ephemeral secrets for the diffie-hellman-group1 and diffie-hellman-group14 key exchange methods. This would cause an SSHv2 Diffie-Hellman handshake to use significantly less secure random parameters. (CVE-2016-0787) After installing these updated packages, all running applications using libssh2 must be restarted for this update to take effect.moderateScientific LinuxtrueScientific Linux 7libssh2-devel-1.4.3-10.el7_2.1.i686.rpm3e89a0d673c1e017e6aa8c78bedae2e629243d4f4f3f803847dc897ecf21f001libssh2-docs-1.4.3-10.el7_2.1.noarch.rpm51e429cf887c54de82745a9093a1bde7969c5c48db9776329b1c33ccc9f69b05libssh2-1.4.3-10.el7_2.1.i686.rpm3bc909bd14b4e2bf742739c68471752403aa7d9e0385b0d8b36ff03cad1a1fa4libssh2-1.4.3-10.el7_2.1.x86_64.rpm6e1ed5e725ecd4af411cb2eac5cd58201f54373d2169ab9a20bbede1ed1ea885libssh2-devel-1.4.3-10.el7_2.1.x86_64.rpm4bcc3f6abfbd21f0e25208d99231ce34a013ed532a73a5f2c4866b6f9432858aSLSA-2016:0430-1Xerces-CIt was discovered that the Xerces-C XML parser did not properly process certain XML input. By providing specially crafted XML data to an application using Xerces-C for XML processing, a remote attacker could exploit this flaw to cause an application crash or, possibly, execute arbitrary code with the privileges of the application. (CVE-2016-0729) After installing the update, all applications using Xerces-C must be restarted for the update to take effect.importantScientific LinuxtrueScientific Linux 7xerces-c-devel-3.1.1-8.el7_2.x86_64.rpm7073e640226a84270175d4b4188e97980246de4a8601f98101aea7718dc46a8fxerces-c-doc-3.1.1-8.el7_2.noarch.rpm0b71ad93bc0ffca6ee54cc98a21deaeb3c83a054a09e9d993b0371bf28463768xerces-c-devel-3.1.1-8.el7_2.i686.rpmd62b3bedbde313384e5888a22ec3e660d45dcb71bb99b41e04c0cfb298404562xerces-c-3.1.1-8.el7_2.x86_64.rpmd666c91db489aa6ebf264b0a18cf3577b68fa7c07e203655e2f2380ee7fa4395xerces-c-3.1.1-8.el7_2.i686.rpmd589732895765185250be2c775602e2ee19260eaa8f5e57081a743f35de8ef76SLSA-2016:0448-1SambaA flaw was found in the way Samba handled ACLs on symbolic links. An authenticated user could use this flaw to gain access to an arbitrary file or directory by overwriting its ACL. (CVE-2015-7560) After installing this update, the smb service will be restarted automatically.moderateScientific LinuxScientific Linux 7samba-client-libs-4.2.3-12.el7_2.i686.rpme7709e733bddb686be3c135d73faa326a48a28ec4c2c2e571a75da6b09fea7afctdb-devel-4.2.3-12.el7_2.x86_64.rpm2c5f038bf4d5f7a6151f88bbacdae287cf79b2e3dd1610997e549bb09b2c0528samba-4.2.3-12.el7_2.x86_64.rpm28c5ccac77053079be0980f2cd6548afe112e1f73450000e0bc9b7ea420b87a9samba-client-libs-4.2.3-12.el7_2.x86_64.rpm60a089e93c1b522a0bb6ea5425d4f076ea914a35a1f1849be0958e17c621aaf1samba-libs-4.2.3-12.el7_2.x86_64.rpmc300183ee3473affeb91f392521e701dfe0d80fac3091e4a2716f49b6fc217e0samba-dc-libs-4.2.3-12.el7_2.x86_64.rpm843e7c592815ee749ef20445e320e6add4e3a5635046f1d947191f8780b24230libwbclient-4.2.3-12.el7_2.i686.rpm8ca0d736148b6ed875693888c8398fc6abd5b2c707dfd0f2991415e72c292aadsamba-libs-4.2.3-12.el7_2.i686.rpm032891eb90f6829f772fcbcf1a168d82acc242b591d9b666329bf364a57a2623samba-devel-4.2.3-12.el7_2.x86_64.rpmc2103180ffef88552fdb9709a9b98b950930194d3e934df02e7f5c12086c271dlibwbclient-devel-4.2.3-12.el7_2.x86_64.rpm5e58fe0d420d73c1e8f5b78e1241a2946e14fb6a24b366e3e2c01c37b268787bctdb-tests-4.2.3-12.el7_2.x86_64.rpm84fdbdcc5125d17c23f50d89f6c83538738e3f8f452ebdab5548f55229978270samba-test-libs-4.2.3-12.el7_2.x86_64.rpmd61be316f060a7bc50ef745a12e39dab233f59fafacf9752e8808090027de08csamba-common-tools-4.2.3-12.el7_2.x86_64.rpme23e7c0c44aeeb1066312c93155ab5c9bb711840a278dfa4f689689d03604491samba-winbind-modules-4.2.3-12.el7_2.i686.rpme15c79c2499b9ff0a96d7af350158acfe85f5c925077344e45b6406e7a281568libsmbclient-devel-4.2.3-12.el7_2.x86_64.rpm47eae0fe56c90fe92d87bc30f299034173a4e55ce6b00f57e04e2468eab671dbsamba-test-libs-4.2.3-12.el7_2.i686.rpme16fbc23e34d9ba5c1a3d7121351015acd43aa9d9bf5e737f744b484ceaf4191libwbclient-4.2.3-12.el7_2.x86_64.rpmea1b1d9a547b32020e8b22c501290cc99acdfc4e6889f3bddd2953d0fe5bbdb3libsmbclient-devel-4.2.3-12.el7_2.i686.rpmf8e9c2f1bca0906ed2141e237d8d8a9123728f7022166922bd0b68885bd68a3esamba-python-4.2.3-12.el7_2.x86_64.rpm4c7755ad2799ab1b1942d572c0f3a78b70cd7313152327835857fffe98096df0libsmbclient-4.2.3-12.el7_2.i686.rpmcf338081d55a703791a42cc486a25a73fa98378ef1ad94c165d6e366d38b26b4samba-winbind-krb5-locator-4.2.3-12.el7_2.x86_64.rpm813b138e0655cb6f8b8ef387c19a7a9293d9302300d8f152cd30318f4203c24dsamba-winbind-clients-4.2.3-12.el7_2.x86_64.rpm7d236dfe6fba0e69dece866504a1840f410d9f5eb9f618945d7260c0b1c6ae40samba-dc-4.2.3-12.el7_2.x86_64.rpmf7c4ebfef2e18ca99bb46e551ada24d0d5ffc38e4f72a82a202301cdb0ce26a4samba-common-libs-4.2.3-12.el7_2.x86_64.rpm1c4c2ab5ece968037acfea79fc4420ff041b661eb60ed6860f19980eecd5fb12samba-common-4.2.3-12.el7_2.noarch.rpmbb3f47122dbe5c188dfbad3f00fecea104d0faa3ea11030d605cf1d79363d1e8libsmbclient-4.2.3-12.el7_2.x86_64.rpm03b378bee192c6f425007d26331961eb3e7c137a0c3591ebe330e5720cb75ce2samba-pidl-4.2.3-12.el7_2.noarch.rpm6d2ec10514ceea3db4938572af49603f25ae5bec6ebd4aa0d1c1afa3901b1416samba-vfs-glusterfs-4.2.3-12.el7_2.x86_64.rpmaf1065f9bae8b17934686a03a74edfb7449baab8a9bf427902cf2496b1a553bfsamba-winbind-modules-4.2.3-12.el7_2.x86_64.rpm04d71a25941ea96c70b4216b1c808fbea09c6543692ee1d14195c6aa36f40e49ctdb-devel-4.2.3-12.el7_2.i686.rpm4e67cb176c9db55c35f07e043922a0cf1f4d3e851020b24562ac53c510b1fb39samba-devel-4.2.3-12.el7_2.i686.rpm450ccbd2e30f988a973acd05949aa19ec25c8ef2f88a1a4c0e78aabfce255509samba-test-devel-4.2.3-12.el7_2.x86_64.rpm9383fc2ffecb4c91c755101b275f3b34c68c6a511c0201736a48c7bb2748844flibwbclient-devel-4.2.3-12.el7_2.i686.rpmf6a22b04b2cd429494121fc60d35de939d16522f9845383f40e6b32aeb5d7d05samba-test-4.2.3-12.el7_2.x86_64.rpmdb6b2e77bd5fda778439f80c20552cddfdd646a5d4c83caaed0640a56b619e4esamba-winbind-4.2.3-12.el7_2.x86_64.rpm58aedb8be5c6510c8b2d8793956e4d398f18e23e871e62b64c7e089a18306f59ctdb-4.2.3-12.el7_2.x86_64.rpm593d6c58b79ea1ccaa4652d12ab80daa548f0947dc025449d8c9824125ff11d1samba-client-4.2.3-12.el7_2.x86_64.rpm3b6c6f2c82015e2ef7538afbab6d51a0d13b5f6d86032000f255511bd74eadbbSLSA-2016:0459-1BindA denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. (CVE-2016-1286) A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. (CVE-2016-1285) After installing the update, the BIND daemon (named) will be restarted automatically.importantScientific LinuxScientific Linux 7bind-libs-9.9.4-29.el7_2.3.x86_64.rpma2482e397395f1a59207d41ccedbe84220d955636e031fd78a96078043b95593bind-libs-9.9.4-29.el7_2.3.i686.rpmf6f31cc8564777144202832935a05a7b0679759ff68a5ab9ee985192e74d0835bind-devel-9.9.4-29.el7_2.3.i686.rpmfc990cff06930b62d7d0cf066c93348e02ebab0b406069d2738c70530d49f96cbind-sdb-9.9.4-29.el7_2.3.x86_64.rpmdea95ece054410abb1f4ff0bc3f5d11fc7633c45891c56cc6a4499585c5c9815bind-lite-devel-9.9.4-29.el7_2.3.x86_64.rpm405dcf0743f98a8886a8ff36406f7ecb6a76b8727a53987815b2658d73cbefd5bind-devel-9.9.4-29.el7_2.3.x86_64.rpm627a1718398691afb524bfced714e3ce7452f816ffe55dc22b63e405133a58a0bind-pkcs11-utils-9.9.4-29.el7_2.3.x86_64.rpm8b62679eb60c2ad635e7a19417f3bd940593a0b3df2cd4c3f3ad6586167b40f1bind-lite-devel-9.9.4-29.el7_2.3.i686.rpma145ffde7a072082202e89c87b0368d60242fb729045d0b733747b0d64c2e816bind-9.9.4-29.el7_2.3.x86_64.rpmfb9725cb3f251068da1a15b34c41af13ea4bcc79ffdf6d4392e1f1139cc9d44bbind-pkcs11-libs-9.9.4-29.el7_2.3.i686.rpma6833654e9e98b1594a49e7b75d45f1c104768fb9d215191c8f48b698d1bb7b1bind-pkcs11-devel-9.9.4-29.el7_2.3.i686.rpm2847d91fa85782ff906300d4242685e4fb6cbbdb4d75f639d94e0940fdabc37dbind-sdb-chroot-9.9.4-29.el7_2.3.x86_64.rpm5689d840c00f9d3e6dfc9140b625235460e0e517839ebb8e237fa2bee0d800adbind-libs-lite-9.9.4-29.el7_2.3.x86_64.rpm61d62a45cf5f2dba257dcae99e43411cc9c609eba0d9c989aa69ec50318d3b9ebind-chroot-9.9.4-29.el7_2.3.x86_64.rpm40bee98c110fe28e77b0f39e4651236a8b9390668a1ecfff2a1ef9cb92c42596bind-pkcs11-libs-9.9.4-29.el7_2.3.x86_64.rpm457da863c71953708aed2eaefbd56f677619d5cce6dc7b5b4991ee1e37df0deabind-license-9.9.4-29.el7_2.3.noarch.rpmaf1ea348b025df59b6c254493b13b009fd4691fe1fbcc4849e6826ed9b82b733bind-libs-lite-9.9.4-29.el7_2.3.i686.rpme905b3152884d4dbc47aa80075f7d1b83a9954c9dd4a41751aaa22f590795802bind-utils-9.9.4-29.el7_2.3.x86_64.rpmbb737402e32abc1af47de9a6d70f2087fe40e60e3f38c30ddb692f6308abc1c8bind-pkcs11-9.9.4-29.el7_2.3.x86_64.rpmf92c12310ae5fff7c05709853a69c5d8535e16670b8eed5def99c97a350f9785bind-pkcs11-devel-9.9.4-29.el7_2.3.x86_64.rpm01eeff743524fc83c28a1686d6447c5f08dd6a3ecc7b49334ab0f5d1dcc5e170SLSA-2016:0460-1ThunderbirdSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1952, CVE-2016-1954, CVE-2016-1957, CVE-2016-1960, CVE-2016-1961, CVE-2016-1974, CVE-2016-1964, CVE-2016-1966) Multiple security flaws were found in the graphite2 font library shipped with Thunderbird. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802) After installing the update, Thunderbird must be restarted for the changes to take effect.importantScientific LinuxtrueScientific Linux 7thunderbird-38.7.0-1.el7_2.x86_64.rpm769e5d94bbbe2693fece85c36ad1df7f1fafae106d27cb43bee615cc0ab841d4SLSA-2016:0465-1OpensshIt was discovered that the OpenSSH server did not sanitize data received in requests to enable X11 forwarding. An authenticated client with restricted SSH access could possibly use this flaw to bypass intended restrictions. (CVE-2016-3115) An access flaw was discovered in OpenSSH; the OpenSSH client did not correctly handle failures to generate authentication cookies for untrusted X11 forwarding. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2016-1908) After installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.moderateScientific LinuxScientific Linux 7openssh-server-sysvinit-6.6.1p1-25.el7_2.x86_64.rpm2692838d9d74842c0c0f2a28f6ddb783210f7f79bd54b4916a2475c303c1d6cdopenssh-keycat-6.6.1p1-25.el7_2.x86_64.rpm8f42ec8ff21e470a87ab317ef901060ac1f1ca1b6784a8793715c89a23f07377openssh-clients-6.6.1p1-25.el7_2.x86_64.rpm04418d3f6f71d7266a9b9b47b7f4566132b38de2443eba19f3744d1a8e0dc824pam_ssh_agent_auth-0.9.3-9.25.el7_2.x86_64.rpm21459b9d29e4241c5470612de06ee22e2e46123eac193b0753a5abd1a44dbb48pam_ssh_agent_auth-0.9.3-9.25.el7_2.i686.rpmd3707216dad453b1b364dca94669164611c988dc41563396b0153f77636c9550openssh-server-6.6.1p1-25.el7_2.x86_64.rpm65cc29ad2edb9a9584b6975cfaa8f7e1fad503b7b753ce7de873070c27ba04b8openssh-6.6.1p1-25.el7_2.x86_64.rpmbc28371abcd896cfd929e2fa9e440c8efb7d53bd87483c6e89f45be1b133a50aopenssh-askpass-6.6.1p1-25.el7_2.x86_64.rpm52c6385365effb793a137e2bcba1198deab32de1ebae19aac9fa9c7012c6d853openssh-ldap-6.6.1p1-25.el7_2.x86_64.rpm1da6d194ee680ea93eedbab1900711acb14cc0544f9c6a5b983ab434ac166537SLSA-2016:0496-1GitAn integer truncation flaw and an integer overflow flaw, both leading to a heap-based buffer overflow, were found in the way Git processed certain path information. A remote attacker could create a specially crafted Git repository that would cause a Git client or server to crash or, possibly, execute arbitrary code. (CVE-2016-2315, CVE-2016-2324)importantScientific LinuxScientific Linux 7perl-Git-SVN-1.8.3.1-6.el7_2.1.noarch.rpm45f34251c1c6f1dbd7f23a0f50ecc8b3ddc4b4a68e26199ee864b8a227c825e7git-p4-1.8.3.1-6.el7_2.1.noarch.rpm956a1d80ac49ddbfb35aad769d908de0e16a5c02e3f5af84984f303a5d7f99bdperl-Git-1.8.3.1-6.el7_2.1.noarch.rpmfc48c412559734233698ded920e355b26bbec1946e7a751dc5516b82eda0ec77git-bzr-1.8.3.1-6.el7_2.1.noarch.rpme4e5c040d1c185c6f8a38af8c96a167675430c14d2703214620866e8e761c336git-gui-1.8.3.1-6.el7_2.1.noarch.rpm0132063cef0c60a58e5582643e6e6222df6c4c4b7c0e4287a161df8e7668be09gitweb-1.8.3.1-6.el7_2.1.noarch.rpmb2e6f3ee7b01b70937bffa50eee9de883e823102b201999369763826ed4f5302git-hg-1.8.3.1-6.el7_2.1.noarch.rpm3a9539d160e13f038b217518274245363f4a34010d1cd4f7a90615169aa2784agit-svn-1.8.3.1-6.el7_2.1.x86_64.rpm01702dc0ec592db885a08d25494df405394eefe5e65e532cac2c5fbfa7999bbcgit-cvs-1.8.3.1-6.el7_2.1.noarch.rpm5f1e86accc69035913a63a4fb8675438d3a2dc95f7737c1911b59392b2eaeed9emacs-git-el-1.8.3.1-6.el7_2.1.noarch.rpm2381f59644fdc232ccaadddcd8f7363fb91e7fdcc6cba70c4006f76a0e8c4176emacs-git-1.8.3.1-6.el7_2.1.noarch.rpm290d53fb7eea2a796a19daf54e8543f25946450e99b22c0dcd0b209dd452c40cgit-all-1.8.3.1-6.el7_2.1.noarch.rpma771effab82abec35763b2efec6d99f0b71155096bafbc8dd157bcb698ad6770git-email-1.8.3.1-6.el7_2.1.noarch.rpm2d1f9e308a3b1b23ab5d1b74be86fa9b1f2b5a1c688139e3bb82380ae0ec3138gitk-1.8.3.1-6.el7_2.1.noarch.rpm6850f5b868b9fbe2eb292795c22e323f6deb99cff19b024857ce97f2ab5229c4git-daemon-1.8.3.1-6.el7_2.1.x86_64.rpm7788272a94239d1f81310b41832b11ed7b2672b35c993c903747191ab4831bb8git-1.8.3.1-6.el7_2.1.x86_64.rpmb4778ab11263c32b66b1c44a3275cdd004a6af567de307c440f66c321de96977SLSA-2016:0512-1Java-1.7.0-OpenjdkSecurity Fix(es): * An improper type safety check was discovered in the Hotspot component. An untrusted Java application or applet could use this flaw to bypass Java Sandbox restrictions. (CVE-2016-0636)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-accessibility-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm59a4e2af3633605629c711d32427982e069cc85dad91a1fd9e232fccf638b67fjava-1.7.0-openjdk-demo-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm6a15adff27b1950af7d34f71bfddb3151d33783233c3b8c93df999f4bcbe6ebdjava-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm05f6602826689ab79c983a970e267a2e7c8b122e33793e2854743ccb766c4278java-1.7.0-openjdk-javadoc-1.7.0.99-2.6.5.0.el7_2.noarch.rpm7baac06f2000b38a60bfb901b6301e57d65c362f9776e47c87828032921d59acjava-1.7.0-openjdk-devel-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm4f0f33bbe5a2bd3223d619df07c21f917c998b40dab870561d01ee2d3a2628a2java-1.7.0-openjdk-src-1.7.0.99-2.6.5.0.el7_2.x86_64.rpmf97f7d935a119e88db2929f1e49e54f25d2107cd85413637a1cbb5e302589c30java-1.7.0-openjdk-headless-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm9fcdf92a91d0ec81f901e2e6a74af0a9f577ab5cd72e67db83b2c964bbf320b6SLSA-2016:0513-1Java-1.8.0-OpenjdkSecurity Fix(es): * An improper type safety check was discovered in the Hotspot component. An untrusted Java application or applet could use this flaw to bypass Java Sandbox restrictions. (CVE-2016-0636)criticalScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-debug-1.8.0.77-0.b03.el7_2.x86_64.rpmcba7e38472eaa51879cec44da09c9a1e44b602abc09faa20a4522f4044c20d78java-1.8.0-openjdk-src-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm73b505613c41bcea634679dbbbccc748ba27c6e90a1ba3afbd8e8297bb7d328ejava-1.8.0-openjdk-javadoc-1.8.0.77-0.b03.el7_2.noarch.rpm65190817eb968c8bcfb45b87b1bc177883bb33b8cf27441b2b0a217212549acejava-1.8.0-openjdk-accessibility-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm58f9effdd48eb84be2ea3fcced33f55f480b183815add4f170e405fecca3e2fcjava-1.8.0-openjdk-demo-1.8.0.77-0.b03.el7_2.x86_64.rpmd9d2bee278546f481e3be031e4a818dc375f0b1d8113e6d7595d90c4cc21513bjava-1.8.0-openjdk-devel-debug-1.8.0.77-0.b03.el7_2.x86_64.rpmac9a0d9ef6deb32be79411d5aa7b332e810aed239bc1b5e58cff83f28d2c6283java-1.8.0-openjdk-accessibility-1.8.0.77-0.b03.el7_2.x86_64.rpm1622a330d543205984426e8f7ef2a4431ba18d209b2cd12d09b6e2afdc44a57fjava-1.8.0-openjdk-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm163f13228914245c9d6438bc24970849d6fd4e6a5a8d7e91850b83d7e6daabd3java-1.8.0-openjdk-javadoc-debug-1.8.0.77-0.b03.el7_2.noarch.rpmb9bd0753d87b63915f72e9d3885e93bbdfe80d8778023d4f88be318a65525dc8java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.x86_64.rpm6b5bbeab2e8776b6b336d67b1e41069487fac0b7fe406831c8bbcf09fa93f340java-1.8.0-openjdk-demo-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm23f545b282cc8f7ba25a87734e1ed81bdd7ba07ecb34afd9bbc351ff4911e762java-1.8.0-openjdk-devel-1.8.0.77-0.b03.el7_2.x86_64.rpm5070366bb1b283dbd863e8c7fa0c8e618318d1d91abf957d6d18e1181aba100fjava-1.8.0-openjdk-headless-1.8.0.77-0.b03.el7_2.x86_64.rpm482857174b7375a058408c6b9890721abb098e4b9ffbfce76000b8e51f84fee5java-1.8.0-openjdk-src-1.8.0.77-0.b03.el7_2.x86_64.rpmb83434bd40e29fe93fe3925f33d9d06a85063c0f476fd3f6c85d417c2fd9c031SLSA-2016:0532-1Krb5Security Fix(es): * A memory leak flaw was found in the krb5_unparse_name() function of the MIT Kerberos kadmind service. An authenticated attacker could repeatedly send specially crafted requests to the server, which could cause the server to consume large amounts of memory resources, ultimately leading to a denial of service due to memory exhaustion. (CVE-2015-8631) * An out-of-bounds read flaw was found in the kadmind service of MIT Kerberos. An authenticated attacker could send a maliciously crafted message to force kadmind to read beyond the end of allocated memory, and write the memory contents to the KDC database if the attacker has write permission, leading to information disclosure. (CVE-2015-8629) * A NULL pointer dereference flaw was found in the procedure used by the MIT Kerberos kadmind service to store policies: the kadm5_create_principal_3() and kadm5_modify_principal() function did not ensure that a policy was given when KADM5_POLICY was set. An authenticated attacker with permissions to modify the database could use this flaw to add or modify a principal with a policy set to NULL, causing the kadmind service to crash. (CVE-2015-8630)moderateScientific LinuxScientific Linux 7krb5-libs-1.13.2-12.el7_2.i686.rpm596812f18d9665ae593e8e4b8e3432bdc770f5c9695c6b2c7aa99a852c5f5d33krb5-server-ldap-1.13.2-12.el7_2.x86_64.rpmf2009ea47f9e5e72b055d355d9cc1cfbc9996cabe370c5afdd58500ce3866780krb5-libs-1.13.2-12.el7_2.x86_64.rpm5867598ef75ebd47fd06c50ac03bd3c49f011f4b20b5ce723e8aee2fa8bdaba8krb5-pkinit-1.13.2-12.el7_2.x86_64.rpm17fb0b88cc1a5be9ddd6a05cac7603d0755a280a86705a98061058535eb480bbkrb5-devel-1.13.2-12.el7_2.i686.rpm1b269da740afc47b6575da84f0e1a6e9a90f4d49e5f9a37a9dcf72e453f2e20fkrb5-server-1.13.2-12.el7_2.x86_64.rpm1a10e179773c277b88358aa9e01fe5b0539729832095a7db0f0bc10d9f687093krb5-devel-1.13.2-12.el7_2.x86_64.rpm91540cc88cfae64a61bdf4eb957123396981a449be026a90626d81f962b6deb2krb5-workstation-1.13.2-12.el7_2.x86_64.rpm152bbffb1e908ead4211fca1ca0c8cf4baadd21acb9c496741a2488f49c2d885SLSA-2016:0534-1MariadbSecurity Fix(es): * It was found that the MariaDB client library did not properly check host names against server identities noted in the X.509 certificates when establishing secure connections using TLS/SSL. A man-in-the-middle attacker could possibly use this flaw to impersonate a server to a client. (CVE-2016-2047) (CVE-2015-4792, CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4870, CVE-2015-4879, CVE-2015-4913, CVE-2016-0505, CVE-2016-0546, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598, CVE-2016-0600, CVE-2016-0606, CVE-2016-0608, CVE-2016-0609, CVE-2016-0616) Bug Fix(es): * When more than one INSERT operation was executed concurrently on a non- empty InnoDB table with an AUTO_INCREMENT column defined as a primary key immediately after starting MariaDB, a race condition could occur. As a consequence, one of the concurrent INSERT operations failed with a "Duplicate key" error message. A patch has been applied to prevent the race condition. Now, each row inserted as a result of the concurrent INSERT operations receives a unique primary key, and the operations no longer fail in this scenario.moderateScientific LinuxScientific Linux 7mariadb-embedded-5.5.47-1.el7_2.i686.rpm23e19102b0d9aa7167c84ff4963318cd43128dfa2bddc57df6ed15b5cd5982f7mariadb-bench-5.5.47-1.el7_2.x86_64.rpm8221478f439399736d7bc61ecc878996fef2e1968aee701220bdea42f04b423cmariadb-libs-5.5.47-1.el7_2.x86_64.rpm469c496c3a04f0ec9704744b3afbe9bbc9d40eb7fd258059dbf0db5cd5c9c80cmariadb-embedded-devel-5.5.47-1.el7_2.i686.rpmcad29599ab8a260d82078ae3e423d9c632203bb5ee7cd627f4ce41a36bd22e03mariadb-embedded-5.5.47-1.el7_2.x86_64.rpm82b8df14bea7b8a32e8b512e40fb98f094d6f8a6f5c9778c3f82c1a49d4764ecmariadb-embedded-devel-5.5.47-1.el7_2.x86_64.rpm0a7a16152145f3599d6e803c1eea280f448e481c38a36bf2db8c2ba6ad9690cdmariadb-5.5.47-1.el7_2.x86_64.rpmebb2cd5609bc8c301d00843fd1788fc465267ac0c3fbc836dd6802f2d5100b6emariadb-test-5.5.47-1.el7_2.x86_64.rpm44c473f4a4063c48970243149256c6e29142d17b3715a31492c2cfacbb54330amariadb-server-5.5.47-1.el7_2.x86_64.rpma7df1847a029edca4a65f9f3f1b6b39ccc6d16c86ad41fb6d9c0aba1b66207fbmariadb-devel-5.5.47-1.el7_2.x86_64.rpme6c8edb544fd31d423a4b613246bd3e2e91a78139b03af632444d5d2e8286686mariadb-libs-5.5.47-1.el7_2.i686.rpmb84d2a46b526cb52b875788c1db879173502178034a36ab86f73c170884e80admariadb-devel-5.5.47-1.el7_2.i686.rpm15b74ff81aee7b598b1bf1889cfa6b1a7a080294757cfa0fd660037f8ea5cf54SLSA-2016:0594-1Graphite2The following packages have been upgraded to a newer upstream version: graphite2 (1.3.6). Security Fix(es): * Various vulnerabilities have been discovered in Graphite2. An attacker able to trick an unsuspecting user into opening specially crafted font files in an application using Graphite2 could exploit these flaws to cause the application to crash or, potentially, execute arbitrary code with the privileges of the application. (CVE-2016-1521, CVE-2016-1522, CVE-2016-1523, CVE-2016-1526)importantScientific LinuxScientific Linux 7graphite2-devel-1.3.6-1.el7_2.i686.rpm9558b82b4332ce5a507e80ee53064260478df0d1058017335331d7826d9e6a8agraphite2-1.3.6-1.el7_2.i686.rpm179d26ac931d2c286526f6022504f4473ec4fc5bad3a81cf98783f689c7b2ff9graphite2-1.3.6-1.el7_2.x86_64.rpme7aeb32c207254a4d3841c4661b97ac344eb569f76e70106f898d4778b14c8a3graphite2-devel-1.3.6-1.el7_2.x86_64.rpm5655556de228d51aea50e4cceda1b21d5d89e14db0992514cfb488fe409f8c67SLSA-2016:0612-1Samba And Samba4Security Fix(es): * Multiple flaws were found in Samba's DCE/RPC protocol implementation. A remote, authenticated attacker could use these flaws to cause a denial of service against the Samba server (high CPU load or a crash) or, possibly, execute arbitrary code with the permissions of the user running Samba (root). This flaw could also be used to downgrade a secure DCE/RPC connection by a man-in-the-middle attacker taking control of an Active Directory (AD) object and compromising the security of a Samba Active Directory Domain Controller (DC). (CVE-2015-5370) Note: While Samba packages as shipped in Scientific Linux do not support running Samba as an AD DC, this flaw applies to all roles Samba implements. * A protocol flaw, publicly referred to as Badlock, was found in the Security Account Manager Remote Protocol (MS-SAMR) and the Local Security Authority (Domain Policy) Remote Protocol (MS-LSAD). Any authenticated DCE/RPC connection that a client initiates against a server could be used by a man-in-the-middle attacker to impersonate the authenticated user against the SAMR or LSA service on the server. As a result, the attacker would be able to get read/write access to the Security Account Manager database, and use this to reveal all passwords or any other potentially sensitive information in that database. (CVE-2016-2118) * Several flaws were found in Samba's implementation of NTLMSSP authentication. An unauthenticated, man-in-the-middle attacker could use this flaw to clear the encryption and integrity flags of a connection, causing data to be transmitted in plain text. The attacker could also force the client or server into sending data in plain text even if encryption was explicitly requested for that connection. (CVE-2016-2110) * It was discovered that Samba configured as a Domain Controller would establish a secure communication channel with a machine using a spoofed computer name. A remote attacker able to observe network traffic could use this flaw to obtain session-related information about the spoofed machine. (CVE-2016-2111) * It was found that Samba's LDAP implementation did not enforce integrity protection for LDAP connections. A man-in-the-middle attacker could use this flaw to downgrade LDAP connections to use no integrity protection, allowing them to hijack such connections. (CVE-2016-2112) * It was found that Samba did not validate SSL/TLS certificates in certain connections. A man-in-the-middle attacker could use this flaw to spoof a Samba server using a specially crafted SSL/TLS certificate. (CVE-2016-2113) * It was discovered that Samba did not enforce Server Message Block (SMB) signing for clients using the SMB1 protocol. A man-in-the-middle attacker could use this flaw to modify traffic between a client and a server. (CVE-2016-2114) * It was found that Samba did not enable integrity protection for IPC traffic by default. A man-in-the-middle attacker could use this flaw to view and modify the data sent between a Samba server and a client. (CVE-2016-2115)criticalScientific LinuxScientific Linux 7libldb-1.1.25-1.el7_2.x86_64.rpmf05668961c0cf86c2ea910ef67b97807d3ef89f603e442b29f37fc79a7978651samba-vfs-glusterfs-4.2.10-6.el7_2.x86_64.rpm4d25314175df8affa19fe7bed11cd77f271ebef1fcf48c56c1fcbffa048ca0d1ctdb-4.2.10-6.el7_2.x86_64.rpm6c8de2e3afa94b524cfe4cb5fbd5c0287239ef5f667a64254414aaf49d8c7979samba-pidl-4.2.10-6.el7_2.noarch.rpm7409c647e8eb9609b204d04007d4b563a83f0370860c82d8d7b9c5a500ebf9eflibldb-devel-1.1.25-1.el7_2.x86_64.rpm5c51e1b113aab4243b2d7484d0116430fa596f270ec0413bf2615e531ebfe953samba-client-libs-4.2.10-6.el7_2.i686.rpm0b9e2231fec8b5c3aca89e68b31a69e8d0514f003cf7cef761bed38c1c83d00fpytalloc-devel-2.1.5-1.el7_2.x86_64.rpmf689fc4a2759fefbae56e75663c57fd1c5853cea5ce8ab1f916bee9a012f15absamba-winbind-krb5-locator-4.2.10-6.el7_2.x86_64.rpmce7541a31e2b785feaa4b2d6a786bdb32887234a71249c844c429f75c14e017alibtevent-devel-0.9.26-1.el7_2.i686.rpm148837400abb10bb66ae40c0311abfd4c2039ad1bb89253d8d8d227a4ce36ac0libwbclient-devel-4.2.10-6.el7_2.i686.rpm7ca72744a3dd448c8e803addc38a3c55d6b8b6e6644a7076bd49494fdaa33430libtalloc-2.1.5-1.el7_2.i686.rpm130df52d9963184feae4fe7444a976e3d9dd43ff182098b135087b84282571acsamba-winbind-modules-4.2.10-6.el7_2.x86_64.rpm7b35bf444d9bc1e21dfe3ae43445ffa57a09f41eb178c913201464be6746d1dasamba-winbind-clients-4.2.10-6.el7_2.x86_64.rpm7a30f787475854be74e0b3d96cff6e48fff51f996394c4f02002a29527d28353libldb-devel-1.1.25-1.el7_2.i686.rpmd04293c2b616988d4306a4353e13af87bf62e9ef8f174a7416df29ef245336cesamba-4.2.10-6.el7_2.x86_64.rpm1e36b60d2264a8cbadee1db398e45f7eb4011f1da2328715771bb3d4917a7aecpytalloc-devel-2.1.5-1.el7_2.i686.rpma85e2711804b367d9b18de1c807f6b6939a6c41a34adf3d390ee1099f66379c3python-tdb-1.3.8-1.el7_2.x86_64.rpmddb159a0ae228eb930879e7a6bc326896228f81f33b828f5e08429d4f26a7191libtevent-0.9.26-1.el7_2.x86_64.rpm1a4205830d91aa81b4c1c48d3e3fcffa1866f452d12f91181c9c7c81c225b93bsamba-common-tools-4.2.10-6.el7_2.x86_64.rpm4d7652a3675ba30aebcd6175792cc8104ac29766bdb9997c8a327acfb68868d6python-tevent-0.9.26-1.el7_2.x86_64.rpm3e7adeb78edeef852b940483acbf1bbba1926cfeebcb131a3a8bce43d6d3fe87libsmbclient-4.2.10-6.el7_2.i686.rpm477957c3184300a20f5222ae319ded891b410db0b5b10b04fdfba49f1e5737eflibsmbclient-4.2.10-6.el7_2.x86_64.rpm9535988ffe3d20cf23ecfe632ca58bb161e175297cd7c523cdc0833ba4634140samba-dc-libs-4.2.10-6.el7_2.x86_64.rpma64d0982e270bddd73e565dd97ca71bcea030b69a60d2d99e4cd8dfedf9ac6b8samba-client-4.2.10-6.el7_2.x86_64.rpmf1834d4678e19883c6cc710c4dbd6d1eedef09e02b163f061c9f63052cab78d5openchange-devel-docs-2.0-10.el7_2.noarch.rpm683c5dcf062e2c486c9a379a02a7021351c3cf195d046ef2f77c6bac25dc1e7bsamba-common-libs-4.2.10-6.el7_2.x86_64.rpm0630cd33ef4fb4ce856b6a44ffa8880fedf799aad2ba0aefd966f2414ce47ee0libldb-1.1.25-1.el7_2.i686.rpmffd1cfd5006774f2cd5dc3047dbbcad76ebb4c7522177c1e7995e4c76b16e112openchange-client-2.0-10.el7_2.x86_64.rpmd9e3586f924bcc0bb4a98db3a37e05cd120c29402c6c1bdadc4f1a176e509a6elibtalloc-2.1.5-1.el7_2.x86_64.rpm921861bf3601b390dc20c5cb99d6d865f0ca5fdf0e7557cf5c4c57aa65374531samba-libs-4.2.10-6.el7_2.i686.rpmbc485c267f317e9a302a9c1e1017f86b08712fbd5a3111f67a41bc725ba4160fsamba-test-libs-4.2.10-6.el7_2.x86_64.rpm6de6b5be51f29cf6cf429ff6d716ccfa64632fd97bd509c6f6f226b72ce19ab3libtalloc-devel-2.1.5-1.el7_2.i686.rpmf42fa2d60581841b6eaba72bc93685979fc3bc855a406165b92ec049e48cddf5libtdb-1.3.8-1.el7_2.x86_64.rpm76cd7925bfc58f4725f99359672c2f189d35b6aafc610544dc4f336da0a57a26samba-devel-4.2.10-6.el7_2.i686.rpmee1c410d40cf58e052f4c73b007d5db695f3d74ecdcfb482cfd807c8d7dc0856libwbclient-devel-4.2.10-6.el7_2.x86_64.rpm94a08dcc5bee840a83dda5d2cc9362af7c9097368b768ec59a2fa8e95d97914esamba-test-libs-4.2.10-6.el7_2.i686.rpm7809cfb8c5c3f28d84fe2fb5a9def88a5049d3113e2d47e62268178e74828ca2pyldb-devel-1.1.25-1.el7_2.i686.rpmeb5cc360976d9b60c8582501ae82cd7257e570f5221c3239c2496e8d3f3d3770openchange-devel-2.0-10.el7_2.x86_64.rpm6c614146704e4e62dff71379f16bdeb7ec95990a9fff53e7acbffb9d3e99066eopenchange-2.0-10.el7_2.i686.rpm53f4d9d0c1ab76de1cd96f98e100a58e359dafe5443b1d6bfea88a9c21cd399epytalloc-2.1.5-1.el7_2.i686.rpmcc1f6d3646452a3a8784f79a3655ef55b0ad8b2b40647ac1f3ab210664ddb793samba-common-4.2.10-6.el7_2.noarch.rpm4d3c5ad665ad86303bf3de74087a6ddd12aba23b2415a67558e7b7e8b4186982pytalloc-2.1.5-1.el7_2.x86_64.rpmc853d0192c2f4dde77ed85738bfbc17b73b05cf19eb6083af4f02ea3061670f8libwbclient-4.2.10-6.el7_2.i686.rpm74ade1cccd507798f5debc8dc286179e1ac9318a9b044edaaa69d5b0ad75498fsamba-python-4.2.10-6.el7_2.x86_64.rpm826759aae64d29c56d5887c473777755a7596084b51c183a26a834b140f3ff39openchange-2.0-10.el7_2.x86_64.rpma7bd6f7077789ca2e3c2c3cc46746eed9651af735b92024f1ae4ba7ae963603alibwbclient-4.2.10-6.el7_2.x86_64.rpme5a9e45c5046b07151b2dc9816c834b7cf25667064ba21262866445cd2594e4dlibtalloc-devel-2.1.5-1.el7_2.x86_64.rpm969d6242cc8e8b9a1327aa204c24fd93c384e5ad987a8b0538f1818746ea0cbfopenchange-devel-2.0-10.el7_2.i686.rpmfed2136e1779011e7a305dfe5392435a270a014d303d5f89fcb171993fce0a16ctdb-devel-4.2.10-6.el7_2.i686.rpm22f847b0ea804233377ad4bf29d5d0cd5e5616bbefa82719e88df6704150fcc7libtdb-devel-1.3.8-1.el7_2.i686.rpmafbcec196d9bc14bede0a4d3d389a16b550b7355fe623b4b0d000f77b845a141tdb-tools-1.3.8-1.el7_2.x86_64.rpm76644a06604039204b15efa910a49f514a810a87931e048e1dcdbcbeb2775c7asamba-test-devel-4.2.10-6.el7_2.x86_64.rpmfa436b3f29e85492ba8eb7c115b29d54103e45d30cc4a6300a5f908a14d5c7e1samba-winbind-4.2.10-6.el7_2.x86_64.rpm425d9c0ba1e41a5caeadcff177accd931344a545b65c0a0876e0749f484b2f44libtevent-devel-0.9.26-1.el7_2.x86_64.rpm6b4fb6393195ebcd9ca18c59d744f88adebde0b26ceb6a739f2cca1dc2fa14f7libtdb-1.3.8-1.el7_2.i686.rpm9ba3540209a935676ce5e90f5f1a1b3c0d28aac9ced78464f28b8a42714a8a42libsmbclient-devel-4.2.10-6.el7_2.x86_64.rpm35c2574b696f91e116d3d4586da787814725cbc5043a4dd693a32a9ea09349d0pyldb-devel-1.1.25-1.el7_2.x86_64.rpm4921c718aa15f6d132514c3ee35658e02a99752e27d8f798da627e744ab7194dctdb-tests-4.2.10-6.el7_2.x86_64.rpm4a84b31089ba0a919c1adc1fda81395c64145169db3a0e0d7e84a3dfe5e3e640libtdb-devel-1.3.8-1.el7_2.x86_64.rpm7093b01f8395081f0ebed8e63dfe773ecad8c0be9ea5fb3e20dc3b303f4af1dbsamba-devel-4.2.10-6.el7_2.x86_64.rpm1709a4b5a6351ac7deb7e0ecb7bd6f4ae529611e1e6a75c87bde7d8ad4863690libtevent-0.9.26-1.el7_2.i686.rpm7a1cb9f4e598b830a4facb25347947c12ab1ba8477f498aaba18d1471a6a7520ldb-tools-1.1.25-1.el7_2.x86_64.rpmf695c2c582f67a1560a862e3aa78451934ba131165fb2833f65b5145aeb9abb1samba-winbind-modules-4.2.10-6.el7_2.i686.rpm4410aad86ab1a4ed4b97bf2a9a49bd0c47e39e000411e5a792794e83d8c688a6samba-dc-4.2.10-6.el7_2.x86_64.rpmc4ea1a10f44d1b2e971c5dfda14cff1eaf9fc69dfb05287d9b7829f96ffeb9c4samba-libs-4.2.10-6.el7_2.x86_64.rpm2c9cdc767252d695cd23aae1ddb1055bccee2107e97a60fda27a517f4d004f4bsamba-client-libs-4.2.10-6.el7_2.x86_64.rpm96c92f1f53711ad46d2ed79afc1f9f2b2ed2b861378ca51f587a2f53c294df30ctdb-devel-4.2.10-6.el7_2.x86_64.rpm781bb5392a0f1197285f9f9435c4e8b1d2d370db07d4e0bffc78a554f86c1b31pyldb-1.1.25-1.el7_2.x86_64.rpm8c001452d7b24b2fcd6e2a00e169a6ffaf7df98cb8e21901d7ef7cc3b1f4d458samba-test-4.2.10-6.el7_2.x86_64.rpm47d7d95c24f5f7fc26e797f7f7e321a74649038fdadf9cef0152cbd0f2f79ce1python-tdb-1.3.8-1.el7_2.i686.rpm1fb545f68f7575948929b5a6cd46b9c2328181ae883cdb1ae2726dea0fbf0fc4libsmbclient-devel-4.2.10-6.el7_2.i686.rpmedbaef1755a5901933033014f5ca221fdcde89f29ddef38b0b9d5d757288a6bepyldb-1.1.25-1.el7_2.i686.rpmbebbca7148e1caa5a06d6c392e604d29ad3befe89f0f7e705f1fdf958790414cSLSA-2016:0650-1Java-1.8.0-OpenjdkSecurity Fix(es): * Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) * It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) * It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) * It was discovered that the GCM (Galois/Counter Mode) implementation in the JCE component in OpenJDK used a non-constant time comparison when comparing GCM authentication tags. A remote attacker could possibly use this flaw to determine the value of the authentication tag. (CVE-2016-3426) * It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.criticalScientific LinuxScientific Linux 7java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2.noarch.rpm2a63ff24de922b4222b7683ca02280493e67a80c2c2d38bcdf43028dc8f4e87ejava-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2.x86_64.rpm4334c46699adb20a82f76200d6d96a08eb3a3495dc93d9ebcc4494c5427115a3java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2.x86_64.rpmdfc5d44f29ef9782521214f0c14eb66355d1690930e8ba90e3e487560497929djava-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm575b57461a3d9cfcc81e3f66a354b2ae379c37e5d244826bf2b82a92d180acf1java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2.x86_64.rpmdb8480d53f5af5f5f2fe8fb903f5dc5414ae32c8e22d31f8275deaeb3b694115java-1.8.0-openjdk-headless-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm17ae836818fa1824f5068f639c0d1d7dd97c4b216defca2aae57cad698ad9fccjava-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2.noarch.rpm99a7e852578ec13254ccc414decef6c28c25367f866542e8f5ff87d68a0bd7f8java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2.x86_64.rpm95b0c186a49b86c8fcb91faf93e8b26b27522eef01074cbc3b95241e1eaaaa75java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2.x86_64.rpmbf47f31d721fa84593bc192bd221c58b32886922b193810f1d1c40b6aeda4f15java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2.x86_64.rpmd528f54cedfbe51fdc55c25ad19e7541a0a11de028ed8daa6f75205feb439125java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2.x86_64.rpm897c7cd34251e692f47f244f13e740e17144515d006c21bbfa77041900825063java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2.x86_64.rpm8982600eb69bb3bd90d1cc401fedbe42460aa68fc5e1946c672b5107f4af8662java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2.x86_64.rpma5cb884881ee9afa22898aebdf887ff53bd3049240b91e69b3a66aedde0bcd84java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.x86_64.rpm7c471326bd960306c4ea744d78e24ceaf27ed1009ac31d28f507a0f983374512SLSA-2016:0676-1Java-1.7.0-OpenjdkSecurity Fix(es): * Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) * It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) * It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) * It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)criticalScientific LinuxScientific Linux 7java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2.noarch.rpm8b679f939388df296c5f476cb972b3df60bf0af3bf602263bdd0a12527e09530java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2.x86_64.rpmf5e0ca74feaad48d1029667cb3d7a1db2fc98e492f0e02173e7048bcdede0e7bjava-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2.x86_64.rpm5c7a374e297ae167a96db7ec53433cd8a8e89297c2ab15c42a318e4595b859e2java-1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2.x86_64.rpm26c859c8bc3df7736cfe89691db0b88983ba9dd085555f7aac7f77123fe116f9java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2.x86_64.rpme1661ca6e58c808431fa5a904d322157865b87dd6b5d18ca1b3cae2b6a7f5835java-1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2.x86_64.rpme533e4434009f0eb401ef078b04486e82ad006e695e3b4b05c2165dd1d1384a6java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2.x86_64.rpm6dd8b566c54f26747efa5fe9fd4842209dfac3f873edce9375baf8d9e27a182bSLSA-2016:0685-1Nss, Nspr, Nss-Softokn, And Nss-Util The following packages have been upgraded to a newer upstream version: nss (3.21.0), nss-util (3.21.0), nspr (4.11.0). Security Fix(es): * A use-after-free flaw was found in the way NSS handled DHE (DiffieHellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) * A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979) Bug Fix(es): * The nss-softokn package has been updated to be compatible with NSS 3.21.moderateScientific LinuxScientific Linux 7nspr-4.11.0-1.el7_2.i686.rpmbe95d0061b69f23ffd57d5ba6090d19f1a8f8037d3665ca03c60edcdc39b65c5nss-softokn-freebl-3.16.2.3-14.2.el7_2.i686.rpm39d17a0aa7fc32e06a83fe6f77ceec5d696937ef83c2d40f3af7cba3f277c32anss-pkcs11-devel-3.21.0-9.el7_2.x86_64.rpm36c31a3bcd5e9d458ac4a97ace57b1898800449995ccf379e992ba0f24a2440dnss-3.21.0-9.el7_2.i686.rpm1a497b55b215f0838bcbaf21c58058a972fb9fab4d9b2a5b80fe0ffc9adf662bnss-util-3.21.0-2.2.el7_2.x86_64.rpmb7dbbfa09ed40be761b83f96c524bb8b4dfa3f5b3a7a6840fedf7465cbb338e6nss-3.21.0-9.el7_2.x86_64.rpm34225dbbc09895a8628f2f8163b675d87c541f5dcd025e36f1546c77de005723nss-softokn-devel-3.16.2.3-14.2.el7_2.i686.rpma6b124dccf566ac65382645cf3a86d75fcfd75c0909d5000c8a5e4ac284f1d2dnss-tools-3.21.0-9.el7_2.x86_64.rpm0db1cf8135573de87ab085617d7b62c92b92da93756c4b20486b15b7629fe9a6nspr-devel-4.11.0-1.el7_2.i686.rpm981faea52cff528004b850efe029874aa3dfbb2d32e607308e70e8362c31f715nss-util-devel-3.21.0-2.2.el7_2.x86_64.rpm933ea854be4c73af9ac46e7242099edb90542725c1af33418083e7935c0e0e2cnss-devel-3.21.0-9.el7_2.i686.rpme015294af9fd0deac92bf67bbf9a24d94cb4e2e62714f08bbc548d0722886ac0nss-sysinit-3.21.0-9.el7_2.x86_64.rpm7019d1ed57fcb1b3c0df697dbb76aad7f964e75c7bef896575b3874486450010nss-util-devel-3.21.0-2.2.el7_2.i686.rpm4da6689d4d9a826e9248c585233f2e430d5f5153fbd64609930c4afe9a7ed1eenss-softokn-freebl-devel-3.16.2.3-14.2.el7_2.x86_64.rpm502f68f68e3409db8bd85b60796cf958a471e0c34d0187407d72b93ca44d0ce8nss-softokn-freebl-devel-3.16.2.3-14.2.el7_2.i686.rpma615437b13891073e107d3578a901df2378aeedf1391dd70c811481560f43e6fnss-softokn-freebl-3.16.2.3-14.2.el7_2.x86_64.rpm6db6e8dd0f78e9712e1a9824f4f5f6a0b46720a394e740c218dfe2cdc65209e5nspr-4.11.0-1.el7_2.x86_64.rpm4144aabd7a39600c1507a1b00093731a147908991ca89c63e12b7c74fb2aed7cnss-softokn-3.16.2.3-14.2.el7_2.x86_64.rpm8ad2f6c1a797549fef8d30aa0beb80c87324e7cdd59cc768f3b5e6414bee0248nss-softokn-3.16.2.3-14.2.el7_2.i686.rpm7b06918ce4ac3df6371c964ec877d6b35ae8e9238d9b40d622bc58375c9b8d5cnss-softokn-devel-3.16.2.3-14.2.el7_2.x86_64.rpmab89d9ec7d2c55b9be0e252b599e3dbe074a001047c71dcd3cc01c358ce24f5fnspr-devel-4.11.0-1.el7_2.x86_64.rpm8ddb1223bc838fcc268ac5c303594004e49ccd522ac5044127e40aa76791c262nss-pkcs11-devel-3.21.0-9.el7_2.i686.rpmef05045df8fb7239dd3fc7995041ba666fd3b7307ec482d544bda68bdf0a4c7bnss-util-3.21.0-2.2.el7_2.i686.rpmbcc8b3a21f9dd039a905a78c9828c8d0fb30cfe2f51f0ba5a2c2b72484cc7fafnss-devel-3.21.0-9.el7_2.x86_64.rpm1456760bb6d29e43c78287da826a3a6b9ef7aa759c744e837242f25591705fefSLSA-2016:0695-1FirefoxThis update upgrades Firefox to version 45.1.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2805, CVE-2016-2806, CVE-2016-2807, CVE-2016-2808, CVE-2016-2814)criticalScientific LinuxScientific Linux 7firefox-45.1.0-1.el7_2.i686.rpmfa7c75af52deb1e4f1211a3ff245ead9a847e7a25dfad3a29c1c6d82e9ac63edfirefox-45.1.0-1.el7_2.x86_64.rpm240e3cf6b416c5cae6bc867653498ed7bc17e42958ac18bb03ae2eb073533492SLSA-2016:0706-1MercurialSecurity Fix(es): * It was discovered that Mercurial failed to properly check Git sub- repository URLs. A Mercurial repository that includes a Git sub-repository with a specially crafted URL could cause Mercurial to execute arbitrary code. (CVE-2016-3068) * It was discovered that the Mercurial convert extension failed to sanitize special characters in Git repository names. A Git repository with a specially crafted name could cause Mercurial to execute arbitrary code when the Git repository was converted to a Mercurial repository. (CVE-2016-3069)importantScientific LinuxScientific Linux 7mercurial-2.6.2-6.el7_2.x86_64.rpmd80f88ffe560d7d7de1c4e8cfdf963fff2a14eced8f20de6a56d59402ea1ca7bmercurial-hgk-2.6.2-6.el7_2.x86_64.rpmd99941b078cd03e72d1cfb39c340a92a9c9521c8393a5b7feefed6470cc36742emacs-mercurial-2.6.2-6.el7_2.x86_64.rpmb96666b64b787631d2de446904cc38bff19fc23d4d0e721dd6a606482731edbdemacs-mercurial-el-2.6.2-6.el7_2.x86_64.rpm157066cddb0e1f2a8e976d6a35c4586020518f0671bd72a36d086c453ce0cd70SLSA-2016:0722-1OpensslSecurity Fix(es): * A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108) * Two integer overflow flaws, leading to buffer overflows, were found in the way the EVP_EncodeUpdate() and EVP_EncryptUpdate() functions of OpenSSL parsed very large amounts of input data. A remote attacker could use these flaws to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105, CVE-2016-2106) * It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-2107) * Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application. (CVE-2016-0799, CVE-2016-2842) * A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109)importantScientific LinuxScientific Linux 7openssl-devel-1.0.1e-51.el7_2.5.x86_64.rpmecdebbeca213993cc3ca0839feeef60ce8a19b5829d92cf5b1ce50ef8f8d3eb4openssl-devel-1.0.1e-51.el7_2.5.i686.rpmd8dda3900bc7639299967da5f22e9811951f82857d0e84384e3df16e2e620410openssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm3f5e21adacadc91af62c74137490d1873a764eb4340a98cf8defc91045251cb0openssl-libs-1.0.1e-51.el7_2.5.i686.rpme5ad0043a20320f00ca5f4834ee2e631004f3287c750a901e4a0db642ba9ea2copenssl-static-1.0.1e-51.el7_2.5.x86_64.rpmfcbbb837bcee3ee045ee0b43e2dd6d7db5f958a13f1dc366a79cc7c5ae951077openssl-1.0.1e-51.el7_2.5.x86_64.rpm28c30b5a7f8fac8b9f72319df6d92a528d37f280011ff53bd9bfc50002afc3c8openssl-static-1.0.1e-51.el7_2.5.i686.rpma75667d64f37920729f689709c66716531d96fb80ead74e952a88fd58d0af135openssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm4d7b56c61c4203c2620a136160b7fd6e2178269306f5de70a9dd90deda06e8edSLSA-2016:0723-1Java-1.6.0-OpenjdkSecurity Fix(es): * Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) * It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) * It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) * It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)criticalScientific LinuxScientific Linux 7java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm52f4ad107473b084e4d0ecc3fb5203b7fd4da6c4bbd67c014948817c77ec9eeajava-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm4cb910e0bfa07c777932dec05d20c91c5b8464c0f0b8bb848acee0b225182da7java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2.x86_64.rpmb9cc3cf00c89632ccb362d61f722ff73d59674006d84ba88975cedc0da0f5fd5java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2.x86_64.rpmfff0834238768371801451f1ebd72a37da01010edc180c850eb81b3d5d668d9ejava-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm76417197014d3c466ee180acdfbd9aabb1fe5104a3b44f4a5eb95220c52050f0SLSA-2016:0724-1Qemu-KvmSecurity Fix(es): * An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)importantScientific LinuxScientific Linux 7qemu-img-1.5.3-105.el7_2.4.x86_64.rpmbfcb3b21769f3240e3c7a1a5f60a70c45d0295a18b00184109046006ddc43451qemu-kvm-common-1.5.3-105.el7_2.4.x86_64.rpm0833487742a890a81854d34ba0707113cc21e4103bb789940d2710fc54711d00libcacard-tools-1.5.3-105.el7_2.4.x86_64.rpmc237e26c6dbf91c12a622babf887cc8010bc1e856f8a591d9ef624035727c173qemu-kvm-1.5.3-105.el7_2.4.x86_64.rpm31605fdb953c021850973e381d706dd18171e49ac71e487bdc46d043de497a6elibcacard-devel-1.5.3-105.el7_2.4.i686.rpm0b7d9979a9386490e019851a6a91f9b9464a4a50869dd84a1bdbf5d972a9dda4libcacard-1.5.3-105.el7_2.4.i686.rpm5a704cfc5591cd14302a74b27e8d38db4b5a9f0f1d22c89b5b03bf4042d03510qemu-kvm-tools-1.5.3-105.el7_2.4.x86_64.rpm441ba047c4e3a643443e7228db369432b9875162858e2e76944e2f4b1ce69ec3libcacard-devel-1.5.3-105.el7_2.4.x86_64.rpm019fb62d67d76eafe5a3cf3579adb7e1fed0b45db9f4c75e3b44b9cb18597524libcacard-1.5.3-105.el7_2.4.x86_64.rpm26f3c387133663221b80060160c7712e5ea685b1da85e9934be90a237ff8827cSLSA-2016:0726-1ImagemagickSecurity Fix(es): * It was discovered that ImageMagick did not properly sanitize certain input before passing it to the delegate functionality. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-3714) * It was discovered that certain ImageMagick coders and pseudo-protocols did not properly prevent security sensitive operations when processing specially crafted images. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would allow the attacker to delete, move, or disclose the contents of arbitrary files. (CVE-2016-3715, CVE-2016-3716, CVE-2016-3717) * A server-side request forgery flaw was discovered in the way ImageMagick processed certain images. A remote attacker could exploit this flaw to mislead an application using ImageMagick or an unsuspecting user using the ImageMagick utilities into, for example, performing HTTP(S) requests or opening FTP sessions via specially crafted images. (CVE-2016-3718) Note: This update contains an updated /etc/ImageMagick/policy.xml file that disables the EPHEMERAL, HTTPS, HTTP, URL, FTP, MVG, MSL, TEXT, and LABEL coders. If you experience any problems after the update, it may be necessary to manually adjust the policy.xml file to match your requirements. Please take additional precautions to ensure that your applications using the ImageMagick library do not process malicious or untrusted files before doing so.importantScientific LinuxScientific Linux 7ImageMagick-c++-devel-6.7.8.9-13.el7_2.i686.rpm310754ba2b08233333be9d9aee26abdeb6378939998e89978d6f17d65539591aImageMagick-devel-6.7.8.9-13.el7_2.x86_64.rpm2cf430b97f16603257a91ef05c92780019b869482316eff691a58ba246be9cb6ImageMagick-c++-devel-6.7.8.9-13.el7_2.x86_64.rpmc25a757546155611ada0e82fbc4cd81d9fd1a4456d7894d6b6a12f70f952729dImageMagick-doc-6.7.8.9-13.el7_2.x86_64.rpm9abcd48937b6081362e371cdf7c7e2fa9714db86c5325032e789722db55dd6b5ImageMagick-perl-6.7.8.9-13.el7_2.x86_64.rpm59e4ad860de8fc033a6a87eb4ee22813ac08cd9c60b08ef7a9c0fe98766bef8eImageMagick-6.7.8.9-13.el7_2.i686.rpm046d76799f4a16520cf10b1b10759f20471181074ccbab676fcb5033029927c0ImageMagick-devel-6.7.8.9-13.el7_2.i686.rpm5b831ec550ae323caedfb849ffe0267b54945417a80bb92fb3a3654a2dd796e0ImageMagick-c++-6.7.8.9-13.el7_2.i686.rpm9ba9023a18c674b8d5d8a01e151ee55c21abdc7925b32680f51d3091073e5df1ImageMagick-6.7.8.9-13.el7_2.x86_64.rpm10d35282f5e0474c549e139b973521ba4420dc54073a5393dfad437e4c888beaImageMagick-c++-6.7.8.9-13.el7_2.x86_64.rpmd55d31f348fdcc6797694313eccdcc09e8eb5f142697d38a51c79c172ce202c0SLSA-2016:1025-1PcreSecurity Fix(es): * Multiple flaws were found in the way PCRE handled malformed regular expressions. An attacker able to make an application using PCRE process a specially crafted regular expression could use these flaws to cause the application to crash or, possibly, execute arbitrary code. (CVE-2015-8385, CVE-2016-3191, CVE-2015-2328, CVE-2015-3217, CVE-2015-5073, CVE-2015-8388, CVE-2015-8391, CVE-2015-8386)importantScientific LinuxScientific Linux 7pcre-static-8.32-15.el7_2.1.x86_64.rpmb12038fe21b5bd7611f41cfa25211b80cab541d144dd185a3ee58d35d825a747pcre-8.32-15.el7_2.1.x86_64.rpm2f7b762c58578425420d812e12fda14393d0975d47014151931a18f6d9738e55pcre-static-8.32-15.el7_2.1.i686.rpm08059030ba9dc696c8231e28710c0fb679f049bf0a98369591259d5bc7f21c4cpcre-tools-8.32-15.el7_2.1.x86_64.rpmac79749c80492d60872a60ac7e1a00103f941d8cdd12c4f4e49360d62fa06286pcre-devel-8.32-15.el7_2.1.x86_64.rpm1c0fb90aa6cc5312ccf85605d1a7e06f452753997351576814e6544be7becee8pcre-8.32-15.el7_2.1.i686.rpm7c4016839bb1ef9172217bec5095cb3ffb14227a73d923372f3a90efb8135c15pcre-devel-8.32-15.el7_2.1.i686.rpm7a489f5b24eb0a17374c1a21b5cef8ec21bb156a37d981536da4c3e3c6e0b1f6SLSA-2016:1033-1KernelSecurity Fix(es): * A flaw was found in the way the Linux kernel's ASN.1 DER decoder processed certain certificate files with tags of indefinite length. A local, unprivileged user could use a specially crafted X.509 certificate DER file to crash the system or, potentially, escalate their privileges on the system. (CVE-2016-0758, Important) Bug Fix(es): * Under certain conditions, the migration threads could race with the CPU hotplug, which could cause a deadlock. A set of patches has been provided to fix this bug, and the deadlock no longer occurs in the system. * A bug in the code that cleans up revoked delegations could previously cause a soft lockup in the NFS server. This patch fixes the underlying source code, so the lockup no longer occurs. * The second attempt to reload Common Application Programming Interface (CAPI) devices on the little-endian variant of IBM Power Systems previously failed. The provided set of patches fixes this bug, and reloading works as intended. * Due to inconsistencies in page size of IOMMU, the NVMe device, and the kernel, the BUG_ON signal previously occurred in the nvme_setup_prps() function, leading to the system crash while setting up the DMA transfer. The provided patch sets the default NVMe page size to 4k, thus preventing the system crash. * Previously, on a system using the Infiniband mlx5 driver used for the SRP stack, a hard lockup previously occurred after the kernel exceeded time with lock held with interrupts blocked. As a consequence, the system panicked. This update fixes this bug, and the system no longer panics in this situation. * On the little-endian variant of IBM Power Systems, the kernel previously crashed in the bitmap_weight() function while running the memory affinity script. The provided patch fortifies the topology setup and prevents sd->child from being set to NULL when it is already NULL. As a result, the memory affinity script runs successfully. * When a KVM guest wrote random values to the special-purpose registers (SPR) Instruction Authority Mask Register (IAMR), the guest and the corresponding QEMU process previously hung. This update adds the code which sets SPRs to a suitable neutral value on guest exit, thus fixing this bug. * Under heavy iSCSI traffic load, the system previously panicked due to a race in the locking code leading to a list corruption. This update fixes this bug, and the system no longer panics in this situation. * During SCSI exception handling (triggered by some irregularities), the driver could previously use an already retired SCSI command. As a consequence, a kernel panic or data corruption occurred. The provided patches fix this bug, and exception handling now proceeds successfully. * When the previously opened /dev/tty, which pointed to a pseudo terminal (pty) pair, was the last file closed, a kernel crash could previously occur. The underlying source code has been fixed, preventing this bug. * Previously, when using VPLEX and FCoE via the bnx2fc driver, different degrees of data corruption occurred. The provided patch fixes the FCP Response (RSP) residual parsing in bnx2fc, which prevents the aforementioned corruption.importantScientific LinuxScientific Linux 7kernel-tools-libs-3.10.0-327.18.2.el7.x86_64.rpm153a44b680b5521c28baf87b6b7c319cfc7ae1744c62b540c5a423ec12af72b8perf-3.10.0-327.18.2.el7.x86_64.rpmfdc6979af62ab39db246d69d858fad6c74143d28c6ce02350269a4c1618fe9adkernel-abi-whitelists-3.10.0-327.18.2.el7.noarch.rpmb80cab9dd6eb56d2cedf2604a6061a7578855c9f39c62192afd82610b151b4cckernel-devel-3.10.0-327.18.2.el7.x86_64.rpmf7dcaf29694bec33f55e874f90ae6cb448b69ecfbe18973004c4ca8fd8ba9741python-perf-3.10.0-327.18.2.el7.x86_64.rpm717abeb58b43d2949b1c7e4dfcb62dc9e139fd6bca8aaa72a0acff1c6bc9a457kernel-headers-3.10.0-327.18.2.el7.x86_64.rpmc6e09775ca6536041697f8783a9e66a9e61b0d0dc4b0a8218ab6a73db51dd0a5kernel-doc-3.10.0-327.18.2.el7.noarch.rpm76c5d7ac56be95b6c5b6223fe7cd5474c8a081b62cfb8573d0a70b3489cd9cc4kernel-tools-libs-devel-3.10.0-327.18.2.el7.x86_64.rpm28bdea38d925b8921f289109411e5c730c17f1370ec370503b7070ed44a73863kernel-3.10.0-327.18.2.el7.x86_64.rpm4dbf13a93a99ad03a89021777af8a610cbad16941e1270ea9ad6e83e895abe8ckernel-debug-3.10.0-327.18.2.el7.x86_64.rpm2947497edbca974374908ce49171e10d50b1f190af1833451865ebf7165b02e2kernel-debug-devel-3.10.0-327.18.2.el7.x86_64.rpm02705b957bad9e80d11a5e76b3f9ac8211332b12787c197269f4f46c40fe3f68kernel-tools-3.10.0-327.18.2.el7.x86_64.rpm92a3f9f83a65e4b2d21ae0fa671040b266d755b28c94d64bdec1a921dee7ff84SLSA-2016:1041-1ThunderbirdThis update upgrades Thunderbird to version 38.8.0. Security Fix(es): * Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2805, CVE-2016-2807)importantScientific LinuxScientific Linux 7thunderbird-38.8.0-1.el7_2.x86_64.rpm708d402bb0bb055c33b8af2d2572fb1e67eefb4ecdb7c6ae7fa093ac940e00c9SLSA-2016:1086-1LibndpSecurity Fix(es): * It was found that libndp did not properly validate and check the origin of Neighbor Discovery Protocol (NDP) messages. An attacker on a non-local network could use this flaw to advertise a node as a router, allowing them to perform man-in-the-middle attacks on a connecting client, or disrupt the network connectivity of that client. (CVE-2016-3698)moderateScientific LinuxScientific Linux 7libndp-1.2-6.el7_2.i686.rpm680ee23c4b79db13203a0cac1f9f46f9c225805ce67d3d1e524c58579061c1calibndp-devel-1.2-6.el7_2.i686.rpmd9ece21eecadd337115e576704aed441a5f8c921c45f0cecc1957dc4bea64e89libndp-1.2-6.el7_2.x86_64.rpm3c53898bbb1d2ceba7e1295ba4de9f21595685c4a5956c77d4f84948fb2115cdlibndp-devel-1.2-6.el7_2.x86_64.rpmfbbf24c00565ddb94307c3ad790bd2a8a3098ad0cef72d55b1cbf2cf46db8b75SLSA-2016:1139-1SquidSecurity Fix(es): * A buffer overflow flaw was found in the way the Squid cachemgr.cgi utility processed remotely relayed Squid input. When the CGI interface utility is used, a remote attacker could possibly use this flaw to execute arbitrary code. (CVE-2016-4051) * Buffer overflow and input validation flaws were found in the way Squid processed ESI responses. If Squid was used as a reverse proxy, or for TLS/HTTPS interception, a remote attacker able to control ESI components on an HTTP server could use these flaws to crash Squid, disclose parts of the stack memory, or possibly execute arbitrary code as the user running Squid. (CVE-2016-4052, CVE-2016-4053, CVE-2016-4054) * An input validation flaw was found in the way Squid handled intercepted HTTP Request messages. An attacker could use this flaw to bypass the protection against issues related to CVE-2009-0801, and perform cache poisoning attacks on Squid. (CVE-2016-4553) * An input validation flaw was found in Squid's mime_get_header_field() function, which is used to search for headers within HTTP requests. An attacker could send an HTTP request from the client side with specially crafted header Host header that bypasses same-origin security protections, causing Squid operating as interception or reverse-proxy to contact the wrong origin server. It could also be used for cache poisoning for client not following RFC 7230. (CVE-2016-4554) * A NULL pointer dereference flaw was found in the way Squid processes ESI responses. If Squid was used as a reverse proxy or for TLS/HTTPS interception, a malicious server could use this flaw to crash the Squid worker process. (CVE-2016-4555) * An incorrect reference counting flaw was found in the way Squid processes ESI responses. If Squid is configured as reverse-proxy, for TLS/HTTPS interception, an attacker controlling a server accessed by Squid, could crash the squid worker, causing a Denial of Service attack. (CVE-2016-4556)moderateScientific LinuxScientific Linux 7squid-3.3.8-26.el7_2.3.x86_64.rpmd59f163354e1d9bb6e135f58d16a9d31b66466b2a968b28b203da1b5c7c21244squid-sysvinit-3.3.8-26.el7_2.3.x86_64.rpmfdf376b088f6d1062e764fb45ea603a836cbfc1d2463f72d2d1e7e4d7aaee840SLSA-2016:1141-1NtpSecurity Fix(es): * It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979) * A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547) * It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548) * A flaw was found in the way NTP's libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550) * An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518) The CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).moderateScientific LinuxScientific Linux 7ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm96e65ecb032070b9e0edace4c8292d7a0505b169f5efd2f4a4d1bf4e9ddb9876ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm838781520c610f4340947e47890bd7b41615db344155cb3731e3939def9070dbntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm684eb6b5a53164071919884984b0a645dacbde249fc72f368c8f2559a3e69cc9ntp-4.2.6p5-22.el7_2.2.x86_64.rpma3359dce236fe1dad8ced4e3a342319e44fecf0843413258be8b73290287fe09sntp-4.2.6p5-22.el7_2.2.x86_64.rpmf81f545c5ed2c283c74cbe55340b8c404450c9e4f361ca9b18458d01ec346b29SLSA-2016:1205-1SpiceSecurity Fix(es): * A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) * A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150)importantScientific LinuxScientific Linux 7spice-server-0.12.4-15.el7_2.1.x86_64.rpm785d4c166da9fda162dc937f7aaedfc9b0ad429f93d5c15023cc4ce46e8845f9spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpmc982515eca849e56a53655e3256ab8e779d87c2ef7d83d4074087c8c6238b5d1SLSA-2016:1217-1FirefoxThis update upgrades Firefox to version 45.2.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2818, CVE-2016-2819, CVE-2016-2821, CVE-2016-2822, CVE-2016-2828, CVE-2016-2831)criticalScientific LinuxScientific Linux 7firefox-45.2.0-1.el7_2.i686.rpmb7e91807f6ee2dd4194cdfda7256759c6e44f8dfa4be2c4c7da50ca6f70facd3firefox-45.2.0-1.el7_2.x86_64.rpm516ead0b1eb6cfddd9defd2c2f7c6df2b57ce31a959fa73ad66e4deb5a4d89eaSLSA-2016:1237-1ImagemagickSecurity Fix(es): * It was discovered that ImageMagick did not properly sanitize certain input before using it to invoke processes. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-5118) * It was discovered that ImageMagick did not properly sanitize certain input before passing it to the gnuplot delegate functionality. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-5239) * Multiple flaws have been discovered in ImageMagick. A remote attacker could, for example, create specially crafted images that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would result in a memory corruption and, potentially, execution of arbitrary code, a denial of service, or an application crash. (CVE-2015-8896, CVE-2015-8895, CVE-2016-5240, CVE-2015-8897, CVE-2015-8898)importantScientific LinuxScientific Linux 7ImageMagick-devel-6.7.8.9-15.el7_2.x86_64.rpm7a2ecda190447510a7d78dbe8fa6b0f534800d2aee48bbe6f625c34d355619faImageMagick-c++-devel-6.7.8.9-15.el7_2.x86_64.rpm7a4592997fd3a96af8320633ad75c89ebe0e0412f8a1e5c5e95cbc156c3b59e7ImageMagick-6.7.8.9-15.el7_2.x86_64.rpm19a17c427ab5acf3eb998cbaf7236f63e2af23649c29c9b7f9952047f1a24110ImageMagick-c++-6.7.8.9-15.el7_2.i686.rpm22f81213525e79ccf735ba26aea790e6878e73256431d150c993cbd73ecf7afdImageMagick-perl-6.7.8.9-15.el7_2.x86_64.rpm15535a7e8aac5317f6c5b421d6f6b90d2f8b95487973ac2f6459e881e9eeb4b1ImageMagick-doc-6.7.8.9-15.el7_2.x86_64.rpm7482b361387e217a5d5f664440d947f33935d78ffe4e5f4c24a21cf9e7b3d1ffImageMagick-c++-6.7.8.9-15.el7_2.x86_64.rpmcecd0d91732fc6f778b10a87ad5904c406bcdba56d20856e9578d4482c5ea69dImageMagick-devel-6.7.8.9-15.el7_2.i686.rpme6e157b40ca20ba036bd73bac94bcdf14bf472387af9a81547beb1513bd333bcImageMagick-c++-devel-6.7.8.9-15.el7_2.i686.rpmcd270ab62cbc42af2583a901280a17f3351fb340d28a7b7944d9caa7dd6d68bdImageMagick-6.7.8.9-15.el7_2.i686.rpm89d450b0d49760b89fd8220aae5fb4251990e0df26076e73821fcd9423c19bfeSLSA-2016:1277-1KernelTo see the complete list of bug fixes, users are directed to the related Knowledge Article: Security Fixes: * A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important) * A race condition flaw was found in the way the Linux kernel's SCTP implementation handled sctp_accept() during the processing of heartbeat timeout events. A remote attacker could use this flaw to prevent further connections to be accepted by the SCTP server running on the system, resulting in a denial of service. (CVE-2015-8767, Moderate) Bug Fixes: * When Small Computer System Interface (SCSI) devices were removed or deleted, a system crash could occur due to a race condition between listing all SCSI devices and SCSI device removal. The provided patch ensures that the starting node for the klist_iter_init_node() function is actually a member of the list before using it. As a result, a system crash no longer occurs in the described scenario. * This update offers a reworked series of patches for the resizable hash table (rhashtable) including a number of backported bug fixes and enhancements from upstream. * Previously, the same value of the mperf Model-Specific Register (MSR) read twice in a row could lead to a kernel panic due to the divide-by-zero error. The provided patch fixes this bug, and the kernel now handles two identical values of mperf gracefully. * When a transparent proxy application was running and the number of established connections on the computer exceeded one million, unrelated processes, such as curl or ssh, were unable to bind to a local IP on the box to initiate a connection. The provided patch fixes the cooperation of the REUSEADDR/NOREUSEADDR socket option, and thus prevents the local port from being exhausted. As a result, the aforementioned bug no longer occurs in the described scenario. * Previously, the kernel support for non-local bind for the IPv6 protocol was incomplete. As a consequence, an attempt to bind a socket to an IPv6 address that is not assigned to the host could fail. The provided patch includes changes in the ip_nonlocal_bind variable, which is now set to allow binding to an IPv6 address that is not assigned to the host. As a result, Linux servers are now able to bind to non-local IPv6 addresses as expected. * On some servers with a faster CPU, USB initialization could previously lead to a kernel hang during boot. If this inconvenience occurred when booting the second kernel during the kdump operation, the kdump service failed and the vmcore was lost. The provided upstream patch fixes this bug, and the kernel no longer hangs after USB initialization. * Previously, when running iperf servers using the mlx4_en module, a kernel panic occurred. The underlying source code has been fixed, and the kernel panic no longer occurs in the described scenario.importantScientific LinuxScientific Linux 7perf-3.10.0-327.22.2.el7.x86_64.rpme051aa0e0c60fda0a2f69fc46b06a044ff84f6567b474c09296eaec926469e97kernel-headers-3.10.0-327.22.2.el7.x86_64.rpm7e66e30a3ff048a78301442477db8f0e3ee7fd287217ed53e952bd9b5dbe0bd6kernel-debug-devel-3.10.0-327.22.2.el7.x86_64.rpmc36ab7ef919527c33c11800954721841052c27b50546708dea8d9774cba58181kernel-tools-3.10.0-327.22.2.el7.x86_64.rpm50d83dbe6e5426489052c048e912870f6ae93943c31696ad197c4514826df397python-perf-3.10.0-327.22.2.el7.x86_64.rpm0428cc40e261626b95c60cf15a20ac1f74cea6f7d9431f25ec66a345a47f6524kernel-devel-3.10.0-327.22.2.el7.x86_64.rpm021b1e2f1603aaf8bb0b68d2f76b2fc274e7013f41aff8380cddd2d282d64a36kernel-tools-libs-3.10.0-327.22.2.el7.x86_64.rpm0448f050e2bc3c9412e5bc47aecee3366a17bc53daae928881def863c367c753kernel-debug-3.10.0-327.22.2.el7.x86_64.rpm08f788151debb1d534c80be71f186ebaac9403150e78219dde9b1aff59e09a1akernel-tools-libs-devel-3.10.0-327.22.2.el7.x86_64.rpm0133a8196c2a0887f6c4a6ebc44bca79af8fdeab9391db17827600353d2af5f4kernel-3.10.0-327.22.2.el7.x86_64.rpm0e581d8ca9467cbcd85f0b5fb1b1117ec0ac6c580a3fb6084c0eff85d63f910ckernel-abi-whitelists-3.10.0-327.22.2.el7.noarch.rpm6b529cd8de6f481519b3ccbdf0a8e80bf35b7574e18629867f3e6f2cdd4d3d0dkernel-doc-3.10.0-327.22.2.el7.noarch.rpm7fda54360413ce7c2108a40d108e195970085202c7d159061a62dee9552309afSLSA-2016:1292-1Libxml2Security Fix(es): A heap-based buffer overflow flaw was found in the way libxml2 parsed certain crafted XML input. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or execute arbitrary code with the permissions of the user running the application. (CVE-2016-1834, CVE-2016-1840) Multiple denial of service flaws were found in libxml2. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, could cause that application to crash. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449)importantScientific LinuxScientific Linux 7libxml2-2.9.1-6.el7_2.3.i686.rpm2c2eba64f574a21a58c7caf51be9dc8a044658c737f8df4b80fc60c74563b2c3libxml2-python-2.9.1-6.el7_2.3.x86_64.rpmd89ed19b110d53ff0a77425314da684d58aa5bc854831d3efd92627f4543495blibxml2-devel-2.9.1-6.el7_2.3.i686.rpmf7b5eceffa2661abc27bfeef52234284566ee9d208fda774fb6d08459e54ac30libxml2-2.9.1-6.el7_2.3.x86_64.rpm6d5d43a696c3d3d289ad7574f3a1a24d706416f6a6b8447fcb8f81bdfa5eb671libxml2-static-2.9.1-6.el7_2.3.i686.rpm5edb98c219a4960fe980808bb4aead08391fae24060ad740830d5f64d2fd6fd5libxml2-static-2.9.1-6.el7_2.3.x86_64.rpm2b9cba394afb6af45ad1c5d2b86ec5767c7a8e0555d0992a181683c18f826e85libxml2-devel-2.9.1-6.el7_2.3.x86_64.rpmf5e1d6ca2935fa14627b223ff3e4c10501e2963b4d29654b4e3ed9f285ddefc3SLSA-2016:1293-1Setroubleshoot And Setroubleshoot-PluginsThe setroubleshoot-plugins package provides a set of analysis plugins for use with setroubleshoot. Each plugin has the capacity to analyze SELinux AVC data and system data to provide user friendly reports describing how to interpret SELinux AVC denials. Security Fix(es): * Shell command injection flaws were found in the way the setroubleshoot executed external commands. A local attacker able to trigger certain SELinux denials could use these flaws to execute arbitrary code with privileges of the setroubleshoot user. (CVE-2016-4989) * Shell command injection flaws were found in the way the setroubleshoot allow_execmod and allow_execstack plugins executed external commands. A local attacker able to trigger an execmod or execstack SELinux denial could use these flaws to execute arbitrary code with privileges of the setroubleshoot user. (CVE-2016-4444, CVE-2016-4446) The CVE-2016-4444 and CVE-2016-4446 issues were discovered by Milos Malik (Red Hat) and the CVE-2016-4989 issue was discovered by Red Hat Product Security. Note: On Scientific Linux 7.0 and 7.1, the setroubleshoot is run with root privileges. Therefore, these issues could allow an attacker to execute arbitrary code with root privileges.importantScientific LinuxScientific Linux 7setroubleshoot-server-3.2.24-4.el7_2.x86_64.rpm1d801bdac28b79ffd14a1064a4addb0756ec1aea69600b266497caa28a335e11setroubleshoot-plugins-3.0.59-2.el7_2.noarch.rpmb09329f8cfa49772f65a51aeb6af31f55fbb0937512cb29fb280c3c84d7779afsetroubleshoot-3.2.24-4.el7_2.x86_64.rpm124ed18241c37b47f530fb4d6495ecb07641af64fd3874ab61ed70e1c45ba497SLSA-2016:1296-1OcamlSecurity Fix(es): * OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit platforms, causes size arguments to internal memmove calls to be sign- extended from 32- to 64-bits before being passed to the memmove function. This leads to arguments between 2GiB and 4GiB being interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be, causing a possible information leak. (CVE-2015-8869)moderateScientific LinuxScientific Linux 7ocaml-runtime-4.01.0-22.7.el7_2.x86_64.rpmd31b41dda8f6d42fe77fbccdc23493ad2ca98b89d42239699fba7d84d92ef091ocaml-labltk-4.01.0-22.7.el7_2.x86_64.rpm47ad48329944b763f2353a35498c743a7b99687326f5e03cf334bc804178d1b9ocaml-camlp4-4.01.0-22.7.el7_2.x86_64.rpm4bdd49a2ee58328f8a2b4e9b558389cf1aa20b0b7e612dd6e82bbb2f4aa63752ocaml-4.01.0-22.7.el7_2.x86_64.rpmc67ecb770d5ca37484ad95f9a09d2322c9ef505b065bf0529e5cf174e698e402ocaml-compiler-libs-4.01.0-22.7.el7_2.x86_64.rpmdee309880dbd092c7f4a54204707c02eb7e8732767966f0ac9a38323d8f81e73ocaml-emacs-4.01.0-22.7.el7_2.x86_64.rpm64223b8d16a20c786c62e90fcfd77f2ae658aca54fd42e81b8f210cac7a4db48ocaml-x11-4.01.0-22.7.el7_2.x86_64.rpm0a83619c91055c1c4650941cbc93ced020ea1d2f3ac76619bd7858be336702e2ocaml-labltk-devel-4.01.0-22.7.el7_2.x86_64.rpm0b459be4f32668efc1802a2f5d9fec68948846ec4136e6f4bcaac310205adca3ocaml-camlp4-devel-4.01.0-22.7.el7_2.x86_64.rpmc856c5ba5b1902e490bb9d110b6304d76b13646f410a8b8db0b0d8aa17cded45ocaml-docs-4.01.0-22.7.el7_2.x86_64.rpm0bbf793b0c424a19b62381961d99be6c81915b5147db4117b0f7d3923538315focaml-ocamldoc-4.01.0-22.7.el7_2.x86_64.rpm8c05fbedef5add3297f7dd2c6807b0c85157d1b5997e0e1bafd57f12ced5a8c5ocaml-source-4.01.0-22.7.el7_2.x86_64.rpmce0ff8e412db0c6d3152a928448e6bba85b9f7c7d1c45a870c720ddc6aa6c117SLSA-2016:1392-1ThunderbirdThis update upgrades Thunderbird to version 45.2.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2818)importantScientific LinuxScientific Linux 7thunderbird-45.2-1.el7_2.x86_64.rpm8ad8145175805efa5e71bc55632c76cd7ab176ada10ae04ba31846dc341f0de3SLSA-2016:1422-1HttpdSecurity Fix(es): * It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-5387) Note: After this update, httpd will no longer pass the value of the Proxy request header to scripts via the HTTP_PROXY environment variable. Bug Fix(es): * In a caching proxy configuration, the mod_cache module would treat content as stale if the Expires header changed when refreshing a cached response. As a consequence, an origin server returning content without a fixed Expires header would not be treated as cacheable. The mod_cache module has been fixed to ignore changes in the Expires header when refreshing content. As a result, such content is now cacheable, improving performance and reducing load at the origin server. * The HTTP status code 451 "Unavailable For Legal Reasons" was not usable in the httpd configuration. As a consequence, modules such as mod_rewrite could not be configured to return a 451 error if required for legal purposes. The 451 status code has been added to the list of available error codes, and modules can now be configured to return a 451 error if required.importantScientific LinuxScientific Linux 7httpd-manual-2.4.6-40.sl7.4.noarch.rpm70996c31b01fe96dcc1a8d024dd70e708c1299177e6d35b9aed7ce0f4c70d37chttpd-devel-2.4.6-40.sl7.4.x86_64.rpmda1071cf25a89f67721492616b2dfd0c623a5d10b663f1c7322aa53d022f3ef4mod_proxy_html-2.4.6-40.sl7.4.x86_64.rpm864df262141e5668f41094225d16632ce1e5cd50b2f9b070b428f70d56d28525mod_ssl-2.4.6-40.sl7.4.x86_64.rpmc923d40d3834db58f51067f056b00d965f6092038b5f6e8db192535bcd3def09mod_session-2.4.6-40.sl7.4.x86_64.rpmed12662ec7fd165abbab1440eef78dc2a28dacd236696d07ba93b5ecdd3ebeb1mod_ldap-2.4.6-40.sl7.4.x86_64.rpmcfa565b5254a0aa91565c61e34f787603ea1e1fa7b5fc58a865ca46b98ff5920httpd-tools-2.4.6-40.sl7.4.x86_64.rpm32f1518659a2580ee1f0dcddb09ced93606fcc5b691c99ff24c3e6d918d56393httpd-2.4.6-40.sl7.4.x86_64.rpm099f2e6a12d6cff52b7b0f0ba002e24400b7567feba7b27ce007f4d63f685019SLSA-2016:1458-1Java-1.8.0-OpenjdkSecurity Fix(es): * Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-3606, CVE-2016-3587, CVE-2016-3598, CVE-2016-3610) * Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) * Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.criticalScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2.x86_64.rpme0846cdd1321b42054fa1977d18301178509a8eb7743815a27bbe71e986ca57fjava-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2.x86_64.rpmfc92ac458c9f6dd86ff4a89d7afcc35c0dcf76ec1170e18f5683c192822e51b1java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm976865952cb2a8c1675ef4ac9d79ed853e4596ab37c7f62c2bbadb8fc37d2722java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2.x86_64.rpmd5afd991dc293b5c337672c7b7995c9970398d58e0d26a56ee49140edc792ebcjava-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm7c8bc048ada82e2428f0a25310693ca9a193857eb24f2a87e3cc432ef97a59cfjava-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2.x86_64.rpmd73937d2405a73d17e16bc66c3cfff60287c6693cc8bb9cbadcf721a90e8227cjava-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm10cd86ae351b1d50290ad13e73be2eb328dd92902072204011cadf5f9f047206java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2.x86_64.rpmb9ff752cdccf15bba98cc10d23198bb94f16623bfc4573f88412ffb75311ea61java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2.noarch.rpmbe480cc1587b607de85a568e3aa02d95c100d18006392d0fcdb6974fd381089cjava-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm943ae204a9a04ef435ae89423165d0e4aab61466aa8f1b3b91e6ea32dd32a392java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.x86_64.rpm5f22392334592b525545d7b31eebc5489bd8e6661fec4556b7675b69f0c993e0java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm1798d294c4ddb88ac4947320e0e8d81e2115a796110b628100cbdb8a7b3149efjava-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2.x86_64.rpmdd7d518f2c14daf99a25d5f49310f06dc6a934593df385412afeb3f832ccaf04java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2.noarch.rpm354132dba07362de9f56b699992962f52423818892985efc79bd1123167dc45aSLSA-2016:1486-1SambaSecurity Fix(es): * A flaw was found in the way Samba initiated signed DCE/RPC connections. A man-in-the-middle attacker could use this flaw to downgrade the connection to not use signing and therefore impersonate the server. (CVE-2016-2119) Bug Fix(es): * Previously, the "net" command in some cases failed to join the client to Active Directory (AD) because the permissions setting prevented modification of the supported Kerberos encryption type LDAP attribute. With this update, Samba has been fixed to allow joining an AD domain as a user. In addition, Samba now uses the machine account credentials to set up the Kerberos encryption types within AD for the joined machine. As a result, using "net" to join a domain now works more reliably. * Previously, the idmap_hash module worked incorrectly when it was used together with other modules. As a consequence, user and group IDs were not mapped properly. A patch has been applied to skip already configured modules. Now, the hash module can be used as the default idmap configuration back end and IDs are resolved correctly.moderateScientific LinuxScientific Linux 7samba-pidl-4.2.10-7.el7_2.noarch.rpm37e5bcf5ad5abcf172049f86544ecaf54ff06fb52ae41d5b3c881ea63a849589samba-test-devel-4.2.10-7.el7_2.x86_64.rpmb18aea518c00e2749963f73886845f04b04b22fb4bcb8e0a7e03b83a9fa9e3edsamba-libs-4.2.10-7.el7_2.i686.rpm3c03fcffc6f5ef5c81ad682e9f3667849b4e88e4321c4585c35c8e10b2738bf1samba-libs-4.2.10-7.el7_2.x86_64.rpm2fa8836a27ab4c01591f1b9ba0388ffce16c385ce450362890a500aafc97aafcsamba-python-4.2.10-7.el7_2.x86_64.rpmab8c969404ef6e4a6d2c79de83bc12eceea938ba543a1c08d162db749021e8e5samba-winbind-modules-4.2.10-7.el7_2.i686.rpmf6119a5da0d7fe6127a851260569e0b2f6e16ae90c86b19c670d45aa5c445ecbsamba-devel-4.2.10-7.el7_2.x86_64.rpm681bf549a43a4d07a13f72b3c24d743ec65db47593fa11b724958567c565bdc0samba-test-libs-4.2.10-7.el7_2.x86_64.rpm5ba7e4dfa9b0897c802ae638f47a846ca732f88905864006f8a61b3b72f9356esamba-client-libs-4.2.10-7.el7_2.i686.rpm90df4fd8c4745c8d6cf79e23046a7bf4767cdf3188f6e65525b869e31132e4f7samba-vfs-glusterfs-4.2.10-7.el7_2.x86_64.rpm6310360b5f739c0f0f7246853b6f0bbd6046c594355879cc24bef2e8faf526cbsamba-common-libs-4.2.10-7.el7_2.x86_64.rpmeb8dc96afcf97f5c3d138a444ae814faf6a882c64ae10347cf880782550ecd85samba-client-4.2.10-7.el7_2.x86_64.rpmcbc7b6d564a317d62ebcc474cd670bec2e0ddc2f57445538de1c70e608d48976samba-common-tools-4.2.10-7.el7_2.x86_64.rpm9d6d662333dbc8073f67a740161519b1ff4d3f069cd2ed4401ab4f656da5a876samba-client-libs-4.2.10-7.el7_2.x86_64.rpmc3a019e4061be07a7aabfd4549f28aa90c2502150e256c8e634969d33693d627samba-test-4.2.10-7.el7_2.x86_64.rpm4f17451bcc04038d342cf3ff41320fafd5d099862858a5f9e03afe6511f7adc7samba-winbind-modules-4.2.10-7.el7_2.x86_64.rpm735bc8d0c08bbc5d23953d0b5f9789ca26cedbb8d7d240dfe250c25a16a233fblibwbclient-devel-4.2.10-7.el7_2.x86_64.rpm9dba9bb9f4c9541322b184273fe1a59c05a309974332db8af9e9eb269fdd6448samba-winbind-clients-4.2.10-7.el7_2.x86_64.rpm876b10139f34565e36b998e83121b44969e3940e6d6174a852d4042cfaf5d156samba-common-4.2.10-7.el7_2.noarch.rpm40688ebf20170e34227fd49c0fbe8a64611173d28517b05d706b724463ddb0adlibsmbclient-4.2.10-7.el7_2.x86_64.rpm7f93c0895944e18fdbb136cb7f7143d6fd16347f69496504d2e308027f1df129ctdb-tests-4.2.10-7.el7_2.x86_64.rpm4dcc714c41afe05249cf32292081fbeaadebf8a1a3b5b8b0698b5bc4705318e5samba-devel-4.2.10-7.el7_2.i686.rpm78a18ec06ee2608c5038541fbc4ed1b827aadb7e25e0d83739eafd752b52558asamba-test-libs-4.2.10-7.el7_2.i686.rpmb76da3de1d6cd580174d53521fe5d0283393f77e66ebd4c4bd2f71d2218a1a38ctdb-devel-4.2.10-7.el7_2.x86_64.rpme87e31fd96ef7ad1c145bee8dcf005476126529cc17a7752ca87d5bdbac6b079ctdb-4.2.10-7.el7_2.x86_64.rpm28af7332a487a7b8897bce92ff404bcfffb9bb683b2488c50f183f743555582flibsmbclient-4.2.10-7.el7_2.i686.rpmb4fa1e361535c1494d8b3d4d33c95b8a97585b65485d0ced22500a229f45c809libsmbclient-devel-4.2.10-7.el7_2.x86_64.rpm2d128f54b092b241c038764b1bc6bc9dd1df77cd8e24f914187b2869d7dc0b51libwbclient-devel-4.2.10-7.el7_2.i686.rpm08100ae44f5aa6b10ef59b3ff94dbe6e484155be9b8831fc16652f93fc487d8csamba-dc-4.2.10-7.el7_2.x86_64.rpm1c3ba01c9edf3d26ea24f6019dbfffbd715d16fbe47821a74ca28c04f988e2a0samba-winbind-4.2.10-7.el7_2.x86_64.rpm3b297b4988174b885a1662fbf82e6e1a7677ef1ce32b514de9ee48901d0cb0eelibsmbclient-devel-4.2.10-7.el7_2.i686.rpm43bd8395ce253bd6fdfdcbe5a9dec4c64411cd5fb0c3f56532ef813ee182aa29libwbclient-4.2.10-7.el7_2.x86_64.rpm36b60bda9bd568af1cb9408fff208ad726e5ca2387512580a22047aebded8722samba-winbind-krb5-locator-4.2.10-7.el7_2.x86_64.rpm917055051ec56e38c524e2f098752c633b794a3c34c7ad17d583e6a5d3f322dactdb-devel-4.2.10-7.el7_2.i686.rpmd3575f253b4bec60eb98928d95ae0d965d0c40cf4bc4620e4acc0881da95fe73samba-4.2.10-7.el7_2.x86_64.rpm12fe90b291abb51c48995b82ed5b0c306f40aec79bf433145c797b727b0fc4fblibwbclient-4.2.10-7.el7_2.i686.rpm044b3662460635ec55149068b5930bfa28e72bfd1b0fde8a89364586849a6441samba-dc-libs-4.2.10-7.el7_2.x86_64.rpm884dfc83a460c3c727e0181b056c69ad9ba5184c7d2ea4f3b8f4a8876fcb5b36SLSA-2016:1504-1Java-1.7.0-OpenjdkSecurity Fix(es): * Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-3606, CVE-2016-3598, CVE-2016-3610) * Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) * Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm475168b7b3674c82c58ad3f5af017797133720c565a729d97a38ea4bb27c7114java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm01669d028e2bb208c8d8640270107e3c771f7cdadd56e4a9bcb09a4d3f6706b1java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm1ef394db33e2dfc3fac2df9ccce5a240590fbd8c499726573120d908d9c24c50java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm1f2b7315b2c577b2cf926edb1fb0c0a88155392f05eea3d2df5e666cd7c5b85bjava-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2.noarch.rpmc980323cb461de97ffba8a6eca44f72e430a90d51688c8d1d169a6e128d80a5fjava-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm0165d497cbd2bd3bf67622d6c0358807a7eb1ae46e49ee6a98fdbda7ea035447java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2.x86_64.rpmf610a3a5b5f6e3740f777a40c770e7a302c1ab82941ae5aa73d20f98da1cdf30SLSA-2016:1538-1GolangThe following packages have been upgraded to a newer upstream version: golang (1.6.3). Security Fix(es): * An input-validation flaw was discovered in the Go programming language built in CGI implementation, which set the environment variable "HTTP_PROXY" using the incoming "Proxy" HTTP-request header. The environment variable "HTTP_PROXY" is used by numerous web clients, including Go's net/http package, to specify a proxy server to use for HTTP and, in some cases, HTTPS requests. This meant that when a CGI-based web application ran, an attacker could specify a proxy server which the application then used for subsequent outgoing requests, allowing a man-in- the-middle attack. (CVE-2016-5386)moderateScientific LinuxScientific Linux 7golang-src-1.6.3-1.el7_2.1.noarch.rpm4ba74cc08444d418d86a4de38195f28205005ee57c1b607ee881bc1619e8de58golang-misc-1.6.3-1.el7_2.1.noarch.rpm971136952b12149a5cef0582f20b7dbe11c50bbbab6a2322eb7ae7e2e2fe8146golang-tests-1.6.3-1.el7_2.1.noarch.rpm868cb842e065b9bf0efa3dcaedf9b9f28a1c5e04d3390e4ad0e6690c90ed78acgolang-docs-1.6.3-1.el7_2.1.noarch.rpm5c1165040129b4e1967afb9373bc435b6cc4daf175b7afb1305fe2101955b744golang-1.6.3-1.el7_2.1.x86_64.rpma38de0e8672583c125f59e9e8b2a6503b9b8acfe30b3b96a18bd9f66bd828775golang-bin-1.6.3-1.el7_2.1.x86_64.rpm2409bfa5cbe2747f329a727ec7b2d24195d96140d97641bcb8be32e03d63c74aSLSA-2016:1539-1KernelTo see the complete list of bug fixes, users are directed to the related Knowledge Article: Security Fix(es): * A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important) * The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application. (CVE-2015-8660, Moderate) * It was reported that on s390x, the fork of a process with four page table levels will cause memory corruption with a variety of symptoms. All processes are created with three level page table and a limit of 4TB for the address space. If the parent process has four page table levels with a limit of 8PB, the function that duplicates the address space will try to copy memory areas outside of the address space limit for the child process. (CVE-2016-2143, Moderate) Bug Fix(es): * The glibc headers and the Linux headers share certain definitions of key structures that are required to be defined in kernel and in userspace. In some instances both userspace and sanitized kernel headers have to be included in order to get the structure definitions required by the user program. Unfortunately because the glibc and Linux headers don't coordinate this can result in compilation errors. The glibc headers have therefore been fixed to coordinate with Linux UAPI-based headers. With the header coordination compilation errors no longer occur. * When running the TCP/IPv6 traffic over the mlx4_en networking interface on the big endian architectures, call traces reporting about a "hw csum failure" could occur. With this update, the mlx4_en driver has been fixed by correction of the checksum calculation for the big endian architectures. As a result, the call trace error no longer appears in the log messages. * Under significant load, some applications such as logshifter could generate bursts of log messages too large for the system logger to spool. Due to a race condition, log messages from that application could then be lost even after the log volume dropped to manageable levels. This update fixes the kernel mechanism used to notify the transmitter end of the socket used by the system logger that more space is available on the receiver side, removing a race condition which previously caused the sender to stop transmitting new messages and allowing all log messages to be processed correctly. * Previously, after heavy open or close of the Accelerator Function Unit (AFU) contexts, the interrupt packet went out and the AFU context did not see any interrupts. Consequently, a kernel panic could occur. The provided patch set fixes handling of the interrupt requests, and kernel panic no longer occurs in the described situation. * net: recvfrom would fail on short buffer. * Backport rhashtable changes from upstream. * Server Crashing after starting Glusterd & creating volumes. * RAID5 reshape deadlock fix. * BDX perf uncore support fix.importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-327.28.2.el7.x86_64.rpmd35e594715161bc6dcfea6bd5bc3faf4ed83a6ad37584a4db637b3cfa01651fbkernel-abi-whitelists-3.10.0-327.28.2.el7.noarch.rpm3c6d58ade357aa8a1ed23ba558e951303e0f965cc08813f6a44ba653bfa6250dkernel-doc-3.10.0-327.28.2.el7.noarch.rpm9d71f2e44e61bdfb804244e5c6f11280f3e922bc46d878c08f1fef309fc2ea8dkernel-tools-libs-3.10.0-327.28.2.el7.x86_64.rpmd638943faa1ed787a0f681a1d83b4e458de6e325eb0fa6472f54ee8d1d68c36bpython-perf-3.10.0-327.28.2.el7.x86_64.rpm633398584bdfe08615c0cd4ed5925191b1254d80b939a6086f106d7d028cae21kernel-devel-3.10.0-327.28.2.el7.x86_64.rpme2b1f838ca386ca5e8cfa0ed8113b1bd6e62e408a9ab7c9e88cd24034b0a6b0dkernel-tools-libs-devel-3.10.0-327.28.2.el7.x86_64.rpmb69f7d0ae073e4915f8062db38e6f2884458d09a8cd136bbc419cd3892a9a466kernel-headers-3.10.0-327.28.2.el7.x86_64.rpm1e0b64e9a43c32996365887986d0346f38ff0e584f0053c5898d5b9928842584kernel-3.10.0-327.28.2.el7.x86_64.rpm5cab7596073690045c3c83f0a63ef8edec2d859a8444726969eaa6be548fd330perf-3.10.0-327.28.2.el7.x86_64.rpm7d0073e096db0d9adaab74e7ef539a2b5119741f25c38954e56dc84f978c9351kernel-debug-devel-3.10.0-327.28.2.el7.x86_64.rpm972bdb58c42646102a0b77dc11cb57386df0647e610253dea8a10a104853a39bkernel-debug-3.10.0-327.28.2.el7.x86_64.rpm7b7fbf08c56d29d3c053b657f779673e3d3ab68a95d8b9476db2590431fd958bSLSA-2016:1546-1LibtiffSecurity Fix(es): * Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files. (CVE-2014-9655, CVE-2015-1547, CVE-2015-8784, CVE-2015-8683, CVE-2015-8665, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783, CVE-2016-3990, CVE-2016-5320) * Multiple flaws have been discovered in various libtiff tools (bmp2tiff, pal2rgb, thumbnail, tiff2bw, tiff2pdf, tiffcrop, tiffdither, tiffsplit, tiff2rgba). By tricking a user into processing a specially crafted file, a remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code with the privileges of the user running the libtiff tool. (CVE-2014-8127, CVE-2014-8129, CVE-2014-8130, CVE-2014-9330, CVE-2015-7554, CVE-2015-8668, CVE-2016-3632, CVE-2016-3945, CVE-2016-3991)importantScientific LinuxScientific Linux 7libtiff-static-4.0.3-25.el7_2.i686.rpm2fbc036ad747b6bbd588f7277741a8ab0c7c70163023f43ddb81a4898c78978dlibtiff-static-4.0.3-25.el7_2.x86_64.rpm923785d3379577e2bdf3ad4e59dec75b909f108b33a81f423311875427d9a07dlibtiff-devel-4.0.3-25.el7_2.x86_64.rpm8a900a22c9adb840b86a2b97f7ac0b4086995e99ba439643f17c9992ad7f978clibtiff-tools-4.0.3-25.el7_2.x86_64.rpm661e193e74f359e25399284331f4ed00cb782f6d2e775f7989590cd17eeb3215libtiff-4.0.3-25.el7_2.i686.rpm1bbc1a40f8ce864e8fc36896e4c44669a99c00d41c6a9e1f15f43c94dafc9f6flibtiff-4.0.3-25.el7_2.x86_64.rpm67e450a99905904c54e049c6284a9e7c3d0a2e517c29c73a963050a23e9413a4libtiff-devel-4.0.3-25.el7_2.i686.rpmbeb9decc149fa2a17afc636fb11f337e5c1e7051b24f3892f1ee8d1757563dc6SLSA-2016:1551-1FirefoxThis update upgrades Firefox to version 45.3.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2836, CVE-2016-5258, CVE-2016-5259, CVE-2016-5252, CVE-2016-5263, CVE-2016-2830, CVE-2016-2838, CVE-2016-5254, CVE-2016-5262, CVE-2016-5264, CVE-2016-5265, CVE-2016-2837)criticalScientific LinuxScientific Linux 7firefox-45.3.0-1.el7_2.x86_64.rpm0fb3b07188ba1b7f8dafd42be0bda27c2f174f4979738c6de5e4a0dc87414dcefirefox-45.3.0-1.el7_2.i686.rpmf381db40af85ff836c228c9b28ac55bd9f3a43d53ce96687081220691334a1d2SLSA-2016:1602-1MariadbThe following packages have been upgraded to a newer upstream version: mariadb (5.5.50). Security Fix(es): (CVE-2016-0640, CVE-2016-0641, CVE-2016-0643, CVE-2016-0644, CVE-2016-0646, CVE-2016-0647, CVE-2016-0648, CVE-2016-0649, CVE-2016-0650, CVE-2016-0666, CVE-2016-3452, CVE-2016-3477, CVE-2016-3521, CVE-2016-3615, CVE-2016-5440, CVE-2016-5444)importantScientific LinuxScientific Linux 7mariadb-embedded-5.5.50-1.el7_2.x86_64.rpm39df28ded5a3a00835f882879b7aa8be1a7bbd256679b8e4418adcc3c6e34017mariadb-bench-5.5.50-1.el7_2.x86_64.rpm3de924296162d2a95ac9a606f0885aeff19451df37fc80576e31bfe3107a72c4mariadb-embedded-devel-5.5.50-1.el7_2.i686.rpm5b0d6a87ceb897becc2732f4fac51ae222098ec4deb65ced9c792de3837834ebmariadb-devel-5.5.50-1.el7_2.x86_64.rpm1b3407ca92085d1cf0afe36f2e9b914cc98b580d8ed4ebd19a6d2ce92e9b6912mariadb-test-5.5.50-1.el7_2.x86_64.rpmed396bb94e61ec9e50ce4a3a628a9e4fbd0bf0b8e8c04b2bbad3cc2eab815321mariadb-embedded-devel-5.5.50-1.el7_2.x86_64.rpm4034de22d81c7bb3c89b4dd395ec9f9d0d93e81a01e719fd9f1722bacb558c30mariadb-libs-5.5.50-1.el7_2.i686.rpm12a6939cad3debb58c63ec49a1b503ce7542342b2c619b11e4a128c622e38724mariadb-server-5.5.50-1.el7_2.x86_64.rpm20eeb4e7b2cf7664b09e4e8f7b3bf73079d61a91ee81409638617aa843739aa5mariadb-embedded-5.5.50-1.el7_2.i686.rpma5dbf5ddaf8a3b988a730f153902a589ecfe474684079cc060488479084359b3mariadb-5.5.50-1.el7_2.x86_64.rpm36d548cdb0a2db368a87b6f9730e2ef3fcdadb8369be85ee63334b984837955cmariadb-libs-5.5.50-1.el7_2.x86_64.rpm83f5d3a07a21667a25f6f68dae28b25cf17f048399a1793ec1c925cf66181963mariadb-devel-5.5.50-1.el7_2.i686.rpmd47002d324cc132cac976c8d2652fd52dea513e8530c6b8b025c4bcbfeccbad3SLSA-2016:1606-1Qemu-KvmSecurity Fix(es): * Quick Emulator(Qemu) built with the Block driver for iSCSI images support (virtio-blk) is vulnerable to a heap buffer overflow issue. It could occur while processing iSCSI asynchronous I/O ioctl(2) calls. A user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host. (CVE-2016-5126) * Quick emulator(Qemu) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement and therefore causes unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403)moderateScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-105.el7_2.7.x86_64.rpmc16a297cdcffde574a135b3327d969e447b3028398da9e999fc3f518bef915bblibcacard-1.5.3-105.el7_2.7.x86_64.rpm4995429b8d5c4cecb888e265faa1c5c9fc6dc5265f4448ca837b448ad09bb52eqemu-img-1.5.3-105.el7_2.7.x86_64.rpma4d960ce3c92e05f3e407c5e0db416eb456aa900f90b5138cbbfb388d0a72f0clibcacard-tools-1.5.3-105.el7_2.7.x86_64.rpmd7413b57c5fedd5b0d34ddfbaf1c4d365016c37b038daed18c0d90b21d129168qemu-kvm-common-1.5.3-105.el7_2.7.x86_64.rpma1804928cdc95e58d3bbe09f8d65d1954439234e6d568f0428a35e84ba6ad770libcacard-devel-1.5.3-105.el7_2.7.x86_64.rpmb8486f48b80b3270b27a3c96d04ad32a0ee40768c3c4dd12bdf1b159c896802clibcacard-1.5.3-105.el7_2.7.i686.rpm07a01adff8f29d07534c15af8c2d2d379d63d59e792e501b5370f059710166e2libcacard-devel-1.5.3-105.el7_2.7.i686.rpm53d33667922e68b169a537b1b2965b045909619966ae3cb8a01b39961bc240ceqemu-kvm-1.5.3-105.el7_2.7.x86_64.rpm1d4b4affaa53a935c48c81dcc5e1a4cce7830cb059550ac453651a43be0ef2f3SLSA-2016:1613-1PhpSecurity Fix(es): * It was discovered that PHP did not properly protect against the HTTP_PROXY variable name clash. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a PHP script to an attacker- controlled proxy via a malicious HTTP request. (CVE-2016-5385) Bug Fix(es): * Previously, an incorrect logic in the SAPI header callback routine caused that the callback counter was not incremented. Consequently, when a script included a header callback, it could terminate unexpectedly with a segmentation fault. With this update, the callback counter is properly managed, and scripts with a header callback implementation work as expected.moderateScientific LinuxScientific Linux 7php-dba-5.4.16-36.3.el7_2.x86_64.rpmc68816f52e18f23a1bece5f4896c233d02e81b110e2a47611c4f250f793d0ff5php-xml-5.4.16-36.3.el7_2.x86_64.rpm577ce3cc3f26a6c7c837d11517db941dae63bc0ae2dc420dfd11d8f23fe4745bphp-process-5.4.16-36.3.el7_2.x86_64.rpm19088a290ccad09de0c44c7aa04f514fd61072be7190226264d5b606e8a5b86aphp-pspell-5.4.16-36.3.el7_2.x86_64.rpm41a35b9ce473666073c3befe00fa3cc30dc1937ea653de77927899ff3a2543d5php-devel-5.4.16-36.3.el7_2.x86_64.rpmcb8745f78ff52f286bd3dcd1153fb587b90b62cb876b87e49570afdabba98c9dphp-intl-5.4.16-36.3.el7_2.x86_64.rpmede2921af12c65fe940e1960989519c8931e30ea160d6eaf15c677de624ca897php-ldap-5.4.16-36.3.el7_2.x86_64.rpm8979ad955e350fac065dde32bcd8e803a1f7cfa5677ef34974730b706cda0999php-embedded-5.4.16-36.3.el7_2.x86_64.rpm983146a8f6b1faac6098c058a51fd6e0d11352e932ac96ab9f6363e3ce348acdphp-snmp-5.4.16-36.3.el7_2.x86_64.rpmc2c5f81f475fc97ce9f66c14584b1bf7a327675a3ae9eeb0deaed2c6925121faphp-soap-5.4.16-36.3.el7_2.x86_64.rpmb5fc00fb470a35be9ed3e2299272e651604b3f8a28892d41998ccd20daa2e5baphp-enchant-5.4.16-36.3.el7_2.x86_64.rpm1996df7e3226f1132ae36fcb1fdc78f3418de5b28cc4c466ca6440f99c8e4823php-common-5.4.16-36.3.el7_2.x86_64.rpmebd9a8204ccf4df4d928ceec1e1f43b1d8b1152fcdef7ab21db539df1c32403fphp-xmlrpc-5.4.16-36.3.el7_2.x86_64.rpmcec55d5b57ba5ee63e2ca84afb89572200971575cbeb495f2f126507cf6f3e85php-pdo-5.4.16-36.3.el7_2.x86_64.rpm7872de7247bfd1bff568d94007495c44aac46158ec593439dfce762d3f73a620php-mbstring-5.4.16-36.3.el7_2.x86_64.rpm6b23c5f83163409e17e31c9a17b0f1fdf7764955fb6c9700414a2e656bc06d6bphp-cli-5.4.16-36.3.el7_2.x86_64.rpm4ee5eb94f3da32e208e8278f3d7d8872a2f90b6746f05ae0326e9a9c3d0579c2php-pgsql-5.4.16-36.3.el7_2.x86_64.rpm7467d46e96504135c0be3ae966440aeb927097be03ef534a368a65c465d97abdphp-5.4.16-36.3.el7_2.x86_64.rpm6d50f35255977ec1e3abb1340a9cab0933fcc994f0e3c05a9a04a61392c8bf37php-gd-5.4.16-36.3.el7_2.x86_64.rpmdeb59f64ef1c1771384d1e63baaa49a4c02a31b66f7832bbeb71f05bcb3cd9c1php-mysql-5.4.16-36.3.el7_2.x86_64.rpmcfdc13d3223dd942273238522d87bcfbff44556a7fd14fe0f507ef2cf35768dfphp-mysqlnd-5.4.16-36.3.el7_2.x86_64.rpm44c8acbfe517b83b9af4c15f2c98ceee7fd6d48cf08ce72a9a5770b3760387adphp-recode-5.4.16-36.3.el7_2.x86_64.rpm44ab1ecfb62ec36740c6017a7cc50abd5ec739a61d0a4f5e48e7a1f2c2ab08d2php-fpm-5.4.16-36.3.el7_2.x86_64.rpmb9563bcd85958078bc0ae84c1168a43c6c61b163414a71df8e0a586e5b3ddf11php-bcmath-5.4.16-36.3.el7_2.x86_64.rpmdec25b3d679dca4aa01e7ab9aed0b95164ffbb48de2eabea331e279eb4f69e7ephp-odbc-5.4.16-36.3.el7_2.x86_64.rpmbd5997442d8859e859a4d3231a326abd22540947c40fe453e3bf905c6aec3e8eSLSA-2016:1626-1PythonSecurity Fix(es): * It was discovered that the Python CGIHandler class did not properly protect against the HTTP_PROXY variable name clash in a CGI context. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a Python CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000110) * It was found that Python's smtplib library did not return an exception when StartTLS failed to be established in the SMTP.starttls() function. A man in the middle attacker could strip out the STARTTLS command without generating an exception on the Python SMTP client application, preventing the establishment of the TLS layer. (CVE-2016-0772) * It was found that the Python's httplib library (used by urllib, urllib2 and others) did not properly check HTTPConnection.putheader() function arguments. An attacker could use this flaw to inject additional headers in a Python application that allowed user provided header names or values. (CVE-2016-5699)moderateScientific LinuxScientific Linux 7tkinter-2.7.5-38.el7_2.x86_64.rpm09d52e7179638d14e2e3fb2ff2ae9bda056c13c652b2db6e4e183b642976a5ccpython-test-2.7.5-38.el7_2.x86_64.rpm028a50c6ae23af0f87e980dcf835813bd8548c22819d63bed5b70c2258a34441python-debug-2.7.5-38.el7_2.x86_64.rpmcba4f030d97067c490249e668e0157779167cb71d9f2ceff2f40a4341eaf309apython-tools-2.7.5-38.el7_2.x86_64.rpm4fcf80b816585f5c405e682d311aedff20d2ee23689c4f1d1a03117538383814python-2.7.5-38.el7_2.x86_64.rpmc8292b8b314b61abfce00d9112cf2b1c2605ff83ff4fceb51160b89687a54bf3python-libs-2.7.5-38.el7_2.x86_64.rpm565c59da32839a1162014755f85a09a5c630a64433656ed282c5baebd0c16cd9python-devel-2.7.5-38.el7_2.x86_64.rpma212882ed780311daa47113270742b17f8034f94cdf5c4d96272e0a036b970e1python-libs-2.7.5-38.el7_2.i686.rpm92cfd07c8b5470f90ed984d8059392c9346db58c4575626657f7cc9229b9bc9dSLSA-2016:1633-1KernelIt was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)importantScientific LinuxScientific Linux 7kernel-tools-libs-devel-3.10.0-327.28.3.el7.x86_64.rpmf73fa41a3d502a532ed92991b8cc2b332ebc2e5e7475b6b08d3086ee72f5b3a8kernel-3.10.0-327.28.3.el7.x86_64.rpmf5998200db0d032521ffd309bbc3c3216db2417cd6dc83401057d3ea59092658kernel-headers-3.10.0-327.28.3.el7.x86_64.rpma147ce3ece2f5c66ce41c2e50c0a62ad0b80699ecc51eeb748c689d7f5207715perf-3.10.0-327.28.3.el7.x86_64.rpm1699ab7ce6c70d93eba722e39060b3825806b22337029eb0b4cb34a69e6f5a7dkernel-debug-3.10.0-327.28.3.el7.x86_64.rpm43a4b56ebf14d85ed3991ad49e46ce557b781d8608c1acd6111ec35a8f528668kernel-debug-devel-3.10.0-327.28.3.el7.x86_64.rpm310e6f669929ded1da0d08428350a47ee536717f7cd4ee3d2ab97afb5d4db8cdpython-perf-3.10.0-327.28.3.el7.x86_64.rpm020e807a6cec721480f7b7cfc1329a773b06ef3243eb75aa3d4edfcd065d04c1kernel-doc-3.10.0-327.28.3.el7.noarch.rpm527c88e49011e8cf8f726853e08dfde14866f21434c0e51a6b08d7d53314fd31kernel-abi-whitelists-3.10.0-327.28.3.el7.noarch.rpm3b575a5a21b1eb9004ae4d1c021343e5df1814623760e047ef1928bc0a2533e5kernel-devel-3.10.0-327.28.3.el7.x86_64.rpm3c4f6b84da3e5ad429263a8f71ddbe37821731ccf7f87d2b833380dbc88ef21bkernel-tools-3.10.0-327.28.3.el7.x86_64.rpm025f4401b2b52eaa29350c544bd4a93c4b1a17cdae030188a0f9df76b52bac87kernel-tools-libs-3.10.0-327.28.3.el7.x86_64.rpm4d85bc640477b522aa56e7a1c0f80c4eb7a08e577b42478540607ce1ac8e66b3SLSA-2016:1776-1Java-1.6.0-OpenjdkSecurity Fix(es): * An insufficient bytecode verification flaw was discovered in the Hotspot component in OpenJDK. An untrusted Java application or applet could use this flaw to completely bypass Java sandbox restrictions. (CVE-2016-3606) * Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) * Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)importantScientific LinuxScientific Linux 7java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2.x86_64.rpmf7ff72ef8622cbff6186313f846a68fa4b42ec6c16db75dad6358e4e5a07f9a9java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2.x86_64.rpm259991b546b30dd1edf60207c9306a4480e987017de1d2d489f4c6900fcaaf11java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2.x86_64.rpm76d4f2f9e3f9f1679bbd59ebd5e2565ae0b8dd03b8e49130d4ac24a206957f06java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2.x86_64.rpm3c2a36f0aff8a81c5632bb0b9fff1b75d5d742c9b4f47609abbf7b41b378526cjava-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2.x86_64.rpm5cd48ef26979da4eedc15f571bd76da4fe7f2d0219813983bd67c043a36558e3SLSA-2016:1797-1IpaSecurity Fix(es): * An insufficient permission check issue was found in the way IPA server treats certificate revocation requests. An attacker logged in with the 'retrieve certificate' permission enabled could use this flaw to revoke certificates, possibly triggering a denial of service attack. (CVE-2016-5404)moderateScientific LinuxScientific Linux 7ipa-server-dns-4.2.0-15.sl7_2.19.x86_64.rpm2f17555730be9b4fcad2d1c01cae4509fa1f21b6b90de6373991c64fc4ff74b6ipa-client-4.2.0-15.sl7_2.19.x86_64.rpma4dd86bc57919d594ec6aa1f2519dc81c9c73982262db3ff7b105acea6000a72ipa-python-4.2.0-15.sl7_2.19.x86_64.rpmecdf6217c564464052855973a251e09b58cf430c48088cbdffa0bd7ab076440bipa-server-4.2.0-15.sl7_2.19.x86_64.rpmdae57fa1658afb9d87620d6794cf659c343ffd09584f9d8a2d80477ae7595ec3ipa-server-trust-ad-4.2.0-15.sl7_2.19.x86_64.rpmeec47ff05e9ea6026b38a968c825dc15c2c9489e0c1ceed18d14da4f7def8886ipa-admintools-4.2.0-15.sl7_2.19.x86_64.rpm3801e0e16b1ffc27892265ef4f38bff8563bf571c4d785921fb90de382a1d553SLSA-2016:1809-1ThunderbirdThis update upgrades Thunderbird to version 45.3.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2836)importantScientific LinuxScientific Linux 7thunderbird-45.3.0-1.el7_2.x86_64.rpmf1a8ce04ecaf830ab2a55c8a653db3b4865e3be00b0ac43ced3ef4f56735f513SLSA-2016:1844-1LibarchiveSecurity Fix(es): * A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive. (CVE-2016-5418) * Multiple out-of-bounds write flaws were found in libarchive. Specially crafted ZIP, 7ZIP, or RAR files could cause a heap overflow, potentially allowing code execution in the context of the application using libarchive. (CVE-2016-1541, CVE-2016-4300, CVE-2016-4302) * Multiple out-of-bounds read flaws were found in libarchive. Specially crafted LZA/LZH, AR, MTREE, ZIP, TAR, or RAR files could cause the application to read data out of bounds, potentially disclosing a small amount of application memory, or causing an application crash. (CVE-2015-8919, CVE-2015-8920, CVE-2015-8921, CVE-2015-8923, CVE-2015-8924, CVE-2015-8925, CVE-2015-8926, CVE-2015-8928, CVE-2015-8934) * Multiple NULL pointer dereference flaws were found in libarchive. Specially crafted RAR, CAB, or 7ZIP files could cause an application using libarchive to crash. (CVE-2015-8916, CVE-2015-8917, CVE-2015-8922) * Multiple infinite loop / resource exhaustion flaws were found in libarchive. Specially crafted GZIP or ISO files could cause the application to consume an excessive amount of resources, eventually leading to a crash on memory exhaustion. (CVE-2016-7166, CVE-2015-8930) * A denial of service vulnerability was found in libarchive. A specially crafted CPIO archive containing a symbolic link to a large target path could cause memory allocation to fail, causing an application using libarchive that attempted to view or extract such archive to crash. (CVE-2016-4809) * An integer overflow flaw, leading to a buffer overflow, was found in libarchive's construction of ISO9660 volumes. Attempting to create an ISO9660 volume with 2 GB or 4 GB file names could cause the application to attempt to allocate 20 GB of memory. If this were to succeed, it could lead to an out of bounds write on the heap and potential code execution. (CVE-2016-6250) * Multiple instances of undefined behavior due to arithmetic overflow were found in libarchive. Specially crafted MTREE archives, Compress streams, or ISO9660 volumes could potentially cause the application to fail to read the archive, or to crash. (CVE-2015-8931, CVE-2015-8932, CVE-2016-5844)importantScientific LinuxScientific Linux 7libarchive-3.1.2-10.el7_2.x86_64.rpm9e800f144d5e492874cd12ee61b19503dbe0b2a3c6611041387bf595ca623632libarchive-3.1.2-10.el7_2.i686.rpm2745ea1d59f3a65469a976e815f9b34a66de0df5a157dfd85211af7b88aa0b49bsdtar-3.1.2-10.el7_2.x86_64.rpm95c94e7c2ca436905e6b149a6e893443d41c2ae27fb823a4a9c4948930cdc951bsdcpio-3.1.2-10.el7_2.x86_64.rpm48b550d184d4d09b2f66e60d6933d09e48e3179948f8c7c589476e9ea1007283libarchive-devel-3.1.2-10.el7_2.i686.rpm580d066bc77a752d0f13618a1edaee88ac1d4702e2a00d1f7f4813d2a3f01ddflibarchive-devel-3.1.2-10.el7_2.x86_64.rpmf0f3c8a40d2613a1d295620b6884c26bf1c60d3b93cc75351725696c7a60dc4fSLSA-2016:1847-1KernelSecurity Fix(es): * A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important) * A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important) * An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate) Bug Fix(es): * In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario. * Previously, running I/O-intensive operations in some cases caused the system to terminate unexpectedly after a null pointer dereference in the kernel. With this update, a set of patches has been applied to the 3w-9xxx and 3w-sas drivers that fix this bug. As a result, the system no longer crashes in the described scenario. * Previously, the Stream Control Transmission Protocol (SCTP) sockets did not inherit the SELinux labels properly. As a consequence, the sockets were labeled with the unlabeled_t SELinux type which caused SCTP connections to fail. The underlying source code has been modified, and SCTP connections now works as expected. * Previously, the bnx2x driver waited for transmission completions when recovering from a parity event, which substantially increased the recovery time. With this update, bnx2x does not wait for transmission completion in the described circumstances. As a result, the recovery of bnx2x after a parity event now takes less time. Enhancement(s): * With this update, the audit subsystem enables filtering of processes by name besides filtering by PID. Users can now audit by executable name (with the "-F exe=<path-to-executable>" option), which allows expression of many new audit rules. This functionality can be used to create events when specific applications perform a syscall. * With this update, the Nonvolatile Memory Express (NVMe) and the multi- queue block layer (blk_mq) have been upgraded to the Linux 4.5 upstream version. Previously, a race condition between timeout and freeing request in blk_mq occurred, which could affect the blk_mq_tag_to_rq() function and consequently a kernel oops could occur. The provided patch fixes this race condition by updating the tags with the active request. The patch simplifies blk_mq_tag_to_rq() and ensures that the two requests are not active at the same time. * The Hyper-V storage driver (storvsc) has been upgraded from upstream. This update provides moderate performance improvement of I/O operations when using storvscr for certain workloads.importantScientific LinuxScientific Linux 7kernel-3.10.0-327.36.1.el7.x86_64.rpmf6d797019988472cec9507d7bdf8050020e92894716859f9c78ac080aa01773ekernel-debug-devel-3.10.0-327.36.1.el7.x86_64.rpma2eba8a814a80a5b0768495fbae75a470835fd4bd4befa205d1ffa4e7246f72dkernel-abi-whitelists-3.10.0-327.36.1.el7.noarch.rpm526dc878809242ef14412af86a72222ec3ac7ec7b12107589fa8d4c2c20a182bkernel-tools-libs-devel-3.10.0-327.36.1.el7.x86_64.rpm2afb8635adfb3b28f19f11cac3a997b4413327b8bff696c8a3ae5498144ee39dkernel-tools-libs-3.10.0-327.36.1.el7.x86_64.rpm89df78c3dd432a0dba78ca434e29413b85f747efc698765b88b029e8bd6bbf01kernel-debug-3.10.0-327.36.1.el7.x86_64.rpm203d3d4a1e0e755da82cb5188a09ed8213d4172b3ce898a7275d6aadfbce987ekernel-doc-3.10.0-327.36.1.el7.noarch.rpmc94b71dc2be79b752812206634ab4cd437e9ce323118b2b488efc8d62d7ad865kernel-tools-3.10.0-327.36.1.el7.x86_64.rpm8ac1240f65db11d0f659002b6ab37f433a27ba4f8ec685ab1c5e38b3867939e5kernel-headers-3.10.0-327.36.1.el7.x86_64.rpmbaa2734d47301d59d3e44abe0dea26a206bea357fa746c0eec79fc1d105b007apython-perf-3.10.0-327.36.1.el7.x86_64.rpmc8d02c03c54d44ec0c67fd551bf3f51e51b51b029e099e328657b6ae6fed9b3dkernel-devel-3.10.0-327.36.1.el7.x86_64.rpmceee0c25316470020842af75c81604949ff000fe4e000c68fa8412912f9c5f18perf-3.10.0-327.36.1.el7.x86_64.rpm59bc7ebddc0b09a284f4446a6f0ced400c37a33e482af860be977e4c7a4283f5SLSA-2016:1912-1FirefoxThis update upgrades Firefox to version 45.4.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-5257, CVE-2016-5278, CVE-2016-5270, CVE-2016-5272, CVE-2016-5274, CVE-2016-5276, CVE-2016-5277, CVE-2016-5280, CVE-2016-5281, CVE-2016-5284, CVE-2016-5250, CVE-2016-5261)criticalScientific LinuxScientific Linux 7firefox-45.4.0-1.el7_2.x86_64.rpm537109c5288bf8e7e17390ed5c363c1cae00dc98a9555b39d053c7a909ebb53efirefox-45.4.0-1.el7_2.i686.rpm1994576e463c3507505d841c234b19647d907df600d9d1d94d9a43d27edb1890SLSA-2016:1940-1OpensslSecurity Fix(es): * A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304) * It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178) * It was discovered that the Datagram TLS (DTLS) implementation could fail to release memory in certain cases. A malicious DTLS client could cause a DTLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory. (CVE-2016-2179) * A flaw was found in the Datagram TLS (DTLS) replay protection implementation in OpenSSL. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection. (CVE-2016-2181) * An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. An attacker able to make an application using OpenSSL to process a large BIGNUM could cause the application to crash or, possibly, execute arbitrary code. (CVE-2016-2182) * A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) This update mitigates the CVE-2016-2183 issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default. * An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. A remote attacker could use this flaw to crash a TLS server using OpenSSL if it used SHA-512 as HMAC for session tickets. (CVE-2016-6302) * Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177) * An out of bounds read flaw was found in the way OpenSSL formatted Public Key Infrastructure Time-Stamp Protocol data for printing. An attacker could possibly cause an application using OpenSSL to crash if it printed time stamp data from the attacker. (CVE-2016-2180) * Multiple out of bounds read flaws were found in the way OpenSSL handled certain TLS/SSL protocol handshake messages. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL. (CVE-2016-6306)importantScientific LinuxScientific Linux 7openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpmc808738e93094286e1556ed3680b370090c904043c13dcf58602758a72f4b2fdopenssl-libs-1.0.1e-51.el7_2.7.i686.rpm00bee96e58b6ac75454a9bca1f0375f93e7bdfe91dc58be43354e317e33426caopenssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm388b78066fcab44cf8ab5cefa987f284fe38f67ec8a7a5ad115ad524d3bbd758openssl-static-1.0.1e-51.el7_2.7.i686.rpma5e3ce9a898e07c92b74b078f836007b677edfa9f8253140c5f476a570b30c0bopenssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm2aa430c69844d088d7ed491d4e2bc05130069e1eeb96f50f19799394f96ca7a0openssl-devel-1.0.1e-51.el7_2.7.i686.rpm829ad5436d8e750acbed2a7bd3e318f7e58f102a05ccbb8d59b6d0a84a5cf829openssl-1.0.1e-51.el7_2.7.x86_64.rpm4aecd6f437a7397099352da4c219c8ba5dbbc53b1262d8b70405ef6e66a1415bopenssl-static-1.0.1e-51.el7_2.7.x86_64.rpm2141a5ce1184176e1ae0a353c61e1bf3fa743f52957c2ace42f8699fb050511bSLSA-2016:1944-1BindSecurity Fix(es): * A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776)importantScientific LinuxScientific Linux 7bind-lite-devel-9.9.4-29.el7_2.4.i686.rpm43b1a90078a4f8127fa30a611c4af3a6043b0c30bc6e0dac08c6918cd9f993d1bind-utils-9.9.4-29.el7_2.4.x86_64.rpm0666eaa7fcd84d8989a24ce73ccd1b6f1cb31c1d3aec88319a1bf6af5cb8892dbind-pkcs11-libs-9.9.4-29.el7_2.4.i686.rpmf66bdaba6ca718c0cf8366e79b4aec599061acf43a671d7ede00e21bfd40456bbind-9.9.4-29.el7_2.4.x86_64.rpm653728d0b628e2ce823d7b42a9ca67638e8163ebf95c55d111a1b07bc5ac0c74bind-libs-lite-9.9.4-29.el7_2.4.i686.rpm17d12d798818754c03c0d521341693da94c4b7e398f4fa254cb1a62bc30ab3e4bind-sdb-chroot-9.9.4-29.el7_2.4.x86_64.rpm7ea53c5ae92e95f58ae425691124e343af05b8a4ac1ecd6b1650b7e86b2cb9bbbind-devel-9.9.4-29.el7_2.4.x86_64.rpm7bc02d795df999db6fea488bac3cb18bcf4dc7d2515732ee3b6f924da7100e3fbind-chroot-9.9.4-29.el7_2.4.x86_64.rpmc5ee22881b0dc0987c4d4af5b024fb41b5ead339c58b91a9084e3a358613047bbind-pkcs11-9.9.4-29.el7_2.4.x86_64.rpm581b98dcc58ae4307dadbe3753f7bae4b32144bf65f1649b2f4b976a6cec2c0cbind-libs-9.9.4-29.el7_2.4.x86_64.rpmfd2a9d8f7e3a428d214bb72cd5a9e1977c3ae94f00d693a932a8ff5e959b70d8bind-pkcs11-devel-9.9.4-29.el7_2.4.x86_64.rpmb7160fc7dc6f87d0a3c83e426d399fbf10a52781007131d3df0a726b7b202a48bind-pkcs11-libs-9.9.4-29.el7_2.4.x86_64.rpm15deed6f136363cbba6a12831ee7044b5a9c4f4c5cdd2e49781746c660b67e60bind-lite-devel-9.9.4-29.el7_2.4.x86_64.rpm603c9443803a6d71fb6fdb02f7d738eebd8a6e123580e19e890446c59e4756debind-license-9.9.4-29.el7_2.4.noarch.rpm207df055e34eae3ab937f9d4b7d968b1a890c28f4d70513f3bce824c192cb2e9bind-pkcs11-utils-9.9.4-29.el7_2.4.x86_64.rpmb2a550b1d25db2940d03b90abe7323f3df1a06a211fc0c0b6fd78e2c6df193c7bind-pkcs11-devel-9.9.4-29.el7_2.4.i686.rpm8d1ddaf33f0a936472232b445ae87644916657d93c8d24dd11f0de120db59decbind-devel-9.9.4-29.el7_2.4.i686.rpm5ad0767972dd9249c5eee3a284dbdd673f55c9327d897b930967cefe40765bd5bind-libs-lite-9.9.4-29.el7_2.4.x86_64.rpm4bda337d9d870cc7d23674b392af99a73491ebadfb36428b26bd28212479c0fdbind-sdb-9.9.4-29.el7_2.4.x86_64.rpm9c06317fd8cc6e5cddbb9d642b88c2175cc0131377ccabf2ef580882995ae02abind-libs-9.9.4-29.el7_2.4.i686.rpmdaf789b58745c0d3f897f5ec7d945014c682d7862d654f1a34352933f40c7231SLSA-2016:1978-1Python-Twisted-WebSecurity Fix(es): * It was discovered that python-twisted-web used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000111) Note: After this update, python-twisted-web will no longer pass the value of the Proxy request header to scripts via the HTTP_PROXY environment variable.importantScientific LinuxScientific Linux 7python-twisted-web-12.1.0-5.el7_2.x86_64.rpm578ad9245b86f09b8e993cdb3cf3de8b11b769d735b3e141f05f50648a6928bbSLSA-2016:1985-1ThunderbirdThis update upgrades Thunderbird to version 45.4.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-5257)importantScientific LinuxScientific Linux 7thunderbird-45.4.0-1.el7_2.x86_64.rpm589ae4bd3dfa4070a089bff1671488f4aef6172532ce50e70f12966291ba38c3SLSA-2016:2046-1TomcatSecurity Fix(es): * It was discovered that the Tomcat packages installed configuration file /usr/lib/tmpfiles.d/tomcat.conf writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-5425) * It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325) * It was found that the expression language resolver evaluated expressions within a privileged code section. A malicious web application could use this flaw to bypass security manager protections. (CVE-2014-7810) * It was discovered that tomcat used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-5388) * A session fixation flaw was found in the way Tomcat recycled the requestedSessionSSL field. If at least one web application was configured to use the SSL session ID as the HTTP session ID, an attacker could reuse a previously used session ID for further requests. (CVE-2015-5346)importantScientific LinuxScientific Linux 7tomcat-servlet-3.0-api-7.0.54-8.el7_2.noarch.rpm10b215f64347b272449e5b3b0397ab94f77c1784e917889df553c4543d6fcf9etomcat-webapps-7.0.54-8.el7_2.noarch.rpmd6335ede43d8e3be77fc47a651997a63c18fb9427820b6606d81708d5698774btomcat-jsvc-7.0.54-8.el7_2.noarch.rpmc7d37a8af4ac18c96f897c2f5dadfeb8a7eee6113604a9c6d2246fd335cfbf45tomcat-jsp-2.2-api-7.0.54-8.el7_2.noarch.rpm168563dce340c24f285618e06aaf8acfa49b18028285808cad0c89af84213e3ctomcat-lib-7.0.54-8.el7_2.noarch.rpm193f6b00210cbc8f0ee9bf37664f7286946c43094bb83fa9c2e470354cf46008tomcat-docs-webapp-7.0.54-8.el7_2.noarch.rpm90deddebed35f46f9c00bcee86e336b0d5db413337c28741eff2f649fd3469d2tomcat-javadoc-7.0.54-8.el7_2.noarch.rpm5053718eacdfefbff7356028cd98368d508e0ba14b64bfdeea4f32f3531d513dtomcat-7.0.54-8.el7_2.noarch.rpm14e5bfbad370aefc0e8be43227f2d2db652fa398a754c3bfc03b99ed7c7f5285tomcat-admin-webapps-7.0.54-8.el7_2.noarch.rpm5b4f2c9059c65ef1418aa6a088ab3cd20f29192091c4b8c13339291f1fe3d539tomcat-el-2.2-api-7.0.54-8.el7_2.noarch.rpm4b37b855e5fc6c1910641aae6bcd27c92d74e2a84665d1d6491456877a5c24fcSLSA-2016:2047-1KernelSecurity Fix(es): * Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path as an unlimited recursion could unfold in both VLAN and TEB modules leading to a stack corruption in the kernel. (CVE-2016-7039, Important)importantScientific LinuxScientific Linux 7kernel-3.10.0-327.36.2.el7.x86_64.rpm5b619350e85b10c3ccffe284e3b8ef1d9c5688c3c25f55de3f553c07cb503f2akernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm86ec62312d4f4781efddceb84a873e4bb9f9941f3e081755d84be77713336d0fkernel-debug-3.10.0-327.36.2.el7.x86_64.rpm3dd5bd517f8f9a7542fa31f884c751dd10908af351d24a02a64998faaf562e48perf-3.10.0-327.36.2.el7.x86_64.rpm07c2e00f659ff47124c74f1e39a784dfb8c95a3ec3445c75e3b0965949b812e6kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm7876c9d4605ccf2332c5617af2d78882d20160b8f2f85e01c8ccaef523b62f4dkernel-doc-3.10.0-327.36.2.el7.noarch.rpm05be5ea4b90e8f8d24d3c962cfeb5f7d52d04e29efac0da100901214c5835b58kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm2ecb84027aee4d3104b9bc79fe545be846efaf0fae90ec68bf583bf22a491644kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm92fd4716df0bb2eb004e764ed7319032bf75f060af45457ba900881481028510kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm3c6fa4100a0760d82ab10c65eb743a878c918fde0238470d158eb5066a03c123kernel-devel-3.10.0-327.36.2.el7.x86_64.rpme957196e3d8a5ac467dea16546183853bcf25143cbdd53f65b66b00e136204ecpython-perf-3.10.0-327.36.2.el7.x86_64.rpm4f8da894b9bf6b937010a18327789c6e0bf85691f8f471ab88d8f4a2fe636336kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm90583ba802603850499fe0ac1de7f9f41c50ebcbc44791bf20b68d1a1488f92fSLSA-2016:2079-1Java-1.8.0-OpenjdkSecurity Fix(es): * It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) * It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) * It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. * A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) * A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively. Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.criticalScientific LinuxScientific Linux 7java-1.8.0-openjdk-accessibility-debug-1.8.0.111-1.b15.el7_2.x86_64.rpm6f949ef5f7b8aa5a3cb6905fc2e386c94d899aa4fe40ba8f24fe0334f307ade9java-1.8.0-openjdk-accessibility-1.8.0.111-1.b15.el7_2.x86_64.rpm14efbea2e02e6ea079ea9d8ba1ce55c7bdd5c9cdf1da5939878d0688cee9b5d0java-1.8.0-openjdk-javadoc-1.8.0.111-1.b15.el7_2.noarch.rpmfbfa814a7dcf3e4eb11cb749828be81720768bee0faad986856a010606c5f3d2java-1.8.0-openjdk-headless-1.8.0.111-1.b15.el7_2.x86_64.rpmbd70b02f32d9e60cb2a10be5020ed507c1d7e05625646eeb5ea6f6a51143ab70java-1.8.0-openjdk-demo-debug-1.8.0.111-1.b15.el7_2.x86_64.rpm55bd4df51621e8be073c1ce33d21a160eaf9bd644e7e402298f736643ea09a31java-1.8.0-openjdk-devel-1.8.0.111-1.b15.el7_2.x86_64.rpmc9cee4a33924ba28351133ffc3daacedc60e1dadde290283059b44afd416a557java-1.8.0-openjdk-demo-1.8.0.111-1.b15.el7_2.x86_64.rpmc9a0fe4e3312b4d2e023c84a64b9b633d5bd857a2f2c041a02c315b18f90864ejava-1.8.0-openjdk-src-1.8.0.111-1.b15.el7_2.x86_64.rpmcf74bd9dd1ac721d111f55d2409977ae5dba37559f183cabc7244979be15b2fcjava-1.8.0-openjdk-headless-debug-1.8.0.111-1.b15.el7_2.x86_64.rpm55500e0277e10becc7ae55da5c52a14437015b812c802c8884a1ccceca6703fcjava-1.8.0-openjdk-devel-debug-1.8.0.111-1.b15.el7_2.x86_64.rpmae35b5060ef9f4369e775a61cc0ca2e2e496a44ef877c5f9ff55cb9d227d98b6java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.x86_64.rpm87fd16a1cdaf62c60c4d2ffbc32da17596a7e56e9bb29238f93411d4324d129fjava-1.8.0-openjdk-src-debug-1.8.0.111-1.b15.el7_2.x86_64.rpmdd023fc325cbdf6ca17cfe35d788f19c0424c8d592f3f3c8bca94d513e8c5cf1java-1.8.0-openjdk-javadoc-debug-1.8.0.111-1.b15.el7_2.noarch.rpm63a0b2b55a6448ad686e0ad2c1de2ceb23acc54dfd8e5e9d57717200ee6df8f9java-1.8.0-openjdk-debug-1.8.0.111-1.b15.el7_2.x86_64.rpmeb29adeb16485126fd7d61520614557df0bee44686a49adb0d9ecb5c24ed3ec4SLSA-2016:2098-1KernelSecurity Fix(es): * A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)importantScientific LinuxScientific Linux 7perf-3.10.0-327.36.3.el7.x86_64.rpm0bed9a2812217a4bcbfcc52ad6441c8ccedb8f0f86614c3e98b079a264976d8bkernel-tools-libs-devel-3.10.0-327.36.3.el7.x86_64.rpmaa46955aebedea9db37db6be17fb9875a7f8e3d896e8602b2835d46534ab6183kernel-doc-3.10.0-327.36.3.el7.noarch.rpm752954972100c1b9d7a042b38c3814b2c1809203b87840b210c5e36dffa82abdkernel-headers-3.10.0-327.36.3.el7.x86_64.rpmba3e688ccaf40f1b68a247379d13bd6e8e3d831d2c954d9f77d03009265eccc5python-perf-3.10.0-327.36.3.el7.x86_64.rpm19d627bbae02bd85e273c1e02f4ead58568b1a2eef91d9658d6696723d3eeffbkernel-devel-3.10.0-327.36.3.el7.x86_64.rpm44bccd903dd1ae9bb40d16ccc854da54a6c8861be776faff60c16ca6add1c2c2kernel-3.10.0-327.36.3.el7.x86_64.rpm2d1276ab649950c7e76cc31c2ee03fc6e86f991031936b1df1ff88fa56b7c6cckernel-abi-whitelists-3.10.0-327.36.3.el7.noarch.rpm377db8fecf62b439d61c5c5f5cbc8b26af8fd382173e4ea9d3f2520e5f600979kernel-tools-3.10.0-327.36.3.el7.x86_64.rpm84ba166e8d705323f4d11fa7e55bb57b60bd5ec79ba82ddf3022fdd7ff336c2bkernel-tools-libs-3.10.0-327.36.3.el7.x86_64.rpm3a80103dfa968c58c425d808fbbf52bc38484e36cefb6824548bfcefbc549d21kernel-debug-3.10.0-327.36.3.el7.x86_64.rpm05a0f861e0a1a4542f31821f1bbaf7f3794e6d60ce77709041ae90bf4b162f9fkernel-debug-devel-3.10.0-327.36.3.el7.x86_64.rpmcdebf464bc4e1df4911c168e2a18c0923deaf5173ffc915a9b65e6a66a347fb6SLSA-2016:2573-2GlibcSecurity Fix(es): * A stack overflow vulnerability was found in _nss_dns_getnetbyname_r. On systems with nsswitch configured to include "networks: dns" with a privileged or network-facing service that would attempt to resolve user- provided network names, an attacker could provide an excessively long network name, resulting in stack corruption and code execution. (CVE-2016-3075) This issue was discovered by Florian Weimer (Red Hat). Additional Changes:lowScientific LinuxScientific Linux 7glibc-2.17-157.el7.i686.rpmc2d23c7e565c11a5bd9a41d20a59fdc3dcf971b179303a9e06ed66428836f521glibc-2.17-157.el7.x86_64.rpma0723018533d986fe0bbf4c13efd7c2b52aff12a94d766cd519c2300297d8cc2glibc-static-2.17-157.el7.x86_64.rpm54c3414fa620c92d866159eab9ecff3f7fbcb99f85ab6c0ec2cb08625a3dd532nscd-2.17-157.el7.x86_64.rpm170afacc2d47a5a64749e864d6b132f86eb0e05310dab85a4245fba057349c14glibc-headers-2.17-157.el7.x86_64.rpmd4b19ac762fd39a26b3cdb57785d60eb6d0165ef7b609713cd1f53e721b764ceglibc-devel-2.17-157.el7.x86_64.rpm3872e35379332caed8abcf467b4fafa09e14326968a32c03aa5c2b3336c79573glibc-static-2.17-157.el7.i686.rpmde6f8daf5220bd74e2068d9ec2dcd8b178cfb8c456ff16fd6178598695993a4aglibc-common-2.17-157.el7.x86_64.rpm5ad3ea07b49695c49edbfbd6e7f79ce705fedd0fa4ff9b0a9e24910ae6501421glibc-devel-2.17-157.el7.i686.rpmba3b733c5c942ffb170a909cd155f14abda05f61775353d925bd24bdce426b71glibc-utils-2.17-157.el7.x86_64.rpmb48e72c14517127a78ade71802eeff6f9765c636b2e0d82b9cd4179b4d2c9acfSLSA-2016:2574-2KernelSecurity Fix(es): * It was found that the Linux kernel's IPv6 implementation mishandled socket options. A local attacker could abuse concurrent access to the socket options to escalate their privileges, or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call. (CVE-2016-3841, Important) (CVE-2013-4312, CVE-2015-8374, CVE-2015-8543, CVE-2015-8812, CVE-2015-8844, CVE-2015-8845, CVE-2016-2053, CVE-2016-2069, CVE-2016-2847, CVE-2016-3156, CVE-2016-4581, CVE-2016-4794, CVE-2016-5412, CVE-2016-5828, CVE-2016-5829, CVE-2016-6136, CVE-2016-6198, CVE-2016-6327, CVE-2016-6480, CVE-2015-8746, CVE-2015-8956, CVE-2016-2117, CVE-2016-2384, CVE-2016-3070, CVE-2016-3699, CVE-2016-4569, CVE-2016-4578) Additional Changes:importantScientific LinuxScientific Linux 7kernel-3.10.0-514.el7.x86_64.rpm05ac32143effe7330380aaf8d483079afbce76b2950bd058489881f46865382akernel-doc-3.10.0-514.el7.noarch.rpm7d3b4cc1096ccb83516c7775b667a8fe9d6201c0c038f25569007f83f2e92cf6kernel-headers-3.10.0-514.el7.x86_64.rpm82d23f2ae0d5cf45bfce717474015ccd054d1ac63668ed1619bfaa35e9fe458ekernel-abi-whitelists-3.10.0-514.el7.noarch.rpmdffe7648eb62f7589c860ea86291290fc2f9a49a8fb84b3c75e06dbee66d2dfbkernel-tools-3.10.0-514.el7.x86_64.rpma2301e038ca469cc23b7a82c86962442f1ba97788258b149c3c0452e8db05846kernel-tools-libs-devel-3.10.0-514.el7.x86_64.rpm70b3ff6e6cb0b6cce58012b2d87ac9ee7bd1a1a17d1995a038a28017274510a6kernel-debug-3.10.0-514.el7.x86_64.rpmd681e117a6779e653087ced8dd79631313baca85cc9fd5a9b613fec04f311272perf-3.10.0-514.el7.x86_64.rpm718b2627762edce9314cc1f9e28c780f3bdb83929cdfd806b51bee103a6fd78akernel-debug-devel-3.10.0-514.el7.x86_64.rpm6b02aa1472dafab86c41974a5dcad16f7e1a0e963819d6c38db18c97fe11eb23kernel-tools-libs-3.10.0-514.el7.x86_64.rpm0eeb203b6f7abdd7a75d67166852a9c114599e07b3efaf13d492d44fcd4b3dd9python-perf-3.10.0-514.el7.x86_64.rpmecee71df78743ddf2081a91203d7231a9630aee006ce89d578ab01354c479a59kernel-devel-3.10.0-514.el7.x86_64.rpm026da69d9888ad5c45709a965f0ddf786a60b7ed6d980f376f8418ff72484b38SLSA-2016:2575-2CurlSecurity Fix(es): * It was found that the libcurl library did not prevent TLS session resumption when the client certificate had changed. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate. (CVE-2016-5419) * It was found that the libcurl library did not check the client certificate when choosing the TLS connection to reuse. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate. (CVE-2016-5420) * It was found that the libcurl library using the NSS (Network Security Services) library as TLS/SSL backend incorrectly re-used client certificates for subsequent TLS connections in certain cases. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate. (CVE-2016-7141) Additional Changes:moderateScientific LinuxScientific Linux 7libcurl-devel-7.29.0-35.el7.i686.rpm50ea99c23efcbd50b23225e34f4e40100e9c67728fe5f0472a38c07299b1b0fbcurl-7.29.0-35.el7.x86_64.rpm20aabd59a0f923667c883ff81dfc5a0783d8a5dcb6676ea62a67b6dad4a963e2libcurl-devel-7.29.0-35.el7.x86_64.rpmf38361651286eb9241aac68ab63bf876387b0b8dd67fc2982efb76727eff853clibcurl-7.29.0-35.el7.x86_64.rpm2b9629c6e04626623c169abe08f50e81d3c17f97ce8560fb180325d5f1476dd4libcurl-7.29.0-35.el7.i686.rpm813c6f031802d905051c7825f218ed056a87e9a743ae4ca8331bcdbc75d53ea3SLSA-2016:2576-2Libguestfs And Virt-P2VVirt-p2v is a tool for conversion of a physical server to a virtual guest. The following packages have been upgraded to a newer upstream version: libguestfs (1.32.7), virt-p2v (1.32.7). Security Fix(es): * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes:moderateScientific LinuxScientific Linux 7ocaml-libguestfs-1.32.7-3.el7.x86_64.rpmefdc61920b0a351dfc990d63a7101283619dc15401219cbfc14a9f88efdd1e6blibguestfs-rescue-1.32.7-3.el7.x86_64.rpm9d3164b22d60433cccc7ca899183f41706f5d88b6a4f290872f6b23f4f5a3f9alibguestfs-tools-1.32.7-3.el7.noarch.rpm3c4414cdcf712d52fb051e44d34c8de8320056426907287d68e75a5c2f392a77libguestfs-devel-1.32.7-3.el7.x86_64.rpmbc506b87bad66eb17431d00a6569ce7f846dd8e566fddacd1017fa376e4ae7b8perl-Sys-Guestfs-1.32.7-3.el7.x86_64.rpm39734597b8439a6fceb54cb20babed925c27927ff5d22a099e8f218b73dbb71alibguestfs-javadoc-1.32.7-3.el7.noarch.rpm461ed1a5a81c2875a70dcb0000bed8f952932e7a268d8cd7880b11c234f21183libguestfs-gobject-devel-1.32.7-3.el7.x86_64.rpm0f0a8911209b5e7acc8c8d00ecb3e5f69cd7e5e4ab5c4f31cdd840d86315e896virt-dib-1.32.7-3.el7.x86_64.rpm6cebe35ed00d8ea14afe36b0211635679136fa806ddb517de43ebb1af67a1bf6libguestfs-1.32.7-3.el7.x86_64.rpm9360a6d8a054ace103665f6b6c196a9815b76906cb70421e4d002a9fda8d070cvirt-v2v-1.32.7-3.el7.x86_64.rpm387c05b3ef535dcd2a9da71f4b4e1d61592244d655e6df95436ae1ae27640dbclibguestfs-man-pages-ja-1.32.7-3.el7.noarch.rpm7af7040fcaf6c7e20159ea44cafff272d6de6350f9be0087321f93dd3a716b43ruby-libguestfs-1.32.7-3.el7.x86_64.rpm0b69bf4bb7330534ecd080ac612bcb134745035b68740b85793dd19a46462a66libguestfs-gobject-doc-1.32.7-3.el7.noarch.rpmbe9d8625439d42b191e77b97d672514834f35935b36159e49a4881461e3e1e40libguestfs-tools-c-1.32.7-3.el7.x86_64.rpmb889fb8e78d1be9b17e059e7aae811ae1ada73d5a9b32358e719dd9bc8ba5f31libguestfs-gobject-1.32.7-3.el7.x86_64.rpmf515d316cc0406bf79769f3cea39f20ad28a54a03e59e8c484ad4170f15fb28alibguestfs-bash-completion-1.32.7-3.el7.noarch.rpm5ded0d051c0633e9cf0db29e531c2ea32052cb4c339642930d634ef5a53f2f65libguestfs-inspect-icons-1.32.7-3.el7.noarch.rpm4600708d7a5e16c57038542f44f17fa0c5f1ba99f58e295170d8dc4c56176389virt-p2v-1.32.7-2.el7.noarch.rpm60e832bc38cc8f12efee279e05667a177d365ce464d08b77de5b7da1eb46578flibguestfs-java-1.32.7-3.el7.x86_64.rpm5356a554a5b59231578dddf2cd05c7e192832664900a772993f08ffefbf9aee1libguestfs-xfs-1.32.7-3.el7.x86_64.rpmb2f1a291a162bbef679f8445b9ff73471c4650882bf4b5c72a68f3372f3124beocaml-libguestfs-devel-1.32.7-3.el7.x86_64.rpm93a946cd474b619cf5273de6c2ce72d872b352987a8485cd260712db62eabc90libguestfs-rsync-1.32.7-3.el7.x86_64.rpmf278877e562d78a1a67ee6bce6e9e6fd73558cbd091d03733d69c3087cab6c20libguestfs-man-pages-uk-1.32.7-3.el7.noarch.rpme04eaafb7aff92c9f09930840771acf6fcb641da93ba11151e6598be58e3f682lua-guestfs-1.32.7-3.el7.x86_64.rpm69c287fd51c7cfda052bacfc3a2c4b762115a59b96bc6a2738b5e5fa5b653388python-libguestfs-1.32.7-3.el7.x86_64.rpm1be683672d8d4289aead2e61ce20e6a249e4d49199e038047da1423e4eb88034libguestfs-gfs2-1.32.7-3.el7.x86_64.rpm871e8b78317d4908e44bb519d0f374c6ded2d14df33c10d72faca3d0afcf19c3libguestfs-java-devel-1.32.7-3.el7.x86_64.rpm83a2e41e73cd6d6f5c0698c49bdbc3e9ac337f1ed41e53cb98d2e4e5f677768dSLSA-2016:2577-2LibvirtThe following packages have been upgraded to a newer upstream version: libvirt (2.0.0). Security Fix(es): * It was found that the libvirt daemon, when using RBD (RADOS Block Device), leaked private credentials to the process list. A local attacker could use this flaw to perform certain privileged operations within the cluster. (CVE-2015-5160) * A path-traversal flaw was found in the way the libvirt daemon handled filesystem names for storage volumes. A libvirt user with privileges to create storage volumes and without privileges to create and modify domains could possibly use this flaw to escalate their privileges. (CVE-2015-5313) * It was found that setting a VNC password to an empty string in libvirt did not disable all access to the VNC server as documented, instead it allowed access with no authentication required. An attacker could use this flaw to access a VNC server with an empty VNC password without any authentication. (CVE-2016-5008)moderateScientific LinuxScientific Linux 7libvirt-daemon-config-network-2.0.0-10.el7.x86_64.rpm6bacbdbe494d07c00ed04dee99f00a1fba43ef2a8450f0ad83885b960676775blibvirt-devel-2.0.0-10.el7.x86_64.rpm82d17da2ac9ba56775a3e87262c715fdf9c7a68a16ac156d793d65c5ba445e57libvirt-daemon-config-nwfilter-2.0.0-10.el7.x86_64.rpm01c02b912d3ca11ac6fd79138c3767f7ae1f9fa04be1f459e800c5460f6d4753libvirt-daemon-lxc-2.0.0-10.el7.x86_64.rpm59904c04a424fb00b30f8002a37211c5df5548b6c386215fdbc0d99c8057f5b4libvirt-daemon-driver-qemu-2.0.0-10.el7.x86_64.rpmb1211538fd57a49d1b55633b4a5f20e1679acabdc26e57cc3354238af34c7826libvirt-2.0.0-10.el7.x86_64.rpm79f075407ebaed5899117a32379244ceaba391245a5dfae13607af846702a669libvirt-client-2.0.0-10.el7.x86_64.rpmf43808231e1a43631456947ef45b07208b7d47a449fc0b22a2fb4e5abc40c532libvirt-daemon-driver-nodedev-2.0.0-10.el7.x86_64.rpm902fb699920c70386a4761ef765392ca1a8be625d7f036b803c6424095fdf279libvirt-daemon-driver-network-2.0.0-10.el7.x86_64.rpmc645d73d0e239a33f7745c41c44ada2843af8ca6efae8f27c0c39cc0b8105ed1libvirt-client-2.0.0-10.el7.i686.rpm337558e17dc87b1575c45f1f65176f3079ca8e7b14005af14dad6f92b14a4017libvirt-daemon-driver-secret-2.0.0-10.el7.x86_64.rpmcaebb9fa28bc150ef9367542faf5b912cc33f9941c0cb47b8c360db423f82d45libvirt-devel-2.0.0-10.el7.i686.rpm605ab72126ac5871dc6bfa3d93d5ac597047aa9235de32b4d3195e9128c390ealibvirt-daemon-driver-nwfilter-2.0.0-10.el7.x86_64.rpme5d97ceffa1815eabfac0e0b41b6ad0571987b426344a5b10334d16992aace9clibvirt-daemon-driver-lxc-2.0.0-10.el7.x86_64.rpm021d564d7e92b8921d663d47e6e1999f2f3b9ee76eec1e6330beff8dbe1fed92libvirt-daemon-kvm-2.0.0-10.el7.x86_64.rpm9b9988ad4deec24a136423574d8b770fb6daac1e8776ae5ec1179b06144caf83libvirt-nss-2.0.0-10.el7.x86_64.rpmbde3a197aedc5142c5f67724e1d63f562f5a475cb8f6dedd5e9e2934b3259aa2libvirt-daemon-driver-storage-2.0.0-10.el7.x86_64.rpmce411caa50da4c13c6cdea8f7c0f93e53b742cd6b8d03efa17f4dad70b0cb9f0libvirt-daemon-2.0.0-10.el7.x86_64.rpme3d37158e109f4f7e42335631637aad7e44f245fa93bb548d2cc89017c4d1f16libvirt-daemon-driver-interface-2.0.0-10.el7.x86_64.rpm2fffad30859e7094ffd15750890604d7fc0ef114510c82eac34bb1bb41c3c06flibvirt-lock-sanlock-2.0.0-10.el7.x86_64.rpm12541cd62032e8af251646b6b0715537cd00d43b2d5331bbaf6fa4d5bcbe7378libvirt-docs-2.0.0-10.el7.x86_64.rpm42518f0f09a13a913465d6248d8bc637f3f7180eaff21e14e5c40849a286df44libvirt-nss-2.0.0-10.el7.i686.rpmf86d1ea20656f186a076a1889df5ac472ada5ddb87a8171d617990afe35ab347libvirt-login-shell-2.0.0-10.el7.x86_64.rpm3616da220af529780623dd9157d2a5fc2ea95ef642b3c62034c2d136a8644bc8SLSA-2016:2578-2PacemakerThe following packages have been upgraded to a newer upstream version: pacemaker (1.1.15). Security Fix(es): * It was found that the connection between a pacemaker cluster and a pacemaker_remote node could be shut down using a new unauthenticated connection. A remote attacker could use this flaw to cause a denial of service. (CVE-2016-7797) Additional Changes:moderateScientific LinuxScientific Linux 7pacemaker-libs-devel-1.1.15-11.el7.i686.rpmd969560bfc353716be1592eb893ff8f98a2a29b4af1da462d790b2d1d8a0532bpacemaker-cli-1.1.15-11.el7.x86_64.rpm75841a38076c9cc447e11f242f5ddaa4dfcb254ba6bbcf12625c12e3b91a4982pacemaker-cluster-libs-1.1.15-11.el7.x86_64.rpm497558fc1d2f435195fbe1f959ad93e172e7ab53d10634faded4bf8c949d6f76pacemaker-libs-1.1.15-11.el7.i686.rpm5b6b7a69e9a3fc7c6dae49fd753727c0074faba9bcee99c535779deeb494d331pacemaker-nagios-plugins-metadata-1.1.15-11.el7.x86_64.rpmb37ffe9e6f1355cc2eeae87524ef2f4dd90832aa8c357330b5a34ec8c27d61fapacemaker-remote-1.1.15-11.el7.x86_64.rpmc595cd849ad5d33d07a797aefaf2ab9cd9f4bd070b2ccb9b76ea2dd191ed6b0epacemaker-1.1.15-11.el7.x86_64.rpmd989928d03b9da0b8a508065bab0a8d51088b8b4428ae995bc971c6b4fe7d97epacemaker-libs-devel-1.1.15-11.el7.x86_64.rpmcc7614bf24b7e5ddceb23760b58fc6a0b67cdf5a28cb5b05d8e5c1d58c71c232pacemaker-cluster-libs-1.1.15-11.el7.i686.rpm4c7c8e8100fc4966144bb58861a2b71a459630dde01836e2337a8ec54346cc4apacemaker-cts-1.1.15-11.el7.x86_64.rpm74fab0ca21a33266c7b729a257dd86ca0e6f3c8a124f7dba906c36fe41368c12pacemaker-doc-1.1.15-11.el7.x86_64.rpm5deab12f61342e9e6992c903904b0abef79cf4d67296293114624000c25419b2pacemaker-libs-1.1.15-11.el7.x86_64.rpm3b64216a267e4ed179aa8171c19639869f319a4c25e9432a409a93ea7d11b059SLSA-2016:2579-2LibreofficeThe following packages have been upgraded to a newer upstream version: libreoffice (5.0.6.2). Security Fix(es): * Multiple flaws were found in the Lotus Word Pro (LWP) document format parser in LibreOffice. By tricking a user into opening a specially crafted LWP document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2016-0794, CVE-2016-0795) Additional Changes:moderateScientific LinuxScientific Linux 7libreoffice-xsltfilter-5.0.6.2-3.el7.x86_64.rpme6d87a3e2e4a13f2fbf0070da588549b8bcb957425a4b568b3e9d99422d8aa7clibreoffice-librelogo-5.0.6.2-3.el7.x86_64.rpm057ea40e4d0debc0f264d777b5b45e34008c81427697d9f1e4892b8eb95879d7libreoffice-langpack-cs-5.0.6.2-3.el7.x86_64.rpm1e738e4ea463cf7b3261ea03c27bd699bddd4115c56d0b8bb4114661aacccf97libreoffice-langpack-mai-5.0.6.2-3.el7.x86_64.rpma2a0b12931e05c599945d16f94793c9093e50919785905606ee8dca745c15b79libreoffice-langpack-tn-5.0.6.2-3.el7.x86_64.rpm0edd08e2b86c51b20a340a909d6485f0f7fee37e6373e80a0c8e0b435b7c70e9libpagemaker-devel-0.0.3-1.el7.x86_64.rpm9c1e17bc9e2286e5202b983b4801b7a7f558338d55a4fd6746e7bcbd388a75f5libreoffice-langpack-nn-5.0.6.2-3.el7.x86_64.rpm2240173d550c5718673ae61eeb86f99de6b55b363011e7ee424fb77c5cba3ec8autocorr-cs-5.0.6.2-3.el7.noarch.rpm9f0e70bb9998077267aa7055448ae5fdf1e5a6f5f9742897d00933327f79146alibreoffice-langpack-pt-PT-5.0.6.2-3.el7.x86_64.rpm91f275c465a5772fc75573d778817bc5c46bc6c9d2ffa538bbdcf2c37905b6a5autocorr-pt-5.0.6.2-3.el7.noarch.rpm44d6d514f68e1c654217718960dce723f3cfbfd81bc2ebb576953099dee5ec85libreoffice-langpack-as-5.0.6.2-3.el7.x86_64.rpma0f85cd579d9f3edfc008d7fee3fd08bdea03de61e4686c74763e2731a58a206libreoffice-sdk-doc-5.0.6.2-3.el7.x86_64.rpm8a3b81785e7285b38d510b07debc821b0df344032cebdb44745a1d4e7bd8383blibreoffice-langpack-ml-5.0.6.2-3.el7.x86_64.rpma61f641d6250ea0da6424b955fbb32a77137709d59e0f2bd5e154e06ac2a997clibcmis-0.5.1-2.el7.x86_64.rpm555bcac1ac200dde1e2197cf22eced47c53e18862b5cac4621506303bacf06aeautocorr-tr-5.0.6.2-3.el7.noarch.rpm2be8f3b1e6575ba29f58bfc091f39032ac948b8fbe2807647e2e761ecb84eb27libreoffice-rhino-5.0.6.2-3.el7.x86_64.rpma1ee7d8ce33bc23c9ca6e8ac82129076fd6788d38452724ae3d2d15a0f36b15alibreoffice-langpack-ro-5.0.6.2-3.el7.x86_64.rpm239aa5824af91793d244fafb5bfbbac79ed91374875817eb45a7883ba69ec944autocorr-hr-5.0.6.2-3.el7.noarch.rpm635c2cc12b04ce3f316432af756ee991973694591a3cc5780fba661b2c1765b2libreoffice-langpack-sk-5.0.6.2-3.el7.x86_64.rpm47bffdacf7f3d9c29bb357cfa5781094d80ef95e4f783edb463ea6ec4c128240libreoffice-langpack-th-5.0.6.2-3.el7.x86_64.rpm142bc7599cb9e3b5c773d7d0623b9e4e795852d8caa23beec165bb5060c01cc5libreoffice-langpack-xh-5.0.6.2-3.el7.x86_64.rpm1550c22fea83b211feaef670c334edc05dd8cc52e7854ad295ff32af069f3e23libreoffice-ure-5.0.6.2-3.el7.x86_64.rpmeeb170dde821bfb7ab104996e8e8aed5a057787f7ff5f391505d784719771950libreoffice-langpack-el-5.0.6.2-3.el7.x86_64.rpm729162024b95c0bcdf27316d1046e751a5c963392e0c44f03cb64e5614c94502libreoffice-glade-5.0.6.2-3.el7.x86_64.rpmdf15e679d076685aa74655f5d6807aa2413a2b014295331f123afc34881efe3flibcmis-tools-0.5.1-2.el7.x86_64.rpm924082d78eb596a624298731949ead27e55dfb579d619946d2c5202242d86b0dautocorr-mn-5.0.6.2-3.el7.noarch.rpmd91621c291cba25554d3372a72d138495c6dd373a98ee02c392bac48276d0704libreoffice-langpack-ga-5.0.6.2-3.el7.x86_64.rpm27c48da18c849a893960fcf2193f8f699fd90414624c63fb8c0229523405fecdlibreoffice-langpack-ss-5.0.6.2-3.el7.x86_64.rpmeebdbd9f179f66d9a626e42d41b95ebfb4fe9cf4ad30d845cacb6fdd44e06703autocorr-ca-5.0.6.2-3.el7.noarch.rpm3096aaaf1f804d08610917754a7e798e7958a58b3b94a7d05f9f6cfe91a4e23dautocorr-it-5.0.6.2-3.el7.noarch.rpm79395f0eb78083fc5f4fa0437a8cb609334d6637d0eaa17f10abac2a00b26681libreoffice-langpack-af-5.0.6.2-3.el7.x86_64.rpm22904a86288e561a671b54739421fcdd425cd54e0beadd3b9a1695686b52fb92libreoffice-pdfimport-5.0.6.2-3.el7.x86_64.rpm0b347d17e29eda3f3fbc1ffc75540e8a43bf272d6bcf4931c2c034a66bcaace3libreoffice-langpack-sv-5.0.6.2-3.el7.x86_64.rpmab7e50e20c2f52c9d33c7055a328ef227d3cb760f733937bdf1149d7070ca188libreoffice-langpack-uk-5.0.6.2-3.el7.x86_64.rpmd97a428d33b350cc10f007b2b5aaf2c23ec619c81e3028132e94c73ca2f4e2balibreoffice-draw-5.0.6.2-3.el7.x86_64.rpmc41316cc5744d80a1f05a44e83e00ec70a400646a9bd173d1e1820bb919d300elibreoffice-langpack-ta-5.0.6.2-3.el7.x86_64.rpm1c31b41ef44b4678d8e3b23235f676c1a5beb6dcf022caf0887883274b9b57b6autocorr-ja-5.0.6.2-3.el7.noarch.rpm069c92d26aa2f8f6d8433273fa18c3da04d781d2ec7dc1a8ba02f951090538f4libreoffice-langpack-sl-5.0.6.2-3.el7.x86_64.rpme0fc8a51c9c3fec6b3b82b13d475d4dc158552dabed50a4eee833e79690de3b5libreoffice-core-5.0.6.2-3.el7.x86_64.rpma3a5c959964ada9188f1140d91e8ab8be0bc799e88766adc033767d85b55e335libreoffice-langpack-pt-BR-5.0.6.2-3.el7.x86_64.rpmb292daf63c3c6ae4c878f8229f0c34df7ff258fb9f759af88a1077dc24cb580blibreoffice-gdb-debug-support-5.0.6.2-3.el7.x86_64.rpm4ecd0ead6184303e0bc37c51ca2269089554695cb7a0787063cc7b5a6eb751bdautocorr-ro-5.0.6.2-3.el7.noarch.rpm3fed1940e7d78332ed18d04e63d0487aa1c3ed5296e3d069e85f1e9dd0be1ffelibreoffice-pyuno-5.0.6.2-3.el7.x86_64.rpm11fc7cb0d1cf9b280ae3a801733266a0abab5ad0aaf2db60852882e3753bf5a4libreoffice-graphicfilter-5.0.6.2-3.el7.x86_64.rpm0a06c5392e7a7a14afa48c39fe9ac6b7022e01ca185f600d66deaebafc1a8244libreoffice-impress-5.0.6.2-3.el7.x86_64.rpmfd1e10e745009c3a3cac854688429628f71f42b98a51d272369994335128efcelibreoffice-writer-5.0.6.2-3.el7.x86_64.rpm638373bed4685d278b3e0591f928bb24adb5a0d1f754aa6436443f5c495c3256libreoffice-math-5.0.6.2-3.el7.x86_64.rpm598ce647f4437135bbddc70b5d9899e3c11f6f4931331a46eec6955da44e3e9fautocorr-pl-5.0.6.2-3.el7.noarch.rpm9c85dd32214702a798afb88571143842283e4730f87b10e8f28f6daca1b761c2autocorr-da-5.0.6.2-3.el7.noarch.rpm03e6b3950b0c972ecd15c8afb9abfd5e58c698d0ff2f1b03194df2c0af318e04libreoffice-langpack-or-5.0.6.2-3.el7.x86_64.rpmbd76a96c78028df7282533f51b8e0fcc059a5fd671feb75fbf058478301a208bautocorr-ko-5.0.6.2-3.el7.noarch.rpm8afd18a669dbdd400e5171a6fa5ed5ec1d2355ad9e68a3d4a57238fbcaa95a97libreoffice-wiki-publisher-5.0.6.2-3.el7.x86_64.rpm4770530fc3fe3a17d196f5474dac2bdd1deca5f57e06e710e12e1517de3b99bflibreoffice-langpack-hu-5.0.6.2-3.el7.x86_64.rpm5ae3a02b381b65ec1f44eebacdd4bb2928f15f1f1619c42762469575881c9003libreoffice-langpack-fi-5.0.6.2-3.el7.x86_64.rpma45b344d76e40fc7c42c21f9b83824dd76221d7021b1a6beee4624eba005722elibreoffice-langpack-dz-5.0.6.2-3.el7.x86_64.rpme27768f24092fa3c9f7548543b3c88426566d3d1627e4e531fff22a7e72e70felibreoffice-langpack-lv-5.0.6.2-3.el7.x86_64.rpm92f6ee0749623eb127f736c3ea0f0e75c1daf1a8fc38119cd556a0a95caf6a9alibreoffice-langpack-it-5.0.6.2-3.el7.x86_64.rpm44dd3f411b929371cc9c460c3b2c78d4446314b7bf7b0e99bbbb62c23eb7eb3alibreoffice-base-5.0.6.2-3.el7.x86_64.rpmdaf0d9aac5a44ae4ddd475c32fdc013b315dd601ae7558dfb56a64bd038af9b4autocorr-is-5.0.6.2-3.el7.noarch.rpmaf4c98bf6810b482b31df6ac60a394f0b53bafdc09f12154ae6578550b37a0a0libreoffice-langpack-hi-5.0.6.2-3.el7.x86_64.rpmefdd6cfa403995bb82a082963a2bb1f317d49927e594d31d68bc27fc7265c07clibreoffice-nlpsolver-5.0.6.2-3.el7.x86_64.rpmc83a61b1e61df92eae7783b2812455eecb8fffa133ca0f7686546ef23f63fbf4libreoffice-langpack-te-5.0.6.2-3.el7.x86_64.rpmd40c137e8edc6183ee2982812bf67d0f7b24499be96aa4dc3d9b620de5760d67autocorr-de-5.0.6.2-3.el7.noarch.rpmafbf8afe37c2d3cb934ca1c5e71c165b8a7b9e56c4b81c9efb1cce3a39e2ec36libreoffice-langpack-zh-Hant-5.0.6.2-3.el7.x86_64.rpm09e6af2a922c6caf7f9e7d609b27f8f850f31e11a6365b4a014c62bc15964ea7libreoffice-langpack-eu-5.0.6.2-3.el7.x86_64.rpm62405fd08e724c110515488b4b847f94cda9cfadc28df04dab4d12226ef2ab97libreoffice-langpack-pl-5.0.6.2-3.el7.x86_64.rpm5e4a8a0f92502a4fe302513f1013ba9782682d1f84f4ed33d405492c694c763aautocorr-sr-5.0.6.2-3.el7.noarch.rpm9bc0dcaa8a73d688efb3cabed734157b3ae97d7cee41421b2c0c217026ba2d7elibreoffice-langpack-kk-5.0.6.2-3.el7.x86_64.rpma886486e3278bfa08d42ff814ce8f65d3ef5132492ab7a18448b71fd5fc4a7beautocorr-fi-5.0.6.2-3.el7.noarch.rpm148891a12ad66b031d83e7824b84bb157962501eb61c3534c458137c82a84066libreoffice-langpack-st-5.0.6.2-3.el7.x86_64.rpm05c598be93956c3d1f45336305a1ba18c12e2660d6304e73f9a5144b88292eb4autocorr-es-5.0.6.2-3.el7.noarch.rpm0d4b9979b8a8eaa22484bc06b73938328176fdf93c5d302fa7898a1943c1d60flibreoffice-officebean-5.0.6.2-3.el7.x86_64.rpm4bbb3d227f67a9beed94645dc3d82aeea64cc96d2f5410a7c0dd5ff25ffba21flibpagemaker-tools-0.0.3-1.el7.x86_64.rpmc40c6d05a7b8a1540a5899cd84b29290d42b1b78b9422629868f09fcc4cb859cautocorr-sv-5.0.6.2-3.el7.noarch.rpmffe1ce4088d652f5b9667a7c9594010c652cf324f65857cd5faba419e63f5cc8libreoffice-langpack-mr-5.0.6.2-3.el7.x86_64.rpm242513ed60fdc878689dad469a5e2b65fff5af102c128cf7808f745feac333c9libreoffice-langpack-ar-5.0.6.2-3.el7.x86_64.rpm6346ddc2055b8ce2a9f0ecf5b6a7107c08b13aec818ac574c2edba9191c693c2libreoffice-langpack-si-5.0.6.2-3.el7.x86_64.rpm839743ddfd006067e6ce010f8445fcee861b1853e4476b9efc98f0abd0706c06libreoffice-langpack-pa-5.0.6.2-3.el7.x86_64.rpm6dc90972db05764169b4ced6f36c52a4e1b0d891caf299e2a852bac04516602blibreoffice-langpack-ru-5.0.6.2-3.el7.x86_64.rpm131d18ee76c64e9bd8787ad07cd87bec50e4fd5f09429715e56c54e07dd46cf0libreoffice-langpack-fa-5.0.6.2-3.el7.x86_64.rpm3a78c4a9dfffcac05193e970116ae6124237120832c56a76bb670ebcae9a33c4libreoffice-ogltrans-5.0.6.2-3.el7.x86_64.rpma77623256341e110891254b28e3c57f6519f6baf4a143988bec509a7b455f934libreoffice-langpack-ja-5.0.6.2-3.el7.x86_64.rpme19dda495a9a8f4d968b20c9a411a3e062d5801c7f3e3ad4d5e03fffb216a906libreoffice-langpack-de-5.0.6.2-3.el7.x86_64.rpmb46bfb5b737040db761ad9e4347d451c2efd3335ea4e0f95bf5cb984a1a29bbbautocorr-bg-5.0.6.2-3.el7.noarch.rpm362f24caddb9568615e424e30b9d3ed163be9ac37180893a43ac9048292b549blibreoffice-bsh-5.0.6.2-3.el7.x86_64.rpmb1e80936db5b275d22137124901e686503eb5e272e82ecdc3fa618cf174dec7blibreoffice-sdk-5.0.6.2-3.el7.x86_64.rpmfeb87917fb0268131beec3014a7ca22e7fca089ddda5551e2c8feb228dba0176libreoffice-langpack-nl-5.0.6.2-3.el7.x86_64.rpma47d249d1ae75270574c9eab6c7c90c400890f2723c3cedcdecad0603c37e405autocorr-lt-5.0.6.2-3.el7.noarch.rpmcdc38e2202072710cfea1beb236dc286ca64daf5c7fbf7d73458d211ee5cbd93libreoffice-langpack-fr-5.0.6.2-3.el7.x86_64.rpm6abeea56c5ac01f6185563012435582b7f55e95356673d8ea78b4093f9d5d59dautocorr-af-5.0.6.2-3.el7.noarch.rpm058695bdcb054dd1e985e2bba8ba58316efba1cf8e989462ab6c69f3d400beadlibreoffice-langpack-sr-5.0.6.2-3.el7.x86_64.rpm1ac986212cd4c3e20f7e9839d6bee4d5a472a06409e273a1d6faca25e2e0b2e9libreoffice-langpack-gu-5.0.6.2-3.el7.x86_64.rpm7904275bbf03c7d78df7c9507479fa3bfd7b927dcd54557eff965c086884351clibcmis-devel-0.5.1-2.el7.x86_64.rpmb897536913fa3d1cf207a8cea8e8d535de8d7e42dd852e0da79a821314875ba5libreoffice-langpack-bg-5.0.6.2-3.el7.x86_64.rpm287476aae9f0a32615087e5813c0d0abf64b3596baa2c52c0c93fbf63a75b67elibreoffice-langpack-kn-5.0.6.2-3.el7.x86_64.rpmcb2d8c5bcdc4ea12564fea4e9344c6eea38cc4fb3df8b1735b3f71792d3bcef6libreoffice-langpack-nb-5.0.6.2-3.el7.x86_64.rpmb52b693d1f40f200a3290cf2499b5d61823ae1fe7fd0b880fd95dc5fefef260elibreoffice-langpack-en-5.0.6.2-3.el7.x86_64.rpm06925c94529986c3a55b2efb7fe9b715f3b615f0d028a460d04524d8960a0736libpagemaker-devel-0.0.3-1.el7.i686.rpm3e2c23cb8fbba577419327da443f936181cd222ff5bb141f0734899eb00fc109autocorr-ru-5.0.6.2-3.el7.noarch.rpm285db7afcf5a164124b03054189ce99c674cba2bb4af41b73764f4ab308c2d95autocorr-sl-5.0.6.2-3.el7.noarch.rpm5dae86b03286351e2a7797276284cb077f6f7c53984aadf6de9380a093fec3c9libreoffice-langpack-et-5.0.6.2-3.el7.x86_64.rpm1ea13e42b7f157dbb5aeb83c7f5a8f9589d4e52a76b1922c3779049564680faflibreoffice-emailmerge-5.0.6.2-3.el7.x86_64.rpm5e26ed5f433fb83e4c4886f891783bc9f58c844041cbd5cfb9469115d3035f0amdds-devel-0.12.1-1.el7.noarch.rpm14896ef0f514639ca113f598e57fea282d0311a4e9423536ae0cb81c2c04143dlibreoffice-langpack-zu-5.0.6.2-3.el7.x86_64.rpmf28bde01d667c8080f19c650faae886140cf859043452da2270bc14d55ded254libpagemaker-doc-0.0.3-1.el7.noarch.rpma06a8e6a700a6b80d7c80a01f9fad8871c22017128bbe1a02110fd3a4b44cc2blibreoffice-langpack-gl-5.0.6.2-3.el7.x86_64.rpmf82587f884fe9e35a96f72102610fb2247d3be00f37e3b0be1e17237a66a3cf8libreoffice-langpack-ts-5.0.6.2-3.el7.x86_64.rpm9660e9582dc5f25da9f8c965fcd725690599072c01d1594097ae5f4c97953e28libreoffice-langpack-tr-5.0.6.2-3.el7.x86_64.rpm9efa8901612b939a1997f1d94a8f0a7938ddf5108c23fd6c1f1ec959aea1dc2aautocorr-zh-5.0.6.2-3.el7.noarch.rpme00a4cb2a889ea2c97221b926f1297bb2b2c5afd42eb62dde24f3ed67d88bc42libreoffice-langpack-lt-5.0.6.2-3.el7.x86_64.rpm34e4ddb62773eeb0384b618acae9fa5337958231d0a610cc7ee3880df7f8c81aautocorr-en-5.0.6.2-3.el7.noarch.rpmb06598e6950e27a6e887a700c304971afe924a255072483aca121d0ba9ff5c56libreoffice-langpack-he-5.0.6.2-3.el7.x86_64.rpm3e578433038d26d6a667a51f096d180a845f6510a676e60ac4015924c6d60579autocorr-hu-5.0.6.2-3.el7.noarch.rpm8ef8fedb9bbec2be4a5fa9e8ebe7e674de532d289f8564bcbd9b6b632d347586libreoffice-langpack-br-5.0.6.2-3.el7.x86_64.rpm6a6fb4821f585d0e711da71e8891a0002e24c34915594e9453f9788c9fea35a9libreoffice-langpack-zh-Hans-5.0.6.2-3.el7.x86_64.rpm8607dcfd0eceba01d58fb31a0fb68b0357b16a2734a7a968c99c6e1896f3e793libpagemaker-0.0.3-1.el7.i686.rpmc7ab8b32c2d74f9e55b50e862a418cb0b8e221b296976f99e815ed5025d68a61libreoffice-langpack-nr-5.0.6.2-3.el7.x86_64.rpm37f49838f3702d19bef40bd49b8118b0c91773cb1321ea7b98f2a56c341cfff7autocorr-sk-5.0.6.2-3.el7.noarch.rpmc0da56b30c01c6ae57b19ceea8dab492a1b5c1a7e3392d6bb1ff814fcba8b60elibpagemaker-0.0.3-1.el7.x86_64.rpm0749b6658234135e2487ad14eba72230fe6d3bb15c684b0411f625be69bfac5bautocorr-lb-5.0.6.2-3.el7.noarch.rpmfbc6baf93a5fd3c4b3c59d20b36b31f2eecdd58bb33dfedcd699f7fc0a1ca811autocorr-ga-5.0.6.2-3.el7.noarch.rpmd85ed0cea93a1398675c8fbc8474c36f1a13acdff6ef49a98923488d0186a5c5libreoffice-langpack-ve-5.0.6.2-3.el7.x86_64.rpm5ddd25fe40cc88ea6f3c307fd9d1a8f38abc5c1b6a5c5590f9d4348d95809af3libcmis-0.5.1-2.el7.i686.rpm364a1058edb4b326906a8fff19d21c7ab364b24d906670a16a75728c8cef59eclibreoffice-postgresql-5.0.6.2-3.el7.x86_64.rpmf01979f57630587789e8fc251c84c7adf8b7a64b24c9ac09278d05d9bf07288flibreoffice-langpack-es-5.0.6.2-3.el7.x86_64.rpma092b6a3b95c44d60b65d768863d0e20b36d17f0b43ee2c37edad38bf2c59632autocorr-nl-5.0.6.2-3.el7.noarch.rpm4c257504ebe735b00e7997b2dfdb62551b9a897925ba50aaf19459ce9c0886celibreoffice-langpack-hr-5.0.6.2-3.el7.x86_64.rpm0f5de89b3eb0e7f11a671342ea5f935b4c4eaabfbdd18b8a5ab81175504ca646libreoffice-filters-5.0.6.2-3.el7.x86_64.rpmbdd2bf97c4c8d9c13a9c1945658aa376d982df26893f55f5224e29a1617a00ffautocorr-vi-5.0.6.2-3.el7.noarch.rpm5b8b9c66fb0d0956f9b65741e0e64d3bfe075de5cb877dd66261f009154975bblibreoffice-opensymbol-fonts-5.0.6.2-3.el7.noarch.rpm82a8007b305dc250474a486981366e9f07340f449f9d0199e8ede3e89aa8bd6blibreoffice-calc-5.0.6.2-3.el7.x86_64.rpmd92b1a0a4394d1c54d67364d7ff708ded3b1c5273e8f3ffaa477dc2c9b48b771libcmis-devel-0.5.1-2.el7.i686.rpmd3be676655e08e54488410470b6d98ec4f5bf54561addcf727631535da3b31b3libreoffice-langpack-ca-5.0.6.2-3.el7.x86_64.rpmf8e2f0801824a159367c3bcf7fa49ad7b4e18e9ed74d28d904fbdb32c641ab1flibreoffice-langpack-ko-5.0.6.2-3.el7.x86_64.rpm29285ddee5a18bb5e7ee9c636b61fb370c00d25c11e22862d7cc18430a061b63libreoffice-langpack-nso-5.0.6.2-3.el7.x86_64.rpmfb767743062fd22145dad11dbfbb582d236a22e11eac4a5d097227a6588b014aautocorr-fr-5.0.6.2-3.el7.noarch.rpme5485470a37c89b2c6d8766dcf38f1cec00a06120ee714ef121ed879cb4a8554libreoffice-langpack-cy-5.0.6.2-3.el7.x86_64.rpm8995435e1ab831dd4ec5b60f2a027e7705897f353c369b3a9d9276191386590eautocorr-fa-5.0.6.2-3.el7.noarch.rpmbcac177ab3c675f9797761d456e60617bd0e50517960cb68b54e9abce72df612libreoffice-langpack-da-5.0.6.2-3.el7.x86_64.rpme34f427dfaf59bdad31d69ea04d4ee4323d1a28dd7068206b39f5d511e4cc09clibreoffice-5.0.6.2-3.el7.x86_64.rpmca3af8d3a90b1ad9b444902610269b9e786767468f51b75fa25a0f718ae83bb3libreoffice-langpack-bn-5.0.6.2-3.el7.x86_64.rpmb04ce868a4dd36a1a504a3ba38fd9988f04cb48da5670069d4448cb926155068SLSA-2016:2580-2PopplerSecurity Fix(es): * A heap-buffer overflow was found in the poppler library. An attacker could create a malicious PDF file that would cause applications that use poppler (such as Evince) to crash or, potentially, execute arbitrary code when opened. (CVE-2015-8868) Additional Changes:moderateScientific LinuxScientific Linux 7poppler-qt-devel-0.26.5-16.el7.x86_64.rpm1470641b9d1bd224269645b16bcf9973b944d616939186a501047b0bdf36bf31poppler-0.26.5-16.el7.i686.rpm7a9a9fcd2062e0bc3c55771ec3e2518a084dbe0f8e46b2c97ec737dd9e1c53d5poppler-cpp-devel-0.26.5-16.el7.i686.rpm8ef6a260a81d9ab2bae70498795f7a77348f3e095bd414f75c196161a789ec20poppler-glib-0.26.5-16.el7.i686.rpmf2a1a23cefc6c6dce6ac74dea84fe0a2a81af3608aef3c793725b3740e34db16poppler-cpp-devel-0.26.5-16.el7.x86_64.rpm2dd758610baa0fe6ddae3391c45ef003617c8291822e01fc73f715b63c3cb2b5poppler-devel-0.26.5-16.el7.x86_64.rpm465f7463c8ada9ee2e4dcf0b64e40f215f73c193d61d70b89c1647f54ca20c25poppler-cpp-0.26.5-16.el7.i686.rpm0fe4065e84075aab80aa6bf7eaa85164fcc0ad9e2778e818b601d3873c8d8d08poppler-qt-devel-0.26.5-16.el7.i686.rpmb2a4bd79a56a825f9729c0247392cd2e6594899f5bdb7fbff8c5fd87f8efb6b9poppler-qt-0.26.5-16.el7.x86_64.rpmeaf569799778141b0cfb9bd1f052a8c201747bfb201dea95899700555d17e1b0poppler-utils-0.26.5-16.el7.x86_64.rpm403058ce7fd805044fb1e90a9197b4600f011aa0fcce479cf570d2dc2f5cd3e6poppler-devel-0.26.5-16.el7.i686.rpme0f4ad3776308d7a34bc2ce62edc45f61f2cf50345a37dba3147d59fb3fb0564poppler-0.26.5-16.el7.x86_64.rpm2c5b1fcd991ec81c001642540fd08fbef79aa78a640b754da80fd5a7076ff8ebpoppler-qt-0.26.5-16.el7.i686.rpm66cd8ca7919ae08559e4ceb091882f4b574561bf5d94d86892d68592c460aeafpoppler-cpp-0.26.5-16.el7.x86_64.rpm60878a7ca64100eae30410d3a45d7ef865b8745e28b984dc4966edba2f98e716poppler-glib-0.26.5-16.el7.x86_64.rpme113f34085f6ec3db24fac0c0a5166419671be8a7bfcfeb8f93e4b4e6c79aa02poppler-glib-devel-0.26.5-16.el7.x86_64.rpm7bb6cba90bbd652de7c1e40416993a05e3e1c5e7b715c44bba695429fd7d8f91poppler-glib-devel-0.26.5-16.el7.i686.rpmeca2833e3dc067cf8c65f419472d3617afb46865fad0fd74713bfd7bc2fcfa95poppler-demos-0.26.5-16.el7.x86_64.rpmbad60ebda9981d8fc976f76c4407fa2e074a94cc0100775982814c068bf81190SLSA-2016:2581-2NetworkmanagerThe following packages have been upgraded to a newer upstream version: NetworkManager (1.4.0), NetworkManager-libreswan (1.2.4), network-manager- applet (1.4.0), libnl3 (3.2.28). Security Fix(es): * A race condition vulnerability was discovered in NetworkManager. Temporary files were created insecurely when saving or updating connection settings, which could allow local users to read connection secrets such as VPN passwords or WiFi keys. (CVE-2016-0764) Additional Changes:lowScientific LinuxScientific Linux 7libnl3-3.2.28-2.el7.x86_64.rpm4bfa8fc281107ab6fdbe6687b8e9d6188c3892073140bb2b54a320ec6555ce8flibnm-gtk-1.4.0-2.el7.i686.rpmd7904441069391d5ae2cd95abc13ee7b273defd8cfe767319a476aa03cc5992aNetworkManager-libnm-devel-1.4.0-12.el7.i686.rpm434202a57f0f2d707d3b5877cf102bdb1ebcf07e0da5a17aa7f6e3399037176bNetworkManager-dispatcher-routing-rules-1.4.0-12.el7.noarch.rpm426e3dab69ea666545b04596b4fdda98bc44adf1a9965b04bf7c523ff021668elibnl3-cli-3.2.28-2.el7.i686.rpmb5133619c01a9d0d2ff646702d1411682b98b3944879d591992500dc1ff03a20libnma-devel-1.4.0-2.el7.i686.rpm9d36ff7cf4e22c5789121acd42a8631d613f3510c183d2c75f367811f0172d8alibnl3-3.2.28-2.el7.i686.rpm9c7d21e3fd8d5b1ad1041d47c4184049ac1aba1804fa8767fead6d0675b610b4network-manager-applet-1.4.0-2.el7.x86_64.rpm59c39dba80d97efb70b9cd96e6e3a180a7afae64e0176c58b92cb1f586b7c28fNetworkManager-glib-devel-1.4.0-12.el7.i686.rpm58688d792e00d1c7fb38fbb41c66399e454d045d37ffdbc08bb44ed83e3d8e0eNetworkManager-wwan-1.4.0-12.el7.x86_64.rpm905209d4d908fb3b16d3def854f9fc7b36b8243af94214956f167e68770dd515NetworkManager-wifi-1.4.0-12.el7.x86_64.rpm7fd54dfda38dcf096e35219301a5bc60c50f4954325de555374ee62fbcf5f5balibnl3-devel-3.2.28-2.el7.x86_64.rpm14d80d79b81fc22bb127092d177461174ab8fd16547cb2bf23690b091c2b04c2NetworkManager-glib-1.4.0-12.el7.i686.rpmff6985859bf7d81d66cce2b59cc69a2f88bf8f51a40047cce746ed2242c19067libnma-devel-1.4.0-2.el7.x86_64.rpmfeced6e0840d71ff31a59d34d6d118192e7b59650afa930ac987a10e8d97a35clibnl3-cli-3.2.28-2.el7.x86_64.rpma596f21a2bee4f73e3a3a9bdca5aa1691f182d01fdf1a01b7f847e73337830bflibnl3-doc-3.2.28-2.el7.x86_64.rpm7c9fa5ab69fc31a32d6177b1ec79df3b5eae1e00e86d2e74ebaf16fc454ba0b4libnm-gtk-devel-1.4.0-2.el7.i686.rpm6995d83ee70b8aa88991dadd275170b1c4898e8e09b0ca7995e0c15c36b2077clibnma-1.4.0-2.el7.i686.rpmd7482001313e4e4461fd2e44595ce4880bdadbcd7cef46a6db7215defba15320NetworkManager-tui-1.4.0-12.el7.x86_64.rpm79ec499e420daf071c941fc8a4a70ca63bf2492fdf62b4b9606b3ccba28938e2NetworkManager-config-server-1.4.0-12.el7.x86_64.rpm4f6daacaa79c5a0d324c981b206a48baced218574e38a35ecf86d017b0600568libnm-gtk-1.4.0-2.el7.x86_64.rpm2d90b8e8db70b860a65f52f4a47b61d32384f551061ab6248af7dd3e860729d3libnm-gtk-devel-1.4.0-2.el7.x86_64.rpm38618617ba14e4897f4d76c4d033d3f6db6f501c0788d59d438a6a5e4e0484c9NetworkManager-glib-1.4.0-12.el7.x86_64.rpmf3ba229d223f5cd3e4104d09cfdb9fcbaab3b1c8b64316342b76d55c8dff2b12libnma-1.4.0-2.el7.x86_64.rpmd9582aed2f5b94eba979d1e95c270f750ff83e139d90d9242e707ca176e407fdNetworkManager-libreswan-gnome-1.2.4-1.el7.x86_64.rpmcb7f259253548d8a0bfed84c73a6fcd855027e8bece41c2a289d75e3fb97d55fNetworkManager-glib-devel-1.4.0-12.el7.x86_64.rpm3b182c3181a4409a5d904abdd371bfe78e25110d8e2a75844f164c134278553eNetworkManager-1.4.0-12.el7.x86_64.rpm513750294eb4a2d5bc265e5898d3836198d36c6a9088cdad03e8409664a28cf5NetworkManager-libnm-1.4.0-12.el7.x86_64.rpm4474e974de4cbeabbf3dd16f6336f3fd6564961cff817766b9c141b5733d0166NetworkManager-bluetooth-1.4.0-12.el7.x86_64.rpmcbc53ecf019cef3b83c7620b6c4eb3001b61a09806d2743da271a2dc187e8828libnl3-devel-3.2.28-2.el7.i686.rpmda48053d0154aa3996a6738a4d66c2a8bc2606397b2239c00164d51501631832nm-connection-editor-1.4.0-2.el7.x86_64.rpm5ef608d818eb226138db7896a72668e1aa8a7e2597b625c4345d1929530dcfebNetworkManager-libreswan-1.2.4-1.el7.x86_64.rpm35bc6f87309ee2e712bef1f4c24c3f587a7812cb38ade0019d974ed5d01d501cNetworkManager-libnm-devel-1.4.0-12.el7.x86_64.rpm66a1636084e51eeee125f88b4880d35b10dfa97bc75040f15f349ca5a944f024NetworkManager-libnm-1.4.0-12.el7.i686.rpma2833c20b96dc2f2d60b387bcdd13c1330a49b41795b87edd68f7791cfa5f249NetworkManager-team-1.4.0-12.el7.x86_64.rpm863fc5301b3eae234750e07f3ad0e6baebff55abecdc6eabadc6ca5318f8c974NetworkManager-adsl-1.4.0-12.el7.x86_64.rpm1f12476b9e01eedda1abbe7124417e6bfaf214dc92c6ffd49dd8df80d56b1bb3SLSA-2016:2582-2NettleSecurity Fix(es): * Multiple flaws were found in the way nettle implemented elliptic curve scalar multiplication. These flaws could potentially introduce cryptographic weaknesses into nettle's functionality. (CVE-2015-8803, CVE-2015-8804, CVE-2015-8805) * It was found that nettle's RSA and DSA decryption code was vulnerable to cache-related side channel attacks. An attacker could use this flaw to recover the private key from a co-located virtual-machine instance. (CVE-2016-6489) Additional Changes:moderateScientific LinuxScientific Linux 7nettle-2.7.1-8.el7.i686.rpma1e97729eee382e96ed1890e098b859bfb0a3dd0eadcb32d6874ed1d10afbe71nettle-devel-2.7.1-8.el7.x86_64.rpma20926b05cbb0d13cfe9a404263e0a9d473e05498584ffe20e34b2414ce28aa9nettle-2.7.1-8.el7.x86_64.rpm9b697d9fbaab31af87b2043abd0822109e5d97362402bf29a5ada42d290c29e2nettle-devel-2.7.1-8.el7.i686.rpm90f01cc546291ed8f106f9c87296949e79504e4ae379a4cd06ae4fa77e4f1150SLSA-2016:2583-2NtpSecurity Fix(es): * It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP's ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd. (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702) * A memory leak flaw was found in ntpd's CRYPTO_ASSOC. If ntpd was configured to use autokey authentication, an attacker could send packets to ntpd that would, after several days of ongoing attack, cause it to run out of memory. (CVE-2015-7701) * An off-by-one flaw, leading to a buffer overflow, was found in cookedprint functionality of ntpq. A specially crafted NTP packet could potentially cause ntpq to crash. (CVE-2015-7852) * A NULL pointer dereference flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could potentially use this flaw to crash ntpd. (CVE-2015-7977) * A stack-based buffer overflow flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash ntpd. (CVE-2015-7978) * It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979) * It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands. (CVE-2015-5194) * It was found that ntpd would exit with a segmentation fault when a statistics type that was not enabled during compilation (e.g. timingstats) was referenced by the statistics or filegen configuration command. (CVE-2015-5195) * It was found that NTP's :config command could be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process (immediately) or the current estimated drift of the system clock (in hourly intervals). (CVE-2015-5196, CVE-2015-7703) * It was discovered that the sntp utility could become unresponsive due to being caught in an infinite loop when processing a crafted NTP packet. (CVE-2015-5219) * A flaw was found in the way NTP verified trusted keys during symmetric key authentication. An authenticated client (A) could use this flaw to modify a packet sent between a server (B) and a client (C) using a key that is different from the one known to the client (A). (CVE-2015-7974) * A flaw was found in the way the ntpq client processed certain incoming packets in a loop in the getresponse() function. A remote attacker could potentially use this flaw to crash an ntpq client instance. (CVE-2015-8158) The CVE-2015-5219 and CVE-2015-7703 issues were discovered by Miroslav Lichvr (Red Hat). Additional Changes:moderateScientific LinuxScientific Linux 7ntp-perl-4.2.6p5-25.el7.noarch.rpma86d621ec1ce276fb26109040c0f4a80dbc6ce8338f707ff37e813fae945c397ntpdate-4.2.6p5-25.el7.x86_64.rpm18c9b5dd127419a0abbf339a5805d579d84cb660e4fb58765e49ae5d2b43a9e2ntp-doc-4.2.6p5-25.el7.noarch.rpmd57610dc1bc62bc2d9f9f6fb33e860300ecca36a066af47e13ecff3547f48915sntp-4.2.6p5-25.el7.x86_64.rpm3b1aa53460ba1e7bd32195460c8a463908afd5cf3302adb6ee593fdfee427e0cntp-4.2.6p5-25.el7.x86_64.rpm592b78a0e502c3e70eb895d8da25593dd30e9f1b5f75e7703ecec6af8bfa9c24SLSA-2016:2585-2Qemu-KvmSecurity Fix(es): * An integer overflow flaw and an out-of-bounds read flaw were found in the way QEMU's VGA emulator set certain VGA registers while in VBE mode. A privileged guest user could use this flaw to crash the QEMU process instance. (CVE-2016-3712) * An infinite loop flaw was found in the way QEMU's e1000 NIC emulation implementation processed data using transmit or receive descriptors under certain conditions. A privileged user inside a guest could use this flaw to crash the QEMU instance. (CVE-2016-1981) Additional Changes:moderateScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-126.el7.x86_64.rpmd57df6cde501526f9c0f3da5f6be9b960ee6890109c2b15d30c96daeb1d372c5qemu-kvm-common-1.5.3-126.el7.x86_64.rpm5385f478749e39d14822ed56d61a23f6dbcf4a4d8d1831974753de6a435d4736qemu-img-1.5.3-126.el7.x86_64.rpm4a7ea2d51d17b25d7b07992c4a1d2b5206d39cc3408de2fdedd9ed5d962882a4qemu-kvm-1.5.3-126.el7.x86_64.rpmf8a0149296ab8213739c6e9dae82f679a89f0c2d1087871301971a6502e97091SLSA-2016:2586-2PythonSecurity Fix(es): * A vulnerability was discovered in Python, in the built-in zipimporter. A specially crafted zip file placed in a module path such that it would be loaded by a later "import" statement could cause a heap overflow, leading to arbitrary code execution. (CVE-2016-5636) Additional Changes:lowScientific LinuxScientific Linux 7tkinter-2.7.5-48.el7.x86_64.rpmd8af6c1b5688849302fa0077f841d4bb35a6aaaf008faf1c54a1b1c0c1eec0a2python-libs-2.7.5-48.el7.i686.rpm966fb59689717d46bd518e0f620f2b882b7439570d3c1aa84b125205d654abbbpython-devel-2.7.5-48.el7.x86_64.rpm24fd0bb39844aafa8d519fa843b34b3e3c7bf9f8ebaf69bf3e6b10364437f004python-libs-2.7.5-48.el7.x86_64.rpm42ac9f4868fa746efa18af2017521f16c8c0d87a89383267b30085db8faae6b7python-tools-2.7.5-48.el7.x86_64.rpma5a3ec6b573c9f70185a44069242ca8da8b58b92f120e262248fe6913d205a09python-test-2.7.5-48.el7.x86_64.rpmf13f37f91b6f7c41fce7e3240d6e1e009b223f0d81e4afc52ea43e7ffca0e81bpython-debug-2.7.5-48.el7.x86_64.rpm0daab48c193fbd14a960bb53dda2cba72131eef91c5a1fde3db47a26605089cdpython-2.7.5-48.el7.x86_64.rpm5e0f6e9ae6061673c699ad6b0411a6c5cc3bdd59b92b20894ecbeba2932b6887SLSA-2016:2587-2WgetSecurity Fix(es): * It was found that wget used a file name provided by the server for the downloaded file when following an HTTP redirect to a FTP server resource. This could cause wget to create a file with a different name than expected, possibly allowing the server to execute arbitrary code on the client. (CVE-2016-4971)moderateScientific LinuxScientific Linux 7wget-1.14-13.el7.x86_64.rpm658007ef3b90a024a316f08c37bbbe384da002cd09a54979629525b469fef500SLSA-2016:2588-2OpensshSecurity Fix(es): * It was discovered that the OpenSSH sshd daemon fetched PAM environment settings before running the login program. In configurations with UseLogin=yes and the pam_env PAM module configured to read user environment settings, a local user could use this flaw to execute arbitrary code as root. (CVE-2015-8325) Additional Changes:moderateScientific LinuxScientific Linux 7pam_ssh_agent_auth-0.9.3-9.31.el7.x86_64.rpm3a977ea2168ebc2f3a532cf789da11620205ff16cbec65f9c8efd7fc19129080openssh-ldap-6.6.1p1-31.el7.x86_64.rpme14873c6bac86577f290ade761799b4f62ca07a95896617c13351ecbb0c55302openssh-clients-6.6.1p1-31.el7.x86_64.rpm58b1e0b43b818d5083abfd0d020dc0f3128cdc84ca0ef83a15b6fc677493213copenssh-keycat-6.6.1p1-31.el7.x86_64.rpmb859ec4f2f31fc68c7e92848016b07f1476b88b51beda3d852192381a7e81f47openssh-server-6.6.1p1-31.el7.x86_64.rpm7844f2b925f9ad3e443faa66cec132d5750dbd287a5b801f65690da76894e98copenssh-6.6.1p1-31.el7.x86_64.rpm6fd11549b6565c7c54d107eae114b3b0486ed7aec3f9b6208fceb80c35fad0aapam_ssh_agent_auth-0.9.3-9.31.el7.i686.rpme4b850fee59defb8c69fd9ce64c5fb74e1068159d47899b1db69031b56d0654bopenssh-askpass-6.6.1p1-31.el7.x86_64.rpm78dfc38aa66d2755ffddf47465f56c939d629bf5ed142693e9dc1643fe416ea9openssh-server-sysvinit-6.6.1p1-31.el7.x86_64.rpm4ae8319dd650441b23d9568a8c7056b6b7d87fb174ce0fba9dab50cffa80cef7SLSA-2016:2589-2GimpThe following packages have been upgraded to a newer upstream version: gimp (2.8.16), gimp-help (2.8.2). Security Fix(es): * Multiple use-after-free vulnerabilities were found in GIMP in the channel and layer properties parsing process when loading XCF files. An attacker could create a specially crafted XCF file which could cause GIMP to crash. (CVE-2016-4994) Additional Changes:moderateScientific LinuxScientific Linux 7gimp-help-ja-2.8.2-1.el7.noarch.rpm96c5f973fe65ac306969095ad795a335e9df9e1f7ba841d96363d48e4d9de9d6gimp-help-zh_CN-2.8.2-1.el7.noarch.rpmc049db30767c71bd59a0569f52c1fddebea060e6a84afedfc525cfef25327d23gimp-2.8.16-3.el7.x86_64.rpm058a9acad361bb5e3b43736b815041ee78744bd402819f917f74d2238cea19b0gimp-libs-2.8.16-3.el7.i686.rpm47fb130a9c2c6060dd88cc2f0bb2bda25e417b6ba09dd48b4b7702e7d35cc6dagimp-help-pt_BR-2.8.2-1.el7.noarch.rpm09b4179df05bb94867fa0eb7c4bf6d33abf16abb3e5609e86a7864ed70bf2fccgimp-help-fr-2.8.2-1.el7.noarch.rpm0063bc0241cd99f416404a29eaba4e135ca79dc96faf2e32f42625ba49ebc6aagimp-help-sv-2.8.2-1.el7.noarch.rpm061f9059fe2b8a0d39217a314e86fbbdbb7baa31e232eb7b8bca52bd71af1725gimp-help-da-2.8.2-1.el7.noarch.rpmb79a862905ddeef423f09f1bda0cfe9f97526d0a8dcacc5d1c3563a543d68444gimp-devel-2.8.16-3.el7.x86_64.rpmd15bb696c300b2cc059d183193bd1c125e0d42e08b984b568c3435de357ff845gimp-help-es-2.8.2-1.el7.noarch.rpm468db0790dd13280557bae833f6af5739c3df990b748e149571fadf78ae2eff3gimp-help-ca-2.8.2-1.el7.noarch.rpm8bc7a8fc6e2b480cc691e50b4ba700c2d44e3eef6ebab8cad12280b3022a7d86gimp-help-2.8.2-1.el7.noarch.rpm602f43de18ac5fe204f6ff4a85ea64aea73523f7b261498d671ee11ec670c5d6gimp-help-nl-2.8.2-1.el7.noarch.rpmde70ecb18b946c15ba5cd4b6bc3151919fb4d39611ec5b7cbdba2a354392d7efgimp-help-it-2.8.2-1.el7.noarch.rpm0b0a22ed3f43764ecea2472ee490e445e89db2f03fffd58cd037cfd8fd34c786gimp-help-en_GB-2.8.2-1.el7.noarch.rpm68ee0eee22b23e18ea7993c00c7d76fc83187aa65c288dbf1e71a1148d083419gimp-help-de-2.8.2-1.el7.noarch.rpm8a1caaa36082c1340cd441d11baba98d8e11f40a49f8e77932b41f876b10e205gimp-libs-2.8.16-3.el7.x86_64.rpmd788c12b893fcecb869fd9095ffaa75f5e4825e8c742175c6755c2234df74f81gimp-help-nn-2.8.2-1.el7.noarch.rpma0e6a6e471f1b316d609c9272d97254f8776029542a4f4bdf2a664b43cba9d7fgimp-devel-tools-2.8.16-3.el7.x86_64.rpmae6ab49c7c8b2c726f924f81cdd6c7a598f67bbd2de0e6c543980f7766d0daabgimp-help-el-2.8.2-1.el7.noarch.rpm30f6cb04d4ac10fb2aeb84db0216872ebf49a6cfea64ec0d4b6ff4ed62873821gimp-help-ru-2.8.2-1.el7.noarch.rpmfc1cf59e63a16b49db4a2eb2c2e269960ccb347662b3ce9411509c27971622fegimp-help-ko-2.8.2-1.el7.noarch.rpm97587c09d0c09b27874a451ca9d9506ee1bdac4a31e7b810b9b765fecee3d591gimp-devel-2.8.16-3.el7.i686.rpm3b12103d91fbadce8cd91c2b69720fd71a2c3f8b60c06182cd6e16c6232add21gimp-help-sl-2.8.2-1.el7.noarch.rpm5baddb58b83620f76eadaec06358a199003781a774cb1c85d0abcb7d14019b89SLSA-2016:2590-2DhcpSecurity Fix(es): * A resource-consumption flaw was discovered in the DHCP server. dhcpd did not restrict the number of open connections to OMAPI and failover ports. A remote attacker able to establish TCP connections to one of these ports could use this flaw to cause dhcpd to exit unexpectedly, stop responding requests, or exhaust system sockets (denial of service). (CVE-2016-2774) Additional Changes:moderateScientific LinuxScientific Linux 7dhcp-libs-4.2.5-47.sl7.x86_64.rpm74d01f0acf9bc780c8de96620d96ebe1436d5ffd9fff78e00fb917ba4da74370dhcp-devel-4.2.5-47.sl7.i686.rpmefb84f65a5db0b74191b48f8cd0b3cac4003ed020cf3b06ba677f95688042f15dhcp-4.2.5-47.sl7.x86_64.rpm181d7e05596fb580d51801239e4649242e36b81c77fc082a8ee4e0de248b65f7dhcp-devel-4.2.5-47.sl7.x86_64.rpm91489ea8dafbfea8aa6cf7a5b46cb217eaefbaeee9221c03a3cff7a8ac35d6e8dhcp-libs-4.2.5-47.sl7.i686.rpme17190b6d6fa4ec2163b5840c8696125ee70f3818fea9d2132beb614b5989a0edhcp-common-4.2.5-47.sl7.x86_64.rpme3a5e09548773a8076e8f1ac0fb896f566970cbbb3bc7941e009225b3d9c6119dhclient-4.2.5-47.sl7.x86_64.rpm07c7b1318be6c92a4184c0f04a7618b18b8b3f774568aa925f0b8600bf159e3aSLSA-2016:2591-2Krb5The following packages have been upgraded to a newer upstream version: krb5 (1.14.1). Security Fix(es): * A NULL pointer dereference flaw was found in MIT Kerberos kadmind service. An authenticated attacker with permission to modify a principal entry could use this flaw to cause kadmind to dereference a null pointer and crash by supplying an empty DB argument to the modify_principal command, if kadmind was configured to use the LDAP KDB module. (CVE-2016-3119) * A NULL pointer dereference flaw was found in MIT Kerberos krb5kdc service. An authenticated attacker could use this flaw to cause krb5kdc to dereference a null pointer and crash by making an S4U2Self request, if the restrict_anonymous_to_tgt option was set to true. (CVE-2016-3120) Additional Changes:lowScientific LinuxScientific Linux 7krb5-devel-1.14.1-26.el7.x86_64.rpma101b343e6479c91cfe72ee0b13858a050094bef80d6160929558e59a14bb7balibkadm5-1.14.1-26.el7.i686.rpm1c30c2faa3055e1b4502e03f4c310e4932e4c1b9a0f9feff25634367a97686cdkrb5-devel-1.14.1-26.el7.i686.rpm39f62c7a6b01f4833339562320b2390f944a1796abb41854d7eb7aa0093d32c2krb5-server-1.14.1-26.el7.x86_64.rpmc94105f63d7e5cf351f689b7804c89716fbaf729ff365569369bd87786934721krb5-workstation-1.14.1-26.el7.x86_64.rpm50ae303413022ac17fcfac833efad8b58210bb4a68e92872af7f3f30c424f903krb5-server-ldap-1.14.1-26.el7.x86_64.rpmd7da201f150a7c7baac4d848f311d4e3a49663a54a84f10ae439178d55d6b41blibkadm5-1.14.1-26.el7.x86_64.rpm7c74630603134451814dcb81080a21bf95e300e6ca90e4632022fba2d9d8689fkrb5-libs-1.14.1-26.el7.x86_64.rpm187f3ba043bca16b62e9c39474ff177e18f481ec5959a8d75e50b2c437c19586krb5-pkinit-1.14.1-26.el7.x86_64.rpm852adcd39f30781531f4c258da0ada181ed835c7fe13f46b2f2af88958441cfckrb5-libs-1.14.1-26.el7.i686.rpm674322a17af34e54d0e6022696441e78a78d1d0798dae86db0d4878c14959c32SLSA-2016:2592-2Subscription-Manager* It was found that subscription-manager set weak permissions on files in /var/lib/rhsm/, causing an information disclosure. A local, unprivileged user could use this flaw to access sensitive data that could potentially be used in a social engineering attack. (CVE-2016-4455)moderateScientific LinuxScientific Linux 7subscription-manager-plugin-ostree-1.17.15-1.sl7.x86_64.rpmb63525a15147613dfb9700c26177e63335c120131fce359f92fa83d1f1142a26python-rhsm-1.17.9-1.el7.x86_64.rpmd4149ee88f2aa6baee30e2098b5387ff2e72de2ce6b5181458179d9dfef22139subscription-manager-initial-setup-addon-1.17.15-1.sl7.x86_64.rpm76bb3f8211637a22a212baf4129be4fee4c12be2441de7d772495fd17dff3812subscription-manager-1.17.15-1.sl7.x86_64.rpm8b26c7d89b59d55ddd4759c6a8f0719f44e819fb9329430826bcef871f7073b5subscription-manager-plugin-container-1.17.15-1.sl7.x86_64.rpm67a5c3a32e422ab2e43729f2f6abc99b9179bcafcf9a06d35f1a9395e768263bsubscription-manager-gui-1.17.15-1.sl7.x86_64.rpm82a47c9fbcd159aa235e072ecf50c5dacbc7e844ef76c8ae1ee4523b9405c734python-rhsm-certificates-1.17.9-1.el7.x86_64.rpmaf9b0755768efd2dd596535857d2a4e5300b46186f0fd4a07e40e140a48c33c2SLSA-2016:2593-2SudoSecurity Fix(es): * It was discovered that the default sudo configuration preserved the value of INPUTRC from the user's environment, which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo. (CVE-2016-7091) Note: With this update, INPUTRC was removed from the env_keep list in /etc/sudoers to avoid having sudo preserve the value of this variable when invoking privileged commands. Additional Changes:lowScientific LinuxScientific Linux 7sudo-devel-1.8.6p7-20.el7.x86_64.rpm216277d5d893b8aaa1fa69bcf2116558743d172b8db940be7a2de0d27159d22esudo-devel-1.8.6p7-20.el7.i686.rpmf8287de560dd760af9fe8e7893b1783679b6bf251340f258dd6fdeef5be530ecsudo-1.8.6p7-20.el7.x86_64.rpma37f1869cf693cc4201b7f6db57094f5edea13e80f8f55a3905033de8d0dacbeSLSA-2016:2594-2389-Ds-BaseThe following packages have been upgraded to a newer upstream version: 389 -ds-base (1.3.5.10). Security Fix(es): * It was found that 389 Directory Server was vulnerable to a flaw in which the default ACI (Access Control Instructions) could be read by an anonymous user. This could lead to leakage of sensitive information. (CVE-2016-5416) * An information disclosure flaw was found in 389 Directory Server. A user with no access to objects in certain LDAP sub-tree could send LDAP ADD operations with a specific object name. The error message returned to the user was different based on whether the target object existed or not. (CVE-2016-4992) * It was found that 389 Directory Server was vulnerable to a remote password disclosure via timing attack. A remote attacker could possibly use this flaw to retrieve directory server password after many tries. (CVE-2016-5405) The CVE-2016-5416 issue was discovered by Viktor Ashirov (Red Hat); the CVE-2016-4992 issue was discovered by Petr Spacek (Red Hat) and Martin Basti (Red Hat); and the CVE-2016-5405 issue was discovered by William Brown (Red Hat). Additional Changes:moderateScientific LinuxScientific Linux 7389-ds-base-1.3.5.10-11.el7.x86_64.rpma8d37280b2ef6278219c04a035dc99106bb63674776e3918a5d9d2c7a434aa6e389-ds-base-devel-1.3.5.10-11.el7.x86_64.rpm299c76a64490426cc9dbc20713a25833070bede25df3144d8c2a60d231f02d23389-ds-base-snmp-1.3.5.10-11.el7.x86_64.rpm025f78027a16abd9ecb9b4d8977701a60311b1895ab09328e0b742098c7fbeff389-ds-base-libs-1.3.5.10-11.el7.x86_64.rpm12ff708f0c69cf220657bc1ceb0794eb56df49192c1a2485c6aae88eb681a349SLSA-2016:2595-2MariadbThe following packages have been upgraded to a newer upstream version: mariadb (5.5.52). Security Fix(es): * It was discovered that the MariaDB logging functionality allowed writing to MariaDB configuration files. An administrative database user, or a database user with FILE privileges, could possibly use this flaw to run arbitrary commands with root privileges on the system running the database server. (CVE-2016-6662) * A race condition was found in the way MariaDB performed MyISAM engine table repair. A database user with shell access to the server running mysqld could use this flaw to change permissions of arbitrary files writable by the mysql system user. (CVE-2016-6663) (CVE-2016-3492, CVE-2016-5612, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-8283) Additional Changes:importantScientific LinuxScientific Linux 7mariadb-test-5.5.52-1.el7.x86_64.rpme121c57fde8fb6f6b9f27a6a43167526266a982d6308def9cb3021348d531417mariadb-embedded-devel-5.5.52-1.el7.i686.rpmc5bcb896c95f5fd4b48b4bec84db60f65be414c960eab3073189d8e144ecff23mariadb-5.5.52-1.el7.x86_64.rpm45247ca599f97596514c363da9a27194c8f842f0e47b99c4892ac635d1f6ce24mariadb-devel-5.5.52-1.el7.x86_64.rpm2d3653e3a3eb8d337e9af5c98812bfd6c17904a397d2285b4c6fa22c107d5fc2mariadb-devel-5.5.52-1.el7.i686.rpma9d469d22d5631a900c290791a6aab022db4e25548451fda8d46e62149ad1901mariadb-embedded-5.5.52-1.el7.x86_64.rpmeea10cdac576571d694131ba46372281769e870bf0336c32020137785b89ad20mariadb-embedded-5.5.52-1.el7.i686.rpma543c388d357b8e8f6208c0d2e660a95ef3d6d2f20494205655c3c7b6500c643mariadb-embedded-devel-5.5.52-1.el7.x86_64.rpm136770968dc4c8be4f2b2f333308d639db8a6afef172ec033701f637041f5035mariadb-server-5.5.52-1.el7.x86_64.rpm726bd1c1c30eda43ccad7691cc2f34db3e1877eced34e940ffc8965c31c2e6b1mariadb-bench-5.5.52-1.el7.x86_64.rpm5ec0a40853eac4e2a93f31a0e15c2b5487bf84c5b8123d087330b78d41d46fb8mariadb-libs-5.5.52-1.el7.x86_64.rpm4ace9d597810793883dce88ab9777421ee0380b6bfcc3bdfaafd74d35aae4dc9mariadb-libs-5.5.52-1.el7.i686.rpm92bf8042db11a488c02d55d259b9d08e1eb49c0a00f1256d8ae746b2652f0f79SLSA-2016:2596-2PcsThe following packages have been upgraded to a newer upstream version: pcs (0.9.152). Security Fix(es): * A Cross-Site Request Forgery (CSRF) flaw was found in the pcsd web UI. A remote attacker could provide a specially crafted web page that, when visited by a user with a valid pcsd session, would allow the attacker to trigger requests on behalf of the user, for example removing resources or restarting/removing nodes. (CVE-2016-0720) * It was found that pcsd did not invalidate cookies on the server side when a user logged out. This could potentially allow an attacker to perform session fixation attacks on pcsd. (CVE-2016-0721) These issues were discovered by Martin Prpic (Red Hat Product Security). Additional Changes:moderateScientific LinuxScientific Linux 7pcs-0.9.152-10.sl7.x86_64.rpm5be9ce405e3010d7b36c456524faf801947def9d326c012de18ce5562b1d370aSLSA-2016:2597-2FirewalldThe following packages have been upgraded to a newer upstream version: firewalld (0.4.3.2). Security Fix(es): * A flaw was found in the way firewalld allowed certain firewall configurations to be modified by unauthenticated users. Any locally logged in user could use this flaw to tamper or change firewall settings. (CVE-2016-5410) Additional Changes:moderateScientific LinuxScientific Linux 7firewalld-0.4.3.2-8.el7.noarch.rpme36a72ff6a117d1542779f1f652255aeb04958881799154f8d0d0a91f48a40eepython-firewall-0.4.3.2-8.el7.noarch.rpm03c5fff55f9b8c1cc0e147cca0641f26c628bbb89b232d86bf48786535e94d9cfirewall-applet-0.4.3.2-8.el7.noarch.rpmcf88a3f664258b1ab736a7cd0dbb8064fed94b595fda0f4045f5d4ebb25a9bacfirewalld-filesystem-0.4.3.2-8.el7.noarch.rpm26749cffeb8b009305ed5d9a51482bd82a2efb2bbefada41ec2b65f783614b5cfirewall-config-0.4.3.2-8.el7.noarch.rpmb7192f42b765cd97d918a1c476311ff6f26ac7f760f1abf2e27f5a6f314ff170SLSA-2016:2598-2PhpSecurity Fix(es): * A flaw was found in the way certain error conditions were handled by bzread() function in PHP. An attacker could use this flaw to upload a specially crafted bz2 archive which, when parsed via the vulnerable function, could cause the application to crash or execute arbitrary code with the permissions of the user running the PHP application. (CVE-2016-5399) * An integer overflow flaw, leading to a heap-based buffer overflow was found in the imagecreatefromgd2() function of PHP's gd extension. A remote attacker could use this flaw to crash a PHP application or execute arbitrary code with the privileges of the user running that PHP application using gd via a specially crafted GD2 image. (CVE-2016-5766) * An integer overflow flaw, leading to a heap-based buffer overflow was found in the gdImagePaletteToTrueColor() function of PHP's gd extension. A remote attacker could use this flaw to crash a PHP application or execute arbitrary code with the privileges of the user running that PHP application using gd via a specially crafted image buffer. (CVE-2016-5767) * A double free flaw was found in the mb_ereg_replace_callback() function of php which is used to perform regex search. This flaw could possibly cause a PHP application to crash. (CVE-2016-5768) Additional Changes:moderateScientific LinuxScientific Linux 7php-pdo-5.4.16-42.el7.x86_64.rpm72a374d410443f3a65aed3015719de510f68233cdafc44248f1bf7b2e7584fc3php-mysqlnd-5.4.16-42.el7.x86_64.rpmd14c559c7698dbff740ab87ef1b3eaf556427d63c1618c87c5f6260852990c07php-embedded-5.4.16-42.el7.x86_64.rpme28bde73717cae26e0b5045c54c8e047ca73f1b6aeccc574e1bc769deda085a1php-pgsql-5.4.16-42.el7.x86_64.rpmf960fa22393ff828f7121d1447b2afb4fa7511de88e10f3a998e55b7fb67c70fphp-xml-5.4.16-42.el7.x86_64.rpm731f93baae78f8e791e4540f77b5b03093cfb0ca61f69e1ce4b8c390a7288258php-common-5.4.16-42.el7.x86_64.rpm274073d3aeea94eaa885cc0c180db79de4a86726cf3492d3a42d41214444f0dfphp-pspell-5.4.16-42.el7.x86_64.rpmbe8f1b3b351f1b48f8d0304c8cfe0d91d7b2791dcd74d073d2550b283f6a46b6php-mbstring-5.4.16-42.el7.x86_64.rpmb3c288531f7b29c0f304828eb168fa02f44cb649e1ef3386a7d041cae96c2dedphp-snmp-5.4.16-42.el7.x86_64.rpm9f8f7ff59d0536557b05e397d2c054c6b8994d9f42cbadc008f3ff51572427fdphp-ldap-5.4.16-42.el7.x86_64.rpmb069fdaaa00f36a21a7eb74761d0f50b52a1b115c8388114d5d3ea12ce955c2fphp-odbc-5.4.16-42.el7.x86_64.rpm6af244e1310efcfdf6ef463dd150abc6bc6d4000a861ca106fb9556e4243a462php-intl-5.4.16-42.el7.x86_64.rpm36e4630f4a2892b1a782488ce41181162607f30de6839fedfe4bc4c50f4cb4bbphp-bcmath-5.4.16-42.el7.x86_64.rpmb35562eaf46c91ff07b69796d60af0dc81b7364d5feabd3f748bb80a2c5057b3php-xmlrpc-5.4.16-42.el7.x86_64.rpm0e7a9dadf70b694fbddd538bed24b9cd713ffcd09f00948e4304c4bc2f516338php-soap-5.4.16-42.el7.x86_64.rpmaa6f4bc7f432702625a2e597e3933e703f77d1486de9acfe970f6d3b0699b870php-5.4.16-42.el7.x86_64.rpm6534096381b3d5a970f8d81b3adcbb7e4ae9d7b4569a30c34e34c583373335b3php-mysql-5.4.16-42.el7.x86_64.rpm5b86dc16709d191e2b492f7b78d2673b8084aebd6e2e79832007e16c2b54b6a4php-enchant-5.4.16-42.el7.x86_64.rpm914ad3aea0ade9e5b24302eb3281f1a63403708666c3890eaec4acc42b1e3743php-process-5.4.16-42.el7.x86_64.rpm2677a4d3306787069e3e5503a9c975174c8a36709ec760bfba3058c0c18a33c6php-recode-5.4.16-42.el7.x86_64.rpmc83b1dcc029bb1fe235951e39ba160a2b0b05f6861ea555f95446350e5be723ephp-gd-5.4.16-42.el7.x86_64.rpm0b4bb305173fe5d56c360f474593efe3acf52982f74e69a3310127a65edcbec5php-devel-5.4.16-42.el7.x86_64.rpm74f48a248954126e9bcf2e3353b6d2bc65922ae1984a7797aff839a36f9859efphp-cli-5.4.16-42.el7.x86_64.rpm24ccc034cecc8d2c3174e377c8cd2dad12e0ca0627182c4e13d2402ebbd14db9php-dba-5.4.16-42.el7.x86_64.rpmfd3da7ec5c3acd746ec44c122902a34cd0f3f7ad045d39aa207fbbb8c2d3fcd5php-fpm-5.4.16-42.el7.x86_64.rpm5a5a6bc0027a3b030d4292174a441fb122e9dfff8a28447cf75008a9e857dd2dSLSA-2016:2599-2TomcatThe following packages have been upgraded to a newer upstream version: tomcat (7.0.69). Security Fix(es): * A CSRF flaw was found in Tomcat's the index pages for the Manager and Host Manager applications. These applications included a valid CSRF token when issuing a redirect as a result of an unauthenticated request to the root of the web application. This token could then be used by an attacker to perform a CSRF attack. (CVE-2015-5351) * It was found that several Tomcat session persistence mechanisms could allow a remote, authenticated user to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that placed a crafted object in a session. (CVE-2016-0714) * A security manager bypass flaw was found in Tomcat that could allow remote, authenticated users to access arbitrary application data, potentially resulting in a denial of service. (CVE-2016-0763) * A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092) * A directory traversal flaw was found in Tomcat's RequestUtil.java. A remote, authenticated user could use this flaw to bypass intended SecurityManager restrictions and list a parent directory via a '/..' in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call. (CVE-2015-5174) * It was found that Tomcat could reveal the presence of a directory even when that directory was protected by a security constraint. A user could make a request to a directory via a URL not ending with a slash and, depending on whether Tomcat redirected that request, could confirm whether that directory existed. (CVE-2015-5345) * It was found that Tomcat allowed the StatusManagerServlet to be loaded by a web application when a security manager was configured. This allowed a web application to list all deployed web applications and expose sensitive information such as session IDs. (CVE-2016-0706) Additional Changes:moderateScientific LinuxScientific Linux 7tomcat-admin-webapps-7.0.69-10.el7.noarch.rpm20a89ebb0fd66fa18aab813d3ff63a967e2a61697e947836bb9a74e54c55626atomcat-7.0.69-10.el7.noarch.rpm12edbf67e52da38b670b51ba7f58bff96a8bdf8671c96e1be4c1206893f0a647tomcat-lib-7.0.69-10.el7.noarch.rpmd28354f6aa28ace029fddbf1d4b6ca53926caaef8f7a6febdb61f08e5ea9dd42tomcat-webapps-7.0.69-10.el7.noarch.rpmc4e8cd03724dce3564c2e4e615d57949ef453b7b168f2a121630c67c7447ecf6tomcat-jsvc-7.0.69-10.el7.noarch.rpme703fd08a3e3a7d18316f02709601288e2568be076ca1bbe3a65ca7c169ccaf2tomcat-jsp-2.2-api-7.0.69-10.el7.noarch.rpm0de8f59fc31baf2ed1735f3dcf61fb1dcf72ed3afb8ce1ee9792254de78d284ftomcat-servlet-3.0-api-7.0.69-10.el7.noarch.rpme27724b6995d49c71c972e97dbde475aba380698e188d5526ebc615e9a4e88f6tomcat-javadoc-7.0.69-10.el7.noarch.rpmd7cdceb1069074c95b179bbfaf9e268d7b00589d1d342b8ce5041d13054a79d8tomcat-el-2.2-api-7.0.69-10.el7.noarch.rpm6af7bac8b3654bfd0e36d554b1a5c03592b06aee67a94573558d1fa41df8b6f0tomcat-docs-webapp-7.0.69-10.el7.noarch.rpm468f9354023d03473f9963df395e764cb7b4720a0a445996a7396ef62b44c30dSLSA-2016:2600-2SquidThe following packages have been upgraded to a newer upstream version: squid (3.5.20). Security Fix(es): * Incorrect boundary checks were found in the way squid handled headers in HTTP responses, which could lead to an assertion failure. A malicious HTTP server could use this flaw to crash squid using a specially crafted HTTP response. (CVE-2016-2569, CVE-2016-2570) * It was found that squid did not properly handle errors when failing to parse an HTTP response, possibly leading to an assertion failure. A malicious HTTP server could use this flaw to crash squid using a specially crafted HTTP response. (CVE-2016-2571, CVE-2016-2572) * An incorrect boundary check was found in the way squid handled the Vary header in HTTP responses, which could lead to an assertion failure. A malicious HTTP server could use this flaw to crash squid using a specially crafted HTTP response. (CVE-2016-3948) Additional Changes:moderateScientific LinuxScientific Linux 7squid-migration-script-3.5.20-2.el7.x86_64.rpm4579cfdc1cc2fe0f6c2cd0778aab70c9b2df3fb42026ffd20de5e1a9ca2734easquid-sysvinit-3.5.20-2.el7.x86_64.rpme18ecca3b57b48e6758c6184ff7e12ea6f9d7b2b188739e4fc5486766b9e02d5squid-3.5.20-2.el7.x86_64.rpm876a22618990321df727f5592bc31d9ebfcd4d70996d0fca32b7c3c04a828496SLSA-2016:2601-2FontconfigSecurity Fix(es): * It was found that cache files were insufficiently validated in fontconfig. A local attacker could create a specially crafted cache file to trigger arbitrary free() calls, which in turn could lead to arbitrary code execution. (CVE-2016-5384) Additional Changes:moderateScientific LinuxScientific Linux 7fontconfig-devel-2.10.95-10.el7.i686.rpm9857be37cf5ba2ed378c1d46926da6fb32b737ca559598f9133fe44c3bfeda6efontconfig-devel-doc-2.10.95-10.el7.noarch.rpmeaa134bc625d29447e5eee032aefb63e2563d863957a21b3213655aa333ab680fontconfig-devel-2.10.95-10.el7.x86_64.rpm932f05a350a31c1c8d95e37ad5b14d3cfa1a98b23645541ffa6f74fd25e0a69bfontconfig-2.10.95-10.el7.x86_64.rpm7f312f105a65490ad7a01ae1a86eba379154ed4087bf7d9c898a6cfcf9bfa73dfontconfig-2.10.95-10.el7.i686.rpm64f2c8ab15754d68be2b76b12f0b42ac5efcd45c3fa500370dba0afa75044f0dSLSA-2016:2602-2Mod_NssThe following packages have been upgraded to a newer upstream version: mod_nss (1.0.14). Security Fix(es): * A flaw was found in the way mod_nss parsed certain OpenSSL-style cipher strings. As a result, mod_nss could potentially use ciphers that were not intended to be enabled. (CVE-2016-3099) This issue was discovered by Rob Crittenden (Red Hat). Additional Changes:lowScientific LinuxScientific Linux 7mod_nss-1.0.14-7.el7.x86_64.rpm79caf4ba960adc5ffc6969f2d899e66cbb36145e3516eb6bfeb9aea537c8bf51SLSA-2016:2603-2LibreswanSecurity Fix(es): * A traffic amplification flaw was found in the Internet Key Exchange version 1 (IKEv1) protocol. A remote attacker could use a libreswan server with IKEv1 enabled in a network traffic amplification denial of service attack against other hosts on the network by sending UDP packets with a spoofed source address to that server. (CVE-2016-5361) Additional Changes:moderateScientific LinuxScientific Linux 7libreswan-3.15-8.el7.x86_64.rpm4cbf3b7c37bee2767bd4a5d997d129e1c003a30b3ba56d84558f91e8eadac0ecSLSA-2016:2604-2Resteasy-BaseSecurity Fix(es): * It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw to execute arbitrary code with the permissions of the application using RESTEasy. (CVE-2016-7050) Additional Changes:importantScientific LinuxScientific Linux 7resteasy-base-javadoc-3.0.6-4.el7.noarch.rpmfa90794cf97370e71df2fad45496a13cc909a4e6379964cebe73272e41e65a76resteasy-base-jackson-provider-3.0.6-4.el7.noarch.rpm3c454053948350c2728ba151a3f43ef328083358ce263f5347718d125ce74f4dresteasy-base-tjws-3.0.6-4.el7.noarch.rpm28f21bf089a93b7a2b80a4e5decfab21106521b8d0dfad433b32851ef5314308resteasy-base-jaxrs-3.0.6-4.el7.noarch.rpmf1fffeba750c55ea95d0cc972defefd6429a95e198ef15220e79091e730784daresteasy-base-jaxb-provider-3.0.6-4.el7.noarch.rpme0b085508d37e29481b98e92d2688a0dc06c8947113057db97c5e592b13682aaresteasy-base-jaxrs-all-3.0.6-4.el7.noarch.rpmbd35230c31b5abfdec2063434c9280e26fb51eb2cc1647cfdccca18b9d945265resteasy-base-3.0.6-4.el7.noarch.rpm25b1576c35502d7f8fda28cbbcb56fd9d9eb5ff34b697e046dc70fd1d7829207resteasy-base-resteasy-pom-3.0.6-4.el7.noarch.rpm846fb21b7b488de171509a4b38ab650c80c9818c9305325db6904ffd773cb3a1resteasy-base-atom-provider-3.0.6-4.el7.noarch.rpm84b1a8c078b87807662086eaf3e4d6870a2580e1e9348ce706d94434923d9de4resteasy-base-jettison-provider-3.0.6-4.el7.noarch.rpm5ce4abe2275a68fc881860b145730f61db3bb390f76f8feabffcaf9c45428475resteasy-base-jaxrs-api-3.0.6-4.el7.noarch.rpm57814bc4870b900114af1e6accf1fd94e8a01ac59256916ec15594fee30b4672resteasy-base-client-3.0.6-4.el7.noarch.rpm36c2f33f1603096689836f66c4079e537f781088f245e0a4c1d4ee587a4b0d1aresteasy-base-providers-pom-3.0.6-4.el7.noarch.rpmab851d23a6310a10f69641e77eb950f1e93832d9164586e39d9486b043114d82SLSA-2016:2605-2Util-LinuxSecurity Fix(es): * It was found that util-linux's libblkid library did not properly handle Extended Boot Record (EBR) partitions when reading MS-DOS partition tables. An attacker with physical USB access to a protected machine could insert a storage device with a specially crafted partition table that could, for example, trigger an infinite loop in systemd-udevd, resulting in a denial of service on that machine. (CVE-2016-5011) Additional Changes:lowScientific LinuxScientific Linux 7libmount-2.23.2-33.el7.x86_64.rpm1801fe82c511d6448f7bf525e346a7e60c048562397c36b19bb8b7f601ab0377util-linux-2.23.2-33.el7.x86_64.rpmc0e9b19796fe66e5f5435a3b1a5e8780bca5b247f82d3de8469954ce5e19c5a2libmount-2.23.2-33.el7.i686.rpm30e435e8df235f95328ea6e606fa3caffb0c8bff16d53826221aa55f80d51908libuuid-devel-2.23.2-33.el7.x86_64.rpm085d128c46234fbcd1769d6762c9c59072f4294eeb7902d178178b38c1844fc1util-linux-2.23.2-33.el7.i686.rpm20864e2a3e3615c138090ec75f867189849d79fc8afde3970fc9c7310f924e04libblkid-2.23.2-33.el7.i686.rpm511d64750f113f920ca7d65420859cf98d98bfd4f550f1f9ed64e9dc6ce96451libuuid-devel-2.23.2-33.el7.i686.rpm6fa95a37fd36797d3836944a97d4da855b860ebdf15fea1222fb0ff64fdf1c25libblkid-devel-2.23.2-33.el7.x86_64.rpm2350ae710273aedbb70954d698f361e8b0adc71192817d6082223dfcee0c3430libuuid-2.23.2-33.el7.i686.rpm7cac0f3687d60a32bf58460b45b17b4ce35486e4829902179811d6fd9d50c646libblkid-devel-2.23.2-33.el7.i686.rpma29ae45b558b4b6e270c4c12041fa920b352688cd0c8491053afd0e725a83909uuidd-2.23.2-33.el7.x86_64.rpm5ec189423986168b7c4544a40c6cd0439325515389f285e5d9bd1f7eb3ad652dlibblkid-2.23.2-33.el7.x86_64.rpm238c1aed025bc42d4c655ca4f9b574ba41645670074dc5e71c45bfe5744ffce3libuuid-2.23.2-33.el7.x86_64.rpm4036dc20951359783c484216210b780a78cb9ceb5eb001716bb8d8e9ff021f27libmount-devel-2.23.2-33.el7.i686.rpmd727d43e5965c31fbc32a8360e6867ee427c83f0522e441f489f9d597a88dac7libmount-devel-2.23.2-33.el7.x86_64.rpm2761f953fae89259572b84866de4b07ce449f2d1bb14da414997e7724ec8037aSLSA-2016:2606-2PostgresqlThe following packages have been upgraded to a newer upstream version: postgresql (9.2.18). Security Fix(es): * A flaw was found in the way PostgreSQL server handled certain SQL statements containing CASE/WHEN commands. A remote, authenticated attacker could use a specially crafted SQL statement to cause PostgreSQL to crash or disclose a few bytes of server memory or possibly execute arbitrary code. (CVE-2016-5423) * A flaw was found in the way PostgreSQL client programs handled database and role names containing newlines, carriage returns, double quotes, or backslashes. By crafting such an object name, roles with the CREATEDB or CREATEROLE option could escalate their privileges to superuser when a superuser next executes maintenance with a vulnerable client program. (CVE-2016-5424) Additional Changes:moderateScientific LinuxScientific Linux 7postgresql-plpython-9.2.18-1.el7.x86_64.rpmc52843fb7b75121ac3a3c707b8af69050a1cad86226c71e01407ddb1e634e67fpostgresql-server-9.2.18-1.el7.x86_64.rpmdc9c9610f754ae74fcd0326eb1c789ac2d68e7389012568aa37be85bbf7e1700postgresql-plperl-9.2.18-1.el7.x86_64.rpm3a58cb947ba247ece34d0ddb7a08f23f72308b1daa827f51f0b196d896f153a9postgresql-9.2.18-1.el7.x86_64.rpmd1ff8f439000a32dac23cbd437a01596780d55533fa9ce194edaf42199fe3426postgresql-test-9.2.18-1.el7.x86_64.rpm38b3595ee212362af14199f6083c9c246c5b6a92655df07d7be819d297ca81f8postgresql-devel-9.2.18-1.el7.x86_64.rpme573ccb1558be79e45d7eccc0ae4ded237cd6d005217e2984e58f702dc1cd505postgresql-devel-9.2.18-1.el7.i686.rpm7884507c1ac76001f3e4398afc7856f79ff0ea116f9af2640f896c0cf94933e3postgresql-contrib-9.2.18-1.el7.x86_64.rpmbe67389ec1dc871e51e73a7796da30ce8bb973dd798a4fffa127a4c655c8f924postgresql-9.2.18-1.el7.i686.rpmb34f647292c0b153cc7bd3904c054149926291625fc071021438d96bae472ea9postgresql-docs-9.2.18-1.el7.x86_64.rpm7d8ef14441411da2efa2fac3243a6b15b1a4b326c2058055fb3bd114d9c3cba7postgresql-libs-9.2.18-1.el7.x86_64.rpmd11ec13d55a0a9656dc7510ef7449b06196077443e02dd30fbafa20a9d9d1eaepostgresql-upgrade-9.2.18-1.el7.x86_64.rpmf56a306f0bb772f69caa31d1b175a53f1dc310cc386766b888e58beb3a393d52postgresql-pltcl-9.2.18-1.el7.x86_64.rpm91d78613463d74a71d936c8919fb6dbad7ef6313088f4b6ec2cbefedb27aebbapostgresql-libs-9.2.18-1.el7.i686.rpm4e47ea41f38a8463ea8437296912a46ac6b8eb9abe73e63ed3ed089eeaebdbb2SLSA-2016:2610-1SystemdSecurity Fix(es): * A flaw was found in the way systemd handled empty notification messages. A local attacker could use this flaw to make systemd freeze its execution, preventing further management of system services, system shutdown, or zombie process collection via systemd. (CVE-2016-7795) Bug Fix(es): * Previously, the udev device manager automatically enabled all memory banks on IBM z System installations. As a consequence, hot plug memory was enabled automatically, which was incorrect. With this update, system architecture checks have been added to the udev rules to address the problem. As a result, hot plug memory is no longer automatically enabled.moderateScientific LinuxScientific Linux 7libgudev1-219-30.el7_3.3.i686.rpmceb8cf1661224e2594d1e2e32c61db0f6a55bc40d3803de11ca14bec1edc1455systemd-journal-gateway-219-30.el7_3.3.x86_64.rpm890c0a8f828139a79124b10e9e461970d984e4f850d0174baa076b59b2512cf4systemd-219-30.el7_3.3.x86_64.rpmb3a9267e1f2e01dde650ba2c0f8c6213829c7392ee8ae5914faafea85ddb3956libgudev1-devel-219-30.el7_3.3.i686.rpm7f4a7960f939749a603ed9b3f96e54c788a3ee4bacdcd3242b20a0434a1994f1libgudev1-devel-219-30.el7_3.3.x86_64.rpmb841f13a0f82895d620adb5c46555d114ef35342f66f90d7d82e0111b6a29e58libgudev1-219-30.el7_3.3.x86_64.rpmc3d433f5204cabd62f1ef22d22365f5914756489b39dfeb8b16268999c1bd4adsystemd-networkd-219-30.el7_3.3.x86_64.rpm9dcac37d795c1db69fbc0de5274b3700319be17a29bd180f3df21091c5ccb29dsystemd-python-219-30.el7_3.3.x86_64.rpma0bf6059e3af855b5c79e86d77656bcee2e361b7ef945a02d9848f2575d38c9dsystemd-libs-219-30.el7_3.3.i686.rpm2a3cf26b8b27538171b5e4d12700cc8c740b47f305ccb2012f729d450ac057b7systemd-sysv-219-30.el7_3.3.x86_64.rpm0bb4377694294f3df373b100cf5df96898ac8788c52317d96495f559c8b82b0csystemd-resolved-219-30.el7_3.3.x86_64.rpmaaca8af58b752c738c2cbac8e987c79238090cd076a32360f7b2a5395e7b919esystemd-devel-219-30.el7_3.3.i686.rpmc6713f98b3f1000b7b1c96050bbb6e36b13448a0bc4ee44d9534ae88baa64024systemd-devel-219-30.el7_3.3.x86_64.rpmcac628070892c093b33a5ce9c11e5ed6c1cb59d13d1134544fa793a207e7a386systemd-resolved-219-30.el7_3.3.i686.rpm86a6e8eb3d01db3bea446defb3e0cb9855d3fa1711d2e332af6ee3b0fcf1f612systemd-libs-219-30.el7_3.3.x86_64.rpmdcf030388ec351235c4a3dc260e05ddd6f086abd379f8917c69e69628a1c7a78SLSA-2016:2614-1PacemakerSecurity Fix(es): * An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035) Bug Fix(es): * The version of Pacemaker in Scientific Linux 7.3 incorporated an increase in the version number of the remote node protocol. Consequently, cluster nodes running Pacemaker in Scientific Linux 7.3 and remote nodes running earlier versions of Scientific Linux were not able to communicate with each other unless special precautions were taken. This update preserves the rolling upgrade capability.importantScientific LinuxScientific Linux 7pacemaker-1.1.15-11.el7_3.2.x86_64.rpm0fde1298f180486affdfc84e2245cc0043f7d619d7d3a406c03a759ca9c9eb1epacemaker-cluster-libs-1.1.15-11.el7_3.2.i686.rpma4e67465cae8fea7bbbc0d8b22c254aa4b770ac6765723d9574c984c38a198f0pacemaker-doc-1.1.15-11.el7_3.2.x86_64.rpme3361d54b0d520313b88244716efe10701fbb9439985af41c015d9d11f28995apacemaker-libs-devel-1.1.15-11.el7_3.2.x86_64.rpmf86c6dee5d40c3c1c1ea5fc25bad7161ce1a69fc0fd783af4d3d53f2b86ab840pacemaker-cli-1.1.15-11.el7_3.2.x86_64.rpm182c70de6ff6e265972d01b740cfed4a589b891add2c81fce6e15e335ca737e2pacemaker-remote-1.1.15-11.el7_3.2.x86_64.rpm3d052062d03d58fcb4848bdbab83ef6c2e2be9ce6fe9327f58b612d09753c763pacemaker-cluster-libs-1.1.15-11.el7_3.2.x86_64.rpm67a67715d0e13d8f3f6cf2a4ba9e47921cb5005cf06db904a120cb71f0b7f782pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2.x86_64.rpm3474b1dc5a73246e8b0b575118eec5f9f011d8319eab09e04d71ec3163080fc5pacemaker-libs-1.1.15-11.el7_3.2.x86_64.rpme6e792037d09e7cd803b57ad0eb549c8ac3f9f189023fde4404c6c1b94ad9ebepacemaker-libs-devel-1.1.15-11.el7_3.2.i686.rpmcf66f989da993c0faafa46424921c746ef49ddd687297e0545cf6e813a0f0349pacemaker-libs-1.1.15-11.el7_3.2.i686.rpmee4e4d86fe3e9ecae252fee251f4f6965d0aea11bacbe9d01031d3627e0380e1pacemaker-cts-1.1.15-11.el7_3.2.x86_64.rpm63bb325adcc44b7faaa0b581126ce591ff3059b7e4be9e47b8124a11c96306e6SLSA-2016:2615-1BindSecurity Fix(es): * A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864)importantScientific LinuxScientific Linux 7bind-sdb-chroot-9.9.4-38.el7_3.x86_64.rpmcd05f7ed9a618371dcd9fef1189af6b0ed5df6469e46495149bf09e61d268d39bind-libs-9.9.4-38.el7_3.i686.rpme209bba385f11362798cc33518711480a100ec350fa65054a58f54160804a138bind-lite-devel-9.9.4-38.el7_3.x86_64.rpm1bd7122eac307a237fadf7170f454afed3cdbdf8b79d39d9de22517340e2b5d5bind-chroot-9.9.4-38.el7_3.x86_64.rpm9d5831a9df7d175148636092a4ef30f302509d0002616ec09817e338ddae9881bind-libs-9.9.4-38.el7_3.x86_64.rpm105039fd2f2addd66b1d4ac597562aeffcc57186fbd1ef02981b46336258df0ebind-devel-9.9.4-38.el7_3.x86_64.rpmbdb6c8044956b8d5cd2c4aa907aa238dc16f6bb951eee6a1e4b8132255ed9e90bind-9.9.4-38.el7_3.x86_64.rpmb657354d2d1df57bfb3ccf7a3088ae84c79308475a7d4616e59c49a654417b65bind-pkcs11-libs-9.9.4-38.el7_3.i686.rpmcc2119323b5e18443e2d8ff7a7d647613a9b5677b4b31f7dcc04477073168bb6bind-utils-9.9.4-38.el7_3.x86_64.rpm619077cf4909d8093f24176a97455172a5234c563b4c19db3de52db73d52198bbind-pkcs11-libs-9.9.4-38.el7_3.x86_64.rpm1dd1dc537b00b45bd157633f34f1052958bdc551004dd20797834131f83056b1bind-license-9.9.4-38.el7_3.noarch.rpmcc941a2cf45a640099cc53dcbd1d80a48d2244330b70768ad59a2c9b515136b0bind-pkcs11-devel-9.9.4-38.el7_3.i686.rpm1426e21e4f054a2a0b8199fff705ed564b44e3a0db26967dbd71abda322d7f5ebind-libs-lite-9.9.4-38.el7_3.i686.rpm7a1b3b0e84c5acaf4af63d258c92ad1e9519b01daa04e67fe7ba3c26a124a579bind-libs-lite-9.9.4-38.el7_3.x86_64.rpm4c35081556a7c49e31678e0270b04142bb08c24729857c923a915e1303aa702ebind-pkcs11-utils-9.9.4-38.el7_3.x86_64.rpm38a568f992671cdc8cf8a344468fd3d17bd0915a5703635f64219004110502cebind-sdb-9.9.4-38.el7_3.x86_64.rpm766f3f5cbbdcda47cf084f7e54018a0656f56422f1ad6f774e1874cae29a0a4dbind-devel-9.9.4-38.el7_3.i686.rpm1b2aac08ba905cf38e63511e93808dcaa45c3341f6729c9deb6da322c8a8da3dbind-lite-devel-9.9.4-38.el7_3.i686.rpm037728d58e6519a4d292cac5492c3cf8e9ad84dafdd4810739a4ee3c95d1a48fbind-pkcs11-9.9.4-38.el7_3.x86_64.rpm6b8f8efb03bede0a08caf2882e3f733a884901f39a972cfd549cfd8710fa78cabind-pkcs11-devel-9.9.4-38.el7_3.x86_64.rpm993f34f6903d41871ecfdb98fb110c38d87102adc3d1a9e3ea52a8a3876477e3SLSA-2016:2658-1Java-1.7.0-OpenjdkSecurity Fix(es): * It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) * It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) * It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. * A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) * A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively.importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.0.el7_3.noarch.rpm82d504caaa22178fec8ad9b68a2676e93a1c3b92ecdcef4ab0bd2d0acf012833java-1.7.0-openjdk-headless-1.7.0.121-2.6.8.0.el7_3.x86_64.rpm6f3cd9c50e3de317e4a0c3f17a0e6a97d5202ed601d1a896435540aadf156d03java-1.7.0-openjdk-src-1.7.0.121-2.6.8.0.el7_3.x86_64.rpmbf427ef28894686388bedbc4af953014a94fd8b385437c1cdaaf727246f52a8djava-1.7.0-openjdk-devel-1.7.0.121-2.6.8.0.el7_3.x86_64.rpma2196f236e804eb44ff6b12a12d9f1e55a17e4c6207b05cd90d61bdc2c151320java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3.x86_64.rpma3aa87a1bd948e0b4960dbeed33150f0f6cadf2c1681b0f68769df3f67c7c4efjava-1.7.0-openjdk-demo-1.7.0.121-2.6.8.0.el7_3.x86_64.rpm306d96e50a869b8627c24cd9a7ae768a4e2a2069b4a4cab69cb2b7c48ca984ddjava-1.7.0-openjdk-accessibility-1.7.0.121-2.6.8.0.el7_3.x86_64.rpmf5ba25c5409cdb9c6e7aa52f325e9cbd24c50ed1e7ded6285e5b20936f25b1b9SLSA-2016:2674-1LibgcryptSecurity Fix(es): * A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker able to obtain the first 580 bytes of the PRNG output could predict the following 20 bytes. (CVE-2016-6313)moderateScientific LinuxScientific Linux 7libgcrypt-devel-1.5.3-13.el7_3.1.x86_64.rpm53ff06f91accd683bdab7ead22b18ed6d8a6cc1b163eab48319f4cf733fb3128libgcrypt-1.5.3-13.el7_3.1.i686.rpm0995155831ca0c307b8c22bdc0ac0e96e0b90b7cde61bbc31bbd49cd9096c0f5libgcrypt-devel-1.5.3-13.el7_3.1.i686.rpmb7d0100e60e8eac2954d47c9b25b4f518832a2166e62c2ecf4a12775a5b614bflibgcrypt-1.5.3-13.el7_3.1.x86_64.rpm8b20e5102b5d53df717c4e52aa6dd4f8f563878f1948d7e02bf9f0db496934b9SLSA-2016:2702-1PolicycoreutilsSecurity Fix(es): * It was found that the sandbox tool provided in policycoreutils was vulnerable to a TIOCSTI ioctl attack. A specially crafted program executed via the sandbox command could use this flaw to execute arbitrary commands in the context of the parent shell, escaping the sandbox. (CVE-2016-7545)importantScientific LinuxScientific Linux 7policycoreutils-sandbox-2.5-9.el7.x86_64.rpma9dd9785f06949b6efab4dca0a3a65f854e483079b7b344e628819b86090d2e3policycoreutils-restorecond-2.5-9.el7.x86_64.rpm3d0ea5c114a3c7add2cef4672c08772ec6cdbfd0b342e4fb1d9928702bddf527policycoreutils-python-2.5-9.el7.x86_64.rpmb6141aada46d2d09fe33677e825b3d42544642eb3f628c5cbda76db95da7bbd6policycoreutils-newrole-2.5-9.el7.x86_64.rpm0701990dd95d76287b548ad8c73b3d239386b5838f45bbab7601f3b35decc542policycoreutils-devel-2.5-9.el7.i686.rpm80163ac88757dcaea2c98cb23242c415eeb514bc38b575fecc963dc22e5cbfd3policycoreutils-2.5-9.el7.x86_64.rpm3677b793fa4d98496490a5bb79660ac1773ccc40d3767a1504f01acc18e0383cpolicycoreutils-gui-2.5-9.el7.x86_64.rpmdd2a89999e270df42d6d485bcc8699603af2ccb5e9610bc6bd9966c5cf9bc84cpolicycoreutils-devel-2.5-9.el7.x86_64.rpm983e79d9cbf3ec8ecb90fb4ebbfee13309212f10b4104092497b31826e8ae2d9SLSA-2016:2779-1Nss And Nss-UtilThe nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.12.3), nss-util (3.12.3). Security Fix(es): * Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-2834) * A NULL pointer dereference flaw was found in the way NSS handled invalid Diffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSL server using NSS. (CVE-2016-5285) * It was found that Diffie Hellman Client key exchange handling in NSS was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. (CVE-2016-8635)moderateScientific LinuxScientific Linux 7nss-3.21.3-2.el7_3.x86_64.rpm0d56e6120c265c702ae71e5f9ec7b55d7e77b38d863561dc8d9bd5370b2c80fenss-pkcs11-devel-3.21.3-2.el7_3.x86_64.rpme769f6e55a3a499db9cab9ab6bd8b18eaaae72f8ad677731f7110b0fecfc13c6nss-util-devel-3.21.3-1.1.el7_3.x86_64.rpm8e8ab2599c191f6ae90c9b124cd8918dc4f174fb8f79ad5e3486d7266ab0294cnss-pkcs11-devel-3.21.3-2.el7_3.i686.rpmc28f447f8d697bcf6a6d73bfb4e32f5e85f56f1f8a123fe4467387cbb155a1c2nss-util-devel-3.21.3-1.1.el7_3.i686.rpm99d52094f4b0efd904306535a670b65bc2d5571c55eb09102f7c998a40f730d1nss-3.21.3-2.el7_3.i686.rpmbecf9250029a5474cd1e3e02e562ef1f56309c00ce48d7cc5618b1b7de03272enss-util-3.21.3-1.1.el7_3.x86_64.rpm73af0e25da790619e83267240ce5c56467ae2366960362812fb8698c78151b31nss-devel-3.21.3-2.el7_3.i686.rpm36217bec92c1f8df597598ee8e75f4473e1855c8b6da85606da1c4e6b97ff04cnss-util-3.21.3-1.1.el7_3.i686.rpmfe962c2d3c79131a90a158500f74b756ea382458648cf38b1f12d72fe4f59cf1nss-devel-3.21.3-2.el7_3.x86_64.rpmb8924c90567e4fe632f4928982530e951434dfc1ce2ac6628859703068c716dfnss-tools-3.21.3-2.el7_3.x86_64.rpme4ce2985c325f999fdd2bd9a97b3699737664af0f359d39add197d9c06eead37nss-sysinit-3.21.3-2.el7_3.x86_64.rpmc00fb63bd850f70049bdb60c4c0466a67b81bccabb274ba239fe1f013c90315fSLSA-2016:2780-1FirefoxThis update upgrades Firefox to version 45.5.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-5296, CVE-2016-5297, CVE-2016-9066, CVE-2016-5291, CVE-2016-5290) * A flaw was found in the way Add-on update process was handled by Firefox. A Man-in-the-Middle attacker could use this flaw to install a malicious signed add-on update. (CVE-2016-9064)criticalScientific LinuxScientific Linux 7firefox-45.5.0-1.el7_3.i686.rpm5b594adc8b186fa91468cba42c7eff4fe6f7ffa53b71f2675a9057f1de667fa4firefox-45.5.0-1.el7_3.x86_64.rpm488025cf5981e8f24fced70c085315621a788a006f4f2b06c240695c1eb41e9eSLSA-2016:2809-1IpsilonSecurity Fix(es): * A vulnerability was found in ipsilon in the SAML2 provider's handling of sessions. An attacker able to hit the logout URL could determine what service providers other users are logged in to and terminate their sessions. (CVE-2016-8638) This issue was discovered by Patrick Uiterwijk (Red Hat) and Howard Johnson.importantScientific LinuxScientific Linux 7ipsilon-persona-1.0.0-13.el7_3.noarch.rpmaeee043f6d502ee3480514947c1ab69ecba6e268bc8299a96e5704b996c3e365ipsilon-authgssapi-1.0.0-13.el7_3.noarch.rpmaf52e86e77130a6856ef58fdf7dbe188c96899021af7d28c20acfa679f3e0b7eipsilon-filesystem-1.0.0-13.el7_3.noarch.rpm181b142abf0f02180f4d93b6de6318b2fddc59fe432ee04c51d9cef985d87b40ipsilon-infosssd-1.0.0-13.el7_3.noarch.rpm5ec9558c494060d366c0296ccf15c04c4be0be14f16c2daecb8c07677373523fipsilon-saml2-1.0.0-13.el7_3.noarch.rpm15bc324e0242f28252782ce9a3cf0b2e54df4ea81628dbb6474f2053d8bd6fffipsilon-base-1.0.0-13.el7_3.noarch.rpm2a386b8e0295c0787b169ef99d5ebab8b226c8821d02bb69fee30ccb039c95deipsilon-tools-ipa-1.0.0-13.el7_3.noarch.rpm7be03eba8573ba6850c81862ff811d21053c00d1acc04c10c2a2c5fae67133e7ipsilon-client-1.0.0-13.el7_3.noarch.rpma50cf6de1d25dbad0b362f0ec7f03d927ca888ba4c1165b088868bbb3f4b4bc6ipsilon-authform-1.0.0-13.el7_3.noarch.rpm44c4bd9cf9b5c6b7d1613ed812d328921aeb555c12a09507ad545956796d1bd8ipsilon-saml2-base-1.0.0-13.el7_3.noarch.rpm496a0fb9b6c620348eade57864099046e899e07f484c61634caa5f76d4ac11b8ipsilon-authldap-1.0.0-13.el7_3.noarch.rpm5435d9d0c305d84421f94fc5b688b19e9ad2e50aaa0ebbad10a3867afb5e85dcipsilon-1.0.0-13.el7_3.noarch.rpm7a4245f0a51bf1d65007a71b207aaf2fafee9e7f7a90952ae266daf1ae39a4aaSLSA-2016:2819-1MemcachedSecurity Fix(es): * Two integer overflow flaws, leading to heap-based buffer overflows, were found in the memcached binary protocol. An attacker could create a specially crafted message that would cause the memcached server to crash or, potentially, execute arbitrary code. (CVE-2016-8704, CVE-2016-8705) * An integer overflow flaw, leading to a heap-based buffer overflow, was found in memcached's parsing of SASL authentication messages. An attacker could create a specially crafted message that would cause the memcached server to crash or, potentially, execute arbitrary code. (CVE-2016-8706)importantScientific LinuxScientific Linux 7memcached-1.4.15-10.el7_3.1.x86_64.rpm7c183db2b957e8e68cf143f283d5fb8874c85a9fcd90c7fdd5868a7c77217a20memcached-devel-1.4.15-10.el7_3.1.x86_64.rpmafa46f776c556cf2c03bb10ecaddf8d51588ceee5508e21f718bfc36fdaa4bb4memcached-devel-1.4.15-10.el7_3.1.i686.rpmb15ce8af75cc172c3665cee8c583a50a898f474716566c5d2a028b160d807d71SLSA-2016:2824-1ExpatSecurity Fix(es): * An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-0718)moderateScientific LinuxScientific Linux 7expat-2.1.0-10.el7_3.x86_64.rpm392a4ccf8a0d5388ea0afa882f70d07c31a866e296aed8ce971ccbc1d9ec4566expat-static-2.1.0-10.el7_3.x86_64.rpm186eb08bbdf2bd57ad90dffc8703faeb92be8139e3f225772620f49f05d01459expat-static-2.1.0-10.el7_3.i686.rpm2098b5b81556b07ac0824266b04c30ca0e76fd19e6c98a5f27c19fc88011e124expat-devel-2.1.0-10.el7_3.i686.rpmff89281bee577b2d1395ef8313a268ea4a47451245f08f11240b76702b6d755cexpat-2.1.0-10.el7_3.i686.rpm15dc6cc9f497c5e9c11ab5795039a8f69125952c31f5c7d7c601e700479c7dbcexpat-devel-2.1.0-10.el7_3.x86_64.rpm9c49ba3bd5bfad811381d6751100fdb2a3e22bca0bfdcaa2a25784d12e9f9efcSLSA-2016:2825-1ThunderbirdThis update upgrades Thunderbird to version 45.5.0 Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-5290)importantScientific LinuxScientific Linux 7thunderbird-45.5.0-1.el7_3.x86_64.rpm5a5ede76cad07bb619adb879f6943623b4fbe5af70e61d14b0778a41672ded16SLSA-2016:2843-1FirefoxThis update upgrades Firefox to version 45.5.1 ESR. Security Fix(es): * A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-9079)criticalScientific LinuxScientific Linux 7firefox-45.5.1-1.el7_3.x86_64.rpm23c4a752046db39df2a8a43e7cefec657b52c81805e5fb75b2dd806859bdd968firefox-45.5.1-1.el7_3.i686.rpmf165bb052a893e8616604677230edc923466595c4ac9bc131b5521e9797a5e5dSLSA-2016:2850-1ThunderbirdThis update upgrades Thunderbird to version 45.5.1. Security Fix(es): * A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-9079)importantScientific LinuxScientific Linux 7thunderbird-45.5.1-1.el7_3.x86_64.rpmfad1a08ed117ffc75948127b1835f4a02886da2f03be77f6de76fe4ecd5320a4SLSA-2016:2872-1SudoSecurity Fix(es): * It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed system(), popen(), or wordexp() C library functions with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could use these flaws to execute arbitrary commands with elevated privileges. (CVE-2016-7032, CVE-2016-7076) These issues were discovered by Florian Weimer (Red Hat).moderateScientific LinuxScientific Linux 7sudo-1.8.6p7-21.el7_3.x86_64.rpm16aad4585c79d4a5304b47bdab4c7a26c51fffdb53fb90aa569bda585a8d5f03sudo-devel-1.8.6p7-21.el7_3.i686.rpm59dd6e6e380abc94d8350615422b4a517f9744ba31003da442c491b3984d9a59sudo-devel-1.8.6p7-21.el7_3.x86_64.rpm262c1e5b2d712d713440b69481e34be9d3406bb6478cb0dfb29cf807ebfa8051SLSA-2016:2946-1FirefoxThis update upgrades Firefox to version 45.6.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-9893, CVE-2016-9899, CVE-2016-9895, CVE-2016-9897, CVE-2016-9898, CVE-2016-9900, CVE-2016-9901, CVE-2016-9902, CVE-2016-9904, CVE-2016-9905)criticalScientific LinuxScientific Linux 7firefox-45.6.0-1.el7_3.x86_64.rpm4216f50d79b70e8e99d171d186a52c5e739e195cf5d0f98dfb05246c6705d1dcfirefox-45.6.0-1.el7_3.i686.rpm3e8d0d7f35e7e3ccd54b42fe08ed9d207f020a0b038ca8a90bbb9f0425c7fc34SLSA-2016:2972-1VimSecurity Fix(es): * A vulnerability was found in vim in how certain modeline options were treated. An attacker could craft a file that, when opened in vim with modelines enabled, could execute arbitrary commands with privileges of the user running vim. (CVE-2016-1248)moderateScientific LinuxScientific Linux 7vim-enhanced-7.4.160-1.el7_3.1.x86_64.rpmf5b71dce78460109c34cc4d15c3f4a4017c5cb17e9f94e9d34d569475f3ca165vim-X11-7.4.160-1.el7_3.1.x86_64.rpmcbaed8c12a3bfcd758abc002a1000544e2cdd9cc5fe81a022a37471db14651devim-common-7.4.160-1.el7_3.1.x86_64.rpm74be6ec8369bf1a0187dfa720d0d8173e671965791e872a1cc600d1b5295289avim-filesystem-7.4.160-1.el7_3.1.x86_64.rpm612fdbd103fae5e3fcd73c0342f9f7e79690b6bb5e77309a6dc380674a0d86abvim-minimal-7.4.160-1.el7_3.1.x86_64.rpm97c631447b5adc21f9f26ef4b0aa8a255d3a329c4b88968122976f5d9dbdc107SLSA-2016:2973-1ThunderbirdThis update upgrades Thunderbird to version 45.6.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-9893, CVE-2016-9899, CVE-2016-9895, CVE-2016-9900, CVE-2016-9901, CVE-2016-9902, CVE-2016-9905)importantScientific LinuxScientific Linux 7thunderbird-45.6.0-1.el7_3.x86_64.rpm64cddfa67b2234b5a934955d8fa292f5ad8625079b7f45bb5c8838f7e0f3a9c5SLSA-2017:0001-1IpaSecurity Fix(es): * It was discovered that the default IdM password policies that lock out accounts after a certain number of failed login attempts were also applied to host and service accounts. A remote unauthenticated user could use this flaw to cause a denial of service attack against kerberized services. (CVE-2016-7030) * It was found that IdM's certprofile-mod command did not properly check the user's permissions while modifying certificate profiles. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks. (CVE-2016-9575)moderateScientific LinuxScientific Linux 7python2-ipaclient-4.4.0-14.sl7_3.1.1.noarch.rpm10221ba328220ad086a8b0fa2a88c3898ee08a48907004a02dd493ec47b511e8ipa-admintools-4.4.0-14.sl7_3.1.1.noarch.rpm76270f4523c58d998be08d63ea94267a7ad0556459351ba66bf06b7b9373075eipa-common-4.4.0-14.sl7_3.1.1.noarch.rpmdfbb4704f872bf3c6a44244bb17fc3e02bec1bfa2faa8610be1e31bf0b9b5ca9ipa-server-common-4.4.0-14.sl7_3.1.1.noarch.rpm66a516edf64d594b854be4ba3d52734284950225575fe259704c1ca3cdbe96a5ipa-server-4.4.0-14.sl7_3.1.1.x86_64.rpm65e91afe1539425b0cb666bf779aa5bd828431501283bb4e23aba73c65e0cd83ipa-python-compat-4.4.0-14.sl7_3.1.1.noarch.rpmc30d133093757877667255e12b339906847fd3c8330fff3ecc85368552502e77ipa-server-trust-ad-4.4.0-14.sl7_3.1.1.x86_64.rpme9a103e3b9f3fd9974c0e8f801727476e78b8aa42f0b9097073ea2eec5a4337bpython2-ipaserver-4.4.0-14.sl7_3.1.1.noarch.rpma3b10f38d19f7e8ab660f213a85d90f124736c50d639a79cb8dd69a91465f9b4ipa-server-dns-4.4.0-14.sl7_3.1.1.noarch.rpm20b7d6b336df5ff76ca16abc3b8a0999ce1510181748991cd0a1c76c566be1fbipa-client-common-4.4.0-14.sl7_3.1.1.noarch.rpmbfe1d0f6df2d0946fc4c2aca1d54b6a1762c1e62a29339250802b7075d00c5dbpython2-ipalib-4.4.0-14.sl7_3.1.1.noarch.rpm2ddcae42f005c5a595b3995fab7ce537d8dd0987f7526e10748304e7744930caipa-client-4.4.0-14.sl7_3.1.1.x86_64.rpm40eaad9fd4949a6f5bba53852e36b5c978d307e94f04ebdc7b026d2a1d553f57SLSA-2017:0013-1GhostscriptSecurity Fix(es): * It was found that the ghostscript functions getenv, filenameforall and .libfile did not honor the -dSAFER option, usually used when processing untrusted documents, leading to information disclosure. A specially crafted postscript document could read environment variable, list directory and retrieve file content respectively, from the target. (CVE-2013-5653, CVE-2016-7977) * It was found that the ghostscript function .setdevice suffered a use- after-free vulnerability due to an incorrect reference count. A specially crafted postscript document could trigger code execution in the context of the gs process. (CVE-2016-7978) * It was found that the ghostscript function .initialize_dsc_parser did not validate its parameter before using it, allowing a type confusion flaw. A specially crafted postscript document could cause a crash code execution in the context of the gs process. (CVE-2016-7979) * It was found that ghostscript did not sufficiently check the validity of parameters given to the .sethalftone5 function. A specially crafted postscript document could cause a crash, or execute arbitrary code in the context of the gs process. (CVE-2016-8602)moderateScientific LinuxScientific Linux 7ghostscript-gtk-9.07-20.el7_3.1.x86_64.rpm005eec47edacc057c169cc4e3e37acc09ffa71fed84ceaa54c11aec9b5f1b546ghostscript-cups-9.07-20.el7_3.1.x86_64.rpm1f3d63800ed67f09e9024a7d21139721a1c6cd282b548b955183a49e7ff0fcc6ghostscript-devel-9.07-20.el7_3.1.i686.rpm8faa6f3b99ff1ebb3c6d67d5c89645c5b71ab86b3d0ba9fea843805e914bb57eghostscript-devel-9.07-20.el7_3.1.x86_64.rpm7dda3abadefea1de1bf106eaa2381bf1a9f34ab8b101834119ec7b94fd2c3a99ghostscript-9.07-20.el7_3.1.x86_64.rpm4f2f822a482d7e85a83cb2c8687101f6f015069f076b21577a44480461ae0b82ghostscript-9.07-20.el7_3.1.i686.rpm92b4063437abb70e639ebfa9bfbdb515c66beb04b767d1b05add8b7794acfc29ghostscript-doc-9.07-20.el7_3.1.noarch.rpm987cd47ecc92c8cceb575087a67e1e0aa63cb7edd7ec3b9edd86305c1dc9306aSLSA-2017:0018-1Gstreamer-Plugins-Bad-FreeSecurity Fix(es): * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer's VMware VMnc video file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9445) * A memory corruption flaw was found in GStreamer's Nintendo NSF music file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9447) * An out-of-bounds heap read flaw was found in GStreamer's H.264 parser. A remote attacker could use this flaw to cause an application using GStreamer to crash. (CVE-2016-9809) Note: This update removes the vulnerable Nintendo NSF plug-in.moderateScientific LinuxScientific Linux 7gstreamer-plugins-bad-free-0.10.23-22.el7_3.i686.rpm7b96a953da70a3ceca2480ef1d630a4146baef4b352daf2b7f42ccfbb0a40c05gstreamer-plugins-bad-free-0.10.23-22.el7_3.x86_64.rpmba14b3de5272a4469cf86dcc04eac023e45cdf576b63816dd14060ba8ce589b3gstreamer-plugins-bad-free-devel-0.10.23-22.el7_3.x86_64.rpm290ece7699af99fa959dc50cc979c370841f3e60efaf0309c785d01a8fc505fagstreamer-plugins-bad-free-devel-docs-0.10.23-22.el7_3.x86_64.rpm274ef9a76cbbde652ee01a0af3491576a0f0c1515a9530d00cf98bb27c936190gstreamer-plugins-bad-free-devel-0.10.23-22.el7_3.i686.rpmb30d5a806660b197e8d46ed95d3b8ecbb1638e3134810e7d16167b68aa5384baSLSA-2017:0019-1Gstreamer-Plugins-GoodSecurity Fix(es): * Multiple flaws were discovered in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use these flaws to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9634, CVE-2016-9635, CVE-2016-9636, CVE-2016-9808) * An invalid memory read access flaw was found in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash. (CVE-2016-9807) Note: This update removes the vulnerable FLC/FLI/FLX plug-in.moderateScientific LinuxScientific Linux 7gstreamer-plugins-good-0.10.31-12.el7_3.x86_64.rpm5260ccdceb0c4701bcac28a5cb6c5b0be609e6fc00f8160ef73b24ed3a49697cgstreamer-plugins-good-devel-docs-0.10.31-12.el7_3.noarch.rpmda48fbbe9e3a46ba7508729a0eb638e7f7634456e6bc5b7bd7044efee68390e9gstreamer-plugins-good-0.10.31-12.el7_3.i686.rpmd8ec0ca9afb6237ec9afc1b326978e51312e13c17740ad2a2c5471e62a9519ecSLSA-2017:0020-1Gstreamer1-Plugins-GoodSecurity Fix(es): * Multiple flaws were discovered in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use these flaws to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9634, CVE-2016-9635, CVE-2016-9636, CVE-2016-9808) * An invalid memory read access flaw was found in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash. (CVE-2016-9807) Note: This update removes the vulnerable FLC/FLI/FLX plug-in.moderateScientific LinuxScientific Linux 7gstreamer1-plugins-good-1.4.5-3.el7_3.x86_64.rpma76ba5cec43fe5fb65c1e05391b844428c050b3756cbab727779866abb4081aegstreamer1-plugins-good-1.4.5-3.el7_3.i686.rpme2f76169f213d8eef943edeade794691f9ad27dd67167915a7eefc047601bfeeSLSA-2017:0021-1Gstreamer1-Plugins-Bad-FreeSecurity Fix(es): * An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer's VMware VMnc video file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9445) * Multiple flaws were discovered in GStreamer's H.264 and MPEG-TS plug- ins. A remote attacker could use these flaws to cause an application using GStreamer to crash. (CVE-2016-9809, CVE-2016-9812, CVE-2016-9813)moderateScientific LinuxScientific Linux 7gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.i686.rpm5ec773d86ab063295c2ee44ce66e0f25d476cff6c4c20026c6aa8a77947b843dgstreamer1-plugins-bad-free-1.4.5-6.el7_3.i686.rpm5996c31b82802ce9ce5bfa36acc6b753d2d6735305c20f13c81b34726eb55b5bgstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.x86_64.rpmc4c6f4b59e045b931b1b066b61ea2caa6194e00d4bc530b9c61759ab309036ecgstreamer1-plugins-bad-free-1.4.5-6.el7_3.x86_64.rpm43b8f469b6684509eebce18bf17b55e202fbc6133d64f2b2b5fb3f0ec3a4bf36SLSA-2017:0061-1Java-1.6.0-OpenjdkSecurity Fix(es): * It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) * It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) * It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. * A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) * A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively.importantScientific LinuxScientific Linux 7java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3.x86_64.rpm669f50250d5e90be61067f76dba19646a6f377c749933d9df9b41658fe7f41edjava-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3.x86_64.rpm403d6777fea1e33ae991f74990b6a8c3a64e74f3930c601b30471a6ddea8818ajava-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3.x86_64.rpmcddf0d610a009173f38c8bdb3f8ee363e98430df1d8acf24566edb4ae8e26673java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3.x86_64.rpm36f29efa9c6f1ed3192c80ad81063aa2f7cb56469e32c440a02592dd3e895822java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3.x86_64.rpm36213308d0a43159a3f169f6d0cf8952392fbc5e2f55a67b31306130e7b9ecc1SLSA-2017:0062-1BindSecurity Fix(es): * A denial of service flaw was found in the way BIND processed a response to an ANY query. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9131) * A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) * A denial of service flaw was found in the way BIND handled an unusually- formed DS record response. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9444)importantScientific LinuxScientific Linux 7bind-lite-devel-9.9.4-38.el7_3.1.x86_64.rpm652f4223062af22c35742ef7d4cea69c6bfecaeae08d3c21a003a56e52dac1c0bind-devel-9.9.4-38.el7_3.1.i686.rpmd71ab1c5196f6760b49a6e758a8cb47a97152ef4bafedb6e0d64e6b2d6b8e172bind-utils-9.9.4-38.el7_3.1.x86_64.rpm9917b73b35074f806eaeed222eaeedf713bf3189dd4e52f0a604b50c3092409bbind-pkcs11-libs-9.9.4-38.el7_3.1.i686.rpm97fe2e8e13bd928c086796f55a2d4e7935b51434fcb7222c3c7f02fe69aba440bind-license-9.9.4-38.el7_3.1.noarch.rpm0f2b86e57f54d5f4482470bb631b2ba5bb205792e0364644e723edbb40771f4bbind-9.9.4-38.el7_3.1.x86_64.rpm9c448e820fc702d40d167a64194f92e14d3638d7ad8f6b07cd522cc7d6bd4c6ebind-lite-devel-9.9.4-38.el7_3.1.i686.rpma04f80143f4ea5669dc4ccac1a4f95d63329d8c774eb04f1cd45f0c0c9452c44bind-sdb-9.9.4-38.el7_3.1.x86_64.rpm2f1a261ed6917681f347fa5b66526ada7dab3a99a7a14eefd427aeff67202935bind-pkcs11-utils-9.9.4-38.el7_3.1.x86_64.rpm5c3e00b7071740e1c1f8c06b5ba11ab0a1dde2e2209262e8fba36894019a69c6bind-libs-lite-9.9.4-38.el7_3.1.x86_64.rpma5062be78e13d670f669bfded52dc0fb437a1765d9a9f384d805add1b6d685c6bind-sdb-chroot-9.9.4-38.el7_3.1.x86_64.rpme654745ab26d0f5d39b1875925b8358506336c2b0aec2486531aca50a2758dfcbind-pkcs11-9.9.4-38.el7_3.1.x86_64.rpm75afb6f8f0e853739f9e396fe3aa354d9701621a1ea68c3ffb8ecf85229f064abind-libs-9.9.4-38.el7_3.1.x86_64.rpm8b0d21439eefe0e8fa389ad434612ebff3b2f2eb4788594a8536c26d350c296abind-chroot-9.9.4-38.el7_3.1.x86_64.rpm4775f6d4d160e213c71e1a613ce3cccd39a7acea1adbc4239bee49ee4ceecb20bind-pkcs11-devel-9.9.4-38.el7_3.1.x86_64.rpm0c6d7a04b431dd3005acd00c488097081c7a4a630c36d53cca2ca5f5978942cebind-pkcs11-libs-9.9.4-38.el7_3.1.x86_64.rpm7b3cdaa0eec2f71a33b58eca9a0c210f285d3b22a45460853c8f8e9c3c9ca0e3bind-libs-lite-9.9.4-38.el7_3.1.i686.rpma45de2b293218271b9f5fb890853895513103416ff4254463587241f2761171abind-libs-9.9.4-38.el7_3.1.i686.rpmae40a14769c7074ab17e77aeda03b22e0e21f2507b693aeba6458f6e6a623a83bind-pkcs11-devel-9.9.4-38.el7_3.1.i686.rpm98ded33ddeebd1d787cfe32e51779369c9ecabfc085a8cd4bb24612b97548de1bind-devel-9.9.4-38.el7_3.1.x86_64.rpm5a980870e6377304a9c7823df9d159e1f69e173beb679a9efec62b2ec6e5627eSLSA-2017:0083-1Qemu-KvmSecurity Fix(es): * An out-of-bounds read-access flaw was found in the QEMU emulator built with IP checksum routines. The flaw could occur when computing a TCP/UDP packet's checksum, because a QEMU function used the packet's payload length without checking against the data buffer's size. A user inside a guest could use this flaw to crash the QEMU process (denial of service). (CVE-2016-2857) Bug Fix(es): * Previously, rebooting a guest virtual machine more than 128 times in a short period of time caused the guest to shut down instead of rebooting, because the virtqueue was not cleaned properly. This update ensures that the virtqueue is cleaned more reliably, which prevents the described problem from occurring.lowScientific LinuxScientific Linux 7qemu-img-1.5.3-126.el7_3.3.x86_64.rpm413e98e8eec2dd33e7edd38972a42b056a7f446c05c17ad5eb5793580ae55144qemu-kvm-common-1.5.3-126.el7_3.3.x86_64.rpm700170146349094b32e8417bb09ceb26f9601d2cb6e36bde878006f58729fa0cqemu-kvm-tools-1.5.3-126.el7_3.3.x86_64.rpm1d4ab59aec5001c1080040f79236b5da652f512e9b9314ea80bd59ae81853ef2qemu-kvm-1.5.3-126.el7_3.3.x86_64.rpmd9024427be1eab019e7ef2d27ba099a676c21d556085a4337eaed8dcc9fb6d30SLSA-2017:0086-1KernelTo see the complete list of bug fixes, users are directed to the related Knowledge Article: Security Fix(es): * A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) * A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection. (CVE-2016-6828, Moderate) * A flaw was found in the Linux kernel's implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash. (CVE-2016-9555, Moderate) Bug Fix(es): * Previously, the performance of Internet Protocol over InfiniBand (IPoIB) was suboptimal due to a conflict of IPoIB with the Generic Receive Offload (GRO) infrastructure. With this update, the data cached by the IPoIB driver has been moved from a control block into the IPoIB hard header, thus avoiding the GRO problem and the corruption of IPoIB address information. As a result, the performance of IPoIB has been improved. * Previously, when a virtual machine (VM) with PCI-Passthrough interfaces was recreated, a race condition between the eventfd daemon and the virqfd daemon occurred. Consequently, the operating system rebooted. This update fixes the race condition. As a result, the operating system no longer reboots in the described situation. * Previously, a packet loss occurred when the team driver in round-robin mode was sending a large number of packets. This update fixes counting of the packets in the round-robin runner of the team driver, and the packet loss no longer occurs in the described situation. * Previously, the virtual network devices contained in the deleted namespace could be deleted in any order. If the loopback device was not deleted as the last item, other netns devices, such as vxlan devices, could end up with dangling references to the loopback device. Consequently, deleting a network namespace (netns) occasionally ended by a kernel oops. With this update, the underlying source code has been fixed to ensure the correct order when deleting the virtual network devices on netns deletion. As a result, the kernel oops no longer occurs under the described circumstances. * Previously, a Kabylake system with a Sunrise Point Platform Controller Hub (PCH) with a PCI device ID of 0xA149 showed the following warning messages during the boot: "Unknown Intel PCH (0xa149) detected." "Warning: Intel Kabylake processor with unknown PCH - this hardware has not undergone testing ..." The messages were shown because this PCH was not properly recognized. With this update, the problem has been fixed, and the operating system now boots without displaying the warning messages. * Previously, the operating system occasionally became unresponsive after a long run. This was caused by a race condition between the try_to_wake_up() function and a woken up task in the core scheduler. With this update, the race condition has been fixed, and the operating system no longer locks up in the described scenario.importantScientific LinuxtrueScientific Linux 7kernel-debug-3.10.0-514.6.1.el7.x86_64.rpm7de9db7864a59cfb6127112785e9b4240810204f4fc3f31315de65ef38bfbbd0python-perf-3.10.0-514.6.1.el7.x86_64.rpm200976cd177427c74bfa12419ac486fef53422b3721ebf8bc5f5f751907dc87dkernel-headers-3.10.0-514.6.1.el7.x86_64.rpmde32b3d762748fde3aa1a1f195c378ffaad189040a78c5a0df54ef8fc1a018cdkernel-devel-3.10.0-514.6.1.el7.x86_64.rpmdff37314fbbec1515d6925acdcc83f1b44ff141f2401bcea02996d276c12ca61kernel-3.10.0-514.6.1.el7.x86_64.rpmb54468059df05d9c32b987da946d3b479a37bdaaaefbb2ad870464eeb6f85770kernel-tools-libs-3.10.0-514.6.1.el7.x86_64.rpm53938bf79afb5c340c3c499ec58fa343335679d2aaa7d06a22239be5b178393ekernel-abi-whitelists-3.10.0-514.6.1.el7.noarch.rpm87c71e0825972782e264465673fd1850580c3107115d160d5b490014757a10fckernel-tools-3.10.0-514.6.1.el7.x86_64.rpm5b5ba7a6859721424e6a2346e618b8dc8fb600f8b8b33276d3622dc3b0ca98d6kernel-debug-devel-3.10.0-514.6.1.el7.x86_64.rpm30fe87fe3793e9a336cfd1287a724f75ee25e8566aca60c63c36747a2c5b1a63perf-3.10.0-514.6.1.el7.x86_64.rpme137fd218643dbaa9eb3e85a1cb913719e55262395a65ee9b98f9e22a3b0466dkernel-doc-3.10.0-514.6.1.el7.noarch.rpm4ff309c3abe8b008fc7f5f323d6791423196e971121df33846f110d46e9ff727kernel-tools-libs-devel-3.10.0-514.6.1.el7.x86_64.rpm7776043890be8aeae9ed1f7f2bde9c06f82dda2e9ef9b8147c1ee0ba439cae40SLSA-2017:0180-1Java-1.8.0-OpenjdkSecurity Fix(es): * It was discovered that the RMI registry and DCG implementations in the RMI component of OpenJDK performed deserialization of untrusted inputs. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-3241) This issue was addressed by introducing whitelists of classes that can be deserialized by RMI registry or DCG. These whitelists can be customized using the newly introduced sun.rmi.registry.registryFilter and sun.rmi.transport.dgcFilter security properties. * Multiple flaws were discovered in the Libraries and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-3272, CVE-2017-3289) * A covert timing channel flaw was found in the DSA implementation in the Libraries component of OpenJDK. A remote attacker could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2016-5548) * It was discovered that the Libraries component of OpenJDK accepted ECSDA signatures using non-canonical DER encoding. This could cause a Java application to accept signature in an incorrect format not accepted by other cryptographic tools. (CVE-2016-5546) * It was discovered that the 2D component of OpenJDK performed parsing of iTXt and zTXt PNG image chunks even when configured to ignore metadata. An attacker able to make a Java application parse a specially crafted PNG image could cause the application to consume an excessive amount of memory. (CVE-2017-3253) * It was discovered that the Libraries component of OpenJDK did not validate the length of the object identifier read from the DER input before allocating memory to store the OID. An attacker able to make a Java application decode a specially crafted DER input could cause the application to consume an excessive amount of memory. (CVE-2016-5547) * It was discovered that the JAAS component of OpenJDK did not use the correct way to extract user DN from the result of the user search LDAP query. A specially crafted user LDAP entry could cause the application to use an incorrect DN. (CVE-2017-3252) * It was discovered that the Networking component of OpenJDK failed to properly parse user info from the URL. A remote attacker could cause a Java application to incorrectly parse an attacker supplied URL and interpret it differently from other applications processing the same URL. (CVE-2016-5552) * Multiple flaws were found in the Networking components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-3261, CVE-2017-3231) * A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) This update mitigates the CVE-2016-2183 issue by adding 3DES cipher suites to the list of legacy algorithms (defined using the jdk.tls.legacyAlgorithms security property) so they are only used if connecting TLS/SSL client and server do not share any other non-legacy cipher suite. Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.criticalScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm536d28b863ac815d3cc2c6bda734e5fd40dc5079047e3176fd6cb9a2ab2db62fjava-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3.noarch.rpm2bccd93621baf59b98be27f80ce8617f9ca33be5985edd6b8cd549bbb9cf7084java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3.x86_64.rpm6e43593c97b64d9f41121dea57c7eb717a186f4c4a013f60d4ff7f56bd1b5987java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3.x86_64.rpme79c0226c6666e0bbfdc88bd991a556cf5234c8142d209ee0d1f7c38276b861djava-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm190a3d0c509f5fb6ae80703c5f180507c4026671e6bf088cb69a2a74be794620java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm9616568c601326d89aecb8f717b07fdc74c3bbc4d87828b98b98cb3f37de09d5java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm2b630153511574f5fee19f870cb95cb118f54b35274e00fd6d7951c50f199352java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3.x86_64.rpmc8a571e36c28ddd08442f35380bae293ff052b96b3e41b031899dfc5a757bf46java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3.x86_64.rpm3788d184823af09c10b42194c34253d8cbfce9cdba11f103e3abf5aff5c05e71java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.x86_64.rpm2dca6cac4031567d09f53b17bea7a66f443c48412628f6bd439462cb4587b94cjava-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3.noarch.rpm9b28b5f260b4aefa94fb30c077a211cd8286dfd11476fb3c66b42962710cb34ajava-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3.noarch.rpme87491b0ad6e089a960e594639fecde1db6486900a99f7a9a66033430c8c050ejava-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3.x86_64.rpma12fad790d82e3f7b685587a24f48a9ffed246811194cfc55b69215e45401aa0java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3.x86_64.rpmc0ab2ec8d4444ec045490c0e21ff663db38a320679395a17180a28279ff8beccjava-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm5b2402db5374a51112f342300374f9a657fe50e32ad825b4c5390cdb991cfa04java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3.noarch.rpmbd1c98a97fe37274130b53ff5de95c1e3c6c4669837a77dac266b2700ee69364SLSA-2017:0182-1SquidSecurity Fix(es): * It was found that squid did not properly remove connection specific headers when answering conditional requests using a cached request. A remote attacker could send a specially crafted request to an HTTP server via the squid proxy and steal private data from other connections. (CVE-2016-10002)moderateScientific LinuxScientific Linux 7squid-3.5.20-2.el7_3.2.x86_64.rpm70af8f17479b4e70cec3167bc401ee919890309ff9a3d5dc4e35dc24c471480asquid-sysvinit-3.5.20-2.el7_3.2.x86_64.rpm567f7920b31f983b8419fea2112445e3a213278943ae9658c6ea28e4ea27b9dasquid-migration-script-3.5.20-2.el7_3.2.x86_64.rpm31cb765b5bc0a0854d254b6d179a145d9e0124d435eb543d233c259d35aec7b9SLSA-2017:0190-1FirefoxThis update upgrades Firefox to version 45.7.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5386, CVE-2017-5390, CVE-2017-5396)criticalScientific LinuxScientific Linux 7firefox-45.7.0-1.el7_3.i686.rpm016761b937ef8d7c506d3a41de074f1df29c91ad18318d3534cf2dd7b4cab59ffirefox-45.7.0-2.el7_3.x86_64.rpm0bd13e279e00ae9e335c36b9b99875f5a8b71549088498413905be3e1e52ff2dfirefox-45.7.0-1.el7_3.x86_64.rpm37ab691b6a8c3ce6d7f0bb8cfa0969ea61f96e457829037eb630388212a08c43firefox-45.7.0-2.el7_3.i686.rpmc2fba23947bf6d3d57b6ab532bccba1815fba819f28ba1a577e231269a586732SLSA-2017:0225-1LibtiffSecurity Fix(es): * Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files. (CVE-2016-9533, CVE-2016-9534, CVE-2016-9535) * Multiple flaws have been discovered in various libtiff tools (tiff2pdf, tiffcrop, tiffcp, bmp2tiff). By tricking a user into processing a specially crafted file, a remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code with the privileges of the user running the libtiff tool. (CVE-2015-8870, CVE-2016-5652, CVE-2016-9540, CVE-2016-9537, CVE-2016-9536)moderateScientific LinuxScientific Linux 7libtiff-4.0.3-27.el7_3.i686.rpm01832cb1da2d6ca2fc9970c574f8bf4eacd3d3350cf1e4868aa44ed02d256ca0libtiff-devel-4.0.3-27.el7_3.i686.rpme643552193d4553687ec12868d0efd83b4e337758f9e1df92aa77c545683728elibtiff-static-4.0.3-27.el7_3.i686.rpm33431cd32bd4cdf5d42d214bedc7257db78bb0f973eeea0731808f32947e795alibtiff-4.0.3-27.el7_3.x86_64.rpm1c373bfb63bea120cafe40e05ebbc26f11b8d3a175cff92ec4a38f47883c588elibtiff-static-4.0.3-27.el7_3.x86_64.rpm08f8c3e49002ab780ea740cb07e16924f15bf9845b411854008007e2bb69a349libtiff-tools-4.0.3-27.el7_3.x86_64.rpm8f42f18e540050a389d5cdf68fb0b1f3979de7ac11f2cf449cc631b2105aeac6libtiff-devel-4.0.3-27.el7_3.x86_64.rpm7b6ecf9124a6264776e22bdee6df3decfac3a97a3e3a64644ec780fb8833f22fSLSA-2017:0238-1ThunderbirdThis update upgrades Thunderbird to version 45.7.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5390, CVE-2017-5396)importantScientific LinuxScientific Linux 7thunderbird-45.7.0-1.el7_3.x86_64.rpm1cc9f117aa334af50f57e83804ee04a276b4b21a40a1df127a36ee089796ae7bSLSA-2017:0252-1NtpSecurity Fix(es): * It was found that when ntp is configured with rate limiting for all associations the limits are also applied to responses received from its configured sources. A remote attacker who knows the sources can cause a denial of service by preventing ntpd from accepting valid responses from its sources. (CVE-2016-7426) * A flaw was found in the control mode functionality of ntpd. A remote attacker could send a crafted control mode packet which could lead to information disclosure or result in DDoS amplification attacks. (CVE-2016-9310) * A flaw was found in the way ntpd implemented the trap service. A remote attacker could send a specially crafted packet to cause a null pointer dereference that will crash ntpd, resulting in a denial of service. (CVE-2016-9311) * A flaw was found in the way ntpd running on a host with multiple network interfaces handled certain server responses. A remote attacker could use this flaw which would cause ntpd to not synchronize with the source. (CVE-2016-7429) * A flaw was found in the way ntpd calculated the root delay. A remote attacker could send a specially-crafted spoofed packet to cause denial of service or in some special cases even crash. (CVE-2016-7433)moderateScientific LinuxScientific Linux 7ntp-4.2.6p5-25.el7_3.1.x86_64.rpm26e42c80bac7b2e852e8ab3a650c28adda4d1578d339050b1f0db62b4af562f0ntp-doc-4.2.6p5-25.el7_3.1.noarch.rpm02e635b980d03c456947da5c93040f9b4f23da1d8ff76796a9eae0555bc5720dntpdate-4.2.6p5-25.el7_3.1.x86_64.rpm3cc05a68f7070364b40efce5696ee30e3d797145c56966e758afc2690562097fsntp-4.2.6p5-25.el7_3.1.x86_64.rpm7bf8436bc85a15e9a9433fbd88e0913a70aeea25403efac4e23f234d1906548antp-perl-4.2.6p5-25.el7_3.1.noarch.rpmd996e0e11d803529bd880e6438a6530307aeb337301f5bdef12e71891b76d63cSLSA-2017:0254-1SpiceSecurity Fix(es): * A vulnerability was discovered in spice in the server's protocol handling. An authenticated attacker could send crafted messages to the spice server causing a heap overflow leading to a crash or possible code execution. (CVE-2016-9577) * A vulnerability was discovered in spice in the server's protocol handling. An attacker able to connect to the spice server could send crafted messages which would cause the process to crash. (CVE-2016-9578)moderateScientific LinuxScientific Linux 7spice-server-0.12.4-20.el7_3.x86_64.rpm8a963a00eb568ce4983b23bbc2e163a1ec2d53954f0a5c75384a0f0856e93733spice-server-devel-0.12.4-20.el7_3.x86_64.rpma50770b5382a90ac433e0fb4b3423c396d40415fd6265d3e3ef859be9813c059SLSA-2017:0269-1Java-1.7.0-OpenjdkSecurity Fix(es): * It was discovered that the RMI registry and DCG implementations in the RMI component of OpenJDK performed deserialization of untrusted inputs. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-3241) This issue was addressed by introducing whitelists of classes that can be deserialized by RMI registry or DCG. These whitelists can be customized using the newly introduced sun.rmi.registry.registryFilter and sun.rmi.transport.dgcFilter security properties. * Multiple flaws were discovered in the Libraries and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-3272, CVE-2017-3289) * A covert timing channel flaw was found in the DSA implementation in the Libraries component of OpenJDK. A remote attacker could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2016-5548) * It was discovered that the Libraries component of OpenJDK accepted ECSDA signatures using non-canonical DER encoding. This could cause a Java application to accept signature in an incorrect format not accepted by other cryptographic tools. (CVE-2016-5546) * It was discovered that the 2D component of OpenJDK performed parsing of iTXt and zTXt PNG image chunks even when configured to ignore metadata. An attacker able to make a Java application parse a specially crafted PNG image could cause the application to consume an excessive amount of memory. (CVE-2017-3253) * It was discovered that the Libraries component of OpenJDK did not validate the length of the object identifier read from the DER input before allocating memory to store the OID. An attacker able to make a Java application decode a specially crafted DER input could cause the application to consume an excessive amount of memory. (CVE-2016-5547) * It was discovered that the JAAS component of OpenJDK did not use the correct way to extract user DN from the result of the user search LDAP query. A specially crafted user LDAP entry could cause the application to use an incorrect DN. (CVE-2017-3252) * It was discovered that the Networking component of OpenJDK failed to properly parse user info from the URL. A remote attacker could cause a Java application to incorrectly parse an attacker supplied URL and interpret it differently from other applications processing the same URL. (CVE-2016-5552) * Multiple flaws were found in the Networking components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-3261, CVE-2017-3231) * A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) This update mitigates the CVE-2016-2183 issue by adding 3DES cipher suites to the list of legacy algorithms (defined using the jdk.tls.legacyAlgorithms security property) so they are only used if connecting TLS/SSL client and server do not share any other non-legacy cipher suite.criticalScientific LinuxScientific Linux 7java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm85150d382d715de809af287048efe342c8e0f9d2b27edb3ef617679232d248f7java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm9101fdfcbfcc56231e0bfd85fb164e0fac98a10043706b178d41396294e15356java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3.noarch.rpm4f9a2514105e6daf40d01f73bbad54d14405ad29bea2cf2075af7e9d40bff328java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm1724533a62e50f9dc73130c7e4c5495284073eaef3ac6773fa5856dff11a6bf7java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm95faf11b5df10be642b3f0ff480a903f973d43a559290b8d835e40f1d2191458java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm7de6f23ba1a5f74eb8f33194facad787488982e2399b98a5965df677da8ac6a8java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3.x86_64.rpmd06b235e2c5362b59940d975bf0199ad5e19f3bf3ccfb3f0647a9950bdd7de9aSLSA-2017:0276-1BindSecurity Fix(es): * A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a null pointer dereference via a specially crafted DNS response. (CVE-2017-3135)moderateScientific LinuxScientific Linux 7bind-pkcs11-devel-9.9.4-38.el7_3.2.i686.rpm845131c1a454077a98f70d322a08bab61efb9c66e39b8582e970606361870a68bind-libs-9.9.4-38.el7_3.2.i686.rpmd1ce9c7b585ab1873ee1cd0d6416b674fd78443910a063ede8fee9794e5f24a5bind-9.9.4-38.el7_3.2.x86_64.rpmab3dd61cfbc284d5894d57122b4655445512f2eb78554d10cc1b658f89413bc3bind-chroot-9.9.4-38.el7_3.2.x86_64.rpm849aab71f8426cc574d1b22309a34bdff58862eb8b3a2eda4a42793858d97631bind-utils-9.9.4-38.el7_3.2.x86_64.rpm02b0d3825390b955cc36b656d21551fb2aad8d4114c5bc12e79e83068b5b1659bind-lite-devel-9.9.4-38.el7_3.2.i686.rpm3f01bb06cf9feab1fa2918ac725f4be3cb8cee2869bc1cc0e052e141e9274d5abind-pkcs11-9.9.4-38.el7_3.2.x86_64.rpm8d23446cdd6fd3e8c2021ca01d1a5fac44423cea63141be54f202b3bd1bdbc30bind-pkcs11-libs-9.9.4-38.el7_3.2.i686.rpmcfbe89512540cd0e25a4c36dcf91794f48ca8b852dcdef078c7951072000886abind-sdb-chroot-9.9.4-38.el7_3.2.x86_64.rpmdf037fa21e82ec13a6d4f4d0f9616bc5e97ad190d2eeb552fdb0d2efe85bbc52bind-devel-9.9.4-38.el7_3.2.i686.rpm83d3f86f3f48393345799e30c741ef2ca37bd387863fbca6f8f143654bf51dacbind-libs-9.9.4-38.el7_3.2.x86_64.rpm0e943e77ee08cedb36afa5d2ebf1c342c31b5f3aeca031c50ba3da63124a503bbind-pkcs11-devel-9.9.4-38.el7_3.2.x86_64.rpm447f3e5b9a2592591a2ee559fd378e2b8ca9c771aadffb160edb65c928e249c4bind-pkcs11-libs-9.9.4-38.el7_3.2.x86_64.rpm5ceae3380f47cbe12788dfbf03e4cd3135a20148becf70143322c442697fde02bind-libs-lite-9.9.4-38.el7_3.2.i686.rpmf089b72a5c83decf8b645689ef5a113badb5d487eccda92c17145e4326d3fed0bind-devel-9.9.4-38.el7_3.2.x86_64.rpm4f2be4613ffa0fde33ebb33469e8fd28a69508608b6344db7d5b7ed8f18162bdbind-license-9.9.4-38.el7_3.2.noarch.rpmba38e1fce9262f2c0c2db9d7c88d34c7905f87b1beb32e9d8a7d577c3e59ea38bind-pkcs11-utils-9.9.4-38.el7_3.2.x86_64.rpmb9e6e1422185e9612e4f806e162575741324b68b3b3c05e645cbc62a07087271bind-libs-lite-9.9.4-38.el7_3.2.x86_64.rpmfb0952d34ab4e7b7f90d03ad39ab94a556051ea4cf75ed8377029fe17a47567ebind-sdb-9.9.4-38.el7_3.2.x86_64.rpme500c4726fa9d8e1e6f7a15047e8d359860de04e4438bbed2691e5e5ac414a76bind-lite-devel-9.9.4-38.el7_3.2.x86_64.rpma78e8e80c5f597b638f1baa94fd8de0d2a2f8cc93d1e9fe5a3db2d6bd632e56cSLSA-2017:0286-1OpensslSecurity Fix(es): * An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite. (CVE-2017-3731) * A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)moderateScientific LinuxScientific Linux 7openssl-devel-1.0.1e-60.el7_3.1.i686.rpme56035332dc97502ef5766ac0dd3a9d1aff18e4df1763209ecceeac21fc491feopenssl-devel-1.0.1e-60.el7_3.1.x86_64.rpmf5bbe674ad696d0c776d89c3977bf05e066a8c400ae8de337050d21c9d5238b1openssl-static-1.0.1e-60.el7_3.1.x86_64.rpm863f6c44847373c6bd6d382c900b8a886ddea4ae41c24a77f00512aaa6125ec2openssl-static-1.0.1e-60.el7_3.1.i686.rpmde68d1d704f6ea3ff9ec3a565380c26f5c1912a18c76e435837479b34a3657e5openssl-1.0.1e-60.el7_3.1.x86_64.rpmcc34fe1e46b3a90fda0d7cef4c81f7faf8e5f8d3f4da92a0704181658c4bcc2copenssl-libs-1.0.1e-60.el7_3.1.x86_64.rpm12def1d900dbed3017f6a7c28be3b339e45b750c3a130426537b93b1fa31e117openssl-libs-1.0.1e-60.el7_3.1.i686.rpm995fba6bee3f1195aa24cd6844623aa7bbbbe43d6db065355a1ea112074b5494openssl-perl-1.0.1e-60.el7_3.1.x86_64.rpmab0c125600df37c1c22fb7cdff9a338954f00fd96115f811c33397c8cd3f7388SLSA-2017:0294-1KernelSecurity Fix(es): * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important)importantScientific LinuxScientific Linux 7kernel-doc-3.10.0-514.6.2.el7.noarch.rpm015061c3245222194841f6db28f5a496d03dfbb570b10cf06021e1a525d97d32python-perf-3.10.0-514.6.2.el7.x86_64.rpm321be9d8a8c01ee0d3fe0f7a1c9857fd6ce5f46a7f7e2cf66f5f5b1541469673kernel-devel-3.10.0-514.6.2.el7.x86_64.rpmca5d187fe244edf4264e0c906bb8de85c1ba831d872a997364b8aa01760bbf36kernel-3.10.0-514.6.2.el7.x86_64.rpmfaf47ce1a00ffdc3d2742bbff77ad20fdc6e64286b2a77239a1c9fb2af24300akernel-debug-devel-3.10.0-514.6.2.el7.x86_64.rpm09d00d1fc8f43b7ffb34f4076f04c804036b849aa3452f0801e761c106383154kernel-tools-libs-3.10.0-514.6.2.el7.x86_64.rpm05b6c23daacb854db851ca18f58237cb31a1db70efc853b204eeb2032d63d529kernel-tools-libs-devel-3.10.0-514.6.2.el7.x86_64.rpm439276a92740c8400f02ab7c63d79cdfa921f5597b2e92d5923d636e407f7948kernel-tools-3.10.0-514.6.2.el7.x86_64.rpmb6ba06c018dcaee395e3b05a492299eb72a40fe1aa0ee92e5582197b81e4dd08kernel-headers-3.10.0-514.6.2.el7.x86_64.rpm62cc2f890569ce04514a98d2215529121688158bac4269fa65877fd138e10d2dperf-3.10.0-514.6.2.el7.x86_64.rpm624b13070e56e7eb2355faa86c1802b266aa8e80e2b566140e5c9a48c2c69031kernel-abi-whitelists-3.10.0-514.6.2.el7.noarch.rpm42b7e3954a1db1aa51a3fcf110b89a39253200cb8282d3c3646a1df6d55c4f8ckernel-debug-3.10.0-514.6.2.el7.x86_64.rpm8021394bed07ace2fa450ca973cfaff6291b158342aa050182256c5d09b126ddSLSA-2017:0386-1KernelSecurity Fix(es): * Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support is vulnerable to a null pointer dereference flaw. It could occur on x86 platform, when emulating an undefined instruction. An attacker could use this flaw to crash the host kernel resulting in DoS. (CVE-2016-8630, Important) * A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. (CVE-2016-8655, Important) * A flaw was discovered in the Linux kernel's implementation of VFIO. An attacker issuing an ioctl can create a situation where memory is corrupted and modify memory outside of the expected area. This may overwrite kernel memory and subvert kernel execution. (CVE-2016-9083, Important) * The use of a kzalloc with an integer multiplication allowed an integer overflow condition to be reached in vfio_pci_intrs.c. This combined with CVE-2016-9083 may allow an attacker to craft an attack and use unallocated memory, potentially crashing the machine. (CVE-2016-9084, Moderate)importantScientific LinuxScientific Linux 7kernel-doc-3.10.0-514.10.2.el7.noarch.rpmd2c5470b9f9af78447d8b6deec7ffe7f72510b1184b639fc55d12357ab94a24akernel-debug-3.10.0-514.10.2.el7.x86_64.rpm21437880f98048c8233e4d93ca9c3efeebdd09a4692e60eee4329569b699ca12kernel-tools-libs-devel-3.10.0-514.10.2.el7.x86_64.rpm29169057239839bb9b58bcd47141ab940e37403cfd52db4b9a8891bc18d6f66dkernel-tools-3.10.0-514.10.2.el7.x86_64.rpmb50e30412b2dd5b372788e6caca8ba6e4665f309cfe2ef101c32afcd0d3533d4perf-3.10.0-514.10.2.el7.x86_64.rpm8ba454ce495c9be4f6c87ac5fc45aa18e208d7debe9c5df5af25e81a6fb7056dkernel-abi-whitelists-3.10.0-514.10.2.el7.noarch.rpm1568f76d039a361f64370e756fd8623191298ae70226c61fb8cfc9c84b6dbda8kernel-headers-3.10.0-514.10.2.el7.x86_64.rpma992be3ad9207ff06555f4ea2cc7a0f5c7286805234a0b71d327399ad8626d65kernel-3.10.0-514.10.2.el7.x86_64.rpmaa60d144d858a258191d5a088286a649780e0b91215bc650b0c90402e97fb9fekernel-devel-3.10.0-514.10.2.el7.x86_64.rpmf64c6173c98ee4ac6a4df9329a2d60bb951277a0ea93197f7ca0b6c87f6fa5c0kernel-debug-devel-3.10.0-514.10.2.el7.x86_64.rpm44fb8028228ce2bd0e1116677017d80803b575b0f978837f7c4f68ba0ecde005kernel-tools-libs-3.10.0-514.10.2.el7.x86_64.rpmcccc2d16f6c3c882cf397bbb8292c695a94d2ddff8cf8c57b02a225ae7ad5d9dSLSA-2017:0388-1IpaSecurity Fix(es): * It was found that IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys. (CVE-2017-2590) Bug Fix(es): * Previously, during an Identity Management (IdM) replica installation that runs on domain level "1" or higher, Directory Server was not configured to use TLS encryption. As a consequence, installing a certificate authority (CA) on that replica failed. Directory Server is now configured to use TLS encryption during the replica installation and as a result, the CA installation works as expected. * Previously, the Identity Management (IdM) public key infrastructure (PKI) component was configured to listen on the "::1" IPv6 localhost address. In environments have the the IPv6 protocol disabled, the replica installer was unable to retrieve the Directory Server certificate, and the installation failed. The default listening address of the PKI connector has been updated from the IP address to "localhost". As a result, the PKI connector now listens on the correct addresses in IPv4 and IPv6 environments. * Previously, when installing a certificate authority (CA) on a replica, Identity Management (IdM) was unable to provide third-party CA certificates to the Certificate System CA installer. As a consequence, the installer was unable to connect to the remote master if the remote master used a third-party server certificate, and the installation failed. This updates applies a patch and as a result, installing a CA replica works as expected in the described situation. * When installing a replica, the web server service entry is created on the Identity Management (IdM) master and replicated to all IdM servers. Previously, when installing a replica without a certificate authority (CA), in certain situations the service entry was not replicated to the new replica on time, and the installation failed. The replica installer has been updated and now waits until the web server service entry is replicated. As a result, the replica installation no longer fails in the described situation.moderateScientific LinuxScientific Linux 7ipa-admintools-4.4.0-14.sl7_3.6.noarch.rpm7e8f85c21b7a9523ca66242a8a608bd8a1ad04556acab1a2dba039ee94f0ca6bpython2-ipalib-4.4.0-14.sl7_3.6.noarch.rpm456da0b3537d57f200bb641ebb40319c13c0b3aae0f36cefc2f3eb2861322b2bpython2-ipaserver-4.4.0-14.sl7_3.6.noarch.rpma42b13612929fac940f4bfdc02e8ef461647327e09a0073287dbddb1ada22b43ipa-server-4.4.0-14.sl7_3.6.x86_64.rpm717de0315d4757efe68b3b8d41faa4924a7905309507ddd0b275d06dce2905dbipa-server-trust-ad-4.4.0-14.sl7_3.6.x86_64.rpm3d09046d02635a37a120616a787e49cb3ec41b66acc012cf9e7d9f7339d64880python2-ipaclient-4.4.0-14.sl7_3.6.noarch.rpm3600151a25b3e32d46355da6478f6ac7d398f00b0c2750261da578a5d59ab143ipa-client-4.4.0-14.sl7_3.6.x86_64.rpm5c46cd6bf10770ea13fb140f1a81b9ad6e3cd60a2d5720647e7d1bb816df8200ipa-server-common-4.4.0-14.sl7_3.6.noarch.rpmec521ea1a0e52faefb8817404ed67adb40750d9ec4e412ee20dd6e014a127e2dipa-python-compat-4.4.0-14.sl7_3.6.noarch.rpmf688ad6e121763054e7da9d0a74ecc39931338644982c1f327318130dd5018feipa-server-dns-4.4.0-14.sl7_3.6.noarch.rpme5427298a5ec5f6fc755b0e8563cba58c96212adeb7d239d4d9ee96be71ecc5aipa-client-common-4.4.0-14.sl7_3.6.noarch.rpm01fe8454be686dbd4ba158e51b0779d8cd1349e5295e8580cb3d93aae52a5703ipa-common-4.4.0-14.sl7_3.6.noarch.rpm8d96c7797f7c8630dc89c3b96a9580de1e15a0b031c6416d7087e65819d1c982SLSA-2017:0396-1Qemu-KvmSecurity Fix(es): * Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host. (CVE-2017-2615) * Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. (CVE-2017-2620) Bug Fix(es): * When using the virtio-blk driver on a guest virtual machine with no space on the virtual hard drive, the guest terminated unexpectedly with a "block I/O error in device" message and the qemu-kvm process exited with a segmentation fault. This update fixes how the system_reset QEMU signal is handled in the above scenario. As a result, if a guest crashes due to no space left on the device, qemu-kvm continues running and the guest can be reset as expected.importantScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm69e71d5f989852636480d4e3a8d81f0a73c33d31fb0f0950136f74bc589df699qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpm7934116fad919a5142d0a829f5f80a0789b3551705598a9f6b6b3eecd5dea008qemu-img-1.5.3-126.el7_3.5.x86_64.rpmb42343c9b3fa13c91b5eb80144910f090b17870ea44b1f383253d8a880126b5fqemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpma78fed283cc7da01c41d49001a5abaa333a8df70db02d0b706c6b81060a3684aSLSA-2017:0461-1FirefoxThis update upgrades Firefox to version 52.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405)criticalScientific LinuxScientific Linux 7firefox-52.0-4.el7_3.i686.rpm6cc82c78604b18c48d8730b2882ad99eb1e92a9176d36706497a05182ba19842firefox-52.0-4.el7_3.x86_64.rpm2af64d43c23a8e43f0e237b37f2c11a223680ac16774256535810c5541a0bad0SLSA-2017:0498-1ThunderbirdThis update upgrades Thunderbird to version 45.8.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405)importantScientific LinuxScientific Linux 7thunderbird-45.8.0-1.el7_3.x86_64.rpm323e8d55f618cd56da20399366f60b7838d2bf7dcd5acd94d7bca0276dcdd865SLSA-2017:0558-1FirefoxSecurity Fix(es): * A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5428)criticalScientific LinuxScientific Linux 7firefox-52.0-5.el7_3.x86_64.rpm84d70b85685001deedd878453fd315cb4cd49d4104b557a4c91e5d059c58a503firefox-52.0-5.el7_3.i686.rpmfe1273b0a0c474d925b4d64a949e758617676a1e88f3a14bf0fbec9feb7e0097SLSA-2017:0837-1IcoutilsSecurity Fix(es): * Multiple vulnerabilities were found in icoutils, in the wrestool program. An attacker could create a crafted executable that, when read by wrestool, could result in memory corruption leading to a crash or potential code execution. (CVE-2017-5208, CVE-2017-5333, CVE-2017-6009) * A vulnerability was found in icoutils, in the wrestool program. An attacker could create a crafted executable that, when read by wrestool, could result in failure to allocate memory or an over-large memcpy operation, leading to a crash. (CVE-2017-5332) * Multiple vulnerabilities were found in icoutils, in the icotool program. An attacker could create a crafted ICO or CUR file that, when read by icotool, could result in memory corruption leading to a crash or potential code execution. (CVE-2017-6010, CVE-2017-6011)importantScientific LinuxScientific Linux 7icoutils-0.31.3-1.el7_3.x86_64.rpm1bb75e9ec026e44dc987159563ef235468822c56b548a145194f6925ce13283aSLSA-2017:0838-1OpenjpegSecurity Fix(es): * Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in OpenJPEG. A specially crafted JPEG2000 image could cause an application using OpenJPEG to crash or, potentially, execute arbitrary code. (CVE-2016-5139, CVE-2016-5158, CVE-2016-5159, CVE-2016-7163) * An out-of-bounds read vulnerability was found in OpenJPEG, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap. (CVE-2016-9573) * A heap-based buffer overflow vulnerability was found in OpenJPEG. A specially crafted JPEG2000 image, when read by an application using OpenJPEG, could cause the application to crash or, potentially, execute arbitrary code. (CVE-2016-9675)moderateScientific LinuxScientific Linux 7openjpeg-libs-1.5.1-16.el7_3.x86_64.rpm1b56b745474c231c92b2f23e03f0791b6cd675be9edc7191161bd77bac667c50openjpeg-devel-1.5.1-16.el7_3.i686.rpm4404546795f84c8b5d6dd1af8c943c85fc7133ae33efe5117cae3e02d4608f71openjpeg-libs-1.5.1-16.el7_3.i686.rpmd0e0f733cf36ea4e6fff83fe12a1dd6e109e4ac2d1225bc7097fc18e9d530dffopenjpeg-1.5.1-16.el7_3.x86_64.rpmba47f3e4ead62bc20a25c84afbeeb62fb0e9e365535a24d33c70848b4800ae8dopenjpeg-devel-1.5.1-16.el7_3.x86_64.rpm9e93b8e0e9d9f38af21f78acbe1f2e9fa9d207c856105303652520460c0d0517SLSA-2017:0906-1HttpdSecurity Fix(es): * It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736) * It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161) * It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743) Note: The fix for the CVE-2016-8743 issue causes httpd to return "400 Bad Request" error to HTTP clients which do not strictly follow HTTP protocol specification. A newly introduced configuration directive "HttpProtocolOptions Unsafe" can be used to re-enable the old less strict parsing. However, such setting also re-introduces the CVE-2016-8743 issue. Bug Fix(es): * When waking up child processes during a graceful restart, the httpd parent process could attempt to open more connections than necessary if a large number of child processes had been active prior to the restart. Consequently, a graceful restart could take a long time to complete. With this update, httpd has been fixed to limit the number of connections opened during a graceful restart to the number of active children, and the described problem no longer occurs. * Previously, httpd running in a container returned the 500 HTTP status code (Internal Server Error) when a connection to a WebSocket server was closed. As a consequence, the httpd server failed to deliver the correct HTTP status and data to a client. With this update, httpd correctly handles all proxied requests to the WebSocket server, and the described problem no longer occurs. * In a configuration using LDAP authentication with the mod_authnz_ldap module, the name set using the AuthLDAPBindDN directive was not correctly used to bind to the LDAP server for all queries. Consequently, authorization attempts failed. The LDAP modules have been fixed to ensure the configured name is correctly bound for LDAP queries, and authorization using LDAP no longer fails.moderateScientific LinuxScientific Linux 7mod_proxy_html-2.4.6-45.sl7.4.x86_64.rpmec8b7c62272f09632a5051f2e52432ea213411f64fd5dda4090a9118d7540933mod_session-2.4.6-45.sl7.4.x86_64.rpmfb54524075f1d5b939eb1404faa6901af77364d558d4ef79fc5cce502fca722amod_ldap-2.4.6-45.sl7.4.x86_64.rpm37d06533511a17adf1294d55a1db4cc81bcf26c9f273d99dd71d319707ef14e2httpd-2.4.6-45.sl7.4.x86_64.rpm678ed93bffa67e561cbc3b0ecc269fdb92cb5cbf72b4a187d69ed7584ead7f02httpd-tools-2.4.6-45.sl7.4.x86_64.rpmd84e3665ae2682ed0a6ade2bb4b6e79f9e571fe10c75e40ac745835c3246f620httpd-manual-2.4.6-45.sl7.4.noarch.rpm5085f29aec70d0f28f85426a2bb3abc195ba7c9644188e127e5343ce7aad5f94mod_ssl-2.4.6-45.sl7.4.x86_64.rpm0e1269c098eb3a981e705c496301083f3a6bbe1082fad9d5db0674f642f737e2httpd-devel-2.4.6-45.sl7.4.x86_64.rpm0157091b3a7e9f1fa31148af5b18796b95a492ed7dcd7af2619b218f89604204SLSA-2017:0907-1Util-LinuxSecurity Fix(es): * A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. (CVE-2017-2616) Bug Fix(es): * The "findmnt --target <path>" command prints all file systems where the mount point directory is <path>. Previously, when used in the chroot environment, "findmnt --target <path>" incorrectly displayed all mount points. The command has been fixed so that it now checks the mount point path and returns information only for the relevant mount point.moderateScientific LinuxScientific Linux 7util-linux-2.23.2-33.el7_3.2.x86_64.rpmef1ced826714b066860aba28d7e7cd1779828c38794b0bc8c27b3cd74d4fe318libuuid-devel-2.23.2-33.el7_3.2.i686.rpmd9763f9d358245e400fdaf3eefe47e6a8a896f2da75e2d49286b972d3724a943libmount-devel-2.23.2-33.el7_3.2.i686.rpm74d315babfadcec7c19710e3b175e9c9a3349006e33e87faf09fbe99a03e053cutil-linux-2.23.2-33.el7_3.2.i686.rpm20b90b3cc3a9b8570f860668e634e7c8c1f7ac21e8c8a4bf33cbed5ffc2f0fe4libmount-2.23.2-33.el7_3.2.i686.rpm97490f4a13152248b776b5534deb28459a61529872083753ed7715b9e6c688b0libblkid-devel-2.23.2-33.el7_3.2.x86_64.rpm308e6b562008dd1d220e3f9a570d96350c129a69dd55f76fea8443ad26d88f66libuuid-devel-2.23.2-33.el7_3.2.x86_64.rpm04b5e8144aee8fbe116d713b973c0b5934c9085b0b4f71ffa1a1422bca98ebacuuidd-2.23.2-33.el7_3.2.x86_64.rpm3610a9f5e22c9eb778830f55a0f2bfbf5fa5dc8674113fce1dc1793c365501a7libblkid-2.23.2-33.el7_3.2.x86_64.rpm8ce1918997d06240694d78506a64e1440609dde8d82f5f74ed76769ff5c73a70libblkid-devel-2.23.2-33.el7_3.2.i686.rpm0786a536cc0c34c680035a333fccde33387d8fe68da69e9262c21dfc6bd621f5libuuid-2.23.2-33.el7_3.2.x86_64.rpmd6fb842e78badb2bb98b11b4d5affa4c386248919713e58343b9c472f11fc3a3libuuid-2.23.2-33.el7_3.2.i686.rpm9773d29facc0cc2e934ec7771f99d57897598e15dee27e9af22ea8edfc00c257libmount-2.23.2-33.el7_3.2.x86_64.rpm016df18dd4ee25194ddcdcc562fb1d6be0db14c553f6bf7db33a9ef20fcd858clibmount-devel-2.23.2-33.el7_3.2.x86_64.rpm1145e07ddc999daeb5a76fffabf61141f5e06f2deab948d2ea2b1d9936528917libblkid-2.23.2-33.el7_3.2.i686.rpmeaf7eca8b2a21d395d69de80eed3106ed65e724a9003b4f9ab75ba0bca82b56cSLSA-2017:0914-1LibreofficeSecurity Fix(es): * It was found that LibreOffice disclosed contents of a file specified in an embedded object's preview. An attacker could potentially use this flaw to expose details of a system running LibreOffice as an online service via a crafted document. (CVE-2017-3157) Bug Fix(es): * Previously, an improper resource management caused the LibreOffice Calc spreadsheet application to terminate unexpectedly after closing a dialog window with accessibility support enabled. The resource management has been improved, and the described problem no longer occurs. * Previously, when an incorrect password was entered for a password protected document, the document has been considered as valid and a fallback attempt to open it as plain text has been made. As a consequence, it could appear that the document succesfully loaded, while just the encrypted unreadable content was shown. A fix has been made to terminate import attempts after entering incorrect password, and now nothing is loaded when a wrong password is entered. * Previously, an improper resource management caused the LibreOffice Calc spreadsheet application to terminate unexpectedly during exit, after the Text Import dialog for CSV (Comma-separated Value) files closed, when accessibility support was enabled. The resource management has been improved, and the described problem no longer occurs.moderateScientific LinuxScientific Linux 7libreoffice-langpack-de-5.0.6.2-5.el7_3.1.x86_64.rpm73afa5e9c2c257427cd548f640f73f80dc860e1e3655fcf5784190570cf4839flibreoffice-langpack-ru-5.0.6.2-5.el7_3.1.x86_64.rpm88ead14d156528a8be795d6eb53b74ec4a343587c2de9ffa3487142eb3b1ee94libreoffice-langpack-cs-5.0.6.2-5.el7_3.1.x86_64.rpm60efbf860212ca0be7dcc1e6e88dc2297ecc13a7aa5cdabcfe0232c6fd61f2c2libreoffice-langpack-el-5.0.6.2-5.el7_3.1.x86_64.rpm0a07c9d889a7dbc36343ef6d1f11a4a17199bcd00e7fe796f04e1a471bcfbb3aautocorr-da-5.0.6.2-5.el7_3.1.noarch.rpmcd18018086dbb678c6432573a0078e93a8a018abbefe610ed10f945b7090d67dlibreoffice-glade-5.0.6.2-5.el7_3.1.x86_64.rpmd79b052ef7175f27a2dea6edc2b15e6106daa55536fcb9941ac7967a85e119c7autocorr-lb-5.0.6.2-5.el7_3.1.noarch.rpmadeaed32e3ffe8011ed5754bf6d9cf0e6836d7169bbb393b3d530ee47c9b6519libreoffice-langpack-kk-5.0.6.2-5.el7_3.1.x86_64.rpmcdf1187843e87b313327f18ea8b3af550c9beec3ba44746722325227442a4fb0autocorr-ko-5.0.6.2-5.el7_3.1.noarch.rpmbea3e06bec0714e6a23546db0ef3731f83ba4583c1251ee042f52261707c2514autocorr-lt-5.0.6.2-5.el7_3.1.noarch.rpm4062b3b1255acb74a3b8973b8ca172e39b6ef11f7425378253908d62e655ea6clibreoffice-langpack-et-5.0.6.2-5.el7_3.1.x86_64.rpm9250f0c020e8df6d2676f2622dc911d4439c0fb8d4fa0ad490355cddfe634a12libreoffice-langpack-lv-5.0.6.2-5.el7_3.1.x86_64.rpm109d0d3247456e942fb363ab1c563ebbc4803f6a44953bb35b0bfa277a8f14bdlibreoffice-langpack-st-5.0.6.2-5.el7_3.1.x86_64.rpmf81c48c411f0584aaf3cdc2a0be6c7d7900459b2587df180637b387226722756autocorr-vi-5.0.6.2-5.el7_3.1.noarch.rpm10ffb017f30cf6ac33b6ae87e965104db71d5779ff9fdf581e224e40132b3647libreoffice-langpack-eu-5.0.6.2-5.el7_3.1.x86_64.rpmdbf1bc866fc05c9b6b84baa1a3fecd04146995a7b42a4f54e1f0799beaf9156dlibreoffice-langpack-nb-5.0.6.2-5.el7_3.1.x86_64.rpm1e2ec49f43d9b0ddeec37012142f0941496beb1c6f7808fff91c48b80c8b70dflibreoffice-langpack-mai-5.0.6.2-5.el7_3.1.x86_64.rpm49cde912a25d367d7555b9d4db341ae8d0a44215e4d6d48c3ca473844f8fe4cblibreoffice-langpack-tn-5.0.6.2-5.el7_3.1.x86_64.rpmd2cf2ebc082165401ccd55118a2b4595c02b29ddf59ba126e4b4a2f1b187c62flibreoffice-langpack-te-5.0.6.2-5.el7_3.1.x86_64.rpm8c58513a5bf39e0d5cfcc50da61f72feac976595a435a95ad6a62ef5a1699eealibreoffice-nlpsolver-5.0.6.2-5.el7_3.1.x86_64.rpm59dae67fdfb8cfb47b4df5cddfe2b2564b1fd1274f386507bf205c8abef4cebflibreoffice-opensymbol-fonts-5.0.6.2-5.el7_3.1.noarch.rpmc1a79ae43d0690888b3ea6cb21656128898bacd32a2dbd22bbe9499060438eeelibreoffice-langpack-bg-5.0.6.2-5.el7_3.1.x86_64.rpme124486c61cee001bab7d7e0bf977414eb5adcf091a956e92b7e81678abd55f4libreoffice-langpack-ve-5.0.6.2-5.el7_3.1.x86_64.rpmf8e297b94515ae4b11ecfd2527e1c5f216adc1ce7e5ebcbaffda9a27ad595453autocorr-fi-5.0.6.2-5.el7_3.1.noarch.rpm83df22436cf3d6f3b01986775d91e7f6843ad96a61193fb880f328d351a20ca0autocorr-ca-5.0.6.2-5.el7_3.1.noarch.rpm188b9375209b995e8cca49aab8c10a2ed7a717ec75ea31a8be8dcd0e867fd58clibreoffice-writer-5.0.6.2-5.el7_3.1.x86_64.rpm323a39343c0142a882775c4122d791a927161430542127527667bc6a2384ab1eautocorr-nl-5.0.6.2-5.el7_3.1.noarch.rpm3144b15aca418058a68935d9b14f6bc295027dcfed6d7eb73e0d6f45695d7f65libreoffice-langpack-lt-5.0.6.2-5.el7_3.1.x86_64.rpm0e362d72ae7192f581a256f63e2cb14c5f4cec55bb5968fb2d03ced157193ff6autocorr-mn-5.0.6.2-5.el7_3.1.noarch.rpma6ca9ad893f7e3eaa094953c5ca0b838a41fee66348a24cf6ac723a925a9cfb7autocorr-hr-5.0.6.2-5.el7_3.1.noarch.rpm6fedfba5ccd4e5e678df36cd3a7d8426322871c942b92748d55181182d2de3delibreoffice-langpack-nr-5.0.6.2-5.el7_3.1.x86_64.rpm3f075e8209b0198aabd3228100188d5045080cfb1bcdbf21050947f536dcd116libreoffice-langpack-ss-5.0.6.2-5.el7_3.1.x86_64.rpmfb1aa1fde890dc87942da4e75956116b88de83de8f4c0d3b4ce47390e709e185libreoffice-langpack-br-5.0.6.2-5.el7_3.1.x86_64.rpm5eb2747d9785a7dc073702e6f73fdbf9ff399a2723cc71a5b1a9b1868be807d0autocorr-is-5.0.6.2-5.el7_3.1.noarch.rpmf9d616b583705aa8db70bc8acc0185191571100ba97ab07d8f03fee56ac7f0cblibreoffice-langpack-ga-5.0.6.2-5.el7_3.1.x86_64.rpmb895636be3a7e6f5e1e5b86d914e57a55537735683548ea0edb64b7a43fa411blibreoffice-langpack-xh-5.0.6.2-5.el7_3.1.x86_64.rpmf7f3b7c93a6dedd2189749565feb4560370d3c70c4ff2e06fb9e5bb8d68972fflibreoffice-draw-5.0.6.2-5.el7_3.1.x86_64.rpme49c14444086fe42c15d4cf1333b4b1bce50810efce15bdfdcc5de8da6dc4b99autocorr-ru-5.0.6.2-5.el7_3.1.noarch.rpma46f17b277caec8d4d0bdbac4f0eacfd1649552f9cc08fc78063adc4ea183baelibreoffice-bsh-5.0.6.2-5.el7_3.1.x86_64.rpm437055ce05a232aa9857b6185c2085bd2e454e3c92a7028b9d6122efe178825alibreoffice-sdk-doc-5.0.6.2-5.el7_3.1.x86_64.rpm95e9ef288ad0195b59490e7af31f861a29732d12a18d94b2a12252dfdeea6cd5autocorr-en-5.0.6.2-5.el7_3.1.noarch.rpm3e2f13dc0685d40fb5c38455409f5b91803f6f8da7187cd960a8d47e01a8b7d4libreoffice-officebean-5.0.6.2-5.el7_3.1.x86_64.rpmc1fb84b982e87e33a79303bcf7e801874d5238e7a0dcf026f60fbece17548011autocorr-ja-5.0.6.2-5.el7_3.1.noarch.rpm6865c2dee19d88a9ccff4e04b0c1b6ae1b0c7213c5ba80bf84d2ba8e2d8d465alibreoffice-langpack-fi-5.0.6.2-5.el7_3.1.x86_64.rpm735d93f31b1be3fedc8671dbc94d65823c9b02a1e50c12327c2f2c1eab80c347autocorr-sv-5.0.6.2-5.el7_3.1.noarch.rpm72f75bb831ecbee653f8bec30609703c6fcc4ad9d091a334bd8b470fdac9f62alibreoffice-langpack-pt-BR-5.0.6.2-5.el7_3.1.x86_64.rpmc22efa738671ff20625803cbcc5ce3b854b4dee8d8d849bc0d100bdedd347564libreoffice-langpack-sv-5.0.6.2-5.el7_3.1.x86_64.rpmec60cd65c274c3c038d327355fd858d1acc0fa97917fee95388701be3314ee83libreoffice-postgresql-5.0.6.2-5.el7_3.1.x86_64.rpmdfa3f5def0bd34392ecf6275e73bace8c29b7ce7a3e38ce5ec45bca197950fe8autocorr-sr-5.0.6.2-5.el7_3.1.noarch.rpmb8f003372f7f377d4a083a13aaacfa07d963644e34ad502175e211c423511adelibreoffice-langpack-zu-5.0.6.2-5.el7_3.1.x86_64.rpme4b7407721b65422d27b7835bb783cdd03e5518a177d855284fd33939acfdd73libreoffice-langpack-ts-5.0.6.2-5.el7_3.1.x86_64.rpm8c583bc41bab9d5e28412027b363ac85efaea468592d86e7db9ffc2aa68f048blibreoffice-langpack-da-5.0.6.2-5.el7_3.1.x86_64.rpmee526164815daf8ee3cb244adf1d519f14a381989436acd191b3c47b0b299665libreoffice-langpack-nl-5.0.6.2-5.el7_3.1.x86_64.rpm32df051363c1c1706c3459bf5533288cd63063e0f73f9e6a33554c16f18dbf99libreoffice-rhino-5.0.6.2-5.el7_3.1.x86_64.rpm7de61507814fe506525108a7fb378eef1d6b87e87f56e68d8639ab9b5d51b670libreoffice-langpack-uk-5.0.6.2-5.el7_3.1.x86_64.rpmc63f8c57531b8d6109b6dee2023fd08543ea7a6c5fea4cf25d70e3c02ab82956libreoffice-langpack-zh-Hant-5.0.6.2-5.el7_3.1.x86_64.rpme45ca88e0639d2aea47cf1aa2ddae9624d7c356cd5a8f36b65988f26e8d0389alibreoffice-langpack-fr-5.0.6.2-5.el7_3.1.x86_64.rpmc5da6f177db5a059ec4566a6651fdbc4498b8a3a249224ee906caac3ffa17bdclibreoffice-langpack-nn-5.0.6.2-5.el7_3.1.x86_64.rpmc97145a81f56cc2c78255700aed82f21e8f9097b01c475935d69b34729738c2alibreoffice-langpack-ja-5.0.6.2-5.el7_3.1.x86_64.rpm073b09ed6edda627da6ae4a734416cfef2007946c19b343e3983705a632bf8b4autocorr-fa-5.0.6.2-5.el7_3.1.noarch.rpm5835c8768c30070dedba3727a0eb1c558340afb884205923ee7c16b7de26cf1clibreoffice-langpack-zh-Hans-5.0.6.2-5.el7_3.1.x86_64.rpm75f30b255b60d89508f840037cf6d60cf21c314bef14d13fa2f96a7001d70a5alibreoffice-langpack-pt-PT-5.0.6.2-5.el7_3.1.x86_64.rpme62174b8efa06d7f4452836622c02d8b8cfbd7acae4643f283cd972a79c7af6flibreoffice-librelogo-5.0.6.2-5.el7_3.1.x86_64.rpm6faf4671fcd54727c494a86759a2d4ed5e2415a0f3b89190da7c6394a8908cc1libreoffice-langpack-ml-5.0.6.2-5.el7_3.1.x86_64.rpm81ea27dacfc8656d0d7cc6954e96a7e8330a85af34d7e8f39fe33846a5e608d2libreoffice-xsltfilter-5.0.6.2-5.el7_3.1.x86_64.rpma4c107b73b741e32182d7cd6ca987b2ed7b20f073cd57b67df527ed8aac1c73cautocorr-hu-5.0.6.2-5.el7_3.1.noarch.rpmccca6e2a45827aff7749b50f078a20730e41ac23094f9ee6425f001d037d8f38autocorr-bg-5.0.6.2-5.el7_3.1.noarch.rpma5dfd1a8c4db8e006c1221dd4b50db2516697d0b4507ec02d38b732592fdb223libreoffice-langpack-ta-5.0.6.2-5.el7_3.1.x86_64.rpm217b38dea03e0fbb68328545b4ca8459a99eab9f12da597ce8c8e2af5fa38beeautocorr-de-5.0.6.2-5.el7_3.1.noarch.rpm1085e8fd0614f1e2e87921fe145b84ee8fc3f00b98d07fc2eba9d37afe89e49aautocorr-ro-5.0.6.2-5.el7_3.1.noarch.rpm7b99cf09870af1d389fa5ad740063f48e001531a1d3ce0a903a3fb794e9a2d88autocorr-zh-5.0.6.2-5.el7_3.1.noarch.rpm936c523b7c75ce7cc3e9b0e3a0f0041d02ed6f4a7cd06e2490ac15883cac44b8libreoffice-langpack-pl-5.0.6.2-5.el7_3.1.x86_64.rpm671f434da060327eae60191f76ca6bfd1f2fd16dcec269e11766574082f26313libreoffice-math-5.0.6.2-5.el7_3.1.x86_64.rpm12a974dbae224b8a7b1c4b69e268550762d9f496f016706929dc22a968925a94autocorr-es-5.0.6.2-5.el7_3.1.noarch.rpmbb6521848b8e94a3559efa4b0990094905e9b27609fc4d532dfc0bb837c3cc7bautocorr-sk-5.0.6.2-5.el7_3.1.noarch.rpmcfb94d13c4d06df2e97426d9ffe377d5bdcaccc34c6bd915705e46523716e6dflibreoffice-langpack-th-5.0.6.2-5.el7_3.1.x86_64.rpm7a9e19369e722ecd8fa8be14297ab1bd1ad63555cb32ee3cb603a369c19e78d4libreoffice-langpack-gl-5.0.6.2-5.el7_3.1.x86_64.rpm417ce3ab7df207ed67f7722b68ad9b2014e9cb091216b7d633042b5bb27896c2libreoffice-5.0.6.2-5.el7_3.1.x86_64.rpm4a7475e18bd75f9c511aafd25940fe2353d477b336950ccf176424ea72c48394autocorr-fr-5.0.6.2-5.el7_3.1.noarch.rpm12e3c962c119852391e8a63b010a221faef5f1d699f2fd122dcde0f88dc2062clibreoffice-langpack-nso-5.0.6.2-5.el7_3.1.x86_64.rpma0e1c292bb0cb6c00edb164c3c98cc485bed4ea22dfc4467e2864183a0069fe1libreoffice-ure-5.0.6.2-5.el7_3.1.i686.rpmf893981d928d1018833a7959d54ecb9f56592df6ba7d938906f08c76a7d56dc2libreoffice-langpack-dz-5.0.6.2-5.el7_3.1.x86_64.rpm7c81ee7bb5bf7fa41a5876195b788dd0d0f48f1980e82ddc890e5f505a3a27b1autocorr-pt-5.0.6.2-5.el7_3.1.noarch.rpm79ea895cbcaacc172301677c893659e052a69dd3bf5a319d55ff38a869e69977libreoffice-langpack-it-5.0.6.2-5.el7_3.1.x86_64.rpmef5a2cb225c76a9423631323962bbecfc9c72791f128f91d4dfb8140127eab92autocorr-af-5.0.6.2-5.el7_3.1.noarch.rpm3fdfae5a5ce276cfe8e5af78136c820568fbdc5f1b7acc33c4f3a759fff645c8libreoffice-langpack-sl-5.0.6.2-5.el7_3.1.x86_64.rpm8e1dcf6ff75879bb6f32f631f3055d280b40b3894296d982cb61cfbd7cf09e9blibreoffice-pyuno-5.0.6.2-5.el7_3.1.x86_64.rpm9493e6136368c13983e8549ee4410c66e6df21df19e27f19fa23a661b448362blibreoffice-base-5.0.6.2-5.el7_3.1.x86_64.rpm81d5498b9abbdce968d17b04b2b0fb90ecd86ae2bee6ccd001f383358b14da46libreoffice-langpack-ar-5.0.6.2-5.el7_3.1.x86_64.rpmf412b63d26e800b9fe446ab3454f6de3d027ec0830a6406fae96c55b6f8ff6a3libreoffice-emailmerge-5.0.6.2-5.el7_3.1.x86_64.rpmb306fb4ba6787862c5b98d3679bf69e1963dd4adf0c35f7fd7e04d56461c8bcclibreoffice-sdk-5.0.6.2-5.el7_3.1.x86_64.rpme7496363c73d517caec8c7f03ae1a692657d7a3204e61b02948dd7dffef568f4libreoffice-impress-5.0.6.2-5.el7_3.1.x86_64.rpmf82bcd97d8870351dafba58cf39626844f41b0476c6a215c9212c91c36ab5878libreoffice-langpack-as-5.0.6.2-5.el7_3.1.x86_64.rpmb7b54d8794221bbb1d6278ac8d07e3f347569b7e9a04c580aa164d1ddc21c12alibreoffice-langpack-or-5.0.6.2-5.el7_3.1.x86_64.rpm705244be10ac9cddf875cb63e625cc4a7c62d9acfc12fd3110e888cc6c616a18libreoffice-graphicfilter-5.0.6.2-5.el7_3.1.x86_64.rpme92b1348c79a322d7d24ea9ee35180baac7408a0925939792e8590099ae32109autocorr-cs-5.0.6.2-5.el7_3.1.noarch.rpmfd09e4adffe8185dc97e14ac7233151af5b4a7d32647fa3883bd8f881e158b3flibreoffice-langpack-kn-5.0.6.2-5.el7_3.1.x86_64.rpm7f2d086ff40a3053ec03e74d6d30f46e671e2a938ed32b7aebf44c2df4117d1blibreoffice-langpack-mr-5.0.6.2-5.el7_3.1.x86_64.rpm7537e24c0635babf670a055467b35624b823df3d4b1b4e412970d2a7ea151840libreoffice-gdb-debug-support-5.0.6.2-5.el7_3.1.x86_64.rpm413aa5f733ad2caa9a4746942f3fc89e116b48404c89d47fba45701197b73c26autocorr-tr-5.0.6.2-5.el7_3.1.noarch.rpm6b60f616d6ddc32a19472dfd705e22dd257a99ebeb2da112e98db17317d421a9libreoffice-langpack-tr-5.0.6.2-5.el7_3.1.x86_64.rpm523323e005d1c0bbdb09678e7e87fff088fb69328c9b13c12e78efae281c9921autocorr-pl-5.0.6.2-5.el7_3.1.noarch.rpm15f26dca4a89a3b92287a710fc878609416ca5f40acae66c9e312bcd26380f2elibreoffice-langpack-ro-5.0.6.2-5.el7_3.1.x86_64.rpmf23a33aeb1d42ef7a1df6a3447068f9e91d7158974e45c5396889015715a6ca4libreoffice-langpack-ca-5.0.6.2-5.el7_3.1.x86_64.rpm290327101c775c2bd0c265d5b105be0d88a998f0dc583eb23e251a9c44716ab1libreoffice-core-5.0.6.2-5.el7_3.1.x86_64.rpmabff4fdd7cb0b6a131943040734a68a80862ec52c057364233cdae91fd589fd7libreoffice-langpack-he-5.0.6.2-5.el7_3.1.x86_64.rpmfa93c72c465b0f42253e973603bcc2ccba7ea39ce61800d91584426b527eaecflibreoffice-langpack-hr-5.0.6.2-5.el7_3.1.x86_64.rpmf15be6acdc9be65138ca255e40ebbec97eef99d26cd059c7e5bd5cc928c43a83autocorr-ga-5.0.6.2-5.el7_3.1.noarch.rpm21d454c8e9b19345e65ffdce1843cab0ea449b20c7362f2a625e5dab68a477f5libreoffice-langpack-gu-5.0.6.2-5.el7_3.1.x86_64.rpm7e3069638b8121135b3885f1fd05677123b5a2c766bef6a566d32c5eed08b8b7libreoffice-langpack-en-5.0.6.2-5.el7_3.1.x86_64.rpmd88381223834f1eb5a89f36c32d04ddf746098246badeda525ea672792693236libreoffice-langpack-es-5.0.6.2-5.el7_3.1.x86_64.rpmde9fd9ec0cccde94bff2b28271c6e931dfa32b7849e407b22c881a7d01cbee79libreoffice-langpack-sr-5.0.6.2-5.el7_3.1.x86_64.rpm04e73d6639cfe207fc9a576b0579a0856a81992031352486a021750f93a94653libreoffice-langpack-pa-5.0.6.2-5.el7_3.1.x86_64.rpm7e3be18a723ba5e84a854fd685c7e34cbe3e9cb23b0de07ffa089324f62bbe04libreoffice-langpack-bn-5.0.6.2-5.el7_3.1.x86_64.rpm891d54fb1341e2b721db52b995e543b6837cda83aa23aa107d0d24493cf40e3alibreoffice-langpack-fa-5.0.6.2-5.el7_3.1.x86_64.rpmd73751403f572ba3563cf4d3e8afffbe9135f6c30569269bc4dec9dbea45bb26libreoffice-langpack-cy-5.0.6.2-5.el7_3.1.x86_64.rpm7266a42adc28e77149b1016eeb311dc9a919efe4939b91fb85fd6e57fafb2050libreoffice-langpack-af-5.0.6.2-5.el7_3.1.x86_64.rpmf2c1a5d924ce7879fbb8ec69351ff7dd74ebdc8fc6a738dde7b330a95265b1f6libreoffice-filters-5.0.6.2-5.el7_3.1.x86_64.rpm20a1ec7681efef6d3c9de20ea80dd62848beed6c914a05cdb06f94e303b552a3libreoffice-ure-5.0.6.2-5.el7_3.1.x86_64.rpm9a7a153e88acd42a76a2bd4380d6347986e3f041ff3e05d4463bae2d1d00320flibreoffice-langpack-hi-5.0.6.2-5.el7_3.1.x86_64.rpmef81fa3dd74413f72cb98278bbfe5ff59acf8ef2a10ea20d3fac379893b82b01libreoffice-langpack-sk-5.0.6.2-5.el7_3.1.x86_64.rpm84e9e34c23ffc0ab080652724727c29ff7304cd1a036a3121b103f62b17add45libreoffice-langpack-hu-5.0.6.2-5.el7_3.1.x86_64.rpm446d00a60c143965bf3d742a3a7900f7ce84427049ff190fd59e26c3121ee0ccautocorr-it-5.0.6.2-5.el7_3.1.noarch.rpm01a40f7cf58530ff8df5144d0184bffbfa2f93c27627e52cfc6aeced0b9ea0e1libreoffice-ogltrans-5.0.6.2-5.el7_3.1.x86_64.rpmcf0deacc8ec9a83341040919ead1e71ca33b106d1292a4d72eed86c184ff99cdlibreoffice-langpack-si-5.0.6.2-5.el7_3.1.x86_64.rpm2f32cb80c79c56561569eb240b6a1b07bbdcaa0f1648ef976d112316f60f66eelibreoffice-langpack-ko-5.0.6.2-5.el7_3.1.x86_64.rpmcb5a432afcab78b5814ac2ac66e61d0c4ef2d3a02f6aa5ffe21094106c10d1c9libreoffice-calc-5.0.6.2-5.el7_3.1.x86_64.rpmbec569515e56692a7623b6c25fa30efdc4b70b4813adc06632cef3c8c16bd956autocorr-sl-5.0.6.2-5.el7_3.1.noarch.rpm3dbed17d953f416f45c85f8bb656ba059e70ba688ba79ec1e28cbee80ef866d0libreoffice-wiki-publisher-5.0.6.2-5.el7_3.1.x86_64.rpm430e55ec87cd1031216203ca7f1269a679e97ab7bbda1cd91b552fbeada927d7libreoffice-pdfimport-5.0.6.2-5.el7_3.1.x86_64.rpme8936ef6084fd963df8eb5cc9af7311973ef53f14ebc0d4f6952c1370a2e7283SLSA-2017:0920-1389-Ds-BaseSecurity Fix(es): * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Bug Fix(es): * Previously, when adding a filtered role definition that uses the "nsrole" virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. * In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly.importantScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.5.10-20.el7_3.x86_64.rpm4aacb145e315ffd65340d5c34c1303ba7394194d9949adba575bddad869936bc389-ds-base-1.3.5.10-20.el7_3.x86_64.rpm195c8d7eba97284eb6d7574f19089608281e98a2df34e148116ac49b7cb360c6389-ds-base-devel-1.3.5.10-20.el7_3.x86_64.rpmf5b90a137d7cda665e46b5dd2d352ef3d0391155682c9492f29186b8d24f2473389-ds-base-libs-1.3.5.10-20.el7_3.x86_64.rpm258f52af6eaffcbe8577d66c94dd3d2842e7d0ad8affbdd915e845bf0228adf6SLSA-2017:0933-1KernelSecurity Fix(es): * A race condition flaw was found in the N_HLDC Linux kernel driver when accessing n_hdlc.tbuf list that can lead to double free. A local, unprivileged user able to set the HDLC line discipline on the tty device could use this flaw to increase their privileges on the system. (CVE-2017-2636, Important) * A flaw was found in the Linux kernel key management subsystem in which a local attacker could crash the kernel or corrupt the stack and additional memory (denial of service) by supplying a specially crafted RSA key. This flaw panics the machine during the verification of the RSA key. (CVE-2016-8650, Moderate) * A flaw was found in the Linux kernel's implementation of setsockopt for the SO_{SND|RCV}BUFFORCE setsockopt() system call. Users with non- namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. This could adversely affect memory allocations and create situations where the system could crash or cause memory corruption. (CVE-2016-9793, Moderate) * A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory. (CVE-2017-2618, Moderate)importantScientific LinuxScientific Linux 7kernel-tools-libs-3.10.0-514.16.1.el7.x86_64.rpm7ce12b4e5798bda9b8d3d511f782f39ef350cf7150be6d148f7eae44077c1f00python-perf-3.10.0-514.16.1.el7.x86_64.rpmc645dd810bdcd6a9f02123945f4bcda63b5cf898ac892293a6a290e560288a32kernel-devel-3.10.0-514.16.1.el7.x86_64.rpmeb4c14d6fb4230e8f928b3c65a030d8e70565f74adaaf029237824aff19404d3kernel-3.10.0-514.16.1.el7.x86_64.rpm17b4419673c90af0d1a478b4f7735d365bb0f18356e205f425a76282cdc8c261kernel-headers-3.10.0-514.16.1.el7.x86_64.rpm40b02e70df87bd4e734b48cf09fb940ba0066242431ef6a02e7162ce3976c340perf-3.10.0-514.16.1.el7.x86_64.rpm617edfa42981b365efaa34b21529753fa7ef8feb9a7a15af725e135b1a286b6akernel-debug-devel-3.10.0-514.16.1.el7.x86_64.rpm1e78e42bb872b16ae29d05346f27b2a814e6f8fe20f672811f0cc0fe4036558ekernel-tools-libs-devel-3.10.0-514.16.1.el7.x86_64.rpm53efdceacf601b7e320d9a5a9b79673c358970dd09711578acb2ba95c18d6571kernel-tools-3.10.0-514.16.1.el7.x86_64.rpm646db0dfa033051126daef925a0146a7f7a5ae9eabed0c52b4883e97bc95e43bkernel-abi-whitelists-3.10.0-514.16.1.el7.noarch.rpm9bdcf38b63e8148221d98fc77c78c42d6216ef7c314db603b80e242755f53d82kernel-debug-3.10.0-514.16.1.el7.x86_64.rpm65ebee0466b48d9dad13a2bbbc217109501328b48b74b6d3321632b65034c51fkernel-doc-3.10.0-514.16.1.el7.noarch.rpma3965f16ef87695b7caaaeeb570b750901365157316bd3ddd5817f5cac6487b5SLSA-2017:0935-1TomcatSecurity Fix(es): * It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816) Note: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded. * A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)moderateScientific LinuxScientific Linux 7tomcat-webapps-7.0.69-11.el7_3.noarch.rpm3dc7e91c6d5d68054cc0e0a4855a0c96a08871b79fd31a9cbf567dca3ec14805tomcat-admin-webapps-7.0.69-11.el7_3.noarch.rpmf155d4dfc266ffacdb668e49cde7b1ff847e15853184235b0bdff8de6777896etomcat-lib-7.0.69-11.el7_3.noarch.rpm81616cba12d5aeaae21107fd1f096b20d0eae6e475d69a3ca6f2fe122ff4c5eftomcat-javadoc-7.0.69-11.el7_3.noarch.rpm2996eb19e6ac64e720da318126a279c6074205a9ead663460c912850da87229btomcat-docs-webapp-7.0.69-11.el7_3.noarch.rpm0e9bf12168c4aa41fb875a5410934b3fbae6491ca3f4fd3cf3acc39a10fbc5e4tomcat-7.0.69-11.el7_3.noarch.rpm167673c479d8e7c4360367980426e5097ff1e95bf5460547b25cdb1958802d0ctomcat-jsp-2.2-api-7.0.69-11.el7_3.noarch.rpmca142ccaea7aaaa1fda2db874efbcfb08490225364e7444382a48f5158730e65tomcat-el-2.2-api-7.0.69-11.el7_3.noarch.rpmadd19d15771cfd524d6f5bbac5861ead5371a8b9cb6fd451049c25f5a535aba3tomcat-jsvc-7.0.69-11.el7_3.noarch.rpme2c854cb8483c1acbf1ece3c0c2fe9eec4542fcf2e6891c2dc3d358a5ed916c1tomcat-servlet-3.0-api-7.0.69-11.el7_3.noarch.rpm318c3c0193c25f159523e7559bd730a43e40857d31c5a217b2646bb7f2bc48c3SLSA-2017:0987-1Qemu-KvmSecurity Fix(es): * A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. (CVE-2016-9603)importantScientific LinuxScientific Linux 7qemu-kvm-1.5.3-126.el7_3.6.x86_64.rpm9856e5003f6a1d75de7a240826f4f475b9684fb02a467ae44c4e565d3c425d58qemu-kvm-tools-1.5.3-126.el7_3.6.x86_64.rpmdfef6cd472181a4f2b4b1f69a6a0a25e3884019d8ff2817bd4e878e3f7f881d7qemu-kvm-common-1.5.3-126.el7_3.6.x86_64.rpmd008a571a975c2af53fb400d4a3ca4e2dd6b2ae24bcc6492fa205376cd28f21cqemu-img-1.5.3-126.el7_3.6.x86_64.rpm91b268c7e278fd9ee0f2b0a53f5182e825e7c1af0529dc1a53e816637074822bSLSA-2017:1095-1BindSecurity Fix(es): * A denial of service flaw was found in the way BIND handled a query response containing CNAME or DNAME resource records in an unusual order. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3137) * A denial of service flaw was found in the way BIND handled query requests when using DNS64 with "break-dnssec yes" option. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3136)importantScientific LinuxScientific Linux 7bind-pkcs11-devel-9.9.4-38.el7_3.3.i686.rpmb4aa9526f1b199d58f2f0388c587a3890c225f20a8e547c4852f85fe5eb1ef53bind-libs-9.9.4-38.el7_3.3.i686.rpma8c51a2f6c4d0f06392e52ae72bf14ca1e038e6693d82893f5e0fcec7a54f2f1bind-pkcs11-utils-9.9.4-38.el7_3.3.x86_64.rpme5a6237cd5a945ceea745f13462c9320010d024969c4cbccf13c2ecf8d02485ebind-libs-lite-9.9.4-38.el7_3.3.x86_64.rpm5cbc07cea12e78fd027dffa8d4b381eda72474550cb3c19dc07a94fc80f3c719bind-pkcs11-9.9.4-38.el7_3.3.x86_64.rpmcb39979ec6932df434a2c762f93fee1b4c5a9c722efeff889f17b8edb91f6985bind-license-9.9.4-38.el7_3.3.noarch.rpm03a4389f1856c7441eb961919935f9e88fccd17d1ad40b6bc933163b8da95bb8bind-lite-devel-9.9.4-38.el7_3.3.x86_64.rpm17169f1ef6ec3f4fe599b157b618ef07424d49ac66296c9301c8c2d14d61cb4cbind-pkcs11-devel-9.9.4-38.el7_3.3.x86_64.rpmabab66c07eed8344d49c30081cddd3067f436ca746cb472bab11633f6d6eda19bind-devel-9.9.4-38.el7_3.3.x86_64.rpmea0b27a16471355b68bf91cfd713d042075bc2ecdd7c2fe480592fc1c0518134bind-libs-9.9.4-38.el7_3.3.x86_64.rpm197952cbb78a3fe7bbb1f201392769e79170c4333dd132a93dbf9f291664a6fbbind-chroot-9.9.4-38.el7_3.3.x86_64.rpmc9a9b647688d6cc18cd6218553ac4a4061fa6fbc5527d6e3479af7b0d964f882bind-pkcs11-libs-9.9.4-38.el7_3.3.x86_64.rpmfcaad4d932d34bc44056e7dc19d7c617edf3ac724594c3cb68bdc2e6d82412febind-sdb-9.9.4-38.el7_3.3.x86_64.rpm1a29b7c1ab3e16d512368b20f347b69125e53ed5e24181f25552a99c17fda347bind-9.9.4-38.el7_3.3.x86_64.rpmf88830cad506933672d57d5f5061063c82aea1636e9157e13533310d800818fdbind-sdb-chroot-9.9.4-38.el7_3.3.x86_64.rpmb40502fc3d5dc630f421d70c4f6924002891c8d0cc39f0721352dadfbd89dd31bind-libs-lite-9.9.4-38.el7_3.3.i686.rpmb171446335ed8f949df04e71009e614fabd6bf07ce717f5892a094c4f1e61d0dbind-utils-9.9.4-38.el7_3.3.x86_64.rpm5504049b81f223dcaad54c778b64e13e6abb16f3f9e11a7674e9360f4755835fbind-lite-devel-9.9.4-38.el7_3.3.i686.rpm7f70a7cddef61c4280e0f431235fc4f9893faa7739ef5bf821f0685eaa52dad3bind-devel-9.9.4-38.el7_3.3.i686.rpm67563c686ea1f755b50ad571a94e65960b2408cf8f2c6f59fd870e6d4a83c34fbind-pkcs11-libs-9.9.4-38.el7_3.3.i686.rpm38559787b9de2f82d75943e10228c1d809b74ca9644eeb37cc0dd26f5f7bf858SLSA-2017:1100-1Nss And Nss-UtilThe nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. The following packages have been upgraded to a newer upstream version: nss (3.28.4), nss-util (3.28.4). Security Fix(es): * An out-of-bounds write flaw was found in the way NSS performed certain Base64-decoding operations. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2017-5461)criticalScientific LinuxScientific Linux 7nss-devel-3.28.4-1.0.el7_3.x86_64.rpme6f46ad54323380f3fe58ca461818b2f2b59119eded5952f32b888d77d13b102nss-devel-3.28.4-1.0.el7_3.i686.rpm880849a06711abf3141e3b89741f4abc0b0b05389a45fc49b60e77dbcdc102eanss-util-3.28.4-1.0.el7_3.x86_64.rpmaf814dfbebb631258af1ec80847365670818673c036e3c39820a5601806be7e7nss-pkcs11-devel-3.28.4-1.0.el7_3.x86_64.rpmc7a4f70b25ee16b22df249a536e69bf8bee43b3e55f8d7fdbbb2bab9b2698150nss-tools-3.28.4-1.0.el7_3.x86_64.rpmefbcf4cf71ef109b8d0107ceb6093a4cf55059e01c7f0f073585e84cc187caa1nss-3.28.4-1.0.el7_3.i686.rpm7d9ee96dcf6f74734201296cdd30610e0f2662bdb239b672da5ee34a3e56003cnss-util-devel-3.28.4-1.0.el7_3.i686.rpm113be40aef07464e26d29d55e6d84affae94c0d8255d88adac4b7d1418c37843nss-pkcs11-devel-3.28.4-1.0.el7_3.i686.rpmd9d1045bfe23b8b7163f82d5148e660b20e45f452d10cdc97f41692c819d0c65nss-3.28.4-1.0.el7_3.x86_64.rpm479eefc16f6ed8e7fa0546f22bf50763696716a14a1cc9f3d4699d3b31e105a3nss-sysinit-3.28.4-1.0.el7_3.x86_64.rpm3663acbeb0ccb6036a33997b6d4de0c6fdc2bdc58dbda345aed918fa680645fanss-util-devel-3.28.4-1.0.el7_3.x86_64.rpm295a133520a9d3adfc417edbbf46914dca0d7c74ad8751c127db2bdfa844d738nss-util-3.28.4-1.0.el7_3.i686.rpm5a7e7d2a4b382a894f93991ac04b7c915c2ada3cce0704e390def7c5d6d9483dSLSA-2017:1106-1FirefoxThis update upgrades Firefox to version 52.1.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5429, CVE-2017-5430, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5437, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5448, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454, CVE-2017-5455, CVE-2017-5456, CVE-2017-5459, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5466, CVE-2017-5467, CVE-2017-5469)criticalScientific LinuxScientific Linux 7firefox-52.1.0-2.el7_3.x86_64.rpm4680809dafd2c54223cff7894d60cfdfc07142de68d714d2519ff1ecb8dbf129firefox-52.1.0-2.el7_3.i686.rpmb38106e785263d56d281e274abb612fae3e7e1b4ebe63b061567a5fd1a503a1cSLSA-2017:1108-1Java-1.8.0-OpenjdkSecurity Fix(es): * An untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. (CVE-2017-3511) * It was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. (CVE-2017-3526) * It was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. (CVE-2017-3509) Note: This update adds support for the "jdk.ntlm.cache" system property which, when set to false, prevents caching of NTLM connections and authentications and hence prevents this issue. However, caching remains enabled by default. * It was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2017-3539) Note: This updates extends the fix for CVE-2016-5542 released as part of the SLSA-2016:2079 erratum to no longer allow the MD5 hash algorithm during the Jar integrity verification by adding it to the jdk.jar.disabledAlgorithms security property. * Newline injection flaws were discovered in FTP and SMTP client implementations in the Networking component in OpenJDK. A remote attacker could possibly use these flaws to manipulate FTP or SMTP connections established by a Java application. (CVE-2017-3533, CVE-2017-3544) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. Bug Fix(es): * When a method is called using the Java Debug Wire Protocol (JDWP) "invokeMethod" command in a target Java virtual machine, JDWP creates global references for every Object that is implied in the method invocation, as well as for the returned argument of the reference type. Previously, the global references created for such arguments were not collected (deallocated) by the garbage collector after "invokeMethod" finished. This consequently caused memory leaks, and because references to such objects were never released, the debugged application could be terminated with an Out of Memory error. This bug has been fixed, and the described problem no longer occurs.moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-demo-1.8.0.131-2.b11.el7_3.x86_64.rpma9840d0dac19d58f90310da1852c362d736167eb68895a1a73273fc11c98a06fjava-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3.i686.rpm33d7f61c90fe1e7552db5ccbfad8bb379d4bfa49e858b6c981af02a54c2f444ejava-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm5228b64a1962a7eff068d080d65ab2b7cfe4a3de852637fab543c86ad53f8dc6java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3.i686.rpma37f09f33bea242c4098bb99b0ff43b0dfa53e27f3b92f000306a10b0518f291java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.el7_3.noarch.rpme832fb7d0ea3fb48c51d38ca42a1a34b40dfbee56bfb10c9f19102b41c1de289java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3.i686.rpm3117afb12c614a7e1f80212c8d4c8c735aa3e5013d3a6e6e184b8edb35672256java-1.8.0-openjdk-src-1.8.0.131-2.b11.el7_3.x86_64.rpm82005e9c79a6e0aade2aebf804858a1271a6577edcde68c10ddddfaa8d94f4a3java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3.x86_64.rpm5d11b75a7f047ae611d1159fac4663c4229b5af16f93724a252bc78444b9d05fjava-1.8.0-openjdk-accessibility-1.8.0.131-2.b11.el7_3.x86_64.rpm1f4a4ce3d4678cc8769cb05bc88f1f7deeda21ba353bf2fa065b15c06c3d7066java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3.i686.rpmdb5f616fcaee3af784de2656f1e406cb816e71a54bb196ad9f798617c3f78c95java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3.i686.rpmef51ecbe600c59ae4c1ba2edd5b92f62dd5118e70a2b93b0fd29f42826fafedcjava-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm745668b7ca934f1efc7f66c58f865091e3770fba8b4db93e8cf28c71830a03b2java-1.8.0-openjdk-src-debug-1.8.0.131-2.b11.el7_3.x86_64.rpma5d63bfc7b1bcd0e276ae48f30f2c07862f732bde3d582b1e8762de78117c1d7java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.x86_64.rpm3686ebdbee5fd064e23e51418d91e28115c8c721bce0201ecbaba2a0ad3fa018java-1.8.0-openjdk-accessibility-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm0343ef921f93a12e28d5bb79a17cc26fc03e86227a1e09ad78a006a9a7ef3ce7java-1.8.0-openjdk-demo-debug-1.8.0.131-2.b11.el7_3.x86_64.rpmd402cee72cfcf4dd5d3ce15ed571b58b79b5e1c737bb04d80925ddfa4fad69c6java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.131-2.b11.el7_3.noarch.rpm2931e4ccc15e9e2f482c6e1b7295e619dfbe591fca969188364ad261ae8151ddjava-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.i686.rpmc8f627b4a98855eeabcf7c48495629100fdf33f30dc78525e2f63f9e9d26e689java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.el7_3.noarch.rpm4059c29398085c958c4bf01a79ef17441aa74869994e5fab0fd3788ffc7c611bjava-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3.x86_64.rpm3c0276c00d66bb8b931d7652ea4df8be157c6306b472d41a3bb1b525cc7be9cfjava-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm692a2ab8f15edddbd53e1200872d272e1011ea7123a5708fcfd3030df5863a59java-1.8.0-openjdk-javadoc-debug-1.8.0.131-2.b11.el7_3.noarch.rpm35df27fd9fd66b32a1c2dd440ce414fc65e87ad9daef3dc3b8151800896ec1bfSLSA-2017:1201-1ThunderbirdThis update upgrades Thunderbird to version 52.1.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5429, CVE-2017-5433, CVE-2017-5435, CVE-2017-5436, CVE-2017-5459, CVE-2017-5466, CVE-2017-5432, CVE-2017-5434, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5446, CVE-2017-5447, CVE-2017-5454, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5469, CVE-2016-10195, CVE-2016-10196, CVE-2017-5445, CVE-2017-5449, CVE-2017-5451, CVE-2017-5467, CVE-2016-10197)importantScientific LinuxScientific Linux 7thunderbird-52.1.0-1.el7_3.x86_64.rpm3fbda790bd40f46f879c286102a8ee644b342e3272ad3e722f1adc837b40bb26SLSA-2017:1204-1Java-1.7.0-OpenjdkSecurity Fix(es): * An untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. (CVE-2017-3511) * It was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. (CVE-2017-3526) * It was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. (CVE-2017-3509) Note: This update adds support for the "jdk.ntlm.cache" system property which, when set to false, prevents caching of NTLM connections and authentications and hence prevents this issue. However, caching remains enabled by default. * It was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2017-3539) Note: This updates extends the fix for CVE-2016-5542 released as part of the SLSA-2016:2658 erratum to no longer allow the MD5 hash algorithm during the Jar integrity verification by adding it to the jdk.jar.disabledAlgorithms security property. * Newline injection flaws were discovered in FTP and SMTP client implementations in the Networking component in OpenJDK. A remote attacker could possibly use these flaws to manipulate FTP or SMTP connections established by a Java application. (CVE-2017-3533, CVE-2017-3544)moderateScientific LinuxScientific Linux 7java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el7_3.x86_64.rpma9a3056ffdcd727eb28229b883d24477f23d2bfe65d8d070feafbfb4ac5016f9java-1.7.0-openjdk-accessibility-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm73dbddb2bb40b4046c2ed14b8a2457a77234bd5e2de9561bb345c65c5ff4cbbdjava-1.7.0-openjdk-headless-1.7.0.141-2.6.10.1.el7_3.x86_64.rpmabd9926c97fb180c271256bcb1291a368cba524ede8338a8af9ebb29ca5f42c7java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm49a9a347f360906df86767dec548fcb9e2635c33bad5205315a41591ad347e56java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el7_3.noarch.rpm7ee184333a194bb985dc81d485ed119c94c1fcf637868a85fe5915704f9cd0a2java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm2936e5fd4716eea354e8201c72b1a484239e1bbbdb829decae18679db59ea06fjava-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm854dfd6b200fe2bd169f0eb02a182fcae20980e1d9f23953cd0070cfa61978a8SLSA-2017:1208-1JasperSecurity Fix(es): Multiple flaws were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2016-8654, CVE-2016-9560, CVE-2016-10249, CVE-2015-5203, CVE-2015-5221, CVE-2016-1577, CVE-2016-8690, CVE-2016-8693, CVE-2016-8884, CVE-2016-8885, CVE-2016-9262, CVE-2016-9591) Multiple flaws were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash. (CVE-2016-1867, CVE-2016-2089, CVE-2016-2116, CVE-2016-8691, CVE-2016-8692, CVE-2016-8883, CVE-2016-9387, CVE-2016-9388, CVE-2016-9389, CVE-2016-9390, CVE-2016-9391, CVE-2016-9392, CVE-2016-9393, CVE-2016-9394, CVE-2016-9583, CVE-2016-9600, CVE-2016-10248, CVE-2016-10251)importantScientific LinuxScientific Linux 7jasper-devel-1.900.1-30.el7_3.x86_64.rpmb2383dc7b72b2d84fc34baebe654aa6f8e40ef27db419f96764bdff5a279ebbbjasper-utils-1.900.1-30.el7_3.x86_64.rpm89958a055175f696043917ce90431df8162c1dc3b2543189d46eb3729595ec7fjasper-1.900.1-30.el7_3.x86_64.rpm9696d3279493c737f75c366276826f9c86d8ac527df01fa26d75817920c9bc2bjasper-libs-1.900.1-30.el7_3.i686.rpm2048af8ff090bd7eb5293209cc72cf0385a73e9380a31535369d2c4337f036bfjasper-devel-1.900.1-30.el7_3.i686.rpmd2a248dc31006b4b6b2ec7a670e717b5291011a5989999cfd0268d4d3b27bb5cjasper-libs-1.900.1-30.el7_3.x86_64.rpm4ab994bfc3cc70eb1713c2eb254539ccf3e4ae832e14deddd9460609a23eefe0SLSA-2017:1230-1GhostscriptSecurity Fix(es): * It was found that ghostscript did not properly validate the parameters passed to the .rsdparams and .eqproc functions. During its execution, a specially crafted PostScript document could execute code in the context of the ghostscript process, bypassing the -dSAFER protection. (CVE-2017-8291)importantScientific LinuxScientific Linux 7ghostscript-doc-9.07-20.el7_3.5.noarch.rpm02d6c1130932298a285178204d3997a25d2454da9c40bff99c6eb394af86795fghostscript-cups-9.07-20.el7_3.5.x86_64.rpm169891555d7400babfe3db5040d739269cc881379a6869f46438e5f0b31377e1ghostscript-devel-9.07-20.el7_3.5.x86_64.rpm3874cd0fc3578d9349aa746f7699b2398dc674754525d009fc0477f619bbb0f0ghostscript-9.07-20.el7_3.5.x86_64.rpm264ff0af40f90443462cdab4d2bfa8f7e4cb889935b960cbb054408b400543cfghostscript-9.07-20.el7_3.5.i686.rpm5928356b981ba2a60e0590061ea9bb5c5221e397a5aaea6d5b28dfa3ac694211ghostscript-gtk-9.07-20.el7_3.5.x86_64.rpm6c6f217e44dbb5a47288d1fff661e6601a544c178ef16c11912ead83472faf62ghostscript-devel-9.07-20.el7_3.5.i686.rpm39409ab5e7d0ce7a3d46deac26a49e42c6db0a5fcd616b9ab311e7bcfdc7f095SLSA-2017:1262-1RpcbindSecurity Fix(es): * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)importantScientific LinuxScientific Linux 7rpcbind-0.2.0-38.el7_3.x86_64.rpm907f0b3ac6b2fe253b98209268f559583771fe67ae7972f00855eed0c8700263SLSA-2017:1263-1LibtirpcSecurity Fix(es): * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)importantScientific LinuxScientific Linux 7libtirpc-0.2.4-0.8.el7_3.i686.rpm3a23b2d2454ac7c4060beff45a6fc7b3497db26ca28f9cf19d62c41c834bac64libtirpc-devel-0.2.4-0.8.el7_3.i686.rpmc2001f94e692581a097067b924ff4b4d494bd0ad83e624647a5ccd378912250clibtirpc-0.2.4-0.8.el7_3.x86_64.rpm781c842cd793bead379be8240f7daf8159186b5178e9036ce93480125952c66blibtirpc-devel-0.2.4-0.8.el7_3.x86_64.rpmb8c25b44e6925ddf19ae3f107fe581452e8681d5a9411c28ad067d79a22a2f47SLSA-2017:1264-1KdelibsSecurity Fix(es): * A privilege escalation flaw was found in the way kdelibs handled D-Bus messages. A local user could potentially use this flaw to gain root privileges by spoofing a callerID and leveraging a privileged helper application. (CVE-2017-8422)importantScientific LinuxScientific Linux 7kdelibs-ktexteditor-4.14.8-6.el7_3.x86_64.rpmbefd0fc022b4a3475b1177b4b2fbbe20f4ec5b164927b217bcc7a1d15ed5a13akdelibs-apidocs-4.14.8-6.el7_3.noarch.rpm97d5d155334178a9c2b1d5f22c1b88fd95ad9090557e860feab83610932061d1kdelibs-4.14.8-6.el7_3.i686.rpmcfd8cd690c4f7f4bfee02d8faf90acdfe02834f3499148bc722055fa7ba5ec39kdelibs-4.14.8-6.el7_3.x86_64.rpm72b8217d05f66a5e6cac687e836eeee74fecdd19b776bc0c2146b0cfe353e3e7kdelibs-devel-4.14.8-6.el7_3.i686.rpm779ca6766a399158d399516ed12eef7c9d72a437f6b0df884174db02244b7e2fkdelibs-ktexteditor-4.14.8-6.el7_3.i686.rpm9197b9d460bb93cca6a376ec926c95126139e61696dc384df78ee3b47cfac21bkdelibs-common-4.14.8-6.el7_3.x86_64.rpmb922156bb53038c4fcf942643d52ea3d279dd3d0d17f62d383153a74cab137dbkdelibs-devel-4.14.8-6.el7_3.x86_64.rpmb91acdb10cf6d973866bdd7a5ea6862e2904b3067a82eabb3ce52530598b3668SLSA-2017:1265-1SambaSecurity Fix(es): * It was found that Samba always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. (CVE-2016-2125) * A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process. (CVE-2016-2126) * A race condition was found in samba server. A malicious samba client could use this flaw to access files and directories, in areas of the server file system not exported under the share definitions. (CVE-2017-2619)moderateScientific LinuxScientific Linux 7samba-client-libs-4.4.4-13.el7_3.x86_64.rpmafac801e4d7a4c55c2ba890c745cbe02d4b2e2923ac40f7d308145f3a3a17255samba-dc-4.4.4-13.el7_3.x86_64.rpm55ac8cca10dfaeec6a5665d4b22a890da53ce6b35b38dc6dab113d138fa76eadlibwbclient-4.4.4-13.el7_3.i686.rpm66333aac385ef80638f0a1abc0244273f3b7e85bcf3f5ea014b61c127107a6c9libsmbclient-devel-4.4.4-13.el7_3.x86_64.rpmdfa4cf2ef813664225cd99be6892a9f764b841994055120a5741eedd78ed5d7csamba-test-4.4.4-13.el7_3.x86_64.rpm605589db6c5ccebb1488d0fe408151cfa47241776b41d7e25ad9719971493203libwbclient-devel-4.4.4-13.el7_3.x86_64.rpm8d0e00a6174482ffc626811389d2ba02490624f64606daf3782c7d124960745fsamba-krb5-printing-4.4.4-13.el7_3.x86_64.rpm8a9963b3599c8955f7d5f529549623063a0994d0d29e84f4d36992f2843fdd12samba-libs-4.4.4-13.el7_3.i686.rpme1722477dc9c531a9a1c09a48d387148fddf882a61f2376e931796fa4c7a22c0samba-test-libs-4.4.4-13.el7_3.i686.rpmb895ec728f1e829b9ae8da75d225952164bdb044225b7619d6df0bfd5a4a48dfsamba-pidl-4.4.4-13.el7_3.noarch.rpme506476f358d8a1558241c04c115159813ea196201ad40d73dc44cfc7d32996bsamba-test-libs-4.4.4-13.el7_3.x86_64.rpm0633b7c8fb7ca9f016c8721dd91559bf8ead7e02e61abec2c5d28f1655d69f92samba-4.4.4-13.el7_3.x86_64.rpmfe238709900120e113c4c26197adf257b172a717a8113437a1ddd9602d45c518samba-common-4.4.4-13.el7_3.noarch.rpm3fab77c1b6c21a376bed0988ab464c42c2640d0c62557525559758b7023643c6libsmbclient-4.4.4-13.el7_3.x86_64.rpm9788d8451b6dc3d4a08686f34fe4d685fcedf100ab95d61c8a856de9878f5d4dsamba-libs-4.4.4-13.el7_3.x86_64.rpm1c92210c82cc72d185d9dc526081486e8317bcebf232bae5a4ee712ec6c3b9a9samba-winbind-clients-4.4.4-13.el7_3.x86_64.rpm6299409f63e2e2c3d80f190070f58e69e5f412b1556eb1be47e6bbab9e7c1c94samba-winbind-modules-4.4.4-13.el7_3.i686.rpm95ce8dffce0e5c5a5992f2eba4145ee2ff0c2404e9ae98c0c0c684e59f2cafc5samba-client-4.4.4-13.el7_3.x86_64.rpme430437e2b96c189c85f7f83dfa74b8509f117862346a4902e6c9859e8d3858esamba-python-4.4.4-13.el7_3.x86_64.rpm9c79a8883ee2cff80ab548fd885be2b04e1d98f3421e0c5ea32721b9f79d4fbdsamba-winbind-krb5-locator-4.4.4-13.el7_3.x86_64.rpm1c85470bb4029af728ece4745f00953cc05141a95a9ea7ca8e46023226928febsamba-devel-4.4.4-13.el7_3.x86_64.rpm556ed7bb28ff4e84b7c51fb9488b1474dc11a9e80eb9b0f4818e69fa80d96cc6samba-devel-4.4.4-13.el7_3.i686.rpm3618b44a1b9aaec7a8da5efea0e865f3606a596f9e2ed5005509d7b9afabd0bfsamba-winbind-4.4.4-13.el7_3.x86_64.rpme7cc8bfed9f34819d72b7271fac6ad7bf9349ae92a56a94d16b5b17ea463de72libsmbclient-4.4.4-13.el7_3.i686.rpmbf1082dbc6661b648046749fc0f1758f04648c6c149ac3341a9bbeae4bb69975samba-vfs-glusterfs-4.4.4-13.el7_3.x86_64.rpm0c4e1a4690ed86892c90f89f797489aaa9939c2d5397785964a86eb67f7a394elibwbclient-4.4.4-13.el7_3.x86_64.rpm78d0da4a1526388208ec472bafec5107de7fad13c9f35c825d73c8300cc67f1clibsmbclient-devel-4.4.4-13.el7_3.i686.rpmd7fdfeecefb4b94c189f03b61a695e75f47647d0622fb084007f60f3d87aad77samba-common-libs-4.4.4-13.el7_3.x86_64.rpm77f7832ef17ac0d700b615b26f11929e70be44b5e51951aec182706276ee4727libwbclient-devel-4.4.4-13.el7_3.i686.rpma1f3ec2e2a6d7c33d4cb6e36060310d4a33108a7d09689158727b7a4f53244ccsamba-winbind-modules-4.4.4-13.el7_3.x86_64.rpme30c9fda76255286a3b7526b4135089db3b2a7f3c36e3f3610d7aae1d1b6158csamba-dc-libs-4.4.4-13.el7_3.x86_64.rpmdedeea4b6a60bf919c0c171a02ace75757c6f4f8f064159097950d6fff44a954ctdb-tests-4.4.4-13.el7_3.x86_64.rpmfe15b8034fff89c9d3db3d99a3b2834676b1206225d499135400034875851765ctdb-4.4.4-13.el7_3.x86_64.rpm1dfca464d032ca51de481c76d14dd17bf9ea059d7ad05c0021b95039ce2b3684samba-common-tools-4.4.4-13.el7_3.x86_64.rpmc4049833ae57298b2f6a70b4b30d625fbe1d3249f657268fc0772254857d02e0samba-client-libs-4.4.4-13.el7_3.i686.rpmb0dbe5db8a02303b5c23ea021fe3d61f138d5d324ade88b4313cd43b398d5310SLSA-2017:1270-1SambaSecurity Fix(es): * A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. (CVE-2017-7494)importantScientific LinuxScientific Linux 7samba-test-libs-4.4.4-14.el7_3.x86_64.rpm1276adae6c587839afcaf6a1fb4cc8edb20980b855928b10d780e62110b41555samba-4.4.4-14.el7_3.x86_64.rpmd0f6e82d4d9d000cb486c5457ea01b819b588d4630aa6ee0d22ca8e4b4267d6fsamba-dc-libs-4.4.4-14.el7_3.x86_64.rpm3eca03254d0e5c08be6b9166f130716d4f9cde6d58da984dedaeda248181e5e8samba-vfs-glusterfs-4.4.4-14.el7_3.x86_64.rpme95615b6b870f47cceeecd3840862a6a4dfc409a9e0b3c9d12547f241ccf4245libsmbclient-devel-4.4.4-14.el7_3.x86_64.rpme2123b5d2910631f8b856584c32f4288abe03107bc48ef50822fae966e25b20esamba-common-4.4.4-14.el7_3.noarch.rpm7e3924e1073d4dcbe4f39e8dbd4e738929a041dbc783bdb02f8272bbb88d7976samba-dc-4.4.4-14.el7_3.x86_64.rpm48274f1b6577a27920404383af64ee33ca59dd11b2c5a414fffe75d88fefd775libwbclient-4.4.4-14.el7_3.i686.rpm1e6fcefd49b9caab4bb424a9baaf0a257ab4610f8bdfce90e28cad0e1872fd36samba-client-libs-4.4.4-14.el7_3.i686.rpmec826f9b3377031d1317d9bb699d6f577a5a073634d395a9ab2338e84951138esamba-python-4.4.4-14.el7_3.x86_64.rpm79ccb62c32582dcdfa654c748667faf1b540e7375a1eb53b91eb04376df657f9samba-winbind-modules-4.4.4-14.el7_3.x86_64.rpmf645bc2473bfb05ccd47db8cb517cc323889bd420713606d2eba2774b684704csamba-devel-4.4.4-14.el7_3.x86_64.rpm0bd8d2dd9789541dbf04aecd5b832fa17f284d435d05e79f285b3c9b572f7d8dsamba-common-tools-4.4.4-14.el7_3.x86_64.rpmfc522f6f791ed51d67a074eda29a78bb6aac6a84c565095b4343c86d0b8cc9f1libwbclient-devel-4.4.4-14.el7_3.x86_64.rpm1ff304283564f8d31ffaef3905dbf7b960fa7754e06b8f5b18bfa5876ec66bb7samba-client-libs-4.4.4-14.el7_3.x86_64.rpm5bcffdc7598f30c69d1cf8d6f1bb1fbf6caac43e7b9d63361d59ab071473b911libwbclient-4.4.4-14.el7_3.x86_64.rpm70299bde971fabbcad27578178fd96a76c04d43b8452f8df51d7ecf40acfb1e1samba-winbind-krb5-locator-4.4.4-14.el7_3.x86_64.rpm93a29f1c02c488bb36e1e431f7ea36ec87e7b708bb1a47ce4a549a67db5046e7samba-libs-4.4.4-14.el7_3.i686.rpm6dd09449b2607f2487ed17c0f8ba34745ea0d4cc97a1597072e8d5de5b08b076ctdb-tests-4.4.4-14.el7_3.x86_64.rpm544b5fc3567447e21a2c38eeb732be5f79f0a4ae43fe07fe35311f9317300070libsmbclient-4.4.4-14.el7_3.x86_64.rpm9a3d318b5ead5a6fe62a9005e70950241ece285608380afa07f96b8d47907315ctdb-4.4.4-14.el7_3.x86_64.rpm70b1bce19ea49727a23de1bcb3d432d1401193516e00756e42971493bb990c51libwbclient-devel-4.4.4-14.el7_3.i686.rpm0337c2076083810785687639720f46bb4d3d3ec6f5c09791cbde2f5b25574595libsmbclient-4.4.4-14.el7_3.i686.rpm141193f5c878052219d73b577f36a8c0116ea97360186c76326e42759161a416samba-test-4.4.4-14.el7_3.x86_64.rpm290ae34869804ffb4cdc84c68188dfcad089bb66a6987a0ce45914a82cfaf8f7samba-common-libs-4.4.4-14.el7_3.x86_64.rpm621c9a83a7fdf31aa945901f5914aaa0bebed0260f198867e4379b46c3034cbcsamba-pidl-4.4.4-14.el7_3.noarch.rpm7c41c23c98efb3a7f805337c3eefe63d709d8ffc585fd7f3f2d0efa0aedceb93samba-devel-4.4.4-14.el7_3.i686.rpm3709cdd90bbaf408024bc1b5592000f7db66ad45edba1a81d53db71c69ac3da1samba-winbind-4.4.4-14.el7_3.x86_64.rpm31cac7b74d067420ee84d338901e9562ea569d63f8f7c27e2a39c47628e474fbsamba-winbind-clients-4.4.4-14.el7_3.x86_64.rpm30388c2da72fc1e9628b70202901e0462744710ded9477b50803e1e86bc39b8dsamba-libs-4.4.4-14.el7_3.x86_64.rpm9e353de37fb7b5e799f4c5db2af3ac9948735b3ba31454443b855ba340f4c159samba-krb5-printing-4.4.4-14.el7_3.x86_64.rpm5d68a0adf80f143bf8560e98a402ad27184e56e5e78ad401d2994617bca7324bsamba-winbind-modules-4.4.4-14.el7_3.i686.rpm4e8f72d22cf08b342696c5b3d2877b7423e17a993823f1258f027b05086d72c0samba-client-4.4.4-14.el7_3.x86_64.rpm3c0d583550d33170879eb61d9d2c5ee7515e403df19bfc1598f8c8d156b3a534libsmbclient-devel-4.4.4-14.el7_3.i686.rpm530dd74982f1bf27a5d3bd9bfc44f9f79cf7a9e0e4d578092432d45c5ed9d3c7samba-test-libs-4.4.4-14.el7_3.i686.rpm1b1e66d7f6f11fa1c6b6acfe3f0b5c56539fd203d36f40382506bc37c8d9dcf4SLSA-2017:1308-1KernelSecurity Fix(es): * It was found that the packet_set_ring() function of the Linux kernel's networking implementation did not properly validate certain block-size data. A local attacker with CAP_NET_RAW capability could use this flaw to trigger a buffer overflow, resulting in the crash of the system. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2017-7308, Important) * Mounting a crafted EXT4 image read-only leads to an attacker controlled memory corruption and SLAB-Out-of-Bounds reads. (CVE-2016-10208, Moderate) * A flaw was found in the Linux kernel's implementation of seq_file where a local attacker could manipulate memory in the put() function pointer. This could lead to memory corruption and possible privileged escalation. (CVE-2016-7910, Moderate) * A vulnerability was found in the Linux kernel. An unprivileged local user could trigger oops in shash_async_export() by attempting to force the in-kernel hashing algorithms into decrypting an empty data set. (CVE-2016-8646, Moderate) * It was reported that with Linux kernel, earlier than version v4.10-rc8, an application may trigger a BUG_ON in sctp_wait_for_sndbuf if the socket tx buffer is full, a thread is waiting on it to queue more data, and meanwhile another thread peels off the association being used by the first thread. (CVE-2017-5986, Moderate)importantScientific LinuxScientific Linux 7python-perf-3.10.0-514.21.1.el7.x86_64.rpm5941249802997eb58882777c50088ddef8b2ffd49db9c2dd101e558a29d96fdckernel-doc-3.10.0-514.21.1.el7.noarch.rpm312e3140f5d79bef9f5b9c5068b867559fe94814c5f17f73616f5d40dd4204a5kernel-tools-3.10.0-514.21.1.el7.x86_64.rpme6176da8b71fbf401733f95752266bba429e8144fa72a87a49a15291b32d0d02kernel-debug-devel-3.10.0-514.21.1.el7.x86_64.rpmaa1c1cfd1e1ced2daa97b5de74dcc5515f23317b2c554098c0e4ec91eebd5774kernel-headers-3.10.0-514.21.1.el7.x86_64.rpmab026194358850a5761cc9744745ca9e89d3ba46713b963fc36d4186afa6be72perf-3.10.0-514.21.1.el7.x86_64.rpmf7bb0b1d913ec99ec50adfc1c12c2041a8a91af5c744e93ade8de3a0086ce97fkernel-devel-3.10.0-514.21.1.el7.x86_64.rpm8dce4c3e892fb44af47bbac5a8b311ef4809b5a95d5fdbf53aa31b66bdc7946ckernel-tools-libs-3.10.0-514.21.1.el7.x86_64.rpm575790d52646bf06d1a02c06291a84be6fd56105a0b005b6aa4ba756874bdf7fkernel-abi-whitelists-3.10.0-514.21.1.el7.noarch.rpmfde25ce9bfd32f2dc9470d429b706afaa413921c94758bd3ffaedb852b92c018kernel-3.10.0-514.21.1.el7.x86_64.rpm444e69efa0d41c6b55456182fedb9fbeafabb90be7942beca1c14c0880589c84kernel-debug-3.10.0-514.21.1.el7.x86_64.rpmfde519d1e634fa1ea3184b24504c3e4adc9ec35bd5d8e3db278be3d9b4896e06kernel-tools-libs-devel-3.10.0-514.21.1.el7.x86_64.rpm20a93b9fa4fcb28f54206ec32e84946780aaddb2a0fb5c8d0c3444c4ae3fb51eSLSA-2017:1365-3NssSecurity Fix(es): * A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library. (CVE-2017-7502) Bug Fix(es): * The Network Security Services (NSS) code and Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, consider installing the updated CA list on June 12, 2017.importantScientific LinuxScientific Linux 7nss-3.28.4-1.2.el7_3.i686.rpm1e097188a52e50181e035d6bdea1c978a1dd80c41ddf2c30d35b5c4260f67355nss-3.28.4-1.2.el7_3.x86_64.rpm686060261531be7ef3384fc4231fec0a18f505a0cf591a309f6dbf28e0465eddnss-sysinit-3.28.4-1.2.el7_3.x86_64.rpm74fc699e3f675adb48835c1450e49681c5393c09aa9f7957917d185b668877cdnss-pkcs11-devel-3.28.4-1.2.el7_3.x86_64.rpm1d39ff94aac9550d5d5c0ba4b77f08ed74787dc57b7ddaafea9c271c23b78361nss-devel-3.28.4-1.2.el7_3.x86_64.rpmc9f0d0bb25c3252e43c79cf6841a3be2cce118a399c878cbb1ffaf86ed5cc942nss-devel-3.28.4-1.2.el7_3.i686.rpm1089c8192bc60237d28de5c9c12951ed1d8b79838d58da8181be6a0dee49bbbcnss-pkcs11-devel-3.28.4-1.2.el7_3.i686.rpmb304a1a8b7a7db6bf6f14a312e36940c0180212d0804551814490063dba3f53dnss-tools-3.28.4-1.2.el7_3.x86_64.rpm83ab67cf76aaa5edba84bd24c05f0496559ea4b47ff852b17d32d9bb2ec38d6fSLSA-2017:1382-1SudoSecurity Fix(es): * A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root. (CVE-2017-1000367)importantScientific LinuxScientific Linux 7sudo-devel-1.8.6p7-22.el7_3.i686.rpme882633017a9f569e95cce620b4dc98bda46e1e7ec3cad8cee4013b97e308889sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm98f6db553e309c5fe87429edc9019319b22fc57e8dd420aec553da6d69aa5767sudo-1.8.6p7-22.el7_3.x86_64.rpmf0e497cf44a9b305f747163c22ed235d672529f6b9ce749fef12529ca7b8c9efSLSA-2017:1430-1Qemu-KvmSecurity Fix(es): * An out-of-bounds r/w access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data via various bitblt functions. A privileged user inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. (CVE-2017-7980) * An out-of-bounds access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions (for example, cirrus_bitblt_rop_fwd_transp_). A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service. (CVE-2017-7718) Bug Fix(es): * Previously, guest virtual machines in some cases became unresponsive when the "pty" back end of a serial device performed an irregular I/O communication. This update improves the handling of serial I/O on guests, which prevents the described problem from occurring.importantScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-126.el7_3.9.x86_64.rpm611faa017c58d88e0f23a490e8679c7357be12d9c23de1b8bc1fe65978e0f8d1qemu-img-1.5.3-126.el7_3.9.x86_64.rpm30563c527ea7af5f0955320bd1998b3af08d597d13f5b2d9a5516b4cacee651fqemu-kvm-common-1.5.3-126.el7_3.9.x86_64.rpm206e801fbabcb6ec1509ed71789499b4210654a02d0a98ecebb26121fd2092ccqemu-kvm-1.5.3-126.el7_3.9.x86_64.rpmeef9fc40cb5cd29a5647f9416350e11e4126cc681f3d96e8deeb8cb265bf2ac9SLSA-2017:1440-1FirefoxThis update upgrades Firefox to version 52.2.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5470, CVE-2017-5472, CVE-2017-7749, CVE-2017-7751, CVE-2017-7756, CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778, CVE-2017-7750, CVE-2017-7752, CVE-2017-7754, CVE-2017-7757, CVE-2017-7758, CVE-2017-7764)criticalScientific LinuxScientific Linux 7firefox-52.2.0-1.el7_3.x86_64.rpm6acccc10c5d3b81ef434f6c946a8ded7ed550d6d36110db882673533413c9846firefox-52.2.0-1.el7_3.i686.rpm7eb09bf69886aed50abed4b1ded0d9aa1a5e6a2e48f78676cd37df2c337c2fb0SLSA-2017:1481-1GlibcSecurity Fix(es): * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)importantScientific LinuxScientific Linux 7glibc-2.17-157.el7_3.4.x86_64.rpm00efff89a7ed98fd4a8f27b50ac365a0664809ffb5e8387b02d31da2b79032d6glibc-common-2.17-157.el7_3.4.x86_64.rpmd384e41b237232419c84dec20af0b1f4eaa2e27b9b36c679c2527857c9e9c85cnscd-2.17-157.el7_3.4.x86_64.rpmade74fb45d62c80f8d057612b808a2641485197fc213e2d5b3ee4b79a5a70038glibc-headers-2.17-157.el7_3.4.x86_64.rpm869e29e55ed5282c8fe36df8930b32612c3b1c6fc93c3d7d650a026d38899c12glibc-static-2.17-157.el7_3.4.i686.rpm04cc0c19f9131355bbae7e46a8b75beffa4c29c57baae8c52c072ede8ebbd721glibc-2.17-157.el7_3.4.i686.rpm594fec4db48e301a006bd665c7c9ea0a1ee199dca9ef6e7514ffb44744abb200glibc-devel-2.17-157.el7_3.4.i686.rpm2eed3c04ece68e3639abec825d4fb2f4d158d3cb76c698565d4734b9fe2e5fd7glibc-static-2.17-157.el7_3.4.x86_64.rpm8225ee116e51a35e8f1ebc08f4a108ce385c3411e3936b6d67831f11f5c3a4c4glibc-devel-2.17-157.el7_3.4.x86_64.rpm99e9c12bb84fdfefd887466d8112c7e8fcd2a9b2703777f98d29bf6f27dfaf9aglibc-utils-2.17-157.el7_3.4.x86_64.rpm892eaa2d5590367f61cd85b752f0c5bebbdd704f72fded8eb4023f40a6e79dfaSLSA-2017:1484-1KernelSecurity Fix(es): * A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-514.21.2.el7.x86_64.rpm77c6ec0b07cc4d57091f4a4600a31c8b2041baa4d51f163355a52b44550b5664kernel-doc-3.10.0-514.21.2.el7.noarch.rpm4cd1beb5c93646cf1942d5d66f604587e75e3433f0170c5c695ba514ec714365kernel-tools-libs-devel-3.10.0-514.21.2.el7.x86_64.rpma8c4f8fae73a2690fcbd2cf0dffc079ec55a26be1bc5ca22abdcc2dff04eceabkernel-abi-whitelists-3.10.0-514.21.2.el7.noarch.rpm7df93ae9625fe4f601d9d7a6a51508cb1532a961a06e8e8a0b36877694fc8f1dkernel-devel-3.10.0-514.21.2.el7.x86_64.rpm82995c9a1bf8e8232b4ed31ffedba5fdc29d6919c4412fc2c0d4bac85ba51595python-perf-3.10.0-514.21.2.el7.x86_64.rpm6d1c604250a6a5e83bf17cace93fb41036df079b05c6f7e43c90bfba93cc0365kernel-headers-3.10.0-514.21.2.el7.x86_64.rpmac2ad9570906750015faf53e375b600c0b8395a9a97cfed31eb7bc8ddbb0cb89kernel-tools-libs-3.10.0-514.21.2.el7.x86_64.rpm0a856445b50f84b77f270780dd4eda251c31b3e3386f9a9107979d1789da8170kernel-debug-devel-3.10.0-514.21.2.el7.x86_64.rpm28dc260370858c1b922c61ba02698a9567b496182d9ffceb6f52124afb1e8a2akernel-3.10.0-514.21.2.el7.x86_64.rpm6b128e1f6646981b258f059bdc97b1af1ee14438baca81ad120c960303d95095kernel-debug-3.10.0-514.21.2.el7.x86_64.rpm05cfa49e754c4a71a5b9088d19e8a0fcbc2d6837fdb3c537b00d7ff83c762423perf-3.10.0-514.21.2.el7.x86_64.rpmade26e281e4485f425fbd2d09b1e366b2daf00e6f346bf02988fe048f96ac87aSLSA-2017:1561-1ThunderbirdThis update upgrades Thunderbird to version 52.2.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5470, CVE-2017-5472, CVE-2017-7749, CVE-2017-7750, CVE-2017-7751, CVE-2017-7756, CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778, CVE-2017-7752, CVE-2017-7754, CVE-2017-7757, CVE-2017-7758, CVE-2017-7764)importantScientific LinuxScientific Linux 7thunderbird-52.2.0-1.el7_3.x86_64.rpm8bfacbbba2b303f110db2517312d59cf0dbedaf44fce480f3783139f061aa29bSLSA-2017:1574-1SudoSecurity Fix(es): * It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root. (CVE-2017-1000368)moderateScientific LinuxScientific Linux 7sudo-devel-1.8.6p7-23.el7_3.x86_64.rpm9c507d7df254f9c3b5e0f2f17b86db0cb5cc146d1fed8d89e98bf501f238d6f8sudo-1.8.6p7-23.el7_3.x86_64.rpm28c8f6e11135127a16890744cda23348948a46f581ca30645946180d5a436923sudo-devel-1.8.6p7-23.el7_3.i686.rpm6830e874bfe3ce9e384336cd80e433522e229fa944441c981abb5665dc6f4320SLSA-2017:1576-1MercurialSecurity Fix(es): * A flaw was found in the way "hg serve --stdio" command in Mercurial handled command-line options. A remote, authenticated attacker could use this flaw to execute arbitrary code on the Mercurial server by using specially crafted command-line options. (CVE-2017-9462)importantScientific LinuxScientific Linux 7mercurial-hgk-2.6.2-7.el7_3.x86_64.rpm3ba96ecd069fc2fa262d7dabfb20bf31bff61fd25d77cf1376f295b5ed0780c5emacs-mercurial-el-2.6.2-7.el7_3.x86_64.rpm8d66927232e401cdb220466acf2ea0e7d951ae88f667d3673d425289cef006f3emacs-mercurial-2.6.2-7.el7_3.x86_64.rpmd99752838fde8ea8a0b7e0712f916bd4b12896ad3a02ab3dd008a9651628992cmercurial-2.6.2-7.el7_3.x86_64.rpmc5d33633cf761ef8c3523b674d668355645d67803b77af9b611e00a953f5eaa5SLSA-2017:1581-1FreeradiusSecurity Fix(es): * An authentication bypass flaw was found in the way the EAP module in FreeRADIUS handled TLS session resumption. A remote unauthenticated attacker could potentially use this flaw to bypass the inner authentication check in FreeRADIUS by resuming an older unauthenticated TLS session. (CVE-2017-9148)importantScientific LinuxScientific Linux 7freeradius-devel-3.0.4-8.el7_3.x86_64.rpm4c234c79b4140551acd7bc35b6ec8fc03c700d2e6b4115fe4c6c27165be3ee4efreeradius-3.0.4-8.el7_3.x86_64.rpm85cb90b401fd832953cff3092b1e582fa8dfcfdd983715ba4359078a3ec80bd3freeradius-sqlite-3.0.4-8.el7_3.x86_64.rpm92842bd474bec36a3b4bb2c45e09a31e13830308ba2bdff021f1b491dde6d250freeradius-devel-3.0.4-8.el7_3.i686.rpmf7f35e0230518f670df00f386890ba1cf95cf0672d5e085a125140d968e5b706freeradius-doc-3.0.4-8.el7_3.x86_64.rpm102d74c7a527bfafe866e0beae9803c7e1a566140073d6b68a42b5120a236b72freeradius-postgresql-3.0.4-8.el7_3.x86_64.rpm17ecafaf71c03a271dfed22fbd0cd2d3eeb1315069915363841893828255ded3freeradius-perl-3.0.4-8.el7_3.x86_64.rpmac41d43f48629d458a352bc33485882006ccc85aa5904226c5cfbbd90c01a19efreeradius-python-3.0.4-8.el7_3.x86_64.rpm8e5662264d1e8bcf6bc33a8c076b32a8817f5e4706904628ac645015797fd1a4freeradius-krb5-3.0.4-8.el7_3.x86_64.rpm31b6d3209c3dd3a3ae6d28b8d5fafffb343dd36ce5294eebd928e9f41053edeafreeradius-mysql-3.0.4-8.el7_3.x86_64.rpmf66fa3460accb18de98a665b36f35f2325f5114ca968d174f2a1f36aa4e12869freeradius-unixODBC-3.0.4-8.el7_3.x86_64.rpmf6f9402f979639ab8329abfb71c2a3ae4d36132944975824e02fb68e96325fecfreeradius-ldap-3.0.4-8.el7_3.x86_64.rpm88086c9c847cf3e156294b79a5e3ed2d0b657c9f298822cf537d13f8e14e9a04freeradius-utils-3.0.4-8.el7_3.x86_64.rpm294832ab07141afd5480cd82df0dfcad9b9a54e98d88658f14823d1e0653e24eSLSA-2017:1615-1KernelSecurity Fix(es): * A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)->frag_list) in the socket buffer(skb_buff). The heap overflow occurred if 'MAX_SKB_FRAGS + 1' parameter and 'NETIF_F_FRAGLIST' feature were used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important) * The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel (denial of service). (CVE-2017-7645, Important) * The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important) * The Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate) * A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate) Bug Fix(es): * Previously, the reserved-pages counter (HugePages_Rsvd) was bigger than the total-pages counter (HugePages_Total) in the /proc/meminfo file, and HugePages_Rsvd underflowed. With this update, the HugeTLB feature of the Linux kernel has been fixed, and HugePages_Rsvd underflow no longer occurs. * If a directory on a NFS client was modified while being listed, the NFS client could restart the directory listing multiple times. Consequently, the performance of listing the directory was sub-optimal. With this update, the restarting of the directory listing happens less frequently. As a result, the performance of listing the directory while it is being modified has improved. * The Fibre Channel over Ethernet (FCoE) adapter in some cases failed to reboot. This update fixes the qla2xxx driver, and FCoE adapter now reboots as expected. * When a VM with Virtual Function I/O (VFIO) device was rebooted, the QEMU process occasionally terminated unexpectedly due to a failed VFIO Direct Memory Access (DMA) map request. This update fixes the vfio driver and QEMU no longer crashes in the described situation. * When the operating system was booted with the in-box lpfc driver, a kernel panic occurred on the little-endian variant of IBM Power Systems. This update fixes lpfc, and the kernel no longer panics in the described situation. * When creating or destroying a VM with Virtual Function I/O (VFIO) devices with "Hugepages" feature enabled, errors in Direct Memory Access (DMA) page table entry (PTE) mappings occurred, and QEMU memory usage behaved unpredictably. This update fixes range computation when making room for large pages in Input/Output Memory Management Unit (IOMMU). As a result, errors in DMA PTE mappings no longer occur, and QEMU has a predictable memory usage in the described situation.importantScientific LinuxScientific Linux 7kernel-doc-3.10.0-514.26.1.el7.noarch.rpmb5f38ad7dfb825076fb5ce892d95d2068b1fcc146f30bca1dff9385de313ef7akernel-debug-3.10.0-514.26.1.el7.x86_64.rpmb4226ea5557456b522c5665cc1f0d2a0adddc4471319c82a07bc51a72d1934cckernel-headers-3.10.0-514.26.1.el7.x86_64.rpm08fa1f3a3124945427d028a4ae099aa334197b9083a39ae0da75178d6d546561kernel-debug-devel-3.10.0-514.26.1.el7.x86_64.rpm8952d20bd854c8354b0e0e0eb0f81ef331321d9ca726be4cb69b3b414fa82d54kernel-devel-3.10.0-514.26.1.el7.x86_64.rpm31a9bff305bb04ab84e03bc4859be628c172bfea885ddd5880930182cbe697b1perf-3.10.0-514.26.1.el7.x86_64.rpm291938fdded27ddc69ddfc7d3b443bd57e26e9203169319cef2fa5dd8e0bcae3python-perf-3.10.0-514.26.1.el7.x86_64.rpm74a32d158c77f23f177e8278e54c977525f2d46377bba629559e5e6b970799ffkernel-abi-whitelists-3.10.0-514.26.1.el7.noarch.rpmc6597028918dd3228b7183f482eee3abca76f953c7847e18cda57574563aeadfkernel-3.10.0-514.26.1.el7.x86_64.rpm2de71196494c9789807d3b2fe2057f4ea29a7a60fa438434639a2b98ceaf4cd6kernel-tools-3.10.0-514.26.1.el7.x86_64.rpm951f5e1bdc4f965d6a32c32c87a9f67d472a52350248e3b4aa9ae0d2e504a569kernel-tools-libs-devel-3.10.0-514.26.1.el7.x86_64.rpm21b60c41644196a81f0495b47c4f6bac3b6787ce27a085a2cd4153b7aad12e10kernel-tools-libs-3.10.0-514.26.1.el7.x86_64.rpmd7691813eb60914e5de752a957c945955db82d58ac9ef6de1d64f4dc1df89625SLSA-2017:1680-1BindSecurity Fix(es): * A flaw was found in the way BIND handled TSIG authentication for dynamic updates. A remote attacker able to communicate with an authoritative BIND server could use this flaw to manipulate the contents of a zone, by forging a valid TSIG or SIG(0) signature for a dynamic update request. (CVE-2017-3143) * A flaw was found in the way BIND handled TSIG authentication of AXFR requests. A remote attacker, able to communicate with an authoritative BIND server, could use this flaw to view the entire contents of a zone by sending a specially constructed request packet. (CVE-2017-3142) Bug Fix(es): * ICANN is planning to perform a Root Zone DNSSEC Key Signing Key (KSK) rollover during October 2017. Maintaining an up-to-date KSK, by adding the new root zone KSK, is essential for ensuring that validating DNS resolvers continue to function following the rollover.importantScientific LinuxScientific Linux 7bind-pkcs11-libs-9.9.4-50.el7_3.1.x86_64.rpm870db17754195ff3c95c794a12f9d5e9e6f1dc79fc5c46034c154d83df3e954ebind-pkcs11-utils-9.9.4-50.el7_3.1.x86_64.rpm14ffaf12e4a4fbf3e0363543dcb3c9822e6b24834c5d34a98308a33a51caf635bind-libs-lite-9.9.4-50.el7_3.1.x86_64.rpmd5649e735902514e5649d8c7fbf5f4fa98e996b519febc8fcff9cc766fe72f48bind-sdb-9.9.4-50.el7_3.1.x86_64.rpmd2f401d3300abdd00156b284c42e207856b371ac04b348343513a72cbd3f08b5bind-9.9.4-50.el7_3.1.x86_64.rpm2a66be962107ea8a860edf1e1b1f3711eb9a5ab2a5d81d1fa851b5987be73a74bind-lite-devel-9.9.4-50.el7_3.1.i686.rpmead2814dedf223aa838d9e2ae2d8077619e418409cf3965114d7a6ea500d8eb5bind-devel-9.9.4-50.el7_3.1.i686.rpm15d4ac5acf41fabed13ad198d4aa6014752953a23000b0387d374e22f557579bbind-libs-9.9.4-50.el7_3.1.i686.rpm6104bfe3d2f883ce0e24c08f714d08deaaaa4eed42167470c36e4cb10fd5e4cebind-pkcs11-9.9.4-50.el7_3.1.x86_64.rpm615e1953bfa1b2272e0c7ebb97b4fdb460ccd0833c78f2e02ba939e6f7c89defbind-pkcs11-libs-9.9.4-50.el7_3.1.i686.rpmf6ff232e89f16f172f3266dea710fb0f5ecad263c2ada3bfa122ad7ba28462e6bind-license-9.9.4-50.el7_3.1.noarch.rpmef567cffe2a37996fcc2dff2692ae00772108458fcaff150291b8513d2c53359bind-sdb-chroot-9.9.4-50.el7_3.1.x86_64.rpmf68600138e9bf307e76461d2364e8cc150e326c5442772101c3dcc893cb81707bind-utils-9.9.4-50.el7_3.1.x86_64.rpm5a91502b85cc711c732459d25136e547e95093edd2abbfd0f9c0949e96cc17eabind-pkcs11-devel-9.9.4-50.el7_3.1.x86_64.rpm3d5251807da5856f91d6bf5e4f650ac7b7fd4a7a26fd713b95ed861b6698a466bind-lite-devel-9.9.4-50.el7_3.1.x86_64.rpm675d1e0d229b9639cc521f82392dc143235a5b6796d0d5192cf3b4ab7ce4bd89bind-pkcs11-devel-9.9.4-50.el7_3.1.i686.rpmb304dade93b8f6d189964f6c9e602cffff153083fef64fc121b16a68404bb3fdbind-chroot-9.9.4-50.el7_3.1.x86_64.rpm745fff5546585a08925a936fcca0308924594cfab604ea208f05cfbbdf371823bind-devel-9.9.4-50.el7_3.1.x86_64.rpm1ca325901d0da6c426df29afa21657719d428810fe22df37e8a7f3783a88c925bind-libs-lite-9.9.4-50.el7_3.1.i686.rpm86ed4af699a630ccc718e0d34bea7cb7082a99eca24c5c5e3e928347a1e176e5bind-libs-9.9.4-50.el7_3.1.x86_64.rpm8baf04baaf85a484a94a8c028e9b643519257bd3a909e0d66c6f26f90291f451SLSA-2017:1681-1Qemu-KvmSecurity Fix(es): * Quick Emulator (QEMU) built with Network Block Device (NBD) Server support was vulnerable to a null-pointer dereference issue. The flaw could occur when releasing a client, which was not initialized due to failed negotiation. A remote user or process could exploit this flaw to crash the qemu-nbd server (denial of service). (CVE-2017-9524)importantScientific LinuxScientific Linux 7qemu-kvm-1.5.3-126.el7_3.10.x86_64.rpmd7a6906147e5f47235625b562481592083a6a57951da6dc744fd89e25891e34fqemu-img-1.5.3-126.el7_3.10.x86_64.rpm80b05dc49ac853a2b35ec53245e7526f06d88a8fb62f49547cafe8730eaeabf4qemu-kvm-tools-1.5.3-126.el7_3.10.x86_64.rpm994a0229bdbf9a0f3c141cacee00a785ece3b03550e88a85c43af052a3c9d8e8qemu-kvm-common-1.5.3-126.el7_3.10.x86_64.rpm42d5643a64d5cbd3aa4e22b5e89d58bcb66325911eab7d1707ab63667d3441d6SLSA-2017:1789-1Java-1.8.0-OpenjdkSecurity Fix(es): * It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-10102) * Multiple flaws were discovered in the RMI, JAXP, ImageIO, Libraries, AWT, Hotspot, and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10107, CVE-2017-10096, CVE-2017-10101, CVE-2017-10089, CVE-2017-10090, CVE-2017-10087, CVE-2017-10111, CVE-2017-10110, CVE-2017-10074, CVE-2017-10067) * It was discovered that the LDAPCertStore class in the Security component of OpenJDK followed LDAP referrals to arbitrary URLs. A specially crafted LDAP referral URL could cause LDAPCertStore to communicate with non-LDAP servers. (CVE-2017-10116) * It was discovered that the Nashorn JavaScript engine in the Scripting component of OpenJDK could allow scripts to access Java APIs even when access to Java APIs was disabled. An untrusted JavaScript executed by Nashorn could use this flaw to bypass intended restrictions. (CVE-2017-10078) * It was discovered that the Security component of OpenJDK could fail to properly enforce restrictions defined for processing of X.509 certificate chains. A remote attacker could possibly use this flaw to make Java accept certificate using one of the disabled algorithms. (CVE-2017-10198) * A covert timing channel flaw was found in the DSA implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application generate DSA signatures on demand could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2017-10115) * A covert timing channel flaw was found in the PKCS#8 implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application repeatedly compare PKCS#8 key against an attacker controlled value could possibly use this flaw to determine the key via a timing side channel. (CVE-2017-10135) * It was discovered that the BasicAttribute and CodeSource classes in OpenJDK did not limit the amount of memory allocated when creating object instances from a serialized form. A specially crafted serialized input stream could cause Java to consume an excessive amount of memory. (CVE-2017-10108, CVE-2017-10109) * Multiple flaws were found in the Hotspot and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-10081, CVE-2017-10193) * It was discovered that the JPEGImageReader implementation in the 2D component of OpenJDK would, in certain cases, read all image data even if it was not used later. A specially crafted image could cause a Java application to temporarily use an excessive amount of CPU and memory. (CVE-2017-10053) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.criticalScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3.i686.rpm1a87805403302f4ca9fe72f1aa28bb471d283fda7ffd777dfa49b3b03f4c237ajava-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3.i686.rpm65ee98ec360484e9b3a18029dfabb82c92eb9e01ef9e08cdb0d26d6721285ca2java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm4cb7bf426eb79aaa73179c3e599c0cc6483768624c91dacf442f55b4537ee6efjava-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3.x86_64.rpm385a749e0a8401b59f74fb935d17ee6aacf0543f6f974d8e5077122d4dfac329java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3.x86_64.rpmff74f62b6d5438d7f1794732780a6478349cb398c220ef88a4711b7b936ae09ejava-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3.i686.rpmd5e0e6e6f08c7d424057598fed0b85726baf5fb28efc645d78f78e1e8de707edjava-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3.noarch.rpm5fdb3c48543618eead81c92e5435cddea182e945a5acfdb4328986f4a3d497a9java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.x86_64.rpmdf8844d6d1e549e885eaace646ded183e1042970e5f36ae517b741498751a86fjava-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3.x86_64.rpmcd94249943ac90d3347de6a38d5acc886154bd7c596767c4a8bf6acee54326a3java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3.i686.rpm8eb23223278e45af4cdd2d966e8c783ff309410165cf907203b824abc2e182fejava-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3.noarch.rpm67ce7550fcdaa0141e8835515adb79a28538a5ef1e705038b19001f686643825java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm58489f0e1cbddb23662e366caa07cf441709b24ef57b51bb63cbc52799eec32fjava-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3.i686.rpmdbda39761de51abe8dcfc9bd719de60b2489d67f9e16b97359747390e743c75fjava-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3.noarch.rpm383b7b40ed70fd66fc34f86e2f4afb42e02dd0622ad631c57fa8649e0ad6e936java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3.x86_64.rpm21369ff1e1d6e331e8ce5c89b10cbaeb8333f11c53f9b0cd9f1bc7af613b2d02java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3.noarch.rpm4c574a1eacff945d316e9f30368adc6916df07d7a66be57a752dac82e72752a8java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm3d9be50d9908e91fe4f86f33f28016e2f813d1ae08443a8ba05ab3cc67a1aae2java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3.x86_64.rpm5dcf311694492a0c1107d266510ed33b56f5e55f961b0364f6d6ffb5391b9b71java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3.x86_64.rpm11ebc07fe0620182dd3f5d700d08b853028990faab3e05f40ec7f800ecdabf6ajava-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.i686.rpmd3e7442c8d85a0ee8e50c7b6bd175b6a9d830047c76651eb22c411542833bd5ejava-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3.x86_64.rpm5b018d37153a59a9b200cc1b134f2f4f760fcb12fa3f37c4124e598c17cd8708java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm052d28a40660b064aa5869947de937ead7f47da989ab3bd9152bd793ec6650bbSLSA-2017:1793-1Graphite2The following packages have been upgraded to a newer upstream version: graphite2 (1.3.10). Security Fix(es): * Various vulnerabilities have been discovered in Graphite2. An attacker able to trick an unsuspecting user into opening specially crafted font files in an application using Graphite2 could exploit these flaws to disclose potentially sensitive memory, cause an application crash, or, possibly, execute arbitrary code. (CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778)importantScientific LinuxScientific Linux 7graphite2-1.3.10-1.el7_3.x86_64.rpmd4f4939aaa4e15757032a183091ef343efa37e138d79a3867c92786c754cc110graphite2-devel-1.3.10-1.el7_3.x86_64.rpm4026bc56312c5ed24304497bff6866e0deaff530e882cfc31b6629fc19454b1agraphite2-devel-1.3.10-1.el7_3.i686.rpmfb7d8854e1372a6c461127f9a17be26e0d217f7ab5fddd2aeee0a4848b4f5b40graphite2-1.3.10-1.el7_3.i686.rpm775904c98e0fbc48923ca813e008829c83847722f57c2647791922dd6295bfcaSLSA-2017:1809-1TomcatSecurity Fix(es): * A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664) * A vulnerability was discovered in Tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application. (CVE-2017-5648)importantScientific LinuxScientific Linux 7tomcat-lib-7.0.69-12.el7_3.noarch.rpm550b4aa07d3609c6febed135365484f5d099325dc86b09dfa24589e804c82318tomcat-el-2.2-api-7.0.69-12.el7_3.noarch.rpm4dd64bbf1ed4b3579bcd2c63f0fcd625872d7c4c8ded0264cc207b280433206dtomcat-docs-webapp-7.0.69-12.el7_3.noarch.rpmf9f4f7420f4767da0e8bb3dae3740410295a7fe223dca417093477b814b06855tomcat-javadoc-7.0.69-12.el7_3.noarch.rpmffe1df54ccb56a4a81137cc22a60f50fb6c0a8f91803d8b52a33ff7e3ee5b7fetomcat-7.0.69-12.el7_3.noarch.rpm0d1d6663818b56bd0ec5d1d509fec284d824e274ad79160b709bfd2436d0a525tomcat-jsp-2.2-api-7.0.69-12.el7_3.noarch.rpm5978b93b6257bf03a3b8484fecde936383efac68fe97637d56be16cf5e434f0atomcat-jsvc-7.0.69-12.el7_3.noarch.rpm73a90b7f55d13582f7c961c84162a6c9dc1676109dbb04217d83b4753a143f93tomcat-admin-webapps-7.0.69-12.el7_3.noarch.rpm140fa1d57742c03fa64b0a483c7f3a890faffd82411fc1ba63685f94d65dab94tomcat-webapps-7.0.69-12.el7_3.noarch.rpm5ff8ed7772f2bb2856653f27d3715f16c956f344638900418d5a68a08683abc8tomcat-servlet-3.0-api-7.0.69-12.el7_3.noarch.rpm196c16f3e435f7b390a9c02e8018a66855da84da1f03f62b1821e0e850a11d97SLSA-2017:1842-1KernelSecurity Fix(es): * An use-after-free flaw was found in the Linux kernel which enables a race condition in the L2TPv3 IP Encapsulation feature. A local user could use this flaw to escalate their privileges or crash the system. (CVE-2016-10200, Important) * A flaw was found that can be triggered in keyring_search_iterator in keyring.c if type->match is NULL. A local user could use this flaw to crash the system or, potentially, escalate their privileges. (CVE-2017-2647, Important) * It was found that the NFSv4 server in the Linux kernel did not properly validate layout type when processing NFSv4 pNFS LAYOUTGET and GETDEVICEINFO operands. A remote attacker could use this flaw to soft- lockup the system and thus cause denial of service. (CVE-2017-8797, Important) This update also fixes multiple Moderate and Low impact security issues: * CVE-2015-8839, CVE-2015-8970, CVE-2016-9576, CVE-2016-7042, CVE-2016-7097, CVE-2016-8645, CVE-2016-9576, CVE-2016-9588, CVE-2016-9806, CVE-2016-10088, CVE-2016-10147, CVE-2017-2596, CVE-2017-2671, CVE-2017-5970, CVE-2017-6001, CVE-2017-6951, CVE-2017-7187, CVE-2017-7616, CVE-2017-7889, CVE-2017-8890, CVE-2017-9074, CVE-2017-8890, CVE-2017-9075, CVE-2017-8890, CVE-2017-9076, CVE-2017-8890, CVE-2017-9077, CVE-2017-9242, CVE-2014-7970, CVE-2014-7975, CVE-2016-6213, CVE-2016-9604, CVE-2016-9685importantScientific LinuxScientific Linux 7python-perf-3.10.0-693.el7.x86_64.rpmc9d29f8f01b7085dd07d5288115e2f052c65adf214c87d07446761b49dc1fdafkernel-devel-3.10.0-693.el7.x86_64.rpma84d40305d301136c7cd48193cd72fe4596ff4c900728912feea17d67db4fad2kernel-debug-devel-3.10.0-693.el7.x86_64.rpm66da4e58cf6ad11fe5e4a9270e3e020037f78ae5393755fc4ba9677426af418akernel-doc-3.10.0-693.el7.noarch.rpme5d8570ab48fe38245f5f2201dd58a96a03e6d188c6076b214ed843d9f1ee596kernel-tools-libs-3.10.0-693.el7.x86_64.rpm9737cf24dfd0cb8cd417f619ebb154273cf42436218f8dfdb62e44b695b689e9kernel-headers-3.10.0-693.el7.x86_64.rpmbf892199da35787b9a4c7d7e81ea41cddc31537ab328de32b7b1cabdd39780a4kernel-abi-whitelists-3.10.0-693.el7.noarch.rpma0d253a53bd19cb7678b6eb894f82d8d43f663ba6f8904448837ea127328fa5akernel-3.10.0-693.el7.x86_64.rpm63e4e84fdd4601c39184dcda9d042f159f17cc6e84ee0f50bbf88a4c78bf59cakernel-debug-3.10.0-693.el7.x86_64.rpm9588d59b765b2b30ff75c541d1088db3d4908bdcb7d8575edcbf64c7c42bcd1dperf-3.10.0-693.el7.x86_64.rpmacd53656f480929d9fcdec86aa8d9ba3cdfd5551cc2e9537624aff0efa2817f2kernel-tools-3.10.0-693.el7.x86_64.rpmf2a77d889e5b2ae92fb541d0aa80e0945fabc700a67f1c208c318dd8a4c17d2fkernel-tools-libs-devel-3.10.0-693.el7.x86_64.rpm065234648e337863787250367ffe241ddcffc3ecc119258f1af4cd2bc1c30e76kmod-openafs-1.6-sl-1.6.21-1.SL74.el7.noarch.rpm3a24e0bec7ec7d2247373fcdf695a56c6aa984ef139769e36d983c68d65a77daSLSA-2017:1852-1OpenldapThe following packages have been upgraded to a later upstream version: openldap (2.4.44). Security Fix(es): * A double-free flaw was found in the way OpenLDAP's slapd server using the MDB backend handled LDAP searches. A remote attacker with access to search the directory could potentially use this flaw to crash slapd by issuing a specially crafted LDAP search query. (CVE-2017-9287)moderateScientific LinuxScientific Linux 7openldap-2.4.44-5.el7.i686.rpmdd060a5f24fe6f93a5659098e27b1324c7f67b3f5221abc41951c19429e793f9openldap-clients-2.4.44-5.el7.x86_64.rpm9672be2e26f1e4a6292a38cd819a900851885168e7dfa9e205d37ef3ed55d7ebopenldap-devel-2.4.44-5.el7.x86_64.rpm993d52dbbbeb65297845df0fa4e4c811c5b8ba526712d7fc4a62bfa3f1068d9fopenldap-devel-2.4.44-5.el7.i686.rpmf273e286f55bf2ba37178cacc6fd4722e796517a86483b09cf08f6542bcf464dopenldap-2.4.44-5.el7.x86_64.rpmde2e0894cad46e64bc3faed1fe29e33e357d80e02a07c577abb60577da378b57openldap-servers-2.4.44-5.el7.x86_64.rpm8b936cfd265a8fb5990048808ef152c6775c63ef074fbfcc674519415e7f0189openldap-servers-sql-2.4.44-5.el7.x86_64.rpm8dc4c9f8f29ecce73ee874934fea17ccd19a8e0699ffec71aef8df70d25b6fabSLSA-2017:1854-1PidginThe following packages have been upgraded to a later upstream version: pidgin (2.10.11). Security Fix(es): * A denial of service flaw was found in the way Pidgin's Mxit plug-in handled emoticons. A malicious remote server or a man-in-the-middle attacker could potentially use this flaw to crash Pidgin by sending a specially crafted emoticon. (CVE-2014-3695) * A denial of service flaw was found in the way Pidgin parsed Groupwise server messages. A malicious remote server or a man-in-the-middle attacker could potentially use this flaw to cause Pidgin to consume an excessive amount of memory, possibly leading to a crash, by sending a specially crafted message. (CVE-2014-3696) * An information disclosure flaw was discovered in the way Pidgin parsed XMPP messages. A malicious remote server or a man-in-the-middle attacker could potentially use this flaw to disclose a portion of memory belonging to the Pidgin process by sending a specially crafted XMPP message. (CVE-2014-3698) * An out-of-bounds write flaw was found in the way Pidgin processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process. (CVE-2017-2640) * It was found that Pidgin's SSL/TLS plug-ins had a flaw in the certificate validation functionality. An attacker could use this flaw to create a fake certificate, that Pidgin would trust, which could be used to conduct man-in-the-middle attacks against Pidgin. (CVE-2014-3694)moderateScientific LinuxScientific Linux 7libpurple-devel-2.10.11-5.el7.i686.rpmdfb6809ac9dfb6b753992d8b402dff9da44234090e838bc1d9eb2b4ea5c2d5c9pidgin-2.10.11-5.el7.x86_64.rpm92093b7794155b5e324aa05e670564e0efe63641b67f18a1d3e6628958b893aelibpurple-devel-2.10.11-5.el7.x86_64.rpm70684e805bb32513c6c01c77882a9fb9a810ee94641cc07a1f6abe8d8fdd65e5finch-devel-2.10.11-5.el7.x86_64.rpm8dcbda2c6b568bae3b7c2b58208841047cb162c80d0f4a94c6bd2591e56bca62pidgin-perl-2.10.11-5.el7.x86_64.rpme44bc731c22568ce97c1dd8fa6289a4011aa59e2fec9f01654c3a0a9d4ca11e9pidgin-devel-2.10.11-5.el7.x86_64.rpmf619fa951890cb5fda40d8a86546c27745279d97e72a2d5b33f5698fe4faa24afinch-2.10.11-5.el7.x86_64.rpmdb58af66b6e5a0bf63640c9df755944a184dd167e7ead1d7525458f4907fff77libpurple-tcl-2.10.11-5.el7.x86_64.rpm88481b1f7082aa674f6be20f354875e20b6e275d4591bd7829076a9d0f024423libpurple-perl-2.10.11-5.el7.x86_64.rpm4744d8745878cda3ae64dce92b7c32400e520a97e592b9676f6296350b103fc5finch-devel-2.10.11-5.el7.i686.rpm4d8c5e7a5efa0ecf2b155a1c211880398336a0c57d9ca1dd117280453bf64153libpurple-2.10.11-5.el7.i686.rpm590f2bef9db2266145986068e64e7f8953ca2b56e4e26f98381633ab78fc886blibpurple-2.10.11-5.el7.x86_64.rpmcfaca54a249b6cbe831def5309f5f2485b5bde2b9cf21bd7582b50f8fb76d0d9pidgin-devel-2.10.11-5.el7.i686.rpme0660ce137c59487d4db762d466b52b344c80f36ee0e03f8c835cafc16724556finch-2.10.11-5.el7.i686.rpme105846947e184c72bbb75563286de2497ac8e2667faec546c14ac29058ef36cSLSA-2017:1856-1Qemu-KvmSecurity Fix(es): * An out-of-bounds memory access issue was found in Quick Emulator (QEMU) in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process. (CVE-2017-2633) * An integer overflow flaw was found in Quick Emulator (QEMU) in the CCID Card device support. The flaw could occur while passing messages via command/response packets to and from the host. A privileged user inside a guest could use this flaw to crash the QEMU process. (CVE-2017-5898) * An information exposure flaw was found in Quick Emulator (QEMU) in Task Priority Register (TPR) optimizations for 32-bit Windows guests. The flaw could occur while accessing TPR. A privileged user inside a guest could use this issue to read portions of the host memory. (CVE-2016-4020)moderateScientific LinuxScientific Linux 7qemu-kvm-1.5.3-141.el7.x86_64.rpm0df2bf73b1ea1a61fef6195fc44f0e7a2f5f333c181b1c498cbf313844ee27f6qemu-img-1.5.3-141.el7.x86_64.rpm2b17f41c7b74cc839c126bade3b9887e3a4ed405355067f6cc6589f6438ae441qemu-kvm-common-1.5.3-141.el7.x86_64.rpmdef4e4d3a0d5285856625d09d62cddfe76ccaa1f402e524f111caec8db2cfbedqemu-kvm-tools-1.5.3-141.el7.x86_64.rpm6c6f2d5e5783f945054a9520cdb1312f168e6d5168d59adc201115be2f4504b5SLSA-2017:1859-1GolangThe following packages have been upgraded to a later upstream version: golang (1.8.3). Security Fix(es): * A carry propagation flaw was found in the implementation of the P-256 elliptic curve in golang. An attacker could possibly use this flaw to extract private keys when static ECDH was used. (CVE-2017-8932)moderateScientific LinuxScientific Linux 7golang-1.8.3-1.el7.x86_64.rpm80216240791953f80c44aebada0ea7b86f9bad5a3dca69e09511bd81eefe074agolang-misc-1.8.3-1.el7.noarch.rpm125ea33613817fb99893298f8327fa94a852c122b8d1695fdabaf962a50bfaccgolang-src-1.8.3-1.el7.noarch.rpm62cdcde7fc9704e277505573fa651d32de143f4f9e1c42656126f44d721bce31golang-tests-1.8.3-1.el7.noarch.rpm48e4d8883dcdae0f93d35f403c48be36e941508e2c7b1b194b65ccae8f5d1aa6golang-docs-1.8.3-1.el7.noarch.rpm1b1b66918067db0ff700f8cad78691521a8c71388326f09efe444f9727c2a7c6golang-bin-1.8.3-1.el7.x86_64.rpm8a168e799487a3ac4e6a86d1562a2053561c3ee423842d852b11275fe4d8f96eSLSA-2017:1860-1Libtasn1The following packages have been upgraded to a later upstream version: libtasn1 (4.10). Security Fix(es): * A heap-based buffer overflow flaw was found in the way the libtasn1 library decoded certain DER-encoded inputs. A specially crafted DER- encoded input could cause an application using libtasn1 to perform an invalid read, causing the application to crash. (CVE-2015-3622) * A stack-based buffer overflow was found in the way libtasn1 decoded certain DER encoded data. An attacker could use this flaw to crash an application using the libtasn1 library. (CVE-2015-2806)moderateScientific LinuxScientific Linux 7libtasn1-tools-4.10-1.el7.x86_64.rpm4f90fc66dc36e410ee25675ea4b0632c73ad5ae880609474248666a55980fc9alibtasn1-4.10-1.el7.x86_64.rpm1183d76eed940dac9c97a10187acbe4503b06a84e03d1c2b6aa6fa1783abad9dlibtasn1-devel-4.10-1.el7.x86_64.rpm889ff835fd9cdc54726951666910004e0a5b66dd7cbaf7b17c60395439cb3153libtasn1-devel-4.10-1.el7.i686.rpm34aeed992980659f5439da4b38cb4dca1b50bebc956074e08ba3d65af68a1713libtasn1-4.10-1.el7.i686.rpm343c7557e8eee24de879227694bfa27b9975eb47791f88736607fe502a1a5cd0SLSA-2017:1865-1X.Org X11 LibrariesThe following packages have been upgraded to a later upstream version: libX11 (1.6.5), libXaw (1.0.13), libXdmcp (1.1.2), libXfixes (5.0.3), libXfont (1.5.2), libXi (1.7.9), libXpm (3.5.12), libXrandr (1.5.1), libXrender (0.9.10), libXt (1.1.5), libXtst (1.2.3), libXv (1.0.11), libXvMC (1.0.10), libXxf86vm (1.1.4), libdrm (2.4.74), libepoxy (1.3.1), libevdev (1.5.6), libfontenc (1.1.3), libvdpau (1.1.1), libwacom (0.24), libxcb (1.12), libxkbfile (1.0.9), mesa (17.0.1), mesa-private-llvm (3.9.1), xcb-proto (1.12), xkeyboard-config (2.20), xorg-x11-proto-devel (7.7). Security Fix(es): * An integer overflow flaw leading to a heap-based buffer overflow was found in libXpm. An attacker could use this flaw to crash an application using libXpm via a specially crafted XPM file. (CVE-2016-10164) * It was discovered that libXdmcp used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions. (CVE-2017-2625) * It was discovered that libICE used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list. (CVE-2017-2626)moderateScientific LinuxScientific Linux 7libX11-common-1.6.5-1.el7.noarch.rpm5485845faff93db901750b57cd67da4d1a5119ffbe6315fafa044e719b528037vulkan-filesystem-1.0.39.1-2.el7.noarch.rpm132bfe1fa43e8b2f02e338c4335aa5f2360ac37bc6c3e2e60bfe8531e16cf909libevdev-utils-1.5.6-1.el7.x86_64.rpmf545686f5a6a85b11780989ee3483cea744233d50f8ea22b9f167c1b29846231libXfont2-devel-2.0.1-2.el7.x86_64.rpmfc1bebf889327e559832baeacc9569946c3ef410ddd550def3da7303f3a3772alibXpm-devel-3.5.12-1.el7.x86_64.rpm23a21952eef977589f14af2c7be12a231794692d0e9b73fea18fa58fc1e0e159libXtst-1.2.3-1.el7.x86_64.rpm983086e558cb6224a004adfbe427423b7d62c2eb003010ad15accd3938d6193emesa-libxatracker-17.0.1-6.20170307.el7.i686.rpma10e8acb7c0353cef04206d482ea69b5e5a10b6ea09c4fa2593cba19a68c6da3libwacom-data-0.24-1.el7.noarch.rpmb20341619309f2a5e1d8f4108ce085f6f1a7bfaac6801d13fc79cbd9c404d790libX11-devel-1.6.5-1.el7.x86_64.rpm1e98976b2c043e16c0da59a017e83bf7edfe295544a9cf9ba139bef457aa2a99libXdmcp-devel-1.1.2-6.el7.x86_64.rpmf3e01ac9dfd4c8d1d805d1373806695883676a549a33cfdd5d04e163b2dfbda0mesa-libxatracker-devel-17.0.1-6.20170307.el7.i686.rpm3214ad690a193bc2caa50dd61690c880cfbe914a82d0c9c80d921055772cd95blibxkbcommon-x11-devel-0.7.1-1.el7.i686.rpmc2b2cb2bc362f2c38e582326c966142b88b66c5dff2ae5a2b430b0995ce25fb6libxkbcommon-devel-0.7.1-1.el7.i686.rpm1a38769a32b4e5467a8f75337a024beab1b0cf577e2ac813b44196f53887eb31libvdpau-devel-1.1.1-3.el7.x86_64.rpm6154695823f45c608ad67555c66d0a80a730bbdc5c71ea477bea59e6185c30a4libXt-1.1.5-3.el7.i686.rpmd9863e79b577d12bf103ddad73a3b4366dabdb0a1de8daa44ce5a7f57c722d99libdrm-devel-2.4.74-1.el7.i686.rpmf0f3bb4b3bbb8d881fcaad006abbdc327436b217b1825d92812935b24c9b366dlibxkbcommon-x11-0.7.1-1.el7.x86_64.rpm43dec5780e26a7bf1b605b28ca36a327313eb2f91e7f7d672a9ae3f0d226b60cxkeyboard-config-2.20-1.el7.noarch.rpmefc5024a7e095b3f5aa194d3aad51deb6c98b9c0fe195dc167e63d2f65e62b63libfontenc-devel-1.1.3-3.el7.x86_64.rpm303a4e07f0e53c6cdd895cfed91708c01c0257c88498dd1c1107d9eddf52f2b2libICE-devel-1.0.9-9.el7.i686.rpm30d43c294774ebb1cb9c39f149dabaed128d1162d5dea325bdc59e9789098d49libXrandr-devel-1.5.1-2.el7.i686.rpm7ef0506eed7c5af638716ef57644955dc50f312e2bbecfad448b15a0dd926784libwacom-0.24-1.el7.x86_64.rpm1c23ac36596cb2082923a7ac9eb84348eb4e9b3f0cc4b7310f687c33cf3092cbxorg-x11-proto-devel-7.7-20.el7.noarch.rpm8122dedb7729974661b2b0d6d6383329b77680c3d796ba5f6d4666d5905a8688libXxf86vm-1.1.4-1.el7.i686.rpmf3b3961c8bc4a979565db8dc604cbe4d54abfc13946318b33af194bc69e647eelibXrandr-devel-1.5.1-2.el7.x86_64.rpmc026b1786ac4405a47895390e005118bebad750accb7b22c0e8ceaeae63d6a27libxkbfile-devel-1.0.9-3.el7.x86_64.rpmdb06c16c2cc890f7664b82cd88f5e46d8a094f2b3f01a41a8bfa8b3e86cfbc42mesa-filesystem-17.0.1-6.20170307.el7.i686.rpm692ae36a386562fd9b5c00acfaedcd0dffec60d4f4593397938d76afad26fd43mesa-libGL-17.0.1-6.20170307.el7.i686.rpm50b279834a0572e96e9683009491d53768a780ab05f55b2ed5613e84f6b404dbmesa-libglapi-17.0.1-6.20170307.el7.x86_64.rpmf7ac81b38dc5832b75f6f1bca460ad7fb96f3332abce5165b49f7c3d872e6735libXaw-1.0.13-4.el7.i686.rpm11ddb50847433bbdcc96a7349089c5794f4dfac2b1adbe2610686b9e4726ef45libxkbcommon-x11-0.7.1-1.el7.i686.rpm5fdb329b256c2a3a5585c617875ab9e05ab1c8aabca44f5c25f7d8024e145001libxkbcommon-0.7.1-1.el7.i686.rpm2fb8e4aa9baf279a562fdf4431308bdc790df4ad149818551fec6ad0cee6c616xcb-proto-1.12-2.el7.noarch.rpmda1ad1d554dac12c2611a885290da0510e78d484975a2deaea86fbbda3ee57bdlibICE-1.0.9-9.el7.x86_64.rpm9fb0d800f07c719b7943715cd96b87f65a6c7f463e369b2538fdb58a172b236blibICE-1.0.9-9.el7.i686.rpmd881731a14e35b217cd8973fbc3cbbf3b9509794435bf35eabd8c266ebbfc99elibwacom-0.24-1.el7.i686.rpm40ff82f500464fb225e56655a67630d01ddf7e52c4010a9556c40722dd3ea01flibXxf86vm-1.1.4-1.el7.x86_64.rpm6b7b19c25e79c15f3af6a0dc988a784d7bde1090c56016b8b2f7d1d05f52c664mesa-libGLES-17.0.1-6.20170307.el7.i686.rpm8e3bba2e814a8af568591042a865cbdfd3dd84b9236ad9c51fa16eeab9bd1c1blibXrender-devel-0.9.10-1.el7.x86_64.rpmd62eb00006743997b8a059ceb6c69a300997d05ff2e1d7d6040f86a109fff6eflibXtst-devel-1.2.3-1.el7.x86_64.rpm949cdc66675621be9e6794a14b9b2561486ab1f5faa29bf93951047e0038356fmesa-libGL-17.0.1-6.20170307.el7.x86_64.rpmf4bab7ceab5812a00a2ae77a7221e790deb7d5e53f4f2c5535c7197429c4e079libXt-devel-1.1.5-3.el7.x86_64.rpma0a857bedd0e53d9b8999b5ed3b683d647b2816b6ce8ba6033aaa65da3f0857dlibXfixes-devel-5.0.3-1.el7.x86_64.rpm2613b993de88df1a816fb9dec6fea6c8564585482db46b9ed39769634cec08d9mesa-libGLES-devel-17.0.1-6.20170307.el7.x86_64.rpm7be2473cf684401905002d1eaaf0ea3b60aebcad0674db96cea781accb67598alibXaw-1.0.13-4.el7.x86_64.rpmd3f48f751f4cbf85cb1a57ff7146c05d068f11599ca7e16ac39bcbf351492106libXaw-devel-1.0.13-4.el7.i686.rpm220d1f4d0c7eba8e24402cf233faf90512b2b1082b2351df84e80abefdcd4ebflibevdev-1.5.6-1.el7.x86_64.rpm3a9c6640eac0e47fc7f3d79314a2c627ea803333045a9d3477d6bf42931a9c10libinput-devel-1.6.3-2.el7.x86_64.rpmbe862753b34d33be1613caa4ea5a50ee14d9e5d9c51f54dd303a8f2fedb1639flibdrm-2.4.74-1.el7.i686.rpmf7ca78c6f51ac6401a93e619ef7f6467a4830923d5a4b9bbb20a6581b8be3fe3libXt-devel-1.1.5-3.el7.i686.rpm4c99750d2887531cb3a864c1ef8100344b4984b34e85fb7cfe22b46b49a5dba7libXpm-3.5.12-1.el7.x86_64.rpm0f5fd03df4f1cfb408d6d2ddaf8434eb94c3a2748b9f62781436e79968368de2libfontenc-devel-1.1.3-3.el7.i686.rpmaa2165d9afbc8b6b6c9ab2b4d3f245b1dc6433dd0b04c469f765624a964f0856libXrandr-1.5.1-2.el7.x86_64.rpmcc1f3d1fb5839bb26a986e013f58c62918fd373dca214ee437e69ba17f119a35libxkbfile-1.0.9-3.el7.x86_64.rpm1280912fe45c34ee78af704ddabd56d25fc2b661c96e65f210cc8bcc4a9bedf9libXfont2-2.0.1-2.el7.i686.rpm890f92f686f57ec00db1b405c0ccfeee7167a3d313f9fcfa4422916489f46819libwacom-devel-0.24-1.el7.x86_64.rpmaa528d6cc1f7e55e4cc34c67757a85ce85379537e803467ef9530c0eb3350f78libepoxy-1.3.1-1.el7.x86_64.rpm5bcc6e7dffb1d6526b217ed180bac8765485a79d8c7af013ffa04eb50e0f67d0mesa-private-llvm-devel-3.9.1-3.el7.i686.rpm0540d88dedcce4b8abc1933d8bdba9588f7186bd36fb947377fe0480a9f805f0libXcursor-1.1.14-8.el7.i686.rpm01c4d55db2f953956deebc74c7f69a706bdd762cccd549443b98663ca0a33f98mesa-libEGL-17.0.1-6.20170307.el7.i686.rpmf1f60ed6a0f19de4e3f0de538821c3878142b1b3f4cb9de0518de1cbd29bf910libxcb-devel-1.12-1.el7.x86_64.rpm2d04347a93f674a32deff2794bef99b8ed0200c2fb6374ca73482b2b3c05b200libXrandr-1.5.1-2.el7.i686.rpmca345114b71775900fde233b38c037ddd51f6f4c24e74b3d572b78165894f644libXcursor-devel-1.1.14-8.el7.i686.rpme1217430017de19e05f3ea66880fe3d50c624a998fee38219e9695b9637a40b8libfontenc-1.1.3-3.el7.i686.rpm3d58ab6d93d70cabd0eb1873bd2a6dca734326063d911bd1fcc795d2c793745blibinput-1.6.3-2.el7.i686.rpm90c1a0a31abebf027e483e5dbb8881cbfd455bc35d37c9c6baf613fe41df049flibXt-1.1.5-3.el7.x86_64.rpm645f8b23cbeafa2531b217c4404602c5eb8be73d93325eccd56575b8ed83ce1clibXrender-0.9.10-1.el7.x86_64.rpm4acf3192b61177cb424186e4d441d5d4250d8abe17c4ad45e86332fdd3245c7dmesa-libGLES-devel-17.0.1-6.20170307.el7.i686.rpm10a7bd564493328f7187d0954bff2ea91125f5cbe74d1f99517253f46a2b782amesa-private-llvm-devel-3.9.1-3.el7.x86_64.rpmb10b4f5b9020453461cf166ea978d4551c3e41bc9b7fe4c025ffcc8102f3b0d0libvdpau-devel-1.1.1-3.el7.i686.rpmdf1f2170458eba96680163aaf8c1f736f3644793ff1a90f6150a78ad34b053ebmesa-libEGL-devel-17.0.1-6.20170307.el7.i686.rpmf96b7385e99db5d1b7ae11fddda2fb3d2b9b8faf49a12eac4598b6d3f09b4140libXpm-3.5.12-1.el7.i686.rpm546ca290cb22dff1777fcb320f93188e9af24f9c3e06d80edaa6be85344d0ac2mesa-libgbm-17.0.1-6.20170307.el7.i686.rpme3766e25387c353a525c9f23025c81a623da39572e10a08a7d0b990a23a014d9libXvMC-1.0.10-1.el7.x86_64.rpmc3f546dfca913dd0775f3278ded8e5578e82835f8aedd1c2b857040d71bf8022libXdmcp-1.1.2-6.el7.i686.rpm0adcb23add1c622153911769a5f1f7611d030402f9a96d510dfb29125b42d8a2libXfixes-devel-5.0.3-1.el7.i686.rpm199366a8ab5b45006551a0ac4974d9faa3db153c0e58d4da1584c02d68a510fdlibXcursor-1.1.14-8.el7.x86_64.rpm3ec4c0b53cb877b5f3a387d8dbe247c893a22705242b5690e4cdc7f17cc5da3fmesa-libOSMesa-17.0.1-6.20170307.el7.x86_64.rpm32273328025bb5db3bab386ef977c90086c17419e955ba5ec40bfe2df55a4b19mesa-libEGL-17.0.1-6.20170307.el7.x86_64.rpm5be6d6cad4e90208539cf4fe5c1f6062079bbb1d13af809af5019a70cda15c88libwacom-devel-0.24-1.el7.i686.rpmbf5b33c164e58caf51101b90697b8e7ecbdae5656910e72074e91c6053bc6ac9libXtst-devel-1.2.3-1.el7.i686.rpma81b5b5be7ccae43167db80eb0ac0021428e479d2f10a79710a023c55dcfd6a2libevdev-1.5.6-1.el7.i686.rpm01b6fc78a905ba950aec00b4ecb241df765f69d4194d024b25ceb75109bc070blibXfont-1.5.2-1.el7.i686.rpm2ef1befd7a8ba3848b45ca75cd426a5dff31824613457c6086e5bb0dfef18f33mesa-libxatracker-17.0.1-6.20170307.el7.x86_64.rpm41f86567bbdf11944c7bc3bd72e855b8e22b875a775cdf7daa492fbac03d10d5libdrm-2.4.74-1.el7.x86_64.rpm7cff35c398cd3c7e7ffa42727134713dcdd79ebda564c082de7bacc35ca8617clibXv-1.0.11-1.el7.i686.rpm2b1e1ecd8a4edfda4bcf66eb542044beff09b09972d60d3a83e14e96aa4d9f65libXdmcp-devel-1.1.2-6.el7.i686.rpm076089592f9a38a3b20c261373bc3a85aac572d7a8eada946103dec2b7d38ff5libX11-1.6.5-1.el7.x86_64.rpm341195b9418da22589e7477d7903b55ef727578f92108deed411a388ede37ca2libXrender-devel-0.9.10-1.el7.i686.rpm69d507cd73322d9a4a9ab50950baaeca142e02eff55f7823aaee0af3446c3b70mesa-libgbm-devel-17.0.1-6.20170307.el7.x86_64.rpmdde2cf5c887959bac1dcc13a0712fc381b1d9d604185acfe554c3552dbf06c91mesa-libgbm-17.0.1-6.20170307.el7.x86_64.rpmaaf2cd08789ddb1f47947727430c711daa96b17757c0f96ff93bba45aff6c579xkeyboard-config-devel-2.20-1.el7.noarch.rpmda7d6a7cd97d7ff7270bf1c68ce2f815b0f704a0e853d4ef047dcecdb9bc0327libinput-1.6.3-2.el7.x86_64.rpm5c13f83d2d52ec4e9231c95199331186742fa6361ab7de6b09e9cb5d4e29a261mesa-vdpau-drivers-17.0.1-6.20170307.el7.x86_64.rpm088e89f45dafd4efc2666152b5432b46d16f777f04cb39382c0df78bb7ccfa37mesa-libGL-devel-17.0.1-6.20170307.el7.x86_64.rpm580b955a86e46d92b77955b864e8489a2edfc1751ff6cac1505774342c73bb5clibXfont2-devel-2.0.1-2.el7.i686.rpm95fe6dfbffd4923d5a7993fbe6868daa9f30cd151935381394053e4244fa1506mesa-libGLES-17.0.1-6.20170307.el7.x86_64.rpmde3dbfc5c38663c9a40ee3854aecbd0d60665bb2fa396386285bd1b21000b1d8vulkan-devel-1.0.39.1-2.el7.i686.rpm3635a4f82d6ad800fc9ddfa9bab5635761147f4a33de548d31591b963a0d014dlibXcursor-devel-1.1.14-8.el7.x86_64.rpmdaa04c9981cab77d8be4e9e7a587c415c164eab1070abb4ccb3263ec3c7748d3libvdpau-1.1.1-3.el7.x86_64.rpm18f3d834f8da61eaba20ee95d4c59f80453476314d310496d2108ae175cb9b61libepoxy-devel-1.3.1-1.el7.i686.rpm0c199973bfd55aae7b7c3943966d07eeb78e2bd8fbfe43d1a7aa494c33ab6382libXi-1.7.9-1.el7.i686.rpmbb290d3c48cb5d6ee9fba81196f13cab913bb15e06afbffc1e542cd450a4b784libepoxy-devel-1.3.1-1.el7.x86_64.rpm3da7f42755ecca697dfa625674b07e279ae00521d83f7f1868e982ea0c400b85mesa-vulkan-drivers-17.0.1-6.20170307.el7.x86_64.rpm63f6f138a1bf2b5ee005851595fbc29cec4d9388dc416eba848c5099c2d9c315mesa-private-llvm-3.9.1-3.el7.x86_64.rpm463aa1e2b52db01ae657e2593dc447a0db527b45e52e5b487cb9187b897c332cvulkan-1.0.39.1-2.el7.i686.rpmc63abc543635bf02f7670350708d6e8ce70397b8b92cc6af7ea32fb29efab62clibXvMC-devel-1.0.10-1.el7.x86_64.rpm1c5c43f53adf72302278515892d67afe6b5a1fe0525a1c2ba889592278bb4783mesa-libOSMesa-devel-17.0.1-6.20170307.el7.i686.rpmceee3426da894725899f5477a51f0fdf2c37c67a9e59953d19bee9b2f7443af9libepoxy-1.3.1-1.el7.i686.rpm4fc64f1ea2bc4e51a96857dd9fbad2a23659fe49be20984a171d2fad7f534712libXv-1.0.11-1.el7.x86_64.rpm88ab9ad2d3748ce23b8f1aabe41d4f1f86b9cb7fbd806849be2c559783afa70blibXfont-1.5.2-1.el7.x86_64.rpmb46c902b5c42caf93ef27a107760dce7afa6017c67c3e4fd74015a097ec699a3libXfont-devel-1.5.2-1.el7.x86_64.rpme243c2ff8ce4f4a442d45730ed4fddf9e779d62ff34ea1d83e134a167c0dc481libICE-devel-1.0.9-9.el7.x86_64.rpm5d97ac9ce161d8d33cc69baa5271370d23f7f5650dd0c73ec6111943425b5f9elibXaw-devel-1.0.13-4.el7.x86_64.rpmea0ff0e875ce0c1ed6b2d5f1bd0a912f293df0d2610bbdcefec26e55f8f8445elibXvMC-devel-1.0.10-1.el7.i686.rpmbf2d1f26eea143261a355605a7230ffe911ec282cbf04e7b4ab4e975ab5eef03libXv-devel-1.0.11-1.el7.i686.rpm0c23afa24709898aa4ad2ae307c817d60114109e13d3126cf231c388fb4f4fb5libX11-1.6.5-1.el7.i686.rpm68a0414eb208e7cde1d32975c412c3068fb4ff04b557e5904053cdbc74b5a7f7libXvMC-1.0.10-1.el7.i686.rpm829fc35dfa5691bc51079eac5736f87840bf0b012b545f2e68c0563889e73d6alibfontenc-1.1.3-3.el7.x86_64.rpm33dcad954d8f53b0e918affc3970094db1c5484b64e4edb633a61cba79945f01vulkan-1.0.39.1-2.el7.x86_64.rpm6395d439a8cf7e2651c62be71a912897ebe2427ad05d35bcfd62c3c68d89eee7libxkbcommon-devel-0.7.1-1.el7.x86_64.rpm6684fc9992a6c259c0d576d07355128f2ba3d068889e991ca6845dc4c1f9b6edmesa-libxatracker-devel-17.0.1-6.20170307.el7.x86_64.rpm52e766feadf4e4979f7b7abc450ed7084af0ca0fab6a2ebd1fc7d702d1304e38libXfont-devel-1.5.2-1.el7.i686.rpmb5687f19fe3879c546db1461ffab22f136e6b09b689eb6fc2a19f7844ee2fd29libXtst-1.2.3-1.el7.i686.rpm234b2c7639e8cb5350292570a7ac9770bb289bed47c86c58b79d6a9f421a0d47libxkbfile-1.0.9-3.el7.i686.rpm3e98b891abf44951a4c6ce6ff83302f8ae548c18d48b16d0bd6f635578690a1dlibxkbcommon-x11-devel-0.7.1-1.el7.x86_64.rpm3135955bd3d578b3e26fc213a8df9d992b68e3aed7129b27fd884f6c77ffe80emesa-libOSMesa-devel-17.0.1-6.20170307.el7.x86_64.rpm3ef3914b67ce28e5e9a6966d9f388cd885fe2e47b32c1252f340e128a76d132blibXi-devel-1.7.9-1.el7.x86_64.rpmc99ff5805359f4592bea1daa531480efcac755fcebcd04989b3f41d45ffa2780libXrender-0.9.10-1.el7.i686.rpme9ee5068c164532e05863ea7a733dc605902c066aacf73344bd55acfbe085dc7mesa-libOSMesa-17.0.1-6.20170307.el7.i686.rpmbfa3592610141f19d06bb718ec9614105b34a88365a6f1564525bb72777a6333libXi-devel-1.7.9-1.el7.i686.rpmc066a789a4e4ff07c4eb8d50cacd26b44cdf7af46e3d6ed86b2983d480ebd60dlibXxf86vm-devel-1.1.4-1.el7.x86_64.rpm0e0bc4ec05788343c195b1304f4d9e2aae51fa855765a8b1a313b15f02f7fb50libXfont2-2.0.1-2.el7.x86_64.rpmd5d720de33e413e1e575b0e0a3b5123200ccadd2c4c6e89a218b949857795679libXxf86vm-devel-1.1.4-1.el7.i686.rpm4d3d6ef65aaa838987ded0118df39b246225fd147fe6a1c3f5204af1320db897libxkbcommon-0.7.1-1.el7.x86_64.rpm9e5f159886b47e64da99e147fd4aa2bed7ee2e467b9ba332783c3aa90fbff2e1libXfixes-5.0.3-1.el7.x86_64.rpmf3afdeb226b8a5285806f4312cebf8d4eef8ffec0ef62f89660a7660e8faf3c4libXfixes-5.0.3-1.el7.i686.rpm2ca3e0204acbb3abdcdc86f9a3c7cbee298ebab38ec6f030129aa49a1f5691c7libXi-1.7.9-1.el7.x86_64.rpm1d1420c88691870bbf21285453ecb7b875d490994d7a31c070561dfeaf2243dalibxcb-doc-1.12-1.el7.noarch.rpm58b162bd6f23626d0bf50f7678aa957321317214e7f1d3bc60ecffbf0296a0b8libinput-devel-1.6.3-2.el7.i686.rpm189146e4a63e061876219e5c208debcbdf34c534881497cacfdafb9c798a2cf0mesa-private-llvm-3.9.1-3.el7.i686.rpma78f42f795ab06363711fe46f20c4c43991b02705efdb4e7d5cdf65e194803e8mesa-dri-drivers-17.0.1-6.20170307.el7.i686.rpm3531d0e23a43561d8b0ae393f5501fe9e0bc651bfc441ed24028697a9a60f360drm-utils-2.4.74-1.el7.x86_64.rpm2adb59c7c0c9ce17a96b697c99266651f2d993319c953855e999941750bb6a89mesa-libgbm-devel-17.0.1-6.20170307.el7.i686.rpme1a7a7e192bce2a439daf9775064981f6382ab72ab380263ef9899a7c2b812fclibX11-devel-1.6.5-1.el7.i686.rpmb5afae88a5d1194c28bfcd65b87e7212a68a61df0844323d11c2a59da2233625libdrm-devel-2.4.74-1.el7.x86_64.rpma9e766a7c0afec11afd5eb6147de86b1a88b5bf5e674ac5ffccaca7c71f211a0libevdev-devel-1.5.6-1.el7.i686.rpm69475e2a03860556c75ffaca8798daa9b80c341cd439564d7d2162309734319emesa-libglapi-17.0.1-6.20170307.el7.i686.rpm1f8c2cece0a30e7c458ca0e10c1a3a326f8339ca5286ac0f35b0d3a417ac9b39libevdev-devel-1.5.6-1.el7.x86_64.rpm18a6adb20b3f48928215d9ba1c6a9467a7512f6d7cffba88b48e22521cb81979libxkbfile-devel-1.0.9-3.el7.i686.rpm3b92f36fb68569f711c819c6352f4d00c76dc727afa841d92972a0d2283045a8mesa-libGL-devel-17.0.1-6.20170307.el7.i686.rpmc7c3f78062be2ba2d8b0dc9f5655146139fe582e450cee426b1645006e0bf282libXv-devel-1.0.11-1.el7.x86_64.rpm3359d4a6c301e6580f0a21d48e6718ed57a19511ac2e98b64cd4ecbc24839eaelibXdmcp-1.1.2-6.el7.x86_64.rpm8ffa760bf80f85a9159e054f7a618673374c1c97f7ac71556de9ef019de4c2cdvulkan-devel-1.0.39.1-2.el7.x86_64.rpmd13b11b7957796f5e20ec03f16b7e2a416da44115514ba1ec71ce4547e84030dmesa-filesystem-17.0.1-6.20170307.el7.x86_64.rpmdaed09585138047e4b5143f8febc5b86f5430c4158080cb753d08d1d08b2a2a5libvdpau-1.1.1-3.el7.i686.rpmc037e5936af85c6f0c6c6aeaf294564faae48f5db912151bf3634137c989366alibvdpau-docs-1.1.1-3.el7.noarch.rpmeabb73e4c152bd995336dc742d258d7f9d9e0a5a339894925ae9b5318289d690libxcb-devel-1.12-1.el7.i686.rpmc2123c2b10f11b21686fc01223b73b15536407efaa21ada45afcfbce1757da85libxcb-1.12-1.el7.x86_64.rpm51acac8c7f95fa2cc43edffc3704d9f3cb015b80ba5e41753fa3fdb5a259e311libxcb-1.12-1.el7.i686.rpm24a7f3c7ef998bc360121b2196c69eae1c257b7c3f38e62734ca0a70c46ff4a8mesa-libEGL-devel-17.0.1-6.20170307.el7.x86_64.rpm1b6a11dfc7ad4cdcc2c495d76bc70534605d6237364565fa990b5f772bb8fd99mesa-dri-drivers-17.0.1-6.20170307.el7.x86_64.rpm605c45b3dfb8f8ff01e529444b52cf1abccea6f8d3ccfb5db0ff46a5359e1ba5libXpm-devel-3.5.12-1.el7.i686.rpm67fafd88e3ac07ce246d2f2fa45fcf25d18fd10a7a45e909f227a4ad737dda5aSLSA-2017:1868-1PythonSecurity Fix(es): * The Python standard library HTTP client modules (such as httplib or urllib) did not perform verification of TLS/SSL certificates when connecting to HTTPS servers. A man-in-the-middle attacker could use this flaw to hijack connections and eavesdrop or modify transferred data. (CVE-2014-9365)moderateScientific LinuxScientific Linux 7python-libs-2.7.5-58.el7.x86_64.rpm09860ab9650c5c9c16eaf425e6fdae48f3c74eacecbe685c90448989d6a69accpython-libs-2.7.5-58.el7.i686.rpm17a099bd2ec9223ed87ed9bf566a8d8a9ff05d86f69eaabdc4ac1ab805ee1997python-test-2.7.5-58.el7.x86_64.rpm8798d69deccad053f84eb615c28a08562bb64ede55071ba5fc2042756f15f84epython-tools-2.7.5-58.el7.x86_64.rpmdf278b6da1e0faf3c9f9f64687cff5e2f8ea9a76fb97070a483813241c410430python-2.7.5-58.el7.x86_64.rpmcf4c937ea110d775b8660e62729f8c68281b4f7e861c2539daf3a65bee249cd1python-debug-2.7.5-58.el7.x86_64.rpm10d239dea8031a95f1ec976b60d2e26829ee07549e7fd5b4e8d47018e5858992tkinter-2.7.5-58.el7.x86_64.rpm1447f4b7caa7419c844a0b3cea8c76564ffd8478c562bfe78da8697c544a6ee3python-devel-2.7.5-58.el7.x86_64.rpm7dca9b11f936fed3f2d61d54cae540d170c9cded642e06f0d91855b5bb7ffdbcSLSA-2017:1871-1TcpdumpThe following packages have been upgraded to a later upstream version: tcpdump (4.9.0). Security Fix(es): * Multiple out of bounds read and integer overflow vulnerabilities were found in tcpdump affecting the decoding of various protocols. An attacker could create a crafted pcap file or send specially crafted packets to the network segment where tcpdump is running in live capture mode (without -w) which could cause it to display incorrect data, crash or enter an infinite loop. (CVE-2015-0261, CVE-2015-2153, CVE-2015-2154, CVE-2015-2155, CVE-2016-7922, CVE-2016-7923, CVE-2016-7924, CVE-2016-7925, CVE-2016-7926, CVE-2016-7927, CVE-2016-7928, CVE-2016-7929, CVE-2016-7930, CVE-2016-7931, CVE-2016-7932, CVE-2016-7933, CVE-2016-7934, CVE-2016-7935, CVE-2016-7936, CVE-2016-7937, CVE-2016-7938, CVE-2016-7939, CVE-2016-7940, CVE-2016-7973, CVE-2016-7974, CVE-2016-7975, CVE-2016-7983, CVE-2016-7984, CVE-2016-7985, CVE-2016-7986, CVE-2016-7992, CVE-2016-7993, CVE-2016-8574, CVE-2016-8575, CVE-2017-5202, CVE-2017-5203, CVE-2017-5204, CVE-2017-5205, CVE-2017-5341, CVE-2017-5342, CVE-2017-5482, CVE-2017-5483, CVE-2017-5484, CVE-2017-5485, CVE-2017-5486)moderateScientific LinuxScientific Linux 7tcpdump-4.9.0-5.el7.x86_64.rpm6281456c16ea0b3bf77300b9a03201852a4075afc3c93aea25b1ea95c9dfe5dfSLSA-2017:1916-1GlibcSecurity Fix(es): * A stack overflow vulnerability was found in nan* functions that could cause applications, which process long strings with the nan function, to crash or, potentially, execute arbitrary code. (CVE-2014-9761) * It was found that out-of-range time values passed to the strftime() function could result in an out-of-bounds memory access. This could lead to application crash or, potentially, information disclosure. (CVE-2015-8776) * An integer overflow vulnerability was found in hcreate() and hcreate_r() functions which could result in an out-of-bounds memory access. This could lead to application crash or, potentially, arbitrary code execution. (CVE-2015-8778) * A stack based buffer overflow vulnerability was found in the catopen() function. An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code. (CVE-2015-8779) * It was found that the dynamic loader did not sanitize the LD_POINTER_GUARD environment variable. An attacker could use this flaw to bypass the pointer guarding protection on set-user-ID or set-group-ID programs to execute arbitrary code with the permissions of the user running the application. (CVE-2015-8777)moderateScientific LinuxScientific Linux 7glibc-static-2.17-196.el7.i686.rpm29698f1aeaa37591d3eab26eb61a977a7b9de72553e4e3fdf8aed0028b17cc1fglibc-devel-2.17-196.el7.x86_64.rpma84d33c12ac11b0e6e9eff8153cbedd8923818ba61873913303e36fdc36933adglibc-utils-2.17-196.el7.x86_64.rpma46ce5770c69773ed8268b580e767e5153fe6a29b9c51fbb64c03f0ee4414ae7nscd-2.17-196.el7.x86_64.rpmb767e0b50d3a5a5524e64139a346681f5bceeefde3ab045ab0a6944b1e4c6721glibc-devel-2.17-196.el7.i686.rpmb10ba5ddd40b556ac5b5e9cabaa541807923d20820d5d921f91842ffef608d47glibc-static-2.17-196.el7.x86_64.rpm24af27f4a1b661a4889f1e148cdacfbf49715ccfd668321cc9559d8efd155e71glibc-common-2.17-196.el7.x86_64.rpmf6cf5611818bf0f0f2487729d29e94b883569e62d2be6cc957b0450a0c19655eglibc-headers-2.17-196.el7.x86_64.rpm6667388fa6bcb645b32708e11dfe275b5c949b32246eb9c970a46ed8121e53f7glibc-2.17-196.el7.x86_64.rpmbce03de481e7fa7c05f9ad52c156a87370101300ff99c358207529142561f7feglibc-2.17-196.el7.i686.rpmcc331618291009172d3a7b9345a194cd54f41919df4a5421919c74e61b1c6b1bSLSA-2017:1931-1BashSecurity Fix(es): * An arbitrary command injection flaw was found in the way bash processed the hostname value. A malicious DHCP server could use this flaw to execute arbitrary commands on the DHCP client machines running bash under specific circumstances. (CVE-2016-0634) * An arbitrary command injection flaw was found in the way bash processed the SHELLOPTS and PS4 environment variables. A local, authenticated attacker could use this flaw to exploit poorly written setuid programs to elevate their privileges under certain circumstances. (CVE-2016-7543) * A denial of service flaw was found in the way bash handled popd commands. A poorly written shell script could cause bash to crash resulting in a local denial of service limited to a specific bash session. (CVE-2016-9401)moderateScientific LinuxScientific Linux 7bash-4.2.46-28.el7.x86_64.rpm9d050d0234ae7008bb2663f6cdb01a5f9d6ca20d4a16afdee149505072b57d2dbash-doc-4.2.46-28.el7.x86_64.rpmc8b360a604414e1c71e30f4ca1eb018abda5bec03ffecd2a49945ce7d15065dcSLSA-2017:1950-1SambaThe following packages have been upgraded to a later upstream version: samba (4.6.2). Security Fix(es): * A flaw was found in the way Samba handled dangling symlinks. An authenticated malicious Samba client could use this flaw to cause the smbd daemon to enter an infinite loop and use an excessive amount of CPU and memory. (CVE-2017-9461)lowScientific LinuxScientific Linux 7libsmbclient-4.6.2-8.el7.x86_64.rpmca134c1a34065f4bf212e2f0bb616172c0069f81bb13f003b5e5bc12c6af96f9samba-winbind-krb5-locator-4.6.2-8.el7.x86_64.rpm20795713f0d1d9616c979a406954552722cc1cdfc55354972c00798e6d9aadecsamba-client-libs-4.6.2-8.el7.i686.rpm6a5b8b5f5c0aa34b5e12558aafcc7346f1798f3d04583cb707560da415e66d91samba-test-devel-4.6.2-8.el7.x86_64.rpmca71a91af2386552acd5078ef3bb6b55daac775749e4b188f0e525672e0c8f61samba-test-4.6.2-8.el7.x86_64.rpm608b32e57f6e8a8331830f9b3bdb0a624d3ed568ee0ee20a41a493db2a03a787samba-krb5-printing-4.6.2-8.el7.x86_64.rpm59efa5f750bbb8b1f2bcf156e34d61ec3b3b0ada54bd66a4a59ae4eeeb3aed39samba-common-4.6.2-8.el7.noarch.rpmeaf570f9e7e5d03c74ee30d88204d6035ed8b9205b0b5e5b30afbe55cf49dedelibwbclient-devel-4.6.2-8.el7.i686.rpmb97342435c5db24f60b1037af56f84027d35aeb819210e302ed479ca03196145ctdb-tests-4.6.2-8.el7.x86_64.rpm86f9ed7a6734816420559a1f4506ce587433c89c01354e6f47192b0d0c2ebfc4ctdb-4.6.2-8.el7.x86_64.rpmdad9e8614d260bfe78891bbfd95d7c6c16bd7f9189fd63253c8a003ea424412esamba-common-libs-4.6.2-8.el7.x86_64.rpm5d035afb49a2cfacee0595e29cbcf110695e46b4f7ef443d47c1cbae5b1306casamba-dc-4.6.2-8.el7.x86_64.rpm282088df32798946fe38d2e192087d9419e917b75a48da252715750fc8088adflibwbclient-4.6.2-8.el7.i686.rpmbb91483d7fc2900993751bbeb0f0c8bf21e3bd18c55b0e6b10e192804f1be7cdlibsmbclient-4.6.2-8.el7.i686.rpm2229d218510ea6e7579acd73da0d3fbd84b642ee19163745ce909562cd2b37eectdb-devel-4.6.2-8.el7.x86_64.rpm546ed8bc32bc51bd6675ba28570b6352b4d0b22aaee59dac0e794c2339eceb9asamba-dc-libs-4.6.2-8.el7.x86_64.rpm7f76e614d7662b60e7b1d9cc857410f51583d724937f7358644a5eca77963f24samba-winbind-modules-4.6.2-8.el7.x86_64.rpmb87a45c6c368373251ff2c3d5cab108f7c3932b27a7f1298a6292daabeffac65samba-devel-4.6.2-8.el7.i686.rpm32b044d8b1477b403bf25a82c734fa232a19c547c58797b93e8d420be3dd4ceasamba-pidl-4.6.2-8.el7.noarch.rpm2af16a1ba887844dc477e9288dc541c99e51691f810659e250da2fa63ccff4f6samba-libs-4.6.2-8.el7.x86_64.rpmc386e00b998a7abb215e5736d61b7f14458aa73d531e8fd05d205769ba7f776clibwbclient-devel-4.6.2-8.el7.x86_64.rpmb85ddce46e17e3a16e510872ac129a651c133704639378dc57bede08d6332d4asamba-winbind-clients-4.6.2-8.el7.x86_64.rpm55d9c7542920f67af0a6d1887e58c52a9f87cab13c049d5da1908dd93608b226libsmbclient-devel-4.6.2-8.el7.i686.rpm1b2b34a1a251d3d2bc99b4c6c5abec37625960f5436a7c833685b269d6ca091dsamba-4.6.2-8.el7.x86_64.rpm3e81c25b8b7a8c5e1fa48422610d75b58ab6c4de6c7d963f686afafb1731366esamba-devel-4.6.2-8.el7.x86_64.rpm9d06b75445d96d8733698d5af8f9728f55e54ee8eaeea20c5ebf3cd30bbcca06samba-winbind-modules-4.6.2-8.el7.i686.rpm9a747bec1f148e8662edb5c9a71043c068c76703a6473fe434bba9d135bff196libwbclient-4.6.2-8.el7.x86_64.rpmaf056d5325614a564b7c152c29242e93e91d0bc5949ac25e30fe4d7da220da70samba-test-libs-4.6.2-8.el7.i686.rpm79ad0a31d34dad95dde918071fb6453fa770c097e800e8c854635767c7695cc5libsmbclient-devel-4.6.2-8.el7.x86_64.rpm45906f929dab7bc819a12859df4517d7ae5a5b0460d53a30734dbf3a11612c3fsamba-libs-4.6.2-8.el7.i686.rpme2e21ba805223252b8af63d1156ed182e3668b950f98b184affc4e05f0d3f204samba-vfs-glusterfs-4.6.2-8.el7.x86_64.rpm55bf604b7cd73ddd746b535c54dc8fadb6e83043fc33bc70b9819d5f52fff356samba-client-libs-4.6.2-8.el7.x86_64.rpm143e87838e60c715aef91f696975148230ae84ddbca51383d8416df2d5a22afdsamba-python-4.6.2-8.el7.x86_64.rpm757977ea874ef78f0f2b4b79350e01bb0117b5e9d4af553e8057cac6d872aaf4samba-client-4.6.2-8.el7.x86_64.rpmdf08926e6e87f3a8eee46a0b8aa56fcb820ac1e3d14b8d4b4e3f8d49a0fac614ctdb-devel-4.6.2-8.el7.i686.rpmf705de7c4d65ea7844a3df2d9dbde890a2716dfea625d038d3e8694d14c117basamba-test-libs-4.6.2-8.el7.x86_64.rpma62f13940c437d21709870ccc9cd9a0aca7c617d6fe27f9bb275de9021e6eaebsamba-winbind-4.6.2-8.el7.x86_64.rpm9ff6845ce430b9a482182f59e7e0e9eed15d6dedf6e2b1197b03ac3731674258samba-common-tools-4.6.2-8.el7.x86_64.rpme937497704ca1b74f16f8c12ed0c85c2256b99c85c66715d88b0a842ba2108bbSLSA-2017:1975-1LibreofficeSecurity Fix(es): * An out-of-bounds write flaw was found in the way Libreoffice rendered certain documents containing Polygon images. By tricking a user into opening a specially crafted LibreOffice file, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2017-7870)moderateScientific LinuxScientific Linux 7autocorr-ko-5.0.6.2-14.el7.noarch.rpmb11b822374beff321bcd3f2df66351e2e748390465df71dfb64d263aa1caa4fdlibreoffice-langpack-hu-5.0.6.2-14.el7.x86_64.rpm0d07656f6b709d8d2f55f023668c425b7b2543ec9e09b9f624b817068d98db7blibreoffice-pyuno-5.0.6.2-14.el7.x86_64.rpmd9cc6bde12e8d6697fc73279b029efc3df48a757e0889a42a5491dabefb1736dlibreoffice-impress-5.0.6.2-14.el7.x86_64.rpm8ed3e7e6ade4608d3f76a0a15f49afc897be0ac8254d0643748eec05a29b34c5autocorr-fr-5.0.6.2-14.el7.noarch.rpmea6bc8ab2fa67fac1560f3240bd4fedbba53dbec1d50c44dcc8d0e6b34ff7055libreoffice-calc-5.0.6.2-14.el7.x86_64.rpmc78ce1f20ea65900f61a171318ba7dd6bda9589dc543d336c11b7fbaa643b024libreoffice-sdk-5.0.6.2-14.el7.x86_64.rpmf46d1310c8a95845ec9167ebad2266bb26018440d1fff9fea8f62a273f36925cautocorr-pt-5.0.6.2-14.el7.noarch.rpmcef82d1c7d81496fb4b7b34d7adeffd8d8222911a760ec0412c83f9d79413486autocorr-ru-5.0.6.2-14.el7.noarch.rpm26d74742d1f843d822fa5a902a92a6090c07d48651302282ac649c2850db3f66libreoffice-writer-5.0.6.2-14.el7.x86_64.rpm69d6c1eedd4cbeae82f116f0a582a3512c46b18263dde5310b277ba05f73590flibreoffice-langpack-kn-5.0.6.2-14.el7.x86_64.rpmd92c771097893e7d2904d4abbdb56c5ceda0edd4bcd6fa0e7967b35f10c6c8e0autocorr-ro-5.0.6.2-14.el7.noarch.rpm777671a9d7997b2a3800284b88397a1167c1ef0164981ffc07c641cf45da2235libreoffice-langpack-te-5.0.6.2-14.el7.x86_64.rpm813286c8e142acb49f8ac66745ec6f0a9333b110d2fed095789e1aaf9c516b9blibreoffice-langpack-ss-5.0.6.2-14.el7.x86_64.rpm7a24cec0240521a91c0c76569b7837f6e80524465528db8a793ad69ae461f0c9libreoffice-langpack-hr-5.0.6.2-14.el7.x86_64.rpmdc5700454d37bedede1b289916d4b94f3f3d156da6b89538893768425b6ce224autocorr-hu-5.0.6.2-14.el7.noarch.rpmc3d789a86bbf9b569e856a581dc0d6ce1acdc82857092476fcb16390c9623944libreoffice-langpack-fi-5.0.6.2-14.el7.x86_64.rpm11b1f9117fcdaa7ca585c456fc539c19e4cc21cdb5397eb1381480e7829ceefclibreoffice-langpack-as-5.0.6.2-14.el7.x86_64.rpm2df35ea778b42593d68a88aa17dc004a8e780318aa9c78b8da216f6dd7ec0ba6libreoffice-langpack-pt-BR-5.0.6.2-14.el7.x86_64.rpm8ac5ab8f5e76d254df4dfdc80f38f1bee1113e535b51fe52554509681820fbb4libreoffice-langpack-nso-5.0.6.2-14.el7.x86_64.rpme9687161cb02dcbce95e7d236ab435d925aaf45221d315b2cc0ec01eb55cb005libreoffice-langpack-dz-5.0.6.2-14.el7.x86_64.rpma6d5ed6cd7a2b40cbcae58c1bad7b5ca8fe0f385b3c232ae4ce187f65f1d662flibreoffice-langpack-en-5.0.6.2-14.el7.x86_64.rpm5b27106461f8b5f69801652fd98627606a77811b5de959e99af58464c5724397libreoffice-langpack-sk-5.0.6.2-14.el7.x86_64.rpm56e644ed4f3bcaa6f7f4fc1340d7f53d752e0c99c2f0b112f2a4f6a3a8aee5ealibreoffice-draw-5.0.6.2-14.el7.x86_64.rpm21a79f5c74b6acb1c3c6062b6f431302bd6c569476438e76369495b120ca3976libreoffice-langpack-or-5.0.6.2-14.el7.x86_64.rpmafda3ccc644595c838d050a1fb926a6e7b236f62b01fa7c13de9b9bc36c8137flibreoffice-langpack-gl-5.0.6.2-14.el7.x86_64.rpm283ca403765967fb1a61c3c2912cf53a9aa3868bf45a20f3204fe5ced42fc2fblibreofficekit-5.0.6.2-14.el7.x86_64.rpmaa7df2b32994fa1bb89bee2b07d830b9ce8e992809a0d3c7573413cb60c55dcdautocorr-is-5.0.6.2-14.el7.noarch.rpm45635817428c1b8defcd52af7a49de63600baf7c66ca33c882e2ef977e870f98autocorr-tr-5.0.6.2-14.el7.noarch.rpm499f3523f371cd6e7f2ce1034168983ffa54c4ed3b1e95fb6081b0c93062ae8aautocorr-ga-5.0.6.2-14.el7.noarch.rpmb07213ba7c352e37e5fa10155f5a7b0c2369f613998bf303bdb952693b1ace74autocorr-vi-5.0.6.2-14.el7.noarch.rpma3065dfee772a502d2fe8163dabb489e410d7cf6d48a291906a0fc685c0c59ebautocorr-ca-5.0.6.2-14.el7.noarch.rpm7409bd26c546dcee50249cf2c932701890545eaf8dc2e1bd97a60b57a6c0b1d9libreoffice-librelogo-5.0.6.2-14.el7.x86_64.rpm03808da0ba3fac39d20b03c3d67a9fc303cf697056755b3e6afd9ddea115af26libreoffice-langpack-mai-5.0.6.2-14.el7.x86_64.rpm7077b735d83b5faf5d7f93626841608c63c496861d26be250bc636a959d65971libreoffice-gdb-debug-support-5.0.6.2-14.el7.x86_64.rpm254062a695e5fc1be8e10df120fa7a6e7bb6a25522807f38eba5730ec46e0a62libreoffice-emailmerge-5.0.6.2-14.el7.x86_64.rpmcaea3b6bca599ea1fa5a532f7b9f0e716542f631e2df5c4748701589535ab37elibreoffice-officebean-5.0.6.2-14.el7.x86_64.rpm066c7b514e752eea17e4b95d0296af51f1b27474eb5f09f18bc13f5505b9090alibreoffice-core-5.0.6.2-14.el7.x86_64.rpm6389af27e00874f1c51e1bdcf18b4b113773a852e51df567ee290c67b01a014flibreoffice-sdk-doc-5.0.6.2-14.el7.x86_64.rpma0e304560457559fc2500f22e42ca5593fd3ba77cef1522598d910f80c1d63dblibreoffice-postgresql-5.0.6.2-14.el7.x86_64.rpm4252face52ec1098e277e598a45b614c2726f27535eb41368494ab779594769elibreoffice-5.0.6.2-14.el7.x86_64.rpm9f00c3573d5a9bf728445c3b83de950f8749646c75c38de93a53973f17df6cf7libreoffice-graphicfilter-5.0.6.2-14.el7.x86_64.rpmebfcfa9eace9628b3a5d637b90e781fbdeaca8970fb22eff2d45c74cd4ffa467autocorr-en-5.0.6.2-14.el7.noarch.rpm58f7fd7db08f3cf3ff8988592fbb5052f4f0de6c193238bdba6712582a6cc491libreoffice-langpack-af-5.0.6.2-14.el7.x86_64.rpm21b178f9181c90d0c8ca73c46e159933b7575cbfb4d10679e919f9481f0ad1f8libreoffice-math-5.0.6.2-14.el7.x86_64.rpm6c838bf142efb5c705f6adb911e0ab0118a601e1c193d49569c5ab84727a3eb6libreoffice-langpack-it-5.0.6.2-14.el7.x86_64.rpmf0a3900d3cb74265f444994500298fdb4991a17c9f0bbb587dc6a5b0b2d166a2autocorr-af-5.0.6.2-14.el7.noarch.rpm385c35f94bd6b055be0861e43126553252d70e1fbe8c6ba718ca97243658c61clibreoffice-langpack-he-5.0.6.2-14.el7.x86_64.rpm1265972183f44e7906631ca39accb58cfe3d8940ac0eef46f84007201d4e5b3alibreoffice-langpack-th-5.0.6.2-14.el7.x86_64.rpmbd07e47a22af709233617b9c32ced923246b9bcf9cd90fcc43181cbf0f6cde30libreoffice-opensymbol-fonts-5.0.6.2-14.el7.noarch.rpmdb96e4f4478b9350c7094b46a0f423614df4a3aa82faa037ebd3cfb71afec0e3libreoffice-langpack-ko-5.0.6.2-14.el7.x86_64.rpm1458a30968b6f0da8139b8c4c0402b1405fa53dca59786cba699977515499a4clibreoffice-langpack-hi-5.0.6.2-14.el7.x86_64.rpm143e2e47ba71ae7d6ad6ffccd2a57b57ce3dfeb9d405d3470ffe429d28677297autocorr-pl-5.0.6.2-14.el7.noarch.rpm53c14568072599a31476dd244b98c9e0c173e367a03329f31833b6370ff0498alibreoffice-langpack-zu-5.0.6.2-14.el7.x86_64.rpm03dd4d0752a4316057162a688a9ba37a5b775c9ead82d84f9cddb0dc43ac5471libreoffice-langpack-pt-PT-5.0.6.2-14.el7.x86_64.rpme1e1a02933aee56b9772d15f42036432253e89e373d4d7189d0017958a5dda2clibreoffice-langpack-cs-5.0.6.2-14.el7.x86_64.rpm3da5753ed58b71db3dee4a82f004973bbf2ba1474fed98c000a7e1d1cc181173autocorr-fi-5.0.6.2-14.el7.noarch.rpm49f18e941aa366d7adbb1fc119a5c97090959991a4eee292a3e42df5cba53d0aautocorr-lb-5.0.6.2-14.el7.noarch.rpmcc014ff07e99ee4cd0d1e33afb33e3d796778c44692eca186f8c368563cc230blibreoffice-langpack-ts-5.0.6.2-14.el7.x86_64.rpm2c1bc65ae6fb97b2d8ff72ed9f5c88b749ec95e33c079ff78f02f7fdb4e1fcd7libreoffice-langpack-ja-5.0.6.2-14.el7.x86_64.rpmbe5a38ea46407db627d6bd0aff7368d2fe11e36302939dd78094da652d8a4cdbautocorr-sl-5.0.6.2-14.el7.noarch.rpmf392b25f566e16e54a6e7ea21e19a4cc3525bf59b2cc3ff962bf74795371cfcblibreoffice-bsh-5.0.6.2-14.el7.x86_64.rpm5b508a8b520a7b764264cdf4cec28a6f2bd4ad66b391d9b2527bb3a235b037fblibreoffice-langpack-es-5.0.6.2-14.el7.x86_64.rpmb8c5e21dfe5975da9456fcd2dcd01e46c45ef0154e2b0f49253b77cd0befade3libreoffice-xsltfilter-5.0.6.2-14.el7.x86_64.rpm00ac4069303ad57d42829403ab60c09a4d4655f7d569f620bfa75bf98f8a409flibreoffice-langpack-ml-5.0.6.2-14.el7.x86_64.rpm910e21864df4b3b4382e62a2a1c1fe5f585d7fe4889b173ee2f59727674cc57elibreoffice-langpack-br-5.0.6.2-14.el7.x86_64.rpmdaf5225ab273150a12c2a08b81dd90bcfd6b4732169f90d17701f07475537c5blibreoffice-langpack-cy-5.0.6.2-14.el7.x86_64.rpmfa53396ade5f8454ed0dc1e1593c65edd1aacf804d91ee92dbf514ca0ac5483dautocorr-es-5.0.6.2-14.el7.noarch.rpm42b70e64a7034eb4280a564c7de45c97cef980411429857de6b03f35f86942a7libreoffice-langpack-nn-5.0.6.2-14.el7.x86_64.rpm7a13b5c1a3edafcfb81308faef7a45fad218ca0123066d07833f10b243551813libreoffice-langpack-ro-5.0.6.2-14.el7.x86_64.rpm28608a1298b5c433a0d88337e6b4ff85ae7dc0481a3d597c61d78c681050f68bautocorr-hr-5.0.6.2-14.el7.noarch.rpm547c74397d6dedd5933447d01b65a7cb3839738def8e4b27d5be9f3404c18dc8libreoffice-ure-5.0.6.2-14.el7.x86_64.rpm57330f6bac031c21c14ed5b1fea30d7ca605cd67128f1ac3e207de0824aa97cclibreoffice-langpack-el-5.0.6.2-14.el7.x86_64.rpm200a56715eccc2289ce4818b45b6a465b5a47ebe1f06c7c4be153746f5bb2239libreoffice-langpack-pa-5.0.6.2-14.el7.x86_64.rpmaf79556138d8c2a6f9f6b332e4571d468320acc5089cc703ffdf579805d46851libreoffice-langpack-da-5.0.6.2-14.el7.x86_64.rpmccc9f262752003089984ea7f19ca6eaa3ea94ed21a13f6973b366b63bf6026fflibreoffice-langpack-tr-5.0.6.2-14.el7.x86_64.rpm25a4a42e96d3887f3c9de64761b98ad65160f67d23aecbc265967cc0358dea39libreoffice-langpack-nb-5.0.6.2-14.el7.x86_64.rpm4b0679abbeb8efb62828e830a019587d5e0f1db61d165fa259fb2efd66676c16libreoffice-wiki-publisher-5.0.6.2-14.el7.x86_64.rpm911218c213cd0c6db1f8b2286157bdf14942fed5f0d69b39114150d599f11a01libreoffice-langpack-bg-5.0.6.2-14.el7.x86_64.rpm697bac34e753f3aa77b0c1a906b49e73dbf57cfb2d1303e516791482deb8bc30autocorr-nl-5.0.6.2-14.el7.noarch.rpm6a76772d3c7ec3937a7092492398097bf753e7b20ca32c51aa6c2a021ad6f830libreoffice-base-5.0.6.2-14.el7.x86_64.rpmdccbeab335774e6dfd0e22c9796f0a785237f33249e1e13423840e98465b0380libreofficekit-5.0.6.2-14.el7.i686.rpm906a37f38ccfdca2cf3f2dbc85fefaa7d6f62d1d093b0b02a19ff34f894dd700libreoffice-langpack-de-5.0.6.2-14.el7.x86_64.rpmd2644f94b373fcd29eaaefb94c751cde150b30bdb88b0a4d11c87956d0e6d3f0autocorr-da-5.0.6.2-14.el7.noarch.rpm2ac9df3fe15effac2c13d5e029382051c6c377eb55c006653d499184022e21dalibreoffice-pdfimport-5.0.6.2-14.el7.x86_64.rpm6f0960e857762c8cc8182c9af7160014a1f580ffe943d4fafc7b564f7aa9f73flibreoffice-langpack-zh-Hans-5.0.6.2-14.el7.x86_64.rpmba2a98e31639332da17421ef2124c2028e61770a81c4ba945e58dd4b6c3d22a9autocorr-de-5.0.6.2-14.el7.noarch.rpm3b83bfb6c1600713a5620fd77d3d87b1c81f33b82441f7a80a2582463f4e1c76libreoffice-langpack-ta-5.0.6.2-14.el7.x86_64.rpm52a6efa8ad59a13de83fe7cadcbdc39d7e5686efe2f4131440398977b71eade0libreoffice-langpack-uk-5.0.6.2-14.el7.x86_64.rpm42c6cee9213ced7bf6d56c85af50c1d156459edd7f829d1a8133916ef95b018flibreoffice-langpack-zh-Hant-5.0.6.2-14.el7.x86_64.rpm856d42c5c48233cfbe216ff676937e19bb1d51a9bc14324a02b67a50418632a9libreoffice-langpack-et-5.0.6.2-14.el7.x86_64.rpm04a1106d0fe801529e6bd45fe641a08cda50f74fd9d6faa715882740619f2d8clibreoffice-langpack-eu-5.0.6.2-14.el7.x86_64.rpma0f435e5620fba23b450e3dfc4c4038671b11e8d4d0c498855659f8dff1b973eautocorr-sr-5.0.6.2-14.el7.noarch.rpm92b0d0b6756416eb1c797cdcc9df209a1b887b64a9f659fb9d0076648cfcbb4blibreoffice-glade-5.0.6.2-14.el7.x86_64.rpmb0dfc87512609724fbb8102bbf9793993ff79a1a4d070e324472c9f55203cea5libreoffice-langpack-sr-5.0.6.2-14.el7.x86_64.rpm96eb15b3d5604e7ba62ed6e995c9b242dc289631060e1c41cdfb3a7a133d1a49libreoffice-langpack-nl-5.0.6.2-14.el7.x86_64.rpm5aa7ab51b357fb4c0b7ecec3ea601249c44cbd7da09d05fb57bc1a34f0fb7385libreoffice-langpack-pl-5.0.6.2-14.el7.x86_64.rpm6e365427afce447c462b312cfee42497b6a6931b7ff95c46d272bd82b341dbd5autocorr-zh-5.0.6.2-14.el7.noarch.rpm71ca27ca13a5a9f7ebff718f5f8fe9df3bda6b0ee765cba2f6ba8d4f1c45c3eclibreoffice-langpack-ar-5.0.6.2-14.el7.x86_64.rpmb0219d3545af26ff527759ad8137559bd4448adab31a6d56c1874f912e0dd05elibreoffice-langpack-lt-5.0.6.2-14.el7.x86_64.rpm7b9a7fc38a0dcf9caa45e8bc3dc77d53bb9c53aa86d585feb7370d2551a8e749libreoffice-langpack-mr-5.0.6.2-14.el7.x86_64.rpmbbf220833d9144bc28951ca0939671d982083ec76219b6b4132327af4a05cd99libreoffice-langpack-ca-5.0.6.2-14.el7.x86_64.rpm30733fd2d06b65139038f52ab1e154da89518b479139048fd5cf61c9c4d62548libreoffice-langpack-st-5.0.6.2-14.el7.x86_64.rpm7fe9a0be443737330cf4ee87f44d535f975dad43c341454df3a17b9b227ec272libreoffice-langpack-ga-5.0.6.2-14.el7.x86_64.rpmd7ee65a8faab9e4eb2dbe69ea9e9bc598ccd9df4412c2b1b04618857aa570b3flibreoffice-langpack-kk-5.0.6.2-14.el7.x86_64.rpm12d305b0caf1738783b4abcedf8e540555e2c1a617e1c9361cd1cb8c955873d8libreofficekit-devel-5.0.6.2-14.el7.i686.rpmb8bad7883258b5136bac74680c42ef1c296fd20c229db7459a11065fe18de86elibreoffice-langpack-xh-5.0.6.2-14.el7.x86_64.rpmea8ca0badb28aa96896d4c426f6677fe9aa8d73b24192ae3600ec291f943649clibreoffice-langpack-ve-5.0.6.2-14.el7.x86_64.rpm030b47e5b7d0d23472cd0f0f1284786ad6eccc649eb80a98763468715a08a8adlibreoffice-langpack-nr-5.0.6.2-14.el7.x86_64.rpm422dd5402d272fab8891d982c8260d3c7f42bd81af4011f3288218d5e0de8fdelibreoffice-langpack-sv-5.0.6.2-14.el7.x86_64.rpm64202be9371980ae06b3e2afd644e32aab479e318c0e7d0773ff1508070b9c3eautocorr-sv-5.0.6.2-14.el7.noarch.rpm9eff20f1924609b1c53185d7d510ae1a4d8c564cd0565a542cd84d065f858705libreoffice-langpack-sl-5.0.6.2-14.el7.x86_64.rpm1e701aab4a2aee337b7fab1fdf04d680c5286fcd8027439236ce3c2288febb39libreoffice-ogltrans-5.0.6.2-14.el7.x86_64.rpm88f24b3e0e61b05a4c0c17985a99fc664191780b1c0de0631a5501c9e73347f6libreoffice-langpack-fa-5.0.6.2-14.el7.x86_64.rpm036341d354ce7a1c53e3883a9a7bcc4778b38c9bd399e04548958da90de6f1f6autocorr-it-5.0.6.2-14.el7.noarch.rpm8e4dfed265ce836fe1e6271f17a6a77683adb47bcb58de4402bd50266fedec73autocorr-bg-5.0.6.2-14.el7.noarch.rpm1f4c0ecd9b2644a9aa3402f1905094a10741b5816eb388718dc5cdda19c607ddlibreofficekit-devel-5.0.6.2-14.el7.x86_64.rpm2d1c7355d140a88f0106dfe05d6f3ff49f14e6375c6a1022d4aa2c86b00f321dlibreoffice-langpack-fr-5.0.6.2-14.el7.x86_64.rpmc59919ab09820febd59116e13558731e60a1dd15cc0711d9aa0aec82fbb3757elibreoffice-filters-5.0.6.2-14.el7.x86_64.rpm1847d20565104ffa248cfba8c885d940bbdf02911fc2ba761121ab5e93d9ce0fautocorr-lt-5.0.6.2-14.el7.noarch.rpm4a7965dc949216ef429f3cf903d4891d008b0ef122c5c9f1811ad148320378e1autocorr-cs-5.0.6.2-14.el7.noarch.rpm4e93abcf1c68c33cabae5d7a0df759b849102483bc7c9b0152a04dc6204e0141libreoffice-rhino-5.0.6.2-14.el7.x86_64.rpmaaf1d14c1296ecf765419d8989ab9c2de9aca65fb02d2920fb76f09187cdf8e0libreoffice-langpack-lv-5.0.6.2-14.el7.x86_64.rpm0e677424fd60285fe81963e4cedff97da02edc0c5f9dc3e65d45186be25e8a5elibreoffice-langpack-gu-5.0.6.2-14.el7.x86_64.rpmf80cc3d14c99404cb9e16f4d0f78f683f1c69f8d73414c65bf4714078b3627d6autocorr-sk-5.0.6.2-14.el7.noarch.rpmc6ac1f80b1ea1101cbaa90a62ac47d60cb4237e098b2cace026c6bcd1e53cf01autocorr-mn-5.0.6.2-14.el7.noarch.rpm7c6f6c38c88e8563eb17542b1e2c95c6b8a87989af02543443c5be55cac2281bautocorr-fa-5.0.6.2-14.el7.noarch.rpm17ee501bf058500bf85dfe8648672f4e8d17fcaee9810adb0e9894624e396f08libreoffice-langpack-ru-5.0.6.2-14.el7.x86_64.rpm0e2346532f7fa8c4d579e2e4c13f4f6df8439d0f163d2dc612a38096bc332ebdautocorr-ja-5.0.6.2-14.el7.noarch.rpm82a3dd85a23102f506d73dd32334f70afb2deb88dfd61101f3fa4797c0ebb564libreoffice-langpack-bn-5.0.6.2-14.el7.x86_64.rpmdafeee32d467447b53bc61fa8541ffc7272c2e2cd2a00428316f3533ffc081b3libreoffice-nlpsolver-5.0.6.2-14.el7.x86_64.rpm58cdb228d2bd802b28b44bdb874891cb4083eeb77884a01985756135a00bec2clibreoffice-langpack-tn-5.0.6.2-14.el7.x86_64.rpmf9eeb90e0f6c7b8cefa9639c57d0f86fc5b18a93a072e6883d529d954e7c5c70libreoffice-langpack-si-5.0.6.2-14.el7.x86_64.rpme9083fdacf1a56edff76fac7d372de4f61a8be436dcfbed1342bd02421f5e87eSLSA-2017:1983-1PostgresqlThe following packages have been upgraded to a later upstream version: postgresql (9.2.21). Security Fix(es): * It was found that some selectivity estimation functions did not check user privileges before providing information from pg_statistic, possibly leaking information. A non-administrative database user could use this flaw to steal some information from tables they are otherwise not allowed to access. (CVE-2017-7484) * It was found that the pg_user_mappings view could disclose information about user mappings to a foreign database to non-administrative database users. A database user with USAGE privilege for this mapping could, when querying the view, obtain user mapping data, such as the username and password used to connect to the foreign database. (CVE-2017-7486)moderateScientific LinuxScientific Linux 7postgresql-libs-9.2.21-1.el7.i686.rpmf779fd5488410472d8baaedc064653f4cc9c1a30fff1976b7a0bf4ac63559d5fpostgresql-pltcl-9.2.21-1.el7.x86_64.rpmae74a10d3ed765cabb70d55e360379e31f4c89b4792e91092c9d389d2b296c71postgresql-plpython-9.2.21-1.el7.x86_64.rpm3ae7f99dbabafa374d411067f5b89b5434bfaab165447583903cd36214f515c3postgresql-docs-9.2.21-1.el7.x86_64.rpm08ea709284c6afb0dd7a31729988bad9afcbcf7076a02415cb98982e3caba2ebpostgresql-upgrade-9.2.21-1.el7.x86_64.rpm3f9b2e78d505a2812f0dfc42ef78339d12e88e40a4d931711d911f06033b9ed7postgresql-devel-9.2.21-1.el7.i686.rpm91157578f5fa5537583478df8cd40bf1e4600a06fe9c0927ad26364beb870bf8postgresql-libs-9.2.21-1.el7.x86_64.rpme85713609d765e61562ca5ce03025f8d98a63b159be04c9d1633f049b353c4b6postgresql-devel-9.2.21-1.el7.x86_64.rpm732f5b1a6f5f4ff4729ea8d05db17166a8523b3301f2079eaf42e6b98d1e685bpostgresql-static-9.2.21-1.el7.i686.rpm09600905ed73a6d325aa80734dc68c74d67d33681522751b86e43b12b27c8470postgresql-plperl-9.2.21-1.el7.x86_64.rpm38d3028eaf5af7228f71c5e680373cbe0c4d1b2ff9b22431c3d19adf82371c27postgresql-static-9.2.21-1.el7.x86_64.rpm6933fce73a284dfc6e8a9e97a57664363980138341e16502907d645a9cb76061postgresql-contrib-9.2.21-1.el7.x86_64.rpm6c064784cf0eff13715645dbf3ef41f4063d919834a73a2e091a7e316b8788eapostgresql-9.2.21-1.el7.i686.rpmed7af420856d465b1e5df5d15afab1f079a8a84377aeb663345e894621d26c08postgresql-server-9.2.21-1.el7.x86_64.rpm659beaa5f23ca87280b57ea2d0c0b9a8cff40283b95c0428b247ee220078d9eepostgresql-9.2.21-1.el7.x86_64.rpm47e3f74ba1e59e237dc769412b277468b2e08f141c727e9f0ce4928f8f29d189postgresql-test-9.2.21-1.el7.x86_64.rpmd59a0cb2af439a5aa475abac42d1bd86f20df677b3cf79cba9dfdf99b1dd025dSLSA-2017:2000-1Tigervnc And FltkFLTK (pronounced "fulltick") is a cross-platform C++ GUI toolkit. It provides modern GUI functionality without the bloat, and supports 3D graphics via OpenGL and its built-in GLUT emulation. The following packages have been upgraded to a later upstream version: tigervnc (1.8.0), fltk (1.3.4). Security Fix(es): * A denial of service flaw was found in the TigerVNC's Xvnc server. A remote unauthenticated attacker could use this flaw to make Xvnc crash by terminating the TLS handshake process early. (CVE-2016-10207) * A double free flaw was found in the way TigerVNC handled ClientFence messages. A remote, authenticated attacker could use this flaw to make Xvnc crash by sending specially crafted ClientFence messages, resulting in denial of service. (CVE-2017-7393) * A missing input sanitization flaw was found in the way TigerVNC handled credentials. A remote unauthenticated attacker could use this flaw to make Xvnc crash by sending specially crafted usernames, resulting in denial of service. (CVE-2017-7394) * An integer overflow flaw was found in the way TigerVNC handled ClientCutText messages. A remote, authenticated attacker could use this flaw to make Xvnc crash by sending specially crafted ClientCutText messages, resulting in denial of service. (CVE-2017-7395) * A buffer overflow flaw, leading to memory corruption, was found in TigerVNC viewer. A remote malicious VNC server could use this flaw to crash the client vncviewer process resulting in denial of service. (CVE-2017-5581) * A memory leak flaw was found in the way TigerVNC handled termination of VeNCrypt connections. A remote unauthenticated attacker could repeatedly send connection requests to the Xvnc server, causing it to consume large amounts of memory resources over time, and ultimately leading to a denial of service due to memory exhaustion. (CVE-2017-7392) * A memory leak flaw was found in the way TigerVNC handled client connections. A remote unauthenticated attacker could repeatedly send connection requests to the Xvnc server, causing it to consume large amounts of memory resources over time, and ultimately leading to a denial of service due to memory exhaustion. (CVE-2017-7396)moderateScientific LinuxScientific Linux 7tigervnc-license-1.8.0-1.el7.noarch.rpmcf0bf59603143f381776aa92f295bab17f1ea4187f81ad336c6164d91fe3e02bfltk-1.3.4-1.el7.x86_64.rpm9c6d66c3bcdb8275947db19a6d50eb7b36c80fb2529216959d07a615eb9ee80ftigervnc-server-module-1.8.0-1.el7.x86_64.rpm14c4cd3628900d459487403759a803e9c06e27a2b69cd111be2528bdd70db29efltk-1.3.4-1.el7.i686.rpm34c0e01a6d8bfecfd9dc721267a4569e60c60a888d1a45cf91ed2222425e56f2fltk-static-1.3.4-1.el7.i686.rpm64d93936cedf735a82f829166b0606885995325d6df1585de359f87016c7f3a2fltk-fluid-1.3.4-1.el7.x86_64.rpmed346d1a8dc1d256deb7e441d954575306638af236fc2f363d3b6ba4239ebb3etigervnc-icons-1.8.0-1.el7.noarch.rpm4e2e32ecdc13d7f094ec71c0fe58c4644eab579b9dc41bf264042b1e62a64aaafltk-static-1.3.4-1.el7.x86_64.rpm6395395a63458d887ce0d9e6f2e35624c0e7e9b2ae0d3d19a77aeb4792772f43tigervnc-server-minimal-1.8.0-1.el7.x86_64.rpmf44d88c2e8c832e0b76f12fecc6b234d221842542762ce45df9ebe82b458528ctigervnc-server-1.8.0-1.el7.x86_64.rpm948c29e8a4c24ebf4dc11e673bae54c3d3a331c656c3b9d860636e6d099017dbtigervnc-server-applet-1.8.0-1.el7.noarch.rpm83506cfe84e7efc4c5fd362ce48bbde27046180726e4a2b969307b0cbf3b981ffltk-devel-1.3.4-1.el7.i686.rpmdfd4077966e248bca8506bba773dd27707cf15f70fc2ee339c455f27d251fd6ftigervnc-1.8.0-1.el7.x86_64.rpm5bb27ab4bfea384fc6e6469732ab2bbae27b52d4673964bc0e27ca7d3c94b693fltk-devel-1.3.4-1.el7.x86_64.rpm96076182e312b7f18bbc91ab028d4264038585256a48b26d509c82838089b831SLSA-2017:2004-1GitSecurity Fix(es): * It was found that the git-prompt.sh script shipped with git failed to correctly handle branch names containing special characters. A specially crafted git repository could use this flaw to execute arbitrary commands if a user working with the repository configured their shell to include repository information in the prompt. (CVE-2014-9938) * A flaw was found in the way git-shell handled command-line options for the restricted set of git-shell commands. A remote, authenticated attacker could use this flaw to bypass git-shell restrictions, to view and manipulate files, by abusing the instance of the less command launched using crafted command-line options. (CVE-2017-8386)moderateScientific LinuxScientific Linux 7git-p4-1.8.3.1-11.el7.noarch.rpm621b90719589d4378627f73e7f10ca7f01c5d0361638816fc232561e5a8b72a8emacs-git-1.8.3.1-11.el7.noarch.rpm4ae9c932a6f6844d476c3c983652adf5c0f71a3615f4d5147e743b41d02c123dperl-Git-1.8.3.1-11.el7.noarch.rpm149447e1781ba34489dd131dfb0000ddfbca1c6b28498a826f21251e6b3f423dgit-email-1.8.3.1-11.el7.noarch.rpm7ffa844ead2ce9fc5fc60ad672ee5e5018cb4c52caf3cc6878e741c4df5ac0eeemacs-git-el-1.8.3.1-11.el7.noarch.rpme8f215af48fa45fb0acfcc5a56d92b499029cfc60a9bf11f7a8dc3d14d56e204git-bzr-1.8.3.1-11.el7.noarch.rpmc58ccce256bd4d27fe5b179adbae56402db9fc5e1dc75a2a5453a82c63410e3fgit-hg-1.8.3.1-11.el7.noarch.rpme1ad5703b2d4e9819e76413f02f2c092d08593023ebeb80ad25b94f8f1875fc2gitk-1.8.3.1-11.el7.noarch.rpmd7993a3b300e6cf8fcc2113e2030f5dc9732740b226ca8db8bde361a835a18a8git-1.8.3.1-11.el7.x86_64.rpm7a2303884b1bac2d8438a4a22925934814614b842b01d31a44b6de859c99ca12git-cvs-1.8.3.1-11.el7.noarch.rpma65ddba0b8963cf870d3010f6f64a737896a240cda5e685ca44534b8e470d9bagit-daemon-1.8.3.1-11.el7.x86_64.rpm7125d4df1f1e58642909e9b6480ca956a0a9f61d721a3c1b4234a769902a4167git-gui-1.8.3.1-11.el7.noarch.rpme566464975c75d5d30cc998d0e4eeedcdc08855f0ba239e9ee164f114fa5fe8eperl-Git-SVN-1.8.3.1-11.el7.noarch.rpmb1aa67a949645a54fdcfec491d9fe20da9f7c12a7ebfd050e2097ba85833d13egitweb-1.8.3.1-11.el7.noarch.rpmab8dfee0e90e79aaa088134b75e32e9781e1ca3482aaa78a8a537b9037f3fe61git-all-1.8.3.1-11.el7.noarch.rpm646dfa33b2dcc19ad9840c9aee9bd4f0ec6c137e7954899a4197e53ba9c46db1git-svn-1.8.3.1-11.el7.x86_64.rpm4211d9e3c6da22e8632b3cc84917aff58045bc2ea3a6155de0a7c27707e22bd7SLSA-2017:2016-1CurlSecurity Fix(es): * Multiple integer overflow flaws leading to heap-based buffer overflows were found in the way curl handled escaping and unescaping of data. An attacker could potentially use these flaws to crash an application using libcurl by sending a specially crafted input to the affected libcurl functions. (CVE-2016-7167)moderateScientific LinuxScientific Linux 7curl-7.29.0-42.el7.x86_64.rpm7a541ab0e8e257f02e286186cca9d1b9abb9c5113ce28cfeab18d521e6f069b4libcurl-7.29.0-42.el7.x86_64.rpmfe735ecdef74a726fd23eb30a748dfd88fb377439c98548d1a069d2439c39e0dlibcurl-devel-7.29.0-42.el7.i686.rpm4f214785c3b1e7e15ff54eeda05ace59f2fd33654a4dba71e1635a77176592cflibcurl-7.29.0-42.el7.i686.rpmfb0c850e9c16843363dc3d13251bc7367b98c2996697c833144f414b8d2e3d1clibcurl-devel-7.29.0-42.el7.x86_64.rpmbe8a03212ed57697ab502d315fe9d14a2bb976d3b4dd2874d2cb4bfdc2de0dc8SLSA-2017:2029-1OpensshThe following packages have been upgraded to a later upstream version: openssh (7.4p1). Security Fix(es): * A covert timing channel flaw was found in the way OpenSSH handled authentication of non-existent users. A remote unauthenticated attacker could possibly use this flaw to determine valid user names by measuring the timing of server responses. (CVE-2016-6210) * It was found that OpenSSH did not limit password lengths for password authentication. A remote unauthenticated attacker could use this flaw to temporarily trigger high CPU consumption in sshd by sending long passwords. (CVE-2016-6515) * It was found that ssh-agent could load PKCS#11 modules from arbitrary paths. An attacker having control of the forwarded agent-socket on the server, and the ability to write to the filesystem of the client host, could use this flaw to execute arbitrary code with the privileges of the user running ssh-agent. (CVE-2016-10009) * It was found that the host private key material could possibly leak to the privilege-separated child processes via re-allocated memory. An attacker able to compromise the privilege-separated process could therefore obtain the leaked key information. (CVE-2016-10011) * It was found that the boundary checks in the code implementing support for pre-authentication compression could have been optimized out by certain compilers. An attacker able to compromise the privilege-separated process could possibly use this flaw for further attacks against the privileged monitor process. (CVE-2016-10012)moderateScientific LinuxScientific Linux 7openssh-clients-7.4p1-11.el7.x86_64.rpm2c2d631a36b664c3304a04e3fe60f3718d66928564a91c9f8a7c349d61012a48openssh-keycat-7.4p1-11.el7.x86_64.rpm9fc4e45532dc8a2c58484deab12b2eee59b9d341d48d2cc85ecda9da6cc4153bpam_ssh_agent_auth-0.10.3-1.11.el7.x86_64.rpm7fdab52407a3c02c9e3b6b5a08003add8373c2ddac148fd846ede62dc2b040bdpam_ssh_agent_auth-0.10.3-1.11.el7.i686.rpm673cb2dcfa0e634b78935e12c236f445b7e3fae2db9fdf57f33105e7f9816a71openssh-askpass-7.4p1-11.el7.x86_64.rpm36d3e8039770dc54412bd0422bef78e00a61f037a7f463d49ce3797416e19929openssh-server-7.4p1-11.el7.x86_64.rpm064f3077cd89a3861e1e9023b32ce278c965dc983cff0b72966cee2fc17284daopenssh-server-sysvinit-7.4p1-11.el7.x86_64.rpm08f907e29c7b60e76b1428e4a8b00de6f9a272250d4f23c741d557f491649902openssh-ldap-7.4p1-11.el7.x86_64.rpme16552d4cf83049d17466dde644bab595a40e1ab79499f1fddb803659ed7686fopenssh-cavs-7.4p1-11.el7.x86_64.rpm0af711e05dee3dd96047e177aaaec4825811bcba8b8ae76cea23bb50a2e73f8copenssh-7.4p1-11.el7.x86_64.rpmf50b432541f66e5c4f531c981d76ffd1774575b2cbccd0dfdff1d4437dfc1af2SLSA-2017:2060-1GstreamerThe following packages have been upgraded to a later upstream version: clutter-gst2 (2.0.18), gnome-video-effects (0.4.3), gstreamer1 (1.10.4), gstreamer1-plugins-bad-free (1.10.4), gstreamer1-plugins-base (1.10.4), gstreamer1-plugins-good (1.10.4), orc (0.4.26). Security Fix(es): * Multiple flaws were found in gstreamer1, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-bad-free packages. An attacker could potentially use these flaws to crash applications which use the GStreamer framework. (CVE-2016-9446, CVE-2016-9810, CVE-2016-9811, CVE-2016-10198, CVE-2016-10199, CVE-2017-5837, CVE-2017-5838, CVE-2017-5839, CVE-2017-5840, CVE-2017-5841, CVE-2017-5842, CVE-2017-5843, CVE-2017-5844, CVE-2017-5845, CVE-2017-5848)moderateScientific LinuxScientific Linux 7clutter-gst2-devel-2.0.18-1.el7.x86_64.rpm008791a48e8c9cffc03c3b6647a2058397af5efc1fd6e5580ab05daababad36fgstreamer1-devel-1.10.4-2.el7.x86_64.rpm224593f80f8fc20a8ecf131ca95d1a5a13695d86c9c70245dedd0d850441c732gnome-video-effects-0.4.3-1.el7.noarch.rpm7acbf4d20802ebf80f34c4a2b032d691a19ea159dd11e90cfbd8cf5395dccb92clutter-gst2-2.0.18-1.el7.i686.rpm9f2e90479760cf3d3cbe208797a4db858272645d2cd63004d749572daf8b761cgstreamer-plugins-bad-free-0.10.23-23.el7.i686.rpm8e5fa325d80c9d15e2a47e2dba8fc54555be9c12c1024324de8cd7487c6a7eb7gstreamer-plugins-good-devel-docs-0.10.31-13.el7.noarch.rpm8e2d95456e9d68a9e62083f87ae2e22f3ffd58dd97783dcfd17f6bd5f8cc33d2gstreamer-plugins-bad-free-devel-0.10.23-23.el7.x86_64.rpmdfdc8b5de1c8fc476ce0580588b35ec1474db08d73e71307ff6b9df0f1807e9egstreamer-plugins-bad-free-devel-0.10.23-23.el7.i686.rpma86c2f8e58ce5c056073572b5e69e29b952393d978bdf344bb5417aae7040255gstreamer1-plugins-base-devel-1.10.4-1.el7.x86_64.rpm84b48e766cf6d2aa221fc8c53f899b90ebbf8fdcd574a447ac7e19bb413a5290gstreamer1-devel-docs-1.10.4-2.el7.noarch.rpm8d559c7f792074ca78621bfb56ffe0537dca219a1ad02405037d5e06f58b2e80gstreamer1-plugins-bad-free-1.10.4-2.el7.x86_64.rpm0bfeb43d6bdac239cd68232cb21962033f8e0114dbf18848365b03ac3eb99f70gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7.x86_64.rpm99442b8bf319c0f891bf2c190c2c5ff04df88ac19c068f462ee27246c50f34cbgstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7.x86_64.rpm37f88a7801fc0ceb81d1d84d3ea1fb5ed9b9d53187a3200bd73c381acd670721gstreamer1-plugins-base-devel-docs-1.10.4-1.el7.noarch.rpm3dc5b1248118b7d924c32c83b6cf2db60cbbce17a930e2232e91803568c07954gstreamer1-plugins-good-1.10.4-2.el7.i686.rpm573acc23be39fb31613787609906346fa301b05df6118b800b210d6d69c438begstreamer1-plugins-bad-free-devel-1.10.4-2.el7.x86_64.rpm2538d8d8e9fe8d5538715e6ba263e2138ae6764199f65e21d3d457ccf5b16004orc-0.4.26-1.el7.x86_64.rpm3f9043a3f0f7bcfe9d212671df5bfe1d51b6ddf586709043380057e2729e0d68gstreamer-plugins-bad-free-0.10.23-23.el7.x86_64.rpm33875688b7d49f0cf17673773e807a8d324f4760036ae9b502855e5c8d925ba0gstreamer-plugins-good-0.10.31-13.el7.i686.rpma68a84a280057ca7f7b3d680f2ca23889dbd96d132003f46ed82b62fe5097d2dorc-devel-0.4.26-1.el7.x86_64.rpm90e06c2734a9cb9c175c0c9416f73b4cb4eeaa6e2d046267c5ac9cbd6e1a5bf2gstreamer1-devel-1.10.4-2.el7.i686.rpm6d807b7cc6fc123f9cd24e293f8a2e76e659f27ac5c7f66dfb6ed828554ec9f7gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7.i686.rpmfd098c0f9a930edc9c556ae78ab9c224940815b94e67b13ec009b68896f437f1orc-compiler-0.4.26-1.el7.x86_64.rpmfbc6fa11172fb88a8c8ac94ade0da1a8b7bb7efa89dba6e4d9c4bb82b5b968acclutter-gst2-devel-2.0.18-1.el7.i686.rpm71b3e30ae7f7f0616a18dd36a97fedf92f029c9e3e10a8efc837dea164818149gstreamer1-plugins-base-devel-1.10.4-1.el7.i686.rpm4f4df58ee526d5b440328624daaec51ab55ea5db7d32f5d5dd68945c4e94a03egstreamer1-1.10.4-2.el7.i686.rpme83537b5e927a8741a27b79b5539308bc74c94f5000337e94e0a847090c8ce28gstreamer1-plugins-base-tools-1.10.4-1.el7.x86_64.rpme69c81cef3f97f271819e708ffb30d1bf688a3518ddf80e44a92f728607bb383gstreamer1-plugins-good-1.10.4-2.el7.x86_64.rpmf70f1c423a1d024bee207ae7533583bcf0c1439dfc528c71cc33aeae0488942fgstreamer1-plugins-bad-free-1.10.4-2.el7.i686.rpm2dbe9aad6cc9d70f98ec9f838096d65035c316261edb9c406c098a13ec363ac7gstreamer1-1.10.4-2.el7.x86_64.rpm60f225c4f6b998f5e40926d65a829e9896d554e8e61c138fade1366fe59b0e87orc-0.4.26-1.el7.i686.rpmf6f7c49d8868f3cf665ff08aaeb2ee241458f6ba0146caad9a256ed0fa8c015bgstreamer1-plugins-base-1.10.4-1.el7.x86_64.rpm69a0e3812c0254b2ff0b4d5ddd117b2b7750c88e9f012b8ade284bbc03b2b014gstreamer1-plugins-base-1.10.4-1.el7.i686.rpm0435fc43abb8745c762862a18f93cef353eee7dc054544b024131d0586563079gstreamer-plugins-good-0.10.31-13.el7.x86_64.rpm4d9fb5a54f29ab3653230063dc7bfd822e51964b054f4d440b4054c5ea212efcorc-devel-0.4.26-1.el7.i686.rpmc1928ce81019ed632901933acaf9e22158c14204a3ea70413ece00f6d1e3828dclutter-gst2-2.0.18-1.el7.x86_64.rpmc0c05e8fcf0fa2412ab7f7d6f4a48bdac834c7ee800cf767192f0de3ec8df659orc-doc-0.4.26-1.el7.noarch.rpme484007cbba80483f80d928a97caae3cc66137de2d25c87115514fdfbd683fe7gstreamer1-plugins-bad-free-devel-1.10.4-2.el7.i686.rpmfb761bd7a6e8707c179c98653877d371c5f2348e0c571e1e7d11d0607e56132bSLSA-2017:2128-1Gdm And Gnome-SessionThe following packages have been upgraded to a later upstream version: gdm (3.22.3), gnome-session (3.22.3). Security Fix(es): * It was found that gdm could crash due to a signal handler dispatched to an invalid conversation. An attacker could crash gdm by holding the escape key when the screen is locked, possibly bypassing the locked screen. (CVE-2015-7496)moderateScientific LinuxScientific Linux 7gnome-session-3.22.3-4.el7.x86_64.rpm15dad6baf13d0f09d40c198785fa395a8e091e4790d120709d0ecce53c4dbd8bgnome-session-custom-session-3.22.3-4.el7.x86_64.rpm6a94fd1b601e3c83c4ccba95be5959e94b0ffe9764e3062d26c911fdc831bf3fgdm-devel-3.22.3-11.el7.x86_64.rpm0261c47fc97478287fa206509cfcb17e9211524b3fd9e84d093667fe6fa49e70gdm-3.22.3-11.el7.x86_64.rpm79821664e064ab360ff8e90c8a72f8182c0a48a1a56c2d4d7127356360cac798gnome-session-xsession-3.22.3-4.el7.x86_64.rpme82aa3b3dbffb1dae225987c5fecfbff2eaa42687da24db4eda29247700af5f5gdm-devel-3.22.3-11.el7.i686.rpmb5109e932868998d174238bff61d3606a7c311cd11fd04d6668c39b24f95a5b2gdm-3.22.3-11.el7.i686.rpmfc9f11cb6f8045e21399092536eb8706e209c15251b4eb62993fe7d746375d92SLSA-2017:2180-1GhostscriptSecurity Fix(es): * A NULL pointer dereference flaw was found in ghostscript's mem_get_bits_rectangle function. A specially crafted postscript document could cause a crash in the context of the gs process. (CVE-2017-7207)lowScientific LinuxScientific Linux 7ghostscript-devel-9.07-28.el7.x86_64.rpm02806c63663b021da85316c2e32619160a6bd49c36db10ca0dd75bffbc00ede9ghostscript-9.07-28.el7.i686.rpm09a3419d479e947ec9fbb45f292b2dcb72848d9be2774871dd68fb2273173bbbghostscript-doc-9.07-28.el7.noarch.rpm3d7c6e89afa8443f90dbfea4ebe50e73265dd6d96ed093aad47e3ea1680bf020ghostscript-9.07-28.el7.x86_64.rpmaa2caf562121e33055fed3cabe671aae7ee93c20f4b12b0f491f38b531d6d1beghostscript-gtk-9.07-28.el7.x86_64.rpm33131ffb23fb8fe278cb01cd23474c8d2d9e3411b06345c096d79f6e291118a7ghostscript-cups-9.07-28.el7.x86_64.rpmcfb655c8d392c5376ffe934f5b8d4e5a344a5d03c5ca370631cb70df8ca7e27cghostscript-devel-9.07-28.el7.i686.rpm7eedfb5dcbec1e8c55ca1a46bcd6c16f61e4b55d14a6e29a50dd6e584caa00d0SLSA-2017:2192-1MariadbThe following packages have been upgraded to a later upstream version: mariadb (5.5.56). Security Fix(es): * It was discovered that the mysql and mysqldump tools did not correctly handle database and table names containing newline characters. A database user with privileges to create databases or tables could cause the mysql command to execute arbitrary shell or SQL commands while restoring database backup created using the mysqldump tool. (CVE-2016-5483, CVE-2017-3600) * A flaw was found in the way the mysqld_safe script handled creation of error log file. The mysql operating system user could use this flaw to escalate their privileges to root. (CVE-2016-5617, CVE-2016-6664) * Multiple flaws were found in the way the MySQL init script handled initialization of the database data directory and permission setting on the error log file. The mysql operating system user could use these flaws to escalate their privileges to root. (CVE-2017-3265) * It was discovered that the mysqld_safe script honored the ledir option value set in a MySQL configuration file. A user able to modify one of the MySQL configuration files could use this flaw to escalate their privileges to root. (CVE-2017-3291) * Multiple flaws were found in the way the mysqld_safe script handled creation of error log file. The mysql operating system user could use these flaws to escalate their privileges to root. (CVE-2017-3312) * A flaw was found in the way MySQL client library (libmysqlclient) handled prepared statements when server connection was lost. A malicious server or a man-in-the-middle attacker could possibly use this flaw to crash an application using libmysqlclient. (CVE-2017-3302) (CVE-2017-3238, CVE-2017-3243, CVE-2017-3244, CVE-2017-3258, CVE-2017-3308, CVE-2017-3309, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318, CVE-2017-3453, CVE-2017-3456, CVE-2017-3464)moderateScientific LinuxScientific Linux 7mariadb-server-5.5.56-2.el7.x86_64.rpm8ff6fdfb366ef25eaf9e448d87f163c571106259074336f1334269803bedfb86mariadb-bench-5.5.56-2.el7.x86_64.rpma9dbebf1dfb3e4b6a7a82fba9d0a449e214245510ad96819db273a1678ec0e93mariadb-libs-5.5.56-2.el7.i686.rpmd7724825a0ca7833ec9bf665100b1502146ab4aef1ebc41067f02e3a22beed91mariadb-devel-5.5.56-2.el7.i686.rpmd0c68e1ce34c4b2fa7fdcda7a96446b67602e78d2aa10541ea6470dc0fed8db5mariadb-libs-5.5.56-2.el7.x86_64.rpm0fd64e7aaa662eb1a5dfc415058b9752b1fbeee79168c408f1f8455727578853mariadb-test-5.5.56-2.el7.x86_64.rpm079ea6384fd1b2b81d9b3e188c30b88268d9f9ab9251468495fe2e40a90f29aemariadb-5.5.56-2.el7.x86_64.rpm1c01449016b0677993dc2f37eaf98c30634f4876b3634e44345bbbe550076f14mariadb-embedded-5.5.56-2.el7.i686.rpme056eb51bf61c2e3eaa27f82e8c62bce34cbeecaaed655ec657d2cc780101b32mariadb-embedded-devel-5.5.56-2.el7.x86_64.rpmbb24ef98cb69f910a8ee3d1cab07565c58326ba5f37fca6e18da3d3dc09aac26mariadb-embedded-5.5.56-2.el7.x86_64.rpm49aff1efacde2fb0afc589f3215543ce65e2c7ae319b8b987dede6fc9861c73dmariadb-embedded-devel-5.5.56-2.el7.i686.rpmdf588a0d9cf23ebce33d2b360fa6358e2ba10449210ac97c6b35596ad99b9b04mariadb-devel-5.5.56-2.el7.x86_64.rpmdd6f5a0850b2898001fb830814f97ca14983d6a8e79b11fff08196c079885868SLSA-2017:2247-1TomcatThe following packages have been upgraded to a later upstream version: tomcat (7.0.76). Security Fix(es): * The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762) * It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018) * It was discovered that when a SecurityManager was configured, Tomcat's system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794) * It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796) * It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)lowScientific LinuxScientific Linux 7tomcat-webapps-7.0.76-2.el7.noarch.rpm007e5a27391d9823019c98dd87f699a7b709d9cc8944c0ddbdcae54dad5a67b5tomcat-jsp-2.2-api-7.0.76-2.el7.noarch.rpm95c51a36a5cc9a6bab2153032334a6cb2dd1b1bacb6657c6d3f0f0a4a90dbd60tomcat-el-2.2-api-7.0.76-2.el7.noarch.rpm11106044be218288d02ee19a707d8c828f9a76c8e2d18ffa79e20a06fae44237tomcat-servlet-3.0-api-7.0.76-2.el7.noarch.rpm07070313f4465526b8f9bc512c47b232077a90185e5f9c0f90aea8cd8decaa06tomcat-docs-webapp-7.0.76-2.el7.noarch.rpmab1d480977a83aeaaeb752e6736cd0beb6b108fc964aee82d1e88df97c8bb0batomcat-jsvc-7.0.76-2.el7.noarch.rpm61222ff8556a93703009e4aa59af03a028e891a63fb11adac75ba738b7d82043tomcat-javadoc-7.0.76-2.el7.noarch.rpm6607500fdcf0390aed1fc794e5ac54e705130a1aafa746266b214b725973f7datomcat-admin-webapps-7.0.76-2.el7.noarch.rpm1f477f0eb1128371938475e21f5f664d9ed72443fea8b612c77e0d65f75bfc95tomcat-lib-7.0.76-2.el7.noarch.rpm40fae13f759426fcae15d92dddd61fe74d17341db8128a8825d82e68f3f90c50tomcat-7.0.76-2.el7.noarch.rpm8dee270854593bef37e04ffc9634e530d0230b18a194655e3cd4c463b34b7d57SLSA-2017:2258-1Gtk-VncThe following packages have been upgraded to a later upstream version: gtk-vnc (0.7.0). Security Fix(es): * It was found that gtk-vnc lacked proper bounds checking while processing messages using RRE, hextile, or copyrect encodings. A remote malicious VNC server could use this flaw to crash VNC viewers which are based on the gtk-vnc library. (CVE-2017-5884) * An integer overflow flaw was found in gtk-vnc. A remote malicious VNC server could use this flaw to crash VNC viewers which are based on the gtk-vnc library. (CVE-2017-5885)moderateScientific LinuxScientific Linux 7gvncpulse-devel-0.7.0-2.el7.x86_64.rpm169e3b60eb1fe1693edcd9aa40319c82e08d816eebde5452cb49ca3d1e38a150gvnc-0.7.0-2.el7.x86_64.rpm4681c91043d422e37a667b92b0f7340fb1a8ba7dd620cf271f8f00d88f063b6agtk-vnc-python-0.7.0-2.el7.x86_64.rpm72d56ffa8b7f9b280b9d14105d69f979902a2742e168a395e0c78aa910e83bd0gtk-vnc-0.7.0-2.el7.x86_64.rpm55b9e1f0e3a908f5c74b6b70834bc2b750a0b744a58d2593156c0d04e6221babgtk-vnc-devel-0.7.0-2.el7.i686.rpmd875571eed70d2a1be4ff7f106736bb6479769d558331caa5914a72d075695c5gvnc-devel-0.7.0-2.el7.x86_64.rpma6443bd5c175ec75b6639c1994cd9d5383d5adafded6f2ea91921a8a1b2846aagtk-vnc2-0.7.0-2.el7.i686.rpm76d7a35c5d9909c1b0c617481cfdcc94caef4faa071d561caef298db5138f6fbgvnc-0.7.0-2.el7.i686.rpm53978f858eb98560cee686b3223840a262ffede3063581d7988b7f15380b8440gvncpulse-0.7.0-2.el7.i686.rpm031aca361239b5a9840759f8923d231480b6e3d9e2bc4535f10d870161d21406gtk-vnc-0.7.0-2.el7.i686.rpm23eab7a800965451f0124678c5f19fc500899b00842aa4de3f054880388a5793gtk-vnc-devel-0.7.0-2.el7.x86_64.rpm2349f0f52627d61a0d6671b05b303506257d1933ff96835fa45912a78b135073gtk-vnc2-devel-0.7.0-2.el7.x86_64.rpm6d5202d3e80da1222d26e9059a3bf6430423c505b39b64c711e839fc44f6377egvnc-devel-0.7.0-2.el7.i686.rpm19643509e3c98a3a830e99d82a87eac61fa66cb52bb5a728fd785b4beef91279gtk-vnc2-0.7.0-2.el7.x86_64.rpm163cd67bf543c7fcda669494c0199287be5a494ef02e856ca89c333184d3211bgtk-vnc2-devel-0.7.0-2.el7.i686.rpmaad7eb2f18662f48ecae3dcfab482e5ad71914fb6457fef8a564ff02e45a1c51gvnc-tools-0.7.0-2.el7.x86_64.rpmcb2e6a47d77eeccb7166537b18bc6d33f125a46180eea448d33650fa7675e7f7gvncpulse-devel-0.7.0-2.el7.i686.rpm0970c8bf4492cbda503d302c0025713f5b853296a2935e2e4bd090e857dd8f2fgvncpulse-0.7.0-2.el7.x86_64.rpm86b5ea984ebcd6a44f3254b0dac1edb88f117e3553e119481032b83fc3fb1007SLSA-2017:2285-1AuthconfigSecurity Fix(es): * A flaw was found where authconfig could configure sssd in a way that treats existing and non-existing logins differently, leaking information on existence of a user. An attacker with physical or network access to the machine could enumerate users via a timing attack. (CVE-2017-7488)moderateScientific LinuxScientific Linux 7authconfig-6.2.8-30.el7.x86_64.rpm7e568f2cf1a3eb616b1baabfeca22311b1b2b0ad6a823402cd229c9b6ae5106dauthconfig-gtk-6.2.8-30.el7.x86_64.rpmb48fc780ab584857e02a4d28c0a1cf28ebcf7c842c7bffb3b60ffec627cac7b7SLSA-2017:2292-1GnutlsThe following packages have been upgraded to a later upstream version: gnutls (3.3.26). Security Fix(es): * A double-free flaw was found in the way GnuTLS parsed certain X.509 certificates with Proxy Certificate Information extension. An attacker could create a specially-crafted certificate which, when processed by an application compiled against GnuTLS, could cause that application to crash. (CVE-2017-5334) * Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-7869) * A null pointer dereference flaw was found in the way GnuTLS processed ClientHello messages with status_request extension. A remote attacker could use this flaw to cause an application compiled with GnuTLS to crash. (CVE-2017-7507) * A flaw was found in the way GnuTLS validated certificates using OCSP responses. This could falsely report a certificate as valid under certain circumstances. (CVE-2016-7444)moderateScientific LinuxScientific Linux 7gnutls-c++-3.3.26-9.el7.i686.rpmf25709b59b906341d21c45b05897572fa261cc65e27d6ffc04a9246f13add079gnutls-devel-3.3.26-9.el7.i686.rpmc37338e50f6564f0e981b77e24ca3f6b166d8deb7a09242fd3a6993592e542b2gnutls-3.3.26-9.el7.i686.rpm34301879885c427765471b9cf0e014322bb8ce20be5422db11cddba70a879912gnutls-dane-3.3.26-9.el7.i686.rpmc42b24460ea320eefa82b54b9b33fd37391df254a7ce908f18af6907273bfc9agnutls-c++-3.3.26-9.el7.x86_64.rpm8e288ff404102b85a8f2e0eee9ecafe7bf1000f790f4a0040a18db88cae79c60gnutls-utils-3.3.26-9.el7.x86_64.rpm28493bbc058042ac9e9cbf0c8879dbf83ff20f5257f280f120a8c3007f271bd6gnutls-devel-3.3.26-9.el7.x86_64.rpm79560074b6e5b97f0fc79fd2252d60cb89a610c23da1d28204ba65c988e91682gnutls-3.3.26-9.el7.x86_64.rpm968d4d47b16948df07ef0df48ff3d9f17e41fda60943ace4d4df4bc1af2147c3gnutls-dane-3.3.26-9.el7.x86_64.rpm8a711b1296e0c6ba60f26810675ca98eeabbb403b89f575b74b673a37ac04aa2SLSA-2017:2299-1Networkmanager And Libnl3The libnl3 packages contain a convenience library that simplifies using the Linux kernel's Netlink sockets interface for network manipulation. The following packages have been upgraded to a later upstream version: NetworkManager (1.8.0), network-manager-applet (1.8.0). Security Fix(es) in the libnl3 component: * An integer overflow leading to a heap-buffer overflow was found in the libnl library. An attacker could use this flaw to cause an application compiled with libnl to crash or possibly execute arbitrary code in the context of the user running such an application. (CVE-2017-0553)moderateScientific LinuxScientific Linux 7libnl3-cli-3.2.28-4.el7.x86_64.rpm299f18d0f7011e96f049930848c9499580b52b00984c0a11a264cb945c6e822cNetworkManager-wwan-1.8.0-9.el7.x86_64.rpmd8a02c030ee2958fc1e04dbd020812a7abc4071f994c1e1f997c492c178bb77flibnl3-doc-3.2.28-4.el7.x86_64.rpm321c59cd9d6c498ba4372a1474dda4e64600fd91c5a928e15b25b6313e25df3elibnl3-cli-3.2.28-4.el7.i686.rpmcdcf546fb376b2fec31a214ef77c311b3b05791ee14383f56d887b0a54699024NetworkManager-config-server-1.8.0-9.el7.noarch.rpmb0bb2310a8492e163b9af70b8b5a162a66fa55214c07fde108f978920ef6219flibnma-devel-1.8.0-3.el7.i686.rpm3910ab18fdd1e61472aa783ff137db101d848a6b1e207d6a49ccc488ac237b6blibnma-1.8.0-3.el7.x86_64.rpmbf267c40ccb03ec66e6d563e19eaa9b3f952820aa1da01771f45afb4e2fcab28NetworkManager-wifi-1.8.0-9.el7.x86_64.rpm9bede8bb8210971302ef8c733d8f8ae24d46a93836fc6f2d64c5f57015927b0bnetwork-manager-applet-1.8.0-3.el7.x86_64.rpm56c6d5357368155929acb941e1ca71fbe94261a0ca7f75bc35d70c9404a11e13NetworkManager-tui-1.8.0-9.el7.x86_64.rpm3513a919c607fdb4e9e5035ac533bf0b27b36830ba7e19dc39741ed5a1142declibnl3-devel-3.2.28-4.el7.i686.rpmd70a0b3340958c2fbfd08ba5cf2086d8d4871daf00b5f243752beccc2e59649dlibnma-1.8.0-3.el7.i686.rpmb69d93bf1df142a0b1a789aef578af64e6c68526e5e664171373b360c4c0ffc5NetworkManager-libnm-1.8.0-9.el7.x86_64.rpm3f99449055a42f4cd5b9595b6073a8bf9c78814a6360dbc8f72b4e02df1118c4libnma-devel-1.8.0-3.el7.x86_64.rpmb9f7fcf9b1951a086d2259444a9097ea864c288425a0aed08c5e18bf2128fb57libnl3-3.2.28-4.el7.i686.rpm176df9f21ffcbf8d9be33925842bcc5381db1d0f4aba72d34733577dc2229670NetworkManager-dispatcher-routing-rules-1.8.0-9.el7.noarch.rpmce6d6f34ce235b0a12662b69b8f7a1ffdf7726c995f0fce4e141b0d2f7cc9894NetworkManager-libnm-1.8.0-9.el7.i686.rpma5836429aa77298185f99adce465a0c7aa215e7a622429371ee8a3e1ac16d2bfNetworkManager-1.8.0-9.el7.x86_64.rpm843e23a499c452d5a9a3cb0b9bc90d71c53253274d3d4fc75743acc6cdc02dfblibnm-gtk-devel-1.8.0-3.el7.i686.rpm28ab0b2c718580b27092137786d2c7ba84c14dcadfc9165d573c2cf7bc85cdf4libnm-gtk-devel-1.8.0-3.el7.x86_64.rpm67a6e45c033f7e7dbfa0457257c74fbfb4358b09a384fb348bc4109cc4c36792NetworkManager-glib-1.8.0-9.el7.x86_64.rpmfccb8b9f35410207358e797052b239369d700a2c8399a898db7d83b7167ee474nm-connection-editor-1.8.0-3.el7.x86_64.rpm6534719f726464b4361aea791c48a9108574c8a8bfdc39176cc22a6a69c83719NetworkManager-glib-1.8.0-9.el7.i686.rpmd3d0b3b13d7338c3765202dda5ed9c8e4148001baa2debb91684f60c37d97b3dNetworkManager-ppp-1.8.0-9.el7.x86_64.rpmcb7ee2ee7c4c98793dac09f87ac413e14310c573989df0af686d541cc85f9583NetworkManager-libreswan-gnome-1.2.4-2.el7.x86_64.rpmc165dc33218388c222d065fb06a0c9410577a120ec5e48ae4117593d3b47d0b4libnm-gtk-1.8.0-3.el7.i686.rpmc002edb97e8eb3f2428acbcefd1d858b0d4133f549af4d78962dc6f68865bc88NetworkManager-libreswan-1.2.4-2.el7.x86_64.rpm0ef1b3d97c24d5c1bc42b11d7a239fa3abf6356bb8e62c82a9e2ad0e1a9f39b5NetworkManager-glib-devel-1.8.0-9.el7.i686.rpm4fee7f108790688a07c977f8c6fd11ef371076600f4775f3a80240b06035d434NetworkManager-libnm-devel-1.8.0-9.el7.i686.rpm02a69cb50923e5087260a3ee4c8e496ae545b7bbfbff045eac0510220af4070eNetworkManager-glib-devel-1.8.0-9.el7.x86_64.rpmac9d15762fc19b9f1eb1241a7d3b5b22e806d87223d3ebfce82130b4a3197d05NetworkManager-libnm-devel-1.8.0-9.el7.x86_64.rpm6140f68377e702fde61966d73d4451e9d070d1350e03fe0c4960c1ce714ca86alibnl3-3.2.28-4.el7.x86_64.rpm51b4d9ca49ee488409c709f35af2a47dd9ba6369405831e3b6be44dc1d74342blibnm-gtk-1.8.0-3.el7.x86_64.rpm7571e2cb5ccf4642d1d96566305aefddb30eaee6ce303c246c9bd9e1227d86f5NetworkManager-adsl-1.8.0-9.el7.x86_64.rpm1b484086e61e2deb8b2129d428596da9711acf52a5d70310897259d8b82fc9bdlibnl3-devel-3.2.28-4.el7.x86_64.rpmd6882a6d33c68c62509479837d874df1ca66857d0a12d52e8d79882e029c828fNetworkManager-team-1.8.0-9.el7.x86_64.rpm99fcdb61319e49e8a8087c76fbd2cd0a2a4991b8553cae4e83b9bb8aa290d252NetworkManager-bluetooth-1.8.0-9.el7.x86_64.rpm1e3276e4e8a305064c9853549f5e19ee61119278e54780786b952a5207666d89SLSA-2017:2335-1Pki-CoreSecurity Fix(es): * It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates. (CVE-2017-7537)moderateScientific LinuxScientific Linux 7pki-symkey-10.4.1-11.el7.x86_64.rpm7c5c9c824791fe8ffda00f6bc0a8648f862a1ed1b734e5d112f8567cf3ee64c8pki-kra-10.4.1-11.el7.noarch.rpme069a0cdb798044a3b28d8b38c684606bac1358a6f3b15d201280f41416fbf24pki-base-10.4.1-11.el7.noarch.rpmdbc86d32bb9f35262d08dec5254749620ede2873cd0fe2e68a5f1c6a83ddc566pki-base-java-10.4.1-11.el7.noarch.rpmb409e6c09e32da5b333d29095d604b87afddda6d7e41bb0913a3ebd242c451efpki-server-10.4.1-11.el7.noarch.rpm05ff28376c1fa0ceb456ad125683ede523ec29336f0cce40fb1580f43d041cc6pki-javadoc-10.4.1-11.el7.noarch.rpmaba6a011b5571dfd91ee02bcdee1ac509f98307bd056254b7e84e7813adf5dd7pki-ca-10.4.1-11.el7.noarch.rpm5168b87c08be0b464304252d3424191d03383a348f25eefeb8f9f200fd634bdepki-tools-10.4.1-11.el7.x86_64.rpm701091bb935c9807394ec65752a80a1178c903fd51c3ae1168857cba508b3582SLSA-2017:2388-1EvinceSecurity Fix(es): * It was found that evince did not properly sanitize the command line which is run to untar Comic Book Tar (CBT) files, thereby allowing command injection. A specially crafted CBT file, when opened by evince or evince- thumbnailer, could execute arbitrary commands in the context of the evince program. (CVE-2017-1000083)importantScientific LinuxScientific Linux 7evince-3.22.1-5.2.el7_4.x86_64.rpm05d654e859a8a53fe6c89ac17b49659be38cd246113abbac37a2d44b99cc6115evince-libs-3.22.1-5.2.el7_4.i686.rpma9851b40c5888488d0fca917e2bdee4bdeffd57c7fb9ffcef48bc9750eada57bevince-devel-3.22.1-5.2.el7_4.x86_64.rpmaa1cc1796338c0a2f67b14bd80f320479eda2f9b3cc091dfe14f8c588e9da4d6evince-libs-3.22.1-5.2.el7_4.x86_64.rpm8a35b920791292175707a136469eff7e88fc58cd37849ab082d0925054fd20b8evince-dvi-3.22.1-5.2.el7_4.x86_64.rpmc9b61a4ce397fa4a47dfee44c5392dabea8105d2ef50a68c39635006044a9100evince-devel-3.22.1-5.2.el7_4.i686.rpm895604173e9477394cef01a4130feed0cf115daf724659cf9e0747728c77d7b2evince-browser-plugin-3.22.1-5.2.el7_4.x86_64.rpmb34bcfe0d95a00edb821cb113af04460ad853c9b9e6529b95b3aa631899c88afevince-nautilus-3.22.1-5.2.el7_4.x86_64.rpmd1513689f482f1f134e6d9f43342701e5a9513c4db8afb9719e03c21c9f937aaSLSA-2017:2389-1FreeradiusSecurity Fix(es): * An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10984) * An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978) * An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983) * A denial of service flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to cause the FreeRADIUS server to enter an infinite loop, consume increasing amounts of memory resources, and ultimately crash by sending a specially crafted request packet. (CVE-2017-10985) * Multiple out-of-bounds read flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10986, CVE-2017-10987)importantScientific LinuxScientific Linux 7freeradius-devel-3.0.13-8.el7_4.x86_64.rpm8cf4786286c3bd7ece1c326d1142bba37a7b4de78452555db18b2c4a11be9461freeradius-3.0.13-8.el7_4.x86_64.rpmb1a6e676383b1cfd6e7e108adf2b1a3b614d78f205cee6d385701ec9504698d1freeradius-unixODBC-3.0.13-8.el7_4.x86_64.rpm99c3a9c64ac8cf54dda3a061790f3b6dccc281ddbe299454db0fd5150db6964ffreeradius-mysql-3.0.13-8.el7_4.x86_64.rpm3a2fe632faa55ec242ec8c8e6638f2631eea92c03c1324039bcb3f63217f1571freeradius-krb5-3.0.13-8.el7_4.x86_64.rpm3f1be6f7cfe7bd202682f4364071a14dbb01c7d2517ff89d63adb3803c131366freeradius-sqlite-3.0.13-8.el7_4.x86_64.rpm3a40cc621ca07b80b6b28058c484ed852d1848e9ff8b59e6cccb00ef57b3607ffreeradius-python-3.0.13-8.el7_4.x86_64.rpm7331e1600512a67de460495e29473c462f4ceaeb815843e152d7525b2039eb8afreeradius-doc-3.0.13-8.el7_4.x86_64.rpm0491ad346fa67d6de5ececa9c908396ed559d0146434edfbe9576a8bd7296bf4freeradius-utils-3.0.13-8.el7_4.x86_64.rpm852e40d83037c82652801b261cd257c1f0886c7ac1313be8348f39759bf7c4a6freeradius-perl-3.0.13-8.el7_4.x86_64.rpm14a7d31ee48ed2aa5172de41d46b353b1c5170dd45632b828d36a4a823d6a580freeradius-postgresql-3.0.13-8.el7_4.x86_64.rpmed8dcd549e794a106be53479ee7fc71360a4188f13b06ffa33080f6b0afdf0d5freeradius-devel-3.0.13-8.el7_4.i686.rpm9d5603c96d2952e4c0934b8c3611c723669d43873b533cbaae955f77ce3bea19freeradius-ldap-3.0.13-8.el7_4.x86_64.rpm132443b35e975f312eec60c8b5aaeaa68d1c3424f05681d635098637f9520d14SLSA-2017:2423-1Log4JSecurity Fix(es): * It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)importantScientific LinuxScientific Linux 7log4j-1.2.17-16.el7_4.noarch.rpm50f48f9a3201b157760a52780117f6d74a38a79f5cbbd5d3a329a3093d4b67bclog4j-javadoc-1.2.17-16.el7_4.noarch.rpme27601e7c85addd97840caed97d311ec35227fae939f695d1e70925376c58333log4j-manual-1.2.17-16.el7_4.noarch.rpmf39faf7cfeb2bc7823deaf3281634aace1cef6d6d504bf5fabc25b6d65b79c7dSLSA-2017:2424-1Java-1.7.0-OpenjdkSecurity Fix(es): * It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-10102) * Multiple flaws were discovered in the RMI, JAXP, ImageIO, Libraries, AWT, Hotspot, and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10107, CVE-2017-10096, CVE-2017-10101, CVE-2017-10089, CVE-2017-10090, CVE-2017-10087, CVE-2017-10110, CVE-2017-10074, CVE-2017-10067) * It was discovered that the LDAPCertStore class in the Security component of OpenJDK followed LDAP referrals to arbitrary URLs. A specially crafted LDAP referral URL could cause LDAPCertStore to communicate with non-LDAP servers. (CVE-2017-10116) * It was discovered that the wsdlimport tool in the JAX-WS component of OpenJDK did not use secure XML parser settings when parsing WSDL XML documents. A specially crafted WSDL document could cause wsdlimport to use an excessive amount of CPU and memory, open connections to other hosts, or leak information. (CVE-2017-10243) * A covert timing channel flaw was found in the DSA implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application generate DSA signatures on demand could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2017-10115) * A covert timing channel flaw was found in the PKCS#8 implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application repeatedly compare PKCS#8 key against an attacker controlled value could possibly use this flaw to determine the key via a timing side channel. (CVE-2017-10135) * It was discovered that the BasicAttribute and CodeSource classes in OpenJDK did not limit the amount of memory allocated when creating object instances from a serialized form. A specially crafted serialized input stream could cause Java to consume an excessive amount of memory. (CVE-2017-10108, CVE-2017-10109) * A flaw was found in the Hotspot component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2017-10081) * It was discovered that the JPEGImageReader implementation in the 2D component of OpenJDK would, in certain cases, read all image data even if it was not used later. A specially crafted image could cause a Java application to temporarily use an excessive amount of CPU and memory. (CVE-2017-10053)criticalScientific LinuxScientific Linux 7java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4.x86_64.rpm9fe1e353590798cca44ffbd9f3b004dad9d3354eae05771d0588ad0f704463f4java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4.x86_64.rpmfbfa06eeba4e74a531faec6a05edde77b7d7b263bf890e68980a176b8e2f534ejava-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4.x86_64.rpm7c3ddd546d1690a27dadaceaa9773acaa47b8e2b3ecf8d0ba48d486efd6ea67djava-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4.x86_64.rpma85fe21d976b8a02d49a238ade5760cbbc499959338279599eebfdac10002f76java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4.x86_64.rpm9d864fec4aef091dda45d1060ce798d3f417e65f0610e9ec8e4986c8567c3807java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4.noarch.rpmf0f1a118ee76001ce6b872a546b1534c49ced2fb86890d5eef5dde02378a8b77java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4.x86_64.rpme24360e007c48cc83a8e1c6b46ec8d0b5c73a6cf7510a59e5511592993d661c5SLSA-2017:2445-1Qemu-KvmSecurity Fix(es): * Quick Emulator (QEMU) built with the Network Block Device (NBD) Server support is vulnerable to a crash via a SIGPIPE signal. The crash can occur if a client aborts a connection due to any failure during negotiation or read operation. A remote user/process could use this flaw to crash the qemu-nbd server resulting in a DoS. (CVE-2017-10664)moderateScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-141.el7_4.1.x86_64.rpme9839537f7a6eeed198ea589b4413d2aea03971c06c3554a0f3b74800c148862qemu-kvm-1.5.3-141.el7_4.1.x86_64.rpm8d4162f5aea2f546a7280271754fd09dd41f6b34c07fb2de0b76afa0022d3ae5qemu-img-1.5.3-141.el7_4.1.x86_64.rpm10b4be9150585f2c0cd139261f7188cfc688be5fa9f11694de14f1f899eeafe0qemu-kvm-tools-1.5.3-141.el7_4.1.x86_64.rpmafabec552ed5239559b7cfa920a2ccac372cfa7c022ff8aa9e0661ba66f99b8aSLSA-2017:2456-1FirefoxThis update upgrades Firefox to version 52.3.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7779, CVE-2017-7798, CVE-2017-7800, CVE-2017-7801, CVE-2017-7753, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7792, CVE-2017-7802, CVE-2017-7807, CVE-2017-7809, CVE-2017-7791, CVE-2017-7803)criticalScientific LinuxScientific Linux 7firefox-52.3.0-2.el7_4.i686.rpm2c201ab08a598776733832985b8632af900d32bba8d2a7d5ceb2dbe72ddcf093firefox-52.3.0-2.el7_4.x86_64.rpm30de33480fd30bc46d8c38773379126f167042bbf57429f345d4606b18e23f0dSLSA-2017:2459-1LibsoupSecurity Fix(es): * A stack-based buffer overflow flaw was discovered within the HTTP processing of libsoup. A remote attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code by sending a specially crafted HTTP request to a server using the libsoup HTTP server functionality or by tricking a user into connecting to a malicious HTTP server with an application using the libsoup HTTP client functionality. (CVE-2017-2885)importantScientific LinuxScientific Linux 7libsoup-devel-2.56.0-4.el7_4.x86_64.rpm181dff2664f53b5bc9c8ec6276fd67d6c04fa2c24f487be50f836e0d14740d1clibsoup-2.56.0-4.el7_4.i686.rpm1abcfdf459e731a1f76857e13152d46eca1b8ff62df799434bc3308f301f36d2libsoup-devel-2.56.0-4.el7_4.i686.rpme48dc50324d6857e05c662f7e03ad7119dcf925a83cdc0468632e4ae10ee47e7libsoup-2.56.0-4.el7_4.x86_64.rpm59f70bddb3f32f47b411ef72517bb77b0dd5439483668ec32d8bde997975ca6aSLSA-2017:2471-1SpiceSecurity Fix(es): * A vulnerability was discovered in spice server's protocol handling. An authenticated attacker could send specially crafted messages to the spice server, causing out-of-bounds memory accesses, leading to parts of server memory being leaked or a crash. (CVE-2017-7506)importantScientific LinuxScientific Linux 7spice-server-0.12.8-2.el7.1.x86_64.rpmc9619ed335a6248e289140493be199d531632946c06275f0c70a83a63397b1f4spice-server-devel-0.12.8-2.el7.1.x86_64.rpm039dfeb770db81dfb6546eae2d77db460b5967fc7e837d87c426e7de20e18b8cSLSA-2017:2473-1KernelSecurity Fix(es): * A race condition was found in the Linux kernel, present since v3.14-rc1 through v4.12. The race happens between threads of inotify_handle_event() and vfs_rename() while running the rename operation against the same file. As a result of the race the next slab data or the slab's free list pointer can be corrupted with attacker-controlled data. (CVE-2017-7533, Important) Bug Fix(es): * Previously, direct I/O read operations going past EOF returned an invalid error number, instead of reading 0 bytes and returning success, if these operations were in same XFS block with EOF. Consequently, creating multiple VMs from a Scientific Linux 7.4 template caused all the VMs to become unresponsive in the 'Image Locked' state. This update fixes the direct I/O feature of the file system, and VMs created from a Scientific Linux 7.4 template now work as expected. * This kernel is signed with the new Secure Boot key.importantScientific LinuxScientific Linux 7kernel-headers-3.10.0-693.1.1.el7.x86_64.rpm26a627408d77af496c98dc4e3b491bfa12035c8ca0db0ecf8ac45d71ff532481kernel-debug-3.10.0-693.1.1.el7.x86_64.rpm78a2e3540a6ef1d4a6ed528f50ca5f198ff8f108755ced044e8a17a013807cd8kernel-debug-devel-3.10.0-693.1.1.el7.x86_64.rpm4442ca5b7045e9b4acbb9813fca4f00dd7f45fc56f318f5a2b97b0710f01fb52kernel-doc-3.10.0-693.1.1.el7.noarch.rpm34d12d2078bf5b252e0a616b1d1bdc63260223b89dc36ae7e3fcd005069dd438kernel-tools-libs-3.10.0-693.1.1.el7.x86_64.rpm9a0bbd893405232d764e2ae663f499333d099f30b8460ec6468852b0b3100a65kernel-tools-libs-devel-3.10.0-693.1.1.el7.x86_64.rpm2bf1cbbc85982b8cf63f05fdee7b566d7aabd5ff1f5f8fc3c9f3dfd8d5ab8a4cpython-perf-3.10.0-693.1.1.el7.x86_64.rpm5c1ac06cf398fec4c6a0b426ca73c8a600c50b4cd2d0a3a2c2bd842120df9050kernel-devel-3.10.0-693.1.1.el7.x86_64.rpm8239c3565f46f1624ba1f15d00e4c77dcb817f6d11a2bf9e3dcd4c15bc58781ckernel-abi-whitelists-3.10.0-693.1.1.el7.noarch.rpm6887b27999c473b230a512520f99a3925aec2abc998f54d82434ac51c824d904kernel-3.10.0-693.1.1.el7.x86_64.rpm530ba2c53c1953ee52ec0edf8f950bb97ef75a086dc9b39f1acdbd70b7dae448kernel-tools-3.10.0-693.1.1.el7.x86_64.rpmc914353cf12c035c0719db545f64dcbf07e16a9b5c594ade0d66ea8799d13c03perf-3.10.0-693.1.1.el7.x86_64.rpm5681feebcd021764bc80416fbef94ae9b69f5f4eb386a3cc5aa82cf7366f261cSLSA-2017:2479-1HttpdSecurity Fix(es): * It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788) * It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167) * A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169) * A buffer over-read flaw was found in the httpd's ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668) * A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)importantScientific LinuxScientific Linux 7httpd-manual-2.4.6-67.sl7.2.noarch.rpmf5cb640848f35939018127cd6d7ccd7fc54392470c235fe734806950853c4cf7mod_ldap-2.4.6-67.sl7.2.x86_64.rpm6bbd2dca76e1ff5de503680bb8526ad41296d197d4543fa09fbf1b22b9c4e6abmod_ssl-2.4.6-67.sl7.2.x86_64.rpmb16cbc4552de23ee73c8a1c0fceeeccc933b923859366791ed8b6a9ec9b15846httpd-2.4.6-67.sl7.2.x86_64.rpm2f9ca3c8a541695827e646f0b7c60ac59fa5d8538a6395d551ea7c1c0c5b7e88httpd-devel-2.4.6-67.sl7.2.x86_64.rpm44fa248d8cfcac3fac78f17634a3dec0a215aade3a39625f4a88c79332a92526mod_proxy_html-2.4.6-67.sl7.2.x86_64.rpmb089815d0e25bacd1532de81830dc7f4dac64413565964d6280eacb6201c4814mod_session-2.4.6-67.sl7.2.x86_64.rpma6b4a199b5c52fc78a998e004c00e811205d96ddd4a382c849d8c98dc0078543httpd-tools-2.4.6-67.sl7.2.x86_64.rpmcd95752eea912c1a6c7def078c16bc5fcfcc84826b83014bc2e50d1437e9843aSLSA-2017:2480-1SubversionSecurity Fix(es): * A shell command injection flaw related to the handling of "svn+ssh" URLs has been discovered in Subversion. An attacker could use this flaw to execute shell commands with the privileges of the user running the Subversion client, for example when performing a "checkout" or "update" action on a malicious repository, or a legitimate repository containing a malicious commit. (CVE-2017-9800)importantScientific LinuxScientific Linux 7subversion-python-1.7.14-11.el7_4.x86_64.rpmca21c88ddd8af388f19b3a9c34d8779394b90f33e255024359f95e2599acd006subversion-libs-1.7.14-11.el7_4.i686.rpm0af259eb29760cd371ca3087003ec4409fc6d7a5e2591590cca9482056614a83subversion-javahl-1.7.14-11.el7_4.i686.rpm3988a7502f490195c19784d3810e75ab282631c6c3b40e9cd761a5b3acd7d6basubversion-1.7.14-11.el7_4.i686.rpm8cb3642eb956097d666734dd53defe197f6219748ff6b1dddd8e9af2520c1674subversion-tools-1.7.14-11.el7_4.x86_64.rpm4c5b088e90d4c1da44edfa063ac5613fb2054277c15982e0cd2ff8217223a46fsubversion-kde-1.7.14-11.el7_4.x86_64.rpmc28083750735eac9268e3496c8e4840c391e25cf8bcf0f020f335c75a9a40441subversion-kde-1.7.14-11.el7_4.i686.rpmee0a2c5ef608f83ae65fbdfac14a6f90939d78a4d293eb0cb0f3e7ece2ce55f7subversion-1.7.14-11.el7_4.x86_64.rpm60be199678f63f0ea4589f676a22c53a86b51e780e552a2c5858df77d3837667subversion-gnome-1.7.14-11.el7_4.i686.rpmdecb38de3241ba5554f03289dcd169b6854d6e53607ca105e2857f70d23da8b3subversion-devel-1.7.14-11.el7_4.i686.rpm49774ce14b8d0a80d18da94b87dfafd5e8e2f8bb4c42e9418badeadff2a48e98subversion-ruby-1.7.14-11.el7_4.i686.rpme86f2f57947a5cd692936be44e1a046ac0332dd2009e96ae9474f72652f6d05csubversion-perl-1.7.14-11.el7_4.x86_64.rpm4bcdbfb4b1a64e7340784743f3be05d07d9538b1b22b98b5e14fa36fac89310esubversion-libs-1.7.14-11.el7_4.x86_64.rpm7a6da8d0a34138c341d199950eb469e02481f8f7c998f21c614db2659f9cd502subversion-devel-1.7.14-11.el7_4.x86_64.rpmfd5a36b35befc803f77766de94df731410a02a139f1860a20a902f55b29aa0edsubversion-ruby-1.7.14-11.el7_4.x86_64.rpm6b9b31612a67fd9b1c883f52e85327194403bb6e02b25d86c9a7a1a1a32697ecsubversion-perl-1.7.14-11.el7_4.i686.rpm206d1f35a37a1c78bc6a3b57ca81562c46365877a59455711ce7e01f28c66c55subversion-javahl-1.7.14-11.el7_4.x86_64.rpm8aafcea59647a0bd69cbb38af57ffc17b8b8f0f8d80e521d14249edad3d6e826mod_dav_svn-1.7.14-11.el7_4.x86_64.rpm94152523eaebd9515a098b093dee69afd9758a5f918992abb20d0d76f6cfe100subversion-gnome-1.7.14-11.el7_4.x86_64.rpm4bfb112cc93b2dbc95de93a60e638e2b75ee46b1e9ea99c5987f5fac634d55acSLSA-2017:2484-1GitSecurity Fix(es): * A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Git. An attacker could use this flaw to execute shell commands with the privileges of the user running the Git client, for example, when performing a "clone" action on a malicious repository or a legitimate repository containing a malicious commit. (CVE-2017-1000117)importantScientific LinuxScientific Linux 7git-p4-1.8.3.1-12.el7_4.noarch.rpma81c8ee90896a136dc177dbafb49296af650fb38a2cdf5bfe7d0fa912528c6c2emacs-git-1.8.3.1-12.el7_4.noarch.rpm86db31c420596eb41f959d93b0f4eaa61672dff8b2a64bbc3b8a038b4e37a3degit-1.8.3.1-12.el7_4.x86_64.rpmed18d10b6408a632ab9dd683774deaed27cd259d1dc11e64e967c4fb0aed3563git-daemon-1.8.3.1-12.el7_4.x86_64.rpmd623a18fdea6dce56bc2f89aa1fdbfea8d00fa761ec6395e8313f8ef0213455eemacs-git-el-1.8.3.1-12.el7_4.noarch.rpm9671b6839281a3d7c25eb67bb30e99fd1c9a29b41428bb69740a920dd16f1936git-email-1.8.3.1-12.el7_4.noarch.rpmfbb165d35a0fb364ad024dcd89a36b369d5df509ab9913c61118f5ab18a08a49git-hg-1.8.3.1-12.el7_4.noarch.rpma9d7e4270523b26ed549c91a16cca704d971fe9963fc7eed68c6d364e2d38b04git-bzr-1.8.3.1-12.el7_4.noarch.rpm8914c5e0877b75c8ef6f104528a87389c7e9140bccec9dc9e7be62a9107d81e0git-svn-1.8.3.1-12.el7_4.x86_64.rpm2a4be8c7a5c4101af141cf19155ccaa8a3301798ab9d094c01eb0c532f908748gitk-1.8.3.1-12.el7_4.noarch.rpma46ee2d321b7837a4b0bdf99583e9a880c40fb86d6e89c75546948d7136db3f3perl-Git-1.8.3.1-12.el7_4.noarch.rpm81fbd2186d3872dcf13c23cbd2ac71add34a751363fd97fe1b6811ae764e1196git-all-1.8.3.1-12.el7_4.noarch.rpm90a882e571ab1d743b6bcd2d3f86b53682ace07d075229b64f8f28b40a15abc3perl-Git-SVN-1.8.3.1-12.el7_4.noarch.rpmb882dac80ef98037b47abd3e8a7d0b745fe328a78b70d27980fefe0e41fe093fgitweb-1.8.3.1-12.el7_4.noarch.rpmb164a6bee3310f31a2128ca5ffdd0d5bbe77aed4aa924cee7d833583a8e6c93bgit-cvs-1.8.3.1-12.el7_4.noarch.rpm74769d2f7e7c43aa174a2680a6c84a4e5258f2244af0ad1a0545156d7a4697e4git-gui-1.8.3.1-12.el7_4.noarch.rpm1e9b9a95bf046d5367f95d81fee17c47fe0b80eae9193d6f9cccd7b7f255cfd6SLSA-2017:2486-1GroovySecurity Fix(es): * It was found that a flaw in Apache groovy library allows remote code execution wherever deserialization occurs in the application. It is possible for an attacker to craft a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability. (CVE-2016-6814)importantScientific LinuxScientific Linux 7groovy-1.8.9-8.el7_4.noarch.rpme576b17a97ce56c4c7e5a72ba1518701cb7c72bf3137d78d7619611b4b68e9a9groovy-javadoc-1.8.9-8.el7_4.noarch.rpm0574314d9958311e3455609abcecf2d8cc01f256e06e96a1d5344739561ef8edSLSA-2017:2489-1MercurialSecurity Fix(es): * A vulnerability was found in the way Mercurial handles path auditing and caches the results. An attacker could abuse a repository with a series of commits mixing symlinks and regular files/directories to trick Mercurial into writing outside of a given repository. (CVE-2017-1000115) * A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Mercurial. This can be exploited to execute shell commands with the privileges of the user running the Mercurial client, for example, when performing a "checkout" or "update" action on a sub- repository within a malicious repository or a legitimate repository containing a malicious commit. (CVE-2017-1000116)importantScientific LinuxScientific Linux 7mercurial-hgk-2.6.2-8.el7_4.x86_64.rpmb745f2fe60dcddffefe827cf71aa85865898aed1cc5fda5e2c30a82f8f6c6935emacs-mercurial-el-2.6.2-8.el7_4.x86_64.rpm748d3a0a976515d3a3a15e22cc000ae54c2277f49e77650e60b64f9128fe8b9emercurial-2.6.2-8.el7_4.x86_64.rpm972dcb111ee2a0fd367760a712efeef8a6576d7f076c1a0a405188b473d772eeemacs-mercurial-2.6.2-8.el7_4.x86_64.rpm465713af60ba88a4c9697de4109144beb91aca61e2c149abf933ef714046cedbSLSA-2017:2492-1Xmlsec1Security Fix(es): * It was discovered xmlsec1's use of libxml2 inadvertently enabled external entity expansion (XXE) along with validation. An attacker could craft an XML file that would cause xmlsec1 to try and read local files or HTTP/FTP URLs, leading to information disclosure or denial of service. (CVE-2017-1000061)moderateScientific LinuxScientific Linux 7xmlsec1-nss-1.2.20-7.el7_4.x86_64.rpm7a9ac4a078944c3bbd422352e731be8138c26c5c88cd2438d719617ae55468dexmlsec1-nss-devel-1.2.20-7.el7_4.x86_64.rpm2601a7adf2b91b27a1b5e98122ad03c539514b58d530039aec8059130b4ad85dxmlsec1-gnutls-devel-1.2.20-7.el7_4.x86_64.rpma16bf576afc4c80b9dec79332b802b8dca6ee41d7fa23fc41be86fb6ec26a652xmlsec1-nss-1.2.20-7.el7_4.i686.rpm22a8cfb289f0edad65689d6fb37d8099fbfd101f91f40664d182c50716a6ee53xmlsec1-openssl-devel-1.2.20-7.el7_4.i686.rpm0a821f15bef50770cdf0a2a0df965ec0eea7012d039afab44638372157512ba2xmlsec1-openssl-devel-1.2.20-7.el7_4.x86_64.rpmc7431b0be2fd414681d214769b385b3eb1a01054401c88d4c7af579e7d9de2f1xmlsec1-gcrypt-devel-1.2.20-7.el7_4.x86_64.rpm501b62ea733498fb93a39535ba741fb0f152c19db910de8e3851202fed614ecbxmlsec1-gcrypt-devel-1.2.20-7.el7_4.i686.rpmbc3c8e855925f747c919d872128de95c62506e248d702e3efe8627c3f00b6561xmlsec1-gnutls-devel-1.2.20-7.el7_4.i686.rpm653d070f0ef30c26c3cae974b2a9457b569af10b4607d297600b6e5f67253abbxmlsec1-gnutls-1.2.20-7.el7_4.i686.rpm9ae520a06a20c711ddd341598a10bda3dade2a5f5d12d33f90f55fecf3bf0e5bxmlsec1-openssl-1.2.20-7.el7_4.x86_64.rpmded8cf6d46a98c36c972f78ab9d1f19f24c601ca2313879739f6a792896bc48cxmlsec1-1.2.20-7.el7_4.x86_64.rpm5367636d2ffcbee5b4ddb7af9d2fcb8df7fa8bf7598c1fe9372595aa43135c7bxmlsec1-openssl-1.2.20-7.el7_4.i686.rpm4a921961b6a3c0051ec9711ade9599feb40c1daed29cc296338dc96a06c63f48xmlsec1-devel-1.2.20-7.el7_4.i686.rpmfef226cbba9c9313a46815bd4606c10e3d12a3f86dce31261ac659208957b4afxmlsec1-nss-devel-1.2.20-7.el7_4.i686.rpm9d0555244e06e21761103304ae906f60b6464d375019531d72b9e021c7778ab2xmlsec1-gcrypt-1.2.20-7.el7_4.x86_64.rpmb2c55b3bfda307da830543d82989c3a9d51953b9a87868de565624f727fff95axmlsec1-1.2.20-7.el7_4.i686.rpm3dd00d8a80e4e5f95f4b06995906111b974bb74d7afb93d6ee284c48e7fb33afxmlsec1-gnutls-1.2.20-7.el7_4.x86_64.rpmbb68aaff45b4bc09a9c33e553217d6108b9da926aef328735cff8a040607808fxmlsec1-devel-1.2.20-7.el7_4.x86_64.rpm183d4811952950033cb8965727ff6253221b9ce1a2712c22732e298c8e3a5dbfxmlsec1-gcrypt-1.2.20-7.el7_4.i686.rpm0ec20314119fa527f7cbebb06614df4454bc32933cc4b8f847198e45f8c4f4ceSLSA-2017:2534-1ThunderbirdThis update upgrades Thunderbird to version 52.3.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7779, CVE-2017-7800, CVE-2017-7801, CVE-2017-7753, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7792, CVE-2017-7802, CVE-2017-7807, CVE-2017-7809, CVE-2017-7791, CVE-2017-7803)importantScientific LinuxScientific Linux 7thunderbird-52.3.0-1.el7_4.x86_64.rpm8be124bb94a977aa583c51d7da7c9bacc5f2aaf96774c0fdfe9821a2591363dbSLSA-2017:2551-1PopplerSecurity Fix(es): * A stack-based buffer overflow was found in the poppler library. An attacker could create a malicious PDF file that would cause applications that use poppler (such as Evince) to crash, or potentially execute arbitrary code when opened. (CVE-2017-9775) * An integer overflow leading to heap-based buffer overflow was found in the poppler library. An attacker could create a malicious PDF file that would cause applications that use poppler (such as Evince) to crash, or potentially execute arbitrary code when opened. (CVE-2017-9776)moderateScientific LinuxScientific Linux 7poppler-demos-0.26.5-17.el7_4.x86_64.rpm7335c612dbd64a189cf27920b120d8eb26e94395c65a0f37a6043df6dfd18a95poppler-cpp-0.26.5-17.el7_4.x86_64.rpmb530aa2870df268c261298f7ba904483163d5e3de4d1119196686995838ce4d7poppler-cpp-devel-0.26.5-17.el7_4.x86_64.rpma80c6d3ccba384a325b1adcb6122a0928123b22db6e3e8963d8d2f40f3746ca2poppler-glib-0.26.5-17.el7_4.x86_64.rpm49fe8a044fc42d5b38e936525888b50e1f06dd49b0eba22649dd465d6a0db3b2poppler-qt-0.26.5-17.el7_4.i686.rpm33c5a1cb5d33d22e0c0bff234cc0a5866bad525d4addd03b25d0ceb397c7e5cfpoppler-utils-0.26.5-17.el7_4.x86_64.rpm18f506905f0aab3d5d8153314fe3e4a4893a0d6588b0e059db179a5032dfc7b9poppler-qt-0.26.5-17.el7_4.x86_64.rpm9af9c6fcb523aa61feb5beaac3465d8ec27623304a8f9bc4960e8dd3f9949765poppler-cpp-0.26.5-17.el7_4.i686.rpm26072ce63d621308e20c01a38f384488b9f5198f05faaaf0044fd07039cf9413poppler-qt-devel-0.26.5-17.el7_4.i686.rpm115b4022a5907faf37dfbc401ad49eaf650d8566c65cca4e5c24ea207c1d8070poppler-glib-0.26.5-17.el7_4.i686.rpmf294f0f9e3cba786c6e3ab5dfaa408003face0ea04a58f21d023c297cb202827poppler-devel-0.26.5-17.el7_4.i686.rpm7fc318342317403c8e74c8842260cf7d5ec859cc8694d692345f9f7d411ebe83poppler-0.26.5-17.el7_4.i686.rpm675ae693078274b2e1b82715b523f7d760c60f068952244e0694822acfb0ce9apoppler-qt-devel-0.26.5-17.el7_4.x86_64.rpm1d3a56c3f56f4eb4c9a4fee5b6d80169fc879e8a57660562ff4184496c7d394bpoppler-glib-devel-0.26.5-17.el7_4.i686.rpm8101d64e27726d376f3cef5d0873c48bb70d2be84bef3a5cea0e7058f6e353bepoppler-glib-devel-0.26.5-17.el7_4.x86_64.rpma7ca4923b5e2f1ce3359e9098d3344654f4f6119ec1a20c70e7d4f0fe8c26100poppler-0.26.5-17.el7_4.x86_64.rpm6acc4fa528439ab629826e2c892d2f0262d19363d47c5991f6638935baddb890poppler-devel-0.26.5-17.el7_4.x86_64.rpm099281c34be832466b8fd096c9311e7f519b982b89651446e6a143c0f09d18a7poppler-cpp-devel-0.26.5-17.el7_4.i686.rpm257a4fb70630d169de76b3c373c2d2c51a17a06f86717c4f528de22446533d42SLSA-2017:2569-1389-Ds-BaseSecurity Fix(es): * A flaw was found in the way 389-ds-base handled authentication attempts against locked accounts. A remote attacker could potentially use this flaw to continue password brute-forcing attacks against LDAP accounts, thereby bypassing the protection offered by the directory server's password lockout policy. (CVE-2017-7551) Bug Fix(es): * In a multi-replication environments, if operations in one back end triggered updates in another back end, the Replica Update Vector (RUV) of the back end was incorrect and replication failed. This fix enables Directory Server to handle Change Sequence Number (CSN) pending lists across multiple back ends. As a result, replication works correctly. * Due to a low default entry cache size value, the Directory Server database had to resolve many deadlocks during resource-intensive tasks. In certain situations, this could result in a "DB PANIC" error and the server no longer responded to requests. After the server was restarted, Directory Server started with a delay to recover the database. However, this recovery could fail, and the database could corrupt. This patch increases the default entry cache size in the nsslapd-cachememsize parameter to 200 MB. As a result, out-of-lock situations or "DB PANIC" errors no longer occur in the mentioned scenario. * Previously, if replication was enabled and a changelog file existed, performing a backup on this master server failed. This update sets the internal options for correctly copying a file. As a result, creating a backup now succeeds in the mentioned scenario. * In certain situations, if the server was previously abruptly shut down, the /etc/dirsrv/<instance_name>/dse.ldif configuration file became corrupted. As a consequence, Directory Server failed to start. With this patch, the server now calls the fsync() function before shutting down to force the file system to write any changes to the disk. As a result, the configuration no longer becomes corrupted, regardless how the server gets stopped.moderateScientific LinuxScientific Linux 7389-ds-base-devel-1.3.6.1-19.el7_4.x86_64.rpmae3f262bcd1968babcc4404bd91570d20ad042e5eca2084dc37b559ea288436b389-ds-base-libs-1.3.6.1-19.el7_4.x86_64.rpme670fd6dc41a35431f551678b6961dad358938efdc68a56dd1e14fe7a2ce46d8389-ds-base-1.3.6.1-19.el7_4.x86_64.rpm99b8b56103bda1e2a2a5300a7220191a95218ac4968f9e9a9345200a48772104389-ds-base-snmp-1.3.6.1-19.el7_4.x86_64.rpm4d668568cef23e5a68b5b18251c50bab895bd351f925975f65d2341e1071bbfaSLSA-2017:2679-1KernelSecurity Fix(es): * A stack buffer overflow flaw was found in the way the Bluetooth subsystem of the Linux kernel processed pending L2CAP configuration responses from a client. On systems with the stack protection feature enabled in the kernel (CONFIG_CC_STACKPROTECTOR=y, which is enabled on all architectures other than s390x and ppc64[le]), an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to crash the system. Due to the nature of the stack protection feature, code execution cannot be fully ruled out, although we believe it is unlikely. On systems without the stack protection feature (ppc64[le]; the Bluetooth modules are not built on s390x), an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to remotely execute arbitrary code on the system with ring 0 (kernel) privileges. (CVE-2017-1000251, Important)importantScientific LinuxScientific Linux 7perf-3.10.0-693.2.2.el7.x86_64.rpmb1fbf613ea37a908e5ce2adcf0d4f754b621041d792ce6c3290064610d037e48kernel-tools-libs-3.10.0-693.2.2.el7.x86_64.rpmaf96232ed1a21f615617700d206ed82e1ee3fc48f07e2f888edcf3f64659a3bckernel-doc-3.10.0-693.2.2.el7.noarch.rpmf5eb103f46945bc3be6f76900bdbfadf125fbe86702f69963b849f10fe52ea56kernel-headers-3.10.0-693.2.2.el7.x86_64.rpmdbc2fbb75ae116cc433a64065709ea6435e624c710cefb48b33a968d688ec3f5python-perf-3.10.0-693.2.2.el7.x86_64.rpmefa8a34c7dee9a838429181b7b4788a96701c2b8168ff38c1a123fde2898a771kernel-devel-3.10.0-693.2.2.el7.x86_64.rpme8db58d1275fb589dd0a0c548533443dde5c3518f56d14184d026ddc6ea22d01kernel-abi-whitelists-3.10.0-693.2.2.el7.noarch.rpmbc800f722516c4da619f3d4af34ee6ec1e8880e4f08f23a5f6811e397f9b39a9kernel-tools-3.10.0-693.2.2.el7.x86_64.rpm4e98853761ed153e7a09cd7336aade712fac5f82f5feacace0b001bc9ef4a270kernel-3.10.0-693.2.2.el7.x86_64.rpm803465a980f7591df9b35c62d897e187c268f340d4667019c1252972bbc3aa2fkernel-debug-devel-3.10.0-693.2.2.el7.x86_64.rpm64fe0b6011b789be474ca72edd48f4fd82b839c76f877ff08d07fb38afbebe1ekernel-tools-libs-devel-3.10.0-693.2.2.el7.x86_64.rpm8312431c5f3c9a838f62c4acf1045ed6665068a4159bbebd55d3bebc19ced883kernel-debug-3.10.0-693.2.2.el7.x86_64.rpmc975e6996edb646e9b7cf6b0270dddc8e4956f0716e02fc49bfb88d4c43aa96eSLSA-2017:2685-1BluezSecurity Fix(es): * An information-disclosure flaw was found in the bluetoothd implementation of the Service Discovery Protocol (SDP). A specially crafted Bluetooth device could, without prior pairing or user interaction, retrieve portions of the bluetoothd process memory, including potentially sensitive information such as Bluetooth encryption keys. (CVE-2017-1000250)moderateScientific LinuxScientific Linux 7bluez-libs-devel-5.44-4.el7_4.i686.rpm8d25da879c5043007a19e57b0bbe7c7af42717de1430df5f72444dbfdb359cd1bluez-libs-devel-5.44-4.el7_4.x86_64.rpmfa32f8190b5eda6055a2444d0e7dff12cfc7fd5b5610cf564ff5c129bb6a0845bluez-libs-5.44-4.el7_4.x86_64.rpm785ff177294ac3c0d361d4357c7e1688d406075f32ce9332147d215f28531341bluez-hid2hci-5.44-4.el7_4.x86_64.rpm6c13612f7432fb3223c212bedb575a24c74265f4aecfc9ba50149dc058dc6707bluez-cups-5.44-4.el7_4.x86_64.rpme5cb60ca16d79aa8aee1279e9bbc442e6700448ccd5cb0f82dfd183abc947a24bluez-libs-5.44-4.el7_4.i686.rpm88d676e65fa41b8b56be4bbbf58fb6e5142a337b14b846f2f44ce90d9bac7125bluez-5.44-4.el7_4.x86_64.rpm5da195c02ff25c8a3eec8f2fa4aa58664e89cd4b1f1d4f16802c194dbf2e2e46SLSA-2017:2728-1PostgresqlThe following packages have been upgraded to a later upstream version: postgresql (9.2.23). Security Fix(es): * It was found that authenticating to a PostgreSQL database account with an empty password was possible despite libpq's refusal to send an empty password. A remote attacker could potentially use this flaw to gain access to database accounts with empty passwords. (CVE-2017-7546) * An authorization flaw was found in the way PostgreSQL handled access to the pg_user_mappings view on foreign servers. A remote, authenticated attacker could potentially use this flaw to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so. (CVE-2017-7547)moderateScientific LinuxScientific Linux 7postgresql-static-9.2.23-1.el7_4.x86_64.rpm1187bb272f803622b3fde61ed6de7b270b4cb3d39dc5c6e784b0198d4073fc98postgresql-docs-9.2.23-1.el7_4.x86_64.rpmcb45dee320b32a240029c1e71ef4109d99dbd05f0a7d23fd8553a58f7b196418postgresql-devel-9.2.23-1.el7_4.x86_64.rpma23d5271eea7736f982fff3a34c07a6932620ac45af3b6e9d8008a2ac2180518postgresql-9.2.23-1.el7_4.x86_64.rpm47692bbf7d22a7ac14884abf32d8eeae085fab4908e6939700853e5cc408dca7postgresql-plperl-9.2.23-1.el7_4.x86_64.rpm092031ed252d041e921a88850dae1288c3ac46033d8fb99664fd5248b4f199c1postgresql-libs-9.2.23-1.el7_4.x86_64.rpmcb91fa6109f2711ec052ffd23c57fe88af5adfb8833eedbfce8215266cc8f6d7postgresql-static-9.2.23-1.el7_4.i686.rpmba24bf1bd003cd406e0727e984657cbc8555c431cda63fbe371b535db08e2a77postgresql-plpython-9.2.23-1.el7_4.x86_64.rpmc00b95c7c4850c27fedd87a0e58cfc2621d76569fd029c3a91d4f56cac2c389cpostgresql-test-9.2.23-1.el7_4.x86_64.rpmb8832416fd197c478aeedbf8657ea87fb1b4404e001c508b8a42559b3c0c6307postgresql-server-9.2.23-1.el7_4.x86_64.rpm071be9dccb30036f90bd85999c66d6a34d31aefecce38133da8ee43ba2007f84postgresql-9.2.23-1.el7_4.i686.rpmff9eafc9a5df367f9134ed82c309b120f94bef52f355559c10dbeaa5f01d1c24postgresql-pltcl-9.2.23-1.el7_4.x86_64.rpm0487cb9091a7f51231f8063828fff3b67afdd137e183df5fe0bc8c0452822524postgresql-libs-9.2.23-1.el7_4.i686.rpme32468ee803afefbcddde8f22cf65c58f1a8dcffbc889bd1463da2219ba1f1a8postgresql-upgrade-9.2.23-1.el7_4.x86_64.rpm973b6e86f82a07d1fbd790d28c0a8b6e50e515c2d2d759e0276b45454228e7d6postgresql-contrib-9.2.23-1.el7_4.x86_64.rpm2b76ea05dadc9c367b7daf2854a568dc1986443ac82407e83b3b2718c6f66a65postgresql-devel-9.2.23-1.el7_4.i686.rpmb2a68dc1182f4e3072f3680975dce52eed5abf3c80e44275768074d6f22af206SLSA-2017:2771-1EmacsSecurity Fix(es): * A command injection flaw within the Emacs "enriched mode" handling has been discovered. By tricking an unsuspecting user into opening a specially crafted file using Emacs, a remote attacker could exploit this flaw to execute arbitrary commands with the privileges of the Emacs user. (CVE-2017-14482)importantScientific LinuxScientific Linux 7emacs-filesystem-24.3-20.el7_4.noarch.rpm5bb960aef018b74834be5d1fbe65050f4a01dd4a852ee8b3583f508ef577c037emacs-el-24.3-20.el7_4.noarch.rpm48f173fcabd33182261ad328f340cef09aa10a8bac60de6c5850462786a56cbaemacs-24.3-20.el7_4.x86_64.rpm1c523c2e6ae5ddf774152d4e878c3b5471c15bad9b47e87d9b55fa3ddad51a38emacs-common-24.3-20.el7_4.x86_64.rpme4c6990b55653a83a9cd90a69cb99b0dd5473a7f7ccf4e86496ec9e9918d6519emacs-terminal-24.3-20.el7_4.noarch.rpm9ccdf72f85936b6d9a18c842169be5439d3766e4cd01a436f36137d3ec7180b8emacs-nox-24.3-20.el7_4.x86_64.rpm451d5e2208a75fde2ba00a1cde33b9bcf51da79282062ec2baea754601c10651SLSA-2017:2788-1AugeasSecurity Fix(es): * A vulnerability was discovered in augeas affecting the handling of escaped strings. An attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution. (CVE-2017-7555)importantScientific LinuxScientific Linux 7augeas-1.4.0-2.el7_4.1.x86_64.rpmed737575e5966b2bef90ef850f35ba4672d7ff1dda43a02b30b6483085a9c84daugeas-libs-1.4.0-2.el7_4.1.i686.rpm60af15a0db3c5f24840072a84fe12b1eb9d66d04c3b8943f97e00973c5511703augeas-devel-1.4.0-2.el7_4.1.i686.rpm188a130333146bc55225a5356beba0c288b056f4609774375eee60d5b4ce3e97augeas-libs-1.4.0-2.el7_4.1.x86_64.rpmfbcf455458c6ae86cfde1774056900c095adba67a87b658d35aea1581a35290daugeas-devel-1.4.0-2.el7_4.1.x86_64.rpmda4336b6d182850c18552e91f96361a1fabd15dfd42e0c2bafe62c0e6e2ec21cSLSA-2017:2790-1SambaSecurity Fix(es): * It was found that samba did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man- in-the-middle attack and retrieve information in plain-text. (CVE-2017-12150) * A flaw was found in the way samba client used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack. (CVE-2017-12151) * An information leak flaw was found in the way SMB1 protocol was implemented by Samba. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker. (CVE-2017-12163)moderateScientific LinuxScientific Linux 7samba-winbind-modules-4.6.2-11.el7_4.x86_64.rpm6182b6ca67f67ec6248f53af604b7f199e101eac9dda43fac3e83c3eabc077d6samba-dc-libs-4.6.2-11.el7_4.x86_64.rpmeca165f7f00d6350da2fa12035b40d5f93c9ae497a915a45107d19417ed98913samba-common-4.6.2-11.el7_4.noarch.rpm907f5b69e7cd0225fd5556a8f8c5e8033c6b6f628321cf3c62c2818b7cdbeed8ctdb-4.6.2-11.el7_4.x86_64.rpm06aee796f221fee3c03ed5be52074e31aef85c279b636cd5e4b762563c80e0d6libsmbclient-devel-4.6.2-11.el7_4.i686.rpmabb7444369c15fa53c1798c91bdf4b55b63676eb78a4ead5dcb1092a22351a00samba-common-tools-4.6.2-11.el7_4.x86_64.rpme909a2a99084517012438171a96a8c90914d9e44148f9f04be172c7eb241fd34samba-dc-4.6.2-11.el7_4.x86_64.rpm1a7f9f632455de3c51c3e7d56664a180a42750bbf64eaf3b84a82ae3474f8716libwbclient-4.6.2-11.el7_4.i686.rpma7ba885083e73efe4d22e74e7648f152a23fd911373c9ff054c3900e80abbe27libsmbclient-4.6.2-11.el7_4.x86_64.rpm665109683b0258b7ac466cf0d0dd2156bebcc123e8d14d9b5fab60caf56f00fdlibwbclient-devel-4.6.2-11.el7_4.x86_64.rpmaea3317fe09b0d2373d54b5607a7e1bad0ed95d8f5d6f97853f5082f592dc5e8samba-python-4.6.2-11.el7_4.x86_64.rpm0006d20429d4c4cbb4db740537712aeaa4eddaa34559729960a65bfd8bb3f044libsmbclient-devel-4.6.2-11.el7_4.x86_64.rpm8ac9796459fe9029fb0b3afbb0de76aeef141027807047436042f17d2a2187d7samba-client-4.6.2-11.el7_4.x86_64.rpm7896d151cce512e0965cbfeabba8e7b92f6499adbde2fc61209f243dac90bc10libwbclient-4.6.2-11.el7_4.x86_64.rpmcf59808e784aca181947cd4ed7c46a925be59d4d65a641aaff46ac31ad792134libwbclient-devel-4.6.2-11.el7_4.i686.rpmfb67336c53f6ccab117f3509e427dfafde3dd3720d8725e6649de7dfed9bcf6fsamba-pidl-4.6.2-11.el7_4.noarch.rpm3627a1860a01556f55605bd963de2c8efaab60ab630396aabb1a0850dda80bbfsamba-4.6.2-11.el7_4.x86_64.rpmc1f061c6404771572cfaf69dfd1575a71434c659168510f2e9ddb8569124eae2samba-test-libs-4.6.2-11.el7_4.i686.rpm28a6d637a6ca02cc94729ad3cb63c5af50c6533b346236f6b562fa21124465c2libsmbclient-4.6.2-11.el7_4.i686.rpme7e8b93966a66d7dda558ff3d76730049f76228153a372a10c7ea386c8ede3factdb-tests-4.6.2-11.el7_4.x86_64.rpmc372c0c4732e86503f168b32e9579f9cd618ab142fe99376099ba62db0fff688samba-libs-4.6.2-11.el7_4.x86_64.rpm283e24a62e53e6e00053d82197cd87560b75133d9ad57ab4232f82ac825ee056samba-test-libs-4.6.2-11.el7_4.x86_64.rpme3247729b156a839f3ef20d5fd566d20c403141a59d58edded5977ca60b09d9bsamba-winbind-modules-4.6.2-11.el7_4.i686.rpmc161b75506fed89d604b9275eb255aedeb435a43a39fca05142168af4e1419bfsamba-client-libs-4.6.2-11.el7_4.x86_64.rpm43f9dfd75895d32dc068dffd4292877da5fb58ee63cc541dec1c0e6d3e2bc165samba-client-libs-4.6.2-11.el7_4.i686.rpmb5d3524fcea8587c0500c95e690f64127eccbebf6130a7ea1d1d45587276a4cdsamba-devel-4.6.2-11.el7_4.x86_64.rpm5e4661f476e2059ca074a2fa400684f811676d0ff0f9b44ebbe31437daf92be2samba-winbind-4.6.2-11.el7_4.x86_64.rpmee112583550ff72a8a15aa45a4b716e44ef64a3218c0dfcfc5304cc600c1a475samba-vfs-glusterfs-4.6.2-11.el7_4.x86_64.rpm8177bc25deebba13791accf52ec71039225bca77700edf6efad7b26c21d27cc6samba-winbind-clients-4.6.2-11.el7_4.x86_64.rpm96e67b4a669d8a8758299346ef77490b248368a3f9af025c7ec9fbcd9de16d56samba-libs-4.6.2-11.el7_4.i686.rpm1542db53c8b1b19d5f68aabcfa9179091b9448c088e1820f3317b8786c6c2fb2samba-krb5-printing-4.6.2-11.el7_4.x86_64.rpmd256e0a196d4f15403e6c2c4632fc283f89d3106f79ec32e30d266e934f2c9bdsamba-winbind-krb5-locator-4.6.2-11.el7_4.x86_64.rpm925f8a3be9715c54e8ed75c32663d0ab0af40f7c7644d88e807496ba603dc4b6samba-common-libs-4.6.2-11.el7_4.x86_64.rpme61017c278dea165f55512a88882a896013feebc877767c774e623dba95636efsamba-devel-4.6.2-11.el7_4.i686.rpm6be809e0a6ab2aa301ddbd2100dabb8adf77cd57643fd28b8d27f930e148a9bcsamba-test-4.6.2-11.el7_4.x86_64.rpmcde89aa6b9d05549a6c1d730ded8f65146af69cb68443ba9dcd732509126bf97SLSA-2017:2831-1FirefoxThis update upgrades Firefox to version 52.4.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7810, CVE-2017-7793, CVE-2017-7818, CVE-2017-7819, CVE-2017-7824, CVE-2017-7814, CVE-2017-7823)criticalScientific LinuxScientific Linux 7firefox-52.4.0-1.el7_4.i686.rpm5f04fafbc871674178d2363553950f466dcf49f8d8ab85b3e5b650ea9df85ccbfirefox-52.4.0-1.el7_4.x86_64.rpm4e71cb240ec5278c7118b16826fb5fa8b099c8fe8423862506195debe1d918e1SLSA-2017:2832-1NssSecurity Fix(es): * A use-after-free flaw was found in the TLS 1.2 implementation in the NSS library when client authentication was used. A malicious client could use this flaw to cause an application compiled against NSS to crash or, potentially, execute arbitrary code with the permission of the user running the application. (CVE-2017-7805)importantScientific LinuxScientific Linux 7nss-3.28.4-12.el7_4.i686.rpm7cf042d2d9e6045e799c59984163bbc4fad032ff0551dba43cca995dd3bccad1nss-tools-3.28.4-12.el7_4.x86_64.rpmf21d403175d56dc21faa121439c39205e7c949d429e8f3b70f502c6dd0abdf11nss-3.28.4-12.el7_4.x86_64.rpm92b5a261a241627fb480fed92488a980afe791778c1e673740bbe048a99d961cnss-devel-3.28.4-12.el7_4.i686.rpmbcdfc1a5ef2b2225a84c9ab2b05eb036637f3ee13ba03525fd2e39ec7d1ef994nss-devel-3.28.4-12.el7_4.x86_64.rpm7abf7603e42098f9eed425b65e8b7173304313bec073a1e11bfa84c9741db6a7nss-pkcs11-devel-3.28.4-12.el7_4.x86_64.rpmce6e1e8cc3d537e14c753e2e01161baec0926fc61ea95a597bedeae78d276d57nss-pkcs11-devel-3.28.4-12.el7_4.i686.rpmd85ca17614a0cad0e80f18a58698a6e03cc23b26ad6e40ee7b999720625daadenss-sysinit-3.28.4-12.el7_4.x86_64.rpm0a3c9fb8eb2f84936b325647a20e674ce71520f74709702b8c73c891309a7522SLSA-2017:2836-1DnsmasqSecurity Fix(es): * A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491) * A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra- names, ra-advrouter, or ra-stateless. (CVE-2017-14492) * A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493) * An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494) * A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add- subnet. (CVE-2017-14495) * An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add- subnet. (CVE-2017-14496)criticalScientific LinuxScientific Linux 7dnsmasq-2.76-2.el7_4.2.x86_64.rpmb29837333e205419f16b24d42fccd994805ee505245a26c90b24170ad9657617dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpmdd586affaba471bec6aa5fe89464bd699bbb533939c1c77d1d44c26b1fab8f39SLSA-2017:2882-1HttpdSecurity Fix(es): * A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)moderateScientific LinuxScientific Linux 7mod_ssl-2.4.6-67.sl7.5.x86_64.rpm54373531d4426fcf38fa5d1186091735fedba084b43075f249357e50c29d6809httpd-tools-2.4.6-67.sl7.5.x86_64.rpm6f079c5adbaf2e2787055a1250b69dcfb46f26d5407af86b6a19ec9047650281httpd-devel-2.4.6-67.sl7.5.x86_64.rpm38575fc82c639ad6339e4a3e49e85e2b69439941932e05b96be241076e40e8e0httpd-manual-2.4.6-67.sl7.5.noarch.rpm8446d79fd1116b473abfbd44fda33329bae587dcf9a80a8abceb0e1410baa1b3mod_ldap-2.4.6-67.sl7.5.x86_64.rpm9cd4f5c471c3d2c4e3c873e0e28e42af276725fe2f1c69e025aacc8a12205973httpd-2.4.6-67.sl7.5.x86_64.rpmb46d7cd8708849ae6dbc53a21945251568720b234f2baf5e6931ec13d722ad38mod_session-2.4.6-67.sl7.5.x86_64.rpm21044d2137bc586cd1f9cab489a21e3d72e66d982327799d4a90867105666c64mod_proxy_html-2.4.6-67.sl7.5.x86_64.rpmd958a7b860c88121d6bea10b6d9e4c648491090891390242b612475c5377d056SLSA-2017:2885-1ThunderbirdThis update upgrades Thunderbird to version 52.4.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7810, CVE-2017-7793, CVE-2017-7818, CVE-2017-7819, CVE-2017-7824, CVE-2017-7814, CVE-2017-7823)importantScientific LinuxScientific Linux 7thunderbird-52.4.0-2.el7_4.x86_64.rpmc39b72cb14b6434051f92a9e95677608880a307715f54fac07149a166b9e1a51SLSA-2017:2907-1Wpa_SupplicantSecurity Fix(es): * A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)importantScientific LinuxScientific Linux 7wpa_supplicant-2.6-5.el7_4.1.x86_64.rpmbc11a4c77c97549c727b9a35faa88ebe516df694f9acc095e95e610469a17356SLSA-2017:2930-1KernelSecurity Fix(es): * Out-of-bounds kernel heap access vulnerability was found in xfrm, kernel's IP framework for transforming packets. An error dealing with netlink messages from an unprivileged user leads to arbitrary read/write and privilege escalation. (CVE-2017-7184, Important) * A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets are implemented in the Linux kernel networking subsystem handling synchronization. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. (CVE-2017-1000111, Important) * An exploitable memory corruption flaw was found in the Linux kernel. The append path can be erroneously switched from UFO to non-UFO in ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If unprivileged user namespaces are available, this flaw can be exploited to gain root privileges. (CVE-2017-1000112, Important) * A flaw was found in the Linux networking subsystem where a local attacker with CAP_NET_ADMIN capabilities could cause an out-of-bounds memory access by creating a smaller-than-expected ICMP header and sending to its destination via sendto(). (CVE-2016-8399, Moderate) * Kernel memory corruption due to a buffer overflow was found in brcmf_cfg80211_mgmt_tx() function in Linux kernels from v3.9-rc1 to v4.13-rc1. The vulnerability can be triggered by sending a crafted NL80211_CMD_FRAME packet via netlink. This flaw is unlikely to be triggered remotely as certain userspace code is needed for this. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely. (CVE-2017-7541, Moderate) * An integer overflow vulnerability in ip6_find_1stfragopt() function was found. A local attacker that has privileges (of CAP_NET_RAW) to open raw socket can cause an infinite loop inside the ip6_find_1stfragopt() function. (CVE-2017-7542, Moderate) * A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace. (CVE-2017-7558, Moderate) * The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user- space close of a Netlink socket, it allows attackers to possibly cause a situation where a value may be used after being freed (use-after-free) which may lead to memory corruption or other unspecified other impact. (CVE-2017-11176, Moderate) * A divide-by-zero vulnerability was found in the __tcp_select_window function in the Linux kernel. This can result in a kernel panic causing a local denial of service. (CVE-2017-14106, Moderate)importantScientific LinuxScientific Linux 7kernel-3.10.0-693.5.2.el7.x86_64.rpmfbd1ab724b87172b1e9e0cf430800f1852d276584db81f1917e67cffbe242573kernel-tools-3.10.0-693.5.2.el7.x86_64.rpm8bfa6abf9d5059599f3ce925718423100d2817a002615914d0ae6e2e61deb129kernel-abi-whitelists-3.10.0-693.5.2.el7.noarch.rpm4b63cc11a123afd179df546ec3f3a4b10059e33474bde80155d54365cac9c1e1kernel-tools-libs-3.10.0-693.5.2.el7.x86_64.rpm1971b41c32745ba1d34f33c4397cadf705b950e4eff17b4b1307270d00853aa8kernel-doc-3.10.0-693.5.2.el7.noarch.rpmbcc07bf18b58469a4245c63ff45cc399bcba3188e821dbc4089a998bb67921cbkernel-headers-3.10.0-693.5.2.el7.x86_64.rpm29fd886341301086156262b1b214c24a52416f7da65e7a06db883bc2a9cfed93kernel-debug-3.10.0-693.5.2.el7.x86_64.rpm1756b3758bffa22f398cadaabf1ee82a5f6e34b96b9a5afa1acfe26cdd20d86bkernel-debug-devel-3.10.0-693.5.2.el7.x86_64.rpmcac10fded59ebf1e13e5db09e17ef36d2574a32d61e9e32bfa8da1623b65f212python-perf-3.10.0-693.5.2.el7.x86_64.rpm5daf7d6b9ef67e89b5ecf130d0a487a9d5e998e1d887df80e66c3ddce5b79f98kernel-devel-3.10.0-693.5.2.el7.x86_64.rpm5bd445e702c0c5c5bfabf68c5329a541086a504f2075072d8bbd45556b4986a0perf-3.10.0-693.5.2.el7.x86_64.rpma18f31cf8c8b6260b7dec86304575548d90e01bdc3f3ea4bc699b53445888667kernel-tools-libs-devel-3.10.0-693.5.2.el7.x86_64.rpm0cd1c3f97058f3b40a0f4709a32c71a087af1aa31fca2712f086c396b77a0b0cSLSA-2017:2998-1Java-1.8.0-OpenjdkSecurity Fix(es): * Multiple flaws were discovered in the RMI and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10285, CVE-2017-10346) * It was discovered that the Kerberos client implementation in the Libraries component of OpenJDK used the sname field from the plain text part rather than encrypted part of the KDC reply message. A man-in-the- middle attacker could possibly use this flaw to impersonate Kerberos services to Java applications acting as Kerberos clients. (CVE-2017-10388) * It was discovered that the Security component of OpenJDK generated weak password-based encryption keys used to protect private keys stored in key stores. This made it easier to perform password guessing attacks to decrypt stored keys if an attacker could gain access to a key store. (CVE-2017-10356) * A flaw was found in the Smart Card IO component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2017-10274) * It was found that the FtpClient implementation in the Networking component of OpenJDK did not set connect and read timeouts by default. A malicious FTP server or a man-in-the-middle attacker could use this flaw to block execution of a Java application connecting to an FTP server. (CVE-2017-10355) * It was found that the HttpURLConnection and HttpsURLConnection classes in the Networking component of OpenJDK failed to check for newline characters embedded in URLs. An attacker able to make a Java application perform an HTTP request using an attacker provided URL could possibly inject additional headers into the request. (CVE-2017-10295) * It was discovered that multiple classes in the JAXP, Serialization, Libraries, and JAX-WS components of OpenJDK did not limit the amount of memory allocated when creating object instances from the serialized form. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized. (CVE-2017-10349, CVE-2017-10357, CVE-2017-10347, CVE-2017-10281, CVE-2017-10345, CVE-2017-10348, CVE-2017-10350) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.criticalScientific LinuxScientific Linux 7java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4.i686.rpmb07009ef4c2068b60d4a50a47ab14928863deda6b8c8137a45900e7069f72720java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4.i686.rpm2e9694674253aaadb7ab1d8704cd75710cee4f7a4d52ea8bf1b35958fb108a80java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm8559026009e1b7dc8408162351e607f696e7f15654ed8db926d7aa5bff29c832java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4.x86_64.rpmf609ce11586e082c842bf31158d35ece5eba7ec71a89898c456a84f8313ab1ebjava-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4.i686.rpm6595936c6d16999563cc1866577172075b5ea7a1432fed5b8cb6be315f13a0fajava-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4.x86_64.rpmf818479e19b06d1582df01a7bc12ebbbe7595ebfa3a15c807429beff0ecb2323java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4.x86_64.rpm40bb1d657c614cebf7b4fb552c2bd5fe1552cab8117de66a19c2f3c364289dd5java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm74b4f9d237f01d4298b4c065fe3233f784cf0bbbffbda5144658ce9cbc434f54java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4.x86_64.rpmb6585ca1e4cae4245defbc221ba1fcaf4e4c0335fe99ea4f5c1869764b82b8f2java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4.x86_64.rpmbaa7aff6c144d92f4a3554c88cbe00c4e3420aadb3c62498b0a165c8400ffe78java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm5e801811378b4da7eb42a12f726451caf4aa44c299da3e4ef411b75e701eba0fjava-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4.noarch.rpm6a14a03cb10e34ff379375e16f574fe4cb2a1db279e7a3c5c85febe9d3b4575fjava-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4.i686.rpm212c7f554833bd12a72fe2e05b01f70758b058e62128fa0344d423da0c2f9e6cjava-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm29e503f716c61a3df8d4f8567f4f8f777a3a107f2a3bc10679d0a3e6c1dded9bjava-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4.i686.rpmf234c9b881bcb7fea3f109a6b5c7af40271ac851346f8c99096fa6dad5e58dbcjava-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4.noarch.rpm239eb14c2127e4b6ba8955d83e4e0d0d4662dff815396917c8b88ade5915c543java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4.noarch.rpmf199a618765a08410b8f2868d8d6a4ec76ee346f5eb98e01fe4a1be4e8b8b76ejava-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm9e1cfb5972cbd43f6d99c323d3c24b09e1021ece98b34d0d6be9e4734c7952fcjava-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4.i686.rpm04ca13e29191ee6e40d92de71577d2b5a7e7697e49183eefe82d44106d2c48c4java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4.i686.rpmf2ca1c0372c93e900fcd11e97ab04fd1476523d73852259c7e89ca843e1a14fcjava-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4.x86_64.rpmbae1f426a0b17f7138d8b59e58b6322df528554d437e35f36da21eaaec4765efjava-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4.i686.rpme141afb230df384415d608aa4d180fa06028e4c3a9e5e759971c1e6adc8fd53ajava-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.i686.rpm3065b4fbb8876e8a502b818c626085978a90dce1e853c64630fa3cdadb356d80java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4.noarch.rpmfd637f1381703ff68e72892ee85d1603a73ee27d67c39e0655c0987a626e0992java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4.i686.rpm27df1f006356e9f2137e853bf808990c4e2ff4af6dce9d6736b0eec76b1c6b35java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4.i686.rpmb713717b5865df5e3fad60191af8ba82abbe5fdf64ac4236c437057807525dadjava-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.x86_64.rpm1324261935cb6c28c60a79a941cc7da0b3d9b048268ab615b64e3b288c2a6376java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4.i686.rpmcc10e2af45ec83c7e193e86e040171108ae568cb7b4f2846bb69197831bbacc0SLSA-2017:3075-1WgetSecurity Fix(es): * A stack-based and a heap-based buffer overflow flaws were found in wget when processing chunked encoded HTTP responses. By tricking an unsuspecting user into connecting to a malicious HTTP server, an attacker could exploit these flaws to potentially execute arbitrary code. (CVE-2017-13089, CVE-2017-13090)importantScientific LinuxScientific Linux 7wget-1.14-15.el7_4.1.x86_64.rpm459a23b2c6b450b32d7265dd570793c5f110ce10184f261e553ff7dba39255a5SLSA-2017:3081-1TomcatSecurity Fix(es): * A vulnerability was discovered in Tomcat's handling of pipelined requests when "Sendfile" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647) * Two vulnerabilities were discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615, CVE-2017-12617) * A vulnerability was discovered in Tomcat where the CORS Filter did not send a "Vary: Origin" HTTP header. This potentially allowed sensitive data to be leaked to other visitors through both client-side and server-side caches. (CVE-2017-7674)importantScientific LinuxScientific Linux 7tomcat-webapps-7.0.76-3.el7_4.noarch.rpm5a8a8d174997c7f25bc21924e1660282e9a5aa95c9821cda3dc24e77981e2b2etomcat-7.0.76-3.el7_4.noarch.rpm8c56ae11d50b694815ee3d5842423015ac9634d7f2844dd4e5b46510342606fftomcat-jsvc-7.0.76-3.el7_4.noarch.rpm2c790eaaaee77e668c112bc160af76e11b83a326437111750f1839ea8a67ec8ctomcat-javadoc-7.0.76-3.el7_4.noarch.rpmbfca1fbe124d70dcf0ce2f59a64e215229db7d593595a8bcd6a71dc7a0095e5etomcat-docs-webapp-7.0.76-3.el7_4.noarch.rpmd208c427778d3e51f9e75265324652b4efba69dc0d95d11baeb7a02df6121b2ctomcat-servlet-3.0-api-7.0.76-3.el7_4.noarch.rpm371de77d92232270f01510bd8539c24ed4356c903b98ff7688778c6358c6bad1tomcat-lib-7.0.76-3.el7_4.noarch.rpm2a5710e00afbad5f2bf909da7aff2ee684d9fbc9dc49a6210c1cfbc1ae6af5e7tomcat-admin-webapps-7.0.76-3.el7_4.noarch.rpm364a4076d279f562f030a005c9aec3b8a35f4815a9fe932445b0f75a671ff956tomcat-jsp-2.2-api-7.0.76-3.el7_4.noarch.rpm548f737cd59671fa6f3f63d0a2e05b178c7748b16cdc020a3ea1d93074dcab3ftomcat-el-2.2-api-7.0.76-3.el7_4.noarch.rpm9cf5cebb93ee2bf2adb1d8d471f0158cc1e0dbd540cb19736740732dbbd6cbedSLSA-2017:3111-1LiblouisSecurity Fix(es): * Multiple flaws were found in the processing of translation tables in liblouis. An attacker could crash or potentially execute arbitrary code using malicious translation tables. (CVE-2014-8184, CVE-2017-13738, CVE-2017-13740, CVE-2017-13741, CVE-2017-13742, CVE-2017-13743, CVE-2017-13744)moderateScientific LinuxScientific Linux 7liblouis-devel-2.5.2-11.el7_4.x86_64.rpmb0382fbde8ca9005d6e0c877d3b4d7fb6b9cb81ef544cbbc1adfc5fdec56870eliblouis-utils-2.5.2-11.el7_4.x86_64.rpm39b87fc05f2ac79866dd0e9c1b8b93781646274e55f27c63bd7f4c260775f438liblouis-2.5.2-11.el7_4.i686.rpm8389e0a65167394d10a3d9316d2ca12fc0980506bfe6b684ea6dd4a54bc6010dliblouis-python-2.5.2-11.el7_4.noarch.rpmc4c265fbeed99295d61404ab7383eff0a3ab57f03ea74e7a3bb116b27c07c25dliblouis-devel-2.5.2-11.el7_4.i686.rpmdb414f03c1ed8734fb2e3ef916aec9d6b13520edf1f3f98b28f906a39542eb7bliblouis-2.5.2-11.el7_4.x86_64.rpme9d617750ab879d75b0aac183406b7bb891ef6daacbb704421bbd3f9463b9f3aliblouis-doc-2.5.2-11.el7_4.noarch.rpmb216df8a1fa638492e979c1a0b27fe4067453280d29ac9b40e910f557cc2dc24SLSA-2017:3221-1PhpSecurity Fix(es): * A null pointer dereference flaw was found in libgd. An attacker could use a specially-crafted .gd2 file to cause an application linked with libgd to crash, leading to denial of service. (CVE-2016-10167) * An integer overflow flaw, leading to a heap-based buffer overflow was found in the way libgd read some specially-crafted gd2 files. A remote attacker could use this flaw to crash an application compiled with libgd or in certain cases execute arbitrary code with the privileges of the user running that application. (CVE-2016-10168)moderateScientific LinuxScientific Linux 7php-common-5.4.16-43.el7_4.x86_64.rpm4d682e43436b0adaf5393280ef5b42318c6ddfe51f6757e15cf96a0cd026e8f6php-pdo-5.4.16-43.el7_4.x86_64.rpm147c0da630c2dc72a4db81e9fa48238b7d0016ce3a261ea5049066cee950dd7ephp-mysql-5.4.16-43.el7_4.x86_64.rpm5aa475e93452584ff1123fd5b1b72578c8e1d07d9973a2054268ca72af70ade3php-intl-5.4.16-43.el7_4.x86_64.rpm2008f3b9532412ebab9508cac73bf73c11e10250b69afcbe6cd38fcead20b689php-snmp-5.4.16-43.el7_4.x86_64.rpma53e692a03b6ed96ba4c3ea3caef73f9cf7978432b8bc23671cca3f903733265php-process-5.4.16-43.el7_4.x86_64.rpm897f6fe7497a36690e921dfeff995604fc3a9c4e50ea695e112928dd0cf5215dphp-soap-5.4.16-43.el7_4.x86_64.rpm2cb95004c9879c0cfb7e516212965228d8b7bf8d3caf37e7598467bb800b4565php-5.4.16-43.el7_4.x86_64.rpm35b981c13746b1a9f325a50b3d4a9f9ee3879a00402dabf7a48549a047b3f52dphp-devel-5.4.16-43.el7_4.x86_64.rpm464f1d7b13c9ba4cbfa38786f47cb053c8c6589513f6d6e604f331e78413c2aephp-ldap-5.4.16-43.el7_4.x86_64.rpm8248064d3e96191defd158958527c03e3d9ee195602266c9469efbffdd25b559php-odbc-5.4.16-43.el7_4.x86_64.rpm74996b2aa8ae59a7ebd86cc709e8284fa69b7a1df052c875a924bdb67821b8fdphp-pgsql-5.4.16-43.el7_4.x86_64.rpm8f0640f1e6f70867160e53467b6ee3946ea1ccafa4362db1e9f27a8fa801e459php-xmlrpc-5.4.16-43.el7_4.x86_64.rpm1a57cc74b9002b98e3e938dd8769f5699688dc26c3a7de330aa39bc145705363php-enchant-5.4.16-43.el7_4.x86_64.rpmf6f2692a4642d4e1f1ca249931e7b1d714971af1cba6b616f425fedf9f552cddphp-mbstring-5.4.16-43.el7_4.x86_64.rpmdeb2b1ad0e9ac61e1fe38595f61845bb4d988c755e7525327868703feb4787e1php-pspell-5.4.16-43.el7_4.x86_64.rpmf6fa3bd16f7b4cd7b3150b58178fcfdca18360f23427ad09f64f6f595798ba8cphp-bcmath-5.4.16-43.el7_4.x86_64.rpm1b54becd660871977d37d2a903033c91cc997fd2f334c878bddf52013889c553php-cli-5.4.16-43.el7_4.x86_64.rpm40acbefaf77d93045acfdaf9197de4f7a530b64d1c35c7b0fd533144076118b3php-recode-5.4.16-43.el7_4.x86_64.rpmf6cf0aab2e1fcb4b66245da2c4340d2bd7fc260e50197479559e5254d851b7faphp-fpm-5.4.16-43.el7_4.x86_64.rpmd5995d9159c64ea3b05aeaa8a5b245e5c0584c46263d73949eea5a3c7390ef96php-embedded-5.4.16-43.el7_4.x86_64.rpm1972dfbefdb1008b9cb912e57d31eb0f6ce08b2b2388824547c87e6c69d06939php-mysqlnd-5.4.16-43.el7_4.x86_64.rpmefacb7a81c807b1412764cd5cad78aba92540acef92957491f29f4c1aa2e22d1php-gd-5.4.16-43.el7_4.x86_64.rpm24bcd3cb5be99a9a9ed6c169535ecb24af0ab679e0e024aa6bb4e3a6663b5751php-dba-5.4.16-43.el7_4.x86_64.rpm9fb4ea30a585d3ef27d12d608e60b524806cd2c225d789e391a8132914c3e011php-xml-5.4.16-43.el7_4.x86_64.rpm9102361ffd714129adf93c6f4921a77b93d27a84351f8ae407372eab07c4d363SLSA-2017:3247-1FirefoxThis update upgrades Firefox to version 52.5.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)criticalScientific LinuxScientific Linux 7firefox-52.5.0-1.el7_4.x86_64.rpmcb8c1273f8851a62110c3ba336c117ad675506357afdfdbcd254c13781a352ddfirefox-52.5.0-1.el7_4.i686.rpm2902355b97fc280b749b48f92f8726a20a783ae73160ee389e0201fc21b8ba73SLSA-2017:3260-1SambaSecurity Fix(es): * A use-after-free flaw was found in the way samba servers handled certain SMB1 requests. An unauthenticated attacker could send specially-crafted SMB1 requests to cause the server to crash or execute arbitrary code. (CVE-2017-14746) * A memory disclosure flaw was found in samba. An attacker could retrieve parts of server memory, which could contain potentially sensitive data, by sending specially-crafted requests to the samba server. (CVE-2017-15275)importantScientific LinuxScientific Linux 7libwbclient-devel-4.6.2-12.el7_4.x86_64.rpm1e34f30a937df77472d5268b8d9eb46ed436dc67998a3988318037ff2c0b3828samba-winbind-clients-4.6.2-12.el7_4.x86_64.rpme866d4eff16115a45b2aad13fbc95b748e897d030ec5fd52f2ec2c12ae963934samba-python-4.6.2-12.el7_4.x86_64.rpm35879032afe765d9614f5950a6d57b6b3020e4d8d3e5cbff05ab60435f2957cbsamba-test-libs-4.6.2-12.el7_4.x86_64.rpma388ecfc7f578fac93922fc3e59072a9431e8d041c6535bb71a63b9f3c74e5f8samba-krb5-printing-4.6.2-12.el7_4.x86_64.rpmbab9ec219da4e1d2e6fc2b7ccaa5a00e42f822cb3bf4c2e165c23d7a0ae37ff6libsmbclient-4.6.2-12.el7_4.i686.rpmed0aca385fb80998169c1b216adc7430adf96f61125d82d223ba77ae8403976dsamba-vfs-glusterfs-4.6.2-12.el7_4.x86_64.rpmecca274ce9d6ad67b59d9bb9d4600f61ff19bb3b4bb99719e0cdf47bfa90a8c9samba-libs-4.6.2-12.el7_4.x86_64.rpm294ec2328496ca9cb24b556a85ad01f96dc6dfec00c2baa6a934afcbcc699d97samba-winbind-4.6.2-12.el7_4.x86_64.rpmcd445f777fb5d99bfded09a054878ae663771ce1d598053e55cb6a761d4760dfsamba-client-libs-4.6.2-12.el7_4.i686.rpm9f60a2df36b66b75c9464298e01d65c47c42be3d4f89a5a61e536ae2f165743fsamba-4.6.2-12.el7_4.x86_64.rpm0d8470da0a7ed076da445ff3e4369b2816623240fd9e96a5cc7ddea42947b276ctdb-4.6.2-12.el7_4.x86_64.rpm0aa6c86a16fbbba978ec02e48493ba42d4ce11ec15965d2382893123e1c6ea3asamba-test-libs-4.6.2-12.el7_4.i686.rpm24c68b0a9bd9eb4d1bd28d424879df15f1d3e92da8584772ff84cb8206daeaf6samba-libs-4.6.2-12.el7_4.i686.rpm73550663b0f2581cf09f7c931d5ae6d3af0d6f075b8a42dd9333745936a29af6samba-common-libs-4.6.2-12.el7_4.x86_64.rpm963755c3b27859b9e3b0b72e69100ad9be6a63350ef5cf77fe626b4e3fb5c3aflibsmbclient-4.6.2-12.el7_4.x86_64.rpm2725ae30def9dd7267186d175280a24aaed840678bcb1ce294d28fa86fb75a28ctdb-tests-4.6.2-12.el7_4.x86_64.rpm19b8d70ca3543849df6353dded71ad268fa480c10527bfd6f6fcef8e6533f3d8samba-winbind-krb5-locator-4.6.2-12.el7_4.x86_64.rpm274544110af7bae7988a62b95b797c534353c3e2bd16e3ef810e6f6d5d47a879libwbclient-4.6.2-12.el7_4.x86_64.rpm25584ac34c8f59ef55b4d0e54779ac337f92e090fbdced4b50d5650fac9ae831libwbclient-4.6.2-12.el7_4.i686.rpmbefbed7c30cca99da395df2c8bb1e75579b67a9c445019c6961a1fcd62c3bd53samba-common-4.6.2-12.el7_4.noarch.rpm9b3d285ac5fe21dfe3d138d69b5c754080a33348c29fe22a589bfe8cbb8cf1bbsamba-pidl-4.6.2-12.el7_4.noarch.rpm29b1d082a211b64a35c07f5cda68f58f5f254989f71e4e82fdade8b84ad893a8samba-dc-libs-4.6.2-12.el7_4.x86_64.rpme7753ddf6fddcaca4bd740af098fb29701133222978caf6af3a1d547808607e4samba-devel-4.6.2-12.el7_4.i686.rpmfea907e4f37f4f5f9ca807a605a0d155a024f04f8b0e2585e0f2c84453caff0dsamba-client-libs-4.6.2-12.el7_4.x86_64.rpmdbc464129d269441e1b74aa46bcc0d426b8d29b4206905b6520b788374eaa1c3samba-dc-4.6.2-12.el7_4.x86_64.rpm7b6327456088f008ae6baf355843ab7869a220161608e3063957978acd793078libsmbclient-devel-4.6.2-12.el7_4.i686.rpm09638f053fa89e0be46083f2fafa09bb29955d5e6972c1f42b97f48b56a9b520samba-winbind-modules-4.6.2-12.el7_4.i686.rpm28c4f0c54a67fb01d42fd8ead315abcbf822f387f5e1fc3ff22863c934bcb7a0samba-winbind-modules-4.6.2-12.el7_4.x86_64.rpm89ab8938b84767f518501a3cf09091865e42d1433f927370dc17e60e207bb1f5libwbclient-devel-4.6.2-12.el7_4.i686.rpmb6dd4913d7bd6e4b60ec510c40710494e66316db1592666667de92a121580392samba-test-4.6.2-12.el7_4.x86_64.rpm8e3d41eb17262e24da93083a4f45a7df4664b60141a8d2b971f8ec921318f1d3libsmbclient-devel-4.6.2-12.el7_4.x86_64.rpm60b39f91b38222c729754cfd27b140b86a39ef78841d4704f80b658d3ddb704esamba-client-4.6.2-12.el7_4.x86_64.rpm146d9348fcfa0ac750aa4becbcde79b631b12bd7c3a68e3bcaa6be4d8d650871samba-devel-4.6.2-12.el7_4.x86_64.rpm859cfd80157e3f348b09bb5356facc7e0551193fa0746b159d7500703b6b239bsamba-common-tools-4.6.2-12.el7_4.x86_64.rpm469d5a9464cb1af81b0100f01e637b879f21b982d61ebc4ad2fcb2a2ea25d715SLSA-2017:3263-1CurlSecurity Fix(es): * A buffer overrun flaw was found in the IMAP handler of libcurl. By tricking an unsuspecting user into connecting to a malicious IMAP server, an attacker could exploit this flaw to potentially cause information disclosure or crash the application. (CVE-2017-1000257)moderateScientific LinuxScientific Linux 7libcurl-devel-7.29.0-42.el7_4.1.x86_64.rpm917c40d16e6e9b97c49448857ec72d3edee5e4a457dbf918675e5f134bb1cecelibcurl-7.29.0-42.el7_4.1.i686.rpmf740b3a1f90226eaab2d70f4bbba5e1aa9703ecf9ad6f1b18468a727b197eb0clibcurl-7.29.0-42.el7_4.1.x86_64.rpm7f055a8eea33d44629e4f697b1022522d1141f764d853df5cada9e86fb57ebb5libcurl-devel-7.29.0-42.el7_4.1.i686.rpmf5463cd8890bbf5de47d4ed205fbfbe5e50fdb86d757ab6d23b4f3681e52608acurl-7.29.0-42.el7_4.1.x86_64.rpm24250f70a5cca2515e49d12cdc9b4b21e31bcd4b3e45cf0d7e42a7cf8232f906SLSA-2017:3269-1ProcmailSecurity Fix(es): * A heap-based buffer overflow flaw was found in procmail's formail utility. A remote attacker could send a specially crafted email that, when processed by formail, could cause formail to crash or, possibly, execute arbitrary code as the user running formail. (CVE-2017-16844)importantScientific LinuxScientific Linux 7procmail-3.22-36.el7_4.1.x86_64.rpm92622daeb4e79ebb95f3c9b5eaa69551de5b4726ec18575779dad2460a9436f4SLSA-2017:3270-1AprSecurity Fix(es): * An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)importantScientific LinuxScientific Linux 7apr-1.4.8-3.el7_4.1.x86_64.rpm2cd86e6d72fb9fa725990bdc2181160560896885409e3f411215db48c1c0b03aapr-devel-1.4.8-3.el7_4.1.i686.rpmc9733277c4d652eb8358c0931948f6dd0fed31e39fd28cdd5d3cf0e5c49fa9daapr-1.4.8-3.el7_4.1.i686.rpm161bccf556d84040f6893b2709c8f6ad7a10379463710e83146cd6351b3a4ea0apr-devel-1.4.8-3.el7_4.1.x86_64.rpmc5599307555f2353406616e108497d31cc63c2356c004438b9d10d56ec970ed5SLSA-2017:3315-1KernelSecurity Fix(es): * It was found that the timer functionality in the Linux kernel ALSA subsystem is prone to a race condition between read and ioctl system call handlers, resulting in an uninitialized memory disclosure to user space. A local user could use this flaw to read information belonging to other users. (CVE-2017-1000380, Moderate)importantScientific LinuxScientific Linux 7kernel-tools-libs-devel-3.10.0-693.11.1.el7.x86_64.rpm242c4833d2ba270c85a7ba55495fd96130b5505487978e946a9ad2cfc0e09809kernel-devel-3.10.0-693.11.1.el7.x86_64.rpm398e71c3844c73724fc21bf65db89887b591e3e6dee2cbd22ea3109e9cd3c73ckernel-tools-3.10.0-693.11.1.el7.x86_64.rpm687ed33a51c3c0028acda833db5e3f3c278bafb2852c2dcd343abd412e0f9509kernel-abi-whitelists-3.10.0-693.11.1.el7.noarch.rpm693ce3caebcc528d833a219722e80eb5e7b28536b71c0121362c4a289a8bbadakernel-3.10.0-693.11.1.el7.x86_64.rpma781c69cf2b69d1cc0d5799173723a1dc5bee3d4d388e9ff49ea69a80b383e89kernel-headers-3.10.0-693.11.1.el7.x86_64.rpmff9c3976fe585160375b5b1ff04b6f7b7a0f6d53ca0b7da3f2ab8fbed2b4d2a2kernel-debug-devel-3.10.0-693.11.1.el7.x86_64.rpm8661af80a1cd8c56f3c41c03c10b5533517f9bbc48227fa0884c74c2f093c0fckernel-debug-3.10.0-693.11.1.el7.x86_64.rpm1f24694bb1040c398d970b78facaef157e8bf84acea031dc0cb9551a64a425f0kernel-tools-libs-3.10.0-693.11.1.el7.x86_64.rpm61ec67d34b26bb63a022a5a9d686c45aeed7b6d9fc4b0ffd2f08451632b7e156python-perf-3.10.0-693.11.1.el7.x86_64.rpm8fa74cd84096559e03365998402fb67bde15d2d55a761e3b1506953ada545f6ekernel-doc-3.10.0-693.11.1.el7.noarch.rpm8759e5ab364cc5363407f946730c0154917b689f8526005105f8ce9f76a0ece5perf-3.10.0-693.11.1.el7.x86_64.rpm5e44c135807894b572a9741cb49f0c2ec3aa17c7bf961f87dc38f3c8a5c502fdSLSA-2017:3368-1Qemu-KvmSecurity Fix(es): * Quick Emulator (QEMU), compiled with the PC System Emulator with multiboot feature support, is vulnerable to an OOB r/w memory access issue. The issue could occur due to an integer overflow while loading a kernel image during a guest boot. A user or process could use this flaw to potentially achieve arbitrary code execution on a host. (CVE-2017-14167) * Quick emulator (QEMU), compiled with the Cirrus CLGD 54xx VGA Emulator support, is vulnerable to an OOB write access issue. The issue could occur while writing to VGA memory via mode4and5 write functions. A privileged user inside guest could use this flaw to crash the QEMU process resulting in Denial of Serivce (DoS). (CVE-2017-15289)moderateScientific LinuxScientific Linux 7qemu-kvm-1.5.3-141.el7_4.4.x86_64.rpm2f332e0d92253c22fc667d1b19f6f29cfdce78ab68ae29fbaef2ebcd621e0137qemu-img-1.5.3-141.el7_4.4.x86_64.rpm5f2f23ff34cfec150a84fe44ca604bafa7abb8876f29cda0632601ad95d08852qemu-kvm-tools-1.5.3-141.el7_4.4.x86_64.rpm74c4b8e24172ff39a5124fbb667b7be7a2094b496c710a1169fc23b5991843abqemu-kvm-common-1.5.3-141.el7_4.4.x86_64.rpmb95cc1eb83661563ab01905840c2718dc118355de996a47ec636ebf78e243dcaSLSA-2017:3372-1ThunderbirdThis update upgrades Thunderbird to version 52.5.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)importantScientific LinuxScientific Linux 7thunderbird-52.5.0-1.el7_4.x86_64.rpma68faf075c6dd0e14109a089eafe37b55191bd41d324ada61c6dcd2b022fa627SLSA-2017:3379-1SssdSecurity Fix(es): * It was found that sssd's sysdb_search_user_by_upn_res() function did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it. (CVE-2017-12173) Bug Fix(es): * Previously, SSSD's krb5 provider did not respect changed UIDs in ID views overriding the default view. Consequently, Kerberos credential caches were created with the incorrect, original UID, and processes of the user were not able to find the changed UID. With this update, SSSD's krb5 provider is made aware of the proper ID view name and respects the ID override data. As a result, the Kerberos credential cache is now created with the expected UID, and the processes can find it. * Previously, the list of cache request domains was sometimes freed in the middle of a cache request operation due to the refresh domains request, as they both were using the same list. As a consequence, a segmentation fault sometimes occurred in SSSD. With this update, SSSD uses a copy of the cache request domains' list for each cache request. As a result, SSSD no longer crashes in this case. * Previously, the calls provided by SSSD to send data to the Privilege Attribute Certificate (PAC) responder did not use a mutex or any other means to serialize access to the PAC responder from a single process. When multithreaded applications overran the PAC responder with multiple parallel requests, some threads did not receive a proper reply. Consequently, such threads only resumed work after waiting 5 minutes for a response. This update configures mutex to serialize access to the PAC responder socket for multithreaded applications. As a result, all threads now get a proper and timely reply.moderateScientific LinuxScientific Linux 7libsss_simpleifp-1.15.2-50.el7_4.8.x86_64.rpm66895df6c08498094900a1f685bfa05bb9a1474b0f93db29a947be38afbb2fa9sssd-kcm-1.15.2-50.el7_4.8.x86_64.rpm532f4a3947c85565b7e42b283342c0600c52ee63b41e4cefdef10e25dc1ea7edsssd-libwbclient-devel-1.15.2-50.el7_4.8.x86_64.rpm3eecc9d9b790c124e40cc7c4c0bb8d92fb6e797386a7d99c53cd32112e892561libsss_nss_idmap-devel-1.15.2-50.el7_4.8.i686.rpm0c4685838fbc6468cff1a4041f6d6ff7542cf9570671e1e5677f087f22ecc30epython-libsss_nss_idmap-1.15.2-50.el7_4.8.x86_64.rpm367cada7ea1458a8f67168cd47a88cf200ebb746499c10bdf9411ba5512e0299sssd-common-1.15.2-50.el7_4.8.x86_64.rpm1ba4e366fc24964449de294c2bf4b6d423d801c5b5a1f11e252514c6947efcb3libsss_idmap-1.15.2-50.el7_4.8.i686.rpmdedecd62f7e72e970fad2d96aaa9ad588ef0c74576601a3944954ab33e787f70python-sssdconfig-1.15.2-50.el7_4.8.noarch.rpm37d6823409d62a96a530bbf7e7b1ef3186158ee2ff22cc75bde330a8bed18360libsss_sudo-1.15.2-50.el7_4.8.x86_64.rpmec06b205c602482cbb1de726e20de5b170b22d674837c161f560192f51cbc9e3sssd-libwbclient-devel-1.15.2-50.el7_4.8.i686.rpm33d9e4b40807d102a18bfe4b0fc01bbc785b10a55a9e0613f74c3c6a613ccf24libsss_certmap-devel-1.15.2-50.el7_4.8.i686.rpm1b6355669f28e4ed3f4816be42316f07564186543551b651e7a055ed4da6410bsssd-ldap-1.15.2-50.el7_4.8.x86_64.rpmaef1f75e062fbe630f705035e4d787e33007fe4df166ceed26859cbbdff4a79fsssd-client-1.15.2-50.el7_4.8.i686.rpmca9c561901658be57b013a8876727643dcb5ef730b2da3097efd643ee7036ba5sssd-client-1.15.2-50.el7_4.8.x86_64.rpmf51b61bd41b753a3707c8efeb81f5748bf7ef17e7fc56c3bcd3390c0d15c777blibsss_nss_idmap-1.15.2-50.el7_4.8.x86_64.rpma8509259969eef780d7f73f2122e225ddec25be56bd8a32f164332fec3a24617libsss_autofs-1.15.2-50.el7_4.8.x86_64.rpmc815e1a3a26832f636f07a47ae442aedb5412a44be2c31c6f0e7d03bc7789512sssd-ad-1.15.2-50.el7_4.8.x86_64.rpm83cac65bd821b833dd55fe4585ee16ff1fdfec74e347d4ca4a9355ea01bccddasssd-libwbclient-1.15.2-50.el7_4.8.x86_64.rpm347df35d7fb7f5915f7956e75e61e6a4ad246eb15dba5a8c1de7419990113cf9libsss_simpleifp-devel-1.15.2-50.el7_4.8.x86_64.rpm26f5fb530aac46b2a38adcd3e9de4faeaa3c7af0fc59ad5837bac288028a7149libsss_certmap-1.15.2-50.el7_4.8.i686.rpmb141eeebc763896db673e2afe6bca195e091f66ad55f1818e164f4bc8326c1d4sssd-proxy-1.15.2-50.el7_4.8.x86_64.rpmc96403d133eb959ae327d7a43c48ecbe249374ca0061fa30ea80439c18b02201sssd-winbind-idmap-1.15.2-50.el7_4.8.x86_64.rpm670c3943db2196a0215ca1f6e01a935950902742ed40da07b782d49f497bb033libsss_idmap-devel-1.15.2-50.el7_4.8.x86_64.rpm134fb75c8f4fc31d32f40717d7ca5065e6d670e0f6ff17f7866e039bbded8cd5libsss_certmap-1.15.2-50.el7_4.8.x86_64.rpm6c2345a37f8acdd35d741ac6c1216f7c13788634efa2582bf87be44700f6b8a9python-libipa_hbac-1.15.2-50.el7_4.8.x86_64.rpme4d0c5017f14cb4af647a72c929faf643ee49aa9caee9edef6ed52863cb24e0bsssd-krb5-common-1.15.2-50.el7_4.8.x86_64.rpm5bc4fc72b2737bf3a9ffd6d6d1230779d72367ba64318307b7d2b3de1817c79fsssd-dbus-1.15.2-50.el7_4.8.x86_64.rpmbefb489cc3a5009ab8c7fafe8a789460bbf91a4dd76b0610030a14dcaabd363alibsss_idmap-1.15.2-50.el7_4.8.x86_64.rpmf29a823c6b02c2425813c282f404f27841f8efe0ef4d1d6418cda142865ec0d8sssd-common-pac-1.15.2-50.el7_4.8.x86_64.rpm674e7ed9fa88f83cc0b8edb085eb88c0053d7fd9a2f3605eb916f459d68dd417libsss_simpleifp-1.15.2-50.el7_4.8.i686.rpm857681ae1d6f59c55668c285eb82e4c13a0d0f0cb641ff6bd11de96d4c30b1eclibipa_hbac-1.15.2-50.el7_4.8.x86_64.rpm2f4654a832180e472770399902ad19f24f77e9a43989701645c2ef01632dd91clibipa_hbac-devel-1.15.2-50.el7_4.8.i686.rpm620c81021c7c05ae9f293b6c150869446f97ed2449af126d4f4694c0e2a0646dsssd-ipa-1.15.2-50.el7_4.8.x86_64.rpm3e0d8e814c52970416b33af18a466acd7bd814115506b28872146ebac8cb6a9blibsss_nss_idmap-1.15.2-50.el7_4.8.i686.rpma65749e99fe4423a499c0eb00584d37290cb1055de0e60c10f2ee5b034179717libsss_certmap-devel-1.15.2-50.el7_4.8.x86_64.rpmfcf144cdd0c6d56344ea00cc1de18ca39c420f4c6da5703f5a3c57d9d449d917libsss_idmap-devel-1.15.2-50.el7_4.8.i686.rpmf181b2afc12396ecec92f98626c1c8a4ad48fd7294d995f5ccf789e67f10a995sssd-polkit-rules-1.15.2-50.el7_4.8.x86_64.rpmdc28e857f5c54a905fb0748f6bdc895c8bcfa064fe8429008e8def4cf96cb151sssd-1.15.2-50.el7_4.8.x86_64.rpm5296a1c45a29bf13bb6d1917b3b16d4b39f0d287140ec15c8c9fbe808de10fdelibsss_nss_idmap-devel-1.15.2-50.el7_4.8.x86_64.rpm2aa2312c6818cde4a454754db382b1ee23bd09ee7c37555f472388b69946e759libipa_hbac-1.15.2-50.el7_4.8.i686.rpmf08ea91c43ca440d4c7ee137373a982a125589e3fab6f6af6fa076bf14301dfclibipa_hbac-devel-1.15.2-50.el7_4.8.x86_64.rpm497ed68d4a5ad0e84c4223e0f84b1714f934b631784f770f25c8ceb494b96a5dlibsss_simpleifp-devel-1.15.2-50.el7_4.8.i686.rpm1ff95bf97d36252fb15d323c27f957fe6f5d3c26d71fd64e7e4490936a0b7a2cpython-sss-murmur-1.15.2-50.el7_4.8.x86_64.rpmfa1e0995068edb0019b1b3731db843fccff972b56a49770b7724d21a41be67cbsssd-tools-1.15.2-50.el7_4.8.x86_64.rpm6f8f71647dc693369e38aca500313941426460f9102da7bb75d5be584366dc6epython-sss-1.15.2-50.el7_4.8.x86_64.rpm961d01dfdaa1941dc2a1930c62ef38ccad3a431effff1ee4628636d142b8dfddsssd-krb5-1.15.2-50.el7_4.8.x86_64.rpm7f8ef1d25f4f3922fd3bdef37950937f2d90789e491d38a451158094955afeb0SLSA-2017:3382-1FirefoxThis update upgrades Firefox to version 52.5.1 ESR. Security Fix(es): * A privacy flaw was discovered in Firefox. In Private Browsing mode, a web worker could write persistent data to IndexedDB, which was not cleared when exiting and would persist across multiple sessions. A malicious website could exploit the flaw to bypass private-browsing protections and uniquely fingerprint visitors. (CVE-2017-7843)importantScientific LinuxScientific Linux 7firefox-52.5.1-1.el7_4.i686.rpm949cab49fb2e8dfc0caf408cbda833cf469c7c2a76b5c15e31d82176192fd5d9firefox-52.5.1-1.el7_4.x86_64.rpmbd4a3a7f063fafacae83f43a85d89d782ae4884045f78e9ca8e264f071a2f849SLSA-2017:3384-1LiblouisSecurity Fix(es): * A missing fix for one stack-based buffer overflow in findTable() for CVE-2014-8184 was discovered. An attacker could cause denial of service or potentially allow arbitrary code execution. (CVE-2017-15101)moderateScientific LinuxScientific Linux 7liblouis-python-2.5.2-12.el7_4.noarch.rpm3ab09963a77b3d6a1cf441341806c08046309a0b349cee2cc7fc15c627bd9171liblouis-utils-2.5.2-12.el7_4.x86_64.rpm1c19ccf982124046bb6e851e064f3fb6fb3057f03e435cd45b33bb4c0eae65e1liblouis-2.5.2-12.el7_4.x86_64.rpm8f0b4623d06636e433a885b2f3c7fc626b5d58370edf6b2a53254e8e6867695dliblouis-doc-2.5.2-12.el7_4.noarch.rpm9963ee3f596ecee42dc015ff25e71dc80d2e9af2b4df00a4a332b30fe98abea7liblouis-2.5.2-12.el7_4.i686.rpm86d992e858de1741f20a550ba6538a0277836f00720ae3d61d20822450c6009eliblouis-devel-2.5.2-12.el7_4.x86_64.rpmfac1d4903034c0e5d345695c903e30c01f12f9aff2ddac804810383fba213d49liblouis-devel-2.5.2-12.el7_4.i686.rpma5c24ed6c4f83d61b99649e2fdee4557de805a8fcdb88ae3035165c6cc25913cSLSA-2017:3392-1Java-1.7.0-OpenjdkSecurity Fix(es): * Multiple flaws were discovered in the RMI and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10285, CVE-2017-10346) * It was discovered that the Kerberos client implementation in the Libraries component of OpenJDK used the sname field from the plain text part rather than encrypted part of the KDC reply message. A man-in-the- middle attacker could possibly use this flaw to impersonate Kerberos services to Java applications acting as Kerberos clients. (CVE-2017-10388) * It was discovered that the Security component of OpenJDK generated weak password-based encryption keys used to protect private keys stored in key stores. This made it easier to perform password guessing attacks to decrypt stored keys if an attacker could gain access to a key store. (CVE-2017-10356) * Multiple flaws were found in the Smart Card IO and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-10274, CVE-2017-10193) * It was found that the FtpClient implementation in the Networking component of OpenJDK did not set connect and read timeouts by default. A malicious FTP server or a man-in-the-middle attacker could use this flaw to block execution of a Java application connecting to an FTP server. (CVE-2017-10355) * It was found that the HttpURLConnection and HttpsURLConnection classes in the Networking component of OpenJDK failed to check for newline characters embedded in URLs. An attacker able to make a Java application perform an HTTP request using an attacker provided URL could possibly inject additional headers into the request. (CVE-2017-10295) * It was discovered that the Security component of OpenJDK could fail to properly enforce restrictions defined for processing of X.509 certificate chains. A remote attacker could possibly use this flaw to make Java accept certificate using one of the disabled algorithms. (CVE-2017-10198) * It was discovered that multiple classes in the JAXP, Serialization, Libraries, and JAX-WS components of OpenJDK did not limit the amount of memory allocated when creating object instances from the serialized form. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized. (CVE-2017-10349, CVE-2017-10357, CVE-2017-10347, CVE-2017-10281, CVE-2017-10345, CVE-2017-10348, CVE-2017-10350) Bug Fix(es): * Previously, OpenJDK could not handle situations when the kernel blocked on a read even when polling the socket indicated that a read is possible. As a consequence, OpenJDK could hang indefinitely. With this update, OpenJDK polls with a timeout and performs a non-blocking read on success, and it no longer hangs in these situations.importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4.x86_64.rpmdd6e40dab306bf63205a0700337722734a18959c349964c4e246ecf60052c20fjava-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm08f8bef6a656a9e25e16153663fc6ce38ca819cae19fa59a4d1df7b5829c441djava-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm0e0fc60360b35ccd79e07ef8df89f0c5ab1f554a2449b10ce5e1b9713e34584cjava-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm4c4d31037ead8efa3f82cde3db1dc4c494009aa64b3a9b11f93bcfefcbe838d3java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4.x86_64.rpmc45c1bded503372446c4acd0dd59e5a39c6868d0808fdfd5f039f8b468ed4602java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm91e39241561d53511117fda5e35329cbe07854db4a72e0be5b92e3431bde7ac1java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4.noarch.rpm1d5daa35c0bf2d3d93dd0dd46116dcd72df39a7cf0c613853b2fb6ef93269967SLSA-2017:3402-1PostgresqlSecurity Fix(es): * Privilege escalation flaws were found in the initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine. (CVE-2017-12172, CVE-2017-15097) Note: This patch drops the script privileges from root to the postgres user. Therefore, this update works properly only if the postgres user has write access to the postgres' home directory, such as the one in the default configuration (/var/lib/pgsql).moderateScientific LinuxScientific Linux 7postgresql-plpython-9.2.23-3.el7_4.x86_64.rpm218745f2c40032aad2f4a2938156c64eb06404734e73b2b77412a734cef9f0c2postgresql-devel-9.2.23-3.el7_4.x86_64.rpmca640939d299beac0efd4523efa8d9e48ff01af507cab8c0124fac342fc56e52postgresql-contrib-9.2.23-3.el7_4.x86_64.rpmcd469dff7c8899fa546707d3c3643afdcc978acc31a6587a12b6247374710717postgresql-docs-9.2.23-3.el7_4.x86_64.rpmc939f5a3c0c6d95070c9858252041d6af59d77f32e859dafabde003d773c3d00postgresql-9.2.23-3.el7_4.i686.rpmd6aea4ff057cdad3cf44c2bece08114195267c75afa73758171d9ca5fed496a7postgresql-libs-9.2.23-3.el7_4.x86_64.rpm3d92a85a92d15ca31c6301c42b50ad5f10c5971179f6db69d1531b4e1539c9a2postgresql-plperl-9.2.23-3.el7_4.x86_64.rpm4a72a459b5c5953292e317b3c642a421eb52a8bbf3786da9f3763d1017349777postgresql-static-9.2.23-3.el7_4.i686.rpmd25b5cec6410ff9465636009d60f77a54000cd883cbeb3b83a002a453bd29da9postgresql-pltcl-9.2.23-3.el7_4.x86_64.rpmb3247e5199574c4ed69e2637bb45836f85f44930e0306e1f4f9a1473a936910bpostgresql-9.2.23-3.el7_4.x86_64.rpmc8b88beede7515b66d0c2f1f5cceeb20f87120093bd6e8f8ddcc92c3095d5c0apostgresql-test-9.2.23-3.el7_4.x86_64.rpm6523160e1ade8838645a7ef0e9ec9e16ba86c1fa32bfb830a659828494fa5817postgresql-libs-9.2.23-3.el7_4.i686.rpmfa853eefadd20a4626cab314b39821be95beec86b7db9838294eba80b4446aa4postgresql-server-9.2.23-3.el7_4.x86_64.rpm06c20eb3bfba6286fab99ad1696d7f4d89baeaafb151eca0d112384e647c5058postgresql-upgrade-9.2.23-3.el7_4.x86_64.rpm3c4d1eed204622773f3c82e7ffec143557fcae7bb84059f4fec36c176dae85capostgresql-static-9.2.23-3.el7_4.x86_64.rpme54c3574c37bd558afde8f3923ad0ca9c3c24acc56a78503ae9f40c87456ecbbpostgresql-devel-9.2.23-3.el7_4.i686.rpm15f628e7fbe42a20cc5314177f8434a227aca7435eb8caeac36cf010a250b698SLSA-2018:0007-1KernelSecurity Fix(es): An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. The performance impact of these patches may vary considerably based on workload and hardware configuration. In this update mitigations for x86-64 architecture are provided. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important) Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important) Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important) Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.importantScientific LinuxScientific Linux 7kernel-headers-3.10.0-693.11.6.el7.x86_64.rpm45822802e5ca43e6497f6e4408c364f485f77591b1b6efd0be2355f0246c213ckernel-abi-whitelists-3.10.0-693.11.6.el7.noarch.rpm7dc499dcc2e027c314d5407aa501b5ca089b9eaade6da9ccee21646dec006d0akernel-tools-3.10.0-693.11.6.el7.x86_64.rpm3d75d2a4db6faa99e67d1a7ca2f9e1a04aec41e0492ae15799cc6f8214d354d6kernel-3.10.0-693.11.6.el7.x86_64.rpmcc25be5a1d8e55a6a36a78e0eaace1a1401625d9e258f256c37534f41bbac734kernel-tools-libs-devel-3.10.0-693.11.6.el7.x86_64.rpm136242974c07ce550d10029240e30398903a152be1fe685cc64bad6405319bb4perf-3.10.0-693.11.6.el7.x86_64.rpme8ec8a6ed4b7eec049f339ef916414b8bbb851970938dcabd82e49015858d553kernel-doc-3.10.0-693.11.6.el7.noarch.rpm2b59ddd02be5a7d3926d4b03be8809116c61cb0e65818fd4ea23462911fdc336kernel-tools-libs-3.10.0-693.11.6.el7.x86_64.rpm9de643c0185dcb5221b1866e78b8df7776c0d4491ad9e6aecfd52a3af86412c7python-perf-3.10.0-693.11.6.el7.x86_64.rpm7092fa73854838a1f3674a1a89e385bf8966461d94f7a42ba8050ee63a21a16akernel-devel-3.10.0-693.11.6.el7.x86_64.rpm30f46c8cc4f56e37d69bcfba90b9551704c446d5a9263def3765fa9914fda2dekernel-debug-3.10.0-693.11.6.el7.x86_64.rpm1abba93d04e4c7c8fecd97d351b7c31947423ccf1e4451f2be99bf8d50c74e9ckernel-debug-devel-3.10.0-693.11.6.el7.x86_64.rpmd3cfe8e65a9528346e375969b865f0483cb89b68dcf7310a1c93e1d66b49e2edSLSA-2018:0012-1Microcode_CtlSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) Note: This is the microcode counterpart of the CVE-2017-5715 kernel mitigation.importantScientific LinuxScientific Linux 7microcode_ctl-2.1-22.2.el7.x86_64.rpm82376a765cb8cad5b4ae31b69168497ccd10b8a48dd216a4693c96ca9005a18cSLSA-2018:0014-1Linux-FirmwareSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) Note: This is the microcode counterpart of the CVE-2017-5715 kernel mitigation.importantScientific LinuxScientific Linux 7iwl7265-firmware-22.0.7.0-57.el7_4.noarch.rpm84d272e87c59a2ed34161ca451c45361d7cdf8a66c53cbec029bdde750b63227linux-firmware-20170606-57.gitc990aae.el7_4.noarch.rpm9856bcd3b6708eb0e6416b6beaaa2a86e51acfa713b862dcdc40fbb5a17059f0iwl105-firmware-18.168.6.1-57.el7_4.noarch.rpm976a082fcbd7aae094379db135c28f82528af13ddbfada8074553342eb22f597iwl3945-firmware-15.32.2.9-57.el7_4.noarch.rpm24638594d3ee7e8acc574ddf0c5f59ac067a6324f882696970de13716e0cdce9iwl6050-firmware-41.28.5.1-57.el7_4.noarch.rpmb0043b0fb75f0c03159a948c880b705e926399ec44efd0432bd6b4b9c908d5b1iwl5000-firmware-8.83.5.1_1-57.el7_4.noarch.rpmf3d9495c7165ed0ca5ee2175c1e3748e77ffcf80cb200a974a1355045130fdfeiwl6000g2b-firmware-17.168.5.2-57.el7_4.noarch.rpm6e862a26553e1ba74dbed302cbc97d2e84d55df03435b41d652c21548deaf3aeiwl100-firmware-39.31.5.1-57.el7_4.noarch.rpm194b742daff31d143ae1f186076b836acd539240360498f0a1d0e08a1d8337faiwl2030-firmware-18.168.6.1-57.el7_4.noarch.rpmd22a1d25fea77e4ad87d80a598d53d60d7e524852d266ccec47db2ee48516cbeiwl5150-firmware-8.24.2.2-57.el7_4.noarch.rpm0bdbbbcad962089d7cb8306e3b1fad75cfa653a63297645ed0abe4b7af32abd5iwl4965-firmware-228.61.2.24-57.el7_4.noarch.rpm56505a350be447257304ace0d0184112847e18a3ed0499f0ac39c7ed36c12c8fiwl3160-firmware-22.0.7.0-57.el7_4.noarch.rpmd05222caf2e7dd0f77eb5b62197149f811739b5b28549529fc1a5d535e00fb29iwl135-firmware-18.168.6.1-57.el7_4.noarch.rpm795ac63b2c2eb42acaafada57b26a683430edfa6b1f1bb59a1f1ab68cc766423iwl7260-firmware-22.0.7.0-57.el7_4.noarch.rpme0493add5b4fa15c58295da3a1fab6bad6d8dba09e73618ccd8f76154885bc32iwl1000-firmware-39.31.5.1-57.el7_4.noarch.rpmbb52fc85b3fb8d25f79dde1575b6a7097890b80d23b138d725e2abff2b41a1c4iwl6000-firmware-9.221.4.1-57.el7_4.noarch.rpm24eb533990dafce8f75240e102238138c9f48180bff6bbb542c9bb731a641d6aiwl2000-firmware-18.168.6.1-57.el7_4.noarch.rpm6f86b722e3c761be3a134bea3ddb0042ab00e13ce9400d37ce14b9084e43b086iwl6000g2a-firmware-17.168.5.3-57.el7_4.noarch.rpm5f345dafe3a148c84d3a8ea0107695ab030098b8fb2556238352523a549f4b23SLSA-2018:0023-1Qemu-KvmSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) Note: This is the qemu-kvm side of the CVE-2017-5715 mitigation.importantScientific LinuxScientific Linux 7qemu-kvm-1.5.3-141.el7_4.6.x86_64.rpma7ce555a522e25e318c5cbc9977a1cffb28b82bbe417e3bccfa7701272c4e452qemu-img-1.5.3-141.el7_4.6.x86_64.rpmc4ffdfa1da781f1617d2fbfb6f1ea1b075473f296633427889c6863f2d6d31dfqemu-kvm-tools-1.5.3-141.el7_4.6.x86_64.rpmebb01c4913b484d7bf9631547648c8c35fd1443ee7c8b0679ed611c0667d87f4qemu-kvm-common-1.5.3-141.el7_4.6.x86_64.rpma6e12fe936f640f381f297a116d03c3cff9da2c233e0a2b130a6d05341fdc856SLSA-2018:0029-1LibvirtSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) Note: This is the libvirt side of the CVE-2017-5715 mitigation.importantScientific LinuxScientific Linux 7libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpmeaf46c8ba57db2532056803f8c5666310d7f817b99455ec07b0b2d950b529c3blibvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm6f89a72f8eb493b95ed963583c78897e19b84eb1fa80741c37750cb76fa47ec9libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpmbc24f51bce5fc4ecfcdf8ce0be4822a27172bdc396130e8aba87e9b09025f91flibvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm77c27710d4ac080ec6216e0bd3523911132f43c54cc5532994a3ed308fa4443elibvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpmd5fdc49fc70202c6469cf85127d282c0f6b75526534072eb7af7408dbc9c7fd4libvirt-libs-3.2.0-14.el7_4.7.i686.rpm75868754cfc0e189990b60d2312cf454a85569c36d3510bd14b9d8b871511d68libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm373bcb670736a32034b812969c7e79d9acff1b4b8aa4a3f1768d77ba277b9e61libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm3d4e5f6779e7933b6b9add129814dbefe3a48ea689d533c769c427f9ce0beda5libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm42d528f17e11b7650d02ef08b80c71081bcac1477abbadb5bc2799756ebfa441libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm85460ae76251c2f12274a064ce0c745c42125c0e06243374c030f40f537da7d5libvirt-client-3.2.0-14.el7_4.7.i686.rpm393e7667e0eb7ddf16160514e178ee76fa335f87070c3f6cc6a842d297b6628alibvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm326188438811113513f12f63a371af14bf8a1f1c5e79ddb3489799faa4caab8blibvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm26e2c6cee7f28098389a489eacf99afa267e28be0f51846f453c8f6bb1c60049libvirt-nss-3.2.0-14.el7_4.7.i686.rpm764b8fc9db43192d90541fc1ed5848e85e0b261f96c0a4eb4173af5fc2c2b43elibvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm7f8b0757c26f9ea37a774e5564f065d7651013df3eb32b814e8fdf92762d8194libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm99519526f8a89e916eaf795f995a38c18f537798518fcdfcf392d30688a46b07libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm2169b4d4ab12bb846d0903dd011d44905001ba0f24bbe020f4912d0378b2bc39libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm8e8cf002142e4a71624cc5d607d45cbe16fba64075fbb36aacec272748558467libvirt-devel-3.2.0-14.el7_4.7.i686.rpmd32c0ac807f8e68ff6b9fe80a2ab0dc1fba16c144723eb767978f0975922dc94libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm1b08dd074208fca92593bc02d5fee4857e2e3153d4fa0a46ce4771a98580ee11libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm849c8e8f3064f10e3475cd037216f0a59f140e164947b6d4a89a1966f3b95828libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpme70c7a187bdd473dbfb929abe4178177fdc0069fb875adba31732eefdeb01bc1libvirt-3.2.0-14.el7_4.7.x86_64.rpm7b3be6f3bac615759372ffefdd331613c0c59d6638b2714c04fddbd427a6a5b2libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm602d00d967ecba81694d6f33d9e60ff0b191f0ec1c228f0cd1911a7df23a7641libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm57828c369930a4402d9af90c770f993e23b76e1b80670aa59c78503a0241f3f6libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm3b7ab8ec8d42668cf7a24c710294bf27000963935ffa849e710d1db072c2cf46libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm1bf5deff90287d8ad95031c94fa83a72c69d48c175435757627ece99f236eeb1libvirt-client-3.2.0-14.el7_4.7.x86_64.rpmb6a96c18a2529d828de87a178a3e9db5c9ccdec485e36ceae329070698b53878libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm0547cf26fa8532a1280d39f320b55cf3e9f550435f69bed93799972e140da6dblibvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm7c5d38af6519776b730b3d4c9fcc0b7ffc3cf05bd81c1d716a6a47bbc03a69f7libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm7208c74973d52281690c5c993181a17d18b9a964b99b30fa217d025642ab29a0libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm0071283271d43cecac9b456d1cd18d9d96372839595a94271037884d2f0af0cclibvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm70a438700b9cae4c25b2e39050d2d77d00b3523542924a41befe13765948a649libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm09f2a21b61a1b1755461751e6b5678ada27c062c313332e57da440e1de1d56a4SLSA-2018:0061-1ThunderbirdThis update upgrades Thunderbird to version 52.5.2. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7846, CVE-2017-7847, CVE-2017-7848, CVE-2017-7829)importantScientific LinuxScientific Linux 7thunderbird-52.5.2-1.el7_4.x86_64.rpm6300f35b5b5192cbb792c9e768ea67a8bb2bf331c24b48fbed3a65113b5ac78bSLSA-2018:0093-1Microcode_CtlThis update supersedes the previous microcode update provided with the CVE-2017-5715 (Spectre) CPU branch injection vulnerability mitigation. Further testing has uncovered problems with the microcode provided along with the Spectre mitigation that could lead to system instabilities. As a result, this microcode update reverts to the last known good microcode version dated before 03 January 2018. You should contact your hardware provider for the latest microcode updates. IMPORTANT: If you are using Intel Skylake-, Broadwell-, and Haswell-based platforms, obtain and install updated microcode from your hardware vendor immediately. The "Spectre" mitigation requires both an updated kernel and updated microcode from your hardware vendor.importantScientific LinuxScientific Linux 7microcode_ctl-2.1-22.5.el7_4.x86_64.rpme5c578a6b4450d3af9f6a14458bffb583571247a599be27fe9a65f5ef282e8c4SLSA-2018:0094-1Linux-FirmwareThis update supersedes the previous microcode update provided with the CVE-2017-5715 (Spectre) CPU branch injection vulnerability mitigation. Further testing has uncovered problems with the microcode provided along with the Spectre mitigation that could lead to system instabilities. As a result, this microcode update reverts to the last known good microcode version dated before 03 January 2018. You should contact your hardware provider for the latest microcode updates. IMPORTANT: If you are using Intel Skylake-, Broadwell-, and Haswell-based platforms, obtain and install updated microcode from your hardware vendor immediately. The "Spectre" mitigation requires both an updated kernel and updated microcode from your hardware vendor.importantScientific LinuxScientific Linux 7iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm90299d2d885d27c62cc57cece94d6fd8ab1b293a074524e832fd73c2dee77b0fiwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm2acb642c0dcc6d16485a783f3d4df730666b2b9742d424cc8bdf5729457515c7iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm6c90d4102031eb0c17b91debd5d5ce64fca202352d79ad0a64f9ea732dc6bd9diwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm570ac6cc11216843620f99c12564c39597bed47bcd0a41db841cbada00bbc235iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm8f53fd5f05a1c1734e7ad39f6fc52f7c7992bbdaffea0b556850e677d3a92773iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpmf20c4e6d314c3b4e3bd1019b27e8d87a6ee7de22714309fcdb9119da84bd12cclinux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm30f097257de02b6a3897ac3a7de895d6d966a1beebf7abc83cb455890e918369iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm8e288123f93843106c7e1c3fc58ba107d9affc364177d3d32583feb00d643805iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpmadaac92fb7383155a7f6215b10403da82daef9fda4fe386d88c25fcad59b2169iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm40e120254a0c9b354cbeef397edda22f942a31e070f35ef044d91f723ce1e6aciwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm51d83c59d0f1eb7b35e0eef0be96f7f20bb30a7d50353810ab5831b4fefeb0aeiwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpmfbd04f791606ec000d53fe9edb834377fc3389cd53c5f65cd15c14204337f6a7iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm283f64489f31ef201b89c097b5cbf97dac44fdce44cc819e90b108a307870610iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm0f3d0b450b9924361bbc7c9201dcfb38b5ba8d457e5398066faf239d60f1d975iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm7aea2a9281244b36b24631d0e9b2767692d6a5b633ec72094a36d834ec02318ciwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm43fffb23e460e1deebb582ebd7b038adada7bcca5d4926d4012bc20eb870841diwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpmf88d5c3c82044eb225468f34a84e5ea994f8dded5be878f2420111db73de1a10iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpmcf0dab4dcf9d40a5cb518853edd8c73b2c271dc7ffa5c3a13b418db983b46f8bSLSA-2018:0095-1Java-1.8.0-OpenjdkSecurity Fix(es): * Multiple flaws were found in the Hotspot and AWT components of OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2018-2582, CVE-2018-2641) * It was discovered that the LDAPCertStore class in the JNDI component of OpenJDK failed to securely handle LDAP referrals. An attacker could possibly use this flaw to make it fetch attacker controlled certificate data. (CVE-2018-2633) * The JGSS component of OpenJDK ignores the value of the javax.security.auth.useSubjectCredsOnly property when using HTTP/SPNEGO authentication and always uses global credentials. It was discovered that this could cause global credentials to be unexpectedly used by an untrusted Java application. (CVE-2018-2634) * It was discovered that the JMX component of OpenJDK failed to properly set the deserialization filter for the SingleEntryRegistry in certain cases. A remote attacker could possibly use this flaw to bypass intended deserialization restrictions. (CVE-2018-2637) * It was discovered that the LDAP component of OpenJDK failed to properly encode special characters in user names when adding them to an LDAP search query. A remote attacker could possibly use this flaw to manipulate LDAP queries performed by the LdapLoginModule class. (CVE-2018-2588) * It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This could make it easier for a remote attacker to spoof responses to those queries. (CVE-2018-2599) * It was discovered that the I18n component of OpenJDK could use an untrusted search path when loading resource bundle classes. A local attacker could possibly use this flaw to execute arbitrary code as another local user by making their Java application load an attacker controlled class file. (CVE-2018-2602) * It was discovered that the Libraries component of OpenJDK failed to sufficiently limit the amount of memory allocated when reading DER encoded input. A remote attacker could possibly use this flaw to make a Java application use an excessive amount of memory if it parsed attacker supplied DER encoded input. (CVE-2018-2603) * It was discovered that the key agreement implementations in the JCE component of OpenJDK did not guarantee sufficient strength of used keys to adequately protect generated shared secret. This could make it easier to break data encryption by attacking key agreement rather than the encryption using the negotiated secret. (CVE-2018-2618) * It was discovered that the JGSS component of OpenJDK failed to properly handle GSS context in the native GSS library wrapper in certain cases. A remote attacker could possibly make a Java application using JGSS to use a previously freed context. (CVE-2018-2629) * It was discovered that multiple classes in the Libraries, AWT, and JNDI components of OpenJDK did not sufficiently validate input when creating object instances from the serialized form. A specially-crafted input could cause a Java application to create objects with an inconsistent state or use an excessive amount of memory when deserialized. (CVE-2018-2663, CVE-2018-2677, CVE-2018-2678) * It was discovered that multiple encryption key classes in the Libraries component of OpenJDK did not properly synchronize access to their internal data. This could possibly cause a multi-threaded Java application to apply weak encryption to data because of the use of a key that was zeroed out. (CVE-2018-2579) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4.i686.rpmd949a6361ae04dcad51715502bf89abb37794eb71d2683d25683464466eda5d5java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4.noarch.rpm64be4feaeafc2226838396e77b8ea62bc1fa9706902880bc9f6502a42c4b9748java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4.x86_64.rpm4e82b1be958895103ec088c667b2131b364a7dec51c70beaf978019b12d461dbjava-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.x86_64.rpm1b753d4e62e85d6c1475d4dfa34e8c228e2cd722abde06d2112e9b34ac90c598java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4.i686.rpmee492478549448267f86935ef4aa48c9a1856fe0f36d7f119492c7b7e19cd828java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4.x86_64.rpm96fea08f34eb53800fe31fd09f125b1bbc346efcc91ac552faa7634d9d957298java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4.i686.rpmd4bda327a31917ae301b648810f970dbe59441fba46c3b12c43212fc903d2d71java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4.i686.rpm14355b426c09eaae8a8a8549bc511f50a3cbd139f82cef52b910028e17fd070djava-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4.i686.rpm14213d335c35b52c7a73766600f3628951bb971edd7ceb09c95535bfce816901java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4.i686.rpmf12733eedf59a0bf8295d3fbb1d43905dde5a4432128dead56db68c4be633220java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4.x86_64.rpm8c68a518c4f86e7f53c0fdbafc172e87b52b3780a18e5c870b4538df8f0c3cf2java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4.noarch.rpmc8840fa5b3a859c0808b2033b8269d1665bed7c2b94b9129a267b1910f8a1df9java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4.x86_64.rpm6394470124a3dd4c85dfdf69353b7d28d61e6573e04f6aafc852f8b6931e0b35java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4.x86_64.rpma50b993d32ead28322e6da24048bc545daf54248e3de533f1429508bc6980b69java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4.i686.rpm4ae9406baca1bfec709d456e0763ec80d5a0f69aaef603060b745175096d7c74java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4.x86_64.rpmeed7c477100ab2062500065abe1bb5396cef00776f5034c64b69fb0bac0e9428java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm60fa545b2a5ec2266f598278bb2b2deb991fc70bba2ed9359f3de0c7962572dajava-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm80d30aa2a0825dbb944deb85a70404816582578912e9a7201b5fa5e8e4a9b21ejava-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4.i686.rpm5000c69b51674bd55001e636c16670b78825f506fb5fa5a12ffe6d945e6a8d9fjava-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4.i686.rpm2638c149ed3dd0914c1ad9899e584b2d45c986c5e17d0fce77f5f13d208781d4java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.i686.rpma58fc287cbde807fd7df35b37ab4021866c9646e071ab332793603bc1acf73d7java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4.x86_64.rpma72ef0c0f42a7431a7c20dc2d6cfc71f2b1ac84c66c9149b090cf0ea1a2037fejava-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4.i686.rpma50ff8bfff3ae89872215de97a332cadcf232f09b058309a1d3dc2c2776404e8java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm22a8d870113e631fe7d249673605a0001f1ad8020da9c4d9d4aa5f269fe8477ejava-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4.i686.rpm0aa4bbd99a4df48c4722a41d02da38c727e4252b03f275965cb622929ce467aejava-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4.noarch.rpmb0e815ae6fbf5f6c23a124995037c0189858d592d664e05019aa5c6f284e9e06java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4.noarch.rpmd38844f58c0d9b65bbe474958261a7d1f8efba6f7b8217329bfed9a4226b0eddjava-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4.x86_64.rpma294afa8246609b1790492a6bfac69d97e60ca4c5169b284819bec6cb2a365edSLSA-2018:0102-1BindSecurity Fix(es): * A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3145)importantScientific LinuxScientific Linux 7bind-pkcs11-devel-9.9.4-51.el7_4.2.x86_64.rpm87abe820205f71d0e9842a2b6aa16e0d717c7c7d8fc46723362d5c4d13d06c70bind-pkcs11-libs-9.9.4-51.el7_4.2.i686.rpmc3f0aef1dbc756b7b60ca87c48922b3d253d12bf523e2a855f61a7ae50cb1085bind-utils-9.9.4-51.el7_4.2.x86_64.rpm918c833bd9e2b257ac065ec743e11872aa35d06f7c15c8c8ce31463656b7c483bind-license-9.9.4-51.el7_4.2.noarch.rpm4c4a120cadf7f575c86341883419348a4af3b7c59a99d7939ccace5a218bbb46bind-chroot-9.9.4-51.el7_4.2.x86_64.rpm43f31a978950ca2d3bd4c675e7e2d629e0dd328f86705e7e472d344b5869b10bbind-libs-9.9.4-51.el7_4.2.x86_64.rpm42ba4e7c855ca03f393076afd220f2d69be8f7132caebe2d24cacc8e26480150bind-pkcs11-utils-9.9.4-51.el7_4.2.x86_64.rpmf32c2a5802c572b13672403b9916834cb5a2ba0ae52ed50b53af0cb17f69bbe9bind-sdb-9.9.4-51.el7_4.2.x86_64.rpmf5f3a152e2dd22da5bcfbdc9d49601110cf55b8b9e8789c8c9fe8000ac9dbd10bind-pkcs11-libs-9.9.4-51.el7_4.2.x86_64.rpm69d1244b41ff28fdbe8b4ab3f77bdfe5c0360566bd1427fd6d38fb7e52bd7c39bind-9.9.4-51.el7_4.2.x86_64.rpm6e99b787ba301ad9d9a6ae104aa44be69d613235442daa06265de67881482b9fbind-pkcs11-devel-9.9.4-51.el7_4.2.i686.rpmd82a7283e67bb6ffd37032a2c89a67910b3e9b5def373c9023713ec90066790abind-lite-devel-9.9.4-51.el7_4.2.i686.rpm82c635b39f3d18bfeacb44ef4401247edd0d6003c2419a6c08aef48a69fd95e8bind-libs-9.9.4-51.el7_4.2.i686.rpm44349256b9bdbe9d3dfa3e9822382bd313f3a8cd5b28392fa5290d5463254c24bind-devel-9.9.4-51.el7_4.2.x86_64.rpm548ea07354ab24b942fed1acda8c5edecf6e63afefef14f7a82ab840b47d1929bind-libs-lite-9.9.4-51.el7_4.2.x86_64.rpm7d03f83a8bc6c0a7041dd21c99d77185e84c36a2ccae2169cd146f37016b1393bind-devel-9.9.4-51.el7_4.2.i686.rpmc98f0fa9bb5317476423ff26f14a65c09a8445853624bc7afc0fa081567bb63ebind-pkcs11-9.9.4-51.el7_4.2.x86_64.rpmf9b1c355be280f68032b09d854c5b0aabb0b136647d94076a16cb14614dd2039bind-sdb-chroot-9.9.4-51.el7_4.2.x86_64.rpme01d444c3962e0a3e93d4cf9dbd3d63e1a343d901d8e7a2e2b62fa0914290f33bind-lite-devel-9.9.4-51.el7_4.2.x86_64.rpm721d22e493f43a157d4f5848cced0169b38fb07f09fd2242dd92ed7c59b8ed14bind-libs-lite-9.9.4-51.el7_4.2.i686.rpm4aac2907ad5298dbcee8ea898f05a7903b9810d45e3ce63a858ce84173f40d27SLSA-2018:0122-1FirefoxThis update upgrades Firefox to version 52.6.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2018-5089, CVE-2018-5091, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5103, CVE-2018-5104, CVE-2018-5117) * To mitigate timing-based side-channel attacks similar to "Spectre" and "Meltdown", the resolution of performance.now() has been reduced from 5s to 20s.criticalScientific LinuxScientific Linux 7firefox-52.6.0-1.el7_4.x86_64.rpm0d1005004eaa36c46278e904b9f535fe9ad51c6112d52617e95aa3c07e9d9126firefox-52.6.0-1.el7_4.i686.rpm56012b5278575b2efd74ac2a09e0b306eb4d059e0d0fc340e6b6ad2758ce0852SLSA-2018:0151-1KernelSecurity Fix(es): An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. * Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. This fix specifically addresses S390 processors. (CVE-2017-5715, Important) * Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. This fix specifically addresses S390 and PowerPC processors. (CVE-2017-5753, Important) * Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. This fix specifically addresses PowerPC processors. (CVE-2017-5754, Important)importantScientific LinuxScientific Linux 7kernel-tools-libs-3.10.0-693.17.1.el7.x86_64.rpm6ecb9a3348682a8c0cab33e5a05770e5ce2e03ce446c8f22fe226b4680045410kernel-abi-whitelists-3.10.0-693.17.1.el7.noarch.rpm1f82b453908e9c134103d2c5c89ef5d70a8003c2551f9583dd453018254245a5kernel-headers-3.10.0-693.17.1.el7.x86_64.rpm8aeb076e8d3d458dc9caa831922516450e549c36a7f1f952d7f363449b85f898perf-3.10.0-693.17.1.el7.x86_64.rpm12d3af77211f76f22b36d2db0fbea956e9524bad24610d9ea508e27f6fdf469ckernel-3.10.0-693.17.1.el7.x86_64.rpmb6bcf6841807bde737b54b76b0edfcdbeff6ea3177b00f2b316a6b46c3be9131kernel-devel-3.10.0-693.17.1.el7.x86_64.rpmb6c0adca527fb83c386782744fb92d9e881b3180aa4f5afd3250286773c1533dpython-perf-3.10.0-693.17.1.el7.x86_64.rpm85f02187e82c482f8bd94f47e5cdc3ef54111951c5128150a7c7da5d9022b164kernel-tools-libs-devel-3.10.0-693.17.1.el7.x86_64.rpmdd1c36ad1e81599410aa0b96af33f3667267cbb94d30d93d8b172fae9e3ac292kernel-doc-3.10.0-693.17.1.el7.noarch.rpm49b78200b9178349b566fd7bc6d9a0211407f477a6bd936728aac21627c29115kernel-tools-3.10.0-693.17.1.el7.x86_64.rpm83a395b49ccec6836ed7fa9ee7a15146d63ed8e1140e90039106c927dd12d5b2kernel-debug-3.10.0-693.17.1.el7.x86_64.rpmcaab75a3e548fb2e440d83d4d21c4cf61641e3eb99f0cdcde4634eea12176bdckernel-debug-devel-3.10.0-693.17.1.el7.x86_64.rpme5be80cce8178887d81fa679abaf156db8307462caf9f9899c3b354f3c61b770SLSA-2018:0158-1DhcpSecurity Fix(es): * It was found that the DHCP daemon did not properly clean up closed OMAPI connections in certain cases. A remote attacker able to connect to the OMAPI port could use this flaw to exhaust file descriptors in the DHCP daemon, leading to a denial of service in the OMAPI functionality. (CVE-2017-3144)moderateScientific LinuxScientific Linux 7dhcp-devel-4.2.5-58.sl7_4.1.i686.rpmf0b61bb5aee75843273f66864c34e5783c5c899c01d3546a18ddf26cdfd52993dhcp-4.2.5-58.sl7_4.1.x86_64.rpmdc730100b6357ce559dfdf837c4782e250c9088279530213478154db9c8ce365dhcp-devel-4.2.5-58.sl7_4.1.x86_64.rpmdb68fbc5f06c047a7ca2c3c6da7c5543fda233dcd0620f543b04f8579239a9c3dhcp-libs-4.2.5-58.sl7_4.1.i686.rpme25ef2e7bcfeb7f1885d8d93ed8b6a5403dadc82e3f447c54ab974558f6e51cddhclient-4.2.5-58.sl7_4.1.x86_64.rpm159974151e98ebd17c49c30830e079751039989c660b4e8a86638af96e80a817dhcp-common-4.2.5-58.sl7_4.1.x86_64.rpmdd3784cd2beb4caab1df463d374af4c79b5eb5052f96d54d4567b7477a8aa801dhcp-libs-4.2.5-58.sl7_4.1.x86_64.rpmb42ab1371ce5d3b4125bdfd0e0b4a3233405712ba4c13adce372713b3657c9c5SLSA-2018:0163-1389-Ds-BaseSecurity Fix(es): * A stack buffer overflow flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2017-15134) Bug Fix(es): * Previously, when a connection received a high operation rate, Directory Server stopped to poll the connection in certain situations. As a consequence, new requests on the connection were not detected and processed. With this update, Directory Server correctly decides whether a connection has to be polled. As a result, connections with a high request rate no longer remain unprocessed. * Previously, if Directory Server was stopped during an operation which created additional changes in the memory changelog, the Replication Update Vector (RUV) in the changelog was higher than the RUV in the database. As a consequence, Directory Server recreated the changelog when the server started. With this update, the server now writes the highest RUV to the changelog only if there is the highest Change Sequence Number (CSN) present in it. As a result, the database and the changelog RUV are consistent and the server does not need recreating the changelog at start up. * Due to a bug, using a large number of Class of Service (CoS) templates in Directory Server increased the virtual attribute processing time. This update improves the structure of the CoS storage. As a result, using a large number of CoS templates no longer increases the virtual attribute processing time.importantScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.6.1-26.el7_4.x86_64.rpmc5773894b11c19f7517ccbafb08416bab538c723f0fec563208705511eedf9b3389-ds-base-1.3.6.1-26.el7_4.x86_64.rpm1d544dd392330e67135a2caa667ebe8587fc2fbae4068eeafb2d878823211163389-ds-base-devel-1.3.6.1-26.el7_4.x86_64.rpm1f2b09c6e6904e9799af030ceb4b24a6c4bb9a7137d85aca0703b47eb987c1a3389-ds-base-libs-1.3.6.1-26.el7_4.x86_64.rpm921170c5e173550fb7857eb6b0c566f03270ad4d4a85d1b47bfe15dafe9c4562SLSA-2018:0223-1NautilusSecurity Fix(es): * An untrusted .desktop file with executable permission set could choose its displayed name and icon, and execute commands without warning when opened by the user. An attacker could use this flaw to trick a user into opening a .desktop file disguised as a document, such as a PDF, and execute arbitrary commands. (CVE-2017-14604) Note: This update will change the behavior of Nautilus. Nautilus will now prompt the user for confirmation when executing an untrusted .desktop file for the first time, and then add it to the trusted file list. Desktop files stored in the system directory, as specified by the XDG_DATA_DIRS environment variable, are always considered trusted and executed without prompt.moderateScientific LinuxScientific Linux 7nautilus-3.22.3-4.el7_4.i686.rpm7c3e197e6cb506fd416883107bc877e3d3bccfa81a3157b7f0451ac39bf09d8cnautilus-extensions-3.22.3-4.el7_4.x86_64.rpmf74841d3ac3727f875d423a985db4584533d64eceb5c70ba2c60b412dfe91f61nautilus-devel-3.22.3-4.el7_4.x86_64.rpm2fe937fc33587bf5ca4d8e49d62d72b14a1aabd8e6a59b3b3bd25c76391297ecnautilus-extensions-3.22.3-4.el7_4.i686.rpm45bfbf3dd06a0c3d27dde58cadb09c6922b1459cb6b960606081aaf59fd370f2nautilus-devel-3.22.3-4.el7_4.i686.rpmbad6138d2de53e2332a08aa36d072aa71bd88f38792c93b928e0a4354eb74169nautilus-3.22.3-4.el7_4.x86_64.rpm75e3c09ecd60eaaa31b087d0b3e14ed1eab5d37ccea75ed8a90c2ce67b0d0f20SLSA-2018:0260-1SystemdSecurity Fix(es): * A race condition was found in systemd. This could result in automount requests not being serviced and processes using them could hang, causing denial of service. (CVE-2018-1049)moderateScientific LinuxScientific Linux 7systemd-devel-219-42.el7_4.7.i686.rpm26e9e2ad418efe3359eed39be61dee7faa8e98706db1627f37894b5f6c228998libgudev1-219-42.el7_4.7.i686.rpmceaaded28a84eab943072b050babcffeb4b6eff63c2aa73e20be2dc6e9fc707esystemd-sysv-219-42.el7_4.7.x86_64.rpm51fdddeaf170880883dfd38b56403e91350a880eabbd72af0b0702d2971291f4libgudev1-devel-219-42.el7_4.7.i686.rpmaa13bed02e3356ad177b3d1d25a2fa7b9f45dbbd9b16a750e38031d870e1cbd8systemd-networkd-219-42.el7_4.7.x86_64.rpm7260ad13b86cf2cf38c3d31620995e10846a164aabefe5f1fb21379c516e05c3libgudev1-devel-219-42.el7_4.7.x86_64.rpm231203639ea87d73c95222759bd6cfaa87e0f765de3459963c43e48c4dff1516systemd-python-219-42.el7_4.7.x86_64.rpm71123f380e64ea3ca2907c2bb3f776b1558a7a4a01bd921fba9d58246ba89f09systemd-journal-gateway-219-42.el7_4.7.x86_64.rpm6ba889294d430cdf07fc1f140c1a36576585dd9ca8e2fb4aaa79c1e87212d672systemd-219-42.el7_4.7.x86_64.rpma519c60d08edd62034c9f92ebefdad1b3cc77c542fdfbe919214ca6ae751c795systemd-resolved-219-42.el7_4.7.i686.rpm78b6f19974a3a7a5dd85d2686ccc252002da56baec5b06693dfbf3d93529b757systemd-libs-219-42.el7_4.7.x86_64.rpm3fccf16134ec458a6f2fe224bde754fef2374037f02a1b8bbb251c22630a5c99systemd-libs-219-42.el7_4.7.i686.rpm165b24c2d202376894ba36d8248cd5d5d7d5c0f36f8d19bd48ac25f9b8294ed7libgudev1-219-42.el7_4.7.x86_64.rpma8287c30a30954b0bdd77bef2d4a5d88250eede36d4a26ee146519004dba7ad2systemd-devel-219-42.el7_4.7.x86_64.rpmc2df323aec57b38161d1ccfe718ff76b03e0741dd69c6770459d786ecb63474bsystemd-resolved-219-42.el7_4.7.x86_64.rpm98588e89a68dac7e1591d4fb6c66d7fee64d7a6eb82d2902d02c90cf9b5f5ad1SLSA-2018:0262-1ThunderbirdThis update upgrades Thunderbird to version 52.6.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2018-5089, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5103, CVE-2018-5104, CVE-2018-5117)importantScientific LinuxScientific Linux 7thunderbird-52.6.0-1.el7_4.x86_64.rpm158de5454e3cf093f7ad1081898b67cf513c8f4d91a92301a01503f42476d596SLSA-2018:0349-1Java-1.7.0-OpenjdkSecurity Fix(es): * A flaw was found in the AWT component of OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2018-2641) * It was discovered that the LDAPCertStore class in the JNDI component of OpenJDK failed to securely handle LDAP referrals. An attacker could possibly use this flaw to make it fetch attacker controlled certificate data. (CVE-2018-2633) * The JGSS component of OpenJDK ignores the value of the javax.security.auth.useSubjectCredsOnly property when using HTTP/SPNEGO authentication and always uses global credentials. It was discovered that this could cause global credentials to be unexpectedly used by an untrusted Java application. (CVE-2018-2634) * It was discovered that the JMX component of OpenJDK failed to properly set the deserialization filter for the SingleEntryRegistry in certain cases. A remote attacker could possibly use this flaw to bypass intended deserialization restrictions. (CVE-2018-2637) * It was discovered that the LDAP component of OpenJDK failed to properly encode special characters in user names when adding them to an LDAP search query. A remote attacker could possibly use this flaw to manipulate LDAP queries performed by the LdapLoginModule class. (CVE-2018-2588) * It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This could make it easier for a remote attacker to spoof responses to those queries. (CVE-2018-2599) * It was discovered that the I18n component of OpenJDK could use an untrusted search path when loading resource bundle classes. A local attacker could possibly use this flaw to execute arbitrary code as another local user by making their Java application load an attacker controlled class file. (CVE-2018-2602) * It was discovered that the Libraries component of OpenJDK failed to sufficiently limit the amount of memory allocated when reading DER encoded input. A remote attacker could possibly use this flaw to make a Java application use an excessive amount of memory if it parsed attacker supplied DER encoded input. (CVE-2018-2603) * It was discovered that the key agreement implementations in the JCE component of OpenJDK did not guarantee sufficient strength of used keys to adequately protect generated shared secret. This could make it easier to break data encryption by attacking key agreement rather than the encryption using the negotiated secret. (CVE-2018-2618) * It was discovered that the JGSS component of OpenJDK failed to properly handle GSS context in the native GSS library wrapper in certain cases. A remote attacker could possibly make a Java application using JGSS to use a previously freed context. (CVE-2018-2629) * It was discovered that multiple classes in the Libraries, AWT, and JNDI components of OpenJDK did not sufficiently validate input when creating object instances from the serialized form. A specially-crafted input could cause a Java application to create objects with an inconsistent state or use an excessive amount of memory when deserialized. (CVE-2018-2663, CVE-2018-2677, CVE-2018-2678) * It was discovered that multiple encryption key classes in the Libraries component of OpenJDK did not properly synchronize access to their internal data. This could possibly cause a multi-threaded Java application to apply weak encryption to data because of the use of a key that was zeroed out. (CVE-2018-2579)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4.x86_64.rpm2d1e41e62013fb3068ebc7f77fb53a664a46c73ca4d6f8ab17342667bbc1accbjava-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4.x86_64.rpmc4112d220cd01d053b063c4b733663cc713dda9af992e64128bd430120369471java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4.x86_64.rpmbfb04ab68552024f5ecbe1c123f01891ef75daab5b9d4cd272f7e7d95de1aaa2java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4.x86_64.rpm9de39452d68c55fab54717f62cd3e197583ef8dcfdb32ffba78ce787cf0a2422java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4.x86_64.rpmb9eb22e48fa616cc28cdd738c9c1028fa5d8651d5b0501d02e690a2a870a7da3java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4.x86_64.rpma21a1409aa4a29a835aa0783f46779eba498fdfa9a33b74e1d2421f3db8bccd8java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4.noarch.rpm81e275659b7840ed999dca92f698ce9596e3bdb7a9d7da52f7da1a7e2ba86820SLSA-2018:0350-1GcabSecurity Fix(es): * gcab: Extracting malformed .cab files causes stack smashing potentially leading to arbitrary code execution (CVE-2018-5345)importantScientific LinuxScientific Linux 7libgcab1-0.7-4.el7_4.x86_64.rpme829580ce63efdc2bda6d45c0bf4427f2fd236be1326b9aedf797cf8ff977d4agcab-0.7-4.el7_4.x86_64.rpm66aeb03b8de845bbfd965e317eeaa179abc85347aa0abb51912d840f5ed6c9d3libgcab1-0.7-4.el7_4.i686.rpm5b8dc9d30c91a7c39fddb9ebac8a71b812001bff1eff9c833764fc9ea3d50fd3libgcab1-devel-0.7-4.el7_4.i686.rpm62b51af38c2f462a63b39a4cd748e7e611c9d14cd355f423f448ddfb88853757libgcab1-devel-0.7-4.el7_4.x86_64.rpm52e5d620a56e605a11b4b21eb6fd53a25374689b4d1f7270a0ee03b7cc292374SLSA-2018:0377-1QuaggaSecurity Fix(es): * quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code (CVE-2018-5379)importantScientific LinuxScientific Linux 7quagga-devel-0.99.22.4-5.el7_4.x86_64.rpme2996381ca9e162f719bbf8bedbeaa85db97c93db1b80c53636770b9013d78b0quagga-devel-0.99.22.4-5.el7_4.i686.rpmf9f74fea89a4ce56a85dde01077332393e7c380b6826e0d308ebb5b8b1f2f9d1quagga-0.99.22.4-5.el7_4.i686.rpm2f63821e48f01ecbceacbf9168ca72ac3b705243a14f7f022e2675032d6404d1quagga-0.99.22.4-5.el7_4.x86_64.rpm2a766d7e3c7478047e22d3c876dd4dd125019316853dad3ff626f897f8c29fbcquagga-contrib-0.99.22.4-5.el7_4.x86_64.rpma6ffc93cdc63de8004b7e67b80c3f4d0350fe7a18895925591701e72e5b0af82SLSA-2018:0378-1RubySecurity Fix(es): * It was discovered that the Net::FTP module did not properly process filenames in combination with certain operations. A remote attacker could exploit this flaw to execute arbitrary commands by setting up a malicious FTP server and tricking a user or Ruby application into downloading files with specially crafted names using the Net::FTP module. (CVE-2017-17405) * A buffer underflow was found in ruby's sprintf function. An attacker, with ability to control its format string parameter, could send a specially crafted string that would disclose heap memory or crash the interpreter. (CVE-2017-0898) * It was found that rubygems did not sanitize gem names during installation of a given gem. A specially crafted gem could use this flaw to install files outside of the regular directory. (CVE-2017-0901) * A vulnerability was found where rubygems did not sanitize DNS responses when requesting the hostname of the rubygems server for a domain, via a _rubygems._tcp DNS SRV query. An attacker with the ability to manipulate DNS responses could direct the gem command towards a different domain. (CVE-2017-0902) * A vulnerability was found where the rubygems module was vulnerable to an unsafe YAML deserialization when inspecting a gem. Applications inspecting gem files without installing them can be tricked to execute arbitrary code in the context of the ruby interpreter. (CVE-2017-0903) * It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences. (CVE-2017-10784) * It was found that the decode method of the OpenSSL::ASN1 module was vulnerable to buffer underrun. An attacker could pass a specially crafted string to the application in order to crash the ruby interpreter, causing a denial of service. (CVE-2017-14033) * A vulnerability was found where rubygems did not properly sanitize gems' specification text. A specially crafted gem could interact with the terminal via the use of escape sequences. (CVE-2017-0899) * It was found that rubygems could use an excessive amount of CPU while parsing a sufficiently long gem summary. A specially crafted gem from a gem repository could freeze gem commands attempting to parse its summary. (CVE-2017-0900) * A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory. (CVE-2017-14064) * The "lazy_initialize" function in lib/resolv.rb did not properly process certain filenames. A remote attacker could possibly exploit this flaw to inject and execute arbitrary commands. (CVE-2017-17790)importantScientific LinuxScientific Linux 7rubygem-rake-0.9.6-33.el7_4.noarch.rpmb556e94365191f3a66fccb6c8ce78017d245189875a9d3cb80a3d3bec9a863e5rubygems-2.0.14.1-33.el7_4.noarch.rpm4b4ef315123837b5f62615a9ed3513dd3192f0298460f30797b6faa85472e5a5ruby-tcltk-2.0.0.648-33.el7_4.x86_64.rpm0052b413b41586cd1fd6123bd87760a1307e2a684a1cd04d6cad40a51869859drubygem-psych-2.0.0-33.el7_4.x86_64.rpm572dbe12072dd0abaf62aedaf46c7b8c22ffa9773027998d969a434fc81e6e8cruby-2.0.0.648-33.el7_4.x86_64.rpm21d15b10a8a89ccce774e33e4dec75bc2244a2590d23540b4b30d481ac688103ruby-devel-2.0.0.648-33.el7_4.x86_64.rpm72b9381f6d6813aebce4739514f28b932f6ba39272350535ccc70a6b0894234arubygems-devel-2.0.14.1-33.el7_4.noarch.rpm3b9881b46155776ed25eb569c2211a124e2f8a50a2a0bc30d397cff14addb72aruby-irb-2.0.0.648-33.el7_4.noarch.rpme546453d6e85d71d1337de011a3f5fbd28c7874f6397809d9fd33ed99f9adb52rubygem-minitest-4.3.2-33.el7_4.noarch.rpm8a8550ba82e73fdb125924adf381b5eb7e28e8e6a712e48c2cd0d9b51f1a553erubygem-rdoc-4.0.0-33.el7_4.noarch.rpm433369a59f9bdb87a5c23a34083808c02b66c597b7b12b4d637e8a00b580f834rubygem-io-console-0.4.2-33.el7_4.x86_64.rpmee78ab6cd2c4d4c74d43a905aeb56f5a6f49cf2cbd68c8d55426019995098865rubygem-json-1.7.7-33.el7_4.x86_64.rpme0ffcee1bcca518859240b4c10025f30cdc9ca74b3b7d3fb8951515532dee7b3rubygem-bigdecimal-1.2.0-33.el7_4.x86_64.rpmac2eff3f0c92f7f1f7bb012d3097bb7774a37498b8ceebac7bf0c5388aae60b5ruby-libs-2.0.0.648-33.el7_4.i686.rpm05a70486176c287088ff96d135bc9b73875c36ccce6742c70a4b55edf6d2ffa9ruby-doc-2.0.0.648-33.el7_4.noarch.rpm3e2137e6cfbd617f61ca1176d3e8986a4bde76c2dc1e1f185d454e29ae73bbfaruby-libs-2.0.0.648-33.el7_4.x86_64.rpm2751cd731fde81090f85bb8c0c9b38b0957c3c2e9b3e0bc427050a7f5f0562b6SLSA-2018:0395-1KernelSecurity Fix(es): * Kernel: KVM: MMU potential stack buffer overrun during page walks (CVE-2017-12188, Important) * Kernel: KVM: debug exception via syscall emulation (CVE-2017-7518, Moderate)importantScientific LinuxScientific Linux 7kernel-tools-libs-devel-3.10.0-693.21.1.el7.x86_64.rpm60b4799aad11eabfd109e3dea3b23390a9d55bfeea738dafddc9d17fdd5d0d65perf-3.10.0-693.21.1.el7.x86_64.rpm13ad3b80b5e39afa1b3f29b68fbb4b0a248d0c2e6f72f769e3b9205900d10a3akernel-debug-devel-3.10.0-693.21.1.el7.x86_64.rpm77a438b4f506ccf5cc3ba132176225348f497a8e4386cb4ecac71b0a2432eb03kernel-debug-3.10.0-693.21.1.el7.x86_64.rpm85c17797efa9fcfdb7e25ea8becea5a49f5456c7cb9317f353029bf0ba1721dbkernel-abi-whitelists-3.10.0-693.21.1.el7.noarch.rpm63fbe7ade932e4b71d32e37fed27a996811a22f153e1202e99e61c8618bf8e1ckernel-3.10.0-693.21.1.el7.x86_64.rpmea256d994097c422d0089e7f2ea61489150be4f8d1ffb1572ea023866cb97328kernel-tools-libs-3.10.0-693.21.1.el7.x86_64.rpm35ef5409d06028e7d72a64fcdfe04c4242d9dc0434df68bae0f652d9e54ea75bkernel-doc-3.10.0-693.21.1.el7.noarch.rpm7feada8ff95a08b012fab5b1627fa0ee81fbddec7864a861a67ee55ee24791fbkernel-tools-3.10.0-693.21.1.el7.x86_64.rpmc6a2b4c27c0a09d42e3e7f0b3b85c5d817e17a32a2ae6399542f74510fad2581python-perf-3.10.0-693.21.1.el7.x86_64.rpm034e53663cce97e1f0c43d9bb7c614547fe21dd993d165cd0d2b692d8396bbabkernel-devel-3.10.0-693.21.1.el7.x86_64.rpmcbe1e57ce4cc8b32356a7af8ccf3a763732af3070fbbc55a4400a2afda7c4a4akernel-headers-3.10.0-693.21.1.el7.x86_64.rpmfc0cdddac698a397281b9a4559d04d9e02540eacd07331b1440d4b1e05efb26fSLSA-2018:0406-1PhpSecurity Fix(es): * php: Buffer over-read from unitialized data in gdImageCreateFromGifCtx function (CVE-2017-7890)moderateScientific LinuxScientific Linux 7php-mbstring-5.4.16-43.el7_4.1.x86_64.rpm38971b6424e202a8b9b19dcab2bd2af29b0d1f7bd523816c9f51bd30aa71f9dfphp-recode-5.4.16-43.el7_4.1.x86_64.rpm544710fa651d000299272b9ce2a690259838b238178c88909b55243643a2be24php-dba-5.4.16-43.el7_4.1.x86_64.rpm51688cde9e003ef9a2a37df425f6987407ce39918f6591b71f250a43a5bc1d4cphp-pspell-5.4.16-43.el7_4.1.x86_64.rpm67848ac4991848db97be6f6870f456ef9729ae84f169d4e08ea859f1fe73dc1bphp-mysqlnd-5.4.16-43.el7_4.1.x86_64.rpm9bcc5d1656a8c5b5d133a191d430b3ec8652c17429f6f7715a184a17aa27bec7php-5.4.16-43.el7_4.1.x86_64.rpmede52aae61026d8e5cc490a88926239df5bd93420a75c19303b0257b98d3838dphp-cli-5.4.16-43.el7_4.1.x86_64.rpm8943dc8f9a4fb9c822e61226fef7b8aa00dfccd60ec55126989d3e71719ee182php-intl-5.4.16-43.el7_4.1.x86_64.rpm01392753f21aa68d0b149e56c82d4417fc690c06aea2857c2a0f1d01f21e25bcphp-pdo-5.4.16-43.el7_4.1.x86_64.rpmdf78d8b360d5e3f8ea0b4ad671ca7da9122020d280ddae85baedf8db5de35d4dphp-common-5.4.16-43.el7_4.1.x86_64.rpm52e597ad759dbb86c61bad9e5b1004595c54a09c174ea0ab73870430bd96d4f0php-snmp-5.4.16-43.el7_4.1.x86_64.rpm3e45ae4919f184086ddd4c44d5882e2f66b17585c75a6f87d28c9a78222e120cphp-pgsql-5.4.16-43.el7_4.1.x86_64.rpm04884223d555a12f67e14ef3882878b4f673e6acdb8df536409c1ebdc12a5ed0php-devel-5.4.16-43.el7_4.1.x86_64.rpm5cafc326306ce746afddc89d912f2ee0578aa5c7b9b02bdf6440e125a6752394php-enchant-5.4.16-43.el7_4.1.x86_64.rpmdcba8b260c3f360b6453b5cf0e8a4a957292bc88326b6b350bf73c532c28f43aphp-mysql-5.4.16-43.el7_4.1.x86_64.rpm2b732091c8629bf951d93ec71941ddd4720c5e7351e88887131109b4920861b8php-gd-5.4.16-43.el7_4.1.x86_64.rpmf2f79c2862810ccdab945394bdf99e1c078df18b02ea2d55a53bee433887f2f1php-soap-5.4.16-43.el7_4.1.x86_64.rpmad5a28ec668f918764161f64564904a8cbbd7dec7877bafb580467cb7929b244php-process-5.4.16-43.el7_4.1.x86_64.rpm274e8fa4101954034838852fa684bd230940fe24534289ea1c83288970557de9php-bcmath-5.4.16-43.el7_4.1.x86_64.rpm2343d016872e24b37080d228313b77b19920e8a5f2d765fd8b41864c76ce4254php-xml-5.4.16-43.el7_4.1.x86_64.rpmb56f8680f18eb4194e64d2defca12e1344606fddf53715b8b7e3fa302cc55481php-ldap-5.4.16-43.el7_4.1.x86_64.rpme885248b792bf705c4ebd32be34a42514de2af8c8e1a426035b33e3563104349php-xmlrpc-5.4.16-43.el7_4.1.x86_64.rpm47b1a92dbbcafc07471bad63752a85afb457fdb6cc0c3bddb35ff0913a3d5bbdphp-fpm-5.4.16-43.el7_4.1.x86_64.rpm7e8f44b3586196230f9cafbce57df40105fa675eac617bd07f6e9a7e200d1c49php-odbc-5.4.16-43.el7_4.1.x86_64.rpm6705d250fbada743474a98a5073c617e479ffb04693e96f62b16b8840e6db100php-embedded-5.4.16-43.el7_4.1.x86_64.rpm5e3e3f4ec1471ea38e690a15ff67578012b18325a110ceb2bef4d7ab95be1237SLSA-2018:0414-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c (CVE-2018-1054) * 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (CVE-2017-15135) Bug Fix(es): * Previously, if an administrator configured an index for an attribute with a specific matching rule in the "nsMatchingRule" parameter, Directory Server did not use the retrieved indexer. As a consequence, Directory Server did not index the values of this attribute with the specified matching rules, and searches with extended filters were unindexed. With this update, Directory Server uses the retrieved indexer that processes the specified matching rule. As a result, searches using extended filters with a specified matching rule are now indexed.importantScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.6.1-28.el7_4.x86_64.rpma5c9e28aaf0d735b3f53675c60a97649d4010d0eda22a072a63ef1087c9267fc389-ds-base-1.3.6.1-28.el7_4.x86_64.rpme0e47ca1813e4be2042cccb9a4bea96109e8001dcd444887c66992d6ee321a1d389-ds-base-devel-1.3.6.1-28.el7_4.x86_64.rpm4a5bcad22d87ec8e943b460a324e4b57b2aa9c76f842fd7777100f86f8dd7f9f389-ds-base-libs-1.3.6.1-28.el7_4.x86_64.rpm802aa441365ceb75268936bd397d1b53fd6d648dc87f6b48a251712e2b8701deSLSA-2018:0418-1LibreofficeSecurity Fix(es): * libreoffice: Remote arbitrary file disclosure vulnerability via WEBSERVICE formula (CVE-2018-6871)moderateScientific LinuxScientific Linux 7autocorr-fa-5.0.6.2-15.el7_4.noarch.rpm169399ab69c537bfa9c4e865e07aa3a02b482c20d220a99da156d6566c88142blibreoffice-draw-5.0.6.2-15.el7_4.x86_64.rpmc8212fa2beaeeb51965c6efa247b3615db8f49eb791470729158a43da67a2f2clibreoffice-langpack-nr-5.0.6.2-15.el7_4.x86_64.rpm66b87d80ea062b50613c9b8c514b40004d8d6c1f9a42744cfb7fdd061b687317libreoffice-langpack-da-5.0.6.2-15.el7_4.x86_64.rpmf5298b2b461e8fd2c849cdb7a144ad6929739539905a7d8d1da5051cc8acbc74libreoffice-langpack-kk-5.0.6.2-15.el7_4.x86_64.rpmc72a072c462f75044265aaa3c34b3cd8711bba03bc40b9d51c76c607a55947balibreoffice-langpack-ve-5.0.6.2-15.el7_4.x86_64.rpm14764cebe5a1dcd35d975896b4fe5ea3b7cf17bb2cff374d9899b010b3754bbalibreofficekit-5.0.6.2-15.el7_4.i686.rpm1038f463d1d259024a694a228a1887f7e2799f0c99dd5831bad9aca61b53cf5clibreofficekit-devel-5.0.6.2-15.el7_4.x86_64.rpmcdfa49e01591807c6c2726d8db99a2976dd8e3b97bfade54c1f54131cef07308libreoffice-langpack-cy-5.0.6.2-15.el7_4.x86_64.rpme423c767ae8f7e60a6511afe74b7ca8b7f060c3a3a0b68ea427097c0a7452082libreoffice-langpack-hr-5.0.6.2-15.el7_4.x86_64.rpm0921dfafdf084e0751d30706997bdeb1d14863aa43cd23e5275b26d3804d6988autocorr-fi-5.0.6.2-15.el7_4.noarch.rpmc4cfef52962d844afbbfe47f02aa8130366cc7ba4114565f040e4e5132deca52libreoffice-langpack-af-5.0.6.2-15.el7_4.x86_64.rpmce83e08e45bce533e9e6fb91094d0306c2caa793ccc0de41296f9b1a2e378c64libreoffice-impress-5.0.6.2-15.el7_4.x86_64.rpm343b90c210c4e099954b983d092de6a7efef4ba2103c235a97ace4ddbc98a7f0autocorr-es-5.0.6.2-15.el7_4.noarch.rpmbe25eb991565656af7174270fdd5543ea3bfeadecb61216f055c11958f6f13e6autocorr-zh-5.0.6.2-15.el7_4.noarch.rpmf396eb521ef2ab9a01622cf03488d2366c8154d369ecb82c5844760bf2b1b460autocorr-is-5.0.6.2-15.el7_4.noarch.rpm34a3a1620a7157db30cfccc1fe95d929faca9e2637651acb140a97e61c430b9dlibreoffice-opensymbol-fonts-5.0.6.2-15.el7_4.noarch.rpm3a171ebb753d5f15f0efbb9a7695ff95823eda24971c91836c765d84f61f5675autocorr-ro-5.0.6.2-15.el7_4.noarch.rpm58b8c8ba5c5d0188d286f678434f2c89c44d72061d72976c66a896d255cc30f7autocorr-tr-5.0.6.2-15.el7_4.noarch.rpm62440472529b94276a6ca0ea218b46e66a246225c218c98202d17112d87bb4e5libreoffice-langpack-sk-5.0.6.2-15.el7_4.x86_64.rpm027e6989a8b9c1554316498e57482913a6aaeeb155100d9b7e947057aae98acfautocorr-ca-5.0.6.2-15.el7_4.noarch.rpm192da6ad21a7403f51ebc9c56e59033fa83d4e9336b9e5ca9d553270ba131c2fautocorr-ga-5.0.6.2-15.el7_4.noarch.rpm7eb708e74f9227e7cb6d6d355fadd7abefd5e9c6fc626e5c7f43a5f7be1d7a7fautocorr-ja-5.0.6.2-15.el7_4.noarch.rpme01c1ec4fd85bb155ce44756d2042cdd235b0a96df4bd6d3ad775f7539abc92dautocorr-vi-5.0.6.2-15.el7_4.noarch.rpm4931f23e98270bd5ca9c18f168888e0757e8335d00f92b32c8a8eb0ef7a9d9b0autocorr-bg-5.0.6.2-15.el7_4.noarch.rpmbb46e8eb22beb760b1e621cd804da615b26aac2ee5ebf947ad7af33c237e182elibreoffice-langpack-lt-5.0.6.2-15.el7_4.x86_64.rpm4a8cf45124feec8abae088f66d0cf40b798eb769a73d2759bad9deb04d7fa2f9autocorr-sk-5.0.6.2-15.el7_4.noarch.rpm1730caffc6e5c11464eebc31d887753fdc0d13e1fbcdb17e0c0c89261d17ec34autocorr-pt-5.0.6.2-15.el7_4.noarch.rpm585e8b579233976cf05da59941d2ab81313b03deca1afbc13a311c4ec83f583flibreoffice-langpack-es-5.0.6.2-15.el7_4.x86_64.rpm2bbc5ad3995b59d6fd7bb67cffb7e3abe57db3c26d0d3fe981a08dca444bccaclibreoffice-langpack-zu-5.0.6.2-15.el7_4.x86_64.rpmda82876b42dcb399cfe69e73d7867ae490225ca2329a9d87e441a8bc6e0615d9libreoffice-langpack-st-5.0.6.2-15.el7_4.x86_64.rpm735da5ab50f38b82dcc1e5a69d7363a02341a4a712ffffcd0c5fa73895093f3fautocorr-hu-5.0.6.2-15.el7_4.noarch.rpm2518d8a425ab9ae06f90eade8fee76d93b08d1f29e4c5b6bb0ad8f5fc7721454autocorr-lt-5.0.6.2-15.el7_4.noarch.rpmdd5911f1928b87e31895802259975fef4714c1b960ad59787ceafb8bb58054calibreoffice-langpack-fr-5.0.6.2-15.el7_4.x86_64.rpmf0e016b5fc7c73b1457790f67b7974dc4498306cfc73b021f1c7b8f70ddbd41elibreoffice-filters-5.0.6.2-15.el7_4.x86_64.rpma91809d2c57fef5faeb59f17f970c7af3040257d61b2b51dead397fbe6067db9autocorr-de-5.0.6.2-15.el7_4.noarch.rpma6833cd9bd1157d24ff6e4cf6ec3cbbceaa369a3ced82f4cdc6ae9f74040e96clibreoffice-langpack-xh-5.0.6.2-15.el7_4.x86_64.rpma24562e1fc7b377299e33b3aabed0d8dfcf4035f60b03f0b72802b971b83b852libreoffice-core-5.0.6.2-15.el7_4.x86_64.rpmf33158cfb6cf7c0b5928ad1f1979efacb02f209562977a966a351ba361f3dbf0autocorr-lb-5.0.6.2-15.el7_4.noarch.rpmb483202220b776b232b8a7dc09e020999a9a54cb314fff5a8747e779ce65ed7alibreoffice-postgresql-5.0.6.2-15.el7_4.x86_64.rpmdbd3c77b56b9d239ce3e5f8119ba6747cb0c8791b9b2f13f2b1de8f2d7adf768libreoffice-langpack-kn-5.0.6.2-15.el7_4.x86_64.rpmb5de34d08324b0a6b1beff5c6800fef91b16bfcdfdc52685e40763e1e567c7bbautocorr-sv-5.0.6.2-15.el7_4.noarch.rpmf4a5d4d55427f94423925fcd53bc73aac4087085819ee126e7a333bdb5ccefb1libreoffice-langpack-ro-5.0.6.2-15.el7_4.x86_64.rpm5b8e2295d199ddf60b06b0f685c85c0328a1492951f8c52ea9e936cea0cee05blibreoffice-glade-5.0.6.2-15.el7_4.x86_64.rpm3cd37cb531f85d329ee8c7daa54698981cefd79b529a69bd2e8d2c8b398b4490libreoffice-librelogo-5.0.6.2-15.el7_4.x86_64.rpme86d51828235093e4cd398ecf1c0ae474d2f8be71738dfdf6d168f1010db94b5libreoffice-langpack-zh-Hans-5.0.6.2-15.el7_4.x86_64.rpm28815538e1b1172666fb5ebb7edec4515b7002ed2f0f460efb88e3abea85f870libreoffice-langpack-ru-5.0.6.2-15.el7_4.x86_64.rpm3d242850eb3267fb248b74f9826959f0c60c76e4634547db1d17474574cb04d6autocorr-ru-5.0.6.2-15.el7_4.noarch.rpmf2b223cf6876fc4c54821f87f4d0de606b1e55c3d01f39b5a4548639f52fd34elibreoffice-langpack-ta-5.0.6.2-15.el7_4.x86_64.rpm1f2ff98b57e72a346f269d468a8e31f701a3245f3726ea093d0e8a254b9d7b2dautocorr-en-5.0.6.2-15.el7_4.noarch.rpm8cd7d4693db07224108b086676b6f33fb5a0b92200e10b3a5a5fc1c1e60931eelibreoffice-sdk-doc-5.0.6.2-15.el7_4.x86_64.rpm19867cc88f7c5ea5d6e6e2f1366ba212c852e97b4057124daa2f1f8dcd237053autocorr-ko-5.0.6.2-15.el7_4.noarch.rpm326cbe7fa4d70c9c4d160b45c80b8e79d09199ecbc65574ad0175cbd2bd11fa6autocorr-pl-5.0.6.2-15.el7_4.noarch.rpm89ea0bdb6fa7bafe66255f2bcde8307fcd516ff4c514037453059353eb5571f9libreoffice-langpack-pt-PT-5.0.6.2-15.el7_4.x86_64.rpm65fe6b82d830a12be11d1d39d285dd05ab42867bbceb7b2593927f3f8bf7dbd1libreoffice-langpack-ca-5.0.6.2-15.el7_4.x86_64.rpm26b91a0f13df7063079555fbbe93c5f8f4aeb26c21b10d2d2339cb6080f2d589libreoffice-langpack-et-5.0.6.2-15.el7_4.x86_64.rpm6e0cf5abe09c014744800aea9e1d26ecf10544e6582c6969c23a958d3bd8f61clibreoffice-langpack-si-5.0.6.2-15.el7_4.x86_64.rpm578fd5b20dadabdc4531663cfe092c5e2e70a777dc6d3edc991846b8b92220a5libreoffice-langpack-mai-5.0.6.2-15.el7_4.x86_64.rpm9dc9cb3a8913507ba699809679fe4662f739cb45f7cd704c9ddcaebf694a368blibreoffice-langpack-cs-5.0.6.2-15.el7_4.x86_64.rpmeb6ceacd3cded675e5ae3451ac8e8f0eedc2d824a3513596f7b70f82cafbdedelibreoffice-langpack-ts-5.0.6.2-15.el7_4.x86_64.rpm610b26a1d1cd2a24caa00bafd8c6b2b3266317a63a718f05d968016a9349a940libreoffice-langpack-uk-5.0.6.2-15.el7_4.x86_64.rpmaa5568873169fd35918e28295a0984ec9f461746672eac36327b5d4655a3b960libreoffice-writer-5.0.6.2-15.el7_4.x86_64.rpm4d8df70092f52d1dc8b69a3862e3a21798d0e7d058c1cf75664fd834c758f8d9libreoffice-pyuno-5.0.6.2-15.el7_4.x86_64.rpm75aee962633beb764c511538377c0f4cba6c75c3af18225787dd54a9773dfbbclibreoffice-langpack-de-5.0.6.2-15.el7_4.x86_64.rpm32ccbfecdc9d474cdd6b3fddb1cb59abbbd8cf00a9a2deb1ee87c80a7bd2d237libreoffice-langpack-sv-5.0.6.2-15.el7_4.x86_64.rpm9806d2ef93e9a6cd9dc54f709627ad373c04c51c624c584f2ac0ff51eae18fc9autocorr-it-5.0.6.2-15.el7_4.noarch.rpm5914d95f36af2fb3dfbcdc529589cf9d25611536da7200c303d7d4a1904031cdlibreoffice-5.0.6.2-15.el7_4.x86_64.rpm4a3dc0f4c6b9a37ec84e66e743d1252b9ddd391ba309d5675683dfed53879485libreoffice-langpack-as-5.0.6.2-15.el7_4.x86_64.rpm885fd76f059e1c65fec3d53039fe05c4c80072397cd4e040aee2c48f0e684324libreoffice-langpack-hu-5.0.6.2-15.el7_4.x86_64.rpmc06c5653530b6cc56ca806d03ee9c2dfd1be7b54499701aea005098c03279324libreoffice-calc-5.0.6.2-15.el7_4.x86_64.rpm506d4f42e7a5ccbf7de2c149df3158a338f11623920a5e28ac78f54892340145libreoffice-langpack-it-5.0.6.2-15.el7_4.x86_64.rpm518362e48b92363bf6b7a2c9287210eadb537af8da2868cff22a76b74cf24a29libreoffice-langpack-sr-5.0.6.2-15.el7_4.x86_64.rpmd5f6de55a2f1f32ec5b14eb7a5a10b74ae514158886b841a5ae2001387dab2cflibreoffice-nlpsolver-5.0.6.2-15.el7_4.x86_64.rpm554c72d9c673ecf5da7234c9f8b499a2a5c24c079030a4dd53066043c98848e2libreoffice-langpack-th-5.0.6.2-15.el7_4.x86_64.rpmc66814349c1d1d1a8f623cc996734d6c5809e1d764afc75a8ad66eedb2312d86libreoffice-langpack-or-5.0.6.2-15.el7_4.x86_64.rpm30aad3cf5381b829f35ffc28de30d00900fa3d1558bce928e6d3954a8b5afe40libreoffice-langpack-ko-5.0.6.2-15.el7_4.x86_64.rpm214ca3ed6819a70760dad139d0489c831c696ee28bc4797227582f192cc75be9libreoffice-langpack-el-5.0.6.2-15.el7_4.x86_64.rpm9354e2b21bb414ce3b9128ac4b21a64fa79f8600609c6cf1b104bd9c547ceb9clibreoffice-langpack-nb-5.0.6.2-15.el7_4.x86_64.rpm1fbbf03574d53cf121821c36f255c750a2c0e895db0c282922c06e576454fb56libreoffice-emailmerge-5.0.6.2-15.el7_4.x86_64.rpm55fb979227442d838b3fca4a5f30405df23c15642d6d07adbf425c21e134a1fflibreoffice-langpack-en-5.0.6.2-15.el7_4.x86_64.rpme84380be983866f75bc82943cbb2dd1bfb6ae7a61f28ece919286a701c1d5a5clibreoffice-langpack-nl-5.0.6.2-15.el7_4.x86_64.rpm2e7e3543b2d3ab5b9c3bf6a05e2a1f749bbd5db74b1b61fd3e6a2e38f68083b8libreoffice-langpack-gu-5.0.6.2-15.el7_4.x86_64.rpm649bc05df870b2ebeb7f966cb2b38aee9af9f4b3d27c15c771083a0607d8ae79autocorr-hr-5.0.6.2-15.el7_4.noarch.rpm33493a8134b6b4b05591ac7b02074ec4410d38334648ca991049cf9b2bc1bf75autocorr-af-5.0.6.2-15.el7_4.noarch.rpm8c80bf5d7df5a9e5f4a1e058003d51957dcaed443463a48d38de60f398396302libreoffice-langpack-tn-5.0.6.2-15.el7_4.x86_64.rpmd8b1dd90b600a9ea5f49b6bac6b6a59e982df6e6d603d1e81ea22bdee3f4410alibreoffice-langpack-pa-5.0.6.2-15.el7_4.x86_64.rpm4b96467c16ef9d3f73842ea634c1793429b21f31503a3f6ebb3d297846a9d5ablibreoffice-langpack-zh-Hant-5.0.6.2-15.el7_4.x86_64.rpma8355147cf1bd036ddbf63d2c2d82b3c90e6b1ab7603a6fcc5657c1b2a83e167libreoffice-ogltrans-5.0.6.2-15.el7_4.x86_64.rpmfc1e62996ac47e5b7335cd353586b1554c3a16ae87783ea9bed1f604db1f452dlibreoffice-ure-5.0.6.2-15.el7_4.x86_64.rpm49f51db5f0ec6381e094673883fca41dd34482c663ae81fc77ee9329bbc53717libreoffice-langpack-he-5.0.6.2-15.el7_4.x86_64.rpm57bc2b0d7b38bcf6ef6266fd376d9f50db0fe124fb4bb1e45eb7a5f24ad8ee9blibreoffice-sdk-5.0.6.2-15.el7_4.x86_64.rpm13ad3a379ed8dab6098ee656bf5ac7e22b488f6f738299544b48fbb7267416b7autocorr-nl-5.0.6.2-15.el7_4.noarch.rpm6877279f44cff9d2e43c0b49dfe419c112a32112d338bfb39b758d2045a7d7d9autocorr-sr-5.0.6.2-15.el7_4.noarch.rpm3d2634bdaf8539ce6ba549f287c3c37788da1012b9be474702b195a00ee94999libreoffice-langpack-nso-5.0.6.2-15.el7_4.x86_64.rpm75a9c84680365be9f4aadc7bbb43ab4d24a17b45031e2e8d6e731b29e4562660libreoffice-base-5.0.6.2-15.el7_4.x86_64.rpmd5c831ddb2557d8aeca7c775a5495168c30cf0152cd71fe93323677f5801ab17libreoffice-langpack-fa-5.0.6.2-15.el7_4.x86_64.rpmbca937cddaac2ec33fbac84989829ddfc784b1e0359fabf8e169da5491f0901elibreoffice-langpack-br-5.0.6.2-15.el7_4.x86_64.rpme01b65c896397cb6d28257dedc8270a5ea158133bf3681d95168ecf836706d69autocorr-da-5.0.6.2-15.el7_4.noarch.rpmf5f2ceca48e1253ac0c6a4add1e2a5f7bd0b0d79ac4edf510e2e9702ac46b617libreoffice-rhino-5.0.6.2-15.el7_4.x86_64.rpm27e6724bee1134c6fccbff3b2afa119a0b84c2d54a6ad9eaa6bcb3d79bddbb44libreoffice-langpack-tr-5.0.6.2-15.el7_4.x86_64.rpmacd03d9b6e272b0718489e7fe9b670fc35ef2d6e02a9eacf8b6ed0048aead22dlibreoffice-langpack-hi-5.0.6.2-15.el7_4.x86_64.rpm3c5569d2824476d83fe985e0dd370f20066c3d3ed3b34f9223391aeecfefea7elibreoffice-graphicfilter-5.0.6.2-15.el7_4.x86_64.rpm9173a809ac4c91b442b5f603da077331a2d2c36ae4d337ba0ea329324e0d5865libreoffice-gdb-debug-support-5.0.6.2-15.el7_4.x86_64.rpmedc0f0327ffd4e437f91ff11feb56c17c837475fab64ee9d08f1cba1504bfbb1libreoffice-langpack-ss-5.0.6.2-15.el7_4.x86_64.rpm3cb1d16cdf6fb00003480074151c70762240487e48c50da7c4cc470a9e23a327libreoffice-langpack-te-5.0.6.2-15.el7_4.x86_64.rpmc59fc1a609204ebfa7fb8b68972d916815a21ec7c7fe8805e3b03dcce1499be6libreoffice-langpack-ja-5.0.6.2-15.el7_4.x86_64.rpmcd874331584c2d11ba35b7813192f8099b850143f6c0ae4c4067bc46ac65a826libreoffice-langpack-eu-5.0.6.2-15.el7_4.x86_64.rpmabe94b1232a5f402c74e101063f0e779293367817c6c8679cedeee10bc4d64cbautocorr-fr-5.0.6.2-15.el7_4.noarch.rpmde409f3a5458fbc0cc84d1ee1de0ff194ad8b72b6173b2180a649f6af9b867f2libreofficekit-5.0.6.2-15.el7_4.x86_64.rpm288760584a259f7deff77323adc0295b458231eff0873afadc1a4f142bd3334flibreoffice-pdfimport-5.0.6.2-15.el7_4.x86_64.rpm67f8194fe62a13ec57c9b88b5f928a745d9495b84b87196df0427345f973f6dclibreoffice-wiki-publisher-5.0.6.2-15.el7_4.x86_64.rpm4507975e42f043b197bc36dba77a70047d2cd4bc86b71c298183417dfe2394b0libreoffice-langpack-ar-5.0.6.2-15.el7_4.x86_64.rpmbd0994b0e49fd2e0efdfb6b2bdf491012dc93efa208f1b0f530f87359c1ca751libreoffice-langpack-gl-5.0.6.2-15.el7_4.x86_64.rpm79bca1490d7f9faeed5ad93cb49005f4688335bcefc1d0dc01e7a45fae99d296libreoffice-xsltfilter-5.0.6.2-15.el7_4.x86_64.rpma2c1f88bea0b00a97e18bd1e526cf14a699c3a44890b22b6e54a870cf679f730libreoffice-langpack-ml-5.0.6.2-15.el7_4.x86_64.rpmf888a00fc56015da383092205acc8ddd0a046fd6defba6fde2883f3f08eb535dautocorr-mn-5.0.6.2-15.el7_4.noarch.rpm43c76b08ffe296335ef5aba146cf26e6a6c1a4b99ebe24f886d82a2b1ae00454autocorr-sl-5.0.6.2-15.el7_4.noarch.rpm1f236c9c9812368130cd663860f6a1383c4d4dc3495e2391c7a607073eed5424libreoffice-langpack-fi-5.0.6.2-15.el7_4.x86_64.rpm3a9710e19c037a1dc802c9a2f11c49513219efc7cebeb29b6765babcdb36071dlibreoffice-officebean-5.0.6.2-15.el7_4.x86_64.rpm95c3da48af3a8609121f1dbe55f79910f397858b96460027705eb83df1bbb57clibreoffice-langpack-lv-5.0.6.2-15.el7_4.x86_64.rpm0ea2fac911f9c28e4590b4d0a6830c1bb59eb793d9c3aa769460ddac0f0b02aclibreoffice-langpack-mr-5.0.6.2-15.el7_4.x86_64.rpmc5b1e61a74f44edfaa4d9a0687d9e8709b0c6ce7c2692155b96d664a5318c0b3libreoffice-math-5.0.6.2-15.el7_4.x86_64.rpmc6c75db91c281ef77352accc3a71d5535589f10a15bbb646b39cb9401fabf607libreoffice-langpack-pt-BR-5.0.6.2-15.el7_4.x86_64.rpm96eddbb6189016d55913e63fc0212452c96166cc123b28c3392c1f70088fbd81libreoffice-langpack-nn-5.0.6.2-15.el7_4.x86_64.rpmaf01273d1b1ec000a4a8cfcc5509177142298bbd6287445b0a21831a8fdbca48libreoffice-bsh-5.0.6.2-15.el7_4.x86_64.rpm4dda45f0375b01df54a477f292e3c16256279f6b0d71f8234d3f0951e69a6fb2libreoffice-langpack-dz-5.0.6.2-15.el7_4.x86_64.rpmbd63770b06795e52a7d7ad95da45816646ae0a9ef5f1a0e5ab17365b29a90895libreoffice-langpack-bn-5.0.6.2-15.el7_4.x86_64.rpmbb3a02d74616f97971dde638afe63d40168e4e933b5cc5625182590c086a7dd7libreoffice-langpack-sl-5.0.6.2-15.el7_4.x86_64.rpm30a93cc3c82b89d9bb9c852a4527b3c70030a19374c8322a945b05d9de544159libreoffice-langpack-bg-5.0.6.2-15.el7_4.x86_64.rpm17215b57e6b2a684964d355f087f50b38d19039ad83d72d4dde3ae739cc6e010autocorr-cs-5.0.6.2-15.el7_4.noarch.rpme6298500efced3195a4c6e84f7a1856aa577c55dfea3cabc5b1982187c870899libreoffice-langpack-pl-5.0.6.2-15.el7_4.x86_64.rpm75e3292f80ff552cd1e506c010b4a426f806cbf221ae560d1612f813fdc410cblibreofficekit-devel-5.0.6.2-15.el7_4.i686.rpm773307138171c28b72d0fc06fa36c82a75864a57e603598cfd5bd2b4dd6511a5libreoffice-langpack-ga-5.0.6.2-15.el7_4.x86_64.rpm3080509f6d4fdd7df59b197b78ea81ccde659982c7174f7216f9087e899ec49cSLSA-2018:0483-1DhcpSecurity Fix(es): * dhcp: Buffer overflow in dhclient possibly allowing code execution triggered by malicious server (CVE-2018-5732) * dhcp: Reference count overflow in dhcpd allows denial of service (CVE-2018-5733)importantScientific LinuxScientific Linux 7dhcp-common-4.2.5-58.sl7_4.3.x86_64.rpmc12c0879580c4d29cc8192995dfec1cdac2ea3a2a64970cf79a1c50ed03d7448dhcp-libs-4.2.5-58.sl7_4.3.x86_64.rpm47a369fd10fd61ce3266b3b14024d7a1d095ec53e939beeec1b259d810ca2577dhcp-devel-4.2.5-58.sl7_4.3.x86_64.rpm92b1b604487977897145059e30e14af0e21a7c8d6acce1921b2bac7135346586dhcp-libs-4.2.5-58.sl7_4.3.i686.rpmc0472d6cb613a4d56babcb067ea50cd3ac8aea01e612d7f424d187f162f4c304dhcp-devel-4.2.5-58.sl7_4.3.i686.rpma240d83a76237b4fc846bb12f834d86ef864ff08e5de463786eef7e0bb9fcdeddhclient-4.2.5-58.sl7_4.3.x86_64.rpmbba4e5a012535a0d9f67aa8859baa4413928b0bfc05088380122da3b0110ceefdhcp-4.2.5-58.sl7_4.3.x86_64.rpmc12a23b67a9959a7ab398793ea5a2f4e02836d942f2b4c78821068aef2608042SLSA-2018:0505-1MailmanSecurity Fix(es): * mailman: Cross-site scripting (XSS) vulnerability in web UI (CVE-2018-5950)moderateScientific LinuxScientific Linux 7mailman-2.1.15-26.el7_4.1.x86_64.rpm1c6893db61c2d4ab5b621fcaa6dbbc5944f2ffd559927e11a2e2d720bf4e22e7SLSA-2018:0527-1FirefoxThis update upgrades Firefox to version 52.7.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) * Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145)criticalScientific LinuxScientific Linux 7firefox-52.7.0-1.el7_4.x86_64.rpmf34427978284894fa3a4bdfc79a949323fd2f8bb82c4a595043fb06b8cf4fd35firefox-52.7.0-1.el7_4.i686.rpmb75b3ad78178f682b403e33de9588e0d344e0e42141fa6b0d66d2a7f16a9a1f4SLSA-2018:0549-1FirefoxThis update upgrades Firefox to version 52.7.2 ESR. Security Fix(es): * Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146)criticalScientific LinuxScientific Linux 7firefox-52.7.2-1.el7_4.x86_64.rpm6e0faaccb874c7d4f3a109aa8d4df0a9c3d3c880896ed5b0eaa8a2fef9a6eaabfirefox-52.7.2-1.el7_4.i686.rpm24669866c86596886269b43bf45102ba2460a02ffbcfe38857798fa184c350d9SLSA-2018:0592-1Slf4JSecurity Fix(es): * slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088)importantScientific LinuxScientific Linux 7slf4j-1.7.4-4.el7_4.noarch.rpm3889c90e46fa3e54b852f76b9a06d871fc8e848b53b550d8643177f3c17cbd2cslf4j-manual-1.7.4-4.el7_4.noarch.rpm7f64a6136aaa69bd3d9df200481f52767e27aa5480b897155435912dcda9c019slf4j-javadoc-1.7.4-4.el7_4.noarch.rpmdf6b1de1b624aecad09cf0aab68a8eaeb486ed61d53abcef7cda7eddcc5bf765SLSA-2018:0648-1ThunderbirdThis update upgrades Thunderbird to version 52.7.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) * Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) * Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) * Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) * Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) * Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144)importantScientific LinuxScientific Linux 7thunderbird-52.7.0-1.el7_4.x86_64.rpmba61dcaca1da8bc84f8da31ab8388a7c7d492af976aa7e9ab7aee0a522eec6abSLSA-2018:0666-1Krb5Security Fix(es): * krb5: Authentication bypass by improper validation of certificate EKU and SAN (CVE-2017-7562) * krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure (CVE-2017-11368) Additional Changes:moderateScientific LinuxScientific Linux 7krb5-devel-1.15.1-18.el7.i686.rpm8124f4733c80418f658cc02fc109735a5bc660ce0796dc633367d2d0e3c04509krb5-devel-1.15.1-18.el7.x86_64.rpm2fc99859ace86b117bf717ed2116ff042000646bb549edd3e4a72d5fbcf6c5ddkrb5-server-ldap-1.15.1-18.el7.x86_64.rpmad76ad713a9414c69dc70db4513bff079de9408c241e64c18c61da2881d2a5c8krb5-workstation-1.15.1-18.el7.x86_64.rpm85cd8103a1992734e5e5f1e924004d2dd11af5bf3a6c2f9a41dd8da73d3da483krb5-server-1.15.1-18.el7.x86_64.rpm7fa9c09e1363301c6b03666a3ac50419adbd6f00ac338289adb991e5c3102e39libkadm5-1.15.1-18.el7.i686.rpm86b5679c51f47b0c39fe28e651587d00027d7afbf3187381ebcb948ce06ba6bckrb5-libs-1.15.1-18.el7.i686.rpm66bd8503b137e38279797ec628fb8d0a22888d3e0a06fc31e2035d43c0d3e09blibkadm5-1.15.1-18.el7.x86_64.rpm30b984d7f65b62c6c5008527e20b5187306ff932dcc869231b67a9b08890b414krb5-libs-1.15.1-18.el7.x86_64.rpm529d743e45c712bcb97926cf07cd68af6c2e9843b47beddfdf853d76d3c2e292krb5-pkinit-1.15.1-18.el7.x86_64.rpmd1ad72f194079f686d87fc402b121f3dfc0aa8d8c7751f21e4cef61026047d36SLSA-2018:0805-1GlibcSecurity Fix(es): * glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation (CVE-2018-1000001) * glibc: Buffer overflow in glob with GLOB_TILDE (CVE-2017-15670) * glibc: Buffer overflow during unescaping of user names with the ~ operator (CVE-2017-15804) * glibc: denial of service in getnetbyname function (CVE-2014-9402) * glibc: DNS resolver NULL pointer dereference with crafted record type (CVE-2015-5180) * glibc: Fragmentation attacks possible when EDNS0 is enabled (CVE-2017-12132) Additional Changes:moderateScientific LinuxScientific Linux 7glibc-utils-2.17-222.el7.x86_64.rpm459039551abe037ad4522ac3940e2bdb3136045c3b1553c801e7a68fd547e70eglibc-2.17-222.el7.i686.rpm1dfd24a7756d1b39bd3af65c9834c0267dea8e4532cb659a983a9ac287b97f59glibc-devel-2.17-222.el7.i686.rpmf99686b875ff4a4ccef595e469c7cfe4b29ed177bac5a42b700b0198431dd6f5glibc-2.17-222.el7.x86_64.rpm1cfac3a2ab9069ef85e758bc37d8b99ffa00d6a74302305f89e88de6940829b0glibc-static-2.17-222.el7.i686.rpmc326a0f18721fa9fc4487b287edad28e291a19dc60a5e9525af343b21cf7f28eglibc-static-2.17-222.el7.x86_64.rpm9afb97b10a91d376b97ecfdd89a3d2c69352505d0a3eb91279e03ba3ab7a2befnscd-2.17-222.el7.x86_64.rpmc3127b2dbb85ce4e69d6e483b4ad135787856652c9ac34119ec61ce6981765eeglibc-devel-2.17-222.el7.x86_64.rpm89d9d5b0b6a938f19936c1049decdfc11a0e2187dcbba08fd340b836494ae03bglibc-headers-2.17-222.el7.x86_64.rpm60995444bd55872ea31705832919f1f9ccb0a0a404d68f2242d0a08c1d8a6217glibc-common-2.17-222.el7.x86_64.rpm4ca526c8aa20ff9762b36593c8ecb5467c387a43b1ee396fde742858d0f7a2d7SLSA-2018:0816-1Qemu-KvmSecurity Fix(es): * Qemu: vga: OOB read access during display update (CVE-2017-13672) * Qemu: Slirp: use-after-free when sending response (CVE-2017-13711) * Qemu: memory exhaustion through framebuffer update request message in VNC server (CVE-2017-15124) * Qemu: I/O: potential memory exhaustion via websock connection to VNC (CVE-2017-15268) * Qemu: Out-of-bounds read in vga_draw_text routine (CVE-2018-5683) Additional Changes:lowScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-156.el7.x86_64.rpmbc02f3020d7523d7742e11e6dfb52ac8cff99cc1eea3782b5e4dfe51a0b3ca24qemu-kvm-common-1.5.3-156.el7.x86_64.rpmb4cf5b49ff7f8523d9d9f141471b8ba60878a35f8fe304779d0ab22be79ae4a2qemu-img-1.5.3-156.el7.x86_64.rpma068f27f810f6430cf56fae9126d9ee548b37ee3fec87ef0a556ae422c5e5c1cqemu-kvm-1.5.3-156.el7.x86_64.rpm61c736bf1eb0f33b6fb160a9b1670793cf78c677b29bb5ab989433cd074be716SLSA-2018:0842-1Xdg-User-DirsSecurity Fix(es): * xdg-user-dirs, gnome-session: Xsession creation of XDG user directories does not honor system umask policy (CVE-2017-15131) Additional Changes:lowScientific LinuxScientific Linux 7xdg-user-dirs-0.15-5.el7.x86_64.rpm2157641bd8917f04e2202f079fc5f7fbc0b3c96750754eaf44f9d7d7e8e2bbbaSLSA-2018:0849-1GccSecurity Fix(es): * gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics (CVE-2017-11671) Additional Changes:lowScientific LinuxScientific Linux 7libstdc++-4.8.5-28.el7.i686.rpmcddfb60738eb2dc62083a423c31feb52d962ffd150e4a6a631b75d6725fe1682gcc-gfortran-4.8.5-28.el7.x86_64.rpm3864dc478adad2e0edfee84f1a23d9a580f5f11232fc0d94551334acb4f3d519libgnat-static-4.8.5-28.el7.i686.rpm99dfa189aecb1fafc9652a2ad0921bfc7997718617ae306e1d90f2101e4c3078libquadmath-static-4.8.5-28.el7.x86_64.rpm48877648118537bb279362b3f56bf9ce569d63a606cf6ad5e08984a6e0cb5032gcc-go-4.8.5-28.el7.x86_64.rpm0688963d1f275ea6233a2689700921f427078001c83a5a7ecd4430f34d1e8587libquadmath-4.8.5-28.el7.i686.rpmbf51c3310e7c30cec0da1e2aea00e0fdf10d45dda47d7eaa2fe2351f5d0f9399libquadmath-devel-4.8.5-28.el7.i686.rpmbf94c133fb90c786082c38b46070ebb82c39688d124fa12f5da227f662253a93libstdc++-docs-4.8.5-28.el7.x86_64.rpm30689ede85012b656ec0e7a086c5db0054ef6674fe6fd52991e203278c4d3c50cpp-4.8.5-28.el7.x86_64.rpmf5f8e33ecdcf4b4a2487a57d32b206ab365c9c4f42904a0a5804403a48e20a43libatomic-static-4.8.5-28.el7.x86_64.rpm5a17cc9ce6bcfe76d8d154394142527ff9bb863c7546ba5829cc2904a961aa15libgfortran-4.8.5-28.el7.i686.rpmde139c6a7a398946d18b66a602ca80988541cd167021481cf9bdf36a0cfcbc27libgfortran-4.8.5-28.el7.x86_64.rpm7be57f1d6b831af8f876adfafb28be91519552650590fcd4c24311ff3f8aa20bgcc-plugin-devel-4.8.5-28.el7.x86_64.rpm31d04df0593f719133013c85d5f44476373a887a9374cb45385e35d7b4de48e1libgnat-static-4.8.5-28.el7.x86_64.rpmb662db6c10b43e8e6764cb78bcaf7ce6cf776f1f60a6a89db107ff687c5a00d3libasan-static-4.8.5-28.el7.x86_64.rpm0770af16151a9061b9c4e1760d42604ac9b10c6d362427bae485e20f23db3e27libstdc++-static-4.8.5-28.el7.x86_64.rpm9f309f971f405ca2280d51d75e361d3544a479ce42656ebfe7ddc88579cf6c06libstdc++-devel-4.8.5-28.el7.x86_64.rpma1d545930e0e911c7f6245a02105a1633faa99ed34f324d0e46c7de0fad63597libatomic-4.8.5-28.el7.i686.rpm038821b9551758191b1ee5139980bdf86e21091b5e4f6b3b7c577f3989ccf976libobjc-4.8.5-28.el7.i686.rpme41672c388bac56f947d3013d348e8f4f5215844de649831ab989bdf6d99222dlibtsan-static-4.8.5-28.el7.x86_64.rpmbfcde7922102cf6b4beeb304df921bd9cdaef7be603029ab3ea36c2228bee6falibitm-static-4.8.5-28.el7.x86_64.rpm83e31db28de4778388400a137b449fa6e1b484cbdc7667289c5bf87798cd9ebdlibitm-devel-4.8.5-28.el7.i686.rpmaf6a254d43a3068bdf38c53519040fa1a5902f27c6b3a1f8f951db4a1b862880libmudflap-devel-4.8.5-28.el7.i686.rpma321747b6dec8345b17e31a401be8650b05f3db2e69cb7d86a9633c9e031021alibstdc++-4.8.5-28.el7.x86_64.rpm1aceb8e3eb2bbb430ec2673d43399392385b508b3378d763b676b4d25160fe7blibmudflap-devel-4.8.5-28.el7.x86_64.rpmc79dbdb81f4fe836793f0290cca4ea0a16ea4bfa10f9e5b059d3727bab5095aclibgcc-4.8.5-28.el7.x86_64.rpmfed6856458dbba77dd34a9fa3c86e73a155d18663f74cb6ba7ed7e51521e96aclibasan-static-4.8.5-28.el7.i686.rpm00f978c681279559472992e94d8d1d5baf97b74dc9de22c8d04e4dfb756461e4libgcc-4.8.5-28.el7.i686.rpm3d7379a013cf57c07c5268372a9dadb393bb160543669ca4f1e99117b065dcb9libitm-4.8.5-28.el7.x86_64.rpm01ea61b6cafe36911fa1819bad3945c8dfe40e3ae267a5fa6d2c1113a96cebeflibstdc++-devel-4.8.5-28.el7.i686.rpm27e7105edd541cf829486d9aa379723d7b5933d86698166e220777a63c33a7b4libgnat-4.8.5-28.el7.i686.rpm4944530da54ba5b8cec1adc0504b6639089c1ba9a618f8ada5fb1058969f7f2elibitm-4.8.5-28.el7.i686.rpmb39feb71004331f2a03bf8f75fee545fe3afaf3ef6e9ca8fcc84f92a7549ef31gcc-gnat-4.8.5-28.el7.x86_64.rpmcc6ed98caba396ad74eb757287dd8c5688a4d2607f28374b8c2279543e733bc0libstdc++-static-4.8.5-28.el7.i686.rpm6659440b5b308da73d9f4132c691f58e2dbcf09107b2a0ee93ccc1a96528cb2fgcc-objc-4.8.5-28.el7.x86_64.rpmf4c0d1880627a87b49af81849221378096520d53559c9044e7f82b2ed95d5a23libmudflap-static-4.8.5-28.el7.x86_64.rpm5e1bf477803f6c5d0dae118661e806ff57ea90bb4dfd067ba9cff7bb73cb513blibatomic-4.8.5-28.el7.x86_64.rpm079c69d95bbe7f730e95b2e1d414ce1bc8c8e8b3460373d0fc1d60e090b0e1b1libasan-4.8.5-28.el7.i686.rpm4b1eeb6f8d2a965573d7de4a65aaad395b019f4a25c89e72a790d885e2683c51libgfortran-static-4.8.5-28.el7.i686.rpm5f1e1a998cf15c5fc61410c6785fe68811fc996f638a6a6acd544b7ddf50bf0flibmudflap-static-4.8.5-28.el7.i686.rpmd6e3421efd8a8b20b60c39c9e369ea059774d1ee639894318d130f3fbd208668gcc-4.8.5-28.el7.x86_64.rpm606c03a2336a33011ab5600dab32b7086bee79d5feb3acc769f006457db2882flibquadmath-static-4.8.5-28.el7.i686.rpm16c4b473fc6b36203fa27d09128defb277cff28750cc2af5e69b9dc7577a7f36libgo-static-4.8.5-28.el7.i686.rpm7ce8be0590c74ede925c9633d238f4350fb0ee00d433e441eee8fb4f85108769libgo-devel-4.8.5-28.el7.i686.rpm74cd428c873ad81af4af765a72ee385de20a2945d3e2b31e1277872fd49ccec7libgo-static-4.8.5-28.el7.x86_64.rpm60b95a2be27e05cdd3c0116b21abf3f2d99d2f4c9bdf58dc275717ccc48130bdlibgomp-4.8.5-28.el7.i686.rpmf73ea4722304e3e1eafd27c5edba95d63ccb664662b6217f2c5dae5b769f9a10libtsan-4.8.5-28.el7.x86_64.rpm4e0a16b222297070ee1aad031010f5a519844c77d579d55e50e68de323b28a62libgnat-devel-4.8.5-28.el7.x86_64.rpme6c28a6f34dcc914618b5bd3a7cd9319135955b862f820ee55b727a3802a83cdlibquadmath-devel-4.8.5-28.el7.x86_64.rpm31e3310d60af606926f7cb1f85f2afaa9c07f004a209ab26e7b471da49a56c30libgo-4.8.5-28.el7.i686.rpm5ffe221a62d993275ef082c34a6f80742480a7eb94b0d789c1a7a06b08966793libatomic-static-4.8.5-28.el7.i686.rpm8205272cb6861bd4de55ebc63cb5da7334c037569bfaacc221f21098c8090745gcc-c++-4.8.5-28.el7.x86_64.rpmd8e3e0943cfe844323b1d6f373b092da8a11ec93755cb1892e53a197e94af3calibmudflap-4.8.5-28.el7.x86_64.rpm3e557394e8d9e283f2176f74e4a2a250be22cf675c2182491f8ced1ab8affca4libgfortran-static-4.8.5-28.el7.x86_64.rpme34862b1c38fa948a0cc671553aa25ee0403c1db91d83e8f2d653dbaedba1e4elibitm-devel-4.8.5-28.el7.x86_64.rpmff6d612cea79247efab019265c43f0e674fcb856737fbda1ec04e8ef21941cdalibgomp-4.8.5-28.el7.x86_64.rpmbc408d4cbf06610d9dcefc62c1ad2f626abe405e738421825e92f9fa247cebb7gcc-objc++-4.8.5-28.el7.x86_64.rpma1abfc3005702ab9bd30ea9351c08b8b5945303183d9d329e28730097d7a6192libgo-devel-4.8.5-28.el7.x86_64.rpm8f9991663642f4af28091b68f13a8e7fcefe6ae47b3cab7f089473947c2f2d35libobjc-4.8.5-28.el7.x86_64.rpm1bead08d5766ad4bfcfeb85968c5e3ef4f1fd90137f4bd006d6caa7e0c62e718libgnat-devel-4.8.5-28.el7.i686.rpm7cbcde4eb5303795695d24a36e312082e5992f2b900880827ee0ab8298fc9063libmudflap-4.8.5-28.el7.i686.rpm965a9e730d727f070fa5fdc38f562da29e78a3ca72669b44379592e259ad63a2libgnat-4.8.5-28.el7.x86_64.rpmbb77869523a541b37cbf35c137f9a0dc00f08d34ce5ba5367bd8ca4046dd9b0elibgo-4.8.5-28.el7.x86_64.rpma481f6b8d1d6500d00f30a7266048a4b1100168b8e154011d7dc179d7edc2857libquadmath-4.8.5-28.el7.x86_64.rpm9c7351918ac33e3f93484b05a1c2bd262e4c718ddd5b91c37e8babc6a3dd87bblibasan-4.8.5-28.el7.x86_64.rpm3d8bedfd7662b02cec6eb989d47a01539b22379614384068d99736c40c7b86f4libitm-static-4.8.5-28.el7.i686.rpma2aad785d99a5b79668ccd00df8d9df9d6299ee576a5e29a86a603e60eeb38daSLSA-2018:0855-1NtpSecurity Fix(es): * ntp: Authenticated DoS via Malicious Config Option (CVE-2017-6463) * ntp: Denial of Service via Malformed Config (CVE-2017-6464) * ntp: Buffer Overflow in DPTS Clock (CVE-2017-6462) Additional Changes:moderateScientific LinuxScientific Linux 7ntpdate-4.2.6p5-28.el7.x86_64.rpmb71d69c792699e2fcb8da579bbf8e0ab7f0bb1c7239193f253d032dd6bab20a4ntp-4.2.6p5-28.el7.x86_64.rpm87cecb2be2dbdd95763c4aed2052168119893728c40b30c57c0b0c0c18e3c08fsntp-4.2.6p5-28.el7.x86_64.rpmad2b0e0484275544fc18f618ab36c1d1583cceac7986e3e808af738c84cf9241ntp-doc-4.2.6p5-28.el7.noarch.rpm3b88a5d1d0f071594736421bea2e4aa6a5add931a9815021efffc8a5c56bb5b2ntp-perl-4.2.6p5-28.el7.noarch.rpm8948be23a03e6dd364acdd6aeb9e39651ab2b02145800825dcc0d6cd7ce8eff4SLSA-2018:0878-1GolangThe following packages have been upgraded to a later upstream version: golang (1.9.4). Security Fix(es): * golang: arbitrary code execution during "go get" or "go get -d" (CVE-2017-15041) * golang: smtp.PlainAuth susceptible to man-in-the-middle password harvesting (CVE-2017-15042) * golang: arbitrary code execution during "go get" via C compiler options (CVE-2018-6574) Additional Changes:moderateScientific LinuxScientific Linux 7golang-tests-1.9.4-1.el7.noarch.rpmf51406b8e808c7cb2107f480196dab22ef97701888b754979cbf807402c9c423golang-src-1.9.4-1.el7.noarch.rpm415e49212a13d596921cc60b21008de8019e3dceec1ddb5432ea6d1a5fd729dfgolang-misc-1.9.4-1.el7.noarch.rpm9cb9906087d0378d40c87c892d6e4af1c293fa2f138a4b351f41f0972e12b180golang-1.9.4-1.el7.x86_64.rpm6c844a18c0c111eb7ee83ce04e214ca7a30feeeb3a580fe824876fd17593c702golang-bin-1.9.4-1.el7.x86_64.rpmc628086783fdc64bf350800e0c8a020c6c1b5b46041f075fb2d267d9925e174cgolang-docs-1.9.4-1.el7.noarch.rpm78f07799cbd18d34cc5dd3039b291aec1631215f4ce7c67e9e42573942c3e35aSLSA-2018:0913-1PolicycoreutilsSecurity Fix(es): * policycoreutils: Relabelling of symbolic links in /tmp and /var/tmp change the context of their target instead (CVE-2018-1063) This issue was discovered by Renaud Mtrich (Red Hat). Additional Changes:lowScientific LinuxScientific Linux 7policycoreutils-python-2.5-22.el7.x86_64.rpm288091191761dbbafab8661077937f0492e4d91190a4e3dad2e42e44279595a6policycoreutils-2.5-22.el7.x86_64.rpm38ed352ff0b4a8293cfe65f8704dbe3050ee94653acd04ee8bac20a2f03f6f98policycoreutils-devel-2.5-22.el7.i686.rpm1bfab176d8f46194f65fbe7c82ff0f731a156a376687600b1b799610f749b267policycoreutils-gui-2.5-22.el7.x86_64.rpm7cca051a4adb22f472c9041a4058815770b0032593183f18bd85d77b0e10a9b0policycoreutils-newrole-2.5-22.el7.x86_64.rpm24a31d9e8b1de676e5b10159af617fb728925d646510a103649f92da384e53ffpolicycoreutils-sandbox-2.5-22.el7.x86_64.rpm4ebf970c899a916dd11e9f96dacc52e582c9d6c00c72ae9879aa978091259527policycoreutils-devel-2.5-22.el7.x86_64.rpmc95c80b5b59d69c3a9544de8ffd4a82de02322f357d975b7b129d632cd42ac46policycoreutils-restorecond-2.5-22.el7.x86_64.rpmb7d328cc220348c61d09b81c3ae27c08894cc42b7bd3e911077b29c1774007a3SLSA-2018:0980-1OpensshSecurity Fix(es): * openssh: Improper write operations in readonly mode allow for zero- length file creation (CVE-2017-15906) Additional Changes:lowScientific LinuxScientific Linux 7openssh-7.4p1-16.el7.x86_64.rpm8f4ec3a655fb26c3afbc53f51c0f996fd377ab542bc8dda092b1265a351c6f62openssh-ldap-7.4p1-16.el7.x86_64.rpmc49e9f90f6ca708a9abc25ac8d278ce08360692129bc4db12d28b44d036c478bopenssh-askpass-7.4p1-16.el7.x86_64.rpm244a610a4858518f8fc46d57e3e4cba99b9a6fc55fb9c00d5f7a694ff355cdb3pam_ssh_agent_auth-0.10.3-2.16.el7.x86_64.rpmc82a800078a9c8251a295dc087d5f6cb643b5aeac48bde191fac766adcfee38eopenssh-keycat-7.4p1-16.el7.x86_64.rpmd06ebaec15901b2dccd1723ffe493d27f8db54d9e4ee6c44f79de9d284f5a689openssh-clients-7.4p1-16.el7.x86_64.rpmabe4e5cd3f0bb705a0a1bba7c6593387bd7c268cd7abdf2523ed52d2637b3230openssh-server-sysvinit-7.4p1-16.el7.x86_64.rpm25a2ec751157fffcbbe277fb2b07a0b39cbf9852a6c440f5b66beffaa6246ff6openssh-server-7.4p1-16.el7.x86_64.rpm10f568cfeb081570b29d66d94f570e230b6774a3c7571877d74ce4dbd0553966pam_ssh_agent_auth-0.10.3-2.16.el7.i686.rpm97343be9248dcfe4cddc1ba4e6def1cea6f24d4705075f97d44aed804791e0d6openssh-cavs-7.4p1-16.el7.x86_64.rpmfeafdf3560b3c3eb08e65e0f26211bd5d0b79f89a6b97ef9fe95b7323dfd08d1SLSA-2018:0998-1OpensslSecurity Fix(es): * openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736) * openssl: Read/write after SSL object in error state (CVE-2017-3737) * openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738) Additional Changes:moderateScientific LinuxScientific Linux 7openssl-devel-1.0.2k-12.el7.x86_64.rpmf50101162865e55c8358186ea38e38fcc470e71b363ec43a0e4aa3bd9f664d89openssl-static-1.0.2k-12.el7.i686.rpm792410ed61751090a56bb05b3899b08f59533be6180948ba1ec2f728b95ed4f6openssl-devel-1.0.2k-12.el7.i686.rpm15e685ab7cc94d7ceacab3d116ea4c44d3d23e1f93d5283f3b081e18adce3c01openssl-static-1.0.2k-12.el7.x86_64.rpmc16f320ed46519f2a3ce191ba0febc5877378c470f71318af1f31a9065a19c46openssl-libs-1.0.2k-12.el7.x86_64.rpm7e704520ec354c10be906c56149a98757057cb5e96605ac1439647777532b4b8openssl-perl-1.0.2k-12.el7.x86_64.rpm52338f1518a5e91573b9764fef3491b3eca6e0c0fd9348517c100e2b12579430openssl-1.0.2k-12.el7.x86_64.rpmb4fbdb7ae590e4f733acd0493f7e9f5105eaec77e6d6fc16747dd307d0cebb92openssl-libs-1.0.2k-12.el7.i686.rpm4cd742c58081b6543eced10bad23e1bf4698312f6e962cacda792f4a58d405baSLSA-2018:1055-1LibvncserverSecurity Fix(es): * libvncserver: Improper input sanitization in rfbProcessClientNormalMessage in rfbserver.c (CVE-2018-7225)moderateScientific LinuxScientific Linux 7libvncserver-0.9.9-12.el7_5.x86_64.rpmb95f5623842b5467972deadf729abd055f8afb8cd4f397dcca7d66e99592ae29libvncserver-devel-0.9.9-12.el7_5.x86_64.rpmd6c1b929c08220019342f628e8c49f04c1900a905bf7127d24923606ab87666flibvncserver-devel-0.9.9-12.el7_5.i686.rpmfc99335fce3d945ceb4923974523a10ac68e10922fa33d015a421955336b32dblibvncserver-0.9.9-12.el7_5.i686.rpm737d9be599f73f2ad7595d213aba176d031043602699afa5612f2d302f3cc231SLSA-2018:1058-1LibvorbisSecurity Fix(es): * Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146)importantScientific LinuxScientific Linux 7libvorbis-1.3.3-8.el7.1.x86_64.rpm6b3a21065471c38e37b0b4829c0615e390c5833f6b7909e69323005d4eb295b3libvorbis-devel-docs-1.3.3-8.el7.1.noarch.rpm0fb6fcf0df54af8f7106fe4d38e859552155f645253a2e1baffe44f22f981713libvorbis-devel-1.3.3-8.el7.1.x86_64.rpm33ec298df2d7f08b12a762fcb5364daef8120f9a9fd5786bdd378aff453f5b49libvorbis-1.3.3-8.el7.1.i686.rpmdd45fd156a4e3b6f12d028b234345e8de30387a9b78e7c94c1d9b96d1b7bfe3clibvorbis-devel-1.3.3-8.el7.1.i686.rpm32f03a9d18286982a4069787c58c356d9ef9850a0362c9bbacd2c128cdfb46feSLSA-2018:1060-1PcsSecurity Fix(es): * pcs: Privilege escalation via authorized user malicious REST call (CVE-2018-1079) * pcs: Debug parameter removal bypass, allowing information disclosure (CVE-2018-1086) * rack-protection: Timing attack in authenticity_token.rb (CVE-2018-1000119)importantScientific LinuxScientific Linux 7pcs-0.9.162-5.sl7_5.1.x86_64.rpm6979cdba92ece64ef19654a54ceb3c5d1bba7b278915fd7c1040837441d93ed8pcs-snmp-0.9.162-5.sl7_5.1.x86_64.rpme65088acd2df1f73b55b4894de9cc29fe4c3bd66158e49e5652c8b37ca128e51SLSA-2018:1062-1KernelSecurity Fix(es): * hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power) * kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important) * kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important) * Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important) * kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important) * kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate) * kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate) * kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate) * kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) * kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate) * kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate) * kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) * kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate) * kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) * kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) * kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate) * kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate) * kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate) * kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate) * Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate) * kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) * kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate) * kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) * kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low) Additional Changes:importantScientific LinuxScientific Linux 7kernel-headers-3.10.0-862.el7.x86_64.rpm6df08b0e6ce4814e5f307598137258b31dcf9ebb1d4a169343c6432762855624perf-3.10.0-862.el7.x86_64.rpmebba2615b243289f2d55437a1cb64991730b19154fe778d06eacb02522a0e7e0kernel-doc-3.10.0-862.el7.noarch.rpm6e82d704660b1e3ca0099e3b9be4191ec1e604e8635f2910e1b3ddce6375017akernel-debug-devel-3.10.0-862.el7.x86_64.rpmc2f29e093b32db2effe0453bdbed33afc896a1f114ec0f93761565422fd109fbkernel-tools-libs-3.10.0-862.el7.x86_64.rpm85448b41477a97f2dd8191b3f0496db31502bb93363e69955e7130f2179d908fkmod-openafs-1.6-sl-862-1.6.22.3-286.sl7.862.x86_64.rpm5170bfe1b485eba55f1f8b094d5c9e1bfafb4b29e4b184a0f07359362c730c11kernel-3.10.0-862.el7.x86_64.rpm1c446019b936f73b0fa96211b9ddff09f73235e8d0c3732b6f84399a912a307dkernel-abi-whitelists-3.10.0-862.el7.noarch.rpm1083366302f6a9a5ffce8b185d402f7efa71d608c11e4ade66f6daff2ab2e662kernel-tools-3.10.0-862.el7.x86_64.rpm7955fe6f269851b09e7d1a45e8787a151bb7b2721ea6622dc672c1fac83fc015kmod-openafs-1.6-sl-1.6.22.3-1.SL75.el7.noarch.rpme8fec099d3302005e95c4b3767d627fda94f7ba2f063857778b38c95f7a627f9kernel-devel-3.10.0-862.el7.x86_64.rpme74edf02663f1d1f53f1161e49919201e4ea6926d8e299f0a7713ef298a5991dkernel-tools-libs-devel-3.10.0-862.el7.x86_64.rpm31ae97bf856e9c9a8ec4016d8434ddd45bb8894403e0771210f046aba3650941python-perf-3.10.0-862.el7.x86_64.rpm60d3fd4402cc43d3975d0363c56589b5af3b0fb70afc8c2b98348971e4bdb1c1kernel-debug-3.10.0-862.el7.x86_64.rpm77c8a50ed95bd596778275d0e411fb0764659ab9cee0ff53e8b0d8d20381280fSLSA-2018:1099-1FirefoxThis update upgrades Firefox to version 52.7.3 ESR. Security Fix(es): * firefox: Use-after-free in compositor potentially allows code execution (CVE-2018-5148)importantScientific LinuxScientific Linux 7firefox-52.7.3-1.el7_5.x86_64.rpm2cc407d08ccb4711df7a3d9564aaa969de2f42ce167cf3cfcdc36e7b11b92975firefox-52.7.3-1.el7_5.i686.rpm071ff38d63c8866ce6177a77b809208f2c03dd8cad69902afcbd201fb266e694SLSA-2018:1169-1CorosyncSecurity Fix(es): * corosync: Integer overflow in exec/totemcrypto.c:authenticate_nss_2_3() function (CVE-2018-1084)importantScientific LinuxScientific Linux 7corosynclib-devel-2.4.3-2.el7_5.1.x86_64.rpm56669ca0e7bd499937c09bd701abc65b49da3a579249137ea18c187c5fd60eefcorosynclib-2.4.3-2.el7_5.1.x86_64.rpmb0604ae15d7e45296079a2c29176f99b8f804f33103bfe52b6cc8803bf2304f6corosynclib-devel-2.4.3-2.el7_5.1.i686.rpmedc2660d6cc89435d074a97040a62a5aa292240f01047c971633665d31079182corosync-qdevice-2.4.3-2.el7_5.1.x86_64.rpmcd1979538ab68c1ae1a1648dc09d5354c36475cdf0ccfa9256b5534935e0a067corosync-qnetd-2.4.3-2.el7_5.1.x86_64.rpma1a381e8d94a3196d07a4ee45076d65d010c6754d63f49ea348d3626db99abc0corosynclib-2.4.3-2.el7_5.1.i686.rpme6469af5a326000f6184abe8523d1446e8991f053571b053c0ae120797d85883corosync-2.4.3-2.el7_5.1.x86_64.rpmb8bf78232312631929cc84da8fa9b98d6ef8366fe600360ebc76b00fdeb910d6SLSA-2018:1191-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) (CVE-2018-2814) * OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) (CVE-2018-2794) * OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) (CVE-2018-2795) * OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) (CVE-2018-2796) * OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) (CVE-2018-2797) * OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) (CVE-2018-2798) * OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) (CVE-2018-2799) * OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) (CVE-2018-2800) * OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) (CVE-2018-2815) * OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) (CVE-2018-2790) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.criticalScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7.i686.rpmdd1162183e2263a79b6ee489827c7b8d8420026d36cc022e16e710c1a1631c96java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7.i686.rpmbfc3a546a42314ab9f23f6459983e3c0f9754c0014970803270c2c354843a31bjava-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7.noarch.rpmd70b5197f7e19c50d12922568dd459c8f34b2f6d3063ac81742b0b25aa042d23java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7.i686.rpm0febe62191b73dfae5ac9f697aa23118428595f9b4bfa804d67ad61728936545java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7.i686.rpmd4eee179095edfea0b7548a0ee9066ebf476d9107f42615d8788fc6be3da9d28java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7.x86_64.rpmbf876f7980e9cf1231eb5363c47faef771c6f880bc00df2fcb0905414b9208dfjava-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.x86_64.rpm80a2ff5b50740b246fbb3fedca09724f00921814ce2f57af9cc77160084d393ejava-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7.i686.rpm0414a83f155d515f203f45b7f7108ad3ed57e1717e4d42bedcf67be215f2ae9ejava-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.x86_64.rpm0f4d55e20e1661ffdddc81cd8f69ad58c6b4bb36fa7e2f8f46bdee5629a1a292java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.x86_64.rpm6188daeac7e0ef27a14f5569f8c0055ed0bef42d3b60e224c78988e440d85990java-1.8.0-openjdk-1.8.0.171-7.b10.el7.i686.rpm7309b8009d6fb87fe2e3ae2d6f7414a72c1b15b1af16a64f89942a61d212dc5ajava-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7.x86_64.rpmfc76914914bfefde5b678a28769734cae4b636b6edfee6d3b14159fd5336009djava-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7.x86_64.rpmf132e7896361bcf6cf33fcfa55bef55addc2bbb2fd29dc865de7749f6457f0dfjava-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7.i686.rpm5eefcb76a1b397482321d524f0fdaa5d84905b75777d285686767aef798c2bc2java-1.8.0-openjdk-1.8.0.171-7.b10.el7.x86_64.rpmc790944ba36ef80e73989e7f4e2f9577b69c40b906c284d408b98a893803dc5bjava-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.i686.rpm104899796257032ecaad8a3105dab00290d5302afd2053935f1464292af1901djava-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.i686.rpmfe344b011768922e793aa9b8a7bba8cae4d9d3317a7ade9b318c351be589e174java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7.noarch.rpm35eb6f88fa190e751d796de3426b3d64b1da83d89e361fd6602cdcfa6e740512java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.x86_64.rpm3e72bcef0d3341eb61813833fff1149656d0c47299deeb79670a4cc27e9b3834java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7.x86_64.rpm88d8b2d136b7b38ddfba5ca4c259d89da0d378e9a20a38e6d758cb67805379e2java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.i686.rpm2ecefe6ebeb5ba52962ac095cb004559f498a6fd0795aa6461b841009123bf64java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.i686.rpm468d1e5841308dbb45b1931dda51f3c1afd76d8fc239d198ae08d717ddc72bbajava-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7.x86_64.rpm51b71c800a873eacb061ed964397c47498f82eaf2d9b18a2811188949b88701djava-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.x86_64.rpm59c6e44a2fc3ec3d457b2166e1f5883241de596304a36416806e037883f0b50ejava-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7.noarch.rpm44004391fccab5cc3bf84c4b55f8b9d90db67d6997a249a9a14635224e3fc296java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7.x86_64.rpm4cbec44fd6369c731d3123f2f5cee08f84ccffbd658cf5f9fd0568655898a60ejava-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.i686.rpmd98723798e217b04f5ca31519ad92059dc73d037a7da623cf34d1e70e060dc21java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7.noarch.rpm04f083a1042ef9fe8ebf52a744109d856e12db788680d2398ea4f9cb955f4826SLSA-2018:1200-1PatchPatch should be installed because it is a common way of upgrading applications. Security Fix(es): * patch: Malicious patch files cause ed to execute arbitrary commands (CVE-2018-1000156)importantScientific LinuxScientific Linux 7patch-2.7.1-10.el7_5.x86_64.rpm1bf9c0f1a233c1f8e9256e7df8d5c5683b9093b2c779d48f86f9e5c98f95d7efSLSA-2018:1223-1LibrelpSecurity Fix(es): * librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c (CVE-2018-1000140)criticalScientific LinuxScientific Linux 7librelp-devel-1.2.12-1.el7_5.1.i686.rpmc736f758a0978b7604a8c8971fce5e4d041f11a7203487532b5d229bf59a79dclibrelp-1.2.12-1.el7_5.1.x86_64.rpm5f5bc431e27e21f7e06f6c16022b4335cef8a14dc737e35202ed211c0e09c06clibrelp-devel-1.2.12-1.el7_5.1.x86_64.rpma2a03251afcffeff0f70601ad152f5cfc11dbcdab22149299aecea8eb44c7bd7librelp-1.2.12-1.el7_5.1.i686.rpmed70fcd8412755bfb4f98e2e35976d8a1f3dd2fee607b96daf10696c77dad08bSLSA-2018:1224-1PackagekitSecurity Fix(es): * PackageKit: authentication bypass allows to install signed packages without administrator privileges (CVE-2018-1106)moderateScientific LinuxScientific Linux 7PackageKit-glib-devel-1.1.5-2.sl7_5.x86_64.rpmfb674f5ce0dc9bbb66a8385e3cfebcffe961ab29c86bd4744710ae7fed7b35a9PackageKit-yum-1.1.5-2.sl7_5.x86_64.rpmcce574cb7142fe1e8e47eaae6b80aca1b6871d6ed7d9567c69f0e718eee085b8PackageKit-gtk3-module-1.1.5-2.sl7_5.i686.rpm2b0468e703a71f4982fab37af5b916a577d79b3eb8a1e762bc788e1d0f7f76d6PackageKit-gtk3-module-1.1.5-2.sl7_5.x86_64.rpmd5526c4663f3b7df96f7a29d8b185ade334098c77f4bb785d517051757ee02b3PackageKit-glib-1.1.5-2.sl7_5.i686.rpm3f6151b10678ff05c5426f003cee59290a944fb637a87cd49fd9cb590be4c530PackageKit-glib-1.1.5-2.sl7_5.x86_64.rpm3f26eff29eed00ef0ef387fe591dd9b0196656cd0e2c602f1755ee3bbc1c636ePackageKit-1.1.5-2.sl7_5.x86_64.rpmbbeaee79ac05642289b90d38ea061cdcb4ca70ed80df6cceaac73a46bca29aa3PackageKit-1.1.5-2.sl7_5.i686.rpm31bfaa8f712df09b5b09c4ede228a7769366be1c28e481473eba52911b4dc74bPackageKit-command-not-found-1.1.5-2.sl7_5.x86_64.rpmd6a5ad4b9334942413266cfe4c39e8d785b6585d7f88c625586a6e116be93a2ePackageKit-gstreamer-plugin-1.1.5-2.sl7_5.x86_64.rpmadb9268c968165a428505355fb85d549be0839d0e66e8b9bb69802f9f50df2fePackageKit-cron-1.1.5-2.sl7_5.x86_64.rpm960139a32812444091a1612164a7c00df8048b2f83065daa116814f205a8a8fdPackageKit-yum-plugin-1.1.5-2.sl7_5.x86_64.rpm2069b74f338f7377101b8a23efdc5b6d7a7f2a2e3cc594ccf7a21e68e8dbb129PackageKit-glib-devel-1.1.5-2.sl7_5.i686.rpm40c08ff781378cfcb872dd616a8bce7e5cc7946efcc045f48b93e72611c1bad8SLSA-2018:1278-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) (CVE-2018-2814) * OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) (CVE-2018-2794) * OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) (CVE-2018-2795) * OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) (CVE-2018-2796) * OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) (CVE-2018-2797) * OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) (CVE-2018-2798) * OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) (CVE-2018-2799) * OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) (CVE-2018-2800) * OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) (CVE-2018-2815) * OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) (CVE-2018-2790)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7.x86_64.rpm9cdce41b9d7eefc9c549638c277211e07dd24610a45b70a0631361c2ea0eb417java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7.x86_64.rpm0f31a913d037ecc136f32c496919dd3b5d638cc33ce65e66722eccbb365a30c9java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7.x86_64.rpmaf9e493197ff05c868118a94a2e9414b21ec272a5fe7582006a79cc758346e6djava-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7.x86_64.rpmf16c439c67cf1048ce06e2d70d79f2c281aae61e0ed3ccf6779fcc31082fbdaajava-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7.x86_64.rpm264f285712dcc3d6f5e8ab7d7f4f21d34964fff1cccc8535317385a345b077e9java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7.x86_64.rpm8ebe99d58d0cea789f97b3fa790385d97db605c44c1f9dcb32607f5c2bc9faf3java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7.noarch.rpmd343897866a34c0d5d49237efb8b3ef212efebd77afff3a87146e9b7c6b50b13SLSA-2018:1318-1KernelSecurity Fix(es): * Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087) * Kernel: error in exception handling leads to DoS (CVE-2018-8897) * Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation (CVE-2017-16939) * kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068) * kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199) * kernel: guest kernel crash during core dump on POWER9 host (CVE-2018-1091)importantScientific LinuxScientific Linux 7kernel-abi-whitelists-3.10.0-862.2.3.el7.noarch.rpm189f87cf2bd9b23d4e8eec76884cd5a3579e69a0812898440a3b2f43df5edce2kernel-tools-3.10.0-862.2.3.el7.x86_64.rpm9a45f4a3e11383af0047a794f78cc9496c42f3454d489859fe886cf7e4ac97b8kernel-debug-3.10.0-862.2.3.el7.x86_64.rpmb1e589f751be619c57e73b00cfa63c8781dcb8a7f2b45bb94bbaf13a0b70554fkernel-tools-libs-devel-3.10.0-862.2.3.el7.x86_64.rpmb7d26ecd072e95dd50fed2a4af282476120baa47b77e14b14099d3194f9524a8kernel-doc-3.10.0-862.2.3.el7.noarch.rpm2cd8d59105d4d77e2457cfbf4e2e4a5eea2fceb1d67d85542560790f723957faperf-3.10.0-862.2.3.el7.x86_64.rpm1d83dab292017c9202e67ca1e46a909f41100545e9ef9e70e9f60386eb25ae40kernel-headers-3.10.0-862.2.3.el7.x86_64.rpm75a47b31ea487e5a759e05bc543e29773053ea174b77ec3409f7e8fe9571861fpython-perf-3.10.0-862.2.3.el7.x86_64.rpm04932ce8b294ec2d96d37671c89e067eaeb6082b4b119bb8388d2dea54b4a92ekernel-tools-libs-3.10.0-862.2.3.el7.x86_64.rpm90c21e11f71e088cc24ad55ca5cc9b3071ca9f6824660389f1e38f759b8de35ekernel-debug-devel-3.10.0-862.2.3.el7.x86_64.rpm41ee1efa783bb6b42c6b24603442d80886feabb847d202d3c98739a3b57bd008kernel-3.10.0-862.2.3.el7.x86_64.rpm0426b49b0d597c2a0ae75e6b58b5ca83d3545bf95fd9796891ba69b65fd5ee58kernel-devel-3.10.0-862.2.3.el7.x86_64.rpm279316b9d2625dc7e6cb29a7d965e87f2e9503922f346fe04c52f160bc6cd681SLSA-2018:1380-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: ns-slapd crash via large filter value in ldapsearch (CVE-2018-1089) Bug Fix(es): * Indexing tasks in Directory Server contain the nsTaskStatus attribute to monitor whether the task is completed and the database is ready to receive updates. Before this update, the server set the value that indexing had completed before the database was ready to receive updates. Applications which monitor nsTaskStatus could start sending updates as soon as indexing completed, but before the database was ready. As a consequence, the server rejected updates with an UNWILLING_TO_PERFORM error. The problem has been fixed. As a result, the nsTaskStatus attribute now shows that indexing is completed after the database is ready to receive updates. * Previously, Directory Server did not remember when the first operation, bind, or a connection was started. As a consequence, the server applied in certain situations anonymous resource limits to an authenticated client. With this update, Directory Server properly marks authenticated client connections. As a result, it applies the correct resource limits, and authenticated clients no longer get randomly restricted by anonymous resource limits. * When debug replication logging is enabled, Directory Server incorrectly logged an error that updating the replica update vector (RUV) failed when in fact the update succeeded. The problem has been fixed, and the server no longer logs an error if updating the RUV succeeds. * This update adds the -W option to the ds-replcheck utility. With this option, ds-replcheck asks for the password, similar to OpenLDAP utilities. As a result, the password is not stored in the shell's history file when the -W option is used. * If an administrator moves a group in Directory Server from one subtree to another, the memberOf plug-in deletes the memberOf attribute with the old value and adds a new memberOf attribute with the new group's distinguished name (DN) in affected user entries. Previously, if the old subtree was not within the scope of the memberOf plug-in, deleting the old memberOf attribute failed because the values did not exist. As a consequence, the plug-in did not add the new memberOf value, and the user entry contained an incorrect memberOf value. With this update, the plug-in now checks the return code when deleting the old value. If the return code is "no such value", the plug-in only adds the new memberOf value. As a result, the memberOf attribute information is correct. * In a Directory Server replication topology, updates are managed by using Change Sequence Numbers (CSN) based on time stamps. New CSNs must be higher than the highest CSN present in the relative update vector (RUV). In case the server generates a new CSN in the same second as the most recent CSN, the sequence number is increased to ensure that it is higher. However, if the most recent CSN and the new CSN were identical, the sequence number was not increased. In this situation, the new CSN was, except the replica ID, identical to the most recent one. As a consequence, a new update in the directory appeared in certain situations older than the most recent update. With this update, Directory Server increases the CSN if the sequence number is lower or equal to the most recent one. As a result, new updates are no longer considered older than the most recent data.importantScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.7.5-21.el7_5.x86_64.rpme951ce842cd3d6f67ef139d300d8483b6a8bf3b76635d30915fe5c7db3006cec389-ds-base-1.3.7.5-21.el7_5.x86_64.rpm162bec82fc86f8d76b09d515bf15d4f1f112f9125d17f619ec76bb0ac5b2931d389-ds-base-libs-1.3.7.5-21.el7_5.x86_64.rpm21c8ac942366ded74d91d93ccad9e6673313c7c53a627790e6c4aa0f16b5b9cf389-ds-base-devel-1.3.7.5-21.el7_5.x86_64.rpm8a1feca4ac85046b37c63e42ab1ea984c2687c64c6c300d7519f3e6fac842252SLSA-2018:1396-1LibvirtSecurity Fix(es): * libvirt: Resource exhaustion via qemuMonitorIORead() method (CVE-2018-5748) * libvirt: Incomplete fix for CVE-2018-5748 triggered by QEMU guest agent (CVE-2018-1064) The CVE-2018-1064 issue was discovered by Daniel P. Berrang (Red Hat) and the CVE-2018-5748 issue was discovered by Daniel P. Berrange (Red Hat) and Peter Krempa (Red Hat). Bug Fix(es): * Previously, the check for a non-unique device boot order did not properly handle updates of existing devices when a new device was attached to a guest. Consequently, updating any device with a specified boot order failed. With this update, the duplicity check detects correctly handles updates and ignores the original device, which avoids reporting false conflicts. As a result, updating a device with a boot order succeeds. * In Scientific Linux 7.5, guests with SCSI passthrough enabled failed to boot because of changes in kernel CGroup detection. With this update, libvirt fetches dependencies and adds them to the device CGroup. As a result, and the affected guests now start as expected. * The VMX parser in libvirt did not parse more than four network interfaces. As a consequence, the esx driver did not expose more than four network interface cards (NICs) for guests running ESXi. With this update, the VMX parser parses all the available NICs in .vmx files. As a result, libvirt reports all the NICs of guests running ESXi. * Previously, user aliases for PTY devices that were longer than 32 characters were not supported. Consequently, if a domain included a PTY device with a user alias longer than 32 characters, the domain would not start. With this update, a static buffer was replaced with a dynamic buffer. As a result, the domain starts even if the length of the user alias for a PTY device is longer than 32 characters.lowScientific LinuxScientific Linux 7libvirt-daemon-lxc-3.9.0-14.el7_5.4.x86_64.rpm174627d6e0a08c716d659e64f4fa0c0bba041ee4189b30e5149f050cfaebbca3libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.4.x86_64.rpm91269e39af37c30680f9673cc879e1f046f509ebdfcb63261b9701c3ddf65ea7libvirt-daemon-kvm-3.9.0-14.el7_5.4.x86_64.rpm7fac744a962d01966e59b50e82172cb8508cca10b1ff548c65218bfe78928903libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.4.x86_64.rpm8a424edd2b1ac51218992910b9bad6aab03cbf0af470030d0f0ab5fc7181af77libvirt-daemon-driver-interface-3.9.0-14.el7_5.4.x86_64.rpmedac5cfb44a0c4ea937e6d980b1c231c3b145ede7a26d65e6eb3c701569caaf2libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.4.x86_64.rpm8be1847ec910ddc6238b8abe2cbbe4801d9cff1828627c2129108ce62bce01c7libvirt-daemon-driver-network-3.9.0-14.el7_5.4.x86_64.rpmd6a36c86d853ce618a019248a505f9f6bff3baaef3446da5608af20aa8e8b89clibvirt-nss-3.9.0-14.el7_5.4.i686.rpmf597efc774c3aff7e954a3b9335f67508b350cd6f9115a7042efcfb1a7782e94libvirt-libs-3.9.0-14.el7_5.4.x86_64.rpmf13638aa120f84002585624e0cab5f25a2e9dffb88a1f2a53a4407dcbe3df2f5libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.4.x86_64.rpm49b8da4919b3636727bf915d08c9630b7c700455884242aef456e3e775ce57e4libvirt-docs-3.9.0-14.el7_5.4.x86_64.rpm063b4488fd06bce0eaccc5bb3f2709e506a2180a507863a6f24d614396068462libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.4.x86_64.rpmdaf97898d532686363cf92bea1c733e4ca0fa84efe0b9243689fa241a31ac078libvirt-client-3.9.0-14.el7_5.4.x86_64.rpmd9c9b8747760dfffa42e62999e168faf284dfc2fa445e26ff090ba51be8c91e9libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.4.x86_64.rpm849e3fbf3a3061495371fe31b2c78ce1437cead122c9a7ead773b4316afe0930libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.4.x86_64.rpme3da40d559333cfbfa96d4eb41b988b53600a7b0afa8b48b0a04a3e0a51ca573libvirt-libs-3.9.0-14.el7_5.4.i686.rpm7093ba44ae8bdb52d48724f090957267015b194e6ce7ea3467e36c82862c5abdlibvirt-nss-3.9.0-14.el7_5.4.x86_64.rpm3a4d02daccf51b6b0f0ffeb5d8fe067150a7ddb4664257da08908e2950a56a29libvirt-daemon-config-network-3.9.0-14.el7_5.4.x86_64.rpm1b325edd67c477c1d7039a49616f98abe5904006d7cd8a04262f4285c1a0cb59libvirt-client-3.9.0-14.el7_5.4.i686.rpm6b3fbe2d8adf3f0397e776c13c90f69f11fd6956a8f7c9b3b4d150957da0b860libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.4.x86_64.rpm518ba9e25c3c9685e22f3197a470e8a3ce547dbbb1d3c0a45f2ba3ecd7675785libvirt-devel-3.9.0-14.el7_5.4.i686.rpm25df98d4c8bcdd45eedbbf212601c488b77cf83f4b4763e06a5d4d9b9e7382felibvirt-daemon-3.9.0-14.el7_5.4.x86_64.rpm39d315d99174ea1728d4ce342ff4c40572327462a25a6abff51c4d2f276a8a28libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.4.x86_64.rpm9347919a46f386b962cb174c6b098edbb605ad2152a21856d7a710b4ded4fabclibvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.4.x86_64.rpma64ea16b65634ebb76ab70e4e560629de06814d81a62e4c8041047188268325blibvirt-daemon-driver-lxc-3.9.0-14.el7_5.4.x86_64.rpm012e812e9c4c0840eb55146245a091bb7296564f41c9e2cfde3ae46a123d6e95libvirt-daemon-driver-secret-3.9.0-14.el7_5.4.x86_64.rpm880dcbb7e5ec4f1151beae0000a7e9f2dd533590e8476c24259f217a2225cd79libvirt-devel-3.9.0-14.el7_5.4.x86_64.rpm2a95d2f684b7e9d6b9a27b9bd9d228a4d4ff74a4afb2d842153c01375be430b3libvirt-3.9.0-14.el7_5.4.x86_64.rpm7188afc124a0a0d874e2836cd6d42231449074d7f03f804b8d2bac07507fa560libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.4.x86_64.rpmbe87d66b98bb2ad5529523664c2873b2e82ec67430cf056cb18b304f94899dd8libvirt-daemon-driver-qemu-3.9.0-14.el7_5.4.x86_64.rpmb0a9b7afa13cbd748d05043e8239145cfb4c76abe24c89fc539993780ab7f0belibvirt-daemon-driver-storage-3.9.0-14.el7_5.4.x86_64.rpm8862e69fef8cd56555358388bc317723ff6fdfd96b83c0877fecffb5b0ffdb38libvirt-lock-sanlock-3.9.0-14.el7_5.4.x86_64.rpme0c9cb3806594d6e7684b3658c3c0aaf8d05e28cc140c91141fe6d2b367963dclibvirt-admin-3.9.0-14.el7_5.4.x86_64.rpm9a82fb8aa17bfb014a0b5bf161c7995d11bb8da441043bfdb74ca4247beebc26libvirt-login-shell-3.9.0-14.el7_5.4.x86_64.rpm54d6a5bc803dd18d92bbaac2377fc29c4b47732692f05713c2c23e5ea91e5ac8SLSA-2018:1415-1FirefoxThis update upgrades Firefox to version 52.8.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 (CVE-2018-5150) * Mozilla: Backport critical security fixes in Skia (CVE-2018-5183) * Mozilla: Use-after-free with SVG animations and clip paths (CVE-2018-5154) * Mozilla: Use-after-free with SVG animations and text paths (CVE-2018-5155) * Mozilla: Same-origin bypass of PDF Viewer to view protected PDF files (CVE-2018-5157) * Mozilla: Malicious PDF can inject JavaScript into PDF Viewer (CVE-2018-5158) * Mozilla: Integer overflow and out-of-bounds write in Skia (CVE-2018-5159) * Mozilla: Lightweight themes can be installed without user interaction (CVE-2018-5168) * Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension (CVE-2018-5178)criticalScientific LinuxScientific Linux 7firefox-52.8.0-1.el7_5.x86_64.rpm69bd61ea3fd15e54faf78b346ae8ec868184f3955bd94b2ac450ed58ae188d31firefox-52.8.0-1.el7_5.i686.rpm31ed8d356b84291ccc75a8e5ca691ba045d987fa7df8fca1259e20a84c10503dSLSA-2018:1416-1Qemu-KvmSecurity Fix(es): * QEMU: cirrus: OOB access when updating VGA display (CVE-2018-7858)moderateScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-156.el7_5.1.x86_64.rpmda99389da4d4633be047462da30cbffa0478c55486503808c7e4fe2f7232445dqemu-kvm-1.5.3-156.el7_5.1.x86_64.rpm32d8eb23751fbb7080d273c9051b829fb8dd6d61f289f73c930fce5c9ff930e0qemu-kvm-common-1.5.3-156.el7_5.1.x86_64.rpm1594bcecedaa6bba5d62ae0436d84eed0683597e69bd027d64ac333dc0f1a82fqemu-img-1.5.3-156.el7_5.1.x86_64.rpmfee7b10b7399f039b2421b284107514db5de0edf563fc228f24cc36e5f2e6b3dSLSA-2018:1453-1DhcpSecurity Fix(es): * A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Scientific Linux. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol. (CVE-2018-1111)criticalScientific LinuxScientific Linux 7dhcp-libs-4.2.5-68.sl7_5.1.x86_64.rpm8ff4b69e890a8f0109e9fb01b7b3e74cf965f86b9ed1254f8c77c67571f006f4dhcp-libs-4.2.5-68.sl7_5.1.i686.rpm5a528d86e3ceb7e451fbfc46a09d3bd23aa093a77fbcd524e5ea89c4f5feb060dhcp-devel-4.2.5-68.sl7_5.1.x86_64.rpmf15f0097941f3c8561af7ed28d5cd3e4ca8b04899d290ee83099eee0df76b8e0dhclient-4.2.5-68.sl7_5.1.x86_64.rpm20516e8aab3f77ae33f30010b480c6e0026170860b9e9f7ccbfda56f2b23eddfdhcp-common-4.2.5-68.sl7_5.1.x86_64.rpm57c15e95e2501176dba70240bc85155d65a797a06a9fcdca1d7963b14a3dab50dhcp-4.2.5-68.sl7_5.1.x86_64.rpm5508364eba3eaab2b4abcec98c12b6213d810bdd62617a9d44d4a61794f5fea1dhcp-devel-4.2.5-68.sl7_5.1.i686.rpm23a9f657fd9e4f00d05fa32fde9189aec6858a60795398f813eaccbacc500026SLSA-2018:1629-1KernelSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact. In this update mitigations for x86-64 architecture are provided.importantScientific LinuxScientific Linux 7kernel-debug-3.10.0-862.3.2.el7.x86_64.rpm25371ac66689e6413aee295d511b2eda789ff6d4e6797d2d2ba1eada9e6645d6kernel-abi-whitelists-3.10.0-862.3.2.el7.noarch.rpm7f7c696167a149493c81b7d189d678be3a613ea37af88a53937d99b707747aa6kernel-debug-devel-3.10.0-862.3.2.el7.x86_64.rpma8fb532b0177ae04269962531a37f403b59ba525325b54eb897ac81baffc0824perf-3.10.0-862.3.2.el7.x86_64.rpm99c1f640691273de40c6088fad258162167263084f0863db4eb545d7abe5aac0kernel-tools-libs-3.10.0-862.3.2.el7.x86_64.rpm372812c202de872faff70a19e9310b67a2b34c479c30495d83e33d4544364e22kernel-doc-3.10.0-862.3.2.el7.noarch.rpm22c1153a7c085e8df4e172adbdaad7968b023a1db06934d7b0827d594a380b94python-perf-3.10.0-862.3.2.el7.x86_64.rpm5186bff828f7d682029129a711dec2cce3ea2e5a04dcab306ad40ff7d66f46b1kernel-headers-3.10.0-862.3.2.el7.x86_64.rpma735351a9dfdae49a97856ec6baf4151b841a1856c087d60f7617b3c2b9eef8fkernel-devel-3.10.0-862.3.2.el7.x86_64.rpmc31bb2bd90c8972bad25815559fb9a76e11da1a0b7475ea11df692262f4f9b7dkernel-3.10.0-862.3.2.el7.x86_64.rpma99da56ca70bae10041a3560a9895c30832a818c642b8142b759389b3ef8c4aekernel-tools-libs-devel-3.10.0-862.3.2.el7.x86_64.rpm9bb13eb0883686bd2c3d0c87d98e09afb9539c2c303b8350981c149f02c10ba7kernel-tools-3.10.0-862.3.2.el7.x86_64.rpm335c4cd24cceed916947d6807e309dd08d79c7e5ef4801ef3a2fd435158c70e0SLSA-2018:1632-1LibvirtSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) Note: This is the libvirt side of the CVE-2018-3639 mitigation.importantScientific LinuxScientific Linux 7libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.5.x86_64.rpm880591e772f5051811df83ceff0123daec50c9703e252898c6310d5162e5ccb8libvirt-daemon-3.9.0-14.el7_5.5.x86_64.rpmb3c994a5c0091b64b08e4a69b228dd999b3a7e32f009ea4b10bedebd394b3768libvirt-devel-3.9.0-14.el7_5.5.i686.rpm6e60454d128fc119b75d00657927e1a6fa6bd8cbad3d8324e5c1045d5b055660libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.5.x86_64.rpm68d3a74485476cf43da87c1d9dae6141110b911e6dab1f11950513bd6e4a60a9libvirt-libs-3.9.0-14.el7_5.5.i686.rpm55775f86341d3b288d44a7f89bb7a1b057000c873fa44abeefff38592aeb4b7alibvirt-daemon-kvm-3.9.0-14.el7_5.5.x86_64.rpm8a8a7deef491532bdd56cc5e170a764b3db8896fa45bc3baf3e4933748db9718libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.5.x86_64.rpm29f7d434154999d0c35388c60e09ac7c5161a2c7a29d233ff5036a5b8b77375elibvirt-daemon-config-network-3.9.0-14.el7_5.5.x86_64.rpm8ac5e152f50fe2a1d37417845b8483134c36bf6b2862927fb42792454c38a2e2libvirt-daemon-driver-storage-3.9.0-14.el7_5.5.x86_64.rpm9fae6e4d80f56fa47870807eebc38635f3bcc0eb4e490531c5376e569146fac8libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.5.x86_64.rpm607db5dbe0fb795643a576d37549fa126170d548cbcb44fc941ef0e0259bdf1elibvirt-devel-3.9.0-14.el7_5.5.x86_64.rpma99c75c97916a0d1f68d1d37450661c023706cfb457130827900a7010dacf375libvirt-login-shell-3.9.0-14.el7_5.5.x86_64.rpm881daea0c72926512883cb0c82e4ab437c47f29cda7253a342f27a86641d5033libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.5.x86_64.rpm0f52f8093aa513085f85cf21dd189c81f6241d716a1dbdf8cc2d240b39346732libvirt-lock-sanlock-3.9.0-14.el7_5.5.x86_64.rpmda1de8b7ed0fcdf5b9f63fdbf1710e67b04c55872acf4567cb86f50db9c61672libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.5.x86_64.rpm577e6bbd1a6dc6b26c652eae73152092d357de638626f7f622d0edda566507cflibvirt-3.9.0-14.el7_5.5.x86_64.rpm67b8f269e2cad83fc9cdfa34eb5a7f51c744264b7fe6eafc841a87543e10a046libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.5.x86_64.rpm7b2461fbe41097beb5f47dea26c51ba405995fadbee03b621c705a1f9563bbablibvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.5.x86_64.rpm7fb4cc383a6202b81c80b0d68bc2976ea99ff3de2e25b766485d22660e62f809libvirt-daemon-lxc-3.9.0-14.el7_5.5.x86_64.rpmd02d11f93164e661621593cac5ec693c338c3b13e445fbec5f5232c60e240f8elibvirt-client-3.9.0-14.el7_5.5.x86_64.rpmf026e052d382bdbab344866afda714244cee0e2725232158f8fe7d035f8ae45blibvirt-nss-3.9.0-14.el7_5.5.x86_64.rpmae92c8c94603cc9a75e449cd36c3f8ba4d1d42a0da8a012c2bd576ecb427282clibvirt-nss-3.9.0-14.el7_5.5.i686.rpm9fb72c0f06a78155c6f011ace1a7412c1d746f2f3f3e0736ab1928b501755392libvirt-libs-3.9.0-14.el7_5.5.x86_64.rpmcec0014f62995cb54b88946c3be8fb9bc1e2708f38854faf396f917ac99d6e97libvirt-daemon-driver-qemu-3.9.0-14.el7_5.5.x86_64.rpmc28f9dc7c8267e5a19cc5a355606584fa22795fe5f0fb6d46decc2399b63956alibvirt-admin-3.9.0-14.el7_5.5.x86_64.rpmed3159228590f365ba7847e3137cd03cabd3c7d3a78b9fcbb15dcb0d502b8f4alibvirt-docs-3.9.0-14.el7_5.5.x86_64.rpm7cb7ccfd02b47e7f56a06491da96994f026ab7cb218ff104c03a95229ba4c911libvirt-client-3.9.0-14.el7_5.5.i686.rpmd43dd6ba7d04033df8aeefd0217dab4c78e670dfb9014518681e458c98a6cfb2libvirt-daemon-driver-secret-3.9.0-14.el7_5.5.x86_64.rpm19113e3891ff688500f6637d66deea5ba1eab4ec671463add8e56b0bd82f3e1flibvirt-daemon-driver-interface-3.9.0-14.el7_5.5.x86_64.rpme63da7aeb9c56a464c71476599eda1a6a3611cadee58be3f6dbbd03f74eec079libvirt-daemon-driver-lxc-3.9.0-14.el7_5.5.x86_64.rpm5c0a7741e6efd82878abf597a6273c41f5c82b34a1f7958cb00f734a41394865libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.5.x86_64.rpm986db0c0af33ec45a763be87b7c643cfa8b9f301af96d51ec162e512410e05c5libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.5.x86_64.rpma212a5983c6ea3582d939898987f6a19225b3c97e0f21e981a8f1c3d2c76ca43libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.5.x86_64.rpmaace95d9840377e62368ab61b5a20af3017886530ea118b5178f407e2faafb89libvirt-daemon-driver-network-3.9.0-14.el7_5.5.x86_64.rpm22f7c6de729e685452ecc315c358e8bbc224602f5777e33a8cf9941d9181ed47SLSA-2018:1633-1Qemu-KvmSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation.importantScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-156.el7_5.2.x86_64.rpmc6f9c71b979848b0974b11a03d3b74e098f25066262e52eb69bf939ecc097460qemu-kvm-tools-1.5.3-156.el7_5.2.x86_64.rpm032daf4c92452b5b5c42203cef99ce9e22e63a74a53ef00cdf08d2841aa95a5fqemu-kvm-1.5.3-156.el7_5.2.x86_64.rpm82fe86bf2269d1964ff2b9769b404cdec82d3e292cb4fda0269fd1df87440458qemu-img-1.5.3-156.el7_5.2.x86_64.rpm434d430ab7e852d0926b5472ba67d60af4e9f896fed5caa484a796d8a6f533b4SLSA-2018:1648-1Java-1.7.0-OpenjdkSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm98c33b111862bff43ed2390031c1dc00c8acd97bbf2ba9f9d6ac8d00ffa2683ejava-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.8.el7_5.noarch.rpmf866f9a7785cf046db7ab8322bab40fd2b622a578f161c7cd86b224334825c0ajava-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.8.el7_5.x86_64.rpmdc783901ef3a8c037207f408a0225ca8ab8095a9b23133e06a6879b2f85121ddjava-1.7.0-openjdk-devel-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm5fca539272c7d451566cc5e3173cc545fd8f2686e9d1fd4694ec585d795e8f6ajava-1.7.0-openjdk-headless-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm5a67c447648317e475585db6006b0066294fa7e563836d98fe18a989348b7b5ajava-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm43490f9905a993748e8c9afeed2f314893ccccf433db6ea77c442393a7ff507djava-1.7.0-openjdk-src-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm67efdfe20d8a7baa75701c1d71bf6d446af60bf425e96577a359e8b295e110efSLSA-2018:1649-1Java-1.8.0-OpenjdkSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5.x86_64.rpm7b9559d5d37bc1bf9f2950168a51164f974cd0547dff18a2523d4a24a178d745java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5.x86_64.rpm1e8609e4fa7da5905d0523cf688e1f29092f8700374d8ae0e7b36b11f36eed50java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5.i686.rpmba4084a6bedfc7d5332adf44310359aa21e26ff676652067c040f9555347241bjava-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5.i686.rpma548a47a5c1b8458fe4c41684602016336fa9739389964b7e0387b1e24453fe7java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.x86_64.rpmfc4ccf47c35a4e902b8d5b28a552cd7921efdefbbf9b08acf8519bf6b4dd4296java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5.i686.rpm06fb36213b2d5c6fe218dea8e9b7d539693be94a50e93cf1931f9f362bc08065java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5.i686.rpm35f698593274f78d0b9997de93bafb5274a07a50064ae15f3d75a0503d027a8bjava-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm0d2806735af6b0bf053424e601a8e4cb382e5cec9a696bfee9a167e6cb207484java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5.x86_64.rpm374af7d20e7f59b871110ba79cc56f5fea1cc190fa72b745455a5353be4db051java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5.x86_64.rpmcee730ad5eb50183b8ccf014ddb453f9d45f4c8ecd442f9677573381beb0b55djava-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5.i686.rpm0277801694ca565278981399e3239be7328582a2fe2d1255f8194f582c553145java-1.8.0-openjdk-javadoc-1.8.0.171-8.b10.el7_5.noarch.rpmb3e35b015c3460804146f0d0ebb32d365c213d16b9acf4a18545bb9d21abf9a2java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-8.b10.el7_5.noarch.rpmf609d73d4f68c3ea108bdbde2a8f69ccfd8c3b675d8a9417938cd5bacee0c8a3java-1.8.0-openjdk-javadoc-zip-1.8.0.171-8.b10.el7_5.noarch.rpm3730ad8a11a52f0f0a43ead4040dc3af03fe1868750ac3ef0427c895056c6e94java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5.i686.rpm490f374d0a1bdad12556e93c5d9b5daf150c37b00c7972deb38ffa738e8f4fb2java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5.x86_64.rpm0c6c801d2d803bb86dda350e7bcf0d30a0436a5c0360fafdc24b093539dcb32fjava-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5.x86_64.rpme0463ce538032cf511af06f955651a583d20ecb5a20ff5c6cb2e408c00c893afjava-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5.i686.rpm2a7ba1e9fa22a75025eaef8bb899e9526efaed9c2c3ee2981174f148453c5966java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5.i686.rpmdfaa09b983836aa2b9f2f7f0e539aee8a93aa142a701ece1936da0fdcdc2b93ejava-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.i686.rpm63c8e2e0a22fe5b44381149c0ab866e98b784ae946c7f161b8b68312e1c54bc3java-1.8.0-openjdk-javadoc-debug-1.8.0.171-8.b10.el7_5.noarch.rpmb62204619eac07b68efc923edb56433e7b8731c60950e4c5ee0025e463c7166cjava-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5.i686.rpma171f47e69a88545f9010ede8d86aca67f709699a7f4dab84b128611df899df8java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm3711355fe43309c73e245219538f9c1ab1056ea2ececb4c9597fb03d04ba60dfjava-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5.i686.rpm8a468360c6c5f4f54f79e0e12ebb20ed053a4d38511ba7ff3c99a4b60358846cjava-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm95d7eb9b1fd42ff070a2955ac7e5c9816974b6f657af2f2593a54097e1247acejava-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5.x86_64.rpm08dba4d127268595ed465c99f280de1620ec5baa8155b97cbfa45e77afffaae3java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm48e4791a18b0543749c99e1b6b66fdc937481be1455a68961e11ec4ab6aaea4ejava-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5.i686.rpm5005b12a0b1bc8ccfe430310a0a949616c603df81ce10d69d68a4ca174046ee5SLSA-2018:1700-1Procps-NgSecurity Fix(es): * procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124) * procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)importantScientific LinuxScientific Linux 7procps-ng-3.3.10-17.el7_5.2.x86_64.rpm517fbebfb1d08f9608924d9707c4582e65603818078eb1bd4a9438b805d786ceprocps-ng-devel-3.3.10-17.el7_5.2.x86_64.rpmc724a7d66b812a45a9e079d745cb1e825325ef1dd1697d70ec605083aed6c598procps-ng-devel-3.3.10-17.el7_5.2.i686.rpm1e2e59398021d89d355e5e338c8be81e781f7a0bc6e97cf874a225479b16a9faprocps-ng-i18n-3.3.10-17.el7_5.2.x86_64.rpm60104b20d7326ef3ad17ef99597cc0239ed960e29b9702312cd45ecd2be3ccc8procps-ng-3.3.10-17.el7_5.2.i686.rpm049bcfc751c6d69b3aae3e6ec6335a6c4e80c8a18141f4639f78a5e64e561303SLSA-2018:1725-1ThunderbirdThis update upgrades Thunderbird to version 52.8.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 (CVE-2018-5150) * Mozilla: Backport critical security fixes in Skia (CVE-2018-5183) * Mozilla: Use-after-free with SVG animations and clip paths (CVE-2018-5154) * Mozilla: Use-after-free with SVG animations and text paths (CVE-2018-5155) * Mozilla: Integer overflow and out-of-bounds write in Skia (CVE-2018-5159) * Mozilla: Full plaintext recovery in S/MIME via chosen-ciphertext attack (CVE-2018-5184) * Mozilla: Hang via malformed headers (CVE-2018-5161) * Mozilla: Encrypted mail leaks plaintext through src attribute (CVE-2018-5162) * Mozilla: Lightweight themes can be installed without user interaction (CVE-2018-5168) * Mozilla: Filename spoofing for external attachments (CVE-2018-5170) * Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension (CVE-2018-5178) * Mozilla: Leaking plaintext through HTML forms (CVE-2018-5185)importantScientific LinuxScientific Linux 7thunderbird-52.8.0-1.el7_5.x86_64.rpm56b27c03046e0f2cb8a9a95b5d32c3600078e929648129a5ca8f67f4aa3cb1ebSLSA-2018:1780-1XmlrpcSecurity Fix(es): * xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag (CVE-2016-5003)importantScientific LinuxScientific Linux 7xmlrpc-server-3.1.3-9.el7_5.noarch.rpm8713eeb55cfe3951bb3936e65cc6de0385703c36a1c35059c2391f7d112819b9xmlrpc-client-3.1.3-9.el7_5.noarch.rpm0d98ef4f4042328c3a528b64f1fa3d6f6dc9bfca79513463cf2ac46bb71193caxmlrpc-common-3.1.3-9.el7_5.noarch.rpmf01614a98b8f52a408a949cf2469dcd0664d98837f14bfdbdf4109dee533549bxmlrpc-javadoc-3.1.3-9.el7_5.noarch.rpm5a99bad47d0d265621402dfac43b0958c15bd390444f1a3102ad805e8dade15aSLSA-2018:1836-1Plexus-ArchiverSecurity Fix(es): * plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)importantScientific LinuxScientific Linux 7plexus-archiver-2.4.2-5.el7_5.noarch.rpmb9ff0d5e282c0e8ac3b94cb83dcc1d767bb7fe8ca700cfd46b746624ac8cd35eplexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm64f255787bc562d507e4aa30d846bb6b4637aee4f8d7027620777b760b7b3c94SLSA-2018:1852-1KernelSecurity Fix(es): * Kernel: FPU state information leakage via lazy FPU restore (CVE-2018-3665)moderateScientific LinuxScientific Linux 7kernel-devel-3.10.0-862.3.3.el7.x86_64.rpm9b32fc782a485e4f7b953f2dab897d067b7e24965b3ed8f5eefdc22c315e0591kernel-tools-3.10.0-862.3.3.el7.x86_64.rpmbd5385fb0be3b368f930a1a047d6b2257aee78c9dfda3b2c90d6b838f8dcedcekernel-tools-libs-devel-3.10.0-862.3.3.el7.x86_64.rpme85649104f5abf52387e279f0771fb049031de098349434480be6c3544a1e771kernel-3.10.0-862.3.3.el7.x86_64.rpma586afaaa05acada487fa3f4896285d16261e775f420c5612adf2cad935006e8kernel-debug-devel-3.10.0-862.3.3.el7.x86_64.rpmd9d0116298a25dc2840bfdc144cc5957584f3a989d9b1289e066c93d4886f8c3python-perf-3.10.0-862.3.3.el7.x86_64.rpme90be9b26d66c1865b41403a04563284f1a7312c8c13e8bbdcda864836033c8akernel-doc-3.10.0-862.3.3.el7.noarch.rpmba5a4a45a26dc3dc0c1902c450a65174554ced7a13711c923b440298267c4a24kernel-headers-3.10.0-862.3.3.el7.x86_64.rpm4dece7f9bc150b7e9964c4b822f7ea25ca3e617f3dc61f4ba1f191cc59379dddkernel-debug-3.10.0-862.3.3.el7.x86_64.rpm8d5fe5e64cf4bb64419be5c57c248523be1a65ebeebee827ff89ba4e8e042d03kernel-abi-whitelists-3.10.0-862.3.3.el7.noarch.rpm5e219d10faa5c33d37fa2e9e520b57440812533628aebfaff6f886c4dd2a4ae2perf-3.10.0-862.3.3.el7.x86_64.rpmb47c1052f5abfc8842347a860b79a98bd334b8b6e91dd60ca2d6d0b3d62963e9kernel-tools-libs-3.10.0-862.3.3.el7.x86_64.rpm3c524e8ee8559f9d6d04541fe55c5f16a4d773a620b44638052340a476440d4eSLSA-2018:1957-1GitSecurity Fix(es): * git: arbitrary code execution when recursively cloning a malicious repository (CVE-2018-11235)importantScientific LinuxScientific Linux 7git-email-1.8.3.1-14.el7_5.noarch.rpm4e1eb28880ab7e8d68d7ea0399369f2d6d7c11abf0f57ce320b179523da92336perl-Git-1.8.3.1-14.el7_5.noarch.rpmdb76da7c88efb9d33c4096e7c16f661846239074e79f736953f0c0cee81ce67bgit-hg-1.8.3.1-14.el7_5.noarch.rpm3671de306b0ebe40e8897bdeedf68a030f35d88325e9418e1cc262913d365851git-p4-1.8.3.1-14.el7_5.noarch.rpm3dfb02d8c7f7ca5b784687b014b5d9d52c48d057d83d75a951d96039ffea27b4git-1.8.3.1-14.el7_5.x86_64.rpm48fea71ea920f4e4cedbec5731f97c14405927de9565ee8749d3e315fd00f722git-cvs-1.8.3.1-14.el7_5.noarch.rpmc4b5dc95fc376fc345a69755ef972517a33c20f5877b7c5ac1f82b1823a71e39emacs-git-1.8.3.1-14.el7_5.noarch.rpmddc2dfb4b919aab9add7cd9e5a4ef86ea5d1ea41fde98531a78e7a5050c4b4e4gitweb-1.8.3.1-14.el7_5.noarch.rpm178cfe185259d928b701961c76def2dcaa3f3d7dbfaf8c9591ead42a78827a34git-svn-1.8.3.1-14.el7_5.x86_64.rpm168aba5f0a14349a2ae30e28bb944d309ab6e757d8bf361f134896026a1c31edemacs-git-el-1.8.3.1-14.el7_5.noarch.rpm30a795f50ee03e69ab1573599804700d4a136e3958f02c91666b6b23b58c1008gitk-1.8.3.1-14.el7_5.noarch.rpm1f64ac713d605efbc0e9d17ccdcb150ff5227fb41d5aa247db94c2da5863fedfperl-Git-SVN-1.8.3.1-14.el7_5.noarch.rpmebf6a9d86925631d193a2680ca78502e0a5ad4cbc0746005b5939f801906a8d5git-daemon-1.8.3.1-14.el7_5.x86_64.rpmb017f182e06b68c1cca028a96217110e85b5acb15bc9944b3afc1d23aa812b4dgit-all-1.8.3.1-14.el7_5.noarch.rpm91ab43e48135962114c738da479dffc0ac1369e4bfc1fbc6c7bd83604a310b69git-bzr-1.8.3.1-14.el7_5.noarch.rpmeeafc3ac4d2208038707d3b1d1d91129c31eafaef722fb74e2b47f8120b4b457git-gui-1.8.3.1-14.el7_5.noarch.rpm1e93e59228bc71cf6e92d1dd21f27cba148ef54ed922cb869e9e2e1205d2e8c8SLSA-2018:1965-1KernelSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC, x86 AMD) * kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message (CVE-2017-11600) Bug Fix(es): See the descriptions in the related Knowledge Article:importantScientific LinuxtrueScientific Linux 7kernel-tools-libs-devel-3.10.0-862.6.3.el7.x86_64.rpmc1263565ee70e5e35cc456e1ad091dd41472625b162fcbe55c67e73dc72d1130kernel-debug-devel-3.10.0-862.6.3.el7.x86_64.rpm2c159fb363dc88cf096419e14410317f70596e61a59c6938a5ba2c9fce84cb9fkernel-3.10.0-862.6.3.el7.x86_64.rpm453d3a410240342190ef4367ee0dc19c7f84fc96f426f7d24a133ab96d7a8402kernel-tools-3.10.0-862.6.3.el7.x86_64.rpm776a532620ad1213682b6b6a3a6322a78b604465f0fccdb54ed83cde2f9faf03kernel-tools-libs-3.10.0-862.6.3.el7.x86_64.rpm13fc7e18e61a364aaa5f288947d676aa4b84f5cbedc15f511738bc9936806c5dkernel-doc-3.10.0-862.6.3.el7.noarch.rpm06eeaf1f1713fd956b323e1f15701f036811e3d2662b5b3ee239e0c0488056ddkernel-headers-3.10.0-862.6.3.el7.x86_64.rpm3d9489c1830726b24ee7f6d7de03ce4192f5b6455f7abecd7487250aa1601f56kernel-debug-3.10.0-862.6.3.el7.x86_64.rpmcd8aa3a5d401ae5a20c7d1c1342a27279c95018053926f776b80814d4c7f1ec3perf-3.10.0-862.6.3.el7.x86_64.rpm9a9204a2b80a8bfb723aca294fb395a150e86d7748ff5745ea7d244ca18e0aadkernel-devel-3.10.0-862.6.3.el7.x86_64.rpm26419618715c8b6b6d1d727fc847fed1b4f74a5932a58fdc24c54b6e8c937e5fpython-perf-3.10.0-862.6.3.el7.x86_64.rpm2c5de5da7ec2901998591baf26a7d5dfb70e0fac602a75576aaac09801153e26kernel-abi-whitelists-3.10.0-862.6.3.el7.noarch.rpmad7a486184d1c2f1972eb3029c8045c5a92f0c108acaf8a30b2befe9f8b4c373SLSA-2018:1979-1Pki-CoreSecurity Fix(es): * pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access (CVE-2018-1080) Bug Fix(es): * Previously, when ECC keys were enrolled, Certificate Management over CMS (CMC) authentication failed with a "TokenException: Unable to insert certificate into temporary database" error. As a consequence, the enrollment failed. This update fixes the problem. As a result, the mentioned bug no longer occurs. * Previously, Certificate System used the same enrollment profiles for issuing RSA and ECC certificates. As a consequence, the key usage extension in issued certificates did not meet the Common Criteria standard. This update adds ECC-specific enrollment profiles where the key usage extension for TLS server and client certificates are different as described in RFC 6960. Additionally, the update changes existing profiles to issue only RSA certificates. As a result, the key usage extension in ECC certificates now meets the Common Criteria standard. * The Certificate System server rejects saving invalid access control lists (ACL). As a consequence, when saving an ACL with an empty expression, the server rejected the update and the pkiconsole utility displayed an StringIndexOutOfBoundsException error. With this update, the utility rejects empty ACL expressions. As a result, invalid ACLs cannot be saved and the error is no longer displayed. * Previously, due to a bug in the Certificate System installation procedure, installing a Key Recovery Authority (KRA) with ECC keys failed. To fix the problem, the installation process has been updated to handle both RSA and ECC subsystems automatically. As a result, installing subsystems with ECC keys no longer fail. * Previously, during verification, Certificate System encoded the ECC public key incorrectly in CMC Certificate Request Message Format (CRMF) requests. As a consequence, requesting an ECC certificate with Certificate Management over CMS (CMC) in CRMF failed. The problem has been fixed, and as a result, CMC CRMF requests using ECC keys work as expected. Enhancement(s): * The pkispawn man page has been updated and now describes the - --skip- configuration and --skip-installation parameters. * With this update, Certificate System adds the Subject Alternative Name (SAN) extension by default to server certificates and sets it to the Common Name (CN) of the certificate. * With this enhancement, users can create Certificate Request Message Format (CRMF) requests without the key archival option when using the CRMFPopClient utility. This feature increases flexibility because a Key Recovery Authority (KRA) certificate is no longer required. Previously, if the user did not pass the "-b transport_certificate_file" option to CRMFPopClient, the utility automatically used the KRA transport certificate stored in the transport.txt file. With this update, if "-b transport_certificate_file" is not specified, Certificate System creates a request without using key archival.moderateScientific LinuxScientific Linux 7pki-base-java-10.5.1-13.1.el7_5.noarch.rpm041655e7cf63f7c0b3dc984087d04bba653d52223c85dfafd7a4c4ffdb3977d3pki-kra-10.5.1-13.1.el7_5.noarch.rpm6daab18699eed43ec273147d20d44a37e452eaafa5f34670fe94a88df76e6bc4pki-tools-10.5.1-13.1.el7_5.x86_64.rpmcdc12bcca6cbc151e0817a1837d9f3adefc9fa9ad3752d6751ba127d70b27a53pki-base-10.5.1-13.1.el7_5.noarch.rpm58262a26678e6d8bc9b650b748d3fe86ee1af169ec24c8a3abb5f004ebae00e9pki-ca-10.5.1-13.1.el7_5.noarch.rpme03e212712328bec7dffb05ae4cb48d62194cee78deaf4d3719a624043c47f23pki-server-10.5.1-13.1.el7_5.noarch.rpm087a2b37f7f58bd6ca7e666e70d71d946932c809a67d3f8aa15f0869861c65e5pki-javadoc-10.5.1-13.1.el7_5.noarch.rpm95a4779e118bb0bda58d119e494a9661da71cdb8943d902b636645d63255832fpki-symkey-10.5.1-13.1.el7_5.x86_64.rpm8a7307d75153a57c1547f6c8b861c132a0e176cf3ab71db888991b5bfc654d35SLSA-2018:1997-1LibvirtSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) Note: This is the libvirt side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors. Bug Fix(es): * Previously, the virtlogd service logged redundant AVC denial errors when a guest virtual machine was started. With this update, the virtlogd service no longer attempts to send shutdown inhibition calls to systemd, which prevents the described errors from occurring. * Prior to this update, guest virtual machine actions that use a python library in some cases failed and "Hash operation not allowed during iteration" error messages were logged. Several redundant thread access checks have been removed, and the problem no longer occurs. * The "virsh capabilities" command previously displayed an inaccurate number of 4 KiB memory pages on systems with very large amounts of memory. This update optimizes the memory diagnostic mechanism to ensure memory page numbers are displayed correctly on such systems.importantScientific LinuxScientific Linux 7libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.6.x86_64.rpm4fc0f30b6c5c22f354a8e873ab4c01750555f5efdc7fd1c29e9cb05e0fc19d1flibvirt-daemon-config-nwfilter-3.9.0-14.el7_5.6.x86_64.rpm05e8eb3250c140b6ae8fed1bed9c26c9cbef99112690a11a53b01ac367f7cdablibvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.6.x86_64.rpm2e2ef92f95d299aa80364dbd450be3ffdb38e9bb310d4f4f81ee73b90711adeflibvirt-admin-3.9.0-14.el7_5.6.x86_64.rpme2bd1255c0d874489b0e62599a48e5e69a4cbe5cb776e555fa4e109b25871dadlibvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.6.x86_64.rpmbd0c71e0ce66b3cf47e2bd50dce9b6edc7c6ad2491658aefaceffbd0e48c6693libvirt-libs-3.9.0-14.el7_5.6.x86_64.rpm13c1cfc61269ccf06659aad37a8b948473b8582d5d2fdc371855e43d09c24ec2libvirt-lock-sanlock-3.9.0-14.el7_5.6.x86_64.rpm99d03ce1e4cb86f63657609713f78a569635183e2e311c5f2bbb617a28a5cdf7libvirt-docs-3.9.0-14.el7_5.6.x86_64.rpm7c2a9daba202bc39674f7d0d666b6dfdf38a787dc42c54228cb996d2c3ee8c7flibvirt-daemon-driver-interface-3.9.0-14.el7_5.6.x86_64.rpm59e296ea34522cf4cf0e4d694eadfedf5dd103855569a439a5929983b74234b0libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.6.x86_64.rpm0f0071f330d5050a2cd1969ea21546d74a6cd2a032ad27bb90d187766aff30fdlibvirt-daemon-driver-lxc-3.9.0-14.el7_5.6.x86_64.rpmbe4cbbfe1569a5e957a987db447df88b4f3efdedcab6a3570476e113729e1f27libvirt-nss-3.9.0-14.el7_5.6.i686.rpmf0a6110e2db5f0b1f6fab0a2cfbc16a0508e03a491ad9a6affa027f642cbe0dflibvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.6.x86_64.rpm6ac6732091a19d621e0cfd3be3e8d3696fb83443ded706a0333be4a229546394libvirt-daemon-config-network-3.9.0-14.el7_5.6.x86_64.rpme95b2a1c3a2ba0689fb9232131def788b9aa15dd6ddb708223e49c1ca1f1df14libvirt-devel-3.9.0-14.el7_5.6.i686.rpm17cea5dbfb9c52eaf796fc6343b24463a5ef2be60bb530a29b0984146c4a1f2elibvirt-daemon-kvm-3.9.0-14.el7_5.6.x86_64.rpme236fbc892c906f886eeca53147342ac8d803f9331c8621bf6e2aada2cad9669libvirt-3.9.0-14.el7_5.6.x86_64.rpmae95023bf7b6937ebf5589632a256eaf8a868efe3399b2e6e3c4388a6f71a14clibvirt-client-3.9.0-14.el7_5.6.i686.rpm25766584762fd6be45e385941b6e8fdc23f64212b7f31fb1f4527d55b1d938d1libvirt-daemon-3.9.0-14.el7_5.6.x86_64.rpmac0e30bafea0cd48b49dab3e6fe2331de96631f66657c78ef77a3612cca69cd0libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.6.x86_64.rpm895836123cbb904323d7814e640d60b9e5ec29bb29a63951c1ae934f272b269flibvirt-daemon-driver-nodedev-3.9.0-14.el7_5.6.x86_64.rpm87db48bb8f64da1d19e3560beee150437e4be52a5babf0ddcb2f6b638e247ca1libvirt-daemon-driver-network-3.9.0-14.el7_5.6.x86_64.rpm766971967707513c7e8180f017be8c852c35aad5fbc3910ac10437058fbceab3libvirt-daemon-lxc-3.9.0-14.el7_5.6.x86_64.rpm0cf044ba37fb3bfacbc0ddc49b5542955db7a5b57815122154b8030ade89065elibvirt-daemon-driver-storage-3.9.0-14.el7_5.6.x86_64.rpm37fdfcd716ee1d9025607ffa170bc4cd04c901e8f5dd2ff8977810f8c1804599libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.6.x86_64.rpmc4bb5739d3dff641056a22b537b473323ae0be7c52d284f50ad7193e95d0eba5libvirt-client-3.9.0-14.el7_5.6.x86_64.rpm6dd53aae863372ddfbfe8e34091b4ab00aa22f44e2b7bec08cc68bf364bb5256libvirt-devel-3.9.0-14.el7_5.6.x86_64.rpm6206797e6dcee249ae2fe0427f276f1c1156a04f5b0bf5e451bedb4f4ea691a8libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.6.x86_64.rpmed0560d738ae9ff9837b16303964ed26ff6a9cfeffddc5cf70a3c6e17cb7f722libvirt-daemon-driver-secret-3.9.0-14.el7_5.6.x86_64.rpm9684ef9a910fb5727ae3e32c838fe45e3f277fb3cef6f20f2b23f3678930308blibvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.6.x86_64.rpmd7699a2228de5bbef65e326eaca4999ea13713cd402150835ae95e9ed1792681libvirt-login-shell-3.9.0-14.el7_5.6.x86_64.rpmad50aa7680f5e3e35162d4eec5c611ff51ccbcee9f08415eb20d71c8b909fc71libvirt-nss-3.9.0-14.el7_5.6.x86_64.rpmbd409d9b58722d24d14ba5804cbce02144d144de35453f5b15ecccf702347faflibvirt-libs-3.9.0-14.el7_5.6.i686.rpmbcdd464ca23f24150efa60fc7dcd0afca87e747ad93b4de2046cc6f6997ef12flibvirt-daemon-driver-qemu-3.9.0-14.el7_5.6.x86_64.rpm92c4d431ef98fc7430dcd7908e0363f28218faff2abc63ebd1cac83bc3f736f7SLSA-2018:2001-1Qemu-KvmSecurity Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors.importantScientific LinuxScientific Linux 7qemu-img-1.5.3-156.el7_5.3.x86_64.rpm1a37af576743f52c434fe90e4d1f94ade9461390b10a750cf80a91d0b5033a8fqemu-kvm-tools-1.5.3-156.el7_5.3.x86_64.rpmf41503c109bf082d3ba2a526d6c2977547e85db0ab450ad0a7c5b5be2774ce0fqemu-kvm-1.5.3-156.el7_5.3.x86_64.rpm0f1439fe7da1344332360600239adaa0298afde26a3575592ec1fb3e68a86c49qemu-kvm-common-1.5.3-156.el7_5.3.x86_64.rpm30e74d3957b47409fd77b968bb85dd87c1df328f0436e865de500ea9420cb14dSLSA-2018:2113-1FirefoxThis update upgrades Firefox to version 60.1.0 ESR. Many older firefox extensions must be updated to work with this new release. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188) * Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359) * Mozilla: Use-after-free using focus() (CVE-2018-12360) * Mozilla: Media recorder segmentation fault when track type is changed during capture (CVE-2018-5156) * Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126) * Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362) * Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363) * Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364) * Mozilla: address bar username and password spoofing in reader mode (CVE-2017-7762) * Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365) * Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366)criticalScientific LinuxScientific Linux 7firefox-60.1.0-4.el7_5.i686.rpmd84a7fc264d1026a99af25400b66d06d95cb0c8a163562694dd62952a9d6ba46firefox-60.1.0-4.el7_5.x86_64.rpmaa59a857b5d6e2590187ea8f5157a0262159442f78e527ef95d5eb6e491785c6sl-indexhtml-7-5.sl7.noarch.rpm9d5d957e19d67a9538769de75ce89ad27ed5805f0b33ee0df4c591567a3cad2aSLSA-2018:2123-1PythonSecurity Fix(es): * A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) Note: This update modifies the Python ssl module to disable 3DES cipher suites by default.moderateScientific LinuxScientific Linux 7python-2.7.5-69.el7_5.x86_64.rpm0e35287bf16923976d9a587f96913342f1a61ca13e205c677463fc28469cae98python-devel-2.7.5-69.el7_5.x86_64.rpm1c8c9fe0b7458eed5e1a95d95885d4442ccb8f27a3587596865a53abe39887f3python-tools-2.7.5-69.el7_5.x86_64.rpm2cf9f4a6c1d0c6f241e61b1f263fd1f7224e07150fa1ff11bda246605eb8617cpython-libs-2.7.5-69.el7_5.i686.rpm9bca472a834687da1772c349647aee4ec4fc18ef9c77963ee0083fdd0a6ba52fpython-debug-2.7.5-69.el7_5.x86_64.rpmf042ab94c3e17d52f2b8d71674802e09fac5e185618612d172debecea2919618python-test-2.7.5-69.el7_5.x86_64.rpm2e6a006462d254e14da0b99b1d588ad23c0eec97175d1f5ec6529c959abe160atkinter-2.7.5-69.el7_5.x86_64.rpme49ce6b730b1b6a2e27a9ea1919afa77b6fbb948fd1cda971dd80b2d143cdbbcpython-libs-2.7.5-69.el7_5.x86_64.rpm91354124e23003d6d2dc73d637275ef5f1c4b62f188bd21aa03dce62e128a698SLSA-2018:2181-1Gnupg2Security Fix(es): * gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification (CVE-2018-12020)importantScientific LinuxScientific Linux 7gnupg2-2.0.22-5.el7_5.x86_64.rpm2184b2cf83f8a633ca0069bc4faf294de5d87604908a872633c4dc915ac160edgnupg2-smime-2.0.22-5.el7_5.x86_64.rpmdec84bff116b50e850dadfa222a4765c3c8b6ecbb6b24dd31e173cd421bde93eSLSA-2018:2240-1OpenslpSecurity Fix(es): * openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution (CVE-2017-17833)importantScientific LinuxScientific Linux 7openslp-2.0.0-7.el7_5.i686.rpm4a00a98f8c9f30c65bc6d7e05e949cf8a3f519ba1c0a60ebcbb91cdcd5130985openslp-devel-2.0.0-7.el7_5.i686.rpm38d100fc0d0a403b832dbceeb3d72007e347fb264c6dbc7825740b879d140296openslp-2.0.0-7.el7_5.x86_64.rpm3e9beb9e1ca1431f78c63ae0fe60c5c68df8662b85a2ef6f9ccc64d3bc1f3231openslp-server-2.0.0-7.el7_5.x86_64.rpm9bbccc4253b1edc0abd561ba03d761e37645c5d7f6f6d0318ca31d9a365a3bb9openslp-devel-2.0.0-7.el7_5.x86_64.rpma555822ea1a94734a5b481d04c9e3f8343cf78453b0cc68e9e2da83f1cc7e8b6SLSA-2018:2242-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. Bug Fix(es): * This update applies changes from OpenJDK upstream version 8u172, which provides a number of bug fixes over the previous version, 8u171. * OpenJDK was recently updated to support reading the system certificate authority database (cacerts) directly. As an unintended consequence, this removed the ability to read certificates from the user-provided jssecacerts file. With this update, that ability is restored by reading from that file first, if available.moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-demo-debug-1.8.0.181-3.b13.el7_5.i686.rpm04e18d75b5826a594fd73dbb551cc433d245666391fcef3b1f603d75a881c54djava-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.x86_64.rpm06d7c981525bff8f68cf20d6fa174ad1617af8c1ced018579c1de8108afb135fjava-1.8.0-openjdk-src-debug-1.8.0.181-3.b13.el7_5.x86_64.rpm17f7b02ce2bb66783d6fe5bd275301bc4f92112303eb495e4ed220d7e050e48fjava-1.8.0-openjdk-src-1.8.0.181-3.b13.el7_5.i686.rpmee95ae9cec75a405e3c3463c47845210073d9cf918cf36048bdacf8e61267b1cjava-1.8.0-openjdk-devel-debug-1.8.0.181-3.b13.el7_5.i686.rpmf66ac65562247c6bc86a390e803c41cac220dcb3200b37601d3f04db1ce5fffajava-1.8.0-openjdk-src-debug-1.8.0.181-3.b13.el7_5.i686.rpm77d18024cc4a210819cfaee820a9835f3fdf1a1e7857bb4e38e5b3e99155d434java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.i686.rpmbcb60027142e729f4e95aaba9ea1fee92c15c796ed8770f7acfd5f766d73364ajava-1.8.0-openjdk-javadoc-zip-debug-1.8.0.181-3.b13.el7_5.noarch.rpm68b29b01d9863733f8e1816908fed57d8b032b08e49e5321079f96bf8f1646abjava-1.8.0-openjdk-accessibility-1.8.0.181-3.b13.el7_5.i686.rpm6b1e9c556e9d96a5971fe249a989d6597d1fc5fec84b0bb51531aac1c5e3afffjava-1.8.0-openjdk-accessibility-debug-1.8.0.181-3.b13.el7_5.x86_64.rpmbecaa38a0a64267e5fd73a2ce851d02673a4e1af8b9d7398e7cf73c82cebad8cjava-1.8.0-openjdk-debug-1.8.0.181-3.b13.el7_5.i686.rpm7de52eba037ab547126613a86d29645ba092e5064139248a5892dcc3730a7796java-1.8.0-openjdk-debug-1.8.0.181-3.b13.el7_5.x86_64.rpma295e63778f9b33cb0104c9f92ea03ddef7bc3fbb8079aa40e9a23098f857e6fjava-1.8.0-openjdk-headless-1.8.0.181-3.b13.el7_5.i686.rpme0e5b114203ff896ab81e55c4cbd80b4317775d201127fd0e4d12264bab5448djava-1.8.0-openjdk-headless-debug-1.8.0.181-3.b13.el7_5.x86_64.rpmd40aab5703d33ee01359edff9a3c72bfec2984a7a742f2444c88f12082892f1ajava-1.8.0-openjdk-devel-debug-1.8.0.181-3.b13.el7_5.x86_64.rpmc859113c709e475207679ef3835e570cd65729bf9c95fbd26094db3e6feed25djava-1.8.0-openjdk-accessibility-1.8.0.181-3.b13.el7_5.x86_64.rpmacce1d5ee8402275560b24898489cf729faf2e8221431a43f657d88471fe1717java-1.8.0-openjdk-devel-1.8.0.181-3.b13.el7_5.i686.rpmefaa4decbe8c3ed2c09dedc1ef63e7fa8b6077245d44b0be098ddc311e2b01bcjava-1.8.0-openjdk-demo-1.8.0.181-3.b13.el7_5.i686.rpmd99ae18d513c244872d7bc3f7251e26b600ebacf192dac4c5ad011b7a61f16f6java-1.8.0-openjdk-demo-1.8.0.181-3.b13.el7_5.x86_64.rpm48359dcd2e2c50f158d08491e26f6dbc01c2122a70579d879c80e64b3bf72835java-1.8.0-openjdk-javadoc-debug-1.8.0.181-3.b13.el7_5.noarch.rpmd95f52b747cc9a2998ac6ce089572ba370b99437d54798a7a33384f914cc9c3bjava-1.8.0-openjdk-src-1.8.0.181-3.b13.el7_5.x86_64.rpm5ca6f23404127566150bfba3d4af002c1dd44ea7ad0d86907c15a30fe0a81dbfjava-1.8.0-openjdk-javadoc-1.8.0.181-3.b13.el7_5.noarch.rpme52ca9401764aa07b73b9743accf922d75d1a7e382c52150dc2b321296d9dda8java-1.8.0-openjdk-devel-1.8.0.181-3.b13.el7_5.x86_64.rpm3e13f1c2a1df60af529b276ba27120604f9f69eba7c1445ff4f3b1e2ab793829java-1.8.0-openjdk-headless-debug-1.8.0.181-3.b13.el7_5.i686.rpm5e54aec927d85bf521524d6d392693d99056f6c0085437abae3c647d3709d496java-1.8.0-openjdk-accessibility-debug-1.8.0.181-3.b13.el7_5.i686.rpm07805aa70a16c533198998585475d004b4894fd3cd2536a2fc980da46a09e7afjava-1.8.0-openjdk-headless-1.8.0.181-3.b13.el7_5.x86_64.rpm6ad9648fde449dbfb21b842b795bfffc5bb46b35b1d2806e9f0a2fa7aef8bbe2java-1.8.0-openjdk-demo-debug-1.8.0.181-3.b13.el7_5.x86_64.rpm45a37ffc4068a55f74ea20efa70f6c73a62b76c455d4c258d4bbd8e932c7f46fjava-1.8.0-openjdk-javadoc-zip-1.8.0.181-3.b13.el7_5.noarch.rpmcd2a1222758c07b4a8ce991b179fd5ead97e012619dfa7f2dda927ed4d494312SLSA-2018:2252-1ThunderbirdThis update upgrades Thunderbird to version 52.9.1. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188) * Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359) * Mozilla: Use-after-free using focus() (CVE-2018-12360) * Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362) * Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363) * Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364) * thunderbird: S/MIME and PGP decryption oracles can be built with HTML emails (CVE-2018-12372) * thunderbird: S/MIME plaintext can be leaked through HTML reply/forward (CVE-2018-12373) * Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365) * Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366) * thunderbird: Using form to exfiltrate encrypted mail part by pressing enter in form field (CVE-2018-12374)importantScientific LinuxScientific Linux 7thunderbird-52.9.1-1.el7_5.x86_64.rpm6584ae59bd0107c74d3cedac466a8ef5bd173b4f76f051a883986cc23df17439SLSA-2018:2285-1Yum-UtilsSecurity Fix(es): * yum-utils: reposync: improper path validation may lead to directory traversal (CVE-2018-10897)importantScientific LinuxScientific Linux 7yum-plugin-auto-update-debug-info-1.1.31-46.el7_5.noarch.rpma89a70ac94d132032ab0e6a149efad0d4395a06842fd57a1cb802bdd0584f3ffyum-plugin-copr-1.1.31-46.el7_5.noarch.rpm8f78e3c42e67199d46657c82f78f2e034a426ef572c38e27950a5052cb70f5b5yum-plugin-upgrade-helper-1.1.31-46.el7_5.noarch.rpm7490b89fdbcbe6ce3f04d99a0d4d6a079a63a537924d2a626d9b7b9beecabd77yum-plugin-filter-data-1.1.31-46.el7_5.noarch.rpm74696089993ef7eeeced56ed39bea8b9474f92eaf63f3150e74bcfbdd6861223yum-plugin-remove-with-leaves-1.1.31-46.el7_5.noarch.rpmbd6f203888527991ff4decdcc7662d7a4bca7da8271c3e7858dd9a91ebf28136yum-utils-1.1.31-46.el7_5.noarch.rpm820bd1a06770241885a1f3e167826f5892c3fe1e34c69cf7089b556cc9f279f4yum-plugin-tsflags-1.1.31-46.el7_5.noarch.rpm8317036b11568edc1132b70d48a35d3224e85c17783e7b65069c936d5cc6a4beyum-plugin-merge-conf-1.1.31-46.el7_5.noarch.rpm2b0bbdefa2b22d01ba04124475cbeeeefb392ab440bd681f8f04a9e8bd804115yum-plugin-rpm-warm-cache-1.1.31-46.el7_5.noarch.rpm7de92a3992cdde9a1454624cd3e39449d519b1b8d4628c67576e1404a6631a25yum-plugin-post-transaction-actions-1.1.31-46.el7_5.noarch.rpmc3598137818e3690fce495f75fd47e294e7f1354c170c35fc4e09aaacec7a602yum-plugin-changelog-1.1.31-46.el7_5.noarch.rpmf74bdd379a01781d0c3b1be7f790b65f37b0c02b28a3947e5f4cf47d22bf854cyum-plugin-ps-1.1.31-46.el7_5.noarch.rpm838ad4ee2b979f1fd22c41ca259c4a2ebaca38bb021fd43d4f5245972e1a6cf4yum-plugin-protectbase-1.1.31-46.el7_5.noarch.rpmd91db99e848718db091e6b148d0e6ff2e1163cbaa8cc17d9b768ba333f841a79yum-plugin-priorities-1.1.31-46.el7_5.noarch.rpmd9fb1eb2a46bf8c764fa6749455ebb9316e98e7364da79b107485e2a7302b54fyum-plugin-fastestmirror-1.1.31-46.el7_5.noarch.rpmf7c39ae422958b1d646d2916934e12f2956188ccf9ae7ae54c53f522a5498cd9yum-plugin-verify-1.1.31-46.el7_5.noarch.rpm0d8bede273ff921021f8104d8f07580df8041f17cfa74523a10df18974bfbc99yum-plugin-fs-snapshot-1.1.31-46.el7_5.noarch.rpmf193721f18c1d94a295d5ca8742316892a90d4d9d53516d8d303c20372e2f86dyum-plugin-local-1.1.31-46.el7_5.noarch.rpm6e9ebab5d7c617d0419329bb68393ba09725de72eb8a18c5298d2d9e43aeb881yum-plugin-aliases-1.1.31-46.el7_5.noarch.rpm41b62c1c2aa5bc918fc224dc15f91dfcd234f4e950bc73b24ad49e431deb7c39yum-NetworkManager-dispatcher-1.1.31-46.el7_5.noarch.rpm41f59fbeafcd703ea78dc1d218bf086a5eafd1c3e0bd0aae7d920c7bd971a7f0yum-plugin-keys-1.1.31-46.el7_5.noarch.rpmea8ef39482ca448c95a1313453160d808e9cf2b23b3d8cb641eda123026f8189yum-plugin-list-data-1.1.31-46.el7_5.noarch.rpm6aeb1e1244fce5ba0540f86bf8c9ada7bc957c350b305bee0e8290bbceed8083yum-plugin-show-leaves-1.1.31-46.el7_5.noarch.rpmec989d6f04a9d311d6ff0fd54eb918365c7e00c5964c8658d62458317eb34556yum-plugin-tmprepo-1.1.31-46.el7_5.noarch.rpm55ad5fd1b5f614384873f7188b3ccf49338b3d3bee09a09b11a55afb675cf781yum-plugin-pre-transaction-actions-1.1.31-46.el7_5.noarch.rpm5f100308ade7e873ae87274f28ef96be8842722c789ab2c589f75f3aa153237dyum-updateonboot-1.1.31-46.el7_5.noarch.rpm85f4ecd82c43ed1cdb1afd8fbd69021070947fa8bca8539d75d54cd330abf0f3yum-plugin-versionlock-1.1.31-46.el7_5.noarch.rpmeea648f66c83b7d8d083cc59c559579309441e1a337887e757bb99642375b722yum-plugin-ovl-1.1.31-46.el7_5.noarch.rpm8c0c8c0bc65900d4a2759acfe0d7843f9ec90080eaef0475ddf163a651c3f031SLSA-2018:2286-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)moderateScientific LinuxScientific Linux 7java-1.7.0-openjdk-accessibility-1.7.0.191-2.6.15.4.el7_5.x86_64.rpme6757dc36ca62a3057d1e5608189b2ca134d3a49beec2a76e703b56311aafa23java-1.7.0-openjdk-demo-1.7.0.191-2.6.15.4.el7_5.x86_64.rpma13ab824b72320eccaf4300973f65382bf62ef9fb2112da39877eeb34cfbb68fjava-1.7.0-openjdk-src-1.7.0.191-2.6.15.4.el7_5.x86_64.rpm980d08f6117c261f63172207191e8cc488d850b5ff6f57ba5d266cf49d44466ejava-1.7.0-openjdk-devel-1.7.0.191-2.6.15.4.el7_5.x86_64.rpmc629432a39964ea37f470add42bbc5125595716f2a3182f383135741ef6b50e6java-1.7.0-openjdk-headless-1.7.0.191-2.6.15.4.el7_5.x86_64.rpmc0a054609d9f1a00be4430b8bf8b6ef322cffc5cc7fc66c67a6e4d0ddfcc4cfejava-1.7.0-openjdk-javadoc-1.7.0.191-2.6.15.4.el7_5.noarch.rpm2e5c8c2744e97683d660b7f8e527eaf9650a362a34f45871e087efdb67557a12java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5.x86_64.rpmfc1b226533324bcc7ea20389a0447410b41281bacea70cafc6f2532864685090SLSA-2018:2384-1KernelSecurity Fix(es): * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side- channel attacks. (CVE-2018-3693) * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) * kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) * kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)importantScientific LinuxScientific Linux 7perf-3.10.0-862.11.6.el7.x86_64.rpm1d50ab8b547993213c0984f6afcaffc6fff5bcb10959f0aa47c3b38430becc81kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm876f698752e6596f7ffe9df68d0875b7db0858d1bc1e806c8d74bed83aee6ae3kernel-3.10.0-862.11.6.el7.x86_64.rpme37d8fb2752cf6b60b60fa3756b7aec75062d7e56a1bed06adfe3e0d60661a12kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpma59ea9e4f83fceda302fbb8f4a54ad0a9347c24f173298d3571aba9476136f36kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm83cc0c0a9d41e922914c3a4aa5f4d29fc1811665d1427875a291bea326a4e857kernel-doc-3.10.0-862.11.6.el7.noarch.rpm91dfa6ece8b083233b19d3f2649429b7c7f8f04e04900b1cd3ce2a27fec624dapython-perf-3.10.0-862.11.6.el7.x86_64.rpm232652ec432f17aa3f76db1738d5e5483fe81f2d7296ccd7c6a09931def1c84dkernel-tools-3.10.0-862.11.6.el7.x86_64.rpmbb8114155a5aa76a386b7f5935fdff1d24087435e2a1dae1a7125910906afa0ckernel-devel-3.10.0-862.11.6.el7.x86_64.rpmd95f60d1e39c73614aee3f5f5ea45310f06f2f3a22d47a5c65df84bf64215873kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm0067d936364b401d7a151811e3ec130d0a096c1fb6e441cc41ba3da260d56459kernel-debug-3.10.0-862.11.6.el7.x86_64.rpma9e25378daeaf1b00bd304e355f1fcaef78e8be074e7c250e2ad7d47703196e7kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpme2acd50a4fd5931910b94df76fafecdb3af298f2d9213aea49dd6abe1722fd07SLSA-2018:2439-1MariadbThe following packages have been upgraded to a later upstream version: mariadb (5.5.60). Security Fix(es): * mysql: Client programs unspecified vulnerability (CPU Jul 2017) (CVE-2017-3636) * mysql: Server: DML unspecified vulnerability (CPU Jul 2017) (CVE-2017-3641) * mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017) (CVE-2017-3651) * mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) (CVE-2017-10268) * mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) (CVE-2017-10378) * mysql: Client programs unspecified vulnerability (CPU Oct 2017) (CVE-2017-10379) * mysql: Server: DDL unspecified vulnerability (CPU Oct 2017) (CVE-2017-10384) * mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) (CVE-2018-2562) * mysql: Server: DDL unspecified vulnerability (CPU Jan 2018) (CVE-2018-2622) * mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) (CVE-2018-2640) * mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) (CVE-2018-2665) * mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) (CVE-2018-2668) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) (CVE-2018-2755) * mysql: Client programs unspecified vulnerability (CPU Apr 2018) (CVE-2018-2761) * mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) (CVE-2018-2771) * mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) (CVE-2018-2781) * mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) (CVE-2018-2813) * mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) (CVE-2018-2817) * mysql: InnoDB unspecified vulnerability (CPU Apr 2018) (CVE-2018-2819) * mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) (CVE-2017-3653) * mysql: use of SSL/TLS not enforced in libmysqld (Return of BACKRONYM) (CVE-2018-2767) Bug Fix(es): * Previously, the mysqladmin tool waited for an inadequate length of time if the socket it listened on did not respond in a specific way. Consequently, when the socket was used while the MariaDB server was starting, the mariadb service became unresponsive for a long time. With this update, the mysqladmin timeout has been shortened to 2 seconds. As a result, the mariadb service either starts or fails but no longer hangs in the described situation.moderateScientific LinuxScientific Linux 7mariadb-test-5.5.60-1.el7_5.x86_64.rpm38bcf2fe9ac262c3332b175e5e2b6a4ed3a1698d1048397e30e440c0bae390f1mariadb-5.5.60-1.el7_5.x86_64.rpmf508c29b492453157f2531e040137de9d9cd79d2be85437e0ded135173ac33bfmariadb-devel-5.5.60-1.el7_5.i686.rpm727cd5f83a8fd452c0f734795fd6e4cd3b2bbdb7fb3e07f06137269e582cd46bmariadb-libs-5.5.60-1.el7_5.x86_64.rpm7ff819fcf7e5d533e026e233e012c5fd4d695fffa568bb898b2e45d3b5579285mariadb-embedded-devel-5.5.60-1.el7_5.i686.rpmcf895464d76189eb8129ee09f22f5c2b6e47ddb1f8eb0ce395ef66a12b03aa78mariadb-embedded-devel-5.5.60-1.el7_5.x86_64.rpma67e40ee7758a3704ff9601bfdde988c9dc560529e564adeee131b11fda886f5mariadb-embedded-5.5.60-1.el7_5.x86_64.rpm2359addb39309cb80a0ffee7c63961aef7386511673e7ec65092c59bc34cb1d8mariadb-bench-5.5.60-1.el7_5.x86_64.rpmb13e9ac9f4d5d9537597c754118e7e0eb73c3f30c5ea7e56e589b8216678dc99mariadb-libs-5.5.60-1.el7_5.i686.rpm00aca1e927efca6bbfad7fe393cb34c30ae92563c05f1fa15d762634e9930996mariadb-server-5.5.60-1.el7_5.x86_64.rpm500a9e2da6a9297d5826d74593930df88e53146a13839cb22cd985dc34a19f4fmariadb-embedded-5.5.60-1.el7_5.i686.rpm2a1c1be030c4914deafea0f850e5d8d21bc50101e8680786a4dea806d0c55c34mariadb-devel-5.5.60-1.el7_5.x86_64.rpmf45f3497f9236508d49e668e682bb95a2ffdeb0facd88a885549933574b0a9c9SLSA-2018:2462-1Qemu-KvmSecurity Fix(es): * QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams (CVE-2018-11806) * QEMU: i386: multiboot OOB access while loading kernel image (CVE-2018-7550) Bug Fix(es): * Previously, live migrating a Windows guest in some cases caused the guest to become unresponsive. This update ensures that Real-time Clock (RTC) interrupts are not missed, which prevents the problem from occurring.importantScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-156.el7_5.5.x86_64.rpm4112db92af431a14ef7dbc6e1c2fef601418086954c0503aee5fd7d9d0cdb9b8qemu-img-1.5.3-156.el7_5.5.x86_64.rpmd2a6b1deaa81a78d675ebb6fb26fd4cc5cb8de37f23eff1ed8f4ae509823db06qemu-kvm-1.5.3-156.el7_5.5.x86_64.rpmce06ba9e207c2d6c7f52fbfa05de9a127aa7703ca77fae805aaa2cc016365c23qemu-kvm-common-1.5.3-156.el7_5.5.x86_64.rpm5ad2c8831e1417cc6137e301f5ad5b9f964a49f0d98c1d34f2a91387ea02fc29SLSA-2018:2526-1MuttSecurity Fix(es): * mutt: Remote code injection vulnerability to an IMAP mailbox (CVE-2018-14354) * mutt: Remote Code Execution via backquote characters (CVE-2018-14357) * mutt: POP body caching path traversal vulnerability (CVE-2018-14362)importantScientific LinuxScientific Linux 7mutt-1.5.21-28.el7_5.x86_64.rpme5e55dcceab196575a04a2d46b833e825e0807feaaddee6c2e30f9ca542d0c8aSLSA-2018:2557-1PostgresqlThe following packages have been upgraded to a later upstream version: postgresql (9.2.24). Security Fix(es): * postgresql: Certain host connection parameters defeat client-side security defenses (CVE-2018-10915)importantScientific LinuxScientific Linux 7postgresql-static-9.2.24-1.el7_5.i686.rpm2ce91a39e3da43018572fa9746d1089f1a40eb01099d13bc1c2e18b685fc0141postgresql-server-9.2.24-1.el7_5.x86_64.rpm9bcc33e5e4235f6d908db74d7b0dd3576a2fd049101852f9e07ce0f3ba52a09cpostgresql-devel-9.2.24-1.el7_5.x86_64.rpm1c27362d280bc88569b987782ebaacda2da116d914303256ca3c447e738fc612postgresql-upgrade-9.2.24-1.el7_5.x86_64.rpm3a5bedee456ab20d2505ad427abfd45470ce0b17ffaea4733f926eafb16d630epostgresql-libs-9.2.24-1.el7_5.x86_64.rpmeca17b97bcdb5b6d6757e8eba5cd9037844449e8d3df1950132df9ede59ad50epostgresql-plperl-9.2.24-1.el7_5.x86_64.rpm981beb22ff82a8ecf62e63566a6eade0bc72234635c6709383374a3ddfb588c3postgresql-libs-9.2.24-1.el7_5.i686.rpmf09717108f448086adf200722c02204a844b3dff7743e5a5e1a8c89a8800fd15postgresql-docs-9.2.24-1.el7_5.x86_64.rpme7ac3609ed5eb5856f60b4153c293d6d8264ec228678fb9084ec758535facb33postgresql-9.2.24-1.el7_5.i686.rpm0972ef973f1d2f5d8dfc1fb7b605346a9f4674940dfa6cbf789235326b4cae2dpostgresql-contrib-9.2.24-1.el7_5.x86_64.rpm638456929914cffdf4006b6ca751554b774e6a37ac61ee97a00d7044fe802bf2postgresql-test-9.2.24-1.el7_5.x86_64.rpmf60ce91403680931b9a68dfd678edc3d0af56a855b9db8f9abb246dc7f91274dpostgresql-plpython-9.2.24-1.el7_5.x86_64.rpmf3020f80369b40d16a3dfc4d485db3faa926bf78487e04584814bf3129b1a9a5postgresql-static-9.2.24-1.el7_5.x86_64.rpmeaa4385646fd0d2c1a8159bd116479ae8354c66a4b83159e351d4b4bc6440d47postgresql-pltcl-9.2.24-1.el7_5.x86_64.rpmf0cebcae0d0739b2a25c0d3875897f6347df0e64fc55e25963bd3da6c0966153postgresql-9.2.24-1.el7_5.x86_64.rpm65a2ed539702ddee95c2c1b82a84294e9a3201825b8c58558faee549626a1c8fpostgresql-devel-9.2.24-1.el7_5.i686.rpm21d0f390b804196016bc95a9ab829f59be8b0d4c4ec1b5fa5a68425305942cd6SLSA-2018:2570-1BindSecurity Fix(es): * bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service (CVE-2018-5740)importantScientific LinuxScientific Linux 7bind-chroot-9.9.4-61.el7_5.1.x86_64.rpmd5d9c2927f55928ba55ae64ddcee781e389fc53e52fe51ffbbb2429fc1acb62ebind-libs-lite-9.9.4-61.el7_5.1.x86_64.rpm8a7b1ec53b125758b3a836d6f66b91ed7dee20d6bc39e0ddf4d872a8c48001cebind-devel-9.9.4-61.el7_5.1.x86_64.rpm2a82d4e4ca76c264e21aa27ef2ed1c8cd00975a0f9e840559b3e989983662124bind-pkcs11-devel-9.9.4-61.el7_5.1.i686.rpme79310658f598b13900702bba6a0568dc7d0b3d1c8f0a954b37b13cf6be31f4ebind-lite-devel-9.9.4-61.el7_5.1.x86_64.rpmd269f8132152ecb98f3badab69e1f9402dd432d1a9d89b4be3231f8ffc851bdebind-sdb-9.9.4-61.el7_5.1.x86_64.rpm0838819d4c3cb2747546111d505fcea519a18d306d62ad4f529abf6e6c4ed33cbind-devel-9.9.4-61.el7_5.1.i686.rpm0142f0bf6d9c9c3c3dce8a3f371f2064b5015de8b9d9e3ddef05168fe9e59907bind-pkcs11-9.9.4-61.el7_5.1.x86_64.rpme196fdff3a975d42d7007268b4974da024c14b90a1d33d2b0757562c71a90b38bind-libs-lite-9.9.4-61.el7_5.1.i686.rpm966387d214f0cf5f0f0fa0876da6745d825def47ca8b038ae2b464c4f42521cdbind-pkcs11-devel-9.9.4-61.el7_5.1.x86_64.rpm8150978cdfaa82d551bfda2bb796f14adb52f152d12ecc174742db7d62a9fc5dbind-libs-9.9.4-61.el7_5.1.x86_64.rpmc36f644908ceff19ad5d8f95db24b290c7d5ffd0e0dd97b25fcf144709686d69bind-9.9.4-61.el7_5.1.x86_64.rpm1b290ec5e31ab558a141a0aec353929504665642cb0fbebe9efc01eba031a62ebind-pkcs11-libs-9.9.4-61.el7_5.1.x86_64.rpm449a71b1eff617a64db8809362dfa28b6ca627a26b8e0336f407898054dcc6c6bind-pkcs11-utils-9.9.4-61.el7_5.1.x86_64.rpm8dfa83be41e1577b1808219c79106753e1eec92639ef26428264cada600e2874bind-sdb-chroot-9.9.4-61.el7_5.1.x86_64.rpm3034cfcc06766a575b430713ebd2662fecdc4ae4736c0db9707628525c6d7e90bind-pkcs11-libs-9.9.4-61.el7_5.1.i686.rpm49eae997a99519d211c6daec0224a0c3d71367924b8340619f1df3a83c9dc6d0bind-libs-9.9.4-61.el7_5.1.i686.rpm482b59edb3f828cc4ae8cbca899d0f6c6a4465fb0da7d748c8a2c70541a66d91bind-utils-9.9.4-61.el7_5.1.x86_64.rpm8062dbd29c39b6d22a0dea93ea68fb381e1ae2d2118d0d16565cf960eba1efb0bind-license-9.9.4-61.el7_5.1.noarch.rpm2ce8d8c9884afc9f476a5dbb1052258ab19faf6e17db44823ef180cd3ea3f9abbind-lite-devel-9.9.4-61.el7_5.1.i686.rpm7c7844cb5897428e2266037a30b68c38aa8daa5176f169641d70ac5c9318765bSLSA-2018:2692-1FirefoxThis update upgrades Firefox to version 60.2.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (CVE-2018-12376) * Mozilla: Use-after-free in driver timers (CVE-2018-12377) * Mozilla: Use-after-free in IndexedDB (CVE-2018-12378) * Mozilla: Proxy bypass using automount and autofs (CVE-2017-16541) * Mozilla: Out-of-bounds write with malicious MAR file (CVE-2018-12379)criticalScientific LinuxScientific Linux 7firefox-60.2.0-1.el7_5.i686.rpm91fb1976cfacee22d33fa1c142a57cfc55ebeb28fbe101dde229b39e7407ef5dfirefox-60.2.0-1.el7_5.x86_64.rpmabb9accf1ee035cc0350b9bed8908908d660a7d1aaec6cb9e930193426b9b0e6SLSA-2018:2731-1Spice And Spice-GtkThe spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. Security Fix(es): * spice: Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service (CVE-2018-10873) This issue was discovered by Frediano Ziglio (Red Hat).importantScientific LinuxScientific Linux 7spice-gtk3-devel-0.34-3.el7_5.2.i686.rpmaeec46af8a66bc1571b6f8abb12256556b0e9c2f9e91bbc0df68aa840fdb35d6spice-gtk-tools-0.34-3.el7_5.2.x86_64.rpm1c9bd38161a098c54b71968d43698a3ead49eb7f872fff1347a3cf414e6aaaffspice-server-devel-0.14.0-2.el7_5.5.x86_64.rpm4dd2f6168c274b5ac957d78531933dcb843e94638a4acb226fc96657e8e52c8fspice-gtk3-devel-0.34-3.el7_5.2.x86_64.rpm0a9b1aadb03140ef059b2500f87c94af6ae2dd65a70fecd96cd3a1974db9f3c0spice-glib-0.34-3.el7_5.2.x86_64.rpm4abdb676bcc7ca9aa26cb0e90c9920fdbc0727b67044a0e70e6ea0c69ead7505spice-glib-devel-0.34-3.el7_5.2.i686.rpm2172c6bfc0756f3d756a49fdcab4e8c0df9a20ad198e158e71637a3b5af5cb07spice-gtk3-0.34-3.el7_5.2.x86_64.rpm0332139317f8b722d224025468911797d0190a347df7bf165ad2bb47e960132aspice-glib-devel-0.34-3.el7_5.2.x86_64.rpm05a07b828b51068ad13cff187fe81301758cd7e2d60baa106b88263300af50dbspice-glib-0.34-3.el7_5.2.i686.rpm4802ce64cd1ce27b1d43e5cb667945201faa87112868e421628bb61dbc1e0fd0spice-gtk3-0.34-3.el7_5.2.i686.rpm9e758c9ad893012e9efc57083326654785b2f88a77d187765a30b976e1ea56d2spice-server-0.14.0-2.el7_5.5.x86_64.rpm1daab9622b8ccf7bc80263339911605046b72225ce97bd7ec7a37c16cbe0de4cspice-gtk3-vala-0.34-3.el7_5.2.x86_64.rpm5ce89ca8f747fdfab53f13bd459296328fc9ee9b3145a840196bc6cae160c55cSLSA-2018:2748-1KernelSecurity Fix(es): * kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)importantScientific LinuxScientific Linux 7perf-3.10.0-862.14.4.el7.x86_64.rpm691459b7708183d1b87db5e1334630e4b8b1423ac7d419b4fe0500a04f7a8907kernel-tools-libs-devel-3.10.0-862.14.4.el7.x86_64.rpmecc8cc88f352be8576f8a9d04767feaef3c6e526370cf43726bae8c0ab1e0594kernel-debug-devel-3.10.0-862.14.4.el7.x86_64.rpmf2eaf8a776c5745b22ae26bcfed73f70ebcb09d7d0b8575f0c83f5ca1ac19cb1kernel-tools-3.10.0-862.14.4.el7.x86_64.rpme7a81284629734bb8101add02393c8df12e06e9406f2967055f3b63883649f4bkernel-doc-3.10.0-862.14.4.el7.noarch.rpm2f93b37bf9976e3c6db89ab92a0aed5ead7a58ec03ec7afbbde54ab0ae2449a6kernel-abi-whitelists-3.10.0-862.14.4.el7.noarch.rpmefcd4777e8cd2f426fd3a41556206f86102cb702765736b5fd9a80da000697f2kernel-headers-3.10.0-862.14.4.el7.x86_64.rpme1b11851990dc6be3bc94c39b98ba9e750a8726200ca333b1b35570c1d3cd4cekernel-3.10.0-862.14.4.el7.x86_64.rpme09a46084508992d82a1491542d3a3b33641b981515d9b2504630fb6f21aa4a1kernel-debug-3.10.0-862.14.4.el7.x86_64.rpmb137fb7dd073fd2c15603eef12f751ddf2853a440dac04cf9452d281ccda2046kernel-devel-3.10.0-862.14.4.el7.x86_64.rpmcc51838a3d313a5258089223eab5d2ba76f326da015f7a3b33bbe4d372d24f68python-perf-3.10.0-862.14.4.el7.x86_64.rpm7bfc8615232ecaba60750cc939f91b6a6dc972578eaa47de42094c98710af3f7kernel-tools-libs-3.10.0-862.14.4.el7.x86_64.rpm6559d307ed6fafcc93fcbeb24fb1fe4c3fced2ed001966e05ffa7946064f56b8SLSA-2018:2757-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) * 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) * 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) * 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) Bug Fix(es): * Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to "off". As a result, Directory Server is now stable. * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved.moderateScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.7.5-28.el7_5.x86_64.rpm25ecfed08aabd6d0e65ad7cf0d2a6221814071ebf4aec8e46a84e2d230e237d8389-ds-base-1.3.7.5-28.el7_5.x86_64.rpmf0f48cbb5b83644416ac5db4e14c0ff35c285a82b05fac3e22b96c9d903ac5e7389-ds-base-devel-1.3.7.5-28.el7_5.x86_64.rpmb9ffb568259d111b7ffed0924eaa2303c7fdba25ac23aed7fd0e033fb3af8186389-ds-base-libs-1.3.7.5-28.el7_5.x86_64.rpm2549be43b5f60270e15c37bf5347992c1b2e36fe550de5d1a7acf52a57145bc8SLSA-2018:2766-1FlatpakSecurity Fix(es): * flatpak: sandbox escape in D-Bus filtering by a crafted authentication handshake (CVE-2018-6560)moderateScientific LinuxScientific Linux 7flatpak-0.8.8-4.el7_5.x86_64.rpm744bc349925e1c81f43d90b147f64a6fd159887fdf3fb033a33f4ac69a61b9d6flatpak-libs-0.8.8-4.el7_5.x86_64.rpmeb040c57ed2504dd7d91714ef264295ea42030fc612d37c46c3c0c45513ab1ccflatpak-devel-0.8.8-4.el7_5.x86_64.rpm63fce8a0785e4466a5a8e7575439807d8fbbcff4ae1d369b3b80d3e64d612f79flatpak-builder-0.8.8-4.el7_5.x86_64.rpmb4bf0e054efc8d2a5ea820e5d678024b7ea347a966e113c914b2caaf59ae90e8SLSA-2018:2768-1NssSecurity Fix(es): * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384)moderateScientific LinuxScientific Linux 7nss-pkcs11-devel-3.36.0-7.el7_5.x86_64.rpm653906a7d6caff90ac992c46d17d59ce0b212973cc01e45a4fe2c7a64efda165nss-3.36.0-7.el7_5.x86_64.rpm8d232525d7f8ff56dbc27639bd36beb17820625142c9f804fe2d475951643babnss-tools-3.36.0-7.el7_5.x86_64.rpmebee26a0cc1ffdb84590bb9e4dc712c0770bf9bf12b8e7056edffa37be3bf10fnss-3.36.0-7.el7_5.i686.rpme4092820a41d48a020971dbd2449e448aecc181991bb225affeecd5c4b00edafnss-devel-3.36.0-7.el7_5.i686.rpm7eb0722fc327568ba740366581a9d67f4db34b589b1ec766d8d3e4df563a6398nss-pkcs11-devel-3.36.0-7.el7_5.i686.rpmfafc33d24cfd89ba7f44c197353bcda18ff358b1ecba5de151bd0b616a8b5784nss-devel-3.36.0-7.el7_5.x86_64.rpm78d34478821c2d53581865686228a40d2daa0a47b7132118bf9c1d537d74dd76nss-sysinit-3.36.0-7.el7_5.x86_64.rpma0c0808c1eb9ca36b674a96f8a9b1e43a81296b3d6a84921d79e1e67319a93cdSLSA-2018:2835-1FirefoxThis update upgrades Firefox to version 60.2.1 ESR. Security Fix(es): * Mozilla: Crash in TransportSecurityInfo due to cached data (CVE-2018-12385) * Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords (CVE-2018-12383)moderateScientific LinuxScientific Linux 7firefox-60.2.1-1.el7_5.x86_64.rpma9407245fee727b04bc105e9b57308bec3b02aee7e2d09f0e083f58fe6490c95firefox-60.2.1-1.el7_5.i686.rpmeb7fb51a8905edf8a760bfb5a183c46d26ecad9fb1458072b0b3dd9d8e520c24SLSA-2018:2884-1FirefoxThis update upgrades Firefox to version 60.2.2 ESR. Security Fix(es): * Mozilla: type confusion in JavaScript (CVE-2018-12386) * Mozilla: stack out-of-bounds read in Array.prototype.push (CVE-2018-12387)criticalScientific LinuxScientific Linux 7firefox-60.2.2-1.el7_5.x86_64.rpm5d94454e96d4f18f6a0e10d306ba21c60b6c5ac11d37914ea28995d04445e993firefox-60.2.2-1.el7_5.i686.rpm2230852a50ed3b5496714169b7f7956cf6e557fda3ef8f47c0cc4c3184cbf70fSLSA-2018:2916-1SpamassassinSecurity Fix(es): * spamassassin: Certain unclosed tags in crafted emails allow for scan timeouts and result in denial of service (CVE-2017-15705) * spamassassin: Local user code injection in the meta rule syntax (CVE-2018-11781)importantScientific LinuxScientific Linux 7spamassassin-3.4.0-4.el7_5.x86_64.rpm1331d1ddff9d3c66e913843c5177a340fef38baef443a96c1a09be886ea166cfSLSA-2018:2918-1GhostscriptSecurity Fix(es): * It was discovered that the ghostscript /invalidaccess checks fail under certain conditions. An attacker could possibly exploit this to bypass the - -dSAFER protection and, for example, execute arbitrary shell commands via a specially crafted PostScript document. (CVE-2018-16509) * ghostscript: LockDistillerParams type confusion (699656) (CVE-2018-15910) * ghostscript: .definemodifiedfont memory corruption if /typecheck is handled (699668) (CVE-2018-16542) * ghostscript: Stack-based out-of-bounds write in pdf_set_text_matrix function in gdevpdts.c (CVE-2018-10194)importantScientific LinuxScientific Linux 7ghostscript-cups-9.07-29.el7_5.2.x86_64.rpm775a5383feb5cc728242c575253c4e3a60cca7753f817f1d231b19a2bb881827ghostscript-9.07-29.el7_5.2.i686.rpm5db0cc84ba9aaa01ed6ae59664875f2d5a9c8c848fe6600bce000d6a2fd3fa79ghostscript-gtk-9.07-29.el7_5.2.x86_64.rpmf505fdca611a211eff6bd331a187fec17515852350610b0b1407deec54e764e2ghostscript-devel-9.07-29.el7_5.2.x86_64.rpma40198713491b69d5b31fc303197b08fe33fe56ea55bfcd07b46ffc2654dca5eghostscript-doc-9.07-29.el7_5.2.noarch.rpm30b1535efed4dbc55a5bcdf6303402afc08a9f38028ce1eb152a667f81130fa7ghostscript-devel-9.07-29.el7_5.2.i686.rpmfc5a76b2d9bdcc5bff73b4c38c4d523ad47606c565de37b22c793e0095cde6b4ghostscript-9.07-29.el7_5.2.x86_64.rpm3cfa299052b14718a6bf28a7cb11c0c6ad89280a163d3f814a9e1025573478daSLSA-2018:2921-1TomcatSecurity Fix(es): * tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336)importantScientific LinuxScientific Linux 7tomcat-lib-7.0.76-8.el7_5.noarch.rpm3728c2d578b02ab5fc1b8479934cd0d8796ffa31774682afd30c2cfe0c7998eatomcat-jsp-2.2-api-7.0.76-8.el7_5.noarch.rpm055ecd91e369438cb269c6c2a4449312cb8487c5c623b3220226ccf2b9b66e40tomcat-javadoc-7.0.76-8.el7_5.noarch.rpm326688afc0f82cd5810fc0099b6857c8eb13f7c85ea344b774c3eeae6412b3d7tomcat-docs-webapp-7.0.76-8.el7_5.noarch.rpm8505569c632acce90c1d8e3dbb96d575f2db3368ac4c41ee78ea9d73cb9c8f4ftomcat-admin-webapps-7.0.76-8.el7_5.noarch.rpmdec9907ed446eeea04bddfd954feb8cce24d4f8b440fcc0dd9c2afb3cc332e78tomcat-el-2.2-api-7.0.76-8.el7_5.noarch.rpm3f76deb85faacf13fae26d35d988bd1b8a6311dafd60cf24b83bdb814b1b8d24tomcat-jsvc-7.0.76-8.el7_5.noarch.rpm01ee561cb573992f604594d7574db6d9c318e27d6183840036a0ff03ec67fc31tomcat-webapps-7.0.76-8.el7_5.noarch.rpm1bf33841373d8bf3550667b54703e73979a02ee9d2a39ebc1488af6e13fec322tomcat-7.0.76-8.el7_5.noarch.rpmd4b31e89e8000b8ec2e65c0fc53abbe3785a80ba6bed807ffdfcf26b497449d1tomcat-servlet-3.0-api-7.0.76-8.el7_5.noarch.rpmedd8482b2257fcc1aaa7e436d4817f98a88cafe3321e9c6b370a0e8dd57b62cfSLSA-2018:2942-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) * OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) (CVE-2018-3183) * OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) * OpenJDK: Incorrect handling of unsigned attributes in singed Jar manifests (Security, 8194534) (CVE-2018-3136) * OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) * OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180) * OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) (CVE-2018-3214)criticalScientific LinuxScientific Linux 7java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5.x86_64.rpm8b1e1f9090aae290e5a7291ce01eb0a347e30d7427850d572ebe7ea3f3d36b19java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5.noarch.rpmeaaf960f99d0cf43445d8f01491455487c63ce7c2d3ffbb2da29077e85780d07java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5.x86_64.rpm5ebb32ffd0ce073a591cb6a87ce5e50a060f61f04078613d151d77f89c92d57ejava-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5.i686.rpmc2e557aabed3f104b9606f08468c130bc6682ef52dc6d259207fbfab04bc4e9cjava-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5.x86_64.rpm7739f800fcacec1188e81218971aeb2e301fb490e9e2005410502c61f6c508f2java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5.x86_64.rpmda751d61e73f7760c5e8c84636193febe0b1294c61d465d5ae6f6900353e0846java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5.i686.rpme684990149004588286727c30c18f586d5173e97f5c192c36939a689e395bb82java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5.i686.rpm631b5a0092679d38a673c4b03e46149257168fd402c26b9a20deb7dbc1b19e9ajava-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5.i686.rpmfb380d437c698fa486faef9b6d58a2073a62851fca5734ba1378f3152eb7dc31java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5.i686.rpmd00b7622248254523e2314f6eab12d5b7200ad7b2a364273ee31094c40175a93java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.x86_64.rpmf7226a6bca7ad10958bd55437a8a9bb52ccab8f070e60faa574c0798bb8cdf8cjava-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5.x86_64.rpm0ddf0e78795081434597c33cdbbd8d7ef2b60ef22af4cd337ce772e24a71ea7cjava-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5.noarch.rpm5be34f1f1bef49a93af98db2af6468ad411a506eadc76e97828dc566aaef0038java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5.i686.rpm9f1639d86c7f34aaeeca2bff0b3a530d6de299cb953090dbb44d47e1e3e9d6e0java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5.i686.rpm86baf4386f5e5bf6f08b0efa7a65d735692f4a2ade20d7d60d5444c418d0f996java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5.noarch.rpma4b1c6ca1569d7bb6b85e95ee55e473922947923b742cde19add4b5cf784fa75java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5.i686.rpm65f307925c47f0c395b0d5e3b86cb02169ab6bc0243e3fabc66f45c74e060bc5java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5.noarch.rpm953d39f9788185c9861d257b9172ce7b4e9b080345f6c85198a0ed84257378efjava-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5.x86_64.rpm93fe6e8e432daa14a75f95b0f7926d27ad147fee8d3767420f5571eef5b49227java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5.x86_64.rpm984bb4347b30b8f70866ac93383358e426c671d89c7648203c5d547a5d42025cjava-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5.i686.rpmedc48a8b1e9a198718b125b5eb85c3d47f53f3b30aae02c9e554b74cefb72942java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5.x86_64.rpmaf56b0338768ab8cd1c31d49fba8edf4ebd6eb251bfdcd49b8c946796f8f0a30java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5.x86_64.rpma78224354ce28088fc4b23194b334bb038a1d189f3a679654c123054204fef40java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5.x86_64.rpm344430e7139735d1a9b27a49ec9bb8508c83eec7fdf835d5fcaa2adbc056d2cbjava-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.i686.rpm723077e382cd53e3408364da607153b7476c4946383708c9610d9a2d29f964fejava-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5.i686.rpm59a71cbd33c91cf0aa6cbfed75e357a1531b0a6e955bddf753d55849d86b6b6bjava-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5.x86_64.rpma85053f11298fc6e834275bb13be0fcc07831a8fbf2f55d20179d4494c019740java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5.i686.rpmbaa48e823b333a3f7f4d73334d624b92f42a17bcd34bf17961a96c87be166837SLSA-2018:3005-1FirefoxThis update upgrades Firefox to version 60.3.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 (CVE-2018-12390) * Mozilla: Crash with nested event loops (CVE-2018-12392) * Mozilla: Integer overflow during Unicode conversion while loading JavaScript (CVE-2018-12393) * Mozilla: WebExtension bypass of domain restrictions through header rewriting (CVE-2018-12395) * Mozilla: WebExtension content scripts can execute in disallowed contexts (CVE-2018-12396) * Mozilla: WebExtension local file permission check bypass (CVE-2018-12397) * Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 (CVE-2018-12389) Bug Fix(es): * Previously, passwords saved in the Firefox browser and encrypted by a master password were erased when Firefox was exited. This update ensures that NSS files used to decrypt stored login data are handled correctly. As a result, the affected passwords are no longer lost after restarting Firefox.criticalScientific LinuxScientific Linux 7firefox-60.3.0-1.el7_5.x86_64.rpm4f1b411ff5756bd2c2920cb81349f5de40bb810e291934cbc731f0ee31dd26d4firefox-60.3.0-1.el7_5.i686.rpmdd47cb033dc04bfbf80a3aec5f7df3fd42e743d66cd89261d840db79ba366550SLSA-2018:3032-1BinutilsSecurity Fix(es): * binutils: Improper bounds check in coffgen.c:coff_pointerize_aux() allows for denial of service when parsing a crafted COFF file (CVE-2018-7208) * binutils: integer overflow via an ELF file with corrupt dwarf1 debug information in libbfd library (CVE-2018-7568) * binutils: integer underflow or overflow via an ELF file with a corrupt DWARF FORM block in libbfd library (CVE-2018-7569) * binutils: NULL pointer dereference in swap_std_reloc_in function in aoutx.h resulting in crash (CVE-2018-7642) * binutils: Integer overflow in the display_debug_ranges function resulting in crash (CVE-2018-7643) * binutils: Crash in elf.c:bfd_section_from_shdr() with crafted executable (CVE-2018-8945) * binutils: Heap-base buffer over-read in dwarf.c:process_cu_tu_index() allows for denial of service via crafted file (CVE-2018-10372) * binutils: NULL pointer dereference in dwarf2.c:concat_filename() allows for denial of service via crafted file (CVE-2018-10373) * binutils: out of bounds memory write in peXXigen.c files (CVE-2018-10534) * binutils: NULL pointer dereference in elf.c (CVE-2018-10535) * binutils: Uncontrolled Resource Consumption in execution of nm (CVE-2018-13033)lowScientific LinuxScientific Linux 7binutils-devel-2.27-34.base.el7.i686.rpm395a8af8f111ecaef0831194b9f7c6956ebfc6ac45f2a6a01d66635a0a415817binutils-2.27-34.base.el7.x86_64.rpm9b565ecbf2aca36c3c550a402f485e01442681d12a7fe192bc5303f414cb7c96binutils-devel-2.27-34.base.el7.x86_64.rpmdc0e88bd35dc9962c6f4ec8a40028481e85de781f2188e4bf369b17b2663827aSLSA-2018:3041-1PythonSecurity Fix(es): * python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (CVE-2018-1061) * python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib (CVE-2018-1060)moderateScientific LinuxScientific Linux 7tkinter-2.7.5-76.el7.x86_64.rpm280048235e7b465417cf33b6724d08014b2fc9aeeeac9e8b958db263c4bd60a5python-libs-2.7.5-76.el7.i686.rpm1fd3fd54df8a580c8000bf3aabe8320ea9ada085549a550dfefdb84f9a28a800python-devel-2.7.5-76.el7.x86_64.rpm4471abd45f462b4ee2056294b22d1fbb8f7a67214c89313db843e8c0488e0420python-debug-2.7.5-76.el7.x86_64.rpm38e2d784ef6763b6ea987917a452a2eb9379728b67f027636e838cac03b4378bpython-tools-2.7.5-76.el7.x86_64.rpmdedb385775768079c928c9a3a9fdd4d91424b76cbf8f839e77f33ae85e4bbee0python-test-2.7.5-76.el7.x86_64.rpmd4f90813fc07df8d42ccf2e2d15516e7fa11e5d2f6180428c8b72984a82f5febpython-2.7.5-76.el7.x86_64.rpm0fb2da16586c5ae532373f69a7d2f23b1d46d99ae9cc70e577862de546ef2996python-libs-2.7.5-76.el7.x86_64.rpm3c56c98e5057327cb6c4eee0fd044c739955ecd0018d79a96ade35e5533405adSLSA-2018:3050-1GnutlsSecurity Fix(es): * gnutls: HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844) * gnutls: HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845) * gnutls: "Just in Time" PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846)moderateScientific LinuxScientific Linux 7gnutls-devel-3.3.29-8.el7.x86_64.rpmf103190f15c9ec6b5225cfbc5da08e15fcf05cec324f3692dfd7bf0192d1f88dgnutls-dane-3.3.29-8.el7.x86_64.rpmb729e00a3552d486607a8f5b034f834ff6c5b436fa7bd6a178bc1debdb8fa9d3gnutls-devel-3.3.29-8.el7.i686.rpm56d461b6b1768ec5a96414123d3bc90d9c4be98346cb58b4286946b9a58ce606gnutls-utils-3.3.29-8.el7.x86_64.rpm6e186aed03ee0394771f1d16e8104dff75507e921efd185efcf5e6a072ef3833gnutls-c++-3.3.29-8.el7.i686.rpm1c893ec131eac21171b894394252ed655972ed27c3da384d47696997927a2452gnutls-3.3.29-8.el7.i686.rpmf87a909dcaaca347b9e1019fcd800a633b4c71bccbd714529bae50280975af46gnutls-c++-3.3.29-8.el7.x86_64.rpme70f08a2fb3ccbbb9b05146bfa5afb4ae10277504a61c549f2f4abc34c9661d4gnutls-dane-3.3.29-8.el7.i686.rpma171ccb3b890377a7daac3ddd6194f4c3116df110a40d98dd6f64ef188779dbbgnutls-3.3.29-8.el7.x86_64.rpm12a197828171a31d0b962c9ec39aaeb0b89a05cf933b5502e8a5658657e548c0SLSA-2018:3052-1WgetSecurity Fix(es): * wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar (CVE-2018-0494)moderateScientific LinuxScientific Linux 7wget-1.14-18.el7.x86_64.rpm4772ad780b20e329f0d9a0e176ee10cae5c972a13cf977bdfcbfccfa79eaaec9SLSA-2018:3054-1LibreofficeSecurity Fix(es): * libreoffice: Use-after-free in sdstor/stgstrms.cxx:StgSmallStrm class allows for denial of service with crafted document (CVE-2018-10119) * libreoffice: Out of bounds write in filter/ww8/ww8toolbar.cxx:SwCTBWrapper class allows for denial of service with crafted document (CVE-2018-10120) * libreoffice: Information disclosure via SMB connection embedded in malicious file (CVE-2018-10583)moderateScientific LinuxScientific Linux 7autocorr-fi-5.3.6.1-19.el7.noarch.rpmd543dbf240c72f21d51489280f424b0e66c61a9b8c4677276c5b5a8ea2164f30libreoffice-help-nb-5.3.6.1-19.el7.x86_64.rpm8382a09b13cb4e935ab5c4ed4ef5f03e418e316902527e3738b3f3ed9afe385alibreoffice-langpack-sv-5.3.6.1-19.el7.x86_64.rpm5c318e6fc22eab85cd506388800d586c68079d35640487271543fdb79da34c71libreoffice-help-sv-5.3.6.1-19.el7.x86_64.rpma5ac89a7cc8c469765b93e102600815e6d1f29c6a1cd9ed477c649f97420bde9autocorr-en-5.3.6.1-19.el7.noarch.rpmea99c68a093f7b5a0a5da1ab32104d61ab94d1f51f299041a2f62b269ff939b1libreoffice-langpack-mai-5.3.6.1-19.el7.x86_64.rpm616ca447dd72d9f687c49240373f3992f672cc820b2c6507def88c709e6e7fb8libreoffice-ogltrans-5.3.6.1-19.el7.x86_64.rpm04600566c58a2424bc1007e0350fc13c47ea6cefef457d90dc60b5d7b41cf6e8libreofficekit-5.3.6.1-19.el7.x86_64.rpm8b3c52c7c5819d67fdba7e3836d3938e7257a8e8199cd8134101e7f83bc5c142libreoffice-rhino-5.3.6.1-19.el7.x86_64.rpm82b1ee22f4afd412261348bcbba4cbb54bcce373e7bbf0bb4ac005aefce24787autocorr-zh-5.3.6.1-19.el7.noarch.rpmc9e11d6ba9d643ca6047066c749aea5b32e1ecfa1b26d22dead9c8f3b713eb3flibreoffice-langpack-nr-5.3.6.1-19.el7.x86_64.rpma69cd77f17717137db7147d2ac73cbb559c5cb6e9894790503df9edcee97e7eblibreoffice-draw-5.3.6.1-19.el7.x86_64.rpm64531567c5a7ddaaca7968bed64dab204397a472ee1e3d2a0d65c426ee340f5blibreoffice-langpack-pt-BR-5.3.6.1-19.el7.x86_64.rpm518da3afcebb85b2a0b58a2768b1192dbb54e1b90516a271f1ecee3006713cf3libreoffice-help-sk-5.3.6.1-19.el7.x86_64.rpma51cf17ec37da14f484ccccc748a7a531340cb4274ee6dda8947032d31ebd8aflibreoffice-help-si-5.3.6.1-19.el7.x86_64.rpm8e1840b77e405720f97027f83d1d82158e9342286b3a151a895ab2dea4f9067aautocorr-sl-5.3.6.1-19.el7.noarch.rpm126f6c3ef1aa8c180d2d71c1cc97de0edd0be0faaa4e7229c23b461ea46c8c16autocorr-ko-5.3.6.1-19.el7.noarch.rpm03ab93057f8a38f8239547bbdfc2816da07ede36cb1a806894e51005a4ae3161autocorr-sv-5.3.6.1-19.el7.noarch.rpm2801285567f3c58baf06051123f906b9c6d629a11c7ca767b1016b992ffc0014libreoffice-core-5.3.6.1-19.el7.x86_64.rpm5db9bd213049db56327bcd1ce5c9822a90791dad87c69eed38900e6a3cc4781blibreoffice-help-gl-5.3.6.1-19.el7.x86_64.rpm1583fa06d0bb3c43bbdc68ab809b2bfe49063267aebdff033eacdf8df3832fe8libreoffice-langpack-ml-5.3.6.1-19.el7.x86_64.rpmef331a980c20dedc2666deec0bb6dcfc1ce65cada3715b891b8ac2b5e0b9c03alibreoffice-xsltfilter-5.3.6.1-19.el7.x86_64.rpm2b76157821fe9de3f22089af2237b918f05dea9f8372b2af06ebdc6102b68a6bautocorr-mn-5.3.6.1-19.el7.noarch.rpmb4ab047e13e92b1e52d48d9771852194c904cbe2a21ee65dd42b44e1d5fee890libreoffice-langpack-gl-5.3.6.1-19.el7.x86_64.rpm8af7ed1c47f99ddd2f5739bdee3becca8b452f479dd07aa121327f5f42d5bf36libreoffice-langpack-fa-5.3.6.1-19.el7.x86_64.rpm7ffd67ddac5c75ada08e9ea8117d87cdbbc665a9907f0afa2869d44b72f013d7libreoffice-sdk-doc-5.3.6.1-19.el7.x86_64.rpm0a7432566967edf12d5921adf628eb00995bd80fb76652b5ce664e61253b4b81libreoffice-langpack-ss-5.3.6.1-19.el7.x86_64.rpm914ba3185870b3706f5197c8007c6b2832a55c44fa675b1f5af80882558828eclibreoffice-help-lv-5.3.6.1-19.el7.x86_64.rpm37e56ca0e0956f9fab2bffd9c5dc4fb9d438f049345a7cbbcb1dab53fe474195libreoffice-help-ro-5.3.6.1-19.el7.x86_64.rpm3290ed24fb3c776c60b342b32cb6da35fdd41d272659d62c5c8fa06aa56d4417libreoffice-ure-common-5.3.6.1-19.el7.noarch.rpme9ba6f2b801c671aa08567a56df0fa4f8d6359e2219c6112ee1e6fea9d00b358libreoffice-x11-5.3.6.1-19.el7.x86_64.rpmc4fc3405a2288dd75e3a66917bbf7b063133de2fa8b8f649ec38114eb0ab2c61libreoffice-5.3.6.1-19.el7.x86_64.rpmca17467aa2cca02257b3fb829395c355c42c2284fb30dda9c9af14253dde685clibreoffice-help-ca-5.3.6.1-19.el7.x86_64.rpm3110ccd0a7b1ae7c66e9ad18e51ba2efea630331b653a0bbcc652c7684d271e9libreoffice-langpack-cy-5.3.6.1-19.el7.x86_64.rpm73ea1d6f70a8ef2fcd57d7046269490903b73bd3c8e98d36685c38f222b26935libreoffice-langpack-bg-5.3.6.1-19.el7.x86_64.rpm9bf2a76754c5d48bff0a6cc4f733cf68e02fcb54d2b6b1ea121d0201f7ee9723libreoffice-langpack-ro-5.3.6.1-19.el7.x86_64.rpm020d97a8e109c4e6845b0ca0bc47a600e30539fd07445f7d16086c9e2a9feb4clibreoffice-officebean-common-5.3.6.1-19.el7.noarch.rpmc9920cde9883c95d5f2cdc8f2aea95f86bb0a5dde9c36d4bce7e739f47ff7eeelibreoffice-langpack-it-5.3.6.1-19.el7.x86_64.rpmb3f628b1aa97fc14c19b30786f1ce24c6ff8a938c6d1dea843bf23637c5143e5libreoffice-langpack-lv-5.3.6.1-19.el7.x86_64.rpm505eca12f522ceb8a27747887e419658049b2978c1b7efad60a99c4952d149a4libreoffice-help-tr-5.3.6.1-19.el7.x86_64.rpm779a6f57d7223812f8cca2c6cc6c339f97b164199c346ab1ad92bc4194365011autocorr-pl-5.3.6.1-19.el7.noarch.rpm2b86a3274c2b76f252c85fc2bc5e095a662c75128f2b620fde040e78fcca5163libreoffice-langpack-dz-5.3.6.1-19.el7.x86_64.rpm9e0b507854c887e260a4beb8408ef37aefa1bd9b93d5ecfe5065d2661f62543blibreoffice-langpack-ar-5.3.6.1-19.el7.x86_64.rpm498f317a0aa37be7fe8d9098f1c9e068aa282aa530d4cf49a8a6fe8110d24924libreoffice-help-zh-Hans-5.3.6.1-19.el7.x86_64.rpm0e7da8e55d0a724fa465c9f4360b6e44b527865fd92945f189ea3e2055071314libreoffice-langpack-sr-5.3.6.1-19.el7.x86_64.rpme034f3ab9b4f45b277343d5c2c16ea46c2c94cc88d7ae639ef8ff38c92af90ddautocorr-ga-5.3.6.1-19.el7.noarch.rpmbbbe6217fe43b28f9efcfe5c3e99a3477869b83bccd6566703d9a3896a8e63b9autocorr-af-5.3.6.1-19.el7.noarch.rpmf6b7ac50b7ab89b5fde7fdbec6ed36cb824e98bdc8a8d203156efdcc6b3397d8libreoffice-glade-5.3.6.1-19.el7.x86_64.rpmacbf9769e6ecfbfa34ba5a06cd48cef90be2a04f98dc92a932f1326616ec589alibreoffice-langpack-tn-5.3.6.1-19.el7.x86_64.rpm3481d541a99dea3e5150b4847649173c6ac6e182dfbd536c636dbef309cd62d6libreoffice-data-5.3.6.1-19.el7.noarch.rpm50c7098e91b06ce152016d4d396ad6a8e95d4a078b4114a139d98b3572650283libreoffice-help-lt-5.3.6.1-19.el7.x86_64.rpmbb72d4880e4978275d401565332c611e146bc4b74a01039d8f5c28b214dedcd2libreoffice-filters-5.3.6.1-19.el7.x86_64.rpmae09878b11996b6548a5dc6baf2ad07bc5c06dc2935bbf880a7e998b7d898192autocorr-cs-5.3.6.1-19.el7.noarch.rpm832dabc39e5be85b52f3608a8a6d16c3592a5230f27425262b74cc91b38ef014libreoffice-pyuno-5.3.6.1-19.el7.x86_64.rpmee5fc42a8c44207314766dc22f46fc9043baf81a2e43e8e9a5152baca1cc171elibreoffice-bsh-5.3.6.1-19.el7.x86_64.rpm64b0f927e1bff1d58fdf463e01f81d6157954613e82658f0a84316432da11d8flibreoffice-langpack-gu-5.3.6.1-19.el7.x86_64.rpm9ed84c5982faec9ddf82ba263979996cddf2ff4b4322fd482f263a13bbcc8462libreoffice-gdb-debug-support-5.3.6.1-19.el7.x86_64.rpm67bfd3ba0609883682e2f6655fec7467d7fcc26cd00085af3078b3da6b6334b2libreoffice-sdk-5.3.6.1-19.el7.x86_64.rpm75332b07f772796fc78de4f90bd4310a6a275c084b40e4a9092532d0a490ce75autocorr-vi-5.3.6.1-19.el7.noarch.rpm6fd47d84a5222d791a6746a1612f40cc78a9ccefaa190c63e7ed301f1ac9d522libreoffice-langpack-cs-5.3.6.1-19.el7.x86_64.rpme11a666b59599a4d2ba3f42ca1e859445d0533b2826bf4ecfa966f853eeb6d29libreoffice-help-fr-5.3.6.1-19.el7.x86_64.rpm1a92a81eadf863bf3bf9b44738325ec824e3a5e1206f3ec34b675f4a689b7b0clibreoffice-langpack-nn-5.3.6.1-19.el7.x86_64.rpmb2b40013281360b9f98780c0da2c561572fc59191dadb3f35f7f6dfe6f2173a5libreoffice-langpack-zh-Hant-5.3.6.1-19.el7.x86_64.rpm1c730d121f436b2a290c6c5be002ba6087f9dc8e958f12aa918247449c7f2bcalibreoffice-help-pt-PT-5.3.6.1-19.el7.x86_64.rpm8cd18c7ed093e0f556b9fbf819fa424b3a086333e429c405ff0b7e6a5284505alibreoffice-base-5.3.6.1-19.el7.x86_64.rpmb8045b8c8fba48e50512bf7570729c0bff0401169bbf153f6615c883860ebd9cautocorr-tr-5.3.6.1-19.el7.noarch.rpmab51db33055c5e0aed5c0714780f1de0e1f1eb0e6b3a42171236409293526436libreoffice-help-ko-5.3.6.1-19.el7.x86_64.rpm846e3acd2eba13cb6c9066720b1e1d357fcf4a1137cff6352667bda2ef8a80cflibreoffice-help-uk-5.3.6.1-19.el7.x86_64.rpm66d29e47e3fe9bd5b21aebc13a09afc330a25842e07739608ef42f60187f9954libreoffice-langpack-te-5.3.6.1-19.el7.x86_64.rpm8325c7809869f5cd03a6f2787494b536f02ecc145a2740a2e3206faa8b196397libreoffice-impress-5.3.6.1-19.el7.x86_64.rpmf7520a6fab6843350ff6326332b02159c9c77611e0fc70e52d66b011df07ea9alibreoffice-langpack-he-5.3.6.1-19.el7.x86_64.rpm1a4902ab9ade3d027dfba9d0d05d23fd3a522d34aa82fb73111f06ced05ab075libreoffice-langpack-bn-5.3.6.1-19.el7.x86_64.rpm96a5a9a0b2d8ddf2697ad706eb98473ddc651e8cc965ebb85a8316219c5411a0libreoffice-langpack-kk-5.3.6.1-19.el7.x86_64.rpmcc80df0d97bfea7ad4c83b54ae51fd2e19b00dd68a3c3f021c5d953b56d40fe7libreoffice-langpack-eu-5.3.6.1-19.el7.x86_64.rpm8e91f3c988f191de95a499e3319250336137d95bad74fe1845177c7b0523adb0autocorr-it-5.3.6.1-19.el7.noarch.rpmf09d2d29bed29f6201801648da6059611438e76f5bcaebe97c63922b04b105fflibreoffice-help-ta-5.3.6.1-19.el7.x86_64.rpmde5d6b4c890973cc3b494b5d5c033c8ecc901e8bed426a8590293101b7f93071libreoffice-langpack-hr-5.3.6.1-19.el7.x86_64.rpm8425cd7dd6e0622a76ead045d87ef18888dc6b6b28b03b6e8556f3e7d11de163libreoffice-langpack-en-5.3.6.1-19.el7.x86_64.rpmb352214931aeb9f5d124eed82fb6bb9ccc41fd883d4f4209eef6cdac897e0950autocorr-de-5.3.6.1-19.el7.noarch.rpm0073205eaaf2410577fd34767bea3381e1b0682c05f8d4fcbc24725e74cdb770autocorr-da-5.3.6.1-19.el7.noarch.rpm837c932dc2b0c282e68820956345751abe5d4bc1fb85bd9e46409403abb84ea6libreoffice-officebean-5.3.6.1-19.el7.x86_64.rpm0a5ceca8b070b264deb477fb2c8e38b83c13098f68e53d1c980c846e225f8fddlibreoffice-help-fi-5.3.6.1-19.el7.x86_64.rpm076342ac2710f68fad8c4faf9e29aef67fc3a88b0d7930dad3bede5d266b5911libreoffice-langpack-es-5.3.6.1-19.el7.x86_64.rpm7b3f02aa69f5fa8476e04a23998ab89526626d1f42d2342f87a3532e57d6d395libreoffice-gtk3-5.3.6.1-19.el7.x86_64.rpm968be9fafb0081a5d0cfe03906ec8bab7113f232d3ee7606cdec42450313d850autocorr-nl-5.3.6.1-19.el7.noarch.rpm6df8f1749733ba27e95c572c21b20316b31199c72f2d2f515df4e25a3ae46cb7libreoffice-langpack-pl-5.3.6.1-19.el7.x86_64.rpm20657cfb7d0cae5478808a69df3e269db857c80cdbf2e28679d2a10db455ef1dlibreoffice-langpack-ja-5.3.6.1-19.el7.x86_64.rpm2f71face0ec54922148363525403f53fc5f771d201271ecb062b9163e0d20410libreoffice-langpack-zh-Hans-5.3.6.1-19.el7.x86_64.rpmbb353a6a2bc1a1b56648a2329f1dfd1214c0ca42d2547df3b2ec6cee9ab5a08cautocorr-es-5.3.6.1-19.el7.noarch.rpm8ed40ff321dcd787299e8a0881e49e7c49e7ba8e80768d68606e0e6ec3838c9blibreoffice-help-eu-5.3.6.1-19.el7.x86_64.rpm0f2cde752f5f7b7146eb909eb2ca65a018c74c77024b64855972cdb4cc92a1d4libreoffice-help-pl-5.3.6.1-19.el7.x86_64.rpmdb53acebe0b8bce458c6812275b45ad0268381a84ce41f6908606a903eabe142libreoffice-help-it-5.3.6.1-19.el7.x86_64.rpm10e8ebe33821b1cc572a281c69749b98829cb01dd74444739e6d3261091c54e3libreoffice-help-cs-5.3.6.1-19.el7.x86_64.rpm9c003dab3d6a9c4e168d59837089dd2d511938f80b6fc3b69aa029368966891elibreoffice-langpack-ts-5.3.6.1-19.el7.x86_64.rpmbcb23c483834e9a5c6d6dc3174a62109dea1ad42a9c08bed4827a2f64bc865b6libreoffice-langpack-sk-5.3.6.1-19.el7.x86_64.rpmc15d4a364bd8353c1d489abcb69127eb008bc72c4881fba41e9155f048942630libreoffice-langpack-uk-5.3.6.1-19.el7.x86_64.rpm536b750535c272be3ed6ea6a4cb9074447bf3571e25d09ff6361c31ace64b3a1libreoffice-help-bg-5.3.6.1-19.el7.x86_64.rpm467d2ce290398bdb3b14459be6d051d8a5dca485d1346f8784c05a9215dd79b4libreoffice-help-es-5.3.6.1-19.el7.x86_64.rpmc4e3f398019eb6832c3d70170c50f770f9721b0714a8007bb16b6690ee7c9a76libreoffice-langpack-de-5.3.6.1-19.el7.x86_64.rpm96decefa0cb0e597a6b4053236213da29c97f26cbdbdc6c7b561638b9773ace3libreoffice-langpack-st-5.3.6.1-19.el7.x86_64.rpmaeb975a2fcd41202a854d9b858ef5c9b4a303c9a75089d0c693a8f799c4e9b00libreoffice-langpack-id-5.3.6.1-19.el7.x86_64.rpmdb49294f9d2d955ce14e4bd6b1e5159a320f4d3434f4767a6fd49a2617f75c81libreoffice-langpack-fi-5.3.6.1-19.el7.x86_64.rpm85c133e6c743546aa0fd8ba490f8c35ec2c500138c7a428b9604f4dbf7f21879libreoffice-langpack-as-5.3.6.1-19.el7.x86_64.rpmcf695f996e6c36d2c3bb7c16ee910e983d59523ad52fdf1168056f6e82de4f78libreoffice-help-nn-5.3.6.1-19.el7.x86_64.rpma9cedd8ece2582784019ee85b5cadf219e1334e1229058a2858459239ffb7279libreoffice-langpack-da-5.3.6.1-19.el7.x86_64.rpma1135d44410917a5e48457b8a222bca7de395d95982e1ebd9d5dcdb54f39ef18libreoffice-help-hu-5.3.6.1-19.el7.x86_64.rpme9e648736c520d37791701c577ddacf5a7d0235b22af3d3d2590aacf3ab2d445libreoffice-help-id-5.3.6.1-19.el7.x86_64.rpm3800724c8416d7f5540ee6a55819c76b9419d20a9d41cfc5e6daebb908eae04dlibreoffice-langpack-et-5.3.6.1-19.el7.x86_64.rpm5f74d1ee581fee07d45a444fb4d20e495fc033a48abf1d5b801d36169f3dd8dalibreofficekit-devel-5.3.6.1-19.el7.x86_64.rpmf5394b1de3daba66f1cc59f015a92e8a78198c65519a73a3321ccba740679fb3libreoffice-help-zh-Hant-5.3.6.1-19.el7.x86_64.rpmf482166af625c4ebeba4e68641c2e1aa953a778fe15b890a09ba7d0ce1098271libreoffice-langpack-lt-5.3.6.1-19.el7.x86_64.rpm4934e2cc72d06be9403523e2fa0587332284f856df299ac89fdebc19122a1a69libreoffice-help-el-5.3.6.1-19.el7.x86_64.rpme25ea1100485a661f4d66a2c808077cd5e45ce9d02852c54ea3a9ee6845b9ee0libreoffice-help-dz-5.3.6.1-19.el7.x86_64.rpma812ee9f953d01c01938140164c65c57b98b20410c3ed557892533734e8ec853libreoffice-langpack-sl-5.3.6.1-19.el7.x86_64.rpm92239aaec19f1adf140bfadd2156ceec734af1b475c9b2d4cbd7a09e76980240libreoffice-librelogo-5.3.6.1-19.el7.x86_64.rpma38f4da25919dd8b48b9cf42684f025fd25d4f17131a1715fd2ce7efe651a50elibreoffice-help-ar-5.3.6.1-19.el7.x86_64.rpm4be84777c971489442b95e7d40304fed1b426074abd1f519f600803adfbb0c74autocorr-lb-5.3.6.1-19.el7.noarch.rpmb20ffc775b8eef4fd97e239711ede2c1e9600752d41d78c63d887d43aab3b9a3libreoffice-graphicfilter-5.3.6.1-19.el7.x86_64.rpm275998006e34c7029f70b9d9289927df85a0d4d14186175d695aef1e0e71264flibreoffice-langpack-mr-5.3.6.1-19.el7.x86_64.rpm8d440c05ed67200b9d0205591700a156ab92680e744c26142bf4b88741b5f3c3autocorr-fa-5.3.6.1-19.el7.noarch.rpmaa40543947b0c04f3132bdbb1fa75b3b1f095752cc949e86592fd5eb6ba71311libreoffice-langpack-ru-5.3.6.1-19.el7.x86_64.rpm2220b66e1147d8e52f2e710c66df4d83ce38828a1d8d229faab97379dc54badflibreoffice-writer-5.3.6.1-19.el7.x86_64.rpm270c2ac60059faea7a252f68d290ed77bd992b5b7c3b0b3f93c50f65e0c6f1b3libreoffice-langpack-zu-5.3.6.1-19.el7.x86_64.rpm6de023bade936dc4963f14e1d2cc9d7df69f8d8e06dde2f96f7d1eee90b63f57libreoffice-ure-5.3.6.1-19.el7.x86_64.rpmea0463076a7e74c8395aba3b5ce8e6d891015f039418fde122377e572508bc08libreoffice-help-ja-5.3.6.1-19.el7.x86_64.rpm2cac78c814e8a34d78e3f72fae48a35876be427bbe63ebae40089b4683382c85libreoffice-postgresql-5.3.6.1-19.el7.x86_64.rpme8ca052b108fce4d551e64bb0cfbbdaea65b93a0fb76c02539a5d0373fd4b738libreoffice-langpack-xh-5.3.6.1-19.el7.x86_64.rpm0394ac462323ea6896c23d7ec93c86ca82039d2f822341cd100fce84971e5f7clibreoffice-langpack-fr-5.3.6.1-19.el7.x86_64.rpm501408dd4737764c86180ccf516a1986ceb0450fa53833d65e823015a812e9d6autocorr-pt-5.3.6.1-19.el7.noarch.rpmeecfe18a3b77319e47c97da762d4f1cdcc85397592a717c4614b6ba350fdf23flibreoffice-langpack-el-5.3.6.1-19.el7.x86_64.rpm59d61db99858bf465edaaf09f3f4e43d11c42a63ae0cab6b66d6f0275429f50dautocorr-is-5.3.6.1-19.el7.noarch.rpm1935ce4ef738512343cca57a440e458e009453d0ec99af42d401e829013819bblibreoffice-help-gu-5.3.6.1-19.el7.x86_64.rpm8fe0f4eae7e0c7b0483547fb2bfe07d3051d3e99fff1995c1ba2edc9170e0428libreoffice-langpack-nso-5.3.6.1-19.el7.x86_64.rpm467b186443d7c8067224a4e1516b3d10b7793f6eb1c099fcc98c5c1d87c86ad3libreoffice-help-he-5.3.6.1-19.el7.x86_64.rpm5480f7c6801e2d2c3d62b8cccd2a615b8624960748850ee6e6e2a968c74e1575autocorr-ru-5.3.6.1-19.el7.noarch.rpmc96342e3cc6eaf52b2effcfdbf6c2ea231a60c1cb78119bdfd9f8b407a7fa2b4libreoffice-langpack-ve-5.3.6.1-19.el7.x86_64.rpm544721d63f697b2cca622d83c9852de1354c85ac1818cdb38abf4ac7c19ef0b5libreoffice-langpack-af-5.3.6.1-19.el7.x86_64.rpmf8a7d76a5305a334c276c1b4622ae4e5018cdd1b9ae440682edd6a69e2e0b76dlibreoffice-help-hi-5.3.6.1-19.el7.x86_64.rpmbf0122919969e9b0c3a3478877d8a2cb0d560047f9ae935a794809858f94d502libreoffice-langpack-th-5.3.6.1-19.el7.x86_64.rpm8857e6808a264fe0849e126fb92452387c0f7205f0227a9e8e09236404c422f9libreoffice-help-da-5.3.6.1-19.el7.x86_64.rpmee0452f80755663044914dbd80fa17b2dbcff39780790e0fdb5136954df5e2d6libreoffice-langpack-hi-5.3.6.1-19.el7.x86_64.rpmdba3ef6962ea3a2d09a46553d9cd5c2aedfbce43b6ac46e840713c91d3850baclibreoffice-langpack-ca-5.3.6.1-19.el7.x86_64.rpmd9ef57965770f294b665d02df63734198544abebc2ab69316695511dbc11a5bblibreoffice-help-nl-5.3.6.1-19.el7.x86_64.rpm0e5453808e529ab51d130d7ba1f935e71a132bc4ba28d141830292f477393769libreoffice-langpack-pa-5.3.6.1-19.el7.x86_64.rpme2e073a1a833fba4c3d2ce61625a51bee053ce4580852ad75f2a2a2987ee14f7libreoffice-langpack-hu-5.3.6.1-19.el7.x86_64.rpma360a999c235652798a46c40f04395dcdb48dcb16853ecee9f7a1393cc0bbb2eautocorr-ro-5.3.6.1-19.el7.noarch.rpm42ba7582498967e43b4a206696245b24ad497a7df1dff2244aad6e255f7ebb0clibreoffice-help-ru-5.3.6.1-19.el7.x86_64.rpma04f69db77f0d177764e09d7d88fe033554c77f34fa87a5f538bea1b46e7029elibreoffice-help-sl-5.3.6.1-19.el7.x86_64.rpmb35f5a6f019608d93daa63010125ce1b7773b8e0526ee51f16281ccea29c7ed6libreoffice-langpack-tr-5.3.6.1-19.el7.x86_64.rpm0d7e8d5c3f28d2c447aa661cb509833c2db854bc03b1c90952f9313c063acca8libreoffice-opensymbol-fonts-5.3.6.1-19.el7.noarch.rpm361e4662a7f9e93f3aa2f4cf7c2721d8ae5441a107df44824b242861f1678f93libreoffice-langpack-ko-5.3.6.1-19.el7.x86_64.rpmf010d62fad3f2d95982c145506bf36e265783a5092a58657222324cb5c4c1e19libreoffice-nlpsolver-5.3.6.1-19.el7.x86_64.rpm8be0a94afce884de4170f677827233aa9ef5e7fd286df4811f31b4abbfcf357aautocorr-ja-5.3.6.1-19.el7.noarch.rpm605d916a633ea62907b7e2d144d0994488079fd70596ae4aa703f401cfa05c84libreoffice-help-bn-5.3.6.1-19.el7.x86_64.rpmd3e469d1a05ef45c5864bbdb088397e3c2eda3a8f28177dbb537388e4f7fea96libreoffice-langpack-si-5.3.6.1-19.el7.x86_64.rpmcdf0769a78f128049c7437d8989ea0cc80bca910e846186d5f2ebc0388479d97libreoffice-emailmerge-5.3.6.1-19.el7.x86_64.rpmb426c59522d3b197bac10c9abdc652dd7534b243f4ab1aefb7acd6fc06d8cc54libreoffice-gtk2-5.3.6.1-19.el7.x86_64.rpm10384dbaff4a68de8dd94a579ad0a84e73b284bdc35e0d74bced0d87d0c71c24autocorr-hr-5.3.6.1-19.el7.noarch.rpmcc68e6784ca6cad8ec3d19d0bb478d9cc321b05bb7783ccc39f53f09d3af7296autocorr-sr-5.3.6.1-19.el7.noarch.rpm132c15ff6217ccf0c8527f5b795a188bd5f68359447abdb5185b6dfc042ccaf8libreoffice-help-et-5.3.6.1-19.el7.x86_64.rpm248ade0789085a05983087ca177c9ba1fcfdb36aff35224d39d1803136cd3713libreoffice-help-de-5.3.6.1-19.el7.x86_64.rpmb336d36f26f28c46c7c2f1a6bab6cf8b870fb81662e17bbe9937d71885bd59b5autocorr-ca-5.3.6.1-19.el7.noarch.rpm4a463997e732e319d333cb783aa7971b15caa8553702425f6c2355e0ab3600d7libreoffice-help-hr-5.3.6.1-19.el7.x86_64.rpm53e4a0beb217e842b1235018680ec1df196c7b4559b3b210180997899756e717autocorr-lt-5.3.6.1-19.el7.noarch.rpmb4f287832de58ccf1cdd943d0b519c3cdd42f3dfef4fecb27c973457900ad730libreoffice-langpack-or-5.3.6.1-19.el7.x86_64.rpmcdec8aff2fa97c3f40c0389b6936ad8805ea7943a5b438dc7bcfedc8603ac932libreoffice-math-5.3.6.1-19.el7.x86_64.rpm8e4942b98e3406f5d72dcd58e0b58333c5d0823602ef49f69b7cdcc731f2babfautocorr-sk-5.3.6.1-19.el7.noarch.rpmaeabbf846762387ffa961f8846bea3f69cb193ed0f354b4be199e183f1cff121libreoffice-langpack-ta-5.3.6.1-19.el7.x86_64.rpm55fc85d877f66c1cba037dbeef10c769e7efc57865997d3d879cc87bebc64190libreoffice-langpack-ga-5.3.6.1-19.el7.x86_64.rpmbdddf0c1e8d5e0a876699bb64471bbbabeba175c08556d1f8eaf66a94b593bc6libreoffice-langpack-br-5.3.6.1-19.el7.x86_64.rpmaba9e46b83ed7457b1b65ff30d2851f10479471db37cc24b1912d8f25b229a5dlibreoffice-langpack-nb-5.3.6.1-19.el7.x86_64.rpm104833f1daab90152715f2c29cb364d1d9df6227eee03418c433887d2c4a0d75autocorr-fr-5.3.6.1-19.el7.noarch.rpmb972344435d9456c4a828ef1731cb354f8a4ef55ebb924dc9529aed1b12a0bb9libreoffice-help-pt-BR-5.3.6.1-19.el7.x86_64.rpme2a0e7b350d02b44495091f7393702b770a6fcd1b89ec03c9c44bef15e241befautocorr-hu-5.3.6.1-19.el7.noarch.rpm49ed7e12e1cb91f60cfcb1a2c13fa531eacef394799417d44430a99736030c16libreoffice-langpack-pt-PT-5.3.6.1-19.el7.x86_64.rpmc1a125c091da1649444a5ebe4a7f285b5d0a30b6f803a77eb2e10d97ba125bdelibreoffice-langpack-kn-5.3.6.1-19.el7.x86_64.rpmb4b5c3786714940ef2756dd47ab18a337f922565a88e095d184289acb22c63e7libreoffice-wiki-publisher-5.3.6.1-19.el7.x86_64.rpmc1bc41e9789ea8320ce265a44c1ea4c4b18e55885973880c036b61fd876eabd4libreoffice-pdfimport-5.3.6.1-19.el7.x86_64.rpm4de0aaf9b97b2df10f6fe34a2053bc1644d18c84f4341bf5bea2462dde5c03caautocorr-bg-5.3.6.1-19.el7.noarch.rpma9840c0b926f91eed9122c197f2d034f9cef3aec512cece3538d79f3b0a6c788libreoffice-calc-5.3.6.1-19.el7.x86_64.rpm26fd9661e5faad0ad075816871803f59ba22146efae4f930e271bb322caee3f4libreoffice-langpack-nl-5.3.6.1-19.el7.x86_64.rpm5c79e80e4d6922126deb3026bfafe2cdccebf299fa1f911d568c1711557291eaSLSA-2018:3056-1SambaSecurity Fix(es): * samba: Weak authentication protocol regression (CVE-2018-1139) * samba: Insufficient input validation in libsmbclient (CVE-2018-10858) * samba: NULL pointer dereference in printer server process (CVE-2018-1050)moderateScientific LinuxScientific Linux 7samba-devel-4.8.3-4.el7.i686.rpm01406f83e45daac8ff123890f68b42c0a5637ff95331e0a45121e1f55fdcb285samba-winbind-clients-4.8.3-4.el7.x86_64.rpma8ebddb5d63b36e584fb87c9f7ae781d44a224b958d4f03edc36c6a68c146e64libsmbclient-devel-4.8.3-4.el7.x86_64.rpm3471bb45cf5a904e7b1170dc7599d8d2d2c30db0537fe93039b1c2c0a261c480samba-python-test-4.8.3-4.el7.x86_64.rpmd5317b51d2202b99e37ed930dcbf705170f9e51db4faa0076be41415c6adb6d4samba-devel-4.8.3-4.el7.x86_64.rpm5a7b962f091b3a820256f7fcc70337dcc613f9c5f2bfe476e0e6592e9d24d748samba-test-libs-4.8.3-4.el7.x86_64.rpme9d3538c017c0ee3af72818216362bca3f197277eca91633d2f48e22159987b0samba-libs-4.8.3-4.el7.i686.rpm041a65db90322d6a2915fce0307be96b5103cbf50bcd53c10d3c6b39aef6ca5csamba-vfs-glusterfs-4.8.3-4.el7.x86_64.rpm98b1088585da6f015e48ee0bb5fca77df6f0b434b3d5b471aa3f09b98d82da68libwbclient-4.8.3-4.el7.x86_64.rpmb917b2f8a8a130c8c6697528bf0f7451860dcdf6d7c9e058501e2ee804ad6269samba-dc-4.8.3-4.el7.x86_64.rpm98dc23a89da634f8b8633c98c25b1eb86ae768c2cd8be22f57ac5caf72a99508samba-winbind-modules-4.8.3-4.el7.i686.rpmdfe9c766635e94dc1cd1bb1e18f3e73dabb2fcb5eeccd62820578df65753ae40samba-winbind-4.8.3-4.el7.x86_64.rpm057a1c20c616a1f8b04d6e5829e7a47adaa0f264f35343c33dc2c95d6b0640b3ctdb-tests-4.8.3-4.el7.x86_64.rpm0ce965f8e81eea19e154da9b49d4f3188656678710b1a429afbec7731206400ectdb-4.8.3-4.el7.x86_64.rpm174dd337c790faec315a3791ee95b7f78501d36fb708453c2f3ae52800b590a1libwbclient-4.8.3-4.el7.i686.rpm6b25b0a682860ba34bd7533b94c956eda7ff1fdc9ee90f5a316012dce8c0f4b7samba-common-4.8.3-4.el7.noarch.rpma2159a8a5b0b6a284a536a89e5c494b3417add2585c88f31a7f44265be9af98fsamba-pidl-4.8.3-4.el7.noarch.rpmfe3c8b33b6c1224be474467f2be959fe726752181f887780a9be7fe58f666300libwbclient-devel-4.8.3-4.el7.i686.rpmfa1ff72fc8cc3c6b476409b6e520be343bacfd2b0489820c7766b6911b9d6d15samba-common-libs-4.8.3-4.el7.x86_64.rpmfa61c25528f79e33f0e178fbb5bd12e5769b6bf96d98cd9af6460127580b08edsamba-4.8.3-4.el7.x86_64.rpmf64859183b8c26f14ea459b81ff6cf8c0817b00549adfbfff9d20638686e8593libsmbclient-devel-4.8.3-4.el7.i686.rpmc09924c3145acdc76fa9249967a5d3d1c899597de85944145158cd594006e8c7libsmbclient-4.8.3-4.el7.i686.rpm090dfae684a60ca94b3935a74f01d4165d075d023e8fabbad382c1a31b5d49f6samba-krb5-printing-4.8.3-4.el7.x86_64.rpm02affc3dc1b04e172a713ef59361ca4e211bca2829bf82bb4fe4a5067b0b8b1fsamba-python-4.8.3-4.el7.x86_64.rpm0d1bd727bbe0742ac9ee1868a111fe979f98ed54704e63dec23f2630c7922c34libwbclient-devel-4.8.3-4.el7.x86_64.rpm1cb703222aa0775f4cfbcbf473aee020d0d97fe480a9d84bfb3ce63de24bdcfbsamba-test-4.8.3-4.el7.x86_64.rpmc9fa7809764dc296b9499725d03afe911b0a48da9610a39f9c8d8dfdc41a8abcsamba-client-libs-4.8.3-4.el7.i686.rpmb77c4cadcc7e9959b8d314f36b9bb45150e1c581fec75eaf99373ca88c7897d7samba-client-libs-4.8.3-4.el7.x86_64.rpmac73010ec92d8634c1388d8cdab51a15267d70927648ec85b83367129da80b21samba-winbind-krb5-locator-4.8.3-4.el7.x86_64.rpm23ea91877e774adc7b3437eec8b3eeefd8f3b6b697ebcf186c74989c1b7301c7samba-libs-4.8.3-4.el7.x86_64.rpme3c25c07327aa1696d8664d67cc61cf8f1d0793a3d6e1f572b747f0f60506268samba-dc-libs-4.8.3-4.el7.x86_64.rpm1239cb04e1c007c3d82c6c2bd6db679b0f4747db50e6ad54780db046fbdd5cdesamba-client-4.8.3-4.el7.x86_64.rpm11a5a5c1cc47b39b276a3af60a72dbe2d39033637af929a871b21949221d7f84libsmbclient-4.8.3-4.el7.x86_64.rpm5f39e0820bd83a4b62ad0b31b59f1439bf580a6a6c36d3ee986af4335db6d250samba-winbind-modules-4.8.3-4.el7.x86_64.rpm5591df8b009edbd2490969a8b67fb7714695ec472ac76549882687b6e524f2f5samba-test-libs-4.8.3-4.el7.i686.rpm412d7b12ddf36804957469e53805d4e8b58b70ae7276f7c4190704d284eb65c6samba-common-tools-4.8.3-4.el7.x86_64.rpm4772fec55c0d3ed48add5060397bdc0b4dda0e0cd77a48a85258f23e4ad824c0SLSA-2018:3059-1X.Org X11Security Fix(es): * libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c (CVE-2015-9262) The SL Team added a fix for upstream bug 1650634lowScientific LinuxScientific Linux 7xorg-x11-server-source-1.20.1-3.el7.noarch.rpm4ffe1d92a4a43a925924f4b194f85ce6a6717ea23f038c801eb2c77d7c64cefblibwacom-0.30-1.el7.i686.rpm2b2ceb816bb611f5c9aaaa01c22c9eeb426fb255ae1a9e23261f9e22e055b994vulkan-1.1.73.0-1.el7.i686.rpm262ab6cd5add6d04637b9c3d7d996ab30ae3b8c11da54306da98f445ca27e096vulkan-devel-1.1.73.0-1.el7.x86_64.rpma3ad72f93763b759a7cf2d88470ebbf031970aa35d6c4515215c0f080b54e2damesa-filesystem-18.0.5-3.el7.i686.rpmf04b179f78010a613f26406ead9431137c32de310ca0e3e3a2459e732200c1d0xorg-x11-drv-synaptics-1.9.0-2.el7.x86_64.rpm3f9e35e53a27537aafb0f1088d9ef21b339bd1d759dd2490c03c77d504224a8fmesa-libEGL-devel-18.0.5-3.el7.i686.rpm08a13f11ed304d661a2d2c4412bc3636df48c8f2171cf939157a094f2c308815xorg-x11-drv-void-1.4.1-2.el7.1.x86_64.rpm6124c6f25d3bbdf04bbef36ffd34506bd2bcc830d80f2d6980c66171f3219f68mesa-libGL-18.0.5-3.el7.x86_64.rpm1fdee1e4478ef363b65eb6ed545d1be5f3eea29985da42e19f507e99661fa46btigervnc-server-1.8.0-13.el7.x86_64.rpm30e36ec9a8ad6ddcb4c3f865e80d68ba2979577aa40b0c93471877598a7d4636libXfont2-devel-2.0.3-1.el7.x86_64.rpma7e2fdd0608f02cee5f3577c3b01509197c05eabb0bddd203e5d8ddfa0357e6cmesa-libOSMesa-18.0.5-3.el7.i686.rpm2855a1dee29bb218940a98e253511109471769f9d8c6467c0e22b88d5e9f62f4xorg-x11-drv-mouse-devel-1.9.2-2.el7.i686.rpm6f86629119659914b6b8a846f3a7203d4a9452c376f4d0e747540326c093afc9freeglut-devel-3.0.0-8.el7.i686.rpm370eb65ef91c7c480fc50504555ccd5b7c9c3b695cd3db574f56d3367ce16726libXcursor-1.1.15-1.el7.i686.rpmac6b859fa72612f58f24e2a84d6520f955b16473b33b7593c22acbc4634123b8libdrm-devel-2.4.91-3.el7.i686.rpm58e2c01f8c9a50255d18d0490bfff130548a5e5f724cc9886ba0b51834d2cca1xorg-x11-font-utils-7.5-21.el7.x86_64.rpmea4e6a36a7df33c9ee270c4453903443b1888a61d2197b6b06b62fdf814add54xorg-x11-server-devel-1.20.1-3.el7.i686.rpma6973ee2c4a6acf3ae5b2f39961f29b82e92997a769596e517f3b801f11dba27mesa-demos-8.3.0-10.el7.x86_64.rpm0eee127b9eb60fd1931c92f998f8224296e59493172a3e4d8c49a24c2d9e61e0mesa-libxatracker-18.0.5-3.el7.i686.rpm870b2755645699ea792c1c2c07e89cc156505141930e040b9f2301cfa987a5d9libXfont2-2.0.3-1.el7.x86_64.rpmec03ca524d062e59f59282b50ab1448c3261d72b15cf08385c1233f2fe2002d5mesa-libwayland-egl-18.0.5-3.el7.i686.rpmf31f8b868725e8e75784e895a0435901fd4cbc0c9507c44110216872aacbc115mesa-dri-drivers-18.0.5-3.el7.i686.rpm3c12915c7b49df7d0a6cd3e72def6c4366694a4f6aa6d3972c70b3eba73c88afmesa-libGLES-devel-18.0.5-3.el7.i686.rpm6578a1f12004fcc18c852a3effc28cb856a4952ac1f75c805c205b82ca9ca8aaxorg-x11-drv-wacom-devel-0.36.1-1.el7.x86_64.rpm9bbbe007103a70ea4ce1ae086dfcf2659b929cd2b411149c08157cf25bc4d9baxorg-x11-drv-openchrome-devel-0.5.0-3.el7.1.x86_64.rpm3ace0423b5f3b6733d178704b418280f04e23e8b7adc7840c726aa91ac4ffc0efreeglut-3.0.0-8.el7.i686.rpm165f7ab0399cf7c4b7f921e6e4d15a42e8c1b42f2d8453395697f044b4e0d712libepoxy-1.5.2-1.el7.x86_64.rpm8a2f375aaeae2457d93b098f6f075da45c48b5fa29e28af4408419f9151800f5mesa-filesystem-18.0.5-3.el7.x86_64.rpmada730564c22b71a1e80b45850047f3051b8e1b4b54e8b8259d6f07780b1fa87libXres-1.2.0-1.el7.x86_64.rpm39e2430fc25c5ba377c695b41a20a0491f5778bb3e2248901470849f5724eac2tigervnc-server-minimal-1.8.0-13.el7.x86_64.rpm48459d8da787fe079352927cb9fc5a3065de7f2033afbf1d0eb4536f4f9a749etigervnc-license-1.8.0-13.el7.noarch.rpme75244322d445c18e17cc6039e8a8f8c51a0b8fdffb7de4e4b798018f139133flibglvnd-1.0.1-0.8.git5baa1e5.el7.i686.rpm4634b1a77fdb6eadab09c2ed46cbfb20b8f5e2b3b5590ee035c9a6460c314e94xorg-x11-drv-synaptics-devel-1.9.0-2.el7.i686.rpm0e41f1ffcf3c0fa577ac55069b1e1ee2da4b470c005e34ad1cc0ba528946e174libepoxy-1.5.2-1.el7.i686.rpmf26868e89f3b41966d63b0b6c71accea8ea7f493ccfddf41043210557fd19492libinput-1.10.7-2.el7.i686.rpm30d866811f009d0ec367c278c8dad1d05099da69237cc841e552c1e4f69d9ce1xorg-x11-drv-evdev-devel-2.10.6-1.el7.i686.rpmbf69735cad6515984a141f467ec9a79fe4b0e189d1a7c99366f3db08cf5263bfxorg-x11-drv-wacom-0.36.1-1.el7.x86_64.rpm7955a49b70ce9b6f447f035d22da218133a47e0d3ff98104045c838b2fdfee3cmesa-libEGL-18.0.5-3.el7.x86_64.rpm8b0a54b64434d205a50090490a5dc6f33481b1b1de4e17bbb7a93a86767d082fmesa-libOSMesa-18.0.5-3.el7.x86_64.rpm38e2bccd1e85a82e2788c01bfd44885097c417a15678284968d0d822ad621b66libXcursor-1.1.15-1.el7.x86_64.rpm447f6be4cf225d9d7c95e9b7550bfc8ba3ae64b73cb562afa32049fe493e0ac7libXfont2-devel-2.0.3-1.el7.i686.rpm41b00c2c5b2d41845c3e69e4f59fe325a6eefbaf15c1d03f2eaac8d4f3bf6d87libX11-1.6.5-2.el7.x86_64.rpmbe6ae3a477dc35303b6b0a5007bfb9610ec541ea607e5fb28fec313687240fc3xorg-x11-drv-libinput-devel-0.27.1-2.el7.i686.rpmb7c9fa4bcc0a43d8ff8560464197f3c4fadb4ebf7fd402312b9a2de1925305ecfreeglut-devel-3.0.0-8.el7.x86_64.rpmcbc270fbdbf5f6c9776e1169977077d1a739744453901470bc41e40f5ce96628mesa-libOSMesa-devel-18.0.5-3.el7.x86_64.rpm31348ba6401fb99a6da9910948a14774afe2cc6d8402210a6cbd6ddf6626ac06xorg-x11-server-Xspice-0.1.5-4.el7.1.x86_64.rpm197f459af9384a822bbcdb3a011df8ba5ec7a510c5293bcee344a22a3ed0d8a8libXfont-1.5.4-1.el7.x86_64.rpm23962e23689e259504e7d4c33d1e8a30fbb35d086f75cd19199912f56e4d3227mesa-vulkan-drivers-18.0.5-3.el7.x86_64.rpmaa3345846af68ad659ccb4ed28d371c8fdf1693a02b7be49482a785e612d215clibglvnd-devel-1.0.1-0.8.git5baa1e5.el7.i686.rpm44dcd4d3c953431b678cadda08b5dd09123839ff9458ca7685cac6b174ab3b96xkeyboard-config-devel-2.24-1.el7.noarch.rpmedcf1db52dd2a2cdeb65acc1712d3c3bb22bc34766b404b54d2a8f63ae660779libXres-1.2.0-1.el7.i686.rpmc89fe8acff3759d3d54c9350a69627cfb014b15574ebb3199e8197d839c5b1cflibglvnd-devel-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm16b9db962f9dbe43fcce71d5939ed8099e869be73f47352a402b0e5f67879f38mesa-libGLES-18.0.5-3.el7.i686.rpme34929e7d7e560bb9baaaae6ff93f31e3324903ade954e25ae16b24592902eafxorg-x11-drv-vesa-2.4.0-1.el7.x86_64.rpmfc928b51bf9ce40c6b0fed24e456890836c2c8bb934201893c8ad014f5bc5791libX11-1.6.5-2.el7.i686.rpm9d468f614e1f62e5b6fc73c68fa926393007304a8cf5fb3a6f53639d2aaf8ca1freeglut-3.0.0-8.el7.x86_64.rpm0f81d43fe0aba054872c795b2488c91c10d61e6f93f947a888eda484d7e6c22clibwacom-devel-0.30-1.el7.x86_64.rpm5d0e1c71eeda785b530b87dc4d44e2467d2a50fc7d7a81ddef2f47f0153c7b44libglvnd-core-devel-1.0.1-0.8.git5baa1e5.el7.i686.rpm165eb96d7b4e62d9632f0d7b0c485746bebf594d2f148ba16d0d872544770de6mesa-libEGL-18.0.5-3.el7.i686.rpm638c728308ce346986dabe95f3d0e86a388fa91772c18dc4e1be3b5d6a741983libXcursor-devel-1.1.15-1.el7.i686.rpmafe1aa564c4b1c315e86a2ed527437e058b89570224290e9d550529ab8add83amesa-libgbm-devel-18.0.5-3.el7.x86_64.rpm30e02238eed5d06c65c7b918d307956695d1067026ed7b6a1442b0a7a29f5182tigervnc-1.8.0-13.el7.x86_64.rpm746814a15f48f1ec838b34f00c25f36784ba2a2b1f6b334626d1ace5cf40aa7alibxcb-devel-1.13-1.el7.i686.rpm28bff94989ae901929c6174f3dd5f547de3850f933fc75db784d7752c8cfec5exorg-x11-drv-synaptics-devel-1.9.0-2.el7.x86_64.rpm1a101b9ed93db568e042a996ec1bd193c6f67868f7718b57990a3f4d0419aee6mesa-dri-drivers-18.0.5-3.el7.x86_64.rpm3436937886e2c5957508c63af79de6b86b1d839d02d09c338eef77f9443f3d79libxcb-doc-1.13-1.el7.noarch.rpmfb5d234f63fd0d9bf029cfaa5543aa6bde06e81f1b7ef62df52752299fb32c97mesa-libwayland-egl-devel-18.0.5-3.el7.i686.rpmf4e97b32c8f5675b9aa3387314ee9c17baf6a9c86192acc6fb095e2c05c06653xorg-x11-server-Xvfb-1.20.1-3.el7.x86_64.rpmbceffbb476c729ee9d6b04d3b55e23300aa84e2518c913753a761c58d03d9561xorg-x11-drv-intel-2.99.917-28.20180530.el7.i686.rpm159213b709a2b28ec7b50a878eaebb3a5a0742519135e99473789c1ba05ee2a7xorg-x11-drv-intel-devel-2.99.917-28.20180530.el7.i686.rpm043f6476c74b02d39293e181a7796396fcd21eb29729575489cc260ec37aa5e7xorg-x11-server-Xnest-1.20.1-3.el7.x86_64.rpmb4c393366c31bb048ab29bfdf9359b54f9f25679e84e7770a7a5d7bb304722d2libglvnd-core-devel-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm7f47574bb6e8c59e6a546647514ee998fccbc70304cd88380572405a55e74e84xorg-x11-server-devel-1.20.1-3.el7.x86_64.rpmf4ac26e2926daf3d3451e96e1c931c87da9c21a1438b5d5eba96f36acbdcdf06xorg-x11-drv-fbdev-0.5.0-1.el7.x86_64.rpm0c5b8120a1ca36d816659cdc31ea3c3c33bb978ae150e671146f3c2a96abd55clibxcb-devel-1.13-1.el7.x86_64.rpma6744b52df73dce31a7fe2c676c18fbe561b2a308f78fde6ac4836b412b56da9mesa-libglapi-18.0.5-3.el7.x86_64.rpmfaaf6a2c282335b84a459cc2596877403817990eeb3f114b727082f108299547libglvnd-egl-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm85dfabca2fad6af0c56f75452af804a3ee938eedd3c5759fe7b7f415cf168f75libXres-devel-1.2.0-1.el7.i686.rpm123d5f4b844842ed95f7f166b3c92ca9a246ad9abd42db63405c50afc0ee49f7libXfont-devel-1.5.4-1.el7.i686.rpmbda75fc4f360bafee253b36f281e5e1229a8a7ab4499a56d1fdeb0a00b88a09cxorg-x11-drv-openchrome-devel-0.5.0-3.el7.1.i686.rpm8f250598085207ca0314b1e51e8d2391621021ad242781ec09d55fdec8802e80xorg-x11-proto-devel-2018.4-1.el7.noarch.rpm5720e86824d5df5ce87ecaf0e1a65850533d7ce16cab1b73495f4243183e4b83xorg-x11-drv-v4l-0.2.0-49.el7.x86_64.rpm6699ef563f10925780d57c7e18274702f89a34d7cec0cde677630c75385d64a1tigervnc-server-module-1.8.0-13.el7.x86_64.rpmf1b1a577162ab053cd6a95ad908ef5f93ecb5b4fb8dd3e5b5d8e042095f4da1bmesa-libxatracker-devel-18.0.5-3.el7.i686.rpm5762c9b24676b5fd7b6fdfad762b22d954c5b7482a05c58947bc63e9d29ea49fxorg-x11-drv-openchrome-0.5.0-3.el7.1.x86_64.rpm2d14e1a5fabaad160b5a83c8592a1a3535efa7a650ef10165b3759198eae05aamesa-vdpau-drivers-18.0.5-3.el7.i686.rpm2fa6d69147743571cd3ad4ecea27ebbb373c3b6f6a42a7b0a464dea36b75cd62libglvnd-opengl-1.0.1-0.8.git5baa1e5.el7.i686.rpm1c1a5b785c03c63b4db9c9cdca47bc59c4b06123f2e030a8c9aa44ebaa235f7alibXfont2-2.0.3-1.el7.i686.rpm37c9d98a124176948c02d6304a96e0aa1fefb4ae326756b7d31dfbb410c1fdb1xorg-x11-drv-dummy-0.3.7-1.el7.1.x86_64.rpm5ab6b3481fc708964292a8f6360bd3ffaf1afaa3187ab43d3e09ea335738dfb8libglvnd-glx-1.0.1-0.8.git5baa1e5.el7.i686.rpmda17c38a167870b842315b3e1ef9c1a1348436e5fc77431561053abca207fd66mesa-libgbm-18.0.5-3.el7.x86_64.rpmb9a35558e4be19699fcf709c1098dd2cbafcc966b634f49cc3a09d1c3db2e009libX11-devel-1.6.5-2.el7.x86_64.rpm7dbeddbbb9868210b958bb7b1888581141733ea8b1d0715986c9f32d956c0d2axorg-x11-drv-libinput-devel-0.27.1-2.el7.x86_64.rpmf16a9a410d8e974e7d78178b9ab31f8cbcf192cef34750b53529e64de9aa6b15libX11-devel-1.6.5-2.el7.i686.rpm70a5bb8742a52e69af50768e2d967fd316cf3148431aa9054d54839002292ae5mesa-libgbm-18.0.5-3.el7.i686.rpmffb59aa423b21ce92bedd3ac69ce589890b229ee29a6e84c989f58e9588413fcxorg-x11-drv-openchrome-0.5.0-3.el7.1.i686.rpmfa319f2beff438562eb8ff0af4d8099557e7c2bf16c571f3564d2f10ff2a5e83libglvnd-gles-1.0.1-0.8.git5baa1e5.el7.i686.rpmacb98c97b8e5f2e2acc5269be33617ecda3d6a57ffeee235b11f69780f7ccb48mesa-libwayland-egl-18.0.5-3.el7.x86_64.rpm807b374eaf3d562f477cfdba8c4b873f8786a48ca7e18cc68dbedf2e06b8ddd7libxcb-1.13-1.el7.x86_64.rpm7f3c1dd17a2f0965a89819979e98be2b62085d560a7a6c8723906943eaa45860vulkan-1.1.73.0-1.el7.x86_64.rpm7bec269c3d7ccc08ac1e83d632a5f920f44c760de5d891de4e7ab59a5f0edaadmesa-libxatracker-18.0.5-3.el7.x86_64.rpm69a2be9dff54b036e26bbf1801e425c8dd4620360938d3c05bb4ccc3054e10a7xorg-x11-server-common-1.20.1-3.el7.x86_64.rpmbb992a6503eb0343103221740dc4f8c547189f310a73c4da26f73359caaecd17libwacom-devel-0.30-1.el7.i686.rpm55741c8721e21f6c322582263c98a94e340b1cf3ec0c0c5125f788c0dc0184adlibinput-1.10.7-2.el7.x86_64.rpmd42188a6f4e15dc9b4aa496620ae12f0054007ce1b499187934cc1c9e7ea0762libwacom-0.30-1.el7.x86_64.rpm3c74e44074db30bcb068ee47a5d0a711ecfea31babb7e2b98e56f823923560baglx-utils-8.3.0-10.el7.x86_64.rpm694599d129d451abcf3a606400f049461b2ea03b8a322312b3d599fbdac51f6emesa-libgbm-devel-18.0.5-3.el7.i686.rpm5940ddde381376b4183239d589a2469d76660e25f503e4f9e1070aa2b119d133xorg-x11-xkb-utils-7.7-14.el7.x86_64.rpm94782f338893182bf25e971f11733fdb45dbf0c83e5fc25f6df8d79dbef6a090mesa-libxatracker-devel-18.0.5-3.el7.x86_64.rpm1bc075e492e231e25adb70983ce4a6919aee0b8a5ee16101795bc0d621601e4dxorg-x11-drv-qxl-0.1.5-4.el7.1.x86_64.rpmf59a088704dcf2e0a461b793bd4f3e8bbbf7e9643ba45947aa1b76e2b80fe04axorg-x11-server-Xorg-1.20.1-3.el7.x86_64.rpm6425667745b1a9b880c230c6fb678f357465eeb121e1240557eefec30afae924xorg-x11-drv-ati-18.0.1-1.el7.x86_64.rpme5850634b32baa4c9b694533e4f177943cc1b0f711e7dbbe0e3b13b013f74d72mesa-libGLES-18.0.5-3.el7.x86_64.rpm41ab4a348dee69bf5766e5c19f29c8c40caecb0ffa38ac3eba3f2691cde26927mesa-libGL-devel-18.0.5-3.el7.x86_64.rpmb576bd52ebcea1bf57a8a3b7098da90654fb3b24200433fd728cc8afe285b812tigervnc-icons-1.8.0-13.el7.noarch.rpmfaeacc84d4b1d90fc23dbd6316a19299486f5592f18453208b6c5fe981de5338libglvnd-egl-1.0.1-0.8.git5baa1e5.el7.i686.rpm1c5ba2f86dd648819c9fb05f7e048321cc310e0e162d4fb631134b41cab71d0fdrm-utils-2.4.91-3.el7.x86_64.rpm53867be210975bcbbbad4e30a3bb51c3f23a567a9656fdac39c13e9542a5d266mesa-libwayland-egl-devel-18.0.5-3.el7.x86_64.rpm112d7695b6402acc56c892700e502503205da9bcca4f51b312af99fb9ad7fb67xorg-x11-drv-intel-2.99.917-28.20180530.el7.x86_64.rpmbdc52cefdfb76a489dfbe26d51288582e842706b51d6f8f59821a78b4ee95b9blibdrm-2.4.91-3.el7.i686.rpmbbd879b2319ee724a65ea8e1688b6642009e9665332d316b67a52c947705c576xorg-x11-xkb-utils-devel-7.7-14.el7.i686.rpm28dc23034e38e34de437f7559c8e9b3068349bb694274a38375b7c36befabad2libepoxy-devel-1.5.2-1.el7.x86_64.rpm273c24f4ec2ca66e13bc7d0bc67b664300efcf3e0c9309966c89ca830752eba8libglvnd-opengl-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm25a847bb3fa6db70f33106cebfbe00dc8942faf77c18051534d35e86de95d182xorg-x11-drv-mouse-1.9.2-2.el7.x86_64.rpmc3207d8e3ca6a1bbb87b41c168289ad1c962bf212421084eb7d70184ecfec9e8libinput-devel-1.10.7-2.el7.i686.rpme8a325cec430a793086899110f0bec727a33fe63ab4ed6eb8dd7bec3eedaad04libxcb-1.13-1.el7.i686.rpm547848567a86990776d0b0e8506951c75c7ac4f42c90e22c739ccbff9a2ee588xorg-x11-server-Xephyr-1.20.1-3.el7.x86_64.rpm1a32170c4ee1ebf4c1bfa3c5bae80e03b087920545c213f8473d6423318b7872tigervnc-server-applet-1.8.0-13.el7.noarch.rpm005788ee83eccf35b52cdc850cf412797a45e2014690ed0510e115b82fadacfcmesa-vdpau-drivers-18.0.5-3.el7.x86_64.rpm9cf2391c6e0d1bc7f2e6b25298f740d27213b3d068ac27ad9a33de8a66edc383xorg-x11-drv-vmmouse-13.1.0-1.el7.1.x86_64.rpmb38d490a493de815dbd267295849fdc8d05bab6c537de072c5c1cb5901f4dcealibXres-devel-1.2.0-1.el7.x86_64.rpmcf439df27590448e77c0fdff0a044d951db47142b2fafc9796421bf25b2d7cc6xkeyboard-config-2.24-1.el7.noarch.rpm04ebe53957d132bc4e625f775cb015ea7064c4f4726ae791d9e94e9b77530443libepoxy-devel-1.5.2-1.el7.i686.rpm18357034b8bf83317ef8acc1af81cc1245cfc7ec53a3ec800dc6970d289b1335mesa-libglapi-18.0.5-3.el7.i686.rpm0758d52f5ddffe54b71daa1c157a57e66979898484deac86f0e6a00657f21157egl-utils-8.3.0-10.el7.x86_64.rpme3c322d1522d59f8e4294d5ce9c2580deeefb2ac32b44be5ec7575fe2674ffc1mesa-libOSMesa-devel-18.0.5-3.el7.i686.rpm05a0e20453a0bb7adf19a004ad204f9157b58871c4888df3ab5966945a5e59a9xorg-x11-drv-vmware-13.2.1-1.el7.1.x86_64.rpm537f64ef752193fe78a0d15c3d8a61c387605be5dccacdcbabca970949de1354libdrm-devel-2.4.91-3.el7.x86_64.rpmd96efbdf072747fd4e46299840c4ca5b8af9c56453344f0e5d1c38dd716df56avulkan-devel-1.1.73.0-1.el7.i686.rpm83841aba869f1273b7d320b7fb39f96b0183ad0cb9f215652bd17d60d6dd1887xorg-x11-xkb-utils-devel-7.7-14.el7.x86_64.rpm0a246b6bd9aa0418cca0bd5572f8291353c1902aeddd54f0d675ba36aad63548mesa-libEGL-devel-18.0.5-3.el7.x86_64.rpm01aecef1b1b7bb2ecd09078b2c51c6f031f6ed3a6d91de62ed9008118486e389xorg-x11-drv-mouse-devel-1.9.2-2.el7.x86_64.rpm8bdc90752fa6953caa6604f6acbd8c4de8eb5e6d9df2c24326a9446c756492e6xorg-x11-xkb-extras-7.7-14.el7.x86_64.rpm2635574e736cf801f786738930426f229def57f1c349be76fd67c1590c4ce739libglvnd-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm369471af4c83de168979c98ef3e77b16543a98f658834691f2d5977c1974bfd4libXcursor-devel-1.1.15-1.el7.x86_64.rpmcafd5bec125e4c7af4e975f58a7dab9d6b208f9ce54ad6348f01edd8aa091985xorg-x11-utils-7.5-23.el7.x86_64.rpm062f9eb1fe70298e8adf96472d9a75d2ecb3fe4af66b5f1c1ffbdf7ca064c14amesa-libGLES-devel-18.0.5-3.el7.x86_64.rpm0a5c00778dc9552f771055b8437580b09eb86a95e5f8d9da45e03e90fbab9b57libdrm-2.4.91-3.el7.x86_64.rpm9821252830967e1cbcf963d602cbaaa7240a92a257dde66c2621baf43a3e99c2libXfont-1.5.4-1.el7.i686.rpm27f4609384e7189c21f0033697f3382342006b4dbee025e38049502ba5cbdd57xcb-proto-1.13-1.el7.noarch.rpm2d2e50ccc657dc563ff4688652bb9674583c0fed1c443dfc87d133c178a9982fintel-gpu-tools-2.99.917-28.20180530.el7.x86_64.rpm3fea0938bb9c76d9a6f60cba2078b21b826a50281ab870eb23e46a443f40e5a6vulkan-filesystem-1.1.73.0-1.el7.noarch.rpmdee255d425130f9a5bc3252d1edf5e5cd29c4f3e193de54929652a9c839f44b6libinput-devel-1.10.7-2.el7.x86_64.rpm84ad9eec0adf2bff7bbf3b8a06b00152efab57e5d95b748564b47e130b59e597xorg-x11-drv-nouveau-1.0.15-1.el7.x86_64.rpm905651609f2dc91e3bfdcf285af1e032822822e636bcd3fa18c2efed99a20103libX11-common-1.6.5-2.el7.noarch.rpm6d8b3e0ecdb93c6d20a0f0406981bfd36f050c4c390021d44a921c21bc29da7dlibglvnd-gles-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm8ea8d43165c3c82bf31cc6153c88b94a27079ad93fff636166010dfe784e245cxorg-x11-server-Xwayland-1.20.1-3.el7.x86_64.rpmddfbc601cc3256a8f34e4b6d93da0ca46bef014cce3de715d5d150aea28cd874libwacom-data-0.30-1.el7.noarch.rpmf5b6f2be3be338c7979e1a74e7b5ac1df1ba9b7cf6a71f197691e6252c386268xorg-x11-server-Xdmx-1.20.1-3.el7.x86_64.rpm73a2c8d07d615b931a5bdf43a0b0b820f4dee341fd3f216ee670684c9235dd75xorg-x11-drv-evdev-2.10.6-1.el7.x86_64.rpmaaba7850c3651677a7b8669dd765e1c61976f7571e92da8e0486328018f5dc61xorg-x11-drv-intel-devel-2.99.917-28.20180530.el7.x86_64.rpma746404190a24376c1c8a6c93bed30366d9a722f03627e314733a8e0559773d9mesa-libGL-devel-18.0.5-3.el7.i686.rpmb7d211798d7c31f00f79aeaaf4c993ffc9fe8b067e76297771048953139875aaxorg-x11-drv-evdev-devel-2.10.6-1.el7.x86_64.rpm03f5ba031f60548d70c2481e1b84c440982ef2f0ac994c1526210ed763300f70mesa-libGL-18.0.5-3.el7.i686.rpm1f456a0fa3b9c2b0fa535162082383f35ec3c532e103558a5106d9ecb60392d5libXfont-devel-1.5.4-1.el7.x86_64.rpm77bf8f75da7793e7f1c7fc98c38fc827f29b14ca01771bd241fb5e98087b0f8dxorg-x11-drv-libinput-0.27.1-2.el7.x86_64.rpm9c7112b0fecfd2e01c42e27576425b6806aebe8c218973a0648de6e257f8b9a0libglvnd-glx-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm363ac6fecc9c18d066b3e4688edb6083a4e9329fa1f1739a5e47d85aaeebac26xorg-x11-drv-wacom-devel-0.36.1-1.el7.i686.rpm8e8e5ac84bc3c204a1c6e3bf23ccb9ad3763b77d7eb1939cee86a4155c21fbc8SLSA-2018:3065-1Libkdcraw* LibRaw: Stack-based buffer overflow in quicktake_100_load_raw() function in internal/dcraw_common.cpp (CVE-2018-5805) * LibRaw: Heap-based buffer overflow in LibRaw::kodak_ycbcr_load_raw function in internal/dcraw_common.cpp (CVE-2018-5800) * LibRaw: NULL pointer dereference in LibRaw::unpack function src/libraw_cxx.cpp (CVE-2018-5801) * LibRaw: Out-of-bounds read in kodak_radc_load_raw function internal/dcraw_common.cpp (CVE-2018-5802) * LibRaw: NULL pointer dereference in leaf_hdr_load_raw() function in internal/dcraw_common.cpp (CVE-2018-5806)moderateScientific LinuxScientific Linux 7libkdcraw-devel-4.10.5-5.el7.i686.rpm0f2f92b0ec59d394ea6c1e7182855532c28830de1f2b474baf7a6474449f1df3libkdcraw-4.10.5-5.el7.i686.rpm95268388bb36b927929b25f07f72297baac5fc1e992e747a8896d2c6ead0e9d1libkdcraw-4.10.5-5.el7.x86_64.rpm9f3132a4f8a083b3331d764b6582f907a982b0fec5b9c69fb9df1641373f219elibkdcraw-devel-4.10.5-5.el7.x86_64.rpmfe2eee21a7b8facc27cfe692f44373308502a9889b4c8b720138e1fb6ba4e370SLSA-2018:3071-1Krb5Security Fix(es): * krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data (CVE-2018-5729) * krb5: DN container check bypass by supplying special crafted data (CVE-2018-5730)lowScientific LinuxScientific Linux 7krb5-pkinit-1.15.1-34.el7.x86_64.rpm6e0b6b457834be28fbf9a5000db8e46b841f9be1b51bfed9529efebadc2b164ckrb5-libs-1.15.1-34.el7.x86_64.rpm059350eb17e79f2aef246190097c2336f253321386b97e0576547ee605f6afc0krb5-server-1.15.1-34.el7.x86_64.rpmcedb91efa59f11c91707fa5d5d73971e8df6cfbe0e9fa25e2a8e2f450fd76b5clibkadm5-1.15.1-34.el7.x86_64.rpm7c7ce37f91c4ffdb92cbb4b77f4e4874f13521c02864ae8d66814e09b2580c6bkrb5-libs-1.15.1-34.el7.i686.rpmb67d561656b794aef21e380b7a900de2b5af0ca30c162edc14fece5eee0283d8krb5-devel-1.15.1-34.el7.x86_64.rpmbb671d63e57a8cec291a1d9b1847c3bd187628f3ba932152f73af92add0f8427krb5-workstation-1.15.1-34.el7.x86_64.rpma6b9974147e55cfb3e2de38499d70a9f4a26c8aca92227bf1420249309633d46krb5-devel-1.15.1-34.el7.i686.rpm4ace895acee50fdde4e72b56f64eefa471d5cc7d01d0382e1411fe184465242ekrb5-server-ldap-1.15.1-34.el7.x86_64.rpm3b5352f0ff08c9305fa88fd74914be24f3151d89d3e458b18da6ae571c305b1clibkadm5-1.15.1-34.el7.i686.rpm7f1f09e283a628d528f32d4cedc37b32d938188073db7ac42d0dca3a58145683SLSA-2018:3073-1ZshSecurity Fix(es): * zsh: Stack-based buffer overflow in gen_matches_files() at compctl.c (CVE-2018-1083) * zsh: buffer overflow for very long fds in >& fd syntax (CVE-2014-10071) * zsh: buffer overflow when scanning very long directory paths for symbolic links (CVE-2014-10072) * zsh: NULL dereference in cd in sh compatibility mode under given circumstances (CVE-2017-18205) * zsh: buffer overrun in symlinks (CVE-2017-18206) * zsh: Stack-based buffer overflow in exec.c:hashcmd() (CVE-2018-1071) * zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution (CVE-2018-1100) * zsh: crash on copying empty hash table (CVE-2018-7549)moderateScientific LinuxScientific Linux 7zsh-html-5.0.2-31.el7.x86_64.rpm5fc4e41b581e92c61eb926101630790b661b7649519c80f6cc166f804d34beb3zsh-5.0.2-31.el7.x86_64.rpm9b059e912bccbda0307cf9a2753beeae59991c327acd4aadc6cc8af855593ac7SLSA-2018:3083-1KernelSecurity Fix(es): * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) * kernel: out-of-bounds access in the show_timer function in kernel/time /posix-timers.c (CVE-2017-18344) * kernel: Integer overflow in udl_fb_mmap() can allow attackers to execute code in kernel space (CVE-2018-8781) * kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902) * kernel: Missing check in inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405) * kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830) * kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861) * kernel: Handling of might_cancel queueing is not properly pretected against race (CVE-2017-10661) * kernel: Salsa20 encryption algorithm does not correctly handle zero- length inputs allowing local attackers to cause denial of service (CVE-2017-17805) * kernel: Inifinite loop vulnerability in madvise_willneed() function allows local denial of service (CVE-2017-18208) * kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service (CVE-2018-1120) * kernel: a null pointer dereference in dccp_write_xmit() leads to a system crash (CVE-2018-1130) * kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial of service (CVE-2018-5344) * kernel: Missing length check of payload in _sctp_make_chunk() function allows denial of service (CVE-2018-5803) * kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption (CVE-2018-5848) * kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image (CVE-2018-10878) * kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet (CVE-2018-1000026) * kernel: Information leak when handling NM entries containing NUL (CVE-2016-4913) * kernel: Mishandling mutex within libsas allowing local Denial of Service (CVE-2017-18232) * kernel: NULL pointer dereference in ext4_process_freed_data() when mounting crafted ext4 image (CVE-2018-1092) * kernel: NULL pointer dereference in ext4_xattr_inode_hash() causes crash with crafted ext4 image (CVE-2018-1094) * kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2018-1118) * kernel: Denial of service in resv_map_release function in mm/hugetlb.c (CVE-2018-7740) * kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c (CVE-2018-7757) * kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service (CVE-2018-10322) * kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file (CVE-2018-10879) * kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image (CVE-2018-10881) * kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function (CVE-2018-10883) * kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c (CVE-2018-10940)importantScientific LinuxtrueScientific Linux 7kernel-debug-3.10.0-957.el7.x86_64.rpm12adda2e4a50f7793d6f908d0c0cd8b5e8b1f1e77be79c7076c024aadc67ff60kmod-openafs-1.6-sl-1.6.23-1.SL76.el7.noarch.rpm1b3a2056f4d0413a86d13cfdd535f5e994e4e7d14ccad91f872f23cc71766b90kernel-tools-libs-devel-3.10.0-957.el7.x86_64.rpm46af9a55559b2067542d798073ed37eb5b6489c8c76a8c38f195ae2e62082928kernel-debug-devel-3.10.0-957.el7.x86_64.rpme1758b55347a72ed1da3c09485904d1ef7f8d4ae61651e5dd7fa9a293d9398bckernel-tools-3.10.0-957.el7.x86_64.rpm785bac81189006c337da76ceb3d01a6a5c9bcf42d391f9a85c850bfb95acf210kernel-tools-libs-3.10.0-957.el7.x86_64.rpma278de5b473a89a01d926b8b449e1c7da89a5f4d8a6b6067b5913fd1f3c30e9dkernel-doc-3.10.0-957.el7.noarch.rpm5a84a2d8d9647f3be4480afed1eac581f240277cbd471b5dcd04719c970c8684kernel-abi-whitelists-3.10.0-957.el7.noarch.rpm75076d34209f66e3bcc3206565ac145dcd628d8798f89e14464129c9346f4424perf-3.10.0-957.el7.x86_64.rpm1f3aff2a3dfa3daf8cecd08aaf6476293eda32794a97c2c8f709ac319ad69665kernel-headers-3.10.0-957.el7.x86_64.rpm84f1d4e682e6498091e3b4667ee81adf3dc0918807d48dd616d3cedae6329d35bpftool-3.10.0-957.el7.x86_64.rpm1f866e5351d12c5e351ef877d5da356e5012b159cc09d14b2e539d61e0dbbdcckmod-openafs-1.6-sl-957-1.6.23-289.sl7.957.x86_64.rpm4718b8eb44cc2e7a9250bb85e5c89e29505108bc812509f1d869af54ad28c98cpython-perf-3.10.0-957.el7.x86_64.rpm1cc93be33ac69a3cd738fe73170419b4d83ac1c66b67b6bb82cb3ff8cf27012ckernel-3.10.0-957.el7.x86_64.rpm77e1498e67f6b801a2664ca1d589ef455eed3bb06700477151f539774ca35b87kernel-devel-3.10.0-957.el7.x86_64.rpma665d1882d64b3bab3dba0b5471156cdaef9953e35399d08c6fad5b440143f87SLSA-2018:3090-1OvmfSecurity Fix(es): * openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service (CVE-2018-0739)moderateScientific LinuxScientific Linux 7OVMF-20180508-3.gitee3198e672e2.el7.noarch.rpmbf62a31163b3030735af0456c2ad87aa20c25300439eb8e105d348c7426ced12SLSA-2018:3092-1GlibcSecurity Fix(es): * glibc: Incorrect handling of RPATH in elf/dl-load.c can be used to execute code loaded from arbitrary libraries (CVE-2017-16997) * glibc: Integer overflow in posix_memalign in memalign functions (CVE-2018-6485) * glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow (CVE-2018-11236) * glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper (CVE-2018-11237)moderateScientific LinuxtrueScientific Linux 7glibc-headers-2.17-260.el7.x86_64.rpm23b384719fb153a684f5e6b898be45cb2f404247f3e7103cbd23ef64299cc560glibc-static-2.17-260.el7.x86_64.rpm827f5c3f559668b841528a3dfa1c7b55a19e5aaaaccbdc9f3515308e75969196glibc-devel-2.17-260.el7.i686.rpm1c2fedb11baf397456e6f9070579d0b2fd35315bc43a38b7a487380c928a4d4eglibc-common-2.17-260.el7.x86_64.rpm369510034cbb4ba6f2c8df109064dcee9fa92b483dd8d335f4a38baad7daedecnscd-2.17-260.el7.x86_64.rpmb42d51a291379c7524691ce16d5629f81f0e4acc82501943cb13ba3d4a08cc3eglibc-devel-2.17-260.el7.x86_64.rpm681bd9d11aceac0dadcdf1489782b8867d1cd22f3208cce8fb38b4ae563fdb7bglibc-utils-2.17-260.el7.x86_64.rpm1f58351625b8eeb6017a4f5f218bfcca4e65618f64bf47e7d7144527c8419afbglibc-2.17-260.el7.i686.rpm60f6c1e7c8474beebace147a392d322ca20613871937c058650b856f96550517glibc-2.17-260.el7.x86_64.rpm7dcc8aa24f99ad119d51c5e2c46cc42b3865cf49d9df5f7d40893b0f90ccd62fglibc-static-2.17-260.el7.i686.rpmd323d00cb3de82d4fb569b9b2f295e73da28c2df9affa5b78b0cb1ea09dba6aeSLSA-2018:3107-1Wpa_SupplicantSecurity Fix(es): * wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant (CVE-2018-14526)moderateScientific LinuxScientific Linux 7wpa_supplicant-2.6-12.el7.x86_64.rpm1143818d5fe67389f47b29b75ce6fca18a96aee278831f9affd89171314c70e5SLSA-2018:3113-1LibvirtSecurity Fix(es): * libvirt: guest could inject executable code via libnss_dns.so loaded by libvirt_lxc before init (CVE-2018-6764)moderateScientific LinuxScientific Linux 7libvirt-docs-4.5.0-10.el7.x86_64.rpmbcb169dfd0d952012f2574303e7db436ab1a9ba759126ed8cea3a4764e7a0191libvirt-daemon-kvm-4.5.0-10.el7.x86_64.rpmb09cfe8771f7f7ad694ff696bdd1cea425fe85dc79d0007097a6eaf35463bc35libvirt-daemon-driver-storage-rbd-4.5.0-10.el7.x86_64.rpm90659892738ac699196bd1a4cbd46f046655d3456504c004d814f984dbcedf9elibvirt-daemon-driver-storage-mpath-4.5.0-10.el7.x86_64.rpmbfec3dcf10c6f15ccdba185b38281270a0718062e1994272183e623801aca5b1libvirt-daemon-driver-interface-4.5.0-10.el7.x86_64.rpm0962f232f1c9d1533b649fb66d031f94b6ce0ffc3959149e7dfe78ae7fb1ac75libvirt-4.5.0-10.el7.x86_64.rpm2060e6f2b3b806acf79a49ea91709f93c4dd3a60db9e2fbc4b1c9d98bcf69f42libvirt-daemon-config-nwfilter-4.5.0-10.el7.x86_64.rpm24f217dbb6471b146c692b9f3966f56f628edd2e0a45c8a1d8db7c0c5f628c68libvirt-daemon-driver-storage-logical-4.5.0-10.el7.x86_64.rpm372de5b2d1cc0258fc25bcc0eb99ebea53b23ab86eaf0c0876a7c0fb7ebb9efclibvirt-client-4.5.0-10.el7.i686.rpm8ea620b2e421277bb4ac8c806ff0e808400a8c7c7f7968e91db605e66f241fb8libvirt-daemon-driver-storage-scsi-4.5.0-10.el7.x86_64.rpma74b37e45bb5216c4f10c8df71a6f870f1d288ed1c262f97a902cebb5adbc785libvirt-daemon-driver-storage-disk-4.5.0-10.el7.x86_64.rpmd4b039ab63dd977765001da464a827a113c5e4a4d29695cf3dd796bcc0b6a454libvirt-devel-4.5.0-10.el7.x86_64.rpm7622448eb69de3e205bf35e72238dc17e2d69a5c005bd07938ce0aa4f1269607libvirt-libs-4.5.0-10.el7.x86_64.rpmb0763014f57fe5a0830561d111bab70480b47e84a3966af3dc5a5b06d5f692c8libvirt-admin-4.5.0-10.el7.x86_64.rpm0dc3ff840d568519e0182bd4bde7845b3b01834bb553833743c1d229c506726clibvirt-daemon-driver-lxc-4.5.0-10.el7.x86_64.rpm1e71a3fe6127bc018d0a51b20d682dd34de4dede6c835d1271160a55b219d84alibvirt-daemon-driver-storage-4.5.0-10.el7.x86_64.rpm5cbe2a7a688d7260f453085dda47036f78c6d0f7634b613419575c4cb79d18f1libvirt-daemon-driver-storage-core-4.5.0-10.el7.x86_64.rpm442a716a26b48d7a64c7f50d0f43829b9cb4db5dfad9f00fb9456d5afbc58c36libvirt-daemon-driver-nodedev-4.5.0-10.el7.x86_64.rpm8a5358d830645a0c4005b05234ea1e10b56a41b0c27e7ee78754b43d44d3a605libvirt-daemon-driver-network-4.5.0-10.el7.x86_64.rpm020140c6ce6f98337144294110efaf42db49169df97afc51ec794a8a8968880blibvirt-nss-4.5.0-10.el7.i686.rpm8bfaf019fda8bcc0cd3d8b6510cb36c23c94ac2d6da940af176892ed297812f6libvirt-daemon-lxc-4.5.0-10.el7.x86_64.rpmf63f90d7d9e6c98e16c05b16058de6287020e68b57bc94580eb7f2ced2fdc04blibvirt-nss-4.5.0-10.el7.x86_64.rpmadba3c20ce8d4d187d9e3b613223716326412488d0d2872680671077d64c8c6blibvirt-devel-4.5.0-10.el7.i686.rpm64f7562642c48e718e508e536c7e026f5615b1fe271920bffc141d559dc7d34flibvirt-daemon-config-network-4.5.0-10.el7.x86_64.rpm3ebde7b3d6139ef160b9aef92bed1bf4b5e0be2eef2b5bab051d2f1987eac804libvirt-login-shell-4.5.0-10.el7.x86_64.rpm826b2b5faf1a5f151d70a6daa29f9f0d0f1e69adeb30fbc0866ae8b8cedeaf65libvirt-daemon-driver-storage-gluster-4.5.0-10.el7.x86_64.rpm4b6a8055656974c80ee6122bba79b04f7f1b6f92273ca2c3a0e8a9b8d83ae4eflibvirt-lock-sanlock-4.5.0-10.el7.x86_64.rpm7b9f8aee68bb0ea6afc54c5961327261de06bc60b039b71c98cb083f457492aclibvirt-bash-completion-4.5.0-10.el7.x86_64.rpmaa13d4f2bc355a2d589fd4d640721b232b35a3121600fce4dec84235ec683115libvirt-daemon-driver-nwfilter-4.5.0-10.el7.x86_64.rpmae0874b345ec80ededd06a6d69085b5ff87d05d57d14f5d5a48277e332d40793libvirt-client-4.5.0-10.el7.x86_64.rpm4eac3c1fdea252908c9956fb5a018f39965dd698b5ffafb3cc716a5a2710ad21libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7.x86_64.rpmef20768c8f0f9eff9ba958af25848731a645fe878fb74ad867188ca910592da3libvirt-daemon-driver-secret-4.5.0-10.el7.x86_64.rpm9e2e29c21f57511b3b72f4043e0c12c4568ed202f5b8af296b5cc9fdadcbd82clibvirt-libs-4.5.0-10.el7.i686.rpmcbf5ee0b92e3348d038e6dbfd5677abefd45ce9d2ae8b85cb3e285c97f816bc1libvirt-daemon-driver-qemu-4.5.0-10.el7.x86_64.rpm0919db78886de7140fc5fe7fe7766637213a2b15c2e7830dc9a3f13428e1194flibvirt-daemon-4.5.0-10.el7.x86_64.rpme023448b8d0704a0326fbac8cc5ffbe84bfbdec9f15afbd945b6adfa019b9481SLSA-2018:3127-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: Mishandled search requests in servers/slapd/search.c:do_search() allows for denial of service (CVE-2018-14648)moderateScientific LinuxScientific Linux 7389-ds-base-1.3.8.4-15.el7.x86_64.rpmdc0e53b0cd69567ff80638fbddcac379e441771ab5f48e95f0fd39b762786263389-ds-base-snmp-1.3.8.4-15.el7.x86_64.rpmb830f9dd2fae410fcadf836f86a8a935fbfa8b9579ab783fc117ea20e5391b4a389-ds-base-devel-1.3.8.4-15.el7.x86_64.rpmde015796dadb2eded1282f4ecdaaf8a7767edfd78fcac3231c51ff4fe3cc268b389-ds-base-libs-1.3.8.4-15.el7.x86_64.rpmeaea48c6227339f40e334f78c74139cf412c3d34b16b82dc72553aeb85b0f9e3SLSA-2018:3140-1GnomeSecurity Fix(es): * libsoup: Crash in soup_cookie_jar.c:get_cookies() on empty hostnames (CVE-2018-12910) * poppler: Infinite recursion in fofi/FoFiType1C.cc:FoFiType1C::cvtGlyph() function allows denial of service (CVE-2017-18267) * libgxps: heap based buffer over read in ft_font_face_hash function of gxps-fonts.c (CVE-2018-10733) * libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c (CVE-2018-10767) * poppler: NULL pointer dereference in Annot.h:AnnotPath::getCoordsLength() allows for denial of service via crafted PDF (CVE-2018-10768) * poppler: out of bounds read in pdfunite (CVE-2018-13988) Additional Changes: * PackageKit is now aware of our SL7 minor release upgrade tool.moderateScientific LinuxScientific Linux 7libgxps-0.3.0-4.el7.i686.rpm465f7b69e8cdc6de62033e5b413c6d1653d648c0c00a6712e567d0d8a357dd19libgovirt-devel-0.3.4-1.el7.i686.rpm7a3f9db3b5b11fa9223991d74564e5fa48436b063d73b0d45419e0d13c906f99gssdp-1.0.2-1.el7.x86_64.rpm89913dd5ff7b6886b8d2f0af6d92af32aefed17eafcb82cc64d2274f0bd76619gnome-contacts-3.28.2-1.el7.x86_64.rpm71ba536cf5859ff1dc76b59b75d79e3f19ebd39469e20dba146a4b5d42c647d8atk-2.28.1-1.el7.x86_64.rpmb63f5a5ab23ba6cb04b868db7513a664f5dcbc3817bacb65ca0052125e1950b0cheese-libs-3.28.0-1.el7.x86_64.rpm9d87e43b9f8f92cb142a9a0d52861ab97746c06fbf2361373b5db000c4adcd34cairo-gobject-devel-1.15.12-3.el7.x86_64.rpmded261e48f8f4082c4302c5f91803d026880431ba9fe893089c2960a3e84661adevhelp-3.28.1-1.el7.i686.rpmdcf5bfa49e864537079608a6fc892413c6526d154506673e2cec5893f8299974gnome-backgrounds-3.28.0-1.el7.noarch.rpm567a5bee306bf01cc24682abc81157898155f9dc103774a6452c8e274a8533a1fwupdate-efi-12-5.el7.x86_64.rpmb08c6e388b5f4e8fb26c745d2e064224698348a0b1924f8d3a994c1d06051233totem-pl-parser-3.26.1-1.el7.x86_64.rpm60cefaa0124607595aee586c3c4515a887a9308791f5545531a86da79b514496webkitgtk4-jsc-devel-2.20.5-1.el7.i686.rpmd689c6602d7c3da4e0e1162f4cff20d95c4208182b6088c5d9185ef84bf0fb15gtksourceview3-devel-3.24.8-1.el7.x86_64.rpm20b3283ac61d1921aad06019a719c2f8eb84cfc22e49ba8a6a19f5c57f1077a6gnome-devel-docs-3.28.0-1.el7.noarch.rpm0d892dbe7f4f2623a548cec776130114d3ee755ace82e9b44a49d001585bb5e3poppler-cpp-devel-0.26.5-20.el7.x86_64.rpm60d28f1f570048ade71a8924279d6d52d76f4f7c6cc6a4b1b4729e41e7a37189osinfo-db-20180531-1.el7.noarch.rpmf636b3fe4db4a6aaee0102520a445fd09188838a0fb4baad3122c2efd59f9ba1freetype-devel-2.8-12.el7.i686.rpm1d7a54a748dd3d7b5b563a9844cebb31221b35fd8136889fb4dc5d35875d7b18evolution-data-server-perl-3.28.5-1.el7.x86_64.rpm2301c68d2e7c0873b76560436764da3ff378f27c38dbd0ab5e4e179e0a3a8ee5totem-nautilus-3.26.2-1.el7.x86_64.rpm3e07c19c8118883ec1fe5fd910713142d6e0c1c69a8e6fdf647ebcb489badb1fpoppler-glib-0.26.5-20.el7.i686.rpm29de6b1008ade61b04212d6380c80f5af7f3a1a6298ce4ae81eaacadb5dfff1cvaladoc-0.40.8-1.el7.x86_64.rpm68fc01541f83c8730a6e8215ce5e68a54212eb0060dce19451b38f5b17805192glade-devel-3.22.1-1.el7.i686.rpm053905ef46ac89ae73e1712e6eb0fc4198fe434f71a60947aea55caf1d45a67aevolution-help-3.28.5-2.el7.noarch.rpmf734bad0b28166984fe4bb9208d1134c9306ec1065ebb34fb020a896c8297866at-spi2-atk-2.26.2-1.el7.i686.rpm415594fa448bab2a09d09c7772cb3f05be3c13c76bb5431b98a0f79e8e1f2c91brasero-nautilus-3.12.2-5.el7.x86_64.rpm00b6925e1b300d640eae20b2f7ff9dfafc4f61e73436c6139316d390f370e539evolution-devel-3.28.5-2.el7.x86_64.rpmdea5c1a1cbcffb0f5ffa504896c89c7faddf619f01ea7213d94dbb95eb4572beevolution-mapi-3.28.3-2.el7.x86_64.rpm0ecb2013acec70592bbe55abeb5a814599b31e7c08ac4ff80af4c1bcdf54b963libchamplain-gtk-0.12.16-2.el7.i686.rpm58b0383a29fe9e59aa8c55924bb4d4672046f14f1b524e653f4ab0cd26a50dc1glib2-doc-2.56.1-2.el7.noarch.rpm203419e47abb77ebb4d699e0b7479f115ecd4314ae1f07a83c93fea8413fed7egspell-devel-1.6.1-1.el7.i686.rpm60b32c8ee105b8d82d02ad20dc0fd04d151b96542fcdf71d319c07c0e39340dbPackageKit-gtk3-module-1.1.10-1.sl7.x86_64.rpmafa2f4487b3775c2b642745ecb94ac6a9379a871867e0f2ce769553ee6778723geocode-glib-3.26.0-2.el7.i686.rpmdccbf51dac48bb2d1980e3e0cbce489d5d882db8dffdf242f74b33916c108d93at-spi2-core-2.28.0-1.el7.x86_64.rpmbcc25a966be32c30bd1d7530d89456810fa324c5acacc6a3803ea3506a9e0df4libpeas-gtk-1.22.0-1.el7.i686.rpm15575166e96d75bc6a2e0b6aed1a5e3878f2d73a9594e8ca4a6e0193dd273e08adwaita-cursor-theme-3.28.0-1.el7.noarch.rpm0525f0c54f5dfe05c7c3ed384209cff707d7fbf43988025fef746e1a037e761fgjs-1.52.3-1.el7.x86_64.rpmf4b18c339c6856a2867c7179af2147941c46f1e55ac584d3d5ed856a921598e4grilo-devel-0.3.6-1.el7.x86_64.rpm85388afe3c1482cbdc8a0f6e7e35d6dfea824e4dc004eaf8d247ff0970a6da25mutter-3.28.3-4.el7.x86_64.rpmf00ec0732ac36018b9041bcd332205b1ed94b2002d093577e15b986961f0e8e2libical-3.0.3-2.el7.x86_64.rpm765b9cf8a6c7c4b2ba606504109e997b0587144b156bbd1b8219ace43f442230gssdp-devel-1.0.2-1.el7.i686.rpm6cb43ca58e51591abca9f14359557ce3448c1826af0c1118a386ae5d51408055gstreamer1-plugins-base-1.10.4-2.el7.i686.rpm1402a7142d77de69cb79a294d1d1e7e5e729acbbd241316c085a298f40617f1elibappstream-glib-builder-0.7.8-2.el7.x86_64.rpm1600b8b03c81341246ae8b000a006585821c58e6c04d3ef1c641d7b76dd678a4gnome-shell-extension-panel-favorites-3.28.1-5.el7.noarch.rpma940ccf4a44846ef56c703d783e5ce8fa0dc65cfd7f238921763fcab1f047478adwaita-icon-theme-3.28.0-1.el7.noarch.rpme18745917fad1e0b69e577b5dba8a3db388de1134fc6299d81cfed3a33b237fblibical-glib-devel-3.0.3-2.el7.i686.rpm1422350a0ba2ef17a2dec28724490ba0a9fa9ca688677ffacebc63f96ab1f5f7libgovirt-devel-0.3.4-1.el7.x86_64.rpm72dc081b8f6290ad4f41b3fa833551b6905317e232d4e6aaf6ddf435c3c2cca3poppler-0.26.5-20.el7.i686.rpm13d32db6f678fb30e9dd5b2a747d949f6a659ab4ff2129e641b9c2901d46f093gdm-pam-extensions-devel-3.28.2-9.el7.x86_64.rpmf0e1dc1332ac896fa09f99777e6d1c32c50e5638bfee3c8acd23ba2d9cb09670libcroco-devel-0.6.12-4.el7.x86_64.rpm661b87847c0201f5e7dd529d1f53a5b8992e110d9166161e71730a9a3282e88dmutter-devel-3.28.3-4.el7.x86_64.rpmd5f005d6d16796c391dcc0f0cab01af1cb1f7e18487d3326ed473567f15bd291google-noto-emoji-fonts-20180508-4.el7.noarch.rpm27d4e2ac3def73eb7850861a2d7ac13713c79fb92167e71289a7b77975e8be5fgnome-keyring-pam-3.28.2-1.el7.x86_64.rpmbaa0f046268de3d076317c6a3005f6e1d17771e6098d3b128386275f70008720glib2-tests-2.56.1-2.el7.x86_64.rpm619630268dc6229703a1db3708327381763d809765fb35e189f448fc90d77112geocode-glib-devel-3.26.0-2.el7.x86_64.rpmefe7df901372042698bdc7dcc67f70538d934d96b491dd3a1020fe0ba27f1f21evolution-data-server-doc-3.28.5-1.el7.noarch.rpm731cd375b75402cf6cd4e40349f5de770024b0b1b41eb899309f77859f96cbdcgnome-desktop3-devel-3.28.2-2.el7.i686.rpme81434d66f6df2cb4433c421a681886ae37fdf1beae62d76d39fc1b7ee62a6d9libsecret-0.18.6-1.el7.i686.rpm767cd911bdf306a932bf33893c07e5fe8f36fd6f1f676f4a1d63ab651c15012ayelp-devel-3.28.1-1.el7.x86_64.rpme1ece2063994be63f5a823cb8b93843332cad84db38c6c5e8a27c86232bf177agtksourceview3-devel-3.24.8-1.el7.i686.rpm064bb2365f0c526f1dc12ce4210253c43ef72c74365a1f2004c260dd929ab493valadoc-0.40.8-1.el7.i686.rpmd0f8165e1550eb85ec4e3838bad9812ba32e28a18f829144c261af6c84b8295cPackageKit-gstreamer-plugin-1.1.10-1.sl7.x86_64.rpm032587a1e8e7d12f31360a04594211c2a31b47e618345743ccd23b58e2d1aef8PackageKit-1.1.10-1.sl7.x86_64.rpm385e30cf59b1edaded00d2775d9c6647b578d250c300475eb3cbceb74aa3631abolt-0.4-3.el7.x86_64.rpm02561c28515d8d58872b361379664e8b4af977e5054df65a2c55aedf3dbd825atotem-pl-parser-devel-3.26.1-1.el7.x86_64.rpm5fc39d5443f3a05fb0b87af1f4c6f3d1d0bb82186670ddac2aee84a9b3f8679eglade-libs-3.22.1-1.el7.x86_64.rpmb106b4b4813abde60d25706e8c12a11492defb61976e7cc8007918b5b085e56eglib2-devel-2.56.1-2.el7.i686.rpm7961336cfa452b59f39179a6a53b1cf05af00eb83a619abed7b649f560db3cbbfile-roller-nautilus-3.28.1-2.el7.x86_64.rpm5df4bafa4f5720a38d017ab9dfb65c1d48c7a675e4fd67162e04fc684aa3fa66glibmm24-devel-2.56.0-1.el7.i686.rpme7d98a1c2a64a0a67d260e78260a0160f71e4b8869dc427b57b9254e20c9f6a8vala-0.40.8-1.el7.i686.rpm3a88decad47708e89f93af514b436a6c7d844edae2db1f0c345f8731fc89069bcairo-devel-1.15.12-3.el7.i686.rpm7b2c2ab89559e5573c6a77a13a8cabdca977e2af570037d5e5d2757a6cff9ef5evince-nautilus-3.28.2-5.el7.x86_64.rpm44964ac9f06b57b0e4a685691a4fe60b8d348438679c27a7f7d4c454961e0c18evolution-3.28.5-2.el7.x86_64.rpm34133c5beef4894f02c0095ea63f9215b862edbe805e5d31f6547f267f5cbbd0gom-devel-0.3.3-1.el7.x86_64.rpmb26f3dbaded1023eb88f722ec39c27b0e6109264c8da8517b892613af8a5a146libgdata-devel-0.17.9-1.el7.i686.rpmaf62c27806a78ea139492b322fa2190f2aa0162968ef8334284e8a0e9b796f2fgnome-clocks-3.28.0-1.el7.x86_64.rpma6658be4aeaa7e6349fd421ea7c2f8da5ca1b514b4d464409f847b09975a5d08gnome-shell-3.28.3-6.el7.x86_64.rpm272aee51d118dc541cda457c34c480f170b2b55b21025ca7b782e1f768990030devhelp-3.28.1-1.el7.x86_64.rpmbc88bd410c0ab6e0d85532ec3d72744237372d62ec70ac19e290aae83fbb7fe4geoclue2-libs-2.4.8-1.el7.i686.rpmd22723a52444e57bdc18385ed1dbb0a61d268d39dbe4a186e9f36d6e582f2037gtk-update-icon-cache-3.22.30-3.el7.x86_64.rpmca751de5e5ae1aa274a7616f789ea90f788a6fd51e9dd45ccc55249e53bd7ae2harfbuzz-1.7.5-2.el7.i686.rpm528278296095b6ebd689f0fcf253af4ba524d0cfceb3d41609329398a7baced3vala-0.40.8-1.el7.x86_64.rpm67ef8f29f16778f7c9641e4496c5eaa15f8ce27eeab2ddf8a3a127fc247e0806libgepub-devel-0.6.0-1.el7.x86_64.rpm570912c51702877aa258b1c2bd6592430c0ea0596568daf2b9b6d33c4ff8408dgnome-shell-extension-no-hot-corner-3.28.1-5.el7.noarch.rpm347487f753821f242338f1ac1e96c70dc12ead43db8422d45c62646bc6caa23efwupdate-libs-12-5.el7.x86_64.rpm91fe3e65cf1495c6716c4fe268beac310c4deff56ece0e63fa7b5e6b3fa4bc77harfbuzz-devel-1.7.5-2.el7.i686.rpm1f418a090e649ffe1b1e1ac7e1aed190c8d3d869a25013c0a825dcdf7a2fe953libwayland-cursor-1.15.0-1.el7.i686.rpm58f0ba13b6265b971680dee17861b13ab3d1e7eb3f8db06a9acc98e11ba5d9dagnome-shell-extension-auto-move-windows-3.28.1-5.el7.noarch.rpm415a90497d961ff05086dea89591db7a33980d493dcb7a14a8a26d11664b6930xdg-desktop-portal-1.0.2-1.el7.i686.rpm7155ef8f92e1f86e1266e1e9e03d266bd8f6d2383f6d71870703cab05a1d2dd8yelp-libs-3.28.1-1.el7.x86_64.rpm49a333eff46c27a2d104e028438010434c7691fd61762df0ecccae0155da7b20upower-devel-0.99.7-1.el7.i686.rpm75fd8e8ae6d6bae36597575ea067be57d05a1aa13154deb72c3fde311bd8c3c2libmediaart-devel-1.9.4-1.el7.x86_64.rpmf684fc145dc14adc67a0900b6b6a1636bcc2b82d93bcfbd43b3bd308a0fd189fevince-devel-3.28.2-5.el7.x86_64.rpm61b96752f8e5a003c62b6a4209ef2b76397ccf105b6bef6ee5f0bbb6c06b7aeclibgdata-0.17.9-1.el7.i686.rpmf310f60be43267b22c87a8fbab86b9afad3cdcaa7e0f4fae0e538e7f26aa926fatk-devel-2.28.1-1.el7.i686.rpm4b8a27af28186f57cedb0e6bafd98f1f74b027f9fd58ce4fbe41b703b8be8917libappstream-glib-devel-0.7.8-2.el7.i686.rpmf5b9a2b08d8c6c98ed1d5d25fa82f9cd74df66af472e2675878dfd454488d465gnome-shell-extension-apps-menu-3.28.1-5.el7.noarch.rpm009e7520dcfc6332abaafdc4eecb281b5381e510afe2399835d04cca4b5b2a44evolution-data-server-langpacks-3.28.5-1.el7.noarch.rpm3532dae01278d4ce49e56da3ee8fab91bdaeebd2fcdda30925fa7bd4892950d2python2-gexiv2-0.10.8-1.el7.x86_64.rpme9eeb4c6a7012ff78171b4e406bb7d46aa7f081b2941ee8b45caf17ae5a55b3dgssdp-docs-1.0.2-1.el7.noarch.rpm133fecd999e136a799ddb26847c4541ac384f4aa85ba63ddccedcd0c715fe46afreetype-demos-2.8-12.el7.x86_64.rpm4940f6ebda9c24eb8bcb9b44450f3e1a757377a5e0aceecda78c45c609e4258ageocode-glib-3.26.0-2.el7.x86_64.rpmaa8dae35a085694f97d96f591c044ff0419058eb8509f6444feb224bf4f83bebcairo-tools-1.15.12-3.el7.i686.rpm083626b26ae24012db0e0ebb1684d5cd66dce673eeca179ec6ac4b44e487f7eclibgnomekbd-devel-3.26.0-1.el7.x86_64.rpm908007638907bc621b7ec0039bb50165750224cb5bc291ea23603c99ee60c8a0seahorse-nautilus-3.11.92-11.el7.x86_64.rpm42e627c9d7a64864bae510a1f86ef7fcf0882d1878b8042ffaad7464f83c1dbdgnome-boxes-3.28.5-2.el7.x86_64.rpm8f8d87958e312b3a64f6c8864da18aff6b4c260d376ccc8091345cdb5ee5ef18libsoup-2.62.2-2.el7.i686.rpm7da6207677a7caf328f3e659777bfca3662f27f2b8ec8183c9ff4948dffac8c3libical-glib-3.0.3-2.el7.i686.rpm5574e3efdb613836582d3c77353c1b6508351970e71c2b7269237b44660520c9evolution-tests-3.28.5-2.el7.x86_64.rpm97990a3443c572cc7b7903e884efb8e6393dcb4321952f8e1bd398a57c61c9b8libmediaart-tests-1.9.4-1.el7.x86_64.rpm714a5c134c7dad63a32067d5d852657456f1843e390e6966d6dd814eb8a979e0openchange-2.3-3.el7.i686.rpm9a310e49b7e61d571bd4010b6cc2a91355e88ecc93cb7f42f95dc8b88443b918libgtop2-2.38.0-3.el7.x86_64.rpme5eb9c8eaa766e9b09b532db8def9d5744e51609177395d3fd1679eb6d3f1bcctotem-pl-parser-3.26.1-1.el7.i686.rpmcbfd9a669aa0d88086b8e427ee29c996aa941d1b7f9783df84ba4a31bc2193c3mozjs52-52.9.0-1.el7.i686.rpm6c73881440148b504a00087e76db7cc674dfa9e8897619d21ed7de518bc97b4eflatpak-devel-1.0.2-2.el7.x86_64.rpmdf6ddf74452c666fc9d221d914c9cc99ca500972c5b81bb5b9dba33cfc535629clutter-gst3-3.0.26-1.el7.x86_64.rpmb25edd7b10a6a01fbbc438cd62d02559318982101b84bb817cf80b5ea671cf89accountsservice-devel-0.6.50-2.el7.i686.rpmb29161052afb08eba6dfa12fe7a159b423908de55ad5995bc8936caaef626786evolution-data-server-devel-3.28.5-1.el7.i686.rpm4b1f235e7d9bbc733a27bbbd6db2c296086070401eee401928ee7eae87b9afb1libcroco-0.6.12-4.el7.x86_64.rpm0035c88d9410880ca7fcc0fe2a23c554066e1551b42c9a9b70ae41b4aa84f551gnome-software-editor-3.28.2-3.el7.x86_64.rpm2abbddcc24daea8e106068cad4fc190f22a46efbd07c217840eb2a1b42e2142dharfbuzz-devel-1.7.5-2.el7.x86_64.rpma1948995c0ef285ee1005db1882408e1873a4854b1b036a1fe5c5d3f9fc3cf11cairo-tools-1.15.12-3.el7.x86_64.rpm0f33e895d050acf4f9eb4078007ed03ebbe08c9c93d6591c96f124dfc5b334bcwebkitgtk4-2.20.5-1.el7.x86_64.rpm099d47c5c558a4a27607f56ff1231ef53fdec562d95a55baa1058db2d90c1d6fgnome-session-xsession-3.28.1-5.el7.x86_64.rpm47cb2fcfec1fd5232d547052e6fefba2043e15571325414f557a54f273e3722aevolution-3.28.5-2.el7.i686.rpm7adce3ae4e626aaf8b422b0f9043e37eb4bd3758b182ef21fde2479afff50a3agom-devel-0.3.3-1.el7.i686.rpmcfd3a27181083dc75cf59f2bdf8037f88136adf86739bfdb1f250330071f7f2egoogle-noto-emoji-color-fonts-20180508-4.el7.noarch.rpm016c4bd2bd4c0ab18d2f75861a6c9fccc3c9a99c743d93941babb8c0b5b598efPackageKit-command-not-found-1.1.10-1.sl7.x86_64.rpmd7064e5254044747ca457c306ae74afb1ba7f483f96812a645c483bfc6782062mozjs52-devel-52.9.0-1.el7.i686.rpm682b78ef4c2b5aaaaadfe957b15430297ddc31448346599f16d745e27341fd36geoclue2-demos-2.4.8-1.el7.x86_64.rpmc1546a8e53f393c6c65ca8b9ab5a02462edcac9da4a3a367d0a9c0c2ea793fbdlibwayland-client-1.15.0-1.el7.x86_64.rpm2d6f257847f10823b5fc3e3c87cd016890a49699e3ce46ca114d2ffc97ab04d5fwupdate-devel-12-5.el7.x86_64.rpm721183a05bc5738087a6c1ee957221b7cee61ec3d26ded80176d94a6d66678c6libgnomekbd-devel-3.26.0-1.el7.i686.rpm469084927cfbeede22d7a6ec380d0e0ced6ab7d6dcba237ae8282a2f37b6a27cgsettings-desktop-schemas-3.28.0-2.el7.i686.rpm6d0e710462c97481724374da04884513725c9fd7a692205341d032850e99f1c3xdg-desktop-portal-1.0.2-1.el7.x86_64.rpm01e82025c00f788e8afe0b0f58b73d705327ec50fba16998e2273f639b17cfa7poppler-glib-0.26.5-20.el7.x86_64.rpm734c66834a318eafeb514b70cff887dcd84272fe1fc7b3b0e257ef68398a96fevala-doc-0.40.8-1.el7.noarch.rpm40b0b9a5ce6c0e09fedc17de2f14a8b1c86e73e0573808d5f7f7a64d1bcca37eevolution-data-server-devel-3.28.5-1.el7.x86_64.rpm929dbaf0fec31320b9ab86966b978f7054a8ceee14c4358604f3f45c1fa32a3elibjpeg-turbo-devel-1.2.90-6.el7.i686.rpmedfe63cd2b3a34503167629547dbdfa8c63c6e69aa1060fca9eeeb4a914978d5gcr-3.28.0-1.el7.x86_64.rpmcb3815449cee3ab62f674135cc979c5ef5167436b0849afd880b323275874a05gvfs-archive-1.36.2-1.el7.x86_64.rpm1b7d151f7b37f9f0b07a6030c5cda6cce2552cb5cf403ec6c425d9b5166868a4gnome-packagekit-updater-3.28.0-1.el7.x86_64.rpm0621331199654e1fae028d1cb0443aca3e4f18fe59654a00c8b506fa94df012dlibpeas-1.22.0-1.el7.x86_64.rpm548938167218a138075c52b85dbfe0fc296bdbe864c2af8c630b8758fd5537b5cairo-1.15.12-3.el7.x86_64.rpm954d8aded8bd9929887e4e146330581248b8f165d4a5f21cadf2d612d8a5d8e5gedit-plugin-joinlines-3.28.1-1.el7.x86_64.rpm843e87e9ad1f8ca909abf9cb8e3379163f5ed71b0208532a61913816178946fflibjpeg-turbo-utils-1.2.90-6.el7.x86_64.rpme5b04b76ae9cbe1e95453f30a8b477299d56015445fd339b05f562067da50f2agdk-pixbuf2-devel-2.36.12-3.el7.x86_64.rpm0c56e05d184fef044b0f7a86415fd7337fc8938c2d686c9414b12d331efd2519gnome-online-miners-3.26.0-1.el7.x86_64.rpm5e7ea00d1ae5545abeaf5c00f3ec7c8a6594c5d4523c5cbe6a17a990eab97163libsoup-2.62.2-2.el7.x86_64.rpm9ca9e0dc58ffe2f0b54a86eba692e2e63b2060c1354e71639a70ebca26bcad5dfolks-devel-0.11.4-1.el7.i686.rpm212539b549c60a73cded5dadb490d51851dc0b28ffca3e7623a4f1e5c724936dsl-release-7.1-5.1.sl7.x86_64.rpm0828e745bb756517dddda61513b0992df770ed2030715ef7dac9656f7650ddc1gedit-plugins-3.28.1-1.el7.x86_64.rpm5ed9f463ff82480fb2e93bdeb5c60ba88cd3a7c581888bc101bd8321fa027430libgovirt-0.3.4-1.el7.i686.rpm625add7efcf8b3894a1f3fcd1e7d5b04bb4d30b8afed3160c83afde38d664611control-center-3.28.1-4.el7.i686.rpm8d2744b0120efcf1dbefa7e5bff434134c477d157e9db27d2ea1af47e2258f12rhythmbox-devel-3.4.2-2.el7.x86_64.rpm870c6d51a2e8ac8f67907efada51bc7db2c6a2c7066e50b7ff55a1163778d406gdm-3.28.2-9.el7.x86_64.rpm94801a53d4d1d9a8b83a3b718125683c0b4c35a5ea18c37710f6f38bcba28408gnome-packagekit-installer-3.28.0-1.el7.x86_64.rpmffad06d946b30582a91cf1d6a1891bf5a8c661a9c2e3799808d89293abd32811yelp-tools-3.28.0-1.el7.noarch.rpm15c91ef9809af42e2adc785819327fa0eb88a6ec8b7942f17d4775a5edd4b802gsettings-desktop-schemas-devel-3.28.0-2.el7.i686.rpmc5d9f0e3f6ddaea175fafb405d44ae43478dc1313e5b2bce0b01878c1e17e1bbgrilo-0.3.6-1.el7.i686.rpmcb915e7d09d0cc6b01d05435dd66d13b0dec4a5e031a8c341c849032681a7dfcevince-3.28.2-5.el7.x86_64.rpmdcd8c32fe29030d7833dfd6a2e65b86913e019c6b6077621a08bdf17e1b3209cfribidi-1.0.2-1.el7.i686.rpm41215f51915c847320cc45881c503144903aac481017956c2aada8eb7b917e2aturbojpeg-1.2.90-6.el7.i686.rpm13ac925453662c21229e744fcd8b21b1f17e0f2190d74b6387b9862b330f988egjs-devel-1.52.3-1.el7.x86_64.rpmc448a902d7c0fab53b92a5e4d63e379257b29778433e81bed22eb32dd105c338gnome-bluetooth-3.28.2-1.el7.i686.rpm351a968f7c2f007d7b8471e0f04cfa11246cb9bd3d720677ca8782fe4794d2d5libchamplain-demos-0.12.16-2.el7.noarch.rpmdd5611939b3c6488463d284fdf8efe407bb90aeca3b7ebb0a902587f53a43ac7libgxps-devel-0.3.0-4.el7.x86_64.rpm79881f677338b116d2110b62c3a07004e79dff1d49fa225f451526e14e95b121gedit-plugin-multiedit-3.28.1-1.el7.x86_64.rpm3228295f32f6ae4dce6ae1cc20f3085d0632647f19b718077c5370aa9f68e399gstreamer1-plugins-base-tools-1.10.4-2.el7.x86_64.rpmdb9417214e926175a6f0c08ff420ed4e2e7f0218602b44eb56baebf6f0dbf571libchamplain-gtk-0.12.16-2.el7.x86_64.rpm307afae947a1bde7cb2e19db3955973f6f0b0342cd8a6e7a0dbca33b0d9c11b0PackageKit-glib-devel-1.1.10-1.sl7.i686.rpmfb5e1ef0c71fdb8c4874b98c9ff76fde42024d51e0c4bb53820db3eaf819076aopenchange-devel-2.3-3.el7.x86_64.rpmc284cd04bc74522d3ad4497febfd34e511f48c5285a9a91690d217fa495ee944gnome-calculator-3.28.2-1.el7.x86_64.rpm0da48eecb5fbcccb6c70870c9d97b4c65ae9947495269d92952fa718322334c8wayland-doc-1.15.0-1.el7.noarch.rpm6ac34917fa5ae9bc827cfe47ad5d203594226712f7358f615de18d305ea0058alibgxps-devel-0.3.0-4.el7.i686.rpme10713d10dab335fc414b165acce4eb663bfd31910b1c4a2aa71d374c9e64a32libgnomekbd-3.26.0-1.el7.i686.rpm6e02c0abbfd2a9aab75726b51b06203e4ce837cf64aef39aac74149dd1b8a4cagdm-3.28.2-9.el7.i686.rpma8001b9fc8803086de02a3b212ca4f2b45be6a57099adbebea0ef808922a7924gnome-getting-started-docs-de-3.28.2-1.el7.noarch.rpmd669edfb0041da4056096c332d18d876dfa50d20f7cd460d782aeca792ced779brasero-libs-3.12.2-5.el7.i686.rpm21a9500de0d522e853033067dc14fecde8952aa1bc677a397f3f15071605b038gedit-plugin-colorschemer-3.28.1-1.el7.x86_64.rpm5dc06ed5589d7ccbb9870691be26d347948b6666b5882be0a49f47f570963f12poppler-cpp-0.26.5-20.el7.i686.rpma3a389360487f286ee63994cbea67f5eec1c040a55076f7020601b8c5a764ceflibical-glib-3.0.3-2.el7.x86_64.rpm45f8a20ddcb9f34a3bb79fa7f88ca7febc255e1a7f4eb6bdf0ac0171eb06dd4enautilus-3.26.3.1-2.el7.x86_64.rpm6eccafde77b9c1212b60aa3e22330ae2c1e049b9dda96aca15f7e1cb10e9e4cfgnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7.noarch.rpmff9ed85a7dc0b88f49298cff30e1e6074bc18ae8888ec9e18906f72fe294adb0gedit-plugin-colorpicker-3.28.1-1.el7.x86_64.rpm96be5fd51a862bd309f83e8dc2aed7d265a1608d15134261d0182e7ab16c5f4fgvfs-afc-1.36.2-1.el7.x86_64.rpm9bd992f93f576e06e9c56d8bbbc17eccc32b71b3cb64c7d6f6e67d0a55fdee9dxdg-desktop-portal-devel-1.0.2-1.el7.x86_64.rpmb9801bbd6d00e41fe72d872b24786a317b28a9c190b73ae43c45bb5a3c0eb459libwnck3-devel-3.24.1-2.el7.i686.rpmb01b925c59eb90d42a6cccb855a1da18c88c72286af22ea7fc9f94d83da34dd6evolution-ews-langpacks-3.28.5-1.el7.noarch.rpm01d68e27a72f5ae7c0c4304093b55b09a90fa59969f061155c2a4eb890bf5c90gnome-shell-extension-windowsNavigator-3.28.1-5.el7.noarch.rpm0ef77295a366b29de46b5e979b7fa895d4729ba78c4626b0e95e55fd536c4fe7libosinfo-1.1.0-2.el7.i686.rpm1673935311f223c09bdfc24e50b32069d22a177f8ca3b71eb182544f2e564184libappstream-glib-0.7.8-2.el7.x86_64.rpmfe170983d8e05766c64bdb763bc8d83a8b39690a7ca770118a78b237d7d31073gnome-shell-extension-updates-dialog-3.28.1-5.el7.noarch.rpm7ec35ff14b1ae041ea66449f9f038949329240f54d603c6fa66e4d673669313cgnome-system-monitor-3.28.2-1.el7.x86_64.rpmafdcd06c54a97ba355feeaa4ad82aaf3c7ceff8c772afed8d71edf14aeb8a883gobject-introspection-1.56.1-1.el7.i686.rpm6f2a61e3e0c16548576a3fe8718f47b303017511d4d14c5efac6782d433d3310cairo-gobject-1.15.12-3.el7.i686.rpma50fec5ea2b0b072ddb9b1632392f24f71cbcd50ea578dbc2372e7bb0f0f5850fontconfig-2.13.0-4.3.el7.i686.rpm0ab6d846bc28d5951c7020476b6f2b35eae7ec71f1d7832d597fe9aeb36f932fglibmm24-2.56.0-1.el7.x86_64.rpm180398fede5741c4b5befa1e38a11ffecb10c21d0f338cf7c4cb2f5728c27476gnome-shell-extension-alternate-tab-3.28.1-5.el7.noarch.rpm761804105d53bc3243bae9e3358f3fe4ffc0f876585e7d667fa67a20c2dd3977gupnp-igd-devel-0.2.5-2.el7.x86_64.rpm33f49960b9fbf5961e5f8dcbf25d91d15b6700b7d485e4f31e1e57b2d2c308f4PackageKit-glib-devel-1.1.10-1.sl7.x86_64.rpmcb0575888389f5a701cc848f3b4bcaa2246048daf91eac0b6871fca810d20b45libgee-0.20.1-1.el7.x86_64.rpma0fe5e55b33341206f5b446feae39e9dc56034cec711a6e52f849c55dae41a35libgtop2-devel-2.38.0-3.el7.i686.rpm7ee5a634f376d62aa8bec85908dc41153df8adb371102be0d7cd4368b983bc7dgssdp-utils-1.0.2-1.el7.x86_64.rpm2619a49ff10224b03662ca2ffc610ced5bdecdc64cac494318209d76d2e3c6f0gnome-bluetooth-3.28.2-1.el7.x86_64.rpme1bf852069e05b36fad9453450994ca441ccc7869daa820d002e60fc9e949135flatpak-libs-1.0.2-2.el7.x86_64.rpme4b33efabb5cb3652c51246ac207d5d96028b76945ff2fd9d577d9102091da72compat-exiv2-023-0.23-2.el7.i686.rpm2f80e511b919c5193017e4b8a4e986274acdc9242c4c6cd3474d65437d87dadeevolution-data-server-3.28.5-1.el7.i686.rpme21f2e65205d4c6edee45bec39b5f6a3b7aa38b6f7523cdc9e73e33811115751valadoc-devel-0.40.8-1.el7.i686.rpmf87dcaa0491f2975b965131569d1121fa9792f5792482a37f6817db96a4dd434gnome-documents-3.28.2-1.el7.x86_64.rpmca66e5bf3260d6ee9bd538156ebea25e8e6d4549027e9b66e6fa1292ce89d6e8evolution-ews-3.28.5-1.el7.x86_64.rpm9163e1d638c1b836a77a900479ad2727a242f37e9bed8b826cdd2571340d5b20json-glib-1.4.2-2.el7.i686.rpm7615faca13559cb75af4330a5ba53f37f0330d93bcb2334c7445582c64c98d24glib2-fam-2.56.1-2.el7.x86_64.rpmc1c5695ed879b69ac0ab16745298b307c9764cbb39f7b31a5f4789c64478fda8gnome-documents-libs-3.28.2-1.el7.x86_64.rpmb29ddcc847ccb11adf485dfd9d9ff54a1c5eb2974b5de099798a8de12e51e63eadwaita-gtk2-theme-3.28-2.el7.i686.rpmff3a92ef210c764a5be7f58dd414d54e8472cfa38a65e7b69cc2d3de526463e6gdm-pam-extensions-devel-3.28.2-9.el7.i686.rpm62dcc28e854dcc0a0c5593253812241e7f24853e37e912b6ec3b887616c563c0libical-glib-doc-3.0.3-2.el7.noarch.rpmc4dd15f7d31ca91f6deabbde42348c841c080c6afb2bd010decf36d8d73cc3cegnome-online-accounts-3.28.0-1.el7.i686.rpm05cbe30a141b38c0c939f87bf375433b56ebe2ed699424e49bfe2bde5ec12dacaccountsservice-libs-0.6.50-2.el7.i686.rpmc9ff3858b40ffbb90a7307a026660a5d103291905bbc9e49504282abc6a61064gedit-plugin-terminal-3.28.1-1.el7.x86_64.rpm47c487968312bd123faa379707a7631b84058b63cf2e76db3ad10c733a9163e4gedit-devel-3.28.1-1.el7.i686.rpm11f55c3b52e21bf21ed1bec5bd25ce02f0b0379f101b825d6927c6a9be359bc7geoclue2-2.4.8-1.el7.i686.rpm1334f197e3bffb2e8023f9caa216665cc6187811070573a689fff71726c80df1libjpeg-turbo-1.2.90-6.el7.i686.rpmfd4ad797197c34c22c7f85733ea7f83831ee6c79c7a2a4386f430cfb9ade03efwebkitgtk4-2.20.5-1.el7.i686.rpmeca57bfc3a6a0230754671fb84142bc325b65d47471b2974abd644900440f89bgupnp-igd-python-0.2.5-2.el7.x86_64.rpm1a0f544046e342a5657f4cb1cc6ae6bbb6baaa6a571c5f88d5485fb29a32a47bgtk3-devel-docs-3.22.30-3.el7.x86_64.rpmfdf9add2f4432041a2ae7e192e850eb7d014cbbe9f104a8bd718ece5dae795d8PackageKit-glib-1.1.10-1.sl7.i686.rpm4f1ea52106f111921770cc16217081033ce34a04e106ee95ab56a4d6e3a7ab68xdg-desktop-portal-gtk-1.0.2-1.el7.x86_64.rpma8be177665857ab7ffe06c676f7d472ca5e56c283fe8465f9eed829a9eb978f0clutter-gst3-devel-3.0.26-1.el7.x86_64.rpm2e178d7468a06e20113ae0044fa80dc5cfc172b55e5e5538c332bd882274de9bglade-devel-3.22.1-1.el7.x86_64.rpm00a0eb1694bca1dfb27d9981cf52332530864e4360f40a80b48d5c4f40c14cd3gnome-session-custom-session-3.28.1-5.el7.x86_64.rpm50472f1eebb0d047559aafde525e75bd2878da34dd94cd3d3b080e4776eb4b0dfile-roller-3.28.1-2.el7.x86_64.rpmca0658f7f323640d7e362b6e119d1454dc60b736d9b7f9b7678a4ae22779b7f1atk-2.28.1-1.el7.i686.rpm93ef87ae76cf36f27160473d77b5a98e6adf71fc8b6f056991facee7d40c4414sushi-3.28.3-1.el7.x86_64.rpm3fa0abe693a157222158688db6d90e812f187903ad5371dc42815682e7cb08f1libchamplain-0.12.16-2.el7.x86_64.rpm2479caba7c795f4e360ed141887dfc5b001dba91f08a8ce79596cb0b3f1aab42libsecret-devel-0.18.6-1.el7.i686.rpm6a53807a9cb20f2c4d56e877db3d8e77597e122dc11c411bb9684e3443465907gnome-shell-extension-workspace-indicator-3.28.1-5.el7.noarch.rpm11a60f50f1627e22188fcdbab8abe0a997e0f552420b5cdcabf1bd5c3da2235fgeoclue2-devel-2.4.8-1.el7.i686.rpm8ae27978ded958351a02e2199df7884f4e16b28b0da741ad09c618a847ce8642librsvg2-devel-2.40.20-1.el7.x86_64.rpm5b3875c6b8051cde23d5e741462eb41e5d6cb4f845c711906ab97746ec295a29libcroco-devel-0.6.12-4.el7.i686.rpm9a24a9a396c0dc0542c865d83c3d46cb5b042be1485e9774b2f1aef5591ffad0gnome-getting-started-docs-pl-3.28.2-1.el7.noarch.rpm3365648f86c81bb98848db8d671a3a0e1655703ca89c6cddeb1817c9124771e7gspell-doc-1.6.1-1.el7.noarch.rpm3cb2927053e505331a50fc91a72b9c43373badf6edc3ac399f23454320e17db8gtksourceview3-3.24.8-1.el7.x86_64.rpmea43a6e51edfe231cfe2ac12842f4870b9c67c4bcf462eed81dd236e0e906461pango-1.42.4-1.el7.x86_64.rpmb9abc4347c04673070f9541eab015ca608a09d5fdf36ef4bf5ecae77e4cc00d2evolution-mapi-langpacks-3.28.3-2.el7.noarch.rpm28b8d8987f1d586904e5c97fbce5f2caf50e85fdfac7e4c763e5ef9f7d4340a7libosinfo-vala-1.1.0-2.el7.x86_64.rpmc050a01513c651298ddb9e693cb9e332f3f3e3f049e865758d83270ad378826clibgtop2-2.38.0-3.el7.i686.rpm976fa9702ce5cd619bb05a63ad8f3ee7dad6bb4490bd77a9b6f535b345f532cclibrsvg2-devel-2.40.20-1.el7.i686.rpmbcb47aeb783e5821f00312be117936aef5fc5e02ad2fef2388c4a9307f8cbbf0gvfs-1.36.2-1.el7.i686.rpmf12a2948e901c4d2380ddda0daca655ca4eed6b72d6729351ea10d04894988b0fribidi-devel-1.0.2-1.el7.x86_64.rpm6e2ecfc32adeb7f9b8c9f0f8db8ea6aa9d7427a646ecddb84bf106311c14cdffgnome-getting-started-docs-es-3.28.2-1.el7.noarch.rpm7128b98daffbd699e93de6a65e3a904ba61773d6f542889ba57334727a0595ddpoppler-glib-devel-0.26.5-20.el7.i686.rpm7fe0bf1eba4a60091300b858b141f25ea6e57e21239c1b826ab395d008b5b7a5fwupd-1.0.8-4.el7.x86_64.rpm9deb4e7d8c9d794a661c7f7c18ebc03c8fad713740270be7c2b3e268573351b4accountsservice-devel-0.6.50-2.el7.x86_64.rpmcd66ea0c52959b77580f0d8004f5d4ad19685b0f740dc97a36b48ba09cfca4e1libappstream-glib-devel-0.7.8-2.el7.x86_64.rpmade3eeef0ec0b7b893b0e43add8a6569ddcc8e06add50dfe043918ffec343293evolution-spamassassin-3.28.5-2.el7.x86_64.rpmd51e567ea1423cf6018183b29a4bd14c28d998d91398fbcd1f1c5269766498fbglib-networking-2.56.1-1.el7.x86_64.rpm2506ea1a5cff4779d20061a08c2eb6f0ea66829b562066cf531b44d8c8c5646cgnome-terminal-3.28.2-2.el7.x86_64.rpmf525fc85da521d5409561e3814e05fc7fb03cc2033fc101e38a01bea160169e7glade-3.22.1-1.el7.x86_64.rpm14098a13ddab6eeb51d1987b69d19c9532fbc0a7f8f3133cf1a21660563f0e07eog-devel-3.28.3-1.el7.i686.rpm0aa7ee89fa54a84b94c16e04021ab069b76aebbbbcac44314709363b1f91fe25nautilus-extensions-3.26.3.1-2.el7.x86_64.rpmce236d2abfdb8c33615f40b5ca98fb807e9c2a8a9dce0288857097df2a3e1447gnome-packagekit-common-3.28.0-1.el7.x86_64.rpm4cfb8556155d692ca7da6451eff59e93deeea4256c6d137b4bc29245660800a4poppler-qt-0.26.5-20.el7.i686.rpm180b89c21fa816670ea2cadf048513a57661754964789a2d55f21d38128971e8gtk3-immodule-xim-3.22.30-3.el7.x86_64.rpm6b821b6484490a5b105cc68c22d4454fb88a283a03df737725feb4a192d953b8gstreamer1-plugins-base-devel-1.10.4-2.el7.x86_64.rpmf206cc573f9615f8a6b774237e84774274b59c2b6c880b41bbd2a4c9c64f8bf5pango-devel-1.42.4-1.el7.i686.rpm614ea7552e0bb83922e77e7e1be57a4a764143da0acddf7521331c3a83e9049dsl-logos-70.0.3-1.el7.noarch.rpm6d07cf95cf68403316e1969c3f52e24877cda10f3043b973f91fc8e22eb66cd7libgtop2-devel-2.38.0-3.el7.x86_64.rpm9a1a2884faf636e21613998dc3366854933a261585545822adfc2ca20739bdaelibmediaart-1.9.4-1.el7.i686.rpm54114bd5bc56ca9f2ac4b654f304e1007dad70590b14ce58f1f557c3a2133e01gedit-plugin-commander-3.28.1-1.el7.x86_64.rpmf9a520f9fecb813ada096afb199f262564cada64b010c5b10f640893752ce15blibjpeg-turbo-static-1.2.90-6.el7.i686.rpm5e2262f6c8e9ed768f6bc36289ba403d05917d9088f5324833d2d70fb64c6367fontconfig-devel-doc-2.13.0-4.3.el7.noarch.rpm2cee5c5df7c96dfbbd1578895313445d4ee7ce23bb9180591a5aa0099b6c34e2libwayland-cursor-1.15.0-1.el7.x86_64.rpme0f6f603a0db4f1f415803ebfc0ef84a64c0c6b1a8034cf52a478672bafc078fgedit-plugin-synctex-3.28.1-1.el7.x86_64.rpm7b9bf15c3e6c5f72c817b431c67da6c8b4f2abb91e8bef78e7d89695b612e367gnome-getting-started-docs-3.28.2-1.el7.noarch.rpm1461328a768f686ce62cb9047fd9768b74e44a940670d61fe635b4245501a6ecjson-glib-devel-1.4.2-2.el7.i686.rpm3b6d9c0f1aecc6de2e9464368627e155525679fdff8fa39d0c36fdb608ad89a7libgweather-devel-3.28.2-2.el7.i686.rpm414bf0eac1a302225ad020f055f674f5da55bdbfff0755e799bdfe62ec41c661libosinfo-devel-1.1.0-2.el7.i686.rpmdb264f8d123ad195375c4c0cca363b23c91c443e6a3b6dfc5a6e8b7ee04f9de7wayland-devel-1.15.0-1.el7.i686.rpm37c4d1a34f46d99d962cf80c8ab8b8270453f538ba071aa3a144da754063e097librsvg2-2.40.20-1.el7.x86_64.rpm082af70506c834aecc263c9ef1bd78446e355c627d06615367e528878bc39daePackageKit-1.1.10-1.sl7.i686.rpm5137bf72efe055f6f51b1beb35a8f31b3ff0feb9abf619e30290293a690fd6b4libjpeg-turbo-static-1.2.90-6.el7.x86_64.rpm32ae62d959a171ba4d4b34b016ce454740ecc5d426ef12eb8b3769067711036ffribidi-devel-1.0.2-1.el7.i686.rpm47425cc5a40460237447862207883cf60fcf85950360b4bf02067f5404448f26gnome-initial-setup-3.28.0-1.el7.x86_64.rpm302231e04c317d337ea8599ff287d39d489e9b84413ed9275907d5ba1964fcdagedit-plugin-wordcompletion-3.28.1-1.el7.x86_64.rpm2c048ebf171930dab1d23520310372729ed3051d8555a8a5e5224ef176836097glib2-2.56.1-2.el7.x86_64.rpmf50515d64fb0f082e5ad09350f7ed4c478c1b64429cbaf26e2776701c34d5000accountsservice-0.6.50-2.el7.x86_64.rpm380306e892149816537f103a4bf14c9f0b6ffb8a2bc555ae76b5ba981abab6e6gnome-bluetooth-libs-3.28.2-1.el7.i686.rpma983c927d6ea72ae24961418a3ec8082bfc867b4296bff561ba2e22359e248aedconf-devel-0.28.0-4.el7.x86_64.rpm37f939214a62563311c74070deca64188b84f149c2bf25ed7dd46c74af9e79d3pango-1.42.4-1.el7.i686.rpmbc966ee7a7c6df7ce657a831e6f227454afa31dda88f342ce40da18ecf25b399folks-devel-0.11.4-1.el7.x86_64.rpm43ad2df4578cb54023fc7a0e7af232abb5aed2f15709c13308fffb272620a8faglib2-static-2.56.1-2.el7.i686.rpm8d7972bb6b648cc05ce84fdc243a5eaa2fffbb101ab3f9696c1d05012302ecffgtksourceview3-3.24.8-1.el7.i686.rpm831e0d71f936015d8101cb3f36d49c46df01ccb4fb2a13d53fec7ca4ec42b0b9libgweather-3.28.2-2.el7.x86_64.rpmd4170cd8582f751405d1adf464002e6b5ac818f60e6382bf8da36de16aea112eyelp-xsl-3.28.0-1.el7.noarch.rpm2672e277221bd4094493e8b5f55238608acb861b9c9c87499f0a2908cb610576libmediaart-devel-1.9.4-1.el7.i686.rpm2ec83af17864ecbb3fb73deca028f786bebbcca58bee088a48ac6d5c694b1ba4libappstream-glib-0.7.8-2.el7.i686.rpm3fccd74b357106598b9b278c3c710fc5aeba5412453690ba02b48481ea837f43mozjs52-52.9.0-1.el7.x86_64.rpm8e1bf90e9904b261a62034762a3e54c85cf79e7b480595062839d6ba60e85da1harfbuzz-icu-1.7.5-2.el7.i686.rpm1ddae11187b659c8671700b6b34b4ba73b9cd2c78d7bb3b903fc4a713c0b21adcairo-gobject-devel-1.15.12-3.el7.i686.rpmaf4297700c43a24043f414fe4ee291611161e830dff9598ada6c1382aaf30c75evolution-data-server-3.28.5-1.el7.x86_64.rpmfde460e485b833c63b2d36971ae95ebdabd4b91ab62f06345e59d681a7f17d6fgedit-3.28.1-1.el7.i686.rpm659da8e2c109e962b678def21d1a842b9406961fdfae7c485e60d85e1883606bwayland-devel-1.15.0-1.el7.x86_64.rpm4822373193f81300c8d8ddf7ba8659376c9a9bf89e13de188a5072c84bb19b9clibwayland-egl-1.15.0-1.el7.x86_64.rpm293538a3255e2965c381427da4bdcda500f23065e0e3836e172153fa47d9d61alibwayland-client-1.15.0-1.el7.i686.rpma956595670295db84808311c5a22dfb10970ac03c847623abfa24b042630cf21dconf-0.28.0-4.el7.x86_64.rpm409f029b22d9ea36fff80974e7e3daebc04d077ab8414a63d846bd861152a028sl7-upgrade-0.1.1-2.el7.noarch.rpme5d103ef7070727d5979545e10c36c45dd6fc0df1491a8e2f30b441f1a67732cevolution-ews-3.28.5-1.el7.i686.rpm22013f8fc060ea52e90ca54a0826e4a9317d7a7cb75d6051f13407c126dfa079gnome-session-wayland-session-3.28.1-5.el7.x86_64.rpmff089025dc87c92b41de4fe1208f3fe989ff147b8e331dc8a5fc25fdd046f1b8gnome-keyring-pam-3.28.2-1.el7.i686.rpm62dcb045bf457f8c67d6c85fc4a849a4e9e466a59e41bbcd251c4ac8e032da6bwebkitgtk4-doc-2.20.5-1.el7.noarch.rpm9442de763c670c8858b6203a42c1f707f93793d3091712cac0c151c3c3c55cdbtotem-devel-3.26.2-1.el7.x86_64.rpmea1f64a0bc7491a6792baf407b2bdd97c5509bc1cae6f4823dcb9aea44bf9328eog-devel-3.28.3-1.el7.x86_64.rpmc422b5e62c7e2090690ea4f4a89b2147f516570da247951b420aa977cb2e8952at-spi2-core-2.28.0-1.el7.i686.rpm5b74fe76a554824523733acd376efac9d6c9ea981d4ae720d650e7570d621658fontconfig-2.13.0-4.3.el7.x86_64.rpm83851cfb2f67cfcd2976d3b1e6d81a8fd49520e5510750fe15f428363c383137gnome-getting-started-docs-fr-3.28.2-1.el7.noarch.rpmf0d37b76449d3a6ec3e8b82b608c435652cf888685e3ec4f625cd1c9195c0dcdPackageKit-cron-1.1.10-1.sl7.x86_64.rpm2619699c08e8352448e8067a8902fbe7f44bbc3fb146a06b73244362417d1d42webkitgtk4-jsc-2.20.5-1.el7.x86_64.rpm552b67294bf1e7d70e08b385956b7ca963426910654315c6d166176ac91861b5vino-3.22.0-7.el7.x86_64.rpmfaa82d0f6810adb1f2d19d1a8d75c96c16cd137f4382063ad3e1a6f174deabf5zenity-3.28.1-1.el7.x86_64.rpm39b498c6413fdecf477a040e9990511ed1f408dbdba61f93b7865834afff4bd2gedit-plugin-charmap-3.28.1-1.el7.x86_64.rpmb69b30ef6a545cd822706b618f5e7173536b01f739f1e433e66d9d32e2d19019libwayland-server-1.15.0-1.el7.x86_64.rpm0ccd5f46c47f1ebc527915f2bc7c4466c554a2378e5308c261b9c199555f6a0cgspell-1.6.1-1.el7.i686.rpmd506825ec0e77c77e0d1e52bef2deb26b8e940c1b1822fd384e552058cebdbafgnome-settings-daemon-devel-3.28.1-2.el7.i686.rpmf7b15263dd64dd3ff7be3b2603e6c9df4ba8e8667770536c5a5632410f78058ffwupd-1.0.8-4.el7.i686.rpm949dc194c2a43e9e9b37a14a20f907da675a2da080b1d73dbfd954d6c06878e2gnome-settings-daemon-3.28.1-2.el7.x86_64.rpm437ac4d304a721b5c888bf4703706f047cc29b2ed9869ed622d034b1c271afc6rest-0.8.1-2.el7.i686.rpmee5e810f48dfb9bf77cdd75bb4f853fa9866fb25b41b940cef4aeabfc0e6db23pango-devel-1.42.4-1.el7.x86_64.rpm992ea1797690ef4d0f80baa77241ea6fa7b7730efed104021ab9127aa86c259agtk3-devel-3.22.30-3.el7.i686.rpma253a2bbf5f540fb05eec31a8a217b0ab0502cb9ab767705e5cd96f1bd687a49gnome-tweak-tool-3.28.1-2.el7.noarch.rpm5105a7c8ce7fc1fb7facc72928a663f52f579c2485870d7b326e3d7e7bd7cbddgobject-introspection-1.56.1-1.el7.x86_64.rpmd02b25312d6a62da4b711063285b39c34150be8754f02272138fc1311b6be4bbatk-devel-2.28.1-1.el7.x86_64.rpmd90926d5eb9d68b07d544bf80091bf61befbb30068dcc9e55658e564625f7104gjs-tests-1.52.3-1.el7.x86_64.rpmac375d7a523b7c3ddb79ebc68db3263a5e3136454fde102764f23c453be8727cglibmm24-2.56.0-1.el7.i686.rpm7cde91f6933375d8d130e996c250ae125ceefb0f971b7f54a97cce9787c3593flibsoup-devel-2.62.2-2.el7.i686.rpm8d81b1c5575b8dcadc6970404b6968541edffcf8b42f5fb209853776118b8a45geoclue2-2.4.8-1.el7.x86_64.rpmf2517db8db36222ecd22f429932fff8b3e9ce84855dbd746d4c56014d2ff1a5dvte291-devel-0.52.2-2.el7.x86_64.rpmf09bcd899fa369b937c006001f4e151e551d4b936b3744bf2b885b89de60579eyelp-3.28.1-1.el7.x86_64.rpm1a3c3f791e132d16f81cdb1ca41c5bc676109ae075bf493b727f9e52a698a68fgnome-getting-started-docs-cs-3.28.2-1.el7.noarch.rpm1431ec0eabbf1d67263e0c3bc13d019926ab09392167501d3ccd1d770ea08958gedit-plugin-bracketcompletion-3.28.1-1.el7.x86_64.rpm5111a8e3951e1b5374304ba92ad131066d6d6be12bff7536d39629a8c9cbe93alibgdata-0.17.9-1.el7.x86_64.rpmb21675e0178f0821c632282d8c320f862b0e7b324395b59c357c0478fc45f8fbgstreamer1-plugins-base-devel-docs-1.10.4-2.el7.noarch.rpm09bdad53b68c53daea1a5a8ab155192ade849fcb1f903b7cd72cf6c57c14ad18gucharmap-devel-10.0.4-1.el7.i686.rpm4434958608be949fd012ef59a3011914936c06c01d25d2b93b335e2f3c6051d4gnome-shell-extension-user-theme-3.28.1-5.el7.noarch.rpme7827d6dca4eb92e36d90b6406f19daa765ad4614d9edfb135dfd1098c1a19d3libpeas-devel-1.22.0-1.el7.i686.rpmafba4b403621319b97c527948362d19e800839b634d01f2d96e77787c8b4013cgnome-shell-extension-systemMonitor-3.28.1-5.el7.noarch.rpm875138739b19ccd57303beced368f45bc1bc659dc2220e01970fe12cc246ab37clutter-gst3-3.0.26-1.el7.i686.rpme99e89b282053230cf2c3d1bc9c42e086aa5835f24b28d6a3a4d87ba9ae6ff56PackageKit-yum-1.1.10-1.sl7.x86_64.rpme413bcd8e01c4ce37b7db2ac006083d7a2c96c8d260ebd785caa4a88c15e6dc6gucharmap-libs-10.0.4-1.el7.x86_64.rpm52faaa92b2d48a67830b2d2d8c6159eab6b627eb1a83a7e9f1b24ddbe9019c79fwupd-devel-1.0.8-4.el7.i686.rpm8285e823ff8c086b8f19e05fd82fa223adfbcc8c57865a861abde87802aa420agnome-getting-started-docs-it-3.28.2-1.el7.noarch.rpm2d1d35b9147fd50fa3c94a04f40dde22460752af12ab76604b7a9675783a5376fwupd-devel-1.0.8-4.el7.x86_64.rpme3f13f4b432db9c32153c71bdbf056dccb1313fabb7d12c30098264c426cd5d5python2-pyatspi-2.26.0-3.el7.noarch.rpmfaee1320402b61e963f710660c120e8ca985b44fbb79c827b063fad4ddf4c59elibwayland-egl-1.15.0-1.el7.i686.rpm3bf9dc9e69e39a824bf5c691dbf52b41bafd48541a57d28d4d35cc422f3f15c1gtk3-devel-3.22.30-3.el7.x86_64.rpmc62deb6cd007c30783acd308c08181cbfec4226cc16bb8d1d52fe61fa1372c39flatpak-builder-1.0.0-2.el7.x86_64.rpm7f92ba6d9a53ea8c6448e222abbb3080c4f26d593ea42b17c84e5c130238526alibpeas-gtk-1.22.0-1.el7.x86_64.rpme8ced35233eedbbfb297f5544b85fd7d9b9bf08fb97717568526b97df049ed0clibsecret-devel-0.18.6-1.el7.x86_64.rpm6e970c1f43cbdf67ae1cf4235732c7844d6e37c3b27a8fb414340b0ae66fcf47gobject-introspection-devel-1.56.1-1.el7.x86_64.rpm23043b564398406562974fded7e9c0eb065f4dfab84960a79237470b6ea2dfb6gnome-bluetooth-libs-3.28.2-1.el7.x86_64.rpm7acb52051bbbae775663b2c2bbe5af674c92b454f1d71434fb623ec1e09d6acfwebkitgtk4-devel-2.20.5-1.el7.i686.rpmaaffc2e9a8c8883f0fec1c01b16d9bdec8c9262bfae56a80f42319ab495914dbgtk-doc-1.28-2.el7.x86_64.rpm9d84486e2fe1254cf125ab1f2bffc27e611fb6a00b18f15e3f6178b00459f8f1glib2-2.56.1-2.el7.i686.rpm88cd34421628e3eb265ba89f20f4f56e0e7c5237f54dbce54315982bc37bac36webkitgtk4-devel-2.20.5-1.el7.x86_64.rpm70c878ee533885f1a846efd76ee79a1be76238ae4bc2102ee961d6954301c86cglibmm24-devel-2.56.0-1.el7.x86_64.rpm7c96927f66877a5468ecee54517961bdc379187f2c28a8e8044e753585161abcgnome-desktop3-devel-3.28.2-2.el7.x86_64.rpm8bc2593da315f2c482efd3ed0ad0bc58d7ae8f87982b01e74dc19a8180037d70gssdp-devel-1.0.2-1.el7.x86_64.rpm1dc9108c1a4126cc0469ded8246fd3ed24887969c485fb60185fe59fe89c09e1gnome-dictionary-3.26.1-2.el7.x86_64.rpmb56c7b953a4beaf0ac7553d2987b6b264ddb1cd9902fe46575da53a03f2fbdb2gnome-getting-started-docs-gl-3.28.2-1.el7.noarch.rpmacc0c168e2504dd9f9f25bcdde2158b8513203ab4b6985764b5b3c59e1b6fbcepoppler-qt-devel-0.26.5-20.el7.i686.rpm03b2f939b11d1082751e7dc3e344f02e40246a9c165977cc4399afa8decb173flibgexiv2-devel-0.10.8-1.el7.i686.rpmb476437650d8c4d68e0547525d6a69b9c1e5004a7b020999386f23dc68354b11gupnp-devel-1.0.2-5.el7.x86_64.rpmb64220f85607128625b5b6360bba1d3e7e2eec89bbe5cfa152e16233e14fbb7enautilus-sendto-3.8.6-1.el7.x86_64.rpm7e263954aa4ae9177d8ae848cd44f02c682bb1c7ec46aac73a2897f5d055cd6byum-conf-sl7x-7.1-5.1.sl7.noarch.rpmd7d64e24dbf25370d41cebda7277b6d19abf63436f19de7db3e16597c5ad3734harfbuzz-icu-1.7.5-2.el7.x86_64.rpm58cce2d920e06e05777a524d39a68eeb11136e15a4a5e301121f323426a3fb6fbrasero-3.12.2-5.el7.x86_64.rpm492ce6d453ab3b59afb7adf1b4b840fbae9da482c6df7e1c9bf74fe598d86665gnome-settings-daemon-3.28.1-2.el7.i686.rpmafb6b7337c4c3de9ae3fad763aef555b1228adf84c46b65cb143e15fd59240ccbrasero-libs-3.12.2-5.el7.x86_64.rpmd8cae388b5587c15898ed1f5f8f8cc90562d1a2d99203c060eb54fd478965f06gnome-desktop3-3.28.2-2.el7.i686.rpmc1b5df20f8ffb8c20530d5ca4dcb0746c163cac3c5f82375cb8dbf41b2f2a68dglib2-devel-2.56.1-2.el7.x86_64.rpm4654fc755c2f47016a7afc1a18be07edcff75814713d8028ea31c386a8077301xdg-desktop-portal-devel-1.0.2-1.el7.i686.rpm2f1b9b75e240eb761298d25a9b7a13bf0d39ea99cf3bb934c2696cc0d4664e93gnome-desktop3-tests-3.28.2-2.el7.x86_64.rpm7ab2663a419107679c88a3754daeb1025914bd5b97c945b023902540ab844dc1shotwell-0.28.4-1.el7.x86_64.rpm55a9d8016292940c79375c90a6b4719c51747d2ffe318289974cb422fc31bafagnome-software-devel-3.28.2-3.el7.x86_64.rpmd9b5d0482b14740eee8ace3c9ba72c5aff445606e1c988f8b6abb90d35beb080at-spi2-core-devel-2.28.0-1.el7.x86_64.rpmc4dd27ccded6a9fbb49ed5f24e707e9208de2371f736f1c94bc9162ddf01638bgupnp-igd-0.2.5-2.el7.i686.rpm6440ec9692b4d98feb8cc2ae86a8c123704f37806756fa7f69b47a40845a2bcayelp-libs-3.28.1-1.el7.i686.rpma4bd1dfb2e191b67d45a8bffec970fe0dcabfd61c76a889346b0c3fde22ad277gdk-pixbuf2-2.36.12-3.el7.x86_64.rpmc7b6e48dd17ce9099e9884b4193a52f9e587daa5bf7c2d04aa5f8ef71ddcd5e4gucharmap-libs-10.0.4-1.el7.i686.rpmabb328e0aab376d0928b4a0f2c0c6a7c795e93fbade22a0113c73224d44f5badgedit-plugin-drawspaces-3.28.1-1.el7.x86_64.rpm014a2f72696a946132fd5a7a656c3ed530fb25a4f88ea42573be82f06d9adbbdlibmediaart-1.9.4-1.el7.x86_64.rpm7cd7dee7d1b81a28d33fd72639e2d19e5c2ca5b64b85e382a01ca35ab565a947gedit-plugin-codecomment-3.28.1-1.el7.x86_64.rpm5d134a1091819701129fbda1385f639381aa04906626fd6b9e53798195e2fe07libical-devel-3.0.3-2.el7.x86_64.rpm8283a9ea6da098a51147528f3600dc712e65273e62849c7cc9a2f1ed66ee4c8flibgweather-3.28.2-2.el7.i686.rpm0232a2bdf7b980b9764b1e1d5fcf58e5e3905285e49eb0f8ba14bcae879b0093gnome-shell-extension-dash-to-dock-3.28.1-5.el7.noarch.rpmd5ad965bf59b47728b97433daebb340c5d1bad945e22a68131da5fd0881f1da4gdm-devel-3.28.2-9.el7.x86_64.rpme411a7c474ad5b20daff9f1318d9c6be576f5a0147cb0c82d72ed3c92aec2bcbgucharmap-10.0.4-1.el7.i686.rpm999d727c7b8fb980e8c571e568bef7cadf43fe76df584bd95ecfad67e31c8747rest-devel-0.8.1-2.el7.x86_64.rpm2d35f4d9dd3949e78b6fb5bf77e32969829d158a3ca8c78e0283bd1943d04749nautilus-3.26.3.1-2.el7.i686.rpm745b747dcb0b138856efa9bf448b4d7ced2f4f9d96105bc834145d3fead78a32nautilus-devel-3.26.3.1-2.el7.x86_64.rpmd27ff7d71f1e26fab46721ae30dba12219882f12c980f06c886d918e1cbcffc0at-spi2-atk-2.26.2-1.el7.x86_64.rpmffcfbfce9c2b239d95acef79c3f2a42026dc7aea94fd20d4c505015e430771c6evolution-data-server-tests-3.28.5-1.el7.i686.rpm0d101882bc274e7d6626fbc785fa55e8fbc0093535527eebfd48dbc2750cd762gnome-bluetooth-libs-devel-3.28.2-1.el7.x86_64.rpm5340db7da00c7798cd432aeb7bccb756ba25448bd7bcda3a45e5c529b5756298evolution-devel-3.28.5-2.el7.i686.rpma0892c0fd5813c6c70bda223474b459dd52ddaf16037e949f1163a283199c44dpoppler-0.26.5-20.el7.x86_64.rpm0a633ddaaea1d5758a08669896f33b2201ddfd0108dc1222ba1b9a53ec259077poppler-glib-devel-0.26.5-20.el7.x86_64.rpm1edd71be82b44aeb9bbe03f2b8fc431ae2cc3ba1a699eabf5a98e5296ef0e802gtk3-3.22.30-3.el7.x86_64.rpmd5b2dd3846b9e7910817883b9fe447e1b374e77e0a694cb0fb8f3bef5588e3bbevolution-langpacks-3.28.5-2.el7.noarch.rpm26c843cefa98843b662683466cba7d982e39c7fef1ef52d0ab43be4e798ac27ccheese-3.28.0-1.el7.x86_64.rpm299afbc6da607d45ff99ec5396cdff8dba99f9134ffd37f6fe1d65ec28281112vte-profile-0.52.2-2.el7.x86_64.rpmc41bd2cca5f6ebef99b22ca32945358b78a4d68d9562ca0ad542fe92b17b0f10gnote-3.28.0-1.el7.x86_64.rpm6e3ee3ec8862cc1ceb1f2729dafae4cdfc74dd8f6841e523d8f64c898f35ec53freetype-devel-2.8-12.el7.x86_64.rpm420dea37804ad2e90956cbd9bd19e549177091667c3b003b25a00a5ba8f36ebcvala-devel-0.40.8-1.el7.x86_64.rpm0a12993dbcfed2952e38c7f6389943c01e852a77a64dd184779ea919a9da11acpoppler-devel-0.26.5-20.el7.i686.rpm5a6818b2696586b006d1b8b519922da373d450928c70946121b6b7d38e402b4bfontconfig-devel-2.13.0-4.3.el7.x86_64.rpm5460276144fb972f8dbb1e3c390ef2adb8de414461e226c49faee23bbb234662fwupdate-12-5.el7.x86_64.rpm94c9771305119ad2d79b8db630b3af26b021d328c987821ed5414eafba3ca28fpoppler-utils-0.26.5-20.el7.x86_64.rpm14f1d2556b180ed0e3df2e957577067a5f394e7acc45adb944090ad650370048gvfs-smb-1.36.2-1.el7.x86_64.rpmeb0e2558b06548e17792247b166ab3aa8b6e4f60e4cae8a8ab11bc39cff94915yelp-xsl-devel-3.28.0-1.el7.noarch.rpmfb79c3ef466de49ddded09d3fc4de5732461eacb01e5219df0dfac63ccfa3d9dgnome-online-accounts-devel-3.28.0-1.el7.i686.rpm0f2c2b74f28b8a3e1c8df21a7f7a09066796204d5b459b00a24608551d20fa3cturbojpeg-devel-1.2.90-6.el7.x86_64.rpmfd686be1b2743be39b98d3f5527932c0fff5ea610a0e5e1ac2fa9838e835f4bagnome-user-docs-3.28.2-1.el7.noarch.rpm7a3c978d927df7aae11ebe5b54485995f4b808dbb9cf9b92e0e4ae6dc7611a56evolution-data-server-tests-3.28.5-1.el7.x86_64.rpme407a251ea4d3a2063d0a5ead415ec5dd760f4423541cfafbca5ffd063c69c0elibgxps-0.3.0-4.el7.x86_64.rpm0977851b1907c6600423b84c56faad7f83be85614ef763082c372585d510a77cgnome-getting-started-docs-ru-3.28.2-1.el7.noarch.rpm0a0b0df3e3b52adac1e1919d130c839d9d32b695246c0ca5d616ab4f92897221libcroco-0.6.12-4.el7.i686.rpm353a188f3e0f12de09104be36e8f01ab6c8710c8cd33bc3953edb19278b57c1bempathy-3.12.13-1.el7.x86_64.rpm380b6007d9b387d98f552d1c5139589e843665256aa19dacaa95e6b732722b63gom-0.3.3-1.el7.x86_64.rpm08eeec2e4d063fd39af6d4cc3d5f851f2e7970b759e6d89214febc702b2c4602libgxps-tools-0.3.0-4.el7.x86_64.rpm90298bf458f31979250b15abe5572a8873c227924be5e0def58b0238b994fee1wayland-protocols-devel-1.14-1.el7.noarch.rpm696f4095d46bacfc3df7255ce89dbfc39d153439a3535eb4ef4d77e8fb250a34at-spi2-core-devel-2.28.0-1.el7.i686.rpme593fb65443528f45e3273635ad5a5f9221cb11d6adf2aa516a97ec493687eb5poppler-devel-0.26.5-20.el7.x86_64.rpmf19d95024df6e9ca2d42f1d919b2f7b7e62456f8525c5022d2338fc0114881begdk-pixbuf2-devel-2.36.12-3.el7.i686.rpm714b8d264e7ae6f91cc1511c62b1e4c2c2bdb12f8ab64ea43769af73167a462egspell-devel-1.6.1-1.el7.x86_64.rpmc2e057ada5aed3885f1d5cd04ac45e530df3f02e4f0cca5db833d54bd1949a06vala-devel-0.40.8-1.el7.i686.rpm39934b36e6782106f56e36036d70cfe43451b243825ed2c939a82045f2d5b3edgnome-color-manager-3.28.0-1.el7.x86_64.rpmac3419003a1a16db7b39fd811001e09fc4a09bfa3b633c1e705c646fe52c7823gedit-plugin-findinfiles-3.28.1-1.el7.x86_64.rpmc2bcb977339af6ca1b2a7ef3c8779cbe11a00b16f646689dfd7581e1121733a9gdm-devel-3.28.2-9.el7.i686.rpm3b9d1c9da01e0a77665d715e35908b196cc246161381dd797d85e177dfe036c0gvfs-gphoto2-1.36.2-1.el7.x86_64.rpma8c0f7caee9f70eded5662386e299333a050e861a5a5418273bb83e1c15b00acharfbuzz-1.7.5-2.el7.x86_64.rpm9bb2f3df58cea31edabbe3812f8e36b80f494ce86ee5f3bb288395fac1c6c245gtksourceview3-tests-3.24.8-1.el7.x86_64.rpm3d56553baf1d71c4d78180d4b5ea26821cfe987a2c3b8846514792bc9d24b49aturbojpeg-1.2.90-6.el7.x86_64.rpm9dac0c05649686c2db5278050fbc72a7dd91fd6a85edbd8b1ea4d47ea97e2a1acairo-gobject-1.15.12-3.el7.x86_64.rpm960b37421f6e496c5fb4a6610ce59996a8758d9fb37f9a03ae6ad3b87c38fa0erest-0.8.1-2.el7.x86_64.rpm04a8fd03295c557b504d57f9f6602b5fa5c531a7da666bfce000819dadcf7707upower-0.99.7-1.el7.i686.rpm8f682fede095502301e3354d4c07132ba78beed6fd2d423bd73ed734d702ac18gvfs-client-1.36.2-1.el7.i686.rpme7521ebe2687d2576de558d8320eac534c1c315a1b7f04a52f2da49a5057b13acontrol-center-3.28.1-4.el7.x86_64.rpm394da5d9e23108fd1855f2fad917b9cbc5cb526c83c3e1da873ac687a796aa5apoppler-demos-0.26.5-20.el7.x86_64.rpm242950f8e8dc7f9490e9f8724f23b3c072c3d20064345a3170224e2ec28bec90openchange-client-2.3-3.el7.x86_64.rpm10db932a5dbdb0e9e99788334f98b602f23d570cfc3e6866b3e3743f9afb0486gnote-3.28.0-1.el7.i686.rpmab79c668a1dbb641d4eda24ba3775bf96e08819d4627c3b64d3ca1098a8615c6libsecret-0.18.6-1.el7.x86_64.rpmebf14b87d9cb241faae94d117e2e82d485de81fad216fcc759f4a783261b6ae6gnome-online-accounts-3.28.0-1.el7.x86_64.rpmd35a00274953a02496ee20ac3ef471a3224ec49eb3b6f4dbfbff1c8ade2ae624accountsservice-libs-0.6.50-2.el7.x86_64.rpm22d69e9271ab08ebd074b4ba3d4d53bbcf3b0c67baaad7c18549fbff99685d83gedit-plugin-smartspaces-3.28.1-1.el7.x86_64.rpm6d02fdb972d3bf422655b1852c899f4f9483be5d962ed2824d8c4d6ac5759b53turbojpeg-devel-1.2.90-6.el7.i686.rpm0719b9d3b5d2c8ac09357e643246f76f36dfc3df3538adad1d046439731a7bbblibchamplain-0.12.16-2.el7.i686.rpm6c8cf74772d68fd3f7fcb9a5d890c089edd57b3bda013c0aacf9163d95822524evolution-devel-docs-3.28.5-2.el7.noarch.rpmf20aa8bb0cb7aa42b516b0a3c895d84a61036684d55b916fc9c55ece46b88d42evince-dvi-3.28.2-5.el7.x86_64.rpm9c41d6be60311a84d713540a9b3d8d21ad088616ca3a84e8a0216572866b0676dconf-0.28.0-4.el7.i686.rpm9367bca476cf9f515dcf6555c24f4f3aa070027417c1f6ac81609d42d1323a78baobab-3.28.0-2.el7.x86_64.rpm6248329b2ea0489493f20f77f4f38fd31bbc87cb728bd104d0aff596ab278d38freetype-2.8-12.el7.x86_64.rpm91d63f03ae151288da99806513421b90fe60ed73f031ff0d9f5350110357c45fjson-glib-1.4.2-2.el7.x86_64.rpm7453c692735d3bb4e4c01d5560324cce91987d0be957cb2ed16e1d3c021ed213gdk-pixbuf2-tests-2.36.12-3.el7.x86_64.rpm33d74d4d3d909d91e5a5186e9901deac25d649b8af8822ecf6bc874b9ce69c77folks-tools-0.11.4-1.el7.i686.rpma4ae802c84fb6ca4a6631d9c32b6a228b2270cfdc49e29eb0d38fdf5bf8b1c33gnome-terminal-nautilus-3.28.2-2.el7.x86_64.rpm897971afc749fedc10b9743cf1ae11c8bbc69117dfeefd06ac9904f626a78097totem-pl-parser-devel-3.26.1-1.el7.i686.rpm850f8a59bdc430c9802b0147d50b37c07f2f1d1b6661a27c7ab30e25d74d46d7evolution-pst-3.28.5-2.el7.x86_64.rpmda1fb37edd002ebce904220ea318f829eff742031966d19b850d736cabef427fgupnp-devel-1.0.2-5.el7.i686.rpmab7a9f5b05c81b12efa7cc2ddab26cb7bda8ccfe587493249dcf97f7fd4936e1libgepub-0.6.0-1.el7.i686.rpma1b64a8264bdacef976cbff52b1f906362c8f2e9482227a68d13761a314dcd7drest-devel-0.8.1-2.el7.i686.rpm2f1c5ea4b56e41b861ce0f404321eedee0a1673e050571fc52a766345c9cc01aopenchange-devel-2.3-3.el7.i686.rpm5f3e62ef151af1b5aca811fd678010499d257e9c23272f5f6bedf951577d1cd6evince-libs-3.28.2-5.el7.i686.rpmd1f36e281a118939df9c4a4c39aaf371c480897cb7736617d8d38671b6366141upower-0.99.7-1.el7.x86_64.rpm8c18b6f47364c4ecc265f2f51b441994ebf8d2106e2e17dba23a9ef530dd7e6bgnome-session-3.28.1-5.el7.x86_64.rpm4e696ea85e883c8105e022cb41f89438ccfe8203b5e93b3a9d05cc0b492e3e82vte291-devel-0.52.2-2.el7.i686.rpm084103593c0877b2a87f554a30f41d1fc99baf5535f9c5669dc91221fd499ccdgnome-shell-extension-top-icons-3.28.1-5.el7.noarch.rpmd85298bd3b9e93c1173aaad1fc252be5eb6a97cc67c8e4ae0ba334df1f8d8bbegnome-shell-extension-places-menu-3.28.1-5.el7.noarch.rpm43137e3442536efe07b43514f6f3f55607df54aa3e12539fbbaed842b86615abeog-3.28.3-1.el7.x86_64.rpm2fee98b097a1b7357ca731b99140a0d4dffe4dcb9c63b65f0f2e04572ae198eagupnp-igd-0.2.5-2.el7.x86_64.rpm66ff5d74b52295edc7cb9adf9498de4b97154fde202707e7a2cd606973db7789gtk3-tests-3.22.30-3.el7.x86_64.rpm50bc55314ecea7c41eae5ef0aa9f6fa8b50c471489ce5ebac790bf1f0d9cec2ffolks-0.11.4-1.el7.x86_64.rpmfa58458d30727c46d4c8cf9fff214e0c078f8600bdcdd04b13411fecaa5014fclibsoup-devel-2.62.2-2.el7.x86_64.rpmee755d0463b3ab0db758a246031c18c8506c189bd787634887010b2e3713e9bbrhythmbox-3.4.2-2.el7.x86_64.rpmd162c72bc2aae37b6a71f323f6e0af846d8123b17a7988eb333322a0a3edbf7bgtk3-3.22.30-3.el7.i686.rpm1e55d7e921dc9c47fafcf44c6fc2b0f1dbd95a1d8af803a0da9d0209dbae29d0upower-devel-docs-0.99.7-1.el7.noarch.rpm845d2c49fe6fc8e1ad0bdd27cfa7124119554a76d7d398d53cffd389606a0b88vte291-0.52.2-2.el7.i686.rpmb7daa0405efff5f1d60c625e8265799e7a193217871ae10e385c126cbc77e839control-center-filesystem-3.28.1-4.el7.x86_64.rpmad5880b56a3d2502a04364bd88782daa4eae49168294e625101c6d1e7ba878e6poppler-qt-devel-0.26.5-20.el7.x86_64.rpm55fd8c9349e04e5d197efa35cf788d4521bb59b0e77d3c56a9d736217252d9a8gnome-shell-extension-drive-menu-3.28.1-5.el7.noarch.rpmce1da379ff6c8c22a4fba48b9a447678be66fc27fb861fd78ff950aefef88763gstreamer1-plugins-base-1.10.4-2.el7.x86_64.rpm173d627d16bc7c30c6f815e072a58e7b806a804386dd2c205626258d1c9d7772cheese-libs-devel-3.28.0-1.el7.i686.rpm95b0370895de349cd5eb6962d2579f89b11d22b762e16c66404513addea652fagedit-3.28.1-1.el7.x86_64.rpma1eaede1d48bd5801683ce86c168c89763de66178fcf671c31f577194336e755libical-glib-devel-3.0.3-2.el7.x86_64.rpmbfc8f24558290d50c50f12de8136d011ad50b5ff48375cb3b0d458786337fc51PackageKit-gtk3-module-1.1.10-1.sl7.i686.rpm6377febd8b9a326c66ff8ef4b0bf42b5a3bbe2afe29dce929509a57ac86ef980gnome-keyring-3.28.2-1.el7.x86_64.rpm7f84a7b2c529a5d5998e0109a8797d80d11b0f7d1d6cbde01b5875c97a514460openchange-devel-docs-2.3-3.el7.noarch.rpm7aef72354108b26630b51e4994150b755465685712bf79ea011b654eb4c80fe4gnome-shell-extension-native-window-placement-3.28.1-5.el7.noarch.rpma86371016fbdb874a50861d640bb4554e392a5bc3a5db3fde19a6febe3377925gom-0.3.3-1.el7.i686.rpmbae7774651a9d15dcfe88e8c965bd7da5fb2f0d14259d0c3b251369b0ad4adecat-spi2-atk-devel-2.26.2-1.el7.i686.rpm1b9a50074b242d15d70b55ebfa0440b3f7370a8a8db4a823ea2bc264da656872devhelp-devel-3.28.1-1.el7.i686.rpmb95c3b9974ebfb02fb9591cac43b62bb060a3dcc01db6981d983c9fab1012af0evolution-mapi-3.28.3-2.el7.i686.rpmcb3d792ee8fa5970003afb7415e4a93d5c39e1b231429ba6a98c8252e2f48e8dgeoclue2-devel-2.4.8-1.el7.x86_64.rpm2e48e8011577d3d1aecde4dd7a968fd0e4894b4dad0ae199f8d116cc7e06fe59gucharmap-devel-10.0.4-1.el7.x86_64.rpm6c157532b1cf5b7bd4e2440cf488ac541b3942de7968a3f2c1d7bc076a411066gnome-settings-daemon-devel-3.28.1-2.el7.x86_64.rpmeb88817e4637622fe1229faebd16382a56522f7092ad14c8ffe0d865a7fde77fupower-devel-0.99.7-1.el7.x86_64.rpmc6198f813b324fa1d31719912ad671f0e9ecc5e20472d95536d4ecb27a0eaae2flatpak-1.0.2-2.el7.x86_64.rpm359206c92ca164833a7459601c78d89e6d081e1d980903bb0565d38260d8c62egcr-3.28.0-1.el7.i686.rpm3c779f2d4de5931979c74afe2baf280066d8c3007c6277b075f561ecd379132cbrasero-devel-3.12.2-5.el7.x86_64.rpm1f3103685cb23755e419b2f8e4bd705fbb15c4baf5d3482a0ba2b1c3c42778edgspell-1.6.1-1.el7.x86_64.rpmb32f88483bdea05a4fab875c3e18c04cb9101095f794831d45a04e92d183edd4dconf-devel-0.28.0-4.el7.i686.rpm0aff3d18c95e765946c9800ab7b10d48bcfc949ccc94d6dd052e9a70877d7693geocode-glib-devel-3.26.0-2.el7.i686.rpm0d8d69348b8d46214927fb6056731d2c1f19f393bc38bc307d6ff54a31f510d3gnome-getting-started-docs-hu-3.28.2-1.el7.noarch.rpmd9fa5e7081e283113c53e9837a9ef11b3a35367f53a2237894cd24c690ee01c7glibmm24-doc-2.56.0-1.el7.noarch.rpm311a94d5393e5375d94b628954999ca9d3186b866e4a07ba392befc85635c686at-spi2-atk-devel-2.26.2-1.el7.x86_64.rpm34131f6cf264146718d1995eb0808091283384725082a8b24cf6634bf2d05d44adwaita-icon-theme-devel-3.28.0-1.el7.noarch.rpm33acb60fdebc8368c8fc97806b3802e896a460f1558583f1b9ba8d9efb30afd8totem-3.26.2-1.el7.x86_64.rpmb5fab7d382574dc95548b90619abd997db521c3e1e764ce0960dcb326a71a967gupnp-igd-devel-0.2.5-2.el7.i686.rpmc11ce96a2aeb0481f558c335861cfe11c3147aefd3ddab28c767ef71a40584ecgrilo-plugins-0.3.7-1.el7.x86_64.rpma1089136b9fa78359e91c8618b7a22df4efcf14a6ad6a905422e53b8989b61b6gedit-plugin-textsize-3.28.1-1.el7.x86_64.rpm887ae112174250458082aa5a883e82ab4c9e309def9f3e01d87ccc63339ef21egnome-classic-session-3.28.1-5.el7.noarch.rpmeef9d9b82f415c8426d32201eab0f159b1cc3ce60ecbfb786b22103189d2741fcheese-libs-3.28.0-1.el7.i686.rpm6db43f17eaaf6d2656f03b71a55f6500b4539b8e89e9cd7ccbd40452f043d2demutter-3.28.3-4.el7.i686.rpmd79c0c8b8124e432adb0f3930adbe46f3b46dd82cb7024d4147bd37fd26dc7a9devhelp-devel-3.28.1-1.el7.x86_64.rpm65dc4a1c7f6d807834acc7ae041ebf2c96a8b2dbdab51b28dc0d1aa1fbcb015aglib-networking-2.56.1-1.el7.i686.rpm9e087be365f2046437f992491ced445a0f12e0fa4f35d99928584d58a8ecaf65mutter-devel-3.28.3-4.el7.i686.rpme58ff6f44034eb0475a391c2e3592c071bb2bfaba2b78d8ff85336efb5f2abd4libgexiv2-0.10.8-1.el7.i686.rpm871c09fcb9c7a440016c1dea4d21e663613efeee60d88e6c0d9d9f6267af16a6libical-devel-3.0.3-2.el7.i686.rpm88365ab9515e4f29228b73cb73f0a3be700ad139c7f33db46a9c4fcfe3c21fb3gtk3-immodules-3.22.30-3.el7.x86_64.rpm3051d81dc2d4160c76e59dcc76d6fdf7a0dff409a112e734467817f87c671dbagrilo-devel-0.3.6-1.el7.i686.rpmf9f725a40c7bd042a24196b539c7c043dadabeab93f08920e0bb1e735949fac0mozjs52-devel-52.9.0-1.el7.x86_64.rpm2681340387d1c2271bf81060a4516045abcf6b74b7ad7945aa5a12c4cafe81delibpeas-1.22.0-1.el7.i686.rpm1503c571b6365e8d3b40160f7537b9d0b8f528b80baf389e6f44ddfde9efad8apoppler-cpp-devel-0.26.5-20.el7.i686.rpm2783e3e901a4d95e4a7ef5fd3b9fb4a658ea8ddbbc29f560f48c4e414a31f742gvfs-mtp-1.36.2-1.el7.x86_64.rpm6408e789daa6c74faf56d4ff93943c043a3ee4cad3bcbc17dce519b1bdcbbe06libgexiv2-devel-0.10.8-1.el7.x86_64.rpm64cfc431228ecf140537b7dae39c9b5382cfb3300fc6d49229d8f961982e7050grilo-0.3.6-1.el7.x86_64.rpm999960c62e67d2dea47954dde97a31f994d11f2e6f9bc25725c9cde079461e3blibrsvg2-2.40.20-1.el7.i686.rpm2dc9fa81a5470649f353119742fd33409d3c4b394489a538ed080430f8b8f5e2gvfs-fuse-1.36.2-1.el7.x86_64.rpm6bedcb62d8eb0ec086f6f33fbcd0160fe2ed7e4905f238df93261e658b3a9664adwaita-gtk2-theme-3.28-2.el7.x86_64.rpm0eb67e8e51cc0be46f178406aeb6ec84017a2fceb794decf13d6899bac5a0960libappstream-glib-builder-devel-0.7.8-2.el7.x86_64.rpm2b39f8cf8737b740530772fd8f1323fde683702dfa5510e98d2b2aac6e63e78dgnome-keyring-3.28.2-1.el7.i686.rpmb8ad0bfebcf114eac9f88388ac482441b06c221a46fb641f3348fa32ec449c65webkitgtk4-plugin-process-gtk2-2.20.5-1.el7.i686.rpmb5922ed81285f0f48e4b58b952f4afa6c07870192c8c3120db8a9d822e033ca7nautilus-devel-3.26.3.1-2.el7.i686.rpm7fb106a316e4d065bec114eea245c57393b614226d618197af047b78dd000125libgovirt-0.3.4-1.el7.x86_64.rpm8654f607a9f13bc7fa1a44fdc01bfa62e87d9e99d17fd27218688a8ceacc867blibosinfo-1.1.0-2.el7.x86_64.rpm28adf592d72760fe5a2a6eb5602a24c5a7631cf8d0a5df27b53342a1f4ed976cglib-networking-tests-2.56.1-1.el7.x86_64.rpm850924193ac19021b245b9be1914cab31943d192b239269768ced21422fe3dd0vte291-0.52.2-2.el7.x86_64.rpmdee8639c7e3a4a76383d1953de497ec26c2a41670fa4e4a34e19c65f6070d8a3PackageKit-yum-plugin-1.1.10-1.sl7.x86_64.rpm5f91c58d3c17f8187c7c1fa404041b87fe175b75be419723ebe1ced9d6c54755gnome-packagekit-3.28.0-1.el7.x86_64.rpm5ccd1d3ae1d1c4f59093fae557f8b65b20628ee71a1682efcc561e59f85d9cf2devhelp-libs-3.28.1-1.el7.x86_64.rpm97d4cfbd77c7a5d990105252c2b8b16c11d33c19c47437e1f3d99b0a87b68996folks-0.11.4-1.el7.i686.rpmc9246bd79633784274094242d511fd78b0f1a56ded4ec5f1ae728e076607ab52fontconfig-devel-2.13.0-4.3.el7.i686.rpm40b3da018c24dcc8af306865971f04838c1de8e6afaf879b737a775297f7d8dclibjpeg-turbo-1.2.90-6.el7.x86_64.rpmd57ad3d1ae49c4c38c6ecd6c1e02f8bddc91f19fa296ce6135173c210e5e9eealibgepub-devel-0.6.0-1.el7.i686.rpme05819b5245211fe4829725d5946484c737e556b4f3b0547f21eddeefd5fa0c1libpeas-devel-1.22.0-1.el7.x86_64.rpmca39db932d1352b65892387674eb063f0c9ce5dc4747584fd74dfd6eee731a51gvfs-1.36.2-1.el7.x86_64.rpm5d8a4d2c4735ff905dafc852798cf86ecf2e15661e27083486e72c373448887fgnome-shell-extension-window-list-3.28.1-5.el7.noarch.rpmdc1eb98017771d6f35dd8795a13ce9d08679eeedcb5392352e2098f5c92a0777folks-tools-0.11.4-1.el7.x86_64.rpmc4e153a0270abf919fb535a3fd061092252d897d7eda6698983295de9354c62egnome-bluetooth-libs-devel-3.28.2-1.el7.i686.rpmf43ef24274ba685f414e42d5b9955c57e8fdac3aa19f9f82eab116d3ac4db54apoppler-cpp-0.26.5-20.el7.x86_64.rpm2bb7c4217d05b4be6a147ac422bd78bdf264dea05f5b58f2ebfd3029c73b294cgvfs-devel-1.36.2-1.el7.x86_64.rpm28941ed9218a6899260355def4b8372945f7d148f6e5e1c7996b5a7e23bc35e6gnome-screenshot-3.26.0-1.el7.x86_64.rpme2a2ec1ad3a777520d8b2892e6af69b242c590ff7c922856e59ad95cfef8129dlibpeas-loader-python-1.22.0-1.el7.i686.rpm9f31282023e889c0ae89f1b82f86be4853b833a373efeb294db1b94f6e297a69gcr-devel-3.28.0-1.el7.i686.rpm5301a994838e2e15023c7669443a1823b486ee07b26810d58b6f2d5b82686058json-glib-tests-1.4.2-2.el7.x86_64.rpm04a176f3a9f3bcea3e356d495e855d7ed84a3a3af4ebed78e371a3bfcdfb124fvaladoc-devel-0.40.8-1.el7.x86_64.rpm9631291664353fe8ef8fab67c9849617ab3d75175cf685216453358b44a7b0d0webkitgtk4-jsc-2.20.5-1.el7.i686.rpm1b883550de3bb8f6396665b548648a8e3e67d8cb82f507fb127af5d3183548e9gsettings-desktop-schemas-devel-3.28.0-2.el7.x86_64.rpmbab250e83952608007a2d899ea1e1ea35dc0da1ab43cf76128c63f17123c8993brasero-devel-3.12.2-5.el7.i686.rpm8701c4f4b1a32558d01d5c0efa1096c43c8a2b197fd782e70a51b240616738ddgsettings-desktop-schemas-3.28.0-2.el7.x86_64.rpm16a78be4d3b83af7c8dbfc6d6d806bffcf26c15c0926cae1efef09efc9f36583gjs-devel-1.52.3-1.el7.i686.rpmeadbad07591b121b0cf395b257db95310c693477cec279ad8ff4528ee622ded6libwnck3-devel-3.24.1-2.el7.x86_64.rpm5937241501ac234e6e4689717e488d41b9739f301d114fb74317b3d42a1a07b7compat-libical1-1.0.1-2.el7.x86_64.rpm27e38dd191b39a42238d8cebb06e6a2adef9f0c85f845caaec1f85a79041a85fgvfs-goa-1.36.2-1.el7.x86_64.rpm90d1899dde79a4a866888afcf0b5a3735cc3d05049d045ef4788dba19cd667feevolution-bogofilter-3.28.5-2.el7.x86_64.rpmbc353007fae975c2d3097b3ca6c9fd964ffc1f7e1b2ecae99cb3d5ff61c2c051libgee-devel-0.20.1-1.el7.x86_64.rpmdd55bcb7964955e022d237910bbea01043a862e863f266e75f69caf93d3ad5d7gupnp-docs-1.0.2-5.el7.noarch.rpm84bc6704642bc8f9ffd1e20bd335801b5435a76488c9dc39891864963d9bd2c1gedit-plugins-data-3.28.1-1.el7.x86_64.rpmc60f9ca15133bcf13a9eae7e3a72e1bd3b4faba86063e7988d2862b40eb2fb2dpoppler-qt-0.26.5-20.el7.x86_64.rpm13bf5e2802f34374ca514e75252a90a77bfeadbad384e2bada3d6ed004a139d5gupnp-1.0.2-5.el7.i686.rpmb11b6d429ff58e52495060599ccb01153c8fd8a033965db3ddf626552efacb5beog-3.28.3-1.el7.i686.rpm6891292db98bddff16263043ab6224c52591ccbb7288ffeccecdd825d4c38fb6webkitgtk4-jsc-devel-2.20.5-1.el7.x86_64.rpmc23c6c645957fc20bace95dbb81daf3f5cdd3a9ddffe6a46543931ac0b0bb392gedit-plugin-bookmarks-3.28.1-1.el7.x86_64.rpm7bf137eb23bdccc5ae51fd03677387201c384cca24936047ab4ae066f5b19a41evince-devel-3.28.2-5.el7.i686.rpmb7345f704cd4b55c6fb33943ef751c1e13b5624931750b748ee2e607e802cde0webkitgtk4-plugin-process-gtk2-2.20.5-1.el7.x86_64.rpm60ee38c886ec23385c7535c57d9a260c04dbf8e43321bc0953d0be41fc6ad486freetype-2.8-12.el7.i686.rpmd8d445ac2b9f94d11ba3582cf711c4a9d13bf2c3ffcb469149a2c7b8a1fb295bcompat-libical1-1.0.1-2.el7.i686.rpm98858f99e2df57250f711e505db9c30679b907920b6a3ce4a908fa08d37faec9fribidi-1.0.2-1.el7.x86_64.rpm13d6c6ac08cbaef901f2ff9b2e89e04bcc621f13301416dd82aa158ec1a2937agnome-themes-standard-3.28-2.el7.x86_64.rpm5de58d555c9fa7710ea24122199e61cbd8d99a9a41faa94a67ebcff0562080d6gdk-pixbuf2-2.36.12-3.el7.i686.rpme2d52135ab4b93e6eb3d590586516f9a98ee3b14b8915d04d956fde8571430b0clutter-gst3-devel-3.0.26-1.el7.i686.rpma7bfcb15d1b114c8486338db5cbb7f0b4537b2483213aa48bd9fea5673693806gvfs-devel-1.36.2-1.el7.i686.rpm4dc9b3438e2b1753b7df247235b455e6f30b43665d464d90af1f839a3584f819libgee-0.20.1-1.el7.i686.rpm9b71339fa00c339f0d82f3dedd8a24518a200069b42fd3bd59f9129d14d709d3cairo-1.15.12-3.el7.i686.rpm6bac471e5c377dc70a019ac76c3dc93b039ebbd8700f99ba6c1886d44089bc30librsvg2-tools-2.40.20-1.el7.x86_64.rpm4395ca3fb879feebddcfbf72b47d4ea5f5324624a2b2fd6862be37503469dc72gvfs-client-1.36.2-1.el7.x86_64.rpmea649cd1ddaa3a84a48d80819d405aa86350218b20887189a6361eb3e0d5e9d3libgweather-devel-3.28.2-2.el7.x86_64.rpm7ddcfcca6085b673ac7cfb165d81afe2c149baacdce3b8de614e9db7c1c8a7ecappstream-data-7-20180614.el7.noarch.rpm2e3dada3c60a742f654c231a3a4d4021c474da7b9c41534ec87ed8c231f1858cjson-glib-devel-1.4.2-2.el7.x86_64.rpm137e3b6d041919c4f8d15469543761fb98c4aa9ab43e3c5ad5ba6b2449a56b21compat-exiv2-023-0.23-2.el7.x86_64.rpm2db54f38f1049b160f0edca7dcee7ba79d18ef33e29a798ad69433979e4a0af0libwnck3-3.24.1-2.el7.x86_64.rpmcac7adb27774134cfb8014993e48e4deedcd80429a4460a8b84c002524e0fa6cekiga-4.0.1-8.el7.x86_64.rpm4317ca7ef1a3aacaded69287315207cfad44a02450a3e61e77fc2cd21b40c716nautilus-extensions-3.26.3.1-2.el7.i686.rpmaaa8f6d9c5bf8111528299e38299fc654151c1ba4ef4f0de95a0d071cd7656dbgvfs-tests-1.36.2-1.el7.x86_64.rpm7bf6b14a46a66689b3acbd9841b7710a1a8ace9128fc8ed5e2a947b791f0d994libgdata-devel-0.17.9-1.el7.x86_64.rpm20fbf66239fdf22de94df0e94981a73d758ad63c9d0bba09cb4916a17f077bf0libgepub-0.6.0-1.el7.x86_64.rpm6e0816d5aa39e9562a76700277fcadd3efd23b4f3b7c1fa37513bae3ff4b3f27gstreamer1-plugins-base-devel-1.10.4-2.el7.i686.rpmf9411d8bdfaeb6c01a76fcb5b90714b9e7352945186e07b86f1096b10713c9bdlibpeas-loader-python-1.22.0-1.el7.x86_64.rpm9f438cb0c0043b926cda6ff3f53e2607a43727b095f989e80b61f6cbfe5867b2devhelp-libs-3.28.1-1.el7.i686.rpm8d14f2192c7a097ecf36dbd32cfa20be4b1cc9e37dee3c4d7b666cb563c8c9e9gnome-desktop3-3.28.2-2.el7.x86_64.rpmb73599533a727c7a8b730d611a939c80706219352f0b69a3464c0b74c7d2838dgedit-plugin-translate-3.28.1-1.el7.x86_64.rpm28191ad7f43675f26a4868316b7d4e39948104a90a4cdd816bcd9a8e08ac1d18libwnck3-3.24.1-2.el7.i686.rpmbdb3c59ae8b9d5f546904c55534272aac7d6dedb3733aff0d88ac5f58f0b2797yelp-devel-3.28.1-1.el7.i686.rpm4454a3bbfa797a7098dfb54a7f504c16a3e9c0fdd5a2105496cc6d0c612a83fclibgexiv2-0.10.8-1.el7.x86_64.rpmb9f4d34c81f7f22e4388b9a3f03f6d029e4490faeb25679d95f6f0f213956147libical-3.0.3-2.el7.i686.rpm86b918889db9c39db4a373ac545b409a2ec031d2db975d6856efadc86f116236gnome-disk-utility-3.28.3-1.el7.x86_64.rpmd472e9969120cf849ed00e5268dc67a5e4fbef45ff3e554562740ca640dd370blibchamplain-devel-0.12.16-2.el7.x86_64.rpmc3e907321eca6da7b8ff311e99ec509dfed7535de1f1ad63845c2d62ddb2a816openchange-2.3-3.el7.x86_64.rpm3c97f6e56d1e4acd80d54065bf7e4c0d0e750bd9df5d7535ad5333aea3f0586fPackageKit-glib-1.1.10-1.sl7.x86_64.rpm522a30b687e407571244729d62c6c2786dbe82dfe2f01d4ad8cfc53a50c08245gnome-shell-extension-launch-new-instance-3.28.1-5.el7.noarch.rpmdeaff88e3260ae7bf7ceddd561f5a8ca34708e2d446d0367d0f5e9c4fa185178cheese-libs-devel-3.28.0-1.el7.x86_64.rpma9df97b76bf19692c8ac0b765ac0afc871c8b14700ca8118de9bc5abfdedc2fdevince-browser-plugin-3.28.2-5.el7.x86_64.rpm37e584a743106e0d2b25d09ddc0c6ccd544d82a783862ff1a5f8972fa244c13aglade-libs-3.22.1-1.el7.i686.rpmb3502e08cd4d0696dcb6182f3efd1e5ef4545ca64c53bb2121d3df7d17aa2ec4gupnp-1.0.2-5.el7.x86_64.rpm6ffa45cb44633df457b40c60b3b6ff87df703861a77f8265556132dab7b7a2f0libgee-devel-0.20.1-1.el7.i686.rpm28167ed744286ce57f7288923a260efab2e7085c191853eee2dbaaaebace9374libappstream-glib-builder-0.7.8-2.el7.i686.rpma5eee84abe50477a226dd2d108d1976b52edb5f11a614b6067ca73a98c3f980cgvfs-afp-1.36.2-1.el7.x86_64.rpm623330e4c458f89a59dc3ace106a6655116385a5660ea53f39f665c1bc297252libjpeg-turbo-devel-1.2.90-6.el7.x86_64.rpm5d5c799f094ad36c110a60bec4037d26e359e1793fa02077544b2eebdc1e2d21gedit-devel-3.28.1-1.el7.x86_64.rpmd0e848bc808087fba8b893b0c17cba4895c0c637d152d49ce453b3113dcdc8f8gnome-color-manager-3.28.0-1.el7.i686.rpmc1829c1bdeb4b6fdcf145caf619a2f0a32e138b9f8ec5c498694f7802a54bb4alibwayland-server-1.15.0-1.el7.i686.rpm0a029a39644916a3ba662a02aa62fbb06f9eeae68a936b1fc91d4b577191b897gnome-font-viewer-3.28.0-1.el7.x86_64.rpm9041ef4e1cfafdf6db8ba798ab19998568cf5b2927f378b35346c8f1b1e4d481pango-tests-1.42.4-1.el7.x86_64.rpm149f3c0f07d876a98a0fe7789cb87c1d7947679fb60e51ea4d4a06ef04b5ebf2libappstream-glib-builder-devel-0.7.8-2.el7.i686.rpm2911a9101761c7d3b7cceafed2d85d2ceb1c14ba2129d3ee78349a5f96ddc97dgjs-1.52.3-1.el7.i686.rpm38ec27be034859add6737c056e7abf7cba9a087a54ca05cdfe2e7a2ba7865a33gnome-shell-extension-common-3.28.1-5.el7.noarch.rpm32d5f7ca9e1f36fb4fdf92384592feb6ef8c5a8a981df83eff650910565bc6ecgcr-devel-3.28.0-1.el7.x86_64.rpmefe5dcee2eb85ee63706dd17bf95cb90e8208bdd3cbb0bcb8493f812d6be2b16geoclue2-libs-2.4.8-1.el7.x86_64.rpmb3bd5c2f8bd0fa22a5bab272b66eec328443a54db67753d340591094edb8f556libosinfo-devel-1.1.0-2.el7.x86_64.rpmab0c57946fc4b790190f4dfb1d341c5d13145afd9fd4e88539f707b114d5cad8gucharmap-10.0.4-1.el7.x86_64.rpm0f45a631676a142474f1ced97803a7092574d53d674af1c3bb1af4f39c956abcgnome-software-3.28.2-3.el7.x86_64.rpmd31ddaad0314d9ebc4882824babb5b80f23e082e8dbadd4e140a1312698686ceevince-libs-3.28.2-5.el7.x86_64.rpma1b3cbd1d292eeb49eb7ebd3cb30265336d72e351917947d8666172a792444afglib2-static-2.56.1-2.el7.x86_64.rpmd736fea0105c48a5ac1207616def3a3407d9e09d707630d8ed12a31e007c5126dconf-editor-3.28.0-1.el7.x86_64.rpm0704d0b55730ab5291838be2bf6398756d54c84d8ce5bb5bac795b9934556a18shotwell-0.28.4-1.el7.i686.rpm048acea7793a1ea2c9d17226a52cc5dac46e591b827e6f7550509736d623ad52libchamplain-devel-0.12.16-2.el7.i686.rpm9ee250be245be8c507777d7729e26fcdb42cfb4fca063610e4eb54ee391cfd64gnome-online-accounts-devel-3.28.0-1.el7.x86_64.rpmd0ad59a25502047a460ee8954d8c92c947521dc87ebcaed363a23655dcf54b6blibgnomekbd-3.26.0-1.el7.x86_64.rpm0a63f76bf3013280c93bf22029cee6fab6aeb3f115eeb5bd139f288007ea6128cairo-devel-1.15.12-3.el7.x86_64.rpm45beb66595b8264a9308455c0f35a971357d3ad429068a0b97ffbe66a7b8a5d0gnome-getting-started-docs-pt_BR-3.28.2-1.el7.noarch.rpmd26edb377427eaf91ed639414bab983f3145312335fa52b3b2b83fdac55ac4dcgssdp-1.0.2-1.el7.i686.rpm063656535fd5e9125f901c8b9cefcec394bfe38c2b057037fbcd7d9481f801a8SLSA-2018:3157-1Curl And Nss-PemSecurity Fix(es): * curl: HTTP authentication leak in redirects (CVE-2018-1000007) * curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120) * curl: RTSP RTP buffer over-read (CVE-2018-1000122) * curl: Out-of-bounds heap read when missing RTSP headers allows information leak of denial of service (CVE-2018-1000301) * curl: LDAP NULL pointer dereference (CVE-2018-1000121)moderateScientific LinuxScientific Linux 7libcurl-devel-7.29.0-51.el7.i686.rpm9788e8e038bcbe21da7be035a83315d4eab9a839aa3e3cf17a2ab4fd233cc690libcurl-devel-7.29.0-51.el7.x86_64.rpmfa0a3f981fda93606f13bd6184954a18bb6caa33da08ccee7c2090d08a64a99flibcurl-7.29.0-51.el7.x86_64.rpm8b0635ebde69a51e48e6f28db440456d20ef959229bee4b8d2f201e4fd3e03f0libcurl-7.29.0-51.el7.i686.rpm5c04503a742e69870b2125f8c1f893849278c9d3f5683df9670a87f3d975a774nss-pem-1.0.3-5.el7.i686.rpm8a3fb1e71607fb77cc315e01797fcd7953f310071588b19ef80cc36dad1e4703nss-pem-1.0.3-5.el7.x86_64.rpm1389d8fee372d7f192a0fb8158bda3b38bba28903304c7e48bde2b24027b27a9curl-7.29.0-51.el7.x86_64.rpm646c8380b06b442c6fe1be35e29bfc55af68b03045136278a8b9b74f19c17eb0SLSA-2018:3158-1SssdSecurity Fix(es): * sssd: information leak from the sssd-sudo responder (CVE-2018-10852)lowScientific LinuxScientific Linux 7libsss_idmap-1.16.2-13.el7.i686.rpm642650999acdf96fa882d3077bc077313f7b2b46591faa0d0df04db35fb52e47libsss_idmap-1.16.2-13.el7.x86_64.rpmed583c422922e03d6cef4cdde21e127c1b87e3c01b8856e3837345245b0b2745sssd-1.16.2-13.el7.x86_64.rpmea1bf8acc93be8197a31e6c9289daf453d79630e0bb5aa530135452261448fe8libsss_autofs-1.16.2-13.el7.x86_64.rpm277380b38837c6c9cb8517233aa5d6ab693c3720bf4a327bcc89d371327a6ebdsssd-ldap-1.16.2-13.el7.x86_64.rpmacf9e3e7ad2fd0e2230542971ef8a495e32c967e82132a7f44db287b77149851sssd-ipa-1.16.2-13.el7.x86_64.rpm33ffdf28ceead8564053e1d67f1213ef20415fa751edf30da28c290978a721b2libsss_simpleifp-1.16.2-13.el7.x86_64.rpm74bb63dc02c8c6d4b96fe3d15d408049ed6f182d187ec87c717ebf287aa77bdasssd-polkit-rules-1.16.2-13.el7.x86_64.rpm2b71762a59c6d0ee0f00423d8a3bee0884c7072ebaff51d8174aa47074421b97sssd-libwbclient-devel-1.16.2-13.el7.x86_64.rpm957914ef6a03f9a976023700bd81fce59fbb17d4e5c2a794a4c0c1b76ae37b34libsss_simpleifp-devel-1.16.2-13.el7.x86_64.rpm710bdba104de7f7ae4389637888a71890422eb06d53a40ae24d1acf684e29ff6sssd-common-pac-1.16.2-13.el7.x86_64.rpm8fe44b31b67ec7909991c98a45ad34793ed9902f61b9dc0c5f4f95c7fd07ce66sssd-krb5-1.16.2-13.el7.x86_64.rpm5a9479bff6f1728286dab04f12775ee07df283e9428923f9bf13c1fab1e55c4epython-sss-1.16.2-13.el7.x86_64.rpm038265777217586db5a3805b97ab898d713e35b66fe6038792a270a194119706libsss_certmap-devel-1.16.2-13.el7.i686.rpmc7b281f36f03ef8e456306daefb753b6f5b771cdf300552b30ebbf13306e2430libsss_idmap-devel-1.16.2-13.el7.i686.rpmfcae5b8b119a85fc88c4bface974580fdc990c45b5098da7f1c411ace770a4e4sssd-client-1.16.2-13.el7.x86_64.rpme4156d799d13d169ca3d4c732689afb7f6ded885606032de26a8f8951186b83clibsss_simpleifp-1.16.2-13.el7.i686.rpmb401289d0848a4e5fb0444f4c17c59c2bd0f54af6650e662685c4e88beafdaf7libsss_simpleifp-devel-1.16.2-13.el7.i686.rpm6eb2836b451f2a7cb792dc03dccaf0233c7fedd736620e24285c975bc338a605sssd-proxy-1.16.2-13.el7.x86_64.rpm141b9e522f42e570a4f48c45f6f633d10689da0ded9b26978e39db1cbbafba6flibipa_hbac-1.16.2-13.el7.x86_64.rpm76c21c88ec8ab07912f3dfbee8f9b3bb359aeae3aa6bab71502694ada8bc5680libsss_sudo-1.16.2-13.el7.x86_64.rpm23d098becbe292c9c9af43ef1ff6f75641ed1e3197540c4c4655022abb9af65elibipa_hbac-devel-1.16.2-13.el7.i686.rpmfb2f6e3a491ff0be5d1e5393f4f7b8388abd8dae1fec6349acc4ea879e5966e3sssd-common-1.16.2-13.el7.x86_64.rpm5e28b963bc4ac9c6dd56c7d8517ffad00183cef42f48d750782a77a1af8e136bpython-sssdconfig-1.16.2-13.el7.noarch.rpmae261c8af3eeb7aa1307998b25e54bec98e4c0b6a58ee64e97d8d9df143e2020libsss_nss_idmap-devel-1.16.2-13.el7.x86_64.rpme380e009166372669179814c7375ce0229d5f2ab583bd4f11d1902c362dad40alibipa_hbac-devel-1.16.2-13.el7.x86_64.rpma1b9e29ef48a826ed67896918e8e017dcef22903e2c91b745da2c50b81857751sssd-libwbclient-1.16.2-13.el7.x86_64.rpmfdbefc3cedb0a5cde0d05729a13200fa90a6c3c624d376478ea1a4d05d2c0245sssd-dbus-1.16.2-13.el7.x86_64.rpm11b32f2efbb39e4797f00657510d5239e0038d304dc0c304605a4f54afb6b171libipa_hbac-1.16.2-13.el7.i686.rpm5b28669c257307c6d7ea2cd3ca7b96bbb3e58e37414026da82b5f514ccf3ac6esssd-krb5-common-1.16.2-13.el7.x86_64.rpm6ca67d5ad4f52f7a61470da8d030a56e0b6958f44b866d515d719c856e81f4fbsssd-kcm-1.16.2-13.el7.x86_64.rpm70a489bc49fa77eed89dffaf9950c4b371b21d3190134b2a9326e3650c329606python-libsss_nss_idmap-1.16.2-13.el7.x86_64.rpm61e22bf478153f99c8f0ec139b0e3b9d320785e9793ebe4df51df4d0c928c3e6libsss_nss_idmap-1.16.2-13.el7.i686.rpmdeaa62e5cea4842ec841558bd43deb07db43ee9b9da868094058db29ea6f86c0libsss_certmap-1.16.2-13.el7.x86_64.rpm09e78d565c8cabef26757c70cb8ffa0887a5429bff33a3b74f0f755c084e270flibsss_certmap-devel-1.16.2-13.el7.x86_64.rpmf11d3c236afcc92f60febd17456e13946d16471c81d6027a7528c4a475e0aaaelibsss_idmap-devel-1.16.2-13.el7.x86_64.rpmd4140cd34f5db72cfc411ea7cc48de9fc5bb137d98853a2a24a792abf77368d7sssd-libwbclient-devel-1.16.2-13.el7.i686.rpm96e2cfa4be526e48c6608ada5a2728ce878e07ef8e6468020b0ae32b8727cb90python-libipa_hbac-1.16.2-13.el7.x86_64.rpmea6eb29bdec54cf1e0d6709aef0d560c4a62c3fb89f71e5b46f44dcf4ec046f3sssd-tools-1.16.2-13.el7.x86_64.rpma95aa96380b9d58861cb731ab81eece4af5b9f7cc00ec2632002ed1abf00a7ccpython-sss-murmur-1.16.2-13.el7.x86_64.rpm860203b4cc68829a35e8dbe3ef8d2804301636e317f7466d873f368e4a7bd822libsss_nss_idmap-1.16.2-13.el7.x86_64.rpm3b86588d3a3dcbbcbab625a337ed25383c027c7902269541f3d7f0aadbd85c2csssd-client-1.16.2-13.el7.i686.rpm880d48ba140742dff54269496af26b63224b5048bbbe3116ac4e0104b731c645sssd-ad-1.16.2-13.el7.x86_64.rpmea5385fc9bf82580d3a38becbc0307e985323527c816d82ad1500478d207706csssd-winbind-idmap-1.16.2-13.el7.x86_64.rpmd3d80a2ae4629b9a2c39ae7e187f5d904c4ca074a8770ac2707b2ae04ffcefc8libsss_certmap-1.16.2-13.el7.i686.rpm19e3f35eddac3f83f8ce89639185e2f525e45c0655a3ba28c1625f8194dcf8cblibsss_nss_idmap-devel-1.16.2-13.el7.i686.rpm3f5627dfbf6c6e4572e5433b9fbd39de5a93f9793141edd8f25ef62f75fa29e8SLSA-2018:3221-1OpensslSecurity Fix(es): * openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495) * openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732) * openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service (CVE-2018-0739) * openssl: Malformed X.509 IPAdressFamily could cause OOB read (CVE-2017-3735) * openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737)moderateScientific LinuxScientific Linux 7openssl-static-1.0.2k-16.el7.x86_64.rpm51b5ffb41824e3c7e4f030061a04585863813a8842e700312a108b2d0d7a0d3dopenssl-1.0.2k-16.el7.x86_64.rpm06175431615dbc609197f852f9e47259bca992cdf0fae02acb22cfbe5f1fb086openssl-libs-1.0.2k-16.el7.x86_64.rpm3fe2c3ae34210dd6f545304c017a6423b41617d5507789d7a881257642f6e761openssl-static-1.0.2k-16.el7.i686.rpm05102fc90a064ce0cb4096a6fbcde16eb162307e2896f5e9a14e4f5499df002aopenssl-perl-1.0.2k-16.el7.x86_64.rpma2c1535177269fe66dfd5319414587eb78a71dac8b82158973d84d0de2828984openssl-devel-1.0.2k-16.el7.i686.rpm7073df011fd7c9f65084440364b5841434dd3a3864e25f635cc49e04ff121435openssl-devel-1.0.2k-16.el7.x86_64.rpm85869d5fa2128aacfface4d56be22615bca75e7e182f8c9a2a118dd682982f23openssl-libs-1.0.2k-16.el7.i686.rpm973f1bf9f4e27471400a763821402ab0db3f7de363610471bad81b81dced66bdSLSA-2018:3229-1ZziplibSecurity Fix(es): * zziplib: out of bound read in mmapped.c:zzip_disk_fread() causes crash (CVE-2018-7725) * zziplib: Bus error in zip.c:__zzip_parse_root_directory() cause crash via crafted zip file (CVE-2018-7726) * zziplib: Memory leak in memdisk.c:zzip_mem_disk_new() can lead to denial of service via crafted zip (CVE-2018-7727)lowScientific LinuxScientific Linux 7zziplib-utils-0.13.62-9.el7.x86_64.rpmc3627684e53f2aea8d4bc49d7b59bd9159d6cd5e709e6e1a027562c99f44fad7zziplib-devel-0.13.62-9.el7.i686.rpm917199bc97a942c53665ddfc62e1b3e95d8a0871620f34691ff81533a3b0b7d6zziplib-0.13.62-9.el7.i686.rpmf57d832ec1b26ec0f1c2ad02dbc0370ffe4764c3fc1815edefc8ad39a307201czziplib-devel-0.13.62-9.el7.x86_64.rpm352a43f4e824f0c3b0cdae4eb2fc3118297d1c8e8b1f148ca611ab4e30792ac9zziplib-0.13.62-9.el7.x86_64.rpm23d4391502eae08abcde5eeffded885a523076f38c28a8da4386ad3b5bdb726eSLSA-2018:3242-1GlusterfsSecurity Fix(es): * glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)moderateScientific LinuxScientific Linux 7python2-gluster-3.12.2-18.sl7.x86_64.rpm6c91537373c3d4e6d69ad5c294a13347cf8f599e9990189c231caac491eb4268glusterfs-client-xlators-3.12.2-18.sl7.x86_64.rpm1a0e182826b0e60af26f7bc876052946c927a74263d905c3512442fd397db631glusterfs-cli-3.12.2-18.sl7.x86_64.rpm2c9de88036085dbb82209a63a9c011048f5c4cdf922d0d1f8fb5d40fdb85074fglusterfs-server-3.12.2-18.sl7.x86_64.rpmee34109e5ea1bbc9961950b019e0360d4469e8de86f6a31b7df66dc5596da3cfglusterfs-libs-3.12.2-18.sl7.x86_64.rpma9861ed941e11bcba00946e959d3fbd59db0357f894e8883fa43b1cfa4ac44b9glusterfs-devel-3.12.2-18.sl7.x86_64.rpmf2f8084bc858cfe5f932ad71123f2821ba1a27e096fb5a4696dedd2a231dc20aglusterfs-3.12.2-18.sl7.x86_64.rpmc6643d4e8e0214a27a70b09e94f165daf30ca998ab7f6e90327ffdb4866822c7glusterfs-api-devel-3.12.2-18.sl7.x86_64.rpm6b516cd8d54d3a7791e7c6896b632e14a375c090bee518813ecade681675d49fglusterfs-api-3.12.2-18.sl7.x86_64.rpmbef25f11700f014077c8ca522eb605af00ceff1c51c5d690436eb522193467a6glusterfs-events-3.12.2-18.sl7.x86_64.rpma9314d78ad8b5cb723d3e5adb0b70c067c64c5c2a339ef598fe3bf164575c37aglusterfs-rdma-3.12.2-18.sl7.x86_64.rpm26ca1d34fc51ba67709704e22c9cc0f7ba170943fa04ed1676635c98be46c346glusterfs-resource-agents-3.12.2-18.sl7.noarch.rpm53a73f79abf3241b37f788ac26494a8b3a03811d5c6f1776284613dc9ec664f3glusterfs-fuse-3.12.2-18.sl7.x86_64.rpmea67a8d9a36b9b6f1817a859efd213b67e47c06dbee0ed35c6c4a8b354655d6bglusterfs-geo-replication-3.12.2-18.sl7.x86_64.rpm884a7a545f7f2d56339f21b3141ade9acf65505d2914ee712f295ff64a3c3ac8SLSA-2018:3246-1LibcdioSecurity Fix(es): * libcdio: Heap-based buffer over-read in print_iso9660_recurse function in iso-info.c (CVE-2017-18198) * libcdio: NULL pointer dereference in realloc_symlink in rock.c (CVE-2017-18199) * libcdio: Double free in get_cdtext_generic() in lib/driver/_cdio_generic.c (CVE-2017-18201)lowScientific LinuxScientific Linux 7libcdio-0.92-3.el7.i686.rpme1efd2621d65f350dcba88f42411579ec45eae77f603dd87a5a0c17dfbc307c3libcdio-0.92-3.el7.x86_64.rpm05e7ec0563ead2c42e792d0196fadd409b843314b8156bb43e8263004ba976bclibcdio-devel-0.92-3.el7.x86_64.rpmb14357d9b81cefdc16d0b2e88b95bf061fee6876a804c649c1c3e934e10bfcd1libcdio-devel-0.92-3.el7.i686.rpm8652cdebb8f7b0445552253cc2993a5c9b3c737c34e220031e81c360a641bfa4SLSA-2018:3249-1SetupSecurity Fix(es): * setup: nologin listed in /etc/shells violates security expectations (CVE-2018-1113)lowScientific LinuxScientific Linux 7setup-2.8.71-10.el7.noarch.rpm713b6c0198cf1a4d1f0b532b29500c753f03a1be2bf448b0e34418f975dd3afeSLSA-2018:3253-1JasperSecurity Fix(es): * jasper: reachable assertion in JPC_NOMINALGAIN() (CVE-2016-9396) * jasper: NULL pointer exception in jp2_encode() (CVE-2017-1000050)lowScientific LinuxScientific Linux 7jasper-utils-1.900.1-33.el7.x86_64.rpmff8cf60dd0ac307048f1de041fe94e507e30402a6a63fb0ed23a5c826bf94ab1jasper-1.900.1-33.el7.x86_64.rpmbbfdf4f2d88986d21707cd6dc660b8e978b1aa1636e1e1379d7a673ca73f2867jasper-devel-1.900.1-33.el7.i686.rpm4d942971cff2883e1dff88216843752a2af898e62a3699c66fa5945cc96134e4jasper-libs-1.900.1-33.el7.x86_64.rpma3fcc56be289a6fb88f6cee675862e59326d5c2b5d5867ad4081eaa490b1bd85jasper-devel-1.900.1-33.el7.x86_64.rpm709c44175b0a2066034f02c80cb051ca121b896788c654b617badb1e4f4e90eejasper-libs-1.900.1-33.el7.i686.rpmc6b73e52ceaf9990ae96d7aef8be55bd55187ecce5e798eaa0b95f23bbb68cfcSLSA-2018:3324-1FuseSecurity Fix(es): * fuse: bypass of the "user_allow_other" restriction when SELinux is active (CVE-2018-10906)moderateScientific LinuxScientific Linux 7fuse-2.9.2-11.el7.x86_64.rpmf90f43bfeccd7b94558bc56ef7073095d544640d2feb1788d5353c4e42d7687dfuse-libs-2.9.2-11.el7.x86_64.rpm41e75530f037f00d21a1eaff7027c4bcea161688f54380742edaa358689af227fuse-devel-2.9.2-11.el7.x86_64.rpm786119db041b423d32a3f3874fbf3cc7c32bdca13ca5d635e522f7b1290b5b4cfuse-libs-2.9.2-11.el7.i686.rpmb40a1305d74e9374a54e1b94ef1fb7d818822cec88969a5820f85463a31d4733fuse-devel-2.9.2-11.el7.i686.rpmd01bb4f2e65eab864c12fa5d9f0631cb4e25cb3785c3fdbe95f46d64d02dbf81SLSA-2018:3327-1LibmspackSecurity Fix(es): * libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks (CVE-2018-14679) * libmspack: off-by-one error in the CHM chunk number validity checks (CVE-2018-14680) * libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c (CVE-2018-14681) * libmspack: off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682)lowScientific LinuxScientific Linux 7libmspack-0.5-0.6.alpha.el7.i686.rpm327da5e9849a46522d1a6c25894f7bcbd20d9216456efbcc06c1b7cd7502c2c9libmspack-devel-0.5-0.6.alpha.el7.i686.rpm78f23e32ec899e19f409ea83ab45843e447d365e41844772722815d20471338dlibmspack-devel-0.5-0.6.alpha.el7.x86_64.rpm1cda0567c49e36e152e0168e88763b3c7342382d4af1baeb33a6e2fefdb27833libmspack-0.5-0.6.alpha.el7.x86_64.rpm3218905bbc77418f0b43437279958d63995d379394685b92db58d11ff90be760SLSA-2018:3335-1Xerces-CSecurity Fix(es): * xerces-c: Stack overflow when parsing deeply nested DTD (CVE-2016-4463)moderateScientific LinuxScientific Linux 7xerces-c-doc-3.1.1-9.el7.noarch.rpm8494ae9d5abd6adc1bd56c5c466ca3d1369706c332ece6f6689a1a77cb6f5f06xerces-c-3.1.1-9.el7.i686.rpm75feddcda1048d0bab9dd7e954207b0891b320853b2fcffaffedc98c8164a34fxerces-c-devel-3.1.1-9.el7.x86_64.rpmb56637bb5c006852e14aebab44b519cf46616e7511f0662c99440b951743c5aaxerces-c-3.1.1-9.el7.x86_64.rpmd2914a2d0053cc411a681716e27f16f3dfd1a7dd35b781fe1a8378ae22ee53b2xerces-c-devel-3.1.1-9.el7.i686.rpm22783db3bc1448611a81ac1df79404f115b09b5cdc85f23ee527c039923a65e2SLSA-2018:3347-1Python-ParamikoSecurity Fix(es): * python-paramiko: Authentication bypass in auth_handler.py (CVE-2018-1000805)criticalScientific LinuxScientific Linux 7python-paramiko-2.1.1-9.el7.noarch.rpm163333de11151d34d19dd0bc92ee065fd468cb3357b88875936137d21bd904f0python-paramiko-doc-2.1.1-9.el7.noarch.rpmc1a319b808524d3760d2290e9877c30194a6680aedf5a92edc9b6a8da9cc5022SLSA-2018:3350-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) * OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) * OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) (CVE-2018-3136) * OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) * OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180) * OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) (CVE-2018-3214)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm2cda12ecc6c85550947c3e028b184365edb6d55336f4b8fcc5fd63e17116e799java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm05f0933e124ce5234e4f6a1bf68e9a1fdb86e28664d0fbb78cffa8e4a02d9934java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm49f8afc058695bc5b35a601d7aab5f63fdd122e39de2c34f7127198450a3a419java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6.noarch.rpm7fcd7b28d65ed30742676171a4af091980aa1459cd36f7a009a06ffbfd8571b3java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6.x86_64.rpmcc950008190bf00804f8e57529d60989887bf351afa32635d59c06dbf08d207ajava-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm7f961baf89755117c3af3b1c6f64b6d91d805b6b46ccf3829a3890a9e9b54a99java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm14f905dd0ad753837e5dbbc085d2b0ea3d1699f025a8ac6242cca04a0856bc67SLSA-2018:3408-1GitSecurity Fix(es): * git: arbitrary code execution via .gitmodules (CVE-2018-17456)importantScientific LinuxScientific Linux 7git-cvs-1.8.3.1-20.el7.noarch.rpmed9ad545f85b9af42abd5facf1dec041152a185b65ce97b55c33588cbf88e83bgit-email-1.8.3.1-20.el7.noarch.rpmb1dadd9ec2cd94d8da3294e5c7c501f4a0123fdf952e18e20149e4138505f366emacs-git-el-1.8.3.1-20.el7.noarch.rpm6dcbe5f701092a5ad0ba639cb87721d50a25937922105274e4e22f8298a9ff30git-gui-1.8.3.1-20.el7.noarch.rpm54423a2bb1c372e9453751a17344732c692641af25799c161b2adfe13163cc96git-all-1.8.3.1-20.el7.noarch.rpm5d93e8676559fab8147f78afcc1910dd9f97024eb2fd69e1f1a4db0ef9be2288git-gnome-keyring-1.8.3.1-20.el7.x86_64.rpm6383dada61789d6a7e0bb66351b88f2fe5b07bc44d4beeae54f47f9594aa52e8gitk-1.8.3.1-20.el7.noarch.rpm88a0c506df25e5098b6a6d844cd1434cc78ec075ec382b2e3702d15a7d8f3b6egit-daemon-1.8.3.1-20.el7.x86_64.rpmdc0b6c43349c6e2d30edca273ea38587280354e9e903ef330473685ff3a87668git-hg-1.8.3.1-20.el7.noarch.rpm2b6e72215f871e4789a7fa40b2194f615dfe37065e9181a075b91b49d91630b8git-bzr-1.8.3.1-20.el7.noarch.rpm0652c9749c101484f00072daefc5632117b3d4aade9de7e180f935db79dcb466perl-Git-SVN-1.8.3.1-20.el7.noarch.rpm8d4f850b0d1d9ef7b994dae5b68114836a52e255bc468cf827ec12fea9bb70afgit-p4-1.8.3.1-20.el7.noarch.rpm0f3895e1a4f35a3179fc8d7cebee5edea722f1768437e16b9d1434b685c59494git-svn-1.8.3.1-20.el7.x86_64.rpme8ed3fc06411d16c905b90fa1e3023d494e2cd3e2b2515896c4efdb2da0efe4cgit-instaweb-1.8.3.1-20.el7.noarch.rpmac2936c4a3614752db1ec7ed6e94b3200c5f4ee3e645a7eb571e1b6f46e558d6git-1.8.3.1-20.el7.x86_64.rpmf232866b27d752251df914743ec4c542af7e7923487880b2149cda4bb38a37c3emacs-git-1.8.3.1-20.el7.noarch.rpmdbfcbde4d3a41427c3042e154c13a6d16ef976acd379ee8325a05977e95343b1gitweb-1.8.3.1-20.el7.noarch.rpmd819e8a0fcd5c975e7875ff0f8fb981c964cced4319408c51e7c805727fcd002perl-Git-1.8.3.1-20.el7.noarch.rpm927a1a86f854100acc9d34e757607b87c97ef4436b6e7c9236522c21fbc54586SLSA-2018:3410-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: Incorrect permission check in Xorg X server allows for privilege escalation (CVE-2018-14665) The SL Team added a fix for upstream bug 1650634importantScientific LinuxScientific Linux 7xorg-x11-server-Xwayland-1.20.1-5.1.sl7.x86_64.rpmdfb2688d91a032762fc983a12967443e173945251c9c89de925c503f4b67639exorg-x11-server-Xdmx-1.20.1-5.1.sl7.x86_64.rpm6f225a1f76d3de77f26a837a35866f7fade1065797f30b12149133d9737b1765xorg-x11-server-Xvfb-1.20.1-5.1.el7.x86_64.rpme1f38699fdb847a5282ccbbf49d1aee2ab7307a8ad6590cef80a66b6f571516cxorg-x11-server-source-1.20.1-5.1.el7.noarch.rpm42e8ddca54dea120887e8ea550f237d76ca111a454b65fb8489e48bc6c2646ddxorg-x11-server-devel-1.20.1-5.1.sl7.i686.rpm5579da64d74c5025330d744dc337a259f5d6863e654bd4bc5474650e458fb6d9xorg-x11-server-devel-1.20.1-5.1.sl7.x86_64.rpmb8dc71307f1cce161fe8a3e9cc8cedde63a6fe3950728bb786b806a70ac330c9xorg-x11-server-Xephyr-1.20.1-5.1.sl7.x86_64.rpm5d3a23734f021af5ac87a2b496bccc2b18558f7a0a058a94e42bbf6940e842d5xorg-x11-server-Xwayland-1.20.1-5.1.el7.x86_64.rpme6f34ffd59a536979d7c2d15235dc53aee7bd7370abf1f98fb1b7efdf0b3d897xorg-x11-server-Xnest-1.20.1-5.1.sl7.x86_64.rpma63717983f32cd0250cfabca472616fb809952f4e83c4d1b127b32274e5f59dbxorg-x11-server-devel-1.20.1-5.1.el7.x86_64.rpm33f85b0d6444e53caab5819554210ab616d0f4bbfd97cd300db1bf82a6b0a66dxorg-x11-server-source-1.20.1-5.1.sl7.noarch.rpm3d66bff48dab8650e90aa0aac5d014066423f890144573f17b91260adca96624xorg-x11-server-Xephyr-1.20.1-5.1.el7.x86_64.rpm668bc0c194df9439d05cf5bd598ae590dfc8ae9298952f928191cce0b96385b6xorg-x11-server-common-1.20.1-5.1.sl7.x86_64.rpm3a11363058a8a57a1d3cb9161b97311e9a87d84e5b58f31969e50a10fbe0bd5dxorg-x11-server-Xvfb-1.20.1-5.1.sl7.x86_64.rpm01be74b1baac677b56fc8adc084f54d3535af7b706c5664130ad69719c313505xorg-x11-server-common-1.20.1-5.1.el7.x86_64.rpmc18d7ad11bf7add9deb67b969b4346878b528c66aecfd8787cff7233620404f7xorg-x11-server-Xnest-1.20.1-5.1.el7.x86_64.rpm0c09cdb9b0cfaac8dd4fe2f961474bbc6966659ad154f6a91c4f5c2686620535xorg-x11-server-Xorg-1.20.1-5.1.sl7.x86_64.rpmcd23ead7edc16c8bd336940228c847202ab8bf645a3c83140dee6dcbb8adfbd5xorg-x11-server-devel-1.20.1-5.1.el7.i686.rpm303060d3e29d3127e604c88f5fa1c7d77b7439dec9fb6bb1a4ea500e17319354xorg-x11-server-Xorg-1.20.1-5.1.el7.x86_64.rpm7771ec60c6ce6fc49814ccf5b3762309cb1de386721d5891970f86d0198d9d64xorg-x11-server-Xdmx-1.20.1-5.1.el7.x86_64.rpmcc1a634c018f347e81cb1404c90cd22000ca49ce11214759e76691b54e57d749SLSA-2018:3458-1ThunderbirdThis update upgrades Thunderbird to version 60.2.1. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (CVE-2018-12376) * Mozilla: Use-after-free in driver timers (CVE-2018-12377) * Mozilla: Use-after-free in IndexedDB (CVE-2018-12378) * Mozilla: Proxy bypass using automount and autofs (CVE-2017-16541) * Mozilla: Out-of-bounds write with malicious MAR file (CVE-2018-12379) * Mozilla: Crash in TransportSecurityInfo due to cached data (CVE-2018-12385) * Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords (CVE-2018-12383) Note: All of the above issues cannot be exploited in Thunderbird by a specially crafted HTML mail, as JavaScript is disabled for mail messages and cannot be enabled. They could be exploited another way in Thunderbird, for example, when viewing the remote content of an RSS feed.importantScientific LinuxScientific Linux 7thunderbird-60.2.1-4.el7_5.x86_64.rpm7911d3e8de175415f270e1083fdc6cfa81bb1b516bc30eff8f410e28b6861d29SLSA-2018:3521-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) * OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) (CVE-2018-3183) * OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) * OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) (CVE-2018-3136) * OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) * OpenJDK: Multi-Release attribute read from outside of the main manifest attributes (Utility, 8199171) (CVE-2018-3150) * OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180)criticalScientific LinuxScientific Linux 7java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6.i686.rpmaae2e77b682233a2592f3c3e3c723ba762bf6740cce4ecd81cd6c3c650f324dajava-11-openjdk-src-11.0.1.13-3.el7_6.i686.rpmdb842b0abb5bdf6df5b6c20f1cf3194de34d9e04d0f679a6d498e9b2e68fe55fjava-11-openjdk-javadoc-11.0.1.13-3.el7_6.i686.rpmfb3aab8662bf3e6bdee13a4311305a385cdc63bf16678642295e4b30d67e5781java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6.x86_64.rpm90bea36f5ca51899ea677dfdeb41c289eaca5ed995ce40d4981958ec46b8b40cjava-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6.i686.rpma6b73297524bd362a95e52a46980cb755cca3ddfc6ad09569a7635fedc186e52java-11-openjdk-headless-debug-11.0.1.13-3.el7_6.i686.rpmf5ea633f64e770dfa5a3eddb9b79cd78f448c99a56d4c50d07a70d1a188b2c77java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6.x86_64.rpmed2392901295b29ad2ec5df3279c73e86cc378f1479398bfedbef59ca11dc5cejava-11-openjdk-demo-11.0.1.13-3.el7_6.i686.rpm312c342d9d926ef56134cb8c3fdf8564ba74d2a903dd6f707ee5a5e750d549f6java-11-openjdk-jmods-11.0.1.13-3.el7_6.i686.rpmc7e80b516f06365b3f2b180ac7c0f7744a940c0ccfe5481099a7f5d80e91348fjava-11-openjdk-javadoc-11.0.1.13-3.el7_6.x86_64.rpm267c6ce7d5ad0efd882cdad0a7c4ed5ebeb67614a78e31d420eb85363efb36a8java-11-openjdk-devel-debug-11.0.1.13-3.el7_6.x86_64.rpm8b961983ad4699cff32e05cf6ea9248b606447bacd5d24205911886ba3bc097fjava-11-openjdk-devel-11.0.1.13-3.el7_6.x86_64.rpm9c276f0c8c133f58744191be03661ea5cd785448d3bc9f690a26db8c1c87f8c1java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6.i686.rpm62a9b3ed3bbd467121ce2e0c253ea19e4195d6259b3b34f1119168c3967b66b5java-11-openjdk-headless-debug-11.0.1.13-3.el7_6.x86_64.rpm7f7496db12dcd72f262378a58a56c401e2cc749252e44814a443fee952ec4f18java-11-openjdk-src-debug-11.0.1.13-3.el7_6.x86_64.rpmbc670e40ddc319cac90272eb44c4b2de3a5f20b05bd8b6c576823c84e59ff24bjava-11-openjdk-src-11.0.1.13-3.el7_6.x86_64.rpm98b4e7ab0b4d53f103fc90e7dd601adeb9f0b6872708b1cd944bd431b470f94cjava-11-openjdk-debug-11.0.1.13-3.el7_6.x86_64.rpm3715d208d9ae78ac24baf3609ae4510b51c9179664ca8f669e670fdf67bdf8a5java-11-openjdk-devel-11.0.1.13-3.el7_6.i686.rpma9e078ffc42bd5421cc7e04048851f06fdf7ec71831e5ea557772bf6f40ee74ajava-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6.x86_64.rpm595a39015564fbe89e7ea47c53b1c341d2562325a14ccf860780ad99cef47e5fjava-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6.i686.rpmcbb26cb2eff855380476b7361603592d2b29579396434c58bcad3f32e5890cc6java-11-openjdk-headless-11.0.1.13-3.el7_6.i686.rpm0494cd4adebe3531e7c45790b0bc4c517b4e01eb7a8162364bb0815418568b55java-11-openjdk-headless-11.0.1.13-3.el7_6.x86_64.rpmcb01913ce4fe42d219922f8329c4736cf39ac6f8fb88e91bbd1275b64f359708java-11-openjdk-11.0.1.13-3.el7_6.i686.rpmd2fc0a4684284114ea8e85ed50b85d4738471b723cc8847503f5bab5d86d99aajava-11-openjdk-debug-11.0.1.13-3.el7_6.i686.rpm0542f1802017aad996920972b0867cae67eb54af09b24833183451cb4ebeb18cjava-11-openjdk-jmods-11.0.1.13-3.el7_6.x86_64.rpme124fff57e94dcb0294d9ff5d95ddf4e27fbfbcd390419bc656cff8c2cf97f1fjava-11-openjdk-jmods-debug-11.0.1.13-3.el7_6.x86_64.rpmc67ca01cb120b6d4a32ff6bf52fd151f0a26d698c1411460614c205d7302a3cejava-11-openjdk-demo-debug-11.0.1.13-3.el7_6.x86_64.rpm3ebfb677c214fc7ee7930514b6facf770cf6338890aa04a36023fb8231921494java-11-openjdk-demo-11.0.1.13-3.el7_6.x86_64.rpma727b5226f02d199bc9548d97bde6cc841c698336a1bf6781ecea19d34f71a11java-11-openjdk-src-debug-11.0.1.13-3.el7_6.i686.rpm3d05c7faa365effaf29999fb761c3e159c317c7accb7c63e227205f294cf1c5ajava-11-openjdk-devel-debug-11.0.1.13-3.el7_6.i686.rpmfeee703445a7b896efac763a7209abfce649c91fb8594c22c4f692cf9ae002e2java-11-openjdk-demo-debug-11.0.1.13-3.el7_6.i686.rpm087087ff7da271c09833f42084cc2efcb023cbb947c10d498a2fc866d1cb2a40java-11-openjdk-11.0.1.13-3.el7_6.x86_64.rpm46564bcfbbfa90c0cdb0d29a42195a7810d049c9f734057ff58041f0fcd509f3SLSA-2018:3532-1ThunderbirdThis update upgrades Thunderbird to version 60.3.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 (CVE-2018-12390) * Mozilla: Crash with nested event loops (CVE-2018-12392) * Mozilla: Integer overflow during Unicode conversion while loading JavaScript (CVE-2018-12393) * Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 (CVE-2018-12389)importantScientific LinuxScientific Linux 7thunderbird-60.3.0-1.el7_5.x86_64.rpmdc4869db80e22d4a09c4aeeb8cbfd47281069f03fc154647fc3827f68cd7ce9bSLSA-2018:3650-1GhostscriptSecurity Fix(es): * ghostscript: .tempfile file permission issues (699657) (CVE-2018-15908) * ghostscript: shading_param incomplete type checking (699660) (CVE-2018-15909) * ghostscript: missing type check in type checker (699659) (CVE-2018-16511) * ghostscript: incorrect access checking in temp file handling to disclose contents of files (699658) (CVE-2018-16539)importantScientific LinuxScientific Linux 7ghostscript-gtk-9.07-31.el7_6.1.x86_64.rpm928ffc2cedfc74b24941c6b6f2e4f493cb0bb987069a08ef6acf884339919222ghostscript-devel-9.07-31.el7_6.1.i686.rpmc90fc3e31e652af4a42d91dde2ed7c49de9ed91f39977e6441f41de7f2484d64ghostscript-doc-9.07-31.el7_6.1.noarch.rpm34992ea2f3fe48ec7032bf2ad141f6cc73d87faf34f406000d8a2d8b3dfd34e5ghostscript-9.07-31.el7_6.1.x86_64.rpm7b665b6fbb6f96940ced10e74e065a9b4a484a651c5cdf91a06310e89dbd79dcghostscript-devel-9.07-31.el7_6.1.x86_64.rpmf31b5ce3f3e6fee4d218b60271a10ef8c8c8ba6798621d42cc6ce10fdbf9bdddghostscript-9.07-31.el7_6.1.i686.rpm00a99b8b0a1b52888ec123237258e0f7d90c23488f5874d0b166ae4a4604089fghostscript-cups-9.07-31.el7_6.1.x86_64.rpmd7537f4995456f80b56b9fec02d369b4c0a189c30fb0d2a8675cfeefb448b537SLSA-2018:3651-1KernelSecurity Fix(es): * kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target (CVE-2018-14633) * kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service (CVE-2018-14646) Bug Fix(es): See the descriptions in the related Knowledge Article:moderateScientific LinuxScientific Linux 7kernel-tools-3.10.0-957.1.3.el7.x86_64.rpmf072ed86a9102143c4a0aa579a2c47943bd6603769f5b248a2de8cd917df0dc0kernel-tools-libs-3.10.0-957.1.3.el7.x86_64.rpmf7e3682fbb0faba8b81a7118798495bf63429cee14a76816a80c284e6cd15d6fkernel-abi-whitelists-3.10.0-957.1.3.el7.noarch.rpm5c41090d02ee0e582c84e29843a6a3c40cfa6f23bf5a697d2728c3ba5b2ec919kernel-3.10.0-957.1.3.el7.x86_64.rpmb78a415148da4a95885a7efa8521adde4cbce548220bc1ad255890ed5f4ec9b0kernel-debug-devel-3.10.0-957.1.3.el7.x86_64.rpmadfd95a42637421b8bf8651575c936cd93f088d353b05d11466cee973efad895kernel-headers-3.10.0-957.1.3.el7.x86_64.rpm068033ebdf2a264105012de02832051a2b51f8246374b699e59150a0af004d13kernel-devel-3.10.0-957.1.3.el7.x86_64.rpm5b7d103154d005372aa611f72680065e714930c9f9ed0c745e7bcce258d68673python-perf-3.10.0-957.1.3.el7.x86_64.rpm4c82bc35d4ec344d5d10a0082abc2141b43d691655d3308844e229e931786d8fkernel-doc-3.10.0-957.1.3.el7.noarch.rpmd1db2a307d557e69f7342d5af1ef223c459bd41e49458161ce2031fa9498e1cabpftool-3.10.0-957.1.3.el7.x86_64.rpmd45b917fadf2d9517abc3178a05e7156d36593b3162075097bc2a142942d21bfkernel-tools-libs-devel-3.10.0-957.1.3.el7.x86_64.rpm1779b6a9e4f33475766f09924bbda67d77f598343fafe70e737b8ec5b110edbaperf-3.10.0-957.1.3.el7.x86_64.rpm1ec39a44903aa41f352c82169a6942472034e95cb097cd1381884072618ea748kernel-debug-3.10.0-957.1.3.el7.x86_64.rpmdae10016b577b02bb693c080a11f4647711a7c9cbec103fa4747a351e9e3d27eSLSA-2018:3663-1Sos-CollectorThe following packages have been upgraded to a later upstream version: sos-collector (1.5). Security Fix(es): * sos-collector: incorrect permissions set on newly created files (CVE-2018-14650) This issue was discovered by Riccardo Schirone (Red Hat Product Security).moderateScientific LinuxScientific Linux 7sos-collector-1.5-3.el7_6.noarch.rpm3bb29005767545a674824c0fdef96a53e5e202dc9549c4982965c879c6cab48cSLSA-2018:3665-1NetworkmanagerSecurity Fix(es): * systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling (CVE-2018-15688)importantScientific LinuxScientific Linux 7NetworkManager-glib-devel-1.12.0-8.el7_6.x86_64.rpm71a65001e23353156cc80d68b62246ba4f1537434f35c8a61067f60f451ce19eNetworkManager-libnm-1.12.0-8.el7_6.i686.rpm02c80598bb10afce9d886aa042de2b94ddfec1d200c541c28c68ea6f788c0fc8NetworkManager-glib-1.12.0-8.el7_6.i686.rpm24f4b7741f5db37c47070e70cc3f5ba04a2574fb823be26fd24a59eb10140a0aNetworkManager-team-1.12.0-8.el7_6.x86_64.rpmfab545bbbb859f10ed41bd5361622990c8b29f80622f8e6c95fe3a66bd6e4a9aNetworkManager-ppp-1.12.0-8.el7_6.x86_64.rpm02137bd22c95de1e78210b25e717d8841ebbbbf025063c5d2cec8c6daa2860c6NetworkManager-adsl-1.12.0-8.el7_6.x86_64.rpmd3ae72cd0f7ed2aaf0bee9af504756a3b963a8dc24587e4af3f08c27ae373253NetworkManager-glib-1.12.0-8.el7_6.x86_64.rpm3362cd5ee27a690adfeba59bf556f68ada7c29052b93df5da000a115b5f2b2a8NetworkManager-dispatcher-routing-rules-1.12.0-8.el7_6.noarch.rpmc4eb225da61338c054b54a6439cb83f70b4dca80c106083e1ee0e68e3459d202NetworkManager-tui-1.12.0-8.el7_6.x86_64.rpm9019a638357b8a846b7418a66008496690a48392b17184679f5e174fbc220db7NetworkManager-wwan-1.12.0-8.el7_6.x86_64.rpm476aa0e351bb97efcf742596cf080c26bf5c1c4c9ded6cb983a3f234ba0a93cdNetworkManager-libnm-devel-1.12.0-8.el7_6.x86_64.rpm91df2817a7cb6eda0494700502396bca44bbdbbb3df9518c60a31dbe96efe8e1NetworkManager-wifi-1.12.0-8.el7_6.x86_64.rpmdd8b2b17cfc90e1106f6b92ab1b8a37324accf414a89b54043aa96e5659edfffNetworkManager-glib-devel-1.12.0-8.el7_6.i686.rpmf0c473945818a2a6d019cd2241a0bb17ff40834a4892fd21662b0553a6a2041dNetworkManager-1.12.0-8.el7_6.x86_64.rpm9616db8513bc1793576a3a92a0af18839ba522e54ba73e88a14920db7765419cNetworkManager-libnm-devel-1.12.0-8.el7_6.i686.rpme7561c497d0a076b2c2c20e9e2bd3826125901c3a20c7355d07d3515a7ce5a1dNetworkManager-libnm-1.12.0-8.el7_6.x86_64.rpma62b170a0bfab3ffed2a8870f1a39fa819b19e7c2ea05a38e66a612a27b1adaaNetworkManager-config-server-1.12.0-8.el7_6.noarch.rpm162fe886ccb3a82da23d6e4af79c98a8a31c36d79a869d655d311df9af7b28ceNetworkManager-bluetooth-1.12.0-8.el7_6.x86_64.rpm6c088e0fed8bcf08ed6b41f213738d36425de88d72515584a0f602d124c9dd93NetworkManager-ovs-1.12.0-8.el7_6.x86_64.rpmd3ba5331ff1663af9ae3f7ce5bc3af6fb8711467022c5e03679ee48d4b24a60bSLSA-2018:3738-1RubySecurity Fix(es): * ruby: OpenSSL::X509::Name equality check does not work correctly (CVE-2018-16395)importantScientific LinuxScientific Linux 7rubygem-bigdecimal-1.2.0-34.el7_6.x86_64.rpme584dd299fae6dd23f6e4fc8d16edfb235e342166a31f149aa560f62a48a52f4rubygem-rdoc-4.0.0-34.el7_6.noarch.rpm29c666387d7cfe9086c09ff244b5c20434c0e32d1c76a9bdf4191dcb6eb8db29ruby-libs-2.0.0.648-34.el7_6.x86_64.rpmc1a4edbb5f8f2209ef882c60cadc2904f5d4c1a936111d83351e634e780db074rubygem-rake-0.9.6-34.el7_6.noarch.rpmbfbb8086592edfdaeb0170fd0ccd43610d8e037b1759c2ddf363ce063146b751ruby-devel-2.0.0.648-34.el7_6.x86_64.rpm26e639ce3df021bfc0316bb14549c326d3d8964365dc7813b565ffbf12c11247ruby-doc-2.0.0.648-34.el7_6.noarch.rpm972ccc5b81d71898fafe3f75fb5fd7b5f6cb60f3334375e2c9e251d702d96432rubygem-json-1.7.7-34.el7_6.x86_64.rpmb27ec8c22c2f1aa281b1e30886a8d9f5613f98270a3ade2bae5b542151253307ruby-irb-2.0.0.648-34.el7_6.noarch.rpm2e7c26b03c574095a475aaa68594b255d908bf5a9e0c325025178f5c48615b74ruby-2.0.0.648-34.el7_6.x86_64.rpm3dd0692e353d20ad99e2734a6dcf4b7644289a1da3191df958131624539312ffrubygem-minitest-4.3.2-34.el7_6.noarch.rpmcecd8891eecab06a7d3ab4ca7a3fc2349b2a749cc7cd011cc8d9d3e064adcd2drubygems-2.0.14.1-34.el7_6.noarch.rpm3a72e31cf0b11a6176c2e7aac0cdefbda78f0b74ca272a8cacf7f0bbd89134a9rubygem-io-console-0.4.2-34.el7_6.x86_64.rpmc52f0078ecd28580ee48fa21bf55090413d05a4bf8eb9a602fe2df15a59c7974rubygem-psych-2.0.0-34.el7_6.x86_64.rpm20a5080298421b2d0ebf5046f79d3ae70e4b2aa9f3caeff652a5617d64d49187ruby-libs-2.0.0.648-34.el7_6.i686.rpmb850a343c83e25e9e3518b41fdcbc7d475f7d36286d516682b7ab5cac0ad93d4rubygems-devel-2.0.14.1-34.el7_6.noarch.rpm742177ea1f7ce738a0e3cb82645547655dd4655f68495f51b6c02d29478e816aruby-tcltk-2.0.0.648-34.el7_6.x86_64.rpm47ab6a3e1708c664474dbf4c7eb6d34dc7a783ce2eb37fb30fc92853623483c0SLSA-2018:3761-1GhostscriptSecurity Fix(es): * ghostscript: incomplete fix for CVE-2018-16509 (CVE-2018-16863) Bug Fix(es): * Previously, the flushpage operator has been removed as part of a major clean-up of a non-standard operator. However, flushpage has been found to be used in a few specific use cases. With this update, it has been re- added to support those use cases.importantScientific LinuxScientific Linux 7ghostscript-doc-9.07-31.el7_6.3.noarch.rpmdc8bde86c77f68aaed7c4b8db632451c2aeffd58ef201cd14f3f6dbd646287aeghostscript-devel-9.07-31.el7_6.3.x86_64.rpm1b2255a9120c2e1b73690073beedab024c623fc366b65cc190538a3b86afcc64ghostscript-devel-9.07-31.el7_6.3.i686.rpmdd17f3411e714c137c18ad94c20d6352b1234c13baa0844ab2a9c95105e6b661ghostscript-gtk-9.07-31.el7_6.3.x86_64.rpmba399aa168c484cbbaf2624d5d97f6af07ee7158147b6e97894787ec398c2c60ghostscript-9.07-31.el7_6.3.i686.rpmf1b46bf7d7f6342f996c36fe02bdb37f51a6a048b8cca7001c7e862e76129608ghostscript-9.07-31.el7_6.3.x86_64.rpma7f571bdb4fe1cc653a586dee11ec80fe6d7b81fdd327a6a1883f1031846e751ghostscript-cups-9.07-31.el7_6.3.x86_64.rpm3b467817c1ce92283417ea6229b46a225bf181fbcbd72c53efca5c4cb61fb8faSLSA-2018:3833-1FirefoxThis update upgrades Firefox to version 60.4.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 (CVE-2018-12405) * Mozilla: Memory corruption in Angle (CVE-2018-17466) * Mozilla: Use-after-free with select element (CVE-2018-18492) * Mozilla: Buffer overflow in accelerated 2D canvas with Skia (CVE-2018-18493) * Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs (CVE-2018-18494) * Mozilla: Integer overflow when calculating buffer sizes for images (CVE-2018-18498)criticalScientific LinuxScientific Linux 7firefox-60.4.0-1.el7.i686.rpmd112f50633333a750e33ee4ae53901045672d1e9ea52c66a4ac0e1e3a5ccc522firefox-60.4.0-1.el7.x86_64.rpm7aa3478c46c5825dbe9d9c40f52760dd050615774e2742c2758dc4e51aea2134SLSA-2018:3834-1GhostscriptSecurity Fix(es): * ghostscript: Incorrect free logic in pagedevice replacement (699664) (CVE-2018-16541) * ghostscript: Incorrect "restoration of privilege" checking when running out of stack during exception handling (CVE-2018-16802) * ghostscript: User-writable error exception table (CVE-2018-17183) * ghostscript: Saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) (CVE-2018-17961) * ghostscript: Saved execution stacks can leak operator arrays (CVE-2018-18073) * ghostscript: 1Policy operator allows a sandbox protection bypass (CVE-2018-18284) * ghostscript: Type confusion in setpattern (700141) (CVE-2018-19134) * ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c (CVE-2018-19409) * ghostscript: Uninitialized memory access in the aesdecode operator (699665) (CVE-2018-15911) Bug Fix(es): * It has been found that ghostscript-9.07-31.el7_6.1 introduced regression during the handling of shading objects, causing a "Dropping incorrect smooth shading object" warning. With this update, the regression has been fixed and the described problem no longer occurs.importantScientific LinuxScientific Linux 7ghostscript-9.07-31.el7_6.6.x86_64.rpm71a2b5b66410e23b951c33f0c0a8273cb3749c992b6415ed1ef19488256a96f2ghostscript-9.07-31.el7_6.6.i686.rpm90ce694187d10a88bb142771ca9c6f0909d42b1a0bcf61125acf080ec1bdc509ghostscript-cups-9.07-31.el7_6.6.x86_64.rpm55dba389eaaacb6f70ab14e0fa7e02ef91cb915b62a3f9422aaf52b1a45a7362ghostscript-gtk-9.07-31.el7_6.6.x86_64.rpma8a0797d405c078c2f1ed98e918814b5d1749ad6b5650ed41cca0e9ea835ca42ghostscript-doc-9.07-31.el7_6.6.noarch.rpm6a7e555ab2210b1b948912c7c0c92e8237a9793c9c0ac5c9e2a4cb9550ea09b1ghostscript-devel-9.07-31.el7_6.6.i686.rpm5861277b6e5e33fcc38de3debf3ede9cae23c27a60b29c98968e586a9404af4bghostscript-devel-9.07-31.el7_6.6.x86_64.rpm76add74c2facaa92f53d27021c56a85569f761765ca184bfbdb7bda54dba36ecSLSA-2019:0022-1KeepalivedSecurity Fix(es): * keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution (CVE-2018-19115)importantScientific LinuxScientific Linux 7keepalived-1.3.5-8.el7_6.x86_64.rpmb942ab03efa6dcf9a580aa10b128328b86e273c961a0f56ce3102dd055c409b5SLSA-2019:0049-1SystemdSecurity Fix(es): * systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling (CVE-2018-15688) * systemd: stack overflow when calling syslog from a command with long cmdline (CVE-2018-16864) * systemd: stack overflow when receiving many journald entries (CVE-2018-16865)importantScientific LinuxScientific Linux 7libgudev1-devel-219-62.el7_6.2.x86_64.rpm22607bc4a1fa8202d0b226d56d738aadd6f752b766965aadf64e6c77adfcadf9systemd-libs-219-62.el7_6.2.i686.rpm65dbbcbf02b651a11e568989f5efb2ad152ea20a63e23f5d15ba109f20de950bsystemd-sysv-219-62.el7_6.2.x86_64.rpmec86080f6a609344b77cad72f32fdf54342378a0ff8300d90776a7c65097c57fsystemd-libs-219-62.el7_6.2.x86_64.rpmfa41c657cd5cda8d950b73949cbfc80b4efec6dfa64e5047431c1dab4a848080systemd-resolved-219-62.el7_6.2.i686.rpm9ea3631370d0d0b263070377f242a25ceb214a215b2b5002ce1cea0b680a6df4libgudev1-devel-219-62.el7_6.2.i686.rpm9d8dfac998956e1e91270b6af0657194441a3eefeeb0ef3c1fda99c47c5265b4libgudev1-219-62.el7_6.2.x86_64.rpmeafe889b8092a3420f5cf6bd787daa2a402fb285c5024e8b43383c8ecbe72930systemd-journal-gateway-219-62.el7_6.2.x86_64.rpm6250ad9f8dd5a33851da21eace739a3190ce4c03952ad8f620f8cec5ec548b9csystemd-resolved-219-62.el7_6.2.x86_64.rpm7dd30c557ed0d3dffb41314b737b8d5dd5d7a32397ae089d58050de3f8692971systemd-219-62.el7_6.2.x86_64.rpmb53511456522c9ccbb8780a9df82eeea19f585da266782add8dde11d1985f8ddlibgudev1-219-62.el7_6.2.i686.rpma8670ff0727c24dbfe4617a89a2e255a7170b6a402e1d91985eab5f7911b032esystemd-python-219-62.el7_6.2.x86_64.rpm0625de7759c3863ee71af805e7259961014e1f3a95d14a7f9e66133e12926890systemd-networkd-219-62.el7_6.2.x86_64.rpmc994f96329501be7cc1cce348bb643cb686129a63af4fc52d23b777ce76c2af9systemd-devel-219-62.el7_6.2.i686.rpm048a5988f8370c6b5d16be82ae7420f075c27460fe6f0fa8f90977551d640a89systemd-devel-219-62.el7_6.2.x86_64.rpme930f1f3e086b549f0bf310cccee04b8f2c6ad9bd4c78ff9d6a1f55cf45141c8SLSA-2019:0059-1LibvncserverSecurity Fix(es): * libvncserver: Heap out-of-bounds write in rfbserver.c in rfbProcessFileTransferReadBuffer() allows for potential code execution (CVE-2018-15127)importantScientific LinuxScientific Linux 7libvncserver-0.9.9-13.el7_6.i686.rpm5d8595e3c342f850867d601329e6994331a19f46d5abb00fa4ba27e35b1962edlibvncserver-0.9.9-13.el7_6.x86_64.rpmf1eba77a642d5c5e7aa2d082713cb03dbd1f57d47f9dac983d3b4c8a11d2b53alibvncserver-devel-0.9.9-13.el7_6.x86_64.rpm34ed18dc8410927f0d8b9bc75d9c6b63cf17b80717a6ff273e9682979a47258dlibvncserver-devel-0.9.9-13.el7_6.i686.rpmf0fcd95a91d8979c86977c522eff61360ef5899dd00d417158d03afb115e2726SLSA-2019:0109-1PerlSecurity Fix(es): * perl: Integer overflow leading to buffer overflow in Perl_my_setenv() (CVE-2018-18311)importantScientific LinuxScientific Linux 7perl-IO-Zlib-1.10-294.el7_6.noarch.rpmedf4f9693c82e4b6bd2b0a9893d649c24267d6be14309b97e62678914da88791perl-devel-5.16.3-294.el7_6.i686.rpm57cec55b2efe28598509fb6a97c590e0060f1d93e6ead02f59575d5225c4e0dfperl-Package-Constants-0.02-294.el7_6.noarch.rpm6e4b4b3761593923c8da62e5c4c848f0d6d04345b19e25bb41b8b58540ae2d17perl-ExtUtils-Install-1.58-294.el7_6.noarch.rpm2b72fc269df845e6d70129ff60ae5682799b26dbd0eff416726cd27388884630perl-ExtUtils-CBuilder-0.28.2.6-294.el7_6.noarch.rpm91b8aaf71189e97e5e65817363089d8c61a443831065d6e1cbc6afbcbf499d48perl-Pod-Escapes-1.04-294.el7_6.noarch.rpm30969fba71886faba27f8f3e0ff0b62f71423a7f1b6604331d0ee6655f7436faperl-devel-5.16.3-294.el7_6.x86_64.rpm5cdc80ba74a730a2701cb4d43a889cee11a31874d762123eb84cca8183c68f95perl-Module-Loaded-0.08-294.el7_6.noarch.rpma708fbe29bea7f70b6f50df5fc903b51de95070dcdeea6e47197ff1abbae564cperl-ExtUtils-Embed-1.30-294.el7_6.noarch.rpmc5bff862e7ff2d44b1955eb8e6d54aa2d5c588e1afbd8633c30aabea1a493a03perl-libs-5.16.3-294.el7_6.i686.rpm89ac0b813a69a4e34605fea3d6d481d47287603326eb92192902d5c7a40b3845perl-CPAN-1.9800-294.el7_6.noarch.rpmb07be44b857f347df2c06828b1ba4d051b8699e303ffbb0c38816108be20f193perl-tests-5.16.3-294.el7_6.x86_64.rpm9903361400d7705bc9c76ca668d271e010f05b5507c08afd2b718f460e2f3e03perl-macros-5.16.3-294.el7_6.x86_64.rpm49343b448f3fc5ca059b97f684f77bb0ecb38a82396e7c111aeb45fd15c4b668perl-Object-Accessor-0.42-294.el7_6.noarch.rpm3365e80482b492d739cdc7273c28a540d03b3d4fcb6ea649a7425d97b8a68166perl-Module-CoreList-2.76.02-294.el7_6.noarch.rpmc273663c4cbc2e355af58fc91f8da82a92b3af7c4d25bf913f341482b225b1c3perl-core-5.16.3-294.el7_6.x86_64.rpm91cd3a6358392659b355f0a334e7935cf45ad1f8e953b1bf4ba1f39121c44856perl-5.16.3-294.el7_6.x86_64.rpm9a5cd5bc7c3c47e167361587d143ae971756a8a38064e8ba72a1adbff0d66ae3perl-Time-Piece-1.20.1-294.el7_6.x86_64.rpm752e6dbd357ed4c126431c5473a93467cfdabb14aa9cec89d93f07e44e88ba0fperl-libs-5.16.3-294.el7_6.x86_64.rpmc449b53461bd02dd4cff8b7c24a6a73ad675fe6b3657c8d85528d8890d146b4bperl-Locale-Maketext-Simple-0.21-294.el7_6.noarch.rpm506d9886d3246b412f6825b9b3a23af17246618e1c84f7e4d87ac71d1b648f92SLSA-2019:0160-1ThunderbirdThis update upgrades Thunderbird to version 60.4.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 (CVE-2018-12405) * chromium-browser, firefox: Memory corruption in Angle (CVE-2018-17466) * Mozilla: Use-after-free with select element (CVE-2018-18492) * Mozilla: Buffer overflow in accelerated 2D canvas with Skia (CVE-2018-18493) * Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs (CVE-2018-18494) * Mozilla: Integer overflow when calculating buffer sizes for images (CVE-2018-18498)importantScientific LinuxScientific Linux 7thunderbird-60.4.0-1.el7_6.x86_64.rpm06a305bd4d99477d05f1b0f98cd40e92b8a90bfde854c1803c2c1dd57d5ed768SLSA-2019:0163-1KernelSecurity Fix(es): * kernel: Use-after-free due to race condition in AF_PACKET implementation (CVE-2018-18559) * kernel: userfaultfd bypasses tmpfs file permissions (CVE-2018-18397) Bug Fix(es): See the descriptions in the related Knowledge Article:importantScientific LinuxScientific Linux 7perf-3.10.0-957.5.1.el7.x86_64.rpmb2b2dfe5bb937a4eab8c3b73ab4a1a4ed5eeac352c3af512baf5f45a656235a5python-perf-3.10.0-957.5.1.el7.x86_64.rpm548dfb513c253164978d82eca968ac2ad036a4d5dd0189b9dcf897358e8c5964kernel-devel-3.10.0-957.5.1.el7.x86_64.rpm9e7283070955b09f75f825b9ecc946c78145dd70ef16db762c6bec201c70ba2ekernel-headers-3.10.0-957.5.1.el7.x86_64.rpm840a21209e828818b4d136a39571e8b8555d1195280766aae033e0e00a544994kernel-debug-devel-3.10.0-957.5.1.el7.x86_64.rpm6ae15aaedf396c08ec1f036d049a1236c743b2ab8c6445de20cf7f8da60e0c94bpftool-3.10.0-957.5.1.el7.x86_64.rpm83c5d209e53326b595137fcf77c6eb99ae7d9ad0d44d92665dc4757effd8eb5dkernel-abi-whitelists-3.10.0-957.5.1.el7.noarch.rpma4c61af0157259f0b9dde3f00da697a67fbeafa3c552ca96a4812b0594662f46kernel-3.10.0-957.5.1.el7.x86_64.rpmdfd2208d0b34e63350b196b510f1ed3da7722572a9cc5a15686cbc18508591a8kernel-doc-3.10.0-957.5.1.el7.noarch.rpm012a4ac238ffe9dcf9a6000e7437ca9352a87202dc9d0d32fc6d2c9ec48873f7kernel-tools-3.10.0-957.5.1.el7.x86_64.rpm507f3c0f796bfa153cc9c01f956457c3d35a3b81d18174e0d06147a8567b0b38kernel-tools-libs-devel-3.10.0-957.5.1.el7.x86_64.rpm15e2231d7d0a55f0b839fe5f0cd48befc6dd02876cffa4d840969dcab2fb4a2ckernel-debug-3.10.0-957.5.1.el7.x86_64.rpmef58b84aeadbd614eb766961143ac00c17d634a9d4df0d818597a35f2d7af84ckernel-tools-libs-3.10.0-957.5.1.el7.x86_64.rpm95f8ef248b61f15b6a199d915d52456e2d61521eae7f9e7be81939afb9af74c5SLSA-2019:0194-1BindSecurity Fix(es): * bind: Crash from assertion error when debug log level is 10 and log entries meet buffer boundary (CVE-2018-5742)moderateScientific LinuxScientific Linux 7bind-license-9.9.4-73.el7_6.noarch.rpm2cbbf9763155101ca4b0699c36eb2efef7cadc8cfc23d4d462cc9cd9ea339daabind-chroot-9.9.4-73.el7_6.x86_64.rpmf37a10f7b2f4812cd5da7d7b5a490394cea0479ecf76c24ad8826284142f76b0bind-pkcs11-devel-9.9.4-73.el7_6.i686.rpm1c3c07dc71c42d46e8293ba8c6e6c1659d0a74eacf70d8928f4a0ead56f4882bbind-pkcs11-9.9.4-73.el7_6.x86_64.rpmf535de09ae4a95bc1449d82a6122cff6064daf43d6618bc59eb4928acbc64a2bbind-lite-devel-9.9.4-73.el7_6.x86_64.rpm38676046a766151eea148552368c8c0216cf043486df2f507a6d697bc1d7d23bbind-pkcs11-libs-9.9.4-73.el7_6.x86_64.rpm51efa7ba9062d266303f0b784cfc2d7d6ff3ef8ef6dc3202a5b75368209c19f3bind-pkcs11-devel-9.9.4-73.el7_6.x86_64.rpme16a55490c423c7b35ae6599954443825df8c3d1782863c2aa9237b85ad689d3bind-sdb-9.9.4-73.el7_6.x86_64.rpm1a9da3d0d4a4a6b6cea4c33fc9516a30a7e291ad8bee531eebf1e9c4c27445cebind-devel-9.9.4-73.el7_6.x86_64.rpm913a83e5492dfaf7a9f7352cf8443d0ebd26e790171ca4a3fd678bb2da7cdc5ebind-libs-9.9.4-73.el7_6.i686.rpmb23628bf0c701e73b761210100ea613cbb9a002b878335e3ed15416f0cd6004abind-utils-9.9.4-73.el7_6.x86_64.rpm2a110da2d6c841a72aba898e09b38a8861296ca982d82e3baf872d7eda41b47bbind-libs-lite-9.9.4-73.el7_6.i686.rpm1c2dee46025a60931d0fa57fe43c3fbbdac4ce74f26a6692de637c4d7a2b0654bind-pkcs11-libs-9.9.4-73.el7_6.i686.rpmf0b8e5b4477bafba2d6ef0c0a51eda0b9ebe2e46d8e296a76fa824a12fb1bfb0bind-libs-9.9.4-73.el7_6.x86_64.rpmd3721fb8ca503fea5a6d93d8fb44d7cb4f15ae930e5aa20977da7916e35a57f0bind-lite-devel-9.9.4-73.el7_6.i686.rpm3fa394e241ecfe90c68fc2dbf107a76aae501beb4c00329a0b5d1e08fd3c501bbind-devel-9.9.4-73.el7_6.i686.rpm0a5e76dc91d115ba1ad743c4c8d46aa22fa4513d97d92a74085ffcd128362fa6bind-pkcs11-utils-9.9.4-73.el7_6.x86_64.rpm807947dfd1ea3dea4a0073e87dc3f6cdb338a5e676ead4c0337220b2ac9b08aabind-libs-lite-9.9.4-73.el7_6.x86_64.rpm9823437c25ebfa56d9a1882c376a01609213f428cbc64b2df31373fa210e048abind-9.9.4-73.el7_6.x86_64.rpmcb9e450e99af6d99da1dd02c83e9b590cecd033bec732c96738cb58d6c003fbfbind-sdb-chroot-9.9.4-73.el7_6.x86_64.rpm95ac7fb80835ff0352b341771b5c2c7871c645d8366557eb48929d1eb1b003dfSLSA-2019:0201-1SystemdSecurity Fix(es): * systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864 (CVE-2019-3815)lowScientific LinuxScientific Linux 7systemd-networkd-219-62.el7_6.3.x86_64.rpm1aa58f3dc5d0ee43f6e194fe4b78186fed43d594eb4bff4067d29576144e48d0systemd-resolved-219-62.el7_6.3.i686.rpm72d45808e5a3f9cfc61be4c01f38c95c0637a5af2c9896da9cb90daaa3a01377systemd-python-219-62.el7_6.3.x86_64.rpm11ca08f4b489f4a281ed57700399bf327224264ff7cbb0925c56084a04e41787libgudev1-219-62.el7_6.3.i686.rpm1d00b6696fd06472873d1ddefe0a255c99026cff55cda70ebb7a08bb1a9308ebsystemd-journal-gateway-219-62.el7_6.3.x86_64.rpm36916fdc6130e4372d01176be674323ff4cd0335f7cd83c663405f9c9a68660asystemd-219-62.el7_6.3.x86_64.rpmd90b348c3e41c029a595b32d0794eabc559c86301e11972ca598b139ec9c9071systemd-sysv-219-62.el7_6.3.x86_64.rpmdfac0ce057468029c5fe008bd909ee696f8d7f431cf0880815dce8e8c92bc0b7systemd-libs-219-62.el7_6.3.i686.rpm7ba9527407079df8cc48b95987cd7d17b1373377dce4acd76f8bfb7755fde33esystemd-devel-219-62.el7_6.3.x86_64.rpm4d0d69c7c6d588ee85b090ad63cfa970cd8f9e3c09a9d7910492e322580b0761systemd-libs-219-62.el7_6.3.x86_64.rpm3ca659f933505799dabfa9ef668f16b7eedd663fb6b4fefa3c06d70a1803015flibgudev1-devel-219-62.el7_6.3.x86_64.rpm028697d040b359f1bb0b5ad649a1232458dda401d113178372c70cf74ced8af3libgudev1-219-62.el7_6.3.x86_64.rpma71d10739b2e66fee55a55acaf3a6aa1e81aae9b53d9115bb707934a1a5249c6systemd-devel-219-62.el7_6.3.i686.rpm384534799736607e48176f74c6ff03464e59343652757a7d8553290e17c27eacsystemd-resolved-219-62.el7_6.3.x86_64.rpmafdc719e149703d994f80eb8540e3b29d66aa9862263a6f4969ba8a69462d858libgudev1-devel-219-62.el7_6.3.i686.rpmc452c85d8bc6ab488511d29b70167a74e8b9a7fa64506b03024234518a340557SLSA-2019:0219-1FirefoxThis update upgrades Firefox to version 60.5.0 ESR. Security Fix(es): * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505)criticalScientific LinuxScientific Linux 7firefox-60.5.0-2.el7.i686.rpmaec7d2072cc8bd01786e91a974c7865a0b69d0b7936ae8db1e616e9b137e51e2firefox-60.5.0-2.el7.x86_64.rpm132bdea7250ad963598418fe366ec62e54c9a241a8ef8b5acbb1f31c7350372bSLSA-2019:0229-1GhostscriptSecurity Fix(es): * ghostscript: use-after-free in copydevice handling (699661) (CVE-2018-16540) * ghostscript: access bypass in psi/zdevice2.c (700153) (CVE-2018-19475) * ghostscript: access bypass in psi/zicc.c (700169) (CVE-2018-19476) * ghostscript: access bypass in psi/zfjbig2.c (700168) (CVE-2018-19477) * ghostscript: subroutines within pseudo-operators must themselves be pseudo-operators (700317) (CVE-2019-6116) Bug Fix(es): * Previously, ghostscript-9.07-31.el7_6.1 introduced a regression during the standard input reading, causing a "/invalidfileaccess in --run--" error. With this update, the regression has been fixed and the described error no longer occurs.importantScientific LinuxScientific Linux 7ghostscript-9.07-31.el7_6.9.i686.rpm57c9536f144184b674d066ceca43f613c9afd0a5838e16478d221be5c54a2109ghostscript-cups-9.07-31.el7_6.9.x86_64.rpmf0947a84149a0a8191b31c42fa55019c07766295a45df68c89c34dc6b5a49adeghostscript-devel-9.07-31.el7_6.9.i686.rpm34aad672b1d7aceec306a59e329be7985f14075be6c4c46ad8c3f6a725b282d6ghostscript-9.07-31.el7_6.9.x86_64.rpm6d0483d59f86cc3bced027543fe6e511c126dad5110596c63b28c585cd2511e1ghostscript-doc-9.07-31.el7_6.9.noarch.rpmdba5befc5adb895e5b1ab4788197d6e588c431501bf432cf1d333145ff5a930bghostscript-devel-9.07-31.el7_6.9.x86_64.rpmefb676257f0d34683d7077250b59e1e8f774285435f0de11c56d24ea0365391eghostscript-gtk-9.07-31.el7_6.9.x86_64.rpmf04116841e31feb5cafa8db65f0b2586e8a1064aa1cd800a098fc411eccc7172SLSA-2019:0230-1PolkitSecurity Fix(es): * polkit: Temporary auth hijacking via PID reuse and non-atomic fork (CVE-2019-6133)importantScientific LinuxScientific Linux 7polkit-0.112-18.el7_6.1.i686.rpmf0f294939b799b7e5b866bb33e7bc90cd7a37ad1ad19ac3cac908b06e0cc4e24polkit-0.112-18.el7_6.1.x86_64.rpm1186403496b22e7be1deabb2cea2587c77d9ae7214e79dda9b73128af89a7b1bpolkit-docs-0.112-18.el7_6.1.noarch.rpm1ba9c5e5c382c31d5e0993b1b1111a13e8a4793daf4fe1bea32f9a4c9551feeepolkit-devel-0.112-18.el7_6.1.x86_64.rpm7f27e195fc9f392168e36af97e5768861b82b3a72a5e756d8b180b52fb472a85polkit-devel-0.112-18.el7_6.1.i686.rpm127495e03bc0126eee9c29dfb284dc8cf661e659b7eecd72b94faea7ce87a0b7SLSA-2019:0231-1SpiceSecurity Fix(es): * spice: Off-by-one error in array access in spice/server/memslot.c (CVE-2019-3813)importantScientific LinuxScientific Linux 7spice-server-devel-0.14.0-6.el7_6.1.x86_64.rpmb40a43290816336fb8e755225d5712cd2c18732e540a1369a9e9cf16102a65easpice-server-0.14.0-6.el7_6.1.x86_64.rpm520734166c2a080ff024951a16029b3f3a1326a65003eb6791a0bdd951d2d2e0SLSA-2019:0270-1ThunderbirdThis update upgrades Thunderbird to version 60.5.0. Security Fix(es): * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) * libical: Multiple use-after-free vulnerabilities (CVE-2016-5824)importantScientific LinuxScientific Linux 7thunderbird-60.5.0-1.el7_6.x86_64.rpm2f873ebe7e2ec619b89a814650c62512a350900732811175764c24fb3d0af840SLSA-2019:0368-1SystemdSecurity Fix(es): * systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash (CVE-2019-6454)importantScientific LinuxScientific Linux 7libgudev1-devel-219-62.el7_6.5.i686.rpm3d1c03bf86f8c31cfcc812bdbf6c533d0a3bad905a1bd2b6dfdfa67554cda738systemd-sysv-219-62.el7_6.5.x86_64.rpm65721f80987c26e90799a4aaa44255c000f38c1bfa2aceae6d1595634c0f4733libgudev1-219-62.el7_6.5.i686.rpmeec2fa91ee5e26224a06997d850af9cb272d29c37402c3dc9e395389054ae935libgudev1-devel-219-62.el7_6.5.x86_64.rpm3583afc88cd9d2cac8727f724f12c868507e3aac1ce34014b183d0cbb6cc8360systemd-219-62.el7_6.5.x86_64.rpm4115483c8ec35d6f5342359c6887ff05b03150021cea6e76c15c74a50129a060systemd-libs-219-62.el7_6.5.x86_64.rpmf8c623b1283d1d8012496690208f5dc6048546169982896155750336d3026900systemd-devel-219-62.el7_6.5.i686.rpmbfec30cd13fa07f488909525ceb837c2a670f3254e796a6fd8bd3cae045ee2a4systemd-networkd-219-62.el7_6.5.x86_64.rpm0523fb3e5541505fc86fb2ed1891dd18cdc5a1557c1e7e15a07603ac83f0ab11systemd-libs-219-62.el7_6.5.i686.rpmca90f41423d04222a1b538fd587038fef54fe2d2c591087688637577f1e2740fsystemd-resolved-219-62.el7_6.5.x86_64.rpm5f3cd94ecf66db375dc0e924ccb2a391ae681a1ad5b930afc7c716c08746183esystemd-devel-219-62.el7_6.5.x86_64.rpm455687ef620ee03c6db755046593450b8ae09f51e9aef84435ea0f798c6ab8c1libgudev1-219-62.el7_6.5.x86_64.rpm38ed300d14673fbd51920183aae79e48376816764273e6b6333d34673d79ce0esystemd-python-219-62.el7_6.5.x86_64.rpm0198f0c5c3f3673d92cd51bf40aad50ec938678238cbe6b9807f7cc5deaa77e0systemd-resolved-219-62.el7_6.5.i686.rpmd53f19dffa30a7a9eeedfee06d668b60dda33001f4904d75bfde2196cbe35a45systemd-journal-gateway-219-62.el7_6.5.x86_64.rpma7a1125c9f89f20155e415b4d22062033eaa5c7749007c95a32f14a84e1bd40bSLSA-2019:0375-1FlatpakSecurity Fix(es): * flatpak: potential /proc based sandbox escape (CVE-2019-8308)importantScientific LinuxScientific Linux 7firefox-60.5.1-1.el7_6.x86_64.rpm0d6d881c5ee9dd40267f169009ba68086b3aefc16fea5ce4a9bb86125c6e3ce5flatpak-libs-1.0.2-4.el7_6.x86_64.rpmc7c0233233e2feed16b6e28bc2fae7cce6a185d8bb91e4ed3aa3722ca4fe60a6flatpak-devel-1.0.2-4.el7_6.x86_64.rpm747df7171f6fea8dbdf37add1291aab3b9382b279f5e45929005a4ee00b10d15flatpak-1.0.2-4.el7_6.x86_64.rpmb72f402752a545037886b8da47ec7d5978b6491d1b5fad6a087053d93d8f16a8flatpak-builder-1.0.0-4.el7_6.x86_64.rpm5500731153aae9f0ab075cf17b0d09f3753f55d9130ea191cbfc6a1d4d96e487firefox-60.5.1-1.el7_6.i686.rpmfd15ca749282f0b222c69a3ecddf0dffe62cefab320d33c5feec1ac16f024e95SLSA-2019:0435-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-devel-1.8.0.201.b09-0.el7_6.i686.rpmae3e135fc63155f038bcbd7cb17c29979a7fa4475368e8dfb15024ac61a1534djava-1.8.0-openjdk-accessibility-1.8.0.201.b09-0.el7_6.x86_64.rpm64df5984bb65e41da88fe2a558b3105c8847d03a0fb15f46602014e70f7760a3java-1.8.0-openjdk-src-debug-1.8.0.201.b09-0.el7_6.i686.rpmfbea38a8b1593c627a801e1e2d1a7f9209c637e64709fc6509455b0e99a2cbc2java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.i686.rpm2a43d3a9d4adc08b49afc366cc0eb5b15c21fe3848639cfe9581ee999bbf6223java-1.8.0-openjdk-javadoc-1.8.0.201.b09-0.el7_6.noarch.rpm203897aeca04c37ae3fe24fa25c35b09f20a80fca2dd8d217f0b72c2c1ef2fcdjava-1.8.0-openjdk-accessibility-debug-1.8.0.201.b09-0.el7_6.x86_64.rpmf2288036bc63664a34226623366a884243ca3e7910894dbfe73e7b9087b3b08cjava-1.8.0-openjdk-headless-1.8.0.201.b09-0.el7_6.i686.rpm824f5e7fe0b6a5454713b20c87dd0626bb496a4713f640e98361d6b6a0a68942java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.201.b09-0.el7_6.noarch.rpmecd4802fcc7897c7b00b7cd648c2cb0e2c54654d3582ce5f1134e2cf36380683java-1.8.0-openjdk-devel-debug-1.8.0.201.b09-0.el7_6.x86_64.rpmc6ccf80c8d953429de9336bebd0ccd7052ab770331a4ba98457fdb073455ea34java-1.8.0-openjdk-devel-1.8.0.201.b09-0.el7_6.x86_64.rpm612272297085bdbf9917518199586d8ba40db2d9b9308a2af30de181b5ca6accjava-1.8.0-openjdk-src-1.8.0.201.b09-0.el7_6.i686.rpm331428ec521a2ef3b6cb64b2bc956058f51ab82a9f4bd073c0d916d462317fb7java-1.8.0-openjdk-demo-1.8.0.201.b09-0.el7_6.x86_64.rpm53fe35b0fbe519e63457850b76876340300f753fd80ce3c70db423976cd74edbjava-1.8.0-openjdk-javadoc-debug-1.8.0.201.b09-0.el7_6.noarch.rpm3ffe74b81c73e37ed8bce998d3827cc72e2a01756d1ad81d915ffc7b39482a2fjava-1.8.0-openjdk-javadoc-zip-1.8.0.201.b09-0.el7_6.noarch.rpmd5f2761915d49f8ef78a242aec082f6b19e97d66f2e97f31336e382f4c6a88b6java-1.8.0-openjdk-demo-1.8.0.201.b09-0.el7_6.i686.rpm75bb036c896de5c0ba70b530196f48abcf81a852f45dc3d9d132700f47c84a3ajava-1.8.0-openjdk-headless-1.8.0.201.b09-0.el7_6.x86_64.rpm81254faec19c63949ef07bbcbf8f283c0f9948a141d4320b20256b4289a2c188java-1.8.0-openjdk-demo-debug-1.8.0.201.b09-0.el7_6.i686.rpm0c39bd0f3f5b57e9e19b40f7f924a8df985f732ebfe25344c756e46058cd31a9java-1.8.0-openjdk-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm5055493a1c6e8aeb74bec7e205f274e2053ee8f6a297dbefd2f8d3723a87dd3ejava-1.8.0-openjdk-src-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm3434d2c0b3fb3193a86a6044cd8396c2bdd341dc1892016c68b90ead280f8948java-1.8.0-openjdk-accessibility-debug-1.8.0.201.b09-0.el7_6.i686.rpm7b07fcc2429d6d4255256b3b376e8f9fc6a18c58ae1b65eef1138af022752555java-1.8.0-openjdk-debug-1.8.0.201.b09-0.el7_6.i686.rpm730c5955ad2fa7a19189601668f7ac273a8db0b97064c13803c8ce79c8e695c5java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.x86_64.rpmddef671401d149766abbc1001ca27d9939238bd2dfdc39a33f29b3d7d50d0215java-1.8.0-openjdk-headless-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm2bbd0bc30eb879f40dca7c06dcce8c0f90c5a531a7a70faad62b3e11ea1c561ejava-1.8.0-openjdk-src-1.8.0.201.b09-0.el7_6.x86_64.rpm66424dc25b4308e76e38e2d36026b2f1280202ce1a2049bc146ee64929a672dbjava-1.8.0-openjdk-devel-debug-1.8.0.201.b09-0.el7_6.i686.rpm176ec27a417ab43c9d3268009faa20aa7c02c8099a8ac7b3ff42211778d5b318java-1.8.0-openjdk-headless-debug-1.8.0.201.b09-0.el7_6.i686.rpmc052ce72ed7b273fe38034d549b310fdb44c3e6dbf3df11de6f7a626ce646ad7java-1.8.0-openjdk-demo-debug-1.8.0.201.b09-0.el7_6.x86_64.rpmd77f12786f96d438c9c4d7622220d45845edc82c2b6f4aabafa694aea112789bjava-1.8.0-openjdk-accessibility-1.8.0.201.b09-0.el7_6.i686.rpmf9637ae53d74bb326eac9274b766f35b84804895600ed4adfe9cff40d13c263aSLSA-2019:0436-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)moderateScientific LinuxScientific Linux 7java-11-openjdk-debug-11.0.2.7-0.el7_6.x86_64.rpm9e6d226ba7de34e66841596377d22da8071f388dee49a3c848359984e24ef7e4java-11-openjdk-devel-11.0.2.7-0.el7_6.i686.rpm0880e44ef033479d3abb3fac34b5f89e56c91c3904bd05344286126278d4d5e4java-11-openjdk-src-debug-11.0.2.7-0.el7_6.x86_64.rpmc7f6359672b6c5bfd2392c7808033c6ef2a1ab6a694970e4eb34bb598b14fc11java-11-openjdk-jmods-debug-11.0.2.7-0.el7_6.i686.rpmfa260754069e01c3e8e60232562c52850d68c255d841e66e20becace158fd3afjava-11-openjdk-devel-debug-11.0.2.7-0.el7_6.i686.rpmebddbf4a7903c282a14adae0ccab35d87e24a259e52bdc35075602ae39c2ea55java-11-openjdk-src-11.0.2.7-0.el7_6.i686.rpmf7a114ef59b3249d3270a8e28be23b8869543562ff0e4b9dc9268afe0fda44d0java-11-openjdk-javadoc-11.0.2.7-0.el7_6.x86_64.rpma0646831347fa8e18e0cc73cc6cd057d0d41513a5a11172cb8ce4bda4254e03cjava-11-openjdk-devel-11.0.2.7-0.el7_6.x86_64.rpmccc4b51dbeb1ef7371ffba8f2b132ae88f0fa593ae9d0ded7b95f2deb0989b53java-11-openjdk-11.0.2.7-0.el7_6.x86_64.rpma3fc47154227450cb16413908dafbfa38469c09e0e907e7f290d8ab7141e168fjava-11-openjdk-demo-11.0.2.7-0.el7_6.i686.rpme7eec0123b8bf9d0175869d98043ff8c51f9ec754b09c0ab5f0bddb326bf7ba3java-11-openjdk-headless-debug-11.0.2.7-0.el7_6.x86_64.rpm8d35f24a89907a347938a1499c75336e609edde927299651aea8aabe90712d53java-11-openjdk-demo-debug-11.0.2.7-0.el7_6.i686.rpme49ba4c71a9818dede2f40751d37ad4acac3daee0ee0b05045d516b6872676a9java-11-openjdk-headless-debug-11.0.2.7-0.el7_6.i686.rpm5497a1a99c508ad5f15befaa1dff4adfae40f2538a923792d5be7f3cc3535c31java-11-openjdk-javadoc-zip-11.0.2.7-0.el7_6.i686.rpmefbf307521d2881991b0b5168daadc0e4b1cd832e5c26e60e229ea7d2e0af3bfjava-11-openjdk-debug-11.0.2.7-0.el7_6.i686.rpm52a5fe74db459503c3b489fbd6c403e184cec2e521a0df2dcfe6147a48c7b563java-11-openjdk-src-11.0.2.7-0.el7_6.x86_64.rpm1c20dec163f6aebf49bd7d6d519bcf80381083aaf499498ef1011190a87216cfjava-11-openjdk-src-debug-11.0.2.7-0.el7_6.i686.rpm408195bab79684f69cec2e5e598b0db98dd090dc10fe4ca11b9e4c49ac1ae7b9java-11-openjdk-javadoc-zip-debug-11.0.2.7-0.el7_6.i686.rpm580fca4bbe811cd70ce931cf5bd7998138102a2e48bfc9b7663c8f10c0575732java-11-openjdk-jmods-11.0.2.7-0.el7_6.x86_64.rpm3fe1fc680a3f6cdefcbda4f17b10121067a288ba8dab149195b8445b4f41d66djava-11-openjdk-demo-debug-11.0.2.7-0.el7_6.x86_64.rpm9c241704df9182e427cf52a7d30b13b41718076e675b96b301d6e9e2e91d3b22java-11-openjdk-headless-11.0.2.7-0.el7_6.x86_64.rpm55d9ba8bb266d29e9a953012b8eca09c0f0726bdf9b8a29c93e06f0461706754java-11-openjdk-headless-11.0.2.7-0.el7_6.i686.rpm392b798a8089920ccee373cd74e88e04dc0f4cc8a7ce77a48f0e68f9fe10b1cbjava-11-openjdk-devel-debug-11.0.2.7-0.el7_6.x86_64.rpm8f4e0a1327056f8a1d1cfb96925ab8da8ecd05f5ef3a2c37a2ccc4ac4e0f889cjava-11-openjdk-11.0.2.7-0.el7_6.i686.rpm1fc48553b5b68b7943cfb010d59a2402829a2bda3f29b2d54583d36f9291fb0cjava-11-openjdk-javadoc-debug-11.0.2.7-0.el7_6.x86_64.rpm6676bc5a2be0239f73435df30f8eba5b71dfeac7b188eb93150e423c8bad1eb3java-11-openjdk-javadoc-zip-debug-11.0.2.7-0.el7_6.x86_64.rpm7357cce01ecae6d595e0841c665635e50451c2b911a47bc67247249d131aa25fjava-11-openjdk-jmods-debug-11.0.2.7-0.el7_6.x86_64.rpme9329b7d0f43bf857886269debad503ba7bcd2d3d69f12b8ab0cf27ebcc0e108java-11-openjdk-demo-11.0.2.7-0.el7_6.x86_64.rpma89abcf7afad5e354e932328e95bf3e9bd5fe0d10352824efb6a8884d30f8664java-11-openjdk-javadoc-zip-11.0.2.7-0.el7_6.x86_64.rpmd0571efe9e428574404ce2fd06523a93e13699b61b4e1513dddc271d1f663528java-11-openjdk-javadoc-debug-11.0.2.7-0.el7_6.i686.rpmb8143e95505dbb93fe6cfdcf877d7ffbaa25c7a7736468779a4667e9c5a0d014java-11-openjdk-jmods-11.0.2.7-0.el7_6.i686.rpm9940e3917e4c7389e6bb7216cf2231f130ac33b31d68dcf0d7bd06541fd7c24bjava-11-openjdk-javadoc-11.0.2.7-0.el7_6.i686.rpmf5659ae86f022dd0d417e566b9f3112aa6829b34b345a2dbd29b2a90cc1ef5f4SLSA-2019:0464-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)moderateScientific LinuxScientific Linux 7java-1.7.0-openjdk-devel-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm4429e009259290af76470d0ce741a0ecc9c93e1e5c1d35156898f63a1676ae4cjava-1.7.0-openjdk-src-1.7.0.211-2.6.17.1.el7_6.x86_64.rpmdff4b851e82eb967bedb8afbac5486ffa414aa05886094dacf0e73ccac855853java-1.7.0-openjdk-headless-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm4a12a36ed0243fcc293b12a59bbdfff803e8af55da344919641af80550947c19java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm253f200360f946add2654512a27249cb881d8046f28c85877ff05b4483b34486java-1.7.0-openjdk-demo-1.7.0.211-2.6.17.1.el7_6.x86_64.rpmbf697711b9eed49a03a9c26e2069f08cfd76950057da2e7d6d26af357a38e974java-1.7.0-openjdk-accessibility-1.7.0.211-2.6.17.1.el7_6.x86_64.rpme24d876407ac634fd60b6acfda0e572e5d0d442681c3a63b527e744051b8aeb9java-1.7.0-openjdk-javadoc-1.7.0.211-2.6.17.1.el7_6.noarch.rpm6b6d4e38c7033f7ecde729902ff5efbd072a273b465a5d21dd1de41e13afc55fSLSA-2019:0482-1CockpitSecurity Fix(es): * cockpit: Crash when parsing invalid base64 headers (CVE-2019-3804)moderateScientific LinuxScientific Linux 7cockpit-doc-173.2-1.sl7.x86_64.rpm4ac82cab19bb35a20cc50ee49107a2c916a342fb0614e676e032a437e567ec3acockpit-system-173.2-1.sl7.noarch.rpma1565c03d1789c1f4f7fdac03438bd19b3f0985f037de4dae6521b0406704979cockpit-networkmanager-173.2-1.sl7.noarch.rpm3c2e1b20953a6f640f3eabfda2fa91225decbdaa756e0f7dc67f875d2c72ff3dcockpit-ws-173.2-1.sl7.x86_64.rpmd4ea4688d7a2df121c837d72d0cbd57b2d1924e129af9167d8463a9da09aa419cockpit-sosreport-173.2-1.sl7.noarch.rpm075d7342d406cb8c07b96a1119fbe492bbc8a52ce76ac117ea177333aa568dc6cockpit-machines-173.2-1.sl7.noarch.rpma542e06135dac9ce3834b90bded5246e4c748271a0cb81f736e286424984abdfcockpit-bridge-173.2-1.sl7.x86_64.rpm2d713ca025acedbb219aeb98f20f1f903b34941e35fa897b4984b80a5d41089bcockpit-173.2-1.sl7.x86_64.rpm0eee8501f565da58c3f1d11d51d4ef03440abedb3b16fa7dfcfa4b0d48eb8995cockpit-ws-173.2-1.sl7.i686.rpm364138329723e9b38178bbe49a0a80091aca0401843d873cbd847dbf541c184ecockpit-kdump-173.2-1.sl7.noarch.rpmbf484e47cd94cae941ddd0f17cca229d29208c75fc802db8b48ad6f661730df9cockpit-machines-ovirt-173.2-1.sl7.noarch.rpmf047892fa5f3949bc2bdb5efea717b99fb448ae7f90c649990ec7178356b3146SLSA-2019:0483-1OpensslSecurity Fix(es): * openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) Bug Fix(es): * Perform the RSA signature self-tests with SHA-256moderateScientific LinuxScientific Linux 7openssl-libs-1.0.2k-16.el7_6.1.i686.rpmfb62f00e11cb18f98c62295b720f8f381566cefa6abe827023a1e9500449e363openssl-libs-1.0.2k-16.el7_6.1.x86_64.rpm7f512e48117ef051328210c438b1cf6d9f610a8c2f5412b9a2b288cfd9cacdaaopenssl-perl-1.0.2k-16.el7_6.1.x86_64.rpm6e06287b60ff22c1464d586b3c974b9048d1a03bccdf660d0cf1effdd1cd82b8openssl-static-1.0.2k-16.el7_6.1.x86_64.rpm59edee442d24df6c63caa9024d3912ff53666a893afaf6e01944acb1a6a8dd00openssl-devel-1.0.2k-16.el7_6.1.x86_64.rpm9e090eaee93a39e4fd202c2a07cd0dbebd985ce36599e34242d4a6a099f6e85aopenssl-static-1.0.2k-16.el7_6.1.i686.rpmb0b93902b639423f2f54b94338149c88157ae3d1051c5ec0a3ba1958827049f2openssl-1.0.2k-16.el7_6.1.x86_64.rpm93a925f453b1fc746bed138c58f2c1e4ca4582758a92e51c9972d9a5630811daopenssl-devel-1.0.2k-16.el7_6.1.i686.rpm09c691b507f8ab62c1de0c1ec01f7869b1825162ddc904d84bd9c44149597abbSLSA-2019:0485-1TomcatSecurity Fix(es): * tomcat: Open redirect in default servlet (CVE-2018-11784)moderateScientific LinuxScientific Linux 7tomcat-admin-webapps-7.0.76-9.el7_6.noarch.rpmdbc504cdcf2be911ddd3939bca17aeee0ce432f9542467d915546264a0ed1a4atomcat-jsp-2.2-api-7.0.76-9.el7_6.noarch.rpm6b185f28a02bfdb739f1423559fe6f76011c4d9c994d82691a431902523bbd59tomcat-el-2.2-api-7.0.76-9.el7_6.noarch.rpmb0c84c0462cc46802d19dc1b3b0c8bb007d9026a9965eb200ba699671d9649c7tomcat-7.0.76-9.el7_6.noarch.rpmfe320d6229b720c4ff81e1784df07de317d33688dfdf32ad79767798f3556248tomcat-webapps-7.0.76-9.el7_6.noarch.rpmce679422b631255c06badbfec18d096a297a327a362e7310dc807f673c1efcf5tomcat-docs-webapp-7.0.76-9.el7_6.noarch.rpma37fdc9fa5a0293da1c87ae43ff6504d78bee99ab6cea306ff1d6a43916cdbcctomcat-servlet-3.0-api-7.0.76-9.el7_6.noarch.rpm81949bd783568c08ac12c046871e23f41d9378e349bdf6c57f62e814efa78906tomcat-lib-7.0.76-9.el7_6.noarch.rpme0292d5a66431e1f3f61c899a3e456c29f8eb05316f0b7df1720567af30977eetomcat-jsvc-7.0.76-9.el7_6.noarch.rpm9d5e0214b279408bc8fd76f805bec025bed3968c51df6023eda4ace341dd8ad6tomcat-javadoc-7.0.76-9.el7_6.noarch.rpm40f42562007589bf0b920d46ca64550cd2aee6b981bb45dc2f3cd03f5d9be69eSLSA-2019:0512-1KernelSecurity Fix(es): * kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568) * kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972) * kernel: Faulty computation of numberic bounds in the BPF verifier (CVE-2018-18445) Bug Fix(es) and Enhancement(s): * kernel fuse invalidates cached attributes during reads * [NetApp-FC-NVMe] SL7.6: nvme reset gets hung indefinitely * Memory reclaim deadlock calling __sock_create() after memalloc_noio_save() * hardened usercopy is causing crash * Backport: xfrm: policy: init locks early * AWS m5 instance type loses NVMe mounted volumes [was: Unable to Mount StatefulSet PV in AWS EBS] * SL 7.6 running on a VirtualBox guest with a GUI has a mouse problem * Kernel bug report in cgroups on heavily contested 3.10 node * [PCIe] SHPC probe crash on Non-ACPI/Non-SHPC ports * [Cavium 7.7 Feat] qla2xxx: Update to latest upstream. * Regression in lpfc and the CNE1000 (BE2 FCoE) adapters that no longer initialize * [csiostor] call trace after command: modprobe csiostor * libceph: fall back to sendmsg for slab pages * Deadlock between stop_one_cpu_nowait() and stop_two_cpus() * Soft lockups occur when the sd driver passes a device size of 1 sector to string_get_size() * [SL7.7] BUG: unable to handle kernel paging request at ffffffffffffffff * SL7.6 - powerpc/pseries: Disable CPU hotplug across migrations / powerpc/rtas: Fix a potential race between CPU-Offline & Migration (LPM) * blk-mq: fix corruption with direct issue * [SL7][patch] iscsi driver can block reboot/shutdown * [DELL EMC 7.6 BUG] Unable to create-namespace over Dell NVDIMM-N * efi_bgrt_init fails to ioremap error during boot * Unable to mount a share on kernel- 3.10.0-957.el7. The share can be mounted on kernel-3.10.0-862.14.4.el7 * System crash with RIP nfs_readpage_async+0x43 -- BUG: unable to handle kernel NULL pointer dereferenceimportantScientific LinuxScientific Linux 7kernel-tools-3.10.0-957.10.1.el7.x86_64.rpmb3189219a31a13535c73af90eb74d42563d76438e19e26debc91130668cb4b51kernel-headers-3.10.0-957.10.1.el7.x86_64.rpm0c0c9f94faec904d71bacbbe0c4881c6704a9bba2396ce358fa73f287876d5adkernel-tools-libs-3.10.0-957.10.1.el7.x86_64.rpmfb3c44824368f96d19a86f985f3b24772823c977546e638250f811a36eb7f844kernel-abi-whitelists-3.10.0-957.10.1.el7.noarch.rpmd11ff48bb8d35a721cf6ddcf4bd4c6286e667c63bd55f77e270091dc9bd906fckernel-doc-3.10.0-957.10.1.el7.noarch.rpmca06a39d9bf6b4830d0246a93f287018cae3819e63884340bb9002459d44e5b2kernel-debug-3.10.0-957.10.1.el7.x86_64.rpmedb31ac2e58969c93c8a9b64731e0d399bdf5bff603800ac304bd81db2494651kernel-tools-libs-devel-3.10.0-957.10.1.el7.x86_64.rpmcfdbdfc2936e79f9fcb2a6db69088dc46eaaf1a2ae2c19eef5c76ee31436f08ckernel-devel-3.10.0-957.10.1.el7.x86_64.rpma6f8318ac294af003ba5763c5deda7009f6e4cb7a4d8038171a05f6559e10f4dpython-perf-3.10.0-957.10.1.el7.x86_64.rpmd7f25b2df17bbaded6717359faf0a6ca8d5ae08373ca9133d19a3f6e4a71344dkernel-debug-devel-3.10.0-957.10.1.el7.x86_64.rpm8da47207bb3594034475773d0746e520f7c57d3f96f0182802e6a292eb53ca2eperf-3.10.0-957.10.1.el7.x86_64.rpma028d79edf1d8e73e1dd4d76aa7234476f0a12c871c0248a3e1081a93a675ed5bpftool-3.10.0-957.10.1.el7.x86_64.rpm918022d1c9c415597941fc66f0b7659b64ef24ad3fb0e39f912dab855b4a63d9kernel-3.10.0-957.10.1.el7.x86_64.rpmeced336da7b8646bd436a66a1925b62f4d64fae85505bdbbd79dc32c97488271SLSA-2019:0597-1Cloud-InitSecurity Fix(es): * cloud-init: extra ssh keys added to authorized_keys on the Azure platform (CVE-2019-0816)moderateScientific LinuxScientific Linux 7cloud-init-18.2-1.el7_6.2.x86_64.rpm99f088a9d17057b54ef385661c383d6749a55aa0152ff4bb4a166c1fe3938cb7SLSA-2019:0622-1FirefoxThis update upgrades Firefox to version 60.6.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788) * Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790) * Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791) * Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792) * Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793) * Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795) * Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796) * Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)criticalScientific LinuxScientific Linux 7firefox-60.6.0-3.el7_6.x86_64.rpmb7c3a0b58dc0611eba85a761e10bb94a632c1848c065feec3d4f843e4542df9efirefox-60.6.0-3.el7_6.i686.rpm09129c74ae205620b102e17a760b049070300952bb84f32bf1249b1144f57a2dSLSA-2019:0633-1GhostscriptSecurity Fix(es): * ghostscript: superexec operator is available (700585) (CVE-2019-3835) * ghostscript: forceput in DefineResource is still accessible (700576) (CVE-2019-3838) Bug Fix(es): * ghostscript: Regression: double comment chars '%%' in gs_init.ps leading to missing metadataimportantScientific LinuxScientific Linux 7ghostscript-cups-9.07-31.el7_6.10.x86_64.rpm1b39698f40c0645fc72aa59830fbc1675a9680c8ad3c2a1858801a507ee4844aghostscript-9.07-31.el7_6.10.i686.rpm0f7805708fea743249811805bfc803e79ab013aba67fe30c24419d68f80ba3faghostscript-gtk-9.07-31.el7_6.10.x86_64.rpmc9a2d2be99fd545df814e25f14c817475ccefe037fd8cea707404f5acfa6fbedghostscript-devel-9.07-31.el7_6.10.x86_64.rpm01fb43e60c66e40b1c261856c29f27dac1aa6681b3f8ee1fcfa854935863df3fghostscript-devel-9.07-31.el7_6.10.i686.rpm0ce9aec8dd093f1214857fc99268889723d4127c3c930f72d83c1af2f26a4a3bghostscript-9.07-31.el7_6.10.x86_64.rpm60a83340c0c6f5720b7ad211ed616da442ec94e68040e315999b4c281fd5829bghostscript-doc-9.07-31.el7_6.10.noarch.rpmceb24d96b786c2c32f72398746dc3f08aef27b82ab7b9f19eb02a7a783027544SLSA-2019:0638-1OpenwsmanSecurity Fix(es): * openwsman: Disclosure of arbitrary files outside of the registered URIs (CVE-2019-3816)importantScientific LinuxScientific Linux 7libwsman-devel-2.6.3-6.git4391e5c.el7_6.i686.rpm9de6e0bdb43295e0d84881f337147d133147f1296a99cfdedae974664248a3b5openwsman-server-2.6.3-6.git4391e5c.el7_6.i686.rpm49bda66322eb8411f3ab740dee8fb85bcd13fb4bc63330a56cea6179d75bc823openwsman-server-2.6.3-6.git4391e5c.el7_6.x86_64.rpm47cd6398ee55c24c6e00fdd1a4cc1646105d36eb888ba10bc87b59c5ad1fe551libwsman-devel-2.6.3-6.git4391e5c.el7_6.x86_64.rpmb6ed9e1b2239e7be5e6bb3b3fdb7e9a31ec12b0563798ed7eb23c2267831bbe8openwsman-perl-2.6.3-6.git4391e5c.el7_6.x86_64.rpm2cb799a098edca75e278de2920bb8da55953198bfd31c767bbe373de9856c20eopenwsman-ruby-2.6.3-6.git4391e5c.el7_6.x86_64.rpm7e7c0382ce8b9d55438255aae94796cd21faf0794250c8c1c7f13873d24f54b8openwsman-python-2.6.3-6.git4391e5c.el7_6.x86_64.rpm83f3988ca4591e0d643ea7b4773192cc9985df9f47923ec322d988b1188a5e02openwsman-client-2.6.3-6.git4391e5c.el7_6.x86_64.rpm7e6a7c87dacc0ac3b543425961526dd10392819ea235f67ee2f713634ea9ec22openwsman-client-2.6.3-6.git4391e5c.el7_6.i686.rpmc992c9345c75ab8319a5e055845e4dca704a67ee9c64c85e57ca19fa942815dblibwsman1-2.6.3-6.git4391e5c.el7_6.i686.rpm1ecf0be1dd93351c7984fe3b6369b146ac696520c37713b5b36e856ffa008263libwsman1-2.6.3-6.git4391e5c.el7_6.x86_64.rpm42fee976fa11762a49e92a6a81a5ef05210e325c4693fe7ba3c428805391d3f8SLSA-2019:0671-1FirefoxThis update upgrades Firefox to version 60.6.1 ESR. Security Fix(es): * Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810) * Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813)criticalScientific LinuxScientific Linux 7firefox-60.6.1-1.el7_6.i686.rpm040abb0f461433a35b0924b2162302b68f5009fb2d68830241aef8993b2c5487firefox-60.6.1-1.el7_6.x86_64.rpm06d0c6b0245f0fb7a91a168ce54c770dab4526291311afd1c0fff67c401effccSLSA-2019:0679-1Libssh2Security Fix(es): * libssh2: Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855) * libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856) * libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857) * libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863)importantScientific LinuxScientific Linux 7libssh2-1.4.3-12.el7_6.2.i686.rpmf9b48ebf4e8582d74b7ed10dee5773f555d23fa4b750e3c63b5b64b0f1b6d332libssh2-devel-1.4.3-12.el7_6.2.x86_64.rpm9fe8e1baa72f8a733f15748cb07e99587e5418c90af32769ad178c9eb20050eclibssh2-docs-1.4.3-12.el7_6.2.noarch.rpm0382f14ffa5ce3c2ea8f200652173f3557dfccc4b3f911003ee5e362e490f242libssh2-1.4.3-12.el7_6.2.x86_64.rpm20e45215aada48dd80bbfffcc7d36ea8c0120b66a559aa51c410b74a80f2ee08libssh2-devel-1.4.3-12.el7_6.2.i686.rpmc18c8b615afb7083aeb3e3a74aa69b8d67338aac0c2b2b2f2a6fff3af9b2d062SLSA-2019:0681-1ThunderbirdSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788) * Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790) * Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791) * Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792) * Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810) * Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813) * Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793) * Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795) * Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796) * Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)importantScientific LinuxScientific Linux 7thunderbird-60.6.1-1.el7_6.x86_64.rpm55bfbe1468e50d3bc7b597e7c8db3b072c9195046e246ff4c2e8d3215cacd5c6SLSA-2019:0697-1FreerdpSecurity Fix(es): * freerdp: Integer truncation leading to heap-based buffer overflow in update_read_bitmap_update() function (CVE-2018-8786) * freerdp: Integer overflow leading to heap-based buffer overflow in gdi_Bitmap_Decompress() function (CVE-2018-8787) * freerdp: Out-of-bounds write in nsc_rle_decode() function (CVE-2018-8788)importantScientific LinuxScientific Linux 7freerdp-libs-1.0.2-15.el7_6.1.x86_64.rpmebbb8eeee1a1bb76c92edb75a197cb6ae93b73c3f8718b3ba5603c8eee50d67ffreerdp-plugins-1.0.2-15.el7_6.1.x86_64.rpmabc3e4c6bb656f9796093503e67d8a1eb8c26455e6286c15e986dce44cd53afdfreerdp-libs-1.0.2-15.el7_6.1.i686.rpmddc4690e74c126527914ca3221901e4de4018846ce526b0ae75c1174be447f9cfreerdp-devel-1.0.2-15.el7_6.1.x86_64.rpm56ef20463588f4a740ff98d1cc0d140a3143ea1184f619995fcd736773ebae1efreerdp-devel-1.0.2-15.el7_6.1.i686.rpm88c38764349d320b95f20881529ded2b552f1dc48fa732f5042f24c28e813b14freerdp-1.0.2-15.el7_6.1.x86_64.rpmfafd3bb9a585c2f151b6907f1571b9e58ad2ef8b905a8a50c538aaf9de0fa9e1SLSA-2019:0710-1PythonSecurity Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)importantScientific LinuxScientific Linux 7tkinter-2.7.5-77.el7_6.x86_64.rpmce38b53c066b340b29536e6f63b0c9fb33e75a7ea8d1f5b593be6ce834bb004cpython-2.7.5-77.el7_6.x86_64.rpm85ef11e2b65b6f0596084173b68569c3e483bd66d521df1c51050cd67839107epython-tools-2.7.5-77.el7_6.x86_64.rpm53f0522796f666d6beadea1b447d4a4233bc73439f9a564ccea0678444d93f99python-devel-2.7.5-77.el7_6.x86_64.rpm7cfd3a6e9e5a6cffe60cc000580a846ffef8ec6adbf1ee4b8303c4aa808919c4python-libs-2.7.5-77.el7_6.x86_64.rpme02e345bf0334c8d15125e44ad79fa159203aeb276e7f79a3fe49fc0d6f73063python-test-2.7.5-77.el7_6.x86_64.rpm405ec0c6dc07c1599f7252d353735e51d7ccd4635b6f755470653706672d4f65python-debug-2.7.5-77.el7_6.x86_64.rpm15adca5eeedc0f2d352e01a13b5174462a120a8360c5866cfe9412d0f2675fccpython-libs-2.7.5-77.el7_6.i686.rpmfdcbd66649b171da99e57d9b77794c03059098658e0514b7121a3a6f492d21abSLSA-2019:0766-1Mod_Auth_MellonSecurity Fix(es): * mod_auth_mellon: authentication bypass in ECP flow (CVE-2019-3878) * mod_auth_mellon: open redirect in logout url when using URLs with backslashes (CVE-2019-3877) Bug Fix(es): * mod_auth_mellon Cert files name wrong when hostname contains a number (fixed in upstream package)importantScientific LinuxScientific Linux 7mod_auth_mellon-0.14.0-2.el7_6.4.x86_64.rpmbdf769a3b872c261041eaab8921365e9adf92161276ee0c6306a792d9ab5487amod_auth_mellon-diagnostics-0.14.0-2.el7_6.4.x86_64.rpm0a14432a03fd1fb34b2361188315f105ce55e09f29791e1f46f6863881646d61SLSA-2019:0775-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698) * OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) * OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6.i686.rpm665072b093c93f268f633d94e2c9a3025d1a9c903945fdb079190c897e9f0c24java-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6.i686.rpm2114354508847058c90a71b26393a9bfe3c8bbc1393320d238029cfc8b5bb7d8java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm33cd5095d99b143d439351651a931aabb06af3893f6a7faaa19e364677f8f7b3java-1.8.0-openjdk-javadoc-debug-1.8.0.212.b04-0.el7_6.noarch.rpm269af0eaae6cdf8a741ada9c6ff0853b26d2696d4010aecb856dd626b5c0f85bjava-1.8.0-openjdk-javadoc-1.8.0.212.b04-0.el7_6.noarch.rpma75aee7e2b483d9aea4dd3f76172a38cc9141b698405e15cea3acdedfcd72bcfjava-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6.x86_64.rpme48ff823a7f9214067a3fd967e85345b521b6bd5469642be8806e5b4ec428dcfjava-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.x86_64.rpm1d3076c9b33215bd3f852d80ad0f676671ee1f4151f26ee2bf28ea57dad39f3fjava-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6.x86_64.rpmb5185d6cc04e39eaae67ee4303e4ca03e3d8eaaa48c30f0baf10dd0da33ce009java-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm01e91369f052d5728ce9f37786c1798433984ae3f3ec5d34b4d9f270512646dfjava-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6.x86_64.rpmd2454ddd0caf0b3ffd07ad79a7fc5811a6fb542b2accf95987a3f155ff94fdddjava-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6.i686.rpm32f959b5be2120fa008cede538784324a57f41db3a8de6991bf837b833e636a5java-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6.x86_64.rpmd9967e4e4492cb59555fa5669a6d74e090a0a30f66c0386b00018ae2764cbe93java-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6.i686.rpm9a14c7b1f9fd137029a8aae12ad7dd992a6c2461c709f5807a45b33220561807java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6.i686.rpm283f70b1cd787bbbfd1071554a7c1efa53590d7eaa1f41a7f4be34567a37d31bjava-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6.x86_64.rpm88919d86c5cacb51b9894dd9e195e292aad55e5f99cc53f5c2e7aa21e3215acdjava-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6.i686.rpme08de1e77f4f4b95734a50912f98fc115fe0ec8ea0687bbed36f88ba161e8d2cjava-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm2aad9ab252446ae667d32ca0a39225b969cdd72a5689d8efa49d3211bc1e665cjava-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6.x86_64.rpm1c62d701ec0aee5b8df4b4b97f5b2dae3d6bb5322a07e989a51901783b3dd923java-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6.i686.rpm53934f02cb09cc42933d6eb266b0e5a5fd0989e50c7eb3708cfbc72819fb7c12java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6.x86_64.rpma8664b2b3f5cfda06e5c193b333b80d040dc3ac4345dadb26f82be9c9b4f47f7java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.i686.rpm5a86ac62be08b9ac6cbb2c79ce0826e3a0693266ed7e026dbf960e430ca5c187java-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm356e9128dae444492b4ea7ac923487c46ebe5cea1f9e1cd55d2a0e802e49b68fjava-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6.i686.rpmfa11f0d21c31416bc110cd2f6b641091e85124e2283223e2aa15e6358a61306fjava-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6.i686.rpmf3a78c6086eeee3653d24ff51c5bd2f57c25d0133e8fb1c62c8d3c6a04ab5659java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.212.b04-0.el7_6.noarch.rpm68d4c227154b800d0ef1fab85e6e6ab9f19c66a947fb6bb95a80952c2afbeef9java-1.8.0-openjdk-javadoc-zip-1.8.0.212.b04-0.el7_6.noarch.rpma49dd1d2609690271976e1dc6eee6254aa59bf74c3fb484ee8b3d84ed4de89cbjava-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6.i686.rpmbbf00dca7691b00912dce58ac4e8f0501206e5e0b91b16c8dfe6e5e07fcedf74java-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6.i686.rpmc29ea595b100005c18ecb0e13f0490c4c2e5963462cf56d25e19c46274dd539dSLSA-2019:0778-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) * OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)moderateScientific LinuxScientific Linux 7java-11-openjdk-javadoc-zip-11.0.3.7-0.el7_6.i686.rpmf5127fa75fffea1567eb879da84d5576fbc26bccd4ba7468d84665bc4d46683fjava-11-openjdk-jmods-debug-11.0.3.7-0.el7_6.x86_64.rpmb9101b84dc74289d5ecc4f770058c208bab23870bc0461b993de4012bacfc89ejava-11-openjdk-headless-debug-11.0.3.7-0.el7_6.i686.rpmd96a15392c2846b8e9aad856b4e8ceccb1dcb8ac52f153013b8133a531deda60java-11-openjdk-demo-debug-11.0.3.7-0.el7_6.x86_64.rpm3f92382f2594d9bd7c4a1cd27dadd055fecf28d51dd03a9e417e0555f7c707ffjava-11-openjdk-javadoc-11.0.3.7-0.el7_6.x86_64.rpm224a41424f45a3423d20a27c9fd9d15d31831f05cf17875b4f9914c20f660dbdjava-11-openjdk-src-11.0.3.7-0.el7_6.x86_64.rpm9f2b32154868aff67192245e5616acec3fa9d953eb35005d356cfc3bf0659bacjava-11-openjdk-debug-11.0.3.7-0.el7_6.i686.rpm41426a8195e66438d9ef3213828355099a2f48a75a306d5450be7de4a9d0e6e1java-11-openjdk-headless-debug-11.0.3.7-0.el7_6.x86_64.rpme423189d7a22ca773a97341eec9db015e89acf3e242eace0210a1585eddd5730java-11-openjdk-src-debug-11.0.3.7-0.el7_6.x86_64.rpm3d6d01445574930e7b764b415a60479b0cb791b9854b495e126a1bc1365c50e2java-11-openjdk-src-11.0.3.7-0.el7_6.i686.rpm4d9172f0b0d16ad4b4d305eebbea98adc938e71be2025163f4a0a9fadc211086java-11-openjdk-devel-11.0.3.7-0.el7_6.x86_64.rpm8d71ddfc72d9727de98a5743da890fbe5be786c9c899846ae4ea96a0859515eejava-11-openjdk-src-debug-11.0.3.7-0.el7_6.i686.rpm04842dfe23aac36ed74d567416c4331f8283dc1521039b7e0bd13941eae75c05java-11-openjdk-javadoc-debug-11.0.3.7-0.el7_6.i686.rpm4c34413a22797fa3dc9765b731e09bef46e8549e52249bbe863d347978d816f6java-11-openjdk-jmods-11.0.3.7-0.el7_6.x86_64.rpm85d384caf5cc5d86643486470e5938c3f86231f254ac45f925ca54001c900507java-11-openjdk-11.0.3.7-0.el7_6.i686.rpm02e9d5607d1ba7ba5a931fe4f62eb2578ee8768544f234f1690dbb5f44271df6java-11-openjdk-headless-11.0.3.7-0.el7_6.x86_64.rpm5bc1c1362951f15154211df35fefc2db621c2643d0a968b528687708e93a13e1java-11-openjdk-devel-debug-11.0.3.7-0.el7_6.x86_64.rpm465f1e16baba3098956df9d4b546bc44950441d01405a92a205aaa84e3092f81java-11-openjdk-demo-11.0.3.7-0.el7_6.i686.rpmc865f80be10daf1edcb361562c46e3af2f7f3de7c97f26ecefa8a1f4113dbe0fjava-11-openjdk-jmods-debug-11.0.3.7-0.el7_6.i686.rpm39f1fe9ddd80939cb6dc7a3df7b91f6d2fdbd61afc2bde67fcf386c4e4bc4de2java-11-openjdk-javadoc-debug-11.0.3.7-0.el7_6.x86_64.rpm2d03f2986f66d10d3f319c25441b4886266f55f5ff185a8ba75f9426d736a07bjava-11-openjdk-javadoc-11.0.3.7-0.el7_6.i686.rpm1364fcf16fca65a3e6204ddbcec4d56a5eb0e7d47f69bf88ead2f28ee5c88270java-11-openjdk-demo-11.0.3.7-0.el7_6.x86_64.rpm75ab5781279abe13d80d948840891802695bb321bbad2cc6fef390f5a68b6712java-11-openjdk-demo-debug-11.0.3.7-0.el7_6.i686.rpmae8997f7a1e21f8642d8d44502bbc0c83c135b5908a93b2603e3723caaa4552ejava-11-openjdk-devel-11.0.3.7-0.el7_6.i686.rpmbac7e931416340179b334c751b548ba8f268d17e7e222e95a1b4ddaa574cca6djava-11-openjdk-headless-11.0.3.7-0.el7_6.i686.rpmb8283c82db02ebb02e05717f7e1b63afd83d85ca249c6385617a2ea3a30ad7bdjava-11-openjdk-jmods-11.0.3.7-0.el7_6.i686.rpm14d528e8da64a869989d84d5d343a94a6995daaad9293961b89556fe9a0ea0f8java-11-openjdk-devel-debug-11.0.3.7-0.el7_6.i686.rpmfd876058d65c149c245fe3b2c94ccb6e639347bed4c724d9daa6d466ae6bf751java-11-openjdk-debug-11.0.3.7-0.el7_6.x86_64.rpm8a67bf17de1bc75b94db5d8029464d91e2f9300101e8c5e920574f8bb774768ajava-11-openjdk-javadoc-zip-debug-11.0.3.7-0.el7_6.x86_64.rpmff3ad2242e5e651cfcf7733d821531695be4aa2657c5434dce295bab55a9ee79java-11-openjdk-javadoc-zip-debug-11.0.3.7-0.el7_6.i686.rpm7e7a255743db9eb93692ec1a1dc68c8222d5a985f564d4fe0978595c86f8f0eajava-11-openjdk-javadoc-zip-11.0.3.7-0.el7_6.x86_64.rpm9ad53b58c6e4a29fe2a844917d7714cca7832dd846d38accff1dd837c935ebf6java-11-openjdk-11.0.3.7-0.el7_6.x86_64.rpm65beb2f348165979798c7b3ce2956f899bbf6a3601a03871184e58e4c72de1bcSLSA-2019:0791-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698) * OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) * OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-headless-1.7.0.221-2.6.18.0.el7_6.x86_64.rpmbad0c78033a01a8df6c59d4b40d43be15b92474b2c780e8f17e0b12176a666dbjava-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm500f5afcf8a7aa18fa804be05576940cc077a157c29ceba71381f21519a07bcejava-1.7.0-openjdk-demo-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm73541f10ca5612593d8c297436de6633f97c6a592b5f81bd5517577c3bcf2640java-1.7.0-openjdk-accessibility-1.7.0.221-2.6.18.0.el7_6.x86_64.rpmbccebef46b073ecf242aea1d6849020c5519653c85ebf4769ce818b85e0859dcjava-1.7.0-openjdk-javadoc-1.7.0.221-2.6.18.0.el7_6.noarch.rpmf0077781738a08e30c0bcfcf429f4360e0e6d3d27d78a3f44877028e3be73d88java-1.7.0-openjdk-devel-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm23e65c2d02e42a1fe54ead6f9c773a90a60e620123cc82ba6df72e4f54d1c242java-1.7.0-openjdk-src-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm5580b16943635baa3160d34b47b3508a2528af41973cd34639475366726e27fbSLSA-2019:0809-1OvmfSecurity Fix(es): * edk2: Buffer Overflow in BlockIo service for RAM disk (CVE-2018-12180)importantScientific LinuxScientific Linux 7OVMF-20180508-3.gitee3198e672e2.el7_6.1.noarch.rpm0b2b8b842427d64cccf82c245857c15b5f70f89e1b7576edf44b02cb08477be3SLSA-2019:0818-1KernelSecurity Fix(es): * Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974) * Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer (CVE-2019-7221) Bug Fix(es): * rbd: avoid corruption on partially completed bios [rhel-7.6.z] * xfs_vm_writepages deadly embrace between kworker and user task. [rhel-7.6.z] * Offload Connections always get vlan priority 0 [rhel-7.6.z] * [NOKIA] SL sends flood of Neighbour Solicitations under specific conditions [rhel-7.6.z] * SL 7.6 - Host crash occurred on NVMe/IB system while running controller reset [rhel-7.6.z] * [rhel7] raid0 md workqueue deadlock with stacked md devices [rhel-7.6.z] * [PureStorage7.6]nvme disconnect following an unsuccessful Admin queue creation causes kernel panic [rhel-7.6.z] * RFC: Regression with -fstack-check in 'backport upstream large stack guard patch to SL6' patch [rhel-7.6.z] * [Hyper-V] [SL 7.6]hv_netvsc: Fix a network regression after ifdown/ifup [rhel-7.6.z] * rtc_cmos: probe of 00:01 failed with error -16 [rhel-7.6.z] * ACPI WDAT watchdog update [rhel-7.6.z] * high ovs-vswitchd CPU usage when VRRP over VXLAN tunnel causing qrouter fail-over [rhel-7.6.z] * Openshift node drops outgoing POD traffic due to NAT hashtable race in __ip_conntrack_confirm() [rhel-7.6.z] * [Backport] [v3,2/2] net: igmp: Allow user-space configuration of igmp unsolicited report interval [rhel-7.6.z] * [SL7.6]: Intermittently seen FIFO parity error on T6225-SO adapter [rhel-7.6.z] * The number of unsolict report about IGMP is incorrect [rhel-7.6.z] * RDT driver causing failure to boot on AMD Rome system with more than 255 CPUs [rhel-7.6.z] * mpt3sas_cm0: fault_state(0x2100)! [rhel-7.6.z] * rwsem in inconsistent state leading system to hung [rhel-7.6.z]importantScientific LinuxScientific Linux 7perf-3.10.0-957.12.1.el7.x86_64.rpmebec746e5a0bed80812e8d2ee33cd9aa53a35e0421813bc9e39d8872fecb294ekernel-tools-libs-3.10.0-957.12.1.el7.x86_64.rpmd250bded11467317fb39df173dbeb2f382a430d341d4a14842b0439ef2f54e3ekernel-debug-devel-3.10.0-957.12.1.el7.x86_64.rpm2a62f350980e29fc3d55e703a6359b6986bd717332b3b71b4418be0d3a4725f9kernel-tools-libs-devel-3.10.0-957.12.1.el7.x86_64.rpm7813a42f81726d58700faeddbc95ebb144bb8249bbcd649b0246b1c38768d564kernel-abi-whitelists-3.10.0-957.12.1.el7.noarch.rpmcfda2ac951006767cf2a47f4c9bf5a5f9861ab8955edc1b8973cde1274559560kernel-doc-3.10.0-957.12.1.el7.noarch.rpmede561e07a0122870bb385d6323111c81d9e7a63b2976cf06152e266ee3418d5kernel-devel-3.10.0-957.12.1.el7.x86_64.rpm3293b007fed10f2592dcdea42b6313bf7689e5163bbbced2feb36c089ff7f472python-perf-3.10.0-957.12.1.el7.x86_64.rpm5b70a532572cd6612d29ae11f458932753a5779a2f75d78d717a459d2af4ad8dkernel-headers-3.10.0-957.12.1.el7.x86_64.rpmae0f3a3152e5acf4b8459c97c8428ca118d8e2ede9583f95f5927e0445747a27kernel-3.10.0-957.12.1.el7.x86_64.rpme2540a0570b30dd8e6d0dfc52fc445fc61e4e9d6f828a63aa248bcaeb878628cbpftool-3.10.0-957.12.1.el7.x86_64.rpmb485941f1a4110b47e0db06db5f4bef4ae0fb4ec19eb79eca8053316390255a8kernel-tools-3.10.0-957.12.1.el7.x86_64.rpm8547b2bbe480ed22e84fe8a34ee132127d110c0eacd121214f6508af3f76ee51kernel-debug-3.10.0-957.12.1.el7.x86_64.rpmd18a4250f6aaeefa019a71c849aec0c248c6f033a63408c76c18a22662f5e22eSLSA-2019:1017-1GhostscriptSecurity Fix(es): * ghostscript: missing attack vector protections for CVE-2019-6116 (CVE-2019-3839)importantScientific LinuxScientific Linux 7ghostscript-9.07-31.el7_6.11.i686.rpm47c27cfcf3168ebebea339e114f4a3dd9ed05de0b4c5975ca117545b2d1b31b3ghostscript-doc-9.07-31.el7_6.11.noarch.rpm1941374265a4470de35749e18d78086ea022fce0db058d1183280da4d38b9713ghostscript-cups-9.07-31.el7_6.11.x86_64.rpm77fc2e5b1245a94a0b4b86dee3b91bb2bd2d204ead18db872a322041c0277e40ghostscript-gtk-9.07-31.el7_6.11.x86_64.rpm2cf96a18433bfcbd53147fd01692bb2d8f22c41194aa42bc1a67bf585a3e8e25ghostscript-9.07-31.el7_6.11.x86_64.rpmc1403617434b8cff6a1c9b2bd1f2586c9c7cc37702c3c50a8714b00b0992e394ghostscript-devel-9.07-31.el7_6.11.x86_64.rpme9b1d95cec502945d6330ff1161160fa87d67d74d30cd58e905929c8f377d1d1ghostscript-devel-9.07-31.el7_6.11.i686.rpm5ebfe57239815f0f06fd8457d688ae29b4442ed55190d06271e5a3809bd02d19SLSA-2019:1022-1Python-Jinja2* python-jinja2: Sandbox escape due to information disclosure via str.format (CVE-2016-10745)importantScientific LinuxScientific Linux 7python-jinja2-2.7.2-3.el7_6.noarch.rpm2d478961299f05460deb5e51e8417d8bc6075b610d5d372bba0f83023172e7b1SLSA-2019:1024-1FlatpakSecurity Fix(es): * flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226) (CVE-2019-10063)importantScientific LinuxScientific Linux 7flatpak-builder-1.0.0-5.el7_6.x86_64.rpmc2d3eebd529963eaeb94a4d08d2552aa98c56ccedc0eca88874781abe6540ffdflatpak-devel-1.0.2-5.el7_6.x86_64.rpm303fa037ae1bdfafb826e829b0ece1fda938458a409e5b9ec1d60e7307ab1083flatpak-libs-1.0.2-5.el7_6.x86_64.rpm1f1cc9383f43a10df4576c274925ed0fe9635e3cab34fa8d8b3c692dc5e590a4flatpak-1.0.2-5.el7_6.x86_64.rpm3aeb197909f940c7a11dc8f984b03a8827febd1201a8dc1341988d29b33d8464SLSA-2019:1131-1FreeradiusSecurity Fix(es): * freeradius: eap-pwd: authentication bypass via an invalid curve attack (CVE-2019-11235) * freeradius: eap-pwd: fake authentication using reflection (CVE-2019-11234)importantScientific LinuxScientific Linux 7freeradius-devel-3.0.13-10.el7_6.x86_64.rpmc633458bc8613ec9fde6495c1fe7f7d1b1b70b60dda0606cf894638dcc2ee07ffreeradius-unixODBC-3.0.13-10.el7_6.x86_64.rpm15bc23b5addb30f53551fd75a33ae7e54c388476d9ea786856656e8f4726b1abfreeradius-devel-3.0.13-10.el7_6.i686.rpm35ddb1ae298cbf0866ec66065b9bd7e2d0e5d4fccc6e9ca1502db4c855563b44freeradius-3.0.13-10.el7_6.x86_64.rpm2464c41b4fb36ff8b5e84a2f1c8023efc78a12c743c88f30977d051b0abd17cefreeradius-mysql-3.0.13-10.el7_6.x86_64.rpma1d849372b5fbf6e3172644292246008d0eb79ca25ebc9ec099123c6549ce9b2freeradius-python-3.0.13-10.el7_6.x86_64.rpmfef90b82488dc559054209e854f1402deaee15bba8e2a20724c61a5536c901a6freeradius-perl-3.0.13-10.el7_6.x86_64.rpmcf5933e25a545e34353283ba02a711cfd9aaa8bd9a6fb13fc141ced8416cf8dffreeradius-sqlite-3.0.13-10.el7_6.x86_64.rpm4184971fe0e08dbe6407da48ada294599727400e5423babd4e6f7efede9b571efreeradius-postgresql-3.0.13-10.el7_6.x86_64.rpm2336ecde76f7d187460ebca640a228b4db03e8260c0c8c92e6a5fa6b0192cdd7freeradius-utils-3.0.13-10.el7_6.x86_64.rpmdee4192c6e8dad5634caa5bc4f6dbcfda5c477e277635d7ca65a620a75f27f58freeradius-doc-3.0.13-10.el7_6.x86_64.rpmcb611c09b8cdd525ee82585ac6da8b514ccfd906dc3850e29c66e4d9d18164befreeradius-ldap-3.0.13-10.el7_6.x86_64.rpmafae6c3615d4430f6af2da1612e389d4009c675e2d30935086aaca30cdf63097freeradius-krb5-3.0.13-10.el7_6.x86_64.rpmb2be6c1fc13d8748c8f385728d5b5e529aac8f4f0dc496b6a00859793faa9f9bSLSA-2019:1168-1KernelSecurity Fix(es): * A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) * Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) * Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) * Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-957.12.2.el7.x86_64.rpmde1414227fa5d20a8611823daf4b1f865ebd235db18c246af078c41b171c6d59kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm4d43a011799d448f47fa4e8147fed519628d724f2f085ffc26d3546c3d591faakernel-doc-3.10.0-957.12.2.el7.noarch.rpme46758550b8d2b718b9bac7b58d15de9ea18e9218ccd18cf9f01572dce9f321fperf-3.10.0-957.12.2.el7.x86_64.rpmc4612d7839e6734704a2ccb75db141913dd9f735f102c407de5ae45c1abba8a7kernel-headers-3.10.0-957.12.2.el7.x86_64.rpmb71994c1ab412a08e126f54f162f70c042a4d7ffd200ef21f4bd15ba9eebc59akernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm4cd3e8a1835f4a33ba7e80a2863f309407bb2060954a9e7b9110a80ca4f07b19python-perf-3.10.0-957.12.2.el7.x86_64.rpm3527c40314b65183bc36eaa21b1c54260c012f1edd7365965dd57604a14af2c4kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm1949f57000d28f7c2769a702ec83f62b051c12e1bfdbea3e832d959625effcefkernel-debug-3.10.0-957.12.2.el7.x86_64.rpme589fa81b473807cd63f3f57a13ea6f910150110be919872da18ab8589930bfdkernel-3.10.0-957.12.2.el7.x86_64.rpm772d9c37e24593b0879a89b5e84f1e0c707082238cef9374ae7ebc56da21f853kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm9ffb55c71e06ea6a551bb6ad52b2baf4f2571508ba4e3bfd6c6127f3fdee055dbpftool-3.10.0-957.12.2.el7.x86_64.rpmebf1daf0a2bcc9fcc30677fcb93fa83dbcfc3e9d47a80c3f3c489165064f7260kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpmb1b208a4a420b953d3c3354772e2bff79731073cb5d66e639158a4401839cb00SLSA-2019:1177-1LibvirtSecurity Fix(es): * A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) * Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) * Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) * Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)importantScientific LinuxScientific Linux 7libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.x86_64.rpm59fbf0f545d8519e88d18b8e3af4c41e81a95ab7807383a1308a601b6cb70d44libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9.x86_64.rpm991fab546cc4fcc0579a5c5c770bf12b8bb90bdf42cb046382e9a5f60d4c5012libvirt-admin-4.5.0-10.el7_6.9.x86_64.rpmab568c9f71a41b24e08e9a1b544bf7191a71513bed4c78d2eb923e6dec42d8b5libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.x86_64.rpmb486b009b2a18d94448e21b63fe6c86f1edc8074d74e64b1b84139a46366ae3elibvirt-lock-sanlock-4.5.0-10.el7_6.9.x86_64.rpm5fc3718c23be4bfa83a63502ba61fe085a9e9b461b195c504146657ef1c23c59libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.x86_64.rpma4e68cccd4ca063538f448add745d3dee8c7c59104e42bdf71df9d84b39b3c52libvirt-nss-4.5.0-10.el7_6.9.i686.rpmaae902e29b0ef0a864747eabd8fd62d41693e51370688ba73d9140decdd13241libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.x86_64.rpma2f9bbd0ac81c63f4aa16530c0ad9976d4144219a647bc2c420eeb22840ec7e5libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9.x86_64.rpm2b16a055fb1a282499d62c55617b1d63617e1ce5fee436753cce59a5b7b8a95elibvirt-daemon-config-network-4.5.0-10.el7_6.9.x86_64.rpm4c6f6a50e1632be0960e1f82d58122f6d3ded6138c39e0cc7b74bbdccb066758libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.x86_64.rpm4c34a81697bfa96d2cea705ecb266daee02969e640c77d172e5025ff655c6998libvirt-devel-4.5.0-10.el7_6.9.i686.rpmb6da9e08e583d38f71452dd0eea0f6b4d9a945180f4b2d8845b6394c34727850libvirt-devel-4.5.0-10.el7_6.9.x86_64.rpmb52007bf454a35ca1e75d4f6427b7200b53e30be21e09cfd0972fe3c673fc142libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.x86_64.rpm3d5c69b78035235813d6b93ec0b39c7475d5ccd542d7d41c0801388983feb9f2libvirt-libs-4.5.0-10.el7_6.9.i686.rpmb803b7a397c010700e19a4137e7c7e10498b5ea4dd24d65e840d1f40dfb98550libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.x86_64.rpmf705d0a5b2cfc76f4e086530bb0214368f5ceb5f6073bccb0377cc9f28e792c4libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.x86_64.rpm902a6ae23b5a862f7727476bb2f2b905908800883f04e79c5d870ccde538dae0libvirt-nss-4.5.0-10.el7_6.9.x86_64.rpme1966584ae1e97346d374e03ce9ab72c405ac9af3db6a44a484b35bdd559fc7elibvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.x86_64.rpmf196fe7c7a1c0c82af35e585e8e16f8959efa279ab443eddfbb3e4b5326d69c1libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.x86_64.rpmb39b175c40db2c3116f71a2ec93b2a23b3185f406c870c82c9f35fd5f5f9f083libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.x86_64.rpm8af321fb574a928ec5d0c1659d06b1d94a4f7c89d5afd2f953f3bc96e4c0907elibvirt-client-4.5.0-10.el7_6.9.i686.rpmb4b5bdf76e75af572e899c4d69458b0d1d4e5f04dd923730ef60a9f523fc6a50libvirt-login-shell-4.5.0-10.el7_6.9.x86_64.rpm4136bf7cfe31e92d9d7cb4ebc186f47214e2df535a1ef71d80be1caeb89c44fclibvirt-daemon-lxc-4.5.0-10.el7_6.9.x86_64.rpm65bba7d6c7ff53809db96d45dc418785a53d983f00be9580d34cb45d71d7042dlibvirt-docs-4.5.0-10.el7_6.9.x86_64.rpm2a3fbdccc7bccb0ac05a6da716004d688bb739888873bb6eb24e868b97e5d1c9libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.x86_64.rpm60b57dcec7742b3242e938eec6f47844466e39d6b6a35fcb44c601bfbcf6e33flibvirt-libs-4.5.0-10.el7_6.9.x86_64.rpm78453a128cae9d62dcb8a5286dc525294ee9fbf9e39e80465056eefcc75544e6libvirt-client-4.5.0-10.el7_6.9.x86_64.rpmd5c92bd706ba1c347e20dc75cedcdb8a28e43e848e78d79ce0c405048472995elibvirt-4.5.0-10.el7_6.9.x86_64.rpmfd0713f515a79a0adef43cdd347c244bd5441e3692b92ddbcdf4104054c536bflibvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.x86_64.rpm224bbc0dcc361a2c3a98edea297d168e43682de604d369a1bc5fdfdd97d3cb6dlibvirt-bash-completion-4.5.0-10.el7_6.9.x86_64.rpm5b52a9f779aa6aac684f5ce573f91f5fe92d3f9d187d8401f5aa1b1345df7d0clibvirt-daemon-driver-network-4.5.0-10.el7_6.9.x86_64.rpm208e0b2565c9242ca171d6754b3f23e01f7f6b854d93f7a6421063ebdfdcce06libvirt-daemon-4.5.0-10.el7_6.9.x86_64.rpmef7bec9a13cafedaf41de52793b21a19cac0ebd266c23e734621088ac1072794libvirt-daemon-kvm-4.5.0-10.el7_6.9.x86_64.rpm03a41d758775fddf912385e7873974f35ec4892b5b5862535ea054c507ad45edlibvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.x86_64.rpm0ddf1988af2e5fb27eb9e36576c49f0abb12d3efd317b9a5ea6f74b8064159fdSLSA-2019:1178-1Qemu-KvmSecurity Fix(es): * A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) * Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) * Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) * Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)importantScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpmeaa61e274ad8fd9fd15ba5c82d21b72f7e0471b8bf03504c2d1c42a13960b80bqemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm8a13d3c875c37c25cb5e54c281470eb11594dc1326e2ccca57c7c4127ff27502qemu-img-1.5.3-160.el7_6.2.x86_64.rpma9e701fc822b168b857867da9a03760bbb2a3ab4a381130a9ee23eabb6cb47f2qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm108208506e233873a7d4c082ac1989cc2b23a8cefcbdf3fe7199dc9162d7c5dfSLSA-2019:1228-1WgetSecurity Fix(es): * wget: do_conversion() heap-based buffer overflow vulnerability (CVE-2019-5953)importantScientific LinuxScientific Linux 7wget-1.14-18.el7_6.1.x86_64.rpm0ff361a85649c75fa5922cee2d526dca51f34a7f6bf126751f60c6946d45c1d7SLSA-2019:1235-1RubySecurity Fix(es): * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) * rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322) * rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323) * rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)importantScientific LinuxScientific Linux 7rubygem-rdoc-4.0.0-35.el7_6.noarch.rpmb77e8464f018e412cdc789e85f100a3791f091b1fe8deeaca595084ab98816f7rubygem-json-1.7.7-35.el7_6.x86_64.rpm7279e9cd2b567127b61a8545338cd06d91b1ef8b6071f4155147861b456f2276rubygem-minitest-4.3.2-35.el7_6.noarch.rpmaa376d4923bf63759802df72bd786b6876f066861bebeacacce2f6e96ab6f701rubygems-2.0.14.1-35.el7_6.noarch.rpmc778b0f790dc43d2fb4e1e3dfdb12e2ea665915ab197de362a81fd835ddafaeeruby-libs-2.0.0.648-35.el7_6.x86_64.rpm9c7903cc877da8693dd30978f1a8e7a7f71470ef96b30bb1f039b4aee38b40f4ruby-doc-2.0.0.648-35.el7_6.noarch.rpmb306f18adf247063945e7a94bf7cb50a28a71aab1fe26c0ddced9767a4e6340fruby-tcltk-2.0.0.648-35.el7_6.x86_64.rpmfb29d26609cf39238f7e03e065450498b91a0c1f9376e49da3ed8f5a04cdb653rubygem-rake-0.9.6-35.el7_6.noarch.rpmcb26dbf95a982b8824eeabd880c26752738aa50b98d65b62f49a1ee04ce5ad32ruby-irb-2.0.0.648-35.el7_6.noarch.rpm536e9c0d345efb6a5d0f886e360aa02a0283492c66633e2bf65bf47f8570e829ruby-libs-2.0.0.648-35.el7_6.i686.rpm7533642f70d979272d598b597471794c665f60af9f7157d73117e1c3791fcbe0ruby-2.0.0.648-35.el7_6.x86_64.rpmfdb67e9a754544c02a472c4c8e52e0c3cb82d7b91c41da187a60616c9dd91ddcrubygem-io-console-0.4.2-35.el7_6.x86_64.rpm32cfeb7cf0b32e4178fb6b17de2c50ba4b9eb59b81f30c6c5638dff940e13bd2ruby-devel-2.0.0.648-35.el7_6.x86_64.rpmb2a106f9864a2005b3a8a75d908d546db731aa30d5cc9ebb1f62a3fdf3240088rubygem-bigdecimal-1.2.0-35.el7_6.x86_64.rpm9873fc81ca531750d007d1b882c6b9d78b284ff21da9e947da830ed1c7d58264rubygem-psych-2.0.0-35.el7_6.x86_64.rpm4de7035b00bb284a79113dbabdee30edb9ff4dc5f68642eb5fa968155fbd1550rubygems-devel-2.0.14.1-35.el7_6.noarch.rpmc1327e2498427d06987358764eebb5e4b32967ad2bc4becc371b3b2fb5723a2eSLSA-2019:1264-1LibvirtSecurity Fix(es): * libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter (CVE-2019-10132) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * libvirt terminates and core-dumps with SIGABRT as a result of a invalid pointer error trying to free memory in virNWFilterBindingDefFree()importantScientific LinuxScientific Linux 7libvirt-daemon-driver-lxc-4.5.0-10.el7_6.10.x86_64.rpm537f081e0750436ea0947abd1b77cb54d482816c380757a9fb6b9bdd5d8e0709libvirt-4.5.0-10.el7_6.10.x86_64.rpmf92fcb9ee0d1b675275e1deb5c6f74b77582d57c9c6de09e9420e4a54db83033libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.10.x86_64.rpm53e14765bb70f24b629a8521b709c0551bb7b5aa5a68a2487b27f99462f82985libvirt-daemon-driver-secret-4.5.0-10.el7_6.10.x86_64.rpm1cf6877d71aa4ab25d95b18f16bbd34f980aeedb7bd9dfe3dd0f4b591f398a2dlibvirt-daemon-driver-network-4.5.0-10.el7_6.10.x86_64.rpm96fc96848ee4d9811a48a2559703c0562cb6d3614e098d54830ae00a1a643fdalibvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.10.x86_64.rpmacff8175a789843d74eb785eb3951c7abf133833aed7312c2e432994a4f120c6libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.10.x86_64.rpma92f781f23095a94267d420a9022703927b0c896437a5965de6577347df620b4libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.10.x86_64.rpmb91b95dcff1f1e04b627ed966804f7202f8ac764f0e1b14cd0925f50596f578blibvirt-libs-4.5.0-10.el7_6.10.i686.rpma3365f17b6afa3bc322dc65b0c0b2314613d8fd3c3b7fdfcd993b383f993f059libvirt-daemon-config-network-4.5.0-10.el7_6.10.x86_64.rpm34532fa5936b53bed74dd17570cebb57aaa1c793ef1e9be2474286e8017af9eflibvirt-docs-4.5.0-10.el7_6.10.x86_64.rpmd1a391b4fa465ebc9d4a633f2f79bac5f96e7c038aa8e8243133d439b16e7918libvirt-daemon-lxc-4.5.0-10.el7_6.10.x86_64.rpm2828deb2605ed571a77e92273ad1ec1bdc27f9fbb3598d13384a0e4bb0b45300libvirt-nss-4.5.0-10.el7_6.10.x86_64.rpm7ada5f035406a2b30d6f6d16105aef561cf044a940f2a2a85c3d0f17034a9492libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.10.x86_64.rpmd9265d60430e9d85a3eda8078cc7e1a1d86c12e8f9403c5dc9998c9f1187bb7alibvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.10.x86_64.rpme010d8c0708bf86b98f065574dffb83ca45d5b455c356540c5cf67d9d07b0585libvirt-daemon-4.5.0-10.el7_6.10.x86_64.rpm76ca534c4ec42a7ec8990a20799e1c1a949c109de3ebf124012c034d7321968flibvirt-daemon-kvm-4.5.0-10.el7_6.10.x86_64.rpm57c70d0e750cd2ffebb920faa699c85e3f550a7e92b3b79f18d93e1f0a1753edlibvirt-lock-sanlock-4.5.0-10.el7_6.10.x86_64.rpm87f78fe0dbb2501313b8e84ed1d0ae637c461ee4521c4f3cb756c71d4d14905blibvirt-admin-4.5.0-10.el7_6.10.x86_64.rpmd858fd15df74144625490c763233dcdb17bb453f8994333940478bf7f36ab46clibvirt-bash-completion-4.5.0-10.el7_6.10.x86_64.rpm7c5ad77b4ee39e80a4666192cbac2690ba9cfe1871115a4eed61baed88e16cd6libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.10.x86_64.rpm8a32c7dc9531b6772d06f443ca23fdb46436c2ecb0015ea37b5c6c43b3bcddf6libvirt-daemon-driver-interface-4.5.0-10.el7_6.10.x86_64.rpmee9fa5e5999fb6952f1c7eac2c717f40a655e2fa4494f3e3661d66c32f99f2a6libvirt-nss-4.5.0-10.el7_6.10.i686.rpme0a2724f169967e5dbe617971cb87246867c7e7d5168534c490d340491e09af7libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.10.x86_64.rpmbbb7c225413ceeb3a9ca042bb611a04ed309d3746e8b92c2df95fe81851d0753libvirt-login-shell-4.5.0-10.el7_6.10.x86_64.rpma774009064fe9734d05c1ee7cb4c03297e2ee9fddf1379831929dc0a3d4764bdlibvirt-libs-4.5.0-10.el7_6.10.x86_64.rpmfb12eef2e5cde3bc5437b7b798a2c74bca681c0156afa31d9b990af7d8f28ccflibvirt-daemon-driver-qemu-4.5.0-10.el7_6.10.x86_64.rpma788a72440f9e085f18cbb3a85573ae7fe76a2f9a118b970087d5087a4451461libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.10.x86_64.rpm1b764fb2157b3a4e842352a97e92d6aae2a5dfd33c80d8ee06e3f2f367124c4dlibvirt-client-4.5.0-10.el7_6.10.x86_64.rpm8bf27fb075ceeb36733a9ccaae8b524b68603abc24b4f98d0e39ce5ec11993bflibvirt-daemon-driver-storage-4.5.0-10.el7_6.10.x86_64.rpmdb7433d13d5c0ae01617676688117bd2569273a5048f17f56d523b2959bf9afflibvirt-devel-4.5.0-10.el7_6.10.x86_64.rpmdc25ad116f573b040e7dc52bc193b3af6db4b6644f15a320a7a5b614942734e8libvirt-client-4.5.0-10.el7_6.10.i686.rpmc30b44316df811f04067c78a228332bf7fa31d56b56434c7834766215a9d3d0elibvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.10.x86_64.rpm89c49e17e51815b36863b192b4e6f066ec72dac81b29e670f7bb3e9749d04a50libvirt-devel-4.5.0-10.el7_6.10.i686.rpm1c9b9490016436ede0c9c6028b1e76937cedd2ac064def9f8849864d77e9ceaclibvirt-daemon-driver-storage-core-4.5.0-10.el7_6.10.x86_64.rpmbb03f6cbb46115b71efe9ec5c73e03cc5cb8d9ac1a3d80bf9048acf960acad70SLSA-2019:1265-1FirefoxThis update upgrades Firefox to version 60.7.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800) * Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797) * Mozilla: Type confusion with object groups and UnboxedObjects (CVE-2019-9816) * Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817) * Mozilla: Compartment mismatch with fetch API (CVE-2019-9819) * Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820) * Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691) * Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692) * Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693) * mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511) * chromium-browser: Out of bounds read in Skia (CVE-2019-5798) * Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698) * libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)criticalScientific LinuxScientific Linux 7firefox-60.7.0-1.el7_6.x86_64.rpme9407ff8f3ea071cb5d1929f7764978fbaf0b559fc1c638b8649506e0b15de99firefox-60.7.0-1.el7_6.i686.rpmc23dd1c4bf8d4e3a521848f837101a7814af5b37604d4e97fe528f962e7cb928SLSA-2019:1278-1PacemakerSecurity Fix(es): * pacemaker: Insufficient local IPC client-server authentication on the client's side can lead to local privesc (CVE-2018-16877) * pacemaker: Insufficient verification inflicted preference of uncontrolled processes can lead to DoS (CVE-2018-16878) * pacemaker: Information disclosure through use-after-free (CVE-2019-3885)importantScientific LinuxScientific Linux 7pacemaker-1.1.19-8.el7_6.5.x86_64.rpmec37f4ee1c380907ff719907922f0acacb4e64230697b6e4c0ff0287f73127c2pacemaker-libs-devel-1.1.19-8.el7_6.5.i686.rpm7c34ef3fdc9f5e66b460f541dc7869bc050bd986809e7e76f68bc6f1c529c516pacemaker-cts-1.1.19-8.el7_6.5.x86_64.rpmfa4b409673858ab8a57af41f0cf78d6663157c4429ed71a048ae9a770fad21e6pacemaker-cli-1.1.19-8.el7_6.5.x86_64.rpm37eb53034a38c11e43defd9e965fc5807fd21d7289b4598072b66afe4d8245d6pacemaker-libs-devel-1.1.19-8.el7_6.5.x86_64.rpm764a2a583a17f35e97d2c4819d99ec9ef8f5a65df74e14218387d5efd44d6f3epacemaker-cluster-libs-1.1.19-8.el7_6.5.x86_64.rpmf06aa4c8b4efd60b11c705892db3080782c5f78e3b905a6046a255ece2cd8a48pacemaker-libs-1.1.19-8.el7_6.5.x86_64.rpm0ce1e80e6347ec65ca00b6082de830865b033d0b794fd0051bb6e5709abd784fpacemaker-doc-1.1.19-8.el7_6.5.x86_64.rpm9d272537a81a3673f9c8a8d4717a895cef7b1fd9ba16a984c52df335b89c0df8pacemaker-cluster-libs-1.1.19-8.el7_6.5.i686.rpmc92ceaeb32f8cbd9b07919b011e216362931f3a930cc9a2a725cc7a1cac6270cpacemaker-libs-1.1.19-8.el7_6.5.i686.rpm0472e488b9730b087f70a196820ddf6c7a597d2bd8d0a25a150fa6b686fcf27fpacemaker-nagios-plugins-metadata-1.1.19-8.el7_6.5.x86_64.rpm2a80198e19e0e93d4e19cd888d4f3338036fe738fe04d7d6acc6d9dded6f7997pacemaker-remote-1.1.19-8.el7_6.5.x86_64.rpm31f44e53637c49a3d47696f0be94fc8ced32781abc8cefbbcf741a49f7e51b5dSLSA-2019:1294-1BindSecurity Fix(es): * bind: Limiting simultaneous TCP clients is ineffective (CVE-2018-5743)importantScientific LinuxScientific Linux 7bind-libs-9.9.4-74.el7_6.1.x86_64.rpm48a2d864e994c75ea6922f7d9f3d1aa501b71b8f9244a28ce485826388070d63bind-libs-9.9.4-74.el7_6.1.i686.rpm25a28249d1365dbd14d2e5f6af0b14f888474bb9f56999e1eaf12b89a66b185bbind-chroot-9.9.4-74.el7_6.1.x86_64.rpm9ca236b4031ba707dd7b6bda1e5ed820ab41f54c58220ed49e57d34b709534cfbind-sdb-chroot-9.9.4-74.el7_6.1.x86_64.rpm4fd1498a3a6d28a41a9fac502a47f81628f0f974d54ad1fa66943d381c57f015bind-lite-devel-9.9.4-74.el7_6.1.x86_64.rpm3c6ea898e4a570a405a829d7404a14a0e2ba5102385a98e1ef9588b92c1065fabind-utils-9.9.4-74.el7_6.1.x86_64.rpm683c4d6bd308b941b28e3583456c35109c6a033cbff5c655c12704a6d7f384b7bind-sdb-9.9.4-74.el7_6.1.x86_64.rpm7eb12e39c51e0ca6fe899b6eacfeadc3204a727d0175de469ccbe51b90f51c21bind-9.9.4-74.el7_6.1.x86_64.rpmc178a5d00e94bb0cbd653b5b2dea28b76bb377b417a179d554b91d505abdb44bbind-devel-9.9.4-74.el7_6.1.i686.rpmc347ad7e18e81dc998861eb65eb8cee81ca52d721ef1f81be8974eb9d71ed6e5bind-pkcs11-devel-9.9.4-74.el7_6.1.i686.rpmf9f23356c93cb5b5914eac5ba2975074528188e97119ccca180b41224cc961c9bind-pkcs11-libs-9.9.4-74.el7_6.1.x86_64.rpmecc2e012d441136886b9bfadeb78a30e3ffce3d92f69f8d3738c4172a38571d7bind-license-9.9.4-74.el7_6.1.noarch.rpm72c7108c7301a8c1d58c2ea3b6351c3fd552bcd395c77fa4cd4cd38ba6e7953dbind-lite-devel-9.9.4-74.el7_6.1.i686.rpm747b12d2e7988e12f428a83bb434cb3f15cc51e7cba982d7fd08f2a5759c956fbind-libs-lite-9.9.4-74.el7_6.1.i686.rpma68d38ccd7f8f7a243b1f799d456cf0dac853ee12a94ae2d333a98cc56446abdbind-pkcs11-devel-9.9.4-74.el7_6.1.x86_64.rpm54297d827a4afdb659a6ab28bee6dfa38b444ce79f9b11d1a7e0279c9582ec5fbind-pkcs11-libs-9.9.4-74.el7_6.1.i686.rpmd1075d9b79bee1bc278e798c52836132885c6fbf4a2e5ee9f009bae7c3e22996bind-pkcs11-9.9.4-74.el7_6.1.x86_64.rpm1a05d44a674f5471862b93748495d62d10be67057d9df1cc5748e3faf3930084bind-libs-lite-9.9.4-74.el7_6.1.x86_64.rpm5e5bcd0733401d5700895a9bd0f7f312433488624c576df206ee10fcb6fa2cc4bind-devel-9.9.4-74.el7_6.1.x86_64.rpm8554468e82eb597ad7062526c5ca1fc9ccc93871eafe4aa3a2b6d1013e67f348bind-pkcs11-utils-9.9.4-74.el7_6.1.x86_64.rpmb6cc9defb9459c461ed467a569b019f3325ab6fb0b27ddfe5a9dd9eaac087cdfSLSA-2019:1309-1ThunderbirdSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800) * Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797) * Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817) * Mozilla: Compartment mismatch with fetch API (CVE-2019-9819) * Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820) * Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691) * Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692) * Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693) * mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511) * chromium-browser: Out of bounds read in Skia (CVE-2019-5798) * Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698) * libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)importantScientific LinuxScientific Linux 7thunderbird-60.7.0-1.el7_6.x86_64.rpmea1e8b4a567a62ac2dc1b588c656d4c62026a29f08ffeb3b7098022d92108639SLSA-2019:1481-1KernelSecurity Fix(es): * An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477) * Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478) * Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)importantScientific LinuxScientific Linux 7kernel-3.10.0-957.21.3.el7.x86_64.rpmfdce6241396d5fab1469a3f74d436880054d30b118f167ffba895a8d5dd4c5d9perf-3.10.0-957.21.3.el7.x86_64.rpmf64687cb62ba001be7b229968d51a36cade320115fbd9e8cf5c94b25d639a6ackernel-devel-3.10.0-957.21.3.el7.x86_64.rpm5d0a7985e620a34088d66627e0151fcf18c207b12e3f8deb3fcad6c5d7b9a838kernel-debug-3.10.0-957.21.3.el7.x86_64.rpm9e8c0a9e4e2a3829e6c5234a58c2fb905036edbfcf74be1047c3a71050bc4529kernel-doc-3.10.0-957.21.3.el7.noarch.rpmd46baf9c8e5239d4e90410f051c4e114f476a8f44865438e801fba54b5bc53debpftool-3.10.0-957.21.3.el7.x86_64.rpmb2380aa3a2b0cb3cf7d4fb2eee4d80d121082848b89839ec744afbfe0cd4dfeakernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm3a370cd8239d4dee746f48171831b364e2a7333e4aeeeded88c440af074be2a8kernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm3dff7f67ebd35452d43c81505e938bcae26acb75cd66bbbd217e4489ba95c8a9kernel-tools-3.10.0-957.21.3.el7.x86_64.rpm937aa465c9fdf80c7ab6647f81440a5ae2a28cd0217167c7a18537493ec4aca1kernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpmdbf39b1c7d5aab5519d0b0b8b376764aa69803d257573fb0af368876b2eb7351python-perf-3.10.0-957.21.3.el7.x86_64.rpm8d0343cb0be308d6241a4b00a6da3a070b131ea6cd12b7946ab5c9b76264ac9bkernel-headers-3.10.0-957.21.3.el7.x86_64.rpm2648ca7cd42a68ee0d95308850050694fb42ede86f8cc4bd0c4fa40fff32c5cfkernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpmfab63c06e1fc0a6c6c488bf0424f53b712f2d45470fc98572a515a713ad6e84bSLSA-2019:1579-1LibvirtSecurity Fix(es): * libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) * libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) * libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) * libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) Bug Fix(es): * Live migration fail with unsafe error when GPFS is used as shared filesystemimportantScientific LinuxScientific Linux 7libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.12.x86_64.rpmf9b07d5f59ef0d0e5cba1a696ddb053709c32556e4133d2bd39f30695752aa7dlibvirt-libs-4.5.0-10.el7_6.12.i686.rpme18e409b43d76c3dcb2e186e367d999484ca92afdd509f738ff5bfdc1fccb72elibvirt-daemon-driver-lxc-4.5.0-10.el7_6.12.x86_64.rpm595955e0d3f5624da3a2bd5ec6df02bf9676506197ef5a7f56a541d0037a207flibvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.12.x86_64.rpm31b7ff2af663df4659c67dc0085b3548e5ccef2b34d2e3faedd56ef2ee46835clibvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.12.x86_64.rpm1aca865b0035fdd857202b8738bed3c2bd51f192ffa2c6b85f1d97a2fe5b1523libvirt-docs-4.5.0-10.el7_6.12.x86_64.rpm1125987ec0118264b0aed6ac479535426aca2384797acdcbf7ffb78dd7f9b76clibvirt-daemon-driver-interface-4.5.0-10.el7_6.12.x86_64.rpm2c2195bde021c9b323954b5a81bf735881aaa327c9cbeb95810ac5937b39afa6libvirt-4.5.0-10.el7_6.12.x86_64.rpm652bded0dcf0e8b21d0bf76750417d0e65dda9e6cab49701c6f00f80c0dcc206libvirt-daemon-driver-storage-4.5.0-10.el7_6.12.x86_64.rpm887051482df0e00cd6304c085dcdc1c4558120930822cc1a716a783f9ed852ablibvirt-lock-sanlock-4.5.0-10.el7_6.12.x86_64.rpm54d9fc3236cb39cbfb23dfcc8e7a48e85b1e8bd81fd79cb460050143b1f26aadlibvirt-daemon-config-nwfilter-4.5.0-10.el7_6.12.x86_64.rpmc7add86df6c9b49b154728b2978c7e9778b6717df09c3ffbbf8778ba710d1b29libvirt-daemon-driver-qemu-4.5.0-10.el7_6.12.x86_64.rpmadb0c9914c67132301b4a869bf5c28461457791903fb71e8818cc9ba87a9c991libvirt-daemon-driver-secret-4.5.0-10.el7_6.12.x86_64.rpm1fdfbf6fa4145baf0bb9eb1945ae0da4d8d67a65e216006892c106a7e8a8160dlibvirt-daemon-kvm-4.5.0-10.el7_6.12.x86_64.rpmc52ee6d9ef7b3282d82c7b5a7e120f96546499972354c4ba55e02da7c02e9939libvirt-daemon-driver-network-4.5.0-10.el7_6.12.x86_64.rpmdacb29e152dd707e81751759f1a5030ead22e27aa6951d345a368b8651456a14libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.12.x86_64.rpmf7460a2cd4a41e2a152ea3769ae767d41a477f0b9a89669c413601abe2645fc7libvirt-daemon-4.5.0-10.el7_6.12.x86_64.rpm9f0c12bfc01d65873182ca1cf7cae8fb8a4c80d7b3b6f591ae19f80ed4ddf506libvirt-nss-4.5.0-10.el7_6.12.x86_64.rpmdccf69350fa243d5437290ba82f49dd708f2418b2d348ddaf45d3e87fa922a4dlibvirt-client-4.5.0-10.el7_6.12.i686.rpm49cd89a2edc15503fe96bc8ab03357ecb7833ec6ea0cf68fa054a05b75d6894blibvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.12.x86_64.rpm6917613d33d365ac4dc6892a62de817e178eda467f6d4bd021d71020487884aalibvirt-devel-4.5.0-10.el7_6.12.x86_64.rpma20a1effeb3467fa5814bbc875150c425423a7787911266c45c66e9d6ada26e1libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.12.x86_64.rpm035eea4e11a51bb104908a9c41cface86445b4e0ef8114ba1a8d71766dfba83dlibvirt-devel-4.5.0-10.el7_6.12.i686.rpma989250839aaafa49f2a4720be37f443c0a0e85963e24705d467cf3cb0a54d59libvirt-client-4.5.0-10.el7_6.12.x86_64.rpm7bda9f96f4300bbfd022f24098d821c9e7259cb873ca2ec1a78da56beea9098alibvirt-daemon-driver-nodedev-4.5.0-10.el7_6.12.x86_64.rpm46bd20e2d26fd300dfd6fc57e18ac840d54c597a72792eb054a7fcffa89d0c14libvirt-bash-completion-4.5.0-10.el7_6.12.x86_64.rpm2df3a9952c83fdb852a44bdcfaa771e036765936e9a7df6c07f6ffe484d32e26libvirt-nss-4.5.0-10.el7_6.12.i686.rpmfc0dbe6acd827873194549d2dd8180e2af59379114515be0c8b46e96a006268elibvirt-admin-4.5.0-10.el7_6.12.x86_64.rpmc2c8504ee143860ad3a5753130d73da137af14c43081b75cd402e20a12d1a727libvirt-libs-4.5.0-10.el7_6.12.x86_64.rpm1e4895093dc1ccd0a15c44d57c17c903aed0994db0cfd023c6f436e85d7a61cclibvirt-daemon-driver-storage-core-4.5.0-10.el7_6.12.x86_64.rpm076afa165a66a81ecdd3a0b3b876d10ca3ad308771de9e12284cbe4c2addbcd6libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.12.x86_64.rpm6cf4fd98e1b5a6718d5ad1f8d574627aded9b1b305ec300534a483c4b52c2df0libvirt-daemon-lxc-4.5.0-10.el7_6.12.x86_64.rpmec83f01f9f277a337973eb46ee588ecd7be61099d22cd5f7bacc03cb4e6c6283libvirt-daemon-config-network-4.5.0-10.el7_6.12.x86_64.rpm7b1c0245f22127511bbe1dcb17c2f246330794d2b211997d232bb646abaa33c3libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.12.x86_64.rpm224c8b899a9628d8de8d98e0bbb2ea03abafb344d6dfc2b7bd9aa1817142c017libvirt-login-shell-4.5.0-10.el7_6.12.x86_64.rpm146273525d617530f1db044ac75e4b48ff7a202f2ff3eb08dd89f334fc3a1fc2SLSA-2019:1587-1PythonSecurity Fix(es): * python: regression of CVE-2019-9636 due to functional fix to allow port numbers in netloc (CVE-2019-10160)importantScientific LinuxScientific Linux 7python-libs-2.7.5-80.el7_6.i686.rpm6e9ed1c38f12914035607bbd2457e21e9a67a0ee3e8a032b6ae3ac7cbb27a85apython-test-2.7.5-80.el7_6.x86_64.rpm528c913a2d15ded6a6b32a677962baf4b01c1d4d39b0b01802dd4ed4686997a8python-libs-2.7.5-80.el7_6.x86_64.rpmbbd51ab9d415a54ebe7aef31aed1b79fd6bf99e1a268132726e9ab93599a3755python-tools-2.7.5-80.el7_6.x86_64.rpmef63bbf1a473c814bc895a0d16274495f11c781d4f047294796ba12654a82213python-devel-2.7.5-80.el7_6.x86_64.rpm4cd8fb7fbabe886b053361334544ea27283d816dad47c856b04ad6861468b373python-debug-2.7.5-80.el7_6.x86_64.rpmfc6960e7ca5aa68f9a7135f40700e7c022f8db0581fa43476cf723f09fb75c3dtkinter-2.7.5-80.el7_6.x86_64.rpm49f60f381de93f4f84486c25ea629334c86131f565ae90b04090008367ea78e7python-2.7.5-80.el7_6.x86_64.rpm3e9ede77b07cb13ae29b43e08893b7c515af062ccfbec0c8b4f5c5036d1c8c94SLSA-2019:1603-1FirefoxSecurity Fix(es): * Mozilla: Type confusion in Array.pop (CVE-2019-11707) * Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708)criticalScientific LinuxScientific Linux 7firefox-60.7.2-1.el7_6.i686.rpm2c3f8cc3afd4791520447ccda510055af35b12c13b8f05f1028332f70708bef8firefox-60.7.2-1.el7_6.x86_64.rpm51e0bbea0a60e05c04ceb0a1211f73e449e8172b58e367d275793436af42510cSLSA-2019:1619-1VimSecurity Fix(es): * vim/neovim: ':source!' command allows arbitrary command execution via modelines (CVE-2019-12735)importantScientific LinuxScientific Linux 7vim-common-7.4.160-6.el7_6.x86_64.rpm61634e49e75686731b93201d8b96cceb817cfaf8ad2779c53cd54d7e4983854bvim-filesystem-7.4.160-6.el7_6.x86_64.rpm173891f6d8127e720099dc85b2f4b10de9a61a9ad37be98451f6aa089bdc7a57vim-enhanced-7.4.160-6.el7_6.x86_64.rpm62677c87b13e49e65ed5f1d1d04f08e5e629e02ba305809b948a9c46b8c4eaa1vim-X11-7.4.160-6.el7_6.x86_64.rpm7b9d087111b99bd158d1e217f5b5874d3316ee7e1585b08ebbba65b4f2565015vim-minimal-7.4.160-6.el7_6.x86_64.rpmee1ad0f96a80cd5be71d53643293c3d64c9358eba745ebf7569e1f9c6e444f19SLSA-2019:1626-1ThunderbirdSecurity Fix(es): * Mozilla: Type confusion in Array.pop (CVE-2019-11707) * thunderbird: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c (CVE-2019-11705) * Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708) * thunderbird: Heap buffer over read in icalparser.c parser_get_next_char (CVE-2019-11703) * thunderbird: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c (CVE-2019-11704) * thunderbird: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c (CVE-2019-11706)importantScientific LinuxScientific Linux 7thunderbird-60.7.2-2.el7_6.x86_64.rpm72252b9ff5bf5cb1105ba687c1776ec857a8d105caa982ea7d6fb3e688c4f558SLSA-2019:1763-1FirefoxThis update upgrades Firefox to version 60.8.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709) * Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811) * Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711) * Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712) * Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713) * Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715) * Mozilla: Caret character improperly escaped in origins (CVE-2019-11717) * Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)criticalScientific LinuxScientific Linux 7firefox-60.8.0-1.el7_6.x86_64.rpm126d2d55613f87f38b26e139743d94f4ea356ff6d23f10df2a79560af6853a90firefox-60.8.0-1.el7_6.i686.rpm42fe07b65fc07271919a4f9094875ebbc188f0e72bb2d9cc2377034312a594f8SLSA-2019:1775-1ThunderbirdThis update upgrades Thunderbird to version 60.8.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709) * Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811) * Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711) * Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712) * Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713) * Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715) * Mozilla: Caret character improperly escaped in origins (CVE-2019-11717) * Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)importantScientific LinuxScientific Linux 7thunderbird-60.8.0-1.el7_6.x86_64.rpm6bddb08175b85dfab59de5c769b765e7dc52a41c82b211e0d34a1434ef6d994dSLSA-2019:1810-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) * OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) * OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) * OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) * OpenJDK: Incorrect handling of certificate status messages during TLS handshake (JSSE, 8222678) (CVE-2019-2821) * OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786) * OpenJDK: Non-constant time comparison in ChaCha20Cipher (Security, 8221344) (CVE-2019-2818)moderateScientific LinuxScientific Linux 7java-11-openjdk-demo-11.0.4.11-0.el7_6.x86_64.rpm591112f9c6f767f6065415cd5f74da8c9863bd89d520bf7d9b0aa200276a626fjava-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6.x86_64.rpmc384e407a554b78430ec59934fb2a8790ef0c7a2b716a17a799593f80e7747bajava-11-openjdk-jmods-11.0.4.11-0.el7_6.x86_64.rpmca7334eec7ae2bf61f24432512268242d216b749b9e1f25ec46d9f49bc4fcab3java-11-openjdk-demo-debug-11.0.4.11-0.el7_6.x86_64.rpma0a57e7fd9030d01cf64e0d15da2744f722be2fc605ded9185b2b49b03ec4169java-11-openjdk-src-11.0.4.11-0.el7_6.i686.rpm1a99ac65e1a3ededd24434ce1489915228a34f2b8c0b7cffe96d975a21092c49java-11-openjdk-demo-debug-11.0.4.11-0.el7_6.i686.rpmc4200636f0372d5c1f54330be4f33677d7b8c55a9d8487c418290f17e189cb99java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6.x86_64.rpm1c6de5ff1ef8540789a59a3b9747ce1e504a9f11f9214f13257d1256d30b9c03java-11-openjdk-11.0.4.11-0.el7_6.i686.rpmd2b76f737398a0914201c6c2f0b627b7c11ff8007a684d9c910d6aea9a04f5e8java-11-openjdk-src-debug-11.0.4.11-0.el7_6.x86_64.rpm56ad1d89a116654ad45b6b6fdbfaddf7beebddd18c609980b564b6c15ecb0871java-11-openjdk-javadoc-11.0.4.11-0.el7_6.i686.rpme80c662ca88ac4820132f765946842fd9e60dbbcf1a442c2eea0eabaa74e757ajava-11-openjdk-devel-11.0.4.11-0.el7_6.i686.rpm5f9ebf70ca546fb96e0f1ba46fe8739c5dce60e44de08d83fb17a4c721cdf4adjava-11-openjdk-demo-11.0.4.11-0.el7_6.i686.rpm44c697ec5c3a2952470fecd68ea09fc811f312d7945e0f502fbaf31ed0602405java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6.i686.rpm489d33b9684186906536b26471d618234866c5d3da352efe341c18cb2e9b5147java-11-openjdk-javadoc-11.0.4.11-0.el7_6.x86_64.rpm1c0371dca43650ac57a7f2d7570f562dba90ca8748fc7b603b763bc49d1ee07ajava-11-openjdk-headless-11.0.4.11-0.el7_6.i686.rpmda38f1c58a045cf357683cd04d5f95e45756a92e81ea62d5ea5daebd19273619java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6.x86_64.rpma348435446548799dae825f30b6f267cfc4a9766c4b808662c09ff1ba15f3dcfjava-11-openjdk-devel-debug-11.0.4.11-0.el7_6.x86_64.rpme8f959a5249202a78dd92e58dccff88fa7ccf213f69928d4534524a3fe82d082java-11-openjdk-headless-debug-11.0.4.11-0.el7_6.i686.rpm3a8a865d8efa5eff0d33e72286396e646d74c9f497ecf1911d86c91ee735f814java-11-openjdk-debug-11.0.4.11-0.el7_6.x86_64.rpmeade03a37958bdeb8e59c1aa131d891fb654296ea6ff9ae7f43524537fd1a6dcjava-11-openjdk-src-debug-11.0.4.11-0.el7_6.i686.rpmdf599f4cdc496007e38b55940e0395567fd76a0210d81aa1811221b4e67adce7java-11-openjdk-debug-11.0.4.11-0.el7_6.i686.rpm5f5f175aaef45b1136c0e38eba4aea22a70b534a7a3c1870aae91e7f29b13d02java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6.i686.rpm2d620d14044937a11d1e2f135d968bc5d98addd60a05f8ba6d5faccb18f7bab7java-11-openjdk-devel-debug-11.0.4.11-0.el7_6.i686.rpm7145db8aaebdc9e114dc662a4d761f29e17165a51c7b3d4c08ba50896c746bbfjava-11-openjdk-jmods-11.0.4.11-0.el7_6.i686.rpmb1bb884e9deca1691385f837f77b09d71747b6107cc535f89345e9d68044a6ecjava-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6.x86_64.rpmcb6d00e20df4f47d8fd89e0a491468c6e11237e8ee6b3272c6ffb6a41e5250c6java-11-openjdk-11.0.4.11-0.el7_6.x86_64.rpm84dd3ba2f40feaa50f28b50e5e92e74908c13262b349b22135ecb1d706a7b06cjava-11-openjdk-headless-debug-11.0.4.11-0.el7_6.x86_64.rpm4003ce94d07d075f945dc7049be87b71983376df48ff3f695922d28a70a469d9java-11-openjdk-src-11.0.4.11-0.el7_6.x86_64.rpm456d551aad1ba2b75b1d38480c7acd73f0df988891d8068f4ead088366f6eaf0java-11-openjdk-headless-11.0.4.11-0.el7_6.x86_64.rpmafb061b2fcc72d53b087807e9e833f417f4cf7a30a6e0800e645302719d4c348java-11-openjdk-devel-11.0.4.11-0.el7_6.x86_64.rpm315bca265bde1c28b5cd536b53a329352970fee1d3476cf4dcc4e06eeb97ea1ejava-11-openjdk-jmods-debug-11.0.4.11-0.el7_6.i686.rpm1d0260405ecaa737cdfaa945b1d940a6e7bbc1d2045c4b4e1b0aa083e8eb6778java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6.i686.rpm59d8166727801bbf05e4004e8942f4f9d1df4e72431159352392ff0b35cf14ccSLSA-2019:1815-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) * OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) * OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) * OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) * OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) (CVE-2019-2842) * OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6.x86_64.rpm6958e54fe909aeed091e34e34e7f3077944df3bd573eff8d775fb277ac8387ddjava-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6.x86_64.rpme189f5eceec525d6f899e70c627f7b66e0316bd8fdf94a4c29037343698b153ajava-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6.x86_64.rpm1cb1bc4b155ef266ebe999c799073a5f882e8d3f206e02b949ad041a226acdffjava-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6.i686.rpmcbe296b528243af76a218cee48f6f450aff571e6f49e3ed0b0f0768eb9f54c51java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm58893f399cd12fc27b5e7161a80cbf152a464fe65a809204f50371706417029ajava-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm9392ad8778e79613124abe925c99a6775beca760b28232b7343d27b2dc6cdf29java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.x86_64.rpme3f297c39952ea8096bbdf8249d2b6ba4e24a92f2de1b7b9bddd990b5b28f8b5java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6.i686.rpm93cb00a9e9b2dd7edbae23654ff53e3968146bff466d4faacc4ec2dfb66d1c52java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6.noarch.rpmcceff5db39e1c6f09f7bec4f4e23315b92ee8d3226193da6fc5228ca982a2439java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6.x86_64.rpma91691a0a7cf2927aa6be4ead72dac18dea0230d14b8e4a62b5e79f94d2f538cjava-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6.i686.rpm003c780db610898b83bfaaed98e426a1b022475bc6adade08ec27c7ccfba733ejava-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6.x86_64.rpm379cd6f3dcf6d1c4d49e1e16fd3acce8c440a205d9d63dcd0a33354f4f41131ejava-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6.i686.rpmfcfc1267fb0e17d5ad5afdb17923ee06e18d6cbcfa5420ae22ae8e658e92c9aajava-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6.x86_64.rpmaf7d23d108936d15f9d42ee27da11197d7861314faf808b2c1cd44e2b5d57370java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.i686.rpm66632d331752a80faf6d53057297516b6107ee7689200b1f46ca2e1ed79a051bjava-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6.i686.rpm58be1052a7a0d5c0791c0620b2877acba24f7481711d4dae8e008b9f7facde33java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6.i686.rpmcd7c5d159594c45e1e5c9a7be7daaf9853e476ebb6e9fafd4ccae1ef5fade5cejava-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6.i686.rpma93d71fe77604e55ba0f699370a20c51645df4772d51e19dcaea10efd55a4116java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6.i686.rpme65808deba1032fe727fa95f9a48f3aa758db00a35dc3844b1abc7f8b304ac28java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6.noarch.rpmbaed0d18bfde493dd9358001c53920a26d2a7b70bbf473a8bdf0c29632846f50java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6.noarch.rpmaf47b3b7e2250e4e81425430f22301a0a2315f24f2947a47a4ecb087d22eda0djava-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6.x86_64.rpm30fbdad254274f2a7441256d005e6322a8a980dd5e79f43441819f355cab65c7java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm5091228b50317c85f07de6d66522170a8f831ea37a67df02bcba49b234d7432ejava-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6.i686.rpmc9654f0466b6695f7feb47b3bf03145d3b91dcc015816e2411c9a7404c834deajava-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6.i686.rpme6739e1f685e9c5a2a505eef857f1b813590b2a5f37287d3a20c7f3972383b42java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6.noarch.rpm98a2588a5b26b9625a4d8ab649088317e324c3ed927a598d5ec49655dc7dba17java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6.x86_64.rpmbde458f89e120666f4da3bf6beb10c1082ed76223103d1865d84ad90d608ca46java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6.i686.rpma00b98c01d91c947648f66435f3112d5000285042e0771c6860a9403af513b20SLSA-2019:1839-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) * OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) * OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) * OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) * OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) (CVE-2019-2842) * OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)moderateScientific LinuxScientific Linux 7java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6.x86_64.rpmfd33308664f1eb7cb9d01032bf57ae755492150a5b0c96389d3c3547284158e6java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6.noarch.rpmc01077f4ec163c99b46eb92dad5a53b8435acc6c52f4ed74943a0997704f05c3java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm711170051ba2c38457007cd7b61646c61bcb40d276db3cdf8e3d14dd3d0f145djava-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm83af3ec05112d04234172651a750ae62dfa84ded6dc89ebb18394584a18e5c9ajava-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6.x86_64.rpmec3fe358bfc6253f1247a3e1f6784321d82145e2a977a051bc91844b11e2f641java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm5a74e703616c0b7b504452b210712857fb32c11f8aa0b747d13355d2becf1274java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6.x86_64.rpmf82d2d747293eca0a0c6749bda353f0a1852a4ae6b3197f8a096a3cebbbe22a5SLSA-2019:1873-1KernelSecurity Fix(es): * kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884) * kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085) * kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871) * kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-957.27.2.el7.x86_64.rpmfbd81b85f33663aaaed9c8e44a029db15bdbf12c2f335fc6830fbb0af4440059kernel-devel-3.10.0-957.27.2.el7.x86_64.rpm30bd158da247ef12560097a6d2a2dac254af2c6b6aef396c91517465d4effe41kernel-tools-libs-3.10.0-957.27.2.el7.x86_64.rpm31fa9142927360b24a193e04038443d1d32d8fe8179cf2b5ee15d3569414ed2ekernel-debug-3.10.0-957.27.2.el7.x86_64.rpmdadc7b68a925b62101a8e92ef74be2d974f65c1e7930392e44c1c5cc54904cbckernel-doc-3.10.0-957.27.2.el7.noarch.rpm5f3b220c9c914c58bf725ffbafedac93c8831c374c00341f4fc034bb7a5c060fkernel-3.10.0-957.27.2.el7.x86_64.rpme8ebba191ac42937be0f1d79f3da7405344d5f1a2e96566ecbc41f324e6d783cperf-3.10.0-957.27.2.el7.x86_64.rpm8bc1774319c3d9477c4c5dc3c4a0ba10161f6389efcf9c57631597b747b97267python-perf-3.10.0-957.27.2.el7.x86_64.rpm896ff9245dec061c2ff291e0345ec43009cf06cca3aa63875b341614f95dc49bkernel-abi-whitelists-3.10.0-957.27.2.el7.noarch.rpmf72d5bef3f7131fe040f2760bab7cc38cfe6fb7382e17d5359313ffcd96dbf44bpftool-3.10.0-957.27.2.el7.x86_64.rpmd9c5be02c096c1dae2a97c6826f631fbc468614944a4af2d80b601734b8be412kernel-debug-devel-3.10.0-957.27.2.el7.x86_64.rpm48151e15e31a991a06ea0e33c193a1df6a16ee5f2b84983ee970758d27e71446kernel-tools-libs-devel-3.10.0-957.27.2.el7.x86_64.rpm542fd050935f7360ecbba7b619198e1409d57da315c19096bf5fff070a622639kernel-headers-3.10.0-957.27.2.el7.x86_64.rpm3b57a3ff7658bd3355534e71bda9c01cd1747dd47df5b55f7a7524e922117325SLSA-2019:1880-1CurlThe curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: NTLM password overflow via integer overflow (CVE-2018-14618) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * baseurl with file:// hangs and then timeout in yum repo * curl crashes on http links with rate-limitlowScientific LinuxScientific Linux 7libcurl-devel-7.29.0-51.el7_6.3.i686.rpm064aba008b886dc82c669739a936e2b077c0f07114409a68cc29031f90c5a8cbcurl-7.29.0-51.el7_6.3.x86_64.rpm39fea7925843be06418a77ad97de0f42a0537712c0c3515e39d007164c9983d0libcurl-devel-7.29.0-51.el7_6.3.x86_64.rpm870aa45eb5eea12e6ce3b20c2a7cc56487ee9de13abeb960629e7f3271c934ealibcurl-7.29.0-51.el7_6.3.x86_64.rpm8db528f7d40eae727d1efbf4658c621ce58e8379903f5b6ff03dc0802b4ddbaelibcurl-7.29.0-51.el7_6.3.i686.rpm44330507a6dcc830b8efe5647ff6c0d484cf7ec972734da3af8566971723deebSLSA-2019:1883-1Qemu-KvmKernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Security Fix(es): * QEMU: device_tree: heap buffer overflow while loading device tree blob (CVE-2018-20815) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * As newer machine remove csske feature, detection of the processor fail and machine used old version as fallback. This update make feature conditional so detection of newer cpu works properly.importantScientific LinuxScientific Linux 7qemu-img-1.5.3-160.el7_6.3.x86_64.rpm8b94e5d1de94d04960aba1aa74974a7025a2bfa7605974afb1b7f0d74b0744b8qemu-kvm-1.5.3-160.el7_6.3.x86_64.rpm20a9cdb53e9496722ecb2528acb49f46f93f4bedc5a01a69f4895e26d392b6a0qemu-kvm-tools-1.5.3-160.el7_6.3.x86_64.rpmdef2bb682462b27dade792d679828a6e977f1f8e53d457875c0c624478066d92qemu-kvm-common-1.5.3-160.el7_6.3.x86_64.rpme42dcec36b1576d41577c3a236b50a6bcc9afd4ce3aff0b62ead5fe7d0461f55SLSA-2019:1884-1Libssh2Security Fix(es): * libssh2: Out-of-bounds memory comparison with specially crafted message channel request (CVE-2019-3862)moderateScientific LinuxScientific Linux 7libssh2-devel-1.4.3-12.el7_6.3.i686.rpm453feab9a385bb6072cf1f4808efa14e65ad46332dc01218bef585cd513360eflibssh2-docs-1.4.3-12.el7_6.3.noarch.rpm401daeed4d9a4c2796c9b1a465d23fd6cfa6a03ad68d4f0d5d2b141b09ca41f8libssh2-1.4.3-12.el7_6.3.i686.rpm896c52d7ea00d3852fede7f3f0d45b08abb271637a8c7de0e3eae016fe7ae75flibssh2-1.4.3-12.el7_6.3.x86_64.rpm046e551216c6acdde2a969c2ebbfdee9bb0d511eba18cc93472fe5956df5b292libssh2-devel-1.4.3-12.el7_6.3.x86_64.rpmf5b1bd332e10125d3e265711aeb5de576d549f2de7fe02dcb3c353170926a6a7SLSA-2019:1896-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: DoS via hanging secured connections (CVE-2019-3883) Bug Fix(es): * Previously, if you were using the PAM plugin and attempted to bind as a dn that doesn't exist, the server would crash. This has now been fixed.moderateScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.8.4-25.1.el7_6.x86_64.rpm5c646b6ef5e62fd672beb6c637d70b93e6391bc7315e79b305d2b0b39065bf85389-ds-base-1.3.8.4-25.1.el7_6.x86_64.rpm3fb74196e4750e8466f1b8e59fb45d5dfbcbd2ffbb0030be1293cd72efaecfda389-ds-base-libs-1.3.8.4-25.1.el7_6.x86_64.rpm16cd8ae8acb33a8b76e6c09d38a17a01632b8f4be6740cfde00c789525a3eee1389-ds-base-devel-1.3.8.4-25.1.el7_6.x86_64.rpm318e8242e366e9b5cde1ef702a67db599af87a8313594e6c922b03fed515ae99SLSA-2019:1898-1HttpdSecurity Fix(es): * httpd: Weak Digest auth nonce generation in mod_auth_digest (CVE-2018-1312)lowScientific LinuxScientific Linux 7mod_ldap-2.4.6-89.sl7_6.1.x86_64.rpm2fd74f29430f70f58fde1ed5560f52c2c6e8c27ebcc562717045f3cfe0824d0bhttpd-2.4.6-89.sl7_6.1.x86_64.rpmbcd9b2517876a2268c285b0033813966392de1c306fba030be7453c18ae5b983mod_session-2.4.6-89.sl7_6.1.x86_64.rpmab0f6d24e6f4aaed8afb0e0d47208c57226a52563b1f0ae0467d8ab4a51fafc8mod_ssl-2.4.6-89.sl7_6.1.x86_64.rpma5efe103d3defcdde5521a32e146a587b35ba33f82c969c22b6afd69c80b7f28httpd-devel-2.4.6-89.sl7_6.1.x86_64.rpm5ad32a07a1dfe5a6798de2f0604acd0c0fc77ee7a6cf1c0164973a64ff085f2ehttpd-manual-2.4.6-89.sl7_6.1.noarch.rpm65283214519aee248d29a0ae40afb98389550f1811c57e7283a426653f96f7e9mod_proxy_html-2.4.6-89.sl7_6.1.x86_64.rpm1d3cee7bff485654792a8f1c0547193f5703ae15ecfc85cfcf916a395c95cc3fhttpd-tools-2.4.6-89.sl7_6.1.x86_64.rpm568115c0fed0bca38a1291992b389c2776d29483a4d0da6218625a28aa276df3SLSA-2019:2003-1Icedtea-WebSecurity Fix(es): * icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite (CVE-2019-10182) * icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite (CVE-2019-10185) * icedtea-web: unsigned code injection in a signed JAR file (CVE-2019-10181)importantScientific LinuxScientific Linux 7icedtea-web-1.7.1-2.el7_6.x86_64.rpmbf2fb0b95b6afef5b1af87084fd9ce50f321a4fb050b935178f7a0948b40b1faicedtea-web-devel-1.7.1-2.el7_6.noarch.rpm4b91d96aa1d50beef9712d1381b50bd349de36a35da0be6923e688e3b6b4b901icedtea-web-javadoc-1.7.1-2.el7_6.noarch.rpmc40e35eeeb53ceb78c3f14736562136e39b14735c8436aef499129dad0a6788fSLSA-2019:2017-1ZshSecurity Fix(es): * zsh: Improper handling of shebang line longer than 64 (CVE-2018-13259)moderateScientific LinuxScientific Linux 7zsh-5.0.2-33.el7.x86_64.rpm2d9e03c821560e782b684bd40f4a2659b6b4ea4c05ea6e43503e8b1b88a336abzsh-html-5.0.2-33.el7.x86_64.rpm3efc548c5c41e574afb2a743f5a5c18c24c228adb8ee509269ee83a25cc7b12dSLSA-2019:2022-1PopplerSecurity Fix(es): * poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc (CVE-2019-7310) * poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc (CVE-2019-9200) * poppler: infinite recursion in Parser::getObj function in Parser.cc (CVE-2018-16646) * poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc (CVE-2018-18897) * poppler: reachable abort in Object.h (CVE-2018-19058) * poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc (CVE-2018-19059) * poppler: pdfdetach utility does not validate save paths (CVE-2018-19060) * poppler: NULL pointer dereference in _poppler_attachment_new (CVE-2018-19149) * poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc (CVE-2018-20481) * poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc (CVE-2018-20650) * poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc (CVE-2018-20662) * poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc (CVE-2019-9631)moderateScientific LinuxScientific Linux 7evince-nautilus-3.28.2-8.el7.x86_64.rpmb7a799cc5aed5b4042832fa62141170173c2c98d2bd0a15572632cb9a080744apoppler-qt-devel-0.26.5-38.el7.i686.rpma29f5eb61e317b4043d8d0a28094ae796d9d47ac461246680cba6b3aeb1baea6okular-devel-4.10.5-7.el7.x86_64.rpmd8e5b42ebc3238b377fd16ec19017e200bba3372003525e5a764933dc0cdab57evince-dvi-3.28.2-8.el7.x86_64.rpm17f89371b60aa34cbff04cd2e634d59347701401552fa183bd8e6f2ed91939d0poppler-demos-0.26.5-38.el7.x86_64.rpm6062a3ec00a2a3baf5df980748ce731b0a0749bc450dc7d000bb50d4d1acb448poppler-glib-0.26.5-38.el7.x86_64.rpm01eb9039559921deac7d2e1122beb73f595638255031b6d602e3948c71754d6dpoppler-qt-0.26.5-38.el7.i686.rpmc58fddc7174d01b547d70085d396afa0dc826a6d1c7ed6d1e09701497c49b50fokular-libs-4.10.5-7.el7.x86_64.rpmcfbcbd6300401f7b7c911ee731db76b984d539da663a9a6a6b907f2f7b25a34cokular-part-4.10.5-7.el7.x86_64.rpm5523de9c70076af86f5fad1d61ffa3d284715539416f4bcb727f1ad7a317ef48evince-libs-3.28.2-8.el7.x86_64.rpm057199893ce80be695189754730b354b053e2cb00ce5be43f350284312cab88cpoppler-cpp-0.26.5-38.el7.x86_64.rpm6b14b1965247d10ad9ae1743e147bad7332512cd2e07ee868290cff31e7b5b12evince-libs-3.28.2-8.el7.i686.rpmefb195b9f6effd1fc3f2f7c2b6057c033b10aa3a741c7d403b1b6f1e908a39aepoppler-utils-0.26.5-38.el7.x86_64.rpm98f8ba6ba84e3e36cdef5aa98e89b619cd1ffe1f8055795e1a105bc3469df01fevince-devel-3.28.2-8.el7.x86_64.rpm414787fe1287b350803cb08195cb526a8503e008ea92ec153847ca42fdd8dd9aokular-4.10.5-7.el7.x86_64.rpmba04b42268808c767d17c76ed25681b55b31d92a9517faa7d3f0bb20391ae8fbpoppler-qt-0.26.5-38.el7.x86_64.rpm8f58ac013e48fd6305a1389577e8c295e5eff13f21c2bda7bb526a5c285521depoppler-glib-0.26.5-38.el7.i686.rpmbba01f17055d6e1204aa1c9dca450f535f3abb92debb23cad2030e3f77ce3409poppler-cpp-devel-0.26.5-38.el7.x86_64.rpm6f49a6a0a97976854f6816df359957ed2998255f1985d1758d062a3d0a0ba6d4poppler-devel-0.26.5-38.el7.i686.rpmac8be02a59af5e6691b656ba67acc7d5774e1092d6f687966af1d9fb1bb0402bpoppler-0.26.5-38.el7.x86_64.rpme0820defb8f7748951bbe8e5702d21efd444f38eeac7e6663df33cdf3ee7d1bbokular-devel-4.10.5-7.el7.i686.rpmb72f2f9a2c812c8d699785b3eced579695e5303b99e7740b76638b86001a853apoppler-glib-devel-0.26.5-38.el7.i686.rpm9530a383ce211d677b204797bbbfc0d806f550933bc770412b07ea12f7dd389cevince-devel-3.28.2-8.el7.i686.rpm2518412c39b1bc73fd39bf9412ee48cc7cbe2bb026adeecbc9c13c3c93dcf137poppler-devel-0.26.5-38.el7.x86_64.rpm3d0daffda0292b9a716143192c078f8c2df5dfecdcdfda38e730cfa6fc688ea5poppler-cpp-devel-0.26.5-38.el7.i686.rpm449607645576b117484fc0b8b9361382e2c76e27c6a10579db4f959754df5d33okular-libs-4.10.5-7.el7.i686.rpmd5b61b01d976a3f7cc4c85c51d13b6317cdcb47dd594c09ae499a2190edb22b3poppler-cpp-0.26.5-38.el7.i686.rpmd5585933b406ba245ed58235088086077909c4912bfdb0806014e25e8add3277poppler-qt-devel-0.26.5-38.el7.x86_64.rpm84431ef7f6134ef3d44bc38f201e17e390dbaffad035d2253d0f55ee3afe1130evince-browser-plugin-3.28.2-8.el7.x86_64.rpme8cd1f672f49f2beb546591a14f716168db85716fb7e528d9ffaa3faefe3f110evince-3.28.2-8.el7.x86_64.rpm7c12c47b7a003b8f3223ab303c7e2bc2ddcd5ee562bbf6bf84209dc57b69a880poppler-0.26.5-38.el7.i686.rpm830ddf2a436ddd6e4c8494bcc50ea6b6e6faf4a9432fc11f2d5301a4cbd6f8fepoppler-glib-devel-0.26.5-38.el7.x86_64.rpmadd4ff127888e439171b57c8fda81e8a20b4e4bdfb51d8392e618150133f177dSLSA-2019:2028-1RubySecurity Fix(es): * ruby: HTTP response splitting in WEBrick (CVE-2017-17742) * ruby: DoS by large request in WEBrick (CVE-2018-8777) * ruby: Buffer under-read in String#unpack (CVE-2018-8778) * ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780) * ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives (CVE-2018-16396) * rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073) * rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074) * rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076) * rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077) * rubygems: XSS vulnerability in homepage attribute when displayed via gem server (CVE-2018-1000078) * rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations (CVE-2018-1000079) * ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (CVE-2018-6914) * ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket (CVE-2018-8779) * rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075)moderateScientific LinuxScientific Linux 7ruby-tcltk-2.0.0.648-36.el7.x86_64.rpm6783cdba73b27585cc8c7d077b49a3cb5d4c9008176ebe44352cc1d2e362eeb1rubygem-json-1.7.7-36.el7.x86_64.rpm9cc88d73fdcae3886babf646cc72000689ddfa033e9156ea8ac4bc12d1c61e4erubygems-2.0.14.1-36.el7.noarch.rpm51c49312c71a5d4e2ef6f2bd9971bb717eb0f926dcf6d86f6814e35704f01729rubygem-bigdecimal-1.2.0-36.el7.x86_64.rpm56d9f180d32a28067e57062c660b3f0e4380e6ca8559b79699a81af362796cbdruby-2.0.0.648-36.el7.x86_64.rpm4df96e6080a3043371e9ce57d0ec9994458553b7f694c3b56d602223931edea0ruby-devel-2.0.0.648-36.el7.x86_64.rpmaaa51d3c7b1470b3d636d1bd584c90e57f9e34e50823bfe9d60c7689ec5b35ecrubygem-minitest-4.3.2-36.el7.noarch.rpm6fb491f42f071742aab4c0f904edcd35c82b05359f5e80133dd75b238f6af1d7rubygem-io-console-0.4.2-36.el7.x86_64.rpm4170a71a95d28025d087c2ca253d5bad9b9919b3addec2ea6274e6d98f640f64rubygems-devel-2.0.14.1-36.el7.noarch.rpmdc1d1c67ad9a0c176bf2481065e19d59e95f5d9f6a500afd4a67d1cbb70da987ruby-doc-2.0.0.648-36.el7.noarch.rpmfebc35c03b1a1f3c8bde8bcafaf9fe7b7fc0f58de3981639c070bd2e7b7e431brubygem-psych-2.0.0-36.el7.x86_64.rpmf15f4e5bdb98d281c73808d2990fbf729b562781a462e5ee89fa6c42f95338e4ruby-irb-2.0.0.648-36.el7.noarch.rpm483d9daadf9768362fc76c852a6e9a7f5cabe569d9cfc36599326b1c43573853rubygem-rdoc-4.0.0-36.el7.noarch.rpme922d2bb4bf096a628c049b90e8277a14fab06bc646ec156bf37e68421b1e077ruby-libs-2.0.0.648-36.el7.i686.rpmd9fb759df79a9feaac6e810a0237f3c318b270e25d7fb7bd65584895f41be5d4ruby-libs-2.0.0.648-36.el7.x86_64.rpm0350f7109b6ac9cb061ad65ebd0d707d4db0075064b950c593704f2fca1b1c3drubygem-rake-0.9.6-36.el7.noarch.rpm4834b8b3a6ee4debcb21fddc04692e37f8cf488fcecede6ea747bcc290ea8d69SLSA-2019:2029-1KernelSecurity Fix(es): * Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900) * Kernel: page cache side channel attacks (CVE-2019-5489) * kernel: Buffer overflow in hidp_process_report (CVE-2018-9363) * kernel: l2tp: Race condition between pppol2tp_session_create() and l2tp_eth_create() (CVE-2018-9517) * kernel: kvm: guest userspace to guest kernel write (CVE-2018-10853) * kernel: use-after-free Read in vhost_transport_send_pkt (CVE-2018-14625) * kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c (CVE-2018-14734) * kernel: Mishandling of indirect calls weakens Spectre mitigation for paravirtual guests (CVE-2018-15594) * kernel: TLB flush happens too late on mremap (CVE-2018-18281) * kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459) * kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460) * kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882) * kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599) * kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810) * kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833) * kernel: Information exposure in fd_locked_ioctl function in drivers/block/floppy.c (CVE-2018-7755) * kernel: Memory leak in drivers/net/wireless/mac80211_hwsim.c:hwsim_new_radio_nl() can lead to potential denial of service (CVE-2018-8087) * kernel: HID: debug: Buffer overflow in hid_debug_events_read() in drivers/hid/hid-debug.c (CVE-2018-9516) * kernel: Integer overflow in the alarm_timer_nsleep function (CVE-2018-13053) * kernel: NULL pointer dereference in lookup_slow function (CVE-2018-13093) * kernel: NULL pointer dereference in xfs_da_shrink_inode function (CVE-2018-13094) * kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c (CVE-2018-13095) * kernel: Information leak in cdrom_ioctl_drive_status (CVE-2018-16658) * kernel: out-of-bound read in memcpy_fromiovecend() (CVE-2018-16885) * Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)importantScientific LinuxtrueScientific Linux 7kernel-debug-devel-3.10.0-1062.el7.x86_64.rpmca5071e03205bdd59a39910d8a4a3d2c03bcf781dab15c5584391bcbefac3895kernel-tools-3.10.0-1062.el7.x86_64.rpm9ca20b7e947f841582326738db014c285ed2cfd49a5be7a0899c084439d38744kernel-3.10.0-1062.el7.x86_64.rpma4ca9692fef93553fdae43550a0fc44c187d1df55c3315ef07d262d62d394779kernel-abi-whitelists-3.10.0-1062.el7.noarch.rpm4cf0e67b1f31d87e3f690aed1d952572709d77b487109e4261794cae45b6dc71kernel-debug-3.10.0-1062.el7.x86_64.rpm6ce355a234754990e6b0f95868c2718dc92b20922078f0afbfbba77517bcbc28kmod-openafs-1.6-sl-1.6.23-1.SL77.el7.noarch.rpm58feb7290fc3b6fc3633d50c1b99f4df58aafc5f3db17a6bda5145b4653c275aperf-3.10.0-1062.el7.x86_64.rpm9a622fd2efcf0053b2f12e6ff725293f6d258ad925ab8aa157aa2503f035d2ffkernel-devel-3.10.0-1062.el7.x86_64.rpmf46bd7b2ff6f7d9b974f35c6fb5f481bf459cd092f0f3e0a482ae1d0314f6341python-perf-3.10.0-1062.el7.x86_64.rpmefd0a024c2f25d004ed387e821a54f69d4bb7867a68970e4aa6943629d871041kernel-headers-3.10.0-1062.el7.x86_64.rpmc3673dc08f46f8bd50c6ba8e33ffbd8b0737882ca5b8fee4de720aff3fb96b59kernel-tools-libs-3.10.0-1062.el7.x86_64.rpm799fac0269040859fe62acd4dc5f5ef8a65b68db6519abec5c302952789dca44bpftool-3.10.0-1062.el7.x86_64.rpma0b7aa9b79176e8eabc4c7966cf246ee439de04847d623c7b6cb9d7f1480d61akernel-tools-libs-devel-3.10.0-1062.el7.x86_64.rpm51c372a008839238d24af9d8ac023996bc0b35b4474abe2ca6f448e6c677ddffkmod-openafs-1.6-sl-1062-1.6.23-289.sl7.1062.x86_64.rpm941d17a6fa3eb287b00224bb15c0ecebddd60512cf8d06584a2819f5e998a4efkernel-doc-3.10.0-1062.el7.noarch.rpmf3d9bde4872ee4f712e2f262528987ea7253d620542446fca63e33cbce808bebSLSA-2019:2030-1PythonSecurity Fix(es): * python: Missing salt initialization in _elementtree.c module (CVE-2018-14647) * python: NULL pointer dereference using a specially crafted X509 certificate (CVE-2019-5010) * python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740) * python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947) * python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)moderateScientific LinuxScientific Linux 7python-libs-2.7.5-86.el7.x86_64.rpm2cec35cc90145ccc1a33a1f44dd5d3a54eb9fd49e603a8687d3f4fad9562de13python-test-2.7.5-86.el7.x86_64.rpm38be9321e392383e78a223f56488d2736d9f1a6b569d0a9b029b285b7771a80fpython-devel-2.7.5-86.el7.x86_64.rpmbbfd5b99b5eb9834756ddbcd2d0aff1c6a6c3b792e4e3694d73cdc3a632d5f70python-debug-2.7.5-86.el7.x86_64.rpm61ea66c8bb37394e425be7b386d9e3cad40f02460a277b3c62c162ec7ead0b9ctkinter-2.7.5-86.el7.x86_64.rpm12d3c7178b77149b5c1dde2af90e961059dd99414c21fd2186935f0251caf976python-libs-2.7.5-86.el7.i686.rpm5e596aa85f4be3af24e4c7b69bde9b47d5f4308f5fe3e84b7e1b6084aefce768python-2.7.5-86.el7.x86_64.rpme9b6d35bc58428e5d112039dfad510c1c54239568063c5ef716fbe8e07be3404python-tools-2.7.5-86.el7.x86_64.rpm3aedf53ea720c6f8b73a3f8eeaf359e857b36830b2ad17c2d13cd730addb7c64SLSA-2019:2033-1PatchSecurity Fix(es): * patch: Out-of-bounds access in pch_write_line function in pch.c (CVE-2016-10713) * patch: Double free of memory in pch.c:another_hunk() causes a crash (CVE-2018-6952)lowScientific LinuxScientific Linux 7patch-2.7.1-11.el7.x86_64.rpm17c48e5349e58b0f84080293a7ffd33116f6efc011c6b5ca0c7e944ae3363ef0SLSA-2019:2035-1Python-RequestsSecurity Fix(es): * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)lowScientific LinuxScientific Linux 7python-requests-2.6.0-5.el7.noarch.rpm5abf96a77b98ef4a701287ee83c569440787b4d004ce880f2cfee3ceead945cfSLSA-2019:2037-1Fence-Agents* fence-agents: mis-handling of non-ASCII characters in guest comment fields (CVE-2019-10153)moderateScientific LinuxScientific Linux 7fence-agents-amt-ws-4.2.1-24.el7.x86_64.rpmd5360918cadc0cb719c82c1256f60468909f4178ab506152977a46ab17ea8675fence-agents-redfish-4.2.1-24.el7.x86_64.rpm97036dd151bcd17f287ba7286a3b24421ebf66a68d2327b90d3aee8e4797aff0fence-agents-gce-4.2.1-24.el7.x86_64.rpmfc7bae26e7521d5fd4f2ec66362c3e2ac0a1ceb4309748b78fc920ea969357c2fence-agents-hpblade-4.2.1-24.el7.x86_64.rpm193dd0f1fc048eaada935d4cecbd95aee6d83972f81682bb1d109da5f20906c6fence-agents-rsb-4.2.1-24.el7.x86_64.rpmbbed2e8a0045036da940102052a6579c343085a418cf071b4860252c0526b4e7fence-agents-aws-4.2.1-24.el7.x86_64.rpm4bc0fefe2f6e1ceba779a2f62aec4aa7e735cbd4fe84a6730176604d5129a8a3fence-agents-ibmblade-4.2.1-24.el7.x86_64.rpmab7b259cd10819d57d20d833c1230d7317caca04ed5012025d58d2da4edf40fafence-agents-rsa-4.2.1-24.el7.x86_64.rpm9a459db7d49e3af9390402e7f63661cf809f822d17c3ac903073737bf7606f81fence-agents-mpath-4.2.1-24.el7.x86_64.rpm1f6007303a59797807a2e3e9f05437caa202726b5babd976da3d6a06f06d6715fence-agents-eaton-snmp-4.2.1-24.el7.x86_64.rpm00675282f039541328c2a76e1b8453dc79d8c250f7e26eaa2c13685658f9a272fence-agents-brocade-4.2.1-24.el7.x86_64.rpmce19052315c8728b5e41a674cc7b39a5bfdeddeec4bad2780ee2cced6b9d6b7afence-agents-aliyun-4.2.1-24.el7.x86_64.rpm9f165d0f821ca154e68abc4b2cbbe1f56db94e86deee0b455fdd97d507e41f36fence-agents-sbd-4.2.1-24.el7.x86_64.rpm341b3ab294f764dca9bbf7e0aa654d62b6237c3ae002ca1aa7d98bb6353f5ddffence-agents-ipmilan-4.2.1-24.el7.x86_64.rpmf2476f79c4bf545d828f56402bd07cc7446dc2c073de5d8162224bd350f78abffence-agents-kdump-4.2.1-24.el7.x86_64.rpm8c1d6edbb220a468e36d24e3bccca7288844498b75afc5853e33e431796a922afence-agents-cisco-mds-4.2.1-24.el7.x86_64.rpm35226a958d4a8d0bdc0c0566232d7af4878863ba87768f3f2b93fa0ed9cda2d9fence-agents-eps-4.2.1-24.el7.x86_64.rpm0958d9cd3c0896f279b5fafd77e6d320e1a633ecfda5d63a4ac0313ffafa9818fence-agents-cisco-ucs-4.2.1-24.el7.x86_64.rpm86ad2c1fd68096c949b8f3db3cbcc16fbe06a53ba0f3d0ff26d9cd2aed7f77bafence-agents-apc-snmp-4.2.1-24.el7.x86_64.rpm45ab566340ecc97b25f521b20ce37fac8198b2c3cfb42dabcc19ec9d959fe4bbfence-agents-vmware-rest-4.2.1-24.el7.x86_64.rpm0737ed30a112a743db45f853f18b7a67e4b1657f2a6cef6864b3dbe5582fdb25fence-agents-scsi-4.2.1-24.el7.x86_64.rpmab7bc939a8ef703ff10bdd6e27771834ea876d60a92973a254c065d8d6f54264fence-agents-virsh-4.2.1-24.el7.x86_64.rpmec9874436205ec8876f568b3fe3c6d620218766671b39e7e22956ad558bfb123fence-agents-all-4.2.1-24.el7.x86_64.rpm163298feb249c4d5f1719112694a13dc19a3d8940add4f4958b2622f611c47b9fence-agents-apc-4.2.1-24.el7.x86_64.rpm6b486c4445561a166eae13bb49159ba909dfd9d1d4853fafd33ba6beaa3a0d50fence-agents-ilo2-4.2.1-24.el7.x86_64.rpm4a246dcfee4aaa667f1c372f0917b15ca03d6b91b50bc5a31e5a75e2baa13118fence-agents-ifmib-4.2.1-24.el7.x86_64.rpm504904b836865efb011ae7dd809de147180ba959af7a8b0a79dfe830531284fcfence-agents-heuristics-ping-4.2.1-24.el7.x86_64.rpm5e99c9c22d631debc82780b27225761a62087fdc92020c1a851458fbe210d90dfence-agents-emerson-4.2.1-24.el7.x86_64.rpm1ec60bc3d868f74ad4e895867477048a7543a4e30a116ccbd7f8da185eb76e82fence-agents-common-4.2.1-24.el7.x86_64.rpm6c357358f7745321f05487a6990891155de10575686c51ec41179b2ac3255ef6fence-agents-bladecenter-4.2.1-24.el7.x86_64.rpm5f783c947c43e915f99631b9fbabc8d39665e0cf7ce11617506c8e832e9e8070fence-agents-vmware-soap-4.2.1-24.el7.x86_64.rpm2fa583f92d997c6a46e3bf1e135ae0bd27a93acacdf4bfdeab18bcd6b8e6c5e6fence-agents-rhevm-4.2.1-24.el7.x86_64.rpmd46009074c2015d1bc5c64ca6c25fdd63156ef86bae67d0b7f77621061857f76fence-agents-azure-arm-4.2.1-24.el7.x86_64.rpm92b29d4fd0481a13e16cb849effe49c9ca682a4bac691332bfb28b2ce81651dffence-agents-drac5-4.2.1-24.el7.x86_64.rpma055853dbee87977dc6f4a49fd2eff90478aa6016121d50ed968160c12e6b263fence-agents-compute-4.2.1-24.el7.x86_64.rpma5fd3ea32d7f5e2e9e4f0e5825c40f213091bf755cefdb0cfa55efeb75db5e76fence-agents-ilo-mp-4.2.1-24.el7.x86_64.rpm4eb9ae3e87d3cdcc281169f900dfe86aa93cb902d9adc7c4272cb0f4fc3cffe3fence-agents-ilo-ssh-4.2.1-24.el7.x86_64.rpm2c3b79fddbe8919b3dfc188dd0b966d44f8f27db3949b2164275ee7b857eea43fence-agents-ilo-moonshot-4.2.1-24.el7.x86_64.rpm6edc29e4e1b98cc7fe0a30498edcebae36ab420a6dd455e04d14b45f3600a4f1fence-agents-intelmodular-4.2.1-24.el7.x86_64.rpm09bb551c7b6a1816014f20b1f6e15d9981e1b1e52eec0dfe5911d7ce38fc85acfence-agents-ipdu-4.2.1-24.el7.x86_64.rpm5a38a2b7958c880eb318bc718d469c7c373c35450a91f82975b8cd41e6bfcaa0fence-agents-wti-4.2.1-24.el7.x86_64.rpm8b6562b8029edc5a2fd24c1352b689ee22f9ff44e9b557e52dbe17aea9e7a091SLSA-2019:2046-1PolkitSecurity Fix(es): * polkit: Improper handling of user with uid > INT_MAX leading to authentication bypass (CVE-2018-19788)moderateScientific LinuxScientific Linux 7polkit-devel-0.112-22.el7.x86_64.rpm593234726ad9d0a1c7951568108bd730059c12cd68ac9cb9fa29ce63fb729299polkit-devel-0.112-22.el7.i686.rpm3c04a46041ef2b7e995e31f3e3f36cb4889235f5634752d789f8ca831dbf980cpolkit-0.112-22.el7.x86_64.rpm44a769568ca617b47151aba4253ce8d805f2b6b4ba100ad4bae73818db152c47polkit-0.112-22.el7.i686.rpm76279d1a9e4975730f3bb04c25af91b5e83c49a78552cc04f6e8df5085129f9fpolkit-docs-0.112-22.el7.noarch.rpmd8398e382bbf16b99dd40e97bf473591ad944538242325b0da65a0ed9ad5142eSLSA-2019:2047-1LibcgroupSecurity Fix(es): * libcgroup: cgrulesengd creates log files with insecure permissions (CVE-2018-14348)moderateScientific LinuxScientific Linux 7libcgroup-pam-0.41-21.el7.x86_64.rpmbef14fb8755e7a1fe33b3741969931c6d71b91318d8ba7df94aa449d3c159985libcgroup-0.41-21.el7.i686.rpm7656ddd7d02318c43947836395dd425f938ab2577836e0939e7c66a83a4e04d1libcgroup-devel-0.41-21.el7.x86_64.rpm05a6cda0c377cfcc847242f424594f7c503a0ff1c798c21d07ea5c719d79952elibcgroup-tools-0.41-21.el7.x86_64.rpmd15d295f687f20a6cf2f394166dce74a0431688ff0abffd33bbe5fad76463a39libcgroup-devel-0.41-21.el7.i686.rpm8525a8f00d62826b904340935358a2ee87f0d058434a642bc61e2077ef236a80libcgroup-0.41-21.el7.x86_64.rpma518e2fd6ee1012aa24be0467012b3ce43567099732b868e22a8144d4db8ed45libcgroup-pam-0.41-21.el7.i686.rpm6e3b2d1bb35bb27d5b78baa7673b466efc0d6b6278d2976f2a5d442cbbce3f0aSLSA-2019:2048-1ExempiSecurity Fix(es): * exempi: Infinite Loop in Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp (CVE-2017-18233) * exempi: Use after free via a PDF file containing JPEG data (CVE-2017-18234) * exempi: Infinite loop in ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp (CVE-2017-18236) * exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp (CVE-2017-18238) * exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for denial of service via crafted XLS file (CVE-2018-7730)lowScientific LinuxScientific Linux 7exempi-2.2.0-9.el7.i686.rpm25394520590874140f7aa18c143ddfa3f0210f8670b3c6fe122b01b1ce2b09f1exempi-devel-2.2.0-9.el7.i686.rpm16dd7be33385d6e9b7cc15dd0cc80b46d8898b95e8bca9ca73dcb8ec1e83b8d2exempi-2.2.0-9.el7.x86_64.rpma975084cedd91d858c3a11a9acfe001f07f2ee3a2088a4f0d7eb43b10e82dc09exempi-devel-2.2.0-9.el7.x86_64.rpme318f7b6e35ff75e294e231c0ed3ae86346085235947a50b42ad278380dcf3b7SLSA-2019:2049-1LibmspackSecurity Fix(es): * libmspack: Out-of-bounds write in mspack/cab.h (CVE-2018-18584) * libmspack: chmd_read_headers() fails to reject filenames containing NULL bytes (CVE-2018-18585)moderateScientific LinuxScientific Linux 7libmspack-0.5-0.7.alpha.el7.i686.rpmed481c31b5dcd954a4f9b17f15413090233198db358229aaf304f56ea005348clibmspack-0.5-0.7.alpha.el7.x86_64.rpmf02ba305946c08a543d80a5923f171bea17b657b1ae93f917f922a3f513269fdlibmspack-devel-0.5-0.7.alpha.el7.x86_64.rpmfed7e74e45dbfb3d53f1e47c88aae7e059c19f2a3deeab3511c0f94e80a8238flibmspack-devel-0.5-0.7.alpha.el7.i686.rpm11ff2e0f577ad3457978cf06788ddcc4454659dfe3e9b8bbcf1f15239ba90a4aSLSA-2019:2051-1Compat-Libtiff3Security Fix(es): * libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service (CVE-2018-7456)lowScientific LinuxScientific Linux 7compat-libtiff3-3.9.4-12.el7.i686.rpm0dbc48ddd384bfbe3e80413c9fbc8d8b856dcbe69141ca119d2d58c1f1959ddfcompat-libtiff3-3.9.4-12.el7.x86_64.rpme2f56b9eab6ab38140c40de97247b9edd2e6b426cb4cf7625b55f53e2e65fbaeSLSA-2019:2052-1Libjpeg-TurboSecurity Fix(es): * libjpeg: null pointer dereference in cjpeg (CVE-2016-3616) * libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service (CVE-2018-14498) * libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212) * libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c (CVE-2018-11213) * libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c (CVE-2018-11214) * libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF (CVE-2018-11813)moderateScientific LinuxScientific Linux 7libjpeg-turbo-static-1.2.90-8.el7.x86_64.rpm679208e525c3cae714a7f71b029182a307a26647c160160301da90eb71662dcdturbojpeg-devel-1.2.90-8.el7.i686.rpm642cb0655b9144b2de73bb5da105933a7d92320b1543309652eade31349a5df8turbojpeg-1.2.90-8.el7.x86_64.rpm1a41a3c83d3f43a339eea99a6d6df43ec4d66f7cd40fcdb8cd7f18e518cf8ee9libjpeg-turbo-devel-1.2.90-8.el7.i686.rpmd897738481a4e8574f7089273a351cbd0be3a12a9369cef45219f7e33f450b94libjpeg-turbo-utils-1.2.90-8.el7.x86_64.rpmfd57b64abde40ed19079e33df00ba662acd1933288975f59977d2b35143578d8turbojpeg-devel-1.2.90-8.el7.x86_64.rpmf299409f4c53d1f699a2b34670db6af67b4fe7029579372dd43fd43d5b7c4629libjpeg-turbo-devel-1.2.90-8.el7.x86_64.rpm5d2f5eaf2f05cf2b89ad26a7a7fb90b6426aedce93df5d56380e1193b24d3012turbojpeg-1.2.90-8.el7.i686.rpme4216c0137e9a983f5eb8d7c7c0089143599c3a664ddfaa4638c2bf4a34e2fa2libjpeg-turbo-1.2.90-8.el7.i686.rpm3d18d4c23312ac9fbe7e497e9313d310faf77e063fa83a28f98c6505782a4be1libjpeg-turbo-static-1.2.90-8.el7.i686.rpm2e3e42756a73003ced383a18aaa234d51393154230f51b6f670dd41d9a3267aclibjpeg-turbo-1.2.90-8.el7.x86_64.rpm3c912244cdd5e94707a35f394cb4e5327c1e5519976352970728ed647d9d3103SLSA-2019:2053-1LibtiffSecurity Fix(es): * libtiff: buffer overflow in gif2tiff (CVE-2016-3186) * libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution (CVE-2018-12900) * libtiff: Out-of-bounds write in tif_jbig.c (CVE-2018-18557) * libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service (CVE-2018-7456) * libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial of service (CVE-2018-8905) * libtiff: heap-based buffer over-read in TIFFWriteScanline function in tif_write.c (CVE-2018-10779) * libtiff: reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c (CVE-2018-10963) * libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c (CVE-2018-17100) * libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c (CVE-2018-17101) * libtiff: tiff2bw tool failed memory allocation leads to crash (CVE-2018-18661)moderateScientific LinuxScientific Linux 7libtiff-devel-4.0.3-32.el7.i686.rpm409a3f85e272254896f9cda8bf09412f6ff4831e46193ceac02fd9b358d4c1f9libtiff-4.0.3-32.el7.i686.rpmd679df3b5d55b8f7aa5519fb2ab85187baf6a49645aa305caebf4b91f7870be0libtiff-static-4.0.3-32.el7.x86_64.rpm5d6e4b3177989105899f2d2c5e560d045468ff697b0ae4384a2243676fac2221libtiff-devel-4.0.3-32.el7.x86_64.rpm60cc34093bf4f7cc31b5f6e72cd73cc927ea6545e37b302ceb2bdd155de679fflibtiff-4.0.3-32.el7.x86_64.rpm004f9399979a65c6027e4f891790505a36656e79b5981e1405912aebff254613libtiff-static-4.0.3-32.el7.i686.rpm42dd6b45af27dc78696762c980f62a3493433d287d9f8bacd5a6053f9341fcaalibtiff-tools-4.0.3-32.el7.x86_64.rpm7bea8ee091862ca222bbcfda38275bed5348f381166fdfc9f5f1f39997419528SLSA-2019:2057-1BindThe following packages have been upgraded to a later upstream version: bind (9.11.4). Security Fix(es): * bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies (CVE-2018-5741)moderateScientific LinuxScientific Linux 7bind-9.11.4-9.P2.el7.x86_64.rpm1e747576450b306fd44dc35c12b21e2ea89cdc68f8fe2d73e1fc7892581def02bind-chroot-9.11.4-9.P2.el7.x86_64.rpm3d9d3b7024d8109f4b53db78e8f41220fd8ed79489262590685dbc87a8d42ba7bind-license-9.11.4-9.P2.el7.noarch.rpm710bfa21b7be185487418ad3703d316262fa19490ced3fc51a4aee95453a07adbind-sdb-9.11.4-9.P2.el7.x86_64.rpmaba22b0045efa6620c0f2c6e951b55c6a84d15c8ff7398f262cd4237135bbf62bind-lite-devel-9.11.4-9.P2.el7.x86_64.rpmf894d2964d4e05dc52364106657aa5ce97401b281e0aa50a8f1709586d533534bind-export-libs-9.11.4-9.P2.el7.i686.rpmd48d493ea03c8d848889c59a6f5c34c15ce8f0bc85460b9f4cb3a6e3424e76c7bind-devel-9.11.4-9.P2.el7.i686.rpma3d2fc224fceeab1a47594f5b9423cd1fcaf9bce566735e5a5b611c85d1ed52fbind-pkcs11-utils-9.11.4-9.P2.el7.x86_64.rpm16e84b5a2871fc52eae749d37f502b526866682e5719ff308eaa029fd3916e75bind-lite-devel-9.11.4-9.P2.el7.i686.rpme73fcb276e2dd481f68f0722cbe36f01f776f5aaf24a42a67c605663c3b4dd5abind-utils-9.11.4-9.P2.el7.x86_64.rpm2235c369edf68efdaf875afd448544f7880086016925571f6001cd993171205fbind-pkcs11-libs-9.11.4-9.P2.el7.x86_64.rpme8ce3b78c784eac2b5e1d339412ee0e6260b16e63d9ab209c2551a84b93aff05bind-libs-lite-9.11.4-9.P2.el7.i686.rpm310374f182f34550c34d36d4a1d2888365ae608e04efb9617f66d2c0f988b05cbind-export-devel-9.11.4-9.P2.el7.x86_64.rpm41f9010cc0ddbd6d023a941716e70b42124a48421bbff57065875b1babe64882bind-pkcs11-9.11.4-9.P2.el7.x86_64.rpm778aa56f823ee3f2f9da73fd659d42e9788c9654b84d15f239bd23ea5d4c7b11bind-libs-9.11.4-9.P2.el7.x86_64.rpm71829fc942974d6c8565d8f15173b5d746ef12e8499bc4dd92cf7ccbf9b49f61bind-libs-lite-9.11.4-9.P2.el7.x86_64.rpm40f6bf6c7f91027e8c10eadefdd22e25401c2ced8f9cbdbac57b5f8fc6a23af0bind-export-devel-9.11.4-9.P2.el7.i686.rpm337c0047175ed7068d077ff5f190cb4f8608a97946d38b36456fa071ce80e89fbind-export-libs-9.11.4-9.P2.el7.x86_64.rpmd2a9e4e3b6df7ee5c079ab98d2a6b41089718325af4e2183d930ad237d7fc841bind-pkcs11-devel-9.11.4-9.P2.el7.x86_64.rpma60a63f69302dd2e2637119ef6458a2c4c4e301b8b566a425a1bca2f23eba03dbind-devel-9.11.4-9.P2.el7.x86_64.rpm36ca856375317548bcfd9acecd9f280051503a3d2f78239cf9707809ed296ff2bind-pkcs11-devel-9.11.4-9.P2.el7.i686.rpm61abe33a603ac7c8fd2810655173598176ec0548bcda1970558ff65da7ed30e3bind-sdb-chroot-9.11.4-9.P2.el7.x86_64.rpm9dda045215e7b7623535996b4dcbd1c47061d96123b81e4fd0c2df8a9f42639cbind-pkcs11-libs-9.11.4-9.P2.el7.i686.rpm82400dfea91a07ce5b877fb74c92b6efdc5203c5a0204469f1c10ad31f994d15bind-libs-9.11.4-9.P2.el7.i686.rpmd00dd97941c6f973f66a9c2e2f12acce418488e38d012aee91dc7e2caf1794edSLSA-2019:2060-1DhcpSecurity Fix(es): * dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS (CVE-2019-6470)moderateScientific LinuxScientific Linux 7dhcp-common-4.2.5-77.sl7.x86_64.rpm5865ec15f45ec81d0b40e23d55428b92cc519c26096e9a0969b2c00f34a6e216dhcp-devel-4.2.5-77.sl7.x86_64.rpm83eff4bbbf960f2e6eba6aceac399ade55c5db539d64d1c6dcc83637db639b78dhclient-4.2.5-77.sl7.x86_64.rpmb4e198ba533ed6e69e6aaef2a4993e3f5cd285276759ce954bf81447065e95ebdhcp-libs-4.2.5-77.sl7.x86_64.rpme35df8a762fed441e029c6f560f8976bce8115bd3a21be7069f37876946531f8dhcp-libs-4.2.5-77.sl7.i686.rpm77483ade12fd99f9ed47dad5064007eed957185851aeed6cdc85e5616b6facf3dhcp-devel-4.2.5-77.sl7.i686.rpma0c59989fc999e407d935b903e31a397222e9a0e9b391d3a083bc1dce6f7306edhcp-4.2.5-77.sl7.x86_64.rpm94b415d6a2271f40f8361c75af907936f77998ee859cb3812ffb311a5e957bb1SLSA-2019:2075-1BinutilsSecurity Fix(es): * binutils: integer overflow leads to heap-based buffer overflow in objdump (CVE-2018-1000876) * binutils: Stack Exhaustion in the demangling functions provided by libiberty (CVE-2018-12641) * binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus- dem.c. (CVE-2018-12697)moderateScientific LinuxScientific Linux 7binutils-devel-2.27-41.base.el7.i686.rpm58a33f3df9d8d1ff800fad12c24ecae4444ff14d80ef07c032ece079d8ef21d0binutils-2.27-41.base.el7.x86_64.rpmb16aef9ddf8d212343bad96bb41af4908bf503693eb0b471f1e70254c20fed83binutils-devel-2.27-41.base.el7.x86_64.rpm241f249d38afebf4db8bbe0d1cacfd4d69eb0ba8d22fa715a360a9dcedc0c4abSLSA-2019:2077-1NtpSecurity Fix(es): * ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution (CVE-2018-12327)lowScientific LinuxScientific Linux 7ntp-doc-4.2.6p5-29.el7.noarch.rpm10bd2e9e78e9f68f9862319885e4b39c71e7afa026738e378eceb4f0b2a0be40sntp-4.2.6p5-29.el7.x86_64.rpm6a1d74a67c26d2865b769d01cec6008189de9a3468d7b70c0b950e5e15b33da6ntpdate-4.2.6p5-29.el7.x86_64.rpma1639fb30d51ecc198232bed1b60058309db02a580afccb0c92b1e4b3827d6bcntp-perl-4.2.6p5-29.el7.noarch.rpm96050106e75f675389902209714d73600585be8beb1dcc6295d9c6a2f626b9c9ntp-4.2.6p5-29.el7.x86_64.rpma3d1b723213098195e119adb864f806566b2e393b31242ba3b1012358babc856SLSA-2019:2078-1Qemu-KvmSecurity Fix(es): * QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)lowScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-167.el7.x86_64.rpm4dadf9034add07c6ba471fc8d9af885bbb854a771312e5177b2eba130b37c436qemu-kvm-tools-1.5.3-167.el7.x86_64.rpmdc107fa62a41cfd2508bfcca57e5793cc67efdb9ec72376f1bc379866dc33a69qemu-img-1.5.3-167.el7.x86_64.rpmd20cfd994cab77aa1d0628f94a4369adf4229f9d067274f59bdd12c9d1b2133dqemu-kvm-1.5.3-167.el7.x86_64.rpmf8d6e871854394ef265d4f15117a25762e13e3b02e05e7ebbcf7d36994a80d44SLSA-2019:2079-1XorgSecurity Fix(es): * libX11: Crash on invalid reply in XListExtensions in ListExt.c (CVE-2018-14598) * libX11: Off-by-one error in XListExtensions in ListExt.c (CVE-2018-14599) * libX11: Out of Bounds write in XListExtensions in ListExt.c (CVE-2018-14600) * libxkbcommon: Invalid free in ExprAppendMultiKeysymList resulting in a crash (CVE-2018-15857) * libxkbcommon: Endless recursion in xkbcomp/expr.c resulting in a crash (CVE-2018-15853) * libxkbcommon: NULL pointer dereference resulting in a crash (CVE-2018-15854) * libxkbcommon: NULL pointer dereference when handling xkb_geometry (CVE-2018-15855) * libxkbcommon: Infinite loop when reaching EOL unexpectedly resulting in a crash (CVE-2018-15856) * libxkbcommon: NULL pointer dereference when parsing invalid atoms in ExprResolveLhs resulting in a crash (CVE-2018-15859) * libxkbcommon: NULL pointer dereference in ExprResolveLhs resulting in a crash (CVE-2018-15861) * libxkbcommon: NULL pointer dereference in LookupModMask resulting in a crash (CVE-2018-15862) * libxkbcommon: NULL pointer dereference in ResolveStateAndPredicate resulting in a crash (CVE-2018-15863) * libxkbcommon: NULL pointer dereference in resolve_keysym resulting in a crash (CVE-2018-15864)moderateScientific LinuxScientific Linux 7xorg-x11-drv-wacom-devel-0.36.1-3.el7.i686.rpmab300556a07abeaa6bfee14bad024b2722a80fcfbb1f9a332cad47189af1dd11libxkbcommon-x11-0.7.1-3.el7.x86_64.rpmcd4daf47a4b371d75ddb6dbac951a847050dfe67c68868dccb09290860947853mesa-libGLw-devel-8.0.0-5.el7.x86_64.rpm1d63beb80e0e1291d305a3e75909fb711ea5196eaf7605a4fbd4a375d3882280libX11-devel-1.6.7-2.el7.i686.rpm8f659c533c8a51353f254fb03f10e2bc5828127d7332943ad43399c1027370c1gdm-devel-3.28.2-16.el7.x86_64.rpm420fd8f5035a74aa1d4124d2d443e0eb6ab1ece4b2743ba35eb5e746eadf49a9libxkbcommon-x11-0.7.1-3.el7.i686.rpm9dafc5f1f6c39f1e723c71aa3dfc43763cb4eec143ad983a2f8b30b2e7d068a3libxkbcommon-x11-devel-0.7.1-3.el7.x86_64.rpmb73bd5f3b2521d6c1c44d280d3722517e73f9b5025267cdb668f879db01c1948xorg-x11-server-Xorg-1.20.4-7.el7.x86_64.rpm09756f301958e6d427b6f6ce2e250c7def16332de7fb2ff4d220ae24c6515e2fxorg-x11-server-devel-1.20.4-7.el7.i686.rpm824e719e037cff7c48cad7703b448431a01f0bc51e4e1fc6ff0917a74892b670libxkbcommon-devel-0.7.1-3.el7.i686.rpm80da18324acb830e34ecafab3af92ad1b235e0efae0f819c3492bbc84d32675bmesa-libGLw-devel-8.0.0-5.el7.i686.rpm154d620ab9dfa702a6ffe254ec1d05634b243f12c44773944038cdd0584a1f6cxorg-x11-drv-wacom-0.36.1-3.el7.x86_64.rpmb3fbf0026c73bce3c42c8223ca7e9b4c977f7312ec3e067404cb4ad422fda068gdm-3.28.2-16.el7.i686.rpmb6d9ec2cbe608ceb486a46bb355819e6cb173c303c043040efacb0542ac644cblibxkbcommon-0.7.1-3.el7.i686.rpm93f8e484981911cd4a44647815e70cf003ae1c00cd84c826506375f18de67d08libX11-1.6.7-2.el7.x86_64.rpmf3e76ba41f4a744fe50ba37d9feb7836a6bb33d5519f1c6b7b340bf8ea70ea63xorg-x11-server-devel-1.20.4-7.el7.x86_64.rpmdbb7353e9ff1d79092d04c7e0723acacec935d4e6f359a249bf2c2ae74e80a7elibxkbcommon-x11-devel-0.7.1-3.el7.i686.rpm92d1e0613446b46d272346cad5c4b40c99c14f471209e7d5dde7676468827fb2xorg-x11-server-common-1.20.4-7.el7.x86_64.rpmfb84aa3e3cdb84937e3a431b2e2c26b705b9eecfc70408576af3cc40e6e29658gdm-pam-extensions-devel-3.28.2-16.el7.x86_64.rpme8c5fb34d5bce9dfc5bf458689d6f4bf54f7ef0245e97162ef635f921b4b9c95gdm-pam-extensions-devel-3.28.2-16.el7.i686.rpm9b680e6218e0cdd67763de96299deeff9a9e08ea72e9167fd31d0c1c9c54a5e9libxkbcommon-devel-0.7.1-3.el7.x86_64.rpm17d5b89129bc3dc9d7cabfe05a1f8c6e3c21326aa9c7a21cf1acb69c87f6bf4dlibX11-1.6.7-2.el7.i686.rpm92d7b388f5dc8881aef0455879eaf520837e101068b4c70298cbebf7aeb73d18libX11-common-1.6.7-2.el7.noarch.rpm9b2675f6e611922d7f0771e8ba88cd1252a190e71387a6076a5bcac988b15dc7mesa-libGLw-8.0.0-5.el7.i686.rpm90bb80b8ef51b9f3fde8b9fff63952b38619c679f91386a16c47f0546c4b0941xorg-x11-server-source-1.20.4-7.el7.noarch.rpmbb783221f8291f03a3a71274bfa7d5310e5f9af8b2762994a9bfca7c0c1226adxorg-x11-drv-ati-19.0.1-2.el7.x86_64.rpmd49904af575d427945d5dfe7ad7d4ce208512db2f7aec82fff138a4003eb62c5xorg-x11-drv-vesa-2.4.0-3.el7.x86_64.rpm5e005325f5c50fa0b99320840002a22c199e9f1fa90802fbfca9215c83d7a3cbxorg-x11-server-Xephyr-1.20.4-7.el7.x86_64.rpm0785a1c8f1fd65b1454708896f5bad35babfc60d27f24957fcc2c52d43c3c31blibxkbcommon-0.7.1-3.el7.x86_64.rpmc216b93ba3637913e65a9ff19f93715d1f57995f96a605fd67c84fe8977bc27fgdm-devel-3.28.2-16.el7.i686.rpmf0bbd6772932cef5c2825b5ab81d97ea2644310aa50a43c31059a36df421b92bxorg-x11-drv-wacom-devel-0.36.1-3.el7.x86_64.rpmba51b64c9770dcaa4741f0ac711b81938b21baa5d99709ef6a87bc6c9f8140bfxorg-x11-server-Xvfb-1.20.4-7.el7.x86_64.rpmb3e187fbce2f08b11a09341b2a0ac4bbf08680bde3f355df3eb461d1b6755434xorg-x11-server-Xdmx-1.20.4-7.el7.x86_64.rpm86c24c4033cc92493cd4a829e5ce592df4d4c6b0abaf75737963d46ef1fc9368xorg-x11-server-Xwayland-1.20.4-7.el7.x86_64.rpmf3f376dda5b1f80d3008ee182b66385680b78dd2e6abae9be4ff765b0aac8d9fxorg-x11-server-Xnest-1.20.4-7.el7.x86_64.rpm1d0783681519fb367db1ce05b220f231dd1e6047764966af0e0ae7178e787941mesa-libGLw-8.0.0-5.el7.x86_64.rpm22991fef470328c675a012ac05aa468bcbb2c95bb6f1dd10ab263e658a88486bgdm-3.28.2-16.el7.x86_64.rpmf1268435099b72ffec6896f8fc62eb1756eee988ae95bd28c3ca5cd05f8639eflibX11-devel-1.6.7-2.el7.x86_64.rpm0c9c313498d6f0aba65f1ed3dc1312ff068d383cfa9460807a6d02fa666a239bSLSA-2019:2091-1SystemdSecurity Fix(es): * systemd: line splitting via fgets() allows for state injection during daemon-reexec (CVE-2018-15686) * systemd: out-of-bounds read when parsing a crafted syslog message (CVE-2018-16866) * systemd: kills privileged process if unprivileged PIDFile was tampered (CVE-2018-16888)moderateScientific LinuxtrueScientific Linux 7systemd-devel-219-67.el7.i686.rpm4ef6d97d7dd7f34ee5f5ec57055ec3c94cf0a8ea9df16d0a6fb2d44d7303e396systemd-resolved-219-67.el7.x86_64.rpm906017985af93b0c23e4800b93fa650c90492acbd028380288c11588d124d7afsystemd-resolved-219-67.el7.i686.rpm33ec641b5d13cafd797bbd6385ae6b8d49a270377cf67bb025625d44b5fe2d39systemd-devel-219-67.el7.x86_64.rpmfc60baaea372f841c8af9db84b62ebc63a006ca4cd58719dd76a561a788dfb69libgudev1-219-67.el7.i686.rpmf7c867bc896abdc5fc8589b0a61d7b89a58eaf5e4a2e5b9ff5db160f8ecd5dcflibgudev1-devel-219-67.el7.x86_64.rpm70af9fa3915d73ca6972d414ce56e40c6f3b74c904a8aa9c104689f7a776474elibgudev1-devel-219-67.el7.i686.rpm83d533c2d778ad6f524833b0a8d45aaae0b44e2e0a5c5e381634467c00184e39libgudev1-219-67.el7.x86_64.rpm897be3abab6330ce4b2a2f6ad65e5e84bd1dc853914589a2936c095b34da1f8asystemd-journal-gateway-219-67.el7.x86_64.rpmec1775a504933b373b77a6bf1bad8e805c5763a8a910961cc784a36e840e4971systemd-219-67.el7.x86_64.rpmde0f8741b86d4366ced0fc81c17d312236eef97bd34419c7a320bbedcde2d43csystemd-networkd-219-67.el7.x86_64.rpm5daf17091083732100c069c7584401694b53e8eb14ebb13fd487316a1c8930efsystemd-python-219-67.el7.x86_64.rpmda2bbeeb76b0a7a4f97f76e8c70ba6f38a7d4d38055a3fdcf0c530d30b07cb62systemd-sysv-219-67.el7.x86_64.rpmac76adc4ecaeab1a19961b947cf8192eddad79009a8474ac9e846b77c9a4549esystemd-libs-219-67.el7.i686.rpm3c0eea3c162cae9caed859fc1f73cb2bf57fa8bf18f0c693ed73b04f67bcbb2asystemd-libs-219-67.el7.x86_64.rpm911685a941d85d3054ae5132cbc444d4ffb65ba50a0d571106b110ec5944f3e5SLSA-2019:2097-1Perl-Archive-TarSecurity Fix(es): * perl: Directory traversal in Archive::Tar (CVE-2018-12015)moderateScientific LinuxScientific Linux 7perl-Archive-Tar-1.92-3.el7.noarch.rpmebda773d8d103ae64a2b2096975c46cb109cc65311b9b205fa3305644dd24f5fSLSA-2019:2099-1SambaThe following packages have been upgraded to a later upstream version: samba (4.9.1). Security Fix(es): * samba: save registry file outside share as unprivileged user (CVE-2019-3880)moderateScientific LinuxScientific Linux 7samba-test-libs-4.9.1-6.el7.i686.rpm3d79e5aad6f604ad2dccc8be2fc6f358a95fdc7559743db51ebed4541fce716dsamba-pidl-4.9.1-6.el7.noarch.rpmcdfe300c74c4576114842fcf15928d80077ab441666545780d78fd555499dd28samba-test-libs-4.9.1-6.el7.x86_64.rpmf937dc596cd93b2910fed00b649bafd009b122c039bfa642ab19064978c5cb93samba-devel-4.9.1-6.el7.i686.rpmbd3a459bd8531ebce6bf5d09ad765b6d7ac8d9a9621e5b06cb7cfd3fd2aef15csamba-dc-libs-4.9.1-6.el7.x86_64.rpmccba60e648429919f9280826cb8c1f98c4b5efd0d0ee345070214a1780409276samba-common-4.9.1-6.el7.noarch.rpm1b41d6355469473f7a279808dc5d2ff1fa22b8aa1532748b936f47db80256d14samba-client-4.9.1-6.el7.x86_64.rpm00b41585952124978ca99a8deb29362d1ccbb73d522d4205579d18c9d8b789e4samba-vfs-glusterfs-4.9.1-6.el7.x86_64.rpm67130377e73c20fe4e384eb2d068f212d3c893498c0d23d2c4ffe35c0ae1e860samba-winbind-clients-4.9.1-6.el7.x86_64.rpmd7813ed6342677d755b2b8fb31ede4773f8866d9f77a8057df12c6c6709757e9samba-devel-4.9.1-6.el7.x86_64.rpmf3c86a12d5e46b9de71c9ce6cd46a94f2feefcec8eaca7ac6b8471d739ce9e9fsamba-winbind-modules-4.9.1-6.el7.x86_64.rpm3f76de7592478b1e619b2e3e9efcef47cd25dbda3f01e40f720b5347db248dbcsamba-dc-4.9.1-6.el7.x86_64.rpmd7db5cdc0c4b298193d8fde2577b1d2ae68c052a26227d89b9fd07224c3c4d79samba-client-libs-4.9.1-6.el7.x86_64.rpmdcc2147d54af5e33dee2ccf83202e90dcc3d857df58d70f79a35ac7d393797fcsamba-krb5-printing-4.9.1-6.el7.x86_64.rpmc5a49497b00c9d4309c6356f56f4f81327c157b19d2f6e5422c8cc56f430a01esamba-winbind-krb5-locator-4.9.1-6.el7.x86_64.rpmee018d59665d90fe5dea7163418395799db16712d49d213a46c40375f2ec7fd0libsmbclient-devel-4.9.1-6.el7.i686.rpm8b242cfa519373668beec55123054fc0038143f74e1d4e8fd83f62157d7c329esamba-test-4.9.1-6.el7.x86_64.rpmac0c143479ce47a6fbd6a8f6c47ef34787cb7ff3daf22149894e62ea193885a9samba-4.9.1-6.el7.x86_64.rpm2cee54a66475e3528b20491b47efb75a949b63b805ec0cb455595be86a990f33samba-common-libs-4.9.1-6.el7.x86_64.rpm107dd5a8f472b093b3f0303ea4fa5bc0d238c61db135687c39a12d12c8cdd022libsmbclient-4.9.1-6.el7.i686.rpma0e0bcb99d12848c5ff34d705c26d46eefa00b0175e4536685da32b7165941aclibwbclient-devel-4.9.1-6.el7.x86_64.rpm3526a6c271cc93ba318c706e7dccb2f01de14aa819e55b5cd58bd58c4508cc5actdb-tests-4.9.1-6.el7.x86_64.rpmf2b4f05b97b24d473899db0ab94bb300760d6a232e19f9129fa04042474d1eealibwbclient-devel-4.9.1-6.el7.i686.rpmc890ac9e1edb9fc414ebd54a041a92edbaab251e9657b936a9701b502c7989fdlibwbclient-4.9.1-6.el7.i686.rpm5b304a1dba64d52f6c75e1576d18ccbbb93094cf832ec51d574bf66f332cbc3actdb-4.9.1-6.el7.x86_64.rpm089fc01403a66b1988970d94de79b42dcb2618899b93cc0369d8250cdecad4c8samba-libs-4.9.1-6.el7.x86_64.rpmf3111dccd7dc68fdd875ab92241ce6034a867154bbcfbad1569c93534d06100dsamba-client-libs-4.9.1-6.el7.i686.rpma166c2b09c6f97a640e46f351a9b5c6fe25f60ba4f79196feedc5e74cc37658csamba-winbind-4.9.1-6.el7.x86_64.rpme524e939230876fc9c36c75cf4963268f2410cba0d0c7c3e152e1876e93f7fc2libwbclient-4.9.1-6.el7.x86_64.rpmbdb16d2ffb586915f5efa4372d6efb00159986e2e4f004721dc7a61bfc8f53f9samba-winbind-modules-4.9.1-6.el7.i686.rpmc82c3b1b82cdcaba8ca65773a52a95953b021167f853a5abe4d9b559f5b9e3d8samba-python-test-4.9.1-6.el7.x86_64.rpmde371479d4d90474281ac7383278a409f822883bbe6ce9cfd1c28a7fae6fd556samba-python-4.9.1-6.el7.i686.rpmd738ab6f4113cf117b1a88a632f886ee750393a86efeb08bdb06ddad3d79b1a3samba-common-tools-4.9.1-6.el7.x86_64.rpme9b4f20159532525ba3a49fae2e2fb6e57fe44e427c9349e54ae86a43513233blibsmbclient-4.9.1-6.el7.x86_64.rpm2277e412060a0f70ae58a46996168f9b166e96aa7752172ed482f9ef551c40b1libsmbclient-devel-4.9.1-6.el7.x86_64.rpme9ed78f4b54767e43c02c37fe2207aef254dc8d52560fabf7e7018ac58452036samba-libs-4.9.1-6.el7.i686.rpmbfa0de6a5285721610f55ae458810206baae441489e6ed4eb4668595b63b76c6samba-python-4.9.1-6.el7.x86_64.rpm289c0dd007bd8a0a5e223217de1726459fe1c7db56d9657c053990389d0004f8SLSA-2019:2101-1Exiv2The following packages have been upgraded to a later upstream version: exiv2 (0.27.0). Security Fix(es): * exiv2: heap-buffer-overflow in Exiv2::IptcData::printStructure in src/iptc.cpp (CVE-2017-17724) * exiv2: out-of-bounds read in Exiv2::Internal::stringFormat image.cpp (CVE-2018-8976) * exiv2: invalid memory access in Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp (CVE-2018-8977) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: SIGABRT caused by memory allocation in types.cpp:Exiv2::Internal::PngChunk::zlibUncompress() (CVE-2018-10958) * exiv2: SIGABRT by triggering an incorrect Safe::add call (CVE-2018-10998) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: integer overflow in getData function in preview.cpp (CVE-2018-12264) * exiv2: integer overflow in the LoaderExifJpeg class in preview.cpp (CVE-2018-12265) * exiv2: heap-based buffer over-read in WebPImage::decodeChunks in webpimage.cpp (CVE-2018-14046) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)lowScientific LinuxScientific Linux 7exiv2-devel-0.27.0-2.el7_6.i686.rpm00af42e53ccdcdd2bcf83a6c1bafe45e33b78a4b6677410843516b4556ffd7e6exiv2-libs-0.27.0-2.el7_6.x86_64.rpmf5571a2cfeb70941bc3cfec25e7f90532f4ff6c0fe1e164edab5f88102bbe97aexiv2-libs-0.27.0-2.el7_6.i686.rpme7abba1a703cffdba30effc95a3b055c697a781ef9741a5c03991f71e0d10c25exiv2-doc-0.27.0-2.el7_6.noarch.rpmd881733ce982d42838762b1ec41a6ce2d324b511a628b5cecd3186a762c74cd9exiv2-devel-0.27.0-2.el7_6.x86_64.rpmabab0f13d029090bb4f6b0ffa4778dba54c66d46be672319a3f5f31d60aead86exiv2-0.27.0-2.el7_6.x86_64.rpmc56e4688f298c0b951ab918cec5e7e96b7f55d12c9b727422be846cb0043a0b3SLSA-2019:2110-1RsyslogSecurity Fix(es): * rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled (CVE-2018-16881)moderateScientific LinuxScientific Linux 7rsyslog-snmp-8.24.0-38.el7.x86_64.rpm09709fc9f836967294fad47de4fc79fe585fb7c2e07b378b74d242e750cb7dbbrsyslog-libdbi-8.24.0-38.el7.x86_64.rpm6079522192a516eea69b9a5277c326261653e1eecca2ca74336face581e141b2rsyslog-mmaudit-8.24.0-38.el7.x86_64.rpmdf447d46c271b458ac5ba3835c1be567926303a483ba8ad0888e809fa5553df8rsyslog-doc-8.24.0-38.el7.noarch.rpm42bd47d23b1ad297e032c24d530b0f9bf321fafac6c38957d1b726f91e2fdc01rsyslog-elasticsearch-8.24.0-38.el7.x86_64.rpmb68107ce4fd6dd1914b256350baa197ae8d07383375e56bc6ee9063a9a6b76c2rsyslog-mmkubernetes-8.24.0-38.el7.x86_64.rpm19aacc88f31bf9668cb3f5e0c08b70b35c7aca33e6efea79e94289ff205a76c9rsyslog-relp-8.24.0-38.el7.x86_64.rpmd3638b10f1887931b3116ef8216b99434fcb1375edec4a599e3ac991bc20575crsyslog-gnutls-8.24.0-38.el7.x86_64.rpmc6e4fa256c7e27a59a197c411e3e69740f7ece7fcd520adbb471812938ee1855rsyslog-gssapi-8.24.0-38.el7.x86_64.rpmb0ab139172cabd78d30b861199a665600b234c7a6f4ea0a7250db245b4c60c04rsyslog-udpspoof-8.24.0-38.el7.x86_64.rpmf5e5b31f4eeb083ebd8801a8d36668af1f6ef43e9402cd25a56a46e887de1903rsyslog-mmsnmptrapd-8.24.0-38.el7.x86_64.rpmab5753660d9d1526a26e9807b382802ded37833a8044dcf41db6b40c72d8cdb4rsyslog-8.24.0-38.el7.x86_64.rpme04d1cd2a6beb5ab0a0d4a700286023bea5561a7f99d87e079ef6ec5794fd9aersyslog-mmnormalize-8.24.0-38.el7.x86_64.rpmd47851ca4bab1e493ad7fe65117f02e3d8397aae75236519cd1c4a478b5a70bbrsyslog-mysql-8.24.0-38.el7.x86_64.rpm5e696e1d24aea3d71dd40026bd2f50913c34f5eb8ce9ca3d9a18269f301a566brsyslog-crypto-8.24.0-38.el7.x86_64.rpm00d5be89a18cdd8fba27d17babdc88c11947f00d93a76ef6b5a55f3917aabc96rsyslog-pgsql-8.24.0-38.el7.x86_64.rpm62cba1d5efcab7e8e7567beea50cda8e639dcd1d380db4d3856779bc0bbe565arsyslog-kafka-8.24.0-38.el7.x86_64.rpm4f9574a4ed06f86aeada79196323cc12d2dcd88c6adf517e2b0fc2cef46cf2b9rsyslog-mmjsonparse-8.24.0-38.el7.x86_64.rpm7c7dee5078444cf6d50e941860e2c852e5e2e62488309ed2302e05d8c02a1abcSLSA-2019:2112-1Mod_Auth_OpenidcSecurity Fix(es): * mod_auth_openidc: OIDC_CLAIM and OIDCAuthNHeader not skipped in an "AuthType oauth20" configuration (CVE-2017-6413) * mod_auth_openidc: Shows user-supplied content on error pages (CVE-2017-6059)moderateScientific LinuxScientific Linux 7mod_auth_openidc-1.8.8-5.el7.x86_64.rpm69a346bba4e4e38726f20404f022bcd466fb61e2804e7581bf7b40090d5f206eSLSA-2019:2118-1GlibcSecurity Fix(es): * glibc: getaddrinfo should reject IP addresses with trailing characters (CVE-2016-10739)moderateScientific LinuxtrueScientific Linux 7glibc-static-2.17-292.el7.x86_64.rpm49f50e24c589507e9948f025d230b6f5f3aab59ca3dca3c55952e331765782d1glibc-static-2.17-292.el7.i686.rpme17b5c3a9562cecb4e984394b253b220976c2f8a3be926f6de24a8d0c5f2e08aglibc-2.17-292.el7.x86_64.rpmd3e151b8844cf0a2e5de3becc0f1370ab03483557183708d253056bec02fc41dglibc-devel-2.17-292.el7.i686.rpm3db541f4a94f12b984d0f0ba2f7ef094c44aaf6c4b70558d49147c7ebc969a9aglibc-2.17-292.el7.i686.rpm1e16dc712b3f311bc6e1b718b663ef99ebbbfd71753885c83f5d5f79fb9accd3glibc-common-2.17-292.el7.x86_64.rpma2c0792213f3a012200a3bc98f855e5244dd18bf90da7cfa7d6ce04757c62767glibc-headers-2.17-292.el7.x86_64.rpm07d519db92765b4a2c23be932f112900626e49ea1b295181c27077285170e73bnscd-2.17-292.el7.x86_64.rpmac8a77010a3a1c77b70b03b4f0584e0b463874f53c69723c9c39da99e2b62ceeglibc-utils-2.17-292.el7.x86_64.rpmb8ce41ff6a007893f2c0b2092261080ca9fdad6f58f656bcd2433fefb5730cf9glibc-devel-2.17-292.el7.x86_64.rpm5845234ec70c0d6f90bc93bad5db3ce91bdd2eafbdf352717fac4b8955331856SLSA-2019:2125-1OvmfSecurity Fix(es): * edk2: Privilege escalation via processing of malformed files in TianoCompress.c (CVE-2017-5731) * edk2: Privilege escalation via processing of malformed files in BaseUefiDecompressLib.c (CVE-2017-5732) * edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function (CVE-2017-5733) * edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function (CVE-2017-5734) * edk2: Privilege escalation via heap-based buffer overflow in Decode() function (CVE-2017-5735) * edk2: Logic error in MdeModulePkg in EDK II firmware allows for privilege escalation by authenticated users (CVE-2018-3613) * openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) * edk2: Stack buffer overflow with corrupted BMP (CVE-2018-12181) * edk2: buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media (CVE-2019-0160) * edk2: stack overflow in XHCI causing denial of service (CVE-2019-0161)moderateScientific LinuxScientific Linux 7OVMF-20180508-6.gitee3198e672e2.el7.noarch.rpmec69ea1f27f537059545320e0eda6dea912a1771e185175a4c25e743b4276721SLSA-2019:2126-1LibwpdSecurity Fix(es): * libwpd: NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp (CVE-2018-19208)lowScientific LinuxScientific Linux 7libwpd-doc-0.10.0-2.el7.noarch.rpm4bd2834daaf2ca681fc73cdc0286504163f267404d46b841166cfd69b559c5calibwpd-0.10.0-2.el7.x86_64.rpm6ff7c5cd7ba79e1d8c8cc3375e9c3dbc501e911151fa66f33a8ecfa6106fcf37libwpd-0.10.0-2.el7.i686.rpm27f175af92cbd09b8e456dac3fdbe0106c89cfce3d56ce4cafb36c33a580e9b6libwpd-devel-0.10.0-2.el7.i686.rpm0030d67a739d64f4e82df0f13c63db9ad121e3d7292f485ae1f903d76bb18037libwpd-tools-0.10.0-2.el7.x86_64.rpm56d920c6ead371974caf2c9ec2ecea04f3afeb4d65ef2eee1734d79818a867balibwpd-devel-0.10.0-2.el7.x86_64.rpm4c6b4cecd1d0f36108be65affa6c638c163173e8935b1b13a18475ba35312366SLSA-2019:2130-1LibreofficeSecurity Fix(es): * libreoffice: Arbitrary python functions in arbitrary modules on the filesystem can be executed without warning (CVE-2018-16858)lowScientific LinuxScientific Linux 7libreofficekit-5.3.6.1-21.el7.x86_64.rpm359d0d3480c60e2c2a3ec2e8ea77b042fe78eacb11b42acb3659cd008df7a143libreoffice-base-5.3.6.1-21.el7.x86_64.rpmd90fd63a397d29f58e89acc5283ed5e1ed96e9715a8870bfc15f696ee3f07e58libreoffice-pdfimport-5.3.6.1-21.el7.x86_64.rpm9c1bdfdd6e22e5d44968e5f88f0e75600ab67daa34bab4c42a498dbb31767159libreoffice-help-pt-BR-5.3.6.1-21.el7.x86_64.rpm38475197be1b168c0878bc770dfb901ed9c5fa55c4247d0a93a56cc564bd673clibreoffice-help-fi-5.3.6.1-21.el7.x86_64.rpm25436276053b726333ce380b8eda618b3d5276d138d28411169b349cc72e60cclibreoffice-langpack-tn-5.3.6.1-21.el7.x86_64.rpm4f65f186b9babf20db43e28b751efa39436d9a259dddcf7c4f160013e4f99c3elibreoffice-help-zh-Hant-5.3.6.1-21.el7.x86_64.rpm74b8b653d527d02ad223e2cc5c06cc91ebc0312368c3e7de0e8c1f010074bb91libreoffice-help-lt-5.3.6.1-21.el7.x86_64.rpmb6d30d63169a471b70624ccd4293242d22506f1d91ca70475a1e342623b7e510libreoffice-langpack-si-5.3.6.1-21.el7.x86_64.rpm22b7dafd02eb7ff9d85173735d535e206d9e760366057ecadf479d2ead2409b5autocorr-mn-5.3.6.1-21.el7.noarch.rpm2999f81a0feab81b620684d162523325ce36286938128b3b8381e4005a408321libreoffice-langpack-eu-5.3.6.1-21.el7.x86_64.rpmee62c670383f3ded3158b5c414672a677cf0069f668d5a1244bff6b86f924f50libreoffice-langpack-hr-5.3.6.1-21.el7.x86_64.rpm19959489b91e46402fbd8a8287efa79858e88abeb10501698492656c659fda5elibreoffice-wiki-publisher-5.3.6.1-21.el7.x86_64.rpmb61cc3c373b7b7cab2f22dfcaa59226f5340ce28b128250c8ca6fdb7a2a44edblibreoffice-ogltrans-5.3.6.1-21.el7.x86_64.rpm7c4641b081ef706280009bc386b9ecb5732a568dc4371321d551a40cf3978034libreoffice-help-nn-5.3.6.1-21.el7.x86_64.rpm045c4ca6baa37df39ddae7ba1e5657cafe7599b55795a01781e89de234ce605dlibreoffice-help-tr-5.3.6.1-21.el7.x86_64.rpm92cb5aa3990e088ca5414ad5b4f5cf2e17f8ee4dbc042400e340ce76888bb737libreoffice-help-pl-5.3.6.1-21.el7.x86_64.rpm3ccae46b13a796ff91d0920e65e6dd93723362ac0796be13d0dbc68163c04b0dlibreoffice-langpack-he-5.3.6.1-21.el7.x86_64.rpmf2f041c8e2bdd7a2574ed3826e79b2d53c4cbe5b538505b9b46c814bf506cb49autocorr-hu-5.3.6.1-21.el7.noarch.rpm41e2586b409b74fa1561b39a45f9f1247625fd383aefdf13b8dc2300638e0a2blibreoffice-langpack-or-5.3.6.1-21.el7.x86_64.rpm2d7359cd90ce76eba177140d54b3a204ad0c58c2f7b480282bffb6ee79ffa119libreoffice-langpack-ro-5.3.6.1-21.el7.x86_64.rpmb786240efa527af84255a12112c03ce52731c4511f748305d6a0aa8fbca0610alibreoffice-langpack-af-5.3.6.1-21.el7.x86_64.rpm6b2cf436d02b00818f9ceea71bc8a95367252b3d1e4c6d2716c3dc8c7bda9642libreoffice-help-el-5.3.6.1-21.el7.x86_64.rpmc5c05d323597f55d5ae9d243fe0ae5cfbca9b0a5a31fd45dd18a13b78e036e25libreoffice-langpack-pt-BR-5.3.6.1-21.el7.x86_64.rpm9686f6305b96bbd5dbde438182b09937eb6750d708d2aae69a16f9c207791069libreoffice-langpack-st-5.3.6.1-21.el7.x86_64.rpmf0cdb03fa345ed2f07ea64d15aa23b5d8c1b8b1fca3a1c82fa67bf6e23f7cdbclibreoffice-langpack-nr-5.3.6.1-21.el7.x86_64.rpm40739a1dab273421e038973fea094d137e3678a0dc452a96d3edbc6e0601dc0alibreoffice-help-it-5.3.6.1-21.el7.x86_64.rpm985d9eda812ada7a2dc22c386b1514ab971ab0f1d8f290d549fa9f74cc72ec55libreoffice-help-bg-5.3.6.1-21.el7.x86_64.rpm9f44cbe347305d0836df44c20c342d37c8c1900b0e98056d82ac51c2107cbc74autocorr-pl-5.3.6.1-21.el7.noarch.rpm8e5725ea7eed2f7948638c5f74f070e44bd3905ada09b75221925f04127b3f00libreoffice-help-si-5.3.6.1-21.el7.x86_64.rpm456d07bfd5f72c275da09ac8eb0c52a30a1b16714f2f8bfb8be55c430e9f1693libreoffice-emailmerge-5.3.6.1-21.el7.x86_64.rpm696615a18cf5dacf60eb30dc9a22abd42324823781b118d36bb22933fcc0c54dlibreoffice-help-ja-5.3.6.1-21.el7.x86_64.rpm15a8798d79d2f4b4badacdea433e106007fbf716db429a02095246395eaa0718libreoffice-help-gu-5.3.6.1-21.el7.x86_64.rpm0f4ee67b2347c98f3904a8e672b16f3f48111dbc5a811db77533d964be5d1218libreoffice-help-sk-5.3.6.1-21.el7.x86_64.rpm70ce7d3b9963aba4e8a7aeb23d59a8e650c88b005bee9a9e1bed207968666b43libreoffice-langpack-ko-5.3.6.1-21.el7.x86_64.rpmebb6accd522624a2e8917b233344d91690f84f17bf6b9a8bf4099a21444a61ecautocorr-bg-5.3.6.1-21.el7.noarch.rpm020d50e50a22ef80bb79a6f7e3c412268c38ec060e14993195d854830ab22923libreoffice-opensymbol-fonts-5.3.6.1-21.el7.noarch.rpm22ff16c3b248df8aaaad8c60dcfbe8624a8a70980dfaf77fe6cb9d154315b51alibreoffice-langpack-mr-5.3.6.1-21.el7.x86_64.rpma278308946ca8b4abd21baaaf29609560ca343dbe9f1bc9a0c7ea43c7b2270cbautocorr-ca-5.3.6.1-21.el7.noarch.rpm8b7cf066402c88c176c619c30c8f6415dce7b51aca3035daa5225e2ea9d5ea5flibreoffice-help-lv-5.3.6.1-21.el7.x86_64.rpmea444a5c4f5656eb61e57ac7703e14a94b2b169a2da6ec7e9097dd3245c175a3libreoffice-langpack-dz-5.3.6.1-21.el7.x86_64.rpmcb2b07eea10129af10ae0be24d83e08ef1fbef045f28e3bd24aa0e6288b2f372libreoffice-langpack-xh-5.3.6.1-21.el7.x86_64.rpm5060ad112ff966dcd75105bff9f2142a058143a937a3ea84a42143c5198c6784libreoffice-help-hr-5.3.6.1-21.el7.x86_64.rpm62543e3cf4969b1d8cd6ed56a01a0dc5bd4357eb8a26e091f582a312f6526768autocorr-ja-5.3.6.1-21.el7.noarch.rpm2261a184af543fab88aeff61403b1c621922770b910e1a53e9b1c3218ea21c96autocorr-ro-5.3.6.1-21.el7.noarch.rpmc552b1ec3907083693bfe7a9c04cbed751fdb8be211fd7737a4a5d94c389f34alibreoffice-help-es-5.3.6.1-21.el7.x86_64.rpme2c9dc8a4bc0e53a2543dbf9ee88cd2de120b26ccc13b1fc79343ef948978f50libreoffice-langpack-te-5.3.6.1-21.el7.x86_64.rpm17aaf54d67e7324cba8ef0ad7a29582bba6faeca2c30899fabfcd6f30cf052d4libreoffice-langpack-zu-5.3.6.1-21.el7.x86_64.rpmfba19878e9b260f6c42081b1d88c7e8fbbbf598f672d2b17148782ceef77f827libreoffice-sdk-5.3.6.1-21.el7.x86_64.rpmdf5765d9f98151db4d55c4e686c62acda6c5fedf1559a34cd2c0e514853bd4bflibreoffice-filters-5.3.6.1-21.el7.x86_64.rpm18593c36e66210f031e19f862ac3b998b1472f3baa3c41b2937e8a13df2012bclibreoffice-xsltfilter-5.3.6.1-21.el7.x86_64.rpm5fee3acf9f01c12b7d04fafc55592f90379d3f457e18e21b6a9b198175ed9eeblibreoffice-langpack-ml-5.3.6.1-21.el7.x86_64.rpm83402c0dade8888c578a5279ee61003753cd8664db9f1e04a4c1ed319796172elibreoffice-help-fr-5.3.6.1-21.el7.x86_64.rpm33e04864a273383d6ae17499bb4db86248a3cac9e36dfb0eb6c9f0f1067432c6autocorr-sl-5.3.6.1-21.el7.noarch.rpm766ff158b19e7c58c6cf9cc9435da6b1359887024ed9b50607f0546fafdb322flibreoffice-impress-5.3.6.1-21.el7.x86_64.rpm297ffdfe23ddd2ca5b00e5bdc5c57b5ec3d88dd6cf38f86890ed7df5a7655f4blibreoffice-langpack-bg-5.3.6.1-21.el7.x86_64.rpm01d4cc371d9df5f3bb0f2aa75dbeca33d364263c4f166f03173867a78e4f47c7libreoffice-langpack-kk-5.3.6.1-21.el7.x86_64.rpm82339ca3adf16847d112b88737e20d769227d70c9b777469a76288c793ed5875libreoffice-help-uk-5.3.6.1-21.el7.x86_64.rpm2cf842c343f92e3c50e7766fc0cb7ed97bd18225bbec6ca953b0d4329b324642libreoffice-langpack-as-5.3.6.1-21.el7.x86_64.rpm0f4de6a007f90b69b979f88521dfa39528f382f6a8eb2d4f41d9688ac0304343libreoffice-langpack-gu-5.3.6.1-21.el7.x86_64.rpm17f092a4badb5d0a40a940201087397d7bf22fc96911631995278028ed772330autocorr-hr-5.3.6.1-21.el7.noarch.rpm85ab9cd94bd58cd29fbd6b2afd06278abce9b2781f880546d5d6d7690c7881f1libreoffice-langpack-mai-5.3.6.1-21.el7.x86_64.rpm38b176702daa7d52bf2f25affe56a62b38d35a5868b4d8c3d4bf71bd99f3ad5dautocorr-ru-5.3.6.1-21.el7.noarch.rpmf32d4e63a6a040caf6ecf60b1ad46a9649d6b9a3eb56ad69612c710eb7ba3476autocorr-tr-5.3.6.1-21.el7.noarch.rpm3aa1519f86f5eb495e3847d884c6322269b012817049a0bafb3e248653897f8flibreoffice-langpack-it-5.3.6.1-21.el7.x86_64.rpm4b224554ba2a41745d16ff9748f8e233fb94b847b1bbb0aecc6560c7415682c6libreoffice-langpack-pl-5.3.6.1-21.el7.x86_64.rpm2bf6037aa76d33320effdf3db24bc3fdbea97f5cd25afe0d2070a339bfa82c63libreoffice-langpack-ve-5.3.6.1-21.el7.x86_64.rpm2aff83d400da26ca5f56a5960ac77c5007e924f726eaea2150aa6bebc3db213alibreoffice-langpack-cy-5.3.6.1-21.el7.x86_64.rpmfcff4b7da1c4bbbb0f674decf2ac45c0b6ef1a87f450e0f0a9f22f72ccbf3c2dlibreoffice-help-pt-PT-5.3.6.1-21.el7.x86_64.rpm55b46a96a9734663af698008f0e0815a4daa7eea0db75c200a724918488a57fblibreoffice-help-sl-5.3.6.1-21.el7.x86_64.rpm334b22e1e465618741f7039db513cb567995002a0bcd00ecb0259ef4b6bf6076libreoffice-5.3.6.1-21.el7.x86_64.rpm86e4df83bdd52355799bb793dc8e4645d0d57f9c78511ada3647115a785693ddlibreoffice-help-ko-5.3.6.1-21.el7.x86_64.rpm91714041dbd319fdbb4eccb36a5d1db6fd29ebc94745561698748ee10e74f60dlibreoffice-rhino-5.3.6.1-21.el7.x86_64.rpmce13c6c9f4ae229a58e934f8554f3a3a136cf4c0dbfaf6ee0ec16d182d264969libreoffice-help-hu-5.3.6.1-21.el7.x86_64.rpmdcc343cbc4c6fe52a93415224b136c90c359429a742fffb4b3e9817cd5dc69f2libreoffice-langpack-ar-5.3.6.1-21.el7.x86_64.rpm03ef77b264dfdfbca603ee81043b109a3f1d40ce1d37f3b73c37d751868daee3libreoffice-help-sv-5.3.6.1-21.el7.x86_64.rpmc86d0fc59234d7182cefae772b565d5d8b18027fc7f7b2a343d323fdd289b325autocorr-is-5.3.6.1-21.el7.noarch.rpme23b8834dff6c6f455b6de3504d735f7b335789b798e341c8f8cb5dfbb2b01aclibreoffice-glade-5.3.6.1-21.el7.x86_64.rpme45cf1325152f4e6d40a047ac1c4b3f940d069c86db271bbfa5fe118371f9352autocorr-ko-5.3.6.1-21.el7.noarch.rpm6f6372e4562118073db59136e68a2cc7e0f5fde6e37e0c83eab4441402533a99libreoffice-calc-5.3.6.1-21.el7.x86_64.rpm85d620eba8ec99765637954a29e873b9966b8f08f0cee2039acfcbcff48ff49flibreoffice-langpack-ca-5.3.6.1-21.el7.x86_64.rpm9e5939d61d20c1b94ce9019787976959dfd1e1c91bf441eb176b885a584dba60libreoffice-langpack-nl-5.3.6.1-21.el7.x86_64.rpm365fc9a9bc019be9de532bbbf6c146a55852489e00b1a1972904b62f7badc865libreoffice-postgresql-5.3.6.1-21.el7.x86_64.rpm31f984b0c909ba1990344e3687c412348df9b99fcc2bd85eb98277fc3d429829libreoffice-gdb-debug-support-5.3.6.1-21.el7.x86_64.rpmfcb9d32b1bc34cf53b2acfc4872c105c6b6482ceee655074064d8bbdb4ffa7e4libreoffice-ure-common-5.3.6.1-21.el7.noarch.rpmb36bf4766ebeb10b177f41ca6eb75e668d93f675788456020ef8506c81c1c4b6libreoffice-langpack-ga-5.3.6.1-21.el7.x86_64.rpm8b23d8dd2d8659488fbac897b95e3f811eccc1c5b0027206827f252cab81882dlibreoffice-langpack-et-5.3.6.1-21.el7.x86_64.rpm37fd2e31532397c6364f72593ef2461791e1ab92145035a1cb7985d6a3b35fd6autocorr-sr-5.3.6.1-21.el7.noarch.rpma47140c802427c27788666e24c0ea80a591f6b0c9886f3808892bfaac2205a4aautocorr-sv-5.3.6.1-21.el7.noarch.rpmb0a5ddd0c846334ee34400b0351fe365249af1465eb72f46dbeb81cf5c01fb9dlibreoffice-langpack-nn-5.3.6.1-21.el7.x86_64.rpm57e63cb2f1d9a3df3c1b9094980f5d2c9c3b4621c84c5989c28473ee734a404aautocorr-lt-5.3.6.1-21.el7.noarch.rpmf65ef377a6bab1f3fb17f2a448171bcb331cdccff4c51bff5a280c83f6fd98a3libreoffice-langpack-fr-5.3.6.1-21.el7.x86_64.rpm3da4ce3bbb5cb2bd4c585193ddfdd13c4a96711a135e2c7abbd30942319acf7flibreoffice-langpack-kn-5.3.6.1-21.el7.x86_64.rpm80c58fc78e8831df1311d06b15fa8abe568893c0ad9280dd6ca1aba6ef3e904clibreofficekit-devel-5.3.6.1-21.el7.x86_64.rpm1876975595c9e777865966dba1b44b6c9725394eccfb1841d2d861f54112ac53libreoffice-langpack-zh-Hans-5.3.6.1-21.el7.x86_64.rpm0a64e443581f77688425161f50de79438d34632c8fc45c46a2dbeee26f8cb62bautocorr-fa-5.3.6.1-21.el7.noarch.rpm977d3bf675bf2fdd77c67db851d6a9f0f4fd08e4f63cd8b8fc8b816efe1ecf57libreoffice-langpack-uk-5.3.6.1-21.el7.x86_64.rpmd39d1bf6ae53a53eb40a2b4e9a05420f1fbc22a53d97c514ec2ae69da76e9768autocorr-de-5.3.6.1-21.el7.noarch.rpm5de780d72868c2b960925e383d8441dff579b64fea3aecc486f34454a81b7b84libreoffice-officebean-common-5.3.6.1-21.el7.noarch.rpmba9855b11a469811efdf7c0e0bdbc16475dbefa5c3c1c603edbabc93e1967ac5libreoffice-langpack-nso-5.3.6.1-21.el7.x86_64.rpm971752a84593a5fc223c998161333fec2f6434e352c8fa103ac588f8b79cc899autocorr-da-5.3.6.1-21.el7.noarch.rpmc91c3bdfbd2321083f497bdf28acf166804c5ee9d6a400d7539c1b91a9b06f4dlibreoffice-langpack-br-5.3.6.1-21.el7.x86_64.rpm08d0d0ae636a8ea2c9ca80668a1ce61a06517ac28d774c309aefd2be36f00eb9libreoffice-nlpsolver-5.3.6.1-21.el7.x86_64.rpmb6ebccecb1d6e254ac6ea7f57de0a5ebcc8203989653c3cea85d07048f2f5398autocorr-lb-5.3.6.1-21.el7.noarch.rpm3392664b47338be628db482c94b29003ec28619a6f555f39798fc718622a6d85libreoffice-help-ar-5.3.6.1-21.el7.x86_64.rpm28528b3f407a786cc06481fd7a16c2fb8e136b984c0f0552518b91744b250eb1libreoffice-librelogo-5.3.6.1-21.el7.x86_64.rpm723deed94495ed8d4b880ce5c4b3b02612444c6e0a3cfb9ac279cfeb1e27ee07libreoffice-langpack-pt-PT-5.3.6.1-21.el7.x86_64.rpmd1435220e18eaaba95b0c77d25452925a22776b5004044b484e4632d36f6086clibreoffice-help-ta-5.3.6.1-21.el7.x86_64.rpm16e42ee3e6847dce27d58b93348bed32c15298e01be5fd36e3cbe96df9fb067dlibreoffice-langpack-hu-5.3.6.1-21.el7.x86_64.rpm8ca22a96d591af6f97abbbd10dc8d2805c19db216164d8d0d522b1e128be1c91autocorr-ga-5.3.6.1-21.el7.noarch.rpm300f0500edbdcc2f8c1afe3b7a88a48183e1ea8506f4fb3a64f5b36a4d7e2a32libreoffice-pyuno-5.3.6.1-21.el7.x86_64.rpm8943bba4f3c697a3fbc346616b06b3262f235eb5696d39fdc5594f8a9ae2ed9cautocorr-it-5.3.6.1-21.el7.noarch.rpm0ca9e449408c536a24cefe153cfb9fbb27e4080c07a76f1e86e752aed0c812b6libreoffice-help-id-5.3.6.1-21.el7.x86_64.rpm8cbe1d83ca6469d35d234fe7c8f626f0dd769f57c86b47f0ca7ded04f680d51clibreoffice-help-nl-5.3.6.1-21.el7.x86_64.rpmed423aecdf21de0005b254842dd2ecadd4f45ad322852b6198cd9b2cc6ca1ee1libreoffice-x11-5.3.6.1-21.el7.x86_64.rpmc41cfa24dc9a67e4408c12e2373fb86f588039ef6db6541698766e891c594030libreoffice-help-he-5.3.6.1-21.el7.x86_64.rpmeb33875b380a6aca7a873bda6fc5d977ad4ae5bae76088123731f8bdab07a517libreoffice-data-5.3.6.1-21.el7.noarch.rpm85eb7c760770c2355617601075abb806322ee5d32df7b06267c96bbc1fc736a7libreoffice-ure-5.3.6.1-21.el7.x86_64.rpmcc70ec2915baaccc6fa1824515eb3efc6295120b921e07fa2e108cff8a1a3d65libreoffice-langpack-sr-5.3.6.1-21.el7.x86_64.rpm1a371769195584e03527a66d5115614aeb8e055f3b1086c605e9f2c8d13afad2libreoffice-help-zh-Hans-5.3.6.1-21.el7.x86_64.rpm0dc9ddb783a9465a7790f0cfc1e45d6810a9d8b2e4a6f4c73e023fb2de98547dlibreoffice-sdk-doc-5.3.6.1-21.el7.x86_64.rpm3aab3291d1b01b0e005a2f9c07c499966c05aa25a4bea9fae0cde867e834f47clibreoffice-langpack-tr-5.3.6.1-21.el7.x86_64.rpmaa6c19707493dc8dd34c7a37232377870fb9d1ac417a27d7d76418723749de7dlibreoffice-langpack-sv-5.3.6.1-21.el7.x86_64.rpm4dd72c073b55dc04487c8c72709f25c01724ef6d6cb0deb02732776e3605fe54libreoffice-langpack-ts-5.3.6.1-21.el7.x86_64.rpma2089f5630652830a219d18dc6067b19997c494a03a41d51e96e568aa8935623autocorr-nl-5.3.6.1-21.el7.noarch.rpm092a6e14137f6a8b1bd63360b05d59eeab0280cbeae1501b257a5fc3e4d02eablibreoffice-help-ca-5.3.6.1-21.el7.x86_64.rpmb44b70b6805da3957c6aeb16667c93d74c092d3e536b60829b39202fb6ea4d91libreoffice-help-hi-5.3.6.1-21.el7.x86_64.rpm1f6e55ae9cad0ecebed298966c3e6041223e5fd3c96b9b201c3e393317c9f972libreoffice-langpack-cs-5.3.6.1-21.el7.x86_64.rpm28efca78cf611e1194eeabef322e72bec3890e7fae3912b47fb79b1da525c42flibreoffice-langpack-th-5.3.6.1-21.el7.x86_64.rpmca0cc16fb189717a478c060795008592e625eddaa51401ee6e07d01f25c3de16libreoffice-langpack-ta-5.3.6.1-21.el7.x86_64.rpm008882dcd84ac646950c9b960dac2de62d13dce95b84e117c3c9d57ad42afecelibreoffice-langpack-fi-5.3.6.1-21.el7.x86_64.rpm73f665b23905bcd7aacb63fbbaa5180a191e4c294169a09238f0eb775275e60flibreoffice-langpack-lv-5.3.6.1-21.el7.x86_64.rpm01da12ee23a698aae6aa0c7a8642508380a877f18da0819893e508e363890170libreoffice-draw-5.3.6.1-21.el7.x86_64.rpm8f55f125d42a3b569f578d9e15d9d4bf2c3d045fd29ee4f1b461b599a67dda0dlibreoffice-langpack-nb-5.3.6.1-21.el7.x86_64.rpm9bb0a7c214d2ef9da0b022df88a5a568306a74cf2ef4434a220a9999bc41b91cautocorr-af-5.3.6.1-21.el7.noarch.rpm154769b7e49ba7dbd3702b79db1fa764badc12492d06b38d57226d54533149cblibreoffice-langpack-ss-5.3.6.1-21.el7.x86_64.rpmd8213fefb56a9072a263a929370793d1313c5f2d9ecc099123520f2720151af8libreoffice-langpack-da-5.3.6.1-21.el7.x86_64.rpm3202d5d924482d74ef0b02d023b090004a27d1055bcfda762f2aaf2e30ce424cautocorr-zh-5.3.6.1-21.el7.noarch.rpmb0b1869022819164c1c26e73c13c97ab78644415033d2195bd2ef71e0233c092libreoffice-help-dz-5.3.6.1-21.el7.x86_64.rpm06a7446fe3dd04ebe1168cc7e1f122d44a6ceeeed9fae771f8bee69ecb09d9beautocorr-sk-5.3.6.1-21.el7.noarch.rpm2931d9fb4c349e09750c2752367c97163d2d2874b8e446ffa90da0ff1c8b863blibreoffice-help-ro-5.3.6.1-21.el7.x86_64.rpmd628fd91045eccd48bf0e55d17e8e55805a22e11ac664b8517b260b008377aaelibreoffice-langpack-en-5.3.6.1-21.el7.x86_64.rpme1528d3106bd3625e6fb8528e3875124966b2b0d31223a3e96bd2b92a9d638ffautocorr-es-5.3.6.1-21.el7.noarch.rpmd6320aafabee518b11ee8ce8a36443b2b04cbe7aae57bc5d05dc6fc71f68eccclibreoffice-langpack-lt-5.3.6.1-21.el7.x86_64.rpme35e3486c35c0dde70e72898294c71347558f3ea41ee6473a69dc45b8074546alibreoffice-langpack-de-5.3.6.1-21.el7.x86_64.rpm9b89a9a29b0eccb2e1777c91cee430ce6a0992fb3dc4297e15293893febe40aclibreoffice-help-gl-5.3.6.1-21.el7.x86_64.rpm04dab2e090da3dae910f10ffa67b0cd9adc0253672925dcbdcf81506d75d9239autocorr-pt-5.3.6.1-21.el7.noarch.rpm1685982c38c444ffa69c850b91dab217e33c5647d376acea4b88a5467090ceddautocorr-fr-5.3.6.1-21.el7.noarch.rpmbc067f1603aaadcda348dc0d36cb98d229b7189f32ca2c4b84442b1cfe0e936alibreoffice-langpack-fa-5.3.6.1-21.el7.x86_64.rpm32c8c161486782dfba2feb2e06d6bb60872e7dc5a7c948b36f5925764c523e76libreoffice-core-5.3.6.1-21.el7.x86_64.rpm1ae88e968658b4497a52a5d6ac863d72b672ff478c7df87043409d8670c4da2dautocorr-cs-5.3.6.1-21.el7.noarch.rpm363a409cfaa7b37e982bf73f286ffe1c3b6f4e2d972964833b2a118d5178f9e2libreoffice-math-5.3.6.1-21.el7.x86_64.rpmce8a6c1a856595197239715070e61a117aa293b2ed3c080978a73a1a694a70f1libreoffice-writer-5.3.6.1-21.el7.x86_64.rpmac1fa31cfdc1d0dabca9907bcc2c5432884b045f708e619630416dd17afe86aclibreoffice-langpack-ru-5.3.6.1-21.el7.x86_64.rpmbd96623c4dd7e42d9d7790604be6cec1f37277aa257f37295265d6645c7f4e1blibreoffice-help-bn-5.3.6.1-21.el7.x86_64.rpmc23f7cf99667175101cbcfc8e715d91a3e427469b42747ba4008772d61636ea8libreoffice-langpack-bn-5.3.6.1-21.el7.x86_64.rpm4554f93c5198b5a64e8831f4c7c14dd745900e2c0ce1d782670d6b399fd4e1f5libreoffice-bsh-5.3.6.1-21.el7.x86_64.rpm4d2ad2c7e546cc5936cffd9aa5a476ac6ff9555fcf05131e71fe6d0241f4974flibreoffice-langpack-hi-5.3.6.1-21.el7.x86_64.rpm038d9dd821212278918a0e2929034f103402cbe006ed53de34990a1ca6155a59libreoffice-langpack-ja-5.3.6.1-21.el7.x86_64.rpmefa46fd9eac871f3ee7e2c0ecaaf8e4fcfdd317f54c88ec75476c7cda1235e53libreoffice-help-et-5.3.6.1-21.el7.x86_64.rpm3ee20df121414db1b36034c1f519885362ca0ac70d07934defd35dd66e401889libreoffice-langpack-pa-5.3.6.1-21.el7.x86_64.rpm4c98d4ba3f31d799c1668c228e142e9a6785cc6b8ee28cef1eea9a072299bdealibreoffice-help-eu-5.3.6.1-21.el7.x86_64.rpmc6d36abec441ea41037daac8de37539e48352caa2ac669bad17b5bf7f1108be5libreoffice-help-cs-5.3.6.1-21.el7.x86_64.rpm59cbc09835fbd5e0e1f6670b365950e40b501a4cbdf6ccdd7561c14ae33033edautocorr-fi-5.3.6.1-21.el7.noarch.rpm168b94c7602fdee50cf0ad431f358ef1fe7a31b485bcb93323ee0e6c82fc34eeautocorr-vi-5.3.6.1-21.el7.noarch.rpm43155f401e218709fa09056969a7f17ae274c1b49b926b6c660e44562197a14blibreoffice-langpack-gl-5.3.6.1-21.el7.x86_64.rpma2569128224323862f1160e4b9c61e081e9a003cd5b9b8495fb37bc0be4c6e26libreoffice-officebean-5.3.6.1-21.el7.x86_64.rpme53512f879c5f4ac5c63a60b5ab4de3c2e403e0a0515ab5f3beed0ed6c86537clibreoffice-langpack-es-5.3.6.1-21.el7.x86_64.rpmf99cdb436be48453133cf7c047fdb6b357387497861eb8d3a50f0555c950dee2libreoffice-langpack-zh-Hant-5.3.6.1-21.el7.x86_64.rpme0a2c4a62455ad36985dcbd5f2a5948a6718cf5a195b76cc6a8946c708a4da05libreoffice-langpack-el-5.3.6.1-21.el7.x86_64.rpmd474a4184414809f6c98cd9d02fdbffabd7ee718b4f045517ec9ada0e0a6e15clibreoffice-help-da-5.3.6.1-21.el7.x86_64.rpm348d3339ff3fa6fe916ec4aa1768686502849c41f737c95ed5d064e883d3e823libreoffice-gtk3-5.3.6.1-21.el7.x86_64.rpmde11fc19c78875e62c81b669af6d3e49bf6799081c1167b509f6fb1c0d82a24cautocorr-en-5.3.6.1-21.el7.noarch.rpmda5cf942bbe7a53bf578034c2378281f0aa01061d50cdc35d238e073fde74d69libreoffice-langpack-sl-5.3.6.1-21.el7.x86_64.rpm35152ad20e0871cc07954b5ebaa1e9fca9812c47c12c2a5346d30c51a9e3d822libreoffice-gtk2-5.3.6.1-21.el7.x86_64.rpmbd47ae987cd6e04bbc871dd485992bf88a37d6be98167873843bd50fd1dc25dflibreoffice-help-nb-5.3.6.1-21.el7.x86_64.rpm6926d9baa39f6651c01abe4f69ad746c8ed576e5397cada1a4ed4bf2388e6d2flibreoffice-graphicfilter-5.3.6.1-21.el7.x86_64.rpm00130ac5aba73b94bac0b7af38f71d57ffefb7df82a8c45e553cc3271bddca1alibreoffice-help-de-5.3.6.1-21.el7.x86_64.rpmc8e2c72625181bc372236c75940404fbf15ec00da8e2ecb1b171f98f0e591acalibreoffice-help-ru-5.3.6.1-21.el7.x86_64.rpmfb51bcc49dda3e48b0c64ee35c284dc5e2c14bd45d0a545c31cf4ebeab06f6b6libreoffice-langpack-sk-5.3.6.1-21.el7.x86_64.rpmf0088df61485ca68f6daf023b827e74f25c00aac63132da9e0444b53299dd279libreoffice-langpack-id-5.3.6.1-21.el7.x86_64.rpm4e8279770c27dfcae60ddce213b20804e6f8b9cab60552948ffddd12c0645687SLSA-2019:2135-1Qt5The following packages have been upgraded to a later upstream version: qt5-qt3d (5.9.7), qt5-qtbase (5.9.7), qt5-qtcanvas3d (5.9.7), qt5-qtconnectivity (5.9.7), qt5-qtdeclarative (5.9.7), qt5-qtdoc (5.9.7), qt5-qtgraphicaleffects (5.9.7), qt5-qtimageformats (5.9.7), qt5-qtlocation (5.9.7), qt5-qtmultimedia (5.9.7), qt5-qtquickcontrols (5.9.7), qt5-qtquickcontrols2 (5.9.7), qt5-qtscript (5.9.7), qt5-qtsensors (5.9.7), qt5-qtserialbus (5.9.7), qt5-qtserialport (5.9.7), qt5-qtsvg (5.9.7), qt5-qttools (5.9.7), qt5-qttranslations (5.9.7), qt5-qtwayland (5.9.7), qt5-qtwebchannel (5.9.7), qt5-qtwebsockets (5.9.7), qt5-qtx11extras (5.9.7), qt5-qtxmlpatterns (5.9.7). Security Fix(es): * qt5-qtbase: Double free in QXmlStreamReader (CVE-2018-15518) * qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service (CVE-2018-19869) * qt5-qtbase: QImage allocation failure in qgifhandler (CVE-2018-19870) * qt5-qtimageformats: QTgaFile CPU exhaustion (CVE-2018-19871) * qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file (CVE-2018-19873)moderateScientific LinuxScientific Linux 7qt5-qtwayland-5.9.7-1.el7.i686.rpmfba68ee7116ffaeb761d93d27ab13ec6c3dce6977ae826a648bfc76fe5aba661qt5-qtdeclarative-static-5.9.7-1.el7.i686.rpm25a5b34b17367f470fabba947cdbb56e3c8881ad81214698325f26076c7d0497qt5-qtconnectivity-devel-5.9.7-1.el7.i686.rpm2fd4a0514e144955fd3a669482adb898a535bef4f34d9183d49591971e6c1b94qt5-qtmultimedia-5.9.7-1.el7.i686.rpmc927e0ee756f670ee5742647106cae5892b7b20500c7bfda953f2ea9847ed27aqt5-qtserialport-5.9.7-1.el7.i686.rpmcdfa41fe64fdfe8bbb17c64050769933b873a1c7dd37dc0b41d0bdd4524edb90qt5-qttools-common-5.9.7-1.el7.noarch.rpm754b3c169de6debc6b08b4dccc22656a64798c955d65c936ebc9ace8f357470cqt5-qtwebsockets-examples-5.9.7-1.el7.x86_64.rpm1aacd2cfd657d0426b9b9b4da680a7bd12d739fcbaa6aa08067b85d8c6b4ac11qt5-designer-5.9.7-1.el7.i686.rpm4c6d434711267f05c9dcea1c27e78e084f025e837507e57c3eafc10f8952b27dqt5-qtconnectivity-devel-5.9.7-1.el7.x86_64.rpm927aeb7ae6c5d0280f3005a210d964f7730a87611695f93ac8f95022c1739faeqt5-qtscript-doc-5.9.7-1.el7.noarch.rpm51a442f8bd9bf31ddf4184291cff8f9a7e41be213f9cf5f246506eb88b076089qt5-qtquickcontrols2-doc-5.9.7-1.el7.x86_64.rpm647b0d2e93e29a67e6ad8800f92291069daea92071ee44e7a9793373b432a7fcqt5-qtserialport-5.9.7-1.el7.x86_64.rpmee6779cda4e8bad1de3e95a3863f1a0a07e7a64ba6727c077ded218b2e9886e1qt5-qtwebchannel-devel-5.9.7-1.el7.i686.rpm7e05ae0432aa93a2aef0917868c5372c36cf63211974a6f4baa1befa9f66588bqt5-qtbase-doc-5.9.7-2.el7.x86_64.rpm8b6e0f1fbb7778cd11dfb81ee688575bf22319e2a60418acc5e3bff150af85deqt5-qtx11extras-5.9.7-1.el7.x86_64.rpm3213f297554619066cc74845c09e8977fb262cfedd2c9f3ffa1e12e336b161aaqt5-qt3d-5.9.7-1.el7.x86_64.rpmb85798f5dd0c8573cdf4916fef96c87133f6f162657192e8b89a777e33710c4eqt5-qtwebsockets-5.9.7-1.el7.x86_64.rpm61b5eff50d6e2d07c05363161d6d6073bff27279da4a19053b892bf7172def67qt5-qtwebsockets-devel-5.9.7-1.el7.i686.rpme95df498574fed70f9df8c1ea70a9b2ace35f2cfdb87fa19c107bcdfda20cd3bqt5-qt3d-examples-5.9.7-1.el7.x86_64.rpmc95842bc388fde5deb86dc3c6f0537c66929bd5bfa12d2fba1df40153664ab0eqt5-qtquickcontrols2-devel-5.9.7-1.el7.i686.rpm996f79a2063f12c9d5fa2b0c84f2585ebe250b726d0115846d3674fd8a4fcb70qt5-qtwebsockets-devel-5.9.7-1.el7.x86_64.rpm8cb758227b83e440dd950a45a1e2c5f29b1c4fc77dd723fea0a56d1ebb2a1ec0qt5-qttools-static-5.9.7-1.el7.i686.rpm37bbb85e7507a17737c8907c95e3f1280ed89316050ae5f5b516978764931b2cqt5-qtsensors-devel-5.9.7-1.el7.i686.rpma73d315c05df9ff90d670aaae8fdb1c464e2a50088cfa8e39cf52c431a5bc9a3qt5-qt3d-doc-5.9.7-1.el7.noarch.rpm869f6e90e2e6aa08ed4379b6797e163e6cc2870a2acefb27b898b315f32701cdqt5-qtsensors-examples-5.9.7-1.el7.i686.rpm5c94e368958478eafe68cd3f6f91c5ecddff6d2735ebacfb6190fb75bcf9253dqt5-qtdoc-5.9.7-1.el7.noarch.rpm1aa1d66f59d21cfc6afa8a5142062a442a1e0e71622629b45f2b86d37c41969bqt5-qtwebchannel-devel-5.9.7-1.el7.x86_64.rpmc30c9e35d6fc54370a039429bf418d6d599b7c131c332511b7c6613d8fe0efabqt5-qttools-libs-designercomponents-5.9.7-1.el7.x86_64.rpm0f4f91c633c4c7c4ede915bdfb34076a1291760e3661122c38740fd7f81b17caqt5-qtdeclarative-5.9.7-1.el7.x86_64.rpm897111207b0ba1e24f0983e3870e9c566d4b151b84927deaeb287b6098d6c002qt5-qtmultimedia-examples-5.9.7-1.el7.x86_64.rpmce434a402e5ffe17e2f5483ebd4a809ab5b9f8f4c688906878e00d3cd57aec27qt5-qtquickcontrols2-5.9.7-1.el7.i686.rpm3fad049c05f32df1bdbe72849e6d8cc68ac9bafac5a28ea664ef804303bf3331qt5-qtbase-postgresql-5.9.7-2.el7.x86_64.rpm21be3f89fa15c79cabe52d5f77a21972e12cd5ca2485df6089ac31ff0c08517eqt5-qtimageformats-5.9.7-1.el7.i686.rpm590bf51630f86b11208c68b78aa96cb35e4ecc0242f5b991516afa2b7e6eedcbqt5-qtbase-mysql-5.9.7-2.el7.x86_64.rpm98190178faa9fd320b300fb2ad20f50422f7bcc405332ebf79d6f5429bbec3c3qt5-qttools-libs-help-5.9.7-1.el7.x86_64.rpm55115acb856cae8ccc2b2263092872273e42a4d9b16c3b428d018d0b267d516aqt5-qtbase-gui-5.9.7-2.el7.i686.rpm4b831754b5f0884a93e18b2ff810a84e9baa9b78841d6e76643921c2f6f6cb01qt5-qtscript-5.9.7-1.el7.i686.rpme2429ba227f355de76267d23e7a740d3fa6edbee952b2ffce46aa20831e353a5qt5-qtsensors-5.9.7-1.el7.i686.rpm8bab2eaa6b8240bf8785be16263848304bed9b2c8378fc21c97a80e54233e2afqt5-qtbase-odbc-5.9.7-2.el7.i686.rpm58fc91f964dd089a8b732a5096029fb3da7dc2a3924b0e8ef1f9f9930ec2dd46qt5-qtquickcontrols-doc-5.9.7-1.el7.noarch.rpmdd6866d2d67f160d720e984d6ec50218188ce3b5156af568a968fe78395de0ebqt5-qtquickcontrols2-devel-5.9.7-1.el7.x86_64.rpm68ffcac74b90546d411f7a808d261a5cb6eff92d4dfd30201acbf3d8ffa05ad6qt5-qtlocation-devel-5.9.7-1.el7.i686.rpmbd68ba42dec78d2acb7ab7cfb5c3ac212609dc0958be4a9e71abaea9adea33cdqt5-qtxmlpatterns-devel-5.9.7-1.el7.x86_64.rpm1dd97f0222e3d5cb35cdc07236f9f50fa7e390b0f44af290d19811a3b3a84d55qt5-qtdeclarative-devel-5.9.7-1.el7.x86_64.rpm94fb265781559bd009314db8ec622689b35b1a9b52f08fb1e3b94ca8bb4c6501qt5-qtwebchannel-examples-5.9.7-1.el7.x86_64.rpmd94cdb49b3bb60c0b0f21028ba1a589621ac8b48a2a72338671ecb053548ab7eqt5-qtwayland-devel-5.9.7-1.el7.x86_64.rpmdcd688c9a5603da6c3452b16c01d29e3c0f93e2bb87b3766a888e822527d8e9dqt5-qtwebchannel-5.9.7-1.el7.x86_64.rpm4f67b3468978e8ea40fa1d9ff4e964bcce7b779a56b75e580101a76f131b06fdqt5-qtlocation-doc-5.9.7-1.el7.noarch.rpm3111f0697fe6d5f2075caf1af8e35f5c342b44cded42c4e1f91707e16f96325bqt5-qdbusviewer-5.9.7-1.el7.x86_64.rpmbc55922bdf091e323dbee6632c380352543cafa5b25d457fb3be77006b330eb6qt5-qtlocation-examples-5.9.7-1.el7.x86_64.rpm042b22741a88015f7a1ed535956b591132d3d5624cf5332610b234aedc3908ebqt5-qtgraphicaleffects-5.9.7-1.el7.i686.rpm5126eef2595496c3fb17391fad205be5dc810e1f46c8d2c864813de23609f5ecqt5-qtscript-examples-5.9.7-1.el7.x86_64.rpmfb7734fb678a1014064df19cacea63e60196a65e7f3664e85307ced40910fa76qt5-qtquickcontrols2-5.9.7-1.el7.x86_64.rpm87837187078c0093e398cff0c1c57905885c5e709b14fd477c0c5b9dde70a590qt5-qtbase-static-5.9.7-2.el7.x86_64.rpm14b81b0868fa881ee77750c2049ee046f44eb3923db69b345a046eeedfcc27e9qt5-qtx11extras-devel-5.9.7-1.el7.i686.rpm2e810b306d02008f0bfb642d2940eba45012a89ea69640f3960dae42e046078dqt5-qtserialbus-5.9.7-1.el7.i686.rpmd62738c358e60ea776873f0b5a73836e1c83318ed4004a44a6a5838661ef7db8qt5-qtwayland-5.9.7-1.el7.x86_64.rpme867f8f072e4ecf5f376e304f0a8e60af9ae8c7acdc4bdfda801cb89902e116dqt5-qtsensors-doc-5.9.7-1.el7.noarch.rpmc5f7783c1caa527b9e43ab9e2a88db733a07ceb348c510468545953467cae959qt5-qttools-doc-5.9.7-1.el7.noarch.rpmf0ded8755e8cbe06141c347a0e427f755c460596a9e374850eccf7c0b1e72c37qt5-qtdeclarative-5.9.7-1.el7.i686.rpm419eb0ee21dfd735763ad7a6a8953c7d718cc8887222cfae565f8ee9d31495aeqt5-qtwebchannel-doc-5.9.7-1.el7.noarch.rpm986a237c485a0001e7ecf4818de44fc4d8c5a73dc4d0aef1a6b57e8f4bc2f2c3qt5-qtwayland-examples-5.9.7-1.el7.x86_64.rpm1a609016ebc7581578ba3ae38a1827ec709de08e96577a3ea61abd2a98c76d29qt5-qtbase-mysql-5.9.7-2.el7.i686.rpm2ff8c920e23fca558e153f51c0cb6a033c3384e3037a73f479a2512a4cbb9ba8qt5-qtsvg-devel-5.9.7-1.el7.i686.rpm35d0731d51b7c2945d9507a534e3e05ebe110ecf88491d8c7ce9670146cd03fbqt5-qtsvg-doc-5.9.7-1.el7.noarch.rpm19c113f6826dc55fa7b75bf1b7f1c0ed7772d330f9ef14d987197236f995bf87qt5-designer-5.9.7-1.el7.x86_64.rpm333d29edcb2046a513358bcd00238868e883e6e7926ba856ed41a8b67fb9a7c6qt5-qtcanvas3d-5.9.7-1.el7.x86_64.rpm167384d8db00574f7a7d66416419b907ef7e90f99498c34f087fb097077fc61bqt5-qtdeclarative-examples-5.9.7-1.el7.x86_64.rpmd301ae6b33fa805613130e818c3d24a2ba7a28c5d57bc9712d589926cb3bc09eqt5-qtdeclarative-doc-5.9.7-1.el7.x86_64.rpm953aa28ac1499509af2f60504d11781226ec3402eed4aa9d3d44f5f290bec3a4qt5-qtmultimedia-devel-5.9.7-1.el7.x86_64.rpm2d7ae744c299bfef24be0e335cba47ebf4eaaa54727c17ea5203265bb1c8086bqt5-qtwebchannel-5.9.7-1.el7.i686.rpm37d772cb746059ce5411967d49eb14ce1f58aeb926c1903ce912285e6c719723qt5-qtxmlpatterns-devel-5.9.7-1.el7.i686.rpmbf5ba826ac856957646467dfe46db277757d198000654779f4025c8f8d363ba4qt5-assistant-5.9.7-1.el7.x86_64.rpmd46462a77d6c8465772f7b3203238d275d8f9d088cc99155b34a933fd132bd5bqt5-rpm-macros-5.9.7-2.el7.noarch.rpmcddbf0a2e603acb62fcb6f5020d70139df067c74e8039d660f1ad53e1fb1ae68qt5-qtserialbus-5.9.7-1.el7.x86_64.rpm29d6fd2ec31ecc7419cda93e42643e691bcc1034d3d1655565f1d1bf4f928ad5qt5-qtserialport-examples-5.9.7-1.el7.x86_64.rpmcee8d36e5e9e6bb34d4563afadea2e91e2f0d9cf168f2d9d67c00794a1029487qt5-qtx11extras-devel-5.9.7-1.el7.x86_64.rpm9865c70b7e024a74775c7250cacd662132bd71848d7a12992b7755a47eea67bfqt5-qtscript-devel-5.9.7-1.el7.i686.rpmc17b309751f9c0e10ffcff2dff9fae87e846cafb52a629a7994bea35528721e9qt5-qttools-5.9.7-1.el7.x86_64.rpmca1e9888f650085cca8cd2448e76b105c9a663a592f150a72c55b1cf80952991qt5-qtmultimedia-examples-5.9.7-1.el7.i686.rpm1802b39844da23760f6e3a9503e2c27d66493bfb44820266955ecb32ce138d17qt5-qtmultimedia-5.9.7-1.el7.x86_64.rpm5e433526b7d314ae4e8fc9d39875b1527917f864488032bb8fb1ebb25cb37cf3qt5-qtserialport-devel-5.9.7-1.el7.x86_64.rpmd0e6eac8b961a7ce6da95adebc428a7aff56b79d3f28221468231ce2ed23c0b1qt5-qt3d-5.9.7-1.el7.i686.rpm622bad27697f5835693c8badd8c8da1aa63ac83180926007e5aaefc0d4013037qt5-qtimageformats-doc-5.9.7-1.el7.noarch.rpmcec80015cb94b9ab2e8905baed2f8117badb0d24dbfecd4e45d9bfe3464ae328qt5-qtbase-odbc-5.9.7-2.el7.x86_64.rpm2a57e17c284ab461003772f31bfd96d122b9d2a78d2e385a03c0ba11dc2b6edeqt5-qtimageformats-5.9.7-1.el7.x86_64.rpm4732252ea01c7934395d52f79da1bfb73c6362619044924d906782828f1ba498qt5-qtxmlpatterns-5.9.7-1.el7.i686.rpmaa14ad7f5792151c6176a0a84a4f6d44449e815a3acd0e8551621931ffd2f62eqt5-qtbase-postgresql-5.9.7-2.el7.i686.rpm7d11651119d37e3071eadc48ff82044c82aea6953371b541d9b0ec4b36609d13qt5-qtconnectivity-doc-5.9.7-1.el7.noarch.rpm2e7852b49bde000b6c7acbd250f269a6807308c7db176d634639efc00ea11cb1qt5-qtsvg-5.9.7-1.el7.i686.rpma1fadc9d7d88ab5f2fb822c934c000ccb72d2f8d526da13a49da91e5dcc6a2bbqt5-qttranslations-5.9.7-1.el7.noarch.rpm46c62d89fa98d272b0505885f33b10317e1f5bcdf9ed5d9859cc1a7117a9f2baqt5-qtscript-devel-5.9.7-1.el7.x86_64.rpm4f6ae7e0f0fcf96d76aecf2d0ff9b0e736af3831a4c1b861a22d9c9cc6a286abqt5-qtserialbus-devel-5.9.7-1.el7.i686.rpm4dbcf0e0964c13928180ac90a4d421e2d957c0c4543d29fb575181eba48690dbqt5-qtconnectivity-5.9.7-1.el7.x86_64.rpmc15d72bd942510ca35328e5ea558c961d3d1f8ccd5e894e1caa9d5a22f6dfc24qt5-qtwebsockets-5.9.7-1.el7.i686.rpmb30b2bf01bffeda4d08e2477aeea811459be19684a76f68cccb5625d1b313109qt5-qtbase-devel-5.9.7-2.el7.i686.rpm1934ffa71693ff138852c0685d8560aff4db0f72ff735792eaff4b7963b23327qt5-qtbase-gui-5.9.7-2.el7.x86_64.rpmae7e469a60db967bd584fa96f72fcceaf56218c2acb1467406c81450a11c4179qt5-qtsvg-devel-5.9.7-1.el7.x86_64.rpm5724d27be0a4907beb48b96a14715c0ef73ceee8ac4f93397216cfccbc489209qt5-qtbase-common-5.9.7-2.el7.noarch.rpmc7a59f50c8858ea91d49a0b657d24e837f6360300e6ce7974eb46010e06deabfqt5-qtserialbus-doc-5.9.7-1.el7.noarch.rpm338401e894fccab9e9b293b7efc336a83ca7c8afe0e8d88b0de6af50d3621759qt5-qtbase-devel-5.9.7-2.el7.x86_64.rpm43a44ded6a8e97bd7caf2cc2cf6da2aa700fcab7ed810b105d5a09ba8332c4c3qt5-qtx11extras-5.9.7-1.el7.i686.rpm3f9bd2022681404ddd7b12e798e53c17dfce91c0f07debdfaca4e51ae9b40287qt5-qtlocation-5.9.7-1.el7.x86_64.rpmc2c4cbdd5bc4f5ac890473d57de112edab473cb140b766cba199223721b00e43qt5-qtquickcontrols-examples-5.9.7-1.el7.x86_64.rpm47cc2b6dc703103136d49634abffbe90efcaaaedf6c8e3b26bdaf513161e5787qt5-qtserialbus-devel-5.9.7-1.el7.x86_64.rpmc760d18c75277028d4e5f76840e8ce27ce416f875a4d554633f82b0dc25893bfqt5-qtxmlpatterns-5.9.7-1.el7.x86_64.rpm6fe7fd8ec7cf634c0ab29988f8845ea5cc67c6a2001da0a44b246be1a2d9d262qt5-qtsvg-5.9.7-1.el7.x86_64.rpm441fb0a4b698fe0acc967e704a18c3966de8bcef4ed84566a05c50bf90e1a8a1qt5-qtlocation-5.9.7-1.el7.i686.rpmd2b203f4f2ff3a5067c34021f3a37849c30a0a89a330010d12191976bcabd329qt5-qttools-static-5.9.7-1.el7.x86_64.rpm55b58ed4c8e221426b90e65a64b2f936c87854087df35e39428a394577eb65aeqt5-qtsensors-devel-5.9.7-1.el7.x86_64.rpmf4524a1285d2079633eef148bb06c4747d13361f4b257e1e3c53af4bf3e9b5cbqt5-qt3d-devel-5.9.7-1.el7.i686.rpm7088fbceb837ad24e1710bdaab95a050a1769a84ab87be8205a0943a4c2c00c4qt5-qtgraphicaleffects-5.9.7-1.el7.x86_64.rpm7ed5081e3bd7543d00f79590be1423c13d289c842d5a90c46b802de56daf6003qt5-qtx11extras-doc-5.9.7-1.el7.noarch.rpmc3d936cf5602154ab0d7b9d1e18e16434e4229074db82a2d853add796d3ba04aqt5-qtscript-5.9.7-1.el7.x86_64.rpm7f86e5ccd249bafd215ad9e2e6526a2c65c84bc0a786a4692ec567db3d68aaadqt5-qtcanvas3d-examples-5.9.7-1.el7.x86_64.rpmf53f554082bf23440efed1139078dbfcc7a3d0c6d4c8ab712ab38c3e3247cf9cqt5-qtconnectivity-5.9.7-1.el7.i686.rpm7b3181923a83fab33dfdad9c5bef4b507b23c593dca11903474b0347895b2508qt5-linguist-5.9.7-1.el7.x86_64.rpma555e5d9ac765386fd1cc244398eae99e6310d4bd9ea7f2661cd944ccdf8f7b7qt5-qtsensors-5.9.7-1.el7.x86_64.rpm222cf4577430eb8190ba758fca5b5979ade13b40fabf37fad5f2ba65c95470e7qt5-qtserialbus-examples-5.9.7-1.el7.x86_64.rpm820be6ef8df2621bb44aa42310c9872ee9246d990db8fe3f6adc8e1622fa5e23qt5-qtwayland-doc-5.9.7-1.el7.noarch.rpmf7c17c276b28c2b38e9b2114b0e22b54335a7406553368792ce9010478f032ceqt5-qttools-devel-5.9.7-1.el7.x86_64.rpmf6a864729a577bfa20b4ca5454956854886527f0eeaf3ce1ecd69540f749c895qt5-qtcanvas3d-doc-5.9.7-1.el7.noarch.rpm1c8a398b66274a323cb13a4df9dc76c2cf8dfa3552b1f7bd8663cde61dae1357qt5-qtdeclarative-static-5.9.7-1.el7.x86_64.rpm6090171c2eac076fd5162c398f3083625fa56b5fb40082622c7141cc79e80980qt5-qtquickcontrols2-examples-5.9.7-1.el7.x86_64.rpm3c246fe62d13d1004419fc6f21497ae2cfba5b578d10da711fd7ad89299a6ffbqt5-qtconnectivity-examples-5.9.7-1.el7.x86_64.rpmd10ba4bb75e410b8710f4b24bafd11117357b25a00c8931fe08b8d41d5d9dba4qt5-qttools-examples-5.9.7-1.el7.x86_64.rpm00629a7ed26649f683e79cd2f928ce2e8e28d78013109f901e0896333416c84bqt5-qtwayland-devel-5.9.7-1.el7.i686.rpmcbd2db4a2c3fa5b672abfb030591a21bbd0c2f64db5709c83cd9ea4b3903560aqt5-qttools-devel-5.9.7-1.el7.i686.rpm0832f57b12b62e1477df19cffa1b6bed4944722f03570f58b6c26623b1d8d1a5qt5-qttools-libs-help-5.9.7-1.el7.i686.rpm27014b3a8b5959addf228a44accc8bbedd609c82d469d20a958b25afdcb198afqt5-qtxmlpatterns-doc-5.9.7-1.el7.noarch.rpmff051d42b731c82dd7689395af94178c4e741651624b227499d8ff9be72dbba5qt5-qttools-libs-designercomponents-5.9.7-1.el7.i686.rpm6ae08a47cffa168d53e30b63a57b5ed67e0f4267d8ca2baa9c7ffcc3fa3e3ea4qt5-qtdeclarative-devel-5.9.7-1.el7.i686.rpm9b09a9aa69371975f2a151a90450e7a7d2d651a9a3f1c154a736087a217e1338qt5-qtlocation-devel-5.9.7-1.el7.x86_64.rpm071416ab0b16bd1a8772c8404eed1442be817dd94773300e0c703d230521313dqt5-qtserialport-devel-5.9.7-1.el7.i686.rpm84f615f1b5b17af8f82d8666ebde9dc3dbe6492bff61ffdd4f950cb3f493e73fqt5-qtbase-5.9.7-2.el7.x86_64.rpma24c6ad30164f0fb0a36ec016044a2d7749c37268d0f1c5620402f73a3e3f2c5qt5-doctools-5.9.7-1.el7.x86_64.rpm16c30added32c2136bb593cb9f9aa0e985b4a206628b87d07f5affb42c248c98qt5-qtserialport-doc-5.9.7-1.el7.noarch.rpme056080ce51741014fdc20b7ae33a32ee45ede2e3b17a9f7bc9471c57047ef37qt5-qtmultimedia-doc-5.9.7-1.el7.noarch.rpmc28d6ea768fbe848d3e9adb0bb5d9924100603449e3d4dd3f0564783b65623b4qt5-qtwebsockets-doc-5.9.7-1.el7.noarch.rpm82d498ac0842998280a82d7bd4a96b7c676596b87079495bf80795cdfdcbffa4qt5-qtmultimedia-devel-5.9.7-1.el7.i686.rpm14ff83cb6c7d6c28623b404a69927491f6ea6d199eebc106eb53cd519ff15db0qt5-qttools-libs-designer-5.9.7-1.el7.x86_64.rpm66482b0fd967f4e0c5801068b556f79c9cb02c119556904f42061e7dbfda2c43qt5-qt3d-devel-5.9.7-1.el7.x86_64.rpm0f5658a5caaa96b8bf7a03c464eac9931655c670e068ccbfcc12db4166b9f96bqt5-qtbase-5.9.7-2.el7.i686.rpm9c619179ffd3944647aa55a8526e40518d8d5bd96d8df7a39c57646a307bfd4dqt5-qtquickcontrols-5.9.7-1.el7.x86_64.rpm688604e813d93a29785e4f454f847d5d8a793333445c6abf70f2e8f73c8b432fqt5-qtsensors-examples-5.9.7-1.el7.x86_64.rpm10ac5cfb99f28868e7839e06531cd067fb61c5dfd656cd5db8b8f1af1ee15221qt5-qtbase-static-5.9.7-2.el7.i686.rpm597607bd478df57af12ef119960a955d6ce9882da0699f8beaba83957a90349dqt5-qtbase-examples-5.9.7-2.el7.x86_64.rpma25a5220ee9637359439582a438f1286041a0d5dcd3c7a52c72f503fb3d2f2ccqt5-qtxmlpatterns-examples-5.9.7-1.el7.x86_64.rpm485eb94b84c0775f08f59fb7f6f6bf9a9ba6ba5bd2f3c936f0a5eaea89e7bf9bqt5-qtgraphicaleffects-doc-5.9.7-1.el7.noarch.rpm32fad95c365861c5452df4e2e3caee0e8a3212abb917a4fa4cd3376df298ed93qt5-qtsvg-examples-5.9.7-1.el7.x86_64.rpmb09f14eaec9152a99835dc7eb9d1631b159b78516587fe4247dfd2cc0d27e336qt5-qttools-libs-designer-5.9.7-1.el7.i686.rpma8457673837e6ccae99d1846037ee88edce183b368707b7e870061de02f1b854SLSA-2019:2136-1Libssh2The following packages have been upgraded to a later upstream version: libssh2 (1.8.0). Security Fix(es): * libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read (CVE-2019-3858) * libssh2: Out-of-bounds reads with specially crafted SSH packets (CVE-2019-3861)moderateScientific LinuxScientific Linux 7libssh2-1.8.0-3.el7.x86_64.rpma9ecfcc252676e16e0ff42b631a4d75aa19459ed0ff38d27dd8602e225fdb1dalibssh2-devel-1.8.0-3.el7.i686.rpm3e204ddbe1fb56aa52bcc1aba2f232bb4345208e11f5f68e323c1a99071f002clibssh2-docs-1.8.0-3.el7.noarch.rpmdcb0775c5f82b23c88445f06b1d094b0cdcf6428796a02df443dbd0867068afclibssh2-devel-1.8.0-3.el7.x86_64.rpm6d94121c0103d571eef4da43d6d9dea23d6e86afeb032b803b696d5f869206cdlibssh2-1.8.0-3.el7.i686.rpm23107e0287d7035121fed766677292739b521b18f44c2dc3e0f59f7bcbe85a1dSLSA-2019:2137-1Keycloak-Httpd-Client-InstallSecurity Fix(es): * keycloak-httpd-client-install: unsafe /tmp log file in --log-file option in keycloak_cli.py (CVE-2017-15111) * keycloak-httpd-client-install: unsafe use of -p/--admin-password on command line (CVE-2017-15112)lowScientific LinuxScientific Linux 7python2-keycloak-httpd-client-install-0.8-1.el7.noarch.rpm82ad5aa0e83d6dcc902c4c88a5b244783cb126217831aeeceaefcd2ca55f3b8ekeycloak-httpd-client-install-0.8-1.el7.noarch.rpm51002e27d278f90359a2c58415293935c31b183aee693f295d6cd90480206b52SLSA-2019:2141-1Kde-WorkspaceSecurity Fix(es): * kde-workspace: Missing sanitization of notifications allows to leak client IP address via IMG element (CVE-2018-6790)lowScientific LinuxScientific Linux 7libkworkspace-4.11.19-13.el7.x86_64.rpme5acae8c05cb2469856efaee2fff457aad9ef0478d807259ec11872a7d3cb821kde-settings-19-23.9.el7.noarch.rpmdb52778332ef52245665115de3884cb57f0ae999b23abbe1322969454528a2edkde-settings-pulseaudio-19-23.9.el7.noarch.rpm960d26a0d1547505bfe7a7198ef3b157fc14bca0a49749ec878021a8e131f29bksysguardd-4.11.19-13.el7.x86_64.rpm3b67687f188674983ba506130de0579f50a5b8aee3d7bce499cd288d0ea44c95kinfocenter-4.11.19-13.el7.x86_64.rpmf7d8da3efa52d147819737f595c2f23230b2b193a21e27c1ce9f56e5d187d99bkwin-gles-libs-4.11.19-13.el7.x86_64.rpmb2f581a57adefe8586e1a5052fd14a26ed3f3ed80deb1d3e3c025d8e4e347125libkworkspace-4.11.19-13.el7.i686.rpm05955900e945defab673e81c1868397ef7a58d6ea2bb1667f7995c1bc45687fbkdelibs-devel-4.14.8-10.el7.x86_64.rpm237fcf540b5d2caa815d384a05a81c4c8117542397139e109a5aaaa96870fa06kgreeter-plugins-4.11.19-13.el7.x86_64.rpmde0c5d9f051d4b4007f309d96dee4e89e09fd929cfc466a1d449e56137801f0fkmenuedit-4.11.19-13.el7.x86_64.rpm5261cb9edaba0899e93ea2bcf8eab511651fb0e27b4b67d894792bb0ebd1ab31kde-workspace-devel-4.11.19-13.el7.x86_64.rpma27814f357216aa6e4968b7d66f4a7dfbf417775acc44f50755bf9e3a3f6a7ffplasma-scriptengine-python-4.11.19-13.el7.x86_64.rpm1cf15b53c2e7934b2b4df41702d49c739605007ea6e0c6eb955606ef82748883kde-workspace-devel-4.11.19-13.el7.i686.rpm5941575a985a489724938b0cea25bbde258622297af1822d07de8d57c9d7941ekde-workspace-ksplash-themes-4.11.19-13.el7.noarch.rpm47c1dbe94d975538a75327511c943b789f19352fbb570fcf99c53f1f7f49eef1kwin-libs-4.11.19-13.el7.x86_64.rpm4f2a52b368a86b28ae388b1a065cf8c0522fe5f69374c935aab14c2750ed6bcekdelibs-4.14.8-10.el7.i686.rpm618ad8e45950e483d7b506c16c20d1058c0541a24c55e019697b7f1d0a87e3a2kmag-4.10.5-4.el7.x86_64.rpm81467d39e4fa1f3b3f405ff79547b7feec7a392082939707dc8d1a9b6b8d1881virtuoso-opensource-6.1.6-7.el7.x86_64.rpmcd108e7b4f0a8d9fef122a588f9d1ed7ed8b27a5acb57095d695ecc8afb4434fkde-settings-ksplash-19-23.9.el7.noarch.rpm469126160a647135bef42c2323f258ec16d5a20a745933492500182d5bdb9596kde-style-oxygen-4.11.19-13.el7.x86_64.rpmd244beb32997a14e6d4412dd203c2a2680d14aeddc67466e8a8c4293d63c3604kdelibs-ktexteditor-4.14.8-10.el7.i686.rpm3de74bcab91626b4b1a865167440b5aae92b5f2d929a5d42d4b20892f0028bbcvirtuoso-opensource-utils-6.1.6-7.el7.x86_64.rpm94558b5102e358ca477d0a1fe7d0efd822782a0f0fcdc121cc048676a94606dcksysguard-libs-4.11.19-13.el7.i686.rpm8bbccfca7abed3e1fcce9ae0aaeaf55d9d1544f779a0a23a1f505f5f63a82939kdelibs-ktexteditor-4.14.8-10.el7.x86_64.rpm2c03843cda651628d174ab0cc705de1f14be8a014be21fde008b2f868174869fkde-settings-plasma-19-23.9.el7.noarch.rpm13757123ed49bc24b9301467cc076d07ebfacc14f5616635c611574f6c8d0df9kwin-gles-libs-4.11.19-13.el7.i686.rpm95a3073616f1446403162770dd6eb4327f046e36cdbc05a067de5653162fb9baksysguard-4.11.19-13.el7.x86_64.rpm4caea1f9485f665804f6ac52ade15111d7ba2a70c25da023e2b978dd434da680kcm_colors-4.11.19-13.el7.x86_64.rpm2eddff740ce84692c943edaac9591af1a41ddec57918929ba2d490fec69c3ccakdelibs-devel-4.14.8-10.el7.i686.rpmbc4b018ab60badb8cf37419aced770a35dd0e95d61031895c23099765bf375c4ksysguard-libs-4.11.19-13.el7.x86_64.rpm70b1b00f16fefebc81d41db17ffe4210010a002eaa2a4bb458c74552a94d60f1kdeclassic-cursor-theme-4.11.19-13.el7.noarch.rpmbf70ad86f2c1789e6c84072ffad1846da654db06c6863dfb7f7fe68a6fcec0b3plasma-scriptengine-ruby-4.11.19-13.el7.x86_64.rpm2775ac37df99e333a4057ff995fc54970be80959243be8cccdeff29a3b8b83f3kwin-4.11.19-13.el7.x86_64.rpma23be23d8577bd5230c8ef417d5c8b7838b97534a77e2bd56e42f86c5cb4acf4kde-workspace-libs-4.11.19-13.el7.x86_64.rpm5871bc039e1157bed8332f7f5f669926bd99a070e72d6b8d0702eb608c293b8dkwin-libs-4.11.19-13.el7.i686.rpm8ac6b6be8b2a51a2d6b2ce09f787b3e8c25012d0652d2c990d93e83d1f7381f8kwin-gles-4.11.19-13.el7.x86_64.rpm8c009042e8952fa28424329b1213560b13a5a801323baff6bc73f5ac47706088oxygen-cursor-themes-4.11.19-13.el7.noarch.rpmb8635675befb9260a0db65e4b2cf529854106f37a635aecb1776ee1012e988d0kde-workspace-4.11.19-13.el7.x86_64.rpm89e0b8e2766d40a0e3b0144ad4b83be530e4f3f78e35aacb8cadeaf56dcd4651kde-settings-minimal-19-23.9.el7.noarch.rpm94dbe0ed97b50196ae27ff21da066112201f224fbe21084260acb0e822f8ab5dkde-workspace-libs-4.11.19-13.el7.i686.rpmb03a574058bbe7888ca3b0bcb18e5403a1c50387b6c8c4cf38a33a5e8cadee46kdelibs-apidocs-4.14.8-10.el7.noarch.rpm8a9f3b2f0b8041f2ad538f35a3079356954f5aacdd119f1d3617250011c5db75qt-settings-19-23.9.el7.noarch.rpma614df3e97398e5752c3afb31858b00b51b98df0ef3a66e9964d8f077fc7fa86khotkeys-libs-4.11.19-13.el7.x86_64.rpmcab6338479ead61bc41c2ddcb84ef8695eb913c59f52e3926ce05f830d5ba2aekhotkeys-4.11.19-13.el7.x86_64.rpm59e735418cf2dd64a7b3cfb8f26d732459cc35142057d50a5b1fe2639c9fdd38kde-style-oxygen-4.11.19-13.el7.i686.rpm2f79e2360c03928e20998b6dd3db53b0479eafde609c3af819a0194f0040eae6khotkeys-libs-4.11.19-13.el7.i686.rpm032f739a1b24c8f8d1fa2f4a4e6c0747b87a64de4b23ad61f9a4a64a4c66e861kdelibs-4.14.8-10.el7.x86_64.rpm25cf28e9cd8b51fd64238d684a58485d35b66ff1be5c2b8747fec04a2c53ee06kdelibs-common-4.14.8-10.el7.x86_64.rpm3f5274b0111bc32b23dacf5b93e24a165ade4c5b36f9190265f2c45fd090b31bSLSA-2019:2143-1OpensshSecurity Fix(es): * openssh: User enumeration via malformed packets in authentication requests (CVE-2018-15473)lowScientific LinuxScientific Linux 7openssh-7.4p1-21.el7.x86_64.rpme427038224b39894087d00c6966d2f77b7ff3b729c581e652124b61d8bd7a4d6openssh-server-7.4p1-21.el7.x86_64.rpm2b8361a9434ee5f0e89c72e57924df7757fc61ce7c9aa5a83a9f3d323b5cfad0openssh-ldap-7.4p1-21.el7.x86_64.rpm52488e9d113f207b4ffa25e3e5bd902b92bef8bfd2a125d65c02375ba8d4d26cpam_ssh_agent_auth-0.10.3-2.21.el7.x86_64.rpm1c3dd63661d5c10b28fe3078edc3603c151ccda85e877bcf02b495b79ec79daeopenssh-clients-7.4p1-21.el7.x86_64.rpmd81c1e0fae411968ee7cc0643000f5307782058154ce123135e74a13da9c7ce1openssh-keycat-7.4p1-21.el7.x86_64.rpmf233a5aa174371c7ce61f80f034cb874af70cae43d7dc0ec00f5df769ce7b2a8pam_ssh_agent_auth-0.10.3-2.21.el7.i686.rpmd93795d096e593240b86221ad5e272e463ec525f01ed92c53dd0883cc6a73a88openssh-askpass-7.4p1-21.el7.x86_64.rpm7cca2c139407f9f62cae44acb305dfd6413ec86ee5b37348e48a53c1a08bb502openssh-server-sysvinit-7.4p1-21.el7.x86_64.rpm5d409c02055b2fdaa756acbcd0d8da1dff60aa747725057892f38ed6db242613openssh-cavs-7.4p1-21.el7.x86_64.rpm151938ecf48e4be538ecbe770f1c141c925dd9a6429c332a79f0e56f724a5ab7SLSA-2019:2145-1GvfsSecurity Fix(es): * gvfs: Incorrect authorization in admin backend allows privileged users to read and modify arbitrary files without prompting for password (CVE-2019-3827)moderateScientific LinuxScientific Linux 7gvfs-mtp-1.36.2-3.el7.x86_64.rpm9546dc42ff20344a9d3c5810250f8a1fc3442df5ffec88cfac3e8db8ef6e20afgvfs-smb-1.36.2-3.el7.x86_64.rpmf77684f83ec2c10e0e6287afcd42ed147c8d3fdb16ed77f545bf1a77a114533cgvfs-afp-1.36.2-3.el7.x86_64.rpm49700d11bb00674c78912692a2715b6bf9e136f82a5eac8aaa2d2bc15a7876f9gvfs-1.36.2-3.el7.i686.rpm479486d976c4e82f012c0edc858256393130c06c48191d1969285e586b6fe94dgvfs-devel-1.36.2-3.el7.x86_64.rpm3eb6dad7a391cbe1dcafbf205686a50555a71a26d39d36cf4a410dc268ef4bcfgvfs-client-1.36.2-3.el7.x86_64.rpmb3c77d044e087efb74870ec65d017cc17db8c1fe985286bb5b26b35bdca69125gvfs-gphoto2-1.36.2-3.el7.x86_64.rpm6d215e6e725b4a90fd3ec35d5292904e27b8a6dce1a4b4900111e8b9b2cc0666gvfs-1.36.2-3.el7.x86_64.rpm13f31748e59249c2ffffee8632802db7dadc8f8405a31f4bbb20457a39bc0086gvfs-devel-1.36.2-3.el7.i686.rpm4432e56a9cbe48fd370b4a3c288ce0b52273b018a685eccfa4f38bd73e8ab034gvfs-client-1.36.2-3.el7.i686.rpma8b252b84e278b68773e7ffe5bcd309c5faf587901b3a7f350b2fea2915a5da7gvfs-afc-1.36.2-3.el7.x86_64.rpm13ddd76fef29b2e31a993dd12e0871e48e2331fe73f5f45e6964408d82c0e6afgvfs-tests-1.36.2-3.el7.x86_64.rpm5506cce40692d41d463c2afc225ef4c39c8b4b650026413264c3f57f5067b827gvfs-goa-1.36.2-3.el7.x86_64.rpm75c2cec84e9037d8ce82a540a844aefa578b529f2946198961a489fe0852b56fgvfs-fuse-1.36.2-3.el7.x86_64.rpmab66732c6e0fa050d6e8b89f0e1ba67f1d439616434b23f536661f8b47699707gvfs-archive-1.36.2-3.el7.x86_64.rpm8c49e288984cab70c2eaad07dfd1fd99a2c63637b32a58ccbb07039baf776666SLSA-2019:2154-1OpenscThe following packages have been upgraded to a later upstream version: opensc (0.19.0). Security Fix(es): * opensc: Buffer overflows handling responses from Muscle Cards in card- muscle.c:muscle_list_files() (CVE-2018-16391) * opensc: Buffer overflows handling responses from TCOS Cards in card- tcos.c:tcos_select_file() (CVE-2018-16392) * opensc: Buffer overflows handling responses from Gemsafe V1 Smartcards in pkcs15-gemsafeV1.c:gemsafe_get_cert_len() (CVE-2018-16393) * opensc: Buffer overflow handling string concatention in tools/util.c:util_acl_to_str() (CVE-2018-16418) * opensc: Buffer overflow handling responses from Cryptoflex cards in cryptoflex-tool.c:read_public_key() (CVE-2018-16419) * opensc: Buffer overflows handling responses from ePass 2003 Cards in card-epass2003.c:decrypt_response() (CVE-2018-16420) * opensc: Buffer overflows handling responses from CAC Cards in card- cac.c:cac_get_serial_nr_from_CUID() (CVE-2018-16421) * opensc: Buffer overflow handling responses from esteid cards in pkcs15-esteid.c:sc_pkcs15emu_esteid_init() (CVE-2018-16422) * opensc: Double free handling responses from smartcards in libopensc/sc.c:sc_file_set_sec_attr() (CVE-2018-16423) * opensc: Out of bounds reads handling responses from smartcards (CVE-2018-16427) * opensc: Infinite recusrion handling responses from IAS-ECC cards in card-iasecc.c:iasecc_select_file() (CVE-2018-16426)moderateScientific LinuxScientific Linux 7opensc-0.19.0-3.el7.x86_64.rpm93a0e753b95c345df793d57cb2d55333df6d66ade5a1afc7ed5553d5b531b279opensc-0.19.0-3.el7.i686.rpm4dd5b2e34f970043f6cc87da460f4a132a2dec5eedd0acdd2666d95c643cce04SLSA-2019:2157-1Freerdp And VinagreThe vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop. The following packages have been upgraded to a later upstream version: freerdp (2.0.0). Security Fix(es): * freerdp: out of bounds read in drdynvc_process_capability_request (CVE-2018-1000852)lowScientific LinuxScientific Linux 7vinagre-3.22.0-12.el7.i686.rpm558b3cf0c619417434f88dc42847303ed4438b2ee9d47a669e9cd6f4eb27a4f5freerdp-devel-2.0.0-1.rc4.el7.i686.rpmdbc731671dd96f884ed646524030ed4624d67f55737ceb077e7af6f47a9ca60alibwinpr-devel-2.0.0-1.rc4.el7.x86_64.rpm81bead18205364de3c76ecb92c7200ab6ec98f5e9526a47e57a3ba5362d0afaefreerdp-libs-2.0.0-1.rc4.el7.x86_64.rpm404485a3c405a1393abe5b832ae5f7d5a34b1553e24d3c252ae3cd96af7c11d4freerdp-devel-2.0.0-1.rc4.el7.x86_64.rpm5e7dbbda4176d39b07d667ebafc411aeb790effa61fd173574a251cfb92e6972libwinpr-devel-2.0.0-1.rc4.el7.i686.rpmaf91fdf08aa80d3ab366b4e77077567a3b9c9d3889f6f15431e5660f8872aeeelibwinpr-2.0.0-1.rc4.el7.x86_64.rpm003ee7f09bb739a3719a71751eb0186600a875f4d67ff672f38a344eb572feedvinagre-3.22.0-12.el7.x86_64.rpm795fbb77a21737d404bbd2730b4c80b9a8f328349050ce52b18c19be8273e913freerdp-2.0.0-1.rc4.el7.x86_64.rpm081a81b6a78262fe7b216b1212eb38a3149f7a4e706c8c07a28e139d73556df3libwinpr-2.0.0-1.rc4.el7.i686.rpm337652bd0852c1cc96d11d75491c4e0c199188602448e6772722964f57187494freerdp-libs-2.0.0-1.rc4.el7.i686.rpmf0c42e5774329f88c823b3fa459aede050a4c80535cc77004c303156a3447e25SLSA-2019:2159-1UnzipSecurity Fix(es): * unzip: Buffer overflow in list.c resulting in a denial of service (CVE-2018-18384)lowScientific LinuxScientific Linux 7unzip-6.0-20.el7.x86_64.rpmf3d4a89a956bc341c528d7f064da771d1bf0c6406ed9e8d9b364ec3c71329355SLSA-2019:2162-1BlktraceSecurity Fix(es): * blktrace: buffer overflow in the dev_map_read function in btt/devmap.c (CVE-2018-10689)lowScientific LinuxScientific Linux 7blktrace-1.0.5-9.el7.x86_64.rpmbe81d8e4a095fcc4c87787a898a1fba4dd8afb6496ee1430695fd4274d7d4c53SLSA-2019:2169-1Linux-FirmwareSecurity Fix(es): * kernel: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange (CVE-2018-5383)importantScientific LinuxtrueScientific Linux 7iwl7260-firmware-22.0.7.0-72.el7.noarch.rpm331bb8d1bd194dc53ade0f993fa86faa716f0c275027fd7b2427c1515ad6d193iwl135-firmware-18.168.6.1-72.el7.noarch.rpm43d6c48540cc9c8e917dde2fb8e23266c1172a1cbf0feec8353f0ee94f370542iwl4965-firmware-228.61.2.24-72.el7.noarch.rpm5243e5201c96448beb7bae63abf1be584edfd98d58c1d54466a051a0f4dc5593iwl3160-firmware-22.0.7.0-72.el7.noarch.rpm9b14a898d58c7d8bd550baa5782816f7adbb97115e2ef7dd0f9f7e834f20417biwl7265-firmware-22.0.7.0-72.el7.noarch.rpm60ae7c0c429a560243ff047847067446df8a9759c24a397b859593f7752bd851iwl3945-firmware-15.32.2.9-72.el7.noarch.rpm70be41dac087d7416959c5e3241159c960e59026053f3919055187cfac8821a3iwl2030-firmware-18.168.6.1-72.el7.noarch.rpm5b18d972510fdf9f94f9ea5e5cb804a56509271dbc23b8e5a91fdbb6fb208120iwl6000g2a-firmware-17.168.5.3-72.el7.noarch.rpme96cd2773f9ec06f457fc37d2cbaa4e61282060a69788a85d6c2e95218b99c0fiwl2000-firmware-18.168.6.1-72.el7.noarch.rpm919b26331adaa4ab21a99f6b94b9aa28e17872f6d4ab884c10ce403ceb76b760iwl6000-firmware-9.221.4.1-72.el7.noarch.rpme53bf45f0422f5ffede6431bfea4ad7d6c77ec2aff1dd748892f7aeb3e229149iwl5150-firmware-8.24.2.2-72.el7.noarch.rpmd9585771e78955802c159825bda08bf60fec22cf18511023e81c48ce8930aa6biwl1000-firmware-39.31.5.1-72.el7.noarch.rpm00b2cfe9c9dc60d6fe742433501c272e42a1b2a4278233553cc29a6405ca1287linux-firmware-20190429-72.gitddde598.el7.noarch.rpm1c9f36285117e6639365f9de2363365fd2d8d930c4c1c04e71198a507e897798iwl5000-firmware-8.83.5.1_1-72.el7.noarch.rpm75972082bd982c590759c3000776b72ef4e3dea2031ab8c678864e1b88f86377iwl105-firmware-18.168.6.1-72.el7.noarch.rpmd5b7be32de7144f85f9565e45674ea36df2d8f802803f06c56c2679a14f4185aiwl6000g2b-firmware-17.168.5.2-72.el7.noarch.rpm195b7d77e4899d62a097f698c2efc6e9447eef4ea1008322a5f4841b2efe86feiwl6050-firmware-41.28.5.1-72.el7.noarch.rpmf8ebd2e82e1790efa33ea2e48375a63a56c2934ed34cc91eb40e02c585c06febiwl100-firmware-39.31.5.1-72.el7.noarch.rpma804828ae01930099e12f476540a420a2e8fa0187e523b807dc7f7d7a3e3c164SLSA-2019:2177-1SssdThe following packages have been upgraded to a later upstream version: sssd (1.16.4). Security Fix(es): * sssd: fallback_homedir returns '/' for empty home directories in passwd file (CVE-2019-3811) * sssd: improper implementation of GPOs due to too restrictive permissions (CVE-2018-16838)moderateScientific LinuxScientific Linux 7sssd-polkit-rules-1.16.4-21.el7.x86_64.rpm25c6faa267fe14c7ecde40fcaafebaea2a00d7ab6bd8cab0a518ef3f4286fa45sssd-proxy-1.16.4-21.el7.x86_64.rpm5fef42ae0361a37b158d7e03805c1faaef56762863223c01a92f1899265150c0libsss_certmap-devel-1.16.4-21.el7.i686.rpm93306e7a9df2e31a7bdbb67c02b582899632d2f4172bc66de0dab7222a934fa9libsss_nss_idmap-devel-1.16.4-21.el7.x86_64.rpm0f561505d8fc74b731efd49d3df05f264a616d04c48693b8a785ffc9bca09cdblibsss_nss_idmap-devel-1.16.4-21.el7.i686.rpm4a6e73e2e41cbd191655b4067fcde2db9973d1712852f7283799a38eac3eaf20libsss_idmap-devel-1.16.4-21.el7.x86_64.rpm1ee3e735bfec09f8c3a93674cc98efb94695ab8ff5c24f5e06be3018d752940dsssd-libwbclient-devel-1.16.4-21.el7.i686.rpm8cd66da996986184b741e5e625f1ff391471706416040629afacb3655f84312flibsss_certmap-1.16.4-21.el7.x86_64.rpmcdad6f6e440805980254d09764e6de0c1e200bcaa2577b48323f882fc536fa09libipa_hbac-devel-1.16.4-21.el7.i686.rpma3aa82c5f14e90e0e0498b742c47af09ed04f54ba3f0e56bd35f25501ca87c0csssd-1.16.4-21.el7.x86_64.rpm15fcded7444bce08443cc157a387380e5e288155215fc05fe0948f7358eb5f9asssd-ipa-1.16.4-21.el7.x86_64.rpm5c2a0902b40412691818983eb6bacf794e782c876b83536a60e6c871aaf12b9blibipa_hbac-1.16.4-21.el7.x86_64.rpm27c9a1fbe06053b4d42549502c11e8f8474be3a3c3cc9aea56c3017f883f6dfclibsss_simpleifp-1.16.4-21.el7.x86_64.rpm2e1f87b69ea9991453fe3df1a3a8426cee9a3c15d27940951e4e4f61ae6b8d64libsss_sudo-1.16.4-21.el7.x86_64.rpmc67c6d27920b36caa413e2908e97b75314351c7ba148cc42b72f0463303eaec9sssd-dbus-1.16.4-21.el7.x86_64.rpm87aa2cb4ccda61001c05800923feb0196045cc196f118c152709f05ec1525b13python-sssdconfig-1.16.4-21.el7.noarch.rpm54f965a0503ccab3c558c1c4d50fb2f6ef95692bc6c2aa334a31855b4bfaaa0elibsss_idmap-1.16.4-21.el7.i686.rpm8e4f08523cf4a373f69d06a266301c1ba1a0eb2e6d7756ab6e3ddf2579e29035libsss_nss_idmap-1.16.4-21.el7.i686.rpm721a911c8960b7849e629cbdfbb56f01dcef5d05e6ea4670b8d4815d69d0a6fblibsss_simpleifp-devel-1.16.4-21.el7.i686.rpm2e6f41bfe745e2dd97eaac14d99430089e945473f355567ba8bf1625788c7a36libsss_autofs-1.16.4-21.el7.x86_64.rpm6913ea836b1366888798fdf2e75daeb7a2311f497951245469a638137841e949libipa_hbac-devel-1.16.4-21.el7.x86_64.rpm11f0a6b994be43b40a4608b2680bce027d5d21e469770e40df634f20e8209dd9libsss_certmap-1.16.4-21.el7.i686.rpm934295c20ff242018ee09b5d51ffe95c62bb0d6aeb80bdac82af9411e63cf6b6libipa_hbac-1.16.4-21.el7.i686.rpm21f8bd29c49398a5f3b8cda6d5e9b7ee446d28d7ec0942ba047be9616d743bd5sssd-client-1.16.4-21.el7.i686.rpmca1edb2e0706dbc57c82951405cf206708f48a17f267e8dfb0c233c5a20d9f72sssd-client-1.16.4-21.el7.x86_64.rpmffd79fc44f062efde47ad3d23457062b8cf683cb944d90a7c9e5d3627bb9fef5libsss_idmap-devel-1.16.4-21.el7.i686.rpm234aa1bd5ed29f907f3df9a985ae5150e1f50bfed33f25026d4a390c76d0ac89sssd-libwbclient-devel-1.16.4-21.el7.x86_64.rpm422e2540c461f8d3981305d3d62bf261cfbe7b947ba7036dfcf5c68c4cad828asssd-krb5-common-1.16.4-21.el7.x86_64.rpmc09e70ce8d3a8d8e6f5daf9935ab6b538cd87f221ed55994c7f64cf89ca9566bpython-sss-1.16.4-21.el7.x86_64.rpm6d2c4249b14cf5b4bc1029960cbf02c3cdef69c793aa9c1a34be837eacaedb54sssd-krb5-1.16.4-21.el7.x86_64.rpm563b406e42a62bf19f57091536dd2442ca655870b4a5bd6b124d52abda28d1dbsssd-common-1.16.4-21.el7.x86_64.rpmedce2b5c409af1535155d46766d8f26025e49aa4aeada37e9c00c736f5c32260python-libipa_hbac-1.16.4-21.el7.x86_64.rpme64a40026d7316dcba68f6b683787ffe700250af14054a5349ee18eed3a1f47bsssd-common-pac-1.16.4-21.el7.x86_64.rpm4d85ced2f6770354df7be9d41b5bfc345a1ce21247a6806ff548e288b372e0e6sssd-winbind-idmap-1.16.4-21.el7.x86_64.rpm240c62805c74d3916edf2a6e6b0b78aad81fb9274e45f9a30bb5900119a2a683sssd-ad-1.16.4-21.el7.x86_64.rpm0ef260b336080dd9b55c5f48e6fa565ab6104260b74a77a10b0c52961dafe509libsss_simpleifp-1.16.4-21.el7.i686.rpmb4051d37b1c16b63c628abfbdba0df3b23d6dc501279792aedc42aa29d4fc9fesssd-tools-1.16.4-21.el7.x86_64.rpm60209f3e02fb70b45c5f590dbca8d88ed0526f540c71d689ad10bfa7fb16a716libsss_certmap-devel-1.16.4-21.el7.x86_64.rpm3698196727d6a4785a08c72b593b97123361f47c8b0afa61b7cd92721c498ce3python-libsss_nss_idmap-1.16.4-21.el7.x86_64.rpm51fdd7f9716d7b96efab4687a195bc633540d7444ec3a48102fa7ea029f2d235sssd-libwbclient-1.16.4-21.el7.x86_64.rpm9dfad753a409df6d2e2504d6f32da49756d74e961aea7b4162d8150ad493ff4clibsss_idmap-1.16.4-21.el7.x86_64.rpm5dca16fa549eccfba77ad0ff079cb3d6ab2be44227e38aa7b833b70d7d2b2527sssd-ldap-1.16.4-21.el7.x86_64.rpme2145c276e0871cf7bb6d0e45c036eb77327389d7589c4719abb3e3d74fbb160python-sss-murmur-1.16.4-21.el7.x86_64.rpme622affbebee15c3e37ac63ce7981c2ced45e0bddb85f4fc8bf30bca40b288e8libsss_simpleifp-devel-1.16.4-21.el7.x86_64.rpm77a7aeafb66c7de4585c98183c960be777a68b125832ee6bf8fc3604dd008979sssd-kcm-1.16.4-21.el7.x86_64.rpm7512db1643fac76189a0decf405348851af9dce04dd9ba21baaa789f2928cef1libsss_nss_idmap-1.16.4-21.el7.x86_64.rpm673996d00a59add58c5ae648c1c64322696d115e21a5b1a5a058289f2455d562SLSA-2019:2178-1Udisks2Security Fix(es): * udisks: Format string vulnerability in udisks_log in udiskslogging.c (CVE-2018-17336)moderateScientific LinuxScientific Linux 7udisks2-lvm2-2.7.3-9.el7.x86_64.rpm2c2f64a68ab09e18bda038c2294d285927e0393d38043e1497d467847424026budisks2-2.7.3-9.el7.x86_64.rpm9099ee1dc754900e4b5c2b93b7a30d0dfd21f7de59ff88eb9230116d8a4e5326libudisks2-devel-2.7.3-9.el7.x86_64.rpm6acf30af273f190b9843721949c1eff0a429b2ba8adbb57307794d8dea682a77udisks2-lsm-2.7.3-9.el7.x86_64.rpm026261e258efa4f334b530b2caf600d6677dd4babe729f3e87127b4d92875b4eudisks2-iscsi-2.7.3-9.el7.x86_64.rpmc80474df53b0a481bd1ce080cda220a9b0b0e9698699422ac780c199b65a1460libudisks2-devel-2.7.3-9.el7.i686.rpm5fed46879d7a498128575616cb45ee4ea9da3c1c4ec77b58a95962688efe1947libudisks2-2.7.3-9.el7.i686.rpm47fee8b93cd2a17707cb3878a45ee63a4067667b5563b8811d2c179af93c562blibudisks2-2.7.3-9.el7.x86_64.rpm39ee5aa547850d13ca3ad0bba3a4ade65a43a379d0121810799ae6ba01f90520SLSA-2019:2181-1CurlSecurity Fix(es): * curl: Heap-based buffer over-read in the curl tool warning formatting (CVE-2018-16842)lowScientific LinuxScientific Linux 7curl-7.29.0-54.el7.x86_64.rpmeba04f278b4e6b3063e6872f04f134c6c7c4d5bb4e20dc361a0d0f1b84d593dblibcurl-devel-7.29.0-54.el7.i686.rpm93b8ab80da1a536a9812786c912eb9a2962eab0656ad9f0a572a8fe5f3789b23libcurl-7.29.0-54.el7.x86_64.rpmfa683a257866522bc5f029fbd8bf0b19b3feacb0091d6673735c53c55f4dd14alibcurl-7.29.0-54.el7.i686.rpm20267e94fb8a5c723daf193e2a426feab9bbf7ec710a1c23bc1a99a3226106d7libcurl-devel-7.29.0-54.el7.x86_64.rpm2b3acef1c65037fac0beb8fb076d479a2a9ac8800cd9f5343b42220a3834da70SLSA-2019:2189-1Procps-NgSecurity Fix(es): * procps-ng, procps: Local privilege escalation in top (CVE-2018-1122)moderateScientific LinuxScientific Linux 7procps-ng-i18n-3.3.10-26.el7.x86_64.rpm3374a9e82d434cc84350c7c80cafd06dab78335c7ef160b675f902b7fdfb71e1procps-ng-3.3.10-26.el7.x86_64.rpm876f9050e44129dac4efa03e3e48a0c11b460d7c3fcfb204b7a6ce2ad632297eprocps-ng-devel-3.3.10-26.el7.x86_64.rpm014f5cc26127c9f075ce066168010133bbf03326d4c793a037831d47690835a4procps-ng-3.3.10-26.el7.i686.rpmc6a8e6d442666a657018a1ff611c9f664858c357ac03a984e12e4f777f87607cprocps-ng-devel-3.3.10-26.el7.i686.rpm371c579d6b29ddc191149d79f615b69d0cdd9638ebfdc836206a2675b153a640SLSA-2019:2196-1ZziplibSecurity Fix(es): * zziplib: Bus error caused by loading of a misaligned address inzzip/zip.c (CVE-2018-6541) * zziplib: Memory leak triggered in the function __zzip_parse_root_directory in zip.c (CVE-2018-16548)lowScientific LinuxScientific Linux 7zziplib-0.13.62-11.el7.i686.rpm977e14c37a992d871a2cf119601c300c1a8fac7e4c5840e64fbc2c5931503df2zziplib-0.13.62-11.el7.x86_64.rpmd3324d50a0df992e625199e127bb7e791e27105d32bcc136fa458409c59b579ezziplib-devel-0.13.62-11.el7.x86_64.rpme851e0b0bc58416f41b3a33e02ad891dcbe1e964f2ae3bda53ea88605feb6613zziplib-utils-0.13.62-11.el7.x86_64.rpmde62ace322bf8c575626c21ab1fc8afcb64dc50b3d5a89100c05d5d40dcd6799zziplib-devel-0.13.62-11.el7.i686.rpm8008989b12129a125ce2f3e8b47eae0414ad4d617bbe3d7d29b7a7b2762a1fb3SLSA-2019:2197-1ElfutilsThe following packages have been upgraded to a later upstream version: elfutils (0.176). Security Fix(es): * elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file (CVE-2018-16062) * elfutils: Double-free due to double decompression of sections in crafted ELF causes crash (CVE-2018-16402) * elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash (CVE-2018-16403) * elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl (CVE-2018-18310) * elfutils: eu-size cannot handle recursive ar files (CVE-2018-18520) * elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c (CVE-2018-18521) * elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw (CVE-2019-7149) * elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c (CVE-2019-7150) * elfutils: Out of bound write in elf_cvt_note in libelf/note_xlate.h (CVE-2019-7664) * elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c (CVE-2019-7665)lowScientific LinuxScientific Linux 7elfutils-libs-0.176-2.el7.i686.rpm1c58fb5f2d15a8ab28ff74ad37f524ae14bc78ef4697205c6c6a66b6160dbe9delfutils-libelf-devel-static-0.176-2.el7.x86_64.rpm154ba76a017a045028509260fe689b706460df8453613efc0eba26ee135804f8elfutils-devel-static-0.176-2.el7.x86_64.rpmeabd22e44d35ec6c1d9589d82f358040f5ce451127dca0f0f04dda0a4c13df0belfutils-libelf-devel-0.176-2.el7.i686.rpmdfbee40e24223f5153725d56226ee26c586c5c8cfcd2606f8272f49f5558492delfutils-default-yama-scope-0.176-2.el7.noarch.rpm012f95e89b352215a93a3f2e021cbbc5242b1bb6984328e5252d0fa4bd8d64d3elfutils-libelf-devel-0.176-2.el7.x86_64.rpm57e2023dfff8636deb25ca44b6696e758e3f921e718c7b6e8aec53d47cd7a9feelfutils-libelf-0.176-2.el7.x86_64.rpm178df255df91b7ac6fc2145410acd5b73facfd8fce4e8bd17719df3bd10552d5elfutils-devel-static-0.176-2.el7.i686.rpm73288f6efd2d3561fe78c17f4d3df4afccb29006733822c24354c72c456526bbelfutils-0.176-2.el7.x86_64.rpm4cb85a1e910cb449b6b2cb1f696371738a7bddd1d2150d19ba9530f157725079elfutils-libs-0.176-2.el7.x86_64.rpm0a70cdf59cb533854696f6b4713319b0b7d0070634c80bfc64b41586f55b3b94elfutils-devel-0.176-2.el7.i686.rpm238bcd68e55cfc4e8a90b03ec2cdce9f976ea7d71e7e0b61538c276c55635397elfutils-libelf-0.176-2.el7.i686.rpm05229aade9def1e7ba7cc63b4d6e197a3dc42ab8a7b452c746ae82b20d972b30elfutils-libelf-devel-static-0.176-2.el7.i686.rpm1d8b665c6700565aeec69c802d7812f711d0532fdd4d80b6d08f44c8317a6434elfutils-devel-0.176-2.el7.x86_64.rpmc7c80b236167b2a2d2e1e5c1f8dc967dbb0809a75a979659df2a7b09204e220cSLSA-2019:2205-1TomcatSecurity Fix(es): * tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) * tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)moderateScientific LinuxScientific Linux 7tomcat-docs-webapp-7.0.76-9.el7.noarch.rpm74a7cbfe82daace38212731d02be4068fed88088097e894c1e8db23f298bd105tomcat-7.0.76-9.el7.noarch.rpm91fe1cfb599c72f1f944735aae9b0dbee21b701dcd0bd338dcea5418c0f9a5d5tomcat-jsvc-7.0.76-9.el7.noarch.rpme78654e4904e1fcc98012caac5348122dbd3c093effa7f76e869f334996f36a2tomcat-jsp-2.2-api-7.0.76-9.el7.noarch.rpm498cb473cf01690492d233dedd0cf3f9ef4d8c1a0e5b3e493a160b364b0dd8a3tomcat-admin-webapps-7.0.76-9.el7.noarch.rpm7d713ef41d520749fe2b0ef011206d49380a1348c1406938e34621d0d512cafftomcat-javadoc-7.0.76-9.el7.noarch.rpmcc9612dc527478821d5b1bf93ecc8631f350133409006e5ff4ce965231674242tomcat-el-2.2-api-7.0.76-9.el7.noarch.rpmc97fc1b7a9b5d1f9badd68f9d759622054912089cf2402b7c9178bb8835574dctomcat-servlet-3.0-api-7.0.76-9.el7.noarch.rpm2c5f2909daddc5b36ee6d6266a07b173911d9efa258674fc9faf8ef1d9017b8btomcat-lib-7.0.76-9.el7.noarch.rpmc5b46f1a64280e7212590fba523393d1a9218e89919f03822fdcb560d01cf94dtomcat-webapps-7.0.76-9.el7.noarch.rpmd60acefc27c055da431682c97fac87cefcb4d1f092ab88fb8490883dc385dd24SLSA-2019:2229-1Spice-GtkThe libgovirt packages contain a library that allows applications to use the oVirt Representational State Transfer (REST) API to list virtual machines (VMs) managed by an oVirt instance. The library is also used to get the connection parameters needed to establish a connection to the VMs using Simple Protocol For Independent Computing Environments (SPICE) or Virtual Network Computing (VNC). The spice-vdagent packages provide a SPICE agent for Linux guests. The virt-viewer packages provide Virtual Machine Viewer, which is a lightweight interface for interacting with the graphical display of a virtualized guest. Security Fix(es): * spice-client: Insufficient encoding checks for LZ can cause different integer/buffer overflows (CVE-2018-10893)moderateScientific LinuxScientific Linux 7spice-gtk3-vala-0.35-4.el7.x86_64.rpmec708b84a8e8ce5ff04840b6fe9f1cf1860ddbda6ee0018dfc9f5e6ca59d51e2libgovirt-devel-0.3.4-3.el7.x86_64.rpm562ff91b1d0c38bef5261a0f714ceb32bb7ae59f59843eb9c12e07b9c5b0c6c0spice-gtk3-devel-0.35-4.el7.i686.rpmd4436a6bb39022d2efc6977adcd7bdaaea6be70d908abd11d413f49716092358libgovirt-0.3.4-3.el7.i686.rpmbe275b364e4b402f6c60a610be093b8dc4c9b259760325679aae10557c84a09fspice-gtk3-0.35-4.el7.i686.rpm7b9fd2dfaf4edb714ff319e9e4547581746351f6f78e34bae84f492f784de5a6spice-glib-0.35-4.el7.x86_64.rpm1870fa90d3a83d01e2c901a1caaf9b0aafeafa32d492011d93dea831ba57f477virt-viewer-5.0-15.el7.x86_64.rpm75974baff920eb162199b78b3ec8a545c47b69b5c5ce9cb6c4541d2fb35c83d8libgovirt-0.3.4-3.el7.x86_64.rpmc139a5196f632f840856d1c6268411a4976416b308b5ec9f47ece07e75f168b8spice-vdagent-0.14.0-18.el7.x86_64.rpmcb431b071406fc028747be8ebecead529c935003330082b36aa90c15976995felibgovirt-devel-0.3.4-3.el7.i686.rpm207f2291369165880a389aee83d5165bbc9fb29de623916502bec0fbfe44f69cspice-glib-devel-0.35-4.el7.i686.rpm23bd0a72fe8f5829241d6a95f79d9fafc56dca87d0d7c4efea8a5267a4324bf2spice-gtk3-devel-0.35-4.el7.x86_64.rpme8f15392a140e9e2f17dabda7144a5eb457e4f6535f74218618353b75eeee533spice-glib-devel-0.35-4.el7.x86_64.rpmd988c92f5d1152dedda8feb25958f08f24829a035f9807ba6e5aabe0eb626e1cspice-gtk-tools-0.35-4.el7.x86_64.rpmc8313f20e593682c8989ddcb048f8936eb8bf50bbe7e67daa09bf714f763db67spice-gtk3-0.35-4.el7.x86_64.rpm569b44c8a85e075eef107c7c20c9a41271b445cbdf4f6067b1557d13b4b7afe9spice-glib-0.35-4.el7.i686.rpmf50be60b197a60cb70f4d09e26a2f2f5f3d7be811324acc69a125bdd9dc64c1bSLSA-2019:2237-1Nss, Nss-Softokn, Nss-Util, And NsprNetscape Portable Runtime (NSPR) provides platform independence for non- GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.44.0), nss-softokn (3.44.0), nss-util (3.44.0), nspr (4.21.0). Security Fix(es): * ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495) * nss: Cache side-channel variant of the Bleichenbacher attack (CVE-2018-12404)moderateScientific LinuxScientific Linux 7nss-softokn-3.44.0-5.el7.x86_64.rpm146c05085a965a06f8f830390f193e790e6f360d0ea5fbff1585ea6e3c434cbdnss-devel-3.44.0-4.el7.i686.rpm1369795b9a89ef6e4bf74edf32270b91115c760d5de1b6b98aa2a9e0e1c48782nss-softokn-freebl-3.44.0-5.el7.i686.rpm9e413d12915178d4416a35501077485121e50ebadcb3e2d29e09e4a42a04ccbbnspr-devel-4.21.0-1.el7.i686.rpm864c539df80fc3f1db33e511518ebcdd54c3b336d7f1af6faf7b5e50f1f4f034nss-devel-3.44.0-4.el7.x86_64.rpm085e6392c89c788ac8815f53160ac93f3cc608884cda542022b3410eea3d5b26nss-tools-3.44.0-4.el7.x86_64.rpmca3b70a0bb881e2d7469a4605f6da954bd8ed601fb4ebd5bb650a7b0c2a346a4nss-pkcs11-devel-3.44.0-4.el7.x86_64.rpmd794c60e34298070d9754e0fe4629576a1bc753de6ec18c05499eaa4800d7dacnss-softokn-devel-3.44.0-5.el7.i686.rpmf0c2f053dbbf6c7b664e354bdfc27236f7d8fbf706a2cf82d459b289986d5987nss-sysinit-3.44.0-4.el7.x86_64.rpm86995364e3943b0e206c11a64cb7e71be12289d2d5fd898a47999e8de4bc459dnss-util-devel-3.44.0-3.el7.x86_64.rpmbfb1a54266db5dd4494ff302b5ed1be3ee9798b10ab24b2f893bccf5f2f150e1nspr-4.21.0-1.el7.x86_64.rpm6ac4ab8db58e7aa40a62354f44607267d82d472eca91b205a35f01091f4046d0nspr-devel-4.21.0-1.el7.x86_64.rpmdde4719aa2f67f866a4ae1afdb9fb4ce46fe3bdba785b85e20ae54445b47564fnss-softokn-freebl-devel-3.44.0-5.el7.i686.rpma75c14e4735e51dd21e9b54fae7912728968048037a534f024437e26bef17e5bnss-softokn-freebl-devel-3.44.0-5.el7.x86_64.rpm89514ba2276782a76fb459308d2bfa5d943c8c7fbce78c16496915a0ef4968c3nss-pkcs11-devel-3.44.0-4.el7.i686.rpmbf0a3a04f309e10f4ca1dfa4162dd6dcc9906bdc1f319c83020d976d0c8a1e1fnss-util-3.44.0-3.el7.x86_64.rpmd00efa3be2125bac037dc35adc7fbf35a11938609b6fad6e0f17097cb92396dbnss-softokn-3.44.0-5.el7.i686.rpm31920d1b61ece4c377ee87445a951de89be853a14eeefbf6cdc20f3be7f25542nss-util-devel-3.44.0-3.el7.i686.rpm97b8b4fc7e3ad07de2af30be4037554789b8bab990113aafa897e6c5ca31ce34nss-softokn-devel-3.44.0-5.el7.x86_64.rpm11ece7f154d3c52942b0d0e3f697cca36839b48b9adfb5870e33893151c81d84nss-3.44.0-4.el7.i686.rpmcfb646ff03c5e18929e6ecdaf35142cf9da0ed953df9381aa8629c773829b04dnspr-4.21.0-1.el7.i686.rpmad99e36575c53ad86217025e3e5796f7d8f046c1defd1a3f10b62a1794caa9c8nss-3.44.0-4.el7.x86_64.rpmd16d0ebcabf0078678d2e94b89240e8ed0764bbac4619a53de7c019c4b9b10cbnss-util-3.44.0-3.el7.i686.rpme0be655623edc1c0b405fa712aedf9121d4585748ebfa028f2c90b02a5258e13nss-softokn-freebl-3.44.0-5.el7.x86_64.rpm819800bfc96b48f23364d69262b17296b919023c8c900a1496aa97899efc1873SLSA-2019:2258-1Http-ParserSecurity Fix(es): * nodejs: Denial of Service with large HTTP headers (CVE-2018-12121) * nodejs: HTTP parser allowed for spaces inside Content-Length header values (CVE-2018-7159)moderateScientific LinuxScientific Linux 7http-parser-devel-2.7.1-8.el7.x86_64.rpm586f539c645af9f5b7b0eecd063f8ecec47a86cf28b582d18c5614a769435fdfhttp-parser-2.7.1-8.el7.i686.rpme9255b46da5640ef0ab2b4f6fed9abb58f6cdeab08cec0235162531c35c0ccd7http-parser-devel-2.7.1-8.el7.i686.rpm7f85b9ac2fc7a9801a90cfc392b1a775621ac7401c471b20e82ba3584d5de836http-parser-2.7.1-8.el7.x86_64.rpmf29e27f4df29f183916edd892ca42f91a5185b06e5de3d45e6334f4aedbaa334SLSA-2019:2272-1Python-Urllib3Security Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)moderateScientific LinuxScientific Linux 7python-urllib3-1.10.2-7.el7.noarch.rpm301138848f3705220b04a9363064f84d50dfdda8266e1475aa90da0c263f10fdSLSA-2019:2276-1MercurialSecurity Fix(es): * mercurial: Buffer underflow in mpatch.c:mpatch_apply() (CVE-2018-13347) * mercurial: HTTP server permissions bypass (CVE-2018-1000132) * mercurial: Missing check for fragment start position in mpatch.c:mpatch_apply() (CVE-2018-13346)moderateScientific LinuxScientific Linux 7emacs-mercurial-el-2.6.2-10.el7.x86_64.rpmbc2a89a871354b8b67e46b89018a5cb180bd20ac7650ecc83f0617dacb456fc9mercurial-2.6.2-10.el7.x86_64.rpm7df7c7eb0ebc2a89b3db5fe99774ef4006b3fa28d3fca7c161a011a46f87fe80emacs-mercurial-2.6.2-10.el7.x86_64.rpm8ae7810144e78ae2c6f00c87d6c09254cfec7d1759ff9a3f4a265984e3c292e2mercurial-hgk-2.6.2-10.el7.x86_64.rpmf02a8a6b49f71038d52712acfbe7d0d4d9f83515696399c22a207115cb7d3b05SLSA-2019:2280-1Uriparser* uriparser: Out-of-bounds write via uriComposeQuery* or uriComposeQueryEx* function (CVE-2018-19198) * uriparser: Integer overflow via uriComposeQuery* or uriComposeQueryEx* function (CVE-2018-19199)moderateScientific LinuxScientific Linux 7uriparser-0.7.5-10.el7.x86_64.rpm8b41cc10ea7188c7e5aab68d1c35b690e7691b85ed1d94883fae432d8788a885uriparser-devel-0.7.5-10.el7.x86_64.rpm2b6d4bbb162ddfce3bd6bcd38169025c2e18b06b98bd3ff69a5bf0954acbe832uriparser-devel-0.7.5-10.el7.i686.rpm0b74b7ba5608f9314639afb5bfec5d8e294d98fdd7df76dc3edcd0f9a949b41buriparser-0.7.5-10.el7.i686.rpmb6250ba3e1e12713b15609e41f2182b020f4dc61743eb75726f47a5086ba2406SLSA-2019:2281-1GhostscriptThe following packages have been upgraded to a later upstream version: ghostscript (9.25). Security Fix(es): * ghostscript: status command permitted with -dSAFER in psi/zfile.c allowing attackers to identify the size and existence of files (CVE-2018-11645)lowScientific LinuxScientific Linux 7ghostscript-doc-9.25-2.el7.noarch.rpm8d5ee86fd50d0addcd8702ebc40e2258acf6e96127441d7016df1a7d03ac47bdghostscript-9.25-2.el7.i686.rpm9280d7c7b2d75d42cd33977487059454428813f259d43c363386b1476a6f05aelibgs-9.25-2.el7.x86_64.rpmd9d2f10ceb28a86acfda1ba01ce8c5f7318a2d2e1f5f73771c14239cd098fe6elibgs-devel-9.25-2.el7.x86_64.rpm34d907a4d8cfc20e882b180db19fe9725b8f1f88a51873e874ab72c1b67bd96bghostscript-cups-9.25-2.el7.x86_64.rpm05979f8ad296db4d04d83e01b724a839996027e92157ed61d7e56da1d3444a81ghostscript-9.25-2.el7.x86_64.rpmc59d8a179a31f338177f81630175a9941a09583c1b8a95b4cd226b8dbd6c9f1eghostscript-gtk-9.25-2.el7.x86_64.rpmd91c6d09d35e2f0d779311148639b0a933d6b704626bd86fc801f28dcaa834e3libgs-devel-9.25-2.el7.i686.rpmd610f5c4902c17a83e17dfe7a84e144d395b88ac9769b821e16ca3ec06a5e5d7libgs-9.25-2.el7.i686.rpm4393d6ec6eac856e7f4d9bd9d20dbafac469b8e1d76d49c53dbbd93de145fde3SLSA-2019:2283-1SoxSecurity Fix(es): * sox: NULL pointer dereference in startread function in xa.c (CVE-2017-18189)lowScientific LinuxScientific Linux 7sox-14.4.1-7.el7.x86_64.rpm326d37a578f9e655acaac2e66b4b9d038c1f925bc7a7a530f20e4abeabf01670sox-devel-14.4.1-7.el7.i686.rpm4d432a674ef5dd0ddb7df0b29d5a19f79ab5b93b034fdb0e08c07cf1e4932d83sox-14.4.1-7.el7.i686.rpme0cfa4615cc81336bc6596faf71eb26bb5ddffdfbe6dfebece9edc2724419fc5sox-devel-14.4.1-7.el7.x86_64.rpm43f1f775215b8fa8348328267cb92e11503fd2021db021b192b8b58294734ad8SLSA-2019:2285-1KeepalivedSecurity Fix(es): * keepalived: Improper pathname validation allows for overwrite of arbitrary filenames via symlinks (CVE-2018-19044)moderateScientific LinuxScientific Linux 7keepalived-1.3.5-16.el7.x86_64.rpmc25e76d995e1eb6587e7b1d962fa72fd05f29229a8a495d877fd1cd52fb9a184SLSA-2019:2290-1LibsolvSecurity Fix(es): * libsolv: NULL pointer dereference in function testcase_read (CVE-2018-20532) * libsolv: NULL pointer dereference in function testcase_str2dep_complex (CVE-2018-20533) * libsolv: illegal address access in pool_whatprovides in src/pool.h (CVE-2018-20534)lowScientific LinuxScientific Linux 7libsolv-devel-0.6.34-4.el7.i686.rpm9617b121e9d2d6090eb520c191b384d1e21255f35773c070c3eac3f68f7ff2bblibsolv-tools-0.6.34-4.el7.x86_64.rpme611fd3e093e996c644b414df52eadf9ffe3fbacd89b7c83b608b62f3ab76778libsolv-demo-0.6.34-4.el7.x86_64.rpm5004290a4325c6fd1b9ce014977dd1cb61fa9f9048055ee5283e817e589428a4python2-solv-0.6.34-4.el7.x86_64.rpmd7acf68f149ceeb96bfe0fff1dbed64d9db8c7aadb0bcc5e0e7ff5fb1a3c08eblibsolv-devel-0.6.34-4.el7.x86_64.rpm45f5d16ae91bd2b2acc9a4d5b7b874dde742026ec31f84ad227a37106a368a09libsolv-tools-0.6.34-4.el7.i686.rpm5f5c85dc730640e7d1302b1ed020b53cdad66016b8b34b1980b2ed2d39aa03a0libsolv-0.6.34-4.el7.x86_64.rpmeda429e432e0c1d94763fa7d9b27050aa13a4b4bed5fa23dbd7be4252c9fb9bflibsolv-0.6.34-4.el7.i686.rpm23ff2d693f0c3284add7d63425dadaf7e22481fb456d4c6a961c0fe231d3cb56SLSA-2019:2294-1LibvirtSecurity Fix(es): * libvirt: NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function (CVE-2019-3840)moderateScientific LinuxScientific Linux 7libvirt-bash-completion-4.5.0-23.el7.x86_64.rpm3f4c0c0d26d46fc34ca52b7a312592e108525bbc29bebb7e274a3055ded832a1libvirt-login-shell-4.5.0-23.el7.x86_64.rpm8e82e1d8a73a3caa12acdc074e4ee147045e85ecba7e6b9170eff471259ad142libvirt-nss-4.5.0-23.el7.x86_64.rpmb83e3af5dc590f5b47dbd02f3bb34f992ea8a579ddea16c8fee9c8e1bc2dbd2blibvirt-nss-4.5.0-23.el7.i686.rpm2f713eef42902927c7b44b8c7793d3d30343baaf95b82396e3c0152cd45d9b82libvirt-daemon-config-nwfilter-4.5.0-23.el7.x86_64.rpm7d3424ae3bf92cee36192d24255f0dba257373073d0ed7630341dfe512fa94b2libvirt-client-4.5.0-23.el7.x86_64.rpm489f6ca067d091d9b7b48979f88e703220307d273a9c264f0e74c2c80acfac9alibvirt-daemon-driver-storage-core-4.5.0-23.el7.x86_64.rpm3ae659d672cd6555a9af1af15d0f6f73356631268fa030bf55e23a6f04666eedlibvirt-admin-4.5.0-23.el7.x86_64.rpm7baaf3f212b43f434d3d4d6e08ea4e9e27b87577234ff84b9ed807035c48bbe9libvirt-daemon-4.5.0-23.el7.x86_64.rpmf0208b2a1e8f18a0957c13db8e13238e8273094a2613bae0b7f5b9c6e2d4baablibvirt-daemon-kvm-4.5.0-23.el7.x86_64.rpmda9cfbb0a753ee0033cd612ac658f3962487fe61c3bb3183dfcca2ca79fed20dlibvirt-daemon-driver-storage-scsi-4.5.0-23.el7.x86_64.rpmbc49a8498fc4402220baa314a86018537a31a6c82906e24d8af666e041c64949libvirt-4.5.0-23.el7.x86_64.rpm61161019662f3d343b704314b204b71bac7c8e58cf22b1dcf3ad40b818981a76libvirt-daemon-driver-nodedev-4.5.0-23.el7.x86_64.rpmaa20a12eabc1fe27cbae8c44a4eeb30d7f435dc3bb8d1acd00b0e5d83e613ae2libvirt-daemon-driver-storage-gluster-4.5.0-23.el7.x86_64.rpm265cc43228cbb5a9a7d07d26e4e79470c0384913b8ebb0ece15e364d5556708dlibvirt-daemon-driver-storage-logical-4.5.0-23.el7.x86_64.rpmda0e5dc32766bb5574db4a50032f9f270b2b33e5e8a2234f550f4850eb3da4d5libvirt-daemon-lxc-4.5.0-23.el7.x86_64.rpm9d38499f320775f4400984b7cc71cdafcb386aebefaabee4e51dee5b9847f15flibvirt-daemon-config-network-4.5.0-23.el7.x86_64.rpm02f52f1a65c104a662613d6d0ac66d60e403e27ae9e249f6b7acb28a9360994flibvirt-daemon-driver-storage-rbd-4.5.0-23.el7.x86_64.rpm8147b039f8b514caa839d0aa7d47f2b3dd24dab1eb213eef9639cb03d0dd8336libvirt-daemon-driver-network-4.5.0-23.el7.x86_64.rpma6f4bdd6fac53dd34a8798ebf027c66fb09796833241568aee6522fa3f640c01libvirt-daemon-driver-lxc-4.5.0-23.el7.x86_64.rpma9a9c6db3b4cd30116991505c8a871c241fcc91ed0306c8ef8ef4037ee3d9751libvirt-daemon-driver-qemu-4.5.0-23.el7.x86_64.rpmf6468be0c8202c0231767acd60c55afbf0f3096497ca853224af892a6c3151dalibvirt-client-4.5.0-23.el7.i686.rpmcbd0153393bdc70231bca080a3c007180b5c16e5767688db256f1323314cc1c1libvirt-daemon-driver-nwfilter-4.5.0-23.el7.x86_64.rpm08cd87bc73d9f76b1e986e3d8ca0052de47cc249df6b17fa6f19c90299efd75clibvirt-daemon-driver-storage-4.5.0-23.el7.x86_64.rpmdd689f79fd7b1691e5d03f3a2c2afaaa2d23d11f59d5e4482f5db8614c5d2da8libvirt-daemon-driver-storage-mpath-4.5.0-23.el7.x86_64.rpm87bfaf7abf83cb5adcb71aa4a5494ae65c18982373a76a9a71ca2ce3fc2a8c5alibvirt-daemon-driver-secret-4.5.0-23.el7.x86_64.rpmaa31f78a33060cf8d6231fbf0566e31e84963ddd032676e95db3a7b2dea62bf8libvirt-devel-4.5.0-23.el7.x86_64.rpmda5fa2aeb548ae46ee2939e83704e0b87609a40fe328c232771bbab24102a000libvirt-libs-4.5.0-23.el7.x86_64.rpm8e174b55ec3d927e5d437ad30187265416f8edd0d8824412eae6e910c97b6aaflibvirt-devel-4.5.0-23.el7.i686.rpmc554295552fd975eaa681f6d92099c3c0904f5961b6c1c92e503b23a92ece213libvirt-daemon-driver-storage-disk-4.5.0-23.el7.x86_64.rpm561fa6bcc30ce74a729d9cb2cb7d8c1ca3f252f019ab188b20d4ed034516f3d0libvirt-daemon-driver-interface-4.5.0-23.el7.x86_64.rpm241582692d7b5e2329b7c71af7ef172e2892d6adca670299d8903b00258c791elibvirt-lock-sanlock-4.5.0-23.el7.x86_64.rpm39fb152238b5c9c3c8d14b7cfcb138dbd549acf93834e1a7f379bd929fa58652libvirt-docs-4.5.0-23.el7.x86_64.rpm95d18ae2fb90c8eb933f3e9e4450f59ee89fca1aca1b5a557b0089010f289a52libvirt-daemon-driver-storage-iscsi-4.5.0-23.el7.x86_64.rpmc4a1c272520be2b2954a8b0a500827cc40f8d5de481eca1bcf414e8adddcc8bclibvirt-libs-4.5.0-23.el7.i686.rpm598a354ab72d7f1bf01d99de785a039cb01e17edc4ac9746334919ea339ec510SLSA-2019:2298-1LibarchiveSecurity Fix(es): * libarchive: Double free in RAR decoder resulting in a denial of service (CVE-2018-1000877) * libarchive: Use after free in RAR decoder resulting in a denial of service (CVE-2018-1000878) * libarchive: Out of bounds read in archive_read_support_format_7zip.c resulting in a denial of service (CVE-2019-1000019) * libarchive: Infinite recursion in archive_read_support_format_iso9660.c resulting in denial of service (CVE-2019-1000020) * libarchive: Out-of-bounds read in lha_read_data_none (CVE-2017-14503)moderateScientific LinuxScientific Linux 7libarchive-devel-3.1.2-12.el7.i686.rpmb78ed3d6a7c5c20c733b8991f61ab5ff7283c1d08b870d871b48abdc84d4c9a0bsdcpio-3.1.2-12.el7.x86_64.rpmbdbb977457b9f0b160303ce2ee7332ea4a40dcf9fe89e3df60192efd2bcb83d8libarchive-3.1.2-12.el7.i686.rpm3d34ee4691ecbb75791cdeb5c3cb4e13db3acc4a8141a229a2e584cbd3ce5310libarchive-3.1.2-12.el7.x86_64.rpm549ea2c82b13329869197988028c69745170b30208495a131fff60c46c908ed8bsdtar-3.1.2-12.el7.x86_64.rpme79dd4fd6c9cf943b41cc05837a416845ebb092ad6e8d6ce732e223114a77e54libarchive-devel-3.1.2-12.el7.x86_64.rpmb95b9e14331fafea490d2dd6e7b100a81d93438565784b4b71c690c418e093d4SLSA-2019:2304-1OpensslSecurity Fix(es): * openssl: 0-byte record padding oracle (CVE-2019-1559) * openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734)moderateScientific LinuxScientific Linux 7openssl-1.0.2k-19.el7.x86_64.rpmf1d57b3a15f280720a5bbdc2669906efa55d763a1ae72d3a8e39c73c11abc371openssl-perl-1.0.2k-19.el7.x86_64.rpmdc23e2311234dc17947a558c6a965a0700023d6428c86740e5009fc413c16145openssl-libs-1.0.2k-19.el7.x86_64.rpm91c9b330d9ce694388e566a45fcf3068b039e3f815be2f5c717a3a88f8c7f3b5openssl-libs-1.0.2k-19.el7.i686.rpm9066e02688f238a76a6823230b33622171170bead7c363c013cc706defd2a4eaopenssl-static-1.0.2k-19.el7.i686.rpm913443f58cfa01bad45d2394be858087722d483620f178beec696092a25e0734openssl-devel-1.0.2k-19.el7.x86_64.rpmb04c37db6bc04e3fdcbbe2b3ba4d35471922916b0058f21e916b2e8f5f4d352fopenssl-static-1.0.2k-19.el7.x86_64.rpm894d2f90b1b60ff96bef99a9a92df116c03bffaa8e8028e410a2241a1d5412f7openssl-devel-1.0.2k-19.el7.i686.rpm6bd3b43823c8e8c2a2b60fe30b7a02ada40cb8ade796ddd541517bf8f924c73dSLSA-2019:2308-1Libguestfs-WinsupportSecurity Fix(es): * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755)lowScientific LinuxScientific Linux 7libguestfs-winsupport-7.2-3.el7.x86_64.rpm92618e79d4015060f695f4d9f0d706149829986bb4b8ea80867ab09ce10210b4SLSA-2019:2327-1MariadbSecurity Fix(es): * mysql: MyISAM unspecified vulnerability (CPU Jul 2018) (CVE-2018-3058) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) (CVE-2018-3063) * mysql: Client programs unspecified vulnerability (CPU Jul 2018) (CVE-2018-3081) * mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) (CVE-2018-3282) * mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019) (CVE-2019-2503) * mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) (CVE-2019-2529) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: Server: Options unspecified vulnerability (CPU Jul 2018) (CVE-2018-3066)moderateScientific LinuxScientific Linux 7mariadb-bench-5.5.64-1.el7.x86_64.rpm10b9581a853f15b71be84ee31d55aebd20a01a25eee4e581b0a7a22c5683e882mariadb-5.5.64-1.el7.x86_64.rpm551ea44a2482fe8b00ce8ba99823d2ea75637d9953883b528b5172ca6934f556mariadb-devel-5.5.64-1.el7.i686.rpm55239eb77d23fd3db781dd56bd80682d77d3865dfb45084a5a7b94580b005a56mariadb-libs-5.5.64-1.el7.x86_64.rpm9e6abffac659fbac9b2d3efa14930b9cfbab53cfea0c4d1c1718e697d097156fmariadb-server-5.5.64-1.el7.x86_64.rpmb6a969bdbb91564dda440fb66f7103303a6f353a6a4ebbabde9cd5253544f79fmariadb-test-5.5.64-1.el7.x86_64.rpm383ad2e6ad307966a9a0c1496f3fc4e16ebc7e45e9ce8853d4f32a19470d2ce8mariadb-embedded-5.5.64-1.el7.x86_64.rpm3a4da368aa562970889a0b00a60fdbbd7680ae9165606ce1573ee872f6effdbcmariadb-embedded-devel-5.5.64-1.el7.x86_64.rpm9f4f4ad4559d50df6ea57d1df134d6e486d8cc6fd191cfdec397d211371e266amariadb-libs-5.5.64-1.el7.i686.rpmf7860872017cef08fa2b5de9ebfe12a0b6da621704b57d8e4dab304784accec4mariadb-embedded-devel-5.5.64-1.el7.i686.rpm614153030ef846dceff49b9c2b1134673d1f1a57f71d35ef60d96d30ede1c72cmariadb-embedded-5.5.64-1.el7.i686.rpm57d320919b4857f89561f51991c9f4e6031f052bbab42037afcb89d71147b869mariadb-devel-5.5.64-1.el7.x86_64.rpmb186bbdcee0604499acb6864cec672b0860aa6478b7a1fc0ec578668f65806f8SLSA-2019:2332-1AdvancecompSecurity Fix(es): * advancecomp: null pointer dereference in function be_uint32_read() in endianrw.h (CVE-2019-8379) * advancecomp: denial of service in function adv_png_unfilter_8 in lib/png.c (CVE-2019-8383)lowScientific LinuxScientific Linux 7advancecomp-1.15-21.el7.x86_64.rpm7d605f357f5f7f41cc02cd7e37d272f65f653c989cc99542b8b77bb5ae54240fSLSA-2019:2336-1UnixodbcSecurity Fix(es): * unixODBC: Buffer overflow in unicode_to_ansi_copy() can lead to crash or other unspecified impact (CVE-2018-7409) * unixODBC: Insecure buffer copy in SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c (CVE-2018-7485)moderateScientific LinuxScientific Linux 7unixODBC-devel-2.3.1-14.el7.x86_64.rpm66d93285c1c70a8ebf08eccc4582f8419ec48790563f8f945ee2cd2ed0344b5eunixODBC-2.3.1-14.el7.i686.rpm66643d81c538a4c70a773e47f70806460c1a72a5d3559c8423ac26b4c852ba93unixODBC-devel-2.3.1-14.el7.i686.rpm95ce183b513ebdd03df315d825ea44d4a9facac7fa4a433653d1ced86fecafcdunixODBC-2.3.1-14.el7.x86_64.rpmbdb238e90309237930883144902c1eddc3ab3dbf85dc430adb3eca10a920be42SLSA-2019:2343-1HttpdSecurity Fix(es): * httpd: mod_auth_digest: access control bypass due to race condition (CVE-2019-0217) * httpd: URL normalization inconsistency (CVE-2019-0220)moderateScientific LinuxScientific Linux 7httpd-2.4.6-90.sl7.x86_64.rpm9873a6acbf5f7c0e0745c99efaab202277fbf724f0cfb55a9b6f8f784bc5663cmod_ldap-2.4.6-90.sl7.x86_64.rpm3ea48c89f6cba16a2e955f75ecd9b425753fbd6fdca05ddd8bce6c61056a50ecmod_session-2.4.6-90.sl7.x86_64.rpmbf8f33ea4f916869ad49c92be8aa9d088a6170013357f50ca6f77a24c7761565mod_proxy_html-2.4.6-90.sl7.x86_64.rpmbeee4b311bbae9cf632e1cc707a403a9d7dd6bcfae2bd7ce5e2a623084593040httpd-manual-2.4.6-90.sl7.noarch.rpmdd42b269e561e231fc5f4f83b1991a6d4b3ab22a513e2d7d4bfdc6d9c38a6db8mod_ssl-2.4.6-90.sl7.x86_64.rpmb0ad732a61aa5373e1195103702d0ddc5cec09c3cbe637ae04c1af2e4b949c36httpd-devel-2.4.6-90.sl7.x86_64.rpm4e754ce2bfbe0419fa51bb7508e3540cceda3ca2f18295e490efe93caa24252dhttpd-tools-2.4.6-90.sl7.x86_64.rpmae80f01449c43cdde6eefd15a8270cce88f1cbeeeb0515e53cf81face144645cSLSA-2019:2462-1GhostscriptSecurity Fix(es): * ghostscript: -dSAFER escape via .buildfont1 (701394) (CVE-2019-10216)importantScientific LinuxScientific Linux 7ghostscript-9.25-2.el7_7.1.x86_64.rpm3467611d94328fd77643f6698059f4f2059760f5a3d0f873816332e8bd3ba3dclibgs-9.25-2.el7_7.1.i686.rpm83037955afd598a9adaf417cf933775a1ad5485b0391f971241aac2e5222b877ghostscript-doc-9.25-2.el7_7.1.noarch.rpm023b35b0a6f219e869f72285609a58ac50bee627b947373fa233f16abfd4a5adlibgs-devel-9.25-2.el7_7.1.i686.rpme688808b5b759f7a2e43208bcf1049dca008f32bed65667a827f5ed05979cb77ghostscript-9.25-2.el7_7.1.i686.rpmfd53f6804615a79e3ff5a882148d749a7806a877989ef4cceb3b4393b619aa6elibgs-9.25-2.el7_7.1.x86_64.rpm04a234ca5fcf6f6deb60fb900df709500a349c8e34dfa44445b8646f1dc3e351ghostscript-gtk-9.25-2.el7_7.1.x86_64.rpm6037e0c4e0606461e8a2d7f1bd3df580150fc4e6a68f5721c01ed97b31e64b37libgs-devel-9.25-2.el7_7.1.x86_64.rpmf50f2e8574431bd03375b27e4895c5d638933d869410ff675f39dc4644c5c645ghostscript-cups-9.25-2.el7_7.1.x86_64.rpm640485e1179500f23895c5803ce3259806735cfd57d5607cdfc6f8df26f914d8SLSA-2019:2571-1PangoSecurity Fix(es): * pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow (CVE-2019-1010238)importantScientific LinuxScientific Linux 7pango-devel-1.42.4-4.el7_7.x86_64.rpm321e3a8017466347ccf258b722e928e712633c797f46a11c97f24796d1bca066pango-1.42.4-4.el7_7.i686.rpm5594d56a8c595d630365467840fdd9e9abef47d3826d8587069bda20d568c49fpango-devel-1.42.4-4.el7_7.i686.rpm1769126a1a9c3e8f8c523d1623fcca33d52483d5c9c5cfe5e73d1d978b3fe84fpango-1.42.4-4.el7_7.x86_64.rpm73d58aeee40ae0884e2a2da6b7c36fcdcd5435093eb6826468718e6d43a4a680pango-tests-1.42.4-4.el7_7.x86_64.rpm35ae734d6175a4e94e13a13138209cea509bbd9439f640a404c58cd81b3f44c0SLSA-2019:2586-1GhostscriptSecurity Fix(es): * ghostscript: Safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator (701445) (CVE-2019-14811) * ghostscript: Safer mode bypass by .forceput exposure in setuserparams (701444) (CVE-2019-14812) * ghostscript: Safer mode bypass by .forceput exposure in setsystemparams (701443) (CVE-2019-14813) * ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) (CVE-2019-14817)importantScientific LinuxScientific Linux 7ghostscript-doc-9.25-2.el7_7.2.noarch.rpma937f757e1f1c554b6a294547b2829c163373bdf010c9606ae7485b258c7a024libgs-9.25-2.el7_7.2.x86_64.rpm54ce651a0d18f05e50ef5abbf07ec476dac9680e93f7d81907a7e00c33259cb5ghostscript-gtk-9.25-2.el7_7.2.x86_64.rpm12163e6188b41db4c53ffaf0923aab230cb9f8e4449c60377aa5d07264660d86libgs-9.25-2.el7_7.2.i686.rpmbacf91f9a401402c2b04bd4f48b79b7e2deeefb7ccbe563f386d1fda64416c06libgs-devel-9.25-2.el7_7.2.x86_64.rpm0fce5a3c13b8c22c57894b7536ec623fbe4b882b49e96d7397020c11bf20d999ghostscript-9.25-2.el7_7.2.x86_64.rpmf18c6a42e6272acbbd95b26c0beb472ce78270e48205513ddd8b6b80773c40fbghostscript-cups-9.25-2.el7_7.2.x86_64.rpm7dcdaeff50da16ce5083e7b1b2f9f099e50b8a90aad77755c371add328b3fcc0ghostscript-9.25-2.el7_7.2.i686.rpm182e2b5fe0fad66137327d8ea287594248ad0af7bfbb9eedf7db5596cb8a3cdblibgs-devel-9.25-2.el7_7.2.i686.rpma5b07e023836e7d20a529315f9d16d87eb44bd089faf464539aaec06ac4bd529SLSA-2019:2600-1KernelSecurity Fix(es): * kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125) * kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results (CVE-2019-9500) Bug Fix(es): * [mlx4] VXLAN over VLAN TCP segmentation * Race condition in /dev/sg due to missing synchronization causes corruption in RHV * panic handing smb2_reconnect due to a use after free * NFSv4.1 client stuck in infinite loop when received NFS4ERR_SEQ_MISORDERED error * Backport TCP follow-up for small buffersimportantScientific LinuxScientific Linux 7kernel-devel-3.10.0-1062.1.1.el7.x86_64.rpmd50b3920395e2e3fdf9ac37377810447b4f786de981163bc41e624f21942de46python-perf-3.10.0-1062.1.1.el7.x86_64.rpmda6be4ab037413ee83fb64b8bff188c06877fe4c49e219505ce7ddf7dfc3aa7akernel-tools-libs-3.10.0-1062.1.1.el7.x86_64.rpm43004300794b17bbadf674aa2e9f0633ec5d4746fcbb39bc96a81bf2215f5075kernel-doc-3.10.0-1062.1.1.el7.noarch.rpm2e65aeff0093bdf9e38d58cb2443c6f22b173dc2aa3170466635e6a23aa163a7kernel-tools-3.10.0-1062.1.1.el7.x86_64.rpm9590a172d750a68a482c3209f5e766fd287bd022608545a2b6de215706a3f9ddkernel-debug-3.10.0-1062.1.1.el7.x86_64.rpm457a73ab3ad2f477781544fa2427063fbd8d2264f8c49b416b47fb65e52c6c4dkernel-debug-devel-3.10.0-1062.1.1.el7.x86_64.rpm72f436d4492b24a75602c98f0d7cd7bb2cb050d70b033c5674841049becc2f48bpftool-3.10.0-1062.1.1.el7.x86_64.rpmab0c1b357de43ecd9dd3d095f10406e529e3669e50835391bfe8bf0078f5312dkernel-abi-whitelists-3.10.0-1062.1.1.el7.noarch.rpm78692e0e8767c86d94a1320b70e2d3bc7bccea3e993591842f92bc259fba736dkernel-headers-3.10.0-1062.1.1.el7.x86_64.rpm908ac854e0a67b92fa902b293bc345a1ca9e75240aa02d79842380c87725c98akernel-tools-libs-devel-3.10.0-1062.1.1.el7.x86_64.rpmbd4f347030ea67c140eaa780df37232deaae8f381e60bc3c394dd6a8cd2cebfdkernel-3.10.0-1062.1.1.el7.x86_64.rpm9cd5ee440e0f4b78d7ef4f637a6f2a3cdf01bf10d530f9a955ef2c2338b1e144perf-3.10.0-1062.1.1.el7.x86_64.rpm9ab476f5889435c7dd6b444f405818b7b2baaa4c7e34f8d1f9284a3ce0bdba68SLSA-2019:2606-1Kdelibs And Kde-Settings* kdelibs: malicious desktop files and configuration files lead to code execution with minimal user interaction (CVE-2019-14744) Bug Fix(es): * kde.csh profile file contains bourne-shell codeimportantScientific LinuxScientific Linux 7qt-settings-19-23.10.el7_7.noarch.rpm37e3132c07c9f37e72384b7bcd9411ca8c61270252586becd40eae630f2f6153kdelibs-4.14.8-11.el7_7.i686.rpm3568dba998fcef4c10d864f37fbd16dc5b5492b61d19ac86461b4e55af0f0c8bkdelibs-apidocs-4.14.8-11.el7_7.noarch.rpm53f7b5c39a35391d109a53b5fe69f63b87b62dd4a3f11a217a656c985abc191akde-settings-19-23.10.el7_7.noarch.rpm2ee4b0a0c9e9dc41f1286d27f12389788d0f84032ab170ff54fd28a8af0a706ekde-settings-pulseaudio-19-23.10.el7_7.noarch.rpmd1385efd9629e1cb33a702d8ded9eed41a83cd8f3de7aff257b9f1190084adeckde-settings-minimal-19-23.10.el7_7.noarch.rpmf68dc11e20d8523dcbe32318df7f9f98537f8eaab946e0df35f1b25d8aa94a6fkdelibs-ktexteditor-4.14.8-11.el7_7.x86_64.rpm9a072728a3dcb36c8343a2575c42d44e37a2bd955a5db7c043587dd29387e61akdelibs-devel-4.14.8-11.el7_7.x86_64.rpm840e8aed19076d738d7c6e534a345a6be78ae7d938fac731d4faad2b4594e4c0kdelibs-ktexteditor-4.14.8-11.el7_7.i686.rpm1d061db54509f4fce7e950d802f72f843c2b30a8b1a859d77d67e82feaf82c46kde-settings-plasma-19-23.10.el7_7.noarch.rpmd146b28621c0573dd0ca4beb941e05d819432fbb950b0f7e31cd52fa6c732138kde-settings-ksplash-19-23.10.el7_7.noarch.rpm4bcea9b803c6e4156fd243c62b9ec7dd93312697d2d2203b06c458609a033682kdelibs-devel-4.14.8-11.el7_7.i686.rpmb71cbc362e5d335df428d3a385f5a70e4bf114ec7bffd34bcb01e13e3ab2258fkdelibs-common-4.14.8-11.el7_7.x86_64.rpme71f0e862c92bd8d85903615a5a4942ad723428709cd37aace459c8fd594ffc3kdelibs-4.14.8-11.el7_7.x86_64.rpm7dd31b48801c05e99d08900182811455fa193b98b39fb6fc3cfaf0ea6f6b336bSLSA-2019:2607-1Qemu-KvmSecurity Fix(es): * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)lowScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-167.el7_7.1.x86_64.rpm6e675ebb9396dc99ee5ee21fff3d090f45cc53e37975a586eff161e0303efdcfqemu-kvm-common-1.5.3-167.el7_7.1.x86_64.rpma558b0a28593a639f76d75fc7e6c265d2ab7b4a025e4143bdc4a8de275249088qemu-img-1.5.3-167.el7_7.1.x86_64.rpm7ea40346c5ed7e0355053aee2f66c35b2e5ca10bf729a2fcb3081e0d99cea05eqemu-kvm-1.5.3-167.el7_7.1.x86_64.rpm09050b6b9de4892fc4b9212f68dee677acf68699d7aaec7057ae6ce61b5000d3SLSA-2019:2729-1FirefoxSecurity Fix(es): * Mozilla: Sandbox escape through Firefox Sync (CVE-2019-9812) * Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740) * Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742) * Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744) * Mozilla: Use-after-free while manipulating video (CVE-2019-11746) * Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752) * firefox: stored passwords in 'Saved Logins' can be copied without master password entry (CVE-2019-11733) * Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)criticalScientific LinuxScientific Linux 7firefox-60.9.0-1.el7_7.x86_64.rpm3f643b791b283370da25205b99f6537fb03b84c897e58e942a47c72dff291c63firefox-60.9.0-1.el7_7.i686.rpm1fe1e8874faddaf3516db69fd15071814cb63e56ea145d203a8fff0ca2cacf82SLSA-2019:2773-1ThunderbirdThis update upgrades Thunderbird to version 60.9.0. Security Fix(es): * Mozilla: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message (CVE-2019-11739) * Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740) * Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742) * Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744) * Mozilla: Use-after-free while manipulating video (CVE-2019-11746) * Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752) * Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)importantScientific LinuxScientific Linux 7thunderbird-60.9.0-1.el7_7.x86_64.rpmd3aafe990ff5989700a7dd3e49d0f66200500ae720af093340b019f6adc666d3SLSA-2019:2829-1KernelSecurity Fix(es): * A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. (CVE-2019-14835)importantScientific LinuxScientific Linux 7bpftool-3.10.0-1062.1.2.el7.x86_64.rpmdcefb8bda878f4600da21beef8e82de9dcccc62fb8b1403ec6d22ddd0209e846kernel-debug-3.10.0-1062.1.2.el7.x86_64.rpmddd736f5c034db246dcb6fc2ae9d078c715ae74f38a23a8c17e4514e18d33dc1kernel-tools-libs-devel-3.10.0-1062.1.2.el7.x86_64.rpm5a0ab7c7add7d332d95522c45fb37340a46216e309749ade4e640bc3fa122d10kernel-tools-3.10.0-1062.1.2.el7.x86_64.rpmd18c0c82630c2cbb91bfb11f678c9b5a09adc684307dc7c77e163b18a8c9b91fkernel-debug-devel-3.10.0-1062.1.2.el7.x86_64.rpmc9c9197ea4660e8cf5d5818499274d0424541f48fdf3f4f798024c39bddd5625kernel-tools-libs-3.10.0-1062.1.2.el7.x86_64.rpmb83adaee3ef3db2a5043cc72d14435f3c8caf6ab8c60a43a8ae5ab8fc2588762kernel-abi-whitelists-3.10.0-1062.1.2.el7.noarch.rpme5fb5262c12120cab02503a7fce1e421e89beeb060366c57278575a88f284537perf-3.10.0-1062.1.2.el7.x86_64.rpmb827b8094f1d550a74a300161e1889085a50d1e089aca2803e94245852e5d66ekernel-doc-3.10.0-1062.1.2.el7.noarch.rpm214eaff2430ee61e2d3261bb9c21b60f6f07f0440e13ba95acfea79c17825bdckernel-headers-3.10.0-1062.1.2.el7.x86_64.rpm06dc7edb6d99757f15db4a9f94a5471aae8b93976c39f227b80334d5948cfd4fkernel-3.10.0-1062.1.2.el7.x86_64.rpm7b874522c733adf3808ce18dc8cdf00f886a1d38b03b5509be1149169382480dpython-perf-3.10.0-1062.1.2.el7.x86_64.rpm89b314e0ec763f52f97c20b1afe4cebfbc63448b31b8c91f06fe14638c43193dkernel-devel-3.10.0-1062.1.2.el7.x86_64.rpm407f18fe00fb89661de019766d31ec3d6f12f59c95172105de7df6d8865caf72SLSA-2019:2836-1DovecotSecurity Fix(es): * dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes (CVE-2019-11500) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7dovecot-pgsql-2.2.36-3.el7_7.1.x86_64.rpmdccc18b6fad729aa0e34cbbc8c8a7d58de6124c68a7aba3fef1f37bfddb3c066dovecot-2.2.36-3.el7_7.1.i686.rpmd7da8c2f84a4db51e4d1c25aed5d43bd1521decae766ecf8908af7e00b564588dovecot-mysql-2.2.36-3.el7_7.1.x86_64.rpmaecefe12da6dbfe278c271d4e51caa6943a95cf455fa21c2006213c843833fd5dovecot-2.2.36-3.el7_7.1.x86_64.rpm10963fefe2a41c6147830d68b53d5a566c7df30da457a03ac80a711c934143c3dovecot-pigeonhole-2.2.36-3.el7_7.1.x86_64.rpmdb4018a2d22fb0328931edd7b56ce63c951cb2361973c7755f868a1a2f227e47dovecot-devel-2.2.36-3.el7_7.1.i686.rpm62e457c171ef6540ae69d62a832d60ef0d64a5a0c490bda5e30b1f4f60c6954cdovecot-devel-2.2.36-3.el7_7.1.x86_64.rpmd6b98470220073ee7f6b4fce454a7eaf28a1583eb95e950d8d50f6f35da7ce20SLSA-2019:2964-1PatchSecurity Fix(es): * patch: do_ed_script in pch.c does not block strings beginning with a ! character (CVE-2018-20969) * patch: OS shell command injection when processing crafted patch files (CVE-2019-13638)importantScientific LinuxScientific Linux 7patch-2.7.1-12.el7_7.x86_64.rpmde563b9bbcb3fabc14d814d6476e2e9bac5bfcb5dc6955a62e50ad4462f1e412SLSA-2019:3055-1KernelSecurity Fix(es): * kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c (CVE-2018-20856) * kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846) * hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506) * kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fixes: * gfs2: Fix iomap write page reclaim deadlock * [FJ7.6 Bug]: [REG] kernel: ipc: ipc_free should use kvfree * high update_cfs_rq_blocked_load contention * [Hyper-V][SL 7] kdump fails to start on a Hyper-V guest of Windows Server 2019. * kvm: backport cpuidle-haltpoll driver * Growing unreclaimable slab memory * [bnx2x] ping failed from pf to vf which has been attached to vm * [Hyper-V]vPCI devices cannot allocate IRQs vectors in a Hyper-V VM with > 240 vCPUs (i.e., when in x2APIC mode) * Macsec: inbound MACSEC frame is unexpectedly dropped with InPktsNotValid * SL 7.7 Beta - Hit error when trying to run nvme connect with IPv6 address * SL 7.6 SS4 - Paths lost when running straight I/O on NVMe/RoCE system * NFSv4.0 client sending a double CLOSE (leading to EIO application failure) * [Azure] CRI-RDOS | [SL 7.8] Live migration only takes 10 seconds, but the VM was unavailable for 2 hours * NFS client autodisconnect timer may fire immediately after TCP connection setup and may cause DoS type reconnect problem in complex network environments * [Inspur] SL7.6 ASPEED graphic card display issue * Allows macvlan to operated correctly over the active-backup mode to support bonding events. * [LLNL 7.5 Bug] slab leak causing a crash when using kmem control group fix these bugs.importantScientific LinuxScientific Linux 7kernel-3.10.0-1062.4.1.el7.x86_64.rpm77f787e95ac70b444de3b0e953826dc1e41e67804f892cb6e28faf14f1afaebckernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm9f06a17bd53338df5d0ec0c1d04f57b5bf1138e68d7453e5cead277a59bb889fkernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpmf36afc74125b5bea5b1b587a4a60a83125db30283a28a96ce6863fba3d41e959kernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm8a9415d8373583918aaa0db4808c0d1c8759758587d7e1870d489857f6115e2eperf-3.10.0-1062.4.1.el7.x86_64.rpm0f4824143d4ea3e78175359a0d6c726a4b5b2d7041bcc4c65e0f233453e7c238kernel-doc-3.10.0-1062.4.1.el7.noarch.rpm04745765b47a9bcb00b4e46744c575812b67164aede8625da8b6bae23b6a91cdkernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpmdfc0c2b4f3a1e85fed98e4cf697aa65453be62d28d76c5ab4edb5d5482b56d67python-perf-3.10.0-1062.4.1.el7.x86_64.rpm11beccaac383ea2515cda98eea79ef1b776242448fc3ac83c5ecff8abb977a91kernel-devel-3.10.0-1062.4.1.el7.x86_64.rpmb0d29a5436058c09b3a4230610830067d3b7ce7816a365f16b8466b4bab295d3bpftool-3.10.0-1062.4.1.el7.x86_64.rpm0503c3ecf1dd7c8d0ed7d5842c08b3837a014347055f9600772e8a89671bfad4kernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm7a0034f13f3ae005c9058dbb95036a284297ceaa7ef660d405f86f1c86e5aa7dkernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm1a364ad571516dcf3767dba95256391663e42cfb0078ee7983eec994d3417d6ekernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm30d2d6fb0b7d18437448d1f839926497a0f6a9241abf75c393b4db1c08d3e8f9SLSA-2019:3067-1JssSecurity Fix(es): * JSS: OCSP policy "Leaf and Chain" implicitly trusts the root certificate (CVE-2019-14823) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7jss-javadoc-4.4.6-3.el7_7.x86_64.rpm390e4ecf669a37d7dcdb0c63d0a5fc243a54e3641dc72c81efb19636a8669b1cjss-4.4.6-3.el7_7.x86_64.rpm5eb8316da281593f4827463498f405eab6eaeacf09cec516db88fc566ea45a00SLSA-2019:3127-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) * OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975) * OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062) (CVE-2019-2977) * OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) * OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) * OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) * OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) * OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) * OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) * OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) * OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) * OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) * OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) * OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) * OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.i686.rpmb15bf5ba762fb696e36df4244f002217174f1d9fd1e981bf039f37a604245e91java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.i686.rpmc2f8c4e9e9575c6804f875905feb0065bb9ebcfbc35d5b9610cabc39a4f28c44java-11-openjdk-demo-debug-11.0.5.10-0.el7_7.x86_64.rpm605533f2353a458c96d0c3ba368cf8b6853755de28f7f2a5143722e85dc49660java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.x86_64.rpm43d80ddb3f061bcc70e6378a858527afb1125be04fb4497c59280f4e9540aed9java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.x86_64.rpma89f4802ab11b465b734a4bdbcf8114dc33bccdef15e8c05002a653ecacca66cjava-11-openjdk-jmods-11.0.5.10-0.el7_7.x86_64.rpm710d54f3af41dfa323f38e3543cfb6f67018759ed93a5a883b5095079044ca3ajava-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.i686.rpm4055766ee453898078c5f92811aa0ac1fff310ce1e5df473b28d756771035828java-11-openjdk-11.0.5.10-0.el7_7.x86_64.rpm4d0559baceb9d642bf3b84c3ab9d9ab97ba977e5874596904d5795ee6b2eeb14java-11-openjdk-src-11.0.5.10-0.el7_7.i686.rpm0e5f22d8153146f3115d61e70e09f69d764001b68a81b36da614bb4b0d82b2b3java-11-openjdk-javadoc-11.0.5.10-0.el7_7.i686.rpm5554af2bca4ca7802df90524f4d9f15f68cd550f6c3bb84cd3ce0261efa59000java-11-openjdk-debug-11.0.5.10-0.el7_7.i686.rpmf2657eb8c512eea99b3b52989a0b96d15a37b8a3b2cefaab7856e2f451191ff4java-11-openjdk-demo-11.0.5.10-0.el7_7.i686.rpm7ea2dd5974763d4583453623946199267e0c8e45c5020d387bada72fdc9d20f5java-11-openjdk-src-11.0.5.10-0.el7_7.x86_64.rpma2f721f922cb3e0c1faf36fd6fc550193d573474a2047e9da7cab360f58e3301java-11-openjdk-11.0.5.10-0.el7_7.i686.rpmef12c024f9cdfb6679d5ddc85a78cb1b701c590cb2db73f95494b0e26667463ejava-11-openjdk-debug-11.0.5.10-0.el7_7.x86_64.rpm8111210a431e85db32bf7ecc8f5183e2c9ca2f71c08d5f013f832ebe25bba89ejava-11-openjdk-devel-debug-11.0.5.10-0.el7_7.x86_64.rpm3a2ad542f0313a2b0dbeb1fd4610605ea2ead806c3b9c806b3a413df7b746104java-11-openjdk-headless-11.0.5.10-0.el7_7.x86_64.rpmec45f955ee85cfe8dfd436616d39c126ff2463cde9385ac092cd14da493a72e8java-11-openjdk-jmods-11.0.5.10-0.el7_7.i686.rpm0020e636a9918e1d4b28f2054267f8deda43ef89ad4d2681e7594202e04eaf6fjava-11-openjdk-devel-11.0.5.10-0.el7_7.x86_64.rpm5549a3fd8ab3b77d387161970b928a1e7a89bff89c287e2917b4d3c08f1c658bjava-11-openjdk-src-debug-11.0.5.10-0.el7_7.x86_64.rpm47fbc6bcd7a71e10f610d317c531440c622cfdd3fc0bc5caee717040003b0886java-11-openjdk-headless-11.0.5.10-0.el7_7.i686.rpm427eb3a50a50966963b3ee9974d868a6091a218670366ce123ff7193bf2fe753java-11-openjdk-devel-11.0.5.10-0.el7_7.i686.rpmb5cd1324cc6fff88631564db9295cf2afeab2a064eacced749e851499f1adbcejava-11-openjdk-demo-debug-11.0.5.10-0.el7_7.i686.rpm9adfa3191f0299c96438dff11777cfb9ab611bd022961fa4c581083b31ffc90fjava-11-openjdk-devel-debug-11.0.5.10-0.el7_7.i686.rpm50f63fe72749e9a0358ad83900dd03d1b7ce4be3deff8fec8f49e9e9e2211c61java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.x86_64.rpm04b01056d583c79c7b459977fe2bad8d447a9f0c803be749a2c6598981a5db0bjava-11-openjdk-headless-debug-11.0.5.10-0.el7_7.x86_64.rpm0117e2b6f12ce9133bbfd1d48e86138a496aacc92ae8ac3d2b5010c42422bdfejava-11-openjdk-demo-11.0.5.10-0.el7_7.x86_64.rpmbb12875f7405ca73dce61dad02bf0f971eefee58e08504b220d01b27abd21c5ejava-11-openjdk-headless-debug-11.0.5.10-0.el7_7.i686.rpm196075fc21a9b4b279095786ffee99317fa167b0b44242d9cbdec33fa503d04djava-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.i686.rpm81fb7669d5e7dbdd7d19343625f73515ef01a635031679b1c5485600075cf9c0java-11-openjdk-src-debug-11.0.5.10-0.el7_7.i686.rpmf9ff1f47a541aa3f8b1e24e6f2f191cefc108d9802a9e3c10c3969e40261487fjava-11-openjdk-javadoc-11.0.5.10-0.el7_7.x86_64.rpm1dece4372aaf7de698cf2cfb9a8fcc3878f4edaaf5750df0514b9e420509b627java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.x86_64.rpmcdaec75b40d5204529e79cc62183dc5eaeb5b9ce9c9276e67434267db050efd6SLSA-2019:3128-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) * OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975) * OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) * OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) * OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) * OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) * OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) * OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) * OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) * OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) * OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) * OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) * OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) * OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7.x86_64.rpmeee5aa2f880814e8c48c22e6da04622d1ef063275546b07a94d2a1143bc8562fjava-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7.x86_64.rpmc3eab471015223be9302c1cac082606f92c147dc2d1c7c7acb6c46468e4dd117java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7.i686.rpm66130f5d808fe7f9dc4b2339c69714eda5caf206a8ea1838491b944c38b59c77java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm1b4ce36d97d043767a7afe44c8a7fa153d105e8d3b12c3d1c9aa80c0b2463435java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7.noarch.rpm9e019e7c3c493be9b46ee48ce8d1c42efc634ad11d4d8432186037cf195bc911java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7.i686.rpme8846661780faf5bd4f183e22aa6ab1a97149d9eb2ecbc9c19100849db33e5fdjava-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7.i686.rpm042d4bb95c6420e28ebbee5e54d59a38da6aa411d3f3af64cde4c2f69b3c7585java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7.x86_64.rpmf17c3df298739e2c2c20f1a76e66b2f72353703c90da7bf656a1193f609edf9ejava-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7.x86_64.rpmd084b526e02a9541ee79a345267b54c11c4f3cb175dd2704bc0c9cfe6c7fbe77java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.x86_64.rpm7e993b1ec77019e1eabe0dbaa88bc1aa26941b2dda9c2f69db5847e44f373c11java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7.i686.rpm7d45e73a3886021f2735cb75ff4d85273278cd3afc4b3329a4a8b88ceafd4dddjava-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7.i686.rpm9a865f57772ad469a5bceb6495b57b3250d05c8ba112994e43b6dfc47c545f7djava-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7.i686.rpm7dfa1dd8c41a7df54e61a67cd908b54a753fe432a5da1ac583d916439aeea262java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7.i686.rpmb3a6b70c62326a6b8d3d6fdfbfd1c291a5678668fa970a1e7ce19b5d448de269java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7.noarch.rpmb319d93f0be48e33331bed6c09d537084abfa3da2a8dea882f3109aa12f7d9d2java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7.i686.rpmf2499d2a2669ac6f77f22c775853a322055a77025fe66ae8e5092c460a87ef1cjava-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7.i686.rpmd3776d3e409ef371a9e9a2c0a1cd1a0f4f2a09019124f1420e9133fbbf6d8fa1java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm80c6974857fb895661fec0b95b84b77b820a82eabe79aed3bce8a21245de6a39java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7.noarch.rpm820f990c80ee88ee377463b099e03bfbd98ca2bcdca2dc7fed6a95f6d15bcc1cjava-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7.x86_64.rpm53d089a42ce336786c277ae9505650a054d0e2bd1699cb6e267880c4958d2296java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7.i686.rpm604f241fc017191862eb2467b9cf7f34cafd3f3e75e3f89c7a793087cde5225ejava-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7.x86_64.rpm30d172a6905bd977abe7f710aa0872d5550e73f6e3c20625db9446d413e6fcedjava-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7.noarch.rpmebb50f9e2743723b4a7b3e58b4946540190f25c9b249832a4eababb6cee3e48cjava-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7.i686.rpm9e0b24c410374a16c15e4cd8562e6b712d88bbb157fbbda14a0569a06aac115bjava-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm873eee7ea3f02ff3b80a2b7e2786fdd8b02ae042829a4500dd2445206fd4b081java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm85bb6a28f9bfd9179d5b93251e6e5532891dce91ea2be7429ef830f54fa3afcejava-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm2b6e884d5bdaccefe61770d352b62da4277303e024ca99548669a821d8b0743djava-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.i686.rpmbf25d0aa5b9ab9cbba586b1f725ae291b02ae8762ea5f994da1959fedc05db67SLSA-2019:3157-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) * OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) * OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) * OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) * OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) * OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) * OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) * OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) * OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) * OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) * OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) * OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE moderateScientific LinuxScientific Linux 7java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm69af4c5976e160b428fbe9ba451c18880aa78fe478220e8e41a9529db05bae2fjava-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm12648738968dc63de3377e98a03742c843695c26c2d879c8978b7ddc5fa82c5cjava-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm81136ad8e52bf505b0b38ef42346e52299e03d5e6402a30cff1da7727dc3911ejava-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm31dc5fff76cafece75c1da203cab822e9c2f68750f6ca0efc253c0fcae907ef6java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7.x86_64.rpmcce3300e996da2a9df10c1efcb794404fe89b1342feab634bf3e86b871190131java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7.x86_64.rpmc1afdb9e26ad60c96d352b4fadbc7c7a4f44c6c992ec24bc647face89995fb48java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7.noarch.rpm488560baf5d511ef1f0119fb0a294fb219b0f60c54da46f4a6b7ea2a17ee0a32SLSA-2019:3193-1FirefoxThis update upgrades Firefox to version 68.2.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764) * Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757) * Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758) * Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759) * Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760) * Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761) * Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762) * Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)criticalScientific LinuxScientific Linux 7firefox-68.2.0-1.el7_7.x86_64.rpm9c684d5a8a4b035b9e2e51eb8c188566327505c5552d358032feee78b3d55de9firefox-68.2.0-1.el7_7.i686.rpmcd74722b0a295558189bb9662f1defbd8dfae81bdc546e75ad60c3167c03af94SLSA-2019:3197-1SudoSecurity Fix(es): * sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword (CVE-2019-14287)importantScientific LinuxScientific Linux 7sudo-1.8.23-4.el7_7.1.x86_64.rpmb2ed1fc10e8c8d2bdca725c05913497603429e559c8a1ea1a841eaadc01064edsudo-devel-1.8.23-4.el7_7.1.x86_64.rpme7b953a0023f2ed4e450fa34153cce3caebe400b4b6ce2195ed5de0649df7ca5SLSA-2019:3210-1ThunderbirdThis update upgrades Thunderbird to version 68.2.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764) * Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757) * Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758) * Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759) * Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760) * Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761) * Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762) * Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763) * expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)importantScientific LinuxScientific Linux 7thunderbird-68.2.0-1.el7_7.x86_64.rpmc3ab426a01ffc671ef54666b773d5b7216f1fd7f29f9bd78338afe87f7d64988SLSA-2019:3286-1PhpSecurity Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)criticalScientific LinuxScientific Linux 7php-mysql-5.4.16-46.1.el7_7.x86_64.rpm3e876ca64724335cba3c44d43766cd39d1c027f4eaf9ba2dafe0e22c87cb6d7dphp-xml-5.4.16-46.1.el7_7.x86_64.rpm6b41c7bff5d0605c29847161a1d6d5a6dcefd85f58b66c8289957fd6ec65df20php-pspell-5.4.16-46.1.el7_7.x86_64.rpm2ca187d6f8d60a9ccf3eb0dcdac20fd2a8d379c97d0b6ed0742fb181a32595f1php-intl-5.4.16-46.1.el7_7.x86_64.rpm1d803470cf7230063896bb8d1b0af973d25159b5875739b46265ed68b65cadf0php-embedded-5.4.16-46.1.el7_7.x86_64.rpm763ea98fb1a17c4596037c7d885fa90d1c59299642efe871d61dea81c380a400php-process-5.4.16-46.1.el7_7.x86_64.rpm1e023c6a830155ce7bc64de5a85c5637b73831da265d3484e18d85f7b37ca1d6php-soap-5.4.16-46.1.el7_7.x86_64.rpm2c695f63ef1f9cf1f45430caf412037fd0378d1deffb44d3b61903172b976262php-odbc-5.4.16-46.1.el7_7.x86_64.rpm0377a81fadaf8cd07780f80fdae950b55c914a3ff50c1c6128aef974bb06fdd5php-snmp-5.4.16-46.1.el7_7.x86_64.rpm82b5b691c79e8a6e07760eb39fb98ddeea89502d6ff09773d8c5a73a209eb879php-pgsql-5.4.16-46.1.el7_7.x86_64.rpm4968f771e8b089ec312547cf7cf7fa3e78331deb664ebdb6514699d18be8b23cphp-dba-5.4.16-46.1.el7_7.x86_64.rpm3535f2edf7765c92aeaf338990c553b87857406ba9a3c5df39abe1eeb5999f9dphp-devel-5.4.16-46.1.el7_7.x86_64.rpm7bbb7e4697e879272a2cd99f6cb233c421d3c1c19f714a7871c7031915b92fa6php-common-5.4.16-46.1.el7_7.x86_64.rpm9e76932a4cf7c8a597f0aa8ed7fc6b9d1ff2085d8131303088ce93dd6ea52468php-bcmath-5.4.16-46.1.el7_7.x86_64.rpm62906137e65b9e36156ab21e920cfef86fc6e3361c54f4b7f6468b3b27731daephp-fpm-5.4.16-46.1.el7_7.x86_64.rpm072c8f559ad274bc5f83a545afe07e50b5645064d2221ac349d15a3c5508c447php-cli-5.4.16-46.1.el7_7.x86_64.rpmf6b6a774b17d9991b0dbf1b4d853e4f94beaba1de019b6efcd1c09e041f4159fphp-pdo-5.4.16-46.1.el7_7.x86_64.rpm7704f6f421bf9addcc612a077a2482d4da2be707d0ff16d3e4e4417f9124c9e2php-enchant-5.4.16-46.1.el7_7.x86_64.rpm9a206f4f477a79f96c37788e131fe8077143db65da66b3eff4d4f02a5041da95php-recode-5.4.16-46.1.el7_7.x86_64.rpme2320bc886ab362cc37fe347fbde0dc1e19bb70243f109b2f3e5fbb7912b1297php-mbstring-5.4.16-46.1.el7_7.x86_64.rpm0045419028ffc6eaa78638dc05a42ec9132dad50e7b694018180d795454b8634php-mysqlnd-5.4.16-46.1.el7_7.x86_64.rpmd5503139024849d4b05d3062b88d6dbbfe560dca097162bad0e525848246578aphp-ldap-5.4.16-46.1.el7_7.x86_64.rpmb7d4139addbe905196d3800173e5e63984d8e529db8b303d90ba68d7c161e867php-5.4.16-46.1.el7_7.x86_64.rpm772ef21a218686bc1bbd921cfdac7a978ddda26c8ba6dedcddbd7594f3f92c76php-xmlrpc-5.4.16-46.1.el7_7.x86_64.rpm15c3c049c21672d3c6bb30a2d3a5810514108a7aec20df7f25de1d82e369f770php-gd-5.4.16-46.1.el7_7.x86_64.rpm5f51b366ede557eb59a64377417bd770c49e9797ef027c663eaf4e63e133ecbbSLSA-2019:3834-1KernelSecurity Fix(es): * hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207) * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) * hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7kernel-tools-libs-3.10.0-1062.4.2.el7.x86_64.rpm7b9608da8b1cb20e6b8dc297a828061bcedc15bfaa667f805dd6dda4fe24aa55kernel-devel-3.10.0-1062.4.2.el7.x86_64.rpm55a97d7e1ab4882e82ddfa7268a2bbf24f796efe8d25a28e229fd570bd5c0812perf-3.10.0-1062.4.2.el7.x86_64.rpmd41766830378a6d44f2797272c2fc2bdd543de8a4bfbaae7b85da681202d87cfkernel-debug-devel-3.10.0-1062.4.2.el7.x86_64.rpm8483171ec11fb3f52fc1d6dea3803749206a260e80a34ded6a3eb2956aced9c3kernel-3.10.0-1062.4.2.el7.x86_64.rpm48f1b0ae96e25c773e04278cc0011e5587cd88ff19427a09ae66c3a2f6fa3c26kernel-tools-libs-devel-3.10.0-1062.4.2.el7.x86_64.rpmc4aa563a328a8bc141f850ffe21b512e764871be316a994c4563ecf75bcd35ebkernel-abi-whitelists-3.10.0-1062.4.2.el7.noarch.rpmc91bac3d5ec62965469a4f2de67fb1db2de9e49dd4e588315c8c0aa01329d0c4bpftool-3.10.0-1062.4.2.el7.x86_64.rpm0b8bd93edd676fd39d0fc2a7ccfd40b234ed64aeb0dbb256bb347f925b315f9fpython-perf-3.10.0-1062.4.2.el7.x86_64.rpm73b7252214dccb8dafd3073ceb79c5cf2a92419a8037ec4bfbf5d4338d5b4791kernel-doc-3.10.0-1062.4.2.el7.noarch.rpm76158ea0b39f4ec2837d4934dd8da5adf7767f80817d896a5d36cf70119f6b47kernel-headers-3.10.0-1062.4.2.el7.x86_64.rpmc788939de8beff6ccca85a53ef5feec0dd7630436474a8c3a344fbf3a21c5e25kernel-tools-3.10.0-1062.4.2.el7.x86_64.rpm7ea0b9ba581775e981983a98a948c095a6834b52f4d7972840d3663e42bb171fkernel-debug-3.10.0-1062.4.2.el7.x86_64.rpm2843f498464ecf9b4c26ca9347d772ee8e7e778e32206d6620f78ae951d2126cSLSA-2019:3872-1KernelSecurity Fix(es): * hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)importantScientific LinuxScientific Linux 7bpftool-3.10.0-1062.4.3.el7.x86_64.rpmfadc96c01c3eada90c238c4ba9338c515328023afeabe564943e084f318c904ekernel-abi-whitelists-3.10.0-1062.4.3.el7.noarch.rpm24d3c649a0b974970ae73f8b72a13e4ca815e5fe889e346ba008fc08cc600d25kernel-tools-libs-devel-3.10.0-1062.4.3.el7.x86_64.rpm5e1b5f5b39449ce1de02d8488d700a9f542cf9da7c8e6a1d3280021e5640df87kernel-tools-3.10.0-1062.4.3.el7.x86_64.rpmece90b29e9fb18a660568d2917f676f4e15ee9be29a5a5bf20963e22ec0af613python-perf-3.10.0-1062.4.3.el7.x86_64.rpma008b02b8e87ff3aab9f5ef6887d57868d46e3d4bb3abe0b20f10c0be29a936ckernel-debug-3.10.0-1062.4.3.el7.x86_64.rpm44ecb1da111c96092b3cf4867fffa9a3d2ee093b25d70f28e8587a52e6c4503ckernel-tools-libs-3.10.0-1062.4.3.el7.x86_64.rpm0403dd6b2d31d8cc20ac8654a22a18a6bc1e0697a512687b763596a199649c59kernel-headers-3.10.0-1062.4.3.el7.x86_64.rpm18387014feee8c0ab9ecb65fd18cc54add00f220429e3754d787dabab12ef416kernel-3.10.0-1062.4.3.el7.x86_64.rpm749683ed464154f60b612a6421e21ae716af98397aa0b7893602207dd402f056kernel-doc-3.10.0-1062.4.3.el7.noarch.rpmcf0612247202337ea6f2edbe36ac11bff53878d3ca28eaf1c17b3483a3e1303bkernel-debug-devel-3.10.0-1062.4.3.el7.x86_64.rpm6509dfe8428969e27f4dfde21206c3bf9682c50c89e06eee1d16a19a6884a9feperf-3.10.0-1062.4.3.el7.x86_64.rpmfcfed7cff267e6ebb4cc44a524009340ee925a0d06ab799ed766a49ac31fc590kernel-devel-3.10.0-1062.4.3.el7.x86_64.rpm7b463c4465adb7df3999bd90b1fedf9091df2ac31b8c5a6ebb965371ff8d73a1SLSA-2019:3888-1GhostscriptSecurity Fix(es): * ghostscript: -dSAFER escape in .charkeys (701841) (CVE-2019-14869)importantScientific LinuxScientific Linux 7libgs-9.25-2.el7_7.3.i686.rpm0f8d2279140e14480f3313c995c20fe5035b697306bd3835243c707e84a89823ghostscript-9.25-2.el7_7.3.x86_64.rpmceb265008bc4c949408cccea197365896ca07576d7a4804b566e4754f3bafd68libgs-devel-9.25-2.el7_7.3.i686.rpm6ee4f5907ee50e370abf33ca181e4882995763ede699e797948483b3b032cdb6ghostscript-cups-9.25-2.el7_7.3.x86_64.rpmc317b4b6f81a110406f2b3c89824b5030b841c3a39fe254439fb4b0e8315971elibgs-9.25-2.el7_7.3.x86_64.rpm7020d4d7d3508197fc936b7ec0b5092001352b41114503434aaeca0b7053b460libgs-devel-9.25-2.el7_7.3.x86_64.rpmc7b64a1077134abd811636f6871b03f1bfe6d476da88bc70907f4212f9035d4aghostscript-doc-9.25-2.el7_7.3.noarch.rpm67dc0fa1254d3e0aa16f95ce6dcc2f2ed542cf1a0586865f8bebece5cbaf5a53ghostscript-gtk-9.25-2.el7_7.3.x86_64.rpm81b42b588f054534571a70bdc55c765044d9bfa9718c4644d64de50fa0e20d77ghostscript-9.25-2.el7_7.3.i686.rpm6cd265e78bd8b71405eae320db4e68338bd3237b90a3f9a125f212313a293c88SLSA-2019:3976-1TcpdumpSecurity Fix(es): * tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix() via crafted pcap (CVE-2018-19519)lowScientific LinuxScientific Linux 7tcpdump-4.9.2-4.el7_7.1.x86_64.rpm0e998b4d908226530c1363ee88e0c8a57813486da5d1d18813c2ec1bca85d47aSLSA-2019:3979-1KernelSecurity Fix(es): * Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821) * kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation (CVE-2019-15239) Bug Fix(es): * On SL 7.7 kernel SCSI VPD information for NVMe drives is missing (breaks InfoScale) * SL7 fnic spamming logs: Current vnic speed set to : 40000 * kernel build: parallelize redhat/mod-sign.sh * kernel build: speed up module compression step * Nested VirtualBox VMs on Windows guest has the potential of impacting memory region allocated to other KVM guests * NULL pointer dereference at check_preempt_wakeup+0x109 * Regression: panic in pick_next_task_rt * ixgbe reports "Detected Tx Unit Hang" with adapter reset on SL 7 * [Intel 7.8 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. * nvme: dead loop in blk_mq_tagset_wait_completed_request() when it is called from timeout handler * [mlx5] VF Representer naming is not consistent/persistent through reboots with OSPD deployment * OS getting restarted because of driver issue with QLogic Corp. ISP2532-based 8Gb Fibre Channel to PCI Express HBA [1077:2532] (rev 02). * mlx5: Load balancing not working over VF LAG configuration * SL7.8 - ISST-LTE: vimlp1: Running LTP af_alg04.c (crypto) crash the LPAR * SL7.5 - Fix security issues on crypto vmx * SL 7.7 RC1 - Host crashes about 4.5 hours into switch port bounce test * SL7.6 - cacheinfo code unsafe vs LPM * xfs hangs on acquiring xfs_buf semaphore * single CPU VM hangs during open_posix_testsuite * rcu_sched self-detected stall on CPU while booting with nohz_fullimportantScientific LinuxScientific Linux 7kernel-debug-3.10.0-1062.7.1.el7.x86_64.rpm39abb1928dc778048af228989a613ed640475ad4b5b68b9238800d14f666b092python-perf-3.10.0-1062.7.1.el7.x86_64.rpm6de91cf17dd2e7280cd0981e013787e15d1ba0841da10b30d9084042e3cf588ekernel-doc-3.10.0-1062.7.1.el7.noarch.rpmfc11413f39840407354d49b4e38278e295ef2e30b207f431cd5bacf69b888287kernel-3.10.0-1062.7.1.el7.x86_64.rpm12f68c2dc34e2d7ccbc8bf156dd85f0316bf42db96c6e1510948a9d0fc0a288ckernel-tools-libs-devel-3.10.0-1062.7.1.el7.x86_64.rpm98eeefe7ecfacc0326e388561a01f8ee84a1d35de7f2701ba78cb62075d5db12perf-3.10.0-1062.7.1.el7.x86_64.rpm7e3c2e04003b37fc9768cae0a10c4a2ce40e8aaa779f2ca9652e5b94b5993b26kernel-abi-whitelists-3.10.0-1062.7.1.el7.noarch.rpma438b7b20c554eca776065b26d1d529ffef4b9aa43bbfff12130523f8778bbe1kernel-headers-3.10.0-1062.7.1.el7.x86_64.rpm3a32873cbbed8e5ebdb299796848c248ffb0d5a4f23f1ec6e9c41c731afba9a1kernel-tools-libs-3.10.0-1062.7.1.el7.x86_64.rpm2cc40436ce2a891e9876315d5e6717351b155214c383af466a6b3d74f0dac25bkernel-devel-3.10.0-1062.7.1.el7.x86_64.rpm91f31d186b219712f191dfd433a4b563a40502b905e292c9ca680bd206c15bfakernel-tools-3.10.0-1062.7.1.el7.x86_64.rpma05f3f703007285ffdc03adc54ba4bf7c26642c5a969245258229febcd1b2b8ckernel-debug-devel-3.10.0-1062.7.1.el7.x86_64.rpm2a948f8b38d105b33c4ccc795b37faf599e2f54dd0c5168aad7dbda3f8df8954bpftool-3.10.0-1062.7.1.el7.x86_64.rpmf59d52d8f5609dd918f9182341b25a0ca13584765df8e35b65a3c6c833956042SLSA-2019:3981-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: Read permission check bypass via the deref plugin (CVE-2019-14824)importantScientific LinuxScientific Linux 7389-ds-base-1.3.9.1-12.el7_7.x86_64.rpmb992265f3adeae49a77c83e5f54672cf6796ce98fd5448a3f26a986e15aa5107389-ds-base-libs-1.3.9.1-12.el7_7.x86_64.rpm55a99fc16001a415a752b2f20efc9e0772d9ebc6333ed708b908e1916a8e6601389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm58011db55e171d0323c3a46f9ba670eb7238f2ac237c0cc18edb5103d984d0b1389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm4019171a26172f2b674748bac8c13149a8ed54ad25277e5d739a41acec71be33SLSA-2019:4024-1SdlSecurity Fix(es): * SDL: CVE-2019-13616 not fixed in Red Hat Enterprise Linux 7 erratum SLSA-2019:3950 (CVE-2019-14906)importantScientific LinuxScientific Linux 7SDL-static-1.2.15-15.el7_7.x86_64.rpm293a9e77f42b6ac238dbc25a06ea0f92b38c120317f76020054303a62493da01SDL-devel-1.2.15-15.el7_7.i686.rpm3a76e50692d44dc09850bea3ff25b7c21ac7abebb91941c4138a4a33f694b2f9SDL-1.2.15-15.el7_7.x86_64.rpmcce6cd575ff5599bb662631eac9fa04f4eb40507f173f520e0351ea04a5b4d16SDL-1.2.15-15.el7_7.i686.rpme92de6951738ca492f73d919a50e030ea58ee36d3168a7e3efbec781e0e74de0SDL-devel-1.2.15-15.el7_7.x86_64.rpm01325c90ebbdf0c5c78d69ed74342c87433e2e6023d0684a09b57e5a1071a04fSDL-static-1.2.15-15.el7_7.i686.rpm9d23e24c6f4baa0c7071acd1bb6ae5c5cdd08d50baf2a5abe3bb6faeb3c47ad2SLSA-2019:4107-1FirefoxSecurity Fix(es): * Mozilla: Use-after-free in worker destruction (CVE-2019-17008) * Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) * Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) * Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-17011)criticalScientific LinuxScientific Linux 7firefox-68.3.0-1.el7_7.x86_64.rpm89abb1df077335d4923665277810732ccba6049222fc6a3e9ab1adb174ecc535firefox-68.3.0-1.el7_7.i686.rpmf09566293d1eb758bdbf38c42be97f21e9e34cf0671bd4e225cb29b79875b13cSLSA-2019:4148-1ThunderbirdThis update upgrades Thunderbird to version 68.3.0. Security Fix(es): * Mozilla: Use-after-free in worker destruction (CVE-2019-17008) * Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) * Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) * Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-17011)importantScientific LinuxScientific Linux 7thunderbird-68.3.0-1.el7_7.x86_64.rpm1b5f51e2be8e7df7bf6a3c91d9760cca15d48ed0a074839cab61032d237cbf2bSLSA-2019:4190-1Nss, Nss-Softokn, Nss-UtilSecurity Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729)importantScientific LinuxScientific Linux 7nss-softokn-freebl-devel-3.44.0-8.el7_7.i686.rpm941f3150a0fa3ccb16d55ee2fa400f1ec1c6736431d9a94832837a494e929877nss-softokn-3.44.0-8.el7_7.i686.rpmefe0b2d8859df15c93ee8dba6852fe618aae28ff6ed5ec7ec577e4106456805cnss-devel-3.44.0-7.el7_7.x86_64.rpmf2819cfb2a896de0ff8fbefd23c70e828f220009f55b5aad5d9fe1a883f19b90nss-3.44.0-7.el7_7.i686.rpm4611534576064691157fece9d0c436568b23b63697b85c7bb2ad255e982f10fdnss-softokn-freebl-3.44.0-8.el7_7.x86_64.rpm523a80a6b06b06196ccc309739042570ed22193782f08f91e23d4da9d9fb76f7nss-softokn-freebl-3.44.0-8.el7_7.i686.rpm0311ef50716cc00cb2497c68d86f27e765edce722618602dd9b5305fe355ff54nss-tools-3.44.0-7.el7_7.x86_64.rpm26d5d9deac7d356e9f809c7a0cb6f6e37f59875afd950925bc60c4191e9a5931nss-softokn-freebl-devel-3.44.0-8.el7_7.x86_64.rpm4c5a91e43234e8234f4d56d570abb2d574cff79656d0a43dbb317f05109a5083nss-pkcs11-devel-3.44.0-7.el7_7.i686.rpme4ca8839e44d9578e63b9258b9ebcd81377a9ba88359506d1a09ffc8debcb859nss-util-3.44.0-4.el7_7.i686.rpma81be3bb2c1127550d8a0df16ac39da0e5502d6a3c9679b659f1fb092d316f19nss-sysinit-3.44.0-7.el7_7.x86_64.rpm154a6576cc083f1254a5c4870c6886c02030f68a8d10da6a726daed45f5d2434nss-devel-3.44.0-7.el7_7.i686.rpmbf5c53e849f81348838a17a0e6a646767f6a62cbbb6cfe4b9d97a8ff5194f9c8nss-softokn-3.44.0-8.el7_7.x86_64.rpme839b674ced6fa1a115538fdb0729959822343ce51163fa30bd8a01385e2bf3fnss-util-3.44.0-4.el7_7.x86_64.rpm467c3bcf5d2000a19f0f4aa15c02ccc73d484f4b393d0227183cccd1100ff3afnss-softokn-devel-3.44.0-8.el7_7.i686.rpm653c4ecb49f71731370c273ed96c936abcf825f6671d8b19b3390f159219c9f7nss-softokn-devel-3.44.0-8.el7_7.x86_64.rpmaf21dd3d1dda0da8f02f5f18ca35811c03dda3ea095f43f64aa348e254939265nss-util-devel-3.44.0-4.el7_7.x86_64.rpm66c639d5163020550f741153105c4d237d22926f9a5d2ef521c6e2c5d3679854nss-util-devel-3.44.0-4.el7_7.i686.rpm1f3429b800e8a585946ec771dfbfc21ad92519afb916a9965a7a0e709ddbff40nss-3.44.0-7.el7_7.x86_64.rpm7fa0c549868bbf6f4e408a65adf747dda0a339997016c38a5732d97f61cb5ff9nss-pkcs11-devel-3.44.0-7.el7_7.x86_64.rpm3a29745b29a90e8ff5abbf2d22a9b4cf3b152555e5a53ed7f65cd9c98f8c82ecSLSA-2019:4240-1OpenslpSecurity Fix(es): * openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution (CVE-2019-5544)criticalScientific LinuxScientific Linux 7openslp-devel-2.0.0-8.el7_7.x86_64.rpmc98df762efc91994747387a183e54d6365bfa83bfe74a608d1f42e5f42400d33openslp-server-2.0.0-8.el7_7.x86_64.rpmcf1e9b66622bea11895ee99e384bc573fc4c9f5bad886b420283fdb785ada711openslp-2.0.0-8.el7_7.x86_64.rpm9ac77cb21153493c097256a5a2ab983a048a715805813545403961f2638e2b13openslp-devel-2.0.0-8.el7_7.i686.rpm921ff9f839cf1f82ae10b5c90e9a38dfc83b31c8d855e190470a97ecaa0a4f7fopenslp-2.0.0-8.el7_7.i686.rpmd296cd473e61af81ef0f29f37c8bacf0375e8cb32d97d739b6544e8d78470d6bSLSA-2019:4326-1FribidiSecurity Fix(es): * fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib /fribidi-bidi.c leading to denial of service and possible code execution (CVE-2019-18397)importantScientific LinuxScientific Linux 7fribidi-1.0.2-1.el7_7.1.i686.rpmf23220491cb94364f5aaf4d7064d28a7911b651d5b9a764fb2030d30123e32cbfribidi-1.0.2-1.el7_7.1.x86_64.rpm89308ed4fcdf6775f0fb546d0dca2cb72ea07aeaa1e040cc1428128cff09b494fribidi-devel-1.0.2-1.el7_7.1.x86_64.rpmfe5002e289f8bd8a3608a2d08528783ef4ab112e493c2f30043fafded011856dfribidi-devel-1.0.2-1.el7_7.1.i686.rpm74ea2da2b06f1945a1675abf0e5141afdb4cb535555ff746917317843fa501acSLSA-2020:0085-1FirefoxThis update upgrades Firefox to version 68.4.1 ESR. Security Fix(es): * Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) * Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) * Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) * Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) * Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)criticalScientific LinuxScientific Linux 7firefox-68.4.1-1.el7_7.x86_64.rpm4aa490cb45ccc4e9fec6675b85f620cd1bfbcc04bd4aeb8dea448030d527a946firefox-68.4.1-1.el7_7.i686.rpm2431d0595402120a241cd3a5281390b60dfc94fbdd62e111b606eeaf49f57cf5SLSA-2020:0120-1ThunderbirdSecurity Fix(es): * Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) * Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) * Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) * Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) * Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)importantScientific LinuxScientific Linux 7thunderbird-68.4.1-2.el7_7.x86_64.rpm6c05501be4091d245f0153f8863cc3778983599079c9ae2b67d7e6bb580d9234SLSA-2020:0122-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) * OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) * OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780) (CVE-2020-2655) * OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)importantScientific LinuxScientific Linux 7java-11-openjdk-devel-debug-11.0.6.10-1.el7_7.i686.rpm97ae765cbeee8ec11956dfbdf238b7a66fa597391dfb0ec34928fd57c21656d4java-11-openjdk-headless-debug-11.0.6.10-1.el7_7.i686.rpm9466fe9386b85978f950a7a4bcbc2abfe3573c86e9de8c8221dc1fbf7f067b23java-11-openjdk-debug-11.0.6.10-1.el7_7.i686.rpm4fde268e1bea510d818ae7cba8f7cdd265e5589037ed57b38187fe2366379f3cjava-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7.x86_64.rpmee7e63a9f2f61c294f9d7f29f56962e4484b5a2f0f142d1a44f9de5e0cf628bfjava-11-openjdk-devel-11.0.6.10-1.el7_7.i686.rpm8f07b9baa8145f0aeaa46e4575bb3e444cd88877ed32e0df0de356b99643a003java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7.i686.rpmbba176e001406d67fda33722105fc510af8366905354aa41155ebb1d56f0f687java-11-openjdk-headless-debug-11.0.6.10-1.el7_7.x86_64.rpm782f5a98996b72ebb6489ad156950ef1bf60a355bec8b91c2bcacd880bf11f70java-11-openjdk-javadoc-11.0.6.10-1.el7_7.i686.rpm8f871e23c71789bad64af1f8feea12b366bdcd52387b725e3a1e3250c5c26afajava-11-openjdk-src-11.0.6.10-1.el7_7.i686.rpmf7bac68361b5f6749deff2f15bca09ce68f0e90345d1fc4ecd0f61ee33eb0d72java-11-openjdk-headless-11.0.6.10-1.el7_7.x86_64.rpm9508ca6aa6fe923e7f535804b2f7e3b4f4743d41c52248316e0947c5088eb550java-11-openjdk-jmods-11.0.6.10-1.el7_7.i686.rpmf432187e025460650af8ddd39f81271752131e6333fd147fee782184421e6c93java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7.i686.rpm03a18a3c29017750e221238a323af071cbd45791fa24fa37b81476cea48dd20ejava-11-openjdk-jmods-11.0.6.10-1.el7_7.x86_64.rpm583074faa25491cc042b28b6364763ee04796e0ed9a5de0762e04677a4b86966java-11-openjdk-src-11.0.6.10-1.el7_7.x86_64.rpm8aff8370d21a70b02e3a82c6816d9b3c891c469fa9e74e1c17bfe55d7a2b0e03java-11-openjdk-11.0.6.10-1.el7_7.x86_64.rpmad20cb7c66b78ebfd85edbeb9bbd30fbee2c443380fdffb866587aefcaa9f32bjava-11-openjdk-jmods-debug-11.0.6.10-1.el7_7.x86_64.rpm9cd1495b028add1aac2ece538889bebd80b76ca9c301f4c127bc30b83dbff8f5java-11-openjdk-demo-debug-11.0.6.10-1.el7_7.x86_64.rpm6b66d63dba28010b036df871aa158a1e9029b27c98d7467a246373e61a6b4635java-11-openjdk-demo-11.0.6.10-1.el7_7.i686.rpm982b457d0f4f444034db792078ed62dd4f942c6b608a00f292bd3f7f5e9e7100java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7.x86_64.rpm0104b3362fee91c162d2cde754448b2c94218fec823ef25ba2900f841dd914cdjava-11-openjdk-demo-11.0.6.10-1.el7_7.x86_64.rpm19c3c4c047d984c360d6a173b8f6e589abcbef395a491ed4805191a87510c725java-11-openjdk-javadoc-11.0.6.10-1.el7_7.x86_64.rpmc654e206ed4db458dfb49f7f7b8849a49e931694de95636149978abc2efac452java-11-openjdk-src-debug-11.0.6.10-1.el7_7.i686.rpm7fe91221d1054f71eb57406ffddb0270ccb9080bb3347236698a4b47e4e266fcjava-11-openjdk-devel-debug-11.0.6.10-1.el7_7.x86_64.rpm0b2697cc94e1ee86af1c9907291334fd0c818d15b3fe3e35ddd27979887f173djava-11-openjdk-devel-11.0.6.10-1.el7_7.x86_64.rpm68ef645650acffb65d6a2c5ae1cb4a97f5bda0f577f166c143fdc25cbfd8f4d1java-11-openjdk-debug-11.0.6.10-1.el7_7.x86_64.rpm8ad8632f4ef253fdcf6a9f28b008f0d450b485621334370f22bebbd7b933e181java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7.i686.rpma229a04f8ae72eee06af2aa012a1abc75b185c5aabfcdea2cf6f384e60fd988ejava-11-openjdk-demo-debug-11.0.6.10-1.el7_7.i686.rpmdbd47feefa9fae9e88d3327a9d707aa6141f6b6cdcc1ba4f076c1b73bc684154java-11-openjdk-src-debug-11.0.6.10-1.el7_7.x86_64.rpm0445e384bfb46d4f947d923911c1aee5d5146c27b92f8e95eb5b9b170d961795java-11-openjdk-headless-11.0.6.10-1.el7_7.i686.rpmda79afceedac1f62d98bd98f1df34e87e16fc677a018dc4f0803ec1cf0032cb4java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7.i686.rpmaadf5c6cc37786f2e77b4fd4d66901615ecc7ac8f736f64e847ac8752910f0bfjava-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7.x86_64.rpmf1320700ea6f52db3b6f48b7a7a0e0f328002ea4192228952b844a920699a705java-11-openjdk-11.0.6.10-1.el7_7.i686.rpmc116ade9eb3aaa4d988ab341a10c6c93b7f7405ef595946d00597ac69908ac8cSLSA-2020:0124-1GitSecurity Fix(es): * git: Remote code execution in recursive clones with nested submodules (CVE-2019-1387)importantScientific LinuxScientific Linux 7perl-Git-SVN-1.8.3.1-21.el7_7.noarch.rpm2162b4c4e3a4fe9429fb8f79b9cc60b51c936d81f98a12880db86ee82e5db6dfgit-cvs-1.8.3.1-21.el7_7.noarch.rpme3ddd2591519c91d33a7e6013b708b2aaf5cf0aa5f6913444b39ad32bbbb055bgitweb-1.8.3.1-21.el7_7.noarch.rpm7793132e4c0a4e8b2491e9981318b0e0590980d6197bcb160714ad3c4de34069git-email-1.8.3.1-21.el7_7.noarch.rpm8677bb51033b8e57cd430dcf3ba44fb615a86b4869c06e9ce498dcb4dd2f7254git-p4-1.8.3.1-21.el7_7.noarch.rpm59820b8ba25495b7537c5244a4c858a5ac32acfdab9273aad57b02cf458ef429git-gnome-keyring-1.8.3.1-21.el7_7.x86_64.rpma09ba4abf7020ac72edef850b93450ab580db4de8d4755dd80ca97d5f0705fd7git-daemon-1.8.3.1-21.el7_7.x86_64.rpmb52884597fee974fb795368aa996853bdec90aecb52d8f8f4add9d3720d2a6e6emacs-git-1.8.3.1-21.el7_7.noarch.rpm55fe3fcf0420f5ffb8c862609b1d0029075878d3d17f5fd5c25f684634169593emacs-git-el-1.8.3.1-21.el7_7.noarch.rpm88d3b6e815f9772b45905a3b0926c84bb2ea6f205059b65f046fe835f5646891git-bzr-1.8.3.1-21.el7_7.noarch.rpm212f7c7629db3c765683edd906cc286df814b6f875a53436a31366c14ac23484git-gui-1.8.3.1-21.el7_7.noarch.rpm82e75213647d7bf65cf382f79da4a8b6678ac9e837e9be0855b51ae40f91339cgit-all-1.8.3.1-21.el7_7.noarch.rpm9dde44bfdc20f5627cb4216183e9557699628cc83782cbf1b6e0df5287cec9dcgit-1.8.3.1-21.el7_7.x86_64.rpm1b445597abd8d68dcf18948d039addcfd692d8205d3eda3d1c5db6eff96d9ce5gitk-1.8.3.1-21.el7_7.noarch.rpm0342933206ac0bb2366a48dde0501437316b2b7637fd7354b49094920ee0a0d3git-svn-1.8.3.1-21.el7_7.x86_64.rpm12ed98b88a25be6a728aa8cd409024be313172dd2f371b9e4aa732c5471358d4git-instaweb-1.8.3.1-21.el7_7.noarch.rpmcae388a2afbaa98b888bfffcc9415a61d84f0b3eb034a6d2ee9bb16270b26f83git-hg-1.8.3.1-21.el7_7.noarch.rpm44751bed36d37955072044905935ea836a0b972b14ed6c952371c92112996073perl-Git-1.8.3.1-21.el7_7.noarch.rpm2b5d813c223b8790dde195188fe45200c3598ff53d6f5d401609a34023895f45SLSA-2020:0194-1Apache-Commons-BeanutilsSecurity Fix(es): * apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)importantScientific LinuxScientific Linux 7apache-commons-beanutils-javadoc-1.8.3-15.el7_7.noarch.rpm98b472b18fe8bce810c08ec0eb26380bb9d3ca4d7866497494c0b6dccfe96537apache-commons-beanutils-1.8.3-15.el7_7.noarch.rpmc99ec5164423f9a4793b49d48da92c1c593d3db669d7952c876d0e68be87774fSLSA-2020:0195-1Python-ReportlabSecurity Fix(es): * python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626)importantScientific LinuxScientific Linux 7python-reportlab-docs-2.5-9.el7_7.1.x86_64.rpm552b0e526e06517730dba733e3a0dddcb3b8fe8f8a0d506121a4035de8d18d47python-reportlab-2.5-9.el7_7.1.x86_64.rpm9b8b87477716bc1f8d3eb4606f506f551de3d2497707bbfcc687b73e0d3ca438SLSA-2020:0196-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) * OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) * OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583) * OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7.i686.rpm9a167c41dd208870d7c4a3faf51063e782cb271f0d03e33bbc8a23d852bc8f0bjava-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7.i686.rpm1e3f5120658683ef11266980fb73e716ce6f5ce5e85ceb70619361fdbe32f439java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm54f427fae1f961eeccdd6ce68781fc25e36c60cabceb5e463fd2f698f110ecd2java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm8e595ea034bbc56eabf461822f1fb05ee57189f13b8e89534dc92ee838aba601java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7.noarch.rpm2bf617aa79566f04338d46fd346890a0cbf2692a611969c924ccc250c334eb5ajava-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7.x86_64.rpm2f9f51b77cff48b013c101e4d0900d67f71d890f799c5fc1050e39b4cdc3460fjava-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7.i686.rpm1069f2a144663f0f77c4c8399dc3b204fae780c074cb68cbdd981ddf6dc10a4bjava-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm945ea95869f62cb6402a5627cb778c8a148dc630666f937df8375c59aa3bc123java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7.noarch.rpm409d3e08400259e30329c170048a427e1a2b646b6d77e7761c3c2a35d8e61660java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm8b46f74609d899f3b396168af5fdb47bfab16504d3382421dcaf0305d5fecad0java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7.i686.rpm70d7a907059f3e12da66053252d7410c3197a72d366896e61e57218a34170d23java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7.noarch.rpmb04084dddc589b56a6ae619e6ee1eaa28636c5b2aa84bed11548f84d8c819fcfjava-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7.x86_64.rpmecaafd42f5f76eea1ffb23f93266e2d0003f5de71b9236ed135d30a1bed32f1djava-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.x86_64.rpm828eff829769a5e9519e271dbbce2fb6cfb89519cd8b56f5224eeb6af62f9fb2java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7.i686.rpm717497708a7033e571f0f61b766dd9b821e28591865950ee91c75e439697d91cjava-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7.i686.rpm97ede619a9fd73e4c82efa6ac461acfad400361cc7e277c031b492938f9b90dejava-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7.x86_64.rpmc7ff935e2150da10bff47654775843f2be10f7386240a46726d15b683d3b3180java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7.i686.rpm81535722a060ca73b844ccd67037288957ab4e34b004c56144283782ef9cdd21java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7.x86_64.rpmb9627b00aa20032ac92db4800e2a63052a707998240877f9f8741395ef171bf3java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7.noarch.rpmc43a14ff50e420e6082bac4a82779bd60007788385ff054e5ad1da323b28f166java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7.i686.rpmb5f0b5d6e2a6ef88c9f3d85e9a2eacbf49d11c76b98dbd431d627115bc9158aajava-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.i686.rpmbe1bab845e1ee4dbe1bf9489d05f087f960d62a912727003a32698cedd4fff79java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7.x86_64.rpmb4461162baf7612da51d42eda654400f705f5a9997dd83adabecc52394a4a54djava-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm555fd3f9099bb49f1086b7836e77bd53bc8e3a3a3a34de9f60a86bc9fdc46745java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7.i686.rpmf53471a410d34ac7af37504154b62f31db9956b19d66ef587284b7add44da770java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7.i686.rpm80ba983246e92994235e5e94124e153adf3500dd7de03a9a7a0848fcd927a680java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7.i686.rpmbce06ef2bbc9489fd94641c4b08dc21fc4a202467002cab62ccdbd621d7f2b4djava-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7.x86_64.rpme7d6174e3bce4adcc115f2a3b19931108e4dcac42d1c5a8a457306b8aff10371SLSA-2020:0203-1LibarchiveSecurity Fix(es): * libarchive: use-after-free in archive_read_format_rar_read_data when there is an error in the decompression of an archive entry (CVE-2019-18408)importantScientific LinuxScientific Linux 7libarchive-devel-3.1.2-14.el7_7.i686.rpm0cc2f7ac0c5642186c3bb5779bdfc5da651bedf7dea87c67a382a2f5f882c8c3bsdtar-3.1.2-14.el7_7.x86_64.rpm732525fbb720279190f83af5754f64c2250f78e82ab6313060bc0b341f595b3dbsdcpio-3.1.2-14.el7_7.x86_64.rpma64a51142a141052495c4650493174d99da67f794fb65e944a88b4081bb4b7cblibarchive-3.1.2-14.el7_7.x86_64.rpm653ab086e559d2ea562d3073828890e147e7cf1b8f91e5db63cee52891f78342libarchive-3.1.2-14.el7_7.i686.rpmaa6ab41a43076a37c860ee2cdd9d3487098b7c3b566a43e0092b0f9b168f2522libarchive-devel-3.1.2-14.el7_7.x86_64.rpm525e61608db869772013cdb15b5ce0b7545b244dae4cf25d1dd55848dcd83ef2SLSA-2020:0227-1SqliteSecurity Fix(es): * sqlite: fts3: improve shadow table corruption detection (CVE-2019-13734)importantScientific LinuxScientific Linux 7sqlite-devel-3.7.17-8.el7_7.1.x86_64.rpmb5a69b5f1a960930d0f34a03be888d4f4e2b6dd8fba5c9da541fb0bcb8456369sqlite-devel-3.7.17-8.el7_7.1.i686.rpmca45feae55907951d999f8818ee9865005e86c0500a16f622ccd3f7c375baf8alemon-3.7.17-8.el7_7.1.x86_64.rpmd6e23b6e2a6da0722a873983ff4d758feff99a4dbdd7a4f8647f758a848a9d52sqlite-doc-3.7.17-8.el7_7.1.noarch.rpm6c5be22ed80b7408119ab9e7f5c6f3d393d72b975fc20d05aeae0ce412d822absqlite-3.7.17-8.el7_7.1.i686.rpm3e0cd96e1b8cc53c760b2efc78c5d8360eefc98b8e1ad712adee4e7848d3fc8csqlite-3.7.17-8.el7_7.1.x86_64.rpmee7fbbd791f47640b5db00cfb874ea2f3f3cd0758ecbb80e2b04a8dc7c5fe91asqlite-tcl-3.7.17-8.el7_7.1.x86_64.rpm680e8ccf7fa92f2e7b687cb21f9283abe50a7c54dc473302113298a9e648eb1aSLSA-2020:0262-1Openjpeg2Security Fix(es): * openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor() (CVE-2020-6851)importantScientific LinuxScientific Linux 7openjpeg2-2.3.1-2.el7_7.i686.rpmf09c869a14d0330b165ab26324c5bbadb8029f032c0672157a42ef68193d675dopenjpeg2-devel-docs-2.3.1-2.el7_7.noarch.rpmbfa8c48a10425ac5047a8488da6103d0035e7ec9475414b1e0b1da54ffada79dopenjpeg2-tools-2.3.1-2.el7_7.i686.rpm153826fc6f578eb08adfd6a77557d883f21492db8fd9998307ef95ea81db4b6dopenjpeg2-2.3.1-2.el7_7.x86_64.rpm0443ad8a7880ca1f0988a3e112cf07f6285ec90f4012ada8c5452713470de4d5openjpeg2-devel-2.3.1-2.el7_7.x86_64.rpm40793a6523c6cfc309b1bdc3011668e172ab89d1dccebf401700f99f68e15341openjpeg2-tools-2.3.1-2.el7_7.x86_64.rpm9bb74281089d3b27094cd36f8af97785c1137618b330499117651ad701e3fd68openjpeg2-devel-2.3.1-2.el7_7.i686.rpm6fe1720011f65c9d1acfb6506fa903d786e062be3f3ff178bb3329dbcb7e5812SLSA-2020:0366-1Qemu-KvmSecurity Fix(es): * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)importantScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-167.el7_7.4.x86_64.rpm99adb41d4bfacb07a0f99829ece6b0f309d1953227001682f38b00d0a879ebabqemu-kvm-1.5.3-167.el7_7.4.x86_64.rpma6cc5f4fde94c75bc6a0d69d46703eb62937195ebd1fa5d9c4d12c4ae2051b17qemu-img-1.5.3-167.el7_7.4.x86_64.rpme4cb8aecb40be801731a1d7d39f14f967faac4f7795d78ce7b35160e02c690c8qemu-kvm-tools-1.5.3-167.el7_7.4.x86_64.rpm3b041f07cb95a6fd5a4a231ce47b8dba86e520510a53602ca794b093d4cf6777SLSA-2020:0374-1KernelSecurity Fix(es): * kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816) * kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c (CVE-2019-14895) * kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901) * kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c (CVE-2019-17133) * kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 (CVE-2019-14898) Bug Fix(es): * [Azure][7.8] Include patch "PCI: hv: Avoid use of hv_pci_dev->pci_slot after freeing it" * [Hyper-V][SL7.8] When accelerated networking is enabled on RedHat, network interface(eth0) moved to new network namespace does not obtain IP address. * [Azure][SL 7.6] hv_vmbus probe pass-through GPU card failed * SMB3: Do not error out on large file transfers if server responds with STATUS_INSUFFICIENT_RESOURCES * Since SL commit 5330f5d09820 high load can cause dm-multipath path failures * Hard lockup in free_one_page()->_raw_spin_lock() because sosreport command is reading from /proc/pagetypeinfo * patchset for x86/atomic: Fix smp_mb__{before,after}_atomic() * fix compat statfs64() returning EOVERFLOW for when _FILE_OFFSET_BITS=64 * Guest crash after load cpuidle-haltpoll driver * SL 7.7 long I/O stalls with bnx2fc from not masking off scope bits of retry delay value * Multiple "mv" processes hung on a gfs2 filesystem * Moving Egress IP will result in conntrack sessions being DESTROYED * core: backports from upstream * kernel BUG at arch/powerpc/platforms/pseries/lpar.c:482! * Race between tty_open() and flush_to_ldisc() using the tty_struct->driver_data field.importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-1062.12.1.el7.x86_64.rpm678df641a81fd93cbfcfd40920cedc1f3b7e3695150d5a6fbbbd6d0cf6047513kernel-tools-libs-3.10.0-1062.12.1.el7.x86_64.rpmc9b728fae4d85bbaa20e176cfb00f642e1bf1802b02cdfe9d39e04204b34098ekernel-headers-3.10.0-1062.12.1.el7.x86_64.rpm7c973327b37ca38c1e700823e7d01b0a8ad4155122feff8e419ec4693b9544d6kernel-doc-3.10.0-1062.12.1.el7.noarch.rpmac4ed5265d0c02061c41193a3e12bd3165ee5617ba628f7a410c51e799bbbeedkernel-3.10.0-1062.12.1.el7.x86_64.rpmfdc18e2f637c04eb92abb2650a37f186a50e15cbff8ae56ec296b36f445b3726kernel-debug-devel-3.10.0-1062.12.1.el7.x86_64.rpm27c77dcaaa3fe4662dc2e6bc7352cdf3e6f9324aa2b7288f00c9770e93e41503kernel-devel-3.10.0-1062.12.1.el7.x86_64.rpm3615f4a9cb7aef285bba47f901242445161a4d16151a884dffa01b1d254ecbe1python-perf-3.10.0-1062.12.1.el7.x86_64.rpm9a4501600513edf7980b6e201a2e836f68ec90cb6ebee4c664f0be81583675a1kernel-abi-whitelists-3.10.0-1062.12.1.el7.noarch.rpm398c5671cb36044813412900d10d37b55e14d95923c9aa7e6c34d2533e17074aperf-3.10.0-1062.12.1.el7.x86_64.rpm0b7fa3d1f43787e42f8e74e62e1ac0296eccac6c793f188f1c0b2a7dfeccf02fbpftool-3.10.0-1062.12.1.el7.x86_64.rpmba9aad83c3de995708bb3d7e5c4400567bced1b4a48e6dcbebec70a3554ade34kernel-debug-3.10.0-1062.12.1.el7.x86_64.rpm7f2d6bac01fefb630bb4ca6a05d83353c73f76da24066efbce6f3268dfcdd2ddkernel-tools-libs-devel-3.10.0-1062.12.1.el7.x86_64.rpm342c41e6e16dc17163d2267929ffa6f1491110dedfaaf35bab5a704936acbbdeSLSA-2020:0378-1IpaSecurity Fix(es): * ipa: Denial of service in IPA server due to wrong use of ber_scanf() (CVE-2019-14867) * ipa: Batch API logging user passwords to /var/log/httpd/error_log (CVE-2019-10195)importantScientific LinuxScientific Linux 7ipa-common-4.6.5-11.sl7_7.4.noarch.rpm7b1852d36bbbb09d30b24b0e293eccc434ddc2a65d3abc1d2c9ef5ba0e5ba9f2ipa-server-trust-ad-4.6.5-11.sl7_7.4.x86_64.rpmf5abcf4e281590b38d237213acc0e59332574d773c928d459351330dbf74508bpython2-ipaserver-4.6.5-11.sl7_7.4.noarch.rpm3cbd6ff946df6c34a43dfa8fb1615fdc67e8720d50472e55842135fd15ed29c2ipa-python-compat-4.6.5-11.sl7_7.4.noarch.rpm1bf34c8b0f25e6b952e5d5fd343547fac2794336494ce1b691ddf142e16b1aa8ipa-server-4.6.5-11.sl7_7.4.x86_64.rpm180de961de0bbfd64888fe7cea257f8810a0d33f1988a676f3f3101209f39caeipa-client-common-4.6.5-11.sl7_7.4.noarch.rpm8eb3f12e3b3269fd7e2e1820d364f04e13b0ea3b9e1d942d3a949d095d531d96python2-ipalib-4.6.5-11.sl7_7.4.noarch.rpm3c48403dcaf45da4932abc0c519589dc679e551079e797d45f012c6508b2dd80ipa-client-4.6.5-11.sl7_7.4.x86_64.rpm8e63051595bbc6af6bbe7b1983b42a7a1dee191f8abc0154e1b9ec0001cefcabipa-server-common-4.6.5-11.sl7_7.4.noarch.rpme79c2d28aa6faea4ed498c4596a5e92002655dd4111c77196959179583bc2d45python2-ipaclient-4.6.5-11.sl7_7.4.noarch.rpm6479a9dc9ce9df5ecfaa1c2408f54463d7415548556c0baba3e578df3705b1b1ipa-server-dns-4.6.5-11.sl7_7.4.noarch.rpm0f822699bbbc6ae9a621e00d1ce688119df166a78d70b62f4017f745a87362a6SLSA-2020:0520-1FirefoxSecurity Fix(es): * Mozilla: Missing bounds check on shared memory read in the parent process (CVE-2020-6796) * Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800) * Mozilla: Incorrect parsing of template tag could result in JavaScript injection (CVE-2020-6798)importantScientific LinuxScientific Linux 7firefox-68.5.0-2.el7_7.x86_64.rpm175699e39486c45858d9496ca1230e1c8e4e5463d9b10e1bde45897184fc2fa9firefox-68.5.0-2.el7_7.i686.rpm6e1418713ff4949b278fe5595f3765f83bb173b149ac7e7dfc6cdca2f4a3c371SLSA-2020:0540-1SudoSecurity Fix(es): * sudo: Stack based buffer overflow when pwfeedback is enabled (CVE-2019-18634)importantScientific LinuxScientific Linux 7sudo-1.8.23-4.el7_7.2.x86_64.rpm2a0983d382baccae0a2b20635df66f8b45e4e68d86ef99a6b50bb616dc918d54sudo-devel-1.8.23-4.el7_7.2.x86_64.rpma280d8794e307450fc85171837c769e3c856446f27f634156f3475d1ba08f08dSLSA-2020:0541-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) * OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) * OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583) * OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7.x86_64.rpmc8e3bd91e252b8f5e256f40f4e09a6cead43df4a8bef5c439f9576b9d7231520java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7.noarch.rpm74ecb156bebeb43b8cc843c9288642ad923b7a0e949874a79239a7b401df7509java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7.x86_64.rpmf7a70c4f7609c54b5b62dd0a3cad5056a67b02219804a1d3d16c5a7d07113aacjava-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm21039ad614cb33f7d1315a6d9d39d16f9ff72b64a3801eda4783ff2c24e6388fjava-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm1943f705c257331671a603efd1ad86f98bb4ecc5a5d84b4ce103fcd993dfa7c4java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.x86_64.rpmcee782279d763c673ae4068f27c6e7db66c7b109fd11fe02ba9196471ebc4594java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7.x86_64.rpmf7ebfb5ed0c2c10ad6f70180fe640a0141b2d7065c2fb4c1b506e1e67c78e12bSLSA-2020:0550-1Openjpeg2Security Fix(es): * openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c (CVE-2020-8112)importantScientific LinuxScientific Linux 7openjpeg2-2.3.1-3.el7_7.i686.rpm059dde7537851f6dc7756c7bdf8aa7af0d7bb0ee04f3c0c8d9c409a9d2df8be5openjpeg2-tools-2.3.1-3.el7_7.x86_64.rpme03f2c1aba39f70bd1d7c9e3d77729393488fe0e990f2f2f3e7648fe46c13ee0openjpeg2-2.3.1-3.el7_7.x86_64.rpmc58a91b3d8572df5ec1035fb963a50ba14dcc86475cf50b3b834ac5aab1b0775openjpeg2-devel-docs-2.3.1-3.el7_7.noarch.rpm01290ac606e5820379fb688b6b0a05694ab57949d49ce3bda6dad2a29f45d69aopenjpeg2-devel-2.3.1-3.el7_7.i686.rpmef22a60d67a2ae98a63f471d8a7d5da921466f4207d65c24b9925de29980ffc4openjpeg2-devel-2.3.1-3.el7_7.x86_64.rpm126b0e9f6dc38e0a18205f32290e367a0428e2d8fe8f5ff4336fc5c30f87a040openjpeg2-tools-2.3.1-3.el7_7.i686.rpm9a42e995d4c9dab1bfd4a120a13374673ce443cf28352490c947ed06b7b19bc3SLSA-2020:0568-1KshSecurity Fix(es): ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection (CVE-2019-14868)importantScientific LinuxScientific Linux 7ksh-20120801-140.el7_7.x86_64.rpm93ea15c7942bc73a8cfe8a36c20d8304b5496c2167369b073240d5e6ae6df625SLSA-2020:0576-1ThunderbirdSecurity Fix(es): Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800) Mozilla: Out-of-bounds read when processing certain email messages (CVE-2020-6793) Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords (CVE-2020-6794) Mozilla: Crash processing S/MIME messages with multiple signatures (CVE-2020-6795) Mozilla: Incorrect parsing of template tag could result in JavaScript injection (CVE-2020-6798) Mozilla: Message ID calculation was based on uninitialized data (CVE-2020-6792)importantScientific LinuxScientific Linux 7thunderbird-68.5.0-1.el7_7.x86_64.rpm6f1cf3ad1169f6cb72de7698056e27375e33b76776d55bb4d66b0f980a8cf0d7SLSA-2020:0578-1Python-PillowSecurity Fix(es): python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312) python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)importantScientific LinuxScientific Linux 7python-pillow-tk-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm9a01184939d4815d1cdf54eb3e445ae68eb4dd48a904fd4a7ea01a6dca75bdaepython-pillow-sane-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpmeb876da3a660b89a307f203226b1ff473d9b64fe3ddc0a15be72894c03045f28python-pillow-doc-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpmd59f714fb4d82265456809b87f7638150234709fc68f7f9c9bf3d083b28bdfe0python-pillow-devel-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm89d889079dd5ee2a4530d0515c42222630fb30d8943c6c2ee44c442fd8d58a49python-pillow-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpmcd338138e9b4f1fcf2af4c0f14634bcc575cf00a1f2d5eb75e8270b3507ce12bpython-pillow-devel-2.0.0-20.gitd1c6db8.el7_7.i686.rpm8ee0e753216a22e34ae1b1e71a2d14fe83e7e2fe98cc6bb91cd5233edbc39432python-pillow-2.0.0-20.gitd1c6db8.el7_7.i686.rpmeebb3e573fb8538d36ddfd7a8678b1924d86b045ffbe28e74cda0f2ec4cf1767python-pillow-qt-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm1ba70357d951b45b0ef0898a4703285e8bad8a63af13244cdc10e6949becaa77SLSA-2020:0630-1PppSecurity Fix(es): * ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)importantScientific LinuxScientific Linux 7ppp-devel-2.4.5-34.el7_7.x86_64.rpme7c6832368636f2a647dbb994be772bb4f325bbd6f38c7895f3cd3ea56fd56e9ppp-devel-2.4.5-34.el7_7.i686.rpmbbcd5ab1611f1a4a2323afd1ba11d1cd870992757ee25b16ac785226d4d31b3cppp-2.4.5-34.el7_7.x86_64.rpm8468a95c88796f4c58d3a4f765c31f42cf7fe38d1a715e4a324316d28aa67c05SLSA-2020:0703-1Http-ParserSecurity Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)importantScientific LinuxScientific Linux 7http-parser-devel-2.7.1-8.el7_7.2.x86_64.rpm6a61bc6d5de0d5f50ea54528de095131f9b4f07a7f8f0a41004b6fbdb56a9a3chttp-parser-2.7.1-8.el7_7.2.i686.rpm4a9b2db6354b8d42a3aac260c026d6a04ef1f6993c1a588c6d6e60e787b342f7http-parser-devel-2.7.1-8.el7_7.2.i686.rpmac4a73bc8cf0b942d7543272ee7c600262bb5572db23273638f60d9b3723e679http-parser-2.7.1-8.el7_7.2.x86_64.rpm6a50ce65455a4f6b584e1406473a4892f8c61a9d88e42865cb7f5f8b63fa30acSLSA-2020:0704-1Xerces-CSecurity Fix(es): * xerces-c: XML parser contains a use-after-free error triggered during the scanning of external DTDs (CVE-2018-1311)importantScientific LinuxScientific Linux 7xerces-c-devel-3.1.1-10.el7_7.x86_64.rpm9c6982620609b837e25da54ccf1372ab92a7560d05c0d4c46bbfa45e43187285xerces-c-devel-3.1.1-10.el7_7.i686.rpm9dcb5caccbdd245eaa140b4783824ba134030677850b03bc837eb816d54bf6d8xerces-c-3.1.1-10.el7_7.i686.rpm0c961eedcb6caadf75f6d2fedd84f5da31b524edc2aa77d223a71281d47262dfxerces-c-doc-3.1.1-10.el7_7.noarch.rpm2de81100d58f2179f44e8dab3a6b632ec359946a90c91bfd1f9e324bf9a9e258xerces-c-3.1.1-10.el7_7.x86_64.rpm187263e91b89b8e7563d2819ac02c758c7e06b7ffeecc222617d9c6b001d52bcSLSA-2020:0815-1FirefoxThis update upgrades Firefox to version 68.6.0 ESR. Security Fix(es): * Mozilla: Use-after-free when removing data about origins (CVE-2020-6805) * Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806) * Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807) * Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814) * Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503) * Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website- controlled data, potentially leading to command injection (CVE-2020-6811) * Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)importantScientific LinuxScientific Linux 7firefox-68.6.0-1.el7_7.i686.rpm88cb26207d17f77e32c4410bfe7397ce686f318d2750b82a29b190af4bde8f9afirefox-68.6.0-1.el7_7.x86_64.rpm58086f74ec53209bcfa1174c6501b4695ce714acb0a3fe0b6ce47640eaa58936SLSA-2020:0834-1KernelSecurity Fix(es): * kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487) * kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666) * Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135) (CVE-2019-19338) Bug Fix(es): * SL7.7 - default idle mishandles lazy irq state * Sanitize MM backported code for SL7 * A bio with a flush and write to an md device can be lost and never complete by the md layer * [FJ7.7 Bug]: [REG] Read from /proc/net/if_inet6 never stop. * SL7.7 - zfcp: fix reaction on bit error threshold notification * SL7.7 Snapshot3 - Kernel Panic when running LTP mm test on s390x * Leak in cachefiles driver * VFS: Busy inodes after unmount of loop0 when encountering duplicate directory inodes * Allocation failure in md's r10buf_pool_alloc function leads to a crash from accessing uninitialized pointers * [Hyper-V][SL7.6]Hyper-V guest waiting indefinitely for RCU callback when removing a mem cgroup * A bnx2fc abort attempt doesn't timeout from miscalculation causing a huge timeout value * scsi: libiscsi: fall back to sendmsg for slab pages * SL7.7 - kernel: avoid cpu yield in SMT environment * SL7.6 - kernel: jump label transformation performance * drm radeon power management warning on VERDE cards * Duplicate enum value in include/linux/blk_types.h * [HPE 7.7 Bug] hpsa: bug fix for reset issue * System Crash on vport creation (NPIV on FCoE) * [Hyper-V][SL 7.8] Four Mellanox Patches needed for kernels that have that have SRIOV * WARNING: CPU: 7 PID: 2049 at mm/slub.c:2296 ___slab_alloc+0x508/0x520 * fio with ioengine=pmemblk on fsdax failed * [HPE 7.7 Bug] hpsa: bug fixes * perf top -p PID does not show anything * Delay in RT task scheduled. Incorrect nr_scheduled value. * A directory on a gfs2 filesystem appears corrupt on nodeB after nodeA renames the directory * ixgbevf interface goes down on hypervisor and causes outage * Can't enable virt-ssbd on some AMD hosts * [HPEMC 7.8 BUG] x86/boot/64: Avoid mapping reserved ranges in early page tables Enhancement(s): * scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show'importantScientific LinuxScientific Linux 7bpftool-3.10.0-1062.18.1.el7.x86_64.rpm15b27b60c6abec50a3e579a2fbe9b44cc6a79e0822c38d319edecf5f47c781cdkernel-doc-3.10.0-1062.18.1.el7.noarch.rpm04fbe850802d58e3b2e3687f2140db4842e6a2054a6de580b8c43e7b4de6e461kernel-3.10.0-1062.18.1.el7.x86_64.rpmad2d3f07961fa26652945b0eefb2c831d1d31ab0aaaa424dd0f3bf5beef4ae9ckernel-debug-devel-3.10.0-1062.18.1.el7.x86_64.rpm384b51e810e0668328ba8b978c03167475cbb00c0b73ccf0bdd096d81582964cperf-3.10.0-1062.18.1.el7.x86_64.rpm4d3ae0654a52d68aa7d5d98a45c85dbe69fa91882d4d9287af9c36799da54fdakernel-devel-3.10.0-1062.18.1.el7.x86_64.rpmc529d11d6cb3f355d9e270b8ef0a1bda91fa3e7b1615e6777897c084a047081dpython-perf-3.10.0-1062.18.1.el7.x86_64.rpm8d82ad81a6f1143e244f3e5e51401be1457b0c831d68f7ddf4bb4af9d318b0cekernel-headers-3.10.0-1062.18.1.el7.x86_64.rpm55a7bb9d091432175915295858c27501d3ecd67c827ab4cd67b36428aa83817fkernel-debug-3.10.0-1062.18.1.el7.x86_64.rpm4139f61327cbe9ce9d5fb33866ef7527ec0f0b1b63bd3870c16df70cdd279baekernel-tools-libs-devel-3.10.0-1062.18.1.el7.x86_64.rpmfdcebc135c16d897fcebdc49df9bb55ef9163e12e98b36f62d7502fc4697e29fkernel-tools-3.10.0-1062.18.1.el7.x86_64.rpme9512b3c7e9cd4dfab6d46b9bb16edd69daeb3db60ed86dc742272e123d6a1c1kernel-abi-whitelists-3.10.0-1062.18.1.el7.noarch.rpmb374b706c3ee5f983ad07eab2356a7cb81a67ca5731eff4c1bac1831cf863cf1kernel-tools-libs-3.10.0-1062.18.1.el7.x86_64.rpm1ab2836bce97f4f239e4ede7fc9416cc514c5a6682eff353adebd449953c8430SLSA-2020:0850-1Python-PipSecurity Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)moderateScientific LinuxScientific Linux 7python3-pip-9.0.3-7.el7_7.noarch.rpmc18ccab066d89eae69c10565c5b66be611fe72b63f49403109a1f648343e2b7bSLSA-2020:0851-1Python-VirtualenvSecurity Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)moderateScientific LinuxScientific Linux 7python-virtualenv-15.1.0-4.el7_7.noarch.rpm0ab1fc8fa3937b844dc11e7fa58d53d520e7a13fdfebc29c41fc51d020b58e20SLSA-2020:0853-1ZshSecurity Fix(es): * zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044)importantScientific LinuxScientific Linux 7zsh-html-5.0.2-34.el7_7.2.x86_64.rpm4b38cf11956e7571e4bd366bee17882082d5408c8adf33c45a592237882f018azsh-5.0.2-34.el7_7.2.x86_64.rpma49b04839177e93a489a28b91e43e20d39d7b7cf27f0e9c167ec18ba9d979d42SLSA-2020:0855-1TomcatSecurity Fix(es): * tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability (CVE-2020-1938)importantScientific LinuxScientific Linux 7tomcat-servlet-3.0-api-7.0.76-11.el7_7.noarch.rpmd19028a7be2470720f852678cb19939ecc95dcc31619f9dda1334aeab787a650tomcat-javadoc-7.0.76-11.el7_7.noarch.rpm873bcf3de628f118510280491113f225bfa4d726037b3febafc573717974ef32tomcat-jsvc-7.0.76-11.el7_7.noarch.rpm8abadce8deeda47eb4c198ce7c4c1ae991751ae267d6ee08a73a0a32bd32e99btomcat-jsp-2.2-api-7.0.76-11.el7_7.noarch.rpmced0dc7fe005335b65b542207c35f1a7f9574420e10828ed1c258d5ee52e855atomcat-lib-7.0.76-11.el7_7.noarch.rpmc989defcba861abf249c8247e935ef77a6e24d8e03fbce9825fa7ca92073ca0btomcat-docs-webapp-7.0.76-11.el7_7.noarch.rpm91e5dafa58e19c0a6ab13d82ea86e462c388c60c0bbeeece2997c23ac8832e2atomcat-7.0.76-11.el7_7.noarch.rpm4936de1712d833283822d5515f50e5bbc45fcdb543be89d49d0078967f3a212ftomcat-webapps-7.0.76-11.el7_7.noarch.rpme22b22b10fba4b5aa6d22250bf2c5a112295c2e837ea81668d5c6e60db1912d4tomcat-admin-webapps-7.0.76-11.el7_7.noarch.rpmb4ce51368ed5943129e3f2a7d224992681588f7c48abf119d9ff3927ac943e80tomcat-el-2.2-api-7.0.76-11.el7_7.noarch.rpme23ae1f4532b4c933362efbdd98d1542c17fdebff5e81de942e60fcb83b9219aSLSA-2020:0897-1IcuSecurity Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)importantScientific LinuxScientific Linux 7libicu-devel-50.2-4.el7_7.i686.rpm40140bcf1a104ca5e33ea0a2e9c0c85d1fb3a50e666c196d8f9fe7e1c32089e2libicu-devel-50.2-4.el7_7.x86_64.rpmfad4a0d6535549306d65e54b12feb572aa25ac7879ed9e97f51c7e44ffef88aelibicu-50.2-4.el7_7.i686.rpm1133c8f24b2cef8f9ab8debac53cd6065f3ca89cab3ba8cef9b8ff5b6d441c64icu-50.2-4.el7_7.x86_64.rpm976e3b73467d16abcd82f0d2baeca50966ea2ce874eb8aed0b83789c5ee9ccb1libicu-50.2-4.el7_7.x86_64.rpm3e2eeea9ccf5b04619edd469f5154004fb07685af25ac99dd2cf6a2513d775bclibicu-doc-50.2-4.el7_7.noarch.rpm35aa86936a25bd792a8cdcd1fd9fb5ed0b2558fe51eea44067f84f51c1f50bfdSLSA-2020:0905-1ThunderbirdSecurity Fix(es): * Mozilla: Use-after-free when removing data about origins (CVE-2020-6805) * Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806) * Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807) * Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814) * Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503) * Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection (CVE-2020-6811) * Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)importantScientific LinuxScientific Linux 7thunderbird-68.6.0-1.el7_7.x86_64.rpm93f78377831f2a42bebf4510767fc96dbbc0786f91048358ac95199ce827959cSLSA-2020:0913-1LibvncserverSecurity Fix(es): * libvncserver: HandleCursorShape() integer overflow resulting in heap-based buffer overflow (CVE-2019-15690)importantScientific LinuxScientific Linux 7libvncserver-0.9.9-14.el7_7.x86_64.rpm4ce9bcc81c5e73162ec9317c66b66e39ad183df86a48f3c2c934f215c741cd0elibvncserver-devel-0.9.9-14.el7_7.x86_64.rpm44424e89b258932d51a2a4e1499ded842e05e45b8341a3ff53914ad9897c3e9flibvncserver-devel-0.9.9-14.el7_7.i686.rpm6c23b682e9efbfa7ed90e8d7c137792a3c5c496aba8b31284787482e6314cb43libvncserver-0.9.9-14.el7_7.i686.rpm517772e158f8ee469b9cb32761ec5baa384ea7739e108f3c3cc628f0d3d432b1SLSA-2020:0984-1IpmitoolSecurity Fix(es): * ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c (CVE-2020-5208)importantScientific LinuxScientific Linux 7bmc-snmp-proxy-1.8.18-9.el7_7.noarch.rpma983e96bea5aeb0b9563f65d7bf687142a9b7e8e3857976c9d9dd896d4faca79ipmitool-1.8.18-9.el7_7.x86_64.rpmf47b232bc0d2de0dfea63dc6d0987fc322026d1b73e6b3c4b8f3c1e9465ada8eexchange-bmc-os-info-1.8.18-9.el7_7.noarch.rpm7ea6f62e7c6e7d82eb5513ea02ce0dd433397289b60553a5e4494bdd67ec4ce7SLSA-2020:1000-1Rsyslog* rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c * rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.cmoderateScientific LinuxScientific Linux 7rsyslog-udpspoof-8.24.0-52.el7.x86_64.rpm054274aa227e4fe3b55ec71e6a3f7927150334c19eda2520e3035de8028e08c9rsyslog-snmp-8.24.0-52.el7.x86_64.rpm592719bab9955cc7930b8dcbaf72908c594e3f803440f48cad00d47144575486rsyslog-libdbi-8.24.0-52.el7.x86_64.rpm3c0fb154e76585e524848ea794ffdfbb48042344755f097804cfba7ed3e9fc86rsyslog-doc-8.24.0-52.el7.noarch.rpm13e0f961f1a1d3c61f9311e2ab7040c099cd75f1a416961edd9cfedea05b252crsyslog-mmaudit-8.24.0-52.el7.x86_64.rpmc7439980fc256f6155ea5f1b14b60f13c3421c3b65b33cdfbde7e62a58f252dfrsyslog-relp-8.24.0-52.el7.x86_64.rpmb23d8d2063183b677364a4f08a7cd2e35b8676ec7a3335582ca8d66057acb82drsyslog-mmkubernetes-8.24.0-52.el7.x86_64.rpm2f224c163f06583c0f9d99b2d6d215dca194512d97d98ee0a619febae2efd4ddrsyslog-gnutls-8.24.0-52.el7.x86_64.rpm70b15b27225a692912f388f13ba387a1ffa0fa64c633730a900b64d9cf134c31rsyslog-mmnormalize-8.24.0-52.el7.x86_64.rpme35a646f0ec31f7a423d74d74c339701f28704be8bc8546dde925701c62fd842rsyslog-crypto-8.24.0-52.el7.x86_64.rpm29d90d976c52475c09fdb8bb2e0f64bf7802a87c7af4bc826ce48a3038c9b47brsyslog-elasticsearch-8.24.0-52.el7.x86_64.rpme86d1b6835415282527fa2b42ec9d224ce8b15f40e782006f1b8fc6093221923rsyslog-mmjsonparse-8.24.0-52.el7.x86_64.rpm2838add15e23220dbe64fd66d3f8ceedf2fc76ae0878b97da5ab6713d374e846rsyslog-mysql-8.24.0-52.el7.x86_64.rpmdd107f8c819e4b43a78414cb4162764b79fc252f167a46c14a7da163e8d6bd9drsyslog-8.24.0-52.el7.x86_64.rpm53fc086d770d38f543be3d35860cebe34c5a0d571f4c79b92055a617e8bcc16frsyslog-pgsql-8.24.0-52.el7.x86_64.rpme56cfbd72ff9b1b7b73ac4ff602f2100d20cc7591ffcc77557bfa41b60a58744rsyslog-gssapi-8.24.0-52.el7.x86_64.rpmb9c6d4384a8bad53de6f964f45e0ecd9c53e69f5eab1cfa8185ab5cd9df34c93rsyslog-mmsnmptrapd-8.24.0-52.el7.x86_64.rpm9797bfee7e8453399ed24380cba0b1a12abbf647ea740b4931ecf8894f168150rsyslog-kafka-8.24.0-52.el7.x86_64.rpm379976f284bbf9fefab125dcbc7b7227576a9ff095c6c2e836d869b314714b43SLSA-2020:1003-1Mod_Auth_Mellon* mod_auth_mellon: Open Redirect via the login?ReturnTo= substring which could facilitate information theftmoderateScientific LinuxScientific Linux 7mod_auth_mellon-diagnostics-0.14.0-8.el7.x86_64.rpm22b333e13396e543dd8054d76e6e1c6985bee59ae305607f3ac5ddf28b38620cmod_auth_mellon-0.14.0-8.el7.x86_64.rpmc48105c86c2bbdbe32d4d82f4d8424b32ead66f663aecc1d1c9e8d0893aee87fSLSA-2020:1011-1Expat* expat: Integer overflow leading to buffer overflow in XML_GetBuffer()moderateScientific LinuxScientific Linux 7expat-devel-2.1.0-11.el7.x86_64.rpm3b30147bb8cc10ba6c987030e273b87e12fc62229dc55286097ac4af9127d7a1expat-2.1.0-11.el7.i686.rpm0d487af4044dc0998baefb06d2cf8e0bee06decaffe9e6c28f2e13f3d12ac41fexpat-2.1.0-11.el7.x86_64.rpm583fd88a4116685b83112e8332bc5bbbc7909ddf783e5f6fd0f0eea33e0eebedexpat-static-2.1.0-11.el7.x86_64.rpm6a4e066bcdbcc56c60ba96fc9415134eae09679ae1d5d347bdfd0785facd1abbexpat-static-2.1.0-11.el7.i686.rpm2db032c6d7fd89e1ea29ef8de7d74ea9f60f4b7d2a635b410afcb2a5e003f012expat-devel-2.1.0-11.el7.i686.rpmde6733bdeb210a9fd5b3ecd5ffaced0b6628576032a7426c38c38b6e42413b6eSLSA-2020:1016-1Kernel* kernel: out of bound read in DVB connexant driver. * kernel: Missing permissions check for request_key() destination allows local attackers to add keys to keyring without Write permission * kernel: denial of service via ioctl call in network tun handling * kernel: usb: missing size check in the __usb_get_extra_descriptor() * kernel: perf_event_open() and execve() race in setuid programs allows a data leak * kernel: brcmfmac frame validation bypass * kernel: null-pointer dereference in hci_uart_set_flow_control * kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command * kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service * kernel: use-after-free in arch/x86/lib/insn-eval.c * kernel: denial of service in arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c via sigreturn() system call * kernel: integer overflow and OOB read in drivers/block/floppy.c * kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service * kernel: buffer-overflow hardening in WiFi beacon validation code. * kernel: (powerpc) incomplete Spectre-RSB mitigation leads to information exposure * kernel: oob memory read in hso_probe in drivers/net/usb/hso.c * Kernel: net: weak IP ID generation leads to remote device tracking * Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR * kernel: ASLR bypass for setuid binaries due to late install_exec_creds()moderateScientific LinuxtrueScientific Linux 7kernel-3.10.0-1127.el7.x86_64.rpm9b69f31633dbbf7cc5b8476755e44b66134da547e005ec394e74542085a12088kernel-doc-3.10.0-1127.el7.noarch.rpmad45d86863e386e4c6f6fa1e47c1cc6ca322cc3b3a61ec2e79d3d48389a6aa88bpftool-3.10.0-1127.el7.x86_64.rpmf57740eef1d2994a9e51d90150cb8eb8e156b8631327d0451efae3aa7c595dc7kernel-tools-libs-devel-3.10.0-1127.el7.x86_64.rpma96fbcd14c2c295700cad30cf24e628edbef8568efc5fa9cf8df784bad38d429kernel-devel-3.10.0-1127.el7.x86_64.rpm6f4ea50495b4dd0e68b1658ef8f224afdd95610cd41de957faf9bae5b23f3068python-perf-3.10.0-1127.el7.x86_64.rpmb2401a0b7be65c1130f0859cbb8d0379af68ab2a5fb54d27b29a119b11c0a585kmod-openafs-1.6-sl-1127-1.6.24-290.sl7.1127.x86_64.rpm65f2c381872b26afa49d2a71012b3cde549c7eedb5f948faaf108a52c52dd571kernel-tools-3.10.0-1127.el7.x86_64.rpm2bed1532028f0b9973105dfa8c468bda0a578283c20c7061a8225e572acb53aakernel-debug-3.10.0-1127.el7.x86_64.rpm5b44d9384ea4dffe424ff19963b690af34c19b6b6ff54abd47912f69379581b8kernel-headers-3.10.0-1127.el7.x86_64.rpmbdc747cbd76a1c5a2c113809af4073a6ca7f2519ee9e3dc68b26cc00ca40c5edkernel-debug-devel-3.10.0-1127.el7.x86_64.rpm39003cda3cad7f449a74ad954c0e4129d5808d27fc1479b3799e4c2a51d0c92aperf-3.10.0-1127.el7.x86_64.rpmaeeb0cd87014cc1fbf4ceb4d1885c9b1687fd2973e2098bdee041cb9420ad3cdkmod-openafs-1.6-sl-1.6.24-1.SL78.el7.noarch.rpm93144a759115baea17333359192f2d53c724e385c2f9c6b9ac2b120179fd913dkernel-abi-whitelists-3.10.0-1127.el7.noarch.rpmd0a1266e426c905094a6fe9c4c774add976a5ffbd7e390734f21659561c0de4ckernel-tools-libs-3.10.0-1127.el7.x86_64.rpm6beea5e777cf6b3223d7e5f11f38cb26eb4ca7bd3549ed6b0e67b0f8532d48fcSLSA-2020:1020-1Curl* curl: TFTP receive heap buffer overflow in tftp_receive_packet() functionlowScientific LinuxScientific Linux 7libcurl-devel-7.29.0-57.el7.x86_64.rpm4e7c5dadbdcd39272e42e1d40613428c158ec07372234918fceaf0192daab209curl-7.29.0-57.el7.x86_64.rpm89a176200d620756c6f014da326fbae32ece5bde0f57e58be17d908b53e6b5b7libcurl-7.29.0-57.el7.x86_64.rpmf14bb4c9533b4a31e2fb61afceca1fb659d3586cbe175f9f388ba839e28e7a9clibcurl-devel-7.29.0-57.el7.i686.rpmf4b33d4552a70977b1e3398259f43482200a7d0275453efcd3d04831cae0ff75libcurl-7.29.0-57.el7.i686.rpm62ca5dbe0401553c8eed177631be5c607eb676d65eb02eeaa717eb95226ad221SLSA-2020:1021-1Gnome* gnome-shell: partial lock screen bypassmoderateScientific LinuxScientific Linux 7gnome-shell-3.28.3-24.el7.x86_64.rpm71cf1edc3c01009a6aea8084769f212f61277a0af8edaecbfc0b2a0ab9d05df5gnome-online-accounts-3.28.2-1.el7.i686.rpm559f9f84ae7aee5af489eb81c35bc6f5de6aa1c27a4fd4c947ddcdfff565778fgnome-shell-extension-drive-menu-3.28.1-11.el7.noarch.rpm6d59a1d091b053a7e52fdf6ed20cbdcac0fee98054992c2cccd6b64255e59cccLibRaw-static-0.19.4-1.el7.i686.rpmc8198898ae3d0cd607b9e29b1f9f9ec66ce4edf661fd586392cea2a8ac0297becolord-devel-1.3.4-2.el7.x86_64.rpm27727d86fd77eee20d74e4cdba6efaf33c00418e1795a625c249d7bf8b54901bgnome-shell-extension-native-window-placement-3.28.1-11.el7.noarch.rpm0a873608d038dc310d7347020e5579f6ebb3c11779ba91cc02a7e416244af848colord-libs-1.3.4-2.el7.x86_64.rpmd6fd1cb9ff2fa9021c557bc9127825d3383e838c4f1d51419de7fefb381a7ca7gnome-settings-daemon-devel-3.28.1-8.el7.x86_64.rpme70246e454f6c5d39d69b6180aa450cab341a22d6942e99bef74583c0b00a0b8shared-mime-info-1.8-5.el7.x86_64.rpm9595990593a1d9e96ba9249a541892b52708fb3a99f7b2370ade40a570eb427dgdm-pam-extensions-devel-3.28.2-22.el7.i686.rpma23bfc02e867114a490916e0759c97287afe9194536ac5bcf5548a977336f40egtk3-immodule-xim-3.22.30-5.el7.x86_64.rpm23cd47e022316e2357ad99b711f147f1b79c1f7d62547cf4c49bbe4ce2a08045gnome-shell-extension-apps-menu-3.28.1-11.el7.noarch.rpma2b58451cca163842166d84e3baf872a82e938e710a43956d29bf0081fc9ec8fosinfo-db-20190805-2.el7.noarch.rpmc4e694ecd8faf86efe9fe166924595040899ccc82653b98f68050b9caf6ea5e4gdm-3.28.2-22.el7.x86_64.rpme3a32fc3a60333cf28aaff08ec398a703ecf75f12a44e50c0c5873e9d4647923gdm-pam-extensions-devel-3.28.2-22.el7.x86_64.rpmbcf7955fbe3cd4e8b9e5b3f8b14089f0fdcc839c3d88cd6531c49cc8c5de79f7gnome-shell-extension-user-theme-3.28.1-11.el7.noarch.rpm0b479c11f2c35a8eca7cdc14df3d0fd665ce4091aa7bdd452aeb45b18bb93899gdm-3.28.2-22.el7.i686.rpm6d0082803dec555d1f41b7b3c643b348db027b49c4d7e392bf833575697b150atracker-preferences-1.10.5-8.el7.x86_64.rpmdd5ce637f8dd23eb038a6341b51341be077a9cfa248ab631520925ebe4d9c064gnome-shell-extension-auto-move-windows-3.28.1-11.el7.noarch.rpme83fbc8e369107edc149a99de75dc7ece6fa3fb59699fbcafc12d1f032cc4deacontrol-center-3.28.1-6.el7.x86_64.rpm0cb889a0bf28b286cd3d4f9a366fad350a98d66a0f929ad446ee165ded3f703cnautilus-3.26.3.1-7.el7.x86_64.rpm3888a3dbc9427b0d31b7dc013cc7a1547be4de8ea005c852f2221c6aaef9e13cgnome-shell-extension-window-list-3.28.1-11.el7.noarch.rpmd02cb581e105cef2cfcbde9076b413171d3073f4e9350e9c5b0e099407f0cd23libgweather-3.28.2-3.el7.x86_64.rpm33c9f6c3b909f2fdf272c2fa8d36920ee80b2443b069fbf0eb23664e45b43e9dcolord-devel-docs-1.3.4-2.el7.noarch.rpmca893715e7bd0d3a885c63bffd50140b32c1097bf9c64fa5e9455f989d2befc8mutter-3.28.3-20.el7.x86_64.rpm4a012f99f16e5e02263f1d85a5b2c182a29ba3eb3109b00eea19282de0ab1e6cgnome-settings-daemon-3.28.1-8.el7.i686.rpmb37026144d808285562bfb7499981be792309647585f04b52bd949388bb9554agnome-shell-extension-extra-osk-keys-3.28.1-11.el7.noarch.rpm58a45900ba0247321584abf43f2e191d00e43f089e05dc8597af99fb69cb5abdcolord-extra-profiles-1.3.4-2.el7.noarch.rpmcdbce679683350a96ac2c9083cb2f0c5b81fdad39d39848102ac472d7e7f96bclibcanberra-gtk3-0.30-9.el7.i686.rpm31c7122e98e8e1d1d4b554444532081f0b0c8a99f2fda4f579f1f5ec50818997control-center-3.28.1-6.el7.i686.rpmd1ebbb62b1b85f60fa1f7149ea634597fdf0cf977596450c26994fa90f921e11gnome-shell-extension-alternate-tab-3.28.1-11.el7.noarch.rpm8b75a7af378fa6b83d429dc0da1a7b0fb8524482bb9721984d2e48fc95555641gtk3-devel-docs-3.22.30-5.el7.x86_64.rpm8b31f644a0ff44620d834f3e9b87522dad33259b508edf1c3e1204afaf6070efgnome-shell-extension-places-menu-3.28.1-11.el7.noarch.rpma3c6407677dbd7627ce1e2f2ba8738520fe294d6c5e8fec47a9e375fb4d8836egnome-settings-daemon-devel-3.28.1-8.el7.i686.rpm37f9fd7d27d3cd9ac678009ac36af40642ac59a5a44d4835bd942f47aaf00f1fgtk3-devel-3.22.30-5.el7.i686.rpmd91a8d52dc734166a60f256cda76b039c283f7e40bd7f304499232b472e63844gnome-shell-extension-systemMonitor-3.28.1-11.el7.noarch.rpmd8e5f043f02ed79b87d92a8e49e4f0e3ea80f24a781cf7d1db78254b3646afaflibgweather-devel-3.28.2-3.el7.x86_64.rpm146155ca24af492b4354f0271c690cb100e5ded14d69e82a50743e4da66da31baccountsservice-devel-0.6.50-7.el7.x86_64.rpm6018c5f6413fe00f986a55604ff169e8013cedcab325911ab5ca08f389958c0bcontrol-center-filesystem-3.28.1-6.el7.x86_64.rpm61b79d0416a2268954839f8bb9be9d405eeaaa22d1dad046eea35cb8e9916375gtk3-tests-3.22.30-5.el7.x86_64.rpm80818e5c07c881820e9d8a9e5d98d9f911a519c6ca99b343b4d95dd5dc5d05b7gnome-shell-extension-no-hot-corner-3.28.1-11.el7.noarch.rpm39e87c650b9ca12c1fba8745324de54138c326d8275a7cbeec74d9182d559c9egnome-online-accounts-3.28.2-1.el7.x86_64.rpm9682512a4c261661dbcb252d7bf586f71b42e5c07eedd0977313acf5b24d7083gnome-shell-extension-windowsNavigator-3.28.1-11.el7.noarch.rpmd479b91d0a3aba8229b7f7cd8e41be7af61f3c1d1b8b6bbc4febd9f03141b7ebgtk3-devel-3.22.30-5.el7.x86_64.rpm4665878bd65cad446af7faa317deb9be3581f88974b296ce765cd23c6d96db71gnome-settings-daemon-3.28.1-8.el7.x86_64.rpm0e398b9b07dafac1fd8029f6cefc03abbe89f32931dbb66b02603df52c344cb0libcanberra-devel-0.30-9.el7.i686.rpm373bd559fdbe42d6effc70446b3147c96d984754ca3ab466445605106e9d6e2dcolord-libs-1.3.4-2.el7.i686.rpm1424d0f76891bc7499f68dfcde9ecc7ae3fe40acd9534c22d826b4f8aa648bc2colord-1.3.4-2.el7.x86_64.rpm39c307cdcd8f036d5cb16cca4109a7529499ebc85bbd0507f397551ef23e52efgtk3-3.22.30-5.el7.x86_64.rpme6c6c444155c88afc6d29cb32e2a9af58738297542b5c18214b0eddcb500dafegsettings-desktop-schemas-devel-3.28.0-3.el7.i686.rpmbecac5dbe7dad083baaa94ade5c2e63a22034567f835854c8f7133efb0cc779dlibcanberra-gtk2-0.30-9.el7.i686.rpm052408ae876e54b960119da2172bf50a3b9a7e2ea066ba6b95e850ad1bad918fgnome-shell-extension-updates-dialog-3.28.1-11.el7.noarch.rpmc1ff51b0b485310e54f3ffc790fc9fea5ee22f22271f0811b8e81524f5c1e467LibRaw-devel-0.19.4-1.el7.i686.rpmde897c6c834a1b7e141867e9e6c881b9e5a96f42f903a4ce65ed72a807ac7f0dnautilus-extensions-3.26.3.1-7.el7.i686.rpmd567499b2b739046d0bcedbdb361798d28402c253dcb618f2119dd4bd6bbd31fgsettings-desktop-schemas-3.28.0-3.el7.x86_64.rpme4ee021ba2f98622dc5bd22278239a04b2a21d0b8bf01497e1dabe9ffbc8506fcolord-devel-1.3.4-2.el7.i686.rpmf0392a3dacf873983621d91a8ce9700fa97ed61930de02677098add129259f17LibRaw-static-0.19.4-1.el7.x86_64.rpmebf8eba1019e883d66567804a68ab2d957da8c64cf17bcdcbcc0376f0d0c2cf9mutter-devel-3.28.3-20.el7.x86_64.rpmaaa77db7b627bd49afbe7cda02747f4f766ee40341b4b974e5857edf9b30abf5mutter-3.28.3-20.el7.i686.rpm057aca87c6075403aabf348046469fffc04fea7944a540ec7283ac639b95546bxchat-tcl-2.8.8-25.el7.x86_64.rpm22723e2cf290e12edce7bf2533088f6e2b30d41359f5bcda2088b9b830450d8enautilus-devel-3.26.3.1-7.el7.i686.rpm2619c80ca4f63bc786ddc0b8c9c60affc5bab6b450970b57cf472d23a8e93fd8nautilus-devel-3.26.3.1-7.el7.x86_64.rpm980d680ba1e47b88ee77235ddefc879d4d5ee82681b2625c6f43ff71f4e899beaccountsservice-0.6.50-7.el7.x86_64.rpmfae9e5c4fe85efe14bb9d5d26d1bdeb254064bd78193dbe0ba56fb208ba76827accountsservice-libs-0.6.50-7.el7.x86_64.rpm29435c616d5ea2fd504ee4ca498f8361fbe86f340ca6ffacce7df751be07fb0amutter-devel-3.28.3-20.el7.i686.rpmddb957f060cba7f1d35ed5cc0b351b0f25610e449fd3ea3cae47c13ea5e3c8a7gtk3-3.22.30-5.el7.i686.rpme34102fed6500921805f6d5aaa85bb676c87aab37676d1335be6261358fba490gsettings-desktop-schemas-devel-3.28.0-3.el7.x86_64.rpmf7c78a30ebbaed4745945138cd4f4b00ab5e3133f8a1333da3b75281d8cd688agnome-classic-session-3.28.1-11.el7.noarch.rpm7b711e7511256f706db6a414e7e99b6258fa70a6fa1bee28af47ab9b5cb33211gnome-shell-extension-workspace-indicator-3.28.1-11.el7.noarch.rpma50dfb261d2ff21c2da0d403854339b3078eab7064877a33e7a1e2de386e3386libgweather-devel-3.28.2-3.el7.i686.rpm2d194f6a5459a71ce78b7d08964265508d5aad7d2be4e8405e1c8d260db5dae0xchat-2.8.8-25.el7.x86_64.rpmfb5af867730d73c501f5383ff60df006beb9756230774b32895726e0b8483bd0gnome-shell-extension-window-grouper-3.28.1-11.el7.noarch.rpm2dc217f76508eabbdd883eab3f557628d8a96f1fefba393e69a1d64bafbfdc73gnome-shell-extension-top-icons-3.28.1-11.el7.noarch.rpm979455db1fee536ae95d85812edf33d16707cde10027c080756df25c16d66af3nautilus-extensions-3.26.3.1-7.el7.x86_64.rpmaa50685f5208d76ed3b6345f8663bbd5ba284732307e1dab443619fb74c00f31gnome-shell-extension-disable-screenshield-3.28.1-11.el7.noarch.rpm9cd8d50b722cca964a89189f110363c21b3ca8cb837a73f62a4a66b3b9247c4dLibRaw-devel-0.19.4-1.el7.x86_64.rpmaee4a5a1b6cca331078e72d47846ebea21ea58fdced83220a02a09993750ba8blibcanberra-0.30-9.el7.i686.rpm18524340ca81b2e1600808d110a80e38faea3c8d8994fbd5196d2ad3cc10e71cgsettings-desktop-schemas-3.28.0-3.el7.i686.rpmd8af116cf05fdfcd588540c5da2d94ac7578bc9f81b8a5e845b14d17df550369tracker-devel-1.10.5-8.el7.x86_64.rpm1830b02fa9b6980a056face17cd1c9e90095c1925dbe5a0b96d0cb054139cd10gdm-devel-3.28.2-22.el7.x86_64.rpmdd020157e5dd78348c18dc4b6f55d9c9ad558a5a51d66c2c7e768b231c68830ftracker-docs-1.10.5-8.el7.noarch.rpmb5623a167c5705c39dc159e72f2ab85b8d3deab569bf121490464094810b7505tracker-needle-1.10.5-8.el7.x86_64.rpm19648e165bd333932d4d83f99aed0aced25362821001f6ee2e65c933fce01273gtk-update-icon-cache-3.22.30-5.el7.x86_64.rpm848ef780d440d041c6c28890f59ce28da85a8497ad3e37f188417aa2ffd96830gnome-shell-extension-panel-favorites-3.28.1-11.el7.noarch.rpm3ee20c7241880630ea304c90d07f755d8fede394a297fe2afbf7dd2ff9092c42gnome-shell-extension-horizontal-workspaces-3.28.1-11.el7.noarch.rpm5f08e4e41a305ceeed52b7898626f06be5407acb519f4f2a654307a9dc4e6fc0gnome-shell-extension-screenshot-window-sizer-3.28.1-11.el7.noarch.rpm0167939b636430f6344bada2d9026493f56eac1fd8a28f37b4debb6168b3fe6flibcanberra-gtk3-0.30-9.el7.x86_64.rpmc5c5c45abc697a303659038822f838c2bed69d309034789398673e8e1931bea3gdm-devel-3.28.2-22.el7.i686.rpme731a3104fe6e61a35690a281e5ba8c068172d9ec8ddc983f91ee53785ad103alibgweather-3.28.2-3.el7.i686.rpmfbaa60e1ee6ce613a380f40c60dfc9f7faee179ccba729eb7ba47400f9ec4818libcanberra-devel-0.30-9.el7.x86_64.rpm08c3514904b6daf6e7f11c69e23c1cc3f26813f3cf12f5d2c59276945adf2e15tracker-1.10.5-8.el7.x86_64.rpm9d7cbeceb53e1d5161f5f52dbdbc3540f9aca3a18c1d2f49d4bbbf2f76ea55a8LibRaw-0.19.4-1.el7.x86_64.rpm33f17cb83fc07632ba59c9abdff51aa34d80422c496dc1ef383b78cf4cf6d144nautilus-3.26.3.1-7.el7.i686.rpm41ae0ba07db98eef6e8dcf5d144ac19e9d8db34789460cb09e6d8d34b31f49f0gnome-shell-extension-launch-new-instance-3.28.1-11.el7.noarch.rpm6fd6060f19843ffe27949eb546a413f8f69afd255840ec81c23dc9d0069ff3dbaccountsservice-devel-0.6.50-7.el7.i686.rpmb7b4e6dc2b757550a1f445ae7da4be9c06de2168ace3d5a181666ecc0576f293LibRaw-0.19.4-1.el7.i686.rpm342dfcf3ded9b4f4c67df292e0e7ec1113971431985df0aa75a802fb3112c838accountsservice-libs-0.6.50-7.el7.i686.rpm14695786c04298f17af7a6d16b758314d8f9f811a772e2d1a0d50fc8f5537eaagnome-online-accounts-devel-3.28.2-1.el7.x86_64.rpma0e48b648b9110f38518b4932cf77f5ac5419c3cc6d8cde5b757592d67cdd6a8gnome-shell-extension-common-3.28.1-11.el7.noarch.rpm48f9252fcbe62d4b0f0893e7e84a6f9474837d9f894e2c572062c0422c27e340gnome-online-accounts-devel-3.28.2-1.el7.i686.rpma4dd0c49580a22aed512bbf249348f464a4e156997db0c24bb97b3d6d0e6e63ctracker-1.10.5-8.el7.i686.rpmee1af99b38b7f50ae027b980ebf5e6e96dbfaea1a54068d5c48fe39ae620c9a0tracker-devel-1.10.5-8.el7.i686.rpm671ebd3ffdb0366610eb0b220cc4c01c162ecea950cd589b10d6c398cb248545gtk3-immodules-3.22.30-5.el7.x86_64.rpm5ec25c28cd37f5fcd39f340f9c9b0529837f4a1e47c22532e293dbc1d73a7ce8libcanberra-gtk2-0.30-9.el7.x86_64.rpm84f9e038c96c6815902bd0b7caf49e1f3eefcfbd60b2d96182c0db732ebb86aalibcanberra-0.30-9.el7.x86_64.rpm128cdb792fc0eb004b83f2d69989bf249af68b7b6da2706a19464f9512d2fadcgnome-shell-extension-dash-to-dock-3.28.1-11.el7.noarch.rpm71a3fd584f441a1d535d9bf10b1a08722644f6c3f6c2965700a857f595d1d9c5gnome-tweak-tool-3.28.1-7.el7.noarch.rpma223cb19095e7daf54d12cdac758ef8014c0972880e8d5621151dcbca5114473SLSA-2020:1022-1File* file: out-of-bounds read via a crafted ELF filelowScientific LinuxScientific Linux 7file-devel-5.11-36.el7.i686.rpm91ba82c93c89111fccc3353acd8684f4858c9dabfb4c8251226878f01ce1e22bfile-static-5.11-36.el7.i686.rpm60fe7c5f507afb7a6d1e572e602161b55c22976a150e43aa98fe9fd6f58c5fa2file-devel-5.11-36.el7.x86_64.rpm4c12336f048667427d8217d26c775c9d3c953e8f5d48cbcb09c08ebc6c23d106file-libs-5.11-36.el7.x86_64.rpm26aafdb0380b1e463875941a1e928c8622b753c388f368adcb59a8457150fd63python-magic-5.11-36.el7.noarch.rpm2f83861a72dc701a447b6c842a713f846986e8c0ca888a7162b1d1b2ba536dccfile-libs-5.11-36.el7.i686.rpm08980b0a6638fad706b45aa983ce3a5b33060d481ec4b29edfa76d71e6922486file-5.11-36.el7.x86_64.rpm955282c9d706565c8c9d77abe174aa71132481b2871c140dfdd983073c1783b1file-static-5.11-36.el7.x86_64.rpmd00d4d364bc0be344a988ff64345f916ec07cbb4763aba9150fb7ef3888c551eSLSA-2020:1034-1Doxygen* doxygen: cross-site scripting in templates/html/search_opensearch.phplowScientific LinuxScientific Linux 7doxygen-doxywizard-1.8.5-4.el7.x86_64.rpm1f5b41c408263fd5a5cf742391f997e047e0f58393e73dac43c1a03216da7092doxygen-latex-1.8.5-4.el7.x86_64.rpm479c8dd6f79cdeb014d7076bdbc854e3c7f46c69665e2c04a56751ff22d2663adoxygen-1.8.5-4.el7.x86_64.rpma0265a372bffa73719a193bed0fa80599a6cc4ed1594acfa642ae82d15150f49SLSA-2020:1036-1Texlive* texlive: Buffer overflow in t1_check_unusual_charstring function in writet1.cmoderateScientific LinuxScientific Linux 7texlive-mathspec-doc-svn15878.0.2-45.el7.noarch.rpm4f949d0333de62e45d3c76da0181819d0332cf5d010ea1721ac2d430613f047btexlive-sectsty-doc-svn15878.2.0.2-45.el7.noarch.rpm842743380a57c1495d40e1a09e85e40fe0d93896de3ec3bd76ac09b06b262454texlive-iftex-svn29654.0.2-45.el7.noarch.rpmd5b64676eedd02562d63086f027be5af124d7c7664508dfbaa14754655847192texlive-changepage-svn15878.1.0c-45.el7.noarch.rpmdf967f31ca270fab04f2bf6996bc9525268c29084277d19e45bcedae2f1a093atexlive-chngcntr-doc-svn17157.1.0a-45.el7.noarch.rpmf2b547427c49f62da018d2ecc5b9e3b6310152b3b48695b73ef1431864398b08texlive-rcs-svn15878.0-45.el7.noarch.rpm400f3c3a85770d0d950124681c41b1202f20fed14769bb7fa1bb15373a7041batexlive-stmaryrd-doc-svn22027.0-45.el7.noarch.rpm2e76e04f0359091127d8c4062a645b0e0080c433c53f59eb9ad74bf4d3441408texlive-setspace-svn24881.6.7a-45.el7.noarch.rpmf47f7eccbe71b76ab466fbf7eb907072de92b2144326fafd9af5552b82beaf3ftexlive-fancybox-svn18304.1.4-45.el7.noarch.rpm1d72bd678591c7b3b6027e8039c7e9055f5e94ebe543125bb8aaabe519d778edtexlive-xetex-svn26330.0.9997.5-45.el7.noarch.rpme52e3cfb4794bbe746f224f4fdadc981f28f0eee7f3eb2ea3e8de7a4f1936ef8texlive-collection-xetex-svn29634.0-45.20130427_r30134.el7.noarch.rpm35f98c174b57a1dfcd0a2a7f4b91482b6c86a514b2e54b48edd3a84268081b78texlive-varwidth-doc-svn24104.0.92-45.el7.noarch.rpm0de09468f82a155ac5d0e234aaeed7a455d9904f71c123c5f8786942ca4f4ed6texlive-geometry-svn19716.5.6-45.el7.noarch.rpma542181f26b72e7ffdca58e04da9ac338076eaf643261cdff2c189ff2793c632texlive-geometry-doc-svn19716.5.6-45.el7.noarch.rpm32c07d085e0797e313b678b700b258b9dacedf26bc87d42e8497777bb1cbaa45texlive-cm-lgc-svn28250.0.5-45.el7.noarch.rpmcfd3d34b4b417bfbf53893165e586b550a9739db7eb79a372bb735cb86073153texlive-charter-svn15878.0-45.el7.noarch.rpm1c5cde84928b78ebc18d2aa8ed1f40dfca2506a9590eca0e485e14a8f8577bb4texlive-texlive.infra-bin-svn22566.0-45.20130427_r30134.el7.x86_64.rpmadd689952647c5d2897b635e428b191f16f26cd39c2d90863639cc5426d64896texlive-etex-doc-svn22198.2.1-45.el7.noarch.rpm12bc2a4043c1142afe098c02c66e59cb5d9ac771cec5b485fe9b67589c64a5b0texlive-luaotfload-doc-svn26718.1.26-45.el7.noarch.rpmeee97b66240b640eed91189fa8a2d94e98ee48e12ce4f4ea661b61ecd621d693texlive-mathpazo-svn15878.1.003-45.el7.noarch.rpm72a60efcdcc7f099eb7ca15140575cbe0834acc099af55cd56d683bb727984dctexlive-ucharclasses-svn27820.2.0-45.el7.noarch.rpmc73faa2214c6ff224e521503c18660ef29bf2c6603d10afaf2b4bdd6b77a25d4texlive-etoolbox-doc-svn20922.2.1-45.el7.noarch.rpm438365a7e5c524b91e0aa88f4394deacd9a0d5bded87fde1d7a3217aa2809ff8texlive-xetex-tibetan-doc-svn28847.0.1-45.el7.noarch.rpmc6e0bc9c456ce930924768359fad14fbc2be063e00f42a5df5e5c8e671727ff2texlive-cite-svn19955.5.3-45.el7.noarch.rpm66a4dd596a75e18c187b7c2399388e7aea01b4066ce7b5356bba51d2eae842c7texlive-overpic-doc-svn19712.0.53-45.el7.noarch.rpmde7475d58c3d92a84abc09fb268c524cc8525e8c5f990bc05b19b21eecf47827texlive-base-2012-45.20130427_r30134.el7.noarch.rpm823bef94bef5ea13707f357a9240bd0119b8422cdbe83249f85de6d8ce3dfc5ctexlive-type1cm-doc-svn21820.0-45.el7.noarch.rpma58d5308b7df0e6c4c1ba882aeb41af0efebe5d77cbe3a4e68f4a6e688f38e9btexlive-kerkis-doc-svn15878.0-45.el7.noarch.rpmfaabd184219bfabf6bd718c3ca907eed1bdeb50dde8f520db01ee34bfdb22215texlive-mdwtools-doc-svn15878.1.05.4-45.el7.noarch.rpm67c519846d56727958f6598fe25907b6c0e791e0612097508906fc8f8d5f02b1texlive-xetexconfig-svn28819.0-45.el7.noarch.rpm58e54f67832883d7d8aad3bf42ffaa6a2f3736a4a82802c06e82d3eb50e5d823texlive-sansmath-doc-svn17997.1.1-45.el7.noarch.rpm084fd308b5785da6b642128d416f884fad425c4dbfad0e963bbdb60d842a0598texlive-xcolor-svn15878.2.11-45.el7.noarch.rpm29f5b78741f56cc5dc97c3e3c7fd1f82dd754aebb463f9085d986c4cd65a70eatexlive-paralist-svn15878.2.3b-45.el7.noarch.rpm882470ed40d7d63bdf8d4f1ce96560d0538e05d2b1d23e705566384368ea2ea5texlive-mflogo-svn17487.0-45.el7.noarch.rpm41d5103ce1cf6a40a703da8d4608fcaeba67f7e0095587c98fe6876540f5f5a7texlive-epstopdf-svn26577.0-45.el7.noarch.rpm673e32c4a9b70627baa10b19383f45dd275d8c5ce37498534424210864d937dbtexlive-bibtex-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm8c035d9d16c07a8f4de6d5c172ae83311b88009a51c5de3b7fbc7206197d5e44texlive-euler-doc-svn17261.2.5-45.el7.noarch.rpm88d7cae6961b795d878881eaf329ad0fe25fd295294b743a0e0229403374ae82texlive-courier-svn28614.0-45.el7.noarch.rpm8668977798bb65e67e7d7ebf98ae4083ad93637ce4387254d863c9430fcd7c61texlive-mnsymbol-doc-svn18651.1.4-45.el7.noarch.rpmd9803379ab595503312c4c67b62e8fd7f373def32a65cf4f19003a9173eb5c91texlive-cm-super-doc-svn15878.0-45.el7.noarch.rpm963762f5aec40aaeed76bec68a63cfce7bb8a39faa5ffb3ea7432d85f838788ftexlive-tools-doc-svn26263.0-45.el7.noarch.rpma2d11fb0b764116f893fbc1a8bbcbba31e55e92c959369c69934d082f64e1bc2texlive-etex-svn22198.2.1-45.el7.noarch.rpmc1e685ecbc946ece3b26bbf5ba375a1d84ee23feb42a488f51c6230cf8e3ab33texlive-pst-text-svn15878.1.00-45.el7.noarch.rpm74cf20338f31010399f4ca97e7adb902463e688bdfd1baeecffd0693e7010de5texlive-amscls-doc-svn29207.0-45.el7.noarch.rpmba2578d90e92a465dfafcf87ae12c1f0e90f9dd22752853dbae2f218aaa27506texlive-bidi-doc-svn29650.12.2-45.el7.noarch.rpm08a39d9554c6cd03a0c1752537591a92bd002b99ec3a83aca120ec78ca50b363texlive-pdfpages-doc-svn27574.0.4t-45.el7.noarch.rpm1b424e31e9db8c143579a1c335bc188ea180bb1434175b7eee61172206acb1f7texlive-pst-text-doc-svn15878.1.00-45.el7.noarch.rpm6a14d5c4602d4090afcec0506c80622820db5b3ece223066776dc52df6ccbb66texlive-amsfonts-svn29208.3.04-45.el7.noarch.rpmb9b992042817246eec0c8b4176bdd222c4a9da0cb41828836fdb3f44ba61fba8texlive-euler-svn17261.2.5-45.el7.noarch.rpm4330efad869862bbdad35dedb1601b18eb1c6da3b51a2d44d6c870a11b81225ctexlive-pdftex-bin-svn27321.0-45.20130427_r30134.el7.x86_64.rpm5fc4d508f1ffdd1e5d037a1aecbfc5ca954d5f4a9e99a825db927d962f36f89btexlive-etex-pkg-svn15878.2.0-45.el7.noarch.rpm880f5c4270e4bb1a3f40cef93989bdfcb0f6c32dbc81a04388c1b030e66f8a0ftexlive-pst-tree-svn24142.1.12-45.el7.noarch.rpm9fa1c877355ad06977e6c367b793ffef562f610adfd1b5e5ae8d176000d4cd6ctexlive-latex-svn27907.0-45.el7.noarch.rpm39ca571bd0a0b08dd1c9f32fac775efef80f358719150078e97b932ba740f80atexlive-fancyvrb-doc-svn18492.2.8-45.el7.noarch.rpmf9386ea3cea168fab859e9b9b18f220fd8f726a82890dc4d0e772807425d7f1btexlive-mparhack-doc-svn15878.1.4-45.el7.noarch.rpm80cc7db34b389d98f4cef4af5bacaaed2444c0d01b82aa123f36bf3f48f428eatexlive-cmap-svn26568.0-45.el7.noarch.rpm305b0c6f1c8c1885760df56cbbe5ac23135794a8fa346e3e432020a77dad5bb8texlive-xtab-svn23347.2.3f-45.el7.noarch.rpm0e7b0495b160d19196f67f6382b8a2590e957777917620929784a8339dc710b7texlive-oberdiek-doc-svn26725.0-45.el7.noarch.rpm5f308100fc8bb7fca406d60d292fc1d139cb50fc046f304a06e3536f46ce09f5texlive-eso-pic-svn21515.2.0c-45.el7.noarch.rpmd8b16f7d8e1ea1c46c32e45a8cf0514cc88a7faeaac88019ebfbe3f169670bd6texlive-passivetex-svn15878.0-45.el7.noarch.rpm2ca111e1bfde110072e1b5f2ae148444efa8dd280ee1a006c43de03cb18012detexlive-scheme-basic-svn25923.0-45.20130427_r30134.el7.noarch.rpma23deb183a2502cc3ed198d864b7183a5bacb1cd50791e0e0016445c8a496e15texlive-tipa-svn29349.1.3-45.el7.noarch.rpmc2e926c326f7ee6693f670d08313b8dccce9890032968391217e7c0fab759ebetexlive-bibtex-doc-svn26689.0.99d-45.el7.noarch.rpmeab64a7610ba57ea33b811a5260b0141fc61eaabd4c9e89d2407c444eeb77db6texlive-cm-doc-svn29581.0-45.el7.noarch.rpm3a829be50dba0658f38f7a535b07e596be7b9f71e6cf3b77670143f38cb42d11texlive-lua-alt-getopt-svn29349.0.7.0-45.el7.noarch.rpm69d73d8d3c5277c017bf19feffdd6f8c30a66ce295450b6fe0d4274aa948263dtexlive-footmisc-doc-svn23330.5.5b-45.el7.noarch.rpm6770e3a49deecc25be58863089fa025ec216fa7f600b5e4078e915402a7c751dtexlive-etoolbox-svn20922.2.1-45.el7.noarch.rpm2938910476d222f5228cbc36e5c840374d669b4ed4d26b137cbe37e494ec3507texlive-thumbpdf-svn26689.3.15-45.el7.noarch.rpm2959212e16958d1aab5a0ea3c5d6797e01428e31570bd3d1f91a2d22d1027cd9texlive-dvipdfm-svn26689.0.13.2d-45.el7.noarch.rpm1cc91289178ef2ddaa37bebc799aba68cc271584e66bdfadb70b8d86cb8e720ctexlive-metapost-examples-doc-svn15878.0-45.el7.noarch.rpmca2a97f08e0b29a1c9609ee1c0d1ae0a915ec768c7d96fad64a6a3cab52844e6texlive-pdftex-doc-svn29585.1.40.11-45.el7.noarch.rpmb564850b1ed1b67f2f96f5c44377ec7899c3b03c4a0ecb0071708025390a5215texlive-ifmtarg-svn19363.1.2a-45.el7.noarch.rpm30dd1a492428914d824d653d8709daa630150e35ed8071bdb10d5a0aab706269texlive-sectsty-svn15878.2.0.2-45.el7.noarch.rpmb1ce7f20421dca4e0f3cb5808b71ad43de9c2bc04702614d455e788111f4528btexlive-url-svn16864.3.2-45.el7.noarch.rpm0a69d5ca3edbf45d29f60ab153d92b9a4b1596a08a7eeb93b5a53cac534094fetexlive-subfigure-doc-svn15878.2.1.5-45.el7.noarch.rpm8cccf08f4d73cd58290c6a5596abba3fa61ba77ac2e701c94aec94079f56975ftexlive-beton-svn15878.0-45.el7.noarch.rpmc0a38f079ceb2791885c4d09c9983df782706e8c93c6394cb86ba42993a69a53texlive-xmltex-doc-svn28273.0.8-45.el7.noarch.rpm763cb2de87ddf283d7829ac57baf7d8b6ad057eaaf1afbcb845e251e9d345468texlive-kastrup-doc-svn15878.0-45.el7.noarch.rpmb840a775cbaf99c9649039c11ee8a67a598a08f68f1c0d802b8333f7710f2c91texlive-pst-node-doc-svn27799.1.25-45.el7.noarch.rpm7e29239fc8203503adfbff18c3357c01aceef00ea67f716c9e3a5e41e3418560texlive-texlive.infra-svn28217.0-45.el7.noarch.rpm8a417478678475ee68da5b013af80c224d2a13590decf3ca2dac6f835e029e3dtexlive-fancyhdr-svn15878.3.1-45.el7.noarch.rpmc5331a2fabb79ca068013051913f8a776c99ed8cb4421d212cf9c2ad1bf537f8texlive-extsizes-doc-svn17263.1.4a-45.el7.noarch.rpm603425638ccf77c82a605e192422c9240d92cba29ac7713bffa9faa9c93da877texlive-rsfs-doc-svn15878.0-45.el7.noarch.rpmfc207758a5524b3be78e45e73befa872f4e37dc64f42d9e3ca94ff23772bf8f7texlive-cjk-svn26296.4.8.3-45.el7.noarch.rpm799a5b595192f5be72bdd7d1b853c07476a7dd833126c31838a132a8ce4a3e91texlive-pdftex-def-svn22653.0.06d-45.el7.noarch.rpme1818ce0ccbd1c57b287b82ea907a6fc07a4a8c091b7575b108ac0f18b1da3c9texlive-xecjk-doc-svn28816.3.1.2-45.el7.noarch.rpm54535cee6780cc6b8bf164225e56c0d8757e5bc225c5a4275fcf35d11dffbb13texlive-wrapfig-doc-svn22048.3.6-45.el7.noarch.rpm2e705627c149403a72a5a047e1436cdc77b3c253d9fc9cd0446f23323a7c9b40texlive-philokalia-doc-svn18651.1.1-45.el7.noarch.rpm80e0e141382f8f0fa4735a19c6ebe7e3be178d65a9ceb0d1ff27a46b121817d8texlive-titlesec-doc-svn24852.2.10.0-45.el7.noarch.rpm1cee81eb0a925b9eda51220f740b9b84833bcdfdbb4f721557ac458005865a9btexlive-ifluatex-svn26725.1.3-45.el7.noarch.rpmfd671f3734d4bdd5e40670b693524ed1e4c07ddd025965e290335b452b2974aetexlive-ifmtarg-doc-svn19363.1.2a-45.el7.noarch.rpme2648a180416fa7f5a0805b1d53d11be438badfda0b191576d575505e7bf0beftexlive-euenc-svn19795.0.1h-45.el7.noarch.rpmf79870e7ea2856090a526c9fb1c86616423da39973bd6b281cf8913c81bfaee6texlive-collection-documentation-base-svn17091.0-45.20130427_r30134.el7.noarch.rpm226ced27a423a9b6ea3f0bc28cc09486425fa71e665a47e76956c062deb0ee8etexlive-amsmath-doc-svn29327.2.14-45.el7.noarch.rpm5f4abf32b3e339740db88fe9b2cb133849a1f54917a9ae0b6a8ce2b2235b1abatexlive-sauerj-svn15878.0-45.el7.noarch.rpm120676aec8a28caa426b66bffd96ffeb18499314f6298e8ff24c96a5141d70c4texlive-parskip-svn19963.2.0-45.el7.noarch.rpm2feb0fe12df7d6a6a02f500e23ff3434d90438f2b30c97aac19375dcd3d59c53texlive-mfware-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpmb01b0ecb4ade5c5f70dc965809f5cbc08d369b75ad76a235e916799d3c472f77texlive-ms-svn24467.0-45.el7.noarch.rpmbe6940aed1e6f6475d92d15a642d015c24cf0244e331a82d9f5c08d141468039texlive-mdwtools-svn15878.1.05.4-45.el7.noarch.rpm79259551c697773243dd4c44cedfb31a4c24a3d088c4800e423904fa774ed3e3texlive-ifxetex-svn19685.0.5-45.el7.noarch.rpm474fe2e64456f37d5d701c9ae57c6ef0eb512344fa3582586bc4310bf441c70etexlive-tetex-svn29585.3.0-45.el7.noarch.rpmf4bcb149dbf464cbdd07cf55f7e6b63d4c38876e2b23bfecba15442a2035f2b5texlive-xstring-svn29258.1.7a-45.el7.noarch.rpm5486866c84612ce11fb401a48d376eddfce9b4b7ec2997848b4cf2f39c7b0b10texlive-metapost-svn26689.1.212-45.el7.noarch.rpm6d576aa5e6b3c0921768963633246076d201e088136a35263242793d4166aff1texlive-dvips-svn29585.0-45.el7.noarch.rpma00646d8182ea039845a3c3e46c7836890dfe2e5798e28cab726a110b6546b64texlive-filecontents-svn24250.1.3-45.el7.noarch.rpm7b4879551a95fb109e9d19f84eaf80d2f3c6b9fea212f305cebe78f85df881e3texlive-collection-basic-svn26314.0-45.20130427_r30134.el7.noarch.rpmdeb420ff838ef295b24fd8be83301c2986355520941442aad34afc9dfdd46ca5texlive-polyglossia-svn26163.v1.2.1-45.el7.noarch.rpm6ce7e41d143bf4d9981c8ffb523da007598e68bc29a5a38ab5112abb4d23fadctexlive-dvipng-doc-svn26689.1.14-45.el7.noarch.rpm87727d8c6f4a10e2e810c1a130280c22bda441eac38a83314617de6998aad001texlive-tocloft-doc-svn20084.2.3e-45.el7.noarch.rpmd0b117426e0ffa5ec06dd907b0d0e558b8b29f26a66f94fcb47a8ca2504b45bctexlive-xetex-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpmb8503cd968d2dfed61253d791c23450c80eb9d48643e9b065ca99ee558b6abc3texlive-multirow-doc-svn17256.1.6-45.el7.noarch.rpm74410daa4bd1aec4fc5d6d928794c0f8b6da2a4ef2f7f14ecaaec5bfb0badbcbtexlive-tex4ht-svn29474.0-45.el7.noarch.rpm3e4a2d01c69251cc3e3f0ecbdb58b468d1aff5fdd97bca70ee37c1d84572fb19texlive-latex-fonts-doc-svn28888.0-45.el7.noarch.rpm470239e47851b2de1f0a5c25e95e2ab82aee795976f28784a03fe40c77a6813atexlive-latex-fonts-svn28888.0-45.el7.noarch.rpm01f043b0f05e5da23568c8ea07fe52fcaf0a427fb45bed87b43640a0f3c51763texlive-fontbook-doc-svn23608.0.2-45.el7.noarch.rpm70f9991451e99a013b78f035d93f33e4784c038812adbbe2f4cd5e90913b7296texlive-pst-eps-svn15878.1.0-45.el7.noarch.rpm65040aef62ef448c43b9b03a80dd7bcb4954ae72f68eebdd6c400fb6a5e62e46texlive-kpathsea-lib-devel-2012-45.20130427_r30134.el7.i686.rpmc5bf738c144e4ed11393219c205655cd5b441acd47d6df9c7a196c927c4a59dftexlive-tools-svn26263.0-45.el7.noarch.rpm8c97f1a002c8d79fd871155734d99c1246a83deafba9d65f855eb99f6b81e6c2texlive-index-doc-svn24099.4.1beta-45.el7.noarch.rpm7a8c3fa1b18f7ee70b290158e15ed473a2bc412e7dde0ae191e3424d8d640bfftexlive-bibtopic-doc-svn15878.1.1a-45.el7.noarch.rpmbe4f77229a1ebd5f778abbd1e116bc372c3e67df28b8ba30dd1eec530672d101texlive-sansmath-svn17997.1.1-45.el7.noarch.rpm08680775ebb0afee34b26acb6438c69a3d21ebfbd876bb371e0fdef1d04d6f87texlive-ncntrsbk-svn28614.0-45.el7.noarch.rpm8bb1be66510d86334285a05b421392ed0c16572e288e2cc6127310534716c28dtexlive-fontware-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm01a69c8f37a82f378c64fd999c6ba3477675e9baba0711e4a88f1f663860bd15texlive-xecyr-svn20221.1.1-45.el7.noarch.rpmc6620374644007ee0c00e1e1571b1659cbfea5cb06aa7fc92625189857577f8etexlive-sepnum-svn20186.2.0-45.el7.noarch.rpmd891e3c8cd1f431a261126f854ecfbdc44b924c97f5bd875c981371bb23b9df9texlive-cmap-doc-svn26568.0-45.el7.noarch.rpm8d53b4393d7012d4190b2319d59d2747af0edeb65818e6d96818090cb471e1bdtexlive-pst-3d-svn17257.1.10-45.el7.noarch.rpma7512ab53a8390e31622aae8ec7c0dae9b200a1d8a0ec6b50a6677ff30bc9c9btexlive-texlive.infra-doc-svn28217.0-45.el7.noarch.rpm252b9d7abf7d192fe1c05a035b3420e957cdbe6f1b0ef0a2467e9ff83f249251texlive-jknapltx-doc-svn19440.0-45.el7.noarch.rpmda395a9f06494f3a1fe9ed3558831800602d94c67f1286c7f26aa2c324944d20texlive-mptopdf-bin-svn18674.0-45.20130427_r30134.el7.noarch.rpm9232432b3a7fdbd78daf1668e20454fb46545e4ec6444a38df5b319d829cca8dtexlive-bookman-svn28614.0-45.el7.noarch.rpm0aa8dacfc91c8df352aa67b1cd5eaf492e3a80d0992d311e2ff454a74e52b733texlive-kpathsea-lib-devel-2012-45.20130427_r30134.el7.x86_64.rpm2232b06be98390c8132598a082c1a98f3bfeff246d2bd95f0dab334a80febe82texlive-cite-doc-svn19955.5.3-45.el7.noarch.rpm0ffeb9c4c9c839ed46adc472a787f09112ff342fb0b9b6c936e862d8380735f5texlive-seminar-svn18322.1.5-45.el7.noarch.rpmf3ce1b6d4ce71382ef41d20845e038964ea4160849f20b85d4ac77e854167299texlive-lm-doc-svn28119.2.004-45.el7.noarch.rpm45502f0c2440cc8a5297e0aac1aca1e4afdf6e18d2469384020ae40d37379774texlive-qstest-svn15878.0-45.el7.noarch.rpm3bc95effafef9406971c47c8f8d1dbc11f68c731715983d486451790029f8b66texlive-anysize-svn15878.0-45.el7.noarch.rpm1ee1f994c9690169981c3096f98be49ca91a23b2698f30d8ec6d5dd1a64106adtexlive-pgf-svn22614.2.10-45.el7.noarch.rpm1fbfe441e8b3caba4b66ac7a48df4b63b7ee5786d7e714c233f3499140f2cadftexlive-t2-doc-svn29349.0-45.el7.noarch.rpme6187ef1aa3fcb7c299ea2963417fef43968c79794c71117283b6a187767d600texlive-fp-svn15878.0-45.el7.noarch.rpm02169f9103fb12d68651cda7c8ddc1790866f8c2c68fca9e7c2361eb33bad571texlive-times-svn28614.0-45.el7.noarch.rpmbdc55ace64a56b86e24e2404888746e2519c7a65794317f8da0461d2132eb33etexlive-xmltex-bin-svn3006.0-45.20130427_r30134.el7.noarch.rpmb88984d5c985736b354daa1f2341a37a83ba12b32770b8407f19a35363764d1dtexlive-eurosym-svn17265.1.4_subrfix-45.el7.noarch.rpm65c70d1893322a939643794fb0bbded06cd16321f1f7dfcdb4d669704fb09dbctexlive-pstricks-svn29678.2.39-45.el7.noarch.rpm62a435b711e41fd303c882fe5cf30da9455facfe1c8518fb44d62fb31d53d748texlive-tetex-doc-svn29585.3.0-45.el7.noarch.rpmde9994cca10bee3194f2ab0d5cb9caf7b578dc800b56c6b56a5af7087bef1494texlive-psnfss-svn23394.9.2a-45.el7.noarch.rpm9cae432f7b3c09c0c0b9e72bc14685e3f6803f6696d49b7ae57e908faa284223texlive-framed-doc-svn26789.0.96-45.el7.noarch.rpm44ad41c363f14345b956eb926fa353322437b3fbbf7b3e1a2b0591f81fee065btexlive-changebar-svn29349.3.5c-45.el7.noarch.rpmfe6d4645e70453f96cb647bb440bbbdb669ed474c92d22fcf6e5b994656755cdtexlive-extsizes-svn17263.1.4a-45.el7.noarch.rpm0eff2053ff8b068c7395c61b1f8a6982a0253699b451a0f1bb166beb05b581a9texlive-txfonts-svn15878.0-45.el7.noarch.rpm4935e192a8dc83dd566159619404c99afa040b315130e2c6486cdc2b30cc431ftexlive-txfonts-doc-svn15878.0-45.el7.noarch.rpm3921175810d9dfb0206d292bc984a16069109679b34e8891907e00781503b9f0texlive-wasysym-doc-svn15878.2.0-45.el7.noarch.rpm922d138d5352fd50b0f689cd94795b0654d61b271aa6df3cee32d48e26774fe2texlive-xstring-doc-svn29258.1.7a-45.el7.noarch.rpmbfa572d89624d3d83ef03d63a0c1c8026b757ca9f2bfca0bd107008465b5364etexlive-ptext-svn28124.1-45.el7.noarch.rpmf994a00bf927032b7fe3be85ceadc5cdfaad166193e944ebd2029a9eaad9e3cbtexlive-natbib-doc-svn20668.8.31b-45.el7.noarch.rpm4dd45329c1e2fc9e21b93cf9c9a87445a85d8cfdd86c21157a68d914dde778bctexlive-pstricks-add-doc-svn28750.3.59-45.el7.noarch.rpm88dd7701f6d5b2422167086dfe0089491ec54e4ade7cab5a6498eeecc5c0325atexlive-kastrup-svn15878.0-45.el7.noarch.rpmf3b20097bef1e623b9bb9a53b3fef2b3478427a58a009e8367ac29420b34e6c8texlive-showexpl-doc-svn27790.v0.3j-45.el7.noarch.rpm1d7fda126c0c8ee09c8679b035f2abd05da76c4f6db3ee468dda8f2633a35569texlive-mathpazo-doc-svn15878.1.003-45.el7.noarch.rpmff870fcb84606917e6afb2012a697877215ee1c6d14929927f58b6de3b36492ctexlive-listings-svn15878.1.4-45.el7.noarch.rpm67bce833df60834210aba6e6cc06bbdb14dce817ff228c17a303ff2880c17b31texlive-tex-gyre-svn18651.2.004-45.el7.noarch.rpm62c6e38d93fec24564a5e747ff36272a7a7080e0f8e488bf686a68424be4ee25texlive-hyph-utf8-svn29641.0-45.el7.noarch.rpm939e8b2603c4d2964f65034634780ad2d4fd69b83e2acd04042b338ceb6565d3texlive-ae-svn15878.1.4-45.el7.noarch.rpm0a0db8ca6f7f426e7b147cfb0b268b6971b5bc96633f818b83641dd49706a79ctexlive-thailatex-doc-svn29349.0.5.1-45.el7.noarch.rpm37b724c2f56ce1644324fc4a78cc2c24dd5c8742995885ea9a24bc24c8edc724texlive-chngcntr-svn17157.1.0a-45.el7.noarch.rpmc47a02df88dc08ddd38d184ac2dee16e7207cab52bc4fc38bb422bd9d5b530fdtexlive-eurosym-doc-svn17265.1.4_subrfix-45.el7.noarch.rpm0630ab6b0abd32e469709a48faf8d88426a84ba61bae3a0e99094e6ae66295c4texlive-texconfig-svn29349.0-45.el7.noarch.rpmbb5fe2cf9574aceab195e9112d0865085d0bff2ada4ea8919b9d0008b68cc4b8texlive-uhc-svn16791.0-45.el7.noarch.rpm05e3bc6195c02c718ecdc34153a59c69965342dff68b02688c24ec4d15216e83texlive-pst-grad-doc-svn15878.1.06-45.el7.noarch.rpm4c061fc10850a2724e2b5506bb09c5bd4afea356da0af57dade34148ec265498texlive-enctex-svn28602.0-45.el7.noarch.rpme9e2ce8bade060e7793318201e2d22e76418b2989fd24d0a1f88555de0eab153texlive-underscore-doc-svn18261.0-45.el7.noarch.rpm97eeb2d22fa86d42db9bc58ec6fa4626f8ab8dbf526d6ca7f789387b1e514155texlive-pst-plot-doc-svn28729.1.44-45.el7.noarch.rpmace65da04b9eab57534f702e608c8afb7c61d323f09c04f1475e847490a7e0dctexlive-memoir-svn21638.3.6j_patch_6.0g-45.el7.noarch.rpm8c2eca02762830123db292b77d6975bb97d473d91e048283c280f6c7dfcf3e1btexlive-euro-svn22191.1.1-45.el7.noarch.rpmf5379d45464d4ae3bfb5de8489a268b70d4f2fcf326c1a7008fa742c793546bftexlive-xetex-pstricks-doc-svn17055.0-45.el7.noarch.rpmb29277a5d1a0c9b8d45ac4be059a147c216c235dad389b1fc2e293c44b7a1469texlive-pslatex-svn16416.0-45.el7.noarch.rpm79813ea9fe59ddf5f46719083a831dab19caefd533309fd7419ab274e3e63a82texlive-kpathsea-bin-svn27347.0-45.20130427_r30134.el7.x86_64.rpm97efe19f0f3324b2b88012540949d65ce82ad810e35861a804db4f3364598548texlive-soul-doc-svn15878.2.4-45.el7.noarch.rpmfc0f50e8aab070baeffa9d4152446c8f6dd6738073cfbcb2209fb16e5e0453f8texlive-mathspec-svn15878.0.2-45.el7.noarch.rpmd8b37597e4489dd8ca9c3c2c892fe87281eca60f1ca451b910c675c1d802d620texlive-pst-blur-svn15878.2.0-45.el7.noarch.rpme6af6f9dc63ff9b8ea23927d1ed20ae5058f0945630438ee84f95d379b308c74texlive-iftex-doc-svn29654.0.2-45.el7.noarch.rpmdd57fd3b5bf93c6a9ea150f9c76f623a686a6425cfb1604566cb9d92b80b5490texlive-2012-45.20130427_r30134.el7.x86_64.rpmfd8f3d38631d33650a15b5acdb88971ea7ee364a4af3b29cecdc1071a0471471texlive-wadalab-svn22576.0-45.el7.noarch.rpm68711264c3e91f8ed8d8e0743f240448b05db8a07babec02145e025f64051acdtexlive-latexconfig-svn28991.0-45.el7.noarch.rpm4fd069fd9494cb6810bb1cdba312c89cbe13fd14711b897abfce7b413af44ac8texlive-makecmds-svn15878.0-45.el7.noarch.rpm2f78be340cc0e2cd8f0e240418bfd2c6fab26c1c972184ec953b682093b4e380texlive-palatino-svn28614.0-45.el7.noarch.rpmf0d6bc6576157854e649a2317c3fde1ab7b7082ab9c1e52d12392a14fb19ca4ftexlive-parallel-svn15878.0-45.el7.noarch.rpmef109ee3a4b18f9d44dd6ea50e46f838f7125cf59c3ac837754e0334a147b0d6texlive-graphics-doc-svn25405.1.0o-45.el7.noarch.rpm67bb876a8b833a205f2978af0d1a147c29692e3523cc2c9860f93fcae1d7370ctexlive-dvipdfmx-svn26765.0-45.el7.noarch.rpm8771a923fa4b9b19d424806450f2a3aa10c3f4087b2ada06b29a015a6b15d436texlive-mnsymbol-svn18651.1.4-45.el7.noarch.rpmd75dc35d34a94c380be3f4e2ab90246a3aa0c4a56ebb0ab68dd5d8cf8fe35ad9texlive-utopia-doc-svn15878.0-45.el7.noarch.rpm1bf151a7da7af484747140a0543309652af867dcf669c4d4b46dfae3d630e068texlive-hyphenat-doc-svn15878.2.3c-45.el7.noarch.rpmeb01e04710b27dea038575bd60945e2ee1329f188e8e71ad7012e74a1f990fe7texlive-t2-svn29349.0-45.el7.noarch.rpm5a1f77cb58268413cd03e9efcc36bab038517de753b7e93d8f2a82275b537458texlive-textpos-svn28261.1.7h-45.el7.noarch.rpm8ccb56ac9b9e4873faa946ce0153a041a1aab9917550a9205d75d8fa1eb58171texlive-xetex-def-svn29154.0.95-45.el7.noarch.rpm4416b76f27f4d4e5711e9c4ed95cac6ab92e6d099be51104fec445f68e1bdebbtexlive-utopia-svn15878.0-45.el7.noarch.rpm37ffefdce4b6dea3b8406238519e1a75cb5d7cbcea15ac1b31df1f6163e7d7bdtexlive-tocloft-svn20084.2.3e-45.el7.noarch.rpma1423f22609cdff7e7b713ce881d1cde0a82156cd5be4279815246746c4f4f7etexlive-oberdiek-svn26725.0-45.el7.noarch.rpm4bda9b9dc45eadba92f991e4fe950505e6604de758f2743ec3d694966e5ce4d6texlive-epstopdf-doc-svn26577.0-45.el7.noarch.rpm463350636e9acc7f61305056ce7e3985fd26fb7f031c64fd8dc45d0a8c3a7310texlive-anysize-doc-svn15878.0-45.el7.noarch.rpm9a7b232e0dbee718d7239a3917ffde5654b48955a2f6f1e7334681120189b31atexlive-adjustbox-svn26555.0-45.el7.noarch.rpm5660804528c96a7aa393fe51550ba5bddbd0f349849e091559d1cee53726d41ftexlive-l3packages-svn29361.SVN_4467-45.el7.noarch.rpmbfffdfaab7ae034166b1de37432d346277eafa1a93422e0c3938948abef456fftexlive-typehtml-doc-svn17134.0-45.el7.noarch.rpmdf5b09029180c2b9bc993bdf87ed83758d7a755eaf8a81b5b052f6f0732aeb64texlive-pdftex-svn29585.1.40.11-45.el7.noarch.rpma5d865311c341edaf56a855b2fe0a56616ef1a783b1108fea1b410dbcb5e5e27texlive-xecyr-doc-svn20221.1.1-45.el7.noarch.rpm1a28abfdf7a25ae040280d890bd7770bc2fd036b1d4976351abc88032e23461btexlive-xetex-itrans-svn24105.4.0-45.el7.noarch.rpme1c87910fe9dc0b82ae87c9527f2633607e342935c5bf660f2e3f82ecafeae40texlive-zapfding-svn28614.0-45.el7.noarch.rpmf94499b8383fe2d357b5463d1d0cd7bb1161cb73f099f6d3de50ad5dc16fbfa5texlive-fontspec-doc-svn29412.v2.3a-45.el7.noarch.rpm32c080356697c6ff4934049f0e72a91489a6f19988a4263b0c4fade1f1425c24texlive-ifluatex-doc-svn26725.1.3-45.el7.noarch.rpme9f920f71733ccfb340e910d847d6a304113eef7b0c714718d921420f4e6d3f9texlive-ctable-doc-svn26694.1.23-45.el7.noarch.rpm5a560e7fb722af53bd978cbfdd81d3c1ffc3a6800febba51f4bc872ce2a30fdftexlive-fancybox-doc-svn18304.1.4-45.el7.noarch.rpm0dd97ed218cb7f4ecc080f3746223e2966915e8c5e24abfc1ffc96110d2524fdtexlive-dvipdfm-doc-svn26689.0.13.2d-45.el7.noarch.rpm16dcea9a1d005bafcae6fe8316d3fc448d67316374b5d6bc979bce952598cf5dtexlive-mfnfss-doc-svn19410.0-45.el7.noarch.rpm3fe3dad3bc41b93915482d313ac8fa1a294870410fb76d6c48e14f4a17e952b0texlive-mh-doc-svn29420.0-45.el7.noarch.rpm9d7b38ae0834382ff72bb27c476ce799777df81719a71b3eb234ff091c420f3ctexlive-threeparttable-doc-svn17383.0-45.el7.noarch.rpmb63830fabc590b373d877f1aac6f5daf87e1b0efb10af1c0ab9b88ca9281144ftexlive-underscore-svn18261.0-45.el7.noarch.rpm6abfd0b1409a3b4731efda7385907e074f912fd3a263dad93cc2ce76d52f5906texlive-luaotfload-svn26718.1.26-45.el7.noarch.rpm534baf70d61c472ce0656e6013fd8b4078b462e5dc2764b07d007523cd93373etexlive-setspace-doc-svn24881.6.7a-45.el7.noarch.rpm4f7f199444740acfc4af9fd86c7a4f406ce8a4a8e8f63455c39b084afc1c5532texlive-cm-lgc-doc-svn28250.0.5-45.el7.noarch.rpm776100b2951fc52a8c09c7cf550eceab44f2cb2c949e8b205ac313c886c21657texlive-colortbl-doc-svn25394.v1.0a-45.el7.noarch.rpmafd00af4a66ad16006eb40104bc49aac0bea85ca699731e0344de061506f1c7btexlive-xetexfontinfo-doc-svn15878.0-45.el7.noarch.rpm30743ccc027197d9c10332c7d0c57eaa411575c5c19bd2107e9129d4ebb6ee54texlive-ulem-doc-svn26785.0-45.el7.noarch.rpm7a0f3184e7c81d8bfa14e39a083b5ac73c7664ed4b739c6df3c1eae75110689btexlive-algorithms-doc-svn15878.0.1-45.el7.noarch.rpm783ee700fa8a8f5d342c46a72ba44e8b47fc300be6e0ce0bb0f57e88f7a76495texlive-titlesec-svn24852.2.10.0-45.el7.noarch.rpm548c2928c48bf14419f86aebd5c290c950dd1937a31fbe8471aa40315ecfc995texlive-jadetex-bin-svn3006.0-45.20130427_r30134.el7.noarch.rpm43d5e9a282880bb8f1b6bb136ddbfdec703527a8ae82662f8917142619ac7922texlive-fixlatvian-doc-svn21631.1a-45.el7.noarch.rpmbf87786a7aedb17fa51fc53897d50ab752dfbf7167ac630e3b84b4db92c0c652texlive-ucs-svn27549.2.1-45.el7.noarch.rpmfea318e93ba5016272b0563b1966b3a127cde96a5cf7bf5c24c40ee1f3443d4etexlive-xeindex-doc-svn16760.0.2-45.el7.noarch.rpm4a13424af84c48e760f221a56428fdae586cca52838a6ccc90581dc67e60141btexlive-svn-prov-doc-svn18017.3.1862-45.el7.noarch.rpmb4f38f1ea6709fb99057375ed2f5bc0fba9b07dc12d1429f93292b451d0de62ftexlive-euro-doc-svn22191.1.1-45.el7.noarch.rpm5f59b6a30f9bcb65aeaed3a9287e165ea2f64c4165e40222f8c445391e725b62texlive-carlisle-doc-svn18258.0-45.el7.noarch.rpm82ad4b0cea6116a7cd4ff2f8b4f583ac879c13f412161d9e3d342d360ea4df94texlive-ae-doc-svn15878.1.4-45.el7.noarch.rpm7ae93318bf4e82f316de2e8bb9523ff34f70c4ada1c837eb3a13b4700c152f8dtexlive-natbib-svn20668.8.31b-45.el7.noarch.rpmf008585a71ae5d0884cf6d369ff933b2ce64343e3a12b3018a69bffd5388b0adtexlive-zapfchan-svn28614.0-45.el7.noarch.rpma85793871769ceca8480e83929df9b6b10778945734a030e06565f8ddbc7528dtexlive-caption-svn29026.3.3__2013_02_03_-45.el7.noarch.rpm8b3562227a70604978591ad6e98bb0949db11a2cd725be7a54c98a15ddb90e5ctexlive-norasi-c90-svn15878.0-45.el7.noarch.rpm20816e14bb1f82a2abed52c284f4b0f891ea3bcae104591ae8d7495115b9fa37texlive-fix2col-doc-svn17133.0-45.el7.noarch.rpm5d5aae9855a9631a39afc682ee0019dac9749991d60d0e20d49d807fd3fe5918texlive-metalogo-svn18611.0.12-45.el7.noarch.rpme97df90649f450b59e58acf8de55a9fe4a763aae36ec4f71278cce7f4e1965c8texlive-wasysym-svn15878.2.0-45.el7.noarch.rpm287c7e10f17a95f837519a5868c75b7b1e73a8db9b88f845f9d39df69f8a451ctexlive-fpl-svn15878.1.002-45.el7.noarch.rpm627d9cc45db0311519318cff538af610ec7ca32e16830152b090efb90c99180dtexlive-enctex-doc-svn28602.0-45.el7.noarch.rpm5040ba682014165448526752ec82e4bcb810aa08e7dfe8714ae5d8f9ac6e9261texlive-fontware-svn26689.0-45.el7.noarch.rpmbee24b19d612a418ec07d3918ef8cbddf89159da89ec69e772e32865f62d3a8dtexlive-wadalab-doc-svn22576.0-45.el7.noarch.rpm30c555cecff7d6fec80973ee2f01d15acb20ae3c49300395703483c88e015cb8texlive-float-svn15878.1.3d-45.el7.noarch.rpm8aa9294cfd448dd7a54a1cd69319a9cf702d97b5922c6aa41726264226903627texlive-eepic-svn15878.1.1e-45.el7.noarch.rpm88920ec133c3dce2e12a7691228b505a1420284611b47817205f492f5dfbe46atexlive-threeparttable-svn17383.0-45.el7.noarch.rpmbcf5dfd2af5c6e9a260b452539423780e428dd4ddd12dff1eec722b3b525e325texlive-beamer-doc-svn29349.3.26-45.el7.noarch.rpmcf3833c6f543f5708349a15419a7ca07e19c988e1392f6f591432d82dbaa13f8texlive-titling-svn15878.2.1d-45.el7.noarch.rpmcb7a187ca00ca4f916f53593179b6cac08dd2681202b44f1d0d7edbc27ebc069texlive-fncychap-doc-svn20710.v1.34-45.el7.noarch.rpmcdd5a1f6fe7300a2c8402064467698e83c7e440e1bfc17bdc863b8a5c48e0fa6texlive-xetex-pstricks-svn17055.0-45.el7.noarch.rpm226dd647edb7ecf717f50c8fd39d7ee7f883c33ee64adc3bc5bce8074fc6583dtexlive-luatex-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpm883de235b79957465f31a9065d8acd67d5a9507324f2cb358285f0ce0662d284texlive-uhc-doc-svn16791.0-45.el7.noarch.rpm6f83b8987f47cbda9a34c09e96fa97e801afef7e84a06cc82068560c67138405texlive-dvipdfmx-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm097cee6e9a306fa36f68e6d9861733341df30897a9a0308d5f7dd0f7795f16b4texlive-pxfonts-doc-svn15878.0-45.el7.noarch.rpm0fb125dbd1202c33230f9c874912bd45186acf85e6e3fe9d0d7c2735eb670417texlive-xepersian-svn29661.12.1-45.el7.noarch.rpm1a970cb699a8c8ac89798a65bc9afa1dcd9974b6f4c584d6efd1b4dd93906f3ctexlive-collection-latex-svn25030.0-45.20130427_r30134.el7.noarch.rpm73e9476f4ffe126867a8a0c6ca052beb15901a19b8e76eece209612f40448cbetexlive-seminar-doc-svn18322.1.5-45.el7.noarch.rpmddcc2b702fc34cb8191e0506a446c147afb876cc0e4da717fca118c5dcea1924texlive-xesearch-doc-svn16041.0-45.el7.noarch.rpm80055c8f2373fd6ac332572a2551e95e013084847bcd5923e0996a24ddedd78ctexlive-pst-coil-doc-svn24020.1.06-45.el7.noarch.rpm3acf08d69a44b86db020e28678936141aab47f46dca8ed8cd636a6022359c9c1texlive-pst-node-svn27799.1.25-45.el7.noarch.rpmc84400c207dfaf559c8762955b6c5530b4da8f6dd4608f23eb3141e6b5c8adf3texlive-jadetex-doc-svn23409.3.13-45.el7.noarch.rpmfe6d3f8c9d92b178e8257dfb5e4732dbc40a3453ba7ae17168bef04c5251a8b3texlive-garuda-c90-svn15878.0-45.el7.noarch.rpm5632e8213c5ea8d4b0bd1ff07d6d0ddea8e65c306c7a511156529c6fa01564e0texlive-xkeyval-doc-svn27995.2.6a-45.el7.noarch.rpm3d83501273e4eb504c830a2a9a255d3acbc34e3bf8d39a3c8f713f40cced8357texlive-was-svn21439.0-45.el7.noarch.rpme1f21bc86738541050b696010103fbf1ad414f79201b483852247af11825156btexlive-psfrag-svn15878.3.04-45.el7.noarch.rpm8e84b806351c4c7f2892dbf82b5302b77582140c545d68655fd38122db1ece57texlive-breakurl-doc-svn15878.1.30-45.el7.noarch.rpm3c0243e3e6df4d0218b7017394bdea8841057a27c204310964f8de0bd6fea878texlive-changebar-doc-svn29349.3.5c-45.el7.noarch.rpm00669a9fe964f6e4a35d80960188791d3eb5412ac4f49f8cf7688db54b750c09texlive-footmisc-svn23330.5.5b-45.el7.noarch.rpmc8bf81dd554ed485facab5a6437f485565c83d5ec38c7c8d38f44a7f30de81e1texlive-thumbpdf-doc-svn26689.3.15-45.el7.noarch.rpme24b56e0cb963a02e81dae0b0816bd2f906c94578159b768064e6ab45f714dc9texlive-graphics-svn25405.1.0o-45.el7.noarch.rpm6db60a82fe2cf0fccfd775007005d7c68f0a37b1ec3609dbc5cd64ee2805e97atexlive-philokalia-svn18651.1.1-45.el7.noarch.rpm92c6d1c860bfad352f77737aebc88792946fe1ae3495db1a8fb9e587073fcd34texlive-enumitem-svn24146.3.5.2-45.el7.noarch.rpmf00d1725918dcffe076e3a621bbb70d85696f0fe562ab616bed658b43b57dd67texlive-xetex-itrans-doc-svn24105.4.0-45.el7.noarch.rpm2f09388fd9dd200b370ef2b0e319292b9254ebd249bfd8f2ed326bb5861fb9d3texlive-currfile-doc-svn29012.0.7b-45.el7.noarch.rpm081c37293c115278280f1dcdb288676ec813dab30e74ad2d851c6b2c2a0aa850texlive-pst-blur-doc-svn15878.2.0-45.el7.noarch.rpme3927d0aa38f9c60f210e3d0c166f127f6161859c543c2befd61e945d81715d5texlive-hyperref-svn28213.6.83m-45.el7.noarch.rpmed4a220b5c41156e751a3467d87807497293fe176326e749264a3ecbabeebc51texlive-bigfoot-doc-svn15878.0-45.el7.noarch.rpm25ee0079843baf06770253e74915c3e626dc7815b73f68aa8c709f07d1fecc66texlive-marvosym-doc-svn29349.2.2a-45.el7.noarch.rpm180cffee896ef031ec55552a462d655969829f0957418f6a996f2545ddca2f4ftexlive-appendix-doc-svn15878.1.2b-45.el7.noarch.rpm49e802089b564aeac5ee1609af538997ab38d7158969985d3919e183cf285c94texlive-unicode-math-svn29413.0.7d-45.el7.noarch.rpm937e6fd4911615f3615a25ba4cd15f795868917804161f3799ec9334e6857aa7texlive-tex-gyre-math-doc-svn29045.0-45.el7.noarch.rpm5f9d5be1fd68ce7db39cb8a133940a00121437316f49da8e73f636a084c90b39texlive-mparhack-svn15878.1.4-45.el7.noarch.rpm2eff5482b122629ea94d5bbd65eb7298ddedd916277ec060d293fb203dc6b235texlive-ulem-svn26785.0-45.el7.noarch.rpm19d996ce82ba352a71bab1cd0fdbf54ffec415ef1ac1779e9e5a36a9085911b2texlive-xmltex-svn28273.0.8-45.el7.noarch.rpm9e488cfa170049440e708de1c31aeb5ec29199e2d3b97196ac2da62244a76886texlive-koma-script-svn27255.3.11b-45.el7.noarch.rpmedad8611aa3b25d156245c59b4cc70560c7913d1e7fb7007a683ee3e1e8a8f3atexlive-epstopdf-bin-svn18336.0-45.20130427_r30134.el7.noarch.rpm12a9a2e0a8edd63ad8cfa5f2b05ce32c6014425d1189753919c3c3a1e9c40ebatexlive-luatexbase-doc-svn22560.0.31-45.el7.noarch.rpm37c9bab1b4358a2d69f28c2fc5ccfc9da3654bbe23c404e62bcb49d0ce43e22atexlive-parskip-doc-svn19963.2.0-45.el7.noarch.rpm93fd637429984bf9d440ba338f49a9a585a3bfbb47389a8871c0497af2184bd9texlive-collection-fontsrecommended-svn28082.0-45.20130427_r30134.el7.noarch.rpm90e4066ac06b903a02ba867598d76e998e37ed7707de29a80a568c90b277960ftexlive-hyphenat-svn15878.2.3c-45.el7.noarch.rpmb8bbf4a46866a4a5e9c0235ff17ea23b23968022c7b550023fadf28c7d8cc4c0texlive-pdfpages-svn27574.0.4t-45.el7.noarch.rpmbdfa440bd18fa1d673c301b112b6a55ad1a84ac8f1abfc05de2722dbe82287b9texlive-placeins-doc-svn19848.2.2-45.el7.noarch.rpma398cf6700688d75e4191b8fd2107566cdf610131e75eb814434a098fff837ebtexlive-cns-svn15878.0-45.el7.noarch.rpm13783ed40f364f78bbceae11b59e1f886fb073c599edda8e9972f04ff6c74edctexlive-tex4ht-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpma29d879e4b52b2659355f778ace1d462d494d6cb135b3386377b43db3d39cec3texlive-ntgclass-svn15878.0-45.el7.noarch.rpm393b87c8eb6a50ed6a8b6765218191d35b3ddfc72b61cc9d6254dce1f2adeeaatexlive-xetex-tibetan-svn28847.0.1-45.el7.noarch.rpm043d62074dd901ab6a58bf6793fefde96f5a997f374b6720227699602352fb6btexlive-fncychap-svn20710.v1.34-45.el7.noarch.rpm2652f5028d5fdd952663aaca269b3daa4c4ba575fb39fe2a7736e039de9b955btexlive-subfigure-svn15878.2.1.5-45.el7.noarch.rpm04dd3fd713915e1ea2d876fe18e13f1da0c82f983a644cdf3ff01dece22a3962texlive-makeindex-doc-svn26689.2.12-45.el7.noarch.rpmd59fb53527215f1089f793693f6d24aee20b47bfadd3999a902e7d78e7436602texlive-fixlatvian-svn21631.1a-45.el7.noarch.rpmf34e1736be0bd441aea57bee1516493cfe713a01487debf82b7ebab19bab6681texlive-dvipng-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm695504ac04a7502eaf1abae69e69eb704f0116c0412390d9c358b2c18c548d16texlive-makecmds-doc-svn15878.0-45.el7.noarch.rpm9b1a22f8373fd3079bf467e9366d5969735690b3814f3757a6fb92fd4772d708texlive-metapost-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpmf1612773a292449e76975710a3b0013d05d4766841d4f7638845474a46b20b0ftexlive-latex-bin-bin-svn14050.0-45.20130427_r30134.el7.noarch.rpmc112b457fd4a5e2e628d748836d56819f3c435ade4ebd41550d92884147cd496texlive-lm-math-svn29044.1.958-45.el7.noarch.rpm24a56c7febe63d789299ca6721978ad386fb9163b7ea79da66de8827e2851a4ctexlive-varwidth-svn24104.0.92-45.el7.noarch.rpm836af5f88e838f4fe3bacdd86f289ccac4b31543de56c396f2e6710df8a720f7texlive-jknapltx-svn19440.0-45.el7.noarch.rpm55de3b6d7fc6702ba12b93fd0377ae9bdaf0b42fcd5cc9d73210c8d2655b3c5atexlive-ifoddpage-svn23979.0-45.el7.noarch.rpm69f1543399793f676a280b3c973044ba3457da59f56da26a7f4f439b36df93a8texlive-powerdot-svn25656.1.4i-45.el7.noarch.rpmf9b56f4bb1aa5b09345cc3ae88d44274f35afda6f58c3f2d23758c98dc78f8b8texlive-pgf-doc-svn22614.2.10-45.el7.noarch.rpm3510e63a99fadf48de7b579c0f7f7378a139bab3689966e0496439717ab1d63ftexlive-pst-math-doc-svn20176.0.61-45.el7.noarch.rpm4b65d5e2923857435476577e195d910754f47d88d961cd845f9e0898d2300e60texlive-gsftopk-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpma2a628701d0262f4de2990489fac1385a37705922f73c4c2efcbe00d9b5ac5catexlive-subfig-svn15878.1.3-45.el7.noarch.rpm153bea0b844337c310bd4a6ef579cc3829c5cff434ab4d4d3c9885b1a83fe09etexlive-babelbib-doc-svn25245.1.31-45.el7.noarch.rpm205d7da7011d955f625c6202e2fe9751abd56d8038d891708a36ccfa573c622btexlive-textpos-doc-svn28261.1.7h-45.el7.noarch.rpmb7abce255c5fdf831c4e211ac85849a7bf262de2c2566e0403a0e09108f6209dtexlive-marvosym-svn29349.2.2a-45.el7.noarch.rpm84bad1b2d91e240149516180080cd0cb2019d647c8dbb1211b04a57e4df258d6texlive-bibtopic-svn15878.1.1a-45.el7.noarch.rpm7ef056f6988b275a23d9dc7ee3d6370e929ede130a03c9d7c22223ea4c7d50batexlive-titling-doc-svn15878.2.1d-45.el7.noarch.rpm10c006dc6f42596301054aff37f5d48a75abc20a8923d52cc3c687936eb397e0texlive-dvipdfmx-doc-svn26765.0-45.el7.noarch.rpm554b25b001a7aedf708dc097dc78a215ff85dd4b2c86dc1e4ac019dd69092f55texlive-filehook-svn24280.0.5d-45.el7.noarch.rpmc71cd6d0ebbb92935bf826bbb8750fef9641c1dac4ebfd4ae9cce650e701a2d1texlive-bibtex-svn26689.0.99d-45.el7.noarch.rpmd71606c2d98a6b273fc9e2354630a87274a2c8e3c77610099e0074e3256272f9texlive-fmtcount-svn28068.2.02-45.el7.noarch.rpm37cc1ec1d2ad32153724cc071a8be79615d021a7bfc72a23cd4970cb89b04095texlive-unicode-math-doc-svn29413.0.7d-45.el7.noarch.rpmdc731737e60c31ac5d51f3327dfc60719bf6dd3bc0cd41277815e5174ddb08c2texlive-metapost-doc-svn26689.1.212-45.el7.noarch.rpmd440496268c377733dc67031b4753c52784f48cacc325262fbadc2b1b0a4d9cbtexlive-ncctools-doc-svn15878.3.5-45.el7.noarch.rpm55e55793a247f77f8494d0efab62046067337aed14f6e266d3630e9b5274da25texlive-appendix-svn15878.1.2b-45.el7.noarch.rpm4675b54bde8131f766940c611705bf5dcd8851f06e493113a7c706c00b15166atexlive-xecolor-doc-svn29660.0.1-45.el7.noarch.rpm2d9969df989cc06cc72e823c39e061b7da7841ecab292cfc09f12769d434734etexlive-thailatex-svn29349.0.5.1-45.el7.noarch.rpmaa3806fa577604e211ff0a5c2983d52df0eb38120db72b1f57f6e88bfcacb66atexlive-xesearch-svn16041.0-45.el7.noarch.rpm004a26efd40d17e9e66969f893ff704174dfd42be25820fc417cb0b104589d6btexlive-hyperref-doc-svn28213.6.83m-45.el7.noarch.rpmb0378f56bead85c0d0bffa4638fc1c2bfcffbf3074752cb48855526caffe5585texlive-pst-slpe-doc-svn24391.1.31-45.el7.noarch.rpm18f242efb2e38be49a9b89da3a0badae842c8f25ffb65bccbbe3c7501a42b259texlive-luatex-doc-svn26689.0.70.1-45.el7.noarch.rpmd6fbee84fa53c5bfcdd80f5d75d48c597ad56623113f07160320486e95c613c9texlive-avantgar-svn28614.0-45.el7.noarch.rpmd3801c03b236e6972457405776793103daf3ce067fd546345b5ef4312d6a8603texlive-xifthen-svn15878.1.3-45.el7.noarch.rpm2211b93ccee206457b5bfbec1aff1b9e72ffe33684e9a5cdf472568f0467d1fatexlive-placeins-svn19848.2.2-45.el7.noarch.rpmc4548682b0a9f57488e9a414632431aadcdc6b478a28d17b06300107c880964atexlive-fpl-doc-svn15878.1.002-45.el7.noarch.rpm1ae835615408c68d1e23fcbfc4abbe36a031b6c5d57749852ca13ee8f1f7969ftexlive-ctable-svn26694.1.23-45.el7.noarch.rpm15aad23678f41008bb7ed548dbfc2f911e488d48bbd56080880a816416546b71texlive-fancyvrb-svn18492.2.8-45.el7.noarch.rpm190aaa0d8cc02e9c7fae73cc917a6fc5afba9f3e898bfd505c133728054279e5texlive-gsftopk-svn26689.1.19.2-45.el7.noarch.rpmaac40e794bef7df266c4d0db88f97bc8d8a8241882fb65f5704d2e975e6b4e30texlive-pst-fill-doc-svn15878.1.01-45.el7.noarch.rpm86cf2f9381331519c1db63122ccf4ba78f63ab60146e20b2bc8104e54345b54dtexlive-textcase-svn15878.0-45.el7.noarch.rpmc750e214d1a0f0cec7eb2ee1d075773abb7e7d6cc374a2aaaf2e77952cb17c3atexlive-arabxetex-svn17470.v1.1.4-45.el7.noarch.rpm7d5ef5a3f3983ceeb38e1b827785852c03482f99280e3921d38f2356423427e8texlive-babelbib-svn25245.1.31-45.el7.noarch.rpmb0ae3478ff87f1188777126607b523af705988e427c0d25f7e0342fdeeb91646texlive-xetex-doc-svn26330.0.9997.5-45.el7.noarch.rpm053952a9d74be130c7c79fb2ad7922e25699d94804b4ad551ca48a301e8a5f93texlive-pst-eps-doc-svn15878.1.0-45.el7.noarch.rpmd139d5a31cdbff6d3b69d4847f18a70c5da43ba1c32c30d61998b210f8b7da27texlive-xdvi-svn26689.22.85-45.el7.noarch.rpmae9010165081d45e0194a7e4091596c7b74639c6d84a97b94ebed79e671c0c49texlive-psfrag-doc-svn15878.3.04-45.el7.noarch.rpm81c36074d5c24c89a087a1e1947eed82957972bd3a7fa4f846efe289e70b20f6texlive-pst-slpe-svn24391.1.31-45.el7.noarch.rpmeac19da90c9c19f431f684d7486c3619617a249471377e471504886d20432bb0texlive-mptopdf-svn26689.0-45.el7.noarch.rpm3eb07ffbdef82782ee39b7dd5d02a0ea57ea7337eed9613a0f02dbe18f5634cbtexlive-xifthen-doc-svn15878.1.3-45.el7.noarch.rpm8395cbefac1d3e0cbbea476046a6af2e37555874bb128c071ae8ccaee5b4c34btexlive-framed-svn26789.0.96-45.el7.noarch.rpm402b2ab97b3fa25aaec7c7652fd402151d2da9bf253949ed8ca7d30fc74b3d04texlive-kpathsea-doc-svn28792.0-45.el7.noarch.rpm95a9b1ce2ec8613375406c7cfe480ae41497b90b2957e7764d86d1c23011b0f6texlive-rotating-doc-svn16832.2.16b-45.el7.noarch.rpme47a39776020cae536002d8733df8c0fff0c2a6d57bead36543545abc7d412f9texlive-pst-math-svn20176.0.61-45.el7.noarch.rpm4124f3396d0375112a6116cdbed23d048279b4e6746b93d0ea546e019f3364e1texlive-type1cm-svn21820.0-45.el7.noarch.rpmd65786dd2ce2619d35e3969cd3df78bb747ea5d1c0b1228d60e87ec85dc79442texlive-ifetex-svn24853.1.2-45.el7.noarch.rpmbbc3cbce21fdda31cb62aedd97c4f158618843370f9242b101b1978c9685e951texlive-rcs-doc-svn15878.0-45.el7.noarch.rpm2f6e0716058d5eac51ab7a5e19f069aa492be6591f646baff33d125f8c24ca5atexlive-sauerj-doc-svn15878.0-45.el7.noarch.rpm25daf5da5c382ace875f461b169bfb87745cbdbfe502eabf5201b0e83d220c32texlive-parallel-doc-svn15878.0-45.el7.noarch.rpmf10102102fffe2c628f7b75bd12d9b14618ec8199c0a5e11eb5a639e9570727ctexlive-section-doc-svn20180.0-45.el7.noarch.rpm338e642955ce425555289caa07470ed67615177e25c05cae695723f5b9f83152texlive-beton-doc-svn15878.0-45.el7.noarch.rpm7f84ef7ae4d703d456105445bcc8babf2f7560d8ef5425072f37b0d2762560cdtexlive-tetex-bin-svn27344.0-45.20130427_r30134.el7.noarch.rpme5e0326adb8923fb25ce42d60f1a0691fc15db4b221edf488f3cbe21403210a0texlive-currfile-svn29012.0.7b-45.el7.noarch.rpm51cccc6d2f567ea0c749ebed159d0f2c14e1dcf369c7d4911addbb6f6ac6692btexlive-arphic-doc-svn15878.0-45.el7.noarch.rpm3f0d4cbac80473ef2e4d212e8cdff7285be2cd4400b6879e4bb7851dfc294b97texlive-powerdot-doc-svn25656.1.4i-45.el7.noarch.rpm615f48ec23fc18dd2e3212c561f528a1d5029b81705b125a052b0db4bc3fa676texlive-l3kernel-svn29409.SVN_4469-45.el7.noarch.rpmafa9d4d37be0f93c0c6f619b927fc8a03dfc89a52aa4af65c7d9c164e30798ebtexlive-multirow-svn17256.1.6-45.el7.noarch.rpma25cb754d919483527e476e940c77f37ca525d49e06dc6f22c94c2740db32d91texlive-changepage-doc-svn15878.1.0c-45.el7.noarch.rpm226ae2b709f40236e6d941daf3e68e8d42e8db93cf6b281a2367fac75bad04b7texlive-arabxetex-doc-svn17470.v1.1.4-45.el7.noarch.rpmedd54d38669377bf4486f363dfdef22c3c3408d6cfdc3b4912b74413646f864ftexlive-symbol-svn28614.0-45.el7.noarch.rpm35dc4de24fc0f550f6e2356ac658efb6e42afa751040f7a19d7b04ab2c5aa089texlive-babel-svn24756.3.8m-45.el7.noarch.rpm87007f702a313c8a93c2e73976a56226665b8770b97d605eff836a28662d29datexlive-textcase-doc-svn15878.0-45.el7.noarch.rpm2983a658ec4fcd5474db5bcf89f407a1342196ffb04ec73495f67c35195ca0d4texlive-caption-doc-svn29026.3.3__2013_02_03_-45.el7.noarch.rpmb7918883ae2fb18c259ca49e7e790f5317e12927447afd332e973f9cc121271atexlive-tex-gyre-math-svn29045.0-45.el7.noarch.rpma57ac23e30fc015a2e6eae75052ff8d789290c6be928f625e61007c4469404betexlive-collectbox-doc-svn26557.0-45.el7.noarch.rpmca128cbaf0aaa32ab96adf6ddda37ebd72175b59bb1b981f1f6b99d8998c58bctexlive-charter-doc-svn15878.0-45.el7.noarch.rpm0b65c0aa9644aae54ff2aae5f7c96f811f5293824d6d1eb2d47f9565ef4d3cd9texlive-latex-doc-svn27907.0-45.el7.noarch.rpmcf46a1be0d32b9620455c301c05f30c48ed16aeef86f70c931d36c751e23e75atexlive-fancyref-svn15878.0.9c-45.el7.noarch.rpm2274a3a276e04d326945cfb84e3765d4c9691ead1ae02e3179c4101e1e889af2texlive-luaotfload-bin-svn18579.0-45.20130427_r30134.el7.noarch.rpm25f927ef3e5754a7b66343eb19b3c548086997b08be0e4bf72f01277620862fbtexlive-euenc-doc-svn19795.0.1h-45.el7.noarch.rpmd347ccd51803aed824eff694aefa3bca92ce96525bdbedf06e102fd888e6d842texlive-soul-svn15878.2.4-45.el7.noarch.rpmb8cff200d52e432c992b56308875132eaa725fd71de21cf2e821644c0bbed1b8texlive-rotating-svn16832.2.16b-45.el7.noarch.rpm1281509d8b75346e14714c332aa1c93fd27e0aad87ca65eb1a49cfe6ced62be4texlive-stmaryrd-svn22027.0-45.el7.noarch.rpmce5121821f5bc9143333d4ddfa0c2598257f4fe4d83477a58ca2881bc8d76e97texlive-pspicture-svn15878.0-45.el7.noarch.rpm957e4d8dd2dd1226442c23763b7eaa67f56cf2e17b324d6b2fbb60ef11f73abftexlive-amsfonts-doc-svn29208.3.04-45.el7.noarch.rpm1dd40ff8fd36119cb26c0413d1c288e3786df892c21cce655d4b82562ab604e2texlive-ucharclasses-doc-svn27820.2.0-45.el7.noarch.rpm056d9a641342768cbb97c632d4e5cf4608f15b7541007ff2b74b03a4bcdb991ftexlive-pst-3d-doc-svn17257.1.10-45.el7.noarch.rpm59e6ed46a6b58ee1e18409d053dc6cfd29cdc93f72dd72b207fbd6786831ad23texlive-sepnum-doc-svn20186.2.0-45.el7.noarch.rpmdad60d10f41faf7e064bb5d5bc537d22f3a2f6685e8a7c430adf3a93491b2b69texlive-lettrine-svn29391.1.64-45.el7.noarch.rpm2a9e153403df873c7ae3b781296274543d0c9cd3fbde6e26439d885f5bdb1f27texlive-preprint-svn16085.0-45.el7.noarch.rpmf34798ca1866edeefd22be293d51cd53d27fe75d26b09d953597a01b1c67fbc4texlive-bera-svn20031.0-45.el7.noarch.rpm683eda1a4fdaf01ecedc4219b70b4388fd8946e35672bc27a71cfc361b192207texlive-dvipng-svn26689.1.14-45.el7.noarch.rpm5260feb910f86f389fed891357d8385e335bf0e87e21e9a1447fa068ba84d93atexlive-ltxmisc-svn21927.0-45.el7.noarch.rpm03649e45aaa6d98e54cbc8beebce3f6c438db196ebc5c16ac3c7296f8411b2ectexlive-helvetic-svn28614.0-45.el7.noarch.rpm234a8ed49c74d5ba9cf3fe299c210ffec1a58e9d1c73f2ce1066f7a71bf7e04btexlive-float-doc-svn15878.1.3d-45.el7.noarch.rpm99b7e3f821afb4b864550d4359741ae43a1507008f4100aac342a37d4a2830c8texlive-l3experimental-doc-svn29361.SVN_4467-45.el7.noarch.rpm72aebaf86ce9971b1c5fb3490fd1ce7b715bacd5e08aacbf7ea19b98e50c2335texlive-carlisle-svn18258.0-45.el7.noarch.rpmad70faf28030cb58b49202d37f3aae9c4595c3c6fc834fcaa726fdc64854ec29texlive-memoir-doc-svn21638.3.6j_patch_6.0g-45.el7.noarch.rpm9329fd14577c0cd8b947dda029cae08f3f566664dfa517353d46ffaded69a228texlive-csquotes-svn24393.5.1d-45.el7.noarch.rpmaed60512ba4d718585db0514a778b17fc5c4d096cf2d77465dec2e16b0515a1ftexlive-tex-svn26689.3.1415926-45.el7.noarch.rpm521b89f6b18a060f0d094d806be94fa11fe567fa42a0494a0e6f083c19dfbab8texlive-pst-fill-svn15878.1.01-45.el7.noarch.rpm69ab985fbdef4743622e4c716159eac2f0b78b4ffdd8dddb2b39a28d65723709texlive-tex-gyre-doc-svn18651.2.004-45.el7.noarch.rpmad17e728f34ef09acded33b60cdd6fb3ecab726c4f5f35072c613c5ef909f0aetexlive-tex4ht-doc-svn29474.0-45.el7.noarch.rpm10c1aa65b7930e47edcc3c33e6dbd44feae54c523c9c0b798238aa55d6b1c6e8texlive-multido-svn18302.1.42-45.el7.noarch.rpmf0b2ba953e0863ed5d9715875f5b8315b4e9156451f213d7f0592c27e196e603texlive-mh-svn29420.0-45.el7.noarch.rpm93328a57bed6b3e7054ee2de21c9f8cfadcf111a824908b30d8bdcb0b639f64etexlive-arphic-svn15878.0-45.el7.noarch.rpmd610caa0cf142b1511297b32b09b6c2ccdfbb7da70ea2bef05889972d3898200texlive-metafont-svn26689.2.718281-45.el7.noarch.rpmc1b22b98491ce58a551c17539ce9241977dbbd1f40d945a643b742d095f7968ftexlive-lettrine-doc-svn29391.1.64-45.el7.noarch.rpmddf7164b7e750f5f51f588344888ad835eddd86911e34081f824e458e0476fa4texlive-fix2col-svn17133.0-45.el7.noarch.rpm60ea3726110da68292842db4cd0dab79a5a57d4d7900314fa03006b60ed4ae8dtexlive-unisugar-svn22357.0.92-45.el7.noarch.rpm7647cac8152028fac82eaf58555b12eb1a8599bf8542c12524a6b7409d2a34e9texlive-bidi-svn29650.12.2-45.el7.noarch.rpma21f516c283b2f722e7836b3d80ce65cd99c29a79787e9ceaf666f7cd39a00e2texlive-etex-pkg-doc-svn15878.2.0-45.el7.noarch.rpm492f142a423e3411bb39fe7b5b9df1c94ae3f53bc2a49846bd226299dc072addtexlive-epsf-doc-svn21461.2.7.4-45.el7.noarch.rpmab121f992318bd2085a7535e30c099ada576962ca419f5fc7a0689611002878ctexlive-listings-doc-svn15878.1.4-45.el7.noarch.rpm15b6c68bab1996161c6b3a1121cb7a2206af1cd53f36eb295d74d8cee44c8369texlive-booktabs-svn15878.1.61803-45.el7.noarch.rpmaf54ac96eacc18457228965c97d4d37efa5b7ba16e3c2ead92bffff91b54e7bdtexlive-algorithms-svn15878.0.1-45.el7.noarch.rpmbc848b29eedce7d1680450daab4a0771e06eff1dc7e8e2217c302da9346a6428texlive-mflogo-doc-svn17487.0-45.el7.noarch.rpm763d2f4923fcddcfa665d255d491db83303dad2d6b3fdebec4a820c715388093texlive-csquotes-doc-svn24393.5.1d-45.el7.noarch.rpmaefcab45f943b8d23d951ae0867e38e2b42c050c808d41d0f7a811954a6c6e29texlive-cm-super-svn15878.0-45.el7.noarch.rpm7716b49b325f233e750c657853f685a504eff53c1ded6dbb9472cb53999c6fd2texlive-luatexbase-svn22560.0.31-45.el7.noarch.rpma17c548beedb84405c093b989d399178a65e7b3000e4e1f97f2b501c133d313dtexlive-microtype-doc-svn29392.2.5-45.el7.noarch.rpm76d614b05997f3a6567e5a2b0e50a5921c8b97055fb3198259804110018449b0texlive-fontwrap-doc-svn15878.0-45.el7.noarch.rpm9ea5822d668688ac4a6ba687e761d86c11903d9c8c07b914bf7efbdbcb1e5844texlive-wasy-doc-svn15878.0-45.el7.noarch.rpmf2990708623d2a14390b65256b074c1e243a2d451200b0526ab9ca1e73fdd7c7texlive-crop-svn15878.1.5-45.el7.noarch.rpmc8df289f16c1c6d44896f6763a2bd41bdb3856fda63c88bf88823f049a720d0dtexlive-makeindex-svn26689.2.12-45.el7.noarch.rpmd73f039d529f5945b617a3bf81c8ea884044b49043be24b4eb0e51e2e0a350e9texlive-section-svn20180.0-45.el7.noarch.rpm2d91224592a7f0849c91922baecd3507dbefee0af5c0af882768913b524247d0texlive-latex-bin-svn26689.0-45.el7.noarch.rpm7c03ec52e04d0658fed074538996d6e93d36accf694526b666b0d9e98a517893texlive-texconfig-bin-svn27344.0-45.20130427_r30134.el7.noarch.rpm16079e5de222defb3975d35c62a5adf6911eebd36884c1917889b9ae706915e6texlive-kpathsea-svn28792.0-45.el7.noarch.rpmd679347135b641cf7b777836146047a1351ae602dc8c4feb6b93e47ce0c51775texlive-collection-latexrecommended-svn25795.0-45.20130427_r30134.el7.noarch.rpm3b0489fa6270629b7b6ef085470a4053da383400d2c5667444e5429c55b8cd78texlive-xunicode-svn23897.0.981-45.el7.noarch.rpm7b2a4c8e67705eed8c237b6118c57b0aeea2caf844dd6256a2145ec0568120dctexlive-xltxtra-svn19809.0.5e-45.el7.noarch.rpm638c0219fa14418ade6b51dca03119f34753bbe6a72c4a5718a402f05019db4ctexlive-dvips-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpmf2c7ad4b1030efaf5cdde84184f3366b6e9a8a5bee68ce2865ac2478bf1543b0texlive-collection-htmlxml-svn28251.0-45.20130427_r30134.el7.noarch.rpm9d11a70093d6284f026b8581984aabcff98d864bb16b1753f604107858d807cdtexlive-marginnote-doc-svn25880.v1.1i-45.el7.noarch.rpm17e135f84d21deba67a05b9aee17e2192b4b1acda03ce88d76b3ead549fb52c9texlive-metalogo-doc-svn18611.0.12-45.el7.noarch.rpmceb535309f841d72175a4a9c5badbb442db6087ffbd799115727a84da1ef2bc5texlive-xdvi-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpmf180857385d6b28bb6570c162bc179db7a057831234df4d5b3b4023973ffd182texlive-ucs-doc-svn27549.2.1-45.el7.noarch.rpm177eba8a07842b54c96e897509740729423d7841a69250f7a3b157c8f14dd335texlive-eso-pic-doc-svn21515.2.0c-45.el7.noarch.rpm97167df5d36a17b243489622cb37b052406f7e9c7f6ff6382771e8c649edaadftexlive-pspicture-doc-svn15878.0-45.el7.noarch.rpmeafeeb812f0506e9e8fd8007a758812a8fa92dd0a0a2bb7403235e13e9374f6dtexlive-realscripts-svn29423.0.3b-45.el7.noarch.rpm4d6a64630e26e7a6004ec8b0580e6bf6662bfb0ae826083362783369a4efee60texlive-ntgclass-doc-svn15878.0-45.el7.noarch.rpm1160dbc9fea01a669d29c3e72491df393c79598ce9c404b30a5092bb7a3ece0ctexlive-xcolor-doc-svn15878.2.11-45.el7.noarch.rpm9eca645b4e576f811881292cccb7aac40debc3ebd58ec0ca34b2431bb85efb0ctexlive-xeindex-svn16760.0.2-45.el7.noarch.rpmac8547ae3842763a85119f1da5b78a8869eccf69cd3932e1fc6f0a6db1bf6240texlive-lua-alt-getopt-doc-svn29349.0.7.0-45.el7.noarch.rpmc219da3d2c72900d65d3f2cfa75c1117b5408490e8b695bd4fe1c2aad3f31a1btexlive-lastpage-doc-svn28985.1.2l-45.el7.noarch.rpmc20223a843a7ea12c862016c7ea52940954c5f5d53f37d3bf5b9c3aae20ba803texlive-hyph-utf8-doc-svn29641.0-45.el7.noarch.rpmfe8ceb07145a51367e1aeed61cbde402123aa6738f1d2c250e03db889ed64832texlive-crop-doc-svn15878.1.5-45.el7.noarch.rpmdf6d98c6e30878d8ab49d46f4a97faa9aef4e0666bdc71654479ef1e04703c41texlive-bera-doc-svn20031.0-45.el7.noarch.rpm21cd7897540b3583d7cba613648504ace8f8bda2262be03fc0bb5e9f2600e2c4texlive-mfware-svn26689.0-45.el7.noarch.rpmf660af8b657c4c2be84dadfe7fad4a61eb2835ac0c3886b4384a722d5c74f93ftexlive-pxfonts-svn15878.0-45.el7.noarch.rpmf21e5e970073e7dffb352c052398b2ea55d4d877d514d2f23f2fc7e9960c7146texlive-preprint-doc-svn16085.0-45.el7.noarch.rpmf15a5763e9d58c85eea318bbee13a86a66bee86f3a805f1e8dc824c6ab331094texlive-lualatex-math-doc-svn29346.1.2-45.el7.noarch.rpm3a20fd0a400fa843ae7d61927931b7b7e75d48c09c47d9d2d79555883c4b0c08texlive-dvips-doc-svn29585.0-45.el7.noarch.rpm8b01d3f2da177dceeeccd758722c9aa513484903f9cdb090063ff5ff2f0be923texlive-enumitem-doc-svn24146.3.5.2-45.el7.noarch.rpmbf61168c2edb6796ebd5982bcf2c46945db82d5f8c46cf14815d1295b3f87820texlive-adjustbox-doc-svn26555.0-45.el7.noarch.rpmba7a05005c049a96cb14f8a659643c09a59e994a223e0ab772a96f5f600004abtexlive-multido-doc-svn18302.1.42-45.el7.noarch.rpm5d2ce52e73784c47f004d40da9fd89cfebf28bbe9ca74a65c0423abde7b824d2texlive-lualatex-math-svn29346.1.2-45.el7.noarch.rpm68c340a3c99d80904f68986d0af55f62d3b6b1e99d83f2d7a0aaf9a8b46d43e5texlive-tex-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpm368a9edcdf22002a47311e369cbff9b7405e7d0954222c9b6a79d392157de7aetexlive-xetexfontinfo-svn15878.0-45.el7.noarch.rpm7066a703b7d58068f1a38f513943f649ac8d5b60b5b5bd0212e25ae408d50591texlive-glyphlist-svn28576.0-45.el7.noarch.rpm4b55fad5aad011635ee1c3acb0990c230284d00ae8d93f8a594fc3d1361c8605texlive-epsf-svn21461.2.7.4-45.el7.noarch.rpm7ca8902b944845b4e17e2a1597221c00b56054c943a9689c12734d5108f53da1texlive-pst-coil-svn24020.1.06-45.el7.noarch.rpmae3dccde2e188b8186ca86d4880ab64754d78e82ecdc7754db824cd4788d091dtexlive-amsmath-svn29327.2.14-45.el7.noarch.rpme34e68ab8c3476c5e4b6ddd39e572e516db384f95024accba3806cd50b1be9d5texlive-datetime-svn19834.2.58-45.el7.noarch.rpm5436589c3a83b8d82fd02c7d3abd6cfbbda8a785274938a38cc1d63884beb942texlive-hyphen-base-svn29197.0-45.el7.noarch.rpm6c3b45534d05fd2b37a21c801b62ab002a5854c084852033cd35abe921dce3c4texlive-wrapfig-svn22048.3.6-45.el7.noarch.rpm2a2d4c8b24be29239aec620c644defb741e3bab4443cad555ceaa301ba9414b5texlive-bigfoot-svn15878.0-45.el7.noarch.rpm2061faa0b09dea232537f58aa1f93c1f1675b1ed222fc09c628bfec8b1adffb2texlive-pstricks-add-svn28750.3.59-45.el7.noarch.rpm638ae37b321251062bc50b3657c30713311c95b28287a14706109317d0fc842atexlive-paralist-doc-svn15878.2.3b-45.el7.noarch.rpm1878c2d52a7169d0f917e315b26223a8855864ee6c9139aad45055c7e6d54bf1texlive-microtype-svn29392.2.5-45.el7.noarch.rpm8173e4bfc5f65ad87c0ef461d4c5ef19271ce209b450e1032bfb896dc2e2fd1btexlive-kpathsea-lib-2012-45.20130427_r30134.el7.x86_64.rpmec4b6f1f13cbdf2c17d4b814e28d6e63584883453faef5c33f8804b812960c22texlive-ifetex-doc-svn24853.1.2-45.el7.noarch.rpmce056f7887b3235548053ddf317a24698d7ebb1e587390d97988071ad90dbde8texlive-kerkis-svn15878.0-45.el7.noarch.rpmef072c5a6bba9f3a3f475c481e1a0655e266ba0dc686cdb6fec89ddf741901b6texlive-realscripts-doc-svn29423.0.3b-45.el7.noarch.rpm497d10316c48450dbf71c006b2799683cb82802c7b7380960955f56201297141texlive-ms-doc-svn24467.0-45.el7.noarch.rpm0a1228cd4ce8b9fa3cce3a843bf4778fb3c9515370f1cf693113abd8408f6933texlive-fontbook-svn23608.0.2-45.el7.noarch.rpmea980b0e9973a6a864e9ec59b4b1ce0f0f9014af0d034121654ce0d6219c70d7texlive-showexpl-svn27790.v0.3j-45.el7.noarch.rpm6aa9a26716db68e91c26764af4d9202b0854f660dbc6f5abeef5db3d5099451btexlive-xunicode-doc-svn23897.0.981-45.el7.noarch.rpmbc9eb32e1b00dad0a407dd4848a907ddf28c1f57263ff47ddee53a1fc282a5cdtexlive-breakurl-svn15878.1.30-45.el7.noarch.rpm6b4f1c04a23792596e52e4db6dea23d3cc71bac9c76bb16b5c9cf5ce6bb9d979texlive-unisugar-doc-svn22357.0.92-45.el7.noarch.rpm259b35b618a28c6bbdef3c2be552d2756492720aee677830e3fd1bbbed032ec9texlive-typehtml-svn17134.0-45.el7.noarch.rpm0baf2f5b8f9c01b7697bb651d4281cea78eeb93505fc29ec3f43f45440c44df2texlive-cjk-doc-svn26296.4.8.3-45.el7.noarch.rpmb383de9e58a91d9972b7771d79b817d036d5497361e07f62c7b72da9da4e0aabtexlive-xecjk-svn28816.3.1.2-45.el7.noarch.rpm3fc34779b3aa5aca3fd8c0b3caacf40a69117861e9bc3d115f7e65d6a6dee73btexlive-attachfile-svn21866.v1.5b-45.el7.noarch.rpm368e6b89a4d8ef703d5bb4d1d7f4e4d7cc308b9361ffb9bb12c1b827a41b95e1texlive-l3kernel-doc-svn29409.SVN_4469-45.el7.noarch.rpm3c5acb0fc00c53586e685592fccac24948d566c29a21d54f32b22829817be1b3texlive-pst-tree-doc-svn24142.1.12-45.el7.noarch.rpm534af4ce72b8c6ada892852a537d196886bb90c4920ffebd6b080f439ec2cfa3texlive-luatex-svn26689.0.70.1-45.el7.noarch.rpmf1824b29566d973ee39d3b0ba28c77da97a3f606c494b8b3d10b29c82674865etexlive-psnfss-doc-svn23394.9.2a-45.el7.noarch.rpm586dad93a57170811d005221734776ecb32053ea9716126444d1eefc8d2d9e29texlive-misc-svn24955.0-45.el7.noarch.rpma13ac5a29a446be376bc7ab40e5c3b534068f07828813517f2c36af437816c2dtexlive-fancyref-doc-svn15878.0.9c-45.el7.noarch.rpm61fd0b303a29dd56602e13c2221fae2d6b8dca202294ac7dc3be922732b306cetexlive-fmtcount-doc-svn28068.2.02-45.el7.noarch.rpm0f94c064ab1bed5ffad901e0da32ecebdd34acd6d593c75c731b585201de0b16texlive-ncctools-svn15878.3.5-45.el7.noarch.rpm97f8f32905ed6a2c211def5a77847cbce98d24651e491fe7423c043c6d72136ctexlive-l3experimental-svn29361.SVN_4467-45.el7.noarch.rpm2dad1cd055dfb374db3aee650ea5cc97fd4a4ec62ef024fed237177d5c4b3b59texlive-dvipdfm-bin-svn13663.0-45.20130427_r30134.el7.noarch.rpm45d36439f752d1701262b335531804321eba0945a586a3592f439cdd0207e1b8texlive-ec-svn25033.1.0-45.el7.noarch.rpm6f48630bd22224e59838677911cf29961cc389c351ad117b7d5520bf841935catexlive-url-doc-svn16864.3.2-45.el7.noarch.rpm4d7eff924a39e6438d4e8e0bb44dd1828ce009f2046e5ca3883df7bc23020965texlive-kpathsea-lib-2012-45.20130427_r30134.el7.i686.rpm2f95fdc6b75d32c54b860e4454a15d807caf07ecbd5caedb85bb985c782d47datexlive-babel-doc-svn24756.3.8m-45.el7.noarch.rpm5831ec988e8514a61ddc6086a49d82221a66eb3fb9c9d2d43facaa8c37c2dc42texlive-index-svn24099.4.1beta-45.el7.noarch.rpme7b0eb2328c27ab8a69e1300f5e5ca6295293b30ce7d4670de694044949e9b14texlive-booktabs-doc-svn15878.1.61803-45.el7.noarch.rpm0110638ea381d8de838ed7f45c23412ba8389ce27250ddec2035c6110f757421texlive-mfnfss-svn19410.0-45.el7.noarch.rpm990920514fa3bde7b70974da177b87e86dc90c00768a503820fafc1e9b4ce290texlive-colortbl-svn25394.v1.0a-45.el7.noarch.rpm9b006bf2907a8321fb75a0d9f3e7b4683cb38e1440c28e920befc08d4ce77502texlive-amscls-svn29207.0-45.el7.noarch.rpm4ccdf117df1508769a9f3f92419e4630cd8e217c8b60c14f62cd489a6ecfc6c5texlive-thumbpdf-bin-svn6898.0-45.20130427_r30134.el7.noarch.rpm00787cc0743467eafe9ba349e2d0c1f340d122d8474e05784284ab8c2dd70900texlive-ifoddpage-doc-svn23979.0-45.el7.noarch.rpm6a179f54c46d6bf77f1b663c977a0d51572ffff46ead2689732b403e70ac9b12texlive-dvipdfmx-def-svn15878.0-45.el7.noarch.rpma9a3a929ba7271a68d14871eb5a8d5f62d77972dde516dd5076742043fd5b01ftexlive-makeindex-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm6b71d84dd9489fb8ee9d116a58ef2bdc4b0a029e6f30062ce0c0256e4a4d2db7texlive-fancyhdr-doc-svn15878.3.1-45.el7.noarch.rpma982ff1d5c93d669ad03f55b723aed51205c2cec976592e320398d76314ee225texlive-fontwrap-svn15878.0-45.el7.noarch.rpm9677c0d03956b5ffde531875c41c0d41d62fc8f2bd7e779760df34edace2196atexlive-eepic-doc-svn15878.1.1e-45.el7.noarch.rpmfdc5b975f2f50d0abe12855c7a207855291788b9447b7b8eb73ca773072161b5texlive-lm-svn28119.2.004-45.el7.noarch.rpm04ed7ee8cf7556bbcd6d5668ea08ee0b51cce5a1ec0d7e6bf880352a906a4b11texlive-rsfs-svn15878.0-45.el7.noarch.rpm6279ec647b8c2a97754335ff3d0ff655926b6440151d47bf6613f3cc75da0412texlive-collectbox-svn26557.0-45.el7.noarch.rpmf523f9c508c4d0f7b50738bbe875c7a88f5e4d88e7a2ea86b0786eafa9f7ed78texlive-wasy-svn15878.0-45.el7.noarch.rpmc51ac0c23dd20ece6f013f1c11999bdd2d1a840825a0c339d565952efaccb648texlive-svn-prov-svn18017.3.1862-45.el7.noarch.rpm122f29cedd4fcfa3846862e80ba32cb93c81b5e9970e78e0eeeb13dac213f750texlive-jadetex-svn23409.3.13-45.el7.noarch.rpm9f3409f44e2554385fd081510502899cbb869a3d371424c7ac9b1839f784358dtexlive-fontspec-svn29412.v2.3a-45.el7.noarch.rpm9d8e832f048d9c557eb80388ea1b947381641023b51c904f2bec1d0241c25e05texlive-filehook-doc-svn24280.0.5d-45.el7.noarch.rpmc3af90602efa3ea325e9e51336cfc3fae3e8bfdf02a89126ae2f2485743b0cb1texlive-ptext-doc-svn28124.1-45.el7.noarch.rpmece3f66848e11ab5cb3dea4a8421872da85b7fc83a1597c2525029db82dfcd62texlive-xepersian-doc-svn29661.12.1-45.el7.noarch.rpm848ba4618ee6906a65a1536e5cd51cf74c7ec405074cea0626c1f42232e62c87texlive-filecontents-doc-svn24250.1.3-45.el7.noarch.rpmc1c4bb646116e875abdf371a594f044d3097174b0daad20849aff6635bafc217texlive-qstest-doc-svn15878.0-45.el7.noarch.rpm3e4eace6e6986243d2f03fac24593287cf75f66b2696c2a92e9d08f2892b1197texlive-xtab-doc-svn23347.2.3f-45.el7.noarch.rpm0b1142e0e134bfb7f72064db96ec92966cb58af74d8ae87c7cffd461713b235ftexlive-xltxtra-doc-svn19809.0.5e-45.el7.noarch.rpm186254377c75069a462fa1336680093b27e285c4fca4c976a0b684644a2875fdtexlive-plain-svn26647.0-45.el7.noarch.rpm44843784b9d3778d18c75c38e95ed88916c84bf016d7266fc22397cd63ca9956texlive-was-doc-svn21439.0-45.el7.noarch.rpm8fbc0522b17531d1662d1fe301f2a5cd11aa69374ba2522219e0a629646b9817texlive-fp-doc-svn15878.0-45.el7.noarch.rpmba41d61d40e9d02885cb7645794ffc105614b5691b3abba631a0470921502b2dtexlive-xecolor-svn29660.0.1-45.el7.noarch.rpmcab29c6d3b3cd9048df1c1cdd5ac13b64c289c73874a083875ec96bd746af23atexlive-l3packages-doc-svn29361.SVN_4467-45.el7.noarch.rpm73a253ec818a7cc04ec9bda1fe1f1a0b9cf776928b66c13245181ccf30845bcctexlive-marginnote-svn25880.v1.1i-45.el7.noarch.rpma6089281b8d2195cfe7109e22b9feb327db53a50b1a59d8235e75ac0ed935963texlive-tipa-doc-svn29349.1.3-45.el7.noarch.rpm13032c0bc6643c84b46c44e27f4a478d8db05271a3ffee0e8862a55477d6708atexlive-attachfile-doc-svn21866.v1.5b-45.el7.noarch.rpm976a1fd15deb01475d3e751da068fac9d40c6148499d26cabd90f9e205eda44ctexlive-pstricks-doc-svn29678.2.39-45.el7.noarch.rpmb5303d40ae92c67f4e5177ea69fb3913c294488bfdeb3d2ae0ca7c3051a62e5ctexlive-lastpage-svn28985.1.2l-45.el7.noarch.rpm94090186af79544c7604e50c91d52029508a9b70fb34dc8c18100b020459027ctexlive-metafont-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpma6e76fcaa33af068af8b1c673f04a94bf5470abbca5e2605b386a38f585d7b85texlive-ifxetex-doc-svn19685.0.5-45.el7.noarch.rpm17dbd87df4543e4e8c615181f8189ac42896b0885712a86489610b7e51f8a641texlive-lm-math-doc-svn29044.1.958-45.el7.noarch.rpm1160cc2f13064534b3253150bb489d4cd9a14e6c4025ed710d3994b3f89071a8texlive-pst-grad-svn15878.1.06-45.el7.noarch.rpm352c63bfcbaf59181495210b3b30fded3d62b38ef99129eb0339f41580037b58texlive-ec-doc-svn25033.1.0-45.el7.noarch.rpm6eecff776f7ddd405f98537d064e8819d3b7e8c0ff30f4c0c1449dcb731642c9texlive-cmextra-svn14075.0-45.el7.noarch.rpma1719d0d382fead78b1976c962eced28307ddb2303812482edc1101b4eab0a59texlive-datetime-doc-svn19834.2.58-45.el7.noarch.rpm7929aeb85cbd8344e21852d7b4c8ec7422598ea5f233315be28bbaccb0325011texlive-polyglossia-doc-svn26163.v1.2.1-45.el7.noarch.rpm9907fbaeb71b4aa947c4132788d79b5f38181d3be09c1bd189550c3bab5c79f1texlive-cns-doc-svn15878.0-45.el7.noarch.rpm2fabfb71f2e3fa36b7aaaff5f8f3638e18442c808a8f9054fcaf34554da64ef3texlive-overpic-svn19712.0.53-45.el7.noarch.rpm969bdb40f6e25b5313f8c2db5efd24d5d53b8c081865aa78a21185160ea565e5texlive-cm-svn29581.0-45.el7.noarch.rpma45600141e1f5b3bfc8bdd86c50103026ad94a505b5195b8f6694526e5c6af39texlive-beamer-svn29349.3.26-45.el7.noarch.rpm54ded66240e2fdd3a23c382eb65b19f88b971d8c42f3bc9cf2da3be49f5f39d9texlive-xkeyval-svn27995.2.6a-45.el7.noarch.rpmae892042993b07c3de06b5c7fc1dda195211506c192062ba092b55a54b0c6189texlive-pst-plot-svn28729.1.44-45.el7.noarch.rpmca6800e92d7b9f90a995f0bcd32835e2490eb4b1c5f0c9afcaf683a7e18700cdtexlive-subfig-doc-svn15878.1.3-45.el7.noarch.rpm63eeefc793cb66d2c5157e2694677407997d03123db2f3542dc45525b6a01d73SLSA-2020:1037-1Advancecomp* advancecomp: integer overflow in png_compress in pngex.ccmoderateScientific LinuxScientific Linux 7advancecomp-1.15-22.el7.x86_64.rpm080ae5091580e5f0529d3c4707a1d14e6d6b8c2137f86e347477d9f2aedda96eSLSA-2020:1045-1Lftp* lftp: particular remote file names may lead to current working directory erasedmoderateScientific LinuxScientific Linux 7lftp-scripts-4.4.8-12.el7.noarch.rpm121ae03fcd39c1932effcaef3230afee3096878ac399c867e2199225410fe5d2lftp-4.4.8-12.el7.x86_64.rpmfe0e2c48ef4259d3df169f7022ada35f15435b9db1ca41c4fc35e909e8652feclftp-4.4.8-12.el7.i686.rpmfe29e90148c072cdf36b4214dcfa98e3d3c2bd1bc3e47070bf2748f6849aceafSLSA-2020:1047-1Wireshark* wireshark: Out-of-bounds read in packet-ldss.c * wireshark: Multiple dissectors could crash (wnpa-sec-2018-36) * wireshark: DICOM dissector infinite loop (wnpa-sec-2018-39) * wireshark: Bazaar dissector infinite loop (wnpa-sec-2018-40) * wireshark: SIGCOMP dissector crash in packet-sigcomp.c * wireshark: Radiotap dissector crash * wireshark: Infinite loop in the MMSE dissectormoderateScientific LinuxScientific Linux 7wireshark-1.10.14-24.el7.x86_64.rpm516cdbef14d71817cb17086e18990dc5bcbe2dc94d003dbc716a854dfa566a03wireshark-devel-1.10.14-24.el7.i686.rpm8dfa2552fe0502309d90600d1069ab93078ec487f2d3e2b64c7465830b46b2dfwireshark-1.10.14-24.el7.i686.rpm349a5600321619f97a67a6bc17f265f04ede4fef00e1f3fef03c3c9e2e13570fwireshark-devel-1.10.14-24.el7.x86_64.rpmf6def1eeb45a5c5878d6b2a720e8ca1131164a20e27abce41c2f2dbd8e65e95fwireshark-gnome-1.10.14-24.el7.x86_64.rpmc74400819d815a6127f9870642da702166eef2a4a863577d9821ee9f32e5d9c4SLSA-2020:1050-1Cups* cups: Local privilege escalation to root due to insecure environment variable handling * cups: Manipulation of cupsd.conf by a local attacker resulting in limited reads of arbitrary files as root * cups: Predictable session cookie breaks CSRF protectionmoderateScientific LinuxScientific Linux 7cups-ipptool-1.6.3-43.el7.x86_64.rpm30321219fd0e834fd3e02d41d9e35c7bd6374d1226bddd73d5d1c4c90835f2cacups-client-1.6.3-43.el7.x86_64.rpmaee326fc52d7de87a5db127a99f11c47441d95a12296bcb98781d7d3622b4e33cups-libs-1.6.3-43.el7.x86_64.rpmc324fc9c255e9b29a610885beec92383e5d50ea3d17cb4ea992c80c726bc4c83cups-libs-1.6.3-43.el7.i686.rpm38e0ca48e591497d554d421288ca1eb6224c31cc4fb527cf2b74a25dda61b578cups-lpd-1.6.3-43.el7.x86_64.rpm622ff1449cd07bc9a24580519c45409d88a7d128e06bc70c2c7cd9010fcfbd0acups-filesystem-1.6.3-43.el7.noarch.rpmeaa47af47f18b8ec67943dc90377b5586fc337531c386387af094a7723aefd11cups-devel-1.6.3-43.el7.i686.rpm5299ab86d0d5fe29a42d979a18a65e4b80e6f3e292d0b80ba56b63a387ba44edcups-devel-1.6.3-43.el7.x86_64.rpm1d01c1807758623160a5955b6fd0d7460020cfa1dc152df347d3f23aea3b4ce8cups-1.6.3-43.el7.x86_64.rpm3e1ed8a149a19feb1a21cda20b7ba6c85ff32a721f06a9de2a2b5f212d0f89d6SLSA-2020:1051-1Libosinfo* Libosinfo: osinfo-install-script option leaks password via command line argumentlowScientific LinuxScientific Linux 7libosinfo-1.1.0-5.el7.i686.rpm3760b63e4738300d8f4a268e3e24b4f008456576150bbc77bf05d013b4cb4869libosinfo-vala-1.1.0-5.el7.x86_64.rpmc0a39d2fcfb662c0f873763d727eedb62ce16cb624d44052b827b8d8e8b3b828libosinfo-1.1.0-5.el7.x86_64.rpmc46df50f1634d79546b96f66b0a0319e3da3ef0589b5f0fdba5e511492f18489libosinfo-devel-1.1.0-5.el7.i686.rpma677b764e18a9f52406c8a06fd21eef2276683f210000ea9cdb21961d21342f3libosinfo-devel-1.1.0-5.el7.x86_64.rpmf9af81804295dfc445874d3f45b271fc85914e005047091429f9177e1430ba1cSLSA-2020:1054-1Mailman* mailman: Cross-site scripting vulnerability allows malicious listowners to inject scripts into listinfo pages * mailman: Mishandled URLs in Utils.py:GetPathPieces() allows attackers to display arbitrary text on trusted sitesmoderateScientific LinuxScientific Linux 7mailman-2.1.15-30.el7.x86_64.rpm4c6560cc837ccd4ba6fd04a80ea918cb45f8d6e9bbab48cf383ef98d46890c2bSLSA-2020:1061-1Bind* bind: TCP Pipelining doesn't limit TCP clients on a single connection * bind: An assertion failure if a trust anchor rolls over to an unsupported key algorithm when using managed-keys * bind: Controls for zone transfers may not be properly applied to DLZs if the zones are writablemoderateScientific LinuxScientific Linux 7bind-export-devel-9.11.4-16.P2.el7.x86_64.rpmea5b762f5baca5a109756607c81a631dca99ab90f52f9423957ab01a3d484ef0bind-utils-9.11.4-16.P2.el7.x86_64.rpmaace8f95ce403ddff5f197510c377ab98aff702f660f1fc8634492cb83884663bind-devel-9.11.4-16.P2.el7.i686.rpm712f0d3e2eccf7f978293b5cb9602ca0ecde951ea26400fb2d3e29ef00758256bind-lite-devel-9.11.4-16.P2.el7.x86_64.rpm8b03a36cd661507bb99d34d8e0e4ccd0c0bf7f7af4184e008644a849a6370ee5bind-export-devel-9.11.4-16.P2.el7.i686.rpm641e187e4a7f9535d88ce0feef4f46cce6712e86bcef0616328eed50cd365f41bind-pkcs11-devel-9.11.4-16.P2.el7.i686.rpm41bb108f63a5a354a05e3ab97ffe6ddbd1da7da58cb977034ea566b89057baf2bind-libs-9.11.4-16.P2.el7.x86_64.rpm34020acaa109c65d78d37007b574923be687851b6d3e292852e493a3d4e73d38bind-pkcs11-libs-9.11.4-16.P2.el7.i686.rpm3292adb152f80f5d640beedab26556b531d760cf82b8a3fcf18cb0723025ecacbind-export-libs-9.11.4-16.P2.el7.x86_64.rpm6c173d231a58494f95c220e33cc690e4c0614f3b71e7d5e5991a0cc200c695d1bind-libs-9.11.4-16.P2.el7.i686.rpm3eb7473bad7b05c936dc1c76cf5c2f5c9e04fb296eeacb360c0a6a057c9f8b48bind-pkcs11-utils-9.11.4-16.P2.el7.x86_64.rpmd419763c2c5e417c7b3ec3acabf281d5f2fec2838213cf30cffebb2fb0c99e9fbind-pkcs11-devel-9.11.4-16.P2.el7.x86_64.rpmcba3e5fb0491c7258cb3a19aca28d07fcdfde4810d8a48d95965be42616848fdbind-pkcs11-libs-9.11.4-16.P2.el7.x86_64.rpmd3c1252b6611a53f60d775e22523f1af9e6373cbd9289c0bb6e6a92ac5b1dc71bind-libs-lite-9.11.4-16.P2.el7.i686.rpm5602ca7f6e9d40561ac5bcca60b4c07257dc523d637b79e04118c3e2ffaa6672bind-libs-lite-9.11.4-16.P2.el7.x86_64.rpm5c0ef59031be1053a97a97c02a38c4fa8a657660ace78e408194e60bf6fab30dbind-sdb-chroot-9.11.4-16.P2.el7.x86_64.rpm228fe5018d67068d3d6490fbed461a403e2aef39d9374b50f0b397e9a0fa6257bind-export-libs-9.11.4-16.P2.el7.i686.rpm067ad5557a7166d6ae739135bcc887cb426dbb878edc35823d21da5fe95d0e5bbind-lite-devel-9.11.4-16.P2.el7.i686.rpm9c2e5ad684cfc4ed40779692817568c3dcce4d465f05a6e6c61ac47b835e07bebind-chroot-9.11.4-16.P2.el7.x86_64.rpm28c5d31d977c02549e7740b3a15f721257ea9bfe117d1409e43b2f51c131d856bind-9.11.4-16.P2.el7.x86_64.rpm4c8be268faf8a57adcc6235e074313c36cb63cecb2dfcb30ef0209f467fae598bind-license-9.11.4-16.P2.el7.noarch.rpm510c0d96cc175ddb6261248fb31556db49e5f23eab2ed423bff629db6c321d76bind-devel-9.11.4-16.P2.el7.x86_64.rpmbf36656b723c591e2652907a8c5e00a2f231f730569bcd4892c60be3529396b8bind-pkcs11-9.11.4-16.P2.el7.x86_64.rpm0300fcceb4551e69fc6c387cf4c5d96dfa8b6fbcc39395f8c5d34e9b815086c0bind-sdb-9.11.4-16.P2.el7.x86_64.rpm30a7ca3ca3c641f815d000d626b366dda84f581e2616b22dc7497bf1001b63e6SLSA-2020:1062-1Dovecot* dovecot: Improper certificate validation * dovecot: Buffer overflow in indexer-worker process results in privilege escalationmoderateScientific LinuxScientific Linux 7dovecot-devel-2.2.36-6.el7.i686.rpm3471b2af67be1c41d0df3d33f9f09f82164f081421d757375622ea733c62d0aadovecot-mysql-2.2.36-6.el7.x86_64.rpmfa5e40e146ef45f111f7f5d9667609784db3a946a6d5d66f2ad69be32253ad53dovecot-devel-2.2.36-6.el7.x86_64.rpm4e141672ec5797ea26c911891d44e7446fb90553f9fefa7749ac71b05b7af7f7dovecot-pigeonhole-2.2.36-6.el7.x86_64.rpm9b5a1c340971784ee8c0e5f64d7b82cf2417acc248facc8a21dfd8e458529de5dovecot-2.2.36-6.el7.x86_64.rpm8345133371a923a9bd6b155b64fb30508e917d46a375a362ca08047aab24446bdovecot-pgsql-2.2.36-6.el7.x86_64.rpm74d2556aace15a0243c5b30ea40af5fef33c17b8e560a12663b650d8887be32edovecot-2.2.36-6.el7.i686.rpmc23d960bf920b3ac7a70005c2802b692d0035648df9094816275cd1e6da511f4SLSA-2020:1068-1Squid* squid: Incorrect pointer handling when processing ESI Responses can lead to denial of service * squid: Incorrect pointer handling in HTTP processing and certificate download can lead to denial of service * squid: XSS via user_name or auth parameter in cachemgr.cgimoderateScientific LinuxScientific Linux 7squid-3.5.20-15.el7.x86_64.rpm15fc5ca999e8a13629671d1eebfa9ad54e6a2a84ef71417a692b163b52a2d7aesquid-sysvinit-3.5.20-15.el7.x86_64.rpmad77d33417d11d48fcda68bfd72354b4aeb974a3a7cd78138707c75153dddf69squid-migration-script-3.5.20-15.el7.x86_64.rpm743619611cd8c503214a741ddaf8ab78a9439f53e8d85b606a8a96bdb2c9f402SLSA-2020:1074-1Poppler And Evince* poppler: integer overflow in Parser::makeStream in Parser.cc * poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc * poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc * poppler: integer overflow in JPXStream::init function leading to memory consumption * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail()moderateScientific LinuxScientific Linux 7poppler-cpp-0.26.5-42.el7.x86_64.rpm121d38e13b1bec5c3d1dbe12e20f7d927faeed46153411e761be3dd2389f5107evince-browser-plugin-3.28.2-9.el7.x86_64.rpm41284fbc4a6721db87020b671c8f6ed0c6a230869cbe95702aa9073d767daffepoppler-qt-0.26.5-42.el7.i686.rpm57f944d40ce2664d5775cd7cc4b696e2d1a3180e076731295e18cdf3e3fe2cf7evince-devel-3.28.2-9.el7.i686.rpme2556ecaa99db1085d4d857e72487284a9f1357c69fe86fec5f6e5e925783ab1poppler-glib-devel-0.26.5-42.el7.i686.rpm59fdc887f5ca48f0aadd844f2c7a245fdc29a81d50b9936dc119881ee0f407f1poppler-qt-0.26.5-42.el7.x86_64.rpmc8561c93f6833df5e6290578dac9cfdbda8f6e7bc1167597737a9ed89ec267a1poppler-glib-devel-0.26.5-42.el7.x86_64.rpm68ffcab44ffc18c05a0e147d1ab2c8863da70cc5b09d9ed5ae4862855063dcb9poppler-utils-0.26.5-42.el7.x86_64.rpm646b7fe4c208dde5f7d115be14fabf3ad88ce7e6100419b46909dbb349b76a23evince-libs-3.28.2-9.el7.i686.rpm35475694cd6e27c3d4a3dd94c815b5530f7b28d4c5cbaf9d1ae7e3f80705675epoppler-glib-0.26.5-42.el7.x86_64.rpm86acd8c0c09f19c9f58414517171b14bcde53bea344d88120da4a56c8da615feevince-libs-3.28.2-9.el7.x86_64.rpm0fdbb41c14cd59c9532f66a18f00d9d06bb1fcb0979d1058e9b93a06e613e285evince-nautilus-3.28.2-9.el7.x86_64.rpmece61e44d447bfe2cf60687a385bed20b74f39aaf1824bed11d4ed9c1c189416poppler-0.26.5-42.el7.x86_64.rpmbcd114783b465399ee55b75330971eddcbf9a6bc0d740e44b0138179d7a8e2eeevince-dvi-3.28.2-9.el7.x86_64.rpm1b194752f2075e884891709178cb5ba22636c9c4151e433835821c7459f2ab82evince-devel-3.28.2-9.el7.x86_64.rpm5bc625c69197cffa3b45f0461d8048e1612a0c57be18d5232ba35063415feb90poppler-qt-devel-0.26.5-42.el7.i686.rpmaa670777ca20d7fb054e820369612825f8e323e7c62dbbff988393fc20f31436poppler-qt-devel-0.26.5-42.el7.x86_64.rpm6b6b21ea965a82e591a8597ae10dd362cf54464401b899db800ace5990d9fec0evince-3.28.2-9.el7.x86_64.rpm03461032243ca44b39915b468ea125b5b67f1eb1b8ee57064b38412f475d23e2poppler-devel-0.26.5-42.el7.i686.rpm8f0e15b6de84c046593322253939f4ecffbdfacb8a71db97842d4cc56e5c9122poppler-cpp-devel-0.26.5-42.el7.x86_64.rpmfed6077dd7185b610ca776ff5ff44515c7d1d2614cf56b7f1b35422b51531b56poppler-cpp-devel-0.26.5-42.el7.i686.rpmef0fb14d8938a802c8a7ea5829ee528f3b05351b95ec345fa2efd8da5c087042poppler-cpp-0.26.5-42.el7.i686.rpm1a0835bbab9409d741bda90b83bf75e735afbd882debbc74e87ab321eba8aa68poppler-glib-0.26.5-42.el7.i686.rpme5bd633d589369b80c07da8d5759ce49d4bc0468de2011ec5a7910cb397f584apoppler-devel-0.26.5-42.el7.x86_64.rpm65808c4480bdb4f8454ba467465fa2fe0e59b70be47ac223424278d61720a2e4poppler-demos-0.26.5-42.el7.x86_64.rpmcf8dbe9eb038ad8403b5f5197e47c325015c010fa4c6f650c73c62f67fa0073bpoppler-0.26.5-42.el7.i686.rpm49fdc6a357057025607e0104504715532b731c20dd6b241cd1b53ac7d80fd9f4SLSA-2020:1080-1Evolution* evolution: specially crafted email leading to OpenPGP signatures being spoofed for arbitrary messages * evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accountsmoderateScientific LinuxScientific Linux 7evolution-data-server-tests-3.28.5-4.el7.x86_64.rpmb9abf6a378985658960f3d9ecef7e9e6805063ce440ace25948d6fb290e48a05evolution-data-server-perl-3.28.5-4.el7.x86_64.rpm2df4f13c318933111156cdf76976f8e4f674847f30c382240a1f689ed0c255f9evolution-bogofilter-3.28.5-8.el7.x86_64.rpm49940792feda2897eef88d20ff914ed4b881d92a23af199423f9aeba4b08081datk-devel-2.28.1-2.el7.i686.rpm00705fdc88ab99690ec0190ae01ecb80b973c62a7c133431fa2d35cbed8ddcb8evolution-3.28.5-8.el7.x86_64.rpmb3680a62611426e31a5c37e818c8c90e108b17fd957dc45003f304328e7acdedatk-2.28.1-2.el7.i686.rpmc7737c508695ecbf235d2975c573f6a78bb26999499ec4f143f2f50e472a29d6evolution-data-server-tests-3.28.5-4.el7.i686.rpm5eba983479051e37adbd77b75d09c12a08eb49b1739c8ddd2269610d4f7c3b92evolution-langpacks-3.28.5-8.el7.noarch.rpm89508295c0fed11fbb83709d04a6b69e2d7c5403f045797c12067954c97077b3evolution-3.28.5-8.el7.i686.rpm05d5b7a4435491a11c6ab8f7246ec8be30f0c973ed4e07b506139aa831a920b2atk-2.28.1-2.el7.x86_64.rpm8daf64b509c18bf136c6859161f377e5c9e6ee95cc06b9b792b282bad9f68e91evolution-devel-3.28.5-8.el7.i686.rpmb5bb39ce515cb534b02a6470f3306ff674a9b63a06f6b8224c4af8837e8ecbdcevolution-data-server-3.28.5-4.el7.x86_64.rpmc4f18fad5a2815799ca64d34ced60bb5bf4c840ff1774aaab05ff8d213c70cd4evolution-ews-3.28.5-5.el7.x86_64.rpm092b71406f49af7fd2ea65b2001f45d5e11be4faa6653d53db201fba2fbf46f8evolution-data-server-devel-3.28.5-4.el7.i686.rpmdc6314cd177b5da004dcbe7ab7ca487f2208b51fe86e11ecce54f7b88487f95bevolution-ews-3.28.5-5.el7.i686.rpm057992b90c9ef7efcfc01bcf5b588c11f1008cbeeebd6b08db6f18a9572c70b8evolution-help-3.28.5-8.el7.noarch.rpmee15075c645a17203a06b77476425dea37be8e4f6ee68be6d5390dcd4356b175evolution-ews-langpacks-3.28.5-5.el7.noarch.rpm7be59e52f24ce0fdc41c4e8c7715286204e950900e626a998656aa74c633d81eevolution-data-server-3.28.5-4.el7.i686.rpmb428a74e3b47db49f6318947c5ff2522d62fdcc95f5738097874b0aedd2d48f8evolution-data-server-devel-3.28.5-4.el7.x86_64.rpm2c9aa5c3527c2e11567899e14ac8e4c06b8ec751e0866341a968de56836e5e1eevolution-data-server-langpacks-3.28.5-4.el7.noarch.rpmeddfb1078b409d6b1ba84242563fdc5ab2f7ef40bd24c2ca701296107d52d0b3atk-devel-2.28.1-2.el7.x86_64.rpm3a4d3dca41643fc93d26942c13cbc3988e3c2aa707b3db85cd65f3fc086bac6devolution-devel-3.28.5-8.el7.x86_64.rpm59b4700df32a1326efc0f040f38f8f785c4971cee88003c722e613dc2814e223evolution-spamassassin-3.28.5-8.el7.x86_64.rpmc241fe203203faa6b493c2c2a8691f270e680a133d995d6c7b778aba80d80020evolution-data-server-doc-3.28.5-4.el7.noarch.rpmd3cff7d0f6c2e4e3444999de40a155d745f1767179edc3feee30b90ddb83435eevolution-pst-3.28.5-8.el7.x86_64.rpm6126fa8c7dcc092d8a6dd202802c1af9fd00437ad4a6f3fa91eef16f4a00020bevolution-devel-docs-3.28.5-8.el7.noarch.rpmb6842fb5ae8079b2a04e26dedb47c3d6e2ca5d6d8a575bef0ead1b4d43515c33SLSA-2020:1081-1Net-Snmp* net-snmp: NULL pointer exception in snmp_oid_compare in snmplib/snmp_api.c resulting in a denial of servicemoderateScientific LinuxScientific Linux 7net-snmp-python-5.7.2-47.el7.x86_64.rpm499fa38c774703ff7d68d0d4b38c23eb5590a0bdbb7857ee7260c3e4567c05benet-snmp-devel-5.7.2-47.el7.i686.rpmc817c5c0514ab7fca11dc6091e244e6b6c8330c4a0cb3c24b415da17af156cb3net-snmp-5.7.2-47.el7.x86_64.rpm28b26ba4fd2e242f6bdd8c25a722c51b21976e5f619f4e8cb0b4aa2ee1dbb600net-snmp-gui-5.7.2-47.el7.x86_64.rpm36dfaf441bd764e98071607ec45cc204f4787342b0073bb59f351a648a572076net-snmp-agent-libs-5.7.2-47.el7.i686.rpm8064787472b2b75d1ddabb4f5cff53d44c450e3e32a67d919e2b4fac4a150ba4net-snmp-perl-5.7.2-47.el7.x86_64.rpm7dd1cc490224675bffe1de6363665dde53d760c650221f8c712b4208c987cacfnet-snmp-libs-5.7.2-47.el7.i686.rpm505c5dc74098375e00e7b2fe3cae12d23eecd0e3fa168bb907b9d9a3d5ceffd7net-snmp-libs-5.7.2-47.el7.x86_64.rpmf79a44eb802af957194710e4ebf8c2fd491125c1f20daa13e72016f2aa8babf6net-snmp-utils-5.7.2-47.el7.x86_64.rpmbf5ec2e12d1059a502d38815c8922d34fad2035e4de3a281e669af602fb25483net-snmp-sysvinit-5.7.2-47.el7.x86_64.rpma3923f4d96c21a728c58d2289cdc98bbb72be21d373d2ab7ae1d9987a384d886net-snmp-devel-5.7.2-47.el7.x86_64.rpm0bcd956c1c68ffaf3719d714fa5d489efc604454b60184532df9492c45518662net-snmp-agent-libs-5.7.2-47.el7.x86_64.rpm69bbf9da197ae36918431a7d7d5f06f10f388bf34942b23f8bbb8a184a424f81SLSA-2020:1084-1Samba* samba: Combination of parameters and permissions can allow user to escape from the share path definition * samba: smb client vulnerable to filenames containing path separatorsmoderateScientific LinuxScientific Linux 7samba-krb5-printing-4.10.4-10.el7.x86_64.rpm53d0573afe9a79e8c96d9aef9289a6d8c4a88677d4a21eee2549bc14c3cd48e1ctdb-tests-4.10.4-10.el7.x86_64.rpmac75649ada4eae94cf34d8502a7afe6ab30543d70a1664d077bb4bc22805c1e3samba-pidl-4.10.4-10.el7.noarch.rpm883055b12cb9e573a62a55a40ec1907e00e8cbef853fbf497e1a700aa95b55absamba-test-4.10.4-10.el7.x86_64.rpm8479cbe7e3c84fb608910656afbdea3ec4bffe2c0d7aabdaca69bafa88c54859libsmbclient-4.10.4-10.el7.x86_64.rpm78a0d451777470d759403e5de7b0bd0b216374f5483f1713f967d071b722b541samba-test-libs-4.10.4-10.el7.i686.rpmff3e175e498ff6d917006aca1c5bacd633b0de13b1aff27a9256749e3a9e9b87samba-4.10.4-10.el7.x86_64.rpm66b2990e8de91113bdd7321116861a4b05b9a56295ccbedc9deddc0348a63538samba-winbind-modules-4.10.4-10.el7.i686.rpm0df9974b4a88620005568a74899c7cf4473cf5144ca2977e7a2fabcac0d22c00samba-dc-4.10.4-10.el7.x86_64.rpm5f94a4d31cea4d1982d8ad4e7d45d17f37a46b58cb4adc108e2afcbbedbb4ea6samba-libs-4.10.4-10.el7.i686.rpm63f890eefe3034668807776dce328ba44c7bcbd1a8b11ea8fa3412a5eb27c293libwbclient-devel-4.10.4-10.el7.x86_64.rpm21c618625d66e5124bd312ab6df4610549a8d0ae2670c9a930722884dcccacb5libsmbclient-devel-4.10.4-10.el7.i686.rpmab2ba50b1ffdff623934488f7663c45bc11674dc9b788cb88ad4d56358287532samba-winbind-clients-4.10.4-10.el7.x86_64.rpmcf8e03ed35b2d97ed3891ca68759e12618e10f75179e89ebeb87fe3c5e183ec8ctdb-4.10.4-10.el7.x86_64.rpm8115ae02295060be774386779a92d6d22701c1b3d7d5577327250f7ae25b08d8samba-common-libs-4.10.4-10.el7.x86_64.rpmda217d025fb4980edb30611792b1eecf1e20c046318b12797f6684fcceef11cbsamba-common-4.10.4-10.el7.noarch.rpm7f9a7deb2e43292cb140ff30dca9cf1ff6c6afa7d24a033ce150528d71d89fb5samba-client-libs-4.10.4-10.el7.i686.rpmc1c8e54eedb8d97c63c9e533215fb1778558ebab32a316cc234b2934dd15b366samba-test-libs-4.10.4-10.el7.x86_64.rpm78b63fe2fdd4f426c8e979614aded3233bdce9308c7a0ad783821c2bf24cd560samba-winbind-4.10.4-10.el7.x86_64.rpm6801991917fe6efcaf54fe98daf4185812dbcb976d526caa4da4fc393261813asamba-winbind-krb5-locator-4.10.4-10.el7.x86_64.rpm0fb8dac3bdd9a24218f2c40beee8c309769d27310e247bd0a0e5351d8afb1179libsmbclient-4.10.4-10.el7.i686.rpma280eb0e2c8064053363a1b912088d64308fc1646e117dd76583376cb4884e98samba-common-tools-4.10.4-10.el7.x86_64.rpm4d2ab30dd98120b8e96b6841d03ea1c629e5b03ae3e3a45a1ef0c1318a85a30dsamba-libs-4.10.4-10.el7.x86_64.rpm42a12be20ed351ebc3db67124c37c9e42d3329cd8303486b230beab14607c0dblibwbclient-4.10.4-10.el7.x86_64.rpm7fa0e6a7231463db1cc613181116db2bc3ee977683dd9e37974459147deacc9esamba-client-libs-4.10.4-10.el7.x86_64.rpm2095ec5b4294c5ceb656bb65e3ce1099c07cdfe48baf2cff8b93b58c3f9586a8samba-client-4.10.4-10.el7.x86_64.rpmdd9a4759f07fc010d528d5634f658881556367bfd2c968cd2b97cae86a28324csamba-dc-libs-4.10.4-10.el7.x86_64.rpmd57365fea2b2b31729a96c0acd93795beb67a77c11478898630f8ac8c700428blibwbclient-4.10.4-10.el7.i686.rpmc03c40e65b49d6f2d31d4a630b6ef13533d146ffab37e3eaf75e8691bdbde3desamba-python-test-4.10.4-10.el7.x86_64.rpmf96873e815e6e3f0b0c1bff4b557a22ae42dfcb4b172cc7b464ebe418380dca9samba-vfs-glusterfs-4.10.4-10.el7.x86_64.rpmbe7529351a088a8805f7e930d60cf3dc2bf7503879bcdd84eb5b215a59466acdlibwbclient-devel-4.10.4-10.el7.i686.rpm0bad370e57a3f18f086cb21fd9c25433b69743a83221aa79d0d2e5aee722c80clibsmbclient-devel-4.10.4-10.el7.x86_64.rpmabe681e3bc08a47eb5b7c0e07674211263522c215e0c676d7fe36dc8d047260esamba-python-4.10.4-10.el7.x86_64.rpmb7881450727a1b2e72757905b359925b06f07cd08f2bd17e1285474b406f2c66samba-devel-4.10.4-10.el7.i686.rpm5fc48433205e752f74977fa9abbf1d00ecedfb32f7d43dfa16d09b2fbc1712aasamba-winbind-modules-4.10.4-10.el7.x86_64.rpm409453df31db84aa8931693a58977265d41450ad3cb08d26e4e1f60569e23e02samba-python-4.10.4-10.el7.i686.rpm1632d3e081a28a30bb69828036c810ea01ee19d3d2b29530908ece4ac583355asamba-devel-4.10.4-10.el7.x86_64.rpmefb546877d488c2eb6bf4ecbc514f66c3113a61bcf21ed8fb109ebfc5708e4a4SLSA-2020:1091-1Python-Twisted-Web* python-twisted: Improper neutralization of CRLF characters in URIs and HTTP methodsmoderateScientific LinuxScientific Linux 7python-twisted-web-12.1.0-6.el7.x86_64.rpm4deb200bc91aabc54dceed7d66c472df361801c1af3e8a823a86fd96d387cdfbSLSA-2020:1100-1Mariadb* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)moderateScientific LinuxScientific Linux 7mariadb-devel-5.5.65-1.el7.x86_64.rpm0047cda33f2efc1dce4f0c76b19a2e9a63eb29ef04c5ded8255d21557b43f786mariadb-embedded-5.5.65-1.el7.x86_64.rpme9bb6deb1e883401655611e95e363afb6255a586f29efb2335fec611a09292bfmariadb-test-5.5.65-1.el7.x86_64.rpmb34908f8c0904bbd6e018f1a6b22ea219bc38e590803abc5d98cdc455bd5f1b3mariadb-server-5.5.65-1.el7.x86_64.rpm515d62971a0808eb8d81c8dec7f09a4fea1d9ef6ec26d3cadc3679907da725a5mariadb-5.5.65-1.el7.x86_64.rpm68f2f930ac32009c73a644fa9098fcb7379df08922e7702807715dfc2871dc20mariadb-libs-5.5.65-1.el7.i686.rpm83af6331006d48207c991218185e7b8ee4bcdc3420cf4c47f71ec06a7021d800mariadb-embedded-devel-5.5.65-1.el7.x86_64.rpm820129a097711163246d52cfa974b000909e3fa0004e7ba39960cdfc0807920amariadb-embedded-5.5.65-1.el7.i686.rpm627a0688d9ed0e3651bbd49604f0c952006100b7908bb7aa9caaab5da65a5fcemariadb-embedded-devel-5.5.65-1.el7.i686.rpmdbab5781405e3f67745bbc4570aa69b4f719d8e25bf53a521c09fc79402de51emariadb-bench-5.5.65-1.el7.x86_64.rpm878f65b906a307bfa317125987c8315e147ae0937c2e7f6e3200f799abb8bbf6mariadb-devel-5.5.65-1.el7.i686.rpm1012b35b43c21756d79c896818bd52ab34ae934dea358ae26c5b518fd29d5505mariadb-libs-5.5.65-1.el7.x86_64.rpmf4b56655dc837d9d5da2a50e4b1ca99bc64c7eb08974a9931b67d652e9f1e803SLSA-2020:1101-1Bluez* bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth deviceslowScientific LinuxScientific Linux 7bluez-libs-5.44-6.el7.x86_64.rpmbbb64bf973fbcfff8f181ef9813a745bdb1809ee2ed96cda73f78db57cb88024bluez-cups-5.44-6.el7.x86_64.rpmd1b852098e290d8da8284c73cb4c498a7e8e86ef2ddb7945288a49de955e19e6bluez-hid2hci-5.44-6.el7.x86_64.rpmd081ebc590da1091f40e6f40c0ad951fde5481b5c38529a9ad1f8af036f7cd74bluez-libs-devel-5.44-6.el7.x86_64.rpm06bef872217dd3b32826dec6fd2aea0dc555797d7388e250ac0b05c8f8c220c8bluez-libs-devel-5.44-6.el7.i686.rpm715f60736b63be50b77e4157f6691c5b051d357750a4871caa179523a630835abluez-5.44-6.el7.x86_64.rpm4117a1c1e697f0fa4b8d7bdf9ca06aecab566fea9218cf1b08e2c88e841360ddbluez-libs-5.44-6.el7.i686.rpm067946753c4781370f874176b66c8f5c97dc03c57a30d8a9582508d21683743bSLSA-2020:1112-1Php* php: Reflected XSS on PHAR 404 page * php: Stack-based buffer under-read in php_stream_url_wrap_http_ex() in http_fopen_wrapper.c when parsing HTTP response * php: Reflected XSS vulnerability on PHAR 403 and 404 error pages * php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.cmoderateScientific LinuxScientific Linux 7php-pdo-5.4.16-48.el7.x86_64.rpm5896765672e4e0685c072077942889551debc9af29a6de4de7a7001ac0389e6cphp-mysqlnd-5.4.16-48.el7.x86_64.rpm524d82ace659534c74c56b0a73748c1c2d042fcd06532ae5e40323254cef603ephp-snmp-5.4.16-48.el7.x86_64.rpme4af2341e74a003d9eb3e83b1b5a1094f818f90b1f74145b7fbb2b24f3093802php-fpm-5.4.16-48.el7.x86_64.rpmc29a050e280bb102f15dbe2fa6210fa1e230baf89405d54c8adad1fc81223c8aphp-xml-5.4.16-48.el7.x86_64.rpm2d7578d80481bbc6adc8557c748c99628007502ecfb0cdf8f53841113d35f814php-process-5.4.16-48.el7.x86_64.rpmd9aed580d95c47c4355b6841e3990bc228f19e7c51b3ddba43504b3f9662fd10php-odbc-5.4.16-48.el7.x86_64.rpm3aff247e0beab1bca7a423286fbbf5ff3512901cb1ae478d94eb5a38ab515fb8php-xmlrpc-5.4.16-48.el7.x86_64.rpm5926f32a4fff5e4f35998c7b9d9c4c5142c429f05cfbb5c86379da1dafe361e3php-mbstring-5.4.16-48.el7.x86_64.rpm1ae23981cfe9c56853c4b93c48bcf1d0ea48136e5b9778e96d8a8a4b6e4e094aphp-pspell-5.4.16-48.el7.x86_64.rpm831e682dcb99aff8cb504c14f2ccdb608d3263928dc14c9d209f941eef6543c6php-common-5.4.16-48.el7.x86_64.rpm7c76fe8fe597ca87f6d2cea1920f75ee4d0be4f4008a40a357c9e4e1043af5cdphp-ldap-5.4.16-48.el7.x86_64.rpm52809ed66acf816918ee1c18d8880fcfc7e1d1ba771228407690ccd75a19abdbphp-embedded-5.4.16-48.el7.x86_64.rpm424508cde4c8f307d4bdd183b8614c656d41c6a30d8cab8e89191bd07c1ba263php-devel-5.4.16-48.el7.x86_64.rpmfdbdaae454f157ef08404e26ef8d2507cc1a31ac80b5012270ddd1530865c8b6php-cli-5.4.16-48.el7.x86_64.rpm455b62bfde65cc6ee6a8112035db06a64a18cc6dee527881905879ab050c2338php-bcmath-5.4.16-48.el7.x86_64.rpmc825e940d01bde8039f20b65fd64684112e4ac7519078e609b1a501982849cedphp-recode-5.4.16-48.el7.x86_64.rpm3378335b6c5e3575baf24cec6ebe7326edd6dc13310393a760cf66d06a05419ephp-intl-5.4.16-48.el7.x86_64.rpme917b511e746a4d90b2b31d4732062a59de60aac4b1f681e829fcf3e69759da6php-dba-5.4.16-48.el7.x86_64.rpmca1fbd484cf2d928c3e5145a7c908bd951b8dde4a5f3b931d0f4a69fe10790afphp-pgsql-5.4.16-48.el7.x86_64.rpm702e0026e9d0ae28adb32b6ab927578a101a9d77b3950f504dc5f2563faebf78php-gd-5.4.16-48.el7.x86_64.rpmfb479b448ecd272339b656b123612d0da7c949fd531a07c1b400b0073833e945php-mysql-5.4.16-48.el7.x86_64.rpmf99db8828f4103f81d9b003ff59d7243c16854b89555066f48cd17d2d91351f0php-soap-5.4.16-48.el7.x86_64.rpm2ce662c55974a7baba692b984da81c173075eeedf057a957b28000e6e568b6f1php-5.4.16-48.el7.x86_64.rpm15e82b4c083ee1a2e4640080ef75fb2cdf3830c806725a302401aabb5851d154php-enchant-5.4.16-48.el7.x86_64.rpme70239757c0406008c52d81ddcc13b675f24def6420bd9e58ea5e1c6f0431b14SLSA-2020:1113-1Bash* bash: BASH_CMD is writable in restricted bash shellsmoderateScientific LinuxScientific Linux 7bash-doc-4.2.46-34.el7.x86_64.rpm95ef57c39850b39ee7fdf031eacde80727ef4ab0b1eec82f0eb74793b121699dbash-4.2.46-34.el7.x86_64.rpm9f0be30f6cddf3a329d88fb0e2beafa3771a4d280afba721fea516deac7ba80eSLSA-2020:1116-1Qemu-Kvm* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()importantScientific LinuxScientific Linux 7qemu-kvm-1.5.3-173.el7.x86_64.rpmcb3d572587f522854dd88ea631e96b540892cb8ff88a2255e730ee8150fc0586qemu-kvm-tools-1.5.3-173.el7.x86_64.rpm90fbcec323bf2e378ed246dae56ac0cf4e2b8e5e1df5d2bcf504f8a1c6df932cqemu-kvm-common-1.5.3-173.el7.x86_64.rpm03ca92caea05c4f5986d2f2f5e03280de4ebd4b439212a308afc0cac41a63b77qemu-img-1.5.3-173.el7.x86_64.rpm6f4789f733a75a09c11a100113a544ad1900ffc22949e4e7b3e8f75e515caf0aSLSA-2020:1121-1Httpd* httpd: mod_session_cookie does not respect expiry time * httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values * httpd: Out of bounds access after failure in reading the HTTP requestmoderateScientific LinuxScientific Linux 7httpd-manual-2.4.6-93.sl7.noarch.rpm12cdeca3138ed890b721afa0886255c773330a579f2cc3ed7e80e44888270fdchttpd-devel-2.4.6-93.sl7.x86_64.rpma5bee07784e18148e5ef949da8e9cd061195e9f7306530498bff1ac464501b0bhttpd-2.4.6-93.sl7.x86_64.rpm2e4570bf4f4765a001119331184bfc605d5479c8e97290cd7b0cbff6a847eaecmod_session-2.4.6-93.sl7.x86_64.rpm18a44ac202b4df28605a327908ec6db4eb5d8922b3547fd141fa8df384cbe993mod_ssl-2.4.6-93.sl7.x86_64.rpm124c129fa5e5d5f5775bd92737b25220a15ccf3bd36528687bc9d7508c91d61dmod_ldap-2.4.6-93.sl7.x86_64.rpmebd54a294522a0d7523e75a91875c2edd3759f68cc134c2d6c2effd4537c0c62httpd-tools-2.4.6-93.sl7.x86_64.rpmeaeb1bd2f9f8b424234de782d6e7463bae07eb99e1bd77fe4bf371c4b9647d62mod_proxy_html-2.4.6-93.sl7.x86_64.rpm707a65fd80966ebb01f95a0053dc686c288be41a631d188848a965d8ea759df8SLSA-2020:1126-1Mutt* mutt: IMAP header caching path traversal vulnerabilitymoderateScientific LinuxScientific Linux 7mutt-1.5.21-29.el7.x86_64.rpm39516f21d38c9d5d4d3986de02f63b5b23b1d36457eab4b1d2e3393e312991a3SLSA-2020:1131-1Python* python: Cookie domain check returns incorrect results * python: email.utils.parseaddr wrongly parses email addressesmoderateScientific LinuxScientific Linux 7python-tools-2.7.5-88.el7.x86_64.rpm3e81921ce8bb619e287fa6cab340354e40a0b83bd130618435c00c838ea69f90python-debug-2.7.5-88.el7.x86_64.rpmfbeedbf6a9541721d22f516e78baf8701e80fa2fa0d2f0c327422a8e577dddc4python-devel-2.7.5-88.el7.x86_64.rpm5dda4bbb68d526f248c5c6280ac9b5b84a2108873b838ba3326eb975074ad9b7tkinter-2.7.5-88.el7.x86_64.rpm3526b706aa711de3b1b8f0139b1251adde90850ef35765b7215ff595cc6b325fpython-2.7.5-88.el7.x86_64.rpm461c0ab8b1ac9a37273d2b01b8d10e41db8cabd44c9f574d9dac138ff4e430f3python-libs-2.7.5-88.el7.x86_64.rpm2c35ec41f6c19b3f7a18d11c3e8e72b66b363d33627705b4bf00eb753d623aaepython-test-2.7.5-88.el7.x86_64.rpm059a0e6b642bdb785a9bfdb0485ed0e0b34736e939ed0468cbee916ba02e0cb6python-libs-2.7.5-88.el7.i686.rpm4ac80cb42b1ef46e03b66b7a894c3eb7baaa7803c799e1871058172463731892SLSA-2020:1132-1Python3* python: Cookie domain check returns incorrect results * python: email.utils.parseaddr wrongly parses email addressesmoderateScientific LinuxScientific Linux 7python3-3.6.8-13.el7.i686.rpm90873480e4cf053c5830ebcbaf1cbf7be5d247966581013642b609466b59231dpython3-debug-3.6.8-13.el7.x86_64.rpm9ea6a8d1a0323a1aea782c0e8c801ea4c30972d4962792fd1ce8e249bbb0877bpython3-idle-3.6.8-13.el7.x86_64.rpm7c3faf6828cd8cbfdc3b247357a6c3b944c9fccd2003342374d18a3aadce480fpython3-libs-3.6.8-13.el7.i686.rpm0cc3e332c302a97500459ce0434eb4dd518fd94c28fdfc151484a8df48f1e9c0python3-debug-3.6.8-13.el7.i686.rpm1bf8eef4d37a645d721364f252a91266d61a6e2cafab7a64e5af69dbf6ccde7dpython3-devel-3.6.8-13.el7.i686.rpmbedb00d3248cfb29da129e8b71ab8e38f8f3482d7d828ecd9c039296a87fbceepython3-3.6.8-13.el7.x86_64.rpmbc1b155507c5363cb52205db0ffe7de7448d73fd28480405b10fffd317237e0dpython3-libs-3.6.8-13.el7.x86_64.rpm531a291e1a1b122b0b974b57d0a19af7e4b01018a3195089f982106ddd26a424python3-tkinter-3.6.8-13.el7.i686.rpm47382ac2235bb762bb997128c859e0a165ccbe383b6d02819761c44bb30d599dpython3-test-3.6.8-13.el7.i686.rpm9d796504f40c63ab8f4e255515e3e4ca0b8f0dce9290411a2ee928a2cfda6ba0python3-devel-3.6.8-13.el7.x86_64.rpm95a96ddaffcb273f5615b90fe6cf9b68ee4de184fceedffd72f05482140c4b7bpython3-tkinter-3.6.8-13.el7.x86_64.rpm6c47b7b108ddef1c5a895b5aad03707e271e3baee4ea828bb9379693393a4ac0python3-test-3.6.8-13.el7.x86_64.rpm6c630d6bfed0d7de2b2eb8c0bc275aff333522b076c16947818ff1e5453cc39dpython3-idle-3.6.8-13.el7.i686.rpmfa561b0065e8697484ca06c7ce5b7b61176eaefc795e89e69e2877439c5207b0SLSA-2020:1135-1Polkit* polkit: Improper authorization in polkit_backend_interactive_authority_check_authorization function in polkitdlowScientific LinuxScientific Linux 7polkit-0.112-26.el7.i686.rpmd317cbf5c7fb21669a4c130e49585e7d2c2647f4f0a2d585d549d192fafc6c9epolkit-docs-0.112-26.el7.noarch.rpmd4840d1198559dd0c0b3cc7d63b0b31269023f6b662d229f711de0e2def4ff03polkit-devel-0.112-26.el7.x86_64.rpmb6876acdda54d5d4dc39c37ec4f2e36597ae7e2160355159777a7eec0da515b2polkit-devel-0.112-26.el7.i686.rpmbc2641a55094fe615b508dff9193f2ef6c405320b94c297b06aca35e7bd3130bpolkit-0.112-26.el7.x86_64.rpmcff0f34881c95204ad467248b5fe3a30e1184d18057743d328bbecce667c578bSLSA-2020:1138-1Gettext* gettext: double free in default_add_message in read-catalog.clowScientific LinuxScientific Linux 7gettext-libs-0.19.8.1-3.el7.i686.rpmcdeb6b97e2542ee0f9272f7c9e0894d336150300ad4a90acc422e49762096f2cgettext-libs-0.19.8.1-3.el7.x86_64.rpm01007120a818da1e3727c668a0b4b2066f789d3ae80aa69dec2985d5e8a7580eemacs-gettext-0.19.8.1-3.el7.noarch.rpm9eefcac5fac587e36cf3d4c82871eb6e702f0ebbe0a15f6de5321f7cacc91cb5gettext-common-devel-0.19.8.1-3.el7.noarch.rpmb659742d587b888316d8d5f34ede272bb8dc613d6caa6118c0cabf5b542cdf4bgettext-devel-0.19.8.1-3.el7.x86_64.rpm480e38d5bbc39a8096381a9770b83aef59506dfe55e359ea9bdc70c5ed7b2833gettext-0.19.8.1-3.el7.x86_64.rpmb6018a436c93c9b1b7f77a8bea3bfc4616679136b43af9a8585ab148945a546cgettext-devel-0.19.8.1-3.el7.i686.rpmfe533c1cf84dd8c5788fdbd0d2735ebd15b827ab9226c5ead9732f4f31567257SLSA-2020:1151-1Libreoffice* libreoffice: LibreLogo script can be manipulated into executing arbitrary python commands * libreoffice: Insufficient URL validation allowing LibreLogo script execution * libreoffice: LibreLogo global-event script execution * libreoffice: Insufficient URL encoding flaw in allowed script location check * libreoffice: Insufficient URL decoding flaw in categorizing macro location * libreoffice: Unsafe URL assembly flaw in allowed script location check * libreoffice: Remote resources protection module not applied to bullet graphicsmoderateScientific LinuxScientific Linux 7libreoffice-langpack-it-5.3.6.1-24.el7.x86_64.rpm9a788e93254d57d2e59070c06e71d1d81285e01de9c722b34a4bb6b3ff6608aalibreoffice-langpack-cs-5.3.6.1-24.el7.x86_64.rpm24b9f0c2871f18ef868da347e06424b5f35f436061b884cc7f972f3d4cef2752libreoffice-help-sl-5.3.6.1-24.el7.x86_64.rpm73098a84f00b1b159e7be909f97c87d8082185f032ca0b22e698f6a59e982a0clibreoffice-help-uk-5.3.6.1-24.el7.x86_64.rpmcf8b29c29c135bd26f7a9fad45529381ccf09a1bf150b6f8f612768169d8c5c8libreoffice-langpack-af-5.3.6.1-24.el7.x86_64.rpme4aae532a496177c153a1ee74aa8aca99969e01b56195d5c3950dcf9bd51a425autocorr-cs-5.3.6.1-24.el7.noarch.rpm299ce9793d214886f4b482a8c775b0188d50ca7cef1008f747dd25a66a7814b9libreoffice-langpack-el-5.3.6.1-24.el7.x86_64.rpm3b19bd4ab6d6e5ee91d3b5d59790b708d2bad92257b18f00fb948d510e1ab9aelibreoffice-langpack-sv-5.3.6.1-24.el7.x86_64.rpm24097662d5d5bd46145cebb52dce09cefbd729b98e807f988f28a860bdfc84a3libreoffice-sdk-doc-5.3.6.1-24.el7.x86_64.rpm417098918e24e87500c32775e92196cb657723823ce29d28d15035798122ef3fautocorr-sl-5.3.6.1-24.el7.noarch.rpmd913e451467673cc99ae79ec95155decac5ed42d90ce4a14796c17b090794b35autocorr-de-5.3.6.1-24.el7.noarch.rpmd1cc7f1413deae05b139df01958483a54eb2dde20e1585172220334f1e52297blibreoffice-emailmerge-5.3.6.1-24.el7.x86_64.rpm42f88b2a39335b48ee53afe68f9ce35cea068790e5cf7b5a69f584b41db7c17alibreoffice-officebean-5.3.6.1-24.el7.x86_64.rpm5f0dffa10f62be36642fa1369aef3748bc18cba98d1b329196107d8f25df72a7libreoffice-rhino-5.3.6.1-24.el7.x86_64.rpmf75f3a80f82778519bd9c76e528386ef2d359c883ac2d5ce1b21a24f982a2e7blibreoffice-help-gl-5.3.6.1-24.el7.x86_64.rpm7c322bf19f21073df1fd9cecc99f93a436f33b6fc10188f2c89f0e97cc2a0f62autocorr-is-5.3.6.1-24.el7.noarch.rpm49abc6bb9b9c0b582ae0fff15410efe8dccbb8292bdf1564f08a605ef403ba21libreoffice-help-lv-5.3.6.1-24.el7.x86_64.rpm37b89c7809f2be648e4a1f9a1aa9abdf6055d25395b70630e7c55819107a41f9libreoffice-calc-5.3.6.1-24.el7.x86_64.rpmbbdadbfab99a4a31972d9e78333366fbef7d719597aa8555cb98a74ff75474eelibreoffice-help-ar-5.3.6.1-24.el7.x86_64.rpm4b1d018dd52851e3065b120f6e11981f849aec8fdc7a598b1bb00ec6cf6a159blibreoffice-help-cs-5.3.6.1-24.el7.x86_64.rpmf7d446d591f4f3b5169c15bfce0a42eaaa54f0c697f23fded6edc41a04dedcf7libreoffice-help-nb-5.3.6.1-24.el7.x86_64.rpm1015a64a04740692490ebe68dadc5d75e5e9c0ddbcc468554c5704fb4f8c7d96autocorr-sr-5.3.6.1-24.el7.noarch.rpmd49d918c056ee1212e99835c9727c616f600bf229a783ac418ab6dfd1984cf1aautocorr-mn-5.3.6.1-24.el7.noarch.rpmf39bdf08382e42a71c2ecf44b34447d3a0efefcdef7b9c2890c3384e8db6d29flibreoffice-help-es-5.3.6.1-24.el7.x86_64.rpmb5431ba2f090c9c7d2695bd0f29ef591863d96cf9e8a6042dbba504478deb659libreoffice-help-it-5.3.6.1-24.el7.x86_64.rpmd2238f851b1f3e96ce52e0f1e0eb106648a41b6d2355ccd71735cf9e7cbeb0f5libreoffice-langpack-eu-5.3.6.1-24.el7.x86_64.rpm3e25b8440f36a2d8ecc07f157a6663f9526d950550c18be9c3682fbd4bc4620dlibreoffice-langpack-hu-5.3.6.1-24.el7.x86_64.rpmc01f089787f59834b3e38e003ce0f663badc0c2015b993ea31807c7aa76e22dalibreoffice-langpack-ml-5.3.6.1-24.el7.x86_64.rpmf4b4c58e2b8df5ea0ce8ccb3463dad6ebe33b42fc94e188c11d858052624cb0dlibreoffice-xsltfilter-5.3.6.1-24.el7.x86_64.rpm007199197d598f738bee3d0e9a9c6a27b278c08659b0ae756474f31fc4116608libreoffice-help-ru-5.3.6.1-24.el7.x86_64.rpm04706a6f31229bd7fcc3ebd6e513af45810cf46eb6d19fa8abd1e5a29845bbb6libreoffice-langpack-pt-PT-5.3.6.1-24.el7.x86_64.rpm5e2bb684454407f326688ce0b6c4efd12e93a0408d3fcbe56e90f145e55fed67libreoffice-filters-5.3.6.1-24.el7.x86_64.rpm3086628809a5e1a70b3a5999bc8cc071c21eee1c62b86be292d6d64a254a92e0libreoffice-langpack-nn-5.3.6.1-24.el7.x86_64.rpmdabdb32b391135b5ff6f5948b753169d9b2868c8782599a2cf2afa5ff39640e6libreoffice-draw-5.3.6.1-24.el7.x86_64.rpm7604c7400fc7c170c9aa97a80579e1ce184d723ced362de693171f2778e1dcd3libreoffice-help-pt-BR-5.3.6.1-24.el7.x86_64.rpm2b0dc76357201e015e461d065f8346f18f2469cb359b79be068f0f60e54c1c20libreoffice-langpack-fi-5.3.6.1-24.el7.x86_64.rpmafb6510d8824f3e6ca16dc2bf9b107141829e552da8e7324446ae82289db2b83libreoffice-langpack-fr-5.3.6.1-24.el7.x86_64.rpm826d47b00ac2a98c371a531a8f6e13702bd4b1ce650e97f415cb6e4aba46c1c9libreoffice-help-pl-5.3.6.1-24.el7.x86_64.rpm845b8312eacb97b0c8db1e6598ce97f264fa7ab6c59115528ee717e994b9c33elibreoffice-help-hi-5.3.6.1-24.el7.x86_64.rpm3fb0e27cef406b5f0d30512675337210bb077a66497cb315186a850b24849bdbautocorr-lt-5.3.6.1-24.el7.noarch.rpmf2d0bf2296ffff769a9edcce38fb60f1c53b430019190ad6578c1c3265686bdelibreoffice-help-ca-5.3.6.1-24.el7.x86_64.rpmfc7dd9fd8fd892a4fb02ecbf1514bdf6143d0b186ba090798e6cbf103e69fd6dautocorr-nl-5.3.6.1-24.el7.noarch.rpm8c2b55fc5350341e259dc91d9a9aaaf848d42efc70a379c4bf2780049774d533libreoffice-help-bg-5.3.6.1-24.el7.x86_64.rpm682b99ec150099ab0387542ccabcdbab825712eec853868efa25be459efeece5libreoffice-langpack-he-5.3.6.1-24.el7.x86_64.rpma8d356c541c4c9e68d0e9ff37d07742d6a720ce743097a09884206385d9414d8libreoffice-5.3.6.1-24.el7.x86_64.rpm5cb749784f39da86d14d9d0add8d462c6cf4e3a3fa8c4e203bba7ad4ebd588d9autocorr-ko-5.3.6.1-24.el7.noarch.rpm80c65bec811df6826acdfbb3b19dca040f67df9ebf0caf8c413893ed482926dclibreoffice-help-tr-5.3.6.1-24.el7.x86_64.rpm09210a0f3d1a8f0126f5b07bc30e40bb4372262e34e192dac40014860ef0595blibreoffice-help-ko-5.3.6.1-24.el7.x86_64.rpmf55e76d5c26c9f697a50df0fac804944ca190969627f6fe45ceaf7a666720e86autocorr-da-5.3.6.1-24.el7.noarch.rpmc6defd1f99af70599df18f9a986874264fbdcf351723fb308a315e78ec76026alibreoffice-x11-5.3.6.1-24.el7.x86_64.rpm0806a13ea01c851e1b177e4d8caa19bfd489f4dcb71585e8d3b4ea5aba334e4bautocorr-fr-5.3.6.1-24.el7.noarch.rpmbfe91d7e7d2b39570d21e3cb8172f2a7a9e05e18126bc55e7aec816a9a806619libreoffice-ure-common-5.3.6.1-24.el7.noarch.rpmc5780927929f8926f064d166ebd3f0a9f835120c74e76abed0d6088dcdf1b282libreoffice-wiki-publisher-5.3.6.1-24.el7.x86_64.rpm25d5db8bc90ae771cd9518a42c3f6a27732ea86049f22984ab38e625513e912dlibreoffice-help-fi-5.3.6.1-24.el7.x86_64.rpm35e6c6d0f966eb017350093253e4deb5b3598543d13e22f0fa315aa328c423c6libreoffice-sdk-5.3.6.1-24.el7.x86_64.rpm4eb09b555dd6920d11bc7581e8b4a0da9478e01a4b2eb549d63f6c31dab43191autocorr-pl-5.3.6.1-24.el7.noarch.rpm80429cac2618c9771950447719591c70eede4774433227de506d473a2bc91a5clibreoffice-langpack-zh-Hant-5.3.6.1-24.el7.x86_64.rpm786f519ce16829c638a88a73ec14daee3adddfd7dffe7105b027bddf425b556flibreoffice-langpack-pt-BR-5.3.6.1-24.el7.x86_64.rpm07e096b66fff94a7c05227cea698db7b4062f3688ef66e42a59960a84b4db0aelibreoffice-help-de-5.3.6.1-24.el7.x86_64.rpm024500059b6f129882470e48aa200f5041bd4ee7643f96f8f506ecf9d5fd5b4dlibreoffice-help-fr-5.3.6.1-24.el7.x86_64.rpmd57fa3eae653a05c3876a3291f8b063bcc13e5726d5cb65f44440bc8005bbe15autocorr-zh-5.3.6.1-24.el7.noarch.rpmbcbe611c9d71d576111b821a9b290e0072e3e0aa2772cd41fc7588461663d958libreoffice-pdfimport-5.3.6.1-24.el7.x86_64.rpm4dec42b02f162f5a90c5b6af23e6a62233d401b0a4fb6eb8b3e67737dc14c383libreoffice-langpack-nso-5.3.6.1-24.el7.x86_64.rpm9b0f1e4b8f51c3b4b438d14774dd1becd6e618dac079796da5d83e1d7ac49a14libreoffice-langpack-ca-5.3.6.1-24.el7.x86_64.rpm7af2e675a289e9c1990704d63cca049427ffdf15919ff935804c124d0bb2dc44libreoffice-langpack-th-5.3.6.1-24.el7.x86_64.rpm0c3c3bc906a971964d3f3f1bf0c749f888f2822b6eb1e1e1df941d7ebfeb19fdlibreoffice-help-ta-5.3.6.1-24.el7.x86_64.rpme0a859ee989313fda923518a2eac0c44762e7ed2ea99f65b47829ca12c399928libreoffice-ure-5.3.6.1-24.el7.x86_64.rpm987ba4c0583495b4d37d6bf6ff905578d4ced11ab0c28b2678170e4060aa5cf6libreoffice-langpack-en-5.3.6.1-24.el7.x86_64.rpm8d71a1350413c33ccbe2065c9056e514428ea22a0abe770ef9281729731545bfautocorr-sv-5.3.6.1-24.el7.noarch.rpm8a2a47ec463dc01c029b4546032e7f90ef868029b70b622e4251566087073c23libreoffice-langpack-fa-5.3.6.1-24.el7.x86_64.rpmbfa9e775280919906ccd1114396e1f22c850566e52bb7d8bbf69424351e5ed10libreoffice-langpack-tn-5.3.6.1-24.el7.x86_64.rpm9e073c169e1168e1e72304f9db9ef2592839d40b73e32b3e37d9ebc53b646659autocorr-fa-5.3.6.1-24.el7.noarch.rpm9e38568ace5bb858f36c18c436639488ae3a9e31dbe3d73f01a8eae46fe01202libreoffice-help-lt-5.3.6.1-24.el7.x86_64.rpm8b429122309425861e8a938e55c1fe98e25aea714e92f4b5827f6bc181be76ealibreoffice-langpack-kk-5.3.6.1-24.el7.x86_64.rpm901cccbccbc3f0555de929a9ce518cceab0a373dafcd9c407b5f59871ec91a7flibreoffice-langpack-lt-5.3.6.1-24.el7.x86_64.rpm8144bce9fd75403f23737f8d4e5780e974c1f1fd5a4cba28252a3e7aa68ce2e0libreoffice-langpack-nr-5.3.6.1-24.el7.x86_64.rpm721a0d21e9b6aa1a952a8305024fc131b3208f06ef1fd31df3e87fccbb0ba702autocorr-ja-5.3.6.1-24.el7.noarch.rpmfb0b7e58a379d673482eaadccf30572b3ea0cfd95a6eba85f27600a0d327222clibreoffice-math-5.3.6.1-24.el7.x86_64.rpme4d7f7209557e98d5b351478708b470c7c1edbdb9b2698f772b3ce4e2bf62a98autocorr-af-5.3.6.1-24.el7.noarch.rpmb21ff8c4c1d91c4d964eb64f65bd52209abe5618c2c781bfac35bad6eae666b0libreoffice-help-dz-5.3.6.1-24.el7.x86_64.rpm2ba081ea8b28d0fb572a37739682d75fff787411a14694b98cca3b1248a8139dlibreoffice-pyuno-5.3.6.1-24.el7.x86_64.rpm5cf4187e6407324d42c2011005444c0a99baafed3509c4821aa64bc03a0d4d44libreoffice-officebean-common-5.3.6.1-24.el7.noarch.rpm8bd2c92fbf105127ffdbd3f9a468e96980866698b5a261d3847fa12a7b9ff3f4libreoffice-help-da-5.3.6.1-24.el7.x86_64.rpm71f25eed108315a20f624f0addd207d37430e68f18ea6ffd6ce6eb1192432e01libreoffice-help-el-5.3.6.1-24.el7.x86_64.rpm6639e05d3b33d8b4ab2ccd69ccbaca672cc7fc989e187507d969ecfa10b33e49libreoffice-help-sk-5.3.6.1-24.el7.x86_64.rpm6b44f84cc0f245793e18f03425909edcb0ad6a4ab741486346c79a2c0fbbf3balibreoffice-impress-5.3.6.1-24.el7.x86_64.rpmdf04f34a22e9a47529c61db39b0eb61dd47e7c52b6218e94cde6622f07c5effalibreoffice-langpack-mr-5.3.6.1-24.el7.x86_64.rpm338bac6607a735d711a9fb562209e33791a65d654c76567e22258eaaddb52137autocorr-ru-5.3.6.1-24.el7.noarch.rpm0ae103992e552fee250648a2615f8b003c52a11c5137bee7b25fc69a0d37c2c9libreoffice-langpack-ve-5.3.6.1-24.el7.x86_64.rpmb3c11bdabd5507da475a5c0dcd2b588e186316b0f5ad9e550572916331a9ea68autocorr-tr-5.3.6.1-24.el7.noarch.rpm436f60f314abe288acc3b180c11ab9a02dbb84be9ee696f78d11638771ef93b4libreoffice-langpack-bn-5.3.6.1-24.el7.x86_64.rpm9654817ddfaf9a0dcab71ef910ccabb1ae12bdf332a2fc655b926513411ff052libreoffice-opensymbol-fonts-5.3.6.1-24.el7.noarch.rpm8a60652b772a694e5903faeafa77fdc7d60c96b729b2238e8db496e26fcff013libreoffice-langpack-as-5.3.6.1-24.el7.x86_64.rpmfed2d9e6e4e6a97ce6509f3efef1182fd9ef085dcc60ff1e97743e9173d2e90elibreoffice-nlpsolver-5.3.6.1-24.el7.x86_64.rpmff21d3eddb6884c8429e2236cc744c6e56d2c9a715d1ec2a8efb1c02f1593c0alibreoffice-help-zh-Hans-5.3.6.1-24.el7.x86_64.rpm6c1f6b6415f2da66fbf74ea664f7ffe647662e91c107ac25be96db16bd4acabblibreoffice-langpack-sr-5.3.6.1-24.el7.x86_64.rpm8aab575f96338044ccc6f235fcf0b9edeaf975f9cc37597d08a7b6779eef0334libreoffice-help-ja-5.3.6.1-24.el7.x86_64.rpm2de21480a0794a497e68e96a7fbf144496e293feb1d94c6de902923b1f23b3b1libreoffice-langpack-cy-5.3.6.1-24.el7.x86_64.rpme6f19af8a6193de4104552d38c75115173dd46c5172c749d0f267b923677b52blibreoffice-data-5.3.6.1-24.el7.noarch.rpmea5f9cce207e9424864ee50310bd7f882dec83ede9bbb8acb70170e3b91ba970autocorr-hr-5.3.6.1-24.el7.noarch.rpmd142151dc23140ffcf14fd10696125f579a4f2dd9d7c11733c3b311f5aae5508libreoffice-langpack-es-5.3.6.1-24.el7.x86_64.rpmf3eb9168fea9a8d6fc59e42aac00389926da96027fd38a5e973d4d0c4e865f65libreoffice-langpack-ss-5.3.6.1-24.el7.x86_64.rpmab2977d1dff078f0b9ce6e6e5ae3b34ef5f6388fd7b12abd47fc95d5d5695f77autocorr-bg-5.3.6.1-24.el7.noarch.rpma5dfd33897637fa782a54a994d02f7ce50099677430451a411da127920786e74libreoffice-langpack-sl-5.3.6.1-24.el7.x86_64.rpm8276569bd65cbde23b325db50b74073daf8d60cb97add93ae987740883d735d3autocorr-ga-5.3.6.1-24.el7.noarch.rpme5a950597cac8427d62e966ac7766f60ca0a37d332e106d4d0b42d0af8f61f7blibreoffice-langpack-id-5.3.6.1-24.el7.x86_64.rpm6d44329c56e2a1de2ea7ed7cf3e1b3917d8cd9229d36797abbdf4c6ff91147b2libreofficekit-devel-5.3.6.1-24.el7.x86_64.rpmbcbf08a985ee61fbadc20dbaa0ed34f3a0dae828911f414f6843c87976b8f5ddlibreoffice-help-eu-5.3.6.1-24.el7.x86_64.rpmb24a4683793d598c3c681c2e1936dae895491c47cb37667df87a100c6cc0c94flibreoffice-langpack-nl-5.3.6.1-24.el7.x86_64.rpm2944587901292b1dec1fbebde652b9352db15984713a3b2923257a6650d9e9d4libreoffice-langpack-hi-5.3.6.1-24.el7.x86_64.rpm5a019acfd02092c65b66020dace2ab640bc14fd0ea126747ea4f74440bec4740libreoffice-langpack-ar-5.3.6.1-24.el7.x86_64.rpm93040c51622886d8b6e702b7ac065b0efb89e5c9fb9e1032d717f020b698017flibreoffice-langpack-ts-5.3.6.1-24.el7.x86_64.rpm53a7a808b2641dcfdc91f4ebf85d6aab30800279c4b4417a125e0a6f0203188alibreoffice-langpack-xh-5.3.6.1-24.el7.x86_64.rpm7e46d1a5e2e7e928cd34ab41425a1001efd3602da0cc425601af3eb300990fe8libreoffice-langpack-gu-5.3.6.1-24.el7.x86_64.rpmf13b0a914061853f69df82ead1686c4c63a1fc8552ea319ba3719e9032b48d91libreoffice-postgresql-5.3.6.1-24.el7.x86_64.rpma5450fcf613930041d5e27c6baa7dd119d23f0a8f7a211200631acc6fa33018blibreoffice-langpack-mai-5.3.6.1-24.el7.x86_64.rpmca4b1f87cd163c452e2f7d94035f251b4553569da5c0878e2aef48e089e2f3d8autocorr-sk-5.3.6.1-24.el7.noarch.rpmd4d421a3d1f7d36bb2309fb945596997cfa424c3f30d6187d39e038b05ecb494libreoffice-graphicfilter-5.3.6.1-24.el7.x86_64.rpm8695b35b39400411015104d4c26fa16b0c9eeb4bf1b1e6722ac1fcd318ad655clibreoffice-langpack-ru-5.3.6.1-24.el7.x86_64.rpm7e7e10dffe437d114d9183026fa5fd766453aa01d02f034661ead04a26f192balibreoffice-langpack-de-5.3.6.1-24.el7.x86_64.rpm962c872aa525fd8ba6c6074ce74d8c95252f5517b348c33b03ae73dae8829baalibreoffice-langpack-bg-5.3.6.1-24.el7.x86_64.rpme3b57507e67daeed89deed6ac86738297ecafe94964eeb68caa492e582ff1077libreoffice-langpack-si-5.3.6.1-24.el7.x86_64.rpmdd92b2ccf3411ce7c93246fa43f065006a8838f398e812104374f7e9731364bdlibreoffice-gdb-debug-support-5.3.6.1-24.el7.x86_64.rpm97dfecff60f00b5219972597f6b042e96d33575f283c3221d3bb6a7a5ae77f74autocorr-ro-5.3.6.1-24.el7.noarch.rpm07cb201d4a21335c398fc8a27b1aaf10db29819f1c64c42cd7319069ff66d063libreoffice-ogltrans-5.3.6.1-24.el7.x86_64.rpm45ae7b684926956076c524b101a618037f68f9a611e7e141dde68d0ba7095101autocorr-vi-5.3.6.1-24.el7.noarch.rpma288a2bbdc007e6fe57eee2885b3b4925667e45f7af0e950da0fc3a41740f10alibreoffice-langpack-ro-5.3.6.1-24.el7.x86_64.rpm5b6aa371fcffc5dcbf41270dadcfe2578788e5852fe0d808b8098be08c853dc5libreoffice-writer-5.3.6.1-24.el7.x86_64.rpmcde95738a1488820a3fb659b5a27ea0fc83d40687ad0b2266abf117b519195d5libreoffice-help-et-5.3.6.1-24.el7.x86_64.rpm31c2fbc3511010d609cabea5be5e70534e226c779e6291fc68d936ebaf30d755libreoffice-help-pt-PT-5.3.6.1-24.el7.x86_64.rpme6d61128a202485387c3d4bd7edb0c3927c1b9de4780df8dc9ad1bb4e994286clibreoffice-help-gu-5.3.6.1-24.el7.x86_64.rpm46719f24dc48759fb4af9af59049842afec4a303c7d6c756a5a85e379a7c801dlibreoffice-langpack-sk-5.3.6.1-24.el7.x86_64.rpm055942952eaf6fa8b93c31075747bd13a91cac2bf2eaebe7266427df233e09b6libreoffice-librelogo-5.3.6.1-24.el7.x86_64.rpm6aa4cc57c1b564dbab5e596599e2e0744db1ac64ecb5e0b38bbf2a2115ed63ccautocorr-ca-5.3.6.1-24.el7.noarch.rpmaf9faad1a7291878b9dd564947904ab29f974ef0e622ce7c6eef2fb6ffe48680autocorr-lb-5.3.6.1-24.el7.noarch.rpmedd774037e0f2dc89d77c6dddbc33545039d9da5ff5eca4e09ca3fdc4aa29bfalibreoffice-help-nl-5.3.6.1-24.el7.x86_64.rpm7240a2abc6a68386c6d084ab549282b9472dca19524cbe806b67c403263dde7alibreoffice-langpack-te-5.3.6.1-24.el7.x86_64.rpm76001e59e198a09b25e0998bc371c778ad1883bc24ed626815eea3131342d483libreoffice-help-hr-5.3.6.1-24.el7.x86_64.rpm1b1cc20a954237dcb092f10798132f71a9c09600874c794e3b9daf075684145flibreoffice-langpack-ta-5.3.6.1-24.el7.x86_64.rpm517cc8c5b4807a39fd49e552f201c3dc5c67623322e45ca380ba8f24c32f8743libreoffice-gtk2-5.3.6.1-24.el7.x86_64.rpmd39d2cfdc2a08e68065d70238b3371d91bb3a916d03b27616cdd3bc26a599932autocorr-hu-5.3.6.1-24.el7.noarch.rpm12bb4fc9a8762df0d1bbc35829d8f53069e70f64562a03e7a991aee341ae9a1elibreoffice-langpack-gl-5.3.6.1-24.el7.x86_64.rpm3af463f4cfa0c4d235c2212f838d525c2782de2e0f38d4918f01fe78777655a5libreoffice-langpack-ga-5.3.6.1-24.el7.x86_64.rpm56617f04aada8ddb2aa9e015502b72b0d15c38cbe49f28a046ce394a84e90786autocorr-es-5.3.6.1-24.el7.noarch.rpme5db2a814b4867932cda29b283cd41eb20a40840e423774822833190fcdd2f3dlibreoffice-help-ro-5.3.6.1-24.el7.x86_64.rpm194d0ad9d6752af94bf44b33e4dbcfceab5742b8304efa19989f764a535f8a64libreofficekit-5.3.6.1-24.el7.x86_64.rpmdd043bd6d1043ffcc2f0cb57046af93f89eb1da5f4ca9a8f19a67ab1bdd0876elibreoffice-langpack-pl-5.3.6.1-24.el7.x86_64.rpmbd5849a6b2f525a80edeb750dd857a4274ca81354f9cae2640e6764e7a8e58bdlibreoffice-gtk3-5.3.6.1-24.el7.x86_64.rpm46dc01b2cfe2956b52bbb1ef0b14aad42c12233fc1f556403db0a6389e58d52flibreoffice-langpack-kn-5.3.6.1-24.el7.x86_64.rpm02eeabfd2981a3842802793283bf99bdf11488e08dd8254a32ab4500254ca331libreoffice-langpack-hr-5.3.6.1-24.el7.x86_64.rpm1449e4b794adecc3213e93d06ec548540eaba6fd38f64d2e4980c957a3b6f93elibreoffice-help-si-5.3.6.1-24.el7.x86_64.rpm9d96906fb83c921cbcda6ec1f0c9001e217913992a7021b6e423e7cd0778ec66libreoffice-langpack-et-5.3.6.1-24.el7.x86_64.rpmcc9e551acd26c4ea2160152b3fba3164be962ad1e521319f210efcaa6be2538clibreoffice-help-bn-5.3.6.1-24.el7.x86_64.rpma71b84c8ba805ab88f95db6a0e7a40cddb723e461e1e082ada3c4923eb07ed1elibreoffice-core-5.3.6.1-24.el7.x86_64.rpmc204088f44b85f2bde69620c2dd6218adabf4dbd50d1bdb4fc2b562232ab82a2libreoffice-langpack-lv-5.3.6.1-24.el7.x86_64.rpm8a23c2846d66378a5c317d1c28a5b98b97bd3aad9fb8578bfa860d9a49b2ed6fautocorr-pt-5.3.6.1-24.el7.noarch.rpm1bf9ef155abf6ab801c864c61439bdeea983146c1e584f0e197c584d5e9d7fa2libreoffice-base-5.3.6.1-24.el7.x86_64.rpm5c63e996584dd975709ae00a53781b5f7a25d87f6d434db3315955d04ffd98f2libreoffice-help-nn-5.3.6.1-24.el7.x86_64.rpmf99de9154d1cd340f93311cc619fde7e71b6f6a8dbd307ba4dd9632699b4255elibreoffice-langpack-zu-5.3.6.1-24.el7.x86_64.rpme6a06bf0fc4ef139b3ddc594ee9ea6eeffc2d556b5d7ea86056787a34531ed84libreoffice-langpack-pa-5.3.6.1-24.el7.x86_64.rpm9d8761d593055fceb525515380904ac897ab83463b74e82bc23df53e25981816libreoffice-langpack-nb-5.3.6.1-24.el7.x86_64.rpm0bed762126ac3c8832eda580633ad54d58ffc39dc409a523ed8143cce242cb87libreoffice-langpack-ko-5.3.6.1-24.el7.x86_64.rpmc05c8d1516c20a1326324e054af6430e5bdb9d85c1ac5ae8816cc0f3a1f361belibreoffice-langpack-st-5.3.6.1-24.el7.x86_64.rpma497ac357a5115d3b44be3b7ce7de09363c84cefc14e68bad080691b1316c80blibreoffice-langpack-or-5.3.6.1-24.el7.x86_64.rpmbefcb6d9c59b64f896d3c0e185fe72f8f9a5e22dc290590012fabc45db203bf5libreoffice-help-sv-5.3.6.1-24.el7.x86_64.rpm70d318447345833a013d2446aa9f614e3d965eb4266c52ee52879dd3d0ab6f01autocorr-it-5.3.6.1-24.el7.noarch.rpme5a3d3ef8a458478c0c72ded0fd45a169583e0ddb67f32852823403917ac47c0libreoffice-langpack-br-5.3.6.1-24.el7.x86_64.rpm9a98cc9e40744ec15b1f81495600f67148e81056679265e55bfcadb8281e0aeflibreoffice-langpack-tr-5.3.6.1-24.el7.x86_64.rpmf836ec1da7411fc990a9612d8bc4b36df0a522f1eb2e968e1a03fe7756354232libreoffice-help-zh-Hant-5.3.6.1-24.el7.x86_64.rpmc19fbe21b45e65ec96d562ff722b97ad7806a516079d534ea5e9aa16157e0181autocorr-en-5.3.6.1-24.el7.noarch.rpm0731199ba48841cfa0d51564f066e5be675503f70422457c68b4dd923642225clibreoffice-langpack-da-5.3.6.1-24.el7.x86_64.rpm59713b73de96f6b8b83e18e15191463640770c045a857927c591e0e43d6ed621libreoffice-bsh-5.3.6.1-24.el7.x86_64.rpm2fa91c3b860730adc647e2bab34d5211ef807c856aa231c4e819a250abe30ddflibreoffice-help-id-5.3.6.1-24.el7.x86_64.rpm3a55b6672c42bdc09e6e891d2f2a25ece93b865578cea7d2081871fbfd4ee8d3libreoffice-help-he-5.3.6.1-24.el7.x86_64.rpm960d5f670778be892cc24c24b29057cb88ba0df2e7481f44d8ba75962877fb0dlibreoffice-langpack-zh-Hans-5.3.6.1-24.el7.x86_64.rpmb0616a26785d5674dad0e00286ed29bc91a67ada4bd4f72d046350d819f7f485libreoffice-langpack-uk-5.3.6.1-24.el7.x86_64.rpm698c5389e87773c3d54d475f4923f2764ea1edcf72e6e491e2e3e0cd58a95ca5libreoffice-glade-5.3.6.1-24.el7.x86_64.rpm58a8bed6cccd72e676801962ad413edea608fa2a2befcfedc01255c007ba6834libreoffice-langpack-ja-5.3.6.1-24.el7.x86_64.rpmf3737edf3792b9d39868abb60beec55d5a5b068968133ed43bc7cfac3ac97d60autocorr-fi-5.3.6.1-24.el7.noarch.rpma75dbccf0df3d1d66f35c931a5359575affd657ac136bfad640284ae259db797libreoffice-help-hu-5.3.6.1-24.el7.x86_64.rpm3f6bd5114d256ca8c0c2c71c2f226a79fd9f78fca995e452cb28ac67c29f3cf2libreoffice-langpack-dz-5.3.6.1-24.el7.x86_64.rpm66db4a0122caba8c01c2eedb3983883ebecb6ac8bf756befa2ca89ead3fa7ff3SLSA-2020:1167-1Nbdkit* nbdkit: denial of service due to premature opening of back-end connectionlowScientific LinuxScientific Linux 7nbdkit-plugin-vddk-1.8.0-3.el7.x86_64.rpme2cd1b3993d20f1bae2b01bb977730d6527c71f943c55e7e408c9b94f2b5b956nbdkit-plugin-python-common-1.8.0-3.el7.x86_64.rpm0d32a05782c76faadf4c42c3580ee4dc8752b7b9bddc12b71f311d5ad8b6bc9cnbdkit-devel-1.8.0-3.el7.x86_64.rpm6722148017e193300c356e1d9b5bfa36bb06ef3ff6c031529d94f596bb767b79nbdkit-1.8.0-3.el7.x86_64.rpm0b8b38a60728ba26889cbcdd3e64fcf7430cac2ca0f78585294d20eeb72e4516nbdkit-example-plugins-1.8.0-3.el7.x86_64.rpme6a7b09dbc82d349c92ac76c6f4d5306b863d785bad4ef7254aef35e8250e2bbnbdkit-plugin-python2-1.8.0-3.el7.x86_64.rpm1e2de9cc4cc3944070b79429d5bfbb25300a7f8dd3062af9ce9ca2146114f6c7nbdkit-basic-plugins-1.8.0-3.el7.x86_64.rpm37917595a7f0955f954a67bb55c5e5599792722a2f843fb9114412589882e56aSLSA-2020:1172-1Qt* qt5-qtbase: Double free in QXmlStreamReader * qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp * qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service * qt5-qtbase: QImage allocation failure in qgifhandler * qt5-qtimageformats: QTgaFile CPU exhaustion * qt5-qtbase: QBmpHandler segmentation fault on malformed BMP filemoderateScientific LinuxScientific Linux 7qt-4.8.7-8.el7.x86_64.rpm79cdd873ee3d50763a260f55fba368b0141870f6e0a3481932ebbfd61f47e66fqt-doc-4.8.7-8.el7.noarch.rpm78ff8c50509a36604254dd05330601458f4caad6e89b616c778978df571ca4cfqt-postgresql-4.8.7-8.el7.i686.rpm1b1d48152d96192d5ff660f347d66969d011690eb6b9be5fb5dda10f74b25922qt-devel-4.8.7-8.el7.x86_64.rpm388c3b2fe1da065a8336753ed69291e65ced3e9015b49c3330daee528e49dd3aqt-x11-4.8.7-8.el7.i686.rpm15b890d9fcd1e7af77df7a08fe5aa1e0bfad82ce4e4545ada61636ce16bfe868qt-mysql-4.8.7-8.el7.i686.rpmb02eafd4c53c58fa6dfccf7739c92f331e986cc91eae6556164fbb1e64ca22c4qt-odbc-4.8.7-8.el7.x86_64.rpm1237ce49b54ca542baa37096687b1cdfa386987a19115f2160432c1a933092bcqt-qvfb-4.8.7-8.el7.x86_64.rpmf52d65f5151cd52696835eeedd8e039e8c63401ac5c823cb32dbd872cd3f6c94qt-odbc-4.8.7-8.el7.i686.rpm318114429841232f268636293b6afe1725948e49f80fb81ba0d907d22b6781c4qt-postgresql-4.8.7-8.el7.x86_64.rpm4e582a8e6f99b584d68064ef4ae0132ced8c22c270eb4b01b675c8b2f5e20460qt-mysql-4.8.7-8.el7.x86_64.rpm63a3ec807e7e67c9ec1ebb4be6be598d3230f6a88145fd180e5290c745939b27qt-4.8.7-8.el7.i686.rpm06ce85228c0eb6a4575842e8dfc38a0d8108343a8d08678b5f2b0270c5e49714qt-devel-4.8.7-8.el7.i686.rpm72aeba1b617cbf06a4147b5f77188d6af9c43732aaca79277873784478648cdfqt-examples-4.8.7-8.el7.x86_64.rpm7c3bd5d755119f41157b891839cbd29bd9b5bf890785e5c5902f7eed58cbb7ddqt-assistant-4.8.7-8.el7.x86_64.rpmc1fb351e6a9ae76643a3e3ace078b9053858d537fa593d7afddf2fd7f4a25d58qt-config-4.8.7-8.el7.x86_64.rpmbe4ade249a93a40c4bd67c879ccd254d3b343b0b9ae30f1976dc8d50e76c432aqt-devel-private-4.8.7-8.el7.noarch.rpm396dd64d2a8265c49ce4c6fa9a921141e49076fb168bc28b5c1e2d382f4b67e7qt-x11-4.8.7-8.el7.x86_64.rpmf32db3715612f38c4b2fe8a80591ec40716b3bb9aef967bbc81d56eeadd0d36dqt-demos-4.8.7-8.el7.x86_64.rpm49792f727a908765683f41a9eb66be65e253bb5bd9545a9eb297daed4cc2f11dqt-qdbusviewer-4.8.7-8.el7.x86_64.rpm7abc2f54a53953f0560a3d8c67218ca49445634d1ce59df949fa405bff7e8467SLSA-2020:1173-1Okular* okular: Directory traversal in function unpackDocumentArchive() in core/document.cppmoderateScientific LinuxScientific Linux 7okular-part-4.10.5-8.el7.x86_64.rpm72f07b485044422f7332defa1137720553f9f3e3b46075c14459afb92359c4bdokular-devel-4.10.5-8.el7.i686.rpm56c0b82557aad934482c70ea694c10df6b1daaf81a3608340b38450616cef775okular-libs-4.10.5-8.el7.x86_64.rpm3b8b75fde43459df275e6b74cc406e53ee84960c1037311a29fc26d0a2d7dba6okular-libs-4.10.5-8.el7.i686.rpm6b3c19b0c3776ef5f28c48d08a4be0cd9011e875c270c0a6dc4e7eceedd21e30okular-devel-4.10.5-8.el7.x86_64.rpmbb9338b0661efa6124dbaffb257c0ea48631f803849e49d93bbc3d0c0d6ec709okular-4.10.5-8.el7.x86_64.rpmc09c3774fefe80794af09098d51af3e301045d2f5da88434c48e5cfc1fd50cc3SLSA-2020:1175-1Taglib* taglib: heap-based buffer over-read via a crafted audio filelowScientific LinuxScientific Linux 7taglib-doc-1.8-8.20130218git.el7.noarch.rpm6ea08f0b9fa734f25558f4040e38684c9b309a09f7cceea2334c69176ac15b64taglib-devel-1.8-8.20130218git.el7.i686.rpm963cd3113710c986d6e282a5f73d5de07ba0065e9ca8ff283ab0b68c3275151dtaglib-1.8-8.20130218git.el7.x86_64.rpm20583449743a7ba18961aef7a16fee865a301890a88b57320f28202be844add5taglib-devel-1.8-8.20130218git.el7.x86_64.rpme20449b0b066f6b81575290a5d7107df2f8202b51d59f50b59f30a6e876589d0taglib-1.8-8.20130218git.el7.i686.rpmf5280a8ad2b4602a453ccfac9133484ee9140ecfd11cb749b605024ac0074a29SLSA-2020:1176-1Avahi* avahi: Multicast DNS responds to unicast queries outside of local networklowScientific LinuxScientific Linux 7avahi-libs-0.6.31-20.el7.x86_64.rpm7cb2f10f045899b53133750c03ac7224dcc35f9ba7837a77b6689fda6ddf333aavahi-ui-0.6.31-20.el7.i686.rpmf9f2d35c751fca490764b3691f6c46b349d7a030b96c7e5d1426f1e5bd37c349avahi-ui-tools-0.6.31-20.el7.x86_64.rpm1e74dfea1cb7bacd3818a2a0c5bfce14e834efd6377aeaf40778c426280d3accavahi-libs-0.6.31-20.el7.i686.rpm2ed4282b30a8f017ac3a691760e6c5077308c7e0a846ac4f581059ee3f62e232avahi-compat-libdns_sd-devel-0.6.31-20.el7.i686.rpm1321310d311dfff88f53696a108fa8b3d7e4c2c642a366570e8dedac7bef434bavahi-0.6.31-20.el7.x86_64.rpm2e8b563077167e0599910ec1aa6d566f65934add557b538e0969390bb4f3ff56avahi-ui-devel-0.6.31-20.el7.x86_64.rpmdfe29fccd67b260c8ad1483a0a7301f5da57195ad0ca09cbf8ca9822ade18838avahi-glib-0.6.31-20.el7.x86_64.rpm00b323944b3cc135ba7f9753d72fad02484336457ca7c5caac5ac74130a512deavahi-compat-howl-0.6.31-20.el7.i686.rpmeb0e5a994ece3f1ad7d335af08c0be16a833a286efe83ea682fee1fe1317b19cavahi-devel-0.6.31-20.el7.x86_64.rpm2eb70083b4939853bfc23956b034d5e105ffd5c482a267c41587f30d73482db4avahi-glib-devel-0.6.31-20.el7.i686.rpm3622d0292974db194ed61df492e9f4fa0d31b97888d89affdd2df9f611545114avahi-compat-howl-devel-0.6.31-20.el7.i686.rpma60f6f0d2874233f403a7dd2ac80b20db7c0cf9230dc9f6fdd878bc13f9e5bdaavahi-qt3-devel-0.6.31-20.el7.x86_64.rpm0ac47bfa54e22844633d07eb0a05a31757494e83095a4fb4b7317c4420017766avahi-compat-libdns_sd-0.6.31-20.el7.i686.rpmad47208d58d1cb322347d7fa061d66dd5a58447bc9dae828d39c1e08f5d6c4f1avahi-compat-howl-devel-0.6.31-20.el7.x86_64.rpm72f234d1277b0566985506067e917bff130645e40b2225cdfe604e500042a813avahi-qt4-0.6.31-20.el7.x86_64.rpm50eb995355c8c1dabeb8054bc40f9293ddfa9ac217495a3336d21fe06ca8938eavahi-devel-0.6.31-20.el7.i686.rpmefbab8cf0439e1149a53a5c5bfd21e9b9bcc17b3bd12d95858082c5ceca60025avahi-ui-devel-0.6.31-20.el7.i686.rpm612ff55e2de379ed90e29472a4ace7bf138e3b0df9dccbdec80e721571d66c78avahi-gobject-0.6.31-20.el7.i686.rpm88c29639a8c0a04d7f8181702eb19a048d5d8bdd892ea27f88c6f8bb2057d022avahi-qt4-devel-0.6.31-20.el7.x86_64.rpm0f3658639366b6a771061b4a161a117364ca6fe99f0e4a73dd661d0d2852a254avahi-0.6.31-20.el7.i686.rpm1400f47774aa56f64934f383007436acd5d69f6eab27df8603a193ed91d15ed2avahi-gobject-0.6.31-20.el7.x86_64.rpmac5997995ba5455ae7f8761bc871b566c67746cc975be2ae1e82406a4c8ddc32avahi-compat-howl-0.6.31-20.el7.x86_64.rpm7a9a49e3a2bac857d9955198935f132073dd3cb2034394efb8da6015b2b9e731avahi-qt3-0.6.31-20.el7.i686.rpm77669d1ee33c94c3e299d8773c3c5ef0a05867674369b5212114f825b40699b0avahi-glib-0.6.31-20.el7.i686.rpmfa8cf354dcd29aac120bb8d46379cba1e9bd9cad59d6b7c902a2069a1f08fd12avahi-ui-gtk3-0.6.31-20.el7.x86_64.rpmb40d2569b7f47bcdee999cbd91985dba3e538d1acb2332a6eb0bd3f89b912fccavahi-tools-0.6.31-20.el7.x86_64.rpmeac5cc37c6f54138efc33c0ccbf5fb71f4fa72b5321fb81e5c36d518468d7c41avahi-compat-libdns_sd-0.6.31-20.el7.x86_64.rpm05046031a9e8d440d1aed829ccb70cf7705e84abe99875d31f632fa75be81b9davahi-compat-libdns_sd-devel-0.6.31-20.el7.x86_64.rpmcc3ee0dcb613acab3adbaca2507864597afc2232a11ecb79af08b01ee8e6c5cbavahi-glib-devel-0.6.31-20.el7.x86_64.rpm74e1854674895bbd807747ba31e5457e1ddc29575af58d61d68f007f516fc50cavahi-dnsconfd-0.6.31-20.el7.x86_64.rpmd61e3e540306208db74d1465a55924b7275a6db15b3cbd9c494b1a9f159950e1avahi-qt3-0.6.31-20.el7.x86_64.rpm36565554d7d7baa967a0f2b38caf67c7dc72445e08cbcb26b07f1d5c4d8ec2eeavahi-gobject-devel-0.6.31-20.el7.x86_64.rpm3741cb08303c58c9d6153ef2f3528b403b9d2b249f456331e4f749fe75f890a0avahi-gobject-devel-0.6.31-20.el7.i686.rpmd5bc87bcc9c3fa7920af1d54eb46146942e53661ca759899c5c0332df83a5f2aavahi-qt3-devel-0.6.31-20.el7.i686.rpmef1a6525107eebfb70b0bd0a4fe7b2725948d1685b27b84db7255c3fe7d469caavahi-qt4-0.6.31-20.el7.i686.rpm8c3b816d2765e372fcbb4f1c276f99f1faaddad442a375317eed666a7f29d73bavahi-ui-gtk3-0.6.31-20.el7.i686.rpmcf98f5cd9818af34aea04d712b1b5b4169d4c3ae7f034ad3e12afacdecf49b51avahi-ui-0.6.31-20.el7.x86_64.rpm025a4d00c990f03ca9af453a4ef4f92e5aa9c31df85c20206d6a1ad1f64c60d0avahi-autoipd-0.6.31-20.el7.x86_64.rpm91c3eec43445fda974a20210c99e8150567c9287a3e5fb0a3bb508a578dacef2avahi-qt4-devel-0.6.31-20.el7.i686.rpma36f72b93d7dd4e64c8cd5593744d4a2b4214890aafa275f34bcfeccef415007SLSA-2020:1178-1Zziplib* zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.cmoderateScientific LinuxScientific Linux 7zziplib-utils-0.13.62-12.el7.x86_64.rpm98a8d2d8a46a13eba3c4ae441d5d00365a07b62ce01310f6ddce76ff235798bdzziplib-devel-0.13.62-12.el7.x86_64.rpmbffc6304ef03bb7e2228bf2a2451b4d798f451cdc80fa073493a1ebb3c58ca7czziplib-0.13.62-12.el7.i686.rpm9a2706d83766611aac5999c5fcb0a55935f17e640db445bdb088f49e22bac11azziplib-0.13.62-12.el7.x86_64.rpm97da238881ad98d139dc4d29dc1c56e74e2f79c3f721348bf0c19d06f3b204b4zziplib-devel-0.13.62-12.el7.i686.rpm285315cf445233607cd29bdc49d18bfe7adf9c64e27ee6986efe55793359eb18SLSA-2020:1180-1Imagemagick* ImageMagick: multiple security vulnerabilitiesmoderateScientific LinuxScientific Linux 7emacs-24.3-23.el7.x86_64.rpmd11cf9d323e523243ce442b4ba7d38f1eaeb7d3f141f7f42fb34ccdc3d9b426eImageMagick-6.9.10.68-3.el7.i686.rpmd73565d840e9d4bcc6a5a398eaa25f7b7c1524eb86f355a5d29adcfa77bf4ce0emacs-el-24.3-23.el7.noarch.rpmd6c6829a7973b4b8e8fc714a8523e89e747602ffba234eae29ce10ec816518fbinkscape-0.92.2-3.el7.x86_64.rpm0e87e06bd04d76d6ec93a471c7280adf76d676157de3d5cd97593b042b5ed36demacs-terminal-24.3-23.el7.noarch.rpmf063131f958e130aa43ac2e619c55b05d223063c70f6781b84ef491d3d488d8eImageMagick-c++-6.9.10.68-3.el7.i686.rpm9ab5f4683878bfa91b8baf6492494e6be1b5c9a209fb6810d9f11f025a3442b0ImageMagick-devel-6.9.10.68-3.el7.x86_64.rpmd5b35d044766211a8c203c4dad4579aaebe5d97a6f9cde50b6bd63dff3f83ab9ImageMagick-c++-devel-6.9.10.68-3.el7.x86_64.rpm669731d3611dfe806762efda7c35ec0cccb3afff8e0a01fbedd3857f94d76d49inkscape-view-0.92.2-3.el7.x86_64.rpm6ac2e22082ae96e818ed2a02a0a9584c8d49552e9901a25ee5490106373f9279ImageMagick-doc-6.9.10.68-3.el7.x86_64.rpm1a1fc29264f248251fd6a2214149007127151a0c23a26c1eb3cdf82fc29d117bImageMagick-6.9.10.68-3.el7.x86_64.rpmc0e52dbe9d8e3730f9d54f0dc25329d02ef18d6655e855a91c84bb96458c441cautotrace-0.31.1-38.el7.i686.rpmae3a24a599fa1b8cec3f874e6cd261f6852010a9af7b5d581b83ad96c01700e6emacs-filesystem-24.3-23.el7.noarch.rpmdaa510effd241b1292a768fb59ad4f8f0f56a2dff8be6fa8f6035cec36de70b3ImageMagick-devel-6.9.10.68-3.el7.i686.rpmfd02685c22977f3d206b8054b5ce0be8a00c1f504ce41af0d21d4cb10e434aacImageMagick-c++-devel-6.9.10.68-3.el7.i686.rpm1cdc4eb382098e29f365c597eb87bfd8923b63b790ed0228ca24d11244e6c0a1autotrace-devel-0.31.1-38.el7.x86_64.rpm34134bbc97889b198ad9d6c2df76471622b6fc8ad9df177345b68fa7cf68142dautotrace-devel-0.31.1-38.el7.i686.rpm0703d29d1fec744068c3de5de40edd668cd8213b83b6bdcb4e7cf8b521c6abffautotrace-0.31.1-38.el7.x86_64.rpmdd74de6dae2413eb56a6c3f3bd0d921a3f7317115d6af45cfc5d132d302b6822emacs-nox-24.3-23.el7.x86_64.rpm3981d377abb5d82b42462b58f5ffb6d18ca217fe072e21589ba2923271e3957cImageMagick-c++-6.9.10.68-3.el7.x86_64.rpm7f32e0325f44f6c13382c158e11cdceb9fbcb99e06ccf22666df025666c5929fImageMagick-perl-6.9.10.68-3.el7.x86_64.rpmf2fcbb6f9d26c7542df7a9f16d9dcd8f8902bcced93ab6290a9e4e085a4c7cd7inkscape-docs-0.92.2-3.el7.x86_64.rpmd7f44d8d3c8f89fe532823557ea7dd56775d345d04b32aaa1c9fa736b73aba63emacs-common-24.3-23.el7.x86_64.rpm8b83d8ffe3888877c54c56675f1061eb559310a6e31febaf49b8e1cf9e6bc0aaSLSA-2020:1181-1Unzip* unzip: overlapping of files in ZIP container leads to denial of servicelowScientific LinuxScientific Linux 7unzip-6.0-21.el7.x86_64.rpm85608f0bce38e465f7058134129737363e68a840e072c87d41aff7353c85b663SLSA-2020:1185-1Libsndfile* libsndfile: stack-based buffer overflow in sndfile-deinterleave utilitymoderateScientific LinuxScientific Linux 7libsndfile-devel-1.0.25-11.el7.i686.rpmbe75f2676006d3a8c300bc35ff848afc8ca19e0e1eaa1183e5d92b33169e85e7libsndfile-1.0.25-11.el7.i686.rpm231ac4acb07be83ad83b3394627576d4d81548ee857ed12e565a8c867f0142aclibsndfile-utils-1.0.25-11.el7.x86_64.rpm0c2d38785cf7148085445b5e1c356bd52f8588af9a8e9c00f26bff4226ae4752libsndfile-devel-1.0.25-11.el7.x86_64.rpma2b607673e71979c46bcf1b9472519e86a1a16e2c74cf08106ae952ab679d6c4libsndfile-1.0.25-11.el7.x86_64.rpm2c5f6f55e792ef15a5b7eb7538ef0ed8df547c441027262b0ab01cc67d589d68SLSA-2020:1189-1Libqb* libqb: Insecure treatment of IPC (temporary) filesmoderateScientific LinuxScientific Linux 7libqb-devel-1.0.1-9.el7.i686.rpm9b33619c14e1f63e80faf6b2d1f426c5fa58c9fc0a00e73c7efa120079950de1libqb-devel-1.0.1-9.el7.x86_64.rpm63e69c4efe8b3b9370a1c8bc500d7365845ee7f1c5f758d3c711cc757a24bd92libqb-1.0.1-9.el7.x86_64.rpm486fa1b7b12bc06a6a7f541133333811b94447de86d9bf9ed8d199b5b3c51dc3libqb-1.0.1-9.el7.i686.rpm9eaee9004ed8df6b4cdcd22f6ffff5e07a819271ca0b4580c0018b1f6f5c8293SLSA-2020:1190-1Libxml2* libxml2: Use after free triggered by XPointer paths beginning with range-to * libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c * libxml2: DoS caused by incorrect error detection during XZ decompression * libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c * libxml2: Unrestricted memory usage in xz_head() function in xzlib.c * libxml2: Infinite loop caused by incorrect error detection during LZMA decompressionmoderateScientific LinuxScientific Linux 7libxml2-devel-2.9.1-6.el7.4.i686.rpm5b42befd79706109e9fca556fbc5fce2e52404eaf68c7aa1b160ba101eefc93flibxml2-static-2.9.1-6.el7.4.i686.rpm7f6ba7b20cb3a86460df5fa134b4aa5a4dd997ee975114d3f96ef114e8848ec1libxml2-python-2.9.1-6.el7.4.x86_64.rpm9892a4e1fb126374c920016af6a88c1d1244206deb6a4f5171c1e27bc267c868libxml2-2.9.1-6.el7.4.i686.rpm85a8c3a6ed6612c5a53ef09429cc33340bc1a17e1ae026cd46f1317234e10646libxml2-static-2.9.1-6.el7.4.x86_64.rpmb740723f65c2626684bcc0acbf260cf6cac248deff05020282e837ed0adea15dlibxml2-2.9.1-6.el7.4.x86_64.rpm773e875478acbd66489226b4177c11040269c26cac13a12dfd4bcd607b26e45clibxml2-devel-2.9.1-6.el7.4.x86_64.rpm90b0f2c254bf1311fc753addef6e90b673f930810c12b56c783755983009d1b4SLSA-2020:1208-1Qemu-Kvm* QEMU: Slirp: potential OOB access due to unsafe snprintf() usagesimportantScientific LinuxScientific Linux 7qemu-img-1.5.3-173.el7_8.1.x86_64.rpmf1f386968dae58c7e07d5bcbc4277a8a7d67f07b2f108834f2fdb4755e40684eqemu-kvm-common-1.5.3-173.el7_8.1.x86_64.rpmb60771a97444f24c04eceaa47d0d8a7fece951440850f95a4d2326bf91c51a63qemu-kvm-1.5.3-173.el7_8.1.x86_64.rpmca31403c3cac507d0ee7ae6ef34332451a7ce09e6d3f33e9426db7aafae4d567qemu-kvm-tools-1.5.3-173.el7_8.1.x86_64.rpm5bd1383d8f4395a9e246490900007bfe3d7d57cb879a0e8c3d748d31cf788b7eSLSA-2020:1334-1Telnettelnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary codeimportantScientific LinuxScientific Linux 7telnet-server-0.17-65.el7_8.x86_64.rpmb9639924e1c258f6c87d9fe7d0b9baa870674e2a918bb2c68eeb67b93427bb8etelnet-0.17-65.el7_8.x86_64.rpm609aae6d0869323d6faaa642adab306b9a6b0ea5ea60eb440d7fd2a0e4f5a865SLSA-2020:1338-1Firefox* Mozilla: Use-after-free while running the nsDocShell destructor * Mozilla: Use-after-free when handling a ReadableStreamcriticalScientific LinuxScientific Linux 7firefox-68.6.1-1.el7_8.i686.rpm01993ba3a72af6b78917dc5f00a91720fc89e982c7e28f2e7d02058f15e1867cfirefox-68.6.1-1.el7_8.x86_64.rpm8176a25e5e267f5a6b45265286ed42c223a8975b660a4942731d486aaa670ca8SLSA-2020:1420-1FirefoxThis update upgrades Firefox to version 68.7.0 ESR. Security Fix(es): * Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821) * Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825) * Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)importantScientific LinuxScientific Linux 7firefox-68.7.0-2.el7_8.x86_64.rpm1e5b267966f341537590d6654c97a355566964cdcf62bbc544e37277a5f55a3dfirefox-68.7.0-2.el7_8.i686.rpm853584adc4e08413c4606997e925c9851ddc2fd92a0a8dab4e5ad77e0833da42SLSA-2020:1489-1ThunderbirdSecurity Fix(es): * Mozilla: Use-after-free while running the nsDocShell destructor (CVE-2020-6819) * Mozilla: Use-after-free when handling a ReadableStream (CVE-2020-6820) * Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821) * Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825) * Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)importantScientific LinuxScientific Linux 7thunderbird-68.7.0-1.el7_8.x86_64.rpmb8f86a931a0edd41a317cad1b77d524a69ded0be84ae61dcd2a67c03987d2479SLSA-2020:1507-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) * OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) * OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) * OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) * OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) * OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) * OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) * OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm56d6cedb4273d200fae0d2ba93880da162f5bcd45a64ec69130c645ee4948f86java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8.x86_64.rpmac2f7f749a3b29f0116e9d47abbed6f0dea039defb4dcb85da2ace29d70b2c40java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8.noarch.rpmd361f061477aaffb7f8aecf0ca6237dfa87fee152f38c9871ce18fc8e4fd4a76java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8.x86_64.rpmc3070a4b2e6170f01d179917f2436d1c415354c2df70ffb7760de5f5b34de193java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8.x86_64.rpmc252a80290bfa8e59fb5a01a0b48892a6e7d8baccea833e3b27b42b34838d0e8java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm5cfb6e9f434aee2d625bea0fc6ac25db12ef77e8086b525a79db06596697f987java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8.x86_64.rpmb7cf63289d514e300887eedcdd5b8a48c71e261b5013ef4d929547265f67ead3SLSA-2020:1509-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) * OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) * OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691) (CVE-2020-2816) * OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581) (CVE-2020-2767) * OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) * OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424) (CVE-2020-2778) * OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) * OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) * OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) * OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754) * OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755) * OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) * OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)importantScientific LinuxScientific Linux 7java-11-openjdk-11.0.7.10-4.el7_8.x86_64.rpm78e63a6d891b057dad896a66da4245e6781ea1cea7e859919d778e28da5771ddjava-11-openjdk-demo-11.0.7.10-4.el7_8.x86_64.rpm3809dfed8a3345dc8aae1a35a90eb4d9c358531bbdf2caa4efa7222021dbc5f9java-11-openjdk-demo-debug-11.0.7.10-4.el7_8.i686.rpm50643e76eae1edf0aae04793221ffebc353e7e68bcd342ad090ad7e898bf0ed5java-11-openjdk-src-11.0.7.10-4.el7_8.x86_64.rpmab85871e725c2fd2794fb839d720c236d4f02f9d07e2cf5034b5a99f889725a4java-11-openjdk-demo-11.0.7.10-4.el7_8.i686.rpm20848af99256c249e985b483406886a5bda510dc6256a381b8d83fbb6b5df261java-11-openjdk-debug-11.0.7.10-4.el7_8.x86_64.rpm876afc21a0f727a737e927b7eb3e869d70965e2b64653b6936ec278788165d81java-11-openjdk-src-debug-11.0.7.10-4.el7_8.i686.rpme92fcf0d0943f66468e339bbcccde7fcd7d1dc12ea44bad3978308615b0ef272java-11-openjdk-javadoc-zip-debug-11.0.7.10-4.el7_8.i686.rpmdb14c224be2d2203f62c459b0079ac7fb497fb2cf81f7aca979caf909b9ed6d4java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8.x86_64.rpm2fb46205c9f9f87f07bd7a7f72f6f5939fccaee14528d392b98eafb4c93bb74bjava-11-openjdk-devel-11.0.7.10-4.el7_8.x86_64.rpmaeb453576033f9281bdaddf05fa93871b0f0d938dcf55eeae9629f08ca53b256java-11-openjdk-javadoc-debug-11.0.7.10-4.el7_8.x86_64.rpm9a3d798dbd225407f84649e581ea80177710c856fe509234f6422464132262c3java-11-openjdk-headless-11.0.7.10-4.el7_8.i686.rpm75e4f9b7103000b896c85b822ae894639fca70458a6fd1c5c495cd1f7e01cbe7java-11-openjdk-headless-debug-11.0.7.10-4.el7_8.x86_64.rpm3156a26c2ecf50f0811db32f47b020653546009e2b15ad6599c3fba21380ceb0java-11-openjdk-debug-11.0.7.10-4.el7_8.i686.rpm7344e10823cc2328323fc34f45567ea27a4aa55584352d21227d0a93c9560e16java-11-openjdk-javadoc-11.0.7.10-4.el7_8.x86_64.rpm524bcef4b6fca48fcc056dd98ba9c888d4d3c5e10d70229bf87f4cae5abf224djava-11-openjdk-javadoc-11.0.7.10-4.el7_8.i686.rpmbaeec652fd2ea7bfadb392612b81abf1c931713463077f5eebf0b1ffd5f0a725java-11-openjdk-11.0.7.10-4.el7_8.i686.rpm1f813c60a4cebd2c4b1b04937c4cc6a07c5f828b3cfd63c8b508e7bb4dccd01ejava-11-openjdk-jmods-debug-11.0.7.10-4.el7_8.x86_64.rpm853150e0df8a322126bbdb0683158d05ffdd627fa8eac41851ba3dbada1fc086java-11-openjdk-devel-debug-11.0.7.10-4.el7_8.i686.rpm1ce89b6a7a64bde744c1b40869cc8d12ea59637099963b9aa0a50a1eac2efbfajava-11-openjdk-jmods-11.0.7.10-4.el7_8.i686.rpm0e499905360df088f13d6ff980e6215870b08d467a3468d97d84afe44114388ejava-11-openjdk-devel-11.0.7.10-4.el7_8.i686.rpm49d6cec33de6e7383fde799957928dc07b222d123336e65f880140a88b1c5ee4java-11-openjdk-src-debug-11.0.7.10-4.el7_8.x86_64.rpmbccd7888a55d0c8c551842891199166bf600732200a61eb575fafd11108e4dbbjava-11-openjdk-jmods-11.0.7.10-4.el7_8.x86_64.rpm61b07ea180ad2fae0b002370febad2a8c1ecd3495d86c7d7cecd4e9ede421370java-11-openjdk-jmods-debug-11.0.7.10-4.el7_8.i686.rpmf455324da739f14b5585a1f1352b376f4fcab462ada2fa8f5e0cc9728d5a63b0java-11-openjdk-headless-11.0.7.10-4.el7_8.x86_64.rpm72f973c0cb28b0053904bc3e637af7b568eb617fcf8ca39d4389fa5bc2da99a1java-11-openjdk-headless-debug-11.0.7.10-4.el7_8.i686.rpmd52887605c8a0c62c9d74942269d4f765ba1b7ecf4cc856914fecdda6682fbf8java-11-openjdk-devel-debug-11.0.7.10-4.el7_8.x86_64.rpmceaaf361e555f7cffab53ce57487a29edd3685ea826ff6b457951c3c8909d21fjava-11-openjdk-demo-debug-11.0.7.10-4.el7_8.x86_64.rpm024b6a02ae009d3a837670275b2e6e8b0d9da78a2f12cdd00991d7344995820ejava-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8.i686.rpm5cec9a806eb7be609b4c88de76862c196822a386d5277819b2985c71136a6be4java-11-openjdk-src-11.0.7.10-4.el7_8.i686.rpm49c77300e0c16c1064fcc94f9c51ba34bd31cbde03dbe2002495463b8b0e668fjava-11-openjdk-javadoc-debug-11.0.7.10-4.el7_8.i686.rpm1a6f1ed433b9aeec0b68e852d084b9091e89a67b17a73eb2715ed673bec46a62java-11-openjdk-javadoc-zip-debug-11.0.7.10-4.el7_8.x86_64.rpma21441a347e279862e253138a5afe664c4f1a7accae09fe8b4d3290dc0b416d8SLSA-2020:1511-1GitSecurity Fix(es): * git: Crafted URL containing new lines can cause credential leak (CVE-2020-5260)importantScientific LinuxScientific Linux 7git-hg-1.8.3.1-22.el7_8.noarch.rpm1ae90a2a5f3ce55dc018e0fa4b3f8fd38b7c675152398906fe3a8130aad68948perl-Git-1.8.3.1-22.el7_8.noarch.rpm8c1ad66b18ccfa7bcdc5656c6744c0043e7e2106102889b6b2e206ad53232e45git-email-1.8.3.1-22.el7_8.noarch.rpma5b4a83030845c35d4693f77d07d2026eca4e41a4376c56ea1371ff64061814bgit-p4-1.8.3.1-22.el7_8.noarch.rpmd1e0b2702173d87a77d6474d7a29dd492c1049bdc90b22595d02cb91f57301eagit-gnome-keyring-1.8.3.1-22.el7_8.x86_64.rpm476b74790af0848bef3a905d5ba4defdfaaa62c6e0bbb08fe151c15bc378b15agit-cvs-1.8.3.1-22.el7_8.noarch.rpme20feec6bda667f900b2225c696388a5445009db93d414a688b55d32f3f99ed3emacs-git-1.8.3.1-22.el7_8.noarch.rpm4e2ce4c9685c44b01c1055437eb1bcfd57c3348546cdc0d44416a438181b5b74git-gui-1.8.3.1-22.el7_8.noarch.rpm0786e633a3b9de657dcd58b68cfbf285677b4c3f223dc96dc50c47389eedf7a6gitweb-1.8.3.1-22.el7_8.noarch.rpm56bb9ba6d3b9542357ba50380aa4d88f25abb117167394abea0e7fd0bf12654cgitk-1.8.3.1-22.el7_8.noarch.rpmec37c467486a230d4b51a41d8f60f264296ee071d069061ff521f63c52ab7bb6perl-Git-SVN-1.8.3.1-22.el7_8.noarch.rpm3e706b4684ab9c75b2090165e8bd6653d6a0e8b76b2e605f53dc69dfb8c04b35git-daemon-1.8.3.1-22.el7_8.x86_64.rpm13c3a7b8c3fc840899e2b35680ea35d3852180234881d871c5a0ba30c0e0c478git-bzr-1.8.3.1-22.el7_8.noarch.rpm71c610f7280e06790462c689915bd2fe7739aa853de4a6b09972fa944d4d4e26git-svn-1.8.3.1-22.el7_8.x86_64.rpmb2bace95a1f2240aadffa64fd700499a3b592a63fe9432df409c8c6908bbbaaegit-instaweb-1.8.3.1-22.el7_8.noarch.rpm8872bb46393c28d37f5795e35497c138f8e6231b2f024353b57b396bd78f3778git-1.8.3.1-22.el7_8.x86_64.rpm67959abfbaa88629e264578caf6b0c4a1ae273603c2b77299b18e22f4a9e4761emacs-git-el-1.8.3.1-22.el7_8.noarch.rpm35a71d11c1e5246619c1a7a5c805270b317d025f7f11ace3eec1afe4d7982ce5git-all-1.8.3.1-22.el7_8.noarch.rpm8ffa81715af249e1303e3176eb2a0a1a4b85aadf1e23855d7c73b8120da07576SLSA-2020:1512-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) * OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) * OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) * OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) * OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) * OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) * OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754) * OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755) * OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) * OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8.x86_64.rpm1069141af62491f1a021cf79fbf46e8724c41e4bbdc73ac940c71050ce435292java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8.i686.rpm7f4a7605aa00e05b5ef57522afd7adfd6d1d0d2f82d6dedef78e8703536fb081java-1.8.0-openjdk-javadoc-debug-1.8.0.252.b09-2.el7_8.noarch.rpmefea41c24e51fc6b4ffd6913f428438ab77058a4f2b92f614d7c85158a564341java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8.x86_64.rpm436ed40f59b987fc9f1537cc8faa715c07befb2ca24d71559b67ed886bd5c786java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.252.b09-2.el7_8.noarch.rpmdaa5e33d513dd54ceb036b8b4a702c9f37dca5d33aec6802a5903a376dca92cdjava-1.8.0-openjdk-debug-1.8.0.252.b09-2.el7_8.i686.rpmb8692f5b5fa33f8e07a00b393a7181e1191b25b0a6edc76596d7eaba528e87f2java-1.8.0-openjdk-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm8b4c0d19fe598c8f930b4bf9eb0c7c80f047e0a41c7c980edb4bf82bcd093cb3java-1.8.0-openjdk-accessibility-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm67ef968322d2949443729d7bf2c18297d4a54ada2c5903f7cec70cbf33181746java-1.8.0-openjdk-headless-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm397cc5fbf2499dc2f1ca13de3d240a860d08dc4b430ab6bcbe09f6a36aeca9d5java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.i686.rpm350db7c8ce15487c58aad33192d0d21b135b6939aa2f27437dba653a01547229java-1.8.0-openjdk-demo-debug-1.8.0.252.b09-2.el7_8.x86_64.rpmbd24c2c842814ba5c79abb989c4e1a6a680648450bf07791ec78cc4d56971448java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8.x86_64.rpm2a79b6e90d600c913f8b6831b56fa3d5b6281828856c63c6af1c005353daaf34java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8.noarch.rpm350c196bf4c5dcc0fc3384c42e1cdfe5c2235f90c98ab0255a578c0ec1bc3e8fjava-1.8.0-openjdk-demo-debug-1.8.0.252.b09-2.el7_8.i686.rpm381a40a7b6dca26c2e31afced75f71524ad1ed734a14dbee58313deccdb13b2ajava-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8.i686.rpm8bc5da3d2b4bcbd255775cb9dda1ed49d33d688f541b97496a237a5cdc395bd3java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.x86_64.rpmb8c62dcff7d47d204a047f0b5a52bb2805bf42ab776d9e870eec3ce6a186e4d3java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8.i686.rpm6898f10477b6d40c18931b7508897915b790800419b2d28dd9b73a817d6a046ajava-1.8.0-openjdk-headless-debug-1.8.0.252.b09-2.el7_8.i686.rpmc365ec1768b4ebf48cdb466a39c169afc720741e7905853d1ea74ef79642e0e8java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8.i686.rpmeefcb409662d3e530f8fe67a18b65cb211181c581c396fe3264160611d5cf534java-1.8.0-openjdk-accessibility-debug-1.8.0.252.b09-2.el7_8.i686.rpm4fdd4e3f37596045a104194d90e3fb4f58555acf61eefcb2740350b9c3a862d9java-1.8.0-openjdk-devel-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm060938775abcbab4e0d34d439f1d54d29e0e4e078cb820685d183fd72944cd24java-1.8.0-openjdk-src-debug-1.8.0.252.b09-2.el7_8.x86_64.rpmc38370deee5569f096495c5555c0d0b73f5fe86faafa355c4a718b49687b2633java-1.8.0-openjdk-src-debug-1.8.0.252.b09-2.el7_8.i686.rpm8b0d08202104cec64552d36769514d7f5bda544dc4fd94b07d42d787783753a6java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8.i686.rpm32dde1f75ff0d154e0f7d379ea57a09dc0ff8fc8c08b418dbdc888bf17e33165java-1.8.0-openjdk-devel-debug-1.8.0.252.b09-2.el7_8.i686.rpm76dd4d34e289c0d4a001dc741dd689d8a9371ee9c074e06d2fd2946d38ec4743java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8.x86_64.rpm7c65a3d8c9e61685fe41b82e56f99cb8397986028148c8081dcc769ef3851a1cjava-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8.noarch.rpm6e5ca39f62145c96c5f75be1cd2e6bb3c81557923ab8a60f5b020b88d038481bjava-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8.x86_64.rpmed48285098be9426b6c74dcdaf01573aa9dfd511405386705744f07c1860ac89SLSA-2020:1561-1Python-Twisted-WebSecurity Fix(es): * python-twisted: HTTP request smuggling when presented with two Content-Length headers (CVE-2020-10108) * python-twisted: HTTP request smuggling when presented with a Content-Length and a chunked Transfer-Encoding header (CVE-2020-10109)importantScientific LinuxScientific Linux 7python-twisted-web-12.1.0-7.el7_8.x86_64.rpmdb3aa75c0081fdc7fe5f6e93bb2228a194a7bbaba5020869dc5670326ac4ad18SLSA-2020:2037-1FirefoxSecurity Fix(es): * Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) * Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) * Mozilla: Buffer overflow in SCTP chunk input validation (CVE-2020-6831) * Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392)criticalScientific LinuxScientific Linux 7firefox-68.8.0-1.el7_8.x86_64.rpmd8d41c0b72aad0a8ad8da51a43a042dfd4e76df4405ef442db0db5451466b2f8firefox-68.8.0-1.el7_8.i686.rpmaa427e2246d1f439484a1d6c89dc37bd65a6aeb54286995ed310663a8963dcf2SLSA-2020:2040-1SquidSecurity Fix(es): * squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) * squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) * squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525)importantScientific LinuxScientific Linux 7squid-migration-script-3.5.20-15.el7_8.1.x86_64.rpme48a229cb920a5df8c1185b05641598a74c1890fab92862bbf07a7d3a7adb506squid-3.5.20-15.el7_8.1.x86_64.rpm2c851b785f68bb2782b17e95f33e52e09dd4908ea53dc680eaf9f14c9e4c768asquid-sysvinit-3.5.20-15.el7_8.1.x86_64.rpm3f78238d5cfad3ec426387a41f248bd8736f8061e3db21903f10d45dcad68d68SLSA-2020:2050-1ThunderbirdSecurity Fix(es): * Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) * Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) * usrsctp: Buffer overflow in AUTH chunk input validation (CVE-2020-6831) * Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392) * Mozilla: Sender Email Address Spoofing using encoded Unicode characters (CVE-2020-12397)criticalScientific LinuxScientific Linux 7thunderbird-68.8.0-1.el7_8.x86_64.rpmdf4fff2e0e48eaac06f00aa8f68c9c88e5b9099b0faafc14bfb33150cdbecd50SLSA-2020:2068-1Python-PipSecurity Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)moderateScientific LinuxScientific Linux 7python3-pip-9.0.3-7.el7_8.noarch.rpm820454d2e9444926b53f576c8ec461bf7fe8510af46c99782ba7c7b72ada90ceSLSA-2020:2081-1Python-VirtualenvSecurity Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)moderateScientific LinuxScientific Linux 7python-virtualenv-15.1.0-4.el7_8.noarch.rpm91df44f1cf0fc7bd093fecfb3046aba54dda019317d2354a0b8b44c11824a0ecSLSA-2020:2082-1KernelSecurity Fix(es): * kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) * kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) * Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)importantScientific LinuxScientific Linux 7perf-3.10.0-1127.8.2.el7.x86_64.rpma615a5d374a43e51fb57d2e39fd6bd3635458425f8883634b06f01fc56cafb31kernel-debug-3.10.0-1127.8.2.el7.x86_64.rpme9d206fe6d585fb3da067b10ac17f7bf1272d74b2fea657c022f9d517cf81fe6kernel-tools-libs-3.10.0-1127.8.2.el7.x86_64.rpmb6950f0e9d60e8daf11cc0471bc03dc41ff90a3dea25da467ff3eb8f180d3d13kernel-devel-3.10.0-1127.8.2.el7.x86_64.rpm1c99f69d2e920b2f72f2cc9ee5a577f1d16d1b1f6e0de0f4dfeb2bedd5fd6879bpftool-3.10.0-1127.8.2.el7.x86_64.rpm6580c5b3853e8f2d2af589894e884ba564777be228337acbbe63bd3f971935dckernel-debug-devel-3.10.0-1127.8.2.el7.x86_64.rpmfbca904b670a1b581572ea3b7ec94d33080d501a8abc6fcea7db01f002ddcce1kernel-tools-libs-devel-3.10.0-1127.8.2.el7.x86_64.rpmda3321490968b1636bd4a30f980f7ad7609ab005c3e047a31cf86c7cf5e66792kernel-abi-whitelists-3.10.0-1127.8.2.el7.noarch.rpm3847d3dd6328593f8f438e4a6d63df714c1b3742dddeaacc57da3f7debad08c2kernel-headers-3.10.0-1127.8.2.el7.x86_64.rpm87755f06f96f52401c96eb6407ccda21828cd0c2cdefc106dddace5a1856ab06python-perf-3.10.0-1127.8.2.el7.x86_64.rpmbade20520df0a6debd0c02835e3417b6bb11de4b7b2144b5968e1508a9163d2ekernel-tools-3.10.0-1127.8.2.el7.x86_64.rpmc2d6dbc5fba50c460519d994bb9473a6da99297413ed758b471c4662809cd81bkernel-doc-3.10.0-1127.8.2.el7.noarch.rpm4e5fa4ac78f4f2e6fb3318f0966f810994fd488ad714828a6b430da15ceeddfakernel-3.10.0-1127.8.2.el7.x86_64.rpm37d3e1c3a515452ae61717af7c2463e12466099ca8b8ef47a9b4969b7be0e244SLSA-2020:2334-1FreerdpSecurity Fix(es): * freerdp: Out-of-bounds write in planar.c (CVE-2020-11521) * freerdp: Integer overflow in region.c (CVE-2020-11523) * freerdp: Out-of-bounds write in interleaved.c (CVE-2020-11524)importantScientific LinuxScientific Linux 7freerdp-2.0.0-4.rc4.el7_8.x86_64.rpm791d36c8dc6db5b52ee3e517cb072f983477ad30785fd7e990f4b8239da4b9e6freerdp-libs-2.0.0-4.rc4.el7_8.x86_64.rpmfd62a93230b38a0518bbfea1b6f9b6cda7503a05f10ee41891f77351d8947c06freerdp-devel-2.0.0-4.rc4.el7_8.i686.rpm584707a19ce635e2eb24ca3dac5bd44a1e5b9bf130705922bb6b8f9012f1d326libwinpr-devel-2.0.0-4.rc4.el7_8.x86_64.rpm2757b56c550b71bd702dbe896b7b307303ff2bc0ee46aa16bdbb037b3579c1dflibwinpr-2.0.0-4.rc4.el7_8.x86_64.rpm396f79278b4fc772d3a5e5f9edab779e3c4811c153572bb72bcaa9b001e4ec67libwinpr-2.0.0-4.rc4.el7_8.i686.rpm7256febcc91b39f536ed215dfc8d7eeb44d6e9dc375ddc9236c98686348a4f08libwinpr-devel-2.0.0-4.rc4.el7_8.i686.rpm84f88e9442ee196a88bddbc4b113ada765f7baafb290c18d0921cb7da57f2d33freerdp-libs-2.0.0-4.rc4.el7_8.i686.rpm030f3031e662efad0b0dceba551900e45bf888a4e830c0a0cb5a41d41ad660acfreerdp-devel-2.0.0-4.rc4.el7_8.x86_64.rpm61169318a91709f9eb63b092c68484e4cb532f72f873b4fad2bf90ffeada157cSLSA-2020:2337-1GitSecurity Fix(es): * git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak (CVE-2020-11008)importantScientific LinuxScientific Linux 7git-svn-1.8.3.1-23.el7_8.x86_64.rpmbaef16b8ee609bdfe586df52f6d9a6d60ed37b5385e83cc287e7c308c88b421cperl-Git-SVN-1.8.3.1-23.el7_8.noarch.rpme99450c166ad1b31e011b06880bc1f6cb6b10af5ae9a5028ef20bc092fffe799gitk-1.8.3.1-23.el7_8.noarch.rpm6ea8bfabe4087bf3b7cb3631d5fe8aa3661361a574d2c2e325f1186d997915abgit-all-1.8.3.1-23.el7_8.noarch.rpm353a55e783cb44262427760ecf2b978c5864f9f5fc90a33e58dd54402f1aab90git-gui-1.8.3.1-23.el7_8.noarch.rpm49125643d46e92cb68315c96e7da69d633fa2c4cf3a6a5c984efb2603022a77cgit-instaweb-1.8.3.1-23.el7_8.noarch.rpm8b40eb707791625e153b45b7fad989aa1131453f273b728a1eb58662e1462f38gitweb-1.8.3.1-23.el7_8.noarch.rpm93c8a63edee34034ecd2b5017c57f0901e3f1ac89cce2d60dc6c03b1867ffef4git-email-1.8.3.1-23.el7_8.noarch.rpm543d003eb48ad2030701efdab9845ad91fb82f2d9b7a81b279d34fa2a40eb5acgit-1.8.3.1-23.el7_8.x86_64.rpm8cc6a6a4546ee960304bab2bc221c0b09c87f1a113a9761b9cfa2f4fdb764e83git-p4-1.8.3.1-23.el7_8.noarch.rpme1e4d06d9f1c0de7ac4c16107b98d7413dc03b84524056e87d0e19d0ea683c01emacs-git-1.8.3.1-23.el7_8.noarch.rpm4bbf2dd337e1c85f44d0e79d530ee711a8ba6419cd62eb0f016639bbb28b02d1emacs-git-el-1.8.3.1-23.el7_8.noarch.rpm69ff078d441376524f9a33285797d8f023d5c05782194318344e739c049a1efbgit-cvs-1.8.3.1-23.el7_8.noarch.rpmdbcfa3c27922ab9f2f4a3223e0cf03ed4b25b55bcf2b3baf6b0b9f40396af93bperl-Git-1.8.3.1-23.el7_8.noarch.rpm4f6f4c1dff39fd3e0dc307eb595de1bd712db53c6f757a6d0b0b51303dea460agit-hg-1.8.3.1-23.el7_8.noarch.rpm651a7175975dc36a527c224e54f46d4a2b7e2cc80022175b51f8e08410d6daf6git-gnome-keyring-1.8.3.1-23.el7_8.x86_64.rpm6d6cf2c56c45bab713aa10feaaaa73f0a981c82fa5f33e91463f2915df237fe5git-daemon-1.8.3.1-23.el7_8.x86_64.rpmd29ed04f5280d41b36c95efbd120a352df3b663d2963846d0ab939a95d771899git-bzr-1.8.3.1-23.el7_8.noarch.rpm399931e89538f32cc5e64f50f09a622f622b2b8d770b01175a737c8617aa021cSLSA-2020:2344-1BindSecurity Fix(es): * bind: BIND does not sufficiently limit the number of fetches performed when processing referrals (CVE-2020-8616) * bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c (CVE-2020-8617)importantScientific LinuxScientific Linux 7bind-libs-lite-9.11.4-16.P2.el7_8.6.i686.rpm865166806f97792e91d6d926e010b247a749354ce3588ba1c96bcd5133010188bind-sdb-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpme76d41362055a509b2677d8f8ca04353eba163cc900bb2f708b62387ba33fdfdbind-libs-9.11.4-16.P2.el7_8.6.i686.rpm7af89eb55fa3a14f6cdd0e27314444627d8968e32bd8bf26f3917c3e58016dd4bind-export-libs-9.11.4-16.P2.el7_8.6.i686.rpm0b130c09a42a4a737d1e81ff962832583b838bcd776982d22addffadceabf01ebind-devel-9.11.4-16.P2.el7_8.6.i686.rpma2a0e46b35bf46cc794497abdbf92ac9e942ca2c51f225bce6765cbd895cc136bind-pkcs11-libs-9.11.4-16.P2.el7_8.6.i686.rpm4da8d1d6136758376a4006696e85f580f769c995856d269fd33026319176c2d8bind-lite-devel-9.11.4-16.P2.el7_8.6.x86_64.rpmc5af589224e73977c166cdb538ddf1e072439fe5a0a47414c619491191047dc1bind-export-devel-9.11.4-16.P2.el7_8.6.i686.rpm6af2ccf1e3af2a568536262910fee7e353ee8c62f3f89378b3f5db24e7728dbfbind-libs-lite-9.11.4-16.P2.el7_8.6.x86_64.rpm02840d07c325d09899e9946a6bc88708a915b302b05d21357a686f98fe9b7827bind-export-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm6719c57f322a045a5ad433c26ff3a4331767a06a764808ccdc4cb8a3b94bf9bbbind-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpm082dfc5f40c56cf69e7bf9b1b61b145d8b91ebfed682ed82abb084b53024e218bind-lite-devel-9.11.4-16.P2.el7_8.6.i686.rpm25326445adb75522121d13028d3c17645afee82784a9f53edaa10e892226c991bind-license-9.11.4-16.P2.el7_8.6.noarch.rpm2775325acad81999f31309573fbe879bb39782a3f10daa040d9eaca0bc3732efbind-pkcs11-9.11.4-16.P2.el7_8.6.x86_64.rpm171c8fdc73ce0337634b40bff9937cd311741b4123335dc07f9a7f9b4d55ba86bind-sdb-9.11.4-16.P2.el7_8.6.x86_64.rpm05db4ac72f517852f6478f3173b9c1111cb408eb5ea7f7a575a62f3347572364bind-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm7fa9a189b00574f45b614defceffff68feaf5d021186a0e0a6fd59717a257194bind-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm5955ebd3462199cd66880ffc33cec10c6031a1ca872a4efb9851207cb0fd40c7bind-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm48b8b1f932d3def08107e353f28520e4562e4a9beab1dc50c67a38861ebf1c9dbind-export-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm9adb7f285c5634860761fa9fe5f69d654dce14adae7bb7097cefb82abb5a26e4bind-9.11.4-16.P2.el7_8.6.x86_64.rpmc6be42ce4f35b91ad377c16393bdfc436b438bfff49fa3bbe657321c3b09cf10bind-pkcs11-devel-9.11.4-16.P2.el7_8.6.i686.rpmf46b2a0972a5d0e0afb565741dfa330aee73a5a98a66cb269d9b690b93efe4b4bind-pkcs11-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm7ab441e92275caff0bb44a55eefeb4882558a3e6a8b22ed4f3e63cbac094507fbind-pkcs11-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm9ad5b85464486b92eab1ff265646e373cc5d8ca569793d163a05fc6fc803382dbind-pkcs11-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm4ad390960e0bbc8b98c71b64536ef1359b5a9d362f37d5bcbc038d89dccec50fSLSA-2020:2381-1FirefoxSecurity Fix(es): * Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405) * Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406) * Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)importantScientific LinuxScientific Linux 7firefox-68.9.0-1.el7_8.x86_64.rpmcd822f257cbbc2481bafa0c646abbc44d04deeafc4c5616aea0f81634de4f0e6firefox-68.9.0-1.el7_8.i686.rpmc420fd11cd7adcdcb333cefe7fa4ec64a300b29cbf824b89bc48a69f2c9833cdSLSA-2020:2405-1FreerdpSecurity Fix(es): * freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c (CVE-2020-13398)importantScientific LinuxScientific Linux 7freerdp-devel-2.0.0-4.rc4.el7_8.1.i686.rpm13129daebb1c1a7172c47fc0cd0b94f6cfae58e3a0ac151faaeedfbf08ded0e9libwinpr-2.0.0-4.rc4.el7_8.1.i686.rpm7188677256bfc2ac5ba16e976a8d9ee89770758ca183040572619aff716ce661libwinpr-2.0.0-4.rc4.el7_8.1.x86_64.rpm278aa434e8b95a5e62afe2dc9b54d705f876afa504918928a7ea888409ea6e6dfreerdp-devel-2.0.0-4.rc4.el7_8.1.x86_64.rpm51380744620ee17d2352dff3f9612f0dfbe2627946b1dbf50fd805cfd1e1a26afreerdp-libs-2.0.0-4.rc4.el7_8.1.x86_64.rpm482a081506c17dcc1a64727bb644fd2ce6615d9c8368b0cc9f489a0e2e8d5aa0freerdp-libs-2.0.0-4.rc4.el7_8.1.i686.rpm079b0e811e8b7caeaea6bbecea90cf638bacfe7d854a6da1a73e1b27b32076f3libwinpr-devel-2.0.0-4.rc4.el7_8.1.x86_64.rpmef881ffa2b57a093a646d147b53cdfefae69310a5756fd756cdf42f4a06dbe04freerdp-2.0.0-4.rc4.el7_8.1.x86_64.rpm65de402e659f95ac09a7a858b506744a0074e0d45a952691d47fbf98ae4870a6libwinpr-devel-2.0.0-4.rc4.el7_8.1.i686.rpm437d89858624d282a9e8f9b9d6d719ff049e609936a3ab29c230178c646b1cd8SLSA-2020:2414-1UnboundSecurity Fix(es): * unbound: amplification of an incoming query into a large number of queries directed to a target (CVE-2020-12662) * unbound: infinite loop via malformed DNS answers received from upstream servers (CVE-2020-12663)importantScientific LinuxScientific Linux 7unbound-python-1.6.6-4.el7_8.x86_64.rpmb368c0fa9b82908b1b54840cd3649358b985d3d97773e0e07c144d61e0af1a2eunbound-libs-1.6.6-4.el7_8.i686.rpmd976b05ca9239fd0cbec53d0a0adae9b33ee3962bfaf9be8e0df52317463ba79unbound-libs-1.6.6-4.el7_8.x86_64.rpm2e65e1e4399a5f2d9549972e087bfc79c1b708b6b859b446b9afea97142e860funbound-devel-1.6.6-4.el7_8.x86_64.rpm168f3304c412a5b6e5a55a145f31af42fab9c1bf0a3f67437e45078fd85a162cunbound-1.6.6-4.el7_8.x86_64.rpmb7eca75b5551a800e8556c5a6050dc0c76aa34e240db7d417c8fda6a66f85ea8unbound-devel-1.6.6-4.el7_8.i686.rpm0d60a73df62f24faaded98cddc9b8591d34b856e6fe8d60bf500e992bb876110SLSA-2020:2432-1Microcode_Ctl* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) * hw: L1D Cache Eviction Sampling (CVE-2020-0549) * hw: Vector Register Data Sampling (CVE-2020-0548) Bug Fix(es): * Update Intel CPU microcode to microcode-20200602 release, addresses: - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f up to 0x621; - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718 up to 0x71a; - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28; - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e up to 0x2f; - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25 up to 0x26; - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c; - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21 up to 0x22; - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6 up to 0xdc; - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151 up to 0x1000157; - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065 up to 0x2006906; - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c up to 0x4002f01; - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c up to 0x5002f01; - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6 up to 0xdc; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46 up to 0x78; - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca up to 0xd6; - Update of 06-8e- 0b/0xd0 (WHL-U W0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e- 0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6. - Change the URL in the intel-microcode2ucode.8 to point to the GitHub repository since the microcode download section at Intel Download Center does not exist anymore. * Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment models. * Re-generate initramfs not only for the currently running kernel, but for several recently installed kernels as well. * Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script. * Update stale posttrans dependency, add triggers for proper handling of the debug kernel flavour along with kernel-rt.moderateScientific LinuxScientific Linux 7microcode_ctl-2.1-61.6.el7_8.x86_64.rpmc0337f87bab2fb65118dc5c52c1b62beaff73ed5ab9d905a015b21a13f8adc63SLSA-2020:2530-1TomcatSecurity Fix(es): * tomcat: deserialization flaw in session persistence storage leading to RCE (CVE-2020-9484)importantScientific LinuxScientific Linux 7tomcat-webapps-7.0.76-12.el7_8.noarch.rpm5175039ebbd3e0343682ed4c890b72f738e3a5135b7a0c81e662040c5576a96dtomcat-el-2.2-api-7.0.76-12.el7_8.noarch.rpm44af55c03f6f1144395846f7ed0b61a78d37fda048e67881876c5b60573740c9tomcat-jsvc-7.0.76-12.el7_8.noarch.rpmf08fb679877651d3e9a323f90ffe8661a80f5c4feb22ff3763be7d8702ac7097tomcat-servlet-3.0-api-7.0.76-12.el7_8.noarch.rpm29693e64398dc9648a646e53600ad28aaa7b367b57ba7defd864e2d6f26d936atomcat-docs-webapp-7.0.76-12.el7_8.noarch.rpm71c5c6d72f624ffa6b839e9bcfbbbcbe3913c825cdaf925512c67fd690a05f5dtomcat-jsp-2.2-api-7.0.76-12.el7_8.noarch.rpm89faea5c27f9ba37fcf946043744a979e2c99313428a1a2935966e972bd4b793tomcat-7.0.76-12.el7_8.noarch.rpm2234847dcd7fa60361a4accac11ec3349e136d5dd0a01b48268c648fd1eff9cctomcat-javadoc-7.0.76-12.el7_8.noarch.rpmbd20b2ff25aab62f88dc50ebd511b1efa213633c9a392956294be1e8569bb830tomcat-lib-7.0.76-12.el7_8.noarch.rpmeda892448414e87da9ff32ad5932c5f291979dc375c0a6644f7ac2a6b21597d5tomcat-admin-webapps-7.0.76-12.el7_8.noarch.rpm6f8c274a9812b9636f362949523d38f849a474bff8a6c76b60547dfa3b9d1ffdSLSA-2020:2549-1LibexifSecurity Fix(es): * libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS (CVE-2020-13112)moderateScientific LinuxScientific Linux 7libexif-devel-0.6.21-7.el7_8.i686.rpm373ba02ed9b2ae6bc06f267481a798a08fec0261c71b72a2100df9d252f83332libexif-0.6.21-7.el7_8.i686.rpmc731f7c864d5c08eb8018f648acb6c8fb480af267187a33208686f026019a228libexif-doc-0.6.21-7.el7_8.x86_64.rpmfb6c09c5635eca3582102cac1ad55a2622147ce56a0a8f82118acdab2c25f03flibexif-0.6.21-7.el7_8.x86_64.rpm7a3c4f8ad022dfdb13821c3acd66aeb43aa6733187964b1f76edbab3796ca8delibexif-devel-0.6.21-7.el7_8.x86_64.rpma059fdf6e7ec0706d9ce204422d7d8f28771890b01be3f18aea052f098d36e45SLSA-2020:2615-1ThunderbirdSecurity Fix(es): * Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage (CVE-2020-12398) * Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405) * Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406) * Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)importantScientific LinuxScientific Linux 7thunderbird-68.9.0-1.el7_8.x86_64.rpm067390d0a29459a3cbee073306c004ad2891f458b865be0fdc25264f51456f33SLSA-2020:2642-1UnboundSecurity Fix(es): * unbound: incomplete fix for CVE-2020-12662 in SL7 (CVE-2020-10772)importantScientific LinuxScientific Linux 7unbound-devel-1.6.6-5.el7_8.x86_64.rpm7c6a0a9a3ce954b42f441f984c16e5007148b2044b2c1ca4b702fdf3425c187funbound-devel-1.6.6-5.el7_8.i686.rpme4d1194d308cbbe07ceb33b12bf886fdeb4daa6d46dca5d96f1f0832e8e62eebunbound-libs-1.6.6-5.el7_8.i686.rpm6a9e60a66c4be3b716934ed18899cf66467fb19964156094a4d74029159a67bbunbound-1.6.6-5.el7_8.x86_64.rpmc68935a7548914dd8fabd3c8d5b3eff283b4178c889ed7544f793ba942b514ecunbound-libs-1.6.6-5.el7_8.x86_64.rpmf0af67c9e40d854eb96469c365377a4aa5a3acb581ff8a5c89a31d001fee6148unbound-python-1.6.6-5.el7_8.x86_64.rpm4db9dbfe2b4069672ed6659c68246288e5cc71f54f41f492c63f36b58d11f5a7SLSA-2020:2663-1NtpSecurity Fix(es): * ntp: ntpd using highly predictable transmit timestamps could result in time change or DoS (CVE-2020-13817) * ntp: DoS on client ntpd using server mode packet (CVE-2020-11868)moderateScientific LinuxScientific Linux 7ntpdate-4.2.6p5-29.el7_8.2.x86_64.rpmf4c6ac47a1840ed72d2fc8d8a16624c4e51fda030897495d3a45231b091d4818ntp-perl-4.2.6p5-29.el7_8.2.noarch.rpm48732021b8c5aa13132971e6568f7758144a5107e46eff4890b62ecd7b833c99ntp-4.2.6p5-29.el7_8.2.x86_64.rpmc59dadad0707f467fdb42c482350d8eb1b8f9ad6525ab4bfa958d26cf582c197sntp-4.2.6p5-29.el7_8.2.x86_64.rpmbdbf0c685b0eeb1cb023568bd9595c0d6882427d1c16169716959daabf770cd4ntp-doc-4.2.6p5-29.el7_8.2.noarch.rpm9c302ecfc45afe6bf258a77897eae9ca69b4b5bd7099e68b4d956e3bae7ee900SLSA-2020:2664-1KernelSecurity Fix(es): * Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)importantScientific LinuxScientific Linux 7perf-3.10.0-1127.13.1.el7.x86_64.rpm73760a7f5ed4f2f865f1240e8201129eb3c6cf59ca5ffdcea9cf599685236dc8kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm39c06e89374fcf4a058cb271a3a2d5a80024de40f3b9914e87bcc51553788346kernel-3.10.0-1127.13.1.el7.x86_64.rpm260bbfe988600b5b26a7c446a0b7b8b9e50bb1f904176d1b4b646196aef2f125kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpmb45deac3bbab816df551e1cdb11d1d981dc039d03f7837c26ed1c7643b3d04cdkernel-doc-3.10.0-1127.13.1.el7.noarch.rpm340fdf47cbe5cd0ac1fd7aea3b8a4baa81d8bf2653899238971633d61d361d99kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpmdeb9a3548569007092ef2aa5c493856874aedac630280d85e5235386d4fabdbfkernel-devel-3.10.0-1127.13.1.el7.x86_64.rpmbec147380af93c9e21766f4f9c0a92b12ce2457acd25563504f977aec94e6f5cpython-perf-3.10.0-1127.13.1.el7.x86_64.rpma25454d4ace4e8f382747605e7e3c11a0189991dc6c55b577e18874cde7d24b5kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpm5562ab6d6e7d07dbb96039bf153f8d6c9e297c83832e9ec8e9e0676094dc58a0kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm325792a6f0d6d111b18fb035cc00db0e54a1e7444510e621e26f3a1ed0a6cdbekernel-tools-3.10.0-1127.13.1.el7.x86_64.rpmc51c9f94e102d860242a2d8576ef8087c923fb82913893d0e4cc2018aebb025ckernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpmd19a378b9d759ccbe18331b4cbe0e2648616effc56c054905443ffc8e72c5bf1bpftool-3.10.0-1127.13.1.el7.x86_64.rpm59879294d334b00829f6737d527f3874361329c5939a137d75e2f5d465c722c0SLSA-2020:2827-1FirefoxSecurity Fix(es): * Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 (CVE-2020-12417) * Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418) * Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419) * Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420) * Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)importantScientific LinuxScientific Linux 7firefox-68.10.0-1.el7_8.i686.rpmfb0e14e53cefd80e6c2af9aedeadc058d8791914b82c2defd686469c5024962dfirefox-68.10.0-1.el7_8.x86_64.rpm84332b01d8275c1aa7b81f17105c111505a637c65ab1d11d98ec7f82de02b5eeSLSA-2020:2894-1DbusSecurity Fix(es): * dbus: denial of service via file descriptor leak (CVE-2020-12049)importantScientific LinuxScientific Linux 7dbus-x11-1.10.24-14.el7_8.x86_64.rpm8b7b8dca07e2b37d52c5f29490c991d4ea65d5a2e41d1b8f88b1069de77ad35cdbus-tests-1.10.24-14.el7_8.x86_64.rpm2d3b5c804b3644d8aecfafb70cb0f23e98279fa2c84245b069bb7af61369779edbus-libs-1.10.24-14.el7_8.x86_64.rpm18d377ccfea34a09a7e92404055a9fa4b3de2cfd75229cf3cab6ebfa8bd2c439dbus-devel-1.10.24-14.el7_8.i686.rpm5b0358f9e63d9da0e5fbece921c0dfd3a492f9d1c887aa53081b14df9e4914badbus-libs-1.10.24-14.el7_8.i686.rpme3e590e330e2b5379205b0d551eb65e4574bcc1341d8d27e77790bc1514516a5dbus-devel-1.10.24-14.el7_8.x86_64.rpmb558ba5ac9e20a6514d8aa7476940cec464a3165cedd0f7c6250b4f99d38aed9dbus-doc-1.10.24-14.el7_8.noarch.rpmbced54d940739cd0ae17d64250a1e063e093d5c45ff3666e553d83e58a530ee9dbus-1.10.24-14.el7_8.x86_64.rpm4f4730bd1a24bc1ffef6f35bf10a374828fa22f1d530e1adcdbe867453a11dd0SLSA-2020:2906-1ThunderbirdSecurity Fix(es): * Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 (CVE-2020-12417) * Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418) * Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419) * Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420) * Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)importantScientific LinuxScientific Linux 7thunderbird-68.10.0-1.el7_8.x86_64.rpm5fce71dd35aa68a2c8c13d9af40d68331a0d63661ac949f9b1e3949d3c2b1d5cSLSA-2020:2968-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583) * OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593) * OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556) * OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) (CVE-2020-14578) * OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) (CVE-2020-14579) * OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621) * OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-accessibility-debug-1.8.0.262.b10-0.el7_8.i686.rpmc25b46a0d2fe83eb11de1b3c67406cbb32d21adf5e36fef22d175b1fa55acbe1java-1.8.0-openjdk-demo-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm1ce8d5e98058aa62e74b621b70cb470bbb2e740c8afd71b516dd5d3bdee13e4fjava-1.8.0-openjdk-src-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm62497feef406d5b15f4ba290705aa480747061a4ceb1ab96ebb2a7cfce1c1d46java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.x86_64.rpm33d57328b81fd57106f8ea3d1351bd90fe2297303cb89bef4f1fd43b673d67dfjava-1.8.0-openjdk-headless-debug-1.8.0.262.b10-0.el7_8.i686.rpmbadff50ef5eb9b8c1415f5a2a0b15fa903258ff032200a5870296f5d6fceadd3java-1.8.0-openjdk-src-debug-1.8.0.262.b10-0.el7_8.i686.rpmb3077b5c669315372b36c27a12b8e88a50bae2d8715bb3f8e09efe3bb1644caajava-1.8.0-openjdk-debug-1.8.0.262.b10-0.el7_8.x86_64.rpmd33b17d742e7dd4d19d6b23c10b0ef37d3f68d5110d4aa92ecf6702bfbe06636java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8.i686.rpm12926aff4ac3519791ae6b2c8ac72fd448b3a7ca27788be3fff97e353628a6a6java-1.8.0-openjdk-demo-debug-1.8.0.262.b10-0.el7_8.i686.rpm2f7f31f5a58b0afbaa8c86636762fe3310f740f66376351c35e3c2500b80638fjava-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8.x86_64.rpm9003c15b94226ffb46ce3a4c6450ffe9c97ab26406e58fb9cf8d8d83cdce85e6java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8.x86_64.rpm60d10537b8ebf4032b9e6a05dc87d6bb953a7463285cfec2402129046e4cbb8ejava-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8.i686.rpm676b594dafbcf182b6c99b8522dc4ee8ef2145eaa8c51da89dfb812220a267a9java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8.x86_64.rpm5599516b9e86a557c7c008ef0da9aaa12c95aa99490912504b295946ed7d0a07java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.262.b10-0.el7_8.noarch.rpm124d974d1d111a6a5763a63b98374a4471590e716124272c4d75f9ffd0cd4c65java-1.8.0-openjdk-accessibility-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm733b5605d57fe3641bbb3ee20eba698a16f11503f8e9034aa74d578897a683fdjava-1.8.0-openjdk-headless-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm99f2678549de7ab83bec22d2e6be32301ec8472ca4d97b0803a5c4be5da90540java-1.8.0-openjdk-devel-debug-1.8.0.262.b10-0.el7_8.x86_64.rpmb71b02a5272e24e6aaa0e1332b5f970c0dd3a29f195e019638d2553b80f8e195java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.i686.rpmb2673b9a059a08890340af10eda8f0598b70c835ac2b9acbd55437b7c13c1c64java-1.8.0-openjdk-devel-debug-1.8.0.262.b10-0.el7_8.i686.rpm335ca82c895c3d7c895c4568fa6565a1d979a1e27188caff3d048b1c41a73774java-1.8.0-openjdk-javadoc-debug-1.8.0.262.b10-0.el7_8.noarch.rpm996c6b9497139853baa1e5056cc7a8c24976b291b0e32f1a492684eea628890ejava-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8.i686.rpmfe27cb5dc3b7653c620c93e1c5a0d4c76e6dc1c7887ee946c18692327dd80f24java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8.i686.rpmea621a3aae7486798d54351a033bdc49301bf86a9ffe4f62b57d3f0caa5ab162java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8.x86_64.rpmb0aef98fcf54214b77c05910e3508cef7e752e45f774a8c234736b2d331e53d7java-1.8.0-openjdk-debug-1.8.0.262.b10-0.el7_8.i686.rpm7c929553ac57db6693e4f22c201c682025b3492a12ef5c5214dfcdb3f89f04d4java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8.i686.rpm292248066f124c758731e9bc2c3eed55b660ac2a4f551e3bd89de7fcb0230eb6java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8.noarch.rpm652f496dcc0797a659abc7a25ea9a772c42386f650c98eee0f198cb2bd459e49java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8.x86_64.rpmd37e78aae8a614c6543a578e5913d9496533c25b757b36e12f0367d8cf1aab3ejava-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8.noarch.rpme11e861a1b9bc2136d69c988f8f64cb2ea670fa18785041bc4becf983ae36b2eSLSA-2020:2969-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583) * OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593) * OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556) * OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562) * OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573) * OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621) * OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)importantScientific LinuxScientific Linux 7java-11-openjdk-debug-11.0.8.10-0.el7_8.i686.rpma9b0110419f1df152ad813e59f935cfc82b2086cd52190e4d599446033d22be2java-11-openjdk-src-11.0.8.10-0.el7_8.i686.rpm0319a6a2690357159a8ffb7e724f2dc63e65d0f824fea8e1ccb7db206cfefea7java-11-openjdk-jmods-debug-11.0.8.10-0.el7_8.x86_64.rpm21f4b120ad248ba5b9b3fe1ac7cbe03ebc0f6ea8cb04a84b8f9b996de8c46da4java-11-openjdk-demo-11.0.8.10-0.el7_8.i686.rpmffdc82b2637ed4a610baf7ce17f8dc1f1920af7b956d92ee39a57475417db588java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8.i686.rpmbeae6c0ace8672eed4179d03e27af0db9ca384c03b8083a52963d56c68503b69java-11-openjdk-11.0.8.10-0.el7_8.i686.rpmef778642f06039caca9c495fa2c3451c3dc658f2bdf839d1d8a643aa8eea81e1java-11-openjdk-javadoc-zip-debug-11.0.8.10-0.el7_8.x86_64.rpm77e4e569ae072a1b740159a132f138bc754f1544d9c420bd6786a238758883ddjava-11-openjdk-demo-debug-11.0.8.10-0.el7_8.x86_64.rpm86f027d64500ffc8807669355479ea664ac130a726ae38ccc17e3ba2a603b156java-11-openjdk-headless-debug-11.0.8.10-0.el7_8.i686.rpm6054356c4b57d0c879e97ce6bc12eee483f15421b2c2ca454921c50cd24281d5java-11-openjdk-headless-11.0.8.10-0.el7_8.i686.rpm633cd5aa2cfd41f7c6a46610edd9b5a51f8c414f068df144ad703fe8a78677fcjava-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8.x86_64.rpmee7c81b54bbc1c5f693b457515c634a9ebeaae78a09333d51e6b70c4ed86d27fjava-11-openjdk-debug-11.0.8.10-0.el7_8.x86_64.rpm35612cf7654f5d8767ecd8687e4f61d507df7d63d37839aaf879f2f2a4631e8cjava-11-openjdk-src-debug-11.0.8.10-0.el7_8.i686.rpm610bb16318f87ba2db84e3cff209f26a8317146b61936d49c5b33b97266b6a70java-11-openjdk-headless-11.0.8.10-0.el7_8.x86_64.rpm51f59303cc115ffadff1e3cc850dd1b7ee3b3702c013e36c82b58eefa6bb641djava-11-openjdk-javadoc-debug-11.0.8.10-0.el7_8.i686.rpmc9fd077067ee02b0c2999fbd750d182859cab791c0994bc636e5d907d858b096java-11-openjdk-jmods-11.0.8.10-0.el7_8.i686.rpm95853bfe16b648ee8486dfc4f076a6b6b3d621f3893bccd14faacb14869d7c45java-11-openjdk-javadoc-zip-debug-11.0.8.10-0.el7_8.i686.rpm808b3edb8a347caf2c5126f87b7b6e1ba8166ed8ea3598265ec3b242733016f2java-11-openjdk-src-11.0.8.10-0.el7_8.x86_64.rpm39ac0c3a1a8111716bbaf498e8993079c0840924a208ca7ba5973aa863354551java-11-openjdk-demo-11.0.8.10-0.el7_8.x86_64.rpm7be688a2a93060eec5425fc00f4b7af5ab784ee7c4aef31d629b64b037435794java-11-openjdk-devel-debug-11.0.8.10-0.el7_8.x86_64.rpm8de9124203a43fe5c94405f575f6c42fb868120f6e2766f886cedc2c0e23eb8cjava-11-openjdk-src-debug-11.0.8.10-0.el7_8.x86_64.rpmee1245080879d431ec2ef46ab06712e7a073223e13516848dbff8778b54ff40ejava-11-openjdk-jmods-debug-11.0.8.10-0.el7_8.i686.rpmd71ae88e48578c33a45d6151bc308caf01f54056e76215b8f44a1d262c35552fjava-11-openjdk-jmods-11.0.8.10-0.el7_8.x86_64.rpm220ed7a3d41c2757e5635f7cde6a313b56ae8a06c7b0b3eed78f34a1d3533367java-11-openjdk-javadoc-debug-11.0.8.10-0.el7_8.x86_64.rpmb5418245f0890743c2846e4f495002efc9736dc3d1bfc82fde9e78eaab81b304java-11-openjdk-devel-11.0.8.10-0.el7_8.x86_64.rpm26e1bfd3f61c884608efb4efab299256215f56bce7a175106e3a62c5e83f5d35java-11-openjdk-javadoc-11.0.8.10-0.el7_8.x86_64.rpm268ce71bdb1210ebdcec9675e7dec2d4e9f8da2917c6d3d56aca61fe3d8b2c23java-11-openjdk-devel-11.0.8.10-0.el7_8.i686.rpm2ec52909847d2f94c62e643b04828c33d547df0a57aeba57d3666192c61924aejava-11-openjdk-demo-debug-11.0.8.10-0.el7_8.i686.rpmd5efda7ddb576c748a34b6427d05b6bfc969c18647f54d0dd55d334ea20de010java-11-openjdk-11.0.8.10-0.el7_8.x86_64.rpm9329751833ad7e0040ce3234c094823dac3879b7c0da664da3660c41cb1e1c5djava-11-openjdk-devel-debug-11.0.8.10-0.el7_8.i686.rpm6570ac3910a747e508d90aae0ee3d442c1541e381b48210f4b4b9ccd477f8f08java-11-openjdk-javadoc-11.0.8.10-0.el7_8.i686.rpm413b519b8c832957880ba0fe3cc2901fc0a683df3d1c8274c218edf574d4dd9cjava-11-openjdk-headless-debug-11.0.8.10-0.el7_8.x86_64.rpmba7b71dd858372163c956387ea6b510ac790312f58875b579e90b6898ac38058SLSA-2020:3217-1Grub2Security Fix(es): * grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process (CVE-2020-10713) * grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow (CVE-2020-14308) * grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow (CVE-2020-14309) * grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow (CVE-2020-14310) * grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow (CVE-2020-14311) * grub2: Fail kernel validation without shim protocol (CVE-2020-15705) * grub2: Use-after-free redefining a function whilst the same function is already executing (CVE-2020-15706) * grub2: Integer overflow in initrd size handling (CVE-2020-15707)moderateScientific LinuxScientific Linux 7mokutil-15-7.sl7_8.x86_64.rpm25149e24397bb7a04aa20ec53bfea557a0bb0606131666472c15f628ab5cc254grub2-efi-x64-cdboot-2.02-0.86.sl7_8.x86_64.rpma25e9b06a21f68fa1fc8a16c20969e11d4a6a7471cbd44f8605191d16a5da129grub2-efi-x64-2.02-0.86.sl7_8.x86_64.rpmca76b954d60a5e3e974f468ce8d2037041b36d8743e88985d7ae0a3a83b55640fwupdate-devel-12-6.el7.x86_64.rpmcd508ed1e4060d9fc856667f9c06a35df72dbea1c3549926f23ccf7c005b2e34grub2-2.02-0.86.sl7_8.x86_64.rpm95329c2057da4c23c41507cf9db560277301222eee5259921851deec33a86de3shim-ia32-15-7.sl7_8.x86_64.rpm788f513bbbc9b629bd59fbf93631cf7d54b9a41b3b52d8d1599ea0fbd3f3b2b9shim-ia32-15-8.sl7_8.x86_64.rpm7e4b9f377e73df5edd541b2ce5855eac42369c8408bfd454eeabb9252fcf8aa4grub2-tools-extra-2.02-0.86.sl7_8.x86_64.rpmb15e14291090912c8b1e3b1ca4e3e49020d58caf1d91fe19311d1624c4f64174mokutil-15-8.sl7_8.x86_64.rpme242f2611a84fc7af2d5ad684179b38d633e9521aa4ee9538f7eab4f96624774shim-unsigned-x64-15-7.sl7_8.x86_64.rpm388c84a4a6aeeb792fe7f9720b28ef933186396d72e49f1893fc8839967e3810grub2-pc-2.02-0.86.sl7_8.x86_64.rpm4e11c0dafc44e87829f70827b400353dfd7d1473b517f838c5f545f628f55e24grub2-efi-ia32-modules-2.02-0.86.sl7_8.noarch.rpm383e09759462fdd31408346574526270c4a15c3201c47360a5b35016c073ad1egrub2-common-2.02-0.86.sl7_8.noarch.rpm8438ecb28b007ae06eee6231a766fc0a55d415f44dc14ff831d895e5a9c527cdgrub2-tools-minimal-2.02-0.86.sl7_8.x86_64.rpmff7406b6020f013eb36ccf7591fb46c36bbec1ed7b46c6507abef7752dc0615afwupdate-efi-12-6.el7.x86_64.rpm5e9513f385cd09ba69a243b3e00a1a46f1f1410ab0acbb803a3c7b616dd6611cgrub2-efi-ia32-2.02-0.86.sl7_8.x86_64.rpm9c786a669ef363b8b6862cfb5982d5d5d712e2235a536b1ff3fc30176b8444cafwupdate-libs-12-6.el7.x86_64.rpm31f60b8c9f5f402ee306fb5e1a9a4dca1bc700ebd972f7cc2d7b189554226fd4grub2-pc-modules-2.02-0.86.sl7_8.noarch.rpma906cfc95bb28c7a5506ed6509fe26f4c7b0ab9cd42f7c4aa7ff3bd112fd1ca0shim-unsigned-ia32-15-7.sl7_8.x86_64.rpmc3bb830b14b10e310d48796ae1b055c730b3143ffac5654e7b49491dd8849721grub2-tools-2.02-0.86.sl7_8.x86_64.rpm9837f02dc7cb340ab34f3155610f0a979c28c25c540c88798c0206c08484e0e1fwupdate-12-6.el7.x86_64.rpm25da2674b397b0a9a39a7d6add874969a8546564f3010532a4e4d9b92963d9fegrub2-efi-ia32-cdboot-2.02-0.86.sl7_8.x86_64.rpmed63193ca324bbae6daf61b5fc08dcbe9c2fd37e43a1481943e96fe8761ced76shim-x64-15-7.sl7_8.x86_64.rpm46faa14554f3fa8ea68524bd67bb9bdcef66aca62ef694e8b4b67bdf0b5fa802shim-x64-15-8.sl7_8.x86_64.rpm68555de75739afa5dac0bfd9ce0abf46b78421d3ac3d483d41e4058d7074fa7agrub2-efi-x64-modules-2.02-0.86.sl7_8.noarch.rpm2806b7d73ed638e7423ed0f09473c2006b2455adfa821e090f6b950f40187585SLSA-2020:3220-1KernelSecurity Fix(es): * kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757) * kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653) * kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654) * kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)importantScientific LinuxScientific Linux 7kernel-abi-whitelists-3.10.0-1127.18.2.el7.noarch.rpm88ef67016077eb8a8b942ac97e7f3d8799f1d14279b397761c734d681f1e37b2kernel-headers-3.10.0-1127.18.2.el7.x86_64.rpmf9bacb2300c029b3be53b09443c447567c61af3d4af2848acdfa0020099dcbebkernel-tools-3.10.0-1127.18.2.el7.x86_64.rpm6bd8eb64278ebdfdbfeff3f9791f404a96bef42fd8c3dfea102d6d675e8b0356kernel-doc-3.10.0-1127.18.2.el7.noarch.rpm914614c1e3e9ea42a3f2d570739f691437f51b5e783a87d6503f6838d2a55304perf-3.10.0-1127.18.2.el7.x86_64.rpm653935c5e314256387530bd667c6c06cf0b52ffcf3c94d664e41767a545f149bkernel-devel-3.10.0-1127.18.2.el7.x86_64.rpmf748cf0459c04f6ce6740d925a703bcf5b780d9bca65877b4a44d42912dd6a61kernel-debug-3.10.0-1127.18.2.el7.x86_64.rpm30ec54dd441a6ea14c14682f8f718e25ce2787f3b709ead1afe0f54681a0eef6python-perf-3.10.0-1127.18.2.el7.x86_64.rpm80ce8ccc6a835980ec28b8571c8cd75bf3e3d63fe8e1162512cbda89e2eb1201kernel-tools-libs-3.10.0-1127.18.2.el7.x86_64.rpmd341efa571760005bd5d2d41362e502d942cd74d6aabf02665c94df99993f5e2kernel-tools-libs-devel-3.10.0-1127.18.2.el7.x86_64.rpm587ea412e4e4ba2cd041c9ffe2f5e899f162b1cda9851db5480c856c549357d5bpftool-3.10.0-1127.18.2.el7.x86_64.rpm144df27c7cbbbc8e3f48da52b9f104dee49b8664366ad54b28848fba84df7dd6kernel-debug-devel-3.10.0-1127.18.2.el7.x86_64.rpm57c45c7cc9913221da733a6605580c03477fa2ad68ec63f8c35612c7679be57dkernel-3.10.0-1127.18.2.el7.x86_64.rpm3021ec30d21977edbc80fc09fa562f665075717c6d0636e1387856f1fed1399cSLSA-2020:3253-1FirefoxSecurity Fix(es): * chromium-browser: Use after free in ANGLE (CVE-2020-6463) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) * Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)importantScientific LinuxScientific Linux 7firefox-68.11.0-1.el7_8.x86_64.rpm891f97022fc7edcd6ade88f35d3a30ef46863d355a5249dba2b02b5f0d3b8043firefox-68.11.0-1.el7_8.i686.rpm36cd5a2c005fbcb8a7a0a3ee3e8258a8886069f2da069254baf722d641b254b8SLSA-2020:3281-1LibvncserverSecurity Fix(es): * libvncserver: websocket decoding buffer overflow (CVE-2017-18922)importantScientific LinuxScientific Linux 7libvncserver-0.9.9-14.el7_8.1.i686.rpmccc988c09ea9883f4139451b785491799ac2b409bc5077ef5206e911a7c42cc1libvncserver-devel-0.9.9-14.el7_8.1.x86_64.rpm7615c1aa2b9cbe5173daf75127f9dc7ad88f9361597fa68a570188fe2237470flibvncserver-0.9.9-14.el7_8.1.x86_64.rpm9ffc66f52ef7c3e3b2f137e9d2a2f3b0a3116e2f21aa3b3ee039b6c2f4a617b4libvncserver-devel-0.9.9-14.el7_8.1.i686.rpm4f2981733cb6094d99e319be3895c311d4430ef0f9d78bf50c1758ed0964c237SLSA-2020:3285-1Postgresql-JdbcSecurity Fix(es): * postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML (CVE-2020-13692)importantScientific LinuxScientific Linux 7postgresql-jdbc-9.2.1002-8.el7_8.noarch.rpm3289199b7bfb79633a8fb67109b9a8458b7c3fba0948164b83d76976e0195228postgresql-jdbc-javadoc-9.2.1002-8.el7_8.noarch.rpm63b0078e5f040d3d4583dd5976c42a5ba0cfad49a314d60567ea1a85bb00588cSLSA-2020:3344-1ThunderbirdSecurity Fix(es): * chromium-browser: Use after free in ANGLE (CVE-2020-6463) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) * Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)importantScientific LinuxScientific Linux 7thunderbird-68.11.0-1.el7_8.x86_64.rpm39bd1f9624b8bb39d2a4ea429c6a261c079ee917961f09ff57cb1f32ff5d1ac2SLSA-2020:3556-1FirefoxSecurity Fix(es): * Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664)importantScientific LinuxScientific Linux 7firefox-68.12.0-1.el7_8.i686.rpmc4c7806f3c2ec925e5079abfffdde33edb14dff920a9bdbb53a8d9ad2f19f71ffirefox-68.12.0-1.el7_8.x86_64.rpma6a85479c9ffbed96a2292cd56983b7bf9f54a69947184ac2854396e66f38957SLSA-2020:3617-1DovecotSecurity Fix(es): * dovecot: Resource exhaustion via deeply nested MIME parts (CVE-2020-12100) * dovecot: Out of bound reads in dovecot NTLM implementation (CVE-2020-12673) * dovecot: Crash due to assert in RPA implementation (CVE-2020-12674)importantScientific LinuxScientific Linux 7dovecot-mysql-2.2.36-6.el7_8.1.x86_64.rpma507781d099d497f58bf28a0a357bd8cba7163e41b48f45fdf5693170b2f0fd4dovecot-devel-2.2.36-6.el7_8.1.i686.rpm01141fb6f2c7b54ce8ed764f3c7125dfbc24338f1129d23db898bd484cb09958dovecot-devel-2.2.36-6.el7_8.1.x86_64.rpm814f2c5519e688465446faa3b3d2d24438bb325d672bca752edf466366bab08adovecot-2.2.36-6.el7_8.1.x86_64.rpmc71bbc74d5af3dbf7070a4f48976ad5431c8ac657e775beabb3c056758e7848fdovecot-pgsql-2.2.36-6.el7_8.1.x86_64.rpm1ef83742a0476b97e60facf48a5a992985b3cd60e968c43f1f14c497c5c98df0dovecot-2.2.36-6.el7_8.1.i686.rpm7731998263496ea7694a4be9c4f0d731f462be7ced5420b5741fa2613cf5126cdovecot-pigeonhole-2.2.36-6.el7_8.1.x86_64.rpm2363f0e5efc1185c5e6ba573a7a92df42ceaa1e98583bc2e7f600442e0b8af5dSLSA-2020:3631-1ThunderbirdSecurity Fix(es): * Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664) * Mozilla: Use-After-Free when aborting an operation (CVE-2020-15669)importantScientific LinuxScientific Linux 7thunderbird-68.12.0-1.el7_8.x86_64.rpmdff64d6f24363451749037dbcf0758e2f7df584b87719e9f0b78c987476a9979SLSA-2020:3848-1LibmspackSecurity Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)lowScientific LinuxScientific Linux 7libmspack-0.5-0.8.alpha.el7.x86_64.rpm41311f31457f4f756f9e1942224751cff503b72d974ae4f22f07826c2aa128bflibmspack-devel-0.5-0.8.alpha.el7.i686.rpm33ad46ba4af18f39fd96519dccec0d132e06e32c0fff3ae0f184a699fb2ef1d2libmspack-0.5-0.8.alpha.el7.i686.rpm71aa1de05bbbd120f8a80c43e91bf43cb02888f16786e63e755847a8e2b9d535libmspack-devel-0.5-0.8.alpha.el7.x86_64.rpma7c8d1b66389e0e5b8d28c80232607abbd6c5b2d858566697ba0f15c6e15fa7aSLSA-2020:3861-1GlibcSecurity Fix(es): * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE-2019-19126)lowScientific LinuxtrueScientific Linux 7glibc-devel-2.17-317.el7.i686.rpmb54addb92e1fd63a02c50f03488e00892a51602fc1208e3d9219ee3b0425097aglibc-common-2.17-317.el7.x86_64.rpm3e35753d321f94879f260cecfab0f0af189cfbde3be8a81b74a6534e5b61c0b4glibc-utils-2.17-317.el7.x86_64.rpm4bee882d975d57ec82e900cd282b206c125da3d188900829f5b4b7b26a7f3c6cglibc-headers-2.17-317.el7.x86_64.rpm08b6e6a7a630564ff22d00916d88c866a84cecedd53d96f14fb3213033634c45glibc-devel-2.17-317.el7.x86_64.rpm5deae7193de12549166f1cd5b82dcb13ad609a517597b5460c029b2c22bb3c72nscd-2.17-317.el7.x86_64.rpm60fed772cfa9694f3f618c1bfedf86fff5300877ff3f31a57e6a65598be2d86fglibc-static-2.17-317.el7.i686.rpm298dc4ef9855e9fa6360093578e621ec4cf5f44f9f8a1b1f0adb5f13d9e5ee83glibc-2.17-317.el7.i686.rpm3d66fa6a4fdf2d1c3d2f6853c35958e700556f22826998c21839ef65b535c228glibc-static-2.17-317.el7.x86_64.rpm6a2e3e27b3b370ff2c77d99f82524a5b5a736b3162dfd214e9e846560fd6b95eglibc-2.17-317.el7.x86_64.rpm4c7ef22bb13adea1db797d46db4d7e38144839a990b00791c5b146ee5f1959e0SLSA-2020:3864-1CupsSecurity Fix(es): * cups: DNS rebinding attacks via incorrect whitelist (CVE-2017-18190) * cups: stack-buffer-overflow in libcups's asn1_get_type function (CVE-2019-8675) * cups: stack-buffer-overflow in libcups's asn1_get_packed function (CVE-2019-8696)moderateScientific LinuxScientific Linux 7cups-ipptool-1.6.3-51.el7.x86_64.rpmabbf65d0730c8623d87d754b024e0e71a6c6469b922d4cbf6aee7748986a4f7bcups-libs-1.6.3-51.el7.i686.rpmf34fd5420818e5d64bdf14e69b516fc8e7419d8e587a5cc2002ac4eac0fec31dcups-client-1.6.3-51.el7.x86_64.rpmfb79471cac1098e9e9ce97fbab3436252d162e208ed31055af01fc1ec9940a48cups-devel-1.6.3-51.el7.i686.rpm48ff95dd5b1ea2d6772013197c49e35e13a13e47cdb8cd694f26ac6419b86f51cups-libs-1.6.3-51.el7.x86_64.rpm6a4150f8ba8a33881386c4f43fe3ca5d5337d6b4faa98af7c66b4323b49602f5cups-1.6.3-51.el7.x86_64.rpme497103a7aa7818ece2a98adcd40446797765527f149a3ca68cb89e52f80303fcups-filesystem-1.6.3-51.el7.noarch.rpmf8efae5dcf706474ab5dc48bfde94d65d3b60290f9d2c1dd064905d205f7b99dcups-lpd-1.6.3-51.el7.x86_64.rpm3b060a15d6c5d947cc771b8e7e276d15d428243facdd7d802a522fe805f3f5aacups-devel-1.6.3-51.el7.x86_64.rpmc6495b6587fa162de9f7af52b39218ec00db42d1c00b9381cfe144b4df09a566SLSA-2020:3868-1SdlSecurity Fix(es): * SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c (CVE-2019-7572) * SDL: heap-based buffer overflow in function MS_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7575) * SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (CVE-2019-7636) * SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (CVE-2019-7637) * SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c (CVE-2019-7638) * SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7573) * SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7574) * SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7576) * SDL: buffer over-read in function SDL_LoadWAV_RW in audio/SDL_wave.c (CVE-2019-7577) * SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (CVE-2019-7578) * SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c (CVE-2019-7635)moderateScientific LinuxScientific Linux 7SDL-static-1.2.15-17.el7.i686.rpm9f01a6029c0164c93afd860499f7360fa6d73c01e43f68d77bdc39914ea36364SDL-static-1.2.15-17.el7.x86_64.rpm184508f6f204d853a4ce76b79a0128684e4daf7db07b8aed42483bda21d95172SDL-devel-1.2.15-17.el7.x86_64.rpm26d9cba78f9af85dd75925d8969cacdd3cd0040c1a33c50cd4538e7f2210dcd8SDL-1.2.15-17.el7.i686.rpm90afcf2b1ae15e0b807d48864fd939a88b5e584d9e4c4365794a7a739c569d02SDL-devel-1.2.15-17.el7.i686.rpm9c3dfe7904800b07de5904704f3b43a23e2a692f3f455018e0f5095e47ac0ed1SDL-1.2.15-17.el7.x86_64.rpm740d2d2435ed2310b1ecd7dd28552f2d8e6acea070ed35d416d9c0e05b219085SLSA-2020:3869-1PcpSecurity Fix(es): * pcp: Local privilege escalation in pcp spec file %post section (CVE-2019-3695) * pcp: Local privilege escalation in pcp spec file through migrate_tempdirs (CVE-2019-3696)lowScientific LinuxScientific Linux 7pcp-pmda-weblog-4.3.2-12.el7.x86_64.rpma454a7212895649230aa8b8773377e2b7abb57748e17dad7c6a82ff91b678e9epcp-pmda-json-4.3.2-12.el7.x86_64.rpm0232ddeefa4840d074f9e382a5730369a5b15828c07fadd4c0cd6bc1409ecdd0pcp-pmda-lmsensors-4.3.2-12.el7.x86_64.rpm36f129bac1ef3cd113865d963391f70527cd18a9356629a03cc0fc0af2714b17pcp-pmda-perfevent-4.3.2-12.el7.x86_64.rpmbc5b0bc62804ee029cd8a9ae5c6f87d831d92de5b4826728fc3b07d6cc0e629cpcp-import-sar2pcp-4.3.2-12.el7.x86_64.rpm6c0cc250506da7c4c449b0a09b6e1dd6336b0b69222fecac821b7f6ae0ac896fpcp-pmda-mounts-4.3.2-12.el7.x86_64.rpm28f2023572aee618b698185d867d23a2911e6feb479d5eea01c654279162a527pcp-pmda-lio-4.3.2-12.el7.x86_64.rpm704fb5287922c28a1f768b7ab9005e3cfef030b9a07fd075e56286fdb3c60933perl-PCP-PMDA-4.3.2-12.el7.x86_64.rpm548bf0cce3d40be957caa901a926f47a3bcf4c391ef349dd6abe26a84bac6eb1pcp-export-pcp2spark-4.3.2-12.el7.x86_64.rpm43aeeff52449f37de6a073bc442992d0f25c7515a422451e77a9f61e38ce1381pcp-pmda-prometheus-4.3.2-12.el7.x86_64.rpm1ab5a52191aa2b9032268963b20b966c58219f4c6bcd3a84017fbeb71ddea360pcp-import-collectl2pcp-4.3.2-12.el7.x86_64.rpm7d602a9cf5b23d89c4a2f5a0215355d02fff23b835c1c3bb62be139538be1c9fpcp-webapp-vector-4.3.2-12.el7.noarch.rpmd965889635760a409ba1db0e6be686732d03ba698e7bd520be67e8eed309507fpcp-pmda-elasticsearch-4.3.2-12.el7.x86_64.rpmfc127b59a84407583f19aa226119fd6b7ec97312321759794c869b12890b79cdpcp-devel-4.3.2-12.el7.i686.rpm3a043966b438e7b70b0e746e0eb3a03d5df4ad1ece6323104d995d93a527a5fdpcp-export-pcp2xml-4.3.2-12.el7.x86_64.rpm40104f37b00da1b4331d82c02740d2248eec07c53a1cdaa551e6278bb5a4d438pcp-pmda-bonding-4.3.2-12.el7.x86_64.rpm8e311bd3c9a0148dc4605d32cea4328bf95432946f30391189a36c5204bb062fpcp-pmda-bcc-4.3.2-12.el7.x86_64.rpm2872768ff4db2f0331d17ee74575c96d415af909088a89ff6890c3cbe7d5453bpcp-manager-4.3.2-12.el7.x86_64.rpm48f8f9458265db55901547921ee51377e23ebbb7b4d4b19cf2d5125805dc58dapcp-pmda-dm-4.3.2-12.el7.x86_64.rpm5ac27c3daaff3ccdd950bf47bc8ded829741512b716e07bd27fff2d01ba862c4pcp-pmda-bash-4.3.2-12.el7.x86_64.rpm86246b5c92705b14a4e26d93ad8ceba3de4b714685fa028ad4a1115f0e62d9depcp-pmda-mailq-4.3.2-12.el7.x86_64.rpm69e458711e14465b398401de4bc76dbe05d336c9a897edaf275aadd7b98f1524pcp-pmda-postfix-4.3.2-12.el7.x86_64.rpmaff4025f51ee417d55e1a60bee57a8f5bf06af5fd0cf129cb5ff2de80a3b60cdpcp-pmda-zimbra-4.3.2-12.el7.x86_64.rpm7c8cc7bd10672add7a8e8aa690da7f28bac36660fb0a2c6296bffa003702bf6epcp-pmda-rsyslog-4.3.2-12.el7.x86_64.rpmb52b4b34f44eebca2f9bb3eaeab201fde66b58c4d9c8f7988ac6003eae3c3d9dpcp-pmda-memcache-4.3.2-12.el7.x86_64.rpm4595abce8417afca060ec4cdf04b48a123d1fc8986d9e1b34626e0b362fbc5b7pcp-4.3.2-12.el7.x86_64.rpma03dd25155cdafd9f19bdeae3a79f381e5a6d82d22a0feab3288ab2000aaae26pcp-pmda-nvidia-gpu-4.3.2-12.el7.x86_64.rpm34b48a857bd683b6b17ef8485c074c4cb666305807584ff03c6210e4660060fepcp-pmda-gpfs-4.3.2-12.el7.x86_64.rpmfa2f8d94f8ba6c65436eddda0a96cc35482eb9732202f77158536a668726344apcp-pmda-trace-4.3.2-12.el7.x86_64.rpm8395984bd7a7db5d6519d1d27d8a39899c3a8261e711e856a1613200dfc763d1pcp-export-pcp2elasticsearch-4.3.2-12.el7.x86_64.rpm51509bf3f0dd3a720067d0bf2fe870d4a195979e0bbe284762ce7f0baa376ee6pcp-pmda-lustrecomm-4.3.2-12.el7.x86_64.rpm7fece26ad4fcb4589facea7c55c61305423912557b940f01e59a7f539a9da2e1pcp-import-ganglia2pcp-4.3.2-12.el7.x86_64.rpmc911207fc5c11570cdb420b9093f109a9e8cf434f6b390a542d3882e76f580c8perl-PCP-LogSummary-4.3.2-12.el7.x86_64.rpma71ba75848f5455be52c265cc897c20c2406363b7d2b49663105ef124227c3efpcp-pmda-apache-4.3.2-12.el7.x86_64.rpme6b1aa988dd567e7198948d406e7b39fe274980c0a275c2da12b4ac952a9586cpcp-pmda-nfsclient-4.3.2-12.el7.x86_64.rpm5f81174aff5ff1d1450862cc1035c58164b44f9ece54fa0bb695c8e99d4b6053pcp-import-mrtg2pcp-4.3.2-12.el7.x86_64.rpmc77ade8f3323d958d756bcc7af4f7b4ab957bd82168a3fa8fe430fe4aa40ecacpcp-pmda-sendmail-4.3.2-12.el7.x86_64.rpm4911131c35164a782591490055311ed91b70f269fa933493ce25463ff7d652f0pcp-gui-4.3.2-12.el7.x86_64.rpm57c6e135711aa806c4549f61aec101cffc3780aed81e50a88c59131cab6014f7pcp-pmda-nginx-4.3.2-12.el7.x86_64.rpm3b402e84b2237bea32bc9156516b033d91bc3614b374b47f2a1c6f91f46ab46dpcp-export-zabbix-agent-4.3.2-12.el7.x86_64.rpmeaa0a4f04f576390a7dcfb5b7078ee205f3962991d2f0de623a0cdd032068ca9pcp-devel-4.3.2-12.el7.x86_64.rpm8274ec24323e0fd7a1ca0738b43245b1f6a896f499aefe6fe860ee0517bb4f45pcp-pmda-cisco-4.3.2-12.el7.x86_64.rpm5c98e31fd5f60de072922fa0a8d72f62a59fcd400d8f237f4e6eab1401f1ba71pcp-webapi-4.3.2-12.el7.x86_64.rpmd200dad51c7435df07a58883c0ebf0dab0e64fd9ac7255533c3fd2db9742a6cdpcp-webapp-blinkenlights-4.3.2-12.el7.noarch.rpm8324ac0d2aa9881d0664a933f14da0c691ed485501c3657f2c083e98853b5378pcp-pmda-gpsd-4.3.2-12.el7.x86_64.rpm0a4a628f55f730cc52c56210b31184a93dd1350d034ac54df9b705e6f0059fcdpcp-pmda-oracle-4.3.2-12.el7.x86_64.rpmeda0c7d47626662b85706829ddfcb029d5f8fc59ea2f8684319e65e05c175cc9pcp-export-pcp2json-4.3.2-12.el7.x86_64.rpm48b08bcae33f208ac72b3a27e94c02e231019fd49a4e7cd5c0b4b9df7ddf9aacpcp-pmda-smart-4.3.2-12.el7.x86_64.rpm2129308a91344e882d2d295f941b7ae93ccc8d844d94d03766bf7dca7de5cb0epcp-zeroconf-4.3.2-12.el7.x86_64.rpm2e7743a4e438f8fbd0f35e6c24f7f4499575d40253eb99f74d3c298b7de84388pcp-doc-4.3.2-12.el7.noarch.rpmec41ebaf7da387a1f16f39d6d1fe44289b03ffc7c952fc1e69a9308c5036b2b3python-pcp-4.3.2-12.el7.x86_64.rpmce52a3660802a820ff127957de7f4b874249e660834088ed1b9c0bc428398f26pcp-system-tools-4.3.2-12.el7.x86_64.rpm333a40445aca73268667005f996a88fd3ed33f381fb4dac5769ea78ef8d9c644pcp-testsuite-4.3.2-12.el7.x86_64.rpm0d95aa8daef0c28b864be440a2d59665e54d3e6f6e44282003d144662e0027ebpcp-export-pcp2influxdb-4.3.2-12.el7.x86_64.rpm8b07d0f0b1eceae8f0ef58380bb391b78927e1ca09c4976b5b909a98ea17be95pcp-pmda-redis-4.3.2-12.el7.x86_64.rpmbb12895076899f8bb934ab0095597fc4b1d9b33b784fac7f1c008fffa29c5b04pcp-pmda-cifs-4.3.2-12.el7.x86_64.rpmf301c8b3ad6dd7c7c1b9921e2f914a3dce2656c3ea016fa3278f9226f5cd456bpcp-pmda-systemd-4.3.2-12.el7.x86_64.rpm3f9a59a2ee1a7ab01c24f7c7c2f62bf9fd6242cf963e37a207b92048624aaeefpcp-conf-4.3.2-12.el7.x86_64.rpm9b6b4e8634b3bfa809bfcebfd3915134b245fb38745e949d61da59490ca2f1a6pcp-export-pcp2graphite-4.3.2-12.el7.x86_64.rpmfbfdef935f7bf379c0736d57f1ffdb001b2f2114a515b0f1553ca911241152d6pcp-pmda-ds389-4.3.2-12.el7.x86_64.rpm87899613e58e5b3d0c15911786a8c606d060c62f3be8b4ba51ac40fffeb1bcf4pcp-pmda-snmp-4.3.2-12.el7.x86_64.rpm13d4002cca44d54a0c966a8732cd0a012a43ef3b5944375c22948d06fabc2fb4pcp-pmda-gfs2-4.3.2-12.el7.x86_64.rpm188c4bd83f512aa350f5a0cde4e885c08d6b5fa3a6078f8089ae60881c44239cpcp-pmda-infiniband-4.3.2-12.el7.x86_64.rpmf29e04e7a1a4ee8dbad285d177c418f42dccec6de8fb9d6c8f5f6180b5f8cdbbpcp-libs-devel-4.3.2-12.el7.i686.rpm3731054a7e66517359dab6b2f4c2701b392ef92c285d10db904925abe5573a9dpcp-webjs-4.3.2-12.el7.noarch.rpm34caa133a0b87790de287a87108a295dfee713eab06635eca09012f8a22851acperl-PCP-MMV-4.3.2-12.el7.x86_64.rpm2d3af366b35b32fb7a9e0e2086721697df720fc3366c1a35e15070a18d380305pcp-libs-devel-4.3.2-12.el7.x86_64.rpmd8537665520b7dc85c3feabbe4ec8e73ff1dc52cd197940837fd768be7f30870pcp-pmda-lustre-4.3.2-12.el7.x86_64.rpmc75fa8443f366dc882869bfd5fd0ce3b18f84be9bb293120cdfa5e3ffacb96ebpcp-webapp-grafana-4.3.2-12.el7.noarch.rpm67a08ef8d3c2155f46e24bab1cd4919ecc193e1affa3bcf9154d05691c09e80apcp-pmda-postgresql-4.3.2-12.el7.x86_64.rpm3ea66e8554babdc95cb9b215bcffa31a4818b92413706713875c290d4ba6c1d5pcp-pmda-news-4.3.2-12.el7.x86_64.rpm8ff2db2354e68d26f3ce528494b905646e8fa01a55b4e409a1f7a7fd1ac42f0dpcp-pmda-named-4.3.2-12.el7.x86_64.rpmebceb40ee5c385c714234d74bd43d038c1ce73a239452a3fffc57720e27207adpcp-pmda-haproxy-4.3.2-12.el7.x86_64.rpm8bbb991de40f0c9585d36a388046369c3aea250d4192f854950549138725fc5bpcp-selinux-4.3.2-12.el7.x86_64.rpmf8c39a44203878dfb7a92115778cfd906c12e3bb008679557ab8b5b7a9ce7126perl-PCP-LogImport-4.3.2-12.el7.x86_64.rpmf82a3cb82dfd0960cf3475808fa23a9ac70c3e2f080ce951673bb8c61f17e6cbpcp-pmda-summary-4.3.2-12.el7.x86_64.rpm1924bb5fa8c4d179f85a0d54b734e36c30f0d14b2dcc98aa2eb25e887804ed59pcp-pmda-pdns-4.3.2-12.el7.x86_64.rpmf0816da6003870e6b52cf2b2613e5634ab83968b15ed33b8548ab4c4a7455894pcp-pmda-gluster-4.3.2-12.el7.x86_64.rpmdb042a9cefac99b68b2036612b7ce4641e9333a03ce969aa89ee9293c7b4e38epcp-import-iostat2pcp-4.3.2-12.el7.x86_64.rpm6899765db035630361e39765ba1eee15382f9143485affc6ca62fe228abcab77pcp-pmda-samba-4.3.2-12.el7.x86_64.rpmd7c4757f33855758ec9e7630a08dd3a62892e0ca48a540eefdd231aecf93df9cpcp-pmda-rpm-4.3.2-12.el7.x86_64.rpm42b8963defba99d9bd04019be374fab137cffdcc344a2982962d9bea760e4bf5pcp-pmda-logger-4.3.2-12.el7.x86_64.rpm4a334eaca4cd7400cb9a89f644ee83f63db52c3e5fb9b3c7f3a6a5a085adcc06pcp-pmda-ds389log-4.3.2-12.el7.x86_64.rpmbc3def914cbe36b1232a0dff5dc68f188a743fb2584fa19fcdc414f6f789a7f7pcp-libs-4.3.2-12.el7.i686.rpm586d81a8f97a4911899beb30e1128a1dde2533aa7682197fcb2b6d03aeb846ffpcp-pmda-libvirt-4.3.2-12.el7.x86_64.rpmf0534334af6c18411356d89d8ad2e598cb1a4dbd284e16addbd08c1476a83427pcp-webapp-graphite-4.3.2-12.el7.noarch.rpm5850fbac343b48075fc7a74bdb9972ac452db3414091e2a66b2e81394a2048b9pcp-pmda-activemq-4.3.2-12.el7.x86_64.rpm40f93060970aa2902d25f6757937c9852fa37f2864f576a8c4404e2810152767pcp-pmda-dbping-4.3.2-12.el7.x86_64.rpm7398ff1b648557ea6e52e9487a835598e9f0c209c67079d652e4776f8265432fpcp-pmda-shping-4.3.2-12.el7.x86_64.rpm74c4df59928de268d66830f43cac4c561f10c3961b19c31629ad933a6b2f49c2pcp-libs-4.3.2-12.el7.x86_64.rpmab6a8dd6ebec57c9b0f1999b95e2f4107f587187f619f9c171cb7fa2a78f9f83pcp-pmda-mic-4.3.2-12.el7.x86_64.rpm4b06c4d24ecdd93b586a641eacf6abc6f5c1a696eefbd66244980c96ba66c877pcp-pmda-mysql-4.3.2-12.el7.x86_64.rpm367a59953bb3c028132ee0a7fb379046bd234773fb86d0a362a72bf0e396a1edpcp-export-pcp2zabbix-4.3.2-12.el7.x86_64.rpm018d2534564a9c60dc3b1226d96b5a55906145bc9ede8d682f8746c20b4f4658pcp-pmda-slurm-4.3.2-12.el7.x86_64.rpmc01a166080a10d2b46385ad284e08ef0d0b74614b76e0a94fa23f5529bb334eapcp-pmda-netfilter-4.3.2-12.el7.x86_64.rpm46894601507a441e377b4e388970ef04ffc583c2d0d3a0d69d9c2934ea78d193pcp-pmda-bind2-4.3.2-12.el7.x86_64.rpm6a32163e4540f98fa1dc33366cda02fe440f309137a3ccd32f896f599499f800pcp-pmda-zswap-4.3.2-12.el7.x86_64.rpma7cb05a1dd91152f78d2caf31a139168811953a84d5bb55be76afee453ce71f8pcp-pmda-docker-4.3.2-12.el7.x86_64.rpm6f61e4f0094fbe1bce20c623c6918ef026b12a87a794e71d1f8727cc71f6def1pcp-pmda-roomtemp-4.3.2-12.el7.x86_64.rpm8634b803899810ff128a29ea217b3423a219782027abbdc2e7b0da767ceb1db3pcp-pmda-unbound-4.3.2-12.el7.x86_64.rpme515a9a8dec6cc0acb270e426cf887f088bad821a5ac20ce4c250c60f090640bpcp-pmda-vmware-4.3.2-12.el7.x86_64.rpm0fafca5834e49f8181ac688bdfa01e4ede409522a5ad37765907d688537b421eSLSA-2020:3873-1LibsrtpSecurity Fix(es): * libsrtp: improper handling of CSRC count and extension header length in RTP header (CVE-2015-6360) * libsrtp: buffer overflow in application of crypto profiles (CVE-2013-2139)moderateScientific LinuxScientific Linux 7libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm3d46addf1591cdc73cbb9035da2ea20700eea4bc42ee514c085f204a7fd7afdclibsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm9e481eb4354af9064dc727515da91a84ad0ae703d261dcee68eb6f50891a4fb4libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm3bcb18505b8aef66783481971e0c7ab5a46d592919b9f799c802b021e2b766c8libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpma97d9980586cd80b86756c8c3641a1d4d9145c0ac259182348922b42701e36b4SLSA-2020:3875-1TigervncSecurity Fix(es): * tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder (CVE-2019-15691) * tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks (CVE-2019-15692) * tigervnc: Heap buffer overflow in TightDecoder::FilterGradient (CVE-2019-15693) * tigervnc: Heap buffer overflow in DecodeManager::decodeRect (CVE-2019-15694) * tigervnc: Stack buffer overflow in CMsgReader::readSetCursor (CVE-2019-15695)moderateScientific LinuxScientific Linux 7tigervnc-license-1.8.0-21.el7.noarch.rpm60dc13b47f3eaa35a40b7370da949560f4b0a214384164572a0282dd03dc7528tigervnc-server-1.8.0-21.el7.x86_64.rpmda195def7f91aa6e312f33beab418d56b160a60db1cfec308d4480ed95b26c1dtigervnc-1.8.0-21.el7.x86_64.rpm6dfe2cc20b9f7947721e62e440e119302369357d21ff4f95c975ac4e8442b54etigervnc-icons-1.8.0-21.el7.noarch.rpm50b608c98ce41c7b39f524660f5c7cf6aeda392512ae5832c2103a6785367c48tigervnc-server-minimal-1.8.0-21.el7.x86_64.rpmeafd08607c4951ff4a167761a3047dd24a0c1a50a65f34e5295512cb11cbceddtigervnc-server-module-1.8.0-21.el7.x86_64.rpm225539e1f71b76534a9136b9068c0187b57b955cac092df86701be4444be287etigervnc-server-applet-1.8.0-21.el7.noarch.rpmfbb91ee4575bd7b803058c51126747a87126ebc5dda45146450c4058dde3539fSLSA-2020:3876-1LibvpxSecurity Fix(es): * libvpx: Denial of service in mediaserver (CVE-2017-0393) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) * libvpx: Out of bounds read in vp8_decode_frame in decodeframe.c (CVE-2020-0034)moderateScientific LinuxScientific Linux 7libvpx-1.3.0-8.el7.x86_64.rpm52f05b8fee498a4be7e99ff0408af2f735789bb5fbcd167bf6ac3fe94e7ee739libvpx-devel-1.3.0-8.el7.x86_64.rpm0ec7b3d61c7211ba012bd89199a4c4ab1639a742fa3d6be7c4f2f0147e119785libvpx-1.3.0-8.el7.i686.rpmc99a2275a9b83069f71bc275c281ca99fcc7c831676e1b473633d5a3cf7ef1d8libvpx-utils-1.3.0-8.el7.x86_64.rpmba63453c446906577c14da5df5fcb30b34dae6d55bcdbc3858687d18fc28cd00libvpx-devel-1.3.0-8.el7.i686.rpm4965e6e8d821d8af743041d219a8560a247ae4815a30e3a77f461599432e970fSLSA-2020:3877-1AudiofileSecurity Fix(es): * audiofile: Heap-based buffer overflow in Expand3To4Module::run() when running sfconvert (CVE-2018-17095) * audiofile: NULL pointer dereference in ModuleState::setup() in modules/ModuleState.cpp allows for denial of service via crafted file (CVE-2018-13440)moderateScientific LinuxScientific Linux 7audiofile-0.3.6-9.el7.i686.rpm9a26fcbae2192fcdecba94b61cf7e69c38b5d1f215a3903e1efd155ced1ad6a1audiofile-0.3.6-9.el7.x86_64.rpm5068bee84e675ca2f2d01d126bd58bb37ab11c0bc48d3d108ff1c2f35cba1e88audiofile-devel-0.3.6-9.el7.x86_64.rpm56216a297f60c0ee46730c797b75c76b1fe563a3307942a11e3f549a7036b5a0audiofile-devel-0.3.6-9.el7.i686.rpm2282107381450a6ba84215a95078f451c1460c294fa8d3c48833f3d7b77690f8SLSA-2020:3878-1DnsmasqSecurity Fix(es): * dnsmasq: memory leak in the create_helper() function in /src/helper.c (CVE-2019-14834)lowScientific LinuxScientific Linux 7dnsmasq-2.76-16.el7.x86_64.rpmdaa4d767de0095812b2aa6f65e301a0e8e303c46cdaafece3c3f7f4a4827fd04dnsmasq-utils-2.76-16.el7.x86_64.rpmd9c5c1ec38c5880a759e8f8fd74c86a2a8e82bbb74b93188e00b40a042e6b8fcSLSA-2020:3887-1Python-PillowSecurity Fix(es): * python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)moderateScientific LinuxScientific Linux 7python-pillow-doc-2.0.0-21.gitd1c6db8.el7.x86_64.rpmb010e860a28fb10f1dc289199f9d53d8e7cb7695fc07bdca7c1e68ecf62fe2d8python-pillow-2.0.0-21.gitd1c6db8.el7.i686.rpm8291569a120b0df9e5e6288837682ca4b4c339c45998f2aae2b4dc21d2ee3308python-pillow-tk-2.0.0-21.gitd1c6db8.el7.x86_64.rpm0858f2e391eb6529e671cadf474bca62bdef7b26d057d0997a29fce49aa00accpython-pillow-devel-2.0.0-21.gitd1c6db8.el7.i686.rpm40398008e1a1fe5a8739bb01444ab77dd8acfb6ef4e95c2e24442114e901f637python-pillow-2.0.0-21.gitd1c6db8.el7.x86_64.rpmdd67334460ba6f58f5bacc7454a593cf2ca27c5be1ddfc7aaedb307b5f4196e6python-pillow-sane-2.0.0-21.gitd1c6db8.el7.x86_64.rpm1171170eb9c007f0ad256743979db0021b3407c0b6d88adf6367577d3591eadbpython-pillow-devel-2.0.0-21.gitd1c6db8.el7.x86_64.rpmd1cc10c620f775819173ca6106443acba2e7f18fa9b3339d61a15fd74a4f1f2bpython-pillow-qt-2.0.0-21.gitd1c6db8.el7.x86_64.rpm8930062c157d5419b324f5de78c527fd1e0d0e0d1ec54c9e6c8ba31f888f66ddSLSA-2020:3888-1Python3Security Fix(es): * python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935) * python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)moderateScientific LinuxScientific Linux 7python3-libs-3.6.8-17.el7.x86_64.rpm3786657d74649a5ef22c5f2f998273c99694812081dc386c17b318b5ba37ba29python3-3.6.8-17.el7.x86_64.rpm5777b19c4aab76059c9b38e47e3f7f6470e10c864e49ffaa2e771281fbe3fc3epython3-idle-3.6.8-17.el7.x86_64.rpm0529688f400285d529efdce8e4ec0ecb67be47e53a7742a49025f080ce9ab6e2python3-tkinter-3.6.8-17.el7.x86_64.rpme19e0c8ded7b6d161afa546da31ac053da70c2907a23e1b010464f4c2045d29bpython3-3.6.8-17.el7.i686.rpm305afdf13a5f552ffa00dd59f154b6ea0546c90e2962410db11d67b28c602f07python3-devel-3.6.8-17.el7.i686.rpma584ccf6e24363faa109f7c98777f86b3814289758653f29f5cb3b9dab8dbb04python3-tkinter-3.6.8-17.el7.i686.rpm11a2d12d28012d1a2c308db52468b86fd56922376a9c87d2779594ea350ec1a7python3-devel-3.6.8-17.el7.x86_64.rpmecb31d93f55639cd16cec810b53bd5a250f91b6bb60842aa0b158cf63d6c67f7python3-debug-3.6.8-17.el7.i686.rpmb549d3f8ef59e18d3e6bbec90dfd5180d86440ecb66885266b722d1b28337cffpython3-test-3.6.8-17.el7.x86_64.rpmdb1880e68d8478b3fd6f648fc76c7b6a7b1e724264da71f3993cd44cfbd09b34python3-test-3.6.8-17.el7.i686.rpm71c341657b208a997fa0a9daddcf06784b2fbf0d1ed972a21965902a791150fepython3-debug-3.6.8-17.el7.x86_64.rpm1e909825758411d5f787c612c08ae2dab9beb4fa7eeacdf2bc7c94c0930b5bc5python3-idle-3.6.8-17.el7.i686.rpm82cd4860dfa00c2cce22b6b685a98f4cf465fd7053161eb0338e2cf8c48d0918python3-libs-3.6.8-17.el7.i686.rpm00b41c5dca14a515d1d4004df978c9e8c86463ce7453e04fd7aad0de3346dac8SLSA-2020:3898-1Cloud-InitSecurity Fix(es): * cloud-init: Use of random.choice when generating random password (CVE-2020-8631) * cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py (CVE-2020-8632) * cloud-init: default configuration disabled deletion of SSH host keys (CVE-2018-10896)moderateScientific LinuxScientific Linux 7cloud-init-19.4-7.el7.x86_64.rpm55591cfe2ed22e312cd0b8366a69f59cb8b93c12c430cb5e47186b85f942000aSLSA-2020:3901-1LibpngSecurity Fix(es): * libpng: does not check length of chunks against user limit (CVE-2017-12652)lowScientific LinuxScientific Linux 7libpng-devel-1.5.13-8.el7.x86_64.rpm9675e15c9e84a9cef3d71cf0822605a6aea0120b63bb9c6b0e501b5e9ec4fd21libpng-static-1.5.13-8.el7.x86_64.rpm644daab0c8f61d93af68ea63a1329d3e8c85c7c84488316748cd97cf54ec2f3clibpng-1.5.13-8.el7.x86_64.rpm0e4f8cdfd63647f81a806f76b25e797c7a8bd64df53ea28e42d8955dba4781bdlibpng-static-1.5.13-8.el7.i686.rpm70fa7e0da54383b8d3de74bcc4fd1b553c53534e41e35b927bf14d2ebe291502libpng-1.5.13-8.el7.i686.rpm5345462ec540ee430e2470dff68515295d373d88c06aab6e4aac87f47f83081alibpng-devel-1.5.13-8.el7.i686.rpmcbecd58b02f2f55e095fb0957743f361210530ef6ba1fc06cae838bfc8be6ba4SLSA-2020:3902-1LibtiffSecurity Fix(es): * libtiff: integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c (CVE-2019-14973) * libtiff: integer overflow leading to heap-based buffer overflow in tif_getimage.c (CVE-2019-17546)moderateScientific LinuxScientific Linux 7libtiff-static-4.0.3-35.el7.i686.rpm4456a90574ff9aefd2dbced4ba6eeb3ddc886eb2574e1c1bc0feaa445f70d6a1libtiff-devel-4.0.3-35.el7.i686.rpm28e354f99c58b96c0667cdd4c28733455e37ef7e83f02d7108584c62490da904libtiff-4.0.3-35.el7.i686.rpm55a2a87e891e5ae9e6f76106a7e7af9e5408261ba9311cc702e2e1000c13052dlibtiff-devel-4.0.3-35.el7.x86_64.rpm114620bc9f5fc438848ae84a24af1c535ac8f7f843f3403c1f179a7624c00a1dlibtiff-tools-4.0.3-35.el7.x86_64.rpm21335421bd3acb7c2782aa6f2be48a81df6a8313af864a35f8b0b0a711b12c3clibtiff-static-4.0.3-35.el7.x86_64.rpm5f50220995c43eedf26e02f65a1dfe4f5ca2afb6d28811d24818233ec1350a49libtiff-4.0.3-35.el7.x86_64.rpm80943e54372643083901569fde0f17b642f859629923f381a2fc308e01a31c2cSLSA-2020:3906-1Qemu-KvmSecurity Fix(es): * QEMU: seccomp: blacklist is not applied to all threads (CVE-2018-15746) * QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382)lowScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-175.el7.x86_64.rpm6d2e2c9316d08af5d94e7984eef0dd6f9b13071883bcb530b8d5b0a2242448d6qemu-kvm-common-1.5.3-175.el7.x86_64.rpm8935d99c77ff3a7742a7f2ec0da11407bdf6613ca2a6a6267ef70e662682d383qemu-img-1.5.3-175.el7.x86_64.rpm490a44a4f588c2e6fad927d8f679f9568c0ee6392989dbd582b305314eee57adqemu-kvm-1.5.3-175.el7.x86_64.rpmf6487877daa75615bb84590866b1a331a449e6bf4b231691d97c161634f93451SLSA-2020:3908-1CpioSecurity Fix(es): * cpio: improper input validation when writing tar header fields leads to unexpect tar generation (CVE-2019-14866)moderateScientific LinuxScientific Linux 7cpio-2.11-28.el7.x86_64.rpm1abeea9894fe45a8983e0258f79069bad85b9effa640033aae9dbebdb497c3a7SLSA-2020:3911-1PythonSecurity Fix(es): * python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935)moderateScientific LinuxScientific Linux 7python-debug-2.7.5-89.el7.x86_64.rpm7fde2bf851b595d53b7c14b4f3d1948af9d33b5dd5315610c9b0f7688f753cb4python-test-2.7.5-89.el7.x86_64.rpm081601053786fb5bf339113a631a01c31622be8022d404ecc8b7b2ee78122097python-tools-2.7.5-89.el7.x86_64.rpm9442bbf8a094feddb106bb41188944fa3d74d2263bf742a5e90136d47413608epython-libs-2.7.5-89.el7.x86_64.rpm429a0cc93beceebc65292b64f2809b0414206ab4940b0f0708b0ba2fdbe2fafdpython-devel-2.7.5-89.el7.x86_64.rpma98e9a7c5b39a55c0dc3114ee895fa705371cc5f1e4b29af071a78d5362cb7ccpython-2.7.5-89.el7.x86_64.rpm512c563a817b55c187e202e047acf8b53ddb456d814712d495c3aae33b1fad60python-libs-2.7.5-89.el7.i686.rpm119b23cdb1e1b152d671f2933dbc802e277e2c7f3db2cb0c06422430366138e2tkinter-2.7.5-89.el7.x86_64.rpmc1308978f2637e9a481d20a9d9d676539f33037c942962fd498a512ba18514edSLSA-2020:3915-1Libssh2Security Fix(es): * libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c (CVE-2019-17498)moderateScientific LinuxScientific Linux 7libssh2-devel-1.8.0-4.el7.i686.rpmde09a90cf07de953e079f73a15570e61771f15212421ae4c688927b5e3c674celibssh2-devel-1.8.0-4.el7.x86_64.rpme6fa7588e0c282c2611051609f1e0de3f2f4e1bd2dd9251d4e45c4eb61259cdflibssh2-1.8.0-4.el7.i686.rpm158a01f5bc056e08a40a418661ef06d1800d719cc93ed4720b966d62f75c4777libssh2-1.8.0-4.el7.x86_64.rpmbcf4dc42888aa5074ae44a1849b80215c1cb26ec7a6e4a10034f4e7979ba6d51libssh2-docs-1.8.0-4.el7.noarch.rpm41146c005a9cb5bfcc19aaab25ad2a27cc16646a6e53fc57d770d59ee5035ff1SLSA-2020:3916-1CurlSecurity Fix(es): * curl: heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482)moderateScientific LinuxScientific Linux 7libcurl-devel-7.29.0-59.el7.i686.rpm9c856db762bc0d68f141856d7ff090c59b88eb98324eaa20a5eaf3a5708f2128libcurl-devel-7.29.0-59.el7.x86_64.rpmef28b8a79559ef802ae17fb9d184bb8be96478e0672806a3449a831df2791fe7libcurl-7.29.0-59.el7.x86_64.rpmb9c5025044f93b09dd9ab29fc5e0106d9f6114624ebbd9d3f3a1e663197b6da3curl-7.29.0-59.el7.x86_64.rpm6dd40f8f62b4aa20eb4088f398bd86eb63bb7b0f20db35e4eb1ececc9ff0934elibcurl-7.29.0-59.el7.i686.rpmb0754db1cf23accbf020f12c8d5c7cd5b34a9e48b0be6a062d5410c1eb227125SLSA-2020:3922-1LibsndfileSecurity Fix(es): * libsndfile: buffer over-read in the function i2alaw_array in alaw.c (CVE-2018-19662)lowScientific LinuxScientific Linux 7libsndfile-1.0.25-12.el7.i686.rpm71e5162542918806a4652b151f5fd4cd3db47c381fa01ccbe8e3b2d3d1402621libsndfile-devel-1.0.25-12.el7.i686.rpm956400c7497fff01c175cc68617a199fe84a679d23c0286d4272880bc43c6da3libsndfile-devel-1.0.25-12.el7.x86_64.rpm7f488640237061a08ec756d39b5aabe0a362778c64a1a2ea1a6c9dc9dc59886dlibsndfile-utils-1.0.25-12.el7.x86_64.rpm7f5ee5d38598133a1d18c261aab7a039e28273babf667fc9761158cc6f95a83elibsndfile-1.0.25-12.el7.x86_64.rpmde695e200b57e33040970a26f9031d65ce22de590c21f5fa37e6fbb4e3fa82d9SLSA-2020:3936-1IpaSecurity Fix(es): * js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip. (CVE-2018-14042) * bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) * bootstrap: XSS in the affix configuration target property (CVE-2018-20677) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * ipa: No password length restriction leads to denial of service (CVE-2020-1722)moderateScientific LinuxScientific Linux 7ipa-server-4.6.8-5.sl7.x86_64.rpm212f856b3912d675c1fb7be2d49c6137e78a30a80fb3c02a5f699e5a1ad125e0ipa-common-4.6.8-5.sl7.noarch.rpm958b97d9fc31c879fdb2dbea8031420b87898c9b965279e694bf538909f79792ipa-server-trust-ad-4.6.8-5.sl7.x86_64.rpm95e90f07a9f23ede63feb3c4fd5757a4d99f10386c6a1faa05098e6791814077python2-ipaserver-4.6.8-5.sl7.noarch.rpmb003b3c0797415a96115c3e01f3850f3b7938c91770a5901dd2fb36c18921466python2-ipalib-4.6.8-5.sl7.noarch.rpm94283f04a0455a3a998e4b570a0395866e61bc6830f3bca211d3ef3feb256d1cpython2-ipaclient-4.6.8-5.sl7.noarch.rpm8d477c0f051efd043f9805ff8c8098eedf08b3486b81a230a3d38ff99bd77954ipa-client-common-4.6.8-5.sl7.noarch.rpm2ec31f79a3aaa0d80dc2816837aa21b209afe379391da2ec801b9fc2d659cb04ipa-client-4.6.8-5.sl7.x86_64.rpm9cf9f179f4f658e86a05603a72e8022514431711915e6b68f62f722936d5f0c9ipa-server-common-4.6.8-5.sl7.noarch.rpmeb08d748f9cb5646645f1dbe27d87dc5db7a327f3211dc8139f2c519b4bfbf69ipa-server-dns-4.6.8-5.sl7.noarch.rpm495fb3fc28301901f52de79642bbae01063134fa48b82666f9d38ed887839b41ipa-python-compat-4.6.8-5.sl7.noarch.rpmaf6dde81ad208f3dd8d38a6fffd9dfcfe14627fd7a159c17e13e4503c0d43ebcSLSA-2020:3940-1OpenwsmanSecurity Fix(es): * openwsman: Infinite loop in process_connection() allows denial of service (CVE-2019-3833)moderateScientific LinuxScientific Linux 7libwsman-devel-2.6.3-7.git4391e5c.el7.x86_64.rpm17355de3560fc7405745ea50c5fb8ecab0f6096568dd89b3813e92ba131902a6libwsman1-2.6.3-7.git4391e5c.el7.x86_64.rpmb143ae5c86e39bee0b9d0e90cddc05917c4ad6f0fda6df2c89254e4c22c6b37aopenwsman-client-2.6.3-7.git4391e5c.el7.i686.rpmff62a824c5f57da21d2acad939e8b631d536c80d57bb80f0f08b96e413c96effopenwsman-client-2.6.3-7.git4391e5c.el7.x86_64.rpma15665c76215e6eb6065f39cab4965986c3e58f2c64bf59141eff1ed81954e7dopenwsman-server-2.6.3-7.git4391e5c.el7.i686.rpmd1e212b90758f5a4b789aed571902ad1bcb6d640084f606b640012c5d0d6f45dopenwsman-python-2.6.3-7.git4391e5c.el7.x86_64.rpmab2e2282adff3c60550ea68ae8c6b3b395fef3b455805d0c0a1aaabeb81f0d9aopenwsman-perl-2.6.3-7.git4391e5c.el7.x86_64.rpm4594f53f2adc81772658d3beed9db7ff7513cdf06c0b687978c58ad589eb7483libwsman-devel-2.6.3-7.git4391e5c.el7.i686.rpmb90cc5a6f47f7328d4c465d24613d2fd73b68bc0e358499e31ec9d7ccfa582fflibwsman1-2.6.3-7.git4391e5c.el7.i686.rpm2ac3a4e56bc45f14b8a72ee0f98ff4239a4b2d18e0ceb4ef0aca94eac58c80a7openwsman-server-2.6.3-7.git4391e5c.el7.x86_64.rpmb56ae81b6084d06b1e50372555f0041f6ef2ece94fe969b83db36469c0e50807openwsman-ruby-2.6.3-7.git4391e5c.el7.x86_64.rpm752b88babaa24ded54c6f3f6f2e9aae905326e58e122c0526244a913d3788d9bSLSA-2020:3943-1LibwmfSecurity Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)lowScientific LinuxScientific Linux 7libwmf-0.2.8.4-44.el7.x86_64.rpm0305c87f54bfeaeedd8830e1e69d72e13f56bb4c1a32a34cee7e9002001567dflibwmf-0.2.8.4-44.el7.i686.rpma65b16d445a9f49bac7ce47b48450c5e9d251f9b0a74dc3d0513c44ed93bac80libwmf-devel-0.2.8.4-44.el7.x86_64.rpmd9f5ecf2c2176631670e054af0f39e71319279196dea4f44804b35f4eddbcdd4libwmf-lite-0.2.8.4-44.el7.x86_64.rpm34bcc527bc53616bd383b921114d1cc768631b411fa468e17f1323a765130957libwmf-devel-0.2.8.4-44.el7.i686.rpm8322e751b91b7cf1542c0463119a8afca17870c9459ae1a471e5fd58a4262d8flibwmf-lite-0.2.8.4-44.el7.i686.rpmea7e092fccc28d46aa2376e62a935c174a1e29bda5797f40df15ce43e957b719SLSA-2020:3944-1UnoconvSecurity Fix(es): * unoconv: mishandling of pathname leads to SSRF and local file inclusion (CVE-2019-17400)moderateScientific LinuxScientific Linux 7unoconv-0.6-8.el7.noarch.rpm97695d70feca1dcd27e7ad8d2760e314ae94fcd2b92ab547e24355b42415edd2SLSA-2020:3949-1LibrabbitmqSecurity Fix(es): * librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow (CVE-2019-18609)moderateScientific LinuxScientific Linux 7librabbitmq-examples-0.8.0-3.el7.x86_64.rpm727e41346155507386016f6a7843b9fb983cdd981078d2e1d88c529c063a373alibrabbitmq-devel-0.8.0-3.el7.x86_64.rpmb0f8ffaca682b7bf6a64be397e8ea9be66fef21fdeded919285dc972082a3b3flibrabbitmq-0.8.0-3.el7.i686.rpm8e91da77c204be6513fc1b4863c65455ab600e85d74a80596e071ebd9847e64flibrabbitmq-devel-0.8.0-3.el7.i686.rpm4920939d44ebc704eec2f33283fc1a258aa1eb481d60130098595479c717148clibrabbitmq-0.8.0-3.el7.x86_64.rpm95019a3bc277abfecc2901a6591a03ef47aed5f54738ab6fae37b9563493a6ffSLSA-2020:3952-1ExpatSecurity Fix(es): * expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843) * expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)moderateScientific LinuxScientific Linux 7expat-2.1.0-12.el7.i686.rpm2821d8234609253c34b8216e80ac1cb471811ea7cbd2f6fe2996500557fc312cexpat-devel-2.1.0-12.el7.x86_64.rpm7f73d056ec93cd87853f3ed50e15854fd573a27e708d8d8ec86a9ef1c386f8a9expat-static-2.1.0-12.el7.x86_64.rpmbaa06e09b3b30fc6775a25044c4286e5e6d919e503bf0dcc78a003444c4759d2expat-devel-2.1.0-12.el7.i686.rpm03be57e99f6187bf48e30f38836507c5ad5c166aa752443353649f066b827449expat-2.1.0-12.el7.x86_64.rpmd1d93801fd83ba106092ab5b688bbad6d0ffa39d000af9bfb9f82feeb2e20401expat-static-2.1.0-12.el7.i686.rpmc521f597bfb4875495920019ac6fbadf086d279b41a94805e66e0582b4316dfdSLSA-2020:3958-1HttpdSecurity Fix(es): * httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications (CVE-2018-1283) * httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS (CVE-2018-1303) * httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) * httpd: <FilesMatch> bypass with a trailing newline in the file name (CVE-2017-15715) * httpd: mod_rewrite potential open redirect (CVE-2019-10098) * httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)moderateScientific LinuxScientific Linux 7mod_proxy_html-2.4.6-95.sl7.x86_64.rpm56159d40bdb54fe04bc5540e9e046a33f73de0c32386fe0de6c1a200516d273fmod_ldap-2.4.6-95.sl7.x86_64.rpm72ce3e7ecec1cbb64444f97de85ca67c4c49b456407ea4c56d3ae8c027b4a566httpd-tools-2.4.6-95.sl7.x86_64.rpm4956f09c9255dbec36163703d7ec819ddcbab8e977824971cf9d2a88e0afcbf8httpd-manual-2.4.6-95.sl7.noarch.rpmd71c6aba2678eea06a0baaa73f1307a24e1baaa644faaa69ee140cfa2fc32a71httpd-devel-2.4.6-95.sl7.x86_64.rpm627fb306c6d41a1d20dc9f5cb9b68d173fcba4221a4177538d9885636e270cc1mod_ssl-2.4.6-95.sl7.x86_64.rpmc72c4a6b8d39138716cd25949b11d11f471bfc6d3b32625645963e9fe006af3fmod_session-2.4.6-95.sl7.x86_64.rpme268ecec31c591436a4f3cbdd2fb223d5b4eccbf731ffc2139db088b4a461692httpd-2.4.6-95.sl7.x86_64.rpm8ae239a2a1435334b2013a17c8d9a4f76f2063fd4b2e4800c17c5685e5474a35SLSA-2020:3966-1FontforgeSecurity Fix(es): * fontforge: out-of-bounds write in SFD_GetFontMetaData function in sfd.c (CVE-2020-5395)moderateScientific LinuxScientific Linux 7fontforge-devel-20120731b-13.el7.x86_64.rpm7b9ec8018b910197e8f886af88df0b2f554ea3dc1256fb045988d26ecf3cf335fontforge-20120731b-13.el7.i686.rpma14c4929fd088e999f39b9bace435ea660435f83337354d66a2e04821494ae26fontforge-devel-20120731b-13.el7.i686.rpm27aaa4c8e0346e188923b9e9d9b669f0ef842343dd8d6310cb26558f44b02c9dfontforge-20120731b-13.el7.x86_64.rpm4dac7c8b6ab4a8b661524f83bb7a58b6fc7ae519682c3894f6a99e68d00d0216SLSA-2020:3970-1Mod_Auth_OpenidcSecurity Fix(es): * mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) * mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)lowScientific LinuxScientific Linux 7mod_auth_openidc-1.8.8-7.el7.x86_64.rpmb2dfaf03eb4ebc8d8caeb9fdc01a93c11fe2539156932b02766d5fee41165193SLSA-2020:3971-1HunspellSecurity Fix(es): * hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx (CVE-2019-16707)lowScientific LinuxScientific Linux 7hunspell-1.3.2-16.el7.i686.rpmafc57b23bf220b4e0bdc5d47b03385ce3e462b56694d27decf794f344f7fe852hunspell-devel-1.3.2-16.el7.x86_64.rpm796a35dc7e3ca03b3989f7a1e31d15e36d0b50988167bc6a6895e8c254c36026hunspell-1.3.2-16.el7.x86_64.rpm6ea12e07ba97623a9ed74f099804324f7aba437527c9c04fca59cea7af0fa235hunspell-devel-1.3.2-16.el7.i686.rpm529137a8d24c430049873f23d7e4cf1655cc9392eea9f0dc9a7e57568a0ce0feSLSA-2020:3972-1SubversionSecurity Fix(es): * subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782)moderateScientific LinuxScientific Linux 7subversion-javahl-1.7.14-16.el7.i686.rpm9e420241533f135082de5962bcee6e9248e4244dc1d7ae9a6c3d8b5de47fbedbsubversion-perl-1.7.14-16.el7.i686.rpm88b1c81c21147fd47988ba979e9b71c16d88a7e08a4d7ecba266ca7c87f8c19esubversion-libs-1.7.14-16.el7.i686.rpmb60bd800b686799dcfcf3446f081d0e5e965f2ccaf92bca5e1fa8e90081796absubversion-perl-1.7.14-16.el7.x86_64.rpmf5aeb55dca994afb3c1c8bed03eaa09ec1dd5e9980fde2aac4e725355b68fe82subversion-kde-1.7.14-16.el7.x86_64.rpma25ce5dcbb8ab3e39b15ca98efe3c25128f9ba3a548b0c3cebf42e90ebb306dcsubversion-tools-1.7.14-16.el7.x86_64.rpm118e499f5eede7fd3942d9a36e2fd97e2a875e35ef39140befc2ce03be4b4aa0subversion-python-1.7.14-16.el7.x86_64.rpm1692e14c1dcbce4ca904c18de551b779e2b8296bc1d0c2ea37007f77e792715fsubversion-devel-1.7.14-16.el7.i686.rpm9af90c245daa07dcd2f23d63eee1f759e9bdbf90064987861c53ac32171261a5subversion-ruby-1.7.14-16.el7.i686.rpma9b5a8aa8f74e57105df14e52f258227b83e67c3fa1f2c6732bc4cfa5eb23a2bsubversion-javahl-1.7.14-16.el7.x86_64.rpm9ad2551310778946957642458a9e7ace2119e53e6266ab9def612fc49c15daa1subversion-devel-1.7.14-16.el7.x86_64.rpmecda44c19b4f383da58b33d7e4fbf4e96c9bb90a2cefde29ec76b83d3d12c142subversion-gnome-1.7.14-16.el7.x86_64.rpm6e4b59df7286843cc7fd87ca04f8d2c7bbc8da3be6d59ea6c9947ac6d17aa7efsubversion-gnome-1.7.14-16.el7.i686.rpm98ce8a27404b1f7097e12536e49cb623f92930957ec02659f5495e581cdea09bsubversion-1.7.14-16.el7.x86_64.rpmdc9fa0f11f228fc248be9473998b8736cf3b3f20fe7e04f7a88c34dbee345785mod_dav_svn-1.7.14-16.el7.x86_64.rpm475fd383a654fb50705e508b5feaa727f2a2761063bb6715d6296bbdbe8386f3subversion-libs-1.7.14-16.el7.x86_64.rpm010444981277e7d62cc5053a15c43c1f1e79daef3eb85cc36bb0275db8722abfsubversion-kde-1.7.14-16.el7.i686.rpmc0dca587c707bef32984b23bcf2fc8ab3b03014223ee41bfe1b519a58be72c37subversion-ruby-1.7.14-16.el7.x86_64.rpm83022b57260bb140ced33314bd05d9276e317c082e214de22c833d4aafbef476subversion-1.7.14-16.el7.i686.rpm9de49ccc1bde5e1743a1b5798adafa97d28a8edb10271d816049f4d7467aee60SLSA-2020:3973-1SpamassassinSecurity Fix(es): * spamassassin: crafted email message can lead to DoS (CVE-2019-12420)moderateScientific LinuxScientific Linux 7spamassassin-3.4.0-6.el7.x86_64.rpm7c97448ab50cb66a231bd9eca82c0ca7abd651266984b18985ccc0ca877d4bb5SLSA-2020:3977-1Evince And PopplerSecurity Fix(es): * poppler: divide-by-zero in function SplashOutputDev::tilingPatternFill in SplashOutputDev.cc (CVE-2019-14494)lowScientific LinuxScientific Linux 7poppler-utils-0.26.5-43.el7.x86_64.rpm5162d9ba3e48d7a413e808bc06676a7edd04bd51a1c8718ea002afdcc9c5c798poppler-qt-0.26.5-43.el7.i686.rpma8c17f651e4689f51fafcdb24b6ceb6a6667de0ebd2a94a0218f7b41369f8a59evince-libs-3.28.2-10.el7.i686.rpm0a7e2afa167ac64174373e2176bd9a5b793164fe600eb087b0d9c135321c0958evince-devel-3.28.2-10.el7.x86_64.rpm440bf76a88b9de54ff33055b838d90ef127bb6f7150c2fed7f779c00671f5c02poppler-qt-0.26.5-43.el7.x86_64.rpmf225514c1b098616e6a2e9fcdfe23dd3c46b3660c74c275f15416b80e0536065poppler-0.26.5-43.el7.i686.rpmc1507b53f3555f5e0a26321678c2ecf72b064ff523d4676ebb7d4e6fb207adbeevince-3.28.2-10.el7.x86_64.rpmfa555a23db3376d0c808697903ae356d4e7ebb92c7c80cef1a3c6b0149f885b5poppler-devel-0.26.5-43.el7.i686.rpm884787b7f46a499bbbbe89201d6005b32810ef2823634b16b0a87917af768c1cpoppler-0.26.5-43.el7.x86_64.rpmcc82fdda6fbfb96c3bc7db238c8f3b6cff6a2c2b2af63d9797cf692e506fac70evince-nautilus-3.28.2-10.el7.x86_64.rpm2e33b3d8b8615beb10e1b3be97f8e8aed5e025cdae69650c97d718adee365fe1poppler-glib-0.26.5-43.el7.i686.rpmf9ec3cb0a1ccac2b2bf58a1a355fd3e3bce1edbe4b29debc4b63669b9d8b62cfpoppler-cpp-0.26.5-43.el7.x86_64.rpm0b13cd58e466f810a4082a1122d708791267c13ec395b5fcf8583998618b0409poppler-demos-0.26.5-43.el7.x86_64.rpm1c42f9eb888f94c4ffacc590c35919688fb5252dd826f1b50b12f1c9f3d3aec5poppler-cpp-devel-0.26.5-43.el7.x86_64.rpmf08181c4683469e1625abf561ba0bee55295adaf152c5e70d92542b186505178poppler-qt-devel-0.26.5-43.el7.i686.rpm21ec1a1e55d461ee50d50e3be096779910d1012137fa812ab5a77c1d3ef58a09poppler-devel-0.26.5-43.el7.x86_64.rpm998e1ecc3582be17d9ffc2ecf64cdbbcfe709fe98be4d7a09e2cff573a8cf5d5poppler-glib-devel-0.26.5-43.el7.x86_64.rpm3e7748820b14fa03f68d8be7b2a762c8f6ee1416eecb7cb605d5b7d568942616poppler-glib-devel-0.26.5-43.el7.i686.rpma0e5e60efa02d2706115fbac1f6059cb2c1a29f212b3395edea5c07b14b03600poppler-qt-devel-0.26.5-43.el7.x86_64.rpmeb7cdd7ade46da10de65b24fb861a3eb5a7ba70710abb3f21a3e323bd77b92f5evince-dvi-3.28.2-10.el7.x86_64.rpme4ca88fe129792db68f53c68842f5d3d9a55ec1b0d09855ca5903dc12a943f3eevince-browser-plugin-3.28.2-10.el7.x86_64.rpma2cf943feb5433df74daccf975da5ed1a10066171bef5002af436de390a47ed1poppler-cpp-devel-0.26.5-43.el7.i686.rpm98d43dff4629260d31e859406a3d58fc1bf6b1c0a8b0783228ac35dc7e6fa6d5poppler-glib-0.26.5-43.el7.x86_64.rpm6bbefede8c6f9015b890a521f75b2023fcca8f7813ee42d67bab970b92b33d9aevince-devel-3.28.2-10.el7.i686.rpm3345138d4c12ed09b94b094fb918e0b55a52f3f1b0333e4e49133ae37c267b03poppler-cpp-0.26.5-43.el7.i686.rpmc95bce5df205c729b17580903b5d571758835e9862b07837d7f8ca67d468731eevince-libs-3.28.2-10.el7.x86_64.rpm2b645c23c0cf4ce5eb5629605682782940d1a7834f2c5e74d337f8476b4d9dbcSLSA-2020:3978-1Glib2 And IbusSecurity Fix(es): * glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress (CVE-2019-12450) * ibus: missing authorization allows local attacker to access the input bus of another user (CVE-2019-14822)moderateScientific LinuxScientific Linux 7glib2-2.56.1-7.el7.i686.rpmdba2e320e5d55a1ad320f43b87818ebfb57707a36f883864412a3d912f209b60ibus-devel-1.5.17-11.el7.i686.rpm812dcaedfae5eb783659c22b0d53a4b126e48d453893be400e2fdc8e2c7d86f1ibus-devel-docs-1.5.17-11.el7.noarch.rpm7b6aa8682348126008cfe3d621c457cca8f6cf8ecfbb6ee0137c150d2944f8e3ibus-gtk3-1.5.17-11.el7.x86_64.rpm41f5c91bc15c18f3c58641ebe933f2fb3b513160e03fd114177282b66fe567bfglib2-2.56.1-7.el7.x86_64.rpm0ff883bb12db31cdc019be14bc63bd925868869886903f8c1cafd5dbd0403a40ibus-devel-1.5.17-11.el7.x86_64.rpm45e9cf8924dc993d1ba8a39959bc987667bfb0f382a7555a27cf65e60cca809bibus-1.5.17-11.el7.x86_64.rpm20015550f6cb008cf8669db337f38c6ada4491d8e9f62aa3cac989e61a0b3a5aibus-gtk3-1.5.17-11.el7.i686.rpm695bf7fe48bbcecd3729cfb89e33479d474b6eacb99b2a54e6fed35e1cf7a51cglib2-tests-2.56.1-7.el7.x86_64.rpma459c1af581430dec38b93d052b964b787c6ceda9ce5dad4a5c34b5a4fd7b16cibus-libs-1.5.17-11.el7.x86_64.rpm38de27d5c3a5ed14e693230bb049fa34f2d6b680a37fba8174bc49c12fee0deeglib2-static-2.56.1-7.el7.x86_64.rpm0468728a64c29056f6b1aec2bccf23bc0bb28b13f3e5994eb5559b20c631b38dibus-libs-1.5.17-11.el7.i686.rpm20cad8d3bd4754b4af69075d3390e97fa46d7eba49b981cfbc2a16382a80ab8cglib2-static-2.56.1-7.el7.i686.rpma79b0ccbc423cfe1916d291feb7637fb7452295bbb0dfc4332075a701531cc7fibus-gtk2-1.5.17-11.el7.i686.rpme6dd9f1a17f11a3606114286bacfc7739649dd7e5244968f57f00f22c953b13aglib2-doc-2.56.1-7.el7.noarch.rpmb5b8fcfe054e7296605c3716bd48db1d25ecfcb2fe709a40a2d2fd7a1e009e99glib2-devel-2.56.1-7.el7.i686.rpm4515cefd9767d0724da9ff92efe8ea4d611fd999428a85d14f586a344e2823acibus-setup-1.5.17-11.el7.noarch.rpm37dd4e489a8144e9001f16eddec4a3b4f239902e2405405f0399b1f886cae9f2glib2-fam-2.56.1-7.el7.x86_64.rpm979b9d7fc459b432b0a9dbc3439b3e23ec0420784ac5ac11a810fd650ef61c59ibus-pygtk2-1.5.17-11.el7.noarch.rpmab7a658c8deb5defb98a43fce38cae69bf3d82a183273ad0e0ab2ee448e43e4dibus-gtk2-1.5.17-11.el7.x86_64.rpmad6517fb5ddccc13e3330e7f71d482c3cf70be067a2bb94d0707c12288a6e9eeglib2-devel-2.56.1-7.el7.x86_64.rpm39675b88fa1d10df44a36f4101aa8a02d85ecca4c9e8e9ead12dc14dc7696127ibus-1.5.17-11.el7.i686.rpm1d8930b8c8f78f873d600a6db0d545b567af6da483630e6932cdf5daaa8528a3SLSA-2020:3981-1SambaSecurity Fix(es): * samba: Crash after failed character conversion at log level 3 or above (CVE-2019-14907)moderateScientific LinuxScientific Linux 7samba-common-libs-4.10.16-5.el7.i686.rpm4433702c6f052a4ae01729333ae0306b4a0a9fc8745cc12f64f0460e3a2e07d4samba-python-test-4.10.16-5.el7.x86_64.rpm28b0a289b685cfecb68be9243ec02e94677c4bcfe6e27d2c2e31f2c5a3f4ade7libwbclient-4.10.16-5.el7.i686.rpmda98ab4422063585f85848f30fd290ae964bdb431fca151f47b1087d7a2a8083samba-test-libs-4.10.16-5.el7.i686.rpmd515625d0f8c09eca2cbfad9d2fe34085d260ffa5529e44a766ee10d37b3d374samba-4.10.16-5.el7.x86_64.rpm2d0f9329836d6501a33d207858a79dba6c9bb51c2cebec698cced5b7a8665329samba-client-libs-4.10.16-5.el7.x86_64.rpm27ea67987195d1416452eba0caa1059c7d4f679f5708aee0e822be2d2b8e464blibwbclient-devel-4.10.16-5.el7.i686.rpmcac6d1848308ec6e87b108f86954d24f117d5f9b67e35b399725cadd16c2746dsamba-devel-4.10.16-5.el7.x86_64.rpm2a5fe36b5e561d9a3933e52afc3c5313f410a91799e5e782dc88f0c61777bbcfsamba-libs-4.10.16-5.el7.x86_64.rpm755f03864afca4db04eb988657f9a59c9b13e797f4bd1e828145b40a90f67649samba-python-4.10.16-5.el7.x86_64.rpm2531e6c7b21b0847d74fe616b02ad83047b6d4a19853687bf3fedb7c4ae9b7f2samba-common-libs-4.10.16-5.el7.x86_64.rpm394731b92d6a154d4b35575c8cb3e1ec5af3766b2dfe187c5b68336ea0760403samba-test-libs-4.10.16-5.el7.x86_64.rpm9b3c4550839b8993121aaddb28673d70922426420c4f7882f5438cdc278504e3libwbclient-4.10.16-5.el7.x86_64.rpm77934186de7c38d772ad4dad60a9118a7e312029b7d4745dddf51edef7e8304esamba-winbind-4.10.16-5.el7.x86_64.rpmd10108b8d29238429076cb308300d86143b050275725a90c75e691821fe6d61fctdb-tests-4.10.16-5.el7.x86_64.rpm76667b5388a6e6d18f1cd220537952b9072e46ca84af15ffefa2f6c34222198esamba-dc-libs-4.10.16-5.el7.x86_64.rpm4d78134794aa567ff154ed2cd401e57dbb43ef5a96b594a866078b5c33c7e5d2samba-libs-4.10.16-5.el7.i686.rpm9187e1b0d2c719896e3c670ef35c4bea2620564afc04f06b0be2f4117f43979csamba-common-4.10.16-5.el7.noarch.rpm0bb6a7568e891375b42e986ddfb2cd3787b195493f6f0472625e23dfb4955547libsmbclient-devel-4.10.16-5.el7.i686.rpme608f00a87f8efa20d4ebc5c97215c826d5c0285225b6275e70e5aa174c7d3d7samba-common-tools-4.10.16-5.el7.x86_64.rpmfda2273d80424a0add92b6556aaa18126dcfc4c862895da5d7270363c4ed3508samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm49437a5b961425beb47e7ddcb95eb1d288e0886860dbee4c9e7f1f6c99c1af2clibsmbclient-4.10.16-5.el7.x86_64.rpm316ffb4dadc05783a92dbf777eb9499c65f2aae8b091f180042d6d6908586e1flibwbclient-devel-4.10.16-5.el7.x86_64.rpmc4401295f9bb51233356788c096d7968feb8ba4534ded907333131bcc8829d75samba-winbind-clients-4.10.16-5.el7.x86_64.rpme75a6bc5aa24e0d8fc5c80c4ffb6f2e67e4e96e7f07df02f3f2ebca35d1b6430samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpmea4b5610a8d66487502c65043cbc2a7836d40263913e72291190b3539717c189samba-python-4.10.16-5.el7.i686.rpm8f11ef77cd00e75ed47dd73d6bb19576e67b818c522d07efbb5fc8fa2253583bsamba-devel-4.10.16-5.el7.i686.rpm700ae8bf484c06b74d108510e2a82a32e90a0de557f8d94ea666b4eee6e67723samba-winbind-modules-4.10.16-5.el7.i686.rpm27a8c897c14b2e00d268fb5703740c69c62c9dc432c0396268263ac65bf273dbsamba-pidl-4.10.16-5.el7.noarch.rpm5a79235d44f7c7c04080d3bf7115a934667640dbc373f7d51c355304d455263fctdb-4.10.16-5.el7.x86_64.rpmda610c0aed36bca99b74785ef1b508b6478783e9b5efed71d4091e158f0f4e08samba-client-4.10.16-5.el7.x86_64.rpm64fe5f9f2b705c3f9af0515f1f23b948cfd585fc22f9f1eec4d4dc6afb25bdf4libsmbclient-devel-4.10.16-5.el7.x86_64.rpm6ebf1d08b95fd3d6418d3e6c08ad864bcfca13a752788137372b60c4097747a1samba-test-4.10.16-5.el7.x86_64.rpm8d935b4bad0b99403e1513c347030460ca8502789c64ec540209a6ccc762a857samba-client-libs-4.10.16-5.el7.i686.rpm549d6cb0c8c952851323e8b9af03bd8ef0eb7838bda43f0d31b9a9391a34e44csamba-winbind-modules-4.10.16-5.el7.x86_64.rpm10a914e3a55da8ccd70a14ef850e825b07f4afd8ee8df5afc16c28ac81964b2bsamba-krb5-printing-4.10.16-5.el7.x86_64.rpmabc9b834724eaf486d251e83f7c794f6061a25d98223568c80f43b34825eaba2libsmbclient-4.10.16-5.el7.i686.rpm09736a08fbf93986ac6f3e134ce18c0cd85f936c93ad64c8739f58791a337655samba-dc-4.10.16-5.el7.x86_64.rpm427ba84be0d94ba9ecdee57d4427880f0a99bcc12b60e3af8b079de0229b97cfSLSA-2020:3984-1FreeradiusSecurity Fix(es): * freeradius: privilege escalation due to insecure logrotate configuration (CVE-2019-10143) * freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations (CVE-2019-13456) * freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access (CVE-2019-17185)moderateScientific LinuxScientific Linux 7freeradius-utils-3.0.13-15.el7.x86_64.rpm7feb6de238043e6a856a4acd13d187da88ddcc7daf10c7edf6fdf56d3f772801freeradius-devel-3.0.13-15.el7.i686.rpm7f9fdea8d5855592486268c8928b6e86fd429c1ff032fe7ca7ec7bf331764d99freeradius-krb5-3.0.13-15.el7.x86_64.rpm36e5b67458d1eb68da1cf45283b6ee493d07c02d17e325850fd91422b7fa5df6freeradius-mysql-3.0.13-15.el7.x86_64.rpme1d08544abe854a451e745b5dff2d021dc8e13d4c63779359a2c5683d723d185freeradius-sqlite-3.0.13-15.el7.x86_64.rpm97ab8cff5c543c2eb68fa0d3026c3855c41a1544f4c3f5d1a97236ad42ea3063freeradius-doc-3.0.13-15.el7.x86_64.rpmcc604a6ba3277d8d609250a753ba807a3bc957261def0a8ac69d8ceadf003233freeradius-devel-3.0.13-15.el7.x86_64.rpmd3f5c2720d685b00d53fbc6d856688947a97acf0bd2303dd28af9a4ca743915ffreeradius-ldap-3.0.13-15.el7.x86_64.rpm241fa7606c84c8c850441e373ca5d420ba8c8a41cec600cb22b8189e3b29e9e2freeradius-postgresql-3.0.13-15.el7.x86_64.rpm2d35bc7bd5d9dd205085a5660dac86558ffabe9b27e5dc73ddcf4c5d09a068e2freeradius-python-3.0.13-15.el7.x86_64.rpm9f531af4b5d5a6c0fd6b862c87c9e70b644a7e88982c198d22f0f734b2d67e90freeradius-unixODBC-3.0.13-15.el7.x86_64.rpm86213d9fbd06e0cb48446face4377f73a241ab26ab752c0eb0e4f1dead64c501freeradius-3.0.13-15.el7.x86_64.rpmccb6b87a403cc6d513fde29a3a5e6b2581551fddca847ce28ed70c8f475f4e21freeradius-perl-3.0.13-15.el7.x86_64.rpm1ebb1fc819a326b63e0c7c84362ca01be3ba1de6917770d5d4d3b603b861d939SLSA-2020:3996-1Libxml2Security Fix(es): * libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c (CVE-2019-19956) * libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388) * libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)moderateScientific LinuxScientific Linux 7libxml2-devel-2.9.1-6.el7.5.x86_64.rpmdbd4aa5cee7ef698a5a3e1668fe4a585f4ae31d42e63ea585f4c75b11978f93clibxml2-2.9.1-6.el7.5.i686.rpm4ee258fe6435d7b424f6f81240b50508424eee0c11e160d80bd5c470f4e45447libxml2-devel-2.9.1-6.el7.5.i686.rpm68c1d8263bbd70e213a086a81c0773024a80a6d62ff489ec90711af32e953d5clibxml2-static-2.9.1-6.el7.5.x86_64.rpmae33ed58034989dbd2a87fb25d809eaf1cfcbbc2dbd19ad12874d4ccde897279libxml2-python-2.9.1-6.el7.5.x86_64.rpm3b7c67f100e199f2efbeb212e280843a651365b6b0f3b474bfbcf08ac5838cc6libxml2-2.9.1-6.el7.5.x86_64.rpm6419297e1d1a20ae43bff5d8f1dfaa1d30d53c0204a64ca3a74a748e4cdea048libxml2-static-2.9.1-6.el7.5.i686.rpm4744bc51e5511cfc541b88fbb5e944b1739235a38dcc568fe434f91836b35254SLSA-2020:4000-1LibvirtSecurity Fix(es): * libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) * libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)moderateScientific LinuxScientific Linux 7libvirt-daemon-driver-storage-disk-4.5.0-36.el7.x86_64.rpm496b33c1674c7ae7250cf1896790b186852808bfb5ce0b5cb0ebd6502db4d2adlibvirt-docs-4.5.0-36.el7.x86_64.rpmb75211ad700f417723012281893e8d8bd9c1b4bca51c6eddbd5122dbaa70d7aflibvirt-daemon-driver-interface-4.5.0-36.el7.x86_64.rpmeb4f8a8f50f1f87916e682635898d022659327f8e0bc753a1f682db73724e04dlibvirt-4.5.0-36.el7.x86_64.rpm4342f4ce8801b71d719cb361a768ef40b011b82bc55713242a8f5f98381a9412libvirt-daemon-config-nwfilter-4.5.0-36.el7.x86_64.rpma1ab324cbba9b45adab889d9bc0da6adc0cb3dac91829340eeaca9f68efae820libvirt-client-4.5.0-36.el7.i686.rpmb46fd5042892e80519b7c053ceddce9a86285fa457dbef04a488faf7f3d581c4libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7.x86_64.rpm10fc3288e9a96eacf3f4116723e2be911e3765435d73b5e56857bb485027b4d2libvirt-daemon-driver-storage-rbd-4.5.0-36.el7.x86_64.rpm1b5411200b747f1620b6cab3063b7777811e634c0aa7df00a3a52b0e98bd7786libvirt-daemon-driver-network-4.5.0-36.el7.x86_64.rpmcf6db16e8ffb5da193690a51de76299f497b352a69a111598d08d817e186f6b8libvirt-lock-sanlock-4.5.0-36.el7.x86_64.rpmdf3f5f92f589c68eabdf536a9095a236e1e7ff95cd8086ae6517fb38312d75b5libvirt-bash-completion-4.5.0-36.el7.x86_64.rpm81e67fa91a548e0c1a774884121f9d59f70b38694aa8ad2c00693437eb102c36libvirt-libs-4.5.0-36.el7.x86_64.rpmd92cf06a7b04a889cb9be5df7b18bae2e37a213b974063de5aa00e0212f10755libvirt-daemon-4.5.0-36.el7.x86_64.rpmb82da992e57525d2255417023bf2ba09cac822aa28461efe2ceb3f170b165bd4libvirt-daemon-lxc-4.5.0-36.el7.x86_64.rpm1255e9ff441baa64e74254dab8954eb79ceace3f6e2999c4a08b8996afa69d52libvirt-daemon-driver-lxc-4.5.0-36.el7.x86_64.rpm619d7b207f4b55ef16b0f64822d35693c75f360b0ddbd10b89f4dfa9261e4fb1libvirt-nss-4.5.0-36.el7.x86_64.rpmedbda8b07b56058e5ff680499db324dc4858a4e18e6bbd5ff92a085f743a9cb2libvirt-daemon-driver-storage-scsi-4.5.0-36.el7.x86_64.rpmfabd0fd7b11570e88a0651b0ba7c04e719fc67670dcbf0c9e87c81483ceec4f6libvirt-daemon-driver-storage-core-4.5.0-36.el7.x86_64.rpmf724365cea637756505ba19938ac48245a4ee35ddda05a5996659ebc254b3906libvirt-daemon-driver-storage-logical-4.5.0-36.el7.x86_64.rpmebf986dc9d961bfaecc99b37ac73f25afdce9daed4d6e60ee8400a0169fb083blibvirt-devel-4.5.0-36.el7.x86_64.rpmbc04447756d3ce6c7bcbf9c0db4e09f5121bf85d7ab746fca00136fa1c3e75d0libvirt-daemon-driver-secret-4.5.0-36.el7.x86_64.rpm05ea88240cc245c611a7be42e4247d4f181368e11b1abbe8289d3e02d69bec86libvirt-daemon-driver-nodedev-4.5.0-36.el7.x86_64.rpm0aefc155c8423513f987338b7bfd66ab6e9280c70245c9bc5700943567c5311blibvirt-daemon-driver-storage-mpath-4.5.0-36.el7.x86_64.rpmcb6833f1004de879a3ad8ceb3596ab1f70b78685958eeefd071af805d9823528libvirt-daemon-driver-storage-gluster-4.5.0-36.el7.x86_64.rpm1aaef4e813e2102b8ff4734389c3548a1a23ebd6b9ff972379c00dc6272d3121libvirt-devel-4.5.0-36.el7.i686.rpm57b2ba8114fe9f847896c89d0a3562a9fe21b6c01f6854326e6f621fe609fa9flibvirt-daemon-driver-storage-4.5.0-36.el7.x86_64.rpm4a6fde25b076d001a9ae766ecac2c04dd73d44b5ba039d9685c5669c6bf4e3a8libvirt-login-shell-4.5.0-36.el7.x86_64.rpm622d332a0ca7e642e1c368f483b2b44b3dcfca419547d115b9981ddeba6a3034libvirt-daemon-config-network-4.5.0-36.el7.x86_64.rpmb16fb2a5b53721064432a56b0723b4a575418b557008673f5847ad9513e6147alibvirt-admin-4.5.0-36.el7.x86_64.rpm86c39d819469ad10d482b6c5c7c4c9cd12fd067c0685607a5079889da6a4dcdelibvirt-daemon-driver-nwfilter-4.5.0-36.el7.x86_64.rpmebfaef3eb423b6fd65bc0451c87251349a9c5c155a2a005753f9392dc58d4527libvirt-nss-4.5.0-36.el7.i686.rpma53f754c6285352146827f07575ec836229172d7798e6a8625bcf351dfd41346libvirt-libs-4.5.0-36.el7.i686.rpm173d7168ddccdf15adb81421561edafc9420d14d80e8ff1e134c96505def39ealibvirt-daemon-driver-qemu-4.5.0-36.el7.x86_64.rpm64e0243d6afed485d0dbf416f1d194a39b0e603faad5d17226d1c36502274483libvirt-daemon-kvm-4.5.0-36.el7.x86_64.rpmd02123c8e6fd6b554fe1d1302665ea5db756df3c45e92ee732506473e04c350clibvirt-client-4.5.0-36.el7.x86_64.rpm0c2ace1e8529336b50bd710718ffed9d99f3f29f550b979d1a9459cbaaa7a076SLSA-2020:4001-1BluezSecurity Fix(es): * bluez: Improper access control in subsystem could result in privilege escalation and DoS (CVE-2020-0556)moderateScientific LinuxScientific Linux 7bluez-5.44-7.el7.x86_64.rpm2a7c532d13084cce124cb6ca75c9bfab50395636149fe3faffbac839edd8d126bluez-libs-5.44-7.el7.i686.rpm3406c53e60fb9f5dbf082ff4d9c0ffdfa71dd89b9cae3f261acf7d75454bf46fbluez-libs-devel-5.44-7.el7.x86_64.rpm5d132f663f3e29b196ff3ea530085cddd445277a12db52ec2ecf37cbdadc2323bluez-cups-5.44-7.el7.x86_64.rpm003193f244334d2b54bb844572e00673a3bd5c044690b9faa773ea02a1910e70bluez-libs-5.44-7.el7.x86_64.rpmd8c30dad8d8ae6b79e21029a8fd77046b07ed9778d53fc3a37779105b72abd23bluez-libs-devel-5.44-7.el7.i686.rpme5f47dc7d3a2f07c9caf704265d08e9f97c4f726f6d37a911f84af63e16ba245bluez-hid2hci-5.44-7.el7.x86_64.rpmb038da1fc353e81a1f64eecd80292e975ee1b92b81b131dd6c2b702440ad77fcSLSA-2020:4003-1NetworkmanagerSecurity Fix(es): * NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults (CVE-2020-10754)moderateScientific LinuxScientific Linux 7NetworkManager-adsl-1.18.8-1.el7.x86_64.rpmd8edc78e849570ddf8483a19e266d9ed2d49bd641169a61347a6295806547d35NetworkManager-glib-devel-1.18.8-1.el7.x86_64.rpm89fc41bf847a9f71ed1b3ca0d307466ebc9c842b4d5335f06ae129ffd9af6c22NetworkManager-libnm-devel-1.18.8-1.el7.i686.rpmf76699181515b748d9ce1e6a2e51cad62386648cd42d38b99db74f6101ee784eNetworkManager-bluetooth-1.18.8-1.el7.x86_64.rpm4b39ed1225bc8c51480e223d07d307b0d660b3a1348c9e1886d4551229489650NetworkManager-ppp-1.18.8-1.el7.x86_64.rpme04b4f1b6c062f4c1064c8152741163efc7a639d5ac97defe01a61c225cef30dNetworkManager-libnm-devel-1.18.8-1.el7.x86_64.rpm5d448ac10548d0cf49cfb5d3afd192d8a291290a22ae6bfebfd9af103c8b1ec0NetworkManager-team-1.18.8-1.el7.x86_64.rpmd09b654320de212d3356a7f307c774205a444aac01063db4d51b05756153a5b2NetworkManager-glib-devel-1.18.8-1.el7.i686.rpm838864e66ccb3d6748ed29a152edc3622d8df575bb758969844cbb9201b69c71NetworkManager-glib-1.18.8-1.el7.i686.rpma70a5fe1268909f14a63b9b0b274d7afb27d3e3226b599559a43e3e6c96bb4bfNetworkManager-ovs-1.18.8-1.el7.x86_64.rpme3d25fd1863714afe048ae512a5f3d491855dcf576dddcd866c25b8dd5e948adNetworkManager-tui-1.18.8-1.el7.x86_64.rpm4701a45225590b1ad266b502a1859c45778bbfb37ed1aabc3232e69932efda0cNetworkManager-1.18.8-1.el7.x86_64.rpmb4ea7cbe44f9840b2cb3c99d1b5755b66ebd88b00a5d564bea3fdf7687cce507NetworkManager-glib-1.18.8-1.el7.x86_64.rpmba74547a0dc95c5498de4f462614d8577c146af750168d73c9ff9312279682e1NetworkManager-config-server-1.18.8-1.el7.noarch.rpm48f0bc72be92efa7e80d6413d11bf39dfd7eec528472645aa2b97218b8da2dddNetworkManager-libnm-1.18.8-1.el7.x86_64.rpm9ff9cf68ba518cd85ee7a94539e2d28009e54054bbaee86e70a8e98430730f55NetworkManager-dispatcher-routing-rules-1.18.8-1.el7.noarch.rpm3b73fb6eb579b58910848316231944d75274b0dbc65baae675b1078905a75146NetworkManager-libnm-1.18.8-1.el7.i686.rpma62d19861728a2bbba0edfee065cc23d686ec219d7c8c24b67d86de1621adda0NetworkManager-wwan-1.18.8-1.el7.x86_64.rpm48b053252567a61b402d37447475ccdd941547bf6609c59834a7a1b9646bd49aNetworkManager-wifi-1.18.8-1.el7.x86_64.rpm4f9a5bb6f3580553d4058916e93753fcda252e7d2e47188b5067053ddd46d5adSLSA-2020:4004-1TomcatSecurity Fix(es): * tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS (CVE-2020-13935) * tomcat: session fixation when using FORM authentication (CVE-2019-17563)importantScientific LinuxScientific Linux 7tomcat-webapps-7.0.76-15.el7.noarch.rpm87b3d642e61504e29155413564fec0b52d5f57b09c4db068f9a05e959791dc23tomcat-jsvc-7.0.76-15.el7.noarch.rpm51964b41102672ad9252b5e716670cd72fc295b594df3ce2ba17bee8837dde96tomcat-7.0.76-15.el7.noarch.rpmd8b7d8cecb0cdb9287b65b2266c0e626574b30948b4524c1c0774dbd8b725cbftomcat-docs-webapp-7.0.76-15.el7.noarch.rpma692cdb3a57907beef6d8360fea12e0c84d8312c78ec7e5573d4359a0efaa409tomcat-javadoc-7.0.76-15.el7.noarch.rpmeed676b99abdbd7b5b4ed025138ebdb94f103951a7eabb7be5d23fcf916426fbtomcat-admin-webapps-7.0.76-15.el7.noarch.rpmb81c410e21ecb8ebed71b452ff00698b3982880affcce2fe6c1bdbe42b658ef2tomcat-jsp-2.2-api-7.0.76-15.el7.noarch.rpmfc0d17a16d3d5df3fb42abf3c476dbaf7fb20aa0e20927da2e86afb328c0e628tomcat-lib-7.0.76-15.el7.noarch.rpm3b5ab3dcdf94abfb690066f4414f22d0cba6854807f38a44b0338f577c10ed8btomcat-servlet-3.0-api-7.0.76-15.el7.noarch.rpm25a9e1fa67fde116785c962eb8a75cf960a3c8c7b09eed7fac582a45397ad602tomcat-el-2.2-api-7.0.76-15.el7.noarch.rpm2d42ec82abd43740e643aae0207161557c27d966214830b0f646cccf4c351e4bSLSA-2020:4005-1LibxsltSecurity Fix(es): * libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL (CVE-2019-11068) * libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure (CVE-2019-18197)moderateScientific LinuxScientific Linux 7libxslt-python-1.1.28-6.el7.x86_64.rpm1b508ab0ac76456f425eebc50523e8af8f3799a0248bbda6d3f9a5e66102f9e8libxslt-devel-1.1.28-6.el7.x86_64.rpm26426b49f1bf78eefb3c7661f6a3b8ccabf421518246e57c4a0bbc79ac2ff70elibxslt-1.1.28-6.el7.i686.rpmbacab1d3c17759b7844f6aa146f9fd71ed0a261dd7ab1842f660dfe9a5c160a9libxslt-devel-1.1.28-6.el7.i686.rpmc33a3d94a13b4f48be72e87c0e1cae7ee5fef991741568d1fe9dfd3f191aba66libxslt-1.1.28-6.el7.x86_64.rpm2cb886c9aec87e6ce4f173be84e20243e3118e9d078d9f13a2e75f69746c3d37SLSA-2020:4007-1SystemdSecurity Fix(es): * systemd: memory leak in button_open() in login/logind-button.c when udev events are received (CVE-2019-20386)lowScientific LinuxtrueScientific Linux 7systemd-devel-219-78.el7.x86_64.rpm9e4a239151efd3c119dc72374bbcf566492374dd93db1a5af3ad4d91b015305alibgudev1-devel-219-78.el7.x86_64.rpm86cd6d60f6ba9d20d5a3bc76e1a44c2f870ed91756ee13046686061ae716123alibgudev1-219-78.el7.x86_64.rpm1634fa6c32fef933648f5e283b236bbd9b98e8d54c81d804dec589c8cf92afbbsystemd-networkd-219-78.el7.x86_64.rpmd6e8711e69c48b45fa944c006c4cb2be87314b42a389e4a2dd2b4610f42a42c1systemd-devel-219-78.el7.i686.rpm29308d4b3f7d40d0e03caf50269889c3b92646b1c8c7cfbabf5f30b8cc05059bsystemd-python-219-78.el7.x86_64.rpm92761bffa75a36304ecc817ce59ffbf6689d078de7445ba5880e023f6ec0eb82libgudev1-219-78.el7.i686.rpm69adfbad6505778b4334a38e21414471b3d0f94635f27c359943158dc4672df2systemd-journal-gateway-219-78.el7.x86_64.rpm1185a7c7fd7c2849afe7db2bddd6830eba1cc4fab57cfd019d99ef20d0c9be7esystemd-libs-219-78.el7.i686.rpm2259559df5e82f98bf8479428bd2322a64f5daf38e8eaf06456b3f44a52c684csystemd-219-78.el7.x86_64.rpm822e1c3f53cb29006bd164865d072215423d8b50dca9c62147ed26a76a9c30b0systemd-resolved-219-78.el7.i686.rpm07f83bd725e762217e0a6feaa74d8281b88f4fec6b86de401bbc13a40f82554dsystemd-resolved-219-78.el7.x86_64.rpma6af5a300b787c0b0e20defce0ff772e2f4c1b1872aa34557c7096dbb436a4eesystemd-sysv-219-78.el7.x86_64.rpma33a30d06e5107808e2ea9d21e6b3a7315d68327c4d5557b45ebddab6c0552e9systemd-libs-219-78.el7.x86_64.rpmfe5ac8fb977e4d3d7f8a80bb4dacdd1792bb6af5e6344de73326cc46af45d2adlibgudev1-devel-219-78.el7.i686.rpmbba990c649a32557f5e0e2b704752c33c6f8669613635fdc2317238808e0f19eSLSA-2020:4011-1E2FsprogsSecurity Fix(es): * e2fsprogs: Crafted ext4 partition leads to out-of-bounds write (CVE-2019-5094) * e2fsprogs: Out-of-bounds write in e2fsck/rehash.c (CVE-2019-5188)moderateScientific LinuxScientific Linux 7e2fsprogs-static-1.42.9-19.el7.x86_64.rpmb13acf7be6e3ee574a91e839289b6abbd0d3e894897a67112e536a4d4ca5ed7elibcom_err-devel-1.42.9-19.el7.i686.rpm29c3c0d7965321619ca46b50c43c315967302ff0e4dfa216436d97320a007a21libss-1.42.9-19.el7.i686.rpm3448fac475a69c773ccc6478561f3ace4bc763c52ba1440ab47fe5ce0ec189c6e2fsprogs-1.42.9-19.el7.x86_64.rpm35e5efa68a1b9e729d60d7300338bb55c88fab016e42eaabc942645b43dcfb23libcom_err-1.42.9-19.el7.x86_64.rpm643d68b3898aae12e14d804f7ef7ca3e1951bdabe998357d75b5188ef4967642libss-devel-1.42.9-19.el7.x86_64.rpmadbf8a194351a859e578994d45cb4f40e5d876a0642659f1c6c4246ba0c972dalibcom_err-devel-1.42.9-19.el7.x86_64.rpm6da95fb7be290714e949ddffb21d3049f34307af9272b4579d9fbbe8fdf121c7e2fsprogs-libs-1.42.9-19.el7.i686.rpmc79875b56cbaaa387b7f382ffa802bef9d1aa507b32d1925dd846958720b996blibss-1.42.9-19.el7.x86_64.rpm0571c9cc209e9dc2c5cbb4d69ea350677fa0b7d5758bac2c4b3c693778651880libss-devel-1.42.9-19.el7.i686.rpme10b1c8d2a7d13341874177e947aead0e9aa44de33dfff748b09d8b0b63def16e2fsprogs-libs-1.42.9-19.el7.x86_64.rpmcfde5380a1da5cfa2bdee6e4c2f20a2c3ed421d33e9b1201aafc446239e52ce8e2fsprogs-devel-1.42.9-19.el7.i686.rpm3c9deb8a85a2b74c3d327a22a43fae6a2ddc9f6b7297803095fc8c1bc878759dlibcom_err-1.42.9-19.el7.i686.rpm4d0990dd22e09ae4e90d0d284a716440f9c20f9fe81e6c6fde627b7770252ad3e2fsprogs-devel-1.42.9-19.el7.x86_64.rpmb989e45b8d91ded5ca37d0b2e45b2276b3de9443b5cb4cb4ded10449654f7753e2fsprogs-static-1.42.9-19.el7.i686.rpmc019fa9a7fcc4264ed62c4664e5d613f74696bcccf11227dabc2027590697bd4SLSA-2020:4024-1OkularSecurity Fix(es): * okular: local binary execution via specially crafted PDF files (CVE-2020-9359)moderateScientific LinuxScientific Linux 7okular-4.10.5-9.el7.x86_64.rpm227ee627aeeb063798344088808c9a66d7dbe0cfe5a2ca556f23e5ecd5ea679bokular-devel-4.10.5-9.el7.x86_64.rpme10dc39c17c4e3c58a6ae470a3ddebc05ef3b3d3a19cb652ff1cb519cd087776okular-libs-4.10.5-9.el7.i686.rpm6007b024d163f9ee217ee795d79daaa975ef722aefff755990c3ecf0f304d633okular-part-4.10.5-9.el7.x86_64.rpm4108c4a129092e7b3677c768a52b1bf2b93832de180f505b9d27ab656c773173okular-libs-4.10.5-9.el7.x86_64.rpmce739b58b2f977bb44604027eb902dc20ea3f179665e6f77915774a7bee0a9adokular-devel-4.10.5-9.el7.i686.rpme3e89569de22f6209882571e46f9db700b345c11c1e41ebc89246987b80bb9f8SLSA-2020:4025-1Qt5-QtbaseSecurity Fix(es): * qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0569) * qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0570)moderateScientific LinuxScientific Linux 7qt5-qtbase-gui-5.9.7-4.el7.x86_64.rpmabab1227dc0ff0370441bfd6278dd3be09d19e4e297a5d50eaeaa1d6bcc0f2feqt5-qtbase-static-5.9.7-4.el7.i686.rpm85982af26b66ccedeb8e13ca9df958dd07cd2c969597e65d6bf84c7f30717de6qt5-qtbase-devel-5.9.7-4.el7.x86_64.rpm7bae4add7fbb0e8b397aa454a9a1f1a033fd4a7988b4afe49a99698accd15a43qt5-qtbase-odbc-5.9.7-4.el7.i686.rpmf525b0851ad58810176d72a29f72d3a20e33d5ec1963c984c60fc31111c9fcf6qt5-qtbase-common-5.9.7-4.el7.noarch.rpm7f1c9432f93dd8c5dde95696eb73298ec04c0544882f443d64991cb81c3a3e63qt5-qtbase-mysql-5.9.7-4.el7.x86_64.rpmddcfc60323daf117580a3fcee0db370dbb6564a2abc2b9eedae8b40b21515a0cqt5-qtbase-5.9.7-4.el7.x86_64.rpmfa797e1be38c73b8781cad9156f3b3ce128ccbfd5383824e180594a36da783bcqt5-qtbase-odbc-5.9.7-4.el7.x86_64.rpm3065f28397158af1c0fc3072e3e2b5d0a027f27ed7d3875701d83620873139bcqt5-qtbase-examples-5.9.7-4.el7.x86_64.rpm81c9cdfe894e4e00581b84c4858769dfe4e4ed852c1b5051a7c822a8f4f8b01aqt5-qtbase-postgresql-5.9.7-4.el7.i686.rpm5e2ba3a99a781f9d33a77f83a2f44ca6a40df0ad61dd32641b151108a1e880ebqt5-rpm-macros-5.9.7-4.el7.noarch.rpm711f1c0aab7124cafb5d774346c9ae55a5de90e72315ed2d17df91193c4ca07fqt5-qtbase-doc-5.9.7-4.el7.x86_64.rpma8ec25d608f268834f7132d62f591d624f927d7b0f5477977270ac880c15552fqt5-qtbase-mysql-5.9.7-4.el7.i686.rpm4c585e99c4fbf42622b8c8e443126da264bc61c7ec907381b0292651494a16dcqt5-qtbase-static-5.9.7-4.el7.x86_64.rpmc457697974f37793091902fec69e8006182da5ace574c164a1e29543226d474aqt5-qtbase-devel-5.9.7-4.el7.i686.rpm1e59d1e9cd21ea65f23b6583662395a4ef48a8b46a2c679b385e544baef3b9e6qt5-qtbase-gui-5.9.7-4.el7.i686.rpm334b59f119bbfe1554f1da9b6cf1f4eab417c714f66414a221c2754f4fc441a7qt5-qtbase-postgresql-5.9.7-4.el7.x86_64.rpm2bf5dead3482eabeab1d6dd021f72927c072d86c1d09e4cf65c303ac7a58d5f1qt5-qtbase-5.9.7-4.el7.i686.rpm504912a51f798dff9d6a988f8d985b776142728f5d2d35151ab118ddacbdc159SLSA-2020:4026-1MariadbSecurity Fix(es): * mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) * mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) * mysql: C API: unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)moderateScientific LinuxScientific Linux 7mariadb-embedded-5.5.68-1.el7.i686.rpm698adde9d3d1b11478b26b49844754a907752444f4bcdbf36d7333b6124644aemariadb-devel-5.5.68-1.el7.x86_64.rpma851ac042508beda19cac0bdbcd6af89a6668867bc5212054ff69ccceda81051mariadb-embedded-5.5.68-1.el7.x86_64.rpm1702cdb5c291ebdf5d6276cc6f99980fddfe6d9a80efea64eeb5b34e2adfe5camariadb-embedded-devel-5.5.68-1.el7.x86_64.rpmc47cc49de59ddb583c025f53f3624d1ae8355c6b57dab59969043e4c4faa3901mariadb-devel-5.5.68-1.el7.i686.rpma64490c6af7b1557f50a34ade4889ec1df0b8b8d00036c99f3c3bae186af3b14mariadb-5.5.68-1.el7.x86_64.rpmf305d3e78cbc2910e780f9298634aef9754974308eafe7130dc5f2e39c7abd27mariadb-test-5.5.68-1.el7.x86_64.rpm5eacd199a619557bde3bb3fba63c742fad338e57f09525ae410fd12ac79b0cc9mariadb-libs-5.5.68-1.el7.x86_64.rpm19b4ec56288c2563d082a4af7f23c6d0a408a0b3485cd1d6b9fb1d72511d2832mariadb-server-5.5.68-1.el7.x86_64.rpmc6caf93379bbb675d16f142ed22ba0720c52abbc7f7b132da92ac7e22081fe8emariadb-libs-5.5.68-1.el7.i686.rpm966f5671d0876ee87e6c8e19592314c1db68a9057f130c7d79f334fcd66ed3c2mariadb-embedded-devel-5.5.68-1.el7.i686.rpmb537cec0f706f485eeb58e826d577af79f764d20574b8e8f0298b4ede8a317fdmariadb-bench-5.5.68-1.el7.x86_64.rpm9974118028d740e534857e7930076a251c21ab12415a631123b461537b067eb7SLSA-2020:4030-1Exiv2Security Fix(es): * exiv2: out-of-bounds read in CiffDirectory::readDirectory due to lack of size check (CVE-2019-17402)lowScientific LinuxScientific Linux 7exiv2-devel-0.27.0-3.el7_8.x86_64.rpm699b7f384aea8609147679d079b0fa531e464c9fab4beda9861a1b6fd06ab980exiv2-doc-0.27.0-3.el7_8.noarch.rpm9712b0545f1a74cbb8b7e53f2c2c90f6bf4e8f5b13fe14dad57c8fd90cb82ad7exiv2-devel-0.27.0-3.el7_8.i686.rpmaa31d9d0acf7fd5f431a3469e9cd75d7e1317328dfc274b957ff4916f8e1d82aexiv2-libs-0.27.0-3.el7_8.x86_64.rpmb4f067e21c8994450c7c4964d2b81305ed823c8bcc67f39a7fab13fdcc52283fexiv2-libs-0.27.0-3.el7_8.i686.rpm2f1e194e18531d71a2bed100da5671f2d21229ca4731f713862a2a7ae9316ed8exiv2-0.27.0-3.el7_8.x86_64.rpm128fb873cb7d2ffc1a10d64715ee26891c2a7629b3dab15dd784acdef0a6a67aSLSA-2020:4031-1FreerdpSecurity Fix(es): * freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) * freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) * freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) * freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) * freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) * freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) * freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) * freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) * freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) * freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) * freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) * freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) * freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) * freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) * freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) * freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) * freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) * freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) * freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) * freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) * freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) * freerdp: out-of-bounds read in irp functions (CVE-2020-11089) * freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) * freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) * freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)moderateScientific LinuxScientific Linux 7libwinpr-2.1.1-2.el7.i686.rpmbed5fd94e38041d14d9606e33eb0a29666be596b107e22604ccec195d57b98effreerdp-2.1.1-2.el7.x86_64.rpm899f978bbb36db7396207aa5631483c9256f46dbea8aacb1ad8b6aa0ce6ad1dalibwinpr-devel-2.1.1-2.el7.i686.rpm8933fcd83816423744b93bedc67f18e0da393f01b50156f0b313ce31dc6def14libwinpr-2.1.1-2.el7.x86_64.rpma16b61139ef5f5a409a2d34683c6e10bcfbc45c303883acc61f6230065ece19bfreerdp-libs-2.1.1-2.el7.x86_64.rpm50f478d4d3649092f7c414be5db7af1464e846b8c6f3c6a6942423af7c4521eafreerdp-devel-2.1.1-2.el7.i686.rpm658b8f764bfcded5b3dfe9e506ec8d0ab2f272bf7c73a87fbfe97ac4eb18516bfreerdp-libs-2.1.1-2.el7.i686.rpm070079fee97cd015d6aa2bf66249388d99c85eebfac8a252d2e62fe27b44f384freerdp-devel-2.1.1-2.el7.x86_64.rpmf0263a6d5bb65e61a7b8f6a62ab158564213b749d76bdf6197f72317b336bc48libwinpr-devel-2.1.1-2.el7.x86_64.rpm1100ac0e91ed41264d2410ac18988a56753b53e8faeb84dfb5248342c16454baSLSA-2020:4032-1DbusSecurity Fix(es): * dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass (CVE-2019-12749)moderateScientific LinuxScientific Linux 7dbus-libs-1.10.24-15.el7.x86_64.rpm1af526b357ce623df3bb58d6e8a692a9d0ba31fe8461b764b0570c4fe4e18cd2dbus-x11-1.10.24-15.el7.x86_64.rpm69faa197f1a91f3de92ff8c0d67eaca2cf0067fc7205ed90f96c6ad3e2029f92dbus-doc-1.10.24-15.el7.noarch.rpm0152845e126e3c84a26aaa8c36a9fd1d44978eb885ae6fc23b8c057aa86cb45cdbus-1.10.24-15.el7.x86_64.rpm49613d23e5af1574fead789a20abd2c5a4f3ea9c12836f12ecdf4ceb307b6438dbus-devel-1.10.24-15.el7.i686.rpm2021654c8951ba2e8d71d9065b02f7dea21ceceece169adcb8d8333688c246addbus-tests-1.10.24-15.el7.x86_64.rpme4e97d5cb1e5b020854335e04f51d1f2ee53f7bc79e90cffb42e6cc549a5131ddbus-libs-1.10.24-15.el7.i686.rpmb296591bca8453364ae229e583e2d8821a0d626792a2d431992a2a08dcc54cbcdbus-devel-1.10.24-15.el7.x86_64.rpmdb8141daf59c2fa1e9e07c88e2727c016f087c8f594a5c789ee3c7aeb00b04b6SLSA-2020:4035-1Webkitgtk4Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-6237, CVE-2019-6251, CVE-2019-8506, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551, CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-8571, CVE-2019-8583, CVE-2019-8584, CVE-2019-8586, CVE-2019-8587, CVE-2019-8594, CVE-2019-8595, CVE-2019-8596, CVE-2019-8597, CVE-2019-8601, CVE-2019-8607, CVE-2019-8608, CVE-2019-8609, CVE-2019-8610, CVE-2019-8611, CVE-2019-8615, CVE-2019-8619, CVE-2019-8622, CVE-2019-8623, CVE-2019-8625, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673, CVE-2019-8674, CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680, CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687, CVE-2019-8688, CVE-2019-8689, CVE-2019-8690, CVE-2019-8707, CVE-2019-8710, CVE-2019-8719, CVE-2019-8720, CVE-2019-8726, CVE-2019-8733, CVE-2019-8735, CVE-2019-8743, CVE-2019-8763, CVE-2019-8764, CVE-2019-8765, CVE-2019-8766, CVE-2019-8768, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8821, CVE-2019-8822, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2019-11070, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-10018, CVE-2020-11793)moderateScientific LinuxScientific Linux 7webkitgtk4-jsc-devel-2.28.2-2.el7.x86_64.rpmaceb7a1c5cd23f70dfed22b1c73b064e692bd4724ed40dfcc6e2acfdc86991b0webkitgtk4-2.28.2-2.el7.x86_64.rpma854513d09cd166c5d487700abc2ceb9975ab4cf584ade02a4570b890e9ca0f9webkitgtk4-jsc-devel-2.28.2-2.el7.i686.rpma340b60560733de3fe9cfb6a83c1bbfa27c4fce8bc30c727fde8c50343ea9a23webkitgtk4-jsc-2.28.2-2.el7.i686.rpmce6685ad0c4617164c3292239310271f102d836b7fd2e13c4f6d0efc64be8951webkitgtk4-2.28.2-2.el7.i686.rpm6e8bedb988c417322723f3557dd9fefd208e4c5d835ddaec54518a79591008b7webkitgtk4-jsc-2.28.2-2.el7.x86_64.rpm5feddee015f19f292616832b1f0bfbb8398172ec215b24980033ae467b687363webkitgtk4-doc-2.28.2-2.el7.noarch.rpma14f84c45f338b6c099ec9f886a9a891560d1b7b197b7a84df5d7af9e16c2950webkitgtk4-devel-2.28.2-2.el7.i686.rpm7bf37530a79b1e5fc06f0ba014a3db9a3bffe8ea6f34a0cc8cc6262f7490e50dwebkitgtk4-devel-2.28.2-2.el7.x86_64.rpme95de77af90a26f474731ed34fae4e2cbdd0f8288536d08dceab82c121070800SLSA-2020:4039-1OpenexrSecurity Fix(es): * OpenEXR: out-of-bounds read during Huffman uncompression (CVE-2020-11761) * OpenEXR: std::vector out-of-bounds read and write in ImfTileOffsets.cpp (CVE-2020-11763) * OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in ImfMisc.cpp (CVE-2020-11764)moderateScientific LinuxScientific Linux 7OpenEXR-libs-1.7.1-8.el7.x86_64.rpm718ced468bf51b2002f9affbb2cb4e978272e6de9a1a74ef424c3a78eea82005OpenEXR-devel-1.7.1-8.el7.x86_64.rpm18c2c0c079ff1e9552402956c508d05d41bfc05e82b03a1d8605dca773782c19OpenEXR-libs-1.7.1-8.el7.i686.rpm8677a62336741f83adde8e09a6ff228e0d7ea4b118d5d0082a216d43a1ba3a38OpenEXR-devel-1.7.1-8.el7.i686.rpm23931bd35b53dcec540bd01060db7f3b24e8425d5ac6bb065a54bb4b578779edOpenEXR-1.7.1-8.el7.x86_64.rpm0fdc6cc95ba73c327efefaada1b9f262e579214a66cace2d711a3191be003b87SLSA-2020:4040-1LibexifSecurity Fix(es): * libexif: out of bound write in exif-data.c (CVE-2019-9278) * libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c (CVE-2020-0093) * libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free (CVE-2020-13113) * libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time (CVE-2020-13114) * libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c (CVE-2020-0182) * libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c (CVE-2020-12767)moderateScientific LinuxScientific Linux 7libexif-doc-0.6.22-1.el7.x86_64.rpm29c8870ea192bd1a7f25455101ffb9da5bc0eb70a3d1c509be4d041156e70749libexif-devel-0.6.22-1.el7.x86_64.rpm7660c2b5f75652c415c05e4e1281c0fc970455970ec8315d17f74eafbdeeb0calibexif-0.6.22-1.el7.i686.rpmc55b7d08e21c66626adc2d006015053d3f6759e16fa2b7a551f93c0b29d401c1libexif-devel-0.6.22-1.el7.i686.rpm759bcabb28968dd4f558845a96872f25aa7ab7d487ee845956652ea06ee5cad0libexif-0.6.22-1.el7.x86_64.rpm462a6cff319a50bf552362667dfd8b845d5d5742cd1ed0d818486fea72cb19dcSLSA-2020:4041-1OpenldapSecurity Fix(es): * openldap: denial of service via nested boolean expressions in LDAP search filters (CVE-2020-12243)moderateScientific LinuxScientific Linux 7openldap-2.4.44-22.el7.x86_64.rpm45dd51741f681ba924741cc13c9c0e0679bee065ad86d33579ad269e37a8f7d1openldap-servers-2.4.44-22.el7.x86_64.rpmd4202c530f9ecaa0524744cee78c5b2d4182d8174436a32df0a4c26b6ddafe82openldap-2.4.44-22.el7.i686.rpm0bdc4ef73447eb751de5c1fd537d1a560a4def7f81efdac649e29ebc0a92960dopenldap-servers-sql-2.4.44-22.el7.x86_64.rpm93e88fd229200c0a07889e9a1f8ef9311ed85a5374a49df5e98a602180bfc2e2openldap-devel-2.4.44-22.el7.i686.rpmddd4c977e73eef7016cf40ec711b5f0d4ff153510a2016a2f4c44a60c3e72e98openldap-devel-2.4.44-22.el7.x86_64.rpm14982fa0e7b07d91720de6da1a47f092ad681e504be3acee6afb76724318354fopenldap-clients-2.4.44-22.el7.x86_64.rpm26847425b742ad43c5306aeff209ff4bc2d782d60aa1ae17eda7b4c842a0a07fSLSA-2020:4060-1KernelSecurity Fix(es): * kernel: use-after-free in sound/core/timer.c (CVE-2019-19807) * kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551) * kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free (CVE-2018-20836) * kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454) * kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)importantScientific LinuxtrueScientific Linux 7python-perf-3.10.0-1160.el7.x86_64.rpm05ee4ea7b278f80f4fd8ae40901116798482739f0c932197a3e8db62348a37c9kernel-devel-3.10.0-1160.el7.x86_64.rpme30ca60530716a375bf5876a5168948c6012e487b6dc5789630a41078a57052bkernel-tools-libs-3.10.0-1160.el7.x86_64.rpm9bae0055d052e84412b1be2b219879ceff924b81efabb571f275a86555eed844kernel-headers-3.10.0-1160.el7.x86_64.rpme1d63994d9db669ec855e25f7f0eafb726996cc9e4e9a613f96474f93f55c4a4bpftool-3.10.0-1160.el7.x86_64.rpmc5d517b5e094f8e519d19d1338c6ea8e051c2a5704a01c5d08861bace992e23fkernel-3.10.0-1160.el7.x86_64.rpm7eb44887d89dd1c11abb325b3c8693be2cbcbb99e62c3c32d8db52d0ce483d8aperf-3.10.0-1160.el7.x86_64.rpmd71f3e601b0d37028d2d378a3ba7dafb0e2c58f5ebf72805c4e0b16b9d497e7ckernel-doc-3.10.0-1160.el7.noarch.rpm57077c9598b9fb2cd9c0742374e9169b29a3a9f26b469e7b3a7ba028c2777df4kernel-tools-3.10.0-1160.el7.x86_64.rpme0f769d0ffd95c24ffae5f1ed3470c7b5f52a009aea99b439db99e5cc12ff716kmod-openafs-1.6-sl-1160-1.6.24-290.sl7.1160.x86_64.rpm2bc7a46865aef14d675e8485f1a1cbc0823b27f4e5dbf714890b3a0ee874e6ackernel-debug-devel-3.10.0-1160.el7.x86_64.rpm5a7407e03439617f377f9bab2077d86184aad3c92ce85dac7c6d5a62ba481196kmod-openafs-1.6-sl-1.6.24-1.SL79.el7.noarch.rpm477c073309fed9f6024465094de52dfaf0461607e3c0ff972e787a3f8b515e1fkernel-tools-libs-devel-3.10.0-1160.el7.x86_64.rpm198789134d8196e6d8f0c485712fc885c446140b5e915bccc870529c81e94806kernel-debug-3.10.0-1160.el7.x86_64.rpm9df47dfc2aa200d4e3dd239dbc9fa4d8598d68d3f08b54ab340704d851964bb5kernel-abi-whitelists-3.10.0-1160.el7.noarch.rpm05ad8c8d7e419eba02a6ca3fe402f0c112510ebfd17aefa7e9f8866648f3ba90SLSA-2020:4072-1LibcrocoSecurity Fix(es): * libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)moderateScientific LinuxScientific Linux 7libcroco-0.6.12-6.el7_9.x86_64.rpmd87d08920dc0d6fc8115db1658235f5de735757dd37422431369a61fa249bc82libcroco-devel-0.6.12-6.el7_9.i686.rpm4b512395a6822fa76d4c0fbc4014b8f33e37eca0dd449e27b22c5393b5532837libcroco-0.6.12-6.el7_9.i686.rpm4b4a8dbf07510cc58a5400f60b2f8e517bfe51567f1cb13fc26df73e19798391libcroco-devel-0.6.12-6.el7_9.x86_64.rpmbf8fdd5833f8236b37fe8bc05897aa99e052984c436bfda0351d38cc387973bbSLSA-2020:4076-1Nss And NsprSecurity Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023)moderateScientific LinuxScientific Linux 7nss-sysinit-3.53.1-3.el7_9.x86_64.rpm15a101e35a98f34fac1b771804494d4c6301eff549833e5e78786fb9feacc8adnss-util-devel-3.53.1-1.el7_9.i686.rpm60683f92b2008461920e8aefda0a27b834a00c7faf48ecb927eaae4d44292177nspr-devel-4.25.0-2.el7_9.i686.rpm3fa4d956eae89cfce468432d9c19af7d360fe488c4e0e6f05e5afa2b9fbae8a1nss-util-3.53.1-1.el7_9.i686.rpm9262d3904ffb913894939f0d81393714589b96d493ddba11f6ef0dbf62e79022nspr-4.25.0-2.el7_9.x86_64.rpme08439dde765b18f4e224a91ae854eeae94dc7dc8f37a60fde90504ab233d7bfnss-devel-3.53.1-3.el7_9.i686.rpm0e0db7d4094860e358678dc2afd7975797eb597cee877b304953603ca2e2f5c5nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm6431e62f2f37e81f770ef6c16adf677c8d181bfbbd1a6751ab6852a3a42312canss-3.53.1-3.el7_9.i686.rpm5dd111c183707e7ceb015f79188e924f397b034aca7c7d274b336cf993c68b2bnss-softokn-freebl-3.53.1-6.el7_9.i686.rpmcae33d2ff8fd02ddf817a0b2ba3293d31b3d563276e4d274205aac710cd30c1bnss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm25e1bf14fd9e2ace713eb7f595db1ee2e60d6099813d5f1fcd98a9970be276acnss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpmcbcdecdc2c895a1b0fc34ae177210bbdc8a94f583f59e47c1c64b7f8db0c17b2nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpmce95acdf422ce3fc7b3662005438988b14f6bcd6195a429730e16d44bec1a098nss-util-devel-3.53.1-1.el7_9.x86_64.rpm216d1def1e80a5867a486fb4d2412663739458dd2ad8b11039291f32e307265dnss-softokn-3.53.1-6.el7_9.i686.rpme96391c99b548cc3fe9f16fe843cfda2d20d5e6d39204401aafc0e1a5492f73fnss-util-3.53.1-1.el7_9.x86_64.rpmfc0d30529d44c6c4edd76892d8700f7f24074c3a0448172bc76bca0df143652cnss-softokn-devel-3.53.1-6.el7_9.i686.rpm3f1b6bf28bb95723ac1c3e7ac8b0fba7c45bb42472b4fe44bef21aaa36b48fd5nss-3.53.1-3.el7_9.x86_64.rpm50faf714fa7d06ecc9cabcfa5e31bfdd489b5a6e1a18e20736f8575c128b032bnss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm0d0cac5d697578932de17afb870c3df1b9c244b0d9b718a127079b18531b3487nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm5e12474924151c097b3f2bde740bbdd83c387afd02498a1baefc13829bb7cb75nss-tools-3.53.1-3.el7_9.x86_64.rpma1f9fa142ea8067c25ed2764b30e0e813ec4d1650d0fb278c73afc1f64fbc787nss-softokn-3.53.1-6.el7_9.x86_64.rpm4875de4d0a8cda97d3e56860fbecd2284818e04a30520087d0f0e84fd958bce3nspr-devel-4.25.0-2.el7_9.x86_64.rpmdc2cbeebe55c53402d9a5a92ec9bc3f0e479b8e5b26d2fb7ab73370586edd447nspr-4.25.0-2.el7_9.i686.rpmb2a769c0f5a9bf9cd471371b1ce23fb1db144a7fd1e4147634136668b6fd9349nss-devel-3.53.1-3.el7_9.x86_64.rpm4fdcf0080023ce61c49172ad09c2e9b10d47698b82a79433039d3ff87ce3f64dSLSA-2020:4079-1Qemu-KvmSecurity Fix(es): * QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)importantScientific LinuxScientific Linux 7qemu-img-1.5.3-175.el7_9.1.x86_64.rpmcc234b4588abcd0ace2c803e27f48acda0fdbd096ca6f37c4165f7b9af872a60qemu-kvm-1.5.3-175.el7_9.1.x86_64.rpm780e0463b252a18a14de1b3be1627dfd4eff587bfe3e83a798a52422463cf1f4qemu-kvm-common-1.5.3-175.el7_9.1.x86_64.rpm8176a5ae74de01a8446831210e7e4ac7d83a5eafaa628b4e447fbf28d716ba63qemu-kvm-tools-1.5.3-175.el7_9.1.x86_64.rpm6bbc2982e31448005f29f6958c4a3cf6103d542e2ae8395d4163eb14fe7cabf8SLSA-2020:4080-1FirefoxSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) * Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (CVE-2020-12422) * Mozilla: X-Frame-Options bypass using object or embed tags (CVE-2020-15648) * Mozilla: Bypassing iframe sandbox when allowing popups (CVE-2020-15653) * Mozilla: Type confusion for special arguments in IonMonkey (CVE-2020-15656) * Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) * Mozilla: Download origin spoofing via redirect (CVE-2020-15677) * Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678) * Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process (CVE-2020-12424) * Mozilla: Out of bound read in Date.parse() (CVE-2020-12425) * Mozilla: Custom cursor can overlay user interface (CVE-2020-15654) * Mozilla: Overriding file type when saving to disk (CVE-2020-15658)importantScientific LinuxScientific Linux 7firefox-78.3.0-1.el7_9.i686.rpm60d7ccbae0fb2e7efd40487513ffa31855c8ffc70640fa40f3fc0632303be2fdfirefox-78.3.0-1.el7_9.x86_64.rpmd32524acf8d66c8f275ec8f19eac5c77f0c48f37d45eb3086f01118fa87a5862SLSA-2020:4082-1SquidSecurity Fix(es): * squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) * squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) * squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) * squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) * squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) * squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) * squid: Improper input validation could result in a DoS (CVE-2020-24606)importantScientific LinuxScientific Linux 7squid-migration-script-3.5.20-17.el7_9.4.x86_64.rpm8b1a3a2a254b270fd04a7dd2f33021ff52c0e5a558ad766f1130305e0b5229c8squid-3.5.20-17.el7_9.4.x86_64.rpmecd073112bc98e8306973eadf51161a824607ae734f6035cf67e1d6b648e4b1csquid-sysvinit-3.5.20-17.el7_9.4.x86_64.rpm23e389475386958ead15f709c786b5aef35748f47648d7ef0fb23fcf0b218c67SLSA-2020:4163-1ThunderbirdSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) * Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) * Mozilla: Download origin spoofing via redirect (CVE-2020-15677) * Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)importantScientific LinuxScientific Linux 7thunderbird-78.3.1-1.el7_9.x86_64.rpm8cb9469cd9c20428bd5bf8d36bc3fc27f29a59bb3479ebc96ab319f2ce2aabdbSLSA-2020:4187-1Important: Spice And Spice-GtkThe spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. Security Fix(es): * spice: multiple buffer overflow vulnerabilities in QUIC decoding code (CVE-2020-14355)importantScientific LinuxScientific Linux 7spice-server-0.14.0-9.el7_9.1.x86_64.rpm30ddab719cd3bda859be66754d7d019ffca626947b292b067a2a72dfe1a01a6dspice-gtk3-vala-0.35-5.el7_9.1.x86_64.rpm262d414824db1a2bb0e8ee584ec73af35c3c7db6055033e89edc18aa4fd668a7spice-glib-devel-0.35-5.el7_9.1.x86_64.rpm5668c3958f2bd0877b5c7434b6ecb4978e0477f7a16563bb3bfa182819435de7spice-glib-devel-0.35-5.el7_9.1.i686.rpm6b893540268d67f008da133de195375193a3762a0d193247364e5d35047c66cespice-glib-0.35-5.el7_9.1.i686.rpm9e0dabdc7afa3624b57a12126fc0ce4332d48a001957581c671df2452588e965spice-gtk3-devel-0.35-5.el7_9.1.x86_64.rpmf1e2dba59dec195d5ab66ee51017e2c82d0f693d1da1a486030708b353c79849spice-gtk3-0.35-5.el7_9.1.x86_64.rpm1d890fc3d9e7b196242546c79cfd32d16da1136b607656068dc6e494ae0432f1spice-glib-0.35-5.el7_9.1.x86_64.rpm27dac680038754a54a867169760f0bde6a9c0de366c074ba11a3316893bd5e83spice-gtk3-0.35-5.el7_9.1.i686.rpm2ff0e30297f5cc7bad06deabaf27e3f4358401c3cdb42dfefd2a15d7389efe5aspice-gtk3-devel-0.35-5.el7_9.1.i686.rpmad0df4223041cd1c29b64383f16fc2695653d6501c31ecb9bd9dce0994238855spice-gtk-tools-0.35-5.el7_9.1.x86_64.rpma689d51b6ae85dbbd313c4dd9733e45ab054009104bfd8cdd4f53ddfabe8f7d0spice-server-devel-0.14.0-9.el7_9.1.x86_64.rpm2b766e8ccc48003a1738820137238bc972b83cc48a6c1295d680c105fd7a51adSLSA-2020:4276-1KernelSecurity Fix(es): * kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351) * kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)importantScientific LinuxScientific Linux 7bpftool-3.10.0-1160.2.2.el7.x86_64.rpm47cc98d79612c44ee4c50be036ff1202c827bacc377befbbe255b5e964fe5134kernel-doc-3.10.0-1160.2.2.el7.noarch.rpm727a63e696b987d5633e3b1f12ac7506e0e6c8de8afa32f85e45451effb2aff2kernel-headers-3.10.0-1160.2.2.el7.x86_64.rpmda5331ece8f1ff9c937d00d93ec8c1c92274df24d1e7b195011c9bacea3a120akernel-3.10.0-1160.2.2.el7.x86_64.rpm6c14fb888501068824f2ed38908bb795a5dced8da3ca3a110e10b291b79084b2python-perf-3.10.0-1160.2.2.el7.x86_64.rpm0dc203103a8e108ebd3e9035912ca0c3c036b2495e563b21611cae6ce04b9ae1kernel-devel-3.10.0-1160.2.2.el7.x86_64.rpme6af572c94419b586d36fa4592d7f067100928b0977cab2367d22cdaa053678ekernel-debug-devel-3.10.0-1160.2.2.el7.x86_64.rpm243e81730c77eecf1958dcee6298e81ed0a91814ebcc940f777ac975caac5142perf-3.10.0-1160.2.2.el7.x86_64.rpm4f8c8280a6df9babc06d5b037f4e9892dd15a5814df3794afeebae843de1661ekernel-tools-3.10.0-1160.2.2.el7.x86_64.rpm222d55b53701eb15e5f6faff4c9efbb061f6c50214ccab31f16c010eb3cc958akernel-debug-3.10.0-1160.2.2.el7.x86_64.rpm95227e1a8230974169c9b94c54634753c92c01eff32a5387731e006b4dceb4f8kernel-tools-libs-devel-3.10.0-1160.2.2.el7.x86_64.rpm8fc5c8d4c4b9c8824a39c471e5b7b1a7f2fbb955875cb93ee8ae5f2aa389bdb9kernel-abi-whitelists-3.10.0-1160.2.2.el7.noarch.rpm7a19019424a7b2bb7896b09adcc4e479eb6d809b7efff3d1e9387fa579f96b3fkernel-tools-libs-3.10.0-1160.2.2.el7.x86_64.rpm545d852acb5f838546dd9015a7c2dda4a03847b8fd77d35373ccbfd1ee6c50efSLSA-2020:4307-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) * OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) * OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) * OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) * OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) * OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) * OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)moderateScientific LinuxScientific Linux 7java-11-openjdk-static-libs-11.0.9.11-0.el7_9.x86_64.rpm7773fe9ab00a5e8c1fa37599c574b80af7c1ee660b6c99e28a71207d48ced107java-11-openjdk-src-11.0.9.11-0.el7_9.x86_64.rpm785df6e2691fd683771687fa700cff34019c9eb04cb47b8889d6ac893bb37be1java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.i686.rpmdfdba17e9f0906b0f52585265c332e327a2a82f69723e8751c5d44cb735adb16java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.x86_64.rpm4bf919398968b3130277688dc7cfcfa05884ff3075f03a968b2483ee714a7a92java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.x86_64.rpm27f5b0fbd8d539fab8c1a4ea03126541add9095f6eb6a5117f17e91a5e89b81fjava-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.x86_64.rpmfce83dfde7f0630f6f930fbd5397f0bed2fb0aa112ad8a717766dfe72382a090java-11-openjdk-devel-debug-11.0.9.11-0.el7_9.x86_64.rpm00d0710ee0f2d7fb402b45cc52980e660c7fd3c073124f5ab8d5a8c8fa1c05d2java-11-openjdk-javadoc-11.0.9.11-0.el7_9.x86_64.rpm7aaee6e13b69540fa095cf098931f029d21869f2f620cf21b8e04d1ffb78126djava-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.i686.rpmb357ecf4582909f59a3c364cc226ee82afe3b3a1ff6f4640abd93163eabf7b9bjava-11-openjdk-headless-11.0.9.11-0.el7_9.x86_64.rpma00bf0b70968ee49ec3a963c94ad6ae7e3aec54b16592b9af8a7b6aae4165507java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.i686.rpme454ea47a65bf2a519a48a11562b81125f4879bea34a5a8f3f06a7ad1fc4dca5java-11-openjdk-debug-11.0.9.11-0.el7_9.i686.rpmfd1c5e53b94b26df626a313c7db3b0c152f8ce9de178876b29ab259269b42341java-11-openjdk-jmods-11.0.9.11-0.el7_9.x86_64.rpm7646e5a15007012257dae0968a551100a2a1097760531d183b8028a02d41ea5ajava-11-openjdk-demo-debug-11.0.9.11-0.el7_9.x86_64.rpm6d036817e9eff8bd9ab8b2c6579e62b1bd65e5d6deb3e63e7fcb1ac58d17f54djava-11-openjdk-demo-11.0.9.11-0.el7_9.i686.rpmd62dc9f69a52e7342d29a506d12f244ff1ed71c35bb9d98e9463b80896699839java-11-openjdk-src-11.0.9.11-0.el7_9.i686.rpm843c4d95590a7a3f422307ecad5a20705513c70ea54d3c384ba0499e4423bb80java-11-openjdk-src-debug-11.0.9.11-0.el7_9.i686.rpma34d858422fd29ddaeca302b07a4ae044c1df031e7fbdd9e85d80405ebd3d84ejava-11-openjdk-demo-11.0.9.11-0.el7_9.x86_64.rpm14b2f5753b2aaa759ab0f96933f8ce6e26c91b6edd91a5545d3a2dd3ad39490ajava-11-openjdk-devel-11.0.9.11-0.el7_9.i686.rpmd6208d100a97ed19eecc9f95cca5ce4d7f635c6c4caff6805a86b34dfde8bad6java-11-openjdk-11.0.9.11-0.el7_9.x86_64.rpm980fdd5684afb67ba596416cd0ddb2883f0957474269e36b86e5063a43855b6fjava-11-openjdk-jmods-11.0.9.11-0.el7_9.i686.rpm3c57bd28c1411992c646173d8a33781d72a541ea82d98483398fef0793276115java-11-openjdk-debug-11.0.9.11-0.el7_9.x86_64.rpmc7c73df4d3bf0a3af20c68f89b944f55df8ac09ab84cb4c16c5e4b53cfe48317java-11-openjdk-javadoc-11.0.9.11-0.el7_9.i686.rpm927bcc99f1a34ca8fa03cdcd6e6adacc2443d4d20ed3a66350d6f330620c64edjava-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.x86_64.rpm8996bc1bf68f25eacd32125341f0fd1650b6e1ba3a7d482c77bb348c58f2a45djava-11-openjdk-headless-11.0.9.11-0.el7_9.i686.rpm9463ccd7aefcf1ab73ae5fe04106befaeef8b28a0366ba35b2d03dc604f29bbdjava-11-openjdk-devel-debug-11.0.9.11-0.el7_9.i686.rpmf996fcb1bae7301ace4b33f230c7237d608983c1b357c30b92596293af396be9java-11-openjdk-static-libs-debug-11.0.9.11-0.el7_9.x86_64.rpm290b0863990ac66b00fb4083c4fa0cd5652aa7dd425b6d7d0125f55add12540bjava-11-openjdk-11.0.9.11-0.el7_9.i686.rpm7406a9cbd48f8589fe8d021f10a10e13087b1d25ba804f38899e45af24af7648java-11-openjdk-src-debug-11.0.9.11-0.el7_9.x86_64.rpm60c79a1a8ead07a961e19e44366f566b078c1e072ed131ca67b8fb8e4c449df0java-11-openjdk-devel-11.0.9.11-0.el7_9.x86_64.rpm75b390535e29603b8704b9f7a10850d6ec91bb8513c78638bf71dac9dd29c4b0java-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.i686.rpmcf2e2b4b7d6b2a08ececc865b2db978d4c8ac3e5ab27bc1bdbb22628d6badc00java-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.i686.rpm976242e401e45c3996fceab5cdac2d634b5b8fe950e37f1702b881557951ef71java-11-openjdk-demo-debug-11.0.9.11-0.el7_9.i686.rpm2dea15a7b85e8b1588d2903733f00dcc9f960170d0e46d94cbb178e847b5205fjava-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.x86_64.rpm8f33384eb89293e170cc12a5699a793ea71f7d2bd7b116da06375d6a8062449dSLSA-2020:4310-1FirefoxSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) * chromium-browser: Use after free in WebRTC (CVE-2020-15969)importantScientific LinuxScientific Linux 7firefox-78.4.0-1.el7_9.x86_64.rpm0f7cecb12ce176dfe68f58e23a8658f885e895967d328d6dddf495a467874d40firefox-78.4.0-1.el7_9.i686.rpm5368bac75f97a694f3d50cc99544bb65499f5d8bc09af1b0212e2a7b49b5590dSLSA-2020:4350-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) * OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) * OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) * OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) * OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) * OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) * OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.x86_64.rpm84315cb088343d080c977e86a915e6409155b31470e1dd809df045148936bf74java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.i686.rpm8e53e8a1970a57d292b99eafb9991e560ec8637365609a3beee02c75712490d3java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.i686.rpm19c42b5702f1772fb858a7dd625a9b7b25ae36a5a446343251b25d688f52344ejava-1.8.0-openjdk-javadoc-debug-1.8.0.272.b10-1.el7_9.noarch.rpm1aa199552998d535623ef176edb0599d6e3ce6ea5c2b304c46e91633ca9c42ddjava-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm291c256aaa593a5b2fadc2c71892cc2cfd49cac62877de65c4d7333d6d1e2766java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm11da3b9851328b21be471ff58700b9b2f5bd82687423bb4aeff49ad5fe74bde7java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.i686.rpm0166f48d73f52d1b4960002169d5fdc6a3bc2dee12fb8cd565131982b16df6acjava-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.i686.rpm23e32a42c36201c41a19045602fe6a68c373dc8a114ceea2847e3ff69c95af67java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm427823d292ddc2e1912dbc3efd235617a03bcc39f55eb6ab6c73999879440526java-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.x86_64.rpmde17e98792cf998ea57892d253aa9a014d87b676323cb00ffe23ffc808a855c1java-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.i686.rpm2fff35aad1f8f8087da29e944b74e864cf77a51390c4b6a8da086ea967ffb7ddjava-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.x86_64.rpm3e2f48307168177298cebba77c02b2add7e979bb11604f1884e6ac3e5c7ae81bjava-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.i686.rpm75a2baf703633777a09a0843420f231b218fb5ccf667034b9217546011a5f1f4java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9.noarch.rpme6a43a8ce33d46f21008e0f57a5e9274718a5846f796b6fd574fd749ad0cd256java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.272.b10-1.el7_9.noarch.rpme4ff55c6a3974510ed0d5a27e453efe217672a67b02dcaf63899407789e101aajava-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.x86_64.rpm9652581e291a509533b2e4ee788ace94e553dbaaeee77f9bea281899d9280f6bjava-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.x86_64.rpmcb363849f85f163f11d69c5721b4171bae4f79393951dd15de33b722872d9d0cjava-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.i686.rpm944ae8a673c37a87563b11c7a02b258b99e4ee270605ef31999f3e742fa7b203java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.x86_64.rpmf69ec149f70f7f866239649eb6f5c5a4c0b8fd826fc431f07b08aa8d93a3c054java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.i686.rpmc32d7e9e4972acc71800876a40238760a778cca2fb2c037511180e03720602c8java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.i686.rpm5f035231f2a2dfb229860b0c91dac5dc62d9fe8e22f095fc467d08875dc80a5fjava-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.i686.rpmd16c13b69c6aa06ee4183431a1edeb59292c109ae4c060ae4ad634d8edca96e3java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.i686.rpmdaaa6fd0a3d4bacf1db37e863d92ecee085d896317a68639f52ed55426d1581cjava-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.i686.rpm42bf03a22cc2276874f1429ebc2578e1c28675d80ff51a26adcfca2400c960fcjava-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.x86_64.rpmccb82da1647e57bbc6d08fdc599b42fd105616c8daa1899f3729ea126caa883ajava-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9.noarch.rpm9a8f96cf3e2853d9be82443633e43a8e6e6272b20a9c2d38fbb40f4621c941a5java-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm787f313e98da032ef62f0dfb22807715b5919725bb31240e48f28826aeb1b884java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.x86_64.rpm4b751ddb7f6a4e3be1a7475be83045a254e457b2320ef35a477e8aa79e0c7eefSLSA-2020:4907-1FreetypeSecurity Fix(es): * freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png (CVE-2020-15999)importantScientific LinuxScientific Linux 7freetype-demos-2.8-14.el7_9.1.x86_64.rpm4bfcf2c7e50e92c1f2d9409f26c5831b3896ec5ce1f8e47ffa61da84870812b6freetype-2.8-14.el7_9.1.i686.rpm856e5771864d72fc764d1a8042323f58fa6a121257e801239a8283d4034dd58cfreetype-devel-2.8-14.el7_9.1.x86_64.rpma55d3145c81d7f556319415342886d99a289c7a2c055ff488a8e8ec4eaeb56c3freetype-2.8-14.el7_9.1.x86_64.rpm0a2506c221bec596a80aac2b5f9956724acd36ff358e33a36d7a72ab9028ed34freetype-devel-2.8-14.el7_9.1.i686.rpmb490be3e3b925087ecd0ba1133a0fb1f6d84b413a04d69e80a0a3c4040a6d12cSLSA-2020:4908-1Libx11Security Fix(es): * libX11: integer overflow leads to double free in locale handling (CVE-2020-14363)importantScientific LinuxScientific Linux 7libX11-1.6.7-3.el7_9.x86_64.rpm6e8e14ca7f672249ccf93b21f9a05353d9f869e8c9e82c21e193d279eacf068dlibX11-devel-1.6.7-3.el7_9.x86_64.rpmf19a029ec329dc1e1243c645ea26b5a7f62dabf74c5b549969d58b13561ffacdlibX11-devel-1.6.7-3.el7_9.i686.rpm1dde8930cae65481b398449efa31c5cfb59d23826f5fa96d9e52cb282f70b99flibX11-common-1.6.7-3.el7_9.noarch.rpm381c93461e119984e0434b571d08714051e8aa858e2e2094b1bf2d0d1edc6d75libX11-1.6.7-3.el7_9.i686.rpmfafea10ff0634bedb1da4a7f7bd5dc1d0ac3b3d282e8c0db6348a5cc6311c657SLSA-2020:4909-1ThunderbirdSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) * chromium-browser: Use after free in WebRTC (CVE-2020-15969)importantScientific LinuxScientific Linux 7thunderbird-78.4.0-1.el7_9.x86_64.rpm25bc3fd79765278178210c5f457310376fb4fdc89b63a3716d1622c585ef860fSLSA-2020:4910-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) * xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) * xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) * xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)importantScientific LinuxScientific Linux 7xorg-x11-server-Xvfb-1.20.4-12.el7_9.x86_64.rpmf6838ab4d46d3054257b828a7aa09da6f020cb48bf424014e1be418934f66c74xorg-x11-server-Xnest-1.20.4-12.el7_9.x86_64.rpm59a891a6804e0ea057830bf640a4a7e10fd3488c6fd198af5ff0ccaa60ebafdbxorg-x11-server-Xwayland-1.20.4-12.el7_9.x86_64.rpm5b1c4f1a7d447b4905e86e7f92cc9afe83d803cadacd5e87d2e0cbf650f0f8d9xorg-x11-server-devel-1.20.4-12.el7_9.x86_64.rpm09033bb3f0b3195c416ec4fd68f5def0470d5a45fb96b8ac599fcf8db93c9ec5xorg-x11-server-Xephyr-1.20.4-12.el7_9.x86_64.rpme030ba439f9e18e27c1304a0037acde04069f35196f4d1edcb1e520ebb5b9a56xorg-x11-server-Xorg-1.20.4-12.el7_9.x86_64.rpm9ebc5b0228dc8be2571033eb26e2cb3cee0ac8bb36f72b7366734efbf3c25748xorg-x11-server-source-1.20.4-12.el7_9.noarch.rpma61f91a5c7e074ebe99958241cf0e74824ed077b38d3eed8ce45ade8cd175ae6xorg-x11-server-common-1.20.4-12.el7_9.x86_64.rpm10e5862388d8b6540d5d679da3bdd3164dcfd8bf2f7719cdbabb6921943bc62bxorg-x11-server-Xdmx-1.20.4-12.el7_9.x86_64.rpm36769b74f79e05de43a4c183a16bcd665b4d5c8e9015f7bcebdbfbbd472521c7xorg-x11-server-devel-1.20.4-12.el7_9.i686.rpm91ea49af08c78dbd43a08054b978fc8c15fed8ff793db9324e1388e9f68989d4SLSA-2020:5002-1CurlmoderateScientific LinuxScientific Linux 7curl-7.29.0-59.el7_9.1.x86_64.rpmba54d7541f99b9c1b96d3b33b9c2e18d90849d7cb66887cc3a1bc986b7c7f482libcurl-devel-7.29.0-59.el7_9.1.i686.rpm5807aead12a31810010e2917c43ef8bc265f212fb924fb1601e9ccf1704807d8libcurl-7.29.0-59.el7_9.1.i686.rpma1e0db291e8a9c734565c398e9a27b6c860183f135ea3a9d7cc5c228584dd083libcurl-7.29.0-59.el7_9.1.x86_64.rpm10d4a066a84d6742cd80208aa0113d24ee91fa5f9920eb44afb28547ed632f79libcurl-devel-7.29.0-59.el7_9.1.x86_64.rpm498795c1e33bc252ef6ba34b65cae08deff1823ffc0ba48263b049e343cea197SLSA-2020:5003-1Fence-AgentslowScientific LinuxScientific Linux 7fence-agents-amt-ws-4.2.1-41.el7_9.2.x86_64.rpm19c1b59f34566a07a680e1125699a5601016c4f319a0b75705d98377c2492973fence-agents-brocade-4.2.1-41.el7_9.2.x86_64.rpmf02e59eb643f3e54fc7b389da7546ae132453de6cacbde4abbd99385e56ea2e5fence-agents-heuristics-ping-4.2.1-41.el7_9.2.x86_64.rpm94d69c86f62a895488c9b506d6f5cfae82631017a45cb41c0ca9c35c8e1d215afence-agents-aws-4.2.1-41.el7_9.2.x86_64.rpm625fa195bf09fd0b2ff93c606f5a10b4b48607c4e7c658eef69c693e2a4349adfence-agents-ifmib-4.2.1-41.el7_9.2.x86_64.rpmf8f38967fe30cdad7aad67901ffaa6bf47b8469b46d6c0e1e3d11aaf7afee7b8fence-agents-apc-snmp-4.2.1-41.el7_9.2.x86_64.rpm5a6ed6aaba21a98dcdd9f4401143fc147a0c989312f25d7cbe1db6834b413402fence-agents-cisco-ucs-4.2.1-41.el7_9.2.x86_64.rpme80734486c4d4890d8320ff21ae677068bca71fe5fe2ba91ff0f5829b4940c1cfence-agents-ipmilan-4.2.1-41.el7_9.2.x86_64.rpmecf3927df5579f5a536b62f71366d279a3915439e331cd613df65b75c8a8ceedfence-agents-emerson-4.2.1-41.el7_9.2.x86_64.rpm93e973edf16a36d9dce880b159f61ff25e2e8ec26970ea2a50ddf29bc65f9b54fence-agents-eaton-snmp-4.2.1-41.el7_9.2.x86_64.rpm87cf4a8df3796539e14f2e45e097ddff5962023dab57efce4dae747dc8706a87fence-agents-bladecenter-4.2.1-41.el7_9.2.x86_64.rpm97effd14d1127ea087f512a63b22ed75bec9dc9b3cc841f314ffca633bd5a723fence-agents-ilo-mp-4.2.1-41.el7_9.2.x86_64.rpm9d8ff4d2b0dd185e45ba025d522050a6642a47d963f089b3d899c3e757e15ec8fence-agents-ipdu-4.2.1-41.el7_9.2.x86_64.rpm06e39bab1ee277ae744255675cfbb44271fd3f3c903323f1a0917f1f7c322f14fence-agents-eps-4.2.1-41.el7_9.2.x86_64.rpmacda91e12e2d0ac30de4dcf54773de27a5ddf0d8d2c59ac643733ef5d7d0d725fence-agents-compute-4.2.1-41.el7_9.2.x86_64.rpmb1a61cc6f553521b7e4e4056b66462718b8e5b59466f1ea3d18c75603bad5cfcfence-agents-hpblade-4.2.1-41.el7_9.2.x86_64.rpm21d3e84059bb8d99d386f4e742374915338e840d53b783e2f45c5bca9fd43138fence-agents-azure-arm-4.2.1-41.el7_9.2.x86_64.rpm1d8b493c7e010d1bebcde306db5209fddc3e122f7ef2ac1332d13fd044061e9efence-agents-aliyun-4.2.1-41.el7_9.2.x86_64.rpmdecc5ac47e2f630fffdbb821ca6ebf7b38269bbae0565bb8410589351ba59a31fence-agents-cisco-mds-4.2.1-41.el7_9.2.x86_64.rpm02a116fb8545da6c0b78a4c1122e6aa029ed2baded2336a6539bd3744f282103fence-agents-gce-4.2.1-41.el7_9.2.x86_64.rpm6d650ff5a7bc1d93d552eed702fb8ff4af0e255a6e012e1ddb3971204bc91755fence-agents-redfish-4.2.1-41.el7_9.2.x86_64.rpm07122c2fadde5f1434def7ae61dd0550c73eb7309b3f87b309c0a2991b14b217fence-agents-vmware-soap-4.2.1-41.el7_9.2.x86_64.rpmafac04d76ee59901927a64348eb93e4ea0c48a164cc0e2029847e8b26edc0ddcfence-agents-kdump-4.2.1-41.el7_9.2.x86_64.rpm8d6a4bc8e0c2082f7bb2fc692d41ccd385925ae94b94fe095591a846c940c7cefence-agents-rhevm-4.2.1-41.el7_9.2.x86_64.rpm798e4abc8535513ab7c780003067d0d787535100f412f57adad927899771c7c9fence-agents-rsa-4.2.1-41.el7_9.2.x86_64.rpm891ca7ba40226f9600a88b4c203b435de729c7aad318c3d08794bf769091c792fence-agents-intelmodular-4.2.1-41.el7_9.2.x86_64.rpm9d4cf92a8bd0efc8af62ffa59e709ac8ea92a414e65d08dcb1915cae96da714ffence-agents-scsi-4.2.1-41.el7_9.2.x86_64.rpm17c615fffd7a175d4158fe6c35728dd9b713c112f9e99529fc0708769b90fb70fence-agents-ilo-moonshot-4.2.1-41.el7_9.2.x86_64.rpm7a5a2b4de31ed4b73eb64ea6166a28dca4bc14a5a6ed7d2ac80c8d1e5e18260afence-agents-common-4.2.1-41.el7_9.2.x86_64.rpm3113ef7fa8701385c7a5c6f61e717ac7835c22d5799875b014af41ab19820f98fence-agents-wti-4.2.1-41.el7_9.2.x86_64.rpmc68f45aa1282b59a0f376da3c37f2f012d3bae05ea7c9c38c304b04359cb989efence-agents-sbd-4.2.1-41.el7_9.2.x86_64.rpm7d1d59df509363d91c0363179db6fcc242c229a2d617512faad157605bb5b391fence-agents-drac5-4.2.1-41.el7_9.2.x86_64.rpm39f494fb8d21bdde0e273d8a4c3110f811ba071cf2e9bb1a137ff0bc70799f05fence-agents-mpath-4.2.1-41.el7_9.2.x86_64.rpm77d14651c7a89a3873fcb841320bc6c4f37aa9bbcb4b118c292899eb16afad4bfence-agents-all-4.2.1-41.el7_9.2.x86_64.rpmaf1d5dde503828705086ed1cfd537bafb76e83b568ad1063e3ae8374cbe99153fence-agents-rsb-4.2.1-41.el7_9.2.x86_64.rpmb4ddaf6fcca6625e8b557cd3c7de1d0a230f23a22a0888d793ab0b0ebf9dbb48fence-agents-ilo-ssh-4.2.1-41.el7_9.2.x86_64.rpm57abe5040417b44ca1df4883b214df169899cfd1775a2d76c76389f600741506fence-agents-ibmblade-4.2.1-41.el7_9.2.x86_64.rpmc3cf909e55970318c1441c421986aace5355b213f0f27fd605c1929384f6d03cfence-agents-lpar-4.2.1-41.el7_9.2.x86_64.rpmb268844e144424fb2899eb26e623c12278f50a473077c04f46012cb21459cc7dfence-agents-vmware-rest-4.2.1-41.el7_9.2.x86_64.rpm9cfec09f827118a1a090fd807df6f879dc8c0c728d097cdc1c32225d4d967a25fence-agents-virsh-4.2.1-41.el7_9.2.x86_64.rpm68430c1c9dd9c303ef148a63c8ae963e773a7baad7617607883d068bb71d43a7fence-agents-ilo2-4.2.1-41.el7_9.2.x86_64.rpm41ee415447647eed027bb185416b14ded13e68e705ac15690df996d2d3c48084fence-agents-apc-4.2.1-41.el7_9.2.x86_64.rpm8d62c1b3065122e397a7cb931437908eee8860e1f8174171619a6fa1c01fe69dSLSA-2020:5004-1Resource-AgentslowScientific LinuxScientific Linux 7resource-agents-aliyun-4.1.1-61.el7_9.4.x86_64.rpm6741e110d07ae95142ad9c8ae7ce0b4ee1d84fa4d443de2263c0efffc0faea0aresource-agents-gcp-4.1.1-61.el7_9.4.x86_64.rpm24113aaad452a826353ff1a9bb70cd501196a5e195fb1af3a339e6cbd1ab0329resource-agents-4.1.1-61.el7_9.4.x86_64.rpmc655d13e0a6b3232dcb85372644ad9a0e41bd2b42ba00a1ed919d79f31a588f4SLSA-2020:5009-1PythonSecurity Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)moderateScientific LinuxScientific Linux 7python-2.7.5-90.el7.x86_64.rpm4e752d78be10a3150e118f067de4a2c1741192fa3a1b1ccccc7cacb2a1d55adapython-devel-2.7.5-90.el7.x86_64.rpm6fb703ebfb6d07fc86aee57f61ebab154a48b3392f9099feb0f862c34dc60570tkinter-2.7.5-90.el7.x86_64.rpmd3887158f3657a31a93bb8a42b504368e58bd61a76a727d1c5d849cd123e8362python-debug-2.7.5-90.el7.x86_64.rpmc2ff66a4cfe90e016335af67c6f9119b924f27fc10d839788bef5b13de7db1a3python-libs-2.7.5-90.el7.x86_64.rpmfbe061a1f6a0f7e4c2c206db5a149e0fbf9a5e07101a22c47f5850913cd6b10cpython-tools-2.7.5-90.el7.x86_64.rpm028b8c625d2bbbc8ddba8669893ce2244b9c34d746b9cd2a11d853ff0de8a2c8python-libs-2.7.5-90.el7.i686.rpm2a375c1e3a4738e095ec03be404443859dd6b779f5e580b5bc1eaf005734c925python-test-2.7.5-90.el7.x86_64.rpm8d4fbc682f98395e2a3b2bd59bfdbc00148c0046f3a93674ef17515ecbd500deSLSA-2020:5010-1Python3Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)moderateScientific LinuxScientific Linux 7python3-libs-3.6.8-18.el7.i686.rpma7660e2a2f3125d61888433e08d9b119eabfbfee7814b5956f641daaac3d16e7python3-devel-3.6.8-18.el7.x86_64.rpm43aa3c0434b1412eae7822f4051ba310a53d1c3096d9758d21ff6652fbeadcc9python3-tkinter-3.6.8-18.el7.x86_64.rpme10cafc4bd4ff0c1a0ddbf36d5c7fc9446fafa85804e1ae63c8410cfe65822f2python3-tkinter-3.6.8-18.el7.i686.rpm317fd91d642bdf926eca2d224aec7b948873ca9f78379436fb32cd2d01ac63d4python3-test-3.6.8-18.el7.x86_64.rpm1d09983f1cf741814abec6324ed5c1e8aff39a249e854538ac774ce447973e9apython3-libs-3.6.8-18.el7.x86_64.rpm17b2a06a86a63c0a24c38aca3f59357bb05f561bb409f13c8092423c0084f60bpython3-3.6.8-18.el7.x86_64.rpm16d6911fd5e4e2d70be8d42e87fb416477baff5c313c3e251f010af76df67b49python3-devel-3.6.8-18.el7.i686.rpm38bfd095c97c53712cd65a01f6ec085a53ec6a7b043fad17da3a850a0584aeb8python3-idle-3.6.8-18.el7.i686.rpma59689e48b4c5506ac5031f9d6a3c4f529576283504531c5c70e9439a8cf2d9fpython3-test-3.6.8-18.el7.i686.rpm87478d3ab6ff72a3be98c75fcf0cf08a0668c71e8d030671ebeb7579ff5bfa7fpython3-debug-3.6.8-18.el7.x86_64.rpmc533139272942d0922d04eb19a99e44fde769aa9f76a93c0cdfa8d9fa1497d37python3-debug-3.6.8-18.el7.i686.rpmaed68cdc24710bf3087d20dc03abb64dbff1a5fbd9d7fa002637558108e158a7python3-3.6.8-18.el7.i686.rpm7f812c3e6f365f2e84fdbac137a6976e42f0f3a5f5c1b5fa95aed1c0a784bb15python3-idle-3.6.8-18.el7.x86_64.rpm8d4219b8ff1bc224f28bd8ad7d6bfc5c993aead45dcda9bdb2364414a3984cf0SLSA-2020:5011-1BindmoderateScientific LinuxScientific Linux 7bind-lite-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm6e55a724a60ef42a4e13b4bd0f32a3abf34323df4958482ae7662740d6d223bbbind-export-libs-9.11.4-26.P2.el7_9.2.x86_64.rpmaac0b90e4609b7004d2027c64a3e27da3b92969c8fbad97d0d053f41f8cac10dbind-export-libs-9.11.4-26.P2.el7_9.2.i686.rpmd473992a2a6512f6bd697e4200b71804f572691556f4c398170305cc7ec4223cbind-pkcs11-libs-9.11.4-26.P2.el7_9.2.i686.rpmcaea82264b0e1e6c343dccf95cc52f257fed2e135b0e15d4d3e5defbc810f433bind-pkcs11-9.11.4-26.P2.el7_9.2.x86_64.rpmed3d5cbf0009188355cb6fe08fa821cb0bb6013b6b2f560c3c28a6053f4fc0b7bind-libs-lite-9.11.4-26.P2.el7_9.2.x86_64.rpm601f32234eb3bc2aaaa8c34b7b814bca3974368c5bcd14b3b20e3391075fc37ebind-sdb-9.11.4-26.P2.el7_9.2.x86_64.rpmf209b01442c24e01c0dbf9b26af008c58b811c96f758b2e58db3985146b10a63bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm2455b597f2205f173708218e701b1a898dfb109b1b3ff6a04e0808b2417d0fb9bind-utils-9.11.4-26.P2.el7_9.2.x86_64.rpmeec76e247d93cbd1f7a186b88afc0f06111d005d9a21e92861f98222488a46bcbind-pkcs11-devel-9.11.4-26.P2.el7_9.2.i686.rpmdd0ef240b3a27a372f8677ad72902b7ca400c4d6d99a8949e123b8b7fd6c09f3bind-devel-9.11.4-26.P2.el7_9.2.i686.rpm98c7ca6154305aeab368688f1c27a1e05fbc2de5e742b32ed3218bd7fc1f544cbind-libs-9.11.4-26.P2.el7_9.2.i686.rpm35c0bd5b784f981951eb890d7e96f670a92cca814aafde0c84790be6f65d2a9ebind-devel-9.11.4-26.P2.el7_9.2.x86_64.rpmb1435d0c8da81b0a72b274eca170649f9b76349b539f6421ab4a2687a8fb64a8bind-lite-devel-9.11.4-26.P2.el7_9.2.i686.rpmaf95fc594e7fd389c1077dc9950675416f28bbfef92e60bb9d1db4e8054bad3ebind-libs-lite-9.11.4-26.P2.el7_9.2.i686.rpmba84e4f9783f4a9c8e8d0314626d596326644b918391d562eab30c32a28f97bebind-export-devel-9.11.4-26.P2.el7_9.2.i686.rpm568c85d08f58ab6c94e2f8dd086448b0295ba44be1669d80600c780dad7c1831bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm1137d00e19fe5e5304f4beac20b234bf52ab2cd1df0f0aecaddf6936cd14d078bind-libs-9.11.4-26.P2.el7_9.2.x86_64.rpmd6bd50edb212bde63536e11a4ca1a861fc56b7096b2ab4953614ad3de87381cabind-license-9.11.4-26.P2.el7_9.2.noarch.rpm91a402777de0497989837c462b009b8a4c06d9536038f7b2ce28ab4003396004bind-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpmadfbe5e8a9b3385e09f7c2e56341682c55a23e8fe1100868dd15e08d3e5dee34bind-sdb-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpma062858ee2760dc527dc773c645df312b22e5440d711a0bf9105450bd563815abind-9.11.4-26.P2.el7_9.2.x86_64.rpm273e674dedfdc72bb0c9762512c41a5ed7c3323bc79888dfd46352cd41558ff5bind-pkcs11-utils-9.11.4-26.P2.el7_9.2.x86_64.rpmb28870f9473211a5aab4761aaf1811a52d8f7d737a53892e03fb98700da4e032bind-export-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm682d4b7e4aa8fe2d2eee80929a26956290c764782a27195eaa18ddb39cbabe00SLSA-2020:5012-1LibrepomoderateScientific LinuxScientific Linux 7librepo-devel-1.8.1-8.el7_9.i686.rpm5e9aa35a981d2840134692f84d2e65150bd03a045a1df0f2432b0c46f8e24f44librepo-1.8.1-8.el7_9.i686.rpm54ac0b83a5980f0fe79f81d89bbc74511e224e96f3aa6acc5b69f30f2ba73f4dlibrepo-devel-1.8.1-8.el7_9.x86_64.rpm842b884bcff0768ce4bcf18fafeb9f1ab99bd8d1e6249607717fa18cd58b9109python-librepo-1.8.1-8.el7_9.x86_64.rpmb29277245dc259c20968baf397c933cc0ec2a338941c8e11b46ac3d016d038b8librepo-1.8.1-8.el7_9.x86_64.rpm818449bd35f4147b579a34e08feb2b30eccdb473abe5bcdf6a069186449e303aSLSA-2020:5020-1TomcatSecurity Fix(es): * tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2020-1935)lowScientific LinuxScientific Linux 7tomcat-admin-webapps-7.0.76-16.el7_9.noarch.rpmaa6977941c1bd2072e8fb52668afe505c2954183b66b3542044143bf50d5a61ftomcat-7.0.76-16.el7_9.noarch.rpm9278de0d20e9970c899c261f58a8f877dfda254c508e807a26543581b5f2a1cbtomcat-el-2.2-api-7.0.76-16.el7_9.noarch.rpm21603edf7a3c774277bf9bd700aa3094ba96a1202a280e3b47028eca16978998tomcat-javadoc-7.0.76-16.el7_9.noarch.rpm5cf6522a174594dc8829b733123119299d4b28d31cc1517b9ba363d2e1502949tomcat-lib-7.0.76-16.el7_9.noarch.rpm7b0ac0b8e2b581ecfcdd755f439d5d9f8d1177b580d36862164e42614f57befctomcat-jsvc-7.0.76-16.el7_9.noarch.rpmab625888831656616637f61767d19ed69855e9bc8b5613b1f2b21a614d4c9fa4tomcat-docs-webapp-7.0.76-16.el7_9.noarch.rpmf32c86c05713f79a60c47dc334f63927ee9b7e4c2882a0ec800cf568da8d75d5tomcat-servlet-3.0-api-7.0.76-16.el7_9.noarch.rpmbae2181cfc1afb37bbb46b70c86db7759a895db94e4d2532e82885dec4ad6a76tomcat-jsp-2.2-api-7.0.76-16.el7_9.noarch.rpm6d36a3c8047de2d05a4432fb9e3a2ef78553a6a23865860d8490688bd4f34d27tomcat-webapps-7.0.76-16.el7_9.noarch.rpme143514d193ed8743b67b9e1a19c66408778aa408d716b211c28a4e923a3f833SLSA-2020:5021-1Qt And Qt5-QtbaseSecurity Fix(es): * qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp (CVE-2020-17507)moderateScientific LinuxScientific Linux 7qt-postgresql-4.8.7-9.el7_9.i686.rpm2f990625aac0eaefe277e1d90296642a9b1769a0ab847d974fc6286a24a7c032qt-4.8.7-9.el7_9.x86_64.rpmf465ebe6ef7078025b0aef2d83521766c0193731dd513dd340f86e97c40ad4b6qt5-qtbase-doc-5.9.7-5.el7_9.x86_64.rpm2357df991d7653d7a563cff583d91c69ec6f2a4a8b540b12b8ec0fbe40647975qt-postgresql-4.8.7-9.el7_9.x86_64.rpm149eaca53c75a7f7715efa7375b2df5b9e7825188b555992a4bd55aa0d3a4b6aqt-examples-4.8.7-9.el7_9.x86_64.rpmeafba1d14ae64d4274b6c589e86ec5469654769e36a98ad2c045e854c79d627eqt5-qtbase-devel-5.9.7-5.el7_9.i686.rpm5ba87d3495269210ce50d1d1d8f9f85aca324920ec8afd356a9f1e264e0063acqt5-qtbase-postgresql-5.9.7-5.el7_9.i686.rpm0a15d3c8e425c94919803f505f5c16e79ee114bfa4a0728e8d6c5fea205dc7e6qt5-qtbase-5.9.7-5.el7_9.i686.rpm496b6233b011be7d3c40f8ca6ba7099784979e45792a5248866fd658d8f3e41fqt-mysql-4.8.7-9.el7_9.i686.rpma929b6861f8b6c71c5b8806107be20a35a566658b50f679f7ec99a516832966dqt-doc-4.8.7-9.el7_9.noarch.rpmb1f0394efc9e9b5c449853c0a4b7985aa41366fb86f0b0a5b2a1a04c4a5e21bfqt5-qtbase-odbc-5.9.7-5.el7_9.i686.rpm39a8424c0f12bf955a09694a34d9d52554f1d69487bd25f7bfaefbea7eedf1c5qt-qdbusviewer-4.8.7-9.el7_9.x86_64.rpmc31cd6a5bc81ed156dc959959be0c07c9a77eae076fab9e71bd31c425dc9580fqt5-rpm-macros-5.9.7-5.el7_9.noarch.rpm477f92195f9f353679121b03e73d2c4b1a890938adba3e8de175814c3c5b2203qt5-qtbase-static-5.9.7-5.el7_9.x86_64.rpme6c9d053df810165e1f2ceed63ff22ffc9223f392eac16b7c0446017e7d8bad2qt-odbc-4.8.7-9.el7_9.x86_64.rpmbe734a03e61cd155d5157f9293d70582a3dec56a806f6d159263e2e43df3453bqt-devel-4.8.7-9.el7_9.i686.rpm9e89c257e4ca088f35aaa05d178f8fc7500e8aad245912921618dfad3c3f4539qt-4.8.7-9.el7_9.i686.rpm99a1970527986d3b3cf24e7c62f6b13abecc10a37afb1d5185e37f5913043a19qt-qvfb-4.8.7-9.el7_9.x86_64.rpm7c7dfcdb90154564be2c0bb73e0c60527fa1e3293115df89d59dccc529ee1f6dqt5-qtbase-common-5.9.7-5.el7_9.noarch.rpm1bd4ac9a033b7f25c252543ac7663d0b33543e34b8cc11b6628e6a2535a5ac84qt-devel-4.8.7-9.el7_9.x86_64.rpm5d24d57c02883634e33c1d9ffb5ce1b6fcb0159ad1c355eb3d49db7b325628f1qt5-qtbase-static-5.9.7-5.el7_9.i686.rpmf9be3f2d2203d1e2fcca65c02e36c78a22cecb1f9e11d8585ff624120f847bcbqt-assistant-4.8.7-9.el7_9.x86_64.rpmcb546610e2a63c8897ebbae15c0c09c5df5dd8cfc8339dee8a9697fc5b98567eqt5-qtbase-mysql-5.9.7-5.el7_9.x86_64.rpmc0e467fe03493409c25efa83cd410e575e50bf5efb6592d7548fdc194873c39dqt5-qtbase-gui-5.9.7-5.el7_9.i686.rpm8410d859b7b9b6895b658d281e39f178f170fffb144fa4a96cf695b8d3f181a2qt5-qtbase-examples-5.9.7-5.el7_9.x86_64.rpmfde83ba6b73398217a03eacb43561b1efe091402f0e46c8bafb7b2c39e129ea1qt-odbc-4.8.7-9.el7_9.i686.rpm266ec15244d156419688218c64525e94997973c67cd35fcd430cf705691701c9qt5-qtbase-odbc-5.9.7-5.el7_9.x86_64.rpmddd010fb1e2ac6f97354294d8f0b4fabbe246258d2ee3a8ebd278813a1382fd8qt-mysql-4.8.7-9.el7_9.x86_64.rpmc78b158f03cd6cd903729cce4953053c132ef22fa81777395da63ea4fbfae809qt-config-4.8.7-9.el7_9.x86_64.rpm4fd2cea00c844b2380defbe708ee6002c8a61625f882effe9faad668f8946803qt5-qtbase-gui-5.9.7-5.el7_9.x86_64.rpm1bdf02c469fd8c928c5f7bc4577cf91d538e5948c64d99dd3cce9717fa353a08qt-x11-4.8.7-9.el7_9.i686.rpm998752272c7d54ce4a591d170f4f8197ef8c7a373c5ca88230adb00b199eb56aqt5-qtbase-devel-5.9.7-5.el7_9.x86_64.rpmf88198b4c90ff9433ca2a2051df7211a64a455f9d78a234769c486c9986ac744qt5-qtbase-postgresql-5.9.7-5.el7_9.x86_64.rpmc666834945473919c0e820375fc1f95feb723453ddab373bc21413acf4056d0eqt5-qtbase-5.9.7-5.el7_9.x86_64.rpm4e32bb93412d4410552a25aee3725c4e54e83cde7570a39112c0fd22c91467f0qt-demos-4.8.7-9.el7_9.x86_64.rpmb138388f394bccf5081a71cbfe11077b9d1293aab2cfabbc8d645e828dd2fd00qt5-qtbase-mysql-5.9.7-5.el7_9.i686.rpm929dc10998613b29239d2d0c0df5ff67bfbf9ae456727ec0f4ab2ac7496a9f11qt-devel-private-4.8.7-9.el7_9.noarch.rpm5340530c5e9e64293ae99b4eec8571eb6b5bb68e23ee1e54c806ebf25a337ae1qt-x11-4.8.7-9.el7_9.x86_64.rpme6d8cf8f67ced43c167000c58fc99685d0279f60bf240565e821ecad0c1f67e7SLSA-2020:5023-1KernelSecurity Fix(es): * kernel: buffer over write in vgacon_scroll (CVE-2020-14331) * kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811) Bug Fix(es): * [OSP13,mlx5] SRIOV VF still sending traffic when PF is down * gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk * GPF panic in qlt_free_session_done+626 * [ Brazos ] "Core(s) per socket" and "Socket" values are interchanged in lscpu output. (kernel) * megaraid Aero: call trace observed during reboots * Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool * The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced * tcp_fragment() limit causes packet drop under normal TCP load * ip link command shows state as UNKNOWN for MACVLAN interface * Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug * [SL-7/mlx4] ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] * Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV * kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome * Null ptr deref after nf_reinject->nf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct()moderateScientific LinuxtrueScientific Linux 7kernel-devel-3.10.0-1160.6.1.el7.x86_64.rpmfa43ac3b28b2a8ab4caaaff4c501aaa62eb34f17d175b59668859842a2dfc67bpython-perf-3.10.0-1160.6.1.el7.x86_64.rpm3cad1140ec4766ed2b2b01cd82d19d1f706fd5b2f813c63d97c5d804a7ab1166kernel-tools-libs-3.10.0-1160.6.1.el7.x86_64.rpmae5303acd4a7d66ac9451fd20e8165b57d9049c0ba2c78c5447419aebc511406kernel-debug-devel-3.10.0-1160.6.1.el7.x86_64.rpm6f1b80feb6f65d1f20927fce25cee1c4070164eeb39a4e0247cf7cafa574fffeperf-3.10.0-1160.6.1.el7.x86_64.rpme8d3cf4b090395d832d9b94609de61cc6e05b8882aaa11c0bce3f2467bbee963kernel-abi-whitelists-3.10.0-1160.6.1.el7.noarch.rpma22cea3e44550afadd16969a5e1e921fcb265865c06e12a02f28a45048c6c12ckernel-tools-3.10.0-1160.6.1.el7.x86_64.rpm35379a584782bb5df8ca0f8ce2d9aeab27ce17bf5c63d748d6cf49a2f4686b08kernel-3.10.0-1160.6.1.el7.x86_64.rpmb8a8c00cf831a57b9ba0ddcc51dda482b846d42992c80ae25b23f54429b4a697kernel-headers-3.10.0-1160.6.1.el7.x86_64.rpmb5cf9d49c2f50a57f515fda688ac10e942090ce5336eda682507913e9cc6692cbpftool-3.10.0-1160.6.1.el7.x86_64.rpmeb459b8bea04b524153136161e04a74bdc58d71fbbdcecf2c5312c67abac7349kernel-doc-3.10.0-1160.6.1.el7.noarch.rpm56f33f85d9f3a92f5b629f9b0e6533bcbba80e6aaf7636c660214210f6313adekernel-tools-libs-devel-3.10.0-1160.6.1.el7.x86_64.rpmf70f095585c8e87bfadb97237bf57c2bcab6d063838b2de7ed3e3bd6b07a5129kernel-debug-3.10.0-1160.6.1.el7.x86_64.rpmbe5779f6ededf4a8c550a4c6ed791e39823ebd7af2ee0aefa2042ae67ebb33daSLSA-2020:5040-1LibvirtSecurity Fix(es): * libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)moderateScientific LinuxScientific Linux 7libvirt-nss-4.5.0-36.el7_9.3.i686.rpm2834e674277a3d4e5c7b920b64448cd37bd2adc9ad0b75c0673a883b5cb42af0libvirt-daemon-config-network-4.5.0-36.el7_9.3.x86_64.rpme52837fd79aa0d9826502e8fc0fc99fe6040d6d83650ed563e063623cfab3276libvirt-libs-4.5.0-36.el7_9.3.i686.rpm46b60bd7c943bde038f8269c067525f00f0a93a8ba84daaadb4a8baff822fe78libvirt-nss-4.5.0-36.el7_9.3.x86_64.rpm7234513bca5e17ca7de87da8f24343e09ea045c9e45fa1349b5d391b53d046f2libvirt-daemon-4.5.0-36.el7_9.3.x86_64.rpmd39fae834251654f0e4be3f781d29f24b50126708581f7db9983f195d84debf6libvirt-daemon-driver-storage-4.5.0-36.el7_9.3.x86_64.rpmeb732df91cd5bfefea2c0e1ef932e89a2ab33cb3eb0215cbe3aa3d8175c53902libvirt-admin-4.5.0-36.el7_9.3.x86_64.rpm7aa1a1b7fd3f1ca0cf554f60e93d42021762187e81a733e813184f208e275955libvirt-daemon-driver-storage-disk-4.5.0-36.el7_9.3.x86_64.rpmba769f4988875848ca17fce27df881b29a65f835e8ac237c7f7a8575a40d7973libvirt-daemon-driver-storage-core-4.5.0-36.el7_9.3.x86_64.rpm73bf5e1ce2f47e28417ca23a447dd3bfed734385d78204c930458c3deaebeee7libvirt-client-4.5.0-36.el7_9.3.x86_64.rpmcb146dff7ec24a5bf7cd1a26acb894693db3c5edb11344ccd3c3bf945bab20a0libvirt-daemon-driver-interface-4.5.0-36.el7_9.3.x86_64.rpmb83688c176dbdd74fb82d3ce011884783b08005d08bd554dffd76245bd1d5405libvirt-daemon-driver-storage-logical-4.5.0-36.el7_9.3.x86_64.rpm59f3951acf83f1ec0815442186beb088b5da8c52d531f1d94816e8a300703fa3libvirt-daemon-driver-storage-gluster-4.5.0-36.el7_9.3.x86_64.rpmc029da9d94f4e235fb8c6e39e2c5bbbf7351bd2ac3393e59812213fbd7e90999libvirt-login-shell-4.5.0-36.el7_9.3.x86_64.rpm454d51418987da1014849d4132925cdef134737d1d08fb1cfa779c89c19a3924libvirt-daemon-driver-qemu-4.5.0-36.el7_9.3.x86_64.rpm050ef515b3c64595620bf6d53a462b54936c3dfe4126a4fdc609cc9a53d9dda1libvirt-docs-4.5.0-36.el7_9.3.x86_64.rpm0235ba04c3a98a9b5d2d31e85027b2a62fda74d77152debd17e4e99064e8a3e7libvirt-devel-4.5.0-36.el7_9.3.i686.rpme02dccd71df37070314abbf77e7e94e6eb1bae0729fe537cc6e981013716fa58libvirt-bash-completion-4.5.0-36.el7_9.3.x86_64.rpm3dfc31f773bb1efa5ef5e687088ab0f1b47fdaf91cd7e929a6f7c385541ccb37libvirt-daemon-driver-network-4.5.0-36.el7_9.3.x86_64.rpm0efbfbc232bcaca3fedfd060b20a8283fc7613f565f6048d0518818441c089c0libvirt-4.5.0-36.el7_9.3.x86_64.rpm157e09bbc77984eafc509c3191726f1dc17fa954ae54bdf641158f7fe20cf557libvirt-daemon-driver-storage-rbd-4.5.0-36.el7_9.3.x86_64.rpm93fbbb3a834d068f53db7b551ba09e14ecb5b2e3fd93582f968124aede4d96dclibvirt-daemon-driver-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm1b59823c76125992f394d22eb838c8c0478a1f5deca52420b620ef0fcb6932f9libvirt-devel-4.5.0-36.el7_9.3.x86_64.rpm7d0ec88254e280eeb07bdf1bb1252c900681099c26df13ad3245a7e3bde7b64alibvirt-daemon-config-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm57452d96f8978a1410c3ef2338fe270c97148911d03e9debba47513a2cdb9c1blibvirt-libs-4.5.0-36.el7_9.3.x86_64.rpme4860ecebc9088da31ce413a567de94ecf49d342e5bbcaae46ebe7087cface77libvirt-client-4.5.0-36.el7_9.3.i686.rpm14bb3afa97114d6eeffeb31b1eb538b277f938a05301296d515b7678e4061d07libvirt-daemon-lxc-4.5.0-36.el7_9.3.x86_64.rpm505fdac487bef830c4d4567539061bf5c9fed6948c86ae44b98fd191025af572libvirt-lock-sanlock-4.5.0-36.el7_9.3.x86_64.rpm664362fcb2c8a7b8ee0bdfaf8c52138a82c9483bd9218a414850e9a21f4aaed6libvirt-daemon-driver-nodedev-4.5.0-36.el7_9.3.x86_64.rpmf5bf6a17338facb41aa3bb9612efa5e11af562e49ebfdef125efaecfa993cedblibvirt-daemon-driver-storage-scsi-4.5.0-36.el7_9.3.x86_64.rpma02e55e98bac0ae38460a3dee0335f4c09db03805b94c3e8a5406dacdf32a152libvirt-daemon-driver-secret-4.5.0-36.el7_9.3.x86_64.rpm5cf289a88e882a0dc6dfffd8e313c4fc5c957a4f3b4f352a04a1ae18226f94b1libvirt-daemon-driver-storage-mpath-4.5.0-36.el7_9.3.x86_64.rpm10f8c9d89b219b32a7d6f3d52e2f9431d37878c6a14c8c463148e6921bdb38ealibvirt-daemon-driver-storage-iscsi-4.5.0-36.el7_9.3.x86_64.rpm9b80a91b5a9f66eafe3468984eea8a0972f7b87dd2cc42f4c75491d687e0b1b7libvirt-daemon-driver-lxc-4.5.0-36.el7_9.3.x86_64.rpm9c92d5f80c668de652d744c66676942226c077b22154a8834a69ff2ba0d9b75flibvirt-daemon-kvm-4.5.0-36.el7_9.3.x86_64.rpm1f62e1ba3e85b38d3025b12c077dd9caf6641a553330ddd49f01479942dfafbfSLSA-2020:5083-1Microcode_CtlSecurity Fix(es): * hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) * hw: Vector Register Leakage-Active (CVE-2020-8696) * hw: Fast forward store predictor (CVE-2020-8698)moderateScientific LinuxScientific Linux 7microcode_ctl-2.1-73.2.el7_9.x86_64.rpm69c381a9699c988fbdc4fd0b3bf8fa247e4ecd50868a7e2dda3900188d845d0eSLSA-2020:5099-1FirefoxSecurity Fix(es): * Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)criticalScientific LinuxScientific Linux 7firefox-78.4.1-1.el7_9.i686.rpme94ecc4b20facf2606282703cebc3026a4dedd3039002f228c9c9c7e379fb682firefox-78.4.1-1.el7_9.x86_64.rpmba519645c1953d71030a3ab3e27da0c317a547ef9d7fdd4fcb158af75e5f3fa6SLSA-2020:5163-1ThunderbirdThis update upgrades Thunderbird to version 78.4.3. Security Fix(es): * Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)importantScientific LinuxScientific Linux 7thunderbird-78.4.3-1.el7_9.x86_64.rpm92c042553512da9c96c8ee1f78a34771072021043df5e88a87657128ef708ae9SLSA-2020:5235-1ThunderbirdThis update upgrades Thunderbird to version 78.5.0. Security Fix(es): * Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) * Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) * Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) * Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) * Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) * Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) * Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) * Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) * Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) * Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)importantScientific LinuxScientific Linux 7thunderbird-78.5.0-1.el7_9.x86_64.rpm4aeda6a0fc5b123d030ff8d61dbe999dbc7911a850bd5ec4dc587824b0165205SLSA-2020:5239-1FirefoxThis update upgrades Firefox to version 78.5.0 ESR. Security Fix(es): * Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) * Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) * Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) * Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) * Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) * Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) * Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) * Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) * Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) * Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)importantScientific LinuxScientific Linux 7firefox-78.5.0-1.el7_9.i686.rpma01136ebd107e00f13819a1ff47a00f4cbfeb618cdbf488899e2a52c75436684firefox-78.5.0-1.el7_9.x86_64.rpm2a9ea789628f4859bab83c8ccf1e5fb214ddecae7f670f550109871358f6f0c0SLSA-2020:5350-1Net-SnmpSecurity Fix(es): * net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution (CVE-2020-15862)importantScientific LinuxScientific Linux 7net-snmp-5.7.2-49.el7_9.1.x86_64.rpm5f6a4f07a16a430a5b5bfba0cdb49f4bfc4d1e82080aea19d098c9b941d9dbe5net-snmp-libs-5.7.2-49.el7_9.1.x86_64.rpm6413cc63e27157a63f2213d9d33f8c3d0dd24d69c57973a0c5c54bcd2b35419cnet-snmp-devel-5.7.2-49.el7_9.1.i686.rpm28dff9113f62a657c99729c6b0820921088723d1e2e36f196f4397e59ea9ba16net-snmp-perl-5.7.2-49.el7_9.1.x86_64.rpmaacc4173eeb02c57b5cc603e87ff09dc3a4ef9e0a2a56b1c222d24ffe71d0378net-snmp-gui-5.7.2-49.el7_9.1.x86_64.rpm0ef72584b2f56c25f567db0b159846d0faf805414aa22a99d0a2a9124df784a2net-snmp-libs-5.7.2-49.el7_9.1.i686.rpm5784605d171bbbd0bd502566b65fcf1fd6a7fcd2f265986217732a1a38dbee40net-snmp-python-5.7.2-49.el7_9.1.x86_64.rpm8bf9e96031cfb8602feea8e199798171335e163802f8142bb6de4eadfcc732aenet-snmp-agent-libs-5.7.2-49.el7_9.1.x86_64.rpm4772c5fea319e3ef852b4455691ab029d4376fada1b836c313b524699f279811net-snmp-devel-5.7.2-49.el7_9.1.x86_64.rpm4db5985d46f717d6201094c9d68072769154cfb8cf8ad20bd8ba5483aba0c9cbnet-snmp-agent-libs-5.7.2-49.el7_9.1.i686.rpm9844acef0228629f571c059899ca877686ded22a947c3273c28ce700a142a27dnet-snmp-utils-5.7.2-49.el7_9.1.x86_64.rpm583d10cddad6c1df718a9d6240aae5d363b041f98f6297f5db023169b5cd3b93net-snmp-sysvinit-5.7.2-49.el7_9.1.x86_64.rpm51b05cd2c54b3e2bd5925721e2bb6fbe877dcf442c355aeb026b2ab7ef226f1aSLSA-2020:5400-1ThunderbirdSecurity Fix(es): * Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes (CVE-2020-26970)importantScientific LinuxScientific Linux 7thunderbird-78.5.1-1.el7_9.x86_64.rpm7204232e5916e30474537b49e8e3c380d323cb508133e2a3f272e2675f6c6b17SLSA-2020:5402-1LibexifSecurity Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)importantScientific LinuxScientific Linux 7libexif-0.6.22-2.el7_9.x86_64.rpmefbb1fc8a925b088d782730b192f4f3261c241540dbc16525fda27d7fef82897libexif-devel-0.6.22-2.el7_9.i686.rpm2074ac598018d8710f20fde5efeef22a67981e962c305d38de81c36dfbe22cdelibexif-0.6.22-2.el7_9.i686.rpm6dc932c606a8b0b97108d1313fe5d3b59706d7feaa9d4ea4404b25eed3b2422elibexif-devel-0.6.22-2.el7_9.x86_64.rpm390e5bc8b3656b1360b772fd168205e8632a1bbe2c3c20340e617ee5d4f9ef2dlibexif-doc-0.6.22-2.el7_9.x86_64.rpm037a55132984a0bd769eb3194ef66167ad9badf0f745e36d5cd34f40e88b48d5SLSA-2020:5408-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) * xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) * xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)importantScientific LinuxScientific Linux 7xorg-x11-server-Xephyr-1.20.4-15.el7_9.x86_64.rpm1dd324a9b38007b9921ab6ca548aef439afa6b55470d00a8549f6d93eb4c43f5xorg-x11-server-Xwayland-1.20.4-15.el7_9.x86_64.rpme0ac1be16eddcef7251eab2e5914fbe32fa46053d7e52c533a3529dbf537fdf1xorg-x11-server-Xorg-1.20.4-15.el7_9.x86_64.rpmbd4762bed5392c807dfe22257611857ae4ff9775f8864505a2c88f549d561f61xorg-x11-server-Xvfb-1.20.4-15.el7_9.x86_64.rpm97c2405899a3c2cc2e38b12158a34ef817b67bc043c72a1da2b1aa67f6608699xorg-x11-server-Xnest-1.20.4-15.el7_9.x86_64.rpmb43f75f93755916cd7662809f920674ff0ee386549c0c1425cc08a180aef832bxorg-x11-server-devel-1.20.4-15.el7_9.i686.rpm21aba054790d48f8b74cd55320fea0b6b2b8bd4afde2619f98143688b977283fxorg-x11-server-Xdmx-1.20.4-15.el7_9.x86_64.rpmcccae5645a379eb7651f950e94e10ff2c9b9eb125ff58b3482125c9e41e461ecxorg-x11-server-common-1.20.4-15.el7_9.x86_64.rpmb3c791887936cc4ae55234af68d275037b4d90c2f0823745aa024e7b6cc7b138xorg-x11-server-devel-1.20.4-15.el7_9.x86_64.rpmce9b2f9a96cb6f7e910bee5639099c84ce13bb87dc6a8d001c67dccb4195668dxorg-x11-server-source-1.20.4-15.el7_9.noarch.rpm28092e85516bb3ad3abaaa0a8b12b886194e9a4ab782b91d22231fecb2c2b59dSLSA-2020:5434-1TargetcliSecurity Fix(es): * targetcli: weak permissions for /etc/target and backup files (CVE-2020-13867)moderateScientific LinuxScientific Linux 7targetcli-2.1.53-1.el7_9.noarch.rpmf1961207eea2a46a9b25e2d7d57195737a0fe1065b3b41498db025f6c36b0b49SLSA-2020:5435-1Python-RtslibSecurity Fix(es): * python-rtslib: weak permissions for /etc/target/saveconfig.json (CVE-2020-14019)moderateScientific LinuxScientific Linux 7python-rtslib-doc-2.1.74-1.el7_9.noarch.rpm38c2d69ce491410d16dcc623d71d2ba6d7cd30792f3efd20768cbe67df54f372python-rtslib-2.1.74-1.el7_9.noarch.rpm34ed38fcd5a5d16bf9c664b9a92f7daf7464ec726c1e79df4b99d50df1737d45SLSA-2020:5437-1KernelSecurity Fix(es): * kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385) * kernel: The flow_dissector feature allows device tracking (CVE-2019-18282) * kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. (CVE-2020-10769) * kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314) * kernel: umask not applied on filesystem without ACL support (CVE-2020-24394) * kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212) * kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)importantScientific LinuxScientific Linux 7kernel-abi-whitelists-3.10.0-1160.11.1.el7.noarch.rpm8c4901a1254d52706a8026f9afa5b964c896fa61d871a47079c886e5434978bbkernel-debug-devel-3.10.0-1160.11.1.el7.x86_64.rpm074a2ca70735365ae82e9859c9fb8820f3d264b5eebd7f7384fddb980c8d44beperf-3.10.0-1160.11.1.el7.x86_64.rpm3e60b1603a251cb4af8f03c0bc08ef03504dda7ef9e0d50efc34f888cb7bc920kernel-tools-libs-devel-3.10.0-1160.11.1.el7.x86_64.rpmf3984b7e00b733ed304ad9d2d1ad2c6d9030b3e8a3cc5430f7cf112a2ff1ce12kernel-tools-3.10.0-1160.11.1.el7.x86_64.rpm0756af1a558d435b5a1b5788bba4d62c3ce18384bea6d923907834a4d391ca89kernel-headers-3.10.0-1160.11.1.el7.x86_64.rpm18f207344f466c5b6e74407601a61ea3185e644570f53fdb7df45290e5857e99bpftool-3.10.0-1160.11.1.el7.x86_64.rpm613af626396059c1078e7f852972e17b69faf1df7b048d6b581f4298a67460f3python-perf-3.10.0-1160.11.1.el7.x86_64.rpmf074050a3bde5f5f20b5402b58a3aab71f9cb94edbd5bef991c127e9f463bde7kernel-3.10.0-1160.11.1.el7.x86_64.rpmcf318a19af37dcd5a560f417ec291a5766a60ec24e9eb2d762f936beb26e6a47kernel-tools-libs-3.10.0-1160.11.1.el7.x86_64.rpm91db286c495fd0f265c5bc0289268239c2d0303c21844bf1415b0310ca867a66kernel-doc-3.10.0-1160.11.1.el7.noarch.rpm4b790062be5b1197903241e00a4ce71a06e3b3952ee700a67880eebdd161b388kernel-debug-3.10.0-1160.11.1.el7.x86_64.rpm01b2018f24bebe98aa6e01b7c5459bf12743278485212b48fe8f9bddd59eb947kernel-devel-3.10.0-1160.11.1.el7.x86_64.rpm01b394eb16a7a6be9c376e088f71a0c44eb4249a28c05fe9a72d53631fb08a81SLSA-2020:5439-1SambaSecurity Fix(es): * samba: Netlogon elevation of privilege vulnerability (Zerologon) (CVE-2020-1472) * samba: Missing handle permissions check in SMB1/2/3 ChangeNotify (CVE-2020-14318) * samba: Unprivileged user can crash winbind (CVE-2020-14323)moderateScientific LinuxScientific Linux 7libwbclient-devel-4.10.16-9.el7_9.x86_64.rpmb076a9f33db35192bbe69ddc9517f2144661cb2756de1d628b5de2ab5a334c7bsamba-pidl-4.10.16-9.el7_9.noarch.rpm3a45929ff73f086c20b0a688e69ef39579cf32ef1e9c5c96c7710496c79ffadbsamba-test-libs-4.10.16-9.el7_9.i686.rpm440286e7959b0a2cf2a559cfc8bf7c5842d258b6f43a0b2a02247cb90f44d6a1samba-common-tools-4.10.16-9.el7_9.x86_64.rpm00c9de7f1cee8e94b586633ba12a1646f89d9575bfc324aa6e9893adbd412b8csamba-winbind-modules-4.10.16-9.el7_9.i686.rpm2efb086f89ba6912cef4104107b9dc01431fdfa669245c1fc061a97749b406b4libwbclient-devel-4.10.16-9.el7_9.i686.rpme86d831cbb14eea16e57267c13a3bfdf06cdec971de24c476e14371a01006b89samba-devel-4.10.16-9.el7_9.x86_64.rpm38f0416a4ecb0e7ebb6bb334f9a75709e2c8e2188270fefea9966db2e6a69ffbctdb-4.10.16-9.el7_9.x86_64.rpm612a9671a5afdfbb3e174a8b747bf1c96e2c5bfb515bf7a93df196c71d5d139bsamba-krb5-printing-4.10.16-9.el7_9.x86_64.rpmd78679a5aa74bcda36d9974620f0b8cfedec6e1f47a91fbce65ae5e23d5b3490samba-test-libs-4.10.16-9.el7_9.x86_64.rpm0b91a59f9c5d32bae9d04b11b50595a48e404f15b4028c9dae01329507923dd8samba-python-4.10.16-9.el7_9.i686.rpm40217003284ac87071f9769e54b664943c738205ae94df6c9f13321692a77a04samba-4.10.16-9.el7_9.x86_64.rpmabf987af637efa73be4eac3641569c7bc4cfee8b251450d6a1370756a74cb1d2samba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm031218649908fa353e5a8c2af61e9054cb39ffcfc8264ee8ac7a677440b4d9d4samba-test-4.10.16-9.el7_9.x86_64.rpm3ab1e89086f913190e3587876a6da9484d97916ccc0302bd04884a9913c55919samba-client-libs-4.10.16-9.el7_9.i686.rpmf80fded3dda885bdf26417baaa147b6d4d7961990adc48677e2e419d3a5b56c2samba-winbind-clients-4.10.16-9.el7_9.x86_64.rpme4fab9053b7ba9b38722867bfdfb42fe7c990e577baaedefe6b50c7e0c75dfd0samba-winbind-4.10.16-9.el7_9.x86_64.rpme3ea6c53cd4e4a8dd2ad0a380c0d55f72d28c563ff59e6cdb5464de51951d18dlibsmbclient-devel-4.10.16-9.el7_9.i686.rpm4db73018e1489cf37ea5ed6abdfc1250946046971a05741eb565a17d513c4471samba-common-libs-4.10.16-9.el7_9.x86_64.rpm46407be156046b26ccbcf0cf131c8a692ce20c4fbfd186d31939e623f5defb39samba-libs-4.10.16-9.el7_9.i686.rpm519e0a4e6bb18214cfa971b232228ff43feda3f36ed123c177ff2ce00feb5b52ctdb-tests-4.10.16-9.el7_9.x86_64.rpmb5ecc1bc7a4e2f1a0c2083725d83c7e9d14a464e2d5fe429bb516da24a5e7b6esamba-common-libs-4.10.16-9.el7_9.i686.rpma9501b4b0918e9be3d9fef799513020f2f61a6dac411d9c87427d70b1df1b002samba-libs-4.10.16-9.el7_9.x86_64.rpm3920df3a2074dcb6633966fda57013415d63549b3a51e8fa993c57af2d8b0e19samba-dc-4.10.16-9.el7_9.x86_64.rpmf271d4c8fc59778b3b8546be5c012d971833fff265e96060c707ea6a9cb543ablibsmbclient-4.10.16-9.el7_9.i686.rpm56efcdcd4fe1755029a174cb76499b2bfece3ec8f226435265a7b1d18f3444besamba-common-4.10.16-9.el7_9.noarch.rpm8042e4e4498238bd6f4eeeef17522327228b39708be95839399d54209c0cf126libwbclient-4.10.16-9.el7_9.i686.rpmbfae295faf35a3784d08fd0cc0e76ab928dfe85a67e8542b97318740b7ac5cc2samba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm3132857bdc0fcec518e8acb2b76662447c28bc201249fa6acb401b75da54dad6libwbclient-4.10.16-9.el7_9.x86_64.rpmfacd100d567679a5e3aa45f595cedbfa4197d17c4521c3fb59dd58696491aaa1samba-winbind-modules-4.10.16-9.el7_9.x86_64.rpmefe3852c88c046489eecb30a7b8a61e8fc9f02b0115a70f058721293394c21acsamba-client-libs-4.10.16-9.el7_9.x86_64.rpme326f21e78e4f94efcd3c3d83cfc199c4e73af0b5feb4a2726c784fa11b409aasamba-python-4.10.16-9.el7_9.x86_64.rpme8cca8a7f801b65b906a85bf563bb92a26cd1f1cea813b09c411a24a6825c2desamba-dc-libs-4.10.16-9.el7_9.x86_64.rpm2909b4efe04c93c004227897e2fb7a63a02d8bf698b8ced94d01c672d69cde93samba-python-test-4.10.16-9.el7_9.x86_64.rpm2a3764105780fcec87cfc7bfd12f80e964d091148cc161ec6f2e8b8d5c6a50afsamba-client-4.10.16-9.el7_9.x86_64.rpm66843da5bf400fc5a2b51436f14a76168fe62e236105023477f2de19c4110b8dlibsmbclient-4.10.16-9.el7_9.x86_64.rpm9ffb0c883afdde797002ba30d19b5e199cbbe4c7606cbabe8b1822cb3a6d131bsamba-devel-4.10.16-9.el7_9.i686.rpm090851bfc72aebe18ed191ca16a3cc57251a653a9381c485872cea5f58232254libsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm3358e17bd6642a2f9ca9247da03aaf13d2b635b0c225a12a5a25064c0b5c8f15SLSA-2020:5443-1GdSecurity Fix(es): * gd: Integer overflow in _gd2GetHeader() resulting in heap overflow (CVE-2016-5766)moderateScientific LinuxScientific Linux 7gd-devel-2.0.35-27.el7_9.x86_64.rpm649bdfb3f448048e424b079817af7ac828e5133323f87bd84aeea5fac6c348cagd-2.0.35-27.el7_9.x86_64.rpm8b22d155263ae48053312e120ad698f6691a26cbdcb53a29352683ed3c58ef31gd-devel-2.0.35-27.el7_9.i686.rpm6098eaf3c89f9adc5feb38e58ebc2cbd2740ba4e3fc45e79edb50c313ff4fe77gd-progs-2.0.35-27.el7_9.x86_64.rpmc1a23e3027865afcf15a1d2e06244f0b21f0ce8db329622b8d14e7e81704db26gd-2.0.35-27.el7_9.i686.rpmb6a019ac8d2811b6eb3296ab2c7e6a72c0bb66a0c848d53764d54111c462c601SLSA-2020:5453-1PacemakerSecurity Fix(es): * pacemaker: ACL restrictions bypass (CVE-2020-25654)moderateScientific LinuxScientific Linux 7pacemaker-1.1.23-1.el7_9.1.x86_64.rpmae3bba33a30bb03d79e842d929b208994522c37c9977689e76b884755b38dec6pacemaker-cts-1.1.23-1.el7_9.1.x86_64.rpmf7ab16be28c957f828ec50d955adfb38bfe761e1227191b1d0f81dd5f2ed8eb8pacemaker-cluster-libs-1.1.23-1.el7_9.1.i686.rpmb323aa8453cb317274a80e53f4b62ad3a90fc6aa19354a9f555e9c8656cacd90pacemaker-cli-1.1.23-1.el7_9.1.x86_64.rpmd0087929e1f47f53190f5fbf4d8fe27e38a25bc761ca9ba9588ea414ba4d7657pacemaker-libs-devel-1.1.23-1.el7_9.1.x86_64.rpm7cec82a8fa695ce95c8dc6a9afd2a81953378a288b588f3bc9625de7919da188pacemaker-remote-1.1.23-1.el7_9.1.x86_64.rpm51d1edcf063c3879e8ab0eea384d56bed87768ca583037f2be802612ead7bf59pacemaker-doc-1.1.23-1.el7_9.1.x86_64.rpm993efca7ba035e125ad01223a8b75047cf4db2c60a2d463655c1cbecc8e38725pacemaker-nagios-plugins-metadata-1.1.23-1.el7_9.1.x86_64.rpme0bba6c20f230d4333a2b050b2fc240886d29b28aca71b1675efe08397bd4a10pacemaker-libs-1.1.23-1.el7_9.1.i686.rpm02d2eb1cf8b91bb2e0c736fafd47e28f0f2f721980e93a7f3ac7d7ca85e10075pacemaker-libs-devel-1.1.23-1.el7_9.1.i686.rpme31001032b9a817b564d4c6c391c732fcce21415a6286678668fef5a87b0e9eapacemaker-libs-1.1.23-1.el7_9.1.x86_64.rpma0ea29234910e70b9d1fa10fd7f12dab0a432c90dd75fc5c556e5e83c131253fpacemaker-cluster-libs-1.1.23-1.el7_9.1.x86_64.rpm83b6faf7f1326a0139ff3b89a28d8e314962a83618d819a1fd9033638c3b020aSLSA-2020:5561-1FirefoxSecurity Fix(es): * chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) * Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) * Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) * Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free (CVE-2020-26974) * Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) * Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) * Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)importantScientific LinuxScientific Linux 7firefox-78.6.0-1.el7_9.x86_64.rpm0d6c4bd288c7d0a631ae8312388c5237d3f3d49d362067931f0c964cbac8b520firefox-78.6.0-1.el7_9.i686.rpm5c1c1f487c0ee722a18c9d0a2d1773a488d2035cd91be329429dfc49017c2fffSLSA-2020:5566-1OpensslSecurity Fix(es): * openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)importantScientific LinuxScientific Linux 7openssl-libs-1.0.2k-21.el7_9.x86_64.rpm4ab783a4b56a43eaa048038f945673f33909a21827029d5ee93b4c81b2f4d92eopenssl-libs-1.0.2k-21.el7_9.i686.rpm2f99416e28a3c658927d78ec90fccfc640eb34bc303f9fa15688a0f049acfb86openssl-static-1.0.2k-21.el7_9.x86_64.rpm25730dc215dab87a5e0cba02d8dc32feb2ad2b924d97e568eb75d86c2377ab8dopenssl-1.0.2k-21.el7_9.x86_64.rpm4099de643d8ffb0d9d7adfd5fcd3b57be8aa259b40a444e71e2bdbfe398ec449openssl-static-1.0.2k-21.el7_9.i686.rpm5324134a3422bb4d2e370d8fd60b425f256ffce1ca7b2f9b5f1766915a5ae87bopenssl-devel-1.0.2k-21.el7_9.i686.rpm6b0eba3b5d8c40fc55a6cbb70138d15c50baf2325cf5f637ff2696afcda2d7a0openssl-devel-1.0.2k-21.el7_9.x86_64.rpm2ff54248f85df13efadba6fe2669cfb9cbc7cfd6901218fb56f02821dc6255c7openssl-perl-1.0.2k-21.el7_9.x86_64.rpmd3f15aa14d37b7458ce9c8f81ad92b40434161a838e064006949813cadecffc1SLSA-2020:5618-1ThunderbirdThis update upgrades Thunderbird to version 78.6.0. Security Fix(es): * chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) * Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) * Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) * Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use- after-free (CVE-2020-26974) * Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) * Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) * Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)importantScientific LinuxScientific Linux 7thunderbird-78.6.0-1.el7_9.x86_64.rpm24422101a4101285534840c54c1008ac45327f0e93b99ebec74e41c60d009b27SLSA-2021:0024-1ImagemagickSecurity Fix(es): * ImageMagick: Shell injection via PDF password could result in arbitrary code execution (CVE-2020-29599)importantScientific LinuxScientific Linux 7ImageMagick-perl-6.9.10.68-5.el7_9.x86_64.rpm35ed20c4a1405b7be51394d2770f8a6cb1ce8727ae75d6d3dd7e11d21181344bImageMagick-devel-6.9.10.68-5.el7_9.i686.rpm38a5bc8854084aea0e436621674b7342c734829122be1f2058521c6a81b1df89ImageMagick-c++-devel-6.9.10.68-5.el7_9.x86_64.rpmc2557d70027530bb4e624c9789ba066907eb63145e00bcc4191d80800f6f14a9ImageMagick-devel-6.9.10.68-5.el7_9.x86_64.rpm263a8c54000db5a2c00dc0d1c8c6eb6c498857eaa6dfcc32979da35f66bdbaa7ImageMagick-doc-6.9.10.68-5.el7_9.x86_64.rpm1902faa24f58f417c8470021e076e97d10952b55e960a365d261c3badc438d29ImageMagick-6.9.10.68-5.el7_9.x86_64.rpm007a874cbb5e96e0ec9d091dc1e1375f5163bc7b51fb924b588b4a9e89693d33ImageMagick-c++-devel-6.9.10.68-5.el7_9.i686.rpmb456d51876febb32c76dac09baa9c049c2a05189e8faf5b3b031170cf506b943ImageMagick-6.9.10.68-5.el7_9.i686.rpm962a00fd6dd0394c38fa745e7b153b4fc4604d16450524ee89d4c89d2c4ae7dfImageMagick-c++-6.9.10.68-5.el7_9.i686.rpm8c7cb49693f69f88cfce4cee36178f33bbb1569e4f2b33f3c279dfffc162bf40ImageMagick-c++-6.9.10.68-5.el7_9.x86_64.rpm203e4810eb5b87904246399de6deec2bb5476e647432cc3fb3cb783a63f969f2SLSA-2021:0053-1FirefoxThis update upgrades Firefox to version 78.6.1 ESR. Security Fix(es): * Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)criticalScientific LinuxScientific Linux 7firefox-78.6.1-1.el7_9.i686.rpm4f8f75fe33d42ec9e805e56187ee91e42c099a99a22371bdd370f5acdf4717a0firefox-78.6.1-1.el7_9.x86_64.rpm8b08548589ca2d090a5090b87ad796bc4b16114224126f9945f0c0f89a03a6deSLSA-2021:0087-1ThunderbirdThis update upgrades Thunderbird to version 78.6.1. Security Fix(es): * Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)criticalScientific LinuxScientific Linux 7thunderbird-78.6.1-1.el7_9.x86_64.rpma9297af8abb6b9ee3f7c109429da762fde47e129d27893f0aec68f2cfb840ce8SLSA-2021:0153-1DnsmasqSecurity Fix(es): * dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684) * dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685) * dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)moderateScientific LinuxScientific Linux 7dnsmasq-2.76-16.el7_9.1.x86_64.rpm6729ababc68f71a67e57ee1a7c0b81375a2804a4081a054fa0f8d03fcdcc046bdnsmasq-utils-2.76-16.el7_9.1.x86_64.rpmd6187f9c7b3e1aab9110e2fd2a764e32f9e4e46af3419d745a1c54aa6423e585SLSA-2021:0162-1XstreamSecurity Fix(es): * XStream: remote code execution due to insecure XML deserialization when relying on blocklists (CVE-2020-26217)importantScientific LinuxScientific Linux 7xstream-javadoc-1.3.1-12.el7_9.noarch.rpmd1c3984fcbe1a1b24baec7263e375eadc97b343c9a463f934c92e43a4e1cf0ffxstream-1.3.1-12.el7_9.noarch.rpm72fb816c08d0492a3c4beddb831f9b13718f36bd9c071a40576baebea1d75bfdSLSA-2021:0221-1SudoSecurity Fix(es): * sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)importantScientific LinuxScientific Linux 7sudo-1.8.23-10.el7_9.1.x86_64.rpm5423b800533b588b826b3262e43317d7483ded52bec632b31e2ad6a7196959a3sudo-devel-1.8.23-10.el7_9.1.x86_64.rpm70d08e1e1e5a472c05109310f94e7080642cb63861cf299c0c4461b4a0fdd814SLSA-2021:0290-1FirefoxThis update upgrades Firefox to version 78.7.0 ESR. Security Fix(es): * Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) * Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) * Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) * Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) * Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)importantScientific LinuxScientific Linux 7firefox-78.7.0-2.el7_9.x86_64.rpmaefb9ecf93045e1f02b4d18b8454ea6a069d36374d511813302be771e372b6cafirefox-78.7.0-2.el7_9.i686.rpmfcf145cb6953a4256c0a7ee96f328579e3a0f81fc046931f75aabff454ec4dadSLSA-2021:0297-1ThunderbirdThis update upgrades Thunderbird to version 78.7.0. Security Fix(es): * Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) * Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) * Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) * Mozilla: IMAP Response Injection when using STARTTLS (CVE-2020-15685) * Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) * Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)importantScientific LinuxScientific Linux 7thunderbird-78.7.0-1.el7_9.x86_64.rpmda24d84fbba521a1fd1d55d856a97ac7be93b07dd9850ee602f76e37e112e419SLSA-2021:0336-1KernelSecurity Fix(es): * kernel: use-after-free in fs/block_dev.c (CVE-2020-15436) * kernel: Nfsd failure to clear umask after processing an open or create (CVE-2020-35513) Bug Fix(es): * double free issue in filelayout_alloc_commit_info * Regression: Plantronics Device SHS2355-11 PTT button does not work after update to 7.7 * Openstack network node reports unregister_netdevice: waiting for qr- 3cec0c92-9a to become free. Usage count = 1 * dlm: add ability to interrupt waiting for acquire POSIX lock * [Azure][SL7] soft lockups and performance loss occurring during final fsync with parallel dd writes to xfs filesystem in azure instance * Guest crashed when hotplug vcpus on booting kernel stage * soft lockup occurs while a thread group leader is waiting on tasklist_waiters in mm_update_next_owner() where a huge number of the thread group members are exiting and trying to take the tasklist_lock. * [DELL EMC 7.6 BUG] Kioxia CM6 NVMe drive fails to enumerate * [Hyper-V][SL7] Request to included a commit that adds a timeout to vmbus_wait_for_unload * Unable to discover the LUNs from new storage port * SL 7.9 Kernel panic at ceph_put_snap_realm+0x21 * A hard lockup occurrs where one task is looping in an sk_lock spinlock that has been taken by another task running timespec64_add_ns(). * ethtool/mlx5_core provides incorrect SFP module info * SL7.7 - zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl * SL7.7 - s390/dasd: Fix zero write for FBA devices * [Azure]IP forwarding issue in netvsc[7.9.z] * Security patch for CVE-2020-25212 breaks directory listings via 'ls' on NFS V4.2 shares mounted with selinux enabled labels Enhancement(s): * RFE : handle better ERRbaduid on SMB1moderateScientific LinuxScientific Linux 7kernel-debug-3.10.0-1160.15.2.el7.x86_64.rpm4819a3eb9dca66f723dfa5c13d6373518d260cde9d2c6f060a94d0b1e77b0b3eperf-3.10.0-1160.15.2.el7.x86_64.rpm90114f195d468dfecac0fb18a9ce5729b7d851a4cb0bcf939bf32d5a58dfdfcdpython-perf-3.10.0-1160.15.2.el7.x86_64.rpm641f97a285f424556bbe68a21bf178e0ef2ef20905b29aab3210af75d103fe47kernel-tools-libs-3.10.0-1160.15.2.el7.x86_64.rpmfe660577b9eaf88827f03c8381566415ad8e1bb3f1650e927c13ecbec550cbd2kernel-devel-3.10.0-1160.15.2.el7.x86_64.rpm6e2d1b4c71950f840f62fc5181b4b8896f0715df42b1776df145f66fc8807109kernel-tools-3.10.0-1160.15.2.el7.x86_64.rpm011bf1357ed906b856da1da696aa34b0363f0eded1c76a912905c9eed2072391kernel-tools-libs-devel-3.10.0-1160.15.2.el7.x86_64.rpme5e98d69d8bf787726353d7de45385c0473b6d619cfd0231181dd27fa36eb526kernel-debug-devel-3.10.0-1160.15.2.el7.x86_64.rpmf68403ea1737e930fb238d3bf1366df3b6427cedc9549ee2d921d114ba1574dfkernel-doc-3.10.0-1160.15.2.el7.noarch.rpma403da577d61eca9239b730a897039157a0631dcb86dca6f68feb8fdc21a0282kernel-headers-3.10.0-1160.15.2.el7.x86_64.rpm366f98be9c759b1a0c83154a9e3a2de474e4afbf6600c12149628ed46f2e14a2kernel-3.10.0-1160.15.2.el7.x86_64.rpm220521bb5eac456a87ce0f75842a5f6e283dd26f69ebc503e9a2fa145c185884kernel-abi-whitelists-3.10.0-1160.15.2.el7.noarch.rpm05e3ce588d2f58ff8b8657f7f34d05ae57d7c27621e6186af6ecf4ccc23e8566bpftool-3.10.0-1160.15.2.el7.x86_64.rpmf157c6631d357e858553558139fb5cb505ca50b43e3602c2d0736df2c18bed82SLSA-2021:0339-1Linux-FirmwareSecurity Fix(es): * hardware: buffer overflow in bluetooth firmware (CVE-2020-12321)importantScientific LinuxScientific Linux 7iwl6000g2b-firmware-18.168.6.1-80.el7_9.noarch.rpm61fac0b0aa5a70b9407d35efa59114947ff835794f071a1db6c66302b83e6115linux-firmware-20200421-80.git78c0348.el7_9.noarch.rpma04f0ec2d675e33d01959e1a83242c245a2d39a7a2c944c9ff1009cdf6e45167iwl6050-firmware-41.28.5.1-80.el7_9.noarch.rpm09990683afec4d460dac7bfe114f290ebc74fa8713f0ac58085a21e7f86c6998iwl5000-firmware-8.83.5.1_1-80.el7_9.noarch.rpma7da327f21ce36292d130875344e0e8a29685864c119177b2416a80190b9efdeiwl3160-firmware-25.30.13.0-80.el7_9.noarch.rpmb441c460e2aff73fff57433dc2c1a269499d061e7824dcc3a5f7e4776093ad9diwl5150-firmware-8.24.2.2-80.el7_9.noarch.rpm1309fbd237fcad5bbaf316bc5374f2020ab43416535194e4fac7404730bd0895iwl6000g2a-firmware-18.168.6.1-80.el7_9.noarch.rpm4fa1b02c8567b22d22a9160f692c5bf1964b5b6ce2c69247a257dcb5e95848aciwl7260-firmware-25.30.13.0-80.el7_9.noarch.rpm50f87a1a5e9d58a92daf1f05b74d1eb117127a54d0d2da5c7c507619612af72fiwl1000-firmware-39.31.5.1-80.el7_9.noarch.rpmc639d41f580e6ba17208031184ec07414e2e09241967dce78acfc1036386bab2iwl135-firmware-18.168.6.1-80.el7_9.noarch.rpmd7440a356a4d6c9feb4a573c817eb1e3dbcb37f4dc94dbdfeb6600e6f53f003ciwl2000-firmware-18.168.6.1-80.el7_9.noarch.rpmb2376b69963be7591f80ee41efad20b6c7001d42d260ab5d229287d2ec8d3ae0iwl6000-firmware-9.221.4.1-80.el7_9.noarch.rpmbf625e797575121e1d90ab40d4487d83578daf2dc8ee043453b4bd44c8cfdb21iwl100-firmware-39.31.5.1-80.el7_9.noarch.rpm707ce9d9cea1f66a7bb4e3c721711e9575cb5a927ec6644fedbbb30de12dd413iwl2030-firmware-18.168.6.1-80.el7_9.noarch.rpm0ccc1eeceda14b1c43ec3ba8060a006c0baa36948c3b6c13f60ab3342c7bc2f0iwl105-firmware-18.168.6.1-80.el7_9.noarch.rpm6c35d887982d431759d462240adc49e8ee0cf75846a4cadbda700b42ea88d394iwl3945-firmware-15.32.2.9-80.el7_9.noarch.rpm359d7aad7d2f44daf6f9f5e8fb3a227f45b7aba607138f749fc647b09297c245iwl4965-firmware-228.61.2.24-80.el7_9.noarch.rpm3ff0d2ff99bfb7b9d6e7ea6f3159545ee33521dea7558a0f2a8ffa9e75898c93SLSA-2021:0343-1PerlSecurity Fix(es): * perl: heap-based buffer overflow in regular expression compiler leads to DoS (CVE-2020-10543) * perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS (CVE-2020-10878) * perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS (CVE-2020-12723)moderateScientific LinuxScientific Linux 7perl-macros-5.16.3-299.el7_9.x86_64.rpma879c7b50bb471730f8ee371ff90439aa238254bacf7b8cd7873afbe3b42538bperl-Object-Accessor-0.42-299.el7_9.noarch.rpmd64afc4f611b5fadf848454ebc5d24ba6d29fad9eceb01e1b1eb9ef47f82d186perl-IO-Zlib-1.10-299.el7_9.noarch.rpm696a5ac2086dab867d43a0f6a9a8ed324d0887e3acf41c5a064c2c41122ac2b4perl-devel-5.16.3-299.el7_9.x86_64.rpm96de282bb6995063683f9a9e03302fcc8e3259ad67bf4023f8d20ab9793f6a02perl-5.16.3-299.el7_9.x86_64.rpm8a1ebda5a8b0d73310ce9a196fa387435c6c86e2b570476b10f055c13481c86dperl-Pod-Escapes-1.04-299.el7_9.noarch.rpm068db7d933a580c661090d8a379621bcee2d174b33a1d8976f5317b2ff59df6eperl-libs-5.16.3-299.el7_9.x86_64.rpm04d5bc27c7b13d66e657fd814dcbbe926f96552aa5805972137ccec6b9a23965perl-Module-CoreList-2.76.02-299.el7_9.noarch.rpmeb4fb6d9d0878452d5ffaeeec24440164ac1ad7ed67c47c6b0daaea384ebeeb6perl-Locale-Maketext-Simple-0.21-299.el7_9.noarch.rpm77c4bcc8c9ef5781b764dd9542a1596e8cf1b6a50edaaf11ca3a1b102aa2cc25perl-devel-5.16.3-299.el7_9.i686.rpm5ab0659408b632e1c380e0a22f046b28275a2ea546300491de5294deb3914044perl-Module-Loaded-0.08-299.el7_9.noarch.rpm75b836eb19a38795869ec7bed3116c6ff0ffd00da7ca9ff9821e8ca47839b359perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.noarch.rpm85e6da0f6a6dd62d6dc5e93f54aadeb0132ce1a8be521478e0e0dc004bb20763perl-Package-Constants-0.02-299.el7_9.noarch.rpmc6625ac445d3b437ea31e7828492f99e7a9db3ab7edf9de0b9b24402756a989fperl-ExtUtils-Install-1.58-299.el7_9.noarch.rpm37c2112c1518ee42c1df7e6f8fe87e262117d4f6ad41932686a04edc1b8ceea8perl-tests-5.16.3-299.el7_9.x86_64.rpm592b542b405321165353857c4695891647bc7a67673d5c68676e60b0fdcaa4c9perl-core-5.16.3-299.el7_9.x86_64.rpm1da5c538c63a3ecaa62da94d0bdc5d44ecc3f690ec2dda0632e2590c28092eddperl-libs-5.16.3-299.el7_9.i686.rpmac2d5dac30d4a5ce7ba68f7945408344ab95816306be5e169da469e58c0d7c5cperl-CPAN-1.9800-299.el7_9.noarch.rpme3c5ea3f13c03a16f5e33e284e704abdb353679e0cc3a4efd49921c39b8d867fperl-ExtUtils-Embed-1.30-299.el7_9.noarch.rpme89ea9809b4a2d6e54e5beff03ee40da52b44c48e659e0f85f239db2841bf276perl-Time-Piece-1.20.1-299.el7_9.x86_64.rpm43c6481cdb21258a36f8c8ecdb8a4512cb899ea3d99c5fd5709a1cee4e004463SLSA-2021:0347-1Qemu-KvmSecurity Fix(es): * QEMU: loader: OOB access while loading registered ROM may lead to code execution (CVE-2020-13765) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) Bug Fix(es): * qemu-kvm FTBFS on rhel7.9moderateScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-175.el7_9.3.x86_64.rpm3d983d02fae65d5d2d794245897da2c827f12948c7a4ee123f80ca80ae9aceccqemu-kvm-tools-1.5.3-175.el7_9.3.x86_64.rpma5d343cba227c6c6f03908786c70e3da960559910b7c92460d14db8c2a4c0f2aqemu-img-1.5.3-175.el7_9.3.x86_64.rpmc63f9feea8f5a3ed3c274cf5193209dd2390dbc612b647c2ea50e74c3442d4f2qemu-kvm-1.5.3-175.el7_9.3.x86_64.rpm3e53c4a294b534c01ee62b3f8659b72b3f66297c9fef4145c78ffe5d9e5e2929SLSA-2021:0348-1GlibcSecurity Fix(es): * glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE-2020-10029) * glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern (CVE-2020-29573) Bug Fix(es): * glibc: 64bit_strstr_via_64bit_strstr_sse2_unaligned detection fails with large device and inode numbers * glibc: Performance regression in ebizzy benchmarkmoderateScientific LinuxScientific Linux 7glibc-2.17-322.el7_9.i686.rpmeacc8efa6a1535da6f99f937267659b1ec828fcc3fa4a56f47093a9a8315a0caglibc-utils-2.17-322.el7_9.x86_64.rpma155c586e5c649ea52af5ef4ff5dc331be482d4a9e5c4ab76cf7a5288dd9b444nscd-2.17-322.el7_9.x86_64.rpmf75977b94de6357ed40a544a2303b9c7b8718902a93c2167721c2afcc9838949glibc-headers-2.17-322.el7_9.x86_64.rpm08a987cadf27a5435d8396d0aab85bc190e0c769adebb5d12441a18c54f5a6eeglibc-2.17-322.el7_9.x86_64.rpm7313f96fbe52fdf0ebe11d6f4104839038daa082391d8cebd0ce2ea53feaf182glibc-common-2.17-322.el7_9.x86_64.rpm8cbea99ed186c6a595b589a89239605dbf2e938c91f7c4163a3048d4e1e74e96glibc-static-2.17-322.el7_9.x86_64.rpm15893bf07ed763152dc3095f86c85e9d53b6fa08a4b88bd34ec084179d8c9f9bglibc-static-2.17-322.el7_9.i686.rpmc0ddb6b8b1d2c5a02c0430a5c0f7e13c771bdc14316e37090c97beaea11feeffglibc-devel-2.17-322.el7_9.x86_64.rpmc7e682d49ec90a9e70349e91dffb34b3e5542f8bde9305784e05b6e5988c9ea1glibc-devel-2.17-322.el7_9.i686.rpmf1012e0c66ae6b9a3d92cb167dd69f5096c1a450369f4bbdc677e3a52ffcfcf2SLSA-2021:0411-1FlatpakSecurity Fix(es): * flatpak: sandbox escape via spawn portal (CVE-2021-21261)importantScientific LinuxScientific Linux 7flatpak-devel-1.0.9-10.el7_9.x86_64.rpmc61b58e307ac1e785724862fa5f80d57d397110acfe5376f714c6d64087cb797flatpak-1.0.9-10.el7_9.x86_64.rpmd0145d8c5521f572cee69348e00b09664808dac4e662590d902cde19fa22ddedflatpak-builder-1.0.0-10.el7_9.x86_64.rpm66b166ee3a30969fcbfd740f8798191aaf894a4056c4c2a7f7042a9669e71c5fflatpak-libs-1.0.9-10.el7_9.x86_64.rpm53e599519edd6b04990f2649ab7bf1bde929af36f047272d2e76b9b41697686bSLSA-2021:0617-1XtermSecurity Fix(es): * xterm: crash when processing combining characters (CVE-2021-27135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xterm-295-3.el7_9.1.x86_64.rpm448e8b7f54e28e5c9703d5229aee2e63307a6bea9d70f84bd855c88859fc5a8cSLSA-2021:0656-1FirefoxThis update upgrades Firefox to version 78.8.0 ESR. Security Fix(es): * Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) * Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) * Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) * Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEcriticalScientific LinuxScientific Linux 7firefox-78.8.0-1.el7_9.x86_64.rpmbffabc0d15725ce0f2db7e29a57216be2d3b29e90cf0e23635a246d57c21c2cafirefox-78.8.0-1.el7_9.i686.rpm538a8b1e2d4d02551f4ad78f403e7084b8f3fd3f64f30bc3365faba14fe7b146SLSA-2021:0661-1ThunderbirdThis update upgrades Thunderbird to version 78.8.0. Security Fix(es): * Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) * Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) * Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) * Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-78.8.0-1.el7_9.x86_64.rpm1aa130714f02d6a5c556311988160f3c524434952a6b6e37c8b5523300e692e3SLSA-2021:0671-1BindSecurity Fix(es): * bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7bind-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm9e5b6954ca3d6c7894e4f201dc81b3a44cc8cf313cb643ca80993250d9547edbbind-license-9.11.4-26.P2.el7_9.4.noarch.rpmd81fadde04be1fafc43fab22dc897c12cbb19a14fc937003d8d95ba767f91843bind-9.11.4-26.P2.el7_9.4.x86_64.rpm155fb158aedbbfa4309a2fc1adf9a9254c1e72832ec0430dbde5fd8000939dcbbind-pkcs11-9.11.4-26.P2.el7_9.4.x86_64.rpm38346b34188c8f02e33be391b9c1028daff131a0a07eb929d74946b40509a22cbind-devel-9.11.4-26.P2.el7_9.4.i686.rpmb41e52f3edca20a46f973b6dd81fd78b02a2d0c135774557825a882f2af91f13bind-sdb-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpm75de22a7c836f42186a20178c133abd0833d0c7f608cb1872a24ead5ae2b0596bind-export-libs-9.11.4-26.P2.el7_9.4.i686.rpm3b21ac1132c5ac0564d420000174627746983bb56597497b7afa20ea1b190d44bind-lite-devel-9.11.4-26.P2.el7_9.4.i686.rpmea67cc77ffa069331349999858a7be56379764c27f50aa00f11994ed1db6fa60bind-pkcs11-utils-9.11.4-26.P2.el7_9.4.x86_64.rpm8ce0b348fce9caddf37e20278fe63d1e4bac52334a6403f1c4b4cb898d8d7eeabind-export-devel-9.11.4-26.P2.el7_9.4.i686.rpm5f919bfe6e9caae3aeb37ac98f75fb8e1dd268d48a739a6f26e988f9cb5ffcdbbind-export-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm0e77cacde069f2e0f0d7cfd869a9bd2d68b63c6590cff598244fedf369b126efbind-pkcs11-libs-9.11.4-26.P2.el7_9.4.i686.rpma5b9ea01e6d83a3239e98c5c2e8e6ca8197a99b540fd9892eadbac9228b5e94bbind-pkcs11-devel-9.11.4-26.P2.el7_9.4.i686.rpm66663a2950103cfddb2b2f82893add4ddc1d4fb874136a91225bf566acb6d3adbind-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm75a0b671d85195099bb672d52ce7bf7fb374f2def8985d6f2c8ad1be6185b8acbind-export-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm3ddbdf296547fabaacae407f196f83ca4e63c7ce59bf70b98d7d54611641957ebind-pkcs11-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm0cb5b1e3f2f602e1b5303ccfc199c83effa19de2cecccb547d247f0c4184a099bind-libs-lite-9.11.4-26.P2.el7_9.4.x86_64.rpme1645fffa1754662ae830cc70dea4f10d4b8bc0118a0418d0fb520dc4215eac5bind-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpmc3863f0ffda833af04d3aabbb71c6855ecdb162552dbe1bb9a0909b2dd8d3a88bind-libs-9.11.4-26.P2.el7_9.4.i686.rpm23d6d30f7a3e3d1a5ce04d5dca4b240fbac6e2ba56d0b5fc4f50706aa9f82cc7bind-pkcs11-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm82e44e5a3424840261903624d40dab0f3bef3083778f2b39620e718284f247f3bind-sdb-9.11.4-26.P2.el7_9.4.x86_64.rpm6ff982494cc963eca0c9b8829b0c2e54bb1c40f199bb66e79111c7f17169a152bind-utils-9.11.4-26.P2.el7_9.4.x86_64.rpmb2c9ec7a5b017591dbec8b4ce004c08404f77f88b6b86bab6a7425de98e969b7bind-lite-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm1fa6d5cfee562631a69c72c711493521bb2ee0ce0781c824a931813e133eb96ebind-libs-lite-9.11.4-26.P2.el7_9.4.i686.rpmb6310e106c6c0a80ef9e0f873a5e7a774de6d8f5cba6ca65cb9e7abd23c62b60SLSA-2021:0699-1Grub2Security Fix(es): * grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) * grub2: Use-after-free in rmmod command (CVE-2020-25632) * grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) * grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) * grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) * grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) * grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.2.x86_64.rpm211792b09de5351782267910616b09be86c67abe554507762bc029ab89f713ffgrub2-efi-ia32-modules-2.02-0.87.sl7_9.2.noarch.rpm91c1cbec8dedb06f74858471953cc877a5897595d67ccdfcf76ec92f57f75a4cgrub2-tools-extra-2.02-0.87.sl7_9.2.x86_64.rpmc999bc78e1c7d24ce12dff9c26b89727827463f3ee2f11ad6ad55695ac479321grub2-efi-ia32-2.02-0.87.sl7_9.2.x86_64.rpmd9d357ee4502829702d4de4272c92a61df523bd845e715f0f95ba8a04b68357dgrub2-common-2.02-0.87.sl7_9.2.noarch.rpma610c089ce1abe1c02eb23d1a75f32d70130c8670f7e8e6b751b6f1d80988078grub2-tools-2.02-0.87.sl7_9.2.x86_64.rpm9be8073a973b51f8bf465f1ba7c590e9068250fd7379e83ca46bd83a52f5d2f3grub2-pc-modules-2.02-0.87.sl7_9.2.noarch.rpmaf47dfa3848878a70d820bf584b6e27b477adfc7101a848e174f2a863fd0593dgrub2-efi-x64-2.02-0.87.sl7_9.2.x86_64.rpmbebee412feb48e7dd3053fe1436ae36d8dcb365da4e707c6e277d3510339dc66grub2-pc-2.02-0.87.sl7_9.2.x86_64.rpmf2b308408f69ad224c62a000f51ee6113a732caa79e13f048c6ca0dc3f3f9ec3grub2-efi-x64-cdboot-2.02-0.87.sl7_9.2.x86_64.rpmb7e8bbde9b06adc5a0547bc1a3eeaf5fd036048fd4b3f69ac9a6b5b4f4cd94dbgrub2-tools-minimal-2.02-0.87.sl7_9.2.x86_64.rpmbfd4e691d2d6adfe6486f9b58b48dad5c0f08ae2e264704e14be52fd9806a2ecgrub2-2.02-0.87.sl7_9.2.x86_64.rpma5cce68e0bdd981b7e54b89917843063ffb01baa386511f618d6b3d3c7022d7bgrub2-efi-x64-modules-2.02-0.87.sl7_9.2.noarch.rpm0ff26046d5996a5ff945f544bbdf505d6c8486faa7944e7efefa2fa7fd15a66bSLSA-2021:0742-1ScreenSecurity Fix(es): * screen: crash when processing combining chars (CVE-2021-26937) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7screen-4.1.0-0.27.20120314git3c2946.el7_9.x86_64.rpm04b381686a62e297500b1341fea5c3bc9d8d3c2a9d9708a47b83290754881a02SLSA-2021:0808-1Wpa_SupplicantSecurity Fix(es): * wpa_supplicant: Use-after-free in P2P provision discovery processing (CVE-2021-27803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7wpa_supplicant-2.6-12.el7_9.2.x86_64.rpm9dc31d95856d46cb6ea4112361e906f5810c2e5fb807ed3171c9959c5764c7ffSLSA-2021:0851-1Pki-CoreSecurity Fix(es): * pki-core: Unprivileged users can renew any certificate (CVE-2021-20179) * pki-core: XSS in the certificate search results (CVE-2020-25715) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Add KRA Transport and Storage Certificates profiles, audit for IPAimportantScientific LinuxScientific Linux 7pki-server-10.5.18-12.el7_9.noarch.rpm27fbad63d48e3e5d745e3fa7226c4ff0c35826d1c159730c9dab129f41446f32pki-symkey-10.5.18-12.el7_9.x86_64.rpme8b4db9bf26442f9289a6ade6e8d75677b468c723c62a78555fef78dac9a052bpki-tools-10.5.18-12.el7_9.x86_64.rpmecd82e0ce19a61c9f8e51befbcb13609b71dd3297b543dff15cd31a7c738bd75pki-base-java-10.5.18-12.el7_9.noarch.rpmb667db533d0b0466cd9a7f191ed2f46ff7b6343365895224fdc58b4ccfdf8dbbpki-javadoc-10.5.18-12.el7_9.noarch.rpmbdd7527f205895ae73cada65090a85605f39ab7185d081b4d36572e13e0b01c2pki-kra-10.5.18-12.el7_9.noarch.rpm7f670bc1e1e47d342b2576e33faa19251ea3b33eac328048705c167d0e486a4epki-base-10.5.18-12.el7_9.noarch.rpm0650738faad52eaabc98983e443017fb63828e5b482060b4c112d7c239c9f00bpki-ca-10.5.18-12.el7_9.noarch.rpmb25de0464afb617728604cf1bc4f9918c412182ca2720ef7f00193e098eaf5a4SLSA-2021:0856-1KernelSecurity Fix(es): * kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211) * kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374) * kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use- after-free (CVE-2020-29661) * kernel: malicious USB devices can lead to multiple out-of-bounds write (CVE-2019-19532) * kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427) * kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c (CVE-2020-7053) * kernel: performance counters race condition use-after-free (CVE-2020-14351) * kernel: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints (CVE-2020-25645) * kernel: use-after-free in read in vt_do_kdgkb_ioctl (CVE-2020-25656) * kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705) * kernel: increase slab leak leads to DoS (CVE-2021-20265) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * BUG: scheduling while atomic: memory allocation under spinlock in scsi_register_device_handler() * WARNING in __iscsit_free_cmd during recovery Abort * lpfc does not issue adisc to fcp-2 devices, does not respond to nvme targer that send an adisc. * Panic in semctl_nolock.constprop.15+0x25b * [SL 7.7][md]Crash due to invalid pool workqueue pointer, work queue race * Guest crash on intel CPU with -cpu host,-spec-ctrl,+ibpb * SL7.9 - kernel/uv: handle length extension properly * Commit b144f013fc16a06d7a4b9a4be668a3583fafeda2 'i40e: don't report link up for a VF who hasn't enabled queues' introducing issues with VM using DPDK * writing to /sys/devices/(...)/net/eno49/queues/tx-16/xps_cpus triggers kernel panic * [Hyper-V][SL-7.9]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit * kvm-rhel7.9 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. * kernel: nvme nvme7: Connect command failed, error wo/DNR bit: 2 * dm-mirror crashes from assuming underlying storage will have a non-NULL merge_bvec_fn * watchdog: use nmi registers snapshot in hardlockup handler * [DELL EMC 7.9 BUG] - Intel E810 NIC interfaces are not functional in SL 7.9 on system with AMD Rome CPUs * [DELL EMC BUG] SL system log shows AMD-Vi error when system connected with Gen 4 NVMe drives.importantScientific LinuxScientific Linux 7kernel-abi-whitelists-3.10.0-1160.21.1.el7.noarch.rpm6094e9603b4da2bd6f6ba4f79b712d16a8d14b56191887cfcc8d668c5e2362d3python-perf-3.10.0-1160.21.1.el7.x86_64.rpm038ef49230c56246614a9e976d4e48bf691c27dd1babf0c510652da1ecda040fkernel-debug-devel-3.10.0-1160.21.1.el7.x86_64.rpm0100ae043f3b4577d767caf812e96a0c2347a2d109e71d143e3bc254b9b10ddbkernel-3.10.0-1160.21.1.el7.x86_64.rpmef252a2debd82692426f4c01bf78fbc47a5fd2373952a6843a3bb47333493e49kernel-tools-libs-devel-3.10.0-1160.21.1.el7.x86_64.rpm62d08da1cc34e06dd21140d6be0ca0f6e7869848011f83c5a23144333caf3a2ekernel-tools-3.10.0-1160.21.1.el7.x86_64.rpmd48e0daae8ef795b5f3cf826a5881096543adf966c215e3388fa49de360c058fbpftool-3.10.0-1160.21.1.el7.x86_64.rpmf4f24d0198c3147ef985fad6a6f613c5aa3129c52651d6c13beb40148b07493fkernel-tools-libs-3.10.0-1160.21.1.el7.x86_64.rpm8f972059f758fb7bee95648c26a782e740d4fdfa4df401a6a1148e86a46d9871perf-3.10.0-1160.21.1.el7.x86_64.rpm6ffd6ee9056d8b8f8c7239bb253fd49c4e0a57d1dce37430e7feb045b84e089bkernel-debug-3.10.0-1160.21.1.el7.x86_64.rpma287d94257eaa061dbe260bb586cba664091cb667304204191a35dd9db5978aakernel-devel-3.10.0-1160.21.1.el7.x86_64.rpmff02f6293b776f7974a19d1df5e50d274398f2b81212892aa18f9004c1920919kernel-headers-3.10.0-1160.21.1.el7.x86_64.rpm9aaef01ecab63328e3ee79422bf5342559480ec96b42b3e1ebf609a58030336ekernel-doc-3.10.0-1160.21.1.el7.noarch.rpmadfcbf58602c4b3dbbd37b346c6368af906a4c0af87daa81824d1135b0976a3dSLSA-2021:0860Moderate: Ipa Security And Bug Fix UpdateRed Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * jquery: Passing HTML containing &lt;option&gt; elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * cannot issue certs with multiple IP addresses corresponding to different hosts (BZ#1846349) * CA-less install does not set required permissions on KDC certificate (BZ#1863619) * IdM Web UI shows users as disabled (BZ#1884819) * Authentication and login times are over several seconds due to unindexed ipaExternalMember (BZ#1892793) * improve IPA PKI susbsystem detection by other means than a directory presence, use pki-server subsystem-find (BZ#1895197) * IPA WebUI inaccessible after upgrading to RHEL 8.3 - idoverride-memberof.js missing (BZ#1897253) moderateScientific Linux 7ipa-client-4.6.8-5.sl7_9.4.x86_64.rpm1ed4bf14bd52dc244d62b6916df8470e09377e46366a271670570b0061ae62d0python2-ipaclient-4.6.8-5.sl7_9.4.noarch.rpm9ff8b4cb8abe9ed22d2ccbc4fc24bf9f5c69da12e614592e1128d818280a7085ipa-python-compat-4.6.8-5.sl7_9.4.noarch.rpmaeffe6fb3d8ef7a95f472e281a7cfdeede480ba3e6f5c08565584bb163a5f20dipa-common-4.6.8-5.sl7_9.4.noarch.rpmd4febde3124992711419e10f72a60fed11bd033cab1c426a6b9cb7a0a862cc42ipa-server-4.6.8-5.sl7_9.4.x86_64.rpm3bc5d8e6824bcb898657402f40baa86030f2ed3eff94f1ff0b806f58b69f9aaapython2-ipaserver-4.6.8-5.sl7_9.4.noarch.rpm9b29cedcbaed715cc305adfb56233bfada6d59d95e46d69f348ea4f78c904993ipa-server-trust-ad-4.6.8-5.sl7_9.4.x86_64.rpmb1ffa453b3b8caee571c289db11631bdcaf82a08b717da819c84bcfececb7493python2-ipalib-4.6.8-5.sl7_9.4.noarch.rpm8136719389c6e1ad756cefa0e711d90ed61d67b9d8957f5b473daf227e478eabipa-client-common-4.6.8-5.sl7_9.4.noarch.rpmf22012aec24260700ec750141870e1af40568ead8cac252af493ae9124daf9b7ipa-server-dns-4.6.8-5.sl7_9.4.noarch.rpmf915a15b5337d345c496b3db7f86bff99fb018766ed8a2892868bdcbfdc6f7e8ipa-server-common-4.6.8-5.sl7_9.4.noarch.rpm4f3b2a4c67baf3947332d06ac24edffb730353ea58514553191762376a3db5f5SLSA-2021:0992-1FirefoxThis update upgrades Firefox to version 78.9.0 ESR. Security Fix(es): * Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) * Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) * Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) * Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-78.9.0-1.el7_9.i686.rpm449df14cbc360743a3ab34d43f07a97ec2ae373f63491b35c475434ecfb308c5firefox-78.9.0-1.el7_9.x86_64.rpmad40a8508cce4f79864e7962536bb3f03c4fabb32ecc482d6995b438af64895fSLSA-2021:0996-1ThunderbirdThis update upgrades Thunderbird to version 78.9.0. Security Fix(es): * Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) * Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) * Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) * Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-78.9.0-3.el7_9.x86_64.rpm9166b8b1c37e08b4a4701b5003444858ecacb6bcdc9d9b193f7e4d3b351b924aSLSA-2021:1002-1FlatpakSecurity Fix(es): * flatpak: "file forwarding" feature can be used to gain unprivileged access to files (CVE-2021-21381) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7flatpak-libs-1.0.9-11.el7_9.x86_64.rpma0c8d1985df717702a00c219b1dfd9411914253a7af93163f746b240db61095cflatpak-builder-1.0.0-11.el7_9.x86_64.rpm00b6c14edd3fba4506b7a3230dca8b89b5540cebc377e2a51f7db1bd3ca4597bflatpak-1.0.9-11.el7_9.x86_64.rpmcf33c9234e001b7606a40cc1b452c7b75d25d06e6005bde9a65aa998a9ad0676flatpak-devel-1.0.9-11.el7_9.x86_64.rpm6521ddac74e82ae43234671eddc5f24b795a47e80b72b9e7a97ff01c824d8094SLSA-2021:1071-1KernelSecurity Fix(es): * kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) * kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) * kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Customer testing eMMC sees and intermittent boot problem on 7.8+, was not seen on 7.3 * tcm loopback driver causes double-start of scsi command when work is delayed * [Azure][SL-7]Mellanox Patches To Prevent Kernel Hang In MLX4 * A patch from upstream c365c292d059 causes us to end up leaving rt_nr_boosted in an inconsistent state, which causes a hard lockup. * [SL7.9.z] Add fix to update snd_wl1 in bulk receiver fast pathimportantScientific LinuxScientific Linux 7python-perf-3.10.0-1160.24.1.el7.x86_64.rpm2f2fd4117c14eeede25c4093b900d7201919a46389f10857579254ea0eff776bkernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpmcb76211b757a3cd464b24f2d7060fe2d0e72afa9d11fc8f3469391eb16fde71ckernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpmaf70c25c4ef9a8ad37b20d2897f7284b9821b5f051e96e2323c73913435c71e1kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm656c38db2453c891ad2c45f9cfb9e74539e60e77471f2bd16c7825c9ec494794kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpme8adb9705ab08223016f1a2d3f3bbe7cc9527178c1416d3e9701c563b42fc66dkernel-3.10.0-1160.24.1.el7.x86_64.rpm8b02c778e6f475a8c05a6fd907f4a30cbf2b398de2db16b774c0e8f80dbf7639kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm45e0d2a3eec5f01530801e319c16cf353c1f4f01e2f671899c1538957580233dkernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm2a5af3560c0d2b58d3e92e072f21cbac7d005054e5669bb750df3ad80e342df9kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm40794e52ae66c3260a991b1ec548f180df2c79ae3be19e9ae2469ce661494ff0kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm4e1999914ac5f99b35772588a3724ac771e06bf70bccb969b19a7f947346c40dkernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpmf1afb9b8996e3da3191f1c34adc71dc6a7647897dec1cfc5f1d92b0de7032716bpftool-3.10.0-1160.24.1.el7.x86_64.rpme8937433e163b569db4594a6ef9ca6282fc9d0a4c26320c2b8ad3fa4594bdc77perf-3.10.0-1160.24.1.el7.x86_64.rpmaa3218f14b92997019671e64c7e60538305d57e6c18be05678bb7221b3a44707SLSA-2021:1072-1LibldbSecurity Fix(es): * samba: Out of bounds read in AD DC LDAP server (CVE-2021-20277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7libldb-1.5.4-2.el7_9.i686.rpmc8d61843617f2cb1f30708c3766acab28cf3322cd4463a6440845f80e58e0006ldb-tools-1.5.4-2.el7_9.x86_64.rpm5a30e6206b96aa941cf5bc0787be552ed795b37a5bcaa3a6c566e416ae0cdeaclibldb-devel-1.5.4-2.el7_9.x86_64.rpmf075bcf6db662ef2ff6165da440e97f8d5daf699c0ca75a1429fc2ae623a0680pyldb-devel-1.5.4-2.el7_9.i686.rpm49a598cb1f95a358da7e166ce9e7e42690b515c9300f27f66e3348c87bbccf6bpyldb-1.5.4-2.el7_9.i686.rpm592e2a51c0c0d2c9a8cbb6ec431564ac5672d3b5cf36c580ed538c146e63b7eblibldb-1.5.4-2.el7_9.x86_64.rpm35c4dfcc466c55a684cde022968cfdc5ed8f6a7908615dacf8de89abead874b5pyldb-devel-1.5.4-2.el7_9.x86_64.rpm0b05d33f911795ff1eed0b117ae6d8f659ca91a120a52db97b25120f8ad1055dpyldb-1.5.4-2.el7_9.x86_64.rpm81b3e1a7462a0ab7d801d10d06cdb7ed1bab30a7ecce8be02a42815c88acb34elibldb-devel-1.5.4-2.el7_9.i686.rpm459a9a0a10f37d4d5422f8b7bd6395b4812e62746ceb5112c9e4686a45100076SLSA-2021:1135-1SquidSecurity Fix(es): * squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7squid-migration-script-3.5.20-17.el7_9.6.x86_64.rpm5f4efbb47e4ef8bbc123c76ee5739139033149ca48f605398cce3d283a615c5csquid-3.5.20-17.el7_9.6.x86_64.rpm01e8917843e5d9f7a76ba9ed41ea78f043ea28b08aa9d34e1f89abae28a4f03csquid-sysvinit-3.5.20-17.el7_9.6.x86_64.rpm51672f3d8d35b136ea56a3926eb0d200f56f7a2a7323edc37fb2a2367a10748eSLSA-2021:1145-1NettleSecurity Fix(es): * nettle: Out of bounds memory access in signature verification (CVE-2021-20305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7nettle-2.7.1-9.el7_9.i686.rpm3a8ab2056c7e273d4f5e3b312f3cae6e1231f8f22fd6e4c7e7a7a47b33230b87nettle-devel-2.7.1-9.el7_9.i686.rpma6ee2bc74687ca5ddc54502f97621d44d3b20108dc5bb3fce0b5199f5f156d72nettle-devel-2.7.1-9.el7_9.x86_64.rpmed4b165b6393d04c01395bbffabde34c663918d165af9a17d15c8ffc49829fc9nettle-2.7.1-9.el7_9.x86_64.rpm631114eff14ce13570db80ea06c014964225734de427b1f5ed72f06315e9985dSLSA-2021:1192-1ThunderbirdThis update upgrades Thunderbird to version 78.9.1. Security Fix(es): * Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991) * Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992) * Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7thunderbird-78.9.1-1.el7_9.x86_64.rpm15b668cdfd777d49d74ef2aa02560696e79393a9ea3435db1cd9eca0c1112f0aSLSA-2021:1297-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * JNI local refs exceeds capacity warning in NetworkInterface::getAllmoderateScientific LinuxScientific Linux 7java-11-openjdk-devel-11.0.11.0.9-1.el7_9.x86_64.rpm0034ea4bb6360a4195b2e893473abe05a4caa5d3fba1bb2f947031a3a0fb23bdjava-11-openjdk-11.0.11.0.9-1.el7_9.i686.rpm3ba7659fe7c21237ddda65067f9bb0890b009f76b99da806d44b95de2f97090djava-11-openjdk-javadoc-11.0.11.0.9-1.el7_9.i686.rpm80c07f488b277fe77a6804f464351a593c6eec64ccd99cc9625c423fa316d30cjava-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9.i686.rpm8c32b31903c528c50a3c9f314fc80503666bdde1e27c87f65b8f07b22fbe9558java-11-openjdk-demo-11.0.11.0.9-1.el7_9.i686.rpm2eddd05a74f9ce62bca7c94ecb11d6e12d0625b51b7d497c3b1f0b24fb3b82d8java-11-openjdk-headless-11.0.11.0.9-1.el7_9.i686.rpmb831a9d9f5307edb419c8930fd5099ddfbaaf35b776a30084af53e8cd977e1d8java-11-openjdk-devel-11.0.11.0.9-1.el7_9.i686.rpmd5a59b97373234482ec6638e3c0f5b8e6634b1a516221f18411c301d78b93cf2java-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9.x86_64.rpm81ff8c66823e9f782647553c4a9813a7c6bfe157175608311fc2b820f514483bjava-11-openjdk-jmods-11.0.11.0.9-1.el7_9.x86_64.rpm3b832771787ee5616db81159d8160c2730f7ffbb49acef711362ecf717af0062java-11-openjdk-jmods-11.0.11.0.9-1.el7_9.i686.rpm063d70c16819779f8dd01c87fed8f1414af2f4e4e6170fa8589352be7a259200java-11-openjdk-src-11.0.11.0.9-1.el7_9.x86_64.rpmdacfb2f2f25e11ffa8ee9bf607585542ad824f662579fdb8c497a98b80f7e706java-11-openjdk-javadoc-11.0.11.0.9-1.el7_9.x86_64.rpma92890f9b8897ff784d2e09cde43a32bcefc529e957334f81ad717bdf0ef804ajava-11-openjdk-static-libs-11.0.11.0.9-1.el7_9.x86_64.rpma8ad8dd549b80506f39dd78eb7a580a83f13b05f9e4e20b17746ffe9fb940ab6java-11-openjdk-11.0.11.0.9-1.el7_9.x86_64.rpm792639abaff2f0c400ac29f6632604909863bc86c812ffb374b0cdd78172eef7java-11-openjdk-headless-11.0.11.0.9-1.el7_9.x86_64.rpm2ad3fb50999eb4448ecaa27c4c74e591a26a89d8afb93a3664485d53d4265d48java-11-openjdk-src-11.0.11.0.9-1.el7_9.i686.rpm4f998f3be20e475b38d401b610ce40fc3075b39248e60e4b0e45f67c11a6805bjava-11-openjdk-demo-11.0.11.0.9-1.el7_9.x86_64.rpm2fd6b328021bbc7b816576def60e0caeb865777f0a739f8bf42ba154122d2340SLSA-2021:1298Moderate: Java-1.8.0-Openjdk Security UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7java-11-openjdk-debug-11.0.11.0.9-1.el7_9.x86_64.rpm20f1ecd8e9bf9493f51e9e3e4ad46f03716f572e0d03aa6ed89bcb0422a736d5java-11-openjdk-devel-debug-11.0.11.0.9-1.el7_9.x86_64.rpmb1707f74e24c39439f064c2c0608d13521966668120480c3a0e392511838f7d3java-1.8.0-openjdk-src-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm0497048dabe9d531c1ec54f14cdbcb011ac31893866ef21176a3776c93fc86b6java-1.8.0-openjdk-debug-1.8.0.292.b10-1.el7_9.i686.rpmc9ecdbedd7a440f9e6e1502dacbdd2ca61a677acc91882764ec9728f61020162java-1.8.0-openjdk-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm755ab6e8a59dc81a4d169f0795737c1eb5efa94ff5da876423486843206c50c0java-11-openjdk-headless-debug-11.0.11.0.9-1.el7_9.x86_64.rpm90c0f00388fc9e9eac0870a6558600244a789e5527841d0441099baf08764adbjava-1.8.0-openjdk-devel-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm48bcc55e3c9f9449e580635946425f8e9913b40d6a1d772c01ee6bd8545145c0java-1.8.0-openjdk-headless-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm6f1c618f7b579e38486cf7ef243f41eafce72022a794e139d8163c2abcb1f737java-1.8.0-openjdk-src-debug-1.8.0.292.b10-1.el7_9.i686.rpm7a37644b790d36eebc1a9ef0d0ddb8856db0c32523139b8be8cd1a31b9ccab1ajava-11-openjdk-src-debug-11.0.11.0.9-1.el7_9.i686.rpmca7ea3307804ce88ab2f3fccd44456f9cdc9828683df5cf677c636ac8d01ddb1java-11-openjdk-javadoc-zip-debug-11.0.11.0.9-1.el7_9.i686.rpmd12b1cb6a0c7d32067a6dfd14876769e23d5b384c6edadbce494b24eca63d328java-11-openjdk-demo-debug-11.0.11.0.9-1.el7_9.x86_64.rpm3d7626bbf610ca3321dbbe2f152ce1080dda51c998b72bcbbdc9deedd3994f50java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.292.b10-1.el7_9.noarch.rpm09cd33f2498b4600c66a4b50b804b380bf784fa1a8c0eb3f92ec6156b74e310ejava-11-openjdk-demo-debug-11.0.11.0.9-1.el7_9.i686.rpm4e2b3380bfbe792c3dc17ec39c66108b64fd7d6268873a85c9507dc39c817823java-1.8.0-openjdk-headless-debug-1.8.0.292.b10-1.el7_9.i686.rpm025f84677045b1bc006ff4fb9b94d983e93bbafb5c5227c155801e50cee9a69fjava-1.8.0-openjdk-demo-debug-1.8.0.292.b10-1.el7_9.x86_64.rpmfe3d03c7aa5b25bbbba8bbfec4966633a33aa87bd64561c061609c0cd98cb7a1java-11-openjdk-static-libs-debug-11.0.11.0.9-1.el7_9.x86_64.rpmd5a2b4ebf25305d2d76e406d8c7425458f422b7a082c2abe2542d5304fbb9f76java-1.8.0-openjdk-devel-debug-1.8.0.292.b10-1.el7_9.i686.rpm24e32f28858eac569e35cea1acfad83e9778475a851a563f6243ebf7583b8f78java-11-openjdk-jmods-debug-11.0.11.0.9-1.el7_9.i686.rpm0d4f527254b81660e0c00bd87b366e7d938b953f30a37bc2a819f4a596a14dabjava-1.8.0-openjdk-accessibility-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm910eb565d7499e6844c58b3773f584cc6e0e2c05d3750de5452e9e2471a87507java-11-openjdk-headless-debug-11.0.11.0.9-1.el7_9.i686.rpmea7f20e35d355ba99ac2c946c02a7c2f8ce5a4d445825c5ad3929c0dac8138eajava-11-openjdk-debug-11.0.11.0.9-1.el7_9.i686.rpma2d0c0863c67920e8212c5175b77d34a9210a5febc07280fcbbc4f2b323d5a93java-11-openjdk-javadoc-debug-11.0.11.0.9-1.el7_9.i686.rpm82ebb5ea88130b5baccde7fb30ab71a4ce8e87394a7fd4c09d94ea03590eee12java-11-openjdk-javadoc-debug-11.0.11.0.9-1.el7_9.x86_64.rpm807f249ef9285c017d4dfee5c2e940521554d6c8378206c08d3cc4b1095b6aadjava-11-openjdk-devel-debug-11.0.11.0.9-1.el7_9.i686.rpmbca96f85c4ef034058789f509a0d5bb4b6677339dfdf275cdf1cfebf14239580java-1.8.0-openjdk-javadoc-debug-1.8.0.292.b10-1.el7_9.noarch.rpme8f5ec498e68ffd8e77385a6f7666685c600940e1b7c66a577294259d5a43066java-1.8.0-openjdk-accessibility-debug-1.8.0.292.b10-1.el7_9.i686.rpm1fb515ba0185aa49efac841b994ee51361d81257bc667d3674e4609211e715aajava-11-openjdk-jmods-debug-11.0.11.0.9-1.el7_9.x86_64.rpm2bdcbc12db372cf829c93a6fa9cb4b88acf5e3a49d80a069d05213adc493bfe7java-1.8.0-openjdk-demo-debug-1.8.0.292.b10-1.el7_9.i686.rpm0a1c20ad5252902044a839f3c8263fff1d22f7ea5cf00046b9cc6491932c1408java-11-openjdk-src-debug-11.0.11.0.9-1.el7_9.x86_64.rpm12a30ec6773dd5188740529f8a94d3fa98311a5609376c0f73a079eb63ef905ajava-11-openjdk-javadoc-zip-debug-11.0.11.0.9-1.el7_9.x86_64.rpm1060c8a7f5760644787be8e5ee05857ff13a5300c3823256589628ca2a701d2fSLSA-2021:1298-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9.x86_64.rpmd03c8ce0b348dd6928c11d3dfb645d2a4657f44f170706201fc479d8a627cb42java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9.x86_64.rpmadbacd36f4f9b5815f023d1a88175b6c1e014528885323bd2d05bfb02ae9f28ejava-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9.x86_64.rpm8f1e47839e3931532edd0952d2dd654a0ab2a021655e0ab0c01a2e0ab3c8e228java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9.x86_64.rpm087265fadbbacc30a0aa9e3b485705ca587ead4d557bc9244d30c797c9b5b7fbjava-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9.i686.rpm7284648b1cfbdcf5702d0ae9bf0ecf10dd9128adcbdc0cf3b951b5ff24b9b064java-1.8.0-openjdk-javadoc-1.8.0.292.b10-1.el7_9.noarch.rpmca42c18ea84acad61b4d70f3092f9a7ece7183a707fdf308926585290aab5dddjava-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9.x86_64.rpm6edeaf04168713d76c97ac60d7d99896e8c692e4aa5d0cd60229911165f2d729java-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9.i686.rpmd77c4ada5fda9a0850e0d37927c004f34a5b595a9da58dcf9a3b432ff325a164java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9.i686.rpm7213a69373655871bf60b0bc346bb499a8329615a5516b39f1daec67a15d1ebdjava-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.i686.rpm623d9d3fedf80e8038397f5569802131699c05b528dbec27d9893875c316c419java-1.8.0-openjdk-javadoc-zip-1.8.0.292.b10-1.el7_9.noarch.rpmadf23389a8a04651ea763f3883c9f77bc38564835bf1bb76599423a1071f66c2java-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9.i686.rpmdcf161f4074c15ee5784e48bbe788ea29a66a3826a3d5f9fcc2a0100baceb2dfjava-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.x86_64.rpm729ea2ffc7c834f188bd8afb5aacc960a453e5542edde397ac1eebc821ac7ab5java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9.i686.rpma5bb2b2a2acf5261549aba3fa664dd82c550f31a4e3ffc8bbe1f1cb52ebd4a6aSLSA-2021:1350-1ThunderbirdThis update upgrades Thunderbird to version 78.10.0. Security Fix(es): * Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994) * Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995) * Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961) * Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998) * Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999) * Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002) * Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945) * Mozilla: Port blocking could be bypassed (CVE-2021-29946) * Mozilla: Race condition when reading from disk while verifying signatures (CVE-2021-29948) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - thunderbird-78.10.0-1.el7_9.x86_64.rpm - thunderbird-debuginfo-78.10.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-78.10.0-1.el7_9.x86_64.rpm27ff7bb70e8a0f52811bae4fed2444655d1143c8e82d93338a5c3a20588f2fc6SLSA-2021:1354-1XstreamSecurity Fix(es): * XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet (CVE-2021-21344) * XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry (CVE-2021-21345) * XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue (CVE-2021-21346) * XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator (CVE-2021-21347) * XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader (CVE-2021-21350) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 noarch - xstream-1.3.1-13.el7_9.noarch.rpm - xstream-javadoc-1.3.1-13.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7xstream-javadoc-1.3.1-13.el7_9.noarch.rpm2ecc7fa6ee2bb422a255f7346c1a40b982110351e3e3d93daa2dcbc7ec134fb2xstream-1.3.1-13.el7_9.noarch.rpm9002183ae963575c82637c92eaf93e240c2fae160ecf24a6e2913de1a5d8637dSLSA-2021:1363-1FirefoxThis update upgrades Firefox to version 78.10.0 ESR. Security Fix(es): * Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994) * Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995) * Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961) * Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998) * Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999) * Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002) * Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945) * Mozilla: Port blocking could be bypassed (CVE-2021-29946) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - firefox-78.10.0-1.el7_9.i686.rpm - firefox-78.10.0-1.el7_9.x86_64.rpm - firefox-debuginfo-78.10.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7firefox-78.10.0-1.el7_9.i686.rpmdbeaf4541e0a177fed5c3a943650a1c55f6c5ca4be2278bf258e750e8da3258bfirefox-78.10.0-1.el7_9.x86_64.rpm668cd09b9146cfe77e64f0561ed96cc794dde90f1c701d4eaf63ae128e432131SLSA-2021:1384-1NssSecurity Fix(es): * nss: TLS 1.3 CCS flood remote DoS Attack (CVE-2020-25648) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * FTBFS: Paypal Cert expired * FTBFS: IKE CLASS_1563 fails gtest * Cannot compile code with nss headers and -Werror=strict-prototypes * CA HSM ncipher token disabled after SL-7.9 update --- SL7 x86_64 - nss-3.53.1-7.el7_9.i686.rpm - nss-3.53.1-7.el7_9.x86_64.rpm - nss-debuginfo-3.53.1-7.el7_9.i686.rpm - nss-debuginfo-3.53.1-7.el7_9.x86_64.rpm - nss-devel-3.53.1-7.el7_9.i686.rpm - nss-devel-3.53.1-7.el7_9.x86_64.rpm - nss-pkcs11-devel-3.53.1-7.el7_9.i686.rpm - nss-pkcs11-devel-3.53.1-7.el7_9.x86_64.rpm - nss-sysinit-3.53.1-7.el7_9.x86_64.rpm - nss-tools-3.53.1-7.el7_9.x86_64.rpmmoderateScientific LinuxScientific Linux 7nss-pkcs11-devel-3.53.1-7.el7_9.x86_64.rpm9de797b2cfcdc8cc229ef47fb4ec244a8feaab780959d0be0ac2e754a7965709nss-pkcs11-devel-3.53.1-7.el7_9.i686.rpm2a04e2b686baf9f3095fb36281f181cac13d70033a54c2c6478cfcde3edd16b8nss-tools-3.53.1-7.el7_9.x86_64.rpm64916d0f417c88546d00651592a19f62947019455574ac2f7b04887a6934868dnss-3.53.1-7.el7_9.i686.rpm46fa84cb2dca239707b5af9e20f16ccc5d9294315fe37e9b522bf89800dbcb3enss-devel-3.53.1-7.el7_9.i686.rpm92efd45efbd9743b4c1338be321742f0ffc9b0c2f3dc9423d465909e0891587cnss-3.53.1-7.el7_9.x86_64.rpm8a388e9732a15b191de402c4877cd8f4a610ae3f6b531180147ca991458310e4nss-devel-3.53.1-7.el7_9.x86_64.rpmc7e84f4e7bce7eaa95ae02f5ada3ca4674e75b25f31695be6fcc139129f18567nss-sysinit-3.53.1-7.el7_9.x86_64.rpm944e84dff5016a57957f4fd0e4f7ac40d2b03659d269083286aa3cc20749fabeSLSA-2021:1389-1OpenldapSecurity Fix(es): * openldap: NULL pointer dereference for unauthenticated packet in slapd (CVE-2020-25692) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - openldap-2.4.44-23.el7_9.i686.rpm - openldap-2.4.44-23.el7_9.x86_64.rpm - openldap-clients-2.4.44-23.el7_9.x86_64.rpm - openldap-debuginfo-2.4.44-23.el7_9.i686.rpm - openldap-debuginfo-2.4.44-23.el7_9.x86_64.rpm - openldap-devel-2.4.44-23.el7_9.i686.rpm - openldap-devel-2.4.44-23.el7_9.x86_64.rpm - openldap-servers-2.4.44-23.el7_9.x86_64.rpm - openldap-servers-sql-2.4.44-23.el7_9.x86_64.rpmmoderateScientific LinuxScientific Linux 7openldap-devel-2.4.44-23.el7_9.x86_64.rpmc4ab39a53ed3b7bb4f40dc04dcb331d76549a4e65f7f0b133ce34c3ad4929f6dopenldap-2.4.44-23.el7_9.x86_64.rpm7d1b468fd544df1619789b5b84c2e9bbc652e6b5b28bdc697819b0d9cc7e94b8openldap-clients-2.4.44-23.el7_9.x86_64.rpmc8b54025ff6c00c6b495fc954f5b7df7858a05b302acd95c0e9898863aa85ac9openldap-2.4.44-23.el7_9.i686.rpmfd10af55c5e2b360e0ee4415366c8a70c20d17bee41f8fba730521a9f5087edeopenldap-servers-2.4.44-23.el7_9.x86_64.rpma2a6a577481dfc70c41991fcd7fc83d5f9ef43bf8858b216813cf13e3bdd56d9openldap-servers-sql-2.4.44-23.el7_9.x86_64.rpm85aecde5a653c61d7d092db4c474810a86c2a72839d3d618dcea9e943f0d568copenldap-devel-2.4.44-23.el7_9.i686.rpm148afb143da738103e79fa5ef8fd77a8967b0badc3662c6b1a0d0705527fb980SLSA-2021:1469-1BindSecurity Fix(es): * bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - bind-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-debuginfo-9.11.4-26.P2.el7_9.5.i686.rpm - bind-debuginfo-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-devel-9.11.4-26.P2.el7_9.5.i686.rpm - bind-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-export-devel-9.11.4-26.P2.el7_9.5.i686.rpm - bind-export-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-export-libs-9.11.4-26.P2.el7_9.5.i686.rpm - bind-export-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-libs-9.11.4-26.P2.el7_9.5.i686.rpm - bind-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-libs-lite-9.11.4-26.P2.el7_9.5.i686.rpm - bind-libs-lite-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-lite-devel-9.11.4-26.P2.el7_9.5.i686.rpm - bind-lite-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-pkcs11-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.i686.rpm - bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.i686.rpm - bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-pkcs11-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-sdb-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-sdb-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm noarch - bind-license-9.11.4-26.P2.el7_9.5.noarch.rpmimportantScientific LinuxScientific Linux 7bind-export-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm5f12080002eed2b3d0a5fe0d6ba3ae0e493c0381fa9774ffdd5cee036061a661bind-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm774c99015bc2d7baa39bd1348801f0737353305e3111a2e54c4d246721f9b918bind-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm5ac89251e16484e5d8d51ec3ec74b8593b1f7e44421a4c2c2c12c739c424198abind-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm04d776e8211418700d08b85c04ec9a87f114ad6aff51b5af0f8245a9bd0ebf4bbind-9.11.4-26.P2.el7_9.5.x86_64.rpm52932470558a95a9898dd936150ba8d7d5d1494fd33b28e0fb7e3cc876e85827bind-libs-lite-9.11.4-26.P2.el7_9.5.i686.rpme09f37081e387b39c847460852f1f063d2bf45b1eb51a5faa7b908e3b1692f17bind-lite-devel-9.11.4-26.P2.el7_9.5.i686.rpm93b73fa12dd56caed82ccac43a574078149254704f2bc72a0470c26dc276ac6dbind-devel-9.11.4-26.P2.el7_9.5.i686.rpmda50831ec3b2b0082f6afb1063c471e85c72a7f9625e037f481a6ebd16df6ec8bind-libs-9.11.4-26.P2.el7_9.5.i686.rpm2434d790ef2452f0887d8bb623d4e64057327d9b96e9fc87c347075ae9a31436bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.i686.rpmc1853aeb2a81d958cce56306aa4add20566b32e562c0d813dbd7a54c72265db0bind-export-devel-9.11.4-26.P2.el7_9.5.i686.rpmdd979fdb8a371cfaf0e06724b90691e2dc742dab923870ca92f84600ac103a19bind-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm1ddb59ec131528bb776e435125a5117d5a42dbf4ccde72580fa129dc95b7f998bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm1adbfc28887c4de3d43e936db64d8e7b29ba01f03ad1087ae3b6ca4c2eb6a715bind-pkcs11-9.11.4-26.P2.el7_9.5.x86_64.rpm3519feefe599d74baeb7cc28541296e856f7c5ca3ba404acf4e8c0ae0f83a248bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.x86_64.rpmdd9591546ab81de27fd16f3f509dda1250c4eec929644d02aa9f3603f8116d81bind-sdb-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm7e0d29db6cb6308fe03e6db8b4701e2ee5d392a0d28a1bc266b4017a8af9ad62bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.i686.rpm65cd52b5f02b1cfbc2c72d324520e3e1c45762ba676522175fb1c889f682c0a2bind-sdb-9.11.4-26.P2.el7_9.5.x86_64.rpm1a54382277a41b4d57517df82f5ce170034b915e91f2e46349f10c019c3b35e6bind-license-9.11.4-26.P2.el7_9.5.noarch.rpm937c00c41008fa6a8771e1b421b4fc0d85fd86dea954d9543eb489091019d111bind-pkcs11-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm1c2bc6b788dbd7703f88045376009b98493a97ca155af266dd3ffb8a6d80481ebind-export-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm3a08818423154fa939cc02b2acfb974d8fdd7d9a6bdeb3a98cf0ac1e6aa3efe6bind-lite-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm51cea52e6d70ec317d51e8fe2e80f3b77cadb97ba8b32c168e190f9b1cc42df4bind-export-libs-9.11.4-26.P2.el7_9.5.i686.rpm5c4745efc2fba02f614bc1d5f9e45ac28360f9033761a90666e03575e78c59f6bind-libs-lite-9.11.4-26.P2.el7_9.5.x86_64.rpm7445a4d51ed6814795bc41931485e412959d1cf7e5ec5c73e6df210edb3df949SLSA-2021:1512-1PostgresqlSecurity Fix(es): * postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) * postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) * postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution (CVE-2019-10208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - postgresql-9.2.24-6.el7_9.i686.rpm - postgresql-9.2.24-6.el7_9.x86_64.rpm - postgresql-contrib-9.2.24-6.el7_9.x86_64.rpm - postgresql-debuginfo-9.2.24-6.el7_9.i686.rpm - postgresql-debuginfo-9.2.24-6.el7_9.x86_64.rpm - postgresql-devel-9.2.24-6.el7_9.i686.rpm - postgresql-devel-9.2.24-6.el7_9.x86_64.rpm - postgresql-docs-9.2.24-6.el7_9.x86_64.rpm - postgresql-libs-9.2.24-6.el7_9.i686.rpm - postgresql-libs-9.2.24-6.el7_9.x86_64.rpm - postgresql-plperl-9.2.24-6.el7_9.x86_64.rpm - postgresql-plpython-9.2.24-6.el7_9.x86_64.rpm - postgresql-pltcl-9.2.24-6.el7_9.x86_64.rpm - postgresql-server-9.2.24-6.el7_9.x86_64.rpm - postgresql-static-9.2.24-6.el7_9.i686.rpm - postgresql-static-9.2.24-6.el7_9.x86_64.rpm - postgresql-test-9.2.24-6.el7_9.x86_64.rpm - postgresql-upgrade-9.2.24-6.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7postgresql-server-9.2.24-6.el7_9.x86_64.rpm13a43265d2a3f0399dbeb8650fd44ce7cf064a5082a1a13ee263a4e5b2f2017apostgresql-devel-9.2.24-6.el7_9.x86_64.rpma46b2709b9a06be227d0a9504dc34592f8c0cc5495d41a52ad85f67d3bb4cdc4postgresql-pltcl-9.2.24-6.el7_9.x86_64.rpmdeac119a80db8d2e3c3d75857be661445fc171e4bc4aaa76595a053295bd093fpostgresql-upgrade-9.2.24-6.el7_9.x86_64.rpma1f9e294cf6a6b0dbf5472ffc42946c8eb7f6f6b999de851d7eb2f06b5b9848bpostgresql-9.2.24-6.el7_9.i686.rpm8b554d1337699f1a83589a30e426978094fc7483066b317095e3501bcca3453epostgresql-devel-9.2.24-6.el7_9.i686.rpm24e50e2bcbcd328ac72503f34bc8a23d9a680df300ad6b7c2c0feeeb4cf1129dpostgresql-9.2.24-6.el7_9.x86_64.rpmb54b8faa628b7928240cc047de9648888f6834e88fd302e1ea19e4526df7b47dpostgresql-static-9.2.24-6.el7_9.i686.rpm35c129497e7c62242bdfe8cfd5ac8ce7b3341c94bcc30ce5931ab5dbeb375552postgresql-docs-9.2.24-6.el7_9.x86_64.rpm88664b6db2f6bf2e9d987f0310bdf165b0b334591e5dcaa442ff7177a388de4epostgresql-plpython-9.2.24-6.el7_9.x86_64.rpm1dd1e6e73a83e66cd49691e2ff5d2bb0a78cafab2d756031de3a1357bfb3670epostgresql-test-9.2.24-6.el7_9.x86_64.rpm002be0d729f775fd923898a302d85600951ccbbeb44be32ad2a4839c726d6d26postgresql-plperl-9.2.24-6.el7_9.x86_64.rpma7f95a93113c7bf49d560e2e2d7f25381263e9c3e8db95bde96f3b21d0fea763postgresql-static-9.2.24-6.el7_9.x86_64.rpmb4a8eb4283bfdae2206f4419c69bf49236f8358dc7cb7728882d30bfc3f8b7bbpostgresql-libs-9.2.24-6.el7_9.x86_64.rpm477b5f0b7e2864b6503c2f5fb08b852b34dbb7eceaa411e471235aaae2a64f8apostgresql-libs-9.2.24-6.el7_9.i686.rpmd929748c04c4fc3d85556033ca3b3b50e454fee4c67ee56bfbfb64d30371a0c3postgresql-contrib-9.2.24-6.el7_9.x86_64.rpmecc7664978f843392d0baeb80516fa54aad6913d69bf6e8b5cd69bc92061020fSLSA-2021:2032-1Slapi-NisSecurity Fix(es): * slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - slapi-nis-0.56.5-4.el7_9.x86_64.rpm - slapi-nis-debuginfo-0.56.5-4.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7slapi-nis-0.56.5-4.el7_9.x86_64.rpm6dfcfec44b8eae028e7946736c04aa975f5c9a2b13e5400da680b1c9f9caf52bSLSA-2021:2033-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: XChangeFeedbackControl integer underflow leads to privilege escalation (CVE-2021-3472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - xorg-x11-server-Xdmx-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xephyr-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xnest-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xorg-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xvfb-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xwayland-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-common-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-debuginfo-1.20.4-16.el7_9.i686.rpm - xorg-x11-server-debuginfo-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-devel-1.20.4-16.el7_9.i686.rpm - xorg-x11-server-devel-1.20.4-16.el7_9.x86_64.rpm noarch - xorg-x11-server-source-1.20.4-16.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7xorg-x11-server-Xdmx-1.20.4-16.el7_9.x86_64.rpm6a2a64f392461a3b1798f2c302639c694ce80af3c9c8400fd6a4b48bd2d07f54xorg-x11-server-devel-1.20.4-16.el7_9.x86_64.rpmee7a8ed348dab7340c8d5207228f6e2bd64e0e046d079d7714ffc986001873d7xorg-x11-server-devel-1.20.4-16.el7_9.i686.rpm0cddf15d75c07eb4495bafc2e68800bc009c65ec332c60b48f6cc11276437422xorg-x11-server-Xorg-1.20.4-16.el7_9.x86_64.rpm3d263b42fd00a1bc625a17575b763e61b0e44d3770ddd403473adfa1f608602bxorg-x11-server-Xvfb-1.20.4-16.el7_9.x86_64.rpm93ed5a11123ff02f577e4714f6ee7b6948362b95c6cdae9501006c6de7567654xorg-x11-server-Xephyr-1.20.4-16.el7_9.x86_64.rpmab7c5ecda7303df4af58245291daef6c585fb946a021a625899271b965112f8exorg-x11-server-common-1.20.4-16.el7_9.x86_64.rpm20e2e6671dd40ce6f5709f9f9ca380787fee0a3b7a6c8a796bdf946b59258a58xorg-x11-server-Xwayland-1.20.4-16.el7_9.x86_64.rpm79a98194010cfed4a7a94c41206fedd321efa41aec8b350e841bcc81640e0388xorg-x11-server-Xnest-1.20.4-16.el7_9.x86_64.rpmdba96725be36791a883264af65d73262f268d36501250f164888631570cfb6d4xorg-x11-server-source-1.20.4-16.el7_9.noarch.rpmec17ae4c7d16c6c046921d42d4155b519290c9e019f112cc3165b805c7744778SLSA-2021:2147-1Glib2Security Fix(es): * glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits (CVE-2021-27219) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE ----- SL7 x86_64 - glib2-2.56.1-9.el7_9.i686.rpm - glib2-2.56.1-9.el7_9.x86_64.rpm - glib2-debuginfo-2.56.1-9.el7_9.i686.rpm - glib2-debuginfo-2.56.1-9.el7_9.x86_64.rpm - glib2-devel-2.56.1-9.el7_9.i686.rpm - glib2-devel-2.56.1-9.el7_9.x86_64.rpm - glib2-fam-2.56.1-9.el7_9.x86_64.rpm - glib2-static-2.56.1-9.el7_9.i686.rpm - glib2-static-2.56.1-9.el7_9.x86_64.rpm - glib2-tests-2.56.1-9.el7_9.x86_64.rpm noarch - glib2-doc-2.56.1-9.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7glib2-tests-2.56.1-9.el7_9.x86_64.rpm02520b0ebb0cf7e0a5e9397fb4daa2545702764867693f2deeb5b132fa2cb0c8glib2-doc-2.56.1-9.el7_9.noarch.rpm71008da68cdfc784b6dc939ea17a2de7e7e34db0694983f4e87dba4ae175bc3eglib2-2.56.1-9.el7_9.i686.rpm7c88e4ba0edbbb2d5831e0d90860a239c1b0b104ca9558ad1c1524c8cb37ce9fglib2-static-2.56.1-9.el7_9.i686.rpme455d5f1b61eb74b40d4f9dcea43818954ec8e8bbb640101a6f382e56f118061glib2-devel-2.56.1-9.el7_9.x86_64.rpmc30ed59651df9ad80a6770b71379384b5efe926628fbf4692c2bd8e8c88e52c6glib2-2.56.1-9.el7_9.x86_64.rpm7e8632f2c3557076b52c2bcd40f6e8c8799af61e4dd641a7a82a04074f453059glib2-fam-2.56.1-9.el7_9.x86_64.rpmf20e6e399f5ce60cb494f80096222050f02bc70e181261b2ba342171674e85fcglib2-static-2.56.1-9.el7_9.x86_64.rpm97ce77b9c203931971627d4b79e4a79e618a5aed74a76f464ad4596e3cfaae3cglib2-devel-2.56.1-9.el7_9.i686.rpmf5b6e9f7130c9060ead03a9eccce33b0217f061be640ed896034f10f969290ecSLSA-2021:2206-1FirefoxThis update upgrades Firefox to version 78.11.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 (CVE-2021-29967) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - firefox-78.11.0-3.el7_9.i686.rpm - firefox-78.11.0-3.el7_9.x86_64.rpm - firefox-debuginfo-78.11.0-3.el7_9.x86_64.rpmcriticalScientific LinuxScientific Linux 7firefox-78.11.0-3.el7_9.x86_64.rpm460e9b9d43dff32fec92291d72995fcc32837e1eff428ffaa799376b642c971cfirefox-78.11.0-3.el7_9.i686.rpmffa44d31cf931ba3ee78db4b3eb806f2ecd97561508a84053ab3bf7897661fdbSLSA-2021:2260-1LibwebpSecurity Fix(es): * libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) * libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) * libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - libwebp-0.3.0-10.el7_9.i686.rpm - libwebp-0.3.0-10.el7_9.x86_64.rpm - libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm - libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm - libwebp-devel-0.3.0-10.el7_9.i686.rpm - libwebp-devel-0.3.0-10.el7_9.x86_64.rpm - libwebp-java-0.3.0-10.el7_9.x86_64.rpm - libwebp-tools-0.3.0-10.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7libwebp-tools-0.3.0-10.el7_9.x86_64.rpmc45e7e543b9e9122850a55e5e94f14c3c555539e4238d302d71509fb5c558c83libwebp-devel-0.3.0-10.el7_9.x86_64.rpm0e9dea5793b1620cf4b8947c70e5b15d5e56f4b10b342d9ff46bf9cad44aa3f7libwebp-0.3.0-10.el7_9.i686.rpmc7c8944319977c15afb204ecae3b947eeaf258f7c7435675a6f8e7974029a5b2libwebp-devel-0.3.0-10.el7_9.i686.rpmab915f9d617061e7465a1e70e84cc78e43359dce1e5a44fbcedbc1c3636dd0f0libwebp-0.3.0-10.el7_9.x86_64.rpmeec5495efec86d0c336291e4b4a8529f0fc2c4b58c94dc9d397d3e20f261cf2flibwebp-java-0.3.0-10.el7_9.x86_64.rpm3052051d8334ead45132328c82d330d98df5f11bd6919b90bbdde3ffaa08263dSLSA-2021:2263-1ThunderbirdThis update upgrades Thunderbird to version 78.11.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 (CVE-2021-29967) * Mozilla: Thunderbird stored OpenPGP secret keys without master password protection (CVE-2021-29956) * Mozilla: Partial protection of inline OpenPGP message not indicated (CVE-2021-29957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - thunderbird-78.11.0-1.el7_9.x86_64.rpm - thunderbird-debuginfo-78.11.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-78.11.0-1.el7_9.x86_64.rpm14a6750cef537a37e7a776f11d13460260cb59d4cdd01c5d92b8eaa134dc1b10SLSA-2021:2305-1Microcode_CtlSecurity Fix(es): * hw: vt-d related privilege escalation (CVE-2020-24489) * hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511) * hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512) * hw: information disclosure on some Intel Atom processors (CVE-2020-24513) Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20210525 release --- SL7 x86_64 microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7microcode_ctl-2.1-73.9.el7_9.x86_64.rpm8a41f6c98891c5e2891129fbcaa9cc7ef5d648a0c4e84107665486b80a36c569SLSA-2021:2313-1SambaSecurity Fix(es): * samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * smb.service stops when samba rpms are updated * samba printing dumps core --- SL7 x86_64 libsmbclient-4.10.16-15.el7_9.i686.rpm libsmbclient-4.10.16-15.el7_9.x86_64.rpm libsmbclient-devel-4.10.16-15.el7_9.i686.rpm libsmbclient-devel-4.10.16-15.el7_9.x86_64.rpm libwbclient-4.10.16-15.el7_9.i686.rpm libwbclient-4.10.16-15.el7_9.x86_64.rpm libwbclient-devel-4.10.16-15.el7_9.i686.rpm libwbclient-devel-4.10.16-15.el7_9.x86_64.rpm samba-4.10.16-15.el7_9.x86_64.rpm samba-client-4.10.16-15.el7_9.x86_64.rpm samba-client-libs-4.10.16-15.el7_9.i686.rpm samba-client-libs-4.10.16-15.el7_9.x86_64.rpm samba-common-libs-4.10.16-15.el7_9.i686.rpm samba-common-libs-4.10.16-15.el7_9.x86_64.rpm samba-common-tools-4.10.16-15.el7_9.x86_64.rpm samba-dc-4.10.16-15.el7_9.x86_64.rpm samba-dc-libs-4.10.16-15.el7_9.x86_64.rpm samba-debuginfo-4.10.16-15.el7_9.i686.rpm samba-debuginfo-4.10.16-15.el7_9.x86_64.rpm samba-devel-4.10.16-15.el7_9.i686.rpm samba-devel-4.10.16-15.el7_9.x86_64.rpm samba-krb5-printing-4.10.16-15.el7_9.x86_64.rpm samba-libs-4.10.16-15.el7_9.i686.rpm samba-libs-4.10.16-15.el7_9.x86_64.rpm samba-python-4.10.16-15.el7_9.i686.rpm samba-python-4.10.16-15.el7_9.x86_64.rpm samba-python-test-4.10.16-15.el7_9.x86_64.rpm samba-test-4.10.16-15.el7_9.x86_64.rpm samba-test-libs-4.10.16-15.el7_9.i686.rpm samba-test-libs-4.10.16-15.el7_9.x86_64.rpm samba-vfs-glusterfs-4.10.16-15.el7_9.x86_64.rpm samba-winbind-4.10.16-15.el7_9.x86_64.rpm samba-winbind-clients-4.10.16-15.el7_9.x86_64.rpm samba-winbind-krb5-locator-4.10.16-15.el7_9.x86_64.rpm samba-winbind-modules-4.10.16-15.el7_9.i686.rpm samba-winbind-modules-4.10.16-15.el7_9.x86_64.rpm noarch samba-common-4.10.16-15.el7_9.noarch.rpm samba-pidl-4.10.16-15.el7_9.noarch.rpmmoderateScientific LinuxScientific Linux 7samba-python-4.10.16-15.el7_9.i686.rpm3bf08c96289e6609050edc7e544893b1c9a5e09067ac53e9c6c4635bd3ffb766libwbclient-devel-4.10.16-15.el7_9.x86_64.rpm541d45d9952b27d8aae45dfee62461b9ef0522eb86c1c9a86b8c33c587869b9bsamba-winbind-modules-4.10.16-15.el7_9.x86_64.rpma0077b3516a5ec8cef57b138f6161f2d1ac71edb9a0700dc84f990a5a0c93a6flibwbclient-devel-4.10.16-15.el7_9.i686.rpmfcb4911e26b223e9506ac04519eeb4e8a757270d4e51cc5f25a2de47ca037163samba-client-libs-4.10.16-15.el7_9.x86_64.rpm5d04a03b32a375baf0ae04d00724f2f0f6b75995aa54c3dd03f94264517cf6f5samba-common-libs-4.10.16-15.el7_9.x86_64.rpm9522acf0e649723e808fc7a15aa11f4047696074b59c08216271a8843bcd5da9samba-python-4.10.16-15.el7_9.x86_64.rpm1b4b8e88dc3795e20dcea916964ef368b00aa0f4de34fd51416dbb69135c0880samba-libs-4.10.16-15.el7_9.i686.rpm8b27e9c6089087bd6f05226f64bab1d7a45403695e4c9fdfdabf89ceadd0e02dsamba-test-libs-4.10.16-15.el7_9.i686.rpm9b0fe9fb48ddda3ed0f438b7ba79a3b88b1154bb9971bf3e222b55cc26c30ca4samba-dc-libs-4.10.16-15.el7_9.x86_64.rpm5e97176ca96821cf7b2987ad6778852edeefa029247ea222f178224454936116samba-libs-4.10.16-15.el7_9.x86_64.rpm963af811ad5dba4265daa8f8a64eb47b8f4125e26ecaa248ac83546b80d8777csamba-test-libs-4.10.16-15.el7_9.x86_64.rpm4693eda3daca745d78f4a07bc36c41d7d1cbc6113b521d604472a8675a6d43c4samba-devel-4.10.16-15.el7_9.x86_64.rpm4ea0d60644619ed6909a51a0d3872b005f554c96c57e86400dcb53c168ce0b65samba-python-test-4.10.16-15.el7_9.x86_64.rpmc02fa36775cde71f0544da4873695f57a7f8b3eab8db8159734475cc3011ba67samba-pidl-4.10.16-15.el7_9.noarch.rpma91fbce57c5064ae71882789184f99f7243d33673cc2b408d18c7067b49c0f27libwbclient-4.10.16-15.el7_9.x86_64.rpm45f6edf64767adcab7ad34a3ad7c63d0c4719d398df338dc169219806e1d7018samba-winbind-modules-4.10.16-15.el7_9.i686.rpm1fa938d059993bfc45d595574c6999fd4f061684fdf951118a6e83020d1416aclibwbclient-4.10.16-15.el7_9.i686.rpm0027f30c8daa1b1244fb454bb207a937744c0fe26441cd9f202eb4aba5cb7e06samba-vfs-glusterfs-4.10.16-15.el7_9.x86_64.rpmaa3617c92e2f894b6d62ade87fc696e02387bb5bc58a31accbc7ebce985ca9f0samba-common-4.10.16-15.el7_9.noarch.rpm4fb374a6298799a03fff8eab3a1b72575e00874d3de4eb9fb6902b8e34ea5bb0samba-devel-4.10.16-15.el7_9.i686.rpm5dcd901abf67c55779f7d66b45042221c291f91b06dcdd52987586c0a189b277samba-winbind-4.10.16-15.el7_9.x86_64.rpm8c73518a4061449bdcf6ea0a7b6068f710b2098d4ee1768dbc7f46ce97c33a1csamba-client-libs-4.10.16-15.el7_9.i686.rpm5800750cc72e98dca3f66cffcd98de3cdc4956705b7d15defa356a15bd0c2ab0libsmbclient-devel-4.10.16-15.el7_9.x86_64.rpm13fca3c22d89f209c28012214df13cdc52972f9572afbb7da8bc1118d70edefdsamba-test-4.10.16-15.el7_9.x86_64.rpm6fe9c97b1783752e9919df0798864794c9e8394b4f21566eeb0fc3e66194d19asamba-client-4.10.16-15.el7_9.x86_64.rpmc87e85699cd76dd6849214745a5bc836fdc9402ed58ccc7c5fd317505d1c7fb7samba-dc-4.10.16-15.el7_9.x86_64.rpm1bb49aca0d1c28f45c006f4481d6f3d2addcbcf2c03fb18da465a0c482a09a9dlibsmbclient-4.10.16-15.el7_9.i686.rpma1d617af8ba3c59a4c1374e93e31276ef7701468d90b52d93ca3a511476042f3libsmbclient-4.10.16-15.el7_9.x86_64.rpm38fcc3da40f8d15fffd50868e35dd44de40449b82a3133cf2c8ae6c624180f4dsamba-common-tools-4.10.16-15.el7_9.x86_64.rpmecf340838f6a535449d829827da7ecaf25b83e51529a606f4754c8c4eb7d2f31samba-winbind-krb5-locator-4.10.16-15.el7_9.x86_64.rpm077416a1636d36455d70022191d90ef391f7afb49da60fb87bba6c8fc0fe9fbcsamba-common-libs-4.10.16-15.el7_9.i686.rpm28fdbfa6a292b8f48ad831e6bfba4f6a7b16ba2c39c064679a1335d9201e6da7samba-4.10.16-15.el7_9.x86_64.rpm0199d755d8c5759035e92e83969a69b1bb0e6f70c63f61f61fa51d82d20f1bf3samba-krb5-printing-4.10.16-15.el7_9.x86_64.rpm3086146d97fbd2fa391f0df8be69d3bb0bcb6558f8f0720e036a046f2b05a7e5samba-winbind-clients-4.10.16-15.el7_9.x86_64.rpm42cc740c2b2a91a831f7bdc3230194787daa79abf26b1365e848d170de97ecbalibsmbclient-devel-4.10.16-15.el7_9.i686.rpm41060951f6192311613b9ab0b609916c5704ea15f3d586f9f790133820855594SLSA-2021:2314-1KernelSecurity Fix(es): * kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362) * kernel: Use after free via PI futex state (CVE-2021-3347) * kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648) * kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363) * kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364) * kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module * SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation * netfilter: reproducible deadlock on nft_log module autoload * netfilter: NULL pointer dereference in nf_tables_set_lookup() * [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for "power cap policy equal to 0 watts" * A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. * netxen driver performs poorly with RT kernel * gendisk->disk_part_tbl->last_lookup retains pointer after partition deletion * Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix * SL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path * SL7.9 - mm/THP: do not access vma->vm_mm after calling handle_userfault * raid: wrong raid io account * qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings * SL 7.9.z - System hang caused by workqueue stall in qla2xxx driver * selinux: setsebool can trigger a deadlock * [Hyper-V][SL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V --- SL7 x86_64 - bpftool-3.10.0-1160.31.1.el7.x86_64.rpm - bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm - perf-3.10.0-1160.31.1.el7.x86_64.rpm - perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - python-perf-3.10.0-1160.31.1.el7.x86_64.rpm - python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm noarch - kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm - kernel-doc-3.10.0-1160.31.1.el7.noarch.rpmimportantScientific LinuxScientific Linux 7kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpmf146169c2e1e2682199b5c6bd03bbe577981645ee5d6b934fd9e1398b794d803kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm001620ea5a1a14ea9a67858d93fdf75581592c8fb1b41b955ca9f515cd900840kernel-3.10.0-1160.31.1.el7.x86_64.rpm33b83b872b03d304dffd44ca8c30ad2ae1b11a7eef719a275521dd71211c6368kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpmb20c4f7db9b6e2720919e918298cee1a16cde0d8bb7cf6d1e8b8bec836f3551apython-perf-3.10.0-1160.31.1.el7.x86_64.rpme3b8261de98a47a78985ee7c714b02bb06d4be508fdcca23466d188ca191cc05kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpmf43dec0a3daa151b602415f6509ac6b62c604bca386112bc506124a347208b71kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm0a87d41078aad213f57ca583375d11182452104cca0b6c0a889b1183605a791cbpftool-3.10.0-1160.31.1.el7.x86_64.rpm19bb2ab022c1b5baa08e787b3b0491a830396095772e3535f8410cf775016cbbkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm15a4b566b7e4fb25a5d6f195d3301d27c7d69db5eaddf72dc0db5907a2aa903eperf-3.10.0-1160.31.1.el7.x86_64.rpmed9b20cf0449eec46adff1d83a44d964feec09ac1aea06b6eebd432a85ae4e0ekernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm4de8770b19792d3525e3a44c54654d8e56a3c66606f4b8f6982673989e65de84kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm2d242882671570f55531142c32916b7679bd8a6c8c8790de86ee3c86ae0c4bb5kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm4d6aadaec334fc5b5f1cfce3ff588e6af061c3b86948b1201e7b1e282949bcc2SLSA-2021:2318-1HivexSecurity Fix(es): * hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 hivex-1.3.10-6.11.el7_9.i686.rpm hivex-1.3.10-6.11.el7_9.x86_64.rpm hivex-debuginfo-1.3.10-6.11.el7_9.i686.rpm hivex-debuginfo-1.3.10-6.11.el7_9.x86_64.rpm hivex-devel-1.3.10-6.11.el7_9.i686.rpm hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm ocaml-hivex-1.3.10-6.11.el7_9.x86_64.rpm ocaml-hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm perl-hivex-1.3.10-6.11.el7_9.x86_64.rpm python-hivex-1.3.10-6.11.el7_9.x86_64.rpm ruby-hivex-1.3.10-6.11.el7_9.x86_64.rpmmoderateScientific LinuxScientific Linux 7ruby-hivex-1.3.10-6.11.el7_9.x86_64.rpm70ff83bd89b3a516c62a82ca22036e00b35f6d738a21541f6cfb28c336321c50ocaml-hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm7922ba897f8ba607bf961263e17cea88351ded69ff9ffb523ddc3d7a6f5d5cefhivex-1.3.10-6.11.el7_9.x86_64.rpmb4bc08184a6fcbfcf3fc701eae65c5401c847cbf052fed4c5036c7d49efdd443perl-hivex-1.3.10-6.11.el7_9.x86_64.rpm927ae1e774035bec849f0847ad3d315c9dfe5c5b859dbf4306b6ac603b45cec7hivex-devel-1.3.10-6.11.el7_9.i686.rpma3ba7c6fbac4ec4872695e6a866e3e6e6a2f0c9ce3a0086e83fee3c06d9c38behivex-devel-1.3.10-6.11.el7_9.x86_64.rpm774709ff3467b495de350f692372acc34009f17b08ef11a6b2a67cf4501f7daepython-hivex-1.3.10-6.11.el7_9.x86_64.rpmcd86f76c5c12683ceb78941a9d1af7fd142bfac23d2eb19c789ffd56e416c23aocaml-hivex-1.3.10-6.11.el7_9.x86_64.rpm9a4dc3d3fc98a74dc47aba35c26e4c41b17e28e5b0536ff2dcf64c4284a9fb8dhivex-1.3.10-6.11.el7_9.i686.rpma68119a2bc76e35331c85acf2974fbe9d0c93026c4c64174b1bca8e5fbb465edSLSA-2021:2322-1Qemu-KvmSecurity Fix(es): * QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 qemu-img-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-common-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-debuginfo-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-tools-1.5.3-175.el7_9.4.x86_64.rpmmoderateScientific LinuxScientific Linux 7qemu-kvm-1.5.3-175.el7_9.4.x86_64.rpmc9072966f802b13c51cc26cad520ba4de9a77f2725322d2c18cde51b47f50d0bqemu-img-1.5.3-175.el7_9.4.x86_64.rpm364a06918e63444100221d6472bbda6129b9b69703f44e360c611d5e55f11106qemu-kvm-tools-1.5.3-175.el7_9.4.x86_64.rpme537aa8950b76e2290bc2ae1a8a1d399e59c2423bb14751ad1f6fe5c323dc692qemu-kvm-common-1.5.3-175.el7_9.4.x86_64.rpm4aa234a0664bcf8dde65870311bce96b737b9220f914667bafe5ea22b5418114SLSA-2021:2323-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: information disclosure during the binding of a DN (CVE-2020-35518) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Add new access log keywords for time spent in work queue and actual operation time --- SL7 x86_64 389-ds-base-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-debuginfo-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-devel-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-libs-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-snmp-1.3.10.2-12.el7_9.x86_64.rpmmoderateScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.10.2-12.el7_9.x86_64.rpmbb65147d453338e7cca13421f947e9ebfc5949e1a34e3829745aafa0a071be5e389-ds-base-1.3.10.2-12.el7_9.x86_64.rpm7b3d1df912cf00d8fc800b3f6caf477abfa0325dc1ff603b5a921cdda3c98533389-ds-base-libs-1.3.10.2-12.el7_9.x86_64.rpmd717f396ae302b7ca1392319957a4b31d2c9fa8253000a12ffe78743b8ceaa01389-ds-base-devel-1.3.10.2-12.el7_9.x86_64.rpmfbe5956bda164c7d8b150849c61601a3e104c3d7d63e15b8b3aa773a5da8ced1SLSA-2021:2328-1Qt5-QtimageformatsSecurity Fix(es): * libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) * libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) * libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) * libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 qt5-qtimageformats-5.9.7-2.el7_9.i686.rpm qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.i686.rpm qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.x86_64.rpm noarch qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7qt5-qtimageformats-5.9.7-2.el7_9.i686.rpm3ae2e559638d0781783b638233cef303a46eaf2dde1f2c7ba68ca6c4db3ab4a3qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpm682d1477d439225104ba4f3a5749071cebddefddb4119c83b6d896a4c18d6375qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm4fdab3f7df2e30a71dbc732a5be85d3dfda87518d11f8c37c3defcc6517e00e7SLSA-2021:2357Important: Dhcp Security UpdateThe Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient (CVE-2021-25217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7dhcp-4.2.5-83.sl7_9.1.x86_64.rpmb287c98b390f00cbb5ebc28a9d5389e387cd1b86e3ae24b20c907aa6e80e1811dhcp-devel-4.2.5-83.sl7_9.1.x86_64.rpme4c7db95a5e4d4ca0c18209014b43b8c2d0dbcdafe4ca27e5e1c0ef8cc13bb4ddhcp-devel-4.2.5-83.sl7_9.1.i686.rpmbc9e52b40a91c46f225d2ef5033505d49d1ffbe9ea59353c7b7dc0695aa335efdhclient-4.2.5-83.sl7_9.1.x86_64.rpm8949ed6e47882dea0ea828752573794a630e70d8760ea7cb03323ceaac492d0edhcp-common-4.2.5-83.sl7_9.1.x86_64.rpm3d5dd700d355b3bdeb1501218cce589e0577778e0760e1814a4072a2cae8729fdhcp-libs-4.2.5-83.sl7_9.1.i686.rpm6aa8ea106a32c5eb0beaf64acae8951f4a0a12c7501069e3503d8d9b069db3a9dhcp-libs-4.2.5-83.sl7_9.1.x86_64.rpmc76788b9c008cf2b5b9542e4cedb2c9cbb5acd81eeae9cbf259cf1687a3566efSLSA-2021:2397-1PostgresqlSecurity Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 postgresql-9.2.24-7.el7_9.i686.rpm postgresql-9.2.24-7.el7_9.x86_64.rpm postgresql-contrib-9.2.24-7.el7_9.x86_64.rpm postgresql-debuginfo-9.2.24-7.el7_9.i686.rpm postgresql-debuginfo-9.2.24-7.el7_9.x86_64.rpm postgresql-devel-9.2.24-7.el7_9.i686.rpm postgresql-devel-9.2.24-7.el7_9.x86_64.rpm postgresql-docs-9.2.24-7.el7_9.x86_64.rpm postgresql-libs-9.2.24-7.el7_9.i686.rpm postgresql-libs-9.2.24-7.el7_9.x86_64.rpm postgresql-plperl-9.2.24-7.el7_9.x86_64.rpm postgresql-plpython-9.2.24-7.el7_9.x86_64.rpm postgresql-pltcl-9.2.24-7.el7_9.x86_64.rpm postgresql-server-9.2.24-7.el7_9.x86_64.rpm postgresql-static-9.2.24-7.el7_9.i686.rpm postgresql-static-9.2.24-7.el7_9.x86_64.rpm postgresql-test-9.2.24-7.el7_9.x86_64.rpm postgresql-upgrade-9.2.24-7.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7postgresql-libs-9.2.24-7.el7_9.x86_64.rpm3bf162c4a94a11e0b6ed4a37bf05afd25f7f0281ea35f708b088abff5cfd1c50postgresql-libs-9.2.24-7.el7_9.i686.rpmd6ebaeddc43cc67b36b83283043b378120e53eb79abfc77187671ed411226640postgresql-server-9.2.24-7.el7_9.x86_64.rpm3f94ec32306530e799b50ff670aaf6809399d1135a67a516498250689e1c8624postgresql-9.2.24-7.el7_9.x86_64.rpmf938f0b97b430cbd251a0f036e4214199df561c5dfd2f478143e5edd5bc12283postgresql-plperl-9.2.24-7.el7_9.x86_64.rpm926162483eb35a1d39e1c0e2b56b7c196697ade56bd8fb38870cff629baa3231postgresql-test-9.2.24-7.el7_9.x86_64.rpmc28b40c3f00cf23e22de580966ecd38e277a70732a7625e9da129475c056d4aapostgresql-9.2.24-7.el7_9.i686.rpmf5515ecf51a202879d66c91312b10c4214cc3995591a34391b472d601aa12775postgresql-pltcl-9.2.24-7.el7_9.x86_64.rpmfe84b2c10cc2ffc47245014647c21768c6ff7dbc3d9f0d9ac9e255700474c202postgresql-docs-9.2.24-7.el7_9.x86_64.rpm4dd6a639a699788e8a6812c960e672544e99bad708395f8a188704004044347epostgresql-static-9.2.24-7.el7_9.i686.rpm7c9e5ef8fb7eff7cb672225f57ed5c8762f3958652a4498f947e119bcc35783epostgresql-plpython-9.2.24-7.el7_9.x86_64.rpm835629aec9a254e10435f3c461b887e2a7f76e5aa91750febadffba0b0da188bpostgresql-static-9.2.24-7.el7_9.x86_64.rpm74afa4f5df7a224a93ccb22c9d8f8e7358c965e69dccae53925f169486c5faf9postgresql-upgrade-9.2.24-7.el7_9.x86_64.rpmb9ecb9b5b59a17c92985c06291051d1834f718be392b5c58f3f2aa58a1437173postgresql-devel-9.2.24-7.el7_9.x86_64.rpm78a04399dfdcc47c4302e4cf573ee64a388a3bb57a39d1ed3fd0647fbf0d6182postgresql-contrib-9.2.24-7.el7_9.x86_64.rpmd2b36cd2421c1d0cbf6d7d31daf716c8c32478593f4b1d1106cdb15afd8637cepostgresql-devel-9.2.24-7.el7_9.i686.rpmdbec064f8fdc17ab8c066186122b31b0648554619f7191ed7705d43596786098SLSA-2021:2417-1GupnpSecurity Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 gupnp-1.0.2-6.el7_9.i686.rpm gupnp-1.0.2-6.el7_9.x86_64.rpm gupnp-debuginfo-1.0.2-6.el7_9.i686.rpm gupnp-debuginfo-1.0.2-6.el7_9.x86_64.rpm gupnp-devel-1.0.2-6.el7_9.i686.rpm gupnp-devel-1.0.2-6.el7_9.x86_64.rpm noarch gupnp-docs-1.0.2-6.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7gupnp-devel-1.0.2-6.el7_9.i686.rpm7f37ce90a108e6ee1e8079e3721e199777ec5a118f40cf4052e8e8f14021dc4fgupnp-1.0.2-6.el7_9.i686.rpm2b8140194eac42849f0413eb49061b72f2bb83a3997b578451c551e39570b21agupnp-devel-1.0.2-6.el7_9.x86_64.rpmc5a7092395429e4b142cb998cc71b239d7ba6018b75fe99366f3431b97faeb61gupnp-docs-1.0.2-6.el7_9.noarch.rpm3ad612ae1e816a0cffcfc500d66b0de0598f332d4159db09e9acaab30343318fgupnp-1.0.2-6.el7_9.x86_64.rpm588c939f7fe4121ee36f425753647b2bee628fcb30a0b919cfd00b1196ecf1faSLSA-2021:2658-1LinuxptpSecurity Fix(es): * linuxptp: missing length check of forwarded messages (CVE-2021-3570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - linuxptp-2.0-2.el7_9.1.x86_64.rpm - linuxptp-debuginfo-2.0-2.el7_9.1.x86_64.rpmimportantScientific LinuxScientific Linux 7linuxptp-2.0-2.el7_9.1.x86_64.rpmcd19472fe3908a41310e91a23e649c7c8aa1c93c58af619542a150c80a6286f8SLSA-2021:2683-1XstreamSecurity Fix(es): * XStream: remote command execution attack by manipulating the processed input stream (CVE-2021-29505) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 noarch - xstream-1.3.1-14.el7_9.noarch.rpm - xstream-javadoc-1.3.1-14.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7xstream-1.3.1-14.el7_9.noarch.rpm4c0d1e279f58b3c5fc61212ae542c273a87ad83e762cf82d968befffc234abc7xstream-javadoc-1.3.1-14.el7_9.noarch.rpm5df6f91d53d3443b4aab2e3cf697e3d6a0e734dae4e6adea1b7540c6425285bcSLSA-2021:2725-1KernelSecurity Fix(es): * kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) * kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) * kernel: use-after-free in show_numa_stats function (CVE-2019-20934) * kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668) * kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * [SL7.9.z] n_tty_open: "BUG: unable to handle kernel paging request" * [ESXi][SL7.8]"qp_alloc_hypercall result = -20" / "Could not attach to queue pair with -20" with vSphere Fault Tolerance enabled * [SL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP * False-positive hard lockup detected while processing the thread state information (SysRq-T) * SL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) * The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console * nvme hangs when trying to allocate reserved tag * [REGRESSION] "call into AER handling regardless of severity" triggers do_recovery() unnecessarily on correctable PCIe errors * Module nvme_core: A double free of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). * sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! * [Hyper-V][SL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed * Kernel panic at cgroup_is_descendant * [Hyper-V][SL-7]Commits To Fix Kdump Failures * IGMPv2 JOIN packets incorrectly routed to loopback * [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] * mlx4: Fix memory allocation in mlx4_buddy_init needed * incorrect assertion on pi_state->pi_mutex.wait_lock from pi_state_update_owner() --- SL7 x86_64 bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpmimportantScientific LinuxScientific Linux 7kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm7d8ecb4acaea932f0c8952ee9af2eacba520a527bfe920b669c922ce4c52d3a9kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpmd693cdb4cf9f6b10fc9e8ed2d32390fc1d4d1a1874ab6e847afd0829cb96000akernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpmd6ae76ca47e20b280316d8ff71851d7c3a20fa3cee111d25aa2a0dd0eff7cbcckernel-doc-3.10.0-1160.36.2.el7.noarch.rpmf8e09350909d363258cabab3a793867b6f775381e1653a0be9386ad2bc9daac0kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm2aa5e3f4679a1935ddbf5185667ca13e950c2a02f8967b58f681108ca2c06314perf-3.10.0-1160.36.2.el7.x86_64.rpmfc1a425560686ecd1aeda5561dd9e31caed3feb6d9ac2290016c5f13eecaae62kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm417ba353631eb370a626496cf0124bda27d15332b74275b31f4d2b0250fb1396python-perf-3.10.0-1160.36.2.el7.x86_64.rpm04dd3ebe74791e117d40c57d072cfc09cb1769bcfd9e12019543fc850cb8d73bkernel-headers-3.10.0-1160.36.2.el7.x86_64.rpme553a94a8a993338ae132e222b1046da227d9601de7743906d1faea33856aedekernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpmb49834e7c0c65269e6ad42c1fc17aa1fdd56d4e7d76bc15bcb1f5d1efe761b4ckernel-3.10.0-1160.36.2.el7.x86_64.rpmb63017d77d981063372bbc92dc6423e9387c01668ee7c70963ff3d886ee46b19bpftool-3.10.0-1160.36.2.el7.x86_64.rpm991736f4f2fe98ff1f6740177e2ce530640dc5f9e8f866280f8db303594e1eddkernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm4fb494afeb8ebe56bdd8add70251c529ab5b5772f941d4cd6e79f9033df73acdSLSA-2021:2741-1FirefoxThis update upgrades Firefox to version 78.12.0 ESR. Security Fix(es): * Mozilla: Use-after-free in accessibility features of a document (CVE-2021-29970) * Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 (CVE-2021-29976) * chromium-browser: Out of bounds write in ANGLE (CVE-2021-30547) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - firefox-78.12.0-1.el7_9.x86_64.rpm - firefox-debuginfo-78.12.0-1.el7_9.x86_64.rpm - firefox-78.12.0-1.el7_9.i686.rpmimportantScientific LinuxScientific Linux 7firefox-78.12.0-1.el7_9.i686.rpm5072673f08d52e0ced6ac477f677481000537be1557c181c8d3483adee4f3c43firefox-78.12.0-1.el7_9.x86_64.rpm6bd823c34deaa1a1e06b0c6665122b3dc08984c22bb398d0ebbec8407e00709dSLSA-2021:2784-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) * OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) * OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 java-11-openjdk-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-debuginfo-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-debuginfo-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-demo-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-demo-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-devel-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-devel-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-headless-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-headless-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-src-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-src-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7java-11-openjdk-11.0.12.0.7-0.el7_9.x86_64.rpm2cfbae8b8d3476eb614c43a6af638d7bc64cdeeb8dfe3afa59727780cbfc3dbejava-11-openjdk-jmods-11.0.12.0.7-0.el7_9.i686.rpmad15ee4fde1e323fd53ad78545605a445f954b03c5f105e5b1277a3a7afde34bjava-11-openjdk-devel-11.0.12.0.7-0.el7_9.i686.rpm25687ef939eaf8b30fa0c0abbf000d50a7de09a91672fd87c0acc078480323eajava-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.i686.rpmd6f8f6df281e2bcb246d37938461a2d8541f5b9288a859dbab42031c82a6c13ejava-11-openjdk-jmods-11.0.12.0.7-0.el7_9.x86_64.rpm40ed18b4d88296b926addc5f3488e95a532af2616b339fb470ab89efe9b33978java-11-openjdk-demo-11.0.12.0.7-0.el7_9.i686.rpmd1c61bdfaf082840c4a026ce0ca27e5060094208f3c94057873b29510fefac34java-11-openjdk-headless-11.0.12.0.7-0.el7_9.i686.rpm580feb4e2aee7dc454c0d87c538e9940ec312de05a735fba275f9a8c8073e486java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.x86_64.rpm150df06bfcf5cf74bd9f22ae934021ae13d6fcd08072d6384ee375cab8df06ddjava-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.i686.rpm746780768d85f21edc8db369296a7d42784cf171564bf91a58a9abcbf2bd3524java-11-openjdk-demo-11.0.12.0.7-0.el7_9.x86_64.rpm6184086c04b7d5ae668b69ea271b49b1ff9356adc659f3eadbce14734e4a87b6java-11-openjdk-src-11.0.12.0.7-0.el7_9.x86_64.rpm4d750ffee5def8f1e7d24404502ed102a8d97ebfa149fdd56cf181143601b41bjava-11-openjdk-devel-11.0.12.0.7-0.el7_9.x86_64.rpm187524191dca7a5b7755f688d53c427c6adfd6f9ee6e62f30dd05a9c970286bajava-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.x86_64.rpmb6a9d24c04f3d17ad62478855251401aa36facff2e016c9422088886e7f1b9c2java-11-openjdk-headless-11.0.12.0.7-0.el7_9.x86_64.rpm2526e65ef5fe50f6864eaeebbfcc62e9010ec568c8d08efb4a466522cdaab033java-11-openjdk-11.0.12.0.7-0.el7_9.i686.rpm1dbca9adc5784430935d62f33177b1aa29a37c6e8c592daa40f3af23eca1fcbajava-11-openjdk-src-11.0.12.0.7-0.el7_9.i686.rpm2c55847b071127c9c423665e36666ad4b0cc399fa8e157ae742a593d32f26999java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.x86_64.rpm397dc94ccadf1cc07ed6b9eec704486ee3e120916bf81bf6301f464245b85f13SLSA-2021:2845Important: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) * OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) * OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * JDK-8266279: 8u292 NoSuchAlgorithmException unrecognized algorithm name: PBEWithSHA1AndDESede (BZ#1960024) importantScientific Linux 7java-1.8.0-openjdk-accessibility-debug-1.8.0.302.b08-0.el7_9.i686.rpm503e87717a057cf98c785b42ef1384df5b43e070f134568c9763153dfdab5d51java-1.8.0-openjdk-src-debug-1.8.0.302.b08-0.el7_9.i686.rpm259e7edd8a077d3d9ce857d1824f5b35ec233b0e3612791cdd16f353ff338365java-1.8.0-openjdk-javadoc-debug-1.8.0.302.b08-0.el7_9.noarch.rpm9fb2415f774c0bf1bf64e3ca720709260ba99b60591718237bcfbcf330134281java-11-openjdk-jmods-debug-11.0.12.0.7-0.el7_9.x86_64.rpmb644e8d999f05d3ed440a9c478aade5487b180429bcfccda9c3d52d58b7c65eajava-11-openjdk-devel-debug-11.0.12.0.7-0.el7_9.i686.rpm6941da52a5e6aeb5a9ca86d8e02521978761a2c026daea27977be3f54b37b769java-1.8.0-openjdk-demo-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm541dfc3f577bd50b00f3f67b7a7ecadfaeabbef5d8016103c289ef48f2dd44c8java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7_9.x86_64.rpma226ad0efd2ba486b68d189957ded0cfeda686213b2a9dc7cc8c484b476fdb26java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.302.b08-0.el7_9.noarch.rpm4deef6abdb8819c181e3e10bd2bc1435ce2d3ca77b1e543189d7780b4d42cffajava-11-openjdk-jmods-debug-11.0.12.0.7-0.el7_9.i686.rpm2a668ff27d9a45507afe1c7daa7c2115814b968bcf1d54de45261aa379fa2476java-1.8.0-openjdk-demo-debug-1.8.0.302.b08-0.el7_9.i686.rpmb66530714e9689b2d24e88327a6116eece12fdfbb14e0a237e28595634cc2643java-11-openjdk-debug-11.0.12.0.7-0.el7_9.x86_64.rpm5545de2e2433d0b52c06f627eef8279a858657c96b833013c9c704cbbfd42034java-1.8.0-openjdk-src-debug-1.8.0.302.b08-0.el7_9.x86_64.rpme9bca973fbcf25a83c3a27cef032e16a667633b886f58940d0129888264db818java-1.8.0-openjdk-debug-1.8.0.302.b08-0.el7_9.x86_64.rpma5dd961b429af5889ef9d24cc0c2ca22f97a260e4e2d06d09fec06babd6ddd6ejava-11-openjdk-debug-11.0.12.0.7-0.el7_9.i686.rpm0c1e27807db8a30ef27d4000333703e9e134efc0ccd79de0845cf4fdc5db3307java-11-openjdk-src-debug-11.0.12.0.7-0.el7_9.i686.rpmd1251ab40d2373fde3711c8dc81bd3fca599f1bffa6888ec1ab546723259bff1java-11-openjdk-src-debug-11.0.12.0.7-0.el7_9.x86_64.rpm572292710adf20d1d3e3f646d3e469df5e23a2707f6969b99cad7eadba74ae0cjava-11-openjdk-demo-debug-11.0.12.0.7-0.el7_9.i686.rpm82b8c2cf3276139d9c1e7009866560a1d932d1582c115b8c6ba832eb3a434f0djava-11-openjdk-headless-debug-11.0.12.0.7-0.el7_9.x86_64.rpm313bc9f9712f72a4998b928f92c3061c467de050947f6bb6d354070e7159a3a4java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7_9.i686.rpm2fb087a780d001dd55ac9e2193645a69bd55386d1fc74fc3ae9e8d28919f3005java-11-openjdk-demo-debug-11.0.12.0.7-0.el7_9.x86_64.rpma87d815fcd33fd6689134ad748c41768af50ed81f886369c84fb7a8ca248a8e8java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7_9.i686.rpm1d2354f323d57fe9229b7afa9293317af44c9ba4e5b5b289591ba50eb7e962a7java-1.8.0-openjdk-headless-debug-1.8.0.302.b08-0.el7_9.i686.rpmd6ae82ec8de7558797b089df7750c7d8043ff0fd895722fadce95d404a16e422java-11-openjdk-static-libs-debug-11.0.12.0.7-0.el7_9.x86_64.rpm2b750a81c4d4f4daeb1ba6aa6a7deccd4325451b3d5736ad9ad981d8bdf54f7ejava-1.8.0-openjdk-devel-debug-1.8.0.302.b08-0.el7_9.i686.rpmf2f4bf7e53f3bfefdc14a881813f261aae9ecd7b7e65e40ae410beb7ea6e6f40java-11-openjdk-devel-debug-11.0.12.0.7-0.el7_9.x86_64.rpm95512f993250891c7b8d2bd6a28bce89ef846eac9aab79b6b9548aaeef057d63java-11-openjdk-headless-debug-11.0.12.0.7-0.el7_9.i686.rpmb84bed334da15fc88b6068df346078fe950ec81cf592cee0939e8d4edf4dd106java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7_9.x86_64.rpme107bf56f04db02fae2ca8d6c7291540e124e4584ac0b79ece4e20ca22d47139java-1.8.0-openjdk-debug-1.8.0.302.b08-0.el7_9.i686.rpm0c476704f8568af73f4fd8241fd3cf6717eb3984305f8da7e27cc0c9e813e1bajava-1.8.0-openjdk-headless-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm7f2476266ea1139f00956d3018d57d890711b16f79f7d1522d804bbb1bde309bjava-1.8.0-openjdk-devel-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm45ab1bf63c939aae68e150fd5c785298bacd2f38655484d1377f65ce487cfa61java-1.8.0-openjdk-accessibility-debug-1.8.0.302.b08-0.el7_9.x86_64.rpmc71f143b109dbc85c5c4a2574e09c4cde1039b780420e71eae2ccaceaa7c0764SLSA-2021:2845-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) * OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) * OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * JDK-8266279: 8u292 NoSuchAlgorithmException unrecognized algorithm name: PBEWithSHA1AndDESede --- SL7 x86_64 java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-debuginfo-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.x86_64.rpm noarch java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.i686.rpm39f9af7346d534f2002887db9f4ff695de79b3ad2499d212e2a0e45eb9fb92bcjava-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.i686.rpm7f3321a3d27853c3087f2e2bca65e30dcaabcbba6169ac009e11cecbda85b476java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.i686.rpm4cf1b2f740d587ce33a1a07625b21d3eb96a97cb3f66c14776a435fa3af479e5java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9.noarch.rpm28f81e124f6d9bb59da40a64297d73b483a577f19c24f1eeba78d08ca6e03146java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9.noarch.rpm9c576e635bfce44eda493bd2d4537d0285dcf6e5ad65ec6921bdb827b568cd56java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.x86_64.rpm06df563cb9a22f4fb86978044e3ccd7fc77e0045f8d0b6bde77bf762d86ab6eejava-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.x86_64.rpmfe7868ec6c87bbfa14b5dbcb2c0c2f62890dfe9bf9908960fdaad79c3309bc90java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.i686.rpmc421080fae04fe01329bad7393633aecec64a7007bca4156f48610dba07dde8fjava-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.x86_64.rpm3964f8ce990919fe3aad915412fa4e49987fffd234eefc1564a40b1aace539b8java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.i686.rpmed38b6dd0cdd0699af0fd65385edc050199398f3907f853a84a7b243aa4d7f52java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.x86_64.rpm72e7ced455969605907a30370a3ead4e2d3a45236aa28550ceff34ccabda5eacjava-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.i686.rpme115f53dc308a75e1993d8ac0442465084d4f7798612b77bc490d389a5f53e61java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.x86_64.rpm5e8345b76c0310784eba308e4f94cfb60c33984b23bd62bde384e85997279035java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.x86_64.rpmb519d21b168768ab0745f0f53f5288f58bbb7f070944c8e7dce3d5a0be6bd5e4SLSA-2021:2881-1ThunderbirdThis update upgrades Thunderbird to version 78.12.0. Security Fix(es): * Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed (CVE-2021-29969) * Mozilla: Use-after-free in accessibility features of a document (CVE-2021-29970) * Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 (CVE-2021-29976) * chromium-browser: Out of bounds write in ANGLE (CVE-2021-30547) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - thunderbird-78.12.0-2.el7_9.x86_64.rpm - thunderbird-debuginfo-78.12.0-2.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-78.12.0-2.el7_9.x86_64.rpm91806481c6fc65fcd2f5ae3c3fff8150b7982eb1f02226c2f8681d50cb369576SLSA-2021:2989-1LassoSecurity Fix(es): * lasso: XML signature wrapping vulnerability when parsing SAML responses (CVE-2021-28091) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - lasso-2.5.1-8.el7_9.i686.rpm - lasso-2.5.1-8.el7_9.x86_64.rpm - lasso-debuginfo-2.5.1-8.el7_9.i686.rpm - lasso-debuginfo-2.5.1-8.el7_9.x86_64.rpm - lasso-devel-2.5.1-8.el7_9.i686.rpm - lasso-devel-2.5.1-8.el7_9.x86_64.rpm - lasso-python-2.5.1-8.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7lasso-2.5.1-8.el7_9.i686.rpm98e13a86c7880b2fbe273dfbf02fe9588b53ea0a7308376a53cd6989eda2f856lasso-2.5.1-8.el7_9.x86_64.rpmcf2896c9af6e17896a050bac5d3866525ed0e43c7f50fd394c1d969edab0acc0lasso-devel-2.5.1-8.el7_9.x86_64.rpm682530e22a43541c96014fca60914ed9c36f229b28084a66b91e2cc6875ffc50lasso-python-2.5.1-8.el7_9.x86_64.rpmbfefa00287b78344a058232d34d74688113e0715f55b2f550cd5b7989d83c7dalasso-devel-2.5.1-8.el7_9.i686.rpm619d5eda91dfad8c51da2b01d131aa662754e2d057ba75501cec5e9e572d32fdSLSA-2021:3028-1Microcode_CtlSecurity Fix(es): * hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) * hw: Vector Register Data Sampling (CVE-2020-0548) * hw: L1D Cache Eviction Sampling (CVE-2020-0549) * hw: vt-d related privilege escalation (CVE-2020-24489) * hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511) * hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512) * hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) * hw: Vector Register Leakage-Active (CVE-2020-8696) * hw: Fast forward store predictor (CVE-2020-8698) --- SL7 x86_64 - microcode_ctl-2.1-73.11.el7_9.x86_64.rpm - microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7microcode_ctl-2.1-73.11.el7_9.x86_64.rpm88a9b7faaa2f8bcfa45c883d79da8855fedf161b102a41ba91c8e7a8cda723dbSLSA-2021:3154-1FirefoxThis update upgrades Firefox to version 78.13.0 ESR. Security Fix(es): * Mozilla: Uninitialized memory in a canvas object could have led to memory corruption (CVE-2021-29980) * Mozilla: Incorrect instruction reordering during JIT optimization (CVE-2021-29984) * Mozilla: Race condition when resolving DNS names could have led to memory corruption (CVE-2021-29986) * Mozilla: Memory corruption as a result of incorrect style treatment (CVE-2021-29988) * Mozilla: Memory safety bugs fixed in Thunderbird 78.13 (CVE-2021-29989) * Mozilla: Use-after-free media channels (CVE-2021-29985) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-78.13.0-2.el7_9.x86_64.rpmbc41b16a9bca16b2a8ce95bcdc37b7988f20720b9cd4f7c0f2e74ed0bd1803d2firefox-78.13.0-2.el7_9.i686.rpmd8449a4c77bed4b52ed6429f3ec3079091b241740fd34a67fbf54e789db5c80aSLSA-2021:3158-1Exiv2Security Fix(es): * exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7exiv2-libs-0.27.0-4.el7_8.i686.rpm6e1655bac655b79fcef547510c9571d75eed3867a13c3c1df24e9ebb7f488e88exiv2-libs-0.27.0-4.el7_8.x86_64.rpmc80106ec40162ef5482829b34e6a1f488a5896145e62988f50069d3a7a3ca99dexiv2-devel-0.27.0-4.el7_8.i686.rpm4c33360ef1a27e17ecb897829b29dcc92ede55fed680d7ecae084ecf15a751f5exiv2-0.27.0-4.el7_8.x86_64.rpm2ad983d2240087ea19daa9c8345c687256c2dfbd767739c4dac6868e3a2800cfexiv2-doc-0.27.0-4.el7_8.noarch.rpm72bbcd2f72146fc524ea043f551cadd8cc7a3b6757fada666865e346171d71a3exiv2-devel-0.27.0-4.el7_8.x86_64.rpm6a7ed5be881d54c881fdb41359fa7b90c508fef7321cf4f588e72503777795e6SLSA-2021:3160-1ThunderbirdThis update upgrades Thunderbird to version 78.13.0. Security Fix(es): * Mozilla: Uninitialized memory in a canvas object could have led to memory corruption (CVE-2021-29980) * Mozilla: Incorrect instruction reordering during JIT optimization (CVE-2021-29984) * Mozilla: Race condition when resolving DNS names could have led to memory corruption (CVE-2021-29986) * Mozilla: Memory corruption as a result of incorrect style treatment (CVE-2021-29988) * Mozilla: Memory safety bugs fixed in Thunderbird 78.13 (CVE-2021-29989) * Mozilla: Use-after-free media channels (CVE-2021-29985) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-78.13.0-1.el7_9.x86_64.rpma1c089fd6ce1fef0bef27a525a9745cc2d310cf48d4b9483805b199e86ed5edaSLSA-2021:3233-1Compat-Exiv2-026Security Fix(es): * exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE7 --- SL7 x86_64 - compat-exiv2-026-0.26-3.el7_9.i686.rpm - compat-exiv2-026-0.26-3.el7_9.x86_64.rpm - compat-exiv2-026-debuginfo-0.26-3.el7_9.i686.rpm - compat-exiv2-026-debuginfo-0.26-3.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7compat-exiv2-026-0.26-3.el7_9.i686.rpm9a34a4f44f655124edba74a73224379e4b27c9deb32651cf533c6a61f5086f19compat-exiv2-026-0.26-3.el7_9.x86_64.rpm0033a683cc63d68e7a84dec2d25b02285145f3fb9df32a933ba26d0b87176ee6SLSA-2021:3234-1Compat-Exiv2-023Security Fix(es): * exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE7 --- SL7 x86_64 - compat-exiv2-023-0.23-2.el7_9.i686.rpm - compat-exiv2-023-0.23-2.el7_9.x86_64.rpm - compat-exiv2-023-debuginfo-0.23-2.el7_9.i686.rpm - compat-exiv2-023-debuginfo-0.23-2.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7compat-exiv2-023-0.23-2.el7_9.i686.rpm234b3ac49dc1dedc349059d07f01a8eabf9899d69b359b6979ecd193a1ebc096compat-exiv2-023-0.23-2.el7_9.x86_64.rpme99bc81d83364f6f684739c64f04bf3cece758e5bea3d7a2e61ddb943dae32cbSLSA-2021:3295-1LibsndfileSecurity Fix(es): * libsndfile: Heap buffer overflow via crafted WAV file allows arbitrary code execution (CVE-2021-3246) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 libsndfile-1.0.25-12.el7_9.1.i686.rpm libsndfile-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-debuginfo-1.0.25-12.el7_9.1.i686.rpm libsndfile-debuginfo-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-devel-1.0.25-12.el7_9.1.i686.rpm libsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpmimportantScientific LinuxScientific Linux 7libsndfile-devel-1.0.25-12.el7_9.1.i686.rpmb3910769e141cfeeab716a19e97939dd241377aaf55821ec9c642af011d0c59clibsndfile-1.0.25-12.el7_9.1.i686.rpm5bab9fed88e6b7fc23592c9da41f699d431160f44e271d4f2fb1b1f2865ba15clibsndfile-1.0.25-12.el7_9.1.x86_64.rpmac61969886fb56f38f2e298136eeb397bee1a22271feeefdb8aed0fbe2a47fealibsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpme117477a7875c688069d8b033df530da34e18628510e18d2921cf3760f13ef08libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpmd15484d0294af5ee8e1392da70f43fa812df27b7c642d79aa0ce936fea1678deSLSA-2021:3296-1Libx11Security Fix(es): * libX11: missing request length checks (CVE-2021-31535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 libX11-1.6.7-4.el7_9.i686.rpm libX11-1.6.7-4.el7_9.x86_64.rpm libX11-debuginfo-1.6.7-4.el7_9.i686.rpm libX11-debuginfo-1.6.7-4.el7_9.x86_64.rpm libX11-devel-1.6.7-4.el7_9.i686.rpm libX11-devel-1.6.7-4.el7_9.x86_64.rpm noarch libX11-common-1.6.7-4.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7libX11-devel-1.6.7-4.el7_9.i686.rpm4f1dc1fb871116b82794ae3b0432e5ac521ed6811611740cac68e62621e8665elibX11-1.6.7-4.el7_9.x86_64.rpm805486b69ea140fa070aa6e28a15a8eb5519e592811c4325acd906d695829340libX11-common-1.6.7-4.el7_9.noarch.rpmff2dbbb2c0c4168eb25f248e7952404ca464f7fbd7974343f2412003abeefd84libX11-1.6.7-4.el7_9.i686.rpm6ff763fc3c4042a91cdf2b63763bc28f35cea891d46a78da3f6198bfeb148d9dlibX11-devel-1.6.7-4.el7_9.x86_64.rpm6be63062aaaf4e8d6329b503577de87342b48cc2acfe3cd690e80f83f1c465e9SLSA-2021:3325-1BindSecurity Fix(es): * bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly (CVE-2021-25214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 bind-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-debuginfo-9.11.4-26.P2.el7_9.7.i686.rpm bind-debuginfo-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-export-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-export-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-export-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-export-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-libs-lite-9.11.4-26.P2.el7_9.7.i686.rpm bind-libs-lite-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-lite-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-lite-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-sdb-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-sdb-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm noarch bind-license-9.11.4-26.P2.el7_9.7.noarch.rpmmoderateScientific LinuxScientific Linux 7bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm0f664c4582d87086632bceea130dad5c9230205974fc1fd51d574d14c36ab72dbind-export-libs-9.11.4-26.P2.el7_9.7.i686.rpm1cd8a4c5be34e924728330c8921f4c162287c484621027417858c3183977b943bind-export-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm40e8e2e47fe864b27bdff476ba1dad290b8b84e1d5e837d5a301928cd4e9b22dbind-libs-lite-9.11.4-26.P2.el7_9.7.x86_64.rpm99baf1d0b90af916bf4caabeadbbe04b73fd490b2a3d0b0d12dba8142c111475bind-devel-9.11.4-26.P2.el7_9.7.x86_64.rpmad423e367926bac84af867f8282f16fc859526a6d503174c675ce8daeb36ff20bind-export-devel-9.11.4-26.P2.el7_9.7.x86_64.rpme5a515e291fab1fa300a30f05511e81411bf61fffd47380944fe4ef5f4693f55bind-lite-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm0253dfb5a08f373842c240c84f0c1eb9171f2ab8e08eeb5126ed3e70a8871921bind-sdb-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpmfa207b6f9321b18c5f525bbb91903bcefa94e530f6c5f17a191925f8cca21681bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.i686.rpmffb34baf93dc78b8c3204a0dfc3e40e5309b130a02aca8e9884ad591b9fd2b61bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.x86_64.rpma6bdf31288be4ca1ee0031c86acb9a40d3258e3d5ba84c431ce77712557534c3bind-libs-lite-9.11.4-26.P2.el7_9.7.i686.rpmb28cab1232e3b1c4c311f24af1f39361f4226651a3061082343f922b856a78b6bind-9.11.4-26.P2.el7_9.7.x86_64.rpm2cf14f362fac3cec4e32deaa2a6ddbcb64700936117dae0cdbbb64f007552d0cbind-lite-devel-9.11.4-26.P2.el7_9.7.i686.rpmf22a802c9f3559615c63df34546aec823b984569735e37463de73ccbfbe9c868bind-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpme50f60168b6033107d65d1dc2047d457f4aaa792d2c8ca4435aff8fb3d7f2395bind-sdb-9.11.4-26.P2.el7_9.7.x86_64.rpm99f00d3261d884dc7d8d6ebc32efa082e4187ecddb4ccfcf9231f9ac35560b64bind-license-9.11.4-26.P2.el7_9.7.noarch.rpm422f7a25a275aa9ef9fe2d98e9f90d28648c8e18d6fb337841fd12b2e16a4f44bind-export-devel-9.11.4-26.P2.el7_9.7.i686.rpmfdee061bae052b6d4d5a92910f14a1633cec37d16509a941cff19cb6e1930ffdbind-libs-9.11.4-26.P2.el7_9.7.i686.rpm034fe87eea2d8b5a2124400aae03a472c9a0d622fb25800e6fbbcd5259e30557bind-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm193531fe7702ea7dda0cb4ef0d7b32d6a503d4d2a96b684a9b4859207e7e66f7bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm229169f1dcd87871c084babd1b0c907de4221b2ec3e89d5083a01689da89a197bind-pkcs11-9.11.4-26.P2.el7_9.7.x86_64.rpm327434f2010bf6e5d1eff08dcaaaa092d11d21299aa111e62ff028d204436379bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.i686.rpmfc2533dea2c78321b310a83c63524e905b24276818acd9ae171bb5b96cc1efddbind-devel-9.11.4-26.P2.el7_9.7.i686.rpm69df49b5752140ef781df58fd756fbba32875b4988a055c654dab339bbf8cacfbind-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm8176d6c537943acedcdfa817652ed8ce382144a789085c0227d8563c6836cb37SLSA-2021:3327-1KernelSecurity Fix(es): * kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555) * kernel: race condition for removal of the HCI controller (CVE-2021-32399) * kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777) * kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) * kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * SAN Switch rebooted and caused (?) OpenStack compute node to reboot * sysfs: cannot create duplicate filename '/class/mdio_bus/ixgbe-8100 * XFS: read-only recovery does not update free space accounting in superblock * The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. * Backport of upstream patch "net: Update window_clamp if SOCK_RCVBUF is set " into rhel-7 * Kernel panic in init_cq_frag_buf * futex: futex_requeue can potentially free the pi_state structure twice * be_poll lockup doing ifenslave when netconsole using bond * OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() --- SL7 x86_64 bpftool-3.10.0-1160.41.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.41.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm perf-3.10.0-1160.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm python-perf-3.10.0-1160.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm kernel-doc-3.10.0-1160.41.1.el7.noarch.rpmimportantScientific LinuxScientific Linux 7kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm5bcfdad599b44925e1230949969a60903487c392b6e40aa5c2d725271d6f82d3kernel-doc-3.10.0-1160.41.1.el7.noarch.rpmc5910ab8910fff70be6016751415352f55198ccdc8e11735da61c6775f76b8eaperf-3.10.0-1160.41.1.el7.x86_64.rpm53538846f19e0fecbbfc76ea664e44b0a60c548785d2d331086baf4ef3b998c9bpftool-3.10.0-1160.41.1.el7.x86_64.rpm5115b684a64e594c10a8202c5e951f143eac59a7f75382e2d65c9104202df150kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpmf16c223fe64df7ea47ff1eed29a0833e150e50412c49e240397c13d1df363847python-perf-3.10.0-1160.41.1.el7.x86_64.rpmd1df2230944d9712346af10fc36e683be7ed322084d36ca609f13f7c15bc4450kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm5a2b5d848316fbd08d1315a721b6875c2c9d367307e5b52ed148f2dfdb396b8akernel-3.10.0-1160.41.1.el7.x86_64.rpm324b80fdf429db9c8c98848d4d3c5e453165c7fa6e8860df88383454c6f60123kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm5a2fc8257aecdaf5d27f57952b69b2b1cd42f8472842e3647c5a3ac9e0ca1e6bkernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm7929926bcb7e8857a134ae7c4e173c7ff2387cad23370fecf0118c7351b545aakernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm5c891a7b590d142e84b1a975f57cc6192bc5e4f116fb485c5b7d1d367822a486kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpmd250b4cdfb1d8ea7986d3dee2694eb112445103c3fd9f7e633ed1565034b8190kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm8d9bf7379a529f839def865bd2276337a3154d516043688b9669a388309e171dSLSA-2021:3336-1SssdSecurity Fix(es): * sssd: shell command injection in sssctl (CVE-2021-3621) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Memory leak in the simple access provider * id lookup is failing intermittently * SSSD is NOT able to contact the Global Catalog when local site is down * Missing search index for `originalADgidNumber` --- SL7 x86_64 libipa_hbac-1.16.5-10.el7_9.10.i686.rpm libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm libipa_hbac-devel-1.16.5-10.el7_9.10.i686.rpm libipa_hbac-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_autofs-1.16.5-10.el7_9.10.x86_64.rpm libsss_certmap-1.16.5-10.el7_9.10.i686.rpm libsss_certmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_certmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_certmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_idmap-1.16.5-10.el7_9.10.i686.rpm libsss_idmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_nss_idmap-1.16.5-10.el7_9.10.i686.rpm libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_nss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_nss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_simpleifp-1.16.5-10.el7_9.10.i686.rpm libsss_simpleifp-1.16.5-10.el7_9.10.x86_64.rpm libsss_simpleifp-devel-1.16.5-10.el7_9.10.i686.rpm libsss_simpleifp-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_sudo-1.16.5-10.el7_9.10.x86_64.rpm python-libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm python-libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm python-sss-1.16.5-10.el7_9.10.x86_64.rpm python-sss-murmur-1.16.5-10.el7_9.10.x86_64.rpm sssd-1.16.5-10.el7_9.10.x86_64.rpm sssd-ad-1.16.5-10.el7_9.10.x86_64.rpm sssd-client-1.16.5-10.el7_9.10.i686.rpm sssd-client-1.16.5-10.el7_9.10.x86_64.rpm sssd-common-1.16.5-10.el7_9.10.x86_64.rpm sssd-common-pac-1.16.5-10.el7_9.10.x86_64.rpm sssd-dbus-1.16.5-10.el7_9.10.x86_64.rpm sssd-debuginfo-1.16.5-10.el7_9.10.i686.rpm sssd-debuginfo-1.16.5-10.el7_9.10.x86_64.rpm sssd-ipa-1.16.5-10.el7_9.10.x86_64.rpm sssd-kcm-1.16.5-10.el7_9.10.x86_64.rpm sssd-krb5-1.16.5-10.el7_9.10.x86_64.rpm sssd-krb5-common-1.16.5-10.el7_9.10.x86_64.rpm sssd-ldap-1.16.5-10.el7_9.10.x86_64.rpm sssd-libwbclient-1.16.5-10.el7_9.10.x86_64.rpm sssd-libwbclient-devel-1.16.5-10.el7_9.10.i686.rpm sssd-libwbclient-devel-1.16.5-10.el7_9.10.x86_64.rpm sssd-polkit-rules-1.16.5-10.el7_9.10.x86_64.rpm sssd-proxy-1.16.5-10.el7_9.10.x86_64.rpm sssd-tools-1.16.5-10.el7_9.10.x86_64.rpm sssd-winbind-idmap-1.16.5-10.el7_9.10.x86_64.rpm noarch python-sssdconfig-1.16.5-10.el7_9.10.noarch.rpmimportantScientific LinuxScientific Linux 7sssd-dbus-1.16.5-10.el7_9.10.x86_64.rpmebb500e796d30ffc9ae912ac078355a34859ccf1d9c9943c71bc45092fd12807python-libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm3e2050e95d1f3ebbb8271671852b412420ea280154df550e557cc7f7dec227a3sssd-ipa-1.16.5-10.el7_9.10.x86_64.rpm76508a713e696581eb1ee4c0ba6d0d9592f2b556016c9355fbc7bf70996c394fsssd-ldap-1.16.5-10.el7_9.10.x86_64.rpm7fb5e25b4f03d4489ec688e682425380885ba49c76de9e762c8a81eae88fdfc9libsss_simpleifp-devel-1.16.5-10.el7_9.10.i686.rpm8cdffd4f636e874abb4110c23062d2ebce093fd02f87da5a87475c850d4604e6sssd-kcm-1.16.5-10.el7_9.10.x86_64.rpm7245184b18feab0c075c6ca5d1d5079d2717f7b12750783548737d42b150b642libsss_simpleifp-1.16.5-10.el7_9.10.i686.rpmaf1a1ac20c407907416e0be39c90ad91aedf44f51b44d33e60c6702d68a06a40libsss_simpleifp-devel-1.16.5-10.el7_9.10.x86_64.rpmbfefb570ae1a9957ca8e43705108387e0a14e3f7f4611f67b813db9c11a701dfpython-sssdconfig-1.16.5-10.el7_9.10.noarch.rpm6b4d7c87a9ff71f3b8d1d4067556d7662ab771ac880d3b53f221709398d60844sssd-krb5-common-1.16.5-10.el7_9.10.x86_64.rpmbd26b00fcbb063337b26d054ad72e0cf9cb0796bed0c3ed6e5ac1eb641cc5bdepython-sss-murmur-1.16.5-10.el7_9.10.x86_64.rpm8d3cf5f00e6b887d17584b95d1664335f1d493f4719111f66504e4f365b57cf2libsss_autofs-1.16.5-10.el7_9.10.x86_64.rpm34810b9bfaf523bc510c3fde66eacd512f7f44639585db09c2fb5259edf6fc03libipa_hbac-devel-1.16.5-10.el7_9.10.i686.rpm48bf468fa6075da60c140bae64400741d3c858f72cb9842f6a58b6683a80e119python-sss-1.16.5-10.el7_9.10.x86_64.rpm6f0917b948a1f3cdd4653cc8b5cf7286eca4114dad2fb958e4a8f9c434bf7f59libsss_nss_idmap-devel-1.16.5-10.el7_9.10.i686.rpmce516026800a8ce723d4cb667c391e353f61fbe2415518d1274210ea72ae79a5sssd-libwbclient-devel-1.16.5-10.el7_9.10.x86_64.rpm9047dbc282b156b53582dc43090e0f8afe87cf64f53ba5525dc26b285f138fd0sssd-winbind-idmap-1.16.5-10.el7_9.10.x86_64.rpm99a3b8b9bff033a5bcdffa7cc798b359778a9e72a882843e4ab56335045499a4sssd-common-1.16.5-10.el7_9.10.x86_64.rpmcc88d2d2ec3ba8cabfd75a9664233edde6b813716e2f9c0ef0c1e181a806473csssd-common-pac-1.16.5-10.el7_9.10.x86_64.rpm0f1d572f4ca4496b4a6f74c90afd87bf42b343ff9f79a250754fc95a4af48de8sssd-1.16.5-10.el7_9.10.x86_64.rpm15cd608affb1ee07c97297add43aafc5c12fa8cee1d6ad26a618e3d72aaa3291libsss_nss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm21634c7c16563a1ca96bebeff099b00a9b6cb46712fa13da41aa91dec1bfeed4libsss_certmap-1.16.5-10.el7_9.10.x86_64.rpm4e025c3b36f5b6f679e88cc79168c081cb78f1f235f10f1e8d37aed8602a634bsssd-krb5-1.16.5-10.el7_9.10.x86_64.rpm36a63b1132197ae7bd592a61dfb846cff68e23dcda1cc4623d84200c94d038d8libipa_hbac-1.16.5-10.el7_9.10.i686.rpm807c8cc510ed682e3823d46990f8e72acecb1417e972c3e30c168060d13e6e2flibsss_certmap-devel-1.16.5-10.el7_9.10.x86_64.rpmde583697d68e9965964e9b776b04b04e5497fb7337c9df6803840102a27239a5libsss_certmap-1.16.5-10.el7_9.10.i686.rpmc84815e08ae58422387429c8933f097cdc4e277f386afcc44bab10a18fb59082sssd-ad-1.16.5-10.el7_9.10.x86_64.rpm7c1858cf98f7e0c684e8561240fe8b02219b8105a2a6ce8eeca431a157560750sssd-libwbclient-1.16.5-10.el7_9.10.x86_64.rpmb3fb83eb2abe7d757f8b314a4507a8f738c3d40f6de155254c6feabfe35f2000sssd-proxy-1.16.5-10.el7_9.10.x86_64.rpm6d788f7682ea53cead8d82d111cab5a27d60169689d666156f5d2ad7b2cec3eblibsss_sudo-1.16.5-10.el7_9.10.x86_64.rpm408a18a3a1ccb71703651ac59e843baaf3085340c36ce4a70cf45103bfb2d2cclibsss_certmap-devel-1.16.5-10.el7_9.10.i686.rpm379d8186fb9607a0a36cd209d7704770971bea0dd0ef16f3d8fefe992109f4f0libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm73855f072f1a2432c650112e27ca2bd1ed03371c2a2910a23a3b84ba863319d4libsss_nss_idmap-1.16.5-10.el7_9.10.i686.rpm28817330e3e6957966737b5798daa8bfa63a3992552f571539cd15fd298ae433libsss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm11fc647330d60e502d86007060e468d67cff2a79c650936210e1603a791a9220sssd-client-1.16.5-10.el7_9.10.i686.rpm379b3eabff1bebbd09397d8b0516cea1c38d05c4e689db04882a8c2019983271libsss_simpleifp-1.16.5-10.el7_9.10.x86_64.rpm11cfb2cd085d2dc80886ae324e199be7f5b15dbd244a8526505e875de391782esssd-tools-1.16.5-10.el7_9.10.x86_64.rpm75cf819b5199bbd7cce944ba7023e307dd27b5fb5e85a0be1a3739f3f5f50e1csssd-client-1.16.5-10.el7_9.10.x86_64.rpm2d916950378d815c659a2d9c847a7ba230752158d2ea248f0c981e110d8d2d76python-libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm67e116b5fdfdf6518a66aeb1a31fed3d6ca6c5257244b27f5a3f830011ee0926libipa_hbac-devel-1.16.5-10.el7_9.10.x86_64.rpm7e0638a0bcf9fe4ef12289b5ded49df445de1cacb9468952f6ab74433d2352edsssd-libwbclient-devel-1.16.5-10.el7_9.10.i686.rpm0e19ac9b1062ea74de9da9ec9b9563254e29e618e6a5d9ef638827fafa967191libsss_idmap-1.16.5-10.el7_9.10.x86_64.rpm4877e9a2a3274b5db35d2999ef1827fb03c941516b9f055c936f0797e659815elibsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm525085aee2a090f378c368427732381827fcd95155c317fa4e41b730e19a8fa2libsss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm9868ad8377d3a7ea59527e8386e69e201eea9b7d4433abe3dee365061863798asssd-polkit-rules-1.16.5-10.el7_9.10.x86_64.rpm15ecfd87feb56508a001d086c9cab4cb011fef0349b3644bfa20aa190c9e2c5blibsss_idmap-1.16.5-10.el7_9.10.i686.rpm2d7c9988bdb0402e3052117ceccea2bb0f3d6143c34bfacf4c2f4981bc8fe7a7SLSA-2021:3338-1HivexSecurity Fix(es): * hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 hivex-1.3.10-6.12.el7_9.i686.rpm hivex-1.3.10-6.12.el7_9.x86_64.rpm hivex-debuginfo-1.3.10-6.12.el7_9.i686.rpm hivex-debuginfo-1.3.10-6.12.el7_9.x86_64.rpm hivex-devel-1.3.10-6.12.el7_9.i686.rpm hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm ocaml-hivex-1.3.10-6.12.el7_9.x86_64.rpm ocaml-hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm perl-hivex-1.3.10-6.12.el7_9.x86_64.rpm python-hivex-1.3.10-6.12.el7_9.x86_64.rpm ruby-hivex-1.3.10-6.12.el7_9.x86_64.rpmlowScientific LinuxScientific Linux 7hivex-1.3.10-6.12.el7_9.i686.rpm1caee1ae63b7e789e9e44bbb1cd42157e6cfc808a461b98227f6c107cbd09c5dhivex-devel-1.3.10-6.12.el7_9.x86_64.rpmd228ff112d6a9331cbb0ffb928122eb5756419ec3aaee85fdcebc10b6f0e37b6ocaml-hivex-1.3.10-6.12.el7_9.x86_64.rpm1f3ef43f71673df625ca2714b1cfd8fd96af7bba80cc8d8c01e9cd5b9d3812ffhivex-1.3.10-6.12.el7_9.x86_64.rpm42dc380b24339b64af4aa373ec67103bba53f1684c3eeb4c31e852135521d66epython-hivex-1.3.10-6.12.el7_9.x86_64.rpme3904da15f8fc7f82cabcb789626a88699cda81f2a0fd02eaeb9c91139e252f2ruby-hivex-1.3.10-6.12.el7_9.x86_64.rpmaa2def395f6c510a1eac7868e33809287cd65c0d17d32dcf5784ea47c183cb2fperl-hivex-1.3.10-6.12.el7_9.x86_64.rpm0f51f73587a33aaf290265edb03d75c08b04d3b84f55871129c44fc4334b7050ocaml-hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm8019f3839747ef54278da82fc0bebc35dd32e461cbb7990ba3c54cb489aca7bahivex-devel-1.3.10-6.12.el7_9.i686.rpma3ecd9709faa50747e5115d83097da32e8d473787ef46e0fba22a07cf083738eSLSA-2021:3438-1KernelSecurity Fix(es): * kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * [SL 7.8][s390x][DASD]Crash in __list_del_entry, alias_pav_group list corrupt when running dasd_alias_remove_device() * EMBARGOED CVE-2021-3715 kernel: use-after-free in route4_change() in net/sched/cls_route.c --- SL7 x86_64 - bpftool-3.10.0-1160.42.2.el7.x86_64.rpm - bpftool-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debug-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debug-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debug-devel-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debuginfo-common-x86_64-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-devel-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-headers-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-tools-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-tools-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-tools-libs-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-tools-libs-devel-3.10.0-1160.42.2.el7.x86_64.rpm - perf-3.10.0-1160.42.2.el7.x86_64.rpm - perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - python-perf-3.10.0-1160.42.2.el7.x86_64.rpm - python-perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm noarch - kernel-abi-whitelists-3.10.0-1160.42.2.el7.noarch.rpm - kernel-doc-3.10.0-1160.42.2.el7.noarch.rpmmoderateScientific LinuxScientific Linux 7kernel-tools-libs-devel-3.10.0-1160.42.2.el7.x86_64.rpmd54bdec26ae4df8b37939e59e6849e140a44e6b10116ae474f0610f1d67dc5ddkernel-tools-3.10.0-1160.42.2.el7.x86_64.rpm0536a7838973ea4c7f8a98cbe918932752f68ccff105c5cb9a831b8530780e51kernel-tools-libs-3.10.0-1160.42.2.el7.x86_64.rpm3bb0a406631f9d6f4c62895475c8500d34c7662730877d1e58be135a065631e5kernel-doc-3.10.0-1160.42.2.el7.noarch.rpmfc6715e90285c83bf4bfacdd56b2a1290ab2ff4295c6b9947354b817500be560kernel-debug-devel-3.10.0-1160.42.2.el7.x86_64.rpm82e800cfca360f81cefd59ca89458c715f091daa55f2f525f17e299544d13f51kernel-headers-3.10.0-1160.42.2.el7.x86_64.rpmdcc57a5759566c840f2804d055b6aca5173e5ab30c1dce27cc5f0a92354990fapython-perf-3.10.0-1160.42.2.el7.x86_64.rpm5f67cbf8f2b09ea18a760128f1e73c0df3e407707aaed177cd25529997a944f9kernel-abi-whitelists-3.10.0-1160.42.2.el7.noarch.rpm33196a3bce35e239045eaeaa537781170a5753215a4570d261b39d6c98042849kernel-3.10.0-1160.42.2.el7.x86_64.rpm84b30ca068c91fe02952ba36a0dce83ba0e41c0ff77ebdb0df95ee3f69feaeaakernel-devel-3.10.0-1160.42.2.el7.x86_64.rpm411ac1452d7827e069b871ef3a260b1d98506eb9baa22c65cac994e99760f2d8perf-3.10.0-1160.42.2.el7.x86_64.rpm12bbbe03c2e6eed4a5c5bd5de4d10abe7f59c1733fcd30e1491b77a4d439cad6bpftool-3.10.0-1160.42.2.el7.x86_64.rpm126127eaeb11dd1e67eff118aebcc7b9606b8d20589fc270ad1a3b7199128a83kernel-debug-3.10.0-1160.42.2.el7.x86_64.rpmc867dab9d6e5db66d4d046ab28da10a58620cf9ea6df3d1afc75fe089e79f01dSLSA-2021:3494-1ThunderbirdThis update upgrades Thunderbird to version 78.14.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - thunderbird-78.14.0-1.el7_9.x86_64.rpm - thunderbird-debuginfo-78.14.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-78.14.0-1.el7_9.x86_64.rpm850f8afd9d801282a58ba0918d138946e44798cae9b087bb575ed7673eab6106SLSA-2021:3498-1FirefoxThis update upgrades Firefox to version 78.14.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - firefox-78.14.0-1.el7_9.i686.rpm - firefox-78.14.0-1.el7_9.x86_64.rpm - firefox-debuginfo-78.14.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7firefox-78.14.0-1.el7_9.x86_64.rpmc35becc58f8d5211ced2d834c117fa17e93125a0fcab7b44d9f8e96dcbeac3d3firefox-78.14.0-1.el7_9.i686.rpm5f1d800c81d82afb56f6c64e087f9fec6caebbb16d6d095f223dbc44403b55bbSLSA-2021:3791-1FirefoxThis update upgrades Firefox to version 91.2.0 ESR. Security Fix(es): * Mozilla: Use-after-free in MessageTask (CVE-2021-38496) * Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 (CVE-2021-38500) * Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 (CVE-2021-38501) * rust-crossbeam-deque: race condition may lead to double free (CVE-2021-32810) * Mozilla: Validation message could have been overlaid on another origin (CVE-2021-38497) * Mozilla: Use-after-free of nsLanguageAtomService object (CVE-2021-38498) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 firefox-91.2.0-4.el7_9.i686.rpm firefox-91.2.0-4.el7_9.x86_64.rpm firefox-debuginfo-91.2.0-4.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7firefox-91.2.0-4.el7_9.x86_64.rpm2108beff106b3a505077f48f3daaccbebe0cb5e0580119fbe631427f4a6e8cebfirefox-91.2.0-4.el7_9.i686.rpme75a8f263454f13e27fd080a3ff5eb5355a6cd833f60c361aae5b08c667f5c4aSLSA-2021:3798-1OpensslSecurity Fix(es): * openssl: integer overflow in CipherUpdate (CVE-2021-23840) * openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7openssl-libs-1.0.2k-22.el7_9.x86_64.rpmd440e6dd5875b7f851b77504780b3d836c6046550d8d21a27057fc172c2e6d7eopenssl-perl-1.0.2k-22.el7_9.x86_64.rpm0896832e03341d76521c42f7b1b2e5353404a29cf1a7e0218e5130549352f670openssl-static-1.0.2k-22.el7_9.i686.rpm5a1bd652238c1bf6f4f249c115d9161468e9ff363d5bcd8e0241b5d77c3a1eaeopenssl-devel-1.0.2k-22.el7_9.i686.rpmb8c85d6360fb785fac3bfc3aaf63442a5257a27325c3426b0d8d9fff2623b3e2openssl-libs-1.0.2k-22.el7_9.i686.rpm326fe4fe4832c1312b334c1553e1c9623543ee6bbd1beb068276e6b5fa81f8e9openssl-devel-1.0.2k-22.el7_9.x86_64.rpm4ac584b2648ef5b2947325914d5bc645a4a4a4bc72ffa4f0d7ff4bd7f289da45openssl-static-1.0.2k-22.el7_9.x86_64.rpm6d732ebba370c1094b6bbcdfd0baa398c8f6e393d25ea7c5df63ef9e63e48345openssl-1.0.2k-22.el7_9.x86_64.rpm625bcddd9f6faea4ca2dd3750620adcc5a77693e36d43026654c853cc40fb95dSLSA-2021:3801-1KernelSecurity Fix(es): * kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543) * kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576) * kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653) * kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Kernel panic due to double fault with DLM reporting for socket error "sk_err=32/0" * "MFW indication via attention" message getting logged frequently after every 5 minutes * lpfc fails to discovery in pt2pt with "2754 PRLI failure DID:0000EF Status:x9/x91e00, data: x0" * pcpu_get_vm_areas using most memory from VmallocUsed * SL 7.9.z [qedf driver] Racing condition between qedf_cleanup_fcport and releasing command after timeout * [Azure] SL 7.9 reports GPU/IB topology incorrectly on some Azure SKUs * [stable guest ABI]Hot add CPU after migration cause guest hang * i40e driver crash at RIP: i40e_config_vf_promiscuous_mode+0x165 * [nfs] Performance issue since commit 5a4f6f11951e * [kernel] Indefinite waiting for RCU callback while removing cgroup --- SL7 x86_64 bpftool-3.10.0-1160.45.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm perf-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm kernel-doc-3.10.0-1160.45.1.el7.noarch.rpmimportantScientific LinuxScientific Linux 7kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm867fdd6e332efbd4cea7bacdb32374f632ca50f3c27b115367c5bceaf950023aperf-3.10.0-1160.45.1.el7.x86_64.rpm4ee7937dec998d123d775db2e2a905e3baff41861e97ef4835f4bd7f9b1d139ekernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpmba563855289df621120ac2ff431b1a133af48779619476660eead751240e58d3kernel-3.10.0-1160.45.1.el7.x86_64.rpmf10179e6528536565797b6977ef373f2bcc93de865490fd71c807743026e493bkernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm0b3b808b3e34bd6a6a80f40cd0283e05c73143fc8134ba6a05a4204471bbfaf2kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpmb86d2bcc3e17d97f11c8b38b05a6c48a62abdca41fa488cbe52c529344d71621kernel-doc-3.10.0-1160.45.1.el7.noarch.rpmc0adc04226bfa29b938ad285aa99f5f2e153031beca278eb46f94b600e11e7fdbpftool-3.10.0-1160.45.1.el7.x86_64.rpm525b3f26666c486a0870cb41de14c0ce3da96d1d688c62b63d45b74077bd9222python-perf-3.10.0-1160.45.1.el7.x86_64.rpm6ee9f492b7ac9d6a9572dabbbe6e1ecf0fe2d1e2c7b571078795f900b19bba80kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpmb6778bbd766fab3ba47aeaffd8dfec93f818b50cf3bc2777a8f4a04a73fcbcbdkernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm923405a988634c32c71fed69171e958b1c0c06b356b2ba0dd5efbef3366c3646kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm8e8fee1867e2a9134f4323f10f6986eb549df5f416b503a3169784d72c582209kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm484a818618e60b5d7cc3bdeb2f7f30cb261533f3eee672e0ab234d71713f7e2aSLSA-2021:3807-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: CRYPT password hash with asterisk allows any bind attempt to succeed (CVE-2021-3652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * A plugin can create an index. Even if the index can be used immediately (for searches) the index remains offline until further reindex * In some rare case, a replication connection may be treated as a regular connection and ACIs evaluated even if they should not. * A regular connection can be erroneously flagged replication connection --- SL7 x86_64 389-ds-base-1.3.10.2-13.el7_9.x86_64.rpm 389-ds-base-debuginfo-1.3.10.2-13.el7_9.x86_64.rpm 389-ds-base-devel-1.3.10.2-13.el7_9.x86_64.rpm 389-ds-base-libs-1.3.10.2-13.el7_9.x86_64.rpm 389-ds-base-snmp-1.3.10.2-13.el7_9.x86_64.rpmlowScientific LinuxScientific Linux 7389-ds-base-devel-1.3.10.2-13.el7_9.x86_64.rpmaec7abb1ea3f088e1fb0844c076f8a2b3a7f94ad9b2eed3384702f32ba7fa86a389-ds-base-libs-1.3.10.2-13.el7_9.x86_64.rpm9a701e7781a327bcf458ded4c0578fcec25e88ea744a5aaa40e74d5f93596929389-ds-base-1.3.10.2-13.el7_9.x86_64.rpme5b1cd1a816777e3910d687b4acc55ce2558fbce0e44e41f74223fd315f366a6389-ds-base-snmp-1.3.10.2-13.el7_9.x86_64.rpm138cc1e3a0c9dfa5610aeed6db70927895f5acf90bcf3242054e5fad1caae504SLSA-2021:3810-1Libxml2Security Fix(es): * libxml2: Use after free via namespace node in XPointer ranges (CVE-2016-4658) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 libxml2-2.9.1-6.el7_9.6.i686.rpm libxml2-2.9.1-6.el7_9.6.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_9.6.i686.rpm libxml2-debuginfo-2.9.1-6.el7_9.6.x86_64.rpm libxml2-devel-2.9.1-6.el7_9.6.i686.rpm libxml2-devel-2.9.1-6.el7_9.6.x86_64.rpm libxml2-python-2.9.1-6.el7_9.6.x86_64.rpm libxml2-static-2.9.1-6.el7_9.6.i686.rpm libxml2-static-2.9.1-6.el7_9.6.x86_64.rpmmoderateScientific LinuxScientific Linux 7libxml2-static-2.9.1-6.el7_9.6.i686.rpm8a59d382b30319d0ff690e40222edb29c738c9ca34cf444404e96aa775067b80libxml2-devel-2.9.1-6.el7_9.6.i686.rpmaca8e9ea39cb10f330355ffc3f46dff2698f681dfdddda2ecf987339aaa73f66libxml2-2.9.1-6.el7_9.6.i686.rpmf87f59a8af354ebd01bf4fe2763aa8ad246912a21c096ce4bc27b22f53d1f608libxml2-devel-2.9.1-6.el7_9.6.x86_64.rpmd9968fe93e5c1af2ccbe30d3a4cb1ae2523e454717b0d6dc762d01aacca2547blibxml2-static-2.9.1-6.el7_9.6.x86_64.rpm66674b9b2caa4763602e3e5ae5cc79704358c65ac092fc65bfc153c54aa5a32blibxml2-python-2.9.1-6.el7_9.6.x86_64.rpm8f07c25339c6fde873b15392514b0344ba7b22b46ca088cf46874535e1f906b7libxml2-2.9.1-6.el7_9.6.x86_64.rpmf4c797e76f3851b1071a8583855370125721551c43ccc91477b77c7b06ad401aSLSA-2021:3841-1ThunderbirdThis update upgrades Thunderbird to version 91.2.0. Security Fix(es): * Mozilla: Use-after-free in MessageTask (CVE-2021-38496) * Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 (CVE-2021-38500) * Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 (CVE-2021-38501) * Mozilla: Downgrade attack on SMTP STARTTLS connections (CVE-2021-38502) * rust-crossbeam-deque: race condition may lead to double free (CVE-2021-32810) * Mozilla: Validation message could have been overlaid on another origin (CVE-2021-38497) * Mozilla: Use-after-free of nsLanguageAtomService object (CVE-2021-38498) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 thunderbird-91.2.0-1.el7_9.x86_64.rpm thunderbird-debuginfo-91.2.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-91.2.0-1.el7_9.x86_64.rpmca7ecb224d07e0dd1409860349eb0eb01188050739568942bf50e43875e78b75SLSA-2021:3856Important: Httpd Security UpdateThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7httpd-tools-2.4.6-97.sl7_9.1.x86_64.rpm9581a172adb312e7e316a2f5ba812b21cdc7464e98af2e92ec9620f12d3bb4c6mod_session-2.4.6-97.sl7_9.1.x86_64.rpm7c721f5a5df540461d2710cce4802bd4b75820fd70ab4fb6f7d03991a5ef2214mod_proxy_html-2.4.6-97.sl7_9.1.x86_64.rpm6f5b0e6091bd251d553a697848d55e871eb7ca33a2d0ad8d6c3de18536e36b6ahttpd-devel-2.4.6-97.sl7_9.1.x86_64.rpm29ecb6fcc01aba2a3d3a2d341fa19e2975d17fb725e5eaa3496b69cddcc55e97httpd-manual-2.4.6-97.sl7_9.1.noarch.rpm1794f9ab5b5a11081fa9978bdd1af37ccf839681cf4bc003e56399f8458feb65mod_ssl-2.4.6-97.sl7_9.1.x86_64.rpmdcd70d4f19c36d40e2a23a2227ba722e869141b9efdfcea1919dc921b3eca1e2httpd-2.4.6-97.sl7_9.1.x86_64.rpm5fc596869c32f29d76b23ea0cd05e38c7cf75c7b9fa861431268266be6905a2cmod_ldap-2.4.6-97.sl7_9.1.x86_64.rpma6adbd702164e543182a0a32f3b1a7f7a4fa75f4e43ec6a8048cc535de40631bSLSA-2021:3889Important: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) * OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) * OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) * OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) * OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) * OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) * OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) * OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) (CVE-2021-35578) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) (CVE-2021-35586) * OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) (CVE-2021-35588) * OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * A defensive security change in an earlier OpenJDK update led to a performance degradation when using the Scanner class. This was due to the change being applied to many common cases that did not need this protection. With this update, we provide the original behaviour for these cases. (RHBZ#1862929) importantScientific Linux 7java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.312.b07-1.el7_9.noarch.rpmb8e041ae56a3b6f55f91e35e550c91c79a5f7663521a4821b54286b5349d4587java-1.8.0-openjdk-headless-debug-1.8.0.312.b07-1.el7_9.i686.rpm185e6681a034b8fb8d4418f512e628f3b385294a5532ece494895abe7551cdfcjava-1.8.0-openjdk-accessibility-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm318dd320b0c51f88be77b97acf3d8c0c3aa22e410b3290fee5c7c860196ba162java-11-openjdk-javadoc-debug-11.0.13.0.8-1.el7_9.i686.rpmf3f4387ab91c214f9dd86464a31e3414b74492361737b221816178c571941c48java-1.8.0-openjdk-headless-debug-1.8.0.312.b07-1.el7_9.x86_64.rpmfe3fc45668fa2d1e847ee3f529c8016bcf9e0bc66bc60e823b890407369a58b3java-1.8.0-openjdk-demo-debug-1.8.0.312.b07-1.el7_9.i686.rpmbe18bb19a976d1fc42494fcb27a048dd7204bed976708e61d91e3171ae2506f9java-11-openjdk-headless-debug-11.0.13.0.8-1.el7_9.i686.rpm97eb31f1ef863866ea004512db55576c813f0d9ca733cdc02c73c15a72c3a264java-1.8.0-openjdk-demo-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm613ca8a7e3e8c2af0b551f7f23b47fe6181517b3925ce98577d40bb76eaa88a0java-11-openjdk-devel-debug-11.0.13.0.8-1.el7_9.i686.rpmc12fe1fbe90dcc0bd4be61d229ac2cbd97879d417447bf7f36440318c10d9681java-11-openjdk-headless-debug-11.0.13.0.8-1.el7_9.x86_64.rpm2eeacab36ce271803ecfc626ed5b1855bfbae454c38aedc1d6c587c4a630267fjava-11-openjdk-javadoc-debug-11.0.13.0.8-1.el7_9.x86_64.rpme90a511e21be6f399a142c7c844768cf9cd5fbf3fe7c60eea4ca2a7e3bc31d32java-11-openjdk-javadoc-zip-debug-11.0.13.0.8-1.el7_9.x86_64.rpm0c7554936b512c3be2b5f0072c3f419f5278b7c27a4d9140c049a8f0d9e3c051java-1.8.0-openjdk-javadoc-debug-1.8.0.312.b07-1.el7_9.noarch.rpm6d49108d4429403240621882e8e762435eca92d61ec7ac01c4a7ecc2d3463301java-11-openjdk-devel-debug-11.0.13.0.8-1.el7_9.x86_64.rpmf86980e699225cd91a39abe0a293a42179db3b72f366266539584c35cda107cajava-11-openjdk-jmods-debug-11.0.13.0.8-1.el7_9.i686.rpm5a5972bf73572ba1ed7673b859557be68d9da5c91c0cd6b97f88e421e8059310java-1.8.0-openjdk-accessibility-debug-1.8.0.312.b07-1.el7_9.i686.rpm2c065ede1975c9b4714b4598a5ba351b0f5798441e3bf526a339f4ea04617faajava-1.8.0-openjdk-debug-1.8.0.312.b07-1.el7_9.i686.rpmbadbefa4886b2f0e02af3920674721ae6dd20cd40550b38fd6350778949da252java-1.8.0-openjdk-src-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm8650d36c04fb12c4e51aed57461a16733b7f785a43e2d7905679168cf742c93ejava-11-openjdk-src-debug-11.0.13.0.8-1.el7_9.x86_64.rpm90eea65199aaf18e400556e0d11fc55978450bd3cf312b35b5c4630a42a32f83java-11-openjdk-src-debug-11.0.13.0.8-1.el7_9.i686.rpm485a53dcbfce50300ce2b08423f653c90d91f068efcbd527b1d05443be6e758djava-11-openjdk-debug-11.0.13.0.8-1.el7_9.i686.rpmd2ef3fdae6a8002640cd022b6440975cea9f7bd2c5d50ef58609d37cc065a5dejava-11-openjdk-javadoc-zip-debug-11.0.13.0.8-1.el7_9.i686.rpm944c237e8e0efc48143d3a1f430cd3b3c316e143542a263dde4120d5594a9761java-11-openjdk-debug-11.0.13.0.8-1.el7_9.x86_64.rpm2986a8d4690f34dd30e269cce43aeff99afc0f9c0d79794071bdd20840f1a0e0java-1.8.0-openjdk-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm06e676bb945720a776d4e3450adc46c75e0bc27e4b9d876a940be5be10633f05java-11-openjdk-demo-debug-11.0.13.0.8-1.el7_9.x86_64.rpme07bfd456b04754c02ed825e5dacd707f2ab07351552b940cf8a106122da4901java-1.8.0-openjdk-devel-debug-1.8.0.312.b07-1.el7_9.i686.rpm815bda03a742f2b7e1f10b785b398d227fee602872bdea6ea51d143348922521java-1.8.0-openjdk-src-debug-1.8.0.312.b07-1.el7_9.i686.rpmca5e16a6456f3cb50263ff94a90ac206afddf4a8aeb5ef3a5dc7a467378f61edjava-11-openjdk-static-libs-debug-11.0.13.0.8-1.el7_9.x86_64.rpmccbff3e9c5546692b8ca43756439d1837893f6127de9635f490bae72668f7f4ajava-11-openjdk-jmods-debug-11.0.13.0.8-1.el7_9.x86_64.rpm6dbb3dca7fa74b6378c7d8c1cb6e589d9c76cf90c4d69375eede2a4d1f32d37bjava-11-openjdk-demo-debug-11.0.13.0.8-1.el7_9.i686.rpma9ddfa9caef1859a580fff96b0d152ff2371b203894ea91c8e2eefbf6a20c951java-1.8.0-openjdk-devel-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm87efefa8960f6579e5731b72101f67e7cf282f7f6a43d58b073c60d8f5a947cdSLSA-2021:3889-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) * OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) * OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) * OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) * OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) * OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) * OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) * OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) (CVE-2021-35578) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) (CVE-2021-35586) * OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) (CVE-2021-35588) * OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * A defensive security change in an earlier OpenJDK update led to a performance degradation when using the Scanner class. This was due to the change being applied to many common cases that did not need this protection. With this update, we provide the original behaviour for these cases. (RHBZ#1862929) --- SL7 x86_64 java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-debuginfo-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.x86_64.rpm noarch java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.x86_64.rpm96becc4df530dcbb300a3ee87e56d7d557d982f3a05a6e13bdf0f173c321ab98java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.i686.rpm8053e3d59d91fa2565831d5591d2bea43d763da33cf9d69e8205aa1c2563e506java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.i686.rpm08274409df9aa67ba85ec46e67c03b74360b3553d9b2d66921632e287b145223java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.i686.rpm7e5737cdd00f317e6fe853678e470966df3db388539749132381d3731894ab2fjava-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.x86_64.rpmdde358379e51deb289aecf16e04be1d2a7d803ae6c6e47b1969ab1cd425a30fbjava-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.x86_64.rpm27ee4919633d5efccefc730781dc6bf03c1bdd255584f54640513fa3cf2408c5java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.i686.rpm06b10b389e6da269004a11f8c8e7d2c98a931309b739bb16d8bbf2e79031b9ffjava-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9.noarch.rpm35d2a9fd1ecb1c7e2c93bbedf92a66bddef3fd81ef5bb8d52264eecb297cee41java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.x86_64.rpmd1f3f237c4290a03682bb672e5a734917de05866edf597726e1be0ed77c43422java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.i686.rpme7a0e52a0cc34f69a2c1e8f959fd064ac6770cbbe9114be3efef465def119cc0java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.x86_64.rpm904e67fa5443bdcc8c1d21217e278c8c4ffd4f9f37e189b7acc46cbc4c514039java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.i686.rpmac3569fd519415e34c1f9f87bfe90a825a1d2fada013b0e2667aa41a541f2f73java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9.noarch.rpm75c9b6a586b9e3d8e08bd1a9808ded2153d35a74d9ba19a418473f04fbbfcba7java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.x86_64.rpm83d558c3b78820fb00cf5ca98fb3763617c578826bd25eb84ab77196ed330d8eSLSA-2021:3892-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) * OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) * OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) * OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) * OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) * OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) * OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) * OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) (CVE-2021-35578) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) (CVE-2021-35586) * OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Previously, uninstalling the OpenJDK RPMs attempted to remove a client directory that did not exist. This directory is no longer used in java-11-openjdk and all references to it have now been removed. (RHBZ#1698873) --- SL7 x86_64 java-11-openjdk-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-debuginfo-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-debuginfo-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-demo-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-demo-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-devel-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-devel-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-headless-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-headless-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-src-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-src-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7java-11-openjdk-demo-11.0.13.0.8-1.el7_9.i686.rpme33b167c32960ebe864e3298c0806fef44326dbf2e60f5fd6de9a64787630e47java-11-openjdk-src-11.0.13.0.8-1.el7_9.x86_64.rpm605d9de79b1e7b66b8a678a32d3662f6024308b0d8efe4212832a6e3696c990fjava-11-openjdk-jmods-11.0.13.0.8-1.el7_9.x86_64.rpm47f96da1d5218fca5cb8492684bc3375eb0562b5d3a2b9d4c04b86be92305609java-11-openjdk-headless-11.0.13.0.8-1.el7_9.i686.rpmcc8f5858a5ef7c4e422c8ac9478b19571d12c9ea62b65b204afba187f834ad3fjava-11-openjdk-11.0.13.0.8-1.el7_9.i686.rpm0818aa1117445013eb4f0ad45b312d1e54ac8c922ceffe90e7674a643eea5788java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.x86_64.rpmfc46580e7be7714628c10b0e0e9fb0ee34b25b3912fa5a599bf77715b069f65bjava-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.x86_64.rpm452cbaf81da20d0b10d5cc951fa527304a7e306f64193c11f9c28c9e60e74c4cjava-11-openjdk-jmods-11.0.13.0.8-1.el7_9.i686.rpmf6fdc5145a6147d28ca9a6eba36ce56aac8e01286353c367a91c4cb2b14cbe31java-11-openjdk-demo-11.0.13.0.8-1.el7_9.x86_64.rpmcf3f5bdb45ebfa36350f721c37429c0ec2b0e08e7fb8cd0835ad0b04831c170djava-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.i686.rpm04cdecef944c4d0caec49c21edb6897edeaee502b5aff9086123a3715ff51fd9java-11-openjdk-devel-11.0.13.0.8-1.el7_9.i686.rpm67fc4f3c7e2f848a74b162d8b863b37d8f7198885a1c0642d27a0bf2e52e1e4bjava-11-openjdk-headless-11.0.13.0.8-1.el7_9.x86_64.rpm378bee12136df9aa9fe80bff862d608232d45449a532cbf404db7357f3314623java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.i686.rpm3d3be31a498e5596c6ec12383fb0cbdbfe7d7577e3ad628f63325b34808717c7java-11-openjdk-11.0.13.0.8-1.el7_9.x86_64.rpmbebb84bedcb3c512d2a0bfeeb8b4db7b60ec32b5815d7de7edf819d3b2ffde24java-11-openjdk-devel-11.0.13.0.8-1.el7_9.x86_64.rpm1d1b99c75a03c26401710fec1fa91024ab5f78e37a1a21c599ccea4061b052c7java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.x86_64.rpm2657fc9170f55acff762e78c6b324cbcf7671e37196f15cce4046d1d34570290java-11-openjdk-src-11.0.13.0.8-1.el7_9.i686.rpm064608eff6a661e8ecd966c80bce8fa37071a8ea30c87741dd144573b073a1d9SLSA-2021:3956-1XstreamSecurity Fix(es): * xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39139) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39141) * xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* (CVE-2021-39144) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39145) * xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39146) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration (CVE-2021-39147) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator (CVE-2021-39148) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* (CVE-2021-39149) * xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39150) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39151) * xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData (CVE-2021-39152) * xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39153) * xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39154) * xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler (CVE-2021-39140) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 noarch - xstream-1.3.1-16.el7_9.noarch.rpm - xstream-javadoc-1.3.1-16.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7xstream-javadoc-1.3.1-16.el7_9.noarch.rpm721d4a42d6144450ca7a9d9a3346ea70c1c2cd3e659be4498547a45c905ad650xstream-1.3.1-16.el7_9.noarch.rpm18234f1e80c5362d2f18e4c98af1b3ad30f317728f614a810542f5013260471dSLSA-2021:4033-1BinutilsSecurity Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in binutils in order to facilitate detection of BiDi Unicode characters: Tools which display names or strings (readelf, strings, nm, objdump) have a new command line option --unicode / -U which controls how Unicode characters are handled. Using "--unicode=default" will treat them as normal for the tool. This is the default behaviour when --unicode option is not used. Using "-- unicode=locale" will display them according to the current locale. Using "--unicode=hex" will display them as hex byte values. Using "-- unicode=escape" will display them as Unicode escape sequences. Using "-- unicode=highlight" will display them as Unicode escape sequences highlighted in red, if supported by the output device. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - binutils-2.27-44.base.el7_9.1.x86_64.rpm - binutils-debuginfo-2.27-44.base.el7_9.1.i686.rpm - binutils-debuginfo-2.27-44.base.el7_9.1.x86_64.rpm - binutils-devel-2.27-44.base.el7_9.1.i686.rpm - binutils-devel-2.27-44.base.el7_9.1.x86_64.rpmmoderateScientific LinuxScientific Linux 7binutils-devel-2.27-44.base.el7_9.1.i686.rpmfb6f39677f4dfcd8081f6c7255d6b3290a7bb59c19bc49777ff53ab5d326d9f8binutils-2.27-44.base.el7_9.1.x86_64.rpmf734e06cf2c45618f88fc22efa5888844a886d627cf2c73b505c16287fd0ef3fbinutils-devel-2.27-44.base.el7_9.1.x86_64.rpmb86b196eb77c5dfcbd607eaea01c7b8cf538def86cc0c047c72004f9fecef54cSLSA-2021:4044-1FlatpakSecurity Fix(es): * flatpak: Sandbox bypass via recent VFS-manipulating syscalls (CVE-2021-41133) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 -flatpak-1.0.9-12.el7_9.x86_64.rpm - flatpak-builder-1.0.0-12.el7_9.x86_64.rpm - flatpak-debuginfo-1.0.9-12.el7_9.x86_64.rpm - flatpak-devel-1.0.9-12.el7_9.x86_64.rpm - flatpak-libs-1.0.9-12.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7flatpak-1.0.9-12.el7_9.x86_64.rpm9eb7d9ef146c06f180f0b37e746cf2d2237d458853a34eb8f91d5914b96f3fbeflatpak-builder-1.0.0-12.el7_9.x86_64.rpm22067faaaeb7791e013f2978eaa4812a0c98185e7379c24d625cc3669e1c929eflatpak-devel-1.0.9-12.el7_9.x86_64.rpm1764362a0c1f11a79eeca38eeffc989f49059b37c95500454fda35278377b209flatpak-libs-1.0.9-12.el7_9.x86_64.rpm58e3c1f8dd1fa2e042593af0ee4e645190955b33c3399cf72ebb0a2eee668351SLSA-2021:4116-1FirefoxThis update upgrades Firefox to version 91.3.0 ESR. Security Fix(es): * Mozilla: Use-after-free in HTTP2 Session object * Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 * Mozilla: iframe sandbox rules did not apply to XSLT stylesheets (CVE-2021-38503) * Mozilla: Use-after-free in file picker dialog (CVE-2021-38504) * Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning (CVE-2021-38506) * Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports (CVE-2021-38507) * Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing (CVE-2021-38508) * Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain (CVE-2021-38509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.3.0-1.el7_9.x86_64.rpmd240ca41ca7b893bf6dfe675cc0570479cd65e03efd623d8a49f34eaaa5e3b63firefox-91.3.0-1.el7_9.i686.rpm8c6d8cc7b4a69ef5cbd1426523aa2b250928f0c44478c8020e085e6333a1370cSLSA-2021:4134-1ThunderbirdThis update upgrades Thunderbird to version 91.3.0. Security Fix(es): * Mozilla: Use-after-free in HTTP2 Session object * Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 * Mozilla: iframe sandbox rules did not apply to XSLT stylesheets (CVE-2021-38503) * Mozilla: Use-after-free in file picker dialog (CVE-2021-38504) * Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning (CVE-2021-38506) * Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports (CVE-2021-38507) * Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing (CVE-2021-38508) * Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain (CVE-2021-38509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.3.0-2.el7_9.x86_64.rpm4c8ed042fda855710d18116d76d222179772e50d5b378b3830c92bb8ddf6626aSLSA-2021:4619-1FreerdpSecurity Fix(es): * freerdp: improper client input validation for gateway connections allows to overwrite memory (CVE-2021-41159) * freerdp: improper region checks in all clients allow out of bound write to memory (CVE-2021-41160) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7libwinpr-2.1.1-5.el7_9.x86_64.rpm77239c60301bfd4569a632c262051c21eec79b1ea830b546779d5084aab7d084freerdp-devel-2.1.1-5.el7_9.i686.rpm00fac61464c5480ec91e302fb37991b75d4f2f69bdd93d0fbddd5e29dcf7fdd5libwinpr-devel-2.1.1-5.el7_9.x86_64.rpm623433c0ea6efa7207d361905f8f4f211d28def2609e49c1fbc4745d35594620freerdp-2.1.1-5.el7_9.x86_64.rpm425ec2b695d055f02fad6b19a925aefe72b42a728f5188beca945ea774551522freerdp-libs-2.1.1-5.el7_9.i686.rpm685bc3857c0a1c7357e7ed1e99a2c3943005b17e0f0ad29461b131cb283d3c75freerdp-libs-2.1.1-5.el7_9.x86_64.rpm16ff1cf1e8b791b72f404683e1b09ca183c1b923bfd7a40bde144c0a011097a0freerdp-devel-2.1.1-5.el7_9.x86_64.rpmf6315426a81bea92b151c19b92dd73abf7785c2c5f38326a7dd87edf9cebd623libwinpr-devel-2.1.1-5.el7_9.i686.rpm4f0aa642e193199463b076ab85aa95c6471db5c0015ffec54a485eb2df6dce37libwinpr-2.1.1-5.el7_9.i686.rpm3ee37c0c201ef2fe982a344d953ffa8ea29a8c96200396163702500be4efe67aSLSA-2021:4777-1KernelSecurity Fix(es): * kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after- free (CVE-2020-36385) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * scsi: ibmvfc: Avoid link down on FS9100 canister reboot * crash in qla2x00_status_entry() because of corrupt srb * qedf driver: race condition between qedf's completion work task and another work item tearing down an fcport with qedf_cleanup_fcport * The kernel crashes in hv_pci_remove_slots() upon hv device removal. A possible race between hv_pci_remove_slots() and pci_devices_present_work(). * I/O delays incorrectly handled in the NVMe stack * Data corruption in NFS client reusing slotid/seqid due to an interrupted slotimportantScientific LinuxScientific Linux 7kernel-devel-3.10.0-1160.49.1.el7.x86_64.rpmc59bd6ad8b0ba335b1a88bffbcf8ef268d3df29a96d7b7b995d30b8c305939dekernel-tools-libs-devel-3.10.0-1160.49.1.el7.x86_64.rpm6e4c1d649dde4da6699c3f05acb8e7ef57f58b8e98dd9d3f197804e05169011ckernel-tools-3.10.0-1160.49.1.el7.x86_64.rpm76e9b04a0a7c47f25152f16f92dd7c8cb609e4558c0616d4f261870ac288b993kernel-tools-libs-3.10.0-1160.49.1.el7.x86_64.rpm85effede8b93bcb34e01c1154c8bb0c9aefc896e7cd9c4809290bfde34d14e6fkernel-3.10.0-1160.49.1.el7.x86_64.rpmaa36c535e415cd33f65a061cdef6ff3fb12a14214d7614ab7cc113412933ff4bkernel-debug-devel-3.10.0-1160.49.1.el7.x86_64.rpmae36099deb7aa92ef933e33052f63aa483b8755c5b63b0360840bc48f1914469kernel-abi-whitelists-3.10.0-1160.49.1.el7.noarch.rpm6c4f2476de1b18214e0d474570a7e21b0d4139c347b674cd0b78836ae5320907bpftool-3.10.0-1160.49.1.el7.x86_64.rpm73b93162d0e202f228b3157df9b278ea9944b817dc7489af189b682b5f0dfd3dkernel-debug-3.10.0-1160.49.1.el7.x86_64.rpm20261f01313111e42969541ffdb4b19cafd855d6294a3ac64481a5edeb8f2a50kernel-doc-3.10.0-1160.49.1.el7.noarch.rpm82e0747f69c44a4d7b658707d6ee95cbb91f67f734e768d03dec121eec1624aakernel-headers-3.10.0-1160.49.1.el7.x86_64.rpm90f2afa509798753be07a36e1c0bca62c2a505ee3f9206d908fadfd437273edfperf-3.10.0-1160.49.1.el7.x86_64.rpm4620413535aa12eddad10c9fa5e0468cd8a8bb4cd7b0523d27959c47fb896295python-perf-3.10.0-1160.49.1.el7.x86_64.rpm255a4e7fe3d8b457d6e51b5df869cf53e6c73f383acdd0b1573161541c9c9ee1SLSA-2021:4782-1OpensshSecurity Fix(es): * openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured (CVE-2021-41617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7openssh-keycat-7.4p1-22.el7_9.x86_64.rpm1335e1327219cdfad2139a4e7eaa935f3c4c420449714d6a512d2ad7e6a795bbpam_ssh_agent_auth-0.10.3-2.22.el7_9.x86_64.rpm49828810f0d5030b8669f601621777242386c6f46b9bd24b8dd9e4ca8385d786openssh-server-sysvinit-7.4p1-22.el7_9.x86_64.rpm27656905c453087fb4326a46ae20f69ad6f7d15dc57ac689aebaa67cc3af2f94openssh-askpass-7.4p1-22.el7_9.x86_64.rpm75a95101038a61ef81f8bc905cca421e78a765ad8ec724b14df9f60dafa4100fopenssh-cavs-7.4p1-22.el7_9.x86_64.rpmd30c8c5057e3ac699638dc6131d01513da36d2ff21ad586caf8b1db7245f854bpam_ssh_agent_auth-0.10.3-2.22.el7_9.i686.rpm9a85d8a27fbec1addee6044fee82166d543cda136dd0f8fc573ca74c5603bab0openssh-server-7.4p1-22.el7_9.x86_64.rpm21c4cdb91e7b33fb22d39d57323aabd8e3c4fb3e247c96e350f6524439410552openssh-7.4p1-22.el7_9.x86_64.rpm09b902fcc03fa2ff326c9f6534af56d52092119319689489dffb5a5712b7c975openssh-clients-7.4p1-22.el7_9.x86_64.rpmb9995430cbc9a2437eceddfaa6d5543cb9cbd27b88a6088bd12e826497f390efopenssh-ldap-7.4p1-22.el7_9.x86_64.rpm56b9b8f33bd2f38acc39a956c5707e609a788f202e7bb1ef7bb1d94e97f0a875SLSA-2021:4785-1RpmSecurity Fix(es): * rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7rpm-4.11.3-48.el7_9.x86_64.rpmf7034a7d37716143df45fce93a7db04674d4c0a11744c6eb7350d3e1a60eb9dbrpm-sign-4.11.3-48.el7_9.x86_64.rpm2148e0ff7f1fb45bfbe7001dbe9999f9cc16425e4b449ed0f28ea41f97160d4brpm-libs-4.11.3-48.el7_9.i686.rpm7c92bfe62ed2e6ef2cb5e34cf60d7b4aa3caf175bba0fe317879b73b083aae0frpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpmf3591c4301390b93035418fd9355051df0c9d22533775c0db02f26f09cfeb039rpm-devel-4.11.3-48.el7_9.i686.rpm6d05f18d940eead5c800f05dead657010bd1c5a78757f1f01327e008248045a0rpm-apidocs-4.11.3-48.el7_9.noarch.rpmdc4d8039966f057bf378f252329a1b26c6ed9b5a59a03a821ec82d8bde9747farpm-build-libs-4.11.3-48.el7_9.x86_64.rpme4ab10a468a9fcf6885626b9045f3268ef3701f891ba304325e720ce57edc005rpm-devel-4.11.3-48.el7_9.x86_64.rpm58728c0ff5dbe6ddf05dfe74e314a78fff2c53bad686f11f69bff0b570716884rpm-build-libs-4.11.3-48.el7_9.i686.rpm773c74a13a8be6aa2766b718b53e89e53c3775a190f09a90445d2f137ce8eea8rpm-python-4.11.3-48.el7_9.x86_64.rpm6473424fa421cf2f447521a64a754fa76d07ca4d2690ec10f946d50a02507554rpm-cron-4.11.3-48.el7_9.noarch.rpmcc1922c981027ee30335ca2191a223e6f40ecee1aa27e7947e200aba8cac9c80rpm-build-4.11.3-48.el7_9.x86_64.rpmbfdfa81bef912c168e7a5e4efdb859656050c1d0919b9a919d4c220eff2a4a06rpm-libs-4.11.3-48.el7_9.x86_64.rpmd13ab2c849e7ef85d698c599f8393fe1b58c118eea4106a8822f496de2f3e097SLSA-2021:4788-1Krb5Security Fix(es): * krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field (CVE-2021-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7libkadm5-1.15.1-51.el7_9.x86_64.rpm657875b63fe49b17f6d97ccfbd08597596af7bc12197093ebe1f5da0d1baf3b8krb5-devel-1.15.1-51.el7_9.x86_64.rpmecdf5093b38c12d3549c5c3ac6069737e21d8645f28c6a7a47243443f5a9ecf9krb5-libs-1.15.1-51.el7_9.x86_64.rpm0b5693f5de9bae23654703f65e36c84e2787e104908f8c171faefffd3bf3caeckrb5-libs-1.15.1-51.el7_9.i686.rpm8c4a640ef705264b41a8b8406ba75dac8812c740b23bacc3cb755b7db5d9e5d6libkadm5-1.15.1-51.el7_9.i686.rpm8ecd0dda63f8fdef85f3be10611b669d2dc8f8820c41e51929957203919c59c6krb5-server-1.15.1-51.el7_9.x86_64.rpmedbefd5f50c0ab6f8f347753a30e6cabb9e3a9a91e3edb0140a39c295c478976krb5-server-ldap-1.15.1-51.el7_9.x86_64.rpm2736348c2e593224a35ad17d2baba550a0f3f9d925bb28687786378dafabf2aekrb5-pkinit-1.15.1-51.el7_9.x86_64.rpme6ef83a4934b858afe592fb93a7365e981aafa924b55b6d515ce30fdd084bc99krb5-devel-1.15.1-51.el7_9.i686.rpmb17db7a9e0d3401fff1a6973e133a3b97a5a42ec6e9f4e54e4533c6d67dd503fkrb5-workstation-1.15.1-51.el7_9.x86_64.rpm518e643fae6225e2a0bf9f417845ac6057b93e97fd4db403cd1264f533781d7eSLSA-2021:4904-1NssSecurity Fix(es): * nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS) (CVE-2021-43527) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEcriticalScientific LinuxScientific Linux 7nss-3.67.0-4.el7_9.i686.rpm8b39d7bbdd0b7c87e89fa90555935b23723b4de00bcb3c620b9244d895da45aanss-pkcs11-devel-3.67.0-4.el7_9.i686.rpmd80c7a1e8ecfa6c65521a83cc7d8145ef3b8cf9624d3ccb14ffb2dd5a7d06b5fnss-3.67.0-4.el7_9.x86_64.rpm9fa543b38cbcd32000f90732cd5dc04f7e6bddcfeaf65b2e1563f345ed58a0bdnss-sysinit-3.67.0-4.el7_9.x86_64.rpmb66372dc9a21d68aeaf19da7827403ad84fa245fa8e22058d891106701661d8bnss-devel-3.67.0-4.el7_9.i686.rpm96ac14ca35823c9a4ac7663af959bef6f678a125fd197e01b94d15df2335cfa4nss-pkcs11-devel-3.67.0-4.el7_9.x86_64.rpmfd5c09387dabef2c766f98684d44e391053a13a1b9c4bfb7baa704ea908d3431nss-devel-3.67.0-4.el7_9.x86_64.rpme37be7a62e6a240e35e8b7fb7ac856bcdae43d435bf76244e80e800210210b1enss-tools-3.67.0-4.el7_9.x86_64.rpmb53f0ac22d348471aaf4297e58721ca11ae4f57122869e47dc1d51bababbcdafSLSA-2021:4913-1MailmanSecurity Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) * mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) * mailman: CSRF protection missing in the user options page (CVE-2016-6893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7mailman-2.1.15-30.el7_9.2.x86_64.rpma6d403a8414332a58f7713c4db942ad7216a5f34f7c6a7e1d4dcfe28cb8bd819SLSA-2021:5014-1FirefoxThis update upgrades Firefox to version 91.4.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 * Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536) * Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537) * Mozilla: Missing fullscreen and pointer lock notification when requesting both (CVE-2021-43538) * Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539) * Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541) * Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler (CVE-2021-43542) * Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543) * Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545) * Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.4.0-1.el7_9.x86_64.rpm74b34b94c0496a052d766ef75b3959f4f21d66d466f6f73698d6bb9397a1ea3bfirefox-91.4.0-1.el7_9.i686.rpm47df76129a2edadd96529cb6ecc6a39c43c555f5ec0932f3f345fdca39a68cddSLSA-2021:5046-1ThunderbirdThis update upgrades Thunderbird to version 91.4.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 * Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536) * Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537) * Mozilla: Missing fullscreen and pointer lock notification when requesting both (CVE-2021-43538) * Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539) * Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541) * Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler (CVE-2021-43542) * Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543) * Mozilla: JavaScript unexpectedly enabled for the composition area (CVE-2021-43528) * Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545) * Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.4.0-3.el7_9.x86_64.rpm6d5614c26c0384912aebe50dc573bc0865fb463afb90ed78e385c01d485f905eSLSA-2021:5192Important: Samba Security And Bug Fix UpdateSamba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717) * samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Backport IDL changes to harden Kerberos communication (BZ#2021428) importantScientific Linux 7ctdb-4.10.16-17.el7_9.x86_64.rpmca4344699b290998b563050811d67e398006832a01d730ad20eb66ca9aedccc6ctdb-tests-4.10.16-17.el7_9.x86_64.rpm8c8da384268bf5fccba4ff8f4c52f415a39ff3b3e604d09c753e64e63ed19f0bSLSA-2021:5192-1SambaSecurity Fix(es): * samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717) * samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Backport IDL changes to harden Kerberos communicationimportantScientific LinuxScientific Linux 7samba-winbind-krb5-locator-4.10.16-17.el7_9.x86_64.rpmfccd7fac0b4e430d2265335820d03a03444d1e394c6c12895b62940562f6325esamba-krb5-printing-4.10.16-17.el7_9.x86_64.rpm76c22fc6f283b0abb8ce92e3a40f5caf50817a1dfcf37895835e1b5ed36900e2libwbclient-devel-4.10.16-17.el7_9.x86_64.rpm77f6e67d80e62266c9f6edc5a7c0eb4ac0abc20201b3b0cee0944a0eb661cdfesamba-client-4.10.16-17.el7_9.x86_64.rpm83f58f79e439d0f5d99de769d791288e5777785799f835f872bf72a6341ce621samba-test-4.10.16-17.el7_9.x86_64.rpm58ebd96e52fbc22359938a509237c70a35cd6cedcca2010c4dd62f96fa8acca9samba-client-libs-4.10.16-17.el7_9.i686.rpm91ef15b825a8a5d761cfc6a0ddbf3e48758b34e51feaf904413244d9d7708562libwbclient-4.10.16-17.el7_9.i686.rpm40d1c0855c8259f9bbfd4f2f45b239b79c8d5101f2df884d86853c1abbf6af4bsamba-4.10.16-17.el7_9.x86_64.rpmd3727b6c48f0a4f9d908e8b6e3427846e6a80c5377ef0e40301e5a9e7df0b642samba-vfs-glusterfs-4.10.16-17.el7_9.x86_64.rpme9f03c3e2696c8256a55a620360f0cd4c4a8b1e70b6b7d4e664648685f58c246samba-devel-4.10.16-17.el7_9.i686.rpma56816dfaf5e2c393a7679576aeb6cc71251b81d1270e49c1f0f695c5cbe8e3bsamba-dc-libs-4.10.16-17.el7_9.x86_64.rpm8b8242d3d2b9651ca69ed606b593554940a9da7af796f5e5866f0fda5b911185samba-python-4.10.16-17.el7_9.i686.rpm1c50d68275ae3e786b12ed0941a5c865dbcae209edfc6da0b1c4062fae0671aasamba-dc-4.10.16-17.el7_9.x86_64.rpm7a05cc305cfdb6a7a873e3293a8e8ecc20f0ce56143be6a169128e274fe98076samba-common-libs-4.10.16-17.el7_9.i686.rpm40bde39bd1fa9e632258146bb71fa6fa62cb8bc173df3bbfc4fb3814230c232flibsmbclient-devel-4.10.16-17.el7_9.x86_64.rpmf2900e10160efa1fa6da0fd4cbb2306141c66e646a071c4429432aae2b178992libsmbclient-4.10.16-17.el7_9.x86_64.rpmd82ae98bd60973a99849a035947c743e3b1bdf17777141b2c91e4015b00d9444samba-client-libs-4.10.16-17.el7_9.x86_64.rpm59b11d7dca5070f0ab7f07fe1e2d366d35e089ef6fde9e652920bce0784b6a14samba-python-4.10.16-17.el7_9.x86_64.rpm226f20e710f0dba58f76df93ede8175a3f7218e2a450678dcce302aa7a77568bsamba-test-libs-4.10.16-17.el7_9.x86_64.rpm8b9125573a1c10f278cafe10823e8638d0d6d3fa8721edff72ee250d1745ce7flibwbclient-4.10.16-17.el7_9.x86_64.rpm11aa4dd9f1070cdccbef45593aa5eb8d11820e0a343f0365224725c2ee6c6052samba-devel-4.10.16-17.el7_9.x86_64.rpm7451c9daf89660e83e84d2e64c25253c6c1eaa71907a8b9a084dfac0f83d1224samba-pidl-4.10.16-17.el7_9.noarch.rpm006b198f8d806c3728f5028d288a95f9a4929068b54635abc2aa1bb22bd2098csamba-libs-4.10.16-17.el7_9.i686.rpm20421f25bfb9f83da767bc8bad49e16734ccea5cb08d6be240ecc216c1c13151samba-test-libs-4.10.16-17.el7_9.i686.rpmd2cea758a40b3c562a7e1701a61791a582d91409b79cdc5bec48a26f4ab4ddbasamba-libs-4.10.16-17.el7_9.x86_64.rpm3cdbb5d29cf8a9de05a3ea1e3ed041f63ace5c469c6214e1a816a6962d9a5f16samba-python-test-4.10.16-17.el7_9.x86_64.rpm885931f0c44184190ab523e79e44757c7e4994ab059d8d66906a695fecc68691libwbclient-devel-4.10.16-17.el7_9.i686.rpma993a893e2c3b713749c49f8fd13e03fe56eb514b45e6b84a7d608baf8248361samba-common-tools-4.10.16-17.el7_9.x86_64.rpm37508a8a808cd8d930f62f8983ee6ee2e8543745cae73cf163d31fd448aa7906samba-common-4.10.16-17.el7_9.noarch.rpm0a5637aac7e2ebbbb6d8f624450c071ab61caa086eecec041becd1520c4cacdesamba-winbind-4.10.16-17.el7_9.x86_64.rpm9a52b6824a9124e6c234bf305315ff6530e5057c88159a3306840461f7c19985samba-winbind-clients-4.10.16-17.el7_9.x86_64.rpm71b55f6e1c2158774b901d97db832afc225ba2882d88b13945557ae7a2e820dasamba-winbind-modules-4.10.16-17.el7_9.i686.rpm0a4d62969165153d51f06cbf88222fa0a88533589740e2e7b6da6a7395b1be82samba-common-libs-4.10.16-17.el7_9.x86_64.rpm91f4fae3ae01f88dd4c5667b02cbe12fc81ce1878891b1f39708aa228f3ca2a9samba-winbind-modules-4.10.16-17.el7_9.x86_64.rpmdd3a2f088f535f905a65bea23360486fe6e6a11d2749465eeebbd0ccdc1bfc14libsmbclient-4.10.16-17.el7_9.i686.rpmaea5935636f86272694d14548ee666e2d1eba32ca6bf57b762132eff600405eclibsmbclient-devel-4.10.16-17.el7_9.i686.rpmd2c8370a21a41827d547e2fb4461cc544a60eb49e696fb1f72367057fe00be37SLSA-2021:5195Moderate: Ipa Security And Bug Fix UpdateRed Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RHEL 8.6 IPA Replica Failed to configure PKINIT setup against a RHEL 7.9 IPA server (BZ#2025848) moderateScientific Linux 7ipa-client-common-4.6.8-5.sl7_9.10.noarch.rpmba3e65b75de0615b30f31251addbebf9a381c5752ce35c0c8a85890b19805a65ipa-server-dns-4.6.8-5.sl7_9.10.noarch.rpm8a1a1d7f5a6a84ea98aedaa19e07359a51a29a38e53fcb4cf267c116c5935f31python2-ipaclient-4.6.8-5.sl7_9.10.noarch.rpmdcd33ccebd465c4e937987026c0aac5c208598b470112e953f5a7741b41e54f6ipa-server-common-4.6.8-5.sl7_9.10.noarch.rpmb9172dd5d1dca7fe8e6849ebb3f238b45232c929509e28d9c9e7249fe8a7e1cbipa-client-4.6.8-5.sl7_9.10.x86_64.rpm4416f3ec1635682299d01ba62964a7f2eee00c3e1a9e659b724a44935cc91f2apython2-ipalib-4.6.8-5.sl7_9.10.noarch.rpmdfa9f7b90e8b4377d664998d7a0a31f0703626732069b265b202764c8ca2af1fipa-common-4.6.8-5.sl7_9.10.noarch.rpm0fb158bf0f87a788649c85f3f6ee3c6e56d6139d057da35d182da389253ac3e2ipa-server-4.6.8-5.sl7_9.10.x86_64.rpme96afb955b6d688374ff418cd38f41fc4308c48b8b3fa2bd2ec2e00e78be45eapython2-ipaserver-4.6.8-5.sl7_9.10.noarch.rpmb0562c5297aa37456cdcec9b40950cfadd9daac380e45107705d9b9faa4ac73aipa-python-compat-4.6.8-5.sl7_9.10.noarch.rpmd3e8bcdc368785fe79dc0c38fcd468781d6518e60ce4d76b62b2e335f834feb2ipa-server-trust-ad-4.6.8-5.sl7_9.10.x86_64.rpma253d56aeba91f49e9be09abdc6d8f19f1798d24adeb6e1d78400025bd5d965cSLSA-2021:5206-1Log4JSecurity Fix(es): * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7log4j-javadoc-1.2.17-17.el7_4.noarch.rpm7f8dcfcca0c95f2356405ffbe58f163d9ae1e29fe844c9c35cf72582717a9086log4j-1.2.17-17.el7_4.noarch.rpm51f4e6b324089f9d26b9d4c167770f5ae0f9302e00e36a9a1b7db5c7431ca091log4j-manual-1.2.17-17.el7_4.noarch.rpm4ce766ab47665d246a4f108b603d6d797967629d900cf570617727d883ddd1a2SLSA-2022:0003-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: SProcRenderCompositeGlyphs out-of-bounds access (CVE-2021-4008) * xorg-x11-server: SProcXFixesCreatePointerBarrier out-of-bounds access (CVE-2021-4009) * xorg-x11-server: SProcScreenSaverSuspend out-of-bounds access (CVE-2021-4010) * xorg-x11-server: SwapCreateRegister out-of-bounds access (CVE-2021-4011) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-devel-1.20.4-17.el7_9.x86_64.rpm98268e97294e5e61cd5ae9724a60f2d86fdb78bfad8b96a6d4cebe683dc5f506xorg-x11-server-Xwayland-1.20.4-17.el7_9.x86_64.rpmfbd34b80cced270b813bbef467a2d12255003967620e2c28bf4de0741c79225bxorg-x11-server-common-1.20.4-17.el7_9.x86_64.rpm2e1018a8d0bd51dff6d83ef948418f762c203d239f0020269fee7500538ab40dxorg-x11-server-source-1.20.4-17.el7_9.noarch.rpm7f5af24d0f6249d57137eb7f5f380a7f13c8aa5cfd9a914b8c5eff9df5c764d7xorg-x11-server-Xvfb-1.20.4-17.el7_9.x86_64.rpmfce562c16c7cdf9d0f147b567379b38071b0d934b574fa1d04007d19ddccc0b4xorg-x11-server-Xdmx-1.20.4-17.el7_9.x86_64.rpmefd6b680b414d75f5dee35c343ddf2e3ee2b0587adf5694202a130037cee4454xorg-x11-server-devel-1.20.4-17.el7_9.i686.rpmd100a533e292e9d1465d3b4238aaadd6e2075b81b3500f467bb26ae697b23fe5xorg-x11-server-Xorg-1.20.4-17.el7_9.x86_64.rpmb5e7aa52ca58da7977f27f333a17e9eacfc6fb54dd54d3390556009264f92652xorg-x11-server-Xephyr-1.20.4-17.el7_9.x86_64.rpm983e196d913b2396c61c6ac75d70687482dd096698a372f2f6ece8cd8f1cbeecxorg-x11-server-Xnest-1.20.4-17.el7_9.x86_64.rpmb01cce56ff3e9feb30957a95d43de3e6e97a9a2181e69dbf4048888095225636SLSA-2022:0059-1Webkitgtk4Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7webkitgtk4-devel-2.28.2-3.el7.i686.rpm2534a83763bd174b50e81a306838d5b1006a9b89f35e76680ee67f4df97cac7cwebkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm218df31a4ff2a0a7c341dc484c2c348e8a2205db49147ccd5448a78cb5e6d78dwebkitgtk4-jsc-2.28.2-3.el7.i686.rpmef77d62e815cf45cec69e28567cd8079f03beeb766ce1c1d846dafb56a016f2dwebkitgtk4-doc-2.28.2-3.el7.noarch.rpm953e6f26fc29f36acfa9015d8c95a5e41f4cac5622b8b90ce20ddbdfd957da6fwebkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpmca992fdc96462b479e549876ac8e275a99e37a6add39225543c90ba2d0e27493webkitgtk4-2.28.2-3.el7.i686.rpmeda71bba7578ebc4415bbfd8c43813920c6be2f8bba1fbc14c0d39a8b5c3222bwebkitgtk4-2.28.2-3.el7.x86_64.rpm643bdebe39d488dd7e5e47699ed2d8ae3227bd5f7d2a182385b9c73152180c5ewebkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm0e22c4a0c88f6a07e46cbb0c1b090888a8ceb611667f8cdba8d5f6303987644dwebkitgtk4-devel-2.28.2-3.el7.x86_64.rpm6c3714b086b57365575f5ab43c8aa2a05af23e0346f9ec215cb71c79098d07b5SLSA-2022:0063-1KernelSecurity Fix(es): * kernel: perf_event_parse_addr_filter memory (CVE-2020-25704) * kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322) * kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * A gfs2 withdrawal occurs function = gfs2_setbit, file = fs/gfs2/rgrp.c, line = 109 * i40e SR-IOV TX driver issue detected on VF 7 - VF connectivity loose after VF down/up duplicate ACK not sent when expected * [kernel-debug] BUG: bad unlock balance detected! when running LTP read_all * Rudimentary support for AMD Milan - Call init_amd_zn() om Family 19h processors * A VM with <=8 CPUs handles all the Mellanox NIC interrupts on CPU0 only, causing low performance * fix _PSD override quirk for AMD family 19h+ * generic_file_aio_read returns 0 when interrupted early with a fatal signalimportantScientific LinuxScientific Linux 7kernel-tools-libs-devel-3.10.0-1160.53.1.el7.x86_64.rpme1b4eb8495df8c8e404e29027bf75bfcf446e9c72f4cdce9e885ad4c0f84c74ckernel-tools-libs-3.10.0-1160.53.1.el7.x86_64.rpmfc7930b80c5c957b3c11ca0a8fdc8253b5c592005218c195013b5af27ad52fe0kernel-3.10.0-1160.53.1.el7.x86_64.rpm50fa58d82abc229771879df7ea1c31833d20c8e5648aaca94f796d4454ce47d9kernel-devel-3.10.0-1160.53.1.el7.x86_64.rpmefe2465efe72478457ad7248132950834a973a31d7e32dd72bd6bb7a5af678d1kernel-debug-3.10.0-1160.53.1.el7.x86_64.rpmb7cbee4f83236379820e3ad7c8c99517ac58062735b6b92fee460df377354e5aperf-3.10.0-1160.53.1.el7.x86_64.rpm3bf6fe2ebcdec2cd7c6947ca654995807dbd5079be69a53f4dd4e83bbde2ce4akernel-headers-3.10.0-1160.53.1.el7.x86_64.rpmdd7cdc23048dcb8f3deb188047954c6e8a860ec543c1141af80401bcbb544cb9kernel-abi-whitelists-3.10.0-1160.53.1.el7.noarch.rpma4e8fae7b13733df408e4e6b47ed996d16189f5d7fcad211b6cdbc1b3f21dfd0kernel-tools-3.10.0-1160.53.1.el7.x86_64.rpm72148e3dc5d1b8f06e71978c4d49a61a9afb83ba56f2b1c4528c0fb9d07714capython-perf-3.10.0-1160.53.1.el7.x86_64.rpm5a97314cb3e63a379d542f48205763959151da815d6b1663057b2eda47725517kernel-doc-3.10.0-1160.53.1.el7.noarch.rpm530aea97981d5feda154cd41631c4a1220b291e183601d7ab2456dae5d5dc721kernel-debug-devel-3.10.0-1160.53.1.el7.x86_64.rpmd1e6c49f3b347b404269e242437ec0ca7f365b201170769917b0b0cc96a0e02abpftool-3.10.0-1160.53.1.el7.x86_64.rpm643ad950e55e74f544c41b24cd7c4a2e1baf65a5802de9e20573f45b31bb27d8SLSA-2022:0064-1OpensslSecurity Fix(es): * openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7openssl-1.0.2k-23.el7_9.x86_64.rpm4b7e5233f1ef54c5a49a2e7ef776b6555b7cbb9d2b310f9697923d9b7c7f25fbopenssl-perl-1.0.2k-23.el7_9.x86_64.rpme6618c1e128f8765d85a14ea2e693bc8fc06c837542ed5c30d7df96c37104bb7openssl-devel-1.0.2k-23.el7_9.x86_64.rpmf3f92393d8ac5d161e7460d7e50d01802e498cfe55855bcc1a7f58bab0580a3aopenssl-devel-1.0.2k-23.el7_9.i686.rpm93769ab70815d8a8cdc9f8edf4f90ad61eb40cee4bd092b8c89a511d0de01274openssl-libs-1.0.2k-23.el7_9.i686.rpmfb34c957a261788fe6457be8bf0ce1f77c970e8132ab509e1dda887884c7b0d9openssl-libs-1.0.2k-23.el7_9.x86_64.rpmc39581eaf6d8a28a5b3af447d4a0a83cdf236803fecf60172074131740c9412copenssl-static-1.0.2k-23.el7_9.x86_64.rpmf40c92173b08ccc3db38d78bbeb03120d0b043bbb4deaa2d423b9e981c0490d0openssl-static-1.0.2k-23.el7_9.i686.rpm5f5d16a031e480a292463d7c1aa64a083d69f8ba617332518b5480af9e558384SLSA-2022:0124-1FirefoxThis update upgrades Firefox to version 91.5.0 ESR. Security Fix(es): * Mozilla: Iframe sandbox bypass with XSLT (CVE-2021-4140) * Mozilla: Race condition when playing audio files (CVE-2022-22737) * Mozilla: Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738) * Mozilla: Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22741) * Mozilla: Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22743) * Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 (CVE-2022-22751) * Mozilla: Leaking cross-origin URLs through securitypolicyviolation event (CVE-2022-22745) * Mozilla: Spoofed origin on external protocol launch dialog (CVE-2022-22748) * Mozilla: Missing throttling on external protocol launch dialog (CVE-2022-22739) * Mozilla: Crash when handling empty pkcs7 sequence (CVE-2022-22747importantScientific LinuxScientific Linux 7firefox-91.5.0-1.el7_9.x86_64.rpmb24cd7262ae038465b552c404eea1adce86219ff96ba1b00bfde6c71fb4d708ffirefox-91.5.0-1.el7_9.i686.rpm52541ab3a9f02cf7b7362cb6b02574c833e661eeb9c14539f3811c03c8b83738SLSA-2022:0127-1ThunderbirdThis update upgrades Thunderbird to version 91.5.0. Security Fix(es): * Mozilla: Iframe sandbox bypass with XSLT (CVE-2021-4140) * Mozilla: Race condition when playing audio files (CVE-2022-22737) * Mozilla: Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738) * Mozilla: Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22741) * Mozilla: Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22743) * Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 (CVE-2022-22751) * Mozilla: Leaking cross-origin URLs through securitypolicyviolation event (CVE-2022-22745) * Mozilla: Spoofed origin on external protocol launch dialog (CVE-2022-22748) * Mozilla: Missing throttling on external protocol launch dialog (CVE-2022-22739) * Mozilla: Crash when handling empty pkcs7 sequence (CVE-2022-22747)importantScientific LinuxScientific Linux 7thunderbird-91.5.0-1.el7_9.x86_64.rpm3cb0a76f2c45fa9cd11c3b908892dfb10fd1f7030c243a18fe0b6e92849b3352SLSA-2022:0143Important: Httpd Security UpdateThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7mod_session-2.4.6-97.sl7_9.4.x86_64.rpmf6d50a70e34d90f430a16387e36ce6c3c58fe33c52432ccfc433c32203ade455httpd-manual-2.4.6-97.sl7_9.4.noarch.rpm8a49f246b504b1bd850314a39faadadeaef3a6cfe23bb67c6774d71e3c5fb8e7mod_proxy_html-2.4.6-97.sl7_9.4.x86_64.rpmb0fd2d6d5a89ba32d563573c3bb8be4c58e28e13e3eed53052af8899509aa4ffhttpd-devel-2.4.6-97.sl7_9.4.x86_64.rpmbd85ba1c0745e459eef961ae53126bb0796a3235ca3dd6539f089add38513004httpd-tools-2.4.6-97.sl7_9.4.x86_64.rpm4c7abdd81e62ca20befa0591ebeff2685f0aa76633a726a99e56fc7bd005b062httpd-2.4.6-97.sl7_9.4.x86_64.rpmf2be60c4f22fff3a82e3b7d590f13ec8ccc695bdfbe7f949bd74d0bcf76ae197mod_ssl-2.4.6-97.sl7_9.4.x86_64.rpm19c13172d628ab4ee8f43bbe35b7bcfcc2f7eaa13ce09c7699f0652025fe5ba1mod_ldap-2.4.6-97.sl7_9.4.x86_64.rpmf2d94441192f13f6930c986ef6b676ff097f35f978363b34e63829aaba93855aSLSA-2022:0162-1GeglSecurity Fix(es): * gegl: shell expansion via a crafted pathname (CVE-2021-45463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7gegl-devel-0.2.0-19.el7_9.1.i686.rpm1026ad809317760b0d4aabbe6b6e860534b665a242954df648017d26425f395agegl-0.2.0-19.el7_9.1.i686.rpmb1f3ba7fcda7b41faeac20f54e467969a03dff3c82d44d92e0b84c0b659c1140gegl-0.2.0-19.el7_9.1.x86_64.rpmef02317437aeae99e92e18ccacfeaf9171450113cc41ba989318f5fcc0c41436gegl-devel-0.2.0-19.el7_9.1.x86_64.rpmb6ac02e80d0cc53efc5d041e39652cef7a249221c39f729b7b8cd0d63ff85226SLSA-2022:0204Moderate: Java-11-Openjdk Security UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) * OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) (CVE-2022-21277) * OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) * OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) * OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) (CVE-2022-21291) * OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) * OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) * OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) * OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) * OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) * OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) * OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360) * OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) * OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) (CVE-2022-21366) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7java-11-openjdk-devel-debug-11.0.14.0.9-1.el7_9.x86_64.rpm54e94a49f94c000311fd8d9e5b97e53301facf3f4124087671061204158dd262java-1.8.0-openjdk-devel-debug-1.8.0.322.b06-1.el7_9.i686.rpm22abc18d93f07f90e6b42ddbd5093a801bf7e3f3015e8cd27f3c4e26c0da2eb7java-11-openjdk-headless-debug-11.0.14.0.9-1.el7_9.x86_64.rpma2a1d79c7ddac04304f1eca9f9d18c82864f1870988c40e6528c4f9bf46d9b68java-11-openjdk-demo-debug-11.0.14.0.9-1.el7_9.i686.rpm3a4aea36b0f4e25a3ed5cf94e0f7386ab5f1d45e3823fec31de7e02212022fadjava-1.8.0-openjdk-headless-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm4f2b655d843d01abe1db3f8e10e173d042dcb42d4bcbafbf32069ccf6cc12dadjava-1.8.0-openjdk-accessibility-debug-1.8.0.322.b06-1.el7_9.i686.rpm250e0a7cad249a45617d83f6b5150b91cc908568fa58912282ccbf9e3614298djava-11-openjdk-javadoc-zip-debug-11.0.14.0.9-1.el7_9.x86_64.rpm7a2935078143afd2685722413322ae84fb00eeb85c730ffaf5d8132439a0cae2java-11-openjdk-headless-debug-11.0.14.0.9-1.el7_9.i686.rpm30a6882e26f722d5d52e51dfb475f44d6dd7c05e6ccc7be976994b6269a724d0java-11-openjdk-demo-debug-11.0.14.0.9-1.el7_9.x86_64.rpm6369689fb71d5d00ec0736c4462b02d19376b3085ba45a70f2186224f30002d8java-11-openjdk-javadoc-debug-11.0.14.0.9-1.el7_9.x86_64.rpmf040b3fff3cadbf5bba46359793f047aceec610db6b246d2d1495b575976b0c4java-11-openjdk-javadoc-zip-debug-11.0.14.0.9-1.el7_9.i686.rpm96de0c2dc0c8db1c3b6d05d1d88021884e87016f30990a68b5081ae3a2dd34a2java-1.8.0-openjdk-headless-debug-1.8.0.322.b06-1.el7_9.i686.rpmf74f241d8001846ea41a74f6e4fe447e3c5040739edfa4bede9d73a4e2acc064java-11-openjdk-debug-11.0.14.0.9-1.el7_9.i686.rpm3fc46c2e0fbdb37e4e798254d1c5ed4d35d14efaea3c20a9401283ea9b068303java-11-openjdk-jmods-debug-11.0.14.0.9-1.el7_9.i686.rpm2fc773b81c442f071e6ed161ff9836373741bf1ac45102c9a2c006d9c48b6641java-1.8.0-openjdk-src-debug-1.8.0.322.b06-1.el7_9.x86_64.rpme9ea555722da53401eb1acedccb6cee5093ffe0d923a857b4de4d4be2c090feejava-1.8.0-openjdk-devel-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm428130bcc2525c6a036bbaf6da0788720b6e75aada9a50fcafe91585b4f28244java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.322.b06-1.el7_9.noarch.rpmfed1d5416135665f0d365e53c2821753658b58496601de12afe92b96e502b314java-1.8.0-openjdk-src-debug-1.8.0.322.b06-1.el7_9.i686.rpmd08459c9eb22b8e5f9be6a280c5df29f72ad16bf6f83f22897aaabbea136e05bjava-1.8.0-openjdk-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm01d5ba12a84abfa92dc7a4bc18d4a833cc125ae5b52c5d8c3bf66e9347bb54f8java-1.8.0-openjdk-javadoc-debug-1.8.0.322.b06-1.el7_9.noarch.rpm91ded251200a705eb4c072c2044612331cd229e820328e0045319633269d704ajava-1.8.0-openjdk-debug-1.8.0.322.b06-1.el7_9.i686.rpmffead4c176d93aee9b77b4da35a516af4023a7ef83a1167d681970b9e1c1d1cejava-11-openjdk-jmods-debug-11.0.14.0.9-1.el7_9.x86_64.rpmf86af909cc2f526fe18fd6535390085ec139b66b88863946cacb8e6ad68dbde7java-11-openjdk-src-debug-11.0.14.0.9-1.el7_9.i686.rpm5afd5e147596a1d9397956bf9721329089d28bc928fdd47a1459ae4b6a3b6b5ejava-11-openjdk-debug-11.0.14.0.9-1.el7_9.x86_64.rpmf5e40ddaf84a7b9a91c9f819c7dd2af4ad5254788ef00c3e83dfba35eaeb80a7java-11-openjdk-src-debug-11.0.14.0.9-1.el7_9.x86_64.rpm4360d60400c097e9d840cd55ee4b32828b82afe859bd0acd2738aed6548b4839java-1.8.0-openjdk-demo-debug-1.8.0.322.b06-1.el7_9.i686.rpm44511b6ecb9daf9acc9d5e84a68d5ba9f06302ca652ae1f507c84e04a43edb75java-1.8.0-openjdk-demo-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm106283358485a57311aa90a8b37fad25d1dd72f71a528ff64872f51ce8d27d32java-1.8.0-openjdk-accessibility-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm419bd98f1f9c77fc6e63f6eff664dc3af238fcbf6916d4952c111e441f341af7java-11-openjdk-devel-debug-11.0.14.0.9-1.el7_9.i686.rpm4fa67312ed6440d3808caf8bd033c095c3126c02c12ca3c8126e958b256550abjava-11-openjdk-static-libs-debug-11.0.14.0.9-1.el7_9.x86_64.rpmfdbd1738c7a9a66b53d2744428dd69a7ff9129a8caa52042fa2ed080b1a7e705java-11-openjdk-javadoc-debug-11.0.14.0.9-1.el7_9.i686.rpmbe5ac853436da737779d848c36be1cdae8aa926fad8d6540b5b4b77f929652a2SLSA-2022:0204-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) * OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) (CVE-2022-21277) * OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) * OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) * OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) (CVE-2022-21291) * OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) * OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) * OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) * OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) * OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) * OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) * OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360) * OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) * OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) (CVE-2022-21366) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7java-11-openjdk-devel-11.0.14.0.9-1.el7_9.x86_64.rpmcc0889f63874783c1587cdb2920dae9c9b22b654208212411a6675c559ae85bdjava-11-openjdk-javadoc-11.0.14.0.9-1.el7_9.x86_64.rpm77bd8cd3cb7b00b03f86de7d2ba8c94733b0cd0058cc898d318c83c6f2b3067ejava-11-openjdk-javadoc-zip-11.0.14.0.9-1.el7_9.i686.rpm5144866cf38908fa899127f174a67b3913a2b873291b355067e0896da8eb4fe0java-11-openjdk-src-11.0.14.0.9-1.el7_9.i686.rpm50eb4249160603431d7aab5d83df8bb7408102070f1e7f6b7b87c9cae987644bjava-11-openjdk-src-11.0.14.0.9-1.el7_9.x86_64.rpmd6bf474547d1334de8d7640fc5126470cd0f84c08c92e2b005df87158e7dad39java-11-openjdk-jmods-11.0.14.0.9-1.el7_9.x86_64.rpm52c47aeb85a00884f332349ad60e14bcfd2967dbf35901b99caa91a9c8874941java-11-openjdk-javadoc-zip-11.0.14.0.9-1.el7_9.x86_64.rpmf2f7478230baa8b5a9dc38d0e718632d861b42d60326bccbcef0d80145ad246ejava-11-openjdk-11.0.14.0.9-1.el7_9.i686.rpmce7b0ad4461acf10115acbecf082ea2475952fd27c71530cf08d55d195153d3ejava-11-openjdk-demo-11.0.14.0.9-1.el7_9.x86_64.rpm8f0a47867262db56e7790a717dd1ada48ae630a58e63875fdbafcbd99ce10b74java-11-openjdk-static-libs-11.0.14.0.9-1.el7_9.x86_64.rpm75db03a8a5647d9c9327f479714bc74dfad20c0002ad9409ceab1e0c0ad09388java-11-openjdk-headless-11.0.14.0.9-1.el7_9.i686.rpmbbf237389b53489037deab07f4eb170225ef1b113b38f7d175f9f5345ff792d9java-11-openjdk-headless-11.0.14.0.9-1.el7_9.x86_64.rpmc69384d43f8be73c756b6b45ed9efdc142fc792d5988b8a7a7f2d81749e21768java-11-openjdk-demo-11.0.14.0.9-1.el7_9.i686.rpmd19bdc3ab44387fbce45f62c463221c9788c0c63d0f9eea7a2bdb7eae77ad7ccjava-11-openjdk-11.0.14.0.9-1.el7_9.x86_64.rpm9459fcb48519274800a15bc286399d160a55ac9e4a14504ddc677e6cdca22371java-11-openjdk-javadoc-11.0.14.0.9-1.el7_9.i686.rpm4100a9da94044e8a26c6fbbb8a155fcb3d346a0b999817f744a566e83af271ddjava-11-openjdk-jmods-11.0.14.0.9-1.el7_9.i686.rpm18e806660adc56368b07783d1dc706fc1574144c5a3c469baf58414b03134389java-11-openjdk-devel-11.0.14.0.9-1.el7_9.i686.rpmd93618065592c206d65b10e92606933f6436cc175d919bf380acd07614d589d3SLSA-2022:0274-1PolkitSecurity Fix(es): * polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7polkit-0.112-26.el7_9.1.i686.rpma51c58a015ba9d4a24cd2892eff98c88780bc2faf647d7a2de964503062c9a9apolkit-devel-0.112-26.el7_9.1.x86_64.rpm9f5b87876726dd6f3222308cf4d835c0ea59184d38f0a6b9d63e7c31230f0e95polkit-0.112-26.el7_9.1.x86_64.rpm68203be229c1f9cda0901c099d1c83d467c440273aeca0477beae5f4837bc9cepolkit-devel-0.112-26.el7_9.1.i686.rpm927f01258ae72316036787ef5c597fa6ab4b4d3b52f1d2a2247ccf1819f9dc84polkit-docs-0.112-26.el7_9.1.noarch.rpme60511f118ae805d5d7cb82c8a852b55454d27a21407581e71db6420d58adf90SLSA-2022:0306-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) * OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) * OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) * OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) * OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) * OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) * OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) * OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) * OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) * OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360) * OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.i686.rpm9fc1c228bfdd6cd91ee00a1b85521b0bd9a1703c25bf371a3e170520718b254ejava-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.x86_64.rpm04dc751224ddbbdfbf53fcc13646051e88de5a92cf81f9621ac4d26bd51adca4java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.x86_64.rpmd0d1db385d79c24b153a5e378d3557637b3262336aa5c670577218a9e1b07b79java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm3f9d342530e385ac09c2bccf9994f13b797fa7245a284d16e77cd44482175e00java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.x86_64.rpmcac72660b95e7de372e9c8863d0d577f6e66b21b019847201a6975aba535fc7cjava-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.i686.rpmb6f8d11f1467b3341d0c1790239571e32e512cc2f9f57033a77c00984940715fjava-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.x86_64.rpmc54c45e92dd9370bd5ec2cf4b94f9c4c2c5c8b23d4d460fc13e9312df9ec2f9djava-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpmd5fd399710a732268bba30410c30f68613bfdd0abdd174ddba84f2084c36ebb4java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.x86_64.rpmea1964a5ac6c3ce7d23c0379adf67af3b9a6b324186b6f5a77c03dc41ea7e955java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.i686.rpma138a9ff6d0a204d4954e21ce9bbfffe6cbc71cdfab9b7254ea8a1519ed38892java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.i686.rpmb0d2892f5361e65f6cf19ed8e55b374bca09237b7ffb47788dc94db5ed46d584java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.x86_64.rpm8930e7312515fb1b8ec206e11be265caf82649d498f28a7bd2664f7668cbfd79java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.i686.rpm1474e8e84cd3edee131374d943d7c5aaa650d46f2fbf2679902f1ee849009900java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.i686.rpmabf6d38551de0d1441ff30ed1e5770c5f9402423d2c42944e003942abd8748aaSLSA-2022:0328-1SambaSecurity Fix(es): * samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution (CVE-2021-44142) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Fix CVE-2020-25717 username map [script] advice * Fix Kerberos authentication on standalone server with MIT realmcriticalScientific LinuxScientific Linux 7samba-vfs-glusterfs-4.10.16-18.el7_9.x86_64.rpmdf8d1340cb4aa6914bb9ea7874070288a8d22c55f39d645ad86ba5a31c259e2bsamba-common-libs-4.10.16-18.el7_9.x86_64.rpmff89d32684ee759c454ef11b51ff31d4ab44179d46d5283cbf646999d16b2886libwbclient-devel-4.10.16-18.el7_9.x86_64.rpmbc9aa7dbffea68c98acbc88351a6327dc9ca500eb6a2479120737e1f96bd2ec2samba-client-libs-4.10.16-18.el7_9.i686.rpm663812b7dfd973fdeb6b74305cf08921d5e8335ed5017c3df59727ebd535ea1esamba-libs-4.10.16-18.el7_9.x86_64.rpme0097d987e2824450c7a11ac3fa532ab06135fd15f38220e2dfaf8f077f038ebctdb-4.10.16-18.el7_9.x86_64.rpmf2202e2e9b18f5f5f4811a7c13559b3ac8af727e7527cb65d40c3e56e4dc8c0dsamba-common-libs-4.10.16-18.el7_9.i686.rpm358abe0a4f3d1cccee4cbfdba14e4b8e9f9b249b3be50719522a14fb86e950d0samba-winbind-clients-4.10.16-18.el7_9.x86_64.rpm5d7f29a95b57203ec49238bd369911af9b72ba82f75a0622ea6163b35f3314b5samba-client-libs-4.10.16-18.el7_9.x86_64.rpm73b297084b805368e9667009be2b75c17b73ad7f1f506494a49df3d35109a3besamba-test-4.10.16-18.el7_9.x86_64.rpmf7e01fd00edc4d62cd42ae41951abf4757e5ad7a1c1ed285a327907171b2ff11samba-winbind-4.10.16-18.el7_9.x86_64.rpmfab6ec8990130ff39e6b8f98593599f42697a5438d68800968033b83cc51e308samba-winbind-krb5-locator-4.10.16-18.el7_9.x86_64.rpma2bd52f053cd2c036687eebc3ea642bfc33aa5a38ab6f2cd55da9210d8d5516fsamba-common-tools-4.10.16-18.el7_9.x86_64.rpm3f52d9d7e060e7b709f26c6293aba4e0ef9d9bdadb5603dd61099716d381aaa9samba-4.10.16-18.el7_9.x86_64.rpmced360cb043b91623e67bee09549903842831c2eede707e98d8ae900796afb51samba-common-4.10.16-18.el7_9.noarch.rpm32f942ee5738af20289aabd52b423162b6bd093c6be041a7071238080853b8e4samba-krb5-printing-4.10.16-18.el7_9.x86_64.rpm01fc3a9e1c9a12f830b114d85d160f26074e02dd715a312951a1e2e5a57dc324ctdb-tests-4.10.16-18.el7_9.x86_64.rpmaa2e4e9aa51f6c1a5f3d4d911af3af5dce1f7d9e9baf676c7e5dd49b8790b0a7samba-winbind-modules-4.10.16-18.el7_9.i686.rpm875867d34e244fe641fff4e423d80b07242a8114b964f46d8557ff456311269dlibwbclient-devel-4.10.16-18.el7_9.i686.rpm68d0c23f13c12c8c6f6a7b10575d1bad11b066bcf4b365a1a0431c771418402csamba-test-libs-4.10.16-18.el7_9.x86_64.rpma9b7a9efd81714e4c1dc7138b23388da7c3b85057317bcb52cbea650c5720897libsmbclient-4.10.16-18.el7_9.i686.rpm52006ab895f07fa144f6caf9f0108d798dc7686e992b97dc18c0a110b2f2f489libsmbclient-devel-4.10.16-18.el7_9.x86_64.rpma6116873071d0e0e1a93f92da747594440df1661bab383785ab65bc054e78c8esamba-devel-4.10.16-18.el7_9.i686.rpmfc07d27a24cfb4bf3fa270fffe46819d19b7e4e847365548d7a6b7ec278da24asamba-devel-4.10.16-18.el7_9.x86_64.rpmca6c55ccd41e72fed93e81bbc6fdde14ea7e8346f8fc14c7801372dba2104e65samba-python-test-4.10.16-18.el7_9.x86_64.rpme6e02517c726e3d2c1b20b65f6d57c118d87f6af0d28492ede3bbbbef4c7ed40libsmbclient-devel-4.10.16-18.el7_9.i686.rpm8a522401f34868ed4780b40edfc1b2fa187e1edf154c390de8b9cba7be2074b1samba-winbind-modules-4.10.16-18.el7_9.x86_64.rpm0910ecae72d725b7e82afd842ef1fa185e4dc42011571109c4c238d91f97c8a5samba-python-4.10.16-18.el7_9.x86_64.rpm1110731afb343bcb0a24bb1093644864edd9c95fd2405668431271396b824fc3libwbclient-4.10.16-18.el7_9.x86_64.rpm93c751bd215072f74bea32450991e179972a893d22670d3aa7734a20f8e284a4samba-libs-4.10.16-18.el7_9.i686.rpm822f845e292c216299de5833eeee71b674544aa92d36be06aa9a0f5c7d5abe4dsamba-pidl-4.10.16-18.el7_9.noarch.rpmf8e815f2673098975c445e25da7c9888356919b0f110f82a04eb99f8e829b91asamba-dc-libs-4.10.16-18.el7_9.x86_64.rpm4e068894c52502219475e5eedff3ebafcb87de6e24b7d19b5f2a442fd8f0210elibsmbclient-4.10.16-18.el7_9.x86_64.rpmade34f32e8b4638566cad1850941da3d52909303b61d17d40757a1f1b2d6e5c4libwbclient-4.10.16-18.el7_9.i686.rpmb18a8ec1660612b3ad53037f8ac744ee63d2b8a9ad2c26af2d6ed8e1b0c56b77samba-python-4.10.16-18.el7_9.i686.rpmd15237e0febd8fb7c185f336f4e8c1b4b5bf46db636e83fa5289b928c9ed0fb8samba-test-libs-4.10.16-18.el7_9.i686.rpm2e289467abbb34185c8560a26d2cf8e48172772b3ebfd21da6cb9bbe7db22633samba-client-4.10.16-18.el7_9.x86_64.rpm4ae012ffc048270196283c083ddc37e49cb6867ac416c766017cbb2518edc18esamba-dc-4.10.16-18.el7_9.x86_64.rpme1085bfc77c7780cde712c509a36e2fedc60a70f6c10f8a7b92c77b2baf3211cSLSA-2022:0442-1Log4JLog4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): * log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305) * log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7log4j-1.2.17-18.el7_4.noarch.rpm9a9f3a9c0c0b3c903b3eaba362782c65a7fe0960c03569ceb943974feb8dc6a0log4j-javadoc-1.2.17-18.el7_4.noarch.rpmb7bce1f231766d0932ad8e7a33358ec1e403446a4c9397b9c9420d4ca87605e6log4j-manual-1.2.17-18.el7_4.noarch.rpm461d220a1b053f5423d08f9200f10c970665b4c01c355772b0494ab003236f85SLSA-2022:0473-1AideSecurity Fix(es): * aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7aide-0.15.1-13.el7_9.1.x86_64.rpm363dd087939f8af0acae1ac7e23f6450d17e61db25f0b1ba7fc788c90b4c8c9cSLSA-2022:0514-1FirefoxThis update upgrades Firefox to version 91.6.0 ESR. Security Fix(es): * Mozilla: Extensions could have bypassed permission confirmation during update (CVE-2022-22754) * Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 (CVE-2022-22764) * Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable (CVE-2022-22756) * Mozilla: Sandboxed iframes could have executed script if the parent appended elements (CVE-2022-22759) * Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types (CVE-2022-22760) * Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages (CVE-2022-22761) * Mozilla: Script Execution during invalid object state (CVE-2022-22763) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.6.0-1.el7_9.i686.rpm006aa93e30bbb3f0008e6d0e66fd76bae445f9cceee651b211fc41064485b986firefox-91.6.0-1.el7_9.x86_64.rpm02ae80929123f01f3766ad291f6c2fe454e161bf31ecb8405a78b352d9d5e857SLSA-2022:0538-1ThunderbirdThis update upgrades Thunderbird to version 91.6.0. Security Fix(es): * Mozilla: Extensions could have bypassed permission confirmation during update (CVE-2022-22754) * Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 (CVE-2022-22764) * Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable (CVE-2022-22756) * Mozilla: Sandboxed iframes could have executed script if the parent appended elements (CVE-2022-22759) * Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types (CVE-2022-22760) * Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages (CVE-2022-22761) * Mozilla: Script Execution during invalid object state (CVE-2022-22763) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.6.0-1.el7_9.x86_64.rpm4cb3af64b351c65ca34d5fdd03c25ef419d792314f77aa5e8f6f9fc14bd12537SLSA-2022:0609-1Python-PillowSecurity Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7python-pillow-sane-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm761ee37e931defd45f9d59ca37e3faf94f054114e2a73c335d20318a23c484a9python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9.i686.rpmd249271ef57c9faae7cffe852c28a837b96ae8f6d1b4e330c1b9792f869adf53python-pillow-tk-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm8bc1039d9b77f4fd8c40f8b4a8dc0c4d1959420b8fd45beeb7ed77855c53268apython-pillow-qt-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpmca4d0a62c0744041d7f27f56718b6d7b22a22aecfa795edc5a968ed7e508e41dpython-pillow-2.0.0-23.gitd1c6db8.el7_9.i686.rpmf24f8203b4277f2c132fa1c7259c7f537836f050dd5a5b7b5c1267fac1d3e9a1python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpmc10b296e79d6f98eecd23df8d0ab59797f6aaac7bb30bdc005023e234b01ed65python-pillow-doc-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm2620c143a4a87bd90be2f59117c2af3fc51383790dca3e0887c226cdbda8a851python-pillow-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm60975a21b14fe34186e2217332ed40acd52bcb74f73d679fd61f81041a9d70bdSLSA-2022:0620-1KernelSecurity Fix(es): * kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466) * kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920) * kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155) * kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330) * kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942) * kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege (CVE-2020-0465) * kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564) * kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573) * kernel: possible use-after-free in bluetooth module (CVE-2021-3752) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Kernel with enabled BERT does not decode CPU fatal events correctly * SL 7.9 - Call trace seen during controller random reset on IB config * Infinite loop in blk_set_queue_dying() from blk_queue_for_each_rl() when another CPU races and modifies the queue's blkg_list * NFS client kernel crash in NFS4 backchannel transmit path - ftrace_raw_event_rpc_task_queued called from rpc_run_bc_task * SELinux is preventing / from mount access on the filesystem /procimportantScientific LinuxScientific Linux 7bpftool-3.10.0-1160.59.1.el7.x86_64.rpm4ddf7ebc316baa4753d705cc370c3345d8e2e3cea217dc81cf612a8ba3f92af2kernel-doc-3.10.0-1160.59.1.el7.noarch.rpm946c0d5fcb9b4946fd34699fb2ef587e861ec95bc4468acce0c7422eb10425d5kernel-tools-3.10.0-1160.59.1.el7.x86_64.rpme747d7f2f10bff1b2ca5b681279af5885c2bb1d05885c2e98b9b6ccace3d3a03kernel-headers-3.10.0-1160.59.1.el7.x86_64.rpma22a4b3e94f5b811f45bf3495d738f76e4496f5ce9330f9720e19cab12fa77c0kernel-devel-3.10.0-1160.59.1.el7.x86_64.rpm6e1694a9954433eabc31e5ce15ffbb9c21ff17193421ae9bb3cb180ed1b88e34python-perf-3.10.0-1160.59.1.el7.x86_64.rpm82a02931a29454361303ab1ba2c02f228f0f17bf17b57b56343a8f6cab755296kernel-tools-libs-devel-3.10.0-1160.59.1.el7.x86_64.rpm463f7dda5c55c053351b111748e0bcfee9f51c9ea91ad6a93d3e43ce32563911kernel-abi-whitelists-3.10.0-1160.59.1.el7.noarch.rpm13ffd6cfe031fa7b7ce1e900387a4a4ba21b9c079f01e6c7727b8a1154fd2504kernel-3.10.0-1160.59.1.el7.x86_64.rpm60245e7c95ddaa01b92e933a97e4a19b14691634789b4da69df74ef7f7ca3e03kernel-debug-devel-3.10.0-1160.59.1.el7.x86_64.rpm82baafb6336e0df2607de6c8cae06e5f156a0468672396aae71a1d3c2e320016kernel-debug-3.10.0-1160.59.1.el7.x86_64.rpmf3d5d25fdcfeeeb70b7f01ee947bf0905277a88b74fc90cd2218a08f9879f0cdperf-3.10.0-1160.59.1.el7.x86_64.rpm05f73fd3364bb8792508c37d2a3c449f175e11e27884d797aacfcdba9495655bkernel-tools-libs-3.10.0-1160.59.1.el7.x86_64.rpm32309a82faf074334032b78dc644203d3d8cca45cb372d5b3b780391248a4504SLSA-2022:0621-1OpenldapSecurity Fix(es): * openldap: assertion failure in Certificate List syntax validation (CVE-2020-25709) * openldap: assertion failure in CSN normalization with invalid input (CVE-2020-25710) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7openldap-clients-2.4.44-25.el7_9.x86_64.rpm05df5e99db0edc47544d7e762ad1ccc43a9e553280b133221c5bd62d14fe880dopenldap-2.4.44-25.el7_9.x86_64.rpme9a2d83f26076ad4562fa60d1ae142d084bfdb8aa51f48827d6934385a26f72bopenldap-devel-2.4.44-25.el7_9.x86_64.rpm97dd2cd507f6de48745ebc747fc1f4ef66077ec5b94c4052d0653c3ecfda9cbaopenldap-2.4.44-25.el7_9.i686.rpmc09a5ae95c62121ac6673698e840713a44a367e395133e28ab063689d6ab80cdopenldap-servers-2.4.44-25.el7_9.x86_64.rpm80759d70873b2db68b01b5378b4959847eed52f08191d3ac7adc649b860fdac0openldap-devel-2.4.44-25.el7_9.i686.rpme7b7ce9bd1c91af747a625b85f9d9a3b92ad3db0145c679b6fa2094563a0edacopenldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm0177d423dfdf9c911c709ed276d8a2fac763c9e586977f47df64187a75f64803SLSA-2022:0628-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: double-free of the virtual attribute context in persistent search (CVE-2021-4091) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * CSN generator can adjust wrongly the local and remote offsets used to generate a CSNlowScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.10.2-15.el7_9.x86_64.rpmce77ae886569507d3d8a636881b4e0227124bb4ac73d40eac1f2a1966385e86f389-ds-base-libs-1.3.10.2-15.el7_9.x86_64.rpmba9bb484a4c7dc68b007a7f520720b47331b793f36702702197405dbd144ca71389-ds-base-devel-1.3.10.2-15.el7_9.x86_64.rpm9dfdde8db3f0283a5d345af8176577a6fec3f27a965a496675311bf7424936de389-ds-base-1.3.10.2-15.el7_9.x86_64.rpm8101f7625070f12f155e4c6d7f4cd2807d5b8e32274999474c2c41b1c5ef2eafSLSA-2022:0666-1Cyrus-SaslSecurity Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7cyrus-sasl-sql-2.1.26-24.el7_9.x86_64.rpm4a40ab6db225cb6ad07f8544edd60c2aee43d0d380300527cd9e9721b1aa5655cyrus-sasl-gs2-2.1.26-24.el7_9.i686.rpmb54b9528ae53f5495721c5f2c8adbebe1f1d1757fa21cb0997471353766c3b31cyrus-sasl-2.1.26-24.el7_9.i686.rpm967339b9fcb7b6167797be3b72d0d4ac420e9b86fe1cac909ad8c90007e11fefcyrus-sasl-scram-2.1.26-24.el7_9.i686.rpm44780aad3b57cae08e6c6f2589d1dadd74ae23126c71398eb4e7c0dcf4661b1fcyrus-sasl-md5-2.1.26-24.el7_9.i686.rpm54625b5af7df520aa30ec4be91f88aa4f021b99b420d85da3b0616076dd98ec3cyrus-sasl-sql-2.1.26-24.el7_9.i686.rpm8904a5ee533579ee4ca9881e15f251c6de2eb088fcbace9481a4ad7adb46377dcyrus-sasl-ldap-2.1.26-24.el7_9.i686.rpmeea9f5dcf16322f440e908b8ff15b291d0d39e817c42673dae424714e236531dcyrus-sasl-gssapi-2.1.26-24.el7_9.x86_64.rpma83b5a1977b9c7b3538b2d3b624a9bdff4f7c505dcf42a0c31fb95aefd07aca0cyrus-sasl-ntlm-2.1.26-24.el7_9.i686.rpmccc7f7145072c2a6b4b86fc3df68c3763801dfcc27186be6ab680e26920dbc0bcyrus-sasl-plain-2.1.26-24.el7_9.i686.rpm6b94a459b9b883c37968d0f20fb8600ba428e4ccfdf66d797b0a56a3b4083963cyrus-sasl-scram-2.1.26-24.el7_9.x86_64.rpma1ddbd0a6fd6f2e074c3df9a2c124bda9d81b9d7d605b0dd8805c215c9ae78dbcyrus-sasl-2.1.26-24.el7_9.x86_64.rpmc0788227ddc4b5349fd59d2c921669ff2943c5a5b26986440b5d1f61b4c8ad16cyrus-sasl-plain-2.1.26-24.el7_9.x86_64.rpmc4ab1f09bb0e4a614871d5c4266e4d18ae88d3df3d57c15772abe292c23d30aacyrus-sasl-lib-2.1.26-24.el7_9.x86_64.rpm2aba1129ef910065dc0a8e69295d1ad6bcd5b1f97ff2e3ac3f3be667594a3363cyrus-sasl-devel-2.1.26-24.el7_9.x86_64.rpm0230c24753ea28baaaab7ff9b4f2dd408029bf893ea6aefab59034f0d2c5cf3fcyrus-sasl-gs2-2.1.26-24.el7_9.x86_64.rpm31a2440a98e41391a5fbab60a833229fa2e70ecaae47167d83359eeaa8b9a48ecyrus-sasl-lib-2.1.26-24.el7_9.i686.rpm4853a8c3bdbd9490959789e6a00ef507002c7d2c16d8867c64dbc95fb0f7d430cyrus-sasl-devel-2.1.26-24.el7_9.i686.rpmb30208f1a17274345596864583a4697e3110646204022787474b3351697d666ccyrus-sasl-ntlm-2.1.26-24.el7_9.x86_64.rpm7d64db4096bcc01a8587a9d5aa2f22616c979dbeba0e1294b9345628a704ac5fcyrus-sasl-gssapi-2.1.26-24.el7_9.i686.rpm4bec982ea813540557f0a52138f8b3e09698020541719c8e783ad57eeacfcf3ecyrus-sasl-ldap-2.1.26-24.el7_9.x86_64.rpmfa614ba1acea9591194c1a17162400866c22b9f4a231e45166d352f0907915d6cyrus-sasl-md5-2.1.26-24.el7_9.x86_64.rpmc4202509cdb3a97da1c6aa221566733f33c1afc61e8c1067d5ad1f4c4bb6d742SLSA-2022:0824-1FirefoxThis update upgrades Firefox to version 91.7.0 ESR. Security Fix(es): * Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485) * Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486) * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235) * expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) * expat: Integer overflow in storeRawNames() (CVE-2022-25315) * Mozilla: Use-after-free in text reflows (CVE-2022-26381) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383) * Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384) * Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387) * Mozilla: Temporary files downloaded to /tmp and accessible by other local users (CVE-2022-26386) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Firefox 91.3.0-1 Language packs installed at /usr/lib64/firefox/langpacks cannot be used any morecriticalScientific LinuxScientific Linux 7firefox-91.7.0-3.el7_9.i686.rpm17a6c0c6940f2d8c32861a0fc4523fd49af44c0790833f5ecef02ac63dd6a45dfirefox-91.7.0-3.el7_9.x86_64.rpm96d651cc95589c55f2343d3ecd7a126c34b8e500a6666c5633ca1071f58c1547SLSA-2022:0850-1ThunderbirdThis update upgrades Thunderbird to version 91.7.0. Security Fix(es): * Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485) * Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486) * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235) * expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) * expat: Integer overflow in storeRawNames() (CVE-2022-25315) * Mozilla: Use-after-free in text reflows (CVE-2022-26381) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383) * Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384) * Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387) * thunderbird: Crafted email could trigger an out-of-bounds write (CVE-2022-0566) * Mozilla: Temporary files downloaded to /tmp and accessible by other local users (CVE-2022-26386) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.7.0-2.el7_9.x86_64.rpm86ae44e13f4bd6644c5f83d8e7149c802629dad4f6a1110dbb096a7fdcd2a9e9SLSA-2022:1045Important: Httpd Security UpdateThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7httpd-2.4.6-97.sl7_9.5.x86_64.rpm0be74a09f7461ff46cf66401b9db4e4f429b1d4c55952455a8a7a012b728b7c5httpd-devel-2.4.6-97.sl7_9.5.x86_64.rpm60c899c7fb2088fb25771d3a18c096b7e85fa343a21f99fde105751d5a78d593httpd-manual-2.4.6-97.sl7_9.5.noarch.rpm53b457c68db12d30eacfe372d40554be842ac10db5568f6576574b28cb6b17d0httpd-tools-2.4.6-97.sl7_9.5.x86_64.rpmb7000fea8dd4c7ddfbcbf98b95ae7e20330fac2554404d59f1dae79ca3d7010cmod_proxy_html-2.4.6-97.sl7_9.5.x86_64.rpm61b42447228c8c4f96ca083fa8874f87393f20064bc6cd7702d5f287107eefc9mod_ssl-2.4.6-97.sl7_9.5.x86_64.rpmd03ed63db929825bd4f0f81df35f02c5cc4ad1a05c7693b42b125a8062a69e08mod_ldap-2.4.6-97.sl7_9.5.x86_64.rpmb01bda47f0ad5df1efa995409759bdaddba56709ca2790177a1a6aa5758086e2mod_session-2.4.6-97.sl7_9.5.x86_64.rpm6f9b6c8d39161243b4d782e6b55549de922d0e2d4a56d057373bb28a5577206cSLSA-2022:1066-1OpensslSecurity Fix(es): * openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7openssl-devel-1.0.2k-25.el7_9.x86_64.rpm0cd7ba148b371e943111ce6eaafbd00eb24c265bbea3545e4cd8f77a4ae0f51aopenssl-devel-1.0.2k-25.el7_9.i686.rpmfb9d5a2a4777a3570d2826570ce98f67c3e75b01d06a859c7d6521ee75d229f8openssl-perl-1.0.2k-25.el7_9.x86_64.rpm7a90aa94a06406b97cb00a55e2ecfbafb31d9967e76907ec7ad4f954a7f573cbopenssl-libs-1.0.2k-25.el7_9.i686.rpme9318045f52dc83193ff047b76fee6f3d06ee2092cd7d6752fdb1a7577be3f42openssl-1.0.2k-25.el7_9.x86_64.rpmda8f28a2c9b1940ce0ee2c745cda3f2774bcf3a426350a26903f29b40b9b2fc9openssl-static-1.0.2k-25.el7_9.x86_64.rpm9f0061c22cec08a203b08ecc08351efa083a2a438c995b153ae072748bad5263openssl-static-1.0.2k-25.el7_9.i686.rpm2c9af1aa25ed8e8d12035e176bd3bb1648e3ae05903620f768fd41c83a3cbc27openssl-libs-1.0.2k-25.el7_9.x86_64.rpme58ebf01a83537b5b6979be59b9bad2552b07874b4ad317037287dbc9e127fd4SLSA-2022:1069-1ExpatSecurity Fix(es): * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235) * expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) * expat: Integer overflow in storeRawNames() (CVE-2022-25315) * expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960) * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) * expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7expat-2.1.0-14.el7_9.i686.rpmdb2260a5a84c3b7184b5bc609698720947e449b84b89688dabf5254d2cccfd5bexpat-2.1.0-14.el7_9.x86_64.rpm5257fbac66b901d8eb514bbc0d61e19302e6e789bf5666bed2840c6fdad50babexpat-devel-2.1.0-14.el7_9.i686.rpm91bc2f24c563682181148502aeee7002e20d1745a3fda375947d0b68298e6f9cexpat-devel-2.1.0-14.el7_9.x86_64.rpm7a36b0bcb1c2ea46cf6c80ffe6d0f37a8767d514bfa2c8fdd27828766f1db9d5expat-static-2.1.0-14.el7_9.i686.rpmd92b1587b263f4e350840712870cce1abf384381120b621f913f6d5dbb426c56expat-static-2.1.0-14.el7_9.x86_64.rpm09fb4769dc9a2d5d253ffddaab86e4eccc87bb0b9fc7a551f5e0a68ea04526c6SLSA-2022:1198-1KernelSecurity Fix(es): * kernel: use-after-free in RDMA listen() (CVE-2021-4028) * kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Adding new kernel entry in grub configuration file only after generation of new initramfs * Cannot mount DFS shares on SL7 * SL7.9 - zcrypt DD: Toleration for new IBM Z Crypto Hardware * kernel panic at skb_free_datagram_locked on 3.10.0-1160.45.1.el7 * Lots of tasks are getting stuck in I/O wait waiting on the buffer_head locked by the task that is busy shrinking slab for freeing pages - 3 patches to fs/buffer.c * [SL 7.9 Bug] x86/platform/uv: Add more to secondary CPU kdump info * REGRESSION System panicking in __kmalloc+0x94 from a freelist issue introduced by a block patch. Enhancement(s): * SL7.9 - kernel: Add support for CPU-MF counter second version 7importantScientific LinuxScientific Linux 7kernel-tools-libs-3.10.0-1160.62.1.el7.x86_64.rpm406efbc3cf0166a399a7d123eed3829f0305f3888628008d5f289e23f55434bakernel-debug-3.10.0-1160.62.1.el7.x86_64.rpm80cd64455bb40e7230c5834ba674fd80d234e6325414d1543edf005b294e1eb5kernel-headers-3.10.0-1160.62.1.el7.x86_64.rpm517ce9e691730d5103e7ebeb16e7d616d639f3412a4166060d58155d06914b65kernel-doc-3.10.0-1160.62.1.el7.noarch.rpm472ce233645dedc0eebab070fbf54bae4b5148b689de439d1d25334317906ea1kernel-tools-libs-devel-3.10.0-1160.62.1.el7.x86_64.rpm61998c4bdf5a790273293189b472775556b614d1a70988f5d81351674a1ace67kernel-tools-3.10.0-1160.62.1.el7.x86_64.rpm303b2a8f6f95bc0b6637d696f898944f6c027bfb04037d268485220bc1c94045kernel-debug-devel-3.10.0-1160.62.1.el7.x86_64.rpmc85e6501cee65b1a7867aad8fc811600b899f71817e88c6369e8d15b949f42ddpython-perf-3.10.0-1160.62.1.el7.x86_64.rpme63786d546be238c2b8da96134eb0cedf37afae465088eec5b916e839cc1d102bpftool-3.10.0-1160.62.1.el7.x86_64.rpme87ae6fa8c463e8a14daa06961a93b0f67bf3d0114b5293a66376a79d7827672perf-3.10.0-1160.62.1.el7.x86_64.rpm189d3795653adaada253018e99cdf4046cbdf6e4cb50fec91aee8c705b1c9fe1kernel-abi-whitelists-3.10.0-1160.62.1.el7.noarch.rpm775ad768127a77f40b4feeeaffeff7bce31181bb02dedca2e3d3f02090e693f1kernel-3.10.0-1160.62.1.el7.x86_64.rpm5f4b87416f08fe2293227436c3860a7b2ba649264a9c16c0113bb22067048556kernel-devel-3.10.0-1160.62.1.el7.x86_64.rpm958f9f19d97851d8cb365895dc33e57e8611f9101896ae8f0485bd687711505dSLSA-2022:1284-1FirefoxThis update upgrades Firefox to version 91.8.0 ESR. Security Fix(es): * Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097) * Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281) * Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289) * Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196) * Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282) * Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285) * Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713) * Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.8.0-1.el7_9.i686.rpm9daf2e0220ee23c0eb4357894ba156262a6e09e3109e488ba28530e5f63b3b26firefox-91.8.0-1.el7_9.x86_64.rpme8b3036efd6a8b939ed121e073fb065f3518b7c43761e4d4610afd5f829b7422SLSA-2022:1302-1ThunderbirdThis update upgrades Thunderbird to version 91.8.0. Security Fix(es): * Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097) * Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281) * Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289) * Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196) * Mozilla: OpenPGP revocation information was ignored (CVE-2022-1197) * Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282) * Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285) * Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713) * Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.8.0-1.el7_9.x86_64.rpma8f369bab052fd85ca6c24f4845174873218547a34eca1081b7d1f7fbfd54a8eSLSA-2022:1440Important: Java-11-Openjdk Security, Bug Fix, And Enhancement UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.15.0.9). (BZ#2047531) Security Fix(es): * OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-11-openjdk-jmods-debug-11.0.15.0.9-2.el7_9.i686.rpm6454698240bf2414d9a427d50bfc9066d1309fdcbe3ce9fa46c08a34531f9bbdjava-1.8.0-openjdk-demo-debug-1.8.0.332.b09-1.el7_9.i686.rpm8fa1db6e7c41fa21f266379f8373d0b5adc94af525b0575000f9170a7897a208java-11-openjdk-demo-debug-11.0.15.0.9-2.el7_9.i686.rpmd61e76b91d98389d1d69d1f777395aee32f352d27aa5f69c3639b96170927768java-1.8.0-openjdk-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm98d063dd81a3e10cd455c9d22c4dc9842526ea4739341844b058af143868df19java-1.8.0-openjdk-debug-1.8.0.332.b09-1.el7_9.i686.rpm6d2bd0cca07b5da3a949c5ab58b8051ef22f9135c194bf6fda871c55252c2f07java-1.8.0-openjdk-devel-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm1d5c0b1629cd24b0ef8772abd047e970432905649620632b32b5b45f33f397d8java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.332.b09-1.el7_9.noarch.rpm0b4e7241ab25be75d62adfd35cf567580d3d778a707cc2c392baad4c0de5d283java-1.8.0-openjdk-accessibility-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm8d0531bfee4d52a9205fcbe8c1e3910652d26957d10214d8dc1720242cc418cbjava-11-openjdk-debug-11.0.15.0.9-2.el7_9.i686.rpma98dbfd8c7b4aa2d34e972234a01c35ec374d4a01453b24030c1e5700c1acbd7java-11-openjdk-headless-debug-11.0.15.0.9-2.el7_9.x86_64.rpm7ab27c142f078cd661ad9bc2986a25b0e965ed9c6c2954c9b727a4a57b770a70java-1.8.0-openjdk-devel-debug-1.8.0.332.b09-1.el7_9.i686.rpma3536da9d95f234070c5588f129862e6f76e115ab6b9be0e0ed7abae77a491dejava-11-openjdk-headless-debug-11.0.15.0.9-2.el7_9.i686.rpm91e1ca80adf9e1c006a587215b8360444486c64e21a21595cd9570ee112d0e18java-11-openjdk-javadoc-zip-debug-11.0.15.0.9-2.el7_9.i686.rpm9a27c396f5c20920f4e3b2135d207f022048ac7d2c8e92a7cc7045804a36ff0ajava-11-openjdk-devel-debug-11.0.15.0.9-2.el7_9.i686.rpm44882dc9edf6502327ae1d7483c4c5e94eaadef140eab876563e545cf588ef69java-11-openjdk-javadoc-zip-debug-11.0.15.0.9-2.el7_9.x86_64.rpm8f5bb8aedb103c83eb41e2cd01541e3745b3ce1c2d18a5fb4c96004573354d46java-11-openjdk-javadoc-debug-11.0.15.0.9-2.el7_9.x86_64.rpm790a422311f4bf7e96ab4f70596e3b15081723e03c10ea5c91be361f32dd00c3java-11-openjdk-static-libs-debug-11.0.15.0.9-2.el7_9.x86_64.rpm865c25db988d67ea0239d79eff5574b232513b88c54e86fde9768de3420f9849java-1.8.0-openjdk-src-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm7ec8ac0d1a0ade3c045fdb70e701cdedaed51839fc794a6cb646da9d2b62542djava-11-openjdk-src-debug-11.0.15.0.9-2.el7_9.x86_64.rpma5f11cb569cd225057fbf7d36db853276edbdfdc8d4e95f8a3eb45dd816ede0cjava-11-openjdk-javadoc-debug-11.0.15.0.9-2.el7_9.i686.rpmbab1d9c934572ad5e702d3f290c5c3be3db749006e8a4f19023d1d3b43195706java-11-openjdk-demo-debug-11.0.15.0.9-2.el7_9.x86_64.rpm55b5258d010f86e7ef8ad2a49179e102cd71c4c281fba741c65ee9d72290c800java-1.8.0-openjdk-demo-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm3c2d12a6fde5807197875fa4f3abab4b4b71c2fbedeebc8b74fa5a929612c5a7java-1.8.0-openjdk-javadoc-debug-1.8.0.332.b09-1.el7_9.noarch.rpm2fbc92e494e095f0bd519994a99ff2dfdef3fc82db35669b1e868e8797c27de2java-1.8.0-openjdk-src-debug-1.8.0.332.b09-1.el7_9.i686.rpm5c9a44c800e5518d218e575dd86612f06ec48a06d1a192896b8ad93b5432c46fjava-11-openjdk-debug-11.0.15.0.9-2.el7_9.x86_64.rpmbf12e7ca8f7d3ee8b42c8fea4863251f25fd0688e622119a9e2d164965268b03java-1.8.0-openjdk-headless-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm29a58554a3c82b76a03f260483b39de964ed2434f54de298b631d7291f5f760ajava-1.8.0-openjdk-accessibility-debug-1.8.0.332.b09-1.el7_9.i686.rpm5c4c150e5d70ef3e359f5cc3c001dd34c5aaa52972b76db6c0cf7f99c09e1480java-11-openjdk-devel-debug-11.0.15.0.9-2.el7_9.x86_64.rpme6070418b3a57822693d1ba54ab0835d412b97de8f31738d137e1a8affd67c06java-11-openjdk-jmods-debug-11.0.15.0.9-2.el7_9.x86_64.rpmf79e6a2d077080d73e3d2e89419e063fed74e795be7eb14bd794be7b6251727fjava-1.8.0-openjdk-headless-debug-1.8.0.332.b09-1.el7_9.i686.rpm1be91c9ffdaf54ab97c3e8ca6e8f8cc761d71df030821976129d0b975e8fff74java-11-openjdk-src-debug-11.0.15.0.9-2.el7_9.i686.rpmc9862419593933f057e7e52a04628c31a91afce54ca20a94e75eb7d8bd4a0c4eSLSA-2022:1440-1Java-11-OpenjdkThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.15.0.9). Security Fix(es): * OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9.i686.rpmdde57732b2c43cf4fdab923ca25a26111486754cfef4b0b7ca9ae4bcc59c8f03java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9.x86_64.rpmdcf924eeb44ba991e6d0ffdc06e5f8ae80a9fefa7034a3c4866cf7a56ef3c8e3java-11-openjdk-jmods-11.0.15.0.9-2.el7_9.i686.rpm29225e443a09ceaff69bc83a0172c0287a57389bdfb51b9f19e612e440bbc71ajava-11-openjdk-jmods-11.0.15.0.9-2.el7_9.x86_64.rpm37e80356b5ec3561aa58ed22a4c8d39eaffc5111a7931dc05f8879fc880c2f66java-11-openjdk-devel-11.0.15.0.9-2.el7_9.x86_64.rpmd13851971149cf7063229db1256e4079cd602a757bdc196b01db2a3eaf888f61java-11-openjdk-11.0.15.0.9-2.el7_9.i686.rpmf941c1ab71d54b68b3cd2560fd5340cba62675deeffa9fac9cb2f663de30c5cdjava-11-openjdk-src-11.0.15.0.9-2.el7_9.x86_64.rpm89d22efd78517f02dbf39aea0f45dfa8d261012bd910d7059012cd53fc6ce28bjava-11-openjdk-11.0.15.0.9-2.el7_9.x86_64.rpm54de3796cc3eb5b01d2b60bcc97b9c8fcf29dcc4a70a8c7031fe6f55cc0f8ec6java-11-openjdk-src-11.0.15.0.9-2.el7_9.i686.rpm3bdef62cb5951dfd6d4561608d29e54e027eb399227e9d066e8ea0a7da7feb73java-11-openjdk-headless-11.0.15.0.9-2.el7_9.x86_64.rpm85b1c49c7c73aa8d4fd021959cbe18c3ee1cdbc75268a0e7b212f1852f0db2d7java-11-openjdk-demo-11.0.15.0.9-2.el7_9.x86_64.rpmb5babd89afc050fb8e0be904f5fc61c9d551ed427a72d4a77d367e415776704djava-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9.i686.rpm43425d585ac388ff95d0d6bcd4d5a80b9c13c0d6df3756a31d89fa50920fe4d9java-11-openjdk-headless-11.0.15.0.9-2.el7_9.i686.rpm187b0eeca1aa3710529d42aec35f95d4cb2a0dadf7089b297512c4cc604a213cjava-11-openjdk-devel-11.0.15.0.9-2.el7_9.i686.rpm7fcf28f2386c7cab99c5bfba993434b55e925ac83db8d627ccbcad6dfeff416fjava-11-openjdk-static-libs-11.0.15.0.9-2.el7_9.x86_64.rpmabd20afa7d4d5874006ad51aafa8bb71c41048ac8be43642c5913d0f9f007bc7java-11-openjdk-demo-11.0.15.0.9-2.el7_9.i686.rpmfd618325e092d5dbe7ad7e7e7c3178a8335f1d2c1d9a9fc05962f6703df8648cjava-11-openjdk-javadoc-11.0.15.0.9-2.el7_9.x86_64.rpmb78a1c26e55cc35b94e51b14ef910876e24a17e7ddd20f0a9bd230ae6e72f3a1SLSA-2022:1487-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.x86_64.rpm2fe3ed816e42aacabe3ccbe30a458b41470ed1419f25c24f07ea37c2faf16ed5java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9.i686.rpm3203b6dee98f8021866c807ba0389dcaa94cafdc001720e86135d61b1a826b4ajava-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9.i686.rpm913f70c9c5bfb2b4c63dffc455ee70363bca51fed32a63bc552c3686c1f9c34fjava-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9.i686.rpm1a08683eeb8f7d7245725793b3ccc5011b5feb349ad97a59b6c1a0e096d56abcjava-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9.i686.rpmc8caa6d338c2691c4c131f970d3a3bafbc26d9445e85f57ca905fa0635c2dbbfjava-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9.x86_64.rpm7555bf4db79a8e019a6757b8b3f7ade934a602a05f711d0ffbf0d17991047a1cjava-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9.x86_64.rpma911a1eb974b106334d39bd84e8394b666788f50805e0b0bb675cf086a5e860ejava-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9.x86_64.rpm2d032b3722bef7b4fcc6722509f7c105c742079e69ed5a2ab9bce66e7d870c22java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9.noarch.rpm4e216459910b462af79016c6fe77c7d44608501de95f10dd93bebc4968ad96e0java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9.i686.rpm25e1e8033161283a58f8deaa404326d267095868935d1d9bb839a38c004046a7java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9.x86_64.rpm46fa43016dca217f7f31aec060edb30aaabaa1f50ae8a70ec3ec0508cb7d8aa7java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9.noarch.rpm65ba24f4ef25a4833d1a39799602766dc85b2c018c8928d31ab4a2001c59b578java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.i686.rpm8b035e58f6ea351ea93babda6b4925d6cfe96b5e169f9548028831c8042ad0c1java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9.x86_64.rpm982688a1575aa0bf1f4c1adaf81c61564d7a2dea3bd7394bcbccc2f8a6997719SLSA-2022:1541-1Maven-Shared-UtilsSecurity Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7maven-shared-utils-0.4-4.el7_9.noarch.rpm635ca492b99ed733728a56d3d5882fc5a367ffcae2bcd0e5730ecba596d48a99maven-shared-utils-javadoc-0.4-4.el7_9.noarch.rpm71ba926f15d5118380601b4e3c13e09b1aa51462571713302735e558c25aeb62SLSA-2022:1703-1FirefoxThis update upgrades Firefox to version 91.9.0 ESR. Security Fix(es): * Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909) * Mozilla: iframe Sandbox bypass (CVE-2022-29911) * Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914) * Mozilla: Leaking browser history with CSS variables (CVE-2022-29916) * Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917) * Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.9.0-1.el7_9.i686.rpm2848a8eb37faa0aa648b62965b19fa466dc4968ed927d3545154545215d52e98firefox-91.9.0-1.el7_9.x86_64.rpmc11a6c9ed11495d188649eb84f2251a15dbf86228fce394a8c8b9fd278ddb811SLSA-2022:1725-1ThunderbirdThis update upgrades Thunderbird to version 91.9.0. Security Fix(es): * Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909) * Mozilla: iframe Sandbox bypass (CVE-2022-29911) * Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914) * Mozilla: Leaking browser history with CSS variables (CVE-2022-29916) * Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917) * Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912) * Mozilla: Speech Synthesis feature not properly disabled (CVE-2022-29913) * Mozilla: Incorrect security status shown after viewing an attached email (CVE-2022-1520) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.9.0-3.el7_9.x86_64.rpm806c8e4eebfcbbae90a9ac8a9d27e401ae2e6bc8bd1e64d871a4c55478605cc9SLSA-2022:2191-1GzipSecurity Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7gzip-1.5-11.el7_9.x86_64.rpm31892df32fdf2c1c290d6e2f41169b2cd56ddbf8bb2635c07416c00979a4d59fSLSA-2022:2213-1ZlibSecurity Fix(es): * zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7zlib-static-1.2.7-20.el7_9.x86_64.rpm59fbd7dba8ac257ebd36d9e43a3f1416134e2034c3c64053397dbe35092f29b1zlib-1.2.7-20.el7_9.i686.rpme2a8ad745347fbfb35c38b8084fa7d8918c8affc9387f5a45f9e60c32279597dminizip-devel-1.2.7-20.el7_9.i686.rpmc8243e2e7c06b397b7d8f8f5f6c0baa8b8a83a37618e96d4ee46974a0648dabezlib-static-1.2.7-20.el7_9.i686.rpm6edb526f889c296e32c1573d68fe243759299b4a8bd2a0b7a29328695ae05769minizip-1.2.7-20.el7_9.i686.rpmcedb4974fde50c300966cefb68799eca467fa942ae921647be90c1e11a3df00fzlib-devel-1.2.7-20.el7_9.i686.rpmce8da1a1626e6648d5557d6566ebc67e0c2b61e841c2c501e15f7bd867bb3236minizip-devel-1.2.7-20.el7_9.x86_64.rpmf9cb6bb4c9f5556c891e8eb177f3b35dbc5dd20ad58256f93e4e2a9a9bea0614zlib-devel-1.2.7-20.el7_9.x86_64.rpmecb3672456577e44acfee7cb131be9acb9781ba1433f4e1fadb18f7d6dcd700czlib-1.2.7-20.el7_9.x86_64.rpm4a4de3032bfcef31be4e2cb07dc924293521d9ce6500d17c45e618af7d3f725aminizip-1.2.7-20.el7_9.x86_64.rpm2e4eacbb6adc7522697701ef62afef3212274d563cf10b9e556fe8e2eb341577SLSA-2022:4642-1KernelSecurity Fix(es): * kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * kernel panic in mlx5_ib driver SL/CentOS 7.9 VM * [SL-7.9] Get Call Trace about "kernel/timer.c:1270 requeue_timers+0x15e/0x170" on specified AMD x86_64 system * kernel NULL pointer dereference while calling dma_pool_alloc from the mlx5_core module * Rhel 7.9 NFS Clients takes very long time to resume operations in an NFS Server failover scenario * perf stat shows unsupported counters for Intel IceLake cpuimportantScientific LinuxScientific Linux 7perf-3.10.0-1160.66.1.el7.x86_64.rpme35107177f0d41b11598d0eb6b700fcb26220351f583b2b7f5822f6e8c3362d6kernel-tools-libs-3.10.0-1160.66.1.el7.x86_64.rpmc1c6d696b1cf50d8c90b8fc28de93bb4281a51a243e473fa57f0bcfe6868b343kernel-debug-devel-3.10.0-1160.66.1.el7.x86_64.rpm9f3f654ab1782eebfee4bdfa9ef84640016992e36a13770aae9d8e3a91d9f05fkernel-headers-3.10.0-1160.66.1.el7.x86_64.rpm69d183d419048a8f44a63d9c6ecefdc9c66a024a3fd1a977a52242a10d9a6c94kernel-doc-3.10.0-1160.66.1.el7.noarch.rpmfb8d00a98dbf8ad64df3c2fc3bd71875f16f26f4bb63d75569f3b23119e1cf82kernel-abi-whitelists-3.10.0-1160.66.1.el7.noarch.rpm7f4a207a45581b1089c7584be3d0e47920eaa1daf4259f06c2f224b5ee6b89d4kernel-devel-3.10.0-1160.66.1.el7.x86_64.rpm335d8182f93343fe1c06d24c240894cce9ff2641ae03e4be023af248320211b0kernel-3.10.0-1160.66.1.el7.x86_64.rpmf9b73f3c142bad4396ca930a46fb0a9936ea56f78daee78c5a5567eef626765dpython-perf-3.10.0-1160.66.1.el7.x86_64.rpmd4df399b78ab27a497b8ba2cdda2b6c2429c137b5b75c0e9e7b7dda9aa1f7f5ckernel-tools-libs-devel-3.10.0-1160.66.1.el7.x86_64.rpm8213bb277061bfe1bd0374654b7af0c9bbe1fc417794613469281c45e94ad21akernel-tools-3.10.0-1160.66.1.el7.x86_64.rpmba2389506b7fdd928f026feeaa2e7c45f63e70a263360669cd5246259d9b9c22kernel-debug-3.10.0-1160.66.1.el7.x86_64.rpm6d3e4617ed58016b72c8c1e794509f65512f2895935e7d5228b82fe0544f18ddbpftool-3.10.0-1160.66.1.el7.x86_64.rpmce07c0edcf1471992df12486aaab0ac6c59c962c91ec2488f8080eb5527c2895SLSA-2022:4729-1FirefoxThis update upgrades Firefox to version 91.9.1 ESR. Security Fix(es): * Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution (CVE-2022-1529) * Mozilla: Prototype pollution in Top-Level Await implementation (CVE-2022-1802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEcriticalScientific LinuxScientific Linux 7firefox-91.9.1-1.el7_9.x86_64.rpm80d46609a8cb319359dc3b90af371283b148cd4a302a84bd648bf361c9c9aea0firefox-91.9.1-1.el7_9.i686.rpm341d17218763d9e521c93047f4952bfec6d6c04b14f9ee0a68fa7349fb40c0e6SLSA-2022:4730-1ThunderbirdThis update upgrades Thunderbird to version 91.9.1. Security Fix(es): * Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution (CVE-2022-1529) * Mozilla: Prototype pollution in Top-Level Await implementation (CVE-2022-1802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEcriticalScientific LinuxScientific Linux 7thunderbird-91.9.1-1.el7_9.x86_64.rpmcdc32e32092757a426f9207dcc7a53db29fa5b0ed6c7fe4fe65314f3cefa263eSLSA-2022:4803-1RsyslogSecurity Fix(es): * rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7rsyslog-snmp-8.24.0-57.el7_9.3.x86_64.rpme3b0542fcbf988eefd3b6ec087cdc45c6c1d06f14f3be8bade5e4f1c7e417672rsyslog-doc-8.24.0-57.el7_9.3.noarch.rpm72657e2cc5db25197b8f643d0203f53eacd2005e6b211e2317675382eba39e4frsyslog-libdbi-8.24.0-57.el7_9.3.x86_64.rpm966ee3885d60b27edf283acd40da8dcb43f82fdf2e4b85775808e4b8c01a91a1rsyslog-pgsql-8.24.0-57.el7_9.3.x86_64.rpm432a8f1b6e2be0243afc23f667afa34872e02b7b9f961628c3236a7b055798afrsyslog-relp-8.24.0-57.el7_9.3.x86_64.rpm8d3db0683773333cd93c29adbc38376f2d4b47539b0e573028504b08227ea593rsyslog-gnutls-8.24.0-57.el7_9.3.x86_64.rpmdbf02a5d0fc4e537ba4efc857f2665213c6d3dc3b84c5f62b6c3ad8978d8464arsyslog-udpspoof-8.24.0-57.el7_9.3.x86_64.rpm5a6260ae1d9c425f4d0e094e01ceaec7a20afea7464ddd37219ce2d86bd42e06rsyslog-crypto-8.24.0-57.el7_9.3.x86_64.rpm35077c3289d295a5cc412a627a2b361607dd36c687b16a2bacdb2b21dc2e4f8arsyslog-mmnormalize-8.24.0-57.el7_9.3.x86_64.rpm644b8ec956e3eaf20423f42b6d09c3a84f1bb42e71e37bd362e0d61c078e75bersyslog-mysql-8.24.0-57.el7_9.3.x86_64.rpma9b52a799cc93dc6d8a1d9f9a194ab5e3dddc39cf22bdb4345a3b0d92c532bb7rsyslog-8.24.0-57.el7_9.3.x86_64.rpm79a351c99a2feaa59d46d57843b73a33626af0b2e0c02e36b4d1433b854eb632rsyslog-mmsnmptrapd-8.24.0-57.el7_9.3.x86_64.rpm111275aab2b392d0e2100b7b793077752a97d9753336c6bb69b6cc7692137d6arsyslog-mmjsonparse-8.24.0-57.el7_9.3.x86_64.rpm46edf8d0738f0a3f00cf1a2780d87e0c6f0bcadc90cd137ecfc30e86571fd90crsyslog-gssapi-8.24.0-57.el7_9.3.x86_64.rpmaf9469c429db2f02c98a5491498b5eeba67965d937b0accd39b9d6cb868dab10rsyslog-mmaudit-8.24.0-57.el7_9.3.x86_64.rpm04c51d5cf3f33a846a9791cd706b8f717e28c9d6d49c3ddf46901600b0250b60rsyslog-elasticsearch-8.24.0-57.el7_9.3.x86_64.rpmfcd136bc321c3355d226340c99e3966a302f34476f045f5224335f637d397567rsyslog-kafka-8.24.0-57.el7_9.3.x86_64.rpm88d2d81c4c6f9f0eecb5f904d4ffbe92f99cf545734a558e3b44642c1185dd87rsyslog-mmkubernetes-8.24.0-57.el7_9.3.x86_64.rpm00a56045395dda8d104195a547d518a18fbbb6b03cf23b40a1184906eef1ca51SLSA-2022:4870-1FirefoxThis update upgrades Firefox to version 91.10.0 ESR. Security Fix(es): * Mozilla: Cross-Origin resource's length leaked (CVE-2022-31736) * Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738) * Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740) * Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741) * Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747) * Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information (CVE-2022-31742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.10.0-1.el7_9.i686.rpm2c73cfaf9b93a6e35b7206601d3a4f4d633b93e520ced5f8479a6eaacad266e1firefox-91.10.0-1.el7_9.x86_64.rpmf439b4056dcf344e92989d85360bc52336ce8ec8f3c89db5ab19f2b3688e3b3eSLSA-2022:4891-1ThunderbirdThis update upgrades Thunderbird to version 91.10.0. Security Fix(es): * Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email (CVE-2022-1834) * Mozilla: Cross-Origin resource's length leaked (CVE-2022-31736) * Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738) * Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740) * Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741) * Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747) * Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information (CVE-2022-31742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.10.0-1.el7_9.x86_64.rpmba4945587137c1e9dc2da7e1bc1c6993113a8dac1a2b1af76a9b473672c62f6bSLSA-2022:4930-1Python-Twisted-WebSecurity Fix(es): * python-twisted: possible http request smuggling (CVE-2022-24801) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7python-twisted-web-12.1.0-8.el7_9.x86_64.rpm45f5bb7fea6902e35eae90d069a93ba49ba7a7c8b0d7c6f2a34eca6fe131ad25SLSA-2022:5052-1XzSecurity Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xz-lzma-compat-5.2.2-2.el7_9.x86_64.rpm178be34e860e9391f07fb01816dc05a79e1d95a398f26b2c998d0ab621a3d073xz-5.2.2-2.el7_9.x86_64.rpm6e66b5705a7befffe0701195106d9d9638602fe7a80d54eaf4c8d1ffe1a694f8xz-devel-5.2.2-2.el7_9.i686.rpmc3af6af75d9eb8a997dbf96539b8e37a276a8a0ffbcfef2f939c6a06fd427277xz-libs-5.2.2-2.el7_9.x86_64.rpmc07f0cf3977e760679b6626d88a5d1b88ca2540ac6659c3fac74da5802341b2exz-compat-libs-5.2.2-2.el7_9.i686.rpmed52b79ebc47ec936fe2e8e2e44dbe888f3707ed6067f473b3b0a9d052a08823xz-devel-5.2.2-2.el7_9.x86_64.rpmc17801a5adcda0f76ceaa856dad0568a25406374520a3b96f926c24c5a265e58xz-compat-libs-5.2.2-2.el7_9.x86_64.rpm50573e4a0c567e0c6000a558a5bcab49ffe16fba1444253b351a628eddefe282xz-libs-5.2.2-2.el7_9.i686.rpm4d87b16c5e91c6169ef120acd7f925bc140876fafc133af49bc086c190652862SLSA-2022:5162-1PostgresqlSecurity Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7postgresql-docs-9.2.24-8.el7_9.x86_64.rpm785f51347d3f6b380a212837cb270c0a462763304285d9b5438448c697e15cc4postgresql-libs-9.2.24-8.el7_9.x86_64.rpm59a4789756e0cb29822cf7c8eedf629e9a67e43b2f7fdc5ace1c9e7fab1f80b1postgresql-plpython-9.2.24-8.el7_9.x86_64.rpm163973d9e3846607713d6a2ace3e29a9c00ae46a46253a9f27f59c85baf77f15postgresql-9.2.24-8.el7_9.x86_64.rpm2d2e7d29446e98fabe696c38228d61c6ac6e18ce1c0a79776cc4cef11974b3d0postgresql-upgrade-9.2.24-8.el7_9.x86_64.rpm725c7494ff796b3c5e721187771a2307352f91738e5133e33f50b808b0086158postgresql-libs-9.2.24-8.el7_9.i686.rpm59efe390ae8c13b421732a56cac09f26690d633efe1e8259bfda1a3f1b9ddfe3postgresql-test-9.2.24-8.el7_9.x86_64.rpm288f93adc82232378274a624afc629b402d6c4c006626541c72b9a59371c424dpostgresql-static-9.2.24-8.el7_9.i686.rpm19a07b567067664944f2a8aa7df574c970184b11ff0949579e157421cdc9cbf0postgresql-pltcl-9.2.24-8.el7_9.x86_64.rpme18690e1d0d9ed6c6818e4198375da98920ad266acc9ec7e7f7b80a7672bde27postgresql-devel-9.2.24-8.el7_9.i686.rpm22a34c80bc19cdf540fb3a0900201c5cf18863efa3f38199343f68896bf238f0postgresql-server-9.2.24-8.el7_9.x86_64.rpm2214e31cdf76b0bb8a399a80ba4662ee4381140c1ea62320bf50df2b2791cacfpostgresql-static-9.2.24-8.el7_9.x86_64.rpm46f46125b8d1815a091900c4fd80a0c838a8b68206c399563ceb3f43b871bb78postgresql-plperl-9.2.24-8.el7_9.x86_64.rpmd0df9bbf5eb5e754c22643007a07ccddaecc7096edfc03c2be248f79d3d004cfpostgresql-devel-9.2.24-8.el7_9.x86_64.rpmbd33822d9eab3ceb26128fb525db894fd6a9bdae21371c94d3db6ffdebb7f006postgresql-contrib-9.2.24-8.el7_9.x86_64.rpm273899f72e24eb777a82216f169a06d18ff1c6c48f0e29b154863757c5bf84c9postgresql-9.2.24-8.el7_9.i686.rpma9e3e531f3c674b2e4ddf3502b6c32d4d2950af50c050ef968c76de7c353d803SLSA-2022:5232-1KernelSecurity Fix(es): * kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729) * kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * XFS inode cluster corruption * sock: sock_dequeue_err_skb() needs hard irq safety * libceph: fix potential use-after-free on linger ping and resendsimportantScientific LinuxScientific Linux 7kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm1d77baa3d81ea83477d62c49e015be49732465ccd422059db318efc757ae8ecbkernel-debug-3.10.0-1160.71.1.el7.x86_64.rpmce17a9c6466362c175e0bddc060062332de9e637d4caafe8cc983a0a1e8be3c3kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm4f556e1061c61af28b9174b25e07f65c43819121efcec015882d984e8b49602dkernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm4db12f15fab31a6a5df99c09f89b5c62e83290fd0a61ac8ce5f9ee5e8a497421kernel-3.10.0-1160.71.1.el7.x86_64.rpm3214a01be7fda555894dc93053890a4100c0aa1c4886e7842ab7cfed376144bbkernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpmd7e26d24d3a734275e8bc9ade31b1ae3adee803dd46db10d57b6d85660494a00bpftool-3.10.0-1160.71.1.el7.x86_64.rpm7b066f7a2dc6af9f4b4060613ecd118b217cf11f81913b38bf5a654015dbde5cpython-perf-3.10.0-1160.71.1.el7.x86_64.rpm1910321931f2f0a442171a982d11ef4f6be5450336c0eac6287f89f65c267caekernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm41aae026c1a9b1193e21d29b67d9c83918da3d7d027d6727b85a9c04c391c7a3kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm2750f1392b10f38d70e95e3d8a78ab25c2518d9ca45d85bd30f300db19593d81perf-3.10.0-1160.71.1.el7.x86_64.rpm2e5767fc21747cc1001ad9293110f8fa39ea33383d025c625bc65a026ba6166ckernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm72dd92debffef227aee347e7b48b4bd26a8154b7ccdefab4a2ded440a376859ekernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm76398d724a76043908976a33be347fffb46febcf045b39309fde9250498c8d91SLSA-2022:5234-1Python-VirtualenvSecurity Fix(es): * python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7python-virtualenv-15.1.0-7.el7_9.noarch.rpme91998c8834ef7665475ce23d9b11eab0bdc361c2c595c7bfd57fe9b5b07c32fSLSA-2022:5235-1PythonSecurity Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7python-devel-2.7.5-92.el7_9.x86_64.rpm3d67098ab806f5b36a32ad07f418c0c3f336177fecd3e69332aa47bc841b6a38python-test-2.7.5-92.el7_9.x86_64.rpm9ca0cb5713f710cfc4281aca00b03121ceb3897e17d7ec58aa7f16223533b1e8python-debug-2.7.5-92.el7_9.x86_64.rpm15793b35b8d9dd822f51a7b2890c5dd76e634259ba7abf19e7e9ad88d9976c66python-libs-2.7.5-92.el7_9.i686.rpm722f37223adac9b05f452755a17f11db6e32a48fba2e9792e205b81b20544032python-tools-2.7.5-92.el7_9.x86_64.rpm119abd1b66cb24e612fc399c80af7c5040169ac2078bac8446f57f81061f2ecctkinter-2.7.5-92.el7_9.x86_64.rpm75ff0121c4b61bdb679b3d1f5464a924ab6ba3e304da49651d948c557741b1b6python-2.7.5-92.el7_9.x86_64.rpmd1d50f02f72bf047ef8fff0a6150e0eeb1eaee72a27fdf8ab41acb42f10b6915python-libs-2.7.5-92.el7_9.x86_64.rpma9b403e98099f7e6ff63ac8e5712b378ec290ce13c7357fe1704c302bac41f4bSLSA-2022:5239-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918) * 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Log the Auto Member invalid regex rules in the LDAP errors log. Enhancement(s): * RFE - Provide an option to abort an Auto Member rebuild task.moderateScientific LinuxScientific Linux 7389-ds-base-libs-1.3.10.2-16.el7_9.x86_64.rpm2b6f8fd9d6c2d5d6a400605ebb49e89a22b1b307288eb098908b1cad691b2e17389-ds-base-devel-1.3.10.2-16.el7_9.x86_64.rpmd226bedc44c7f9d2cf5192e322e7e0a9cd1656c3b68aa8973ec6ed482f9264e5389-ds-base-snmp-1.3.10.2-16.el7_9.x86_64.rpm748b47079f3d10641d78e5f1e3e63bc24b6e874fab0706073bc364f561147ab0389-ds-base-1.3.10.2-16.el7_9.x86_64.rpm0ed083ae9c6791c4b9eee5fb1eb5e7cd1b22a74f433b86a1c7975cda5e9afcbbSLSA-2022:5479-1FirefoxThis update upgrades Firefox to version 91.11 ESR. Security Fix(es): * Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468) * Mozilla: Use-after-free in nsSHistory (CVE-2022-34470) * Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479) * Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484) * Mozilla: Undesired attributes could be set as part of prototype pollution (CVE-2022-2200) * Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744) * Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472) * Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.11.0-2.el7_9.x86_64.rpm5e83f5f9e9a731890b9ba7d60465f40904736502213b1f154fd5e104105844befirefox-91.11.0-2.el7_9.i686.rpm6ff4fc0a21fa4e5fa5f25bc3c28d56596b6699302f3d9bc0ae2c5671b679e254SLSA-2022:5480-1ThunderbirdThis update upgrades Thunderbird to version 91.11. Security Fix(es): * Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468) * Mozilla: Use-after-free in nsSHistory (CVE-2022-34470) * Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479) * Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484) * Mozilla: Undesired attributes could be set as part of prototype pollution (CVE-2022-2200) * Mozilla: An email with a mismatching OpenPGP signature date was accepted as valid (CVE-2022-2226) * Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744) * Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472) * Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.11.0-2.el7_9.x86_64.rpm518b25f63fd9c1898cf7dbc477faf7330e4eeca94bbfaf5ce71233c8b0f46c1eSLSA-2022:5542-1SquidSecurity Fix(es): * squid: DoS when processing gopher server responses (CVE-2021-46784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7squid-sysvinit-3.5.20-17.el7_9.7.x86_64.rpmdbff6ab9c250e0f10dfca230a5f1170d86e8144eb1dd96909b41e1183ee5ecc0squid-3.5.20-17.el7_9.7.x86_64.rpm000c8e8e89638b9035378a053890a009bf1912fce759f517f212187470ddb2b5squid-migration-script-3.5.20-17.el7_9.7.x86_64.rpmab738d32e426a0b2aa73cb8c5d479f25edb1c03e00afda9adcc0cf661cf02b43SLSA-2022:5687Important: Java-11-Openjdk Security, Bug Fix, And Enhancement UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2083258) Security Fix(es): * OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-11-openjdk-jmods-debug-11.0.16.0.8-1.el7_9.i686.rpmff485a031b7358e9a603019431d11ad49fe1c191b651a1ab4a966f3254434a36java-11-openjdk-src-debug-11.0.16.0.8-1.el7_9.i686.rpm35b009867aeaec41a4101189c975ab32f52b96997c04179577e204fa7c953041java-11-openjdk-javadoc-debug-11.0.16.0.8-1.el7_9.x86_64.rpm8fc0bd4b7300cd42b8c60f8301d2262a0e6ea85ca55bbc6191f423f8202351dfjava-11-openjdk-debug-11.0.16.0.8-1.el7_9.i686.rpmf6277b5d6d7a9a104aa48ff42821bba76d39ea8109ca0ef184dd602386fdddecjava-11-openjdk-javadoc-zip-debug-11.0.16.0.8-1.el7_9.i686.rpm94355e3db0d1eeb216c439c8794e367d054b3c0f110445a51e122ff51efbe2b1java-11-openjdk-javadoc-debug-11.0.16.0.8-1.el7_9.i686.rpmc0b7fa4b587e7c76e5b652246d91f417d05c21d031489d5f776db52c4554f81fjava-11-openjdk-jmods-debug-11.0.16.0.8-1.el7_9.x86_64.rpm08d96bdd9b4331466d1c58221053dd24927fd80259e9e2cdc3edbf4c06b9e061java-11-openjdk-javadoc-zip-debug-11.0.16.0.8-1.el7_9.x86_64.rpmc3ae470cc832c94dc93002679fe56a85f31e5988fafff3fa00b23e4c520d16b9java-11-openjdk-static-libs-debug-11.0.16.0.8-1.el7_9.x86_64.rpm58260f8e9843800aa31099c7e4f7a6aa74597a915271959fc300c78fef0825d6java-11-openjdk-devel-debug-11.0.16.0.8-1.el7_9.i686.rpmead1acfec0163bef28a3971805467b337155d5ba67064a613dab2424f187a02cjava-11-openjdk-demo-debug-11.0.16.0.8-1.el7_9.i686.rpm9c83e1948e56b5044f88c9a04eef39f63ec956fc54f29b023c752b62f71f73fbjava-11-openjdk-debug-11.0.16.0.8-1.el7_9.x86_64.rpm7c81e27141ef3886d8a41bc2d856be63ac236f2aa11c4782382e82d44ce2c221java-11-openjdk-headless-debug-11.0.16.0.8-1.el7_9.x86_64.rpm07d0d9aedd58dc4d0bc84278ce0304fa2611a20ccc953e0719b2af733f5c95d1java-11-openjdk-src-debug-11.0.16.0.8-1.el7_9.x86_64.rpm3e5b6dde1167f229003f25a94346f478c7386e8578b31da25f85940331851b92java-11-openjdk-headless-debug-11.0.16.0.8-1.el7_9.i686.rpm37cafdda08da3a1ea4dad7b80777489a1e4f6117b828b5100e289e33088700c0java-11-openjdk-demo-debug-11.0.16.0.8-1.el7_9.x86_64.rpm78fab0f72db34591ffdf639cdbe2205b7d7838e039c3a6132953943c67894bfbjava-11-openjdk-devel-debug-11.0.16.0.8-1.el7_9.x86_64.rpm3ab693276932133e379fdf8b4ba7d90d26dc330d6c7dd75a6fc03b150e18bd45SLSA-2022:5687-1Java-11-OpenjdkThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). Security Fix(es): * OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-11-openjdk-demo-11.0.16.0.8-1.el7_9.x86_64.rpm8611c379545049fb5145af947ade98d6a34982bc6b1bd6fdc81b844cbcb69d6ajava-11-openjdk-headless-11.0.16.0.8-1.el7_9.x86_64.rpm144ea8e27c84507fcd45e26a346bceeb42afa3b2d10cc491ca6a313ad72d87fejava-11-openjdk-static-libs-11.0.16.0.8-1.el7_9.x86_64.rpm4bb7d26c567fe11f583ff82d4e213651a0add391dc89c7ded87d18acabba77ecjava-11-openjdk-demo-11.0.16.0.8-1.el7_9.i686.rpm0dfbe0a0574ac807f4e74809bb73dad28f577fdd6f077cee0bb6aabd5dafaa3bjava-11-openjdk-11.0.16.0.8-1.el7_9.x86_64.rpm31ab6b80b64db525f4350f5e232a4ad566c0a79970861d8029ea611644c5771fjava-11-openjdk-devel-11.0.16.0.8-1.el7_9.x86_64.rpmdb9ed77efbe929b28e593e4a21d6dded7aea5e80c7c9757c4e6d1fabe0c35720java-11-openjdk-headless-11.0.16.0.8-1.el7_9.i686.rpm55746417c54be47dd7809c30d000e0b7df9c025cc5350cd3ded8aac7a7c27033java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9.i686.rpmb16c911001ad580f4c2eca21d0924a8baade689e538df738b7f5e9c9f4253005java-11-openjdk-jmods-11.0.16.0.8-1.el7_9.i686.rpm820cfd6ee3b4b8a3d26cd3492a4774099272260bd0d18dd554c2f131c707ac84java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9.i686.rpm1e4d28d9a9842eca02530b1c5663a51a039fc5e5e6920b447097fde9621ee2afjava-11-openjdk-javadoc-11.0.16.0.8-1.el7_9.x86_64.rpma9676e773f4ab904e6df5340fd3ddebb1bd7150ade2b0dd4a3d6e48d83ad3203java-11-openjdk-src-11.0.16.0.8-1.el7_9.i686.rpmdceaf6b3fa5f11e3c3090f103adc39c32ab3b78e19e0a0ec82e56054a2ae28adjava-11-openjdk-devel-11.0.16.0.8-1.el7_9.i686.rpm30ecf4fca91c24ce852ef7d2c7f0ffe7d3c0cc2267a92963cfe5e3105225d811java-11-openjdk-11.0.16.0.8-1.el7_9.i686.rpmaac17aa4e1897cc09e6e0e34dc6dfc05075cb0a119889610763865b5eb7c814djava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9.x86_64.rpm404c5774f8f9163e381965ffc6e739616efae6c6fa8a6bff1bc09627535c3c73java-11-openjdk-src-11.0.16.0.8-1.el7_9.x86_64.rpmcb1b49986b19897e0457f122762c3a018f006826fc0b1270fe1e82c804c5c5f6java-11-openjdk-jmods-11.0.16.0.8-1.el7_9.x86_64.rpmc962abaf22b4a395efaf424f8c79ef7676507c16265a1f7253bfdcf794360ea2SLSA-2022:5698Important: Java-1.8.0-Openjdk Security, Bug Fix, And Enhancement UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2083257) Security Fix(es): * OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-1.8.0-openjdk-devel-debug-1.8.0.342.b07-1.el7_9.i686.rpm5cfe245f019d5fc6308312b6a2c36a5b3816add572af41e5c6da2630b2a9bc9ajava-1.8.0-openjdk-src-debug-1.8.0.342.b07-1.el7_9.x86_64.rpmdd552247cc20b81cab5abc2ac39dc17703d58a53732fa2f6e0f11c51b8d1de95java-1.8.0-openjdk-src-debug-1.8.0.342.b07-1.el7_9.i686.rpm2d94cbaab9b7bf560be85fef61cec7970813cbcfb23a6293de86d10ffee052d0java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.342.b07-1.el7_9.noarch.rpmeab54a41190cafaef99ff3f6d5539734a6c151d3868f78a326b549940284c43fjava-1.8.0-openjdk-demo-debug-1.8.0.342.b07-1.el7_9.i686.rpme283c2ea3701cd6b330e1fb6c469a58905becb4687d6ddca1fdfcf5b6e24a173java-1.8.0-openjdk-demo-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm5dede49755fef443561ec1294d59dddef1e977661dc8965744ea5b3eadaa82f7java-1.8.0-openjdk-headless-debug-1.8.0.342.b07-1.el7_9.i686.rpmfb412993684366151cc44711dd03669a328a34a78c0a6672f94f1a3f48e7dd8bjava-1.8.0-openjdk-accessibility-debug-1.8.0.342.b07-1.el7_9.x86_64.rpme1592b2fdef08f1ac87ecb4356fe1a6667cc9a310a5eff04bc97fb67bead7846java-1.8.0-openjdk-javadoc-debug-1.8.0.342.b07-1.el7_9.noarch.rpm49142f39946bf7ab738aeeeb04d894615267f95b7dc83a735c1aa75531c95599java-1.8.0-openjdk-debug-1.8.0.342.b07-1.el7_9.i686.rpm4d87c03704812f5de6e21624549dfee758efd582b6161854c671bb5c4671f2ffjava-1.8.0-openjdk-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm5ff4ae53a07a78eeca4ad20043caa10fb4f5ce90b73a6e102d2870d3a13fcf9ajava-1.8.0-openjdk-headless-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm3fb8a14a48644a420ec20fd27537402eca63522a85023ab13bbcede16dc384adjava-1.8.0-openjdk-accessibility-debug-1.8.0.342.b07-1.el7_9.i686.rpmff4d3843ce0896b873094b65d95ca7aecf1343ba1c948dbafa02de065c951154java-1.8.0-openjdk-devel-debug-1.8.0.342.b07-1.el7_9.x86_64.rpme1bdd17a0490037142cdb6ae84a6ff45766880d6cb7e147f74b7ae01788f652dSLSA-2022:5698-1Java-1.8.0-OpenjdkThe following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). Security Fix(es): * OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9.x86_64.rpm4ab7f27a38f56298c39e246c94d702d582ea7461cd0cda84ae19d6898080d863java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.x86_64.rpm4f5e91bda435dd90919ffa87bf89fdac660a7581c552c0c1a6e8bc8b729c694ajava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el7_9.noarch.rpm6e2bfd3f96c12846a098b7d01b6114c64b868638c083814e5a57facae46d4081java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9.x86_64.rpm866c8ff926d25e5c119c13292f2bac934bb3e02a9b821123efdd85dd3b263135java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9.i686.rpmb4006d90a56f38c63ef8522c0c97ad8a5963d5e50107985f0f758e39e03f5c27java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.i686.rpm6b3829da94a98f6ad1e9e4224796bf108eb0f15f1b6fea2a7be9cfd0b559767ejava-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9.x86_64.rpm7dabfb17f9d0efe22785ddeff0450c86fc99e0942e254911f3424cbaa1040dfdjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9.x86_64.rpm42b430ea26f1ca194196526b12c4dbac2d646081c4572cdcfc35e184fd9f491bjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el7_9.noarch.rpm8ccac8e0148f92f0c7f079a592c2a7e62644b42c26d0c61b3b93b1c22454868ejava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9.i686.rpm1fb56095e0db3a565698ac3a02327db2940983beb6cc358373da4dab1ef91c70java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9.x86_64.rpm943ac0fd188f796e44f4173e92e2e6b7bfd67d0597bf42234b17463b1cd62a02java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9.i686.rpmf25db7168bce97ee6e42b1605467a84b4aea3418c88cdf10131b453f9c700968java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9.i686.rpm37005280cc568854374742f1509d56437f8e4a07ada84ab33b6eff370523036cjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9.i686.rpmebfc9595270935485aa68afb4085c59d07730d26b097e9a9149993c98f89af98SLSA-2022:5773-1ThunderbirdThis update upgrades Thunderbird to version 91.12.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 (CVE-2022-2505) * Mozilla: Directory indexes for bundled resources reflected URL parameters (CVE-2022-36318) * Mozilla: Mouse Position spoofing with CSS transforms (CVE-2022-36319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.12.0-1.el7_9.x86_64.rpm25a5d69dab2c0d6e34baffa70a62cbf18dbce647a17972984ee25af215b4a716SLSA-2022:5776-1FirefoxThis update upgrades Firefox to version 91.12.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 (CVE-2022-2505) * Mozilla: Directory indexes for bundled resources reflected URL parameters (CVE-2022-36318) * Mozilla: Mouse Position spoofing with CSS transforms (CVE-2022-36319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.12.0-2.el7_9.i686.rpme807c37430e440a90e53af5e3858b6d52894389f35fa4361859e909c484328e8firefox-91.12.0-2.el7_9.x86_64.rpmef66827a15fe99c87e24c7685945c40f106fa61acab0287487d7d79a8482bd4fSLSA-2022:5905-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-Xorg-1.20.4-18.el7_9.x86_64.rpmf198d70d27d6f20b08719a5d875253fc44f9ea11146514d27c98c6ab8c12ee7axorg-x11-server-Xnest-1.20.4-18.el7_9.x86_64.rpm6b9a477b42d0bf923e2e2cfd4dce74d98748caa2f83b94a587514bc46102bf2cxorg-x11-server-Xdmx-1.20.4-18.el7_9.x86_64.rpm6e5c93deb4573a33358916269db7b17a0df2403364718318c5afe97b2806bc9cxorg-x11-server-devel-1.20.4-18.el7_9.i686.rpm7aaefe51552cc5d7a9e2d6d51f58a94df47648dff8b4cefa9353ef3f54f1a813xorg-x11-server-Xvfb-1.20.4-18.el7_9.x86_64.rpmfcb5709e9084537571247640566e2680616a5db70de7491bd83278358e22a64dxorg-x11-server-source-1.20.4-18.el7_9.noarch.rpmec086e923e6853c3f484c456df0a9428b87748d4c26a3b10befb8b5716219d86xorg-x11-server-Xwayland-1.20.4-18.el7_9.x86_64.rpmf8c10d3f4bfb44128472809afe964e52451f3b4534c0438ad07aeadd2e0e8356xorg-x11-server-common-1.20.4-18.el7_9.x86_64.rpm29f5d4a1af552ddb0093c15683f86e51d39d9a055bfc5209ba2a26200449b8d7xorg-x11-server-Xephyr-1.20.4-18.el7_9.x86_64.rpma409484eb5a91f441cf24a219a3e24fb4a51587b5bf18385001d912889178772xorg-x11-server-devel-1.20.4-18.el7_9.x86_64.rpm546ecc8a110ab6d2c1d3b0362e1ffd9dd0ac923bed363397d560eeab0f72b7c2SLSA-2022:5937-1KernelSecurity Fix(es): * Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123) * Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) * Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * SolarFlare sfc spurious TX completion * Page allocation failure on cryptsetup open * The kernel-rt crashes where one task is indefinitely looping in __start_cfs_bandwidth() with the cfs_b->lock spinlock being held * While using PTimekeeper the qede driver produces excessive log messages * The kernel crashes due to a GPF happens in mutex_spin_on_owner(). The known RDMA/cma bug that was introduced with a patch from upstream commit 722c7b2bfead is the possible cause. * Running LTP testcase creat09 fails showing related to 'cve-2018-13405' * Crash when releasing inode which was on unmouted superblockmoderateScientific LinuxScientific Linux 7kernel-devel-3.10.0-1160.76.1.el7.x86_64.rpmeb6c6858ee108768f74cbf482648a1d7c1468dfd9c6c14df31c4faea745a3aafkernel-tools-3.10.0-1160.76.1.el7.x86_64.rpm737ff7b8680df3b857d3386e5e33fb441444da64f4bfe0e9996d943dcee11bdbkernel-tools-libs-3.10.0-1160.76.1.el7.x86_64.rpm028e5f26d6cb86bc95b0a0583c97a367cd71cbf05b6115ec3aad3dff4c792abakernel-headers-3.10.0-1160.76.1.el7.x86_64.rpmae37ab166a3132528ba33a244f4de1a9f8644f0df5d3ff424056c0df935046d5kernel-debug-devel-3.10.0-1160.76.1.el7.x86_64.rpm96b836848019f779069f10177b6d425f351526684bbadcda46e1cc06aa2b006bkernel-doc-3.10.0-1160.76.1.el7.noarch.rpmd102f7c09caf2f06e44a067310247b90109993c49a4f5fe2756ef40119c67723kernel-3.10.0-1160.76.1.el7.x86_64.rpmef75240138a948d9fdc8669cf50f5ca70e48f2a9217acd6559577ca782b666fakernel-tools-libs-devel-3.10.0-1160.76.1.el7.x86_64.rpmd15c22331aa7656ad2f356b252b861f88a176d7a883bfa1c69c4e3098475777apython-perf-3.10.0-1160.76.1.el7.x86_64.rpmb054c8924feb65a2322d77acaac5203839c1217149ece08fc0b5da3c618a60b4kernel-abi-whitelists-3.10.0-1160.76.1.el7.noarch.rpmf05cd8f070add9cd4fc3e2dde0412e2e6f220d5c7bdc8a37e377e49c41637f11bpftool-3.10.0-1160.76.1.el7.x86_64.rpmbc87496d4e290c092d76890042f67cd51705320c826f03086ed3fabf4b4cb29dperf-3.10.0-1160.76.1.el7.x86_64.rpm2ae7ad41b3cacbc8e843a4e3a0c6a2289ab9046e72cb3de23cdeb21488cdacd6kernel-debug-3.10.0-1160.76.1.el7.x86_64.rpm10ebee491b5390dfd3a729a6195825d8dd9809bf8287f9cb321ebede65329e78SLSA-2022:6160-1SystemdSecurity Fix(es): * systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7systemd-219-78.el7_9.7.x86_64.rpm2b08ea19b057824d23fbcee8bb677679b7502f5b0b0cd38d60b7547ede2616e5systemd-libs-219-78.el7_9.7.x86_64.rpm3ed557aa85228f94cf8edce8c2bc89de8768a9ef050ee9928d68e6306501df1dlibgudev1-devel-219-78.el7_9.7.x86_64.rpmc7f3267ae4feb20d1d39d56a84a392e357db2ee1b34a6af2a7f7ffde61d30330systemd-resolved-219-78.el7_9.7.i686.rpm17ccc70a4c6b0fd4e36f601dda974f4c5f0d9c9da5cb3c348c54ee0039e5c5a3systemd-python-219-78.el7_9.7.x86_64.rpm621c4981bdbb67e3c0183a129cd2a51c36d6fa7b7940ed5ae3326fdf2d43bb06libgudev1-219-78.el7_9.7.i686.rpma813ab9e45be45a76c35df5060d6a236e18fd15fb13b2dd55ebc4f48a87f2b47systemd-resolved-219-78.el7_9.7.x86_64.rpme8fb0512bc5b5c66a605062cd97348245d57219d59f0fd14c5c12715017fe90elibgudev1-219-78.el7_9.7.x86_64.rpm02046f2acce4d5b8942b5e44d1fc5055a9e0e0f36e8463f3b17bc1a0155f4976systemd-devel-219-78.el7_9.7.i686.rpm2c5fc64cb5b0cb6df919385209c89eea049576a44a733ce2db2a119af579a726systemd-networkd-219-78.el7_9.7.x86_64.rpm774a53e5c24bc4ffbfa971d0686081c94f071eb3922e882ae90c82740f6c26dfsystemd-sysv-219-78.el7_9.7.x86_64.rpm3f89049498d61702206987358b0093989b9e8a226f794f03c941ede6b11b49d3libgudev1-devel-219-78.el7_9.7.i686.rpm3d2423fe28b482163248e160f4a471838e8c0a4f40308e6325cee4e2b4184e30systemd-journal-gateway-219-78.el7_9.7.x86_64.rpmd00824b3b9831e98c7a22512c63df9e320b7ab2769d49159dba45f99c212d93csystemd-libs-219-78.el7_9.7.i686.rpm48338899941ad604d5b84c5610d198837179fde1a03eb8301038ba704c2bcb45systemd-devel-219-78.el7_9.7.x86_64.rpm791e864b91024b15cba4e60eea597d4261f1926cd7c8f7a24e8158d8a15ba699SLSA-2022:6169-1ThunderbirdThis update upgrades Thunderbird to version 91.13.0. Security Fix(es): * Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) * Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) * Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) * Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) * Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.13.0-1.el7_9.x86_64.rpm6d85633aab8f9d5e33b46d20c0cb450d8b929292c3d4ec57f5cc9c4b9e1ca949SLSA-2022:6170-1RsyncSecurity Fix(es): * rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7rsync-3.1.2-11.el7_9.x86_64.rpm0c488dacb9f63cc2330889b3748f363389f63ac0c34cad4588f23ef4afe550beSLSA-2022:6179-1FirefoxThis update upgrades Firefox to version 91.13.0 ESR. Security Fix(es): * Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) * Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) * Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) * Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) * Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.13.0-1.el7_9.i686.rpm81039b2e705fbc6fb6c4ef61fcc0fc13592fb7a778009b300b41befb5500b044firefox-91.13.0-1.el7_9.x86_64.rpm098f44ada05d0d9010b129d6c9f3b00921b8b94b3568a4b550bc6cbd07339c37SLSA-2022:6381-1Open-Vm-ToolsSecurity Fix(es): * open-vm-tools: local root privilege escalation in the virtual machine (CVE-2022-31676) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7open-vm-tools-11.0.5-3.el7_9.4.x86_64.rpm2c7a540c07f75bbde969aab6fcd7643af51af971b6f2e604e30160fdf66c102bopen-vm-tools-desktop-11.0.5-3.el7_9.4.x86_64.rpm3736617d4ffbbee600bb2b187c796ea5a2e976c42a51bdc11310520b2a493cc7open-vm-tools-devel-11.0.5-3.el7_9.4.x86_64.rpmff5657209dd6cdfe32980b90cd40eb61d77c1f1fd633a53137d8429890940660open-vm-tools-test-11.0.5-3.el7_9.4.x86_64.rpmae6fb0521fdab2fd20a14ffb493fd0e72863d59051fe1d16f2bacd95df27ec89SLSA-2022:6710-1ThunderbirdThis update upgrades Thunderbird to version 102.3.0. Security Fix(es): * Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag (CVE-2022-3033) * Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959) * Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960) * Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962) * Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked (CVE-2022-3032) * Mozilla: An iframe element in an HTML email could trigger a network request (CVE-2022-3034) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of- service attack (CVE-2022-36059) * Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix (CVE-2022-40958) * Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956) * Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.3.0-3.el7_9.x86_64.rpm5c158e57590300fc7fdc7642fadd46a5c062d8f1d3f5aaf87fc01b93f3110114SLSA-2022:6711-1FirefoxThis update upgrades Firefox to version 102.3.0 ESR. Security Fix(es): * Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959) * Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960) * Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962) * Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix (CVE-2022-40958) * Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956) * Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.3.0-6.el7_9.x86_64.rpm16dfa4174101455cbdf4db85f950a31f77d7a7a7cf9fbb71aa501b68d60b6a48firefox-102.3.0-6.el7_9.i686.rpma90f01eb2e7fb81dada4d449816efb77b1bb64bffdf4774ddc2be5a93ff8d340SLSA-2022:6765-1BindSecurity Fix(es): * bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177) * bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7bind-export-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm8c8e95e6cc3d13d0a60fed32d2eb4c01f58f23a44d1ea1e09269db25a19f4b7dbind-9.11.4-26.P2.el7_9.10.x86_64.rpmc3c174c51b49054fc568a401d3333d3f72d60eb844202e128a35d9f0cab01f6cbind-libs-lite-9.11.4-26.P2.el7_9.10.x86_64.rpm452a47e1a5c85d5284ca3f3e624f93f3030863d7c1a716ec87f17c07d71bc3b0bind-sdb-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpm38640fd00904a57efd528c2c076063e966d23cc216db15d22ed891140254393dbind-pkcs11-libs-9.11.4-26.P2.el7_9.10.i686.rpma0032d922ee1ad824ece7bee12589cef936bea052cf91695a46f4d29d48d6950bind-devel-9.11.4-26.P2.el7_9.10.x86_64.rpme7245226cdf1bf2a601cfc69cd381ce021c02992837e33a08f03e0289d423f29bind-sdb-9.11.4-26.P2.el7_9.10.x86_64.rpm11614018e6fd0121a286ff84626820225434594f97ef7f85c052a069f293a302bind-license-9.11.4-26.P2.el7_9.10.noarch.rpmf46466f6f10683fea611257b1f00763bd3f9441b97de721c19ff378e9104c901bind-export-devel-9.11.4-26.P2.el7_9.10.i686.rpm262677c264df05452a69e4ef29c3b8b7136538cbde5e230c7c35518b233819f0bind-libs-9.11.4-26.P2.el7_9.10.i686.rpmb50a3aa1d2f5d7ecf431a390f9d95312f338c75c847f9be2e3ce68616b9bae5fbind-export-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm886b312819904b985a31a29c6186a922989129eab0a7d539381e01dee30876a7bind-pkcs11-utils-9.11.4-26.P2.el7_9.10.x86_64.rpm3f00161ab3c26341c8ab2d1bd5a22440d71ec8908dc5ed389f963a4050321eadbind-lite-devel-9.11.4-26.P2.el7_9.10.i686.rpm83aa7de54f47a6e325acc11254c9c3f447811ac6ec120e214288e278d72eff6cbind-utils-9.11.4-26.P2.el7_9.10.x86_64.rpm46d8f6e86bf934a2a672fae81dc95c4652b050b2a98dd17b7e4d282992199671bind-pkcs11-devel-9.11.4-26.P2.el7_9.10.i686.rpm9b4f8ba068b3891a277d4e4615ca3f8c882bad7fc9094d902267527fbf3c0b8ebind-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpm3397207eef4b4b8230eb35d39e553433e864226d0f7dc4b0c8ecfa934e41c71dbind-pkcs11-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm214fd14b0d5694ca4ef19425be5f88df6e324ad67f5f416ff037ebfdba6cb2ccbind-export-libs-9.11.4-26.P2.el7_9.10.i686.rpm63caf82f0c27722f3bcae22df946bb32b1042778da5ba76ce4f064abfa8d687abind-lite-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm1043d386988aa361c430fc5bcf99f0e719c54e69c93b9b97dfafdb46f874b3d6bind-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm7b348a7112ff4e203e64deec4f3d72909188f2302ab758dc02062c2d8f9e884ebind-devel-9.11.4-26.P2.el7_9.10.i686.rpmf1713f6bb470b0d7457202d39cd42bb0d03db2b75ab696e5ee3eb58d714a7226bind-pkcs11-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm08fd5980cfa071b0029fcdc029d63ce1ca3649ef4a73d96a15a8a005ccfa9183bind-pkcs11-9.11.4-26.P2.el7_9.10.x86_64.rpm59d79cc06227b29ff85aad74c80d32ecf96007b4cf44413fc92d94beb89b51e6bind-libs-lite-9.11.4-26.P2.el7_9.10.i686.rpm49ff2ab782cd64e6e4716f6fd496983a988cbe706f2edb2e903a3ea0b9184396SLSA-2022:6815-1SquidSecurity Fix(es): * squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7squid-3.5.20-17.el7_9.8.x86_64.rpmc80eba4f4ea195535460958b789906d52c7dca95daf9b548071db9c6edb70a45squid-sysvinit-3.5.20-17.el7_9.8.x86_64.rpmf5822f2cb2c244fb13fc93edc60a914c70a7e9f764dd7558f0e676e6cfd06275squid-migration-script-3.5.20-17.el7_9.8.x86_64.rpm41e3aa29f321f1a3db9d6b6b48288842b2e41f3f75a1640d0fa9cbfd0fca8ef7SLSA-2022:6834-1ExpatSecurity Fix(es): * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7expat-devel-2.1.0-15.el7_9.i686.rpm6d734ec2dfb8d067b0ed9e0044f6ef41e53fb641f894c40f01b89b2257ed032eexpat-2.1.0-15.el7_9.i686.rpm9d0a2ee25f9603e4c03758b57ad0bfcb35d6578381841c4235ff2ba9c8415dbeexpat-devel-2.1.0-15.el7_9.x86_64.rpm1a55d904f7411d5734a35309c82dd5ef4d5f906ecb198aaccac3ba57c32cd8b2expat-static-2.1.0-15.el7_9.i686.rpm2b51ea7bea1db7ec6ffe364e0e55f7483eeb02d2f8a0600bc4fc5ac14f12a70eexpat-2.1.0-15.el7_9.x86_64.rpm342e80ce03829aa81d520b4d1765e109818f6341d410bc9e4f6a2fdbc2909fefexpat-static-2.1.0-15.el7_9.x86_64.rpmc5e62aa01f2a9979cde445da233c0ce980eb6d2124036f0f3e83246ed36c80d0SLSA-2022:6997-1FirefoxThis update upgrades Firefox to version 102.3.0 ESR. Security Fix(es): * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.3.0-7.el7_9.i686.rpme0034b680c6c69752f77043e773d5f536fd2346d3e56ad571c76cdd058167e88firefox-102.3.0-7.el7_9.x86_64.rpm4881290a113ee0c15753bc4b63202747fcc727620c5089ba94fd2b563cfc69c9SLSA-2022:6998-1ThunderbirdThis update upgrades Thunderbird to version 102.3.0. Security Fix(es): * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.3.0-4.el7_9.x86_64.rpm94b25799df156b6c9c081860f77acd08ce9c5579d31716471499eed12aa9892aSLSA-2022:7002Moderate: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 8u352) (BZ#2130371) moderateScientific Linux 7java-1.8.0-openjdk-demo-debug-1.8.0.352.b08-2.el7_9.x86_64.rpmd56beb31d4ce3cb40cf06a3da3e78ecd7188dc0ef89bbeedb94fc05c0da906ccjava-1.8.0-openjdk-src-debug-1.8.0.352.b08-2.el7_9.i686.rpm4c8ef6112e9d00d3c6897a771b2774d74c339bbf0f83958034f4d72d835cd2d8java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.352.b08-2.el7_9.noarch.rpm6e34c23528db17618c9dd959117bb35918d8f396ab75fe755a6c734c75e7c2dajava-1.8.0-openjdk-headless-debug-1.8.0.352.b08-2.el7_9.i686.rpm1be77c0923180bb6caffdaa7116b170fc598c54a75b6e745b6896909ba4e42b0java-1.8.0-openjdk-src-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm094e338d13280eafaa2a1d56c0f5adf1d3f81d8d1d598ed6c3040a4ecc5cd17ajava-1.8.0-openjdk-javadoc-debug-1.8.0.352.b08-2.el7_9.noarch.rpm5c369b93e91db39be0f766c413578e7144f0d877463e12c8ed344fb2659ae60cjava-1.8.0-openjdk-headless-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm4bfda19ee57fc0edbd38c9fb1dbfa2dcbd1acc677d17dea82b097a8dead97ce4java-1.8.0-openjdk-devel-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm95a8274eacb0e615ccba63bfbe4f25693e055dee17e4c21aed7978ac968b5afbjava-1.8.0-openjdk-accessibility-debug-1.8.0.352.b08-2.el7_9.i686.rpmdc22f9c7db829153bef1e0f454e626f978408ef1d954b33a4725accf8f502246java-1.8.0-openjdk-accessibility-debug-1.8.0.352.b08-2.el7_9.x86_64.rpma7c2844adb412d23f0d44e2406a02168ad616ab6782ab507b23e4d630a4658dajava-1.8.0-openjdk-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm393037559109238206721f2850b69dbfdc4d63c4b5e2049aff4a6c4593ea3120java-1.8.0-openjdk-demo-debug-1.8.0.352.b08-2.el7_9.i686.rpmeb968d4f78a6de548c383fc6057ce11701ee12320697f918a3d3c36db9c1a8b2java-1.8.0-openjdk-debug-1.8.0.352.b08-2.el7_9.i686.rpm3a8ef487dc22dee957cb88c32af7efce732327055257cba68d755bd424e1c661java-1.8.0-openjdk-devel-debug-1.8.0.352.b08-2.el7_9.i686.rpm6efff0a7e6bf24d99c9292a1fab2cff2f82e77dcf81c55fa22b52b16117b5542SLSA-2022:7002-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 8u352)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9.x86_64.rpm045324cf39dd8d58706f6c90b421bbfe82dfbf1fa1bb614becf94af1bc5598fajava-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el7_9.noarch.rpm5154bc849ea4faebc2df3ec151a2fff7e579d7bc8a0d6a92bc7ac3916e8eea85java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el7_9.noarch.rpm236fc0b6fe5e63a031d98dad0282a0005276e6457b19792171ae5751c4893b88java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9.i686.rpm41b5cd44eeaf21dddc7a8fcab47c64a450d31c421149160feac0d58851312e23java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.i686.rpm2260ae4a9e1b4fbdc73d15c0eb9a3dcfed10e6602ba22c01363528045e961b90java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9.x86_64.rpm005d42f99b2171c26982cc7d7311934935a2d5ef23bd81e748c826b7a70de691java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9.x86_64.rpma9bf6ced787401b1a48a4b41f761037e5e24b17ad998f1b2069c7b505a083177java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.x86_64.rpm34c31532c398cfcf388c394b3470d8cd2074534ee132f770cd1080c685bd2094java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9.i686.rpm00123b9b7145ddc44227277d96a63acd537f393cd5183070bfb01762289c2419java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9.i686.rpm7c587708770b27a9d455b30e4f3118d410595e4a047187a377f94a272a742edfjava-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9.i686.rpmd723f61e6ce4a05c6683286586fb847941cafacb422bb68c40f35346c7b8e638java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9.i686.rpmf2bba7fd17da0be94b52d99e7efa8b27dbf3fa40e964595c6cdb331544f0a2edjava-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9.x86_64.rpm5527a326f0fca48935071a78978625a171fbfa130ac8b939a086a633a8e9eb7fjava-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9.x86_64.rpma85d45511bcc33ddbb1351d215ec9e16b644ecd45a8ef08c6c927cd4c8284f88SLSA-2022:7008Moderate: Java-11-Openjdk Security And Bug Fix UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) (BZ#2130373) moderateScientific Linux 7java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7_9.i686.rpm65a4fae1ca173d02255c130907fcd50e78168bc5bc4135e20df69177bd56c619java-11-openjdk-demo-debug-11.0.17.0.8-2.el7_9.i686.rpm9b30e0b4114447ecba9284f9f8bdc7a7fad055bd25fa4d0f940b2445b6a19073java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7_9.x86_64.rpm3d3a96485558332be7609acf9e84226055ff1d14905e59a943ea18cbab036696java-11-openjdk-demo-debug-11.0.17.0.8-2.el7_9.x86_64.rpm9c23f12f9a5495a548e1c9459308e84b9e9bc0ba240fa1dc77ea08baf93b2e62java-11-openjdk-devel-debug-11.0.17.0.8-2.el7_9.x86_64.rpmc794784018586395306109eb35a4e7a2b0af066a1c512f075ad22511bcc300c4java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7_9.x86_64.rpm0b5a939ef30c149d7c8bc37d653dba5e91cc9800a95b7105afb9d53461fc42efjava-11-openjdk-jmods-debug-11.0.17.0.8-2.el7_9.i686.rpm1f9d95412225790c9ee7352e4f91df4e7802ba3277c8d8dd51b1739db7ad3664java-11-openjdk-headless-debug-11.0.17.0.8-2.el7_9.i686.rpmd885ab7433ac56582a23b9ecd7d23131073867860a272dd26173cf376f16f65ejava-11-openjdk-jmods-debug-11.0.17.0.8-2.el7_9.x86_64.rpm9f96cafc43c20dab9078c4fff5050241c0a92b28af68e4fab5160bed79580a44java-11-openjdk-devel-debug-11.0.17.0.8-2.el7_9.i686.rpma887b2c3dd2ffe619fdd61c8fb2ddc15918bda4b3ecdd06aace9b65e7f335952java-11-openjdk-debug-11.0.17.0.8-2.el7_9.x86_64.rpm49bf2f5320e238c6aae952f0a51052ed5e6759fc81e272117e30c0e39b6ad55bjava-11-openjdk-src-debug-11.0.17.0.8-2.el7_9.i686.rpm906dbfba89f53fba9d831aef188204c768faea406c5c6cac748650a2acd5b2ddjava-11-openjdk-src-debug-11.0.17.0.8-2.el7_9.x86_64.rpmbe16072fc3b3928b5e29e9ac8de897e345b1e7c05bc5a3653394f190a516a935java-11-openjdk-static-libs-debug-11.0.17.0.8-2.el7_9.x86_64.rpmd220f2012589f2cb3f6a2a35c2d450e9d046810cdfad7162041dbac644ee5a24java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7_9.i686.rpm873e1f41f194c4720c8b728c6fdca7682b625710ee7b6335f64734b3c5937f49java-11-openjdk-debug-11.0.17.0.8-2.el7_9.i686.rpm01ed2ea371ef11fd32780c19716eb34a3b66e3eaf3a493095e65bf86f69521c5java-11-openjdk-headless-debug-11.0.17.0.8-2.el7_9.x86_64.rpm26122d4e60e887d73eb597edad58173f18d3ca9cc960670b3ba34cfc89627058SLSA-2022:7008-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17)moderateScientific LinuxScientific Linux 7java-11-openjdk-headless-11.0.17.0.8-2.el7_9.i686.rpm2e2f4282ea556b93790aa1f19bba98323f97261add22e01175952f7b54180271java-11-openjdk-devel-11.0.17.0.8-2.el7_9.i686.rpmc6dac67cc14997f8bdd2dd3f7c17a5356cf1dfd544c537e4a4cb1be83e411dc5java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.x86_64.rpmf3eba0997d80fd02f0641cb91ef9d3e79154b864cb8ec725b3468e6772c85942java-11-openjdk-11.0.17.0.8-2.el7_9.i686.rpmd68cb771bd42bb1114ef6559d8f7a51c2fd9e2ef435ad5a94dcb10744af7837fjava-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.i686.rpmb68bc607c222aa7323545ccb3262e624a17ad28dd04cfe4f0575a0cd6a14b905java-11-openjdk-devel-11.0.17.0.8-2.el7_9.x86_64.rpm15ab7a5216ed7697b80152e664dad4c0118228e2efbe7fde553627ef5d0fe1d6java-11-openjdk-11.0.17.0.8-2.el7_9.x86_64.rpm897a35cd9ecd8fe3605aeb9f800e834335b04aeeb756419b111fa6910fdbf20ajava-11-openjdk-src-11.0.17.0.8-2.el7_9.x86_64.rpm4e1a6147713db1f4fafbd879be92ce02a46966b7dbf0474b43eed85ffbb4bdb7java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.i686.rpm85858b751048b26cad16d92415828e9468ee5835840e547c549c00e31fade5d3java-11-openjdk-src-11.0.17.0.8-2.el7_9.i686.rpm5b6289d4a8c6cfb1938a28dc1a42b9849c012856d101f1ee0e69e621a979d06djava-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.x86_64.rpm5f7eb56248f3f5eb23975d3b7bae6acb884bcc24aeab2c6d51c80277274f28e8java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.x86_64.rpm28fc66558d2ba55d75d14e50f8816694f309cb296e8ac95a22655364e2a0c176java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.i686.rpm79f01ac42da78f71404bcac3d62dcc7c6f3d60100a33b8e1eff91f9c25d75210java-11-openjdk-demo-11.0.17.0.8-2.el7_9.i686.rpma70dbda492c78313c14a7a84828fc160b387bb1a1ea3ebfc2901e4a1ada2c63cjava-11-openjdk-demo-11.0.17.0.8-2.el7_9.x86_64.rpmbc21f6281a4762c1b3a272002479649491b01a68954c3962d4c7a75c38390c5cjava-11-openjdk-static-libs-11.0.17.0.8-2.el7_9.x86_64.rpmde645229b378ac294b1976bb731ce4336a91191ebb1573bb8f042b109397b583java-11-openjdk-headless-11.0.17.0.8-2.el7_9.x86_64.rpmbbb34fc805b6ee57991a015d7ae9bbfd4de8f6f6685a0a5a6e8dafee0f0e24a7SLSA-2022:7069-1FirefoxThis update upgrades Firefox to version 102.4.0 ESR. Security Fix(es): * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.4.0-1.el7_9.x86_64.rpm0642373afde8eacc9aeeb43c40c54bcf7c9f3749c7a1a8ea40e35825d201482efirefox-102.4.0-1.el7_9.i686.rpm9acb24fcb2dfe02086a689c5392f6c45d84459580fd79b2d14ce0993dc21d96cSLSA-2022:7086-1Pki-CoreSecurity Fix(es): * pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field (CVE-2022-2393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7pki-server-10.5.18-23.el7_9.noarch.rpm09524799484444a63b913868881e250af4f0119140f1ca99fc6c4fbc468cac6bpki-kra-10.5.18-23.el7_9.noarch.rpmf76d979333f8434d23757f3b6e1bb28343747049e0a10cb5252ebcfe5462802cpki-base-java-10.5.18-23.el7_9.noarch.rpm794c5cb52ab984ec7528d71a07eb08a8e2d93ef75e10ebf594d4c42cb40b248bpki-javadoc-10.5.18-23.el7_9.noarch.rpm167f14b76c2519a957b28c4c1104739f821a2f2943f3b31f34437ebcd68f8bf9pki-symkey-10.5.18-23.el7_9.x86_64.rpm49a97d887f18cea8d21db6e43d88473304c72347ec23df948a7058b2922e07c9pki-tools-10.5.18-23.el7_9.x86_64.rpmfd9f9a6b2d9168cf15bba41c981c54459bce435098ec52d0c4827685bcb01ea7pki-base-10.5.18-23.el7_9.noarch.rpm953ae5767d157d431e1c9bb90cd2151636d8e605ec23df90789c96372f8602ddpki-ca-10.5.18-23.el7_9.noarch.rpm02068486401ee6b5051a65921893a41da030562b0a46be4f00fbd004f9119515SLSA-2022:7087-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Import may break replication because changelog starting csn may not be createdmoderateScientific LinuxScientific Linux 7389-ds-base-1.3.10.2-17.el7_9.x86_64.rpm944f95622365738fafccebbf63316eac7d691e3e470ee9fc33d68fdba098b14f389-ds-base-snmp-1.3.10.2-17.el7_9.x86_64.rpmd8d451f7a840ad2daf7160514343a7d0803e7f24b76086999548e5715fe5b085389-ds-base-devel-1.3.10.2-17.el7_9.x86_64.rpm6ec4b181ba625b39344fcbd044793356d3549213cbf7e94806dd06fc38d84a17389-ds-base-libs-1.3.10.2-17.el7_9.x86_64.rpm77db2d2adfa7d50b05eb1f3eb8f39fb488d0a6b36121d361057dff940ebd85d3SLSA-2022:7088-1LibksbaSecurity Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7libksba-1.3.0-6.el7_9.x86_64.rpm7e11e6a81df1d6272e17a03009a28d7943a6cabd68bf3a923c6d89ead0769d2flibksba-devel-1.3.0-6.el7_9.x86_64.rpm673f0822ba542ac61ce573dca842da2c6661e75fb2de30e86bad51cb7a6237e3libksba-devel-1.3.0-6.el7_9.i686.rpm07a063e3cc370de7bb840c75e0f4ee06e5c777a7c18b843916c71c484ca8e943libksba-1.3.0-6.el7_9.i686.rpm533730773bb7dfd38472b7e70e42eb7e2ffd62449d70aeca13d4019900e8f8b8SLSA-2022:7184-1ThunderbirdThis update upgrades Thunderbird to version 102.4.0. Security Fix(es): * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.4.0-1.el7_9.x86_64.rpm751d9af64cbed054e4ce9d25ba8de957cfca2e6b6bbc6e583f6bb7e955e8e702SLSA-2022:7186-1Device-Mapper-MultipathSecurity Fix(es): * device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7device-mapper-multipath-libs-0.4.9-136.el7_9.x86_64.rpmc0417cd8fbd8cf0ebb675b89fe1472401299dbe36f3fe4832a6fd6f3d4820ee3device-mapper-multipath-devel-0.4.9-136.el7_9.x86_64.rpmfe3b267788d109ff4f28777fcc00dafaa6669cae749057415a1194fe94cabeeclibdmmp-devel-0.4.9-136.el7_9.x86_64.rpm30ca5556be8eab6e7c22d594443e7627ddc1d414751cad4b31556d244787ce56device-mapper-multipath-0.4.9-136.el7_9.x86_64.rpm55013cb7881446aa95631dfd591cde64b649c7a1b91c942d131bc49e117c0ff1kpartx-0.4.9-136.el7_9.x86_64.rpm0df134d6cc6152e6ee502a0590a4f10aeaabd870624486bcd1ecf804d0376e01libdmmp-devel-0.4.9-136.el7_9.i686.rpm7d73ab67bd157e7d42989546fe383af91118f2bb5afa94b5ac0ca82ce2d6d9b2libdmmp-0.4.9-136.el7_9.x86_64.rpm859220b7a7116671fa883778eb026c73853085eb18dcdf85d37c6f13904a8b9blibdmmp-0.4.9-136.el7_9.i686.rpmdf30e350eaf3d5d7eff406c4e548aea30732ea9564ea84403018876c810e2664device-mapper-multipath-libs-0.4.9-136.el7_9.i686.rpm16b497a2a5748f83372ecd97c9a53caf6a56c5136e039a3ec351c7ac6074fa26device-mapper-multipath-sysvinit-0.4.9-136.el7_9.x86_64.rpm125e697568c384f2b0e8b1e81a067b11d599fe7a078c7ac2347729e66a6b21e6device-mapper-multipath-devel-0.4.9-136.el7_9.i686.rpmbe0f0cbdc39232617d8f56ea6b5c387a8e7a5fdc378e8379553adcca324e81f0SLSA-2022:7337-1KernelSecurity Fix(es): * a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588) * RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900) * Branch Type Confusion (non-retbleed) (CVE-2022-23825) * Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * lpfc panics in lpfc_els_free_iocb() during port recovery * mlx5 reports error messages during shutdown then panic with mce * Kernel panic due to hard lockup caused by deadlock between tasklist_lock and k_itimer->it_lock * fix excess double put in nfs_prime_dcacheimportantScientific LinuxScientific Linux 7kernel-debug-devel-3.10.0-1160.80.1.el7.x86_64.rpm371b608b0e17311b77cbb5c189256e34e26616d68e63c2377d3cf2fff2738f6ckernel-doc-3.10.0-1160.80.1.el7.noarch.rpm8ebb2c2be13c520a0bc08dd36c7d3f6986cb16e3999e3ef5e1a0405227ebaf19bpftool-3.10.0-1160.80.1.el7.x86_64.rpm5b1549f366029a1777a0a1672a63ecb1070ceef48b309f5f3315442f9c000764perf-3.10.0-1160.80.1.el7.x86_64.rpma45033d911a9951c719cbe1aff04fcf2216b4196f99c28010beb30b26f3366cbkernel-tools-3.10.0-1160.80.1.el7.x86_64.rpm2d77fae8e1d3117d2bd2d48cbc79b5c3dcbf58c48a6f8b9be6a2681eee9d2806kernel-tools-libs-devel-3.10.0-1160.80.1.el7.x86_64.rpm4a71676849293f3c9f03b00e00d398df59415f2b4b2b146f74ae8f5583d347efkernel-tools-libs-3.10.0-1160.80.1.el7.x86_64.rpmaac2543f8b404cc85519fca1c32a189b44db191d78a4d19345e5b2963c531436python-perf-3.10.0-1160.80.1.el7.x86_64.rpm059abb1c94a1beb4ff872ca8ea2dc9faf621c414a90dcfedfa5922eabf27bebekernel-devel-3.10.0-1160.80.1.el7.x86_64.rpmddbdb5dffbf590e495a3f442dac24a81a3cc0ae681eb42fe5853a68d2ea2b6b0kernel-abi-whitelists-3.10.0-1160.80.1.el7.noarch.rpm0f478084fd9a6ac71bdfe4f6a6d68c360817fe8b8875cfc733e46165b5230a67kernel-3.10.0-1160.80.1.el7.x86_64.rpm334bf15c70cbd6233c3b86e566248a9996c9e25a541f91113f6bc278a09ccf45kernel-headers-3.10.0-1160.80.1.el7.x86_64.rpme1b1fb5a43dba7bdcc17a379221e8dfe0084b0a62bf19934dd34a293e0cd6565kernel-debug-3.10.0-1160.80.1.el7.x86_64.rpmdccc8cb1637b56a31daafec03d0f5618c74aa0c35c407136d3c447b661adf7fcSLSA-2022:7340-1Php-PearSecurity Fix(es): * Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) * Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) * Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7php-pear-1.9.4-23.el7_9.noarch.rpm03d25f58bd03ae554728125a505e13150c6f9bc8eae411c41dc195bb34099c22SLSA-2022:7343Important: Pcs Security UpdateThe pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Security Fix(es): * rubygem-rack: crafted requests can cause shell escape sequences (CVE-2022-30123) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7pcs-snmp-0.9.169-3.sl7_9.3.x86_64.rpm390b97770cab2e1374c50ec3619000ebb7872e23a8419e960c92041cfff00a83pcs-0.9.169-3.sl7_9.3.x86_64.rpmf8d9e60d0aa9c4ead385ae3725133bd8e1593e67285fa304ad0fc02bc6e3ef31SLSA-2022:8491-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c (CVE-2022-3550) * xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c (CVE-2022-3551) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-devel-1.20.4-19.el7_9.x86_64.rpm3e3432461e7d3bc68549c1872fde8eac9e22004155b343f0d5e98e0a96a6debdxorg-x11-server-devel-1.20.4-19.el7_9.i686.rpm0fd6387e097cf045b57e24a56d2da4afee38e756dc8ed403e95263f6356547e0xorg-x11-server-source-1.20.4-19.el7_9.noarch.rpm9023b819fdd94631d36f8be6c4c146489ca13e1134cb7e713d0846a2190816f6xorg-x11-server-common-1.20.4-19.el7_9.x86_64.rpm24376753e027a21ae6fa8e7b389c76538157ed9e06b64e44fc9b89a99fc6c10bxorg-x11-server-Xwayland-1.20.4-19.el7_9.x86_64.rpm5618774205f6014628aeee0dcf61781f52a0f265211147dffb51967c92942fdcxorg-x11-server-Xorg-1.20.4-19.el7_9.x86_64.rpm9ceb862a8744affd6ac8c2d38d756324460ad2cfe084621de13c075aad9590e2xorg-x11-server-Xephyr-1.20.4-19.el7_9.x86_64.rpmd0fcf4663345dc9465ef599962e37c0682546d1e76426a1e946245c0910ab558xorg-x11-server-Xnest-1.20.4-19.el7_9.x86_64.rpm0e1d8fbdd9864e1c01862fa15e6d601e0b230ee758da7838f905cf728054aed5xorg-x11-server-Xvfb-1.20.4-19.el7_9.x86_64.rpmaef148d20647d6392ce3a307b6305368d22ba19d28efb86fe15f1a90f02466a6xorg-x11-server-Xdmx-1.20.4-19.el7_9.x86_64.rpm3472ac91cc88a2b629fb6dc03cee388c9e0d7bb8d3e476526b7074480d663b2bSLSA-2022:8552-1FirefoxThis update upgrades Firefox to version 102.5.0 ESR. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.5.0-1.el7_9.i686.rpmfbfdecd9b75c9285060bf545f775eec9d54c680f703ee44634b2d6892b5b62c6firefox-102.5.0-1.el7_9.x86_64.rpmd9246fd451ec95c47e1faae3b828827c1a897d3a0447c57b2a79e744347c42d4SLSA-2022:8555-1ThunderbirdThis update upgrades Thunderbird to version 102.5.0. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.5.0-2.el7_9.x86_64.rpmaa6b87752deb674efc6faf9d021e36523a29be598aba27f9627d9118f480c8aaSLSA-2022:8560-1HsqldbSecurity Fix(es): * hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7hsqldb-demo-1.8.1.3-15.el7_9.noarch.rpm52afec8b8d834a50847f845c3d07024d94af6ecde1019872ddfd1b8f7ae27ca6hsqldb-1.8.1.3-15.el7_9.noarch.rpm227ca9d80bccfb61a5790605ed02ff16da540572df48e3705884964262444a56hsqldb-javadoc-1.8.1.3-15.el7_9.noarch.rpma27b384f2e00296902b1a0fc4191f3ba7316a3fafd968e944e37f19a4d7151f6hsqldb-manual-1.8.1.3-15.el7_9.noarch.rpmd37aa571bfe6d88ad8c91d832ce9b4681a923db382482dd0c616e245e37ed2c2SLSA-2022:8640-1Krb5Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7krb5-workstation-1.15.1-55.el7_9.x86_64.rpm632e08ca81c5804305ea37d3a31eb3043c022e5f3f5477ad7dfd0fa39ee52e83libkadm5-1.15.1-55.el7_9.i686.rpm88bb67fe414e2b7cb835e8232d313bf8ca0a6cfeb75b7e572f7752d8edec8c64krb5-server-ldap-1.15.1-55.el7_9.x86_64.rpmfdd36b73b8525fafedd6d7583da11d48fed0c3152cb1f6781efc425b05152380krb5-devel-1.15.1-55.el7_9.x86_64.rpm7c2e5c8e65ee6cc4042785a0ed36f99435254246f07260981f47b848921e61f2krb5-server-1.15.1-55.el7_9.x86_64.rpm5c22318fd10f1e807a87454ab210b4f1c3e5681fb931becfd7a866a37476808akrb5-devel-1.15.1-55.el7_9.i686.rpm0a98cd60d216e78afb2bfd8c25bf46c2aeeaa1b4412b3000c702a8c4db02bf32krb5-pkinit-1.15.1-55.el7_9.x86_64.rpm67b71dd1972f73c992e99e75c2204ca00ebc4d6979e0f833c9c14125ff4b7229krb5-libs-1.15.1-55.el7_9.x86_64.rpm94051fb415c683c99563089edd3efdc1c89803c3a5dd6a5d552d6fc0e302e3f7libkadm5-1.15.1-55.el7_9.x86_64.rpm09c4105398d0ebfda101c5733482baba1a78c10c09214d066630e4b93b368142krb5-libs-1.15.1-55.el7_9.i686.rpm1f711a5526449ed91253280ae45242d477b1abc458cc6d2cbac38ad0ae33cf20SLSA-2022:8799-1Pki-CoreSecurity Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7pki-symkey-10.5.18-24.el7_9.x86_64.rpm3763d3b06fa5adf88b1d856ec6e4df9ca072e85bb4c81802e242f92a276ff808pki-base-java-10.5.18-24.el7_9.noarch.rpmdec3a16ca4abc10365d37dd7f5b56d884f68dbd6daf866b94879a8791d0a7e07pki-tools-10.5.18-24.el7_9.x86_64.rpm0ab55652836140beb57a6c63f61647209cab3de7150476eb35cc8dadbb914db0pki-base-10.5.18-24.el7_9.noarch.rpm18901f2122cb5943d0653f02b4c62053e7f560ed6ea4b756c5423076d84d3234pki-server-10.5.18-24.el7_9.noarch.rpm56e94336222080a7ff07384101ee0283b3bd10c37c4f2a80c0829109bdad74bapki-kra-10.5.18-24.el7_9.noarch.rpmf9f6a70b5fce40e571b34548f86c5a4c3396d08b883a8cc489278f380a075b20pki-ca-10.5.18-24.el7_9.noarch.rpm2e0f47fdb4abae43cd3dfed8b80839aa1d2a766c0251406381fe380f81392d07pki-javadoc-10.5.18-24.el7_9.noarch.rpme5f1fc8f795dc8659b0e65e19d84f650ff31d2784ff1fe8a16f794d5ec3b3847SLSA-2022:8900-1Grub2Security Fix(es): * grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7grub2-efi-x64-2.02-0.87.sl7_9.11.x86_64.rpm99f13a06930fd8354a1ce96c33a6259dc91161f7b09891410980dc420ccabe97grub2-2.02-0.87.sl7_9.11.x86_64.rpmc2dcf0ed508fe4acc3f214e50869ff48cf0886c74714a2577e2b67d762855fc2grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.11.x86_64.rpm5918876ca7da16670b153194d5a341cb7761ae6492372e7072ddbdcbaa42b5a8grub2-tools-2.02-0.87.sl7_9.11.x86_64.rpmf30b3c3195f950bd75b2d21900762fcea27dab83ae1e850266e2850f25457554grub2-efi-x64-cdboot-2.02-0.87.sl7_9.11.x86_64.rpm4cd257f520e9638b7cb458d48fd0d283e107960078011156a3a8f36c9974390fgrub2-tools-minimal-2.02-0.87.sl7_9.11.x86_64.rpm9c6b61af8090eac77335eb6d8ba3ad60833940748bdf74b499bb951f9894f65agrub2-tools-extra-2.02-0.87.sl7_9.11.x86_64.rpm71306d978b90994b31c82c9d7f9b4af1f9ebbe05b1359243d83f10b9ee71c6cfgrub2-efi-ia32-2.02-0.87.sl7_9.11.x86_64.rpm4ab89cd7a4d82eb2be1409e571f0e0f0f84c29a5a46305d549fcdac72816dbe2grub2-pc-2.02-0.87.sl7_9.11.x86_64.rpmae59cc1a85e6dbfbef53c30ebefb1e2fbc1ecf5ea64dd5e219acdadc8d54d936grub2-common-2.02-0.87.sl7_9.11.noarch.rpmbe8001b8070d239f5aa659ba3935f0f12f041c36098d269c6d3d646e3d909995grub2-efi-ia32-modules-2.02-0.87.sl7_9.11.noarch.rpmdde4f7b829f72d95ab2c64758b3984d14e513648d5e16960635f19b9dc224db0grub2-pc-modules-2.02-0.87.sl7_9.11.noarch.rpmd7305826250898110bd4c2b6011ec147aa73f2c34cb7264f62528928a896b020grub2-efi-x64-modules-2.02-0.87.sl7_9.11.noarch.rpm797f457079572c3ba99445cb9db9c3650c7144d48d2f65ded3f11256a3524432SLSA-2022:8958-1BcelSecurity Fix(es): * Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7bcel-5.2-19.el7_9.noarch.rpme0cca685fe9940435681041174b6a4030eb581bc4e5308f7b587e3d4d1a0beffbcel-javadoc-5.2-19.el7_9.noarch.rpm7a618a7aa2a41af5da430d391a804277066289904fbe29cd4ea8fd0354b7774fSLSA-2022:9072-1FirefoxThis update upgrades Firefox to version 102.6.0 ESR. Security Fix(es): * Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) * Mozilla: Use-after-free in WebGL (CVE-2022-46880) * Mozilla: Memory corruption in WebGL (CVE-2022-46881) * Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) * Mozilla: Use-after-free in WebGL (CVE-2022-46882) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.6.0-1.el7_9.i686.rpme520550281c9f7c97655685cc5ab1c53c4a4958a2cba6c34d6294d78b179cbebfirefox-102.6.0-1.el7_9.x86_64.rpmaa5d2fc2abac7f2b6755b0d75ad9e00a5b88aa7f311c0f4be1cb30c09bf76cc0SLSA-2022:9079-1ThunderbirdThis update upgrades Thunderbird to version 102.6.0. Security Fix(es): * Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) * Mozilla: Use-after-free in WebGL (CVE-2022-46880) * Mozilla: Memory corruption in WebGL (CVE-2022-46881) * Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content (CVE-2022-45414) * Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) * Mozilla: Use-after-free in WebGL (CVE-2022-46882) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.6.0-2.el7_9.x86_64.rpm42b9264f75fcbd01966a937d569bd365f98c1c7bf4d83596b2bda5b8f060f137SLSA-2023:0045-1TigervncSecurity Fix(es): * xorg-x11-server: X.Org Server XkbGetKbdByName use-after-free (CVE-2022-4283) * xorg-x11-server: X.Org Server XTestSwapFakeInput stack overflow (CVE-2022-46340) * xorg-x11-server: X.Org Server XIPassiveUngrab out-of-bounds access (CVE-2022-46341) * xorg-x11-server: X.Org Server XvdiSelectVideoNotify use-after-free (CVE-2022-46342) * xorg-x11-server: X.Org Server ScreenSaverSetAttributes use-after-free (CVE-2022-46343) * xorg-x11-server: X.Org Server XIChangeProperty out-of-bounds access (CVE-2022-46344) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7tigervnc-1.8.0-23.el7_9.x86_64.rpmdd3017d51e87041cf20c76409022f16c604d3db82fea92764bea0ddf3064c1b1tigervnc-server-1.8.0-23.el7_9.x86_64.rpm8ba2077105eacdd811c769c72a7a9834e55b37f61af9aa7a754fe0f5349b81d8tigervnc-server-minimal-1.8.0-23.el7_9.x86_64.rpm1ba07a8cbf1e41a0a31c664a7bcdb64fb1a5c15aaf675dfbee04f9eeadb76ed1tigervnc-license-1.8.0-23.el7_9.noarch.rpmd4918406587f5ee86cb34b02ced600c4cebc2d49094803a34f912ac6eca5f403tigervnc-server-applet-1.8.0-23.el7_9.noarch.rpm3ce399d5291dfe9f6ea5866ca916bcc44ba1327dffe7d42ff380a8f88cc519f5tigervnc-server-module-1.8.0-23.el7_9.x86_64.rpmf749036b2eec25233c9739ba858271abbc5c050abba51fb05efa087350fc4b77tigervnc-icons-1.8.0-23.el7_9.noarch.rpme06f8c903c7c8f2a55c2d691f7635c0450f53b242cc4ca08b2e927dc07d534c4SLSA-2023:0046-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: X.Org Server XkbGetKbdByName use-after-free (CVE-2022-4283) * xorg-x11-server: X.Org Server XTestSwapFakeInput stack overflow (CVE-2022-46340) * xorg-x11-server: X.Org Server XIPassiveUngrab out-of-bounds access (CVE-2022-46341) * xorg-x11-server: X.Org Server XvdiSelectVideoNotify use-after-free (CVE-2022-46342) * xorg-x11-server: X.Org Server ScreenSaverSetAttributes use-after-free (CVE-2022-46343) * xorg-x11-server: X.Org Server XIChangeProperty out-of-bounds access (CVE-2022-46344) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-devel-1.20.4-21.el7_9.i686.rpmb225aa56a8ca3c634abadd18923c8556e372e00b4f2048ef8e8d024f00048859xorg-x11-server-common-1.20.4-21.el7_9.x86_64.rpm79d53e5d5cb651278f2afcb1294f9b7f02c9247a3adaca45560400fc0b570f88xorg-x11-server-Xnest-1.20.4-21.el7_9.x86_64.rpm3b2ce032e3823928c8c7b39a8f3485b7f98ff75c1d93d5522b13f387742cbcc1xorg-x11-server-Xvfb-1.20.4-21.el7_9.x86_64.rpmb2b56bdddd55759d19fe1cda40eef9a558d83177e52e4d4febb2674bd11183c4xorg-x11-server-Xorg-1.20.4-21.el7_9.x86_64.rpmd55a20b8c13216c9b26bbf8bfa3968a8ec696e167a952acd479fc8c88a25a143xorg-x11-server-devel-1.20.4-21.el7_9.x86_64.rpm31d5dcfa4b14c22d9148fc0343746d4e468c267bbc21e3beb4b573c099e60c48xorg-x11-server-Xephyr-1.20.4-21.el7_9.x86_64.rpm579384683f9a00c1f779d2d356627975bbffb7fb22b45183c7cd129615eeccd5xorg-x11-server-source-1.20.4-21.el7_9.noarch.rpm51c813defbae680877830c3caba839f053ef6b7004088f7358c28d288113e7c5xorg-x11-server-Xwayland-1.20.4-21.el7_9.x86_64.rpma47e375d2cf9f34c2ccc30d20c6f94d619c492ccc51715729c75b314e3f58d67xorg-x11-server-Xdmx-1.20.4-21.el7_9.x86_64.rpm18862f831a03ed2aefa268c9c5bbdce8b7b977d0010a4d6a2f547d37b1c2e861SLSA-2023:0195Moderate: Java-11-Openjdk Security And Bug Fix UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) (BZ#2150192) moderateScientific Linux 7java-11-openjdk-javadoc-zip-debug-11.0.18.0.10-1.el7_9.x86_64.rpm4fcccdefc071d921599a1e7c4bc3a4f5fa074bef39e0504866e93dc5f91f2531java-11-openjdk-demo-debug-11.0.18.0.10-1.el7_9.i686.rpm5721c7753a72eac303fe3255b37283d95fcd94c7376c2d4ebbeeedff3a096af1java-11-openjdk-javadoc-zip-debug-11.0.18.0.10-1.el7_9.i686.rpm51b99f58322d567cddd042efbc869f373b52e933383e45a66c97ae8cc45e1f63java-11-openjdk-headless-debug-11.0.18.0.10-1.el7_9.i686.rpm6a258f5f2f99e2e656619c7f5f3b6b7f2023b8f901c0a0334873b94fdc941b29java-11-openjdk-src-debug-11.0.18.0.10-1.el7_9.x86_64.rpm8ad97a2c2b6319d5cc2fcb597087eaa62c042f2225f2217708cab3fa727c7744java-11-openjdk-javadoc-debug-11.0.18.0.10-1.el7_9.x86_64.rpm7bceae79f301a98f2b175728c26b4dc0ddd2049e5aba176fe774f0afd219a1aejava-11-openjdk-javadoc-debug-11.0.18.0.10-1.el7_9.i686.rpm42e0fc8733f5c586bb78b49b5a2de5bd09258b51af47a92b6e8712bf03ba76d1java-11-openjdk-demo-debug-11.0.18.0.10-1.el7_9.x86_64.rpm52fe117f3dc1637a5bce91dbbbf262cb3426d5ba229fdb5be195fb49de0dead5java-11-openjdk-static-libs-debug-11.0.18.0.10-1.el7_9.x86_64.rpm46ada50a9aa614b885d0dd4a7015ee5d1fb06d7f490904fa30e1ce6957236953java-11-openjdk-devel-debug-11.0.18.0.10-1.el7_9.x86_64.rpm2c9d49a68aa09f02258351c91f555f6b0211de901645235f7d0f31f232115963java-11-openjdk-headless-debug-11.0.18.0.10-1.el7_9.x86_64.rpmb3f024c8c0309215dd310fdc7d20f9e854ff1793fcd79f7cbdf51565a692ccbdjava-11-openjdk-src-debug-11.0.18.0.10-1.el7_9.i686.rpmce46f933757568cd5b7eba35845c701fcc3e4ed15e922ded40398265ee427211java-11-openjdk-debug-11.0.18.0.10-1.el7_9.i686.rpm3c359c9afd7dfd0a006e9b23d4ad5f1036df5508873b104ab0f05b5b5bbc60fajava-11-openjdk-jmods-debug-11.0.18.0.10-1.el7_9.x86_64.rpmbce1e0dc45399bdbee0b5b70b9596f99c175ca68a14454e8de229887bdfbff18java-11-openjdk-devel-debug-11.0.18.0.10-1.el7_9.i686.rpm1872c8712dccd991aa136cce3c2e86875a3b2643acc896bec68c3b083507125ejava-11-openjdk-jmods-debug-11.0.18.0.10-1.el7_9.i686.rpm1915fcb1e7116b4b935440e911a85d10923bd50e9c924c70aeaea617e26ab15cjava-11-openjdk-debug-11.0.18.0.10-1.el7_9.x86_64.rpm88c6d0144ec63fe83ba7762cd6bb68ba4d04c150859d27d78d0a1c5858b78b4bSLSA-2023:0195-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18)moderateScientific LinuxScientific Linux 7java-11-openjdk-demo-11.0.18.0.10-1.el7_9.i686.rpm3bc1d3cae89a9b43428bc5b056d83be87f802edd3b625132919a4179e3636b00java-11-openjdk-11.0.18.0.10-1.el7_9.i686.rpmf843f7100c0e05db141e5711b463151f6f84edc518e26801f642781dadadca7cjava-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9.i686.rpm748d1bbacd06da97f2aee6b4cc956921ed77d1686c9ecc216e3fbefdc764d37bjava-11-openjdk-static-libs-11.0.18.0.10-1.el7_9.x86_64.rpm842ad0e3202d29c2ab7d4a0da2ffd7ad60553b79dbc38a04e365248634c6de44java-11-openjdk-headless-11.0.18.0.10-1.el7_9.i686.rpm271de5dce775c818dd0b07bb8f270955529619164be4339e950d85d38733b777java-11-openjdk-devel-11.0.18.0.10-1.el7_9.i686.rpm135f5bac306fd312a6d7a5ed81c4922953d0ef8b2459fd5df8ce47ef3e275595java-11-openjdk-headless-11.0.18.0.10-1.el7_9.x86_64.rpm954bed46277a5d12619ace7f32279515c2a98ffda3733e187797f19460113d75java-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9.x86_64.rpm1977afedf027ab6b36f6bb4701372b22ed6891ccb86921ec144da42de29f9a09java-11-openjdk-demo-11.0.18.0.10-1.el7_9.x86_64.rpmbdeda4ae3c3d1558414becfd75b3df7cef33576f702a1a1d3997c638d07b75fajava-11-openjdk-11.0.18.0.10-1.el7_9.x86_64.rpm1e1ee682659151ffc7e9622e46fc4a5385da0c847855c692fb300b454fe95038java-11-openjdk-src-11.0.18.0.10-1.el7_9.i686.rpm61e30fd23ae2c3e0fbbb70ee6995a7e608dd52710ded594d9ea8b9ff71f6dff2java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9.x86_64.rpm1b9d27cbbe2e7a6823e56922b743ce76e738da8af3281699337a61f2df134024java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9.i686.rpm8962445f55696819dfe7c47f475c2b53cc0d96e5ff73bc5d645d6b61edbb7debjava-11-openjdk-src-11.0.18.0.10-1.el7_9.x86_64.rpm973dea4ab545a00f6aac1ce0b55b22df5a5bbb2d9071f77ce4b98f0ea0997a7cjava-11-openjdk-jmods-11.0.18.0.10-1.el7_9.x86_64.rpmb89892b3f9e18cd038d05dd81498d044c33b301dc2e42bf4a8a7e9eef50d4d9ajava-11-openjdk-jmods-11.0.18.0.10-1.el7_9.i686.rpm27e633ba219e5a22027e01f848a8a16d84316b68f7cd97929c42fce46a887983java-11-openjdk-devel-11.0.18.0.10-1.el7_9.x86_64.rpm145f8da2a5bc486a8421b1e7cb57363db2e0f2b18f9349f21546ce6b8312f0afSLSA-2023:0203Moderate: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) (BZ#2150191) moderateScientific Linux 7java-1.8.0-openjdk-devel-debug-1.8.0.362.b08-1.el7_9.i686.rpmd67f5f2319f6ff0a3b5de8d2d807ee5c67e926c7a8dcacaf2e28e8e9bc6b2238java-1.8.0-openjdk-headless-debug-1.8.0.362.b08-1.el7_9.x86_64.rpmc43fcee935ee49480526fac1e2080c2036252474816bd997f9ec6418f4add8e9java-1.8.0-openjdk-demo-debug-1.8.0.362.b08-1.el7_9.i686.rpm17fab252cbef0c6091cc5b79ee41edf7247454269c7672890c234175a9eb1f03java-1.8.0-openjdk-accessibility-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm8a61d12f78f3795ac2cf62406286a5f37c7deead7dd6c3a02dd4c1e889ef8900java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.362.b08-1.el7_9.noarch.rpmcea11c3b85836b654b96bf42c4a8d3325d4d9db3c17277871f917965165aec3ajava-1.8.0-openjdk-debug-1.8.0.362.b08-1.el7_9.i686.rpm59b237e3ae54ab4415241c247e5d3d42a352e2b81960c848cd8ec07d91fe1fb3java-1.8.0-openjdk-headless-debug-1.8.0.362.b08-1.el7_9.i686.rpm8b9addb29a05d1fd51e24843f9c9ff233ffefa529185561466b7c7d5f244b5e2java-1.8.0-openjdk-accessibility-debug-1.8.0.362.b08-1.el7_9.i686.rpmeafcc7b9ea13057aec5c7b0ebe6f10882c24d023883a27a2e2509bef8e8e1179java-1.8.0-openjdk-src-debug-1.8.0.362.b08-1.el7_9.i686.rpmef2f54dfcec1be271424d6a3a0a362c9a3af74a93f52ef43402d1912c781729bjava-1.8.0-openjdk-demo-debug-1.8.0.362.b08-1.el7_9.x86_64.rpmaf40a2cfda64966d5a427c2eea862ea30d618567d401078c4c0c448bf9432df6java-1.8.0-openjdk-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm51112771c749d39cf0184f0bb26636af59c40d88eee15751b02ce8f719f10a37java-1.8.0-openjdk-javadoc-debug-1.8.0.362.b08-1.el7_9.noarch.rpm5fbd504305174e6bfb203b14e45aa9fee36c3da9f73d7c810733d9600fcdda54java-1.8.0-openjdk-src-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm394b99e5dad56c6b475922a65576ff8f622be890d773b2f61800985c335daae3java-1.8.0-openjdk-devel-debug-1.8.0.362.b08-1.el7_9.x86_64.rpmd23676057675490f4089eab52482b9cd0e7878e5a2f3cf9c9d113207478d0751SLSA-2023:0203-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el7_9.noarch.rpm05b6ccceb390b74f5a4dfc27aa6f6100d7bce12dc245e3c52e0ccc7fe1d642bfjava-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el7_9.noarch.rpmd7b36f402fb5e3cb164069a19de48997180a7acbf656960bb8395de371279098java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9.i686.rpm653e348b4a040d8fade666eb0133836bd40c9973dd7ff739b24337dfbdc2c892java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9.x86_64.rpmfebf86745e38c1a80182668de2e367ad6870206ed182ff455aa67cea0a450222java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9.x86_64.rpm752180dbb579f396c985a1d7de2f8b79440096ebe4240c8b16a011eeab0557bcjava-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.i686.rpme5eeba85072f8947cb295251e39a59f2387fb3bdcb75fab7446b3319262313d6java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9.i686.rpm4c06915a71f9f8f77fc3224a3befd6978484aa94fa0fbc6fc388db7463a24e22java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9.x86_64.rpm8502fc7913dce12d4b6782a1b1bd06573cf1e0f3b87026a84fbf391584632705java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.x86_64.rpm4c48921b8d693ebe70aea1f02ad0281c6bf7ad5343dd8286014421164bc60053java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9.i686.rpm77908458f8b22121d9d5d237ba5df39a2d013502b35c14bb51f7efecb23c2159java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9.x86_64.rpm29e7e96ad8580b7ad6a47a627b381b7af105f9d1ffd99ed38cb9eae25ccc3768java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9.i686.rpm165e46dc7a8d05f83a894dd20c23d60abc3c1887ecfa1c5254049ff044d73fc0java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9.x86_64.rpm591856a5e8fa2aca76194cf466f2c7a8e0ee74bea747b9a9618e4b5b51b24ab7java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9.i686.rpm8b4df27fdadbb0e8f1d2d251fbbe1659a597ab959926c96a03963d71d1631039SLSA-2023:0291-1SudoSecurity Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7sudo-devel-1.8.23-10.el7_9.3.x86_64.rpmb509e056243c05835de134363455b1f06feb4a168d8589a349ba2c8e83eddd47sudo-1.8.23-10.el7_9.3.x86_64.rpmcac42c69a281a8b043ad8439ea382ef1189f033ae73996f6ee04a369fd8db073SLSA-2023:0296-1FirefoxThis update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.7.0-1.el7_9.x86_64.rpm11b23f5cd514cc8129706f30b58ad4a5ff362d3ef32d278e706ec529245f2128firefox-102.7.0-1.el7_9.i686.rpm6dcb5e50c1d0aeda1e6b048bb06d3b39cc58c23a5c108108eaefc4fe586d4027SLSA-2023:0377Important: Libxpm Security UpdateThe libXpm packages contain the X Pixmap parser library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7libXpm-devel-3.5.12-2.el7_9.i686.rpmb198deb123820a78c48009ba17ad5cbd90c0c33aa6bb09c392370a38599b7ae3libXpm-3.5.12-2.el7_9.x86_64.rpmdf039c15386f0ccaf4d4ecec2af6f54b1d698240cadbf324d7327d67ec92f365libXpm-devel-3.5.12-2.el7_9.x86_64.rpm60c812c275867820f98e75f4b0067b0b5ab76e52b5f95ecf26a2831b8e97a6e8libXpm-3.5.12-2.el7_9.i686.rpm2f0d3e0e9abe5bb42ef048af825a38deda1b5ead99875ab9e4f2063a51766714SLSA-2023:0399-1KernelSecurity Fix(es): * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prevent unnecessary resets - Avoid leaving shost->last_reset with stale value if EH does not run * i40e: Request to backport upstream commit 2e5a20573a92 * disable VMA-based swap-in readahead on PowerPCimportantScientific LinuxScientific Linux 7kernel-abi-whitelists-3.10.0-1160.83.1.el7.noarch.rpm98e7e92cd04b875945fd4cb335412bf8c24a4e439ce39aabc1d795c46c4298d5perf-3.10.0-1160.83.1.el7.x86_64.rpmd33cbb5d8ad58c6e4c876a306ec93179871e9a2a84123c97d3793b0a8404dbe9kernel-3.10.0-1160.83.1.el7.x86_64.rpm03e614e31ff2f223881b8542d50a59e0360117c66c4663fea606ad019dc574ackernel-debug-devel-3.10.0-1160.83.1.el7.x86_64.rpm6c11f35cc47ff1a43b18c0506fabc9a3f3d3b0b2f5c8c15470c443c7828450e9kernel-tools-libs-devel-3.10.0-1160.83.1.el7.x86_64.rpm1366cd9ad0a75cb819e32ab8e99f2e59afe5fa863832725e38334f2a1c8af63dkernel-debug-3.10.0-1160.83.1.el7.x86_64.rpm1a49e659075919d95f7ebd2fd2bc6689cb2f475d1274496c971e44e0899014c1kernel-tools-libs-3.10.0-1160.83.1.el7.x86_64.rpmace7dd6fc95f571358580c4a373531a643070b7b59571908ea809c31dca21b76kernel-doc-3.10.0-1160.83.1.el7.noarch.rpm863a86b1705c39a0d3f84cadcc501337fd023cfc5cf517d71611b513a24100afbpftool-3.10.0-1160.83.1.el7.x86_64.rpmad4a6345606050446ad16b770f6d3d27852dda942ddfd3a0f06c0b2f551f89d0kernel-devel-3.10.0-1160.83.1.el7.x86_64.rpm6e0ef358ba023ff734894a30f88fa4cbf5d4a0639c70323c8881bb083a2dc6e7kernel-tools-3.10.0-1160.83.1.el7.x86_64.rpm7d96c648f1ecdb2a7a013c40c3eb09397ab8d091ad9a1edebff4a55348d0a1a0kernel-headers-3.10.0-1160.83.1.el7.x86_64.rpm0b6671b29f4ad5264592b71ad0eddc45a9ae36cf0b6f270e02743487c3fa0bdapython-perf-3.10.0-1160.83.1.el7.x86_64.rpm68b80d5f1ee488ce0fe8bf9e7f6d996325fe03c11fa6180f2491c6daa84d0920SLSA-2023:0402-1BindSecurity Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: processing large delegations may severely degrade resolver performance (CVE-2022-2795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.i686.rpmeb7454c91c0c0229c5c42b7b39da752e86f3a8d3178430deb6a1b44c96881f8dbind-pkcs11-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm0f56a8eb01c837fa298d23a19ab0440f1c384d578326e75deb4f079ab3d879e1bind-libs-lite-9.11.4-26.P2.el7_9.13.x86_64.rpmab10c3e78d6034f2aaa0c8b4ebf6d7be3407f1357101e822c318cf17ea861d63bind-export-libs-9.11.4-26.P2.el7_9.13.i686.rpma2a4d81888ef9d2d40a9925b76a4810877a2d2c652f56690282bdea89262089cbind-libs-lite-9.11.4-26.P2.el7_9.13.i686.rpmab7659bf414b34d38f29bb3c339e7ef7227ab6029c09aea0d9796f3b16617074bind-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpmf4a664d35029d85dd179c384f40480a3428f7812dc5451815f570169ad5772b6bind-pkcs11-9.11.4-26.P2.el7_9.13.x86_64.rpm1ced88f817c5c9b837c0f30d5716d0170451c17cb76f2aafae9f38ec7d4eb2b7bind-sdb-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm043c7ab8699a0c632fbcf86503a81e396117e945c9b688fbc3dd8ebf74bf130abind-export-devel-9.11.4-26.P2.el7_9.13.x86_64.rpmbc654c846cc7b0cf207acabf543674bb337c2d00834b8a1642d20f1f876c7913bind-9.11.4-26.P2.el7_9.13.x86_64.rpm4da9b800ab814fad0c507e1fbbcd24e87046e12f6a114208a20735d11ca050ddbind-sdb-9.11.4-26.P2.el7_9.13.x86_64.rpm6cb479ea7e8351c0e798e4bba3b420e8f8527767c75c387558d04ccc176131fbbind-pkcs11-libs-9.11.4-26.P2.el7_9.13.i686.rpmbd749319924fd015a69e9e0b46bbe2f1372885887dcae418439f0ac76ce4c217bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm8d3f4431c5eeca4e4d989d494d1e9fa35e5315c146e2ee097b18e46d125ac0a2bind-lite-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm776572692e3ee2fa60f1b3ec56e69ee16c4229730f7845cbc3fa135dab5c3c91bind-devel-9.11.4-26.P2.el7_9.13.i686.rpm329962f999d5f845da95aaac1b0236c6c12ab50763a353458b0563949e9241cbbind-lite-devel-9.11.4-26.P2.el7_9.13.i686.rpm42ca2439d41c12224fb12b8bda8ef7a3e260ceb64d79f0b6054eaec655cc7644bind-license-9.11.4-26.P2.el7_9.13.noarch.rpmf9aef2500b2b1ed6c3206607d73157246a3b0ea6fda944b02706154b00b4e979bind-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm1eb2074549612b1cff2a28627e5f3b2a4d236566d5adaa99b4674405697d2598bind-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm4e09efb17c23f9971cf3c42854c641011561dace108198a272befdfefe2ebacebind-export-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm4003d60867abb79d5c6e609204461ae25f64ccd2b1fd3738b72b12b440325bccbind-pkcs11-utils-9.11.4-26.P2.el7_9.13.x86_64.rpma6ec6b932f762a7869a3550209b49a275b111bf37ee2995818965911c54deb94bind-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm46774dcafc058b1dd4cfc9a640d0d0a446467d300bcee59a7bda88a1b53e8c01bind-libs-9.11.4-26.P2.el7_9.13.i686.rpm34830638859ee62e60bc47dda6f0383455e839436448de55706892203e9fd909bind-export-devel-9.11.4-26.P2.el7_9.13.i686.rpmb388afda1b0ac50faedaaa336b839370c6edc9e37fc2bf2e444f8ffdd839e878SLSA-2023:0403-1SssdSecurity Fix(es): * sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters (CVE-2022-4254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * smartcards: special characters must be escaped when building search filterimportantScientific LinuxScientific Linux 7libsss_nss_idmap-1.16.5-10.el7_9.15.x86_64.rpm16bc4d0557dde9b46a1c9897345a621b49b790c90c07141860cfc9e93df55ee2libipa_hbac-1.16.5-10.el7_9.15.x86_64.rpm529d2d8d22c5c0b309ba3e79c1e410e0fcfc53987eb9322c862b6840a8675584sssd-ldap-1.16.5-10.el7_9.15.x86_64.rpm84b915877ab3a0f4fd324e69005f330e06b2a0e8f5787a2d0bba23d2b76ca9b2sssd-ipa-1.16.5-10.el7_9.15.x86_64.rpm8e8ec7152e1511103ce96db1be110b5010660c65698b467c470a980b0af99201sssd-client-1.16.5-10.el7_9.15.x86_64.rpm2fdc8cec74266f2a85a55c6d3b6b0307458d0a20476e5749c76aef33c6151225libipa_hbac-1.16.5-10.el7_9.15.i686.rpmec9e2f79eb49a0a505bc4258a16c40fdb4513d3ee2a915987ad1dbcb12a32a4asssd-krb5-common-1.16.5-10.el7_9.15.x86_64.rpmd7b2acb1b193cfdfdca7c54d169497cd58ee5e57e76980ed7868446d8b90cfdalibsss_nss_idmap-1.16.5-10.el7_9.15.i686.rpm8759698f9478c1aeb33c8ea981a0a6439202f6066cdb70c2682e1100320cbb42libipa_hbac-devel-1.16.5-10.el7_9.15.x86_64.rpm4fbb6253c7180e83a4b2bb828bd2a6cd24014d28a0055d2fcfc2fb5fc706f78clibsss_certmap-1.16.5-10.el7_9.15.x86_64.rpm388a3fc9d5274d70d776671716eb893b82d5e832890dae1d7ba2cf2d0484f3fclibipa_hbac-devel-1.16.5-10.el7_9.15.i686.rpm56cb20370288a226781598ee1d8dd41707ba4d2e6374a2b2a4505d2302357279sssd-tools-1.16.5-10.el7_9.15.x86_64.rpm255fd956b96970e4286710242848e4e2ea03d870037cdcfb4eb601449a82a13elibsss_simpleifp-devel-1.16.5-10.el7_9.15.x86_64.rpm5cb5f1d47f0a70fb927abe487e444b4bdc44504b78e7be135573e6800a33c3b6sssd-libwbclient-devel-1.16.5-10.el7_9.15.x86_64.rpmaf6072ecffe9de1b96a4a2d046fde800d16199ed23fa9a5562fafd798ba0d812sssd-krb5-1.16.5-10.el7_9.15.x86_64.rpmfad79434fd51546a0fbee2de76ce712bfa0688711c140b1dc07c9a8c0b64c782python-sss-murmur-1.16.5-10.el7_9.15.x86_64.rpm938cc193a64aae61f740e346a6cc07d91159b2bd59beb7e708126467fa3f9ae0libsss_sudo-1.16.5-10.el7_9.15.x86_64.rpmdd638f04c9746d12804f8f6832b0d7ba71bbbf274bea2c9e47208bba79340e8dlibsss_nss_idmap-devel-1.16.5-10.el7_9.15.i686.rpm36c1eaaa24852833dc15e6e2d9001115d52559f8216da22719195690cbb84937libsss_simpleifp-1.16.5-10.el7_9.15.x86_64.rpm18c60954981fe89a687102c7ade27f8460765feb6a5dc041b1af83a2b4559bcesssd-common-pac-1.16.5-10.el7_9.15.x86_64.rpme7d7f28cfe133469d32a76816d268647e82f76efcc19bf23c656497e1ca0b219libsss_certmap-devel-1.16.5-10.el7_9.15.i686.rpme13ef52f86fd527281433977507ec7c903aa1509fc320351a8333674b0296ae3libsss_simpleifp-1.16.5-10.el7_9.15.i686.rpmf9c666658668dd42ba5dc5d4a6d5cd92c1fd810366eebfaa8d213fc523e85374sssd-winbind-idmap-1.16.5-10.el7_9.15.x86_64.rpm3f7f3f823469bc5e778a4a7d7c8f78fe28de7ab4f08ef9e4e18e0d2c3a4d3671libsss_nss_idmap-devel-1.16.5-10.el7_9.15.x86_64.rpm5b0b124649901239d68533cd1160d197a6664fba2b04a6e577b271a1ff520458python-libipa_hbac-1.16.5-10.el7_9.15.x86_64.rpm1268d17249eabc1d72f4f7d4e532006684674dd6e1ddb7fb61f27eb5925e1ceelibsss_idmap-devel-1.16.5-10.el7_9.15.x86_64.rpmd110b98cc9817c35bb3de61a1d32a7d730f929d01030553b2c9cfd185d8882e1sssd-ad-1.16.5-10.el7_9.15.x86_64.rpm917491496fe70b0202e6f01082eadc5e8f1a995664b299843c829cc6dcfd6f77libsss_idmap-devel-1.16.5-10.el7_9.15.i686.rpm388765451b6fe56a237844e7bf42c6b96e04ed258ee5db463defffc2a96fa39bsssd-libwbclient-devel-1.16.5-10.el7_9.15.i686.rpm348326d8bac6c34c68273d1e15767b70bbb787dc04b2928ebfc3e3f00409ef39libsss_certmap-1.16.5-10.el7_9.15.i686.rpmb69296ad05824787abe7334c0802db70c802318dbc071fed8e0e1f2103c17738sssd-libwbclient-1.16.5-10.el7_9.15.x86_64.rpm91f4a3ad5d10e03c211e30e14045c82c014392c9e3a4e8340a736662f4955792python-sss-1.16.5-10.el7_9.15.x86_64.rpm20e31c810deb0e0829a6b056f2952375a95bbd973af4acba096a481902c2a263sssd-dbus-1.16.5-10.el7_9.15.x86_64.rpmb76094d7cc0b6c9d867a24911850af375df7342d2d5027fa01aad2a1831e8932libsss_idmap-1.16.5-10.el7_9.15.i686.rpmfc62a7d175109d6eac959a24e9c66eac882b75e167c102b169f0167c5053e1bfpython-libsss_nss_idmap-1.16.5-10.el7_9.15.x86_64.rpma39774f4d0d89e596fa26fdd71180c15fc10f775827c9111f0ef263bfbda2393libsss_autofs-1.16.5-10.el7_9.15.x86_64.rpmc94c5b0f3138667df29e2276c9953e660d6fae4084fee8c13de93d44c1ce243bsssd-client-1.16.5-10.el7_9.15.i686.rpm19a7dc1be7ab7889c11f1bb537e695576a8ddaad71b6a98494dff5b95320734bsssd-common-1.16.5-10.el7_9.15.x86_64.rpmfba7a3b126e91c9453e4dab4e6d664e867f750f02852cc9ea52727d81a0d47b5libsss_simpleifp-devel-1.16.5-10.el7_9.15.i686.rpm39e740f102af4b6235a1428d0985cf18cbc14301443b4efdcbc587d897d3ee97libsss_certmap-devel-1.16.5-10.el7_9.15.x86_64.rpmd4967b404147f7103003cd1d643edeea8b827e201cae7e5df4e7320e25f6c381python-sssdconfig-1.16.5-10.el7_9.15.noarch.rpmd9917b941c40b174fe3288f491f5a5c27432162520eee3e9802d08c5906bdc22sssd-polkit-rules-1.16.5-10.el7_9.15.x86_64.rpm612d622be4d58ea8063b0f9fae21db3e244b111bb3b1cebc3d6b0de80893c6belibsss_idmap-1.16.5-10.el7_9.15.x86_64.rpm67a758c68ca0ad65538bedcefb3878c38a204eec2805bcd3766399204f22f60dsssd-kcm-1.16.5-10.el7_9.15.x86_64.rpmc1ba20a5876ef78cd463c30044c1f803c7c4a6522934f7593eb61e0d60f8dbfdsssd-proxy-1.16.5-10.el7_9.15.x86_64.rpm3e0a62b4beb3d82c57a1b105f5e3a2b331cb6e33d45e87beaf7c2c6da1e7c078sssd-1.16.5-10.el7_9.15.x86_64.rpmb7915ce2844a91d5c646615b010658b2441d16532459bea87c6c18669f83ee9fSLSA-2023:0456-1ThunderbirdThis update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.7.1-1.el7_9.x86_64.rpmf8eb0f48dc455b82381081db3cba0b2c75a0d885b8582ab5b17e418aa4d3ba27SLSA-2023:0530-1LibksbaSecurity Fix(es): * libksba: integer overflow to code executiona (CVE-2022-47629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7libksba-devel-1.3.0-7.el7_9.i686.rpmeb11ecb88f45499e516fc9e39454fc4ba8fae8176cb3dce87bf18faab092f0a0libksba-devel-1.3.0-7.el7_9.x86_64.rpm132171720846a1714489518d30207780d5c838a872d48d262b805519d967b8bdlibksba-1.3.0-7.el7_9.x86_64.rpmf4ed855d1c9f63d62bdc83eb52442a7350bd5202af24fded086e59ebee4b677dlibksba-1.3.0-7.el7_9.i686.rpm7e5903cb864a99118df2cb87a56afcb8a7cb92feb4a5c9480748323a2cb32752SLSA-2023:0600-1ThunderbirdThis update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.7.1-2.el7_9.x86_64.rpma3d1eadfa0d5aa89a22b7885e85c547dd7cf96d832158506919f52bbaa19c73aSLSA-2023:0675-1Tigervnc And Xorg-X11-ServerX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-Xorg-1.20.4-22.el7_9.x86_64.rpm8694f038496e5948c3a3783ab51176edef29d8d95296ef79e3a5eb686ae2adbetigervnc-server-1.8.0-24.el7_9.x86_64.rpm6aa9ebde340d047d4bb706b83dd28cd6e8e46bf5d0eb54d18709a4ba11d386ccxorg-x11-server-devel-1.20.4-22.el7_9.x86_64.rpmf107aadb4473d707bd74c370f8b2f70af9211609c2f2ca64bd31913946f5bf70tigervnc-1.8.0-24.el7_9.x86_64.rpmc17da119f457426264bb1dab2c7feb6d4f81f6b5dd406f66f3b178fa9cc93ae0xorg-x11-server-common-1.20.4-22.el7_9.x86_64.rpm04dfa49a820630082a4de59f0b63b9ede317888a4a402388cd2011fe72aa1154tigervnc-server-minimal-1.8.0-24.el7_9.x86_64.rpmec701a0f8060564f5fa9b234242f61975328a64589a23ec4b85ceaa9771a13ffxorg-x11-server-Xephyr-1.20.4-22.el7_9.x86_64.rpm0e34f2713da8012f8f2843474faeb2c7815a3c3fef7d8af01eeb8c4986f7c6b5xorg-x11-server-Xvfb-1.20.4-22.el7_9.x86_64.rpmb9e16048bd8c405251a93c584bc5c873bb527d29e2543447fab2403870734950xorg-x11-server-Xwayland-1.20.4-22.el7_9.x86_64.rpm40b038aea93bb116a76856958fb9e757a0873c454edce402c48fe248c320fe2atigervnc-icons-1.8.0-24.el7_9.noarch.rpm9f0328e2dbec5856c753c1d131e04d04d5a54b76d76d0125a89bc8a56747b824xorg-x11-server-Xdmx-1.20.4-22.el7_9.x86_64.rpm2c8c222a89dc9210b033711127ff969b3f2736e74b92bf24bcc4fc37c6d6fe6dxorg-x11-server-devel-1.20.4-22.el7_9.i686.rpma7529527d02d8baa8ebc8f416af1e48201c10b85225714068a80945799233b08tigervnc-server-module-1.8.0-24.el7_9.x86_64.rpmbd0288bb6da3f80c87d9dda13a62173ff0173a96693015cd8f4885bc16c2ac34tigervnc-server-applet-1.8.0-24.el7_9.noarch.rpmb17d08a619cffba382ede4c812adc1d4788651daae8cdb25c2fd90982d8cc2c0xorg-x11-server-Xnest-1.20.4-22.el7_9.x86_64.rpm8a1c4e5f7e823dfd628bcc73ee45c65382b0fc7f92bf0e76c24197ba79348334tigervnc-license-1.8.0-24.el7_9.noarch.rpm6fe8f2e3641dd29b7d3e9d68132f5e885a7801e0ee1d9123718b320655d6ac27xorg-x11-server-source-1.20.4-22.el7_9.noarch.rpmd92e9b25809b714f3f04f31f7eb8b49e26d3002dacd39d7f0e9b337f15b632e3SLSA-2023:0812-1FirefoxThis update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.8.0-2.el7_9.x86_64.rpma3877ec0d3d9b26a2d922f57130ad636c80eaad56ac034af6a842d93be7f7fbffirefox-102.8.0-2.el7_9.i686.rpm6758c75f205d4e4c74069d30d41135040e340c0941cd2aa36d065b46bb22e491SLSA-2023:0817-1ThunderbirdThis update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.8.0-2.el7_9.x86_64.rpm84f11997de0cca1fbbb42d12ae5ab748e6a2b12da62075e83ff0313820b63696SLSA-2023:0978-1GitSecurity Fix(es): * git: gitattributes parsing integer overflow (CVE-2022-23521) * git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7git-1.8.3.1-24.el7_9.x86_64.rpmb26c2f0f9afecaae81c7a39acc8f66dfaa9b6d2e49f58370d1fa43425ab328bdgit-instaweb-1.8.3.1-24.el7_9.noarch.rpm5cbf8d6cd4c5f1ca050dcd4c99fbd2d7a90861ed38de876cc168ff0019cb08b8git-daemon-1.8.3.1-24.el7_9.x86_64.rpmedca8227e635ecf93dfeeff500d4314b8271777dbda7a4c5e0df88d87c66b773gitweb-1.8.3.1-24.el7_9.noarch.rpme0e2d826925d442e35ea871ca3bc35a2e82aa2df5f09c48a80b18e9b86badf81emacs-git-1.8.3.1-24.el7_9.noarch.rpmc9a516c4f2cc89e203a84a70ce903cdb388014a187d43a178bd163f78e454942git-cvs-1.8.3.1-24.el7_9.noarch.rpmfa461440d71427a33bed73c62219fc4d2c1e37b73a3141e82a773c037d20dae5git-all-1.8.3.1-24.el7_9.noarch.rpmbd063bcbd94dcfaaf21fa3fce44019ecb9e49baefbad3f82846c5b018678159egit-gnome-keyring-1.8.3.1-24.el7_9.x86_64.rpm33829bca4c6cf3140c450f2ec4a8bfa8d6a9b7fc0d7ecbaa68ad73be9fc9d37fgit-p4-1.8.3.1-24.el7_9.noarch.rpm30fc2f9f292da5a4e7ee3ce8ca7baef2911973d72c856e81763596d3758208e8git-svn-1.8.3.1-24.el7_9.x86_64.rpm2cb056134b6bf424851bf959c25e17968f87dac0995c4faf5d09c4389f971a97git-hg-1.8.3.1-24.el7_9.noarch.rpmffd7e91f163eaedf85059bf5ac67d4ffae3414f915f891a4b1ab0fdf18c655e8git-email-1.8.3.1-24.el7_9.noarch.rpm67ef252f653719b74cb97466d1aab0f27249c1748ef5ced8337696376b5b39fdgit-gui-1.8.3.1-24.el7_9.noarch.rpm5d2c34d5b8486e3b27d65917b33fe782b5a858375fc1b0cb093ee114cbd04214emacs-git-el-1.8.3.1-24.el7_9.noarch.rpm99de28fe34035a00e4e9f90dc525e53058ea287ce4d1bbae965f044f73cd33bcgit-bzr-1.8.3.1-24.el7_9.noarch.rpmb58ab51d4051ea420f870ecb5fb3f399a77cdccbd2066e06cdf87136255e5d9bperl-Git-1.8.3.1-24.el7_9.noarch.rpm17f47c2a2714359e706cabb37c903cf05449cc6538a9698bd63635f09889d4c9gitk-1.8.3.1-24.el7_9.noarch.rpm512cf3658af83e990041688730807c342d960053723e696fdceee8c635b0d509perl-Git-SVN-1.8.3.1-24.el7_9.noarch.rpm66077fc18291ae304da279d1f97ed77a1306bcc07629cbf9bfe5fa8f24525a46SLSA-2023:1090Important: Samba Security UpdateSamba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7ctdb-4.10.16-24.el7_9.x86_64.rpmfddfbde281170a2350208c846e02cb2f735ee2da692388dfe592d3b6f2221315ctdb-tests-4.10.16-24.el7_9.x86_64.rpm0586c7e2c9783848bfc7fd8d069049645fcb9addf7f29a3405028b6f8fa6f8ceSLSA-2023:1090-1SambaSecurity Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7samba-devel-4.10.16-24.el7_9.i686.rpm500ff04ad16fa32c36af15b5e3c1b80492ddb2605c8831333fe699144e1b5585samba-common-libs-4.10.16-24.el7_9.i686.rpm3a506031708a60521c1ce26d7b25b7d33f871448efee490754aaa11f238bf6c5samba-test-libs-4.10.16-24.el7_9.i686.rpmaa14ab7a6819597c7179bf43a2612e93e65cdf60b588a47c90c5f69fc3a0a01esamba-libs-4.10.16-24.el7_9.x86_64.rpmfb4328a23ff9c6f3f1338e8ab0b640f49b135346019b3bf09ce2b9c125282814samba-client-4.10.16-24.el7_9.x86_64.rpm9817baee22eb3d09944be83b09843d8c5c0002914ba9dde8184f3ceedecfd53esamba-winbind-modules-4.10.16-24.el7_9.i686.rpmfd638a33e01ee122966a262131400c851d4b2cb82898af5ed06cbae1e88de1aasamba-winbind-4.10.16-24.el7_9.x86_64.rpmeb8c266f6f5019fc5b2c600965b45d57087e8d635aa5952361e28edb3ebaccdcsamba-dc-4.10.16-24.el7_9.x86_64.rpm2c381f7d0617036e73e5636546c62c420822537f69456921c6adab74ad4cb3f0samba-winbind-krb5-locator-4.10.16-24.el7_9.x86_64.rpm3ccc9f9326d8b4602a3ef3e389f23d593140ad6dda7893ead58d258aa2ed35absamba-dc-libs-4.10.16-24.el7_9.x86_64.rpm162e40109413dc22aa30db63c52aca3cd022e563f8813efe5afbb1ec654c1bbelibwbclient-4.10.16-24.el7_9.x86_64.rpm645fc6268dcb2bed6534f8e588b76b142e19a03a8e99db58fab3962305542881samba-client-libs-4.10.16-24.el7_9.x86_64.rpm7570e96a1288f733237327dc3da948701b33ec973a909820d25f28864a63127elibwbclient-devel-4.10.16-24.el7_9.i686.rpm4006301818a57799b4760db07835dfa52580c8ed26037adff4a8f7fa12750105samba-4.10.16-24.el7_9.x86_64.rpm2259a55556e9766fcc56db5372bf17847a469ee86031509c485a20e6926d9c78samba-python-4.10.16-24.el7_9.x86_64.rpm70674e86b6f31bad41417cefb7aaa003a98dfc3700094b1767d5c6336c80c664samba-common-4.10.16-24.el7_9.noarch.rpm599601a6ec8dbd3ea3f75be569b375fb9854c9c06123c08d9e4f36869e83f17asamba-winbind-clients-4.10.16-24.el7_9.x86_64.rpm8c48cc5d15e8aa111c148bd4654ee35ef9d477e89b3f8b70659c58500d1a4a89samba-test-libs-4.10.16-24.el7_9.x86_64.rpmfad10520ae3cc31e6aa868f6385b027985464857673faaf5490291b40bde0843samba-python-4.10.16-24.el7_9.i686.rpmfc81d3283b08cf0a13ee1a3dc32c648956df0d797e19dc438229706f80874e9dsamba-libs-4.10.16-24.el7_9.i686.rpmece27d16977a89a859fb38d509053ef6487ccd79f432777da058a9ed83f2115csamba-client-libs-4.10.16-24.el7_9.i686.rpme284f006353619c61dc1b3995028031745e0c51ab673aac7df9d47af3ffeab58libsmbclient-4.10.16-24.el7_9.i686.rpm36482c21714fff9ecea78bfd9b60f4818a077034f7ae65d7975a0d1305988565libsmbclient-devel-4.10.16-24.el7_9.i686.rpm0ed2103a8eb2ee8ae24bc01c4a16685ac33614bb0ae0db7f22e6ed515fd6d335libsmbclient-4.10.16-24.el7_9.x86_64.rpm38054eae1a74d2b95eeb8896b5985b5b6d7a189724c60d2a2d29b5fe2fd4a350samba-vfs-glusterfs-4.10.16-24.el7_9.x86_64.rpm2fbe9e1eeab8b46c0a07951c9de7af55591df294d580fbc4f35b622750ab5c54samba-pidl-4.10.16-24.el7_9.noarch.rpm60e72d724b225ce033d0c9ab75ece967b47edceb53f35338a94d8e5bf3dd44e2samba-devel-4.10.16-24.el7_9.x86_64.rpm481f7fdb19fa20bbbdaace15be52182a64ea6017bad6c8a3e7073c0477d659bbsamba-python-test-4.10.16-24.el7_9.x86_64.rpmee6083c33c8dea339c7dfdbcea143aa161f3efbab2c5b7605a4be8ec853f2667samba-winbind-modules-4.10.16-24.el7_9.x86_64.rpm794419b4cdfaddb314cfe6da06baa77bf8b2de66a2405373276d8b4a9283b1acsamba-test-4.10.16-24.el7_9.x86_64.rpma95cfb5c67cb83fa714c978bc63bb89c4558c29c5d33ab551e8a9f447a24516flibwbclient-4.10.16-24.el7_9.i686.rpmb4b4c731d0e5e3c42bb147a1f50523d98b0fba7418f05feeb1e60803e4cbb852samba-common-libs-4.10.16-24.el7_9.x86_64.rpm7da197a0d57e411be6d6b01650265d280532834d8a384a544f3c5660b7bbe626libwbclient-devel-4.10.16-24.el7_9.x86_64.rpmf5cfea82a73d3008884adeeb93d6b6e82a67a0c69f6ccedf3a9d72e2152a2b0esamba-krb5-printing-4.10.16-24.el7_9.x86_64.rpm4597f10df0c826ef51647d1bc615be93c0616512ecaf577ecc51aa7c4cd4b7a8libsmbclient-devel-4.10.16-24.el7_9.x86_64.rpm0b6dd455d26f75fe2b0015e954e9a9f7d40adc1511e366d64bd70694d1dc4232samba-common-tools-4.10.16-24.el7_9.x86_64.rpm5e105eee330f72edd154260e9b5abaeaff92e26a8c7bbf599a0d5943ebc1788cSLSA-2023:1091-1KernelSecurity Fix(es): * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * kernel: use-after-free related to leaf anon_vma double reuse (CVE-2022-42703) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Regression - SAS3416 card works on SL 7.7 and below, does not work on SL 7.8 or 7.9 * use-after-free in sctp_do_8_2_transport_strike * SL7.9 - [Regression] Kernel test failed during CPU polarization test - lscpu, chcpu - LPAR * SL 7, block: Crash in blk_mq_rq_timed_out() when dereferencing NULL request->q pointer * qla2xxx: Qlogic double completion races during error handling are still not fixed and this will also be a SL8+ exposure * kernel 3.10.0-1160.80.1.el7.x86_64 on Xeon E55xx crashes upon KVM startup * Guest's time jumped forward by 12 minutes _after_ live-migration completes (in 30 seconds) * SL7: target crashes if a malicious initiator sends a logout immediately after a login command * SL7.9 - LTP testcase creat09 fails related to 'CVE-2018-13405' and 'CVE-2021-4037`importantScientific LinuxScientific Linux 7perf-3.10.0-1160.88.1.el7.x86_64.rpm2994a6e723cfacabd813dac1ea31a94b3d7335b015d5d9f5bb91dc450ca04154kernel-headers-3.10.0-1160.88.1.el7.x86_64.rpmf0fabded1573afeafbdea88dabaa33d9a5b25eb6a2e8da0b0741d98b82ee39cdbpftool-3.10.0-1160.88.1.el7.x86_64.rpmbd2b9606716ea103edfeade341a514508e78e2ebb20de46917c58714075b19a8kernel-tools-libs-3.10.0-1160.88.1.el7.x86_64.rpm18196694a675b25665410c3c9d44a2e98d1ca5bd946987e609612e8cfbdaa3e7python-perf-3.10.0-1160.88.1.el7.x86_64.rpmfa3a944b73812f9848fd6a8a3f5db3bad17e75c3964713e8358f699734a3cd58kernel-devel-3.10.0-1160.88.1.el7.x86_64.rpm847e8c99f83ffa5657b05ef11a8200d47838d7625d4daaae8176b24efc86c852kernel-abi-whitelists-3.10.0-1160.88.1.el7.noarch.rpm3e5a1430d717b710a581e948c0be5a661f549ba1dffb627801476755b4df5ca8kernel-3.10.0-1160.88.1.el7.x86_64.rpm5c64944b3c8e0a4b1b489a49fae4eca1e0e11230199314410617969ceea45b7ckernel-debug-3.10.0-1160.88.1.el7.x86_64.rpm23b0e945e1397bfc990f1f366e451335a0934428a9149bc85d47fae479dc9bf5kernel-tools-libs-devel-3.10.0-1160.88.1.el7.x86_64.rpm7675927d96955b743696d9e8314b6f78d61132e2e7b916df89a67d4f497f88dfkernel-debug-devel-3.10.0-1160.88.1.el7.x86_64.rpm32cd28ab0db8bea7fab5947760340fce5ac55dcf5ed47134de5501479e5e82adkernel-tools-3.10.0-1160.88.1.el7.x86_64.rpm86e80c491ce804d47f821e7ea6aa2ebc03421f81a13821e0fd94708e34a345b3kernel-doc-3.10.0-1160.88.1.el7.noarch.rpmba8643984b51511422db80b0ce8a7c820c0d691c260480f7e6e245f4de156a53SLSA-2023:1093-1PesignSecurity Fix(es): * pesign: Local privilege escalation on pesign systemd service (CVE-2022-3560) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7pesign-0.109-11.el7_9.x86_64.rpm818e3c6565f79af164f8deb035916daf2318eda8901ce99140df3d0f6cbc9fd3SLSA-2023:1095-1ZlibSecurity Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7zlib-1.2.7-21.el7_9.x86_64.rpmb906a4671893fe9fcf39156ba4033ba9bcd43627435e8b82217568f5d3b997d5minizip-devel-1.2.7-21.el7_9.i686.rpm28334f56db86508ed18a210c742977186328cae7b5472f6f12d4808b65b8192cminizip-devel-1.2.7-21.el7_9.x86_64.rpm6ab923ac4a54450364d194e1cedac2302f3c78a3f7d7c7560eb26a03b2565c59zlib-devel-1.2.7-21.el7_9.x86_64.rpmbc81ee36a9b0f222e5fca10b578453b8e6981ed0868012df60ab15105629244dzlib-static-1.2.7-21.el7_9.i686.rpm520f6ed819c571b365246297f7f7beef2d9d9db1f424556aad8844cefc98eb8ezlib-static-1.2.7-21.el7_9.x86_64.rpm328f1fe6e08399d03326a68f542ad89ddcb416dfabf1757c67ee372a4c6a8d71minizip-1.2.7-21.el7_9.i686.rpm7620d3f8bd2161803e83754acde308b4b76f47fd13b7a35f4d14973e89b363c1zlib-1.2.7-21.el7_9.i686.rpm4ebd12869bda437316581c42b39b035604ff470992e069d213283e17b7f3acffzlib-devel-1.2.7-21.el7_9.i686.rpm949c7905f39fc96d1c159336a55f1c0e9e22efe2ed5584cb759e7206750f80b3minizip-1.2.7-21.el7_9.x86_64.rpmafc722f2c605a07221685863675ef9f6607275561c1a95ecd42aeea6d157c357SLSA-2023:1332-1NssSecurity Fix(es): * nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7nss-devel-3.79.0-5.el7_9.x86_64.rpm34ce3134bee9eb51fe1920ee90371c3f8580d7acd476b5fdea6cf12bd7600ec0nss-tools-3.79.0-5.el7_9.x86_64.rpm0d669b9c5f62827ce1be6a066d8f5ab4881ecb66c4e37940865e839b6f386029nss-devel-3.79.0-5.el7_9.i686.rpma19367f29460d9ca333423ed010bc7bd5cc91c05ce4ffaa8affc9e190e2a9b86nss-3.79.0-5.el7_9.i686.rpmee56b00c8b952b66513a703df2001a2cb80a22f8a70b9e09b7005c756220d4c2nss-3.79.0-5.el7_9.x86_64.rpmf2520c6f279918a8a25d0af46886654a0fee295452dc01d2b314e0fd78b6fb4fnss-sysinit-3.79.0-5.el7_9.x86_64.rpmd15a95b44c4bf2c0539039b14df3f1144bb6b0ed81735081b3ee6e623d4322eanss-pkcs11-devel-3.79.0-5.el7_9.i686.rpm1c017b19a750ad2def22e07bd3316737c87d2e82808a8b929203e91ed8583767nss-pkcs11-devel-3.79.0-5.el7_9.x86_64.rpmddfe69109a54ff7b19f4751269ccaeb77bd7defa8b4aa0f975056110c82dbafeSLSA-2023:1333-1FirefoxThis update upgrades Firefox to version 102.9.0 ESR. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.9.0-3.el7_9.x86_64.rpma427a7a88bbd42133b1aaaf4008c3fcc07dbad9616aed631c0f49726b156fce8firefox-102.9.0-3.el7_9.i686.rpm59d53797253f44aaf180d6cbb4edbcc6eaa79d72c43b37363ecdce3cbdfe6829SLSA-2023:1335-1OpensslSecurity Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7openssl-1.0.2k-26.el7_9.x86_64.rpm2e31d503681d6e51ffe1b515f01f0dc727f815ff16c44c30e151d1369dea38dfopenssl-static-1.0.2k-26.el7_9.x86_64.rpmc77c9e6ac83fe42c8effcc805dec484f68e057d40e2dc5357da3239d6c87596fopenssl-devel-1.0.2k-26.el7_9.i686.rpm29934cbf30d318a3c22bf8df0ee8321131d2dafaf96e68ffce5981c2b7a00ddeopenssl-perl-1.0.2k-26.el7_9.x86_64.rpm5fc16fc71da41b06defadfb576ac263d32ec4d632810feaec2c8797ad169d9baopenssl-devel-1.0.2k-26.el7_9.x86_64.rpm496511b8e774088eb9316cf3f6844619ba665ec80b90e46bd86cf08d75182828openssl-static-1.0.2k-26.el7_9.i686.rpm79b9820ed1c1acdf7cb580cffbfc22a4da3a575ac4a63a00341a0013206b86e7openssl-libs-1.0.2k-26.el7_9.x86_64.rpm2bd1f18958c502d555455c93beae0ecbfb201ca20e3a33f94fddf624f95efbc8openssl-libs-1.0.2k-26.el7_9.i686.rpm05c3ac671b481f99d8127e80e8ef27d40f3d417f7116726e6ad2bf036cd51ee3SLSA-2023:1401-1ThunderbirdThis update upgrades Thunderbird to version 102.9.0. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.9.0-1.el7_9.x86_64.rpmaaef7ae5f3ff0fe550f70ff6757c567713337f61bb126f5909ff9ad5de04e06eSLSA-2023:1593Important: Httpd Security UpdateThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7httpd-manual-2.4.6-98.sl7_9.7.noarch.rpm10e663ffe1d3b93bec8607a8ed2cef51586ae7574113e23ea5b168df1ba5fb7fSLSA-2023:1593-1HttpdSecurity Fix(es): * httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7httpd-tools-2.4.6-98.sl7_9.7.x86_64.rpmb6cf4199858267e8f9762451385d46f87e8ceb75bac0b2de7fe032732fb06203httpd-2.4.6-98.sl7_9.7.x86_64.rpm3d4bc97a92e7c0bb5425a938a84c21101f25b7b53e825193af04e1fd8892d0dfmod_session-2.4.6-98.sl7_9.7.x86_64.rpm1ce891dabde1836b2b362c14de6e3aafdcd7c8d5f6de73e64e7f878ccd7d96a2mod_ssl-2.4.6-98.sl7_9.7.x86_64.rpm49f6fa7cfc5629f66b01e3a18ec3e558dc6722839a3766fc7d2cbe4fc1195b63mod_ldap-2.4.6-98.sl7_9.7.x86_64.rpm6e05444ce8d8bf1e3a91639b23bf7d128e584646f26949bb215f1446e1837820mod_proxy_html-2.4.6-98.sl7_9.7.x86_64.rpm1a650a8e1ea9a7d69c3d00dbeb59bb17e6a5c94df65dcb21cf3714c2859f781bhttpd-devel-2.4.6-98.sl7_9.7.x86_64.rpmecc06f45c96a7758b84341f2d60318bf7b28ff3b318304a73b4dbeccad3249f2SLSA-2023:1594-1Tigervnc And Xorg-X11-ServerX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-Xdmx-1.20.4-23.el7_9.x86_64.rpm97bf7b3f2bb37ae6d3e7a4efa36851013f8dc9b4cec489c2764768a14f8a0790xorg-x11-server-devel-1.20.4-23.el7_9.x86_64.rpm5c4766340029b5da5b87e44f14c9ff40b4d7e939beb439ae4fd922ead3a5a401xorg-x11-server-Xorg-1.20.4-23.el7_9.x86_64.rpm834e599ec8cf47884775633fa718683d390a944447405f8ff7b99ea05aec1f12xorg-x11-server-common-1.20.4-23.el7_9.x86_64.rpm62f517a3a48adb938f85b62f362149acdd6be710767e7770a46c37215f66a172tigervnc-1.8.0-25.el7_9.x86_64.rpm04671427d8346c9647f78cbdd0268fa1e5f699536f69d5cee4c769baee9b150btigervnc-server-1.8.0-25.el7_9.x86_64.rpm9a0971a52bce35c9630a41c85f52bffcf44546cfbd79cacb99b735206b946f5ctigervnc-license-1.8.0-25.el7_9.noarch.rpm983db28d51982dbfde3db1e7b05dc7702c97f51977ec27ec7b9d3b55d7761d5btigervnc-server-applet-1.8.0-25.el7_9.noarch.rpmebd8ed160da00171c32afe1429bd9d8ceaf34a91af5369bad46fc75d121bb3b2xorg-x11-server-Xvfb-1.20.4-23.el7_9.x86_64.rpm5a14ef83b13c887c9537e214da940725b07ca8b45a50fd17ff63cf4580b45d00xorg-x11-server-source-1.20.4-23.el7_9.noarch.rpm35176bd63454bd00d5b1f0cf5abca716a2d9027dff58a39a1dab81b73a93b091xorg-x11-server-devel-1.20.4-23.el7_9.i686.rpm14244e03dbef775e3f5c6518c5ed08869205d39aa9411935fc4c007f9fc9120etigervnc-icons-1.8.0-25.el7_9.noarch.rpmf088e39a19cae65c421134424e007808080e02f5479f8c8ab224e3fab6b53aaexorg-x11-server-Xnest-1.20.4-23.el7_9.x86_64.rpm17d6256f633f77185934d41b63fef31042c96aa996dad9c1e0d65fdf2a861969tigervnc-server-module-1.8.0-25.el7_9.x86_64.rpm13a0791a7fe89474cd82503b3d573f393f9440dde33dc3e651684b8b25aab271tigervnc-server-minimal-1.8.0-25.el7_9.x86_64.rpm91cf15c11dd54d4faa4450cf63008a4747524ec1cedf6c89ecb9e41b8bcc717fxorg-x11-server-Xephyr-1.20.4-23.el7_9.x86_64.rpm3467bf8a152e43b9bef7a27bd16715c5e3fa540e59fb5a33fb4b6aa4bc6e71b7xorg-x11-server-Xwayland-1.20.4-23.el7_9.x86_64.rpme46d1a09f68e8b9c5c3fc265d0444d94ca0247c6f795ade8ffa4e2f3063d3d93SLSA-2023:1791-1FirefoxThis update upgrades Firefox to version 102.10.0 ESR. Security Fix(es): * MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp * Mozilla: Fullscreen notification obscured (CVE-2023-29533) * Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) * Mozilla: Invalid free from JavaScript code (CVE-2023-29536) * Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) * Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) * Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) * Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) * Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.10.0-1.el7_9.i686.rpm4b88e59f89bd15b2d7dffa6ae1fd994a9adc1906332c85530f2d93a4739498d6firefox-102.10.0-1.el7_9.x86_64.rpm1971c8dd433daf282cc606e06d8148c6771731090d0fd0c3345fcae01055ac8bSLSA-2023:1806-1ThunderbirdThis update upgrades Thunderbird to version 102.10.0. Security Fix(es): * Thunderbird: Revocation status of S/Mime recipient certificates was not checked (CVE-2023-0547) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of- service attack (CVE-2023-28427) * Mozilla: Fullscreen notification obscured (CVE-2023-29533) * Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) * Mozilla: Invalid free from JavaScript code (CVE-2023-29536) * Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) * Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) * Thunderbird: Hang when processing certain OpenPGP messages (CVE-2023-29479) * Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) * Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) * Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) * MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.10.0-2.el7_9.x86_64.rpm1c30a55a7773ed392b56df4f614bf0542653fd91f7a7b5b2a648d2912dd559a9SLSA-2023:1875Important: Java-11-Openjdk Security UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-11-openjdk-demo-11.0.19.0.7-1.el7_9.x86_64.rpmca044ee07327b954b4aff68d9abf78d153a77c58f605be2b722e8cabb54ebee0java-11-openjdk-jmods-debug-11.0.19.0.7-1.el7_9.i686.rpmdf4208141f7ba687db292f880890b548ad5137f1723d26c58d134421dfd3f484java-11-openjdk-src-debug-11.0.19.0.7-1.el7_9.i686.rpm893b77a830554f328e04b4b4175516ae2cecfed146daac80e6d21c01f28fc631java-11-openjdk-demo-11.0.19.0.7-1.el7_9.i686.rpm5ce3e0b5c15c5a458d1ab4b0aed61ebe2ca8f6f5d90183675c3534d3acd7c0a4java-11-openjdk-src-11.0.19.0.7-1.el7_9.i686.rpm0521427a43634e0bcb5235a172a09ce2938c3ff33f4d03fe660e33078b9249a2java-11-openjdk-headless-11.0.19.0.7-1.el7_9.i686.rpm1bcd0ac8c3c793004a05e1a20a23b19127a964e7ee34ec57570abb2cfd25897ajava-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9.i686.rpm3eff7cecbe2e857bec3fdaf3911f021eb8731c6023da45671d315bad6510b25bjava-11-openjdk-jmods-11.0.19.0.7-1.el7_9.i686.rpm14339f857ef1c2eeb77945e298c3fa4762a10fb16fef2bbe9d8c39ee6304e2e9java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9.i686.rpm8d3f8771540dc157c943f36685da8ee39f5f8a4fbfb6b9544164a255feab788djava-11-openjdk-devel-debug-11.0.19.0.7-1.el7_9.i686.rpm368f46f7268fafdb3c579111305d4f7ec7ec3c1ce938aa01312c9ffa2b8ea772java-11-openjdk-demo-debug-11.0.19.0.7-1.el7_9.i686.rpm966c80b7f3c3e97c3be19ab2e037202e5a530518918897217e55a0d2eda58b5bjava-11-openjdk-debug-11.0.19.0.7-1.el7_9.i686.rpm5d3ad55933a600443139b9639e74211c56e605e5dc5ddcd3f34a992c254f57fejava-11-openjdk-devel-11.0.19.0.7-1.el7_9.i686.rpmc945c271b8a7fa135263b37a727bcb633fbad9901a9b253d7feb2a380c0b8bb0java-11-openjdk-11.0.19.0.7-1.el7_9.i686.rpmce9ed1c9d3076c33543fda913bdea950b7892a007bca45953cc54b34dbd4d7c7java-11-openjdk-headless-debug-11.0.19.0.7-1.el7_9.i686.rpmce7b0839a2ee5e74efd3b5ec54c0456afdd51a5cc82947087b4c4c7b735443b7java-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7_9.i686.rpm697d64355c9693a6bb54d851d774c842bf46b5da410b241aa89fab6e9b27d86ejava-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7_9.i686.rpme27543f31898a2b72dc1687122ea3677eceabe93f618d77567dbec358d34cef5SLSA-2023:1899-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7_9.x86_64.rpme7d7dcca1e81bf498dd349ae60f174446b068ce267e7ad6f503ef9b4954c2fa3java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9.x86_64.rpm3da89a9ffafce0f76610f0d5ff3b3ddaaaa7b0602106f6be67a1957f829bd8c6java-11-openjdk-src-11.0.19.0.7-1.el7_9.x86_64.rpm783b5a5ace4eabbc26c765569f31ff4863e83c81b48696a728bf9e4ee4534556java-11-openjdk-11.0.19.0.7-1.el7_9.x86_64.rpmd13185ac7d38f202463ddf655a25d02cef85b71d59acbe56ed0f7d40dc70d2c7java-11-openjdk-jmods-debug-11.0.19.0.7-1.el7_9.x86_64.rpm60ffc85fbd4b6440b246fa7f6c7ca08db70bc89dd26c97ce6f2a238b2304944djava-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7_9.x86_64.rpm79d88f962c73afceafa92655367a00510eb84da07b69f2e773d60208e62034d5java-11-openjdk-static-libs-debug-11.0.19.0.7-1.el7_9.x86_64.rpmddeb619b8bb2023b0ebe9bcf192a72ac70be99ce02964f925d14aae0adeda89djava-11-openjdk-devel-11.0.19.0.7-1.el7_9.x86_64.rpmb200923f06dfd3a841c63f1be22c6ee30274787ab0b6ef93865a0531a2796d47java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9.x86_64.rpm1460d071feb21ff6bc669df2c59314a558d6ae377a0129be52b7f722aa21b591java-11-openjdk-debug-11.0.19.0.7-1.el7_9.x86_64.rpmf4db844a3283adb1a688769e5489614dcf2a25663a77f0943dadc08676d2a5dcjava-11-openjdk-headless-debug-11.0.19.0.7-1.el7_9.x86_64.rpm2f9282054eaaf1e0966ca3c79fb01604b52b6a736cc18100b48f4f207ac026a1java-11-openjdk-src-debug-11.0.19.0.7-1.el7_9.x86_64.rpm2c449d2a8bc39812577a9fd2179d4d190a242b7544548665792ab1957319326cjava-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9.x86_64.rpmff4bac6396cc6032ef5235e742d2901140529240aaca67794b38f123b3e55584java-11-openjdk-demo-debug-11.0.19.0.7-1.el7_9.x86_64.rpm42589b275de9ea6b01352701fa670321f4ff8ab8097a0cf0c939309ef833d45bjava-11-openjdk-headless-11.0.19.0.7-1.el7_9.x86_64.rpmb98fefbf36becafb610464da95ed028209814f32571e7edbe9747f7538bd2e91java-11-openjdk-devel-debug-11.0.19.0.7-1.el7_9.x86_64.rpm47443f3d369fa4eb622bf76975a3c62ad614321efbabaf6319bebf02386aa668java-11-openjdk-jmods-11.0.19.0.7-1.el7_9.x86_64.rpm285b1cd3daa192966c20725f318f343e0e93f85e370570a5be2f553ac021b397SLSA-2023:1904Important: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Native code within the OpenJDK code base attempted to call close() on a file descriptor repeatedly if it returned the error code, EINTR. However, the close() native call is not restartable and this caused the virtual machine to crash. The close() call is now only made once. (RHBZ#2159458) importantScientific Linux 7java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.372.b07-1.el7_9.noarch.rpm646768d83d6251c8eedf888f3915c573c053176902179b5f5a69cc8d37b1ebfajava-1.8.0-openjdk-accessibility-debug-1.8.0.372.b07-1.el7_9.i686.rpm806a3a0b17335ea6d9d1b8c53042e8bae1916f06e1ef5400e97827ef34bfb15fjava-1.8.0-openjdk-devel-debug-1.8.0.372.b07-1.el7_9.i686.rpm1bd2264d72db55590781bac0667f09114c7868d31a9353148fb4740b21934245java-1.8.0-openjdk-src-debug-1.8.0.372.b07-1.el7_9.i686.rpmd3cf33cd94a93d63544a4fbf673759b44f22933337b3f3b18ee5b8b81aa33606java-1.8.0-openjdk-debug-1.8.0.372.b07-1.el7_9.i686.rpmb1ff189ca269ee49847a9265cf0988dc998b33e92927fcf811f0c61afe6e8ba1java-1.8.0-openjdk-headless-debug-1.8.0.372.b07-1.el7_9.i686.rpm3ca61ef2ecfbce5403113d58ef935a7c8b9b2b95a247ecda8d58dbcd347397e3java-1.8.0-openjdk-demo-debug-1.8.0.372.b07-1.el7_9.i686.rpm4a97194520016f53ff2f66ec138b36bf53ce65cad09bbe01d96bd386e7293861java-1.8.0-openjdk-javadoc-debug-1.8.0.372.b07-1.el7_9.noarch.rpmf2aabab9fbc0ef81ca5da7a6ea4e2caa6473df13dd9121e0c021bbfe916fa16bSLSA-2023:1904-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Native code within the OpenJDK code base attempted to call close() on a file descriptor repeatedly if it returned the error code, EINTR. However, the close() native call is not restartable and this caused the virtual machine to crash. The close() call is now only made once. (RHBZ#2159458)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.x86_64.rpm3970da71dbb7d4387ffda5541026805c6155773aa068f9aa2c50f7c1635f40efjava-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9.i686.rpmb8f5a08a2517c86193fdff4312d88df661c2d1366d5694d5e8d8dd1f4908cfb4java-1.8.0-openjdk-demo-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm1b9c9d2c00fa1860c1a335735c066903dbb2fcb5d535fc757759f4abb3128b24java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9.i686.rpmb81940212cfd79f445033cabe563daeb3596757fd22446f6e61df8541562a0cdjava-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9.noarch.rpm5c509a7695f34dc1ca8aa721bd41db8f1768b9cbb5639571b0554c15244c6361java-1.8.0-openjdk-devel-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm21617911170f00001069a2338b7c3b9a5b6dd725074040579da1eb78a80e96a6java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.i686.rpmdf2eec75f6a7373e61d2a3b5a1f2b39ce61d77160466ad77bd1e1fcfc27888aejava-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9.i686.rpm7c1d3c628dc2aa8ba5868c8503584323e6a85cb243ceab78b237eb8a55110a6ejava-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9.x86_64.rpm44c0732528921c3523825792eb390055db12f5f0dfcfc951e29200853e8a2888java-1.8.0-openjdk-headless-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm9fbac8c8d22e94f89554d198252d5e8603d7627e7ef794466d86b2569cd03e5fjava-1.8.0-openjdk-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm2805bc614336ff529007801b092c3b638899290d57d3ede83686b5af7ecc797djava-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9.i686.rpm4cff91774c6f91e91384e2faf2141154e8f52123e68c7cc5bcd5d996df383a6djava-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9.x86_64.rpm0e7b61f122111dd61463033d0391ff4ba07ca13ba4517ceffec740aca8f79454java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9.i686.rpmbc2adc4d0f284b275ed81058992d4c4355c126850d61a8ab0a9a66ac4ce08949java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9.x86_64.rpm74da510bb8b01ead3f0dd393642a3632d4de354042276f8759912951838b5540java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9.x86_64.rpm3b0f1a5bb573bbb35d00485b3fd963351cf346d7c39fe4817a8d63c9492fe91cjava-1.8.0-openjdk-src-debug-1.8.0.372.b07-1.el7_9.x86_64.rpmc3ab8dfc60523f0a92429fd8d33a70da029b9de871be58b8a819a10facad0c2ejava-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9.noarch.rpma2facdb5600ce337d1ade1b1f902d8dd669cdff38f4cfda163c61239ec6b905bjava-1.8.0-openjdk-accessibility-debug-1.8.0.372.b07-1.el7_9.x86_64.rpmd5bfcfe020159faf6beb324035ef036ea4871292bd296df6e5472bb392d31528java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9.x86_64.rpm157a01cf2f7272493df845a357a7c4c1386b1656203880886448576c23ef6775SLSA-2023:1987-1KernelSecurity Fix(es): * kernel: memory corruption in usbmon driver (CVE-2022-43750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * NFSv4.1 : state manager loop TEST_STATEID/OPENmoderateScientific LinuxScientific Linux 7kernel-debug-devel-3.10.0-1160.90.1.el7.x86_64.rpmde36d46b2412c28856e2a4670ceab1138e88f088b02f688b09d6a4f47dcd1f2ckernel-3.10.0-1160.90.1.el7.x86_64.rpm23abdf98822a301faf51002e5cd3df3b237663599b54512bf5b3a704d2133f7ekernel-tools-libs-devel-3.10.0-1160.90.1.el7.x86_64.rpm5209696d1b9d02fda70665d0c33b8f42a0c2867c8c091ca0fa7ac187092dc610kernel-tools-libs-3.10.0-1160.90.1.el7.x86_64.rpmf912c4a8afbb5370c90d0f75f8ec48eadebda3e00a7c8cb3c812a4004121ec00perf-3.10.0-1160.90.1.el7.x86_64.rpm1f03dbba96d8c0aacd2c650617f689be28fc8fb500504203c7a6afc7e72f337dkernel-doc-3.10.0-1160.90.1.el7.noarch.rpm6c4fd3efe53de4ae2e3efc49baecdca84f4f5bccfa0d7cb2c5e05ef082b42e36bpftool-3.10.0-1160.90.1.el7.x86_64.rpmf59bfe8f6576b3594181ee0b78c833cebdb4c7ec6f5ea3950a4d863261708de4kernel-tools-3.10.0-1160.90.1.el7.x86_64.rpm1b51f9afb4bbf819af7e9945ea1bc83859f238da61968c3595e15b9438ef7fd7kernel-devel-3.10.0-1160.90.1.el7.x86_64.rpmdc586da04a325769bd63167a147befbe92ef90bf73a3b6c62483a33f3eabe18bkernel-debug-3.10.0-1160.90.1.el7.x86_64.rpme391d30656de06da5d4f1f021e84b75e97907824f27654997d7e1b6e6d56006dkernel-abi-whitelists-3.10.0-1160.90.1.el7.noarch.rpmc7bf8b4514eb48baae5bf8d71f0f5769459e0e0f2a6ea82b228dbd14afbaae93kernel-headers-3.10.0-1160.90.1.el7.x86_64.rpm4922ad2e5a87275be7d464a3b2983caf86c777941081f96271a65d66c068018bpython-perf-3.10.0-1160.90.1.el7.x86_64.rpm287afd725862c75b3bc9b5a2a6bd6f032963e86c856224219a7a7ab71d3b7987SLSA-2023:2077-1LibwebpSecurity Fix(es): * Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7libwebp-tools-0.3.0-11.el7.x86_64.rpm69ad43f31cdd66bae7427ae8e7675a2473f8ec82a42d9ccc18f3fb8b147f23bclibwebp-devel-0.3.0-11.el7.x86_64.rpmd0f7746496279510d8d9349af1eedf768d6a9f6728b052b90c745128df1dc164libwebp-devel-0.3.0-11.el7.i686.rpmacc9073bac4c34b94140c41c00723439d7f8bdb27affd320ba2f6c0f6110a03alibwebp-0.3.0-11.el7.i686.rpmfde748bfb7fb2f89d217f1ce683817d6111d46d5961c517d98af764ae8598aealibwebp-0.3.0-11.el7.x86_64.rpm28f595642a9bf838e0c24a74f183e3fe24bb477ecb200018354951c31784f6b2libwebp-java-0.3.0-11.el7.x86_64.rpm15ac95abcbc2b845c4bef4bba6549f898899e7f7c9df1c5eda18011ea7d24406SLSA-2023:3137-1FirefoxThis update upgrades Firefox to version 102.11.0 ESR. Security Fix(es): * Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205) * Mozilla: Crash in RLBox Expat driver (CVE-2023-32206) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207) * Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215) * Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211) * Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212) * Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.11.0-2.el7_9.x86_64.rpme2c2a1d54b202b045157a98bc48bef2d9e30b1946e632dd97f9d3f1eb32e031dfirefox-102.11.0-2.el7_9.i686.rpm217731f4536be9805e2c725616e4be6b623c1506a35bb55b2086030fcbc2b4e2SLSA-2023:3145-1Apr-UtilSecurity Fix(es): * apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7apr-util-mysql-1.5.2-6.el7_9.1.x86_64.rpmecbec100c816c813f091b250f8d4472ca80d76347e483adc7f48d49aa224e480apr-util-nss-1.5.2-6.el7_9.1.x86_64.rpm7df19e8165bbd56b4351b225ece0d4a43893a10dd5bcbf4acb5db7dba6d4f76bapr-util-devel-1.5.2-6.el7_9.1.i686.rpm77cee88e27df38a0c49fbe92f4b392e924026cf18b9fef8cbe7accdaf2d6de64apr-util-odbc-1.5.2-6.el7_9.1.x86_64.rpm6ff109d36706fc3357c18c1b1d96e6b19233ea875101a8a3a7553c35b322f02aapr-util-1.5.2-6.el7_9.1.i686.rpma10bfc1aff922fa7c434500ada8fe75f96726a33e8a55c4e6e71b02885860dccapr-util-ldap-1.5.2-6.el7_9.1.x86_64.rpme25308894da281c3d546aca086e3a57f0428e8d01bdf83792fe0036da195439bapr-util-1.5.2-6.el7_9.1.x86_64.rpmb9dcf09c4b5bb5cb5c8db172f981b3c8043fd17aac07c4e1aed8af74f7284dbfapr-util-openssl-1.5.2-6.el7_9.1.x86_64.rpm8a5ece8be05a373617dd4137d523928c8d3a789a142e17b132669e0a80629fb0apr-util-devel-1.5.2-6.el7_9.1.x86_64.rpm29b315ff9cdfd835b84e0a733d12f6e6bcda0ee7f46ff9aaf9530bea4db0e538apr-util-sqlite-1.5.2-6.el7_9.1.x86_64.rpm9934b4db3804226ad60d97ef34095433b3b413806f877b2eff7fcdee6c4b4e49apr-util-pgsql-1.5.2-6.el7_9.1.x86_64.rpmccbb8d25374e3a3b0ac4d6a4f53d75abb82e10b611965c16a761907a95e3297bSLSA-2023:3151-1ThunderbirdThis update upgrades Thunderbird to version 102.11.0. Security Fix(es): * Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205) * Mozilla: Crash in RLBox Expat driver (CVE-2023-32206) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207) * Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215) * Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211) * Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212) * Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.11.0-1.el7_9.x86_64.rpm83950be333d1640567c94fc1a971c081442598d46e203d365aee10ce5b49e3f8SLSA-2023:3263-1GitSecurity Fix(es): * git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652) * git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7perl-Git-1.8.3.1-25.el7_9.noarch.rpmc7b6358ffc05927f5d9a35c27857311630ebd75e9ef07749f33777b29b3d3d52gitk-1.8.3.1-25.el7_9.noarch.rpme756ea7f5b1836048bf353e2852378e1d28076550c1e611dbec1753e0c391526git-email-1.8.3.1-25.el7_9.noarch.rpm97899af62ee4b49b14b3423aae26390a143e6c3bce6ae55155d2faa133fc486egit-gui-1.8.3.1-25.el7_9.noarch.rpm294d6e517fc935fa5f592e1e91673aa0016f9d1d8a319ebd4c649f971eeaec3bgit-cvs-1.8.3.1-25.el7_9.noarch.rpm8010fe9f7a9f769ce948649f91321b0f50c10454b8ea402522e89b05b59681c0git-gnome-keyring-1.8.3.1-25.el7_9.x86_64.rpm78438f3c27a923f51e56b7a7b1d3cb53e65697751b833fd7e2f8a8a7a7f98080git-all-1.8.3.1-25.el7_9.noarch.rpmefa5741496687d523e89c33aa496a53e2e81c5f1f739f0890ba0e60fa02915d3emacs-git-el-1.8.3.1-25.el7_9.noarch.rpm0ab9001313770b6d4639542725fe6fe273360ba834f514b6d47e19e7a73b85cagit-p4-1.8.3.1-25.el7_9.noarch.rpme22b37264ccb2453f57e7d3f90c9a51f91fc95a312c06e94fffdda160ce0d998gitweb-1.8.3.1-25.el7_9.noarch.rpmccac8cdd7f8d8e0471b9b486349cd02e2c5e8a38dc886d8e3970a784a105c3fegit-1.8.3.1-25.el7_9.x86_64.rpm75e09efa67ede28fa48fc303a4b64f88ef0767c7a57862ba207b6c542a8c5129git-daemon-1.8.3.1-25.el7_9.x86_64.rpm4a7893c0ccb2136cef96a3a42d1c976c4708baae1006ab0401e236184119f805git-bzr-1.8.3.1-25.el7_9.noarch.rpm88099b0b0b0eac62df45f49512eee7277d55011dd5e1ebe315d4482e92118238emacs-git-1.8.3.1-25.el7_9.noarch.rpm204e0a02b8a7cb91e7ff10fc3c57ea2e69f3531aa62b2fe30f2a1b7922d0a20bgit-instaweb-1.8.3.1-25.el7_9.noarch.rpm3e83eeab3a710c7be5655e2df71272688ff9f0af44b02f2ce1a06bc46bd733d0git-hg-1.8.3.1-25.el7_9.noarch.rpm7dbe6883a220246b72b07b0883b4d5cc6a6394d76fdd54ea15ceb7b968c005cbperl-Git-SVN-1.8.3.1-25.el7_9.noarch.rpm5dd193a55fb659b5d314001e1658f8a453cb21ee5e08c6bdd3dd5cacdb018290git-svn-1.8.3.1-25.el7_9.x86_64.rpm58d5775c300153c42aaee661185813841751bf363ed31cf0603f16fcd891f5dfSLSA-2023:3481-1EmacsSecurity Fix(es): * emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7emacs-24.3-23.el7_9.1.x86_64.rpm16429ed85d33e15b552460c1b67de5294986c29daaa3d2c348e33ed9b1915302emacs-terminal-24.3-23.el7_9.1.noarch.rpme6304cdcc84e2f3b192eb747f376b7c28385031751e7f32ce62087cd4a4cc996emacs-el-24.3-23.el7_9.1.noarch.rpmcd07bf3dce1867952ff000c38af14043a31e2e230afd103c843157a81b64c7ceemacs-filesystem-24.3-23.el7_9.1.noarch.rpm52c8fb406a8e2b782b38536fe5e61ce36c031c3824cb32ce88b6bd2e9e6562d8emacs-nox-24.3-23.el7_9.1.x86_64.rpm379d8bbcd19407c44dc6b00af52973afecf4488c0b57609032725948563c02a3emacs-common-24.3-23.el7_9.1.x86_64.rpm77e5977105cc0b7645f5141a684adc2845813a0205881e1d0239961910937217SLSA-2023:3555-1PythonSecurity Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7python-test-2.7.5-93.el7_9.x86_64.rpm1c508a26d568ab252f09be0a5a9844febd340580a46f9959c8ea9b7bd643c879python-libs-2.7.5-93.el7_9.i686.rpm74a2f37e515525613a58e2d2e48cdef939554c6e985b556022f7a2fc3da193bapython-2.7.5-93.el7_9.x86_64.rpmc2b14b2623f7080d71a784a26cc0e0917c121879174aed1d7498702cd5f58e48python-tools-2.7.5-93.el7_9.x86_64.rpma141c7be5f16cb7d79c86a7d217c3c26170f59892f3d8449f155c95ef6bc7163python-devel-2.7.5-93.el7_9.x86_64.rpmc69106bbfeff385d12c48f00f9111f5e9551607cadaed31f7cea6303c465419ctkinter-2.7.5-93.el7_9.x86_64.rpm2af896618aad06c74e7d6aa51f936cd1def6ff4c2cdde61ad56f6c07dc53e989python-libs-2.7.5-93.el7_9.x86_64.rpma9911b8402a76fb873d4f8954d6ad8c3335a940617273561485f7ac44a10f3d3python-debug-2.7.5-93.el7_9.x86_64.rpm6a649dc6a6ed2a55d9dda6498f1f6fc0aea0e9e059c76f1ca4dcec9415f19cc2SLSA-2023:3556-1Python3Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7python3-idle-3.6.8-19.el7_9.i686.rpmc3213042d778d496f5b48723f2f16e839754e53017944827b719eba596409007python3-libs-3.6.8-19.el7_9.x86_64.rpmacc5dc6879fcb54764b1982a828c7bd0d818e94ffa4b7656abf8bac9d2311cc0python3-tkinter-3.6.8-19.el7_9.i686.rpm082e297fda5b60c723bf4d11eaf47f2eaf9ffbf10b10e1809432a722d32e4d28python3-idle-3.6.8-19.el7_9.x86_64.rpmabdbe62fff672d7c8c674af61906edf5de7a1fa2eafcf6ffc991bb4f61c01955python3-test-3.6.8-19.el7_9.x86_64.rpm9b4d40db2ba3248732de180ffd339f822c98eaab3dc446a63c83e244d3fdf998python3-debug-3.6.8-19.el7_9.i686.rpm1d9a91b8ff0dda6a911e2cc7d89c7520736632c95fca8785cbd9e7c937f3c62bpython3-debug-3.6.8-19.el7_9.x86_64.rpmaeabd980724b1d01314f93ee5368b188ace49f641ced64cb03f50c3daf80463epython3-devel-3.6.8-19.el7_9.x86_64.rpm06c47f05308ffd3e781f031941cf7e06cc0fd06ffb9dffe8191ab667bf295690python3-3.6.8-19.el7_9.i686.rpmb403cec0cf4d82052b1f34eab7ee866f48b4a38c847736a878041b92c9274b27python3-tkinter-3.6.8-19.el7_9.x86_64.rpm3fd7dd673a988c986805ed4ced6f19dc47d44f81aee291626dfcc9ae8f00fb27python3-libs-3.6.8-19.el7_9.i686.rpm85efb8f32cb59dd05a7a21f48cc2abe7711b7f2f1d19997cf4328a54e7b12d7bpython3-3.6.8-19.el7_9.x86_64.rpmeb546d5fe026dc6902621e56f6bc958568a1880997534d56ed5fe6b1f0ba3a1cpython3-test-3.6.8-19.el7_9.i686.rpmd6c13b289c5b6793a34b0b67f88ab0730fb99b111e10adf77ad54e09cbc26358python3-devel-3.6.8-19.el7_9.i686.rpmba765447ce9209db237e4814f289ef966e50753d880e591b84ea9dc9eb8b9032SLSA-2023:3563-1ThunderbirdThis update upgrades Thunderbird to version 102.12.0. Security Fix(es): * Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) * Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.12.0-1.el7_9.x86_64.rpm3d6ef4a4906929928258405965ed74368e1a192aa83d0105bc4f25fa1f799885SLSA-2023:3579-1FirefoxThis update upgrades Firefox to version 102.12.0 ESR. Security Fix(es): * Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) * Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.12.0-1.el7_9.i686.rpm85dd0bd1ea66050ffc9257d0c70173cc9db885ea8ca48b309c830c62eccb0f7efirefox-102.12.0-1.el7_9.x86_64.rpmb0eda21f63d6600d82d0eea6f78452939b615447a11748b6d3ff9dfca96df831SLSA-2023:3741-1C-AresSecurity Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7c-ares-devel-1.10.0-3.el7_9.1.i686.rpm4810d2e56485882183e34a8ddb72425fc96df44ff0690bc1d0acb024f9cfcc3cc-ares-1.10.0-3.el7_9.1.x86_64.rpm2767f9710da7c66679b27ee4c75b0eb4430dcb4a9d7d505a2a4a651218216a7ec-ares-devel-1.10.0-3.el7_9.1.x86_64.rpmc682f4cea6d4ae48a03518f7d4722b960bfb476a6edf9e96e80c3d43606fbe4bc-ares-1.10.0-3.el7_9.1.i686.rpm3bd881548e05c652d368e63a5a8e5487da80fb4dc7e9d59e8489f037d8214c1fSLSA-2023:3944-1Open-Vm-ToolsSecurity Fix(es): * open-vm-tools: authentication bypass vulnerability in the vgauth module (CVE-2023-20867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * [ESXi] [SL7] vmtoolsd task is blocked in the uninterruptible state while attempting to delete (unlink) the file 'quiesce_manifest.xml' * [ESXi][SL7.9][open-vm-tools] Snapshot of the SL7 guest on the VMWare ESXi hypervisor failed vm hangslowScientific LinuxScientific Linux 7open-vm-tools-devel-11.0.5-3.el7_9.6.x86_64.rpme50c2f59eebd90a27a7c4b05f3ea63a278ef1587a393736a4a46837a2240e6e7open-vm-tools-desktop-11.0.5-3.el7_9.6.x86_64.rpm583a5c038ff4273c49f1bbaedd4c4fe343c81f9d4ddffcca1ac64a27cba33b63open-vm-tools-test-11.0.5-3.el7_9.6.x86_64.rpmdd3dbeab07c3601f04fd9276645e4d879bfb2591dbf218106a4679bc3f2d0e8fopen-vm-tools-11.0.5-3.el7_9.6.x86_64.rpmd91ad175421f9064d2b465745ffb5522d929f0ac6931a66fa5c9a45dcd359603SLSA-2023:4062-1ThunderbirdThis update upgrades Thunderbird to version 102.13.0. Security Fix(es): * Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202) * Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 (CVE-2023-37211) * Mozilla: Fullscreen notification obscured (CVE-2023-37207) * Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.13.0-2.el7_9.x86_64.rpm457011a565fd0d609ffafae8889642b0098c1782e64d391a7ec242f940aff6acSLSA-2023:4079-1FirefoxThis update upgrades Firefox to version 102.13.0 ESR. Security Fix(es): * Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202) * Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 (CVE-2023-37211) * Mozilla: Fullscreen notification obscured (CVE-2023-37207) * Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.13.0-2.el7_9.i686.rpm52525c06ded84e0af82ad1bb583015b6dd976b15c200a89929aea7970ebf182afirefox-102.13.0-2.el7_9.x86_64.rpm7d5b42ef904a7638edaf85655b8848a9b55128200dc6514220839294a292259aSLSA-2023:4151-1KernelSecurity Fix(es): * kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * perf record -ag does not capture user space stack frames on s390x * SL7.9 - kernel: handle new reply code FILTERED_BY_HYPERVISORimportantScientific LinuxScientific Linux 7grub2-2.02-0.87.sl7_9.11.0.x86_64.rpm02fdac07bcfcd70a44e58b2b66eacfb4b878d5021d85e5f6121f77a9328b5667grub2-tools-extra-2.02-0.87.sl7_9.11.0.x86_64.rpm6251a806574027dfd31c399144e35a259a698a3a28c3b2eaa54e6a0f188107f2grub2-tools-minimal-2.02-0.87.sl7_9.11.0.x86_64.rpm51a9101328612f9d71fe72c145879aba98a2b5afbdf08e04f5f427f5f3597a1dkernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm13ddb32f504cbe0194aeead1151afc046b34cace7c5bc5193aed6bea6d4072c0kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpmacc68d033ea9e974d2f6f2041224aff5f46859c6e45c0b97997949bf6add434dkernel-devel-3.10.0-1160.95.1.el7.x86_64.rpmd427f4027b89aa13cbc836bcafb6b69a7c335d37b84efc738b9aef1c30395e72grub2-efi-ia32-2.02-0.87.sl7_9.11.0.x86_64.rpmacaf931aae56735cabdefc5d99313cac4725e5a2211b19f15562856065856345kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpmaa994b7f8e6f91bc84e63169d2c518b4435aef54a487d99b3edea56719ccea1cshim-ia32-15.6-3.sl7.x86_64.rpm39185186a7f6cb0cefcc2c1d26d1dda21996afa9106651c290f8c41b0421abeagrub2-efi-x64-2.02-0.87.sl7_9.11.0.x86_64.rpm183ae7eb980f05ea13f48d4e2f41c90d34dc8b23817fc19969ca0ef69feb718efwupdate-12-6.sl7_9.x86_64.rpmf05fee0dca5f4736b736d99beec247af393b5f3920e668a98800e582159f24bbkernel-3.10.0-1160.95.1.el7.x86_64.rpm6ae9d35124a1f80a46ab4f8ad9ad4a4c6237452120f67f04881a22b7cf579e1bfwupdate-libs-12-6.sl7_9.x86_64.rpmd01c9c211a1f3d7a0beba4f69ba33a6285d11dbc8477c2a44590600a2644bb2agrub2-efi-ia32-modules-2.02-0.87.sl7_9.11.0.noarch.rpm31fe7931059e9be7e6bdad1a83a200f77593f86750de08e65fc1b8af0cc6a34apython-perf-3.10.0-1160.95.1.el7.x86_64.rpm306970c6e447bbeb126a7e99d4524b45a0cc580e5bdd05b30c60bf497ba1b516kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm646b38c30483557716b7a9addd2326eb8be8c30c972d830094895917b94ee58cbpftool-3.10.0-1160.95.1.el7.x86_64.rpm94cc896650fb6c867857693598868f7e90d7dff12ea92cb57d97c491e5e61482grub2-tools-2.02-0.87.sl7_9.11.0.x86_64.rpm1f2405d5161a7e40d572c69b539a588a86c5b52608a8040c76236783c25fc617grub2-common-2.02-0.87.sl7_9.11.0.noarch.rpmdd912b0a96c6f9aac8dd2c44c40a7a57030b9096745740f69fa71baa2e3a2699grub2-efi-x64-modules-2.02-0.87.sl7_9.11.0.noarch.rpmd26326bb671444d05e22b08e86c63b1efb22eb88e56b619103e09c497c8226e0kernel-doc-3.10.0-1160.95.1.el7.noarch.rpme917b958908bfe5251fbdee329eea5285e1986be0982e74170ee9beda0630d9dshim-x64-15.6-3.sl7.x86_64.rpm37566ff2a06fd123d9213bb8a80c355ec75811dcd769220ff04bb2496db58147fwupdate-efi-12-6.sl7_9.x86_64.rpmb0363c1d769a27dd112cf4beed6f9537c150bb34e384b45e97e90c2a347d4ee2fwupdate-devel-12-6.sl7_9.x86_64.rpm76179cf91bf69a5f79b595984e40b0a455c76f97779731b2280fed8d72eefd6dkernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpmf1fceb068c5b4818015623b6b3e87d91effa4ec9d972bf8f01efe5212616907eshim-unsigned-x64-15.6-3.sl7.x86_64.rpmbdb026643e0ca5cacf8acb7778bb5dc9b09fe7c866ee8f14ccd1ece10450a61ekernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm32fdbe756f8ed96b782df457240816cd884b0705447ee0a2c0495b7c7d763830grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.11.0.x86_64.rpm50b51f12a760777c9387ad0e1191da8716f876f3065c894fa52cd0829f8fd131grub2-pc-modules-2.02-0.87.sl7_9.11.0.noarch.rpmd8a8f3c36a67551c955b05eede25d191e50c555f8ac86438772a6db95a0c530dshim-unsigned-ia32-15.6-3.sl7.x86_64.rpm2f1541a06e65a2d86848aca2d79f1640955593a7a68eec7a03a5a47d30f3ff76kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpmdd68286b55ee763dd8fc678c44f263ec5d96c35a4c9fe9786e7cd0cbe153e1abgrub2-efi-x64-cdboot-2.02-0.87.sl7_9.11.0.x86_64.rpm2db99f7c06c5210819d5f9eb42c9abe0b8d9655d0b77f07ef73c4dae95d96175grub2-pc-2.02-0.87.sl7_9.11.0.x86_64.rpm1681e6f273f637765446f401f3eb14c0d731bada9d85f03251efc8804bc51157perf-3.10.0-1160.95.1.el7.x86_64.rpm0376e3997d60d170fce182e5cf2799f5ecb39f38e863b4913c5a993031e684f5SLSA-2023:4152-1BindSecurity Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7bind-9.11.4-26.P2.el7_9.14.x86_64.rpm29acbdd8ef76126617364b40e3f2b7329905520c0fc2997cca1943ade2e2f170bind-lite-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm7b6ad4d11d5f58c4b785a685817819d9887e90dbf5b5ef896f2edfc520d31e44bind-libs-9.11.4-26.P2.el7_9.14.i686.rpm66a6af922faa347aaf91e64655d56f5d5b5e0d92890a2ae56f02c70c4864c95ebind-pkcs11-9.11.4-26.P2.el7_9.14.x86_64.rpm7e5d0f76854bfcfbe47690bb640b238c30e97e54e939c22322536c9d3f1faab0bind-pkcs11-devel-9.11.4-26.P2.el7_9.14.i686.rpm6ddd097023193aacaa88687e1a4c37c905a7d9941541c80818654a584728e67fbind-pkcs11-libs-9.11.4-26.P2.el7_9.14.i686.rpma5d4544e806cf573de6fb927d2bb437679f2696a34fa5f792d2b76af32bb0fdbbind-utils-9.11.4-26.P2.el7_9.14.x86_64.rpm2fb0d462a1b1db1a2725e1e0baf84fb76417bf2856005d9bd57c42907b8f5944bind-chroot-9.11.4-26.P2.el7_9.14.x86_64.rpm9d0985c47e21159f2ecc9df5c8ea8d2d70f5a56bd05aa6ed00ff25b36197c5e0bind-export-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm5390ad1a5f2685596965712efe2d275bed051f57873af3ebc42b4c416539c908bind-pkcs11-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm4a989308307618115dab799fbd00aee4a7f6fe5d19f641b5e77430d452959540bind-libs-lite-9.11.4-26.P2.el7_9.14.i686.rpm2bce489aca7599245223ffae177480f2dc3b14e16c637f40a5a0c0890534a3b9bind-pkcs11-utils-9.11.4-26.P2.el7_9.14.x86_64.rpm7ff549d1ea4277b8cf04054cc499a2ef031e3bc53062ab740d612d3516fc5a20bind-devel-9.11.4-26.P2.el7_9.14.x86_64.rpmbb0eaaa881ed826216814d893c4ba525c373dd290e9eb74f24da46f40a43cfc4bind-sdb-9.11.4-26.P2.el7_9.14.x86_64.rpmbae52c0b8227daab9989105f72a3a74c7f75cceabd06b9b47d5bb4971eb6e7abbind-export-devel-9.11.4-26.P2.el7_9.14.i686.rpm0b226d71c582c942d56ca8f9a799ebe69c336b8f097905bfb1fdbaa487202bacbind-export-libs-9.11.4-26.P2.el7_9.14.i686.rpm2846839473093619718e8ea04cd84b4d4f27feb87cfb515d70fa32df7c2d74debind-license-9.11.4-26.P2.el7_9.14.noarch.rpm718ac5e100a00cf62b780e12da17fbdb95ea1e171c609c2f38db53b9aa319d6abind-pkcs11-libs-9.11.4-26.P2.el7_9.14.x86_64.rpmaca48ff6d1d75402d11355ed6f532fef4a349812937782dee155e1eca0610460bind-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm840cda41fd97e0bc0d1665a201486780fde37112cb891fe0b94062ab0f5714dabind-sdb-chroot-9.11.4-26.P2.el7_9.14.x86_64.rpm9029c343cea2748a44100b3b0b89315ab0007e45171f7be07d3d0f50d093003cbind-devel-9.11.4-26.P2.el7_9.14.i686.rpm9bca8849fb777e9b638fcccb73d988d3b34353f26ce5efc93f02b31fb81f1926bind-libs-lite-9.11.4-26.P2.el7_9.14.x86_64.rpm574c4f30fafb93115de42de08603fa9bd6f0189f2f06247cb806b0cd4de33392bind-lite-devel-9.11.4-26.P2.el7_9.14.i686.rpme75f71ee6da51243433b0b1e77fbca1b79b3205e1068775255f44eafffc1b966bind-export-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm482ef3dbadd5c64e229c46f6548fc0573e6931d61e126f5be2ff411f6a8af5e0SLSA-2023:4166Moderate: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) (BZ#2217708) moderateScientific Linux 7java-1.8.0-openjdk-devel-debug-1.8.0.382.b05-1.el7_9.i686.rpm7c3395ba0672303eeacd383463317845324c1aac2030233d7fea9558fff90549java-1.8.0-openjdk-demo-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm0acdfddd0a7621da52715ba0b8b239c1f5f0ee2dd1a5c773c835ca249e20bf0fjava-1.8.0-openjdk-src-debug-1.8.0.382.b05-1.el7_9.x86_64.rpmabfdc2d0ba965927ba438926b19bfddef818fa2ca21eac00c883a8503c092d1bjava-1.8.0-openjdk-src-debug-1.8.0.382.b05-1.el7_9.i686.rpm2ddc1ee4b77ec9cc6bceb4a1e2ea40fe0f47deb48bfd326e384c36ac9d4e409djava-1.8.0-openjdk-javadoc-debug-1.8.0.382.b05-1.el7_9.noarch.rpmaeb291eb0b50c6df8df73995e0d169b30d8cf97bf536fa903e1482fb69575ee7java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.382.b05-1.el7_9.noarch.rpm5de760604ddd497ea668ecf2f0f19d63f3d41595ed6ccbed0d890e6840626418java-1.8.0-openjdk-demo-debug-1.8.0.382.b05-1.el7_9.i686.rpm06ed414d6eb74d917f79c66135606b847e084b887f2e7aaec07907cc1ce898d7java-1.8.0-openjdk-accessibility-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm3ff546cd8366a57d4613b8b3329c4002bb5521633b5497eb89a8fa4339cf2073java-1.8.0-openjdk-accessibility-debug-1.8.0.382.b05-1.el7_9.i686.rpm6b4b98b46d82621ea627ea494bcde7a01d57c52f499a3251a2026c7f45e1f5c8java-1.8.0-openjdk-debug-1.8.0.382.b05-1.el7_9.i686.rpmd5cca96d47139cb3c734101fc7d16eb5da6b8791594b76cc9cb311c0d77b8436java-1.8.0-openjdk-headless-debug-1.8.0.382.b05-1.el7_9.i686.rpmbb19016336ad1ffef6ccc598a796d2259b59ba46531c2a4e8ba765475158f440java-1.8.0-openjdk-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm0c8b6ce7646a1b634638dabc81d075cfcb4eddc5f6776f6d7cd2bf7103e358ffjava-1.8.0-openjdk-devel-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm1f710135ab14b8921155c51224f1620959c92342f5ed6c4f9e8405eb1fec8ea8java-1.8.0-openjdk-headless-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm324fc8fe94286881f47638b6e0fd83bcd142875e7620d79ce20d80bf130ac238SLSA-2023:4166-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9.i686.rpmbe2517d7192e20c4080fe95929dfae8a9aea42cab14e7e51c138f6c266d5055cjava-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9.i686.rpm246498ddacd857113797505382a16215d170259474f568de21cdf337ff0f53efjava-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9.x86_64.rpm9c426e1a4c65a49038792a46eda61db38172a58b637f04a031cb8dc4de8cd1cajava-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9.x86_64.rpmb5b7073955ddd948e0c276da88d014744e6e2f2fd6ee40b993eff6af81b8a4fdjava-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-1.el7_9.noarch.rpm93929cce2fa47a2f63ccc5d1e84aa2cb89ffcac2fd09fe915b0e4d2f33145645java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.i686.rpm9ce39f54dfaeec78b581d0b325a8412dd482468778bca0f96a755e38f80736edjava-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9.i686.rpmbb44623d2ee60580b7a1a7816d0351bd036210246f3e3fee58c3cfe8719eae06java-1.8.0-openjdk-javadoc-1.8.0.382.b05-1.el7_9.noarch.rpmb5d809bd49184057cfaa02919c8737f8ae3c3d2a9bdcb764ac4e19bb9c1cf322java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9.x86_64.rpmca822420f5631ceffa2d5652b7666c8c2acde9aaae3d32837dc2295c8a4e1716java-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9.x86_64.rpm61ba3d584fa8f470ae66e0853c79997ae4939c3e81ac78e8e782b29cd7143e60java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9.i686.rpme5be3aeb37544ea9645bd3ea4ef068cd56baa4982faba21298ec5db94b461cf1java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9.x86_64.rpmc9db4e28c818f4caf37c8ebf7d4db06219799d5bc58f51989d93edefd4ffea8cjava-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9.i686.rpm20fa5eebb058c93de0e25304267aeb15993df86f8e712172fb49e325dd4b2380java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.x86_64.rpm8fea289176fabde82dcb29089c11467714e6a9abf9507fdd3cd6f86f0f658177SLSA-2023:4233Moderate: Java-11-Openjdk Security And Bug Fix UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036) * OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041) * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193) * OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20) (BZ#2217709) moderateScientific Linux 7java-11-openjdk-jmods-debug-11.0.20.0.8-1.el7_9.i686.rpm79edb96529d10ef16a14e2daf18ca1395d47fa641003d863f312355ea68f741ejava-11-openjdk-debug-11.0.20.0.8-1.el7_9.x86_64.rpmc8be48c9d252511eec2ccf4cd7fc3fcf707e8d216f95966a6d70f958affc667ejava-11-openjdk-javadoc-zip-debug-11.0.20.0.8-1.el7_9.x86_64.rpm20371f5b12456cb60bdeb50594787a9915571aeb4bed66acd480282d857a7debjava-11-openjdk-javadoc-debug-11.0.20.0.8-1.el7_9.x86_64.rpmf9ae10bed9a2bf684c6e270d4e7462952312530edc183bd7a0c09962419cba8cjava-11-openjdk-devel-debug-11.0.20.0.8-1.el7_9.x86_64.rpma53b63613af856ef8200398dc244c8afa4d2cff0f22263536599d752979620a6java-11-openjdk-debug-11.0.20.0.8-1.el7_9.i686.rpmbb113cc3ec5a057138fb0938f2778346db9a4855c6c6a4a6b46f3e5bebe2c81ejava-11-openjdk-static-libs-debug-11.0.20.0.8-1.el7_9.x86_64.rpm3bb27392b418c7c8899fc2e0856d3088e204b078c4dd1dc42cba2533e6055080java-11-openjdk-src-debug-11.0.20.0.8-1.el7_9.i686.rpm28344a7fd67e264329c9b07f5dcd8610dd66e448e5034ce1cf2fa55fcd234b92java-11-openjdk-devel-debug-11.0.20.0.8-1.el7_9.i686.rpm27fddb078f6eb1a9cf97d83adca5712bce9b19d61c0f9f261094530b0daac735java-11-openjdk-src-debug-11.0.20.0.8-1.el7_9.x86_64.rpm33dc461e2082675b6e346795f300a91acdefa485e9233d3cf39f39b66e1fdae3java-11-openjdk-demo-debug-11.0.20.0.8-1.el7_9.x86_64.rpm8d383e463fb3b251593c23148d5c2ea67bdc3ba64601dd4ee6b8c2c249a85396java-11-openjdk-headless-debug-11.0.20.0.8-1.el7_9.x86_64.rpmde3b19406174e17155461c16bbb7ab46d6bab3ea373d9314d96cfbb7b5dea026java-11-openjdk-demo-debug-11.0.20.0.8-1.el7_9.i686.rpme71b46bf3b51c008b27b18cf8f8b4ab68e8fc6698382531f49ff66caebc79586java-11-openjdk-javadoc-zip-debug-11.0.20.0.8-1.el7_9.i686.rpmb45ea9aee2c7cbf87cf5e1a036fdaff5fc324eb0625524ea8333725f0c3f585fjava-11-openjdk-headless-debug-11.0.20.0.8-1.el7_9.i686.rpmbfd172cc6c3047b7f2eaf10420625983b90ee8e61e0081b2db7b24e80cea299ejava-11-openjdk-jmods-debug-11.0.20.0.8-1.el7_9.x86_64.rpmf931e5668f419210f43e2b6024127623b3fd6428cdb9dc043cb0a1aa036ca660java-11-openjdk-javadoc-debug-11.0.20.0.8-1.el7_9.i686.rpm4718a60737d866d51134e1997539125b97ffe020138b1154e117738222266221SLSA-2023:4233-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036) * OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041) * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193) * OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20)moderateScientific LinuxScientific Linux 7java-11-openjdk-jmods-11.0.20.0.8-1.el7_9.i686.rpm6b81768fbdd28e1f6d21396d5c56c492566e171f0b3ba69d6a53c6899d8e7669java-11-openjdk-devel-11.0.20.0.8-1.el7_9.x86_64.rpm44d5bb2962cf95018188e0e9322f1cb0749559717925095f014860d9a2d52a51java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9.i686.rpm181fec129c7d9092535329e8c13b10738f5b458b4bfc8e2b35f3d7a849fbf9e8java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9.i686.rpm8d254b5dd60cc5ae65759c71124065eebeadf32795a13e6e6b4c19d3453c5734java-11-openjdk-jmods-11.0.20.0.8-1.el7_9.x86_64.rpm9fd0134a61497cef62d71c58e257c28984fe6754e417330cc4d3f196e800f4a9java-11-openjdk-devel-11.0.20.0.8-1.el7_9.i686.rpm0c514dc36635d32c240308ef4dfc2b015bcc3c7223d010cf7ddf81ace4f6c9efjava-11-openjdk-javadoc-11.0.20.0.8-1.el7_9.x86_64.rpm28f51f4e0c1d3b94b428e29c38ff7cde48854235795a347f7bce25e3fc1a011ejava-11-openjdk-src-11.0.20.0.8-1.el7_9.x86_64.rpm27a31b28a2db95c6db0a33da9d25fcdf6f29d7a3c8a6c2fbf3a265bebec66a22java-11-openjdk-11.0.20.0.8-1.el7_9.i686.rpm256fef34638e88b726b4a2f1c25fe1c25f3b9f780bfbf76cd7707df050945acejava-11-openjdk-headless-11.0.20.0.8-1.el7_9.x86_64.rpm5eee4ef43ef2ae522c24da2c9567c7a10a8e69c762b7388de5a44a094fdc31f4java-11-openjdk-demo-11.0.20.0.8-1.el7_9.x86_64.rpme8ccbd4e99b30c1b578777648ae4a22f2925f73051c06ce99f714f6b60bbe707java-11-openjdk-src-11.0.20.0.8-1.el7_9.i686.rpme4a4b80fd40168ee4be8d2d45724d4732b643a3109f88120835280019c5d1ccbjava-11-openjdk-demo-11.0.20.0.8-1.el7_9.i686.rpmfb47826b6a6845ad11f4df022362b11cc86f8f707603371872e06ecc2a338833java-11-openjdk-11.0.20.0.8-1.el7_9.x86_64.rpm4277755e41d7df46ee4f348b36b869e49d17408bb01b498245bebd9ead246923java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9.x86_64.rpm58c77950e50ddc6351ef578222b43c1629ac54bd5dfb8e1739807702af220c16java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9.x86_64.rpm07ef48a92d0025a97f2a3ba7d19df6dbc2e00facba809f2d5dba5d74f097473djava-11-openjdk-headless-11.0.20.0.8-1.el7_9.i686.rpm8187223a55a7d29c536ef088992487a98eb5d02f73701a501a5b0a5a9973cb4cSLSA-2023:4326-1Iperf3Security Fix(es): * iperf3: memory allocation hazard and crash (CVE-2023-38403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7iperf3-devel-3.1.7-3.el7_9.x86_64.rpme53c0d01885458be4adac152217cf53d799662878939bc5fc691966f389e2f0fiperf3-3.1.7-3.el7_9.x86_64.rpm10a02c97f06d7be475a801b26dd8e756dbe815448697365a2aadfaa1deb0132fiperf3-3.1.7-3.el7_9.i686.rpmcfceef3822daabf5924b978c72905b741df7d00aaff0701b93f98cbe3c29aed7iperf3-devel-3.1.7-3.el7_9.i686.rpm3ec8a3704f101c48bf5e1ebb5799a8c4bbab428be5d54c451cae8049349698cbSLSA-2023:4382-1OpensshSecurity Fix(es): * openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7pam_ssh_agent_auth-0.10.3-2.23.el7_9.i686.rpm15137695c53e2f504a6425d916c4e8d918cde6ea488c14a409e5bea6d383234bopenssh-server-sysvinit-7.4p1-23.el7_9.x86_64.rpm533d76891a4fd3af080647599d3de4aa93943e29dd2ba22e6cb2099e9297fc57openssh-server-7.4p1-23.el7_9.x86_64.rpme49f21aa861a841c7277185e4773533fdf824307c3bd2a190dbf6a4993534f4eopenssh-clients-7.4p1-23.el7_9.x86_64.rpm42ff6594a5706664e867dec3f55c7c5f2f781a76387b4b0fbdd61dc761c122cfpam_ssh_agent_auth-0.10.3-2.23.el7_9.x86_64.rpm5f5a93beb057f9d2bd3fc6809afa4bde65bc5cf9e2777ff6ad037b47524bb0d9openssh-askpass-7.4p1-23.el7_9.x86_64.rpm99e3fab2ddbf75dc3fe4eec47c13b108bcc5f86943ae40c64600b06a5ca13894openssh-7.4p1-23.el7_9.x86_64.rpm46560001f786099f2c23e67c61af9ada89ce46dee0a69c0ab2d9c8fec4928e18openssh-keycat-7.4p1-23.el7_9.x86_64.rpmc40d827906c9369a9cec60464f73dccca0c426665c52635a716cfdced2f9757bopenssh-ldap-7.4p1-23.el7_9.x86_64.rpm9668bcfc1a63f462660cc217d76fb0cfb95877ffabac224267198051dc9fb002openssh-cavs-7.4p1-23.el7_9.x86_64.rpme4eb00f6b5814dad2c715cfb2570de1665b13cddf60578f8a644b88fb470b02bSLSA-2023:4461-1FirefoxThis update upgrades Firefox to version 102.14.0 ESR. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.14.0-1.el7_9.i686.rpm46d3174db667a468ed9cb3879dbbefb56ba6a15111095d9f94cf9309b018a57dfirefox-102.14.0-1.el7_9.x86_64.rpm773c59b1f0ce9ec001ca836d4986d4ec85972700c21e51b94e5f149abd14b401SLSA-2023:4495-1ThunderbirdThis update upgrades Thunderbird to version 102.14.0. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.14.0-1.el7_9.x86_64.rpm90d4ca466a0c27ff92aa361e83fef3d2ad2a24f8ea729dc3ec89a46aab27f924SLSA-2023:4701Moderate: Subscription-Manager Security UpdateThe subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Red Hat entitlement platform. Security Fix(es): * subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7subscription-manager-cockpit-1.24.52-2.sl7_9.noarch.rpmd4dce8973007bffbdb590385324bb6fd624bdf3bf42f093cc1011ce33043d590SLSA-2023:4701-1Subscription-ManagerSecurity Fix(es): * subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7subscription-manager-plugin-ostree-1.24.52-2.sl7_9.x86_64.rpm3aef89a2e5aa34e5153b964de89ed8dc97536a4197eca875550277ba3a329df9subscription-manager-initial-setup-addon-1.24.52-2.sl7_9.x86_64.rpmd004be8aedd432c0ea079c964d307e81a2899951816394458e645f88c5466994python-syspurpose-1.24.52-2.sl7_9.x86_64.rpmac777cf7e2eec23ec0e63b8c373ba4673dfdb5c5667d99d1fee87b23fff2d13fsubscription-manager-rhsm-certificates-1.24.52-2.sl7_9.x86_64.rpm59bac61f4807e35bfe6ffc7571678a2d01c64c5ac838510fa8f318f58ac36bb1subscription-manager-gui-1.24.52-2.sl7_9.x86_64.rpm6fb9aebcc5c57bd532ba287e48d4c86f54096c54d01da06ca6779a2cbc601385subscription-manager-1.24.52-2.sl7_9.x86_64.rpmdc72bb7a68002ce37e74d434c63040b2ee393b29fcf70bdbb4dd9c7a7ccd1570rhsm-gtk-1.24.52-2.sl7_9.x86_64.rpmd039aca531355bf6b59cbfe5391109d27d7b4cbf5d60e0c1abbd7b352cf62671subscription-manager-rhsm-1.24.52-2.sl7_9.x86_64.rpm65df3cd12882609a31cb34e044827a64bb72e46c7f0a99ec5a9b62a36431d403subscription-manager-plugin-container-1.24.52-2.sl7_9.x86_64.rpme9b395154b73f1f202917516bbfa4775d16da753e3ba2ec3deafc44316153c7dSLSA-2023:4766-1CupsSecurity Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7cups-devel-1.6.3-52.el7_9.x86_64.rpm7c3cbf4cc374bdfd8015361637a8b8a867b5d1fa69bb7beff755640f23f6c0cccups-devel-1.6.3-52.el7_9.i686.rpm5504cec28cb1a1e19235afb9c2c56e02ba69aff292d6eef5d78f8d969419ce01cups-libs-1.6.3-52.el7_9.i686.rpm88297a55377748d2933fc8de089f795e27b3865d49e549e260b3fac7215498c2cups-client-1.6.3-52.el7_9.x86_64.rpm95ca623b83f86e463b49c79bbb19ccec5cf0199fa1ed2271a0e9a2f67148c76acups-1.6.3-52.el7_9.x86_64.rpm5741a6d72fe6c707106827df879c07eb365b69af9fd6eda0c6234f9136df517ecups-filesystem-1.6.3-52.el7_9.noarch.rpm5d1fd0decc17e7916b5d62739789604e57922d2c7b52fd4b12ad62288f188d3fcups-ipptool-1.6.3-52.el7_9.x86_64.rpmad6a544566561c17ed080bcdc740b00c63bc540a587e056c9285079b223826d0cups-lpd-1.6.3-52.el7_9.x86_64.rpm8e901dc27343fab9c1d7dcc25456b2817c574fd7e5fee0e00f157ce6e0b1621bcups-libs-1.6.3-52.el7_9.x86_64.rpm0485f21088d13e839a97117b8bdbc2430f5d0d9120cde06179f95bbc56802dffSLSA-2023:4819-1KernelSecurity Fix(es): * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * nf_conntrack causing nfs to stall * Request to backport upstream commit 5e2d2cc2588b, 26a8b12747c9, and e98fa02c4f2e for SL 7.9.z * Fix soft lockup happens in gfs2_dir_get_hash_table()importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-1160.99.1.el7.x86_64.rpm75fddc94eff778849051cd727cde8d2e2eab9f0dbe25819a1d54dea474ba2419kernel-headers-3.10.0-1160.99.1.el7.x86_64.rpm9480fa13131dc355affd38b22afae1755613b3600b7dfe14699c4747410c227dkernel-debug-devel-3.10.0-1160.99.1.el7.x86_64.rpm28326695252bb7d55df1dbaf43cc0761341058093df41ddfb46502f704eeb00bkernel-debug-3.10.0-1160.99.1.el7.x86_64.rpmfc472728cc201ee91ac0fce414ac4907d6c1ece852952923855f7af882ec7ad9python-perf-3.10.0-1160.99.1.el7.x86_64.rpm4a3bc0876b9b50589d39ff0880f73c65154e7a10a4e70b2c23dee84821f34b77kernel-abi-whitelists-3.10.0-1160.99.1.el7.noarch.rpm9e4dfeb66bac590bd33a26a3790dd3dfddf021f04c63cb11861c56569690d705kernel-3.10.0-1160.99.1.el7.x86_64.rpm823739028f271b72b7c0eb70e840c904a8b2c7fe1a757ebe819051befaac9a4bperf-3.10.0-1160.99.1.el7.x86_64.rpmabce41dd1aee77f661942497306545ac92cb95691348aa373cb66d2ba7ff333ekernel-tools-libs-devel-3.10.0-1160.99.1.el7.x86_64.rpm60f1ab6f6adb06f4d334331206fa7a46354fb75c8c10b467c569acdcd60356f0kernel-tools-libs-3.10.0-1160.99.1.el7.x86_64.rpm7547e301ec4b71ab1cd94b53e76d74b88fcc61a279c782d4e4184374ab2db0cekernel-devel-3.10.0-1160.99.1.el7.x86_64.rpmcd25d361321788c310c1156e50d2441ae63062eedaf5210068a9261acff274edbpftool-3.10.0-1160.99.1.el7.x86_64.rpm3337d4a5bc9064ab0ff906f5ef8ce2a5f97898ed0755a9d76b507f6797caad8ckernel-doc-3.10.0-1160.99.1.el7.noarch.rpm40076f29ea2adeb4fc645a3173cce4ffbd86b82d3feb16cdb794d8db0df3e4f6SLSA-2023:4945-1ThunderbirdThis update upgrades Thunderbird to version 102.15.0. Security Fix(es): * Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573) * Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574) * Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575) * Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585) * Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051) * Mozilla: Full screen notification obscured by external program (CVE-2023-4053) * Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578) * Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580) * Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581) * Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.15.0-1.el7_9.x86_64.rpm46e739eeccfcee1be1adafb14c695e142b04362af9b6817cbffaed4730cfd694SLSA-2023:5019-1FirefoxThis update upgrades Firefox to version 102.15.0 ESR. Security Fix(es): * Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573) * Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574) * Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575) * Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585) * Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051) * Mozilla: Full screen notification obscured by external program (CVE-2023-4053) * Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578) * Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580) * Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581) * Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.15.0-1.el7_9.x86_64.rpm61891cfbf073416bacb946e6277177b91a65036cbce448a4d9487b556e7962f4firefox-102.15.0-1.el7_9.i686.rpma877db6eca1e072036ca6240b94335741438f65df125fbeb18d97deb9d69bd51SLSA-2023:5191-1ThunderbirdThis update upgrades Thunderbird to version 102.15.1. Security Fix(es): * libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.15.1-1.el7_9.x86_64.rpmba267354f3ea78058c39dc9a97779e0b13a6b2171755048856938aa03992073bSLSA-2023:5197-1FirefoxThis update upgrades Firefox to version 102.15.1 ESR. Security Fix(es): * libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.15.1-1.el7_9.i686.rpm85ef44035e869811a3f97325047aea5e33af2c1caabda824e7776c13b5ad9d4efirefox-102.15.1-1.el7_9.x86_64.rpmb4551ac8b815861793286454e211a169412783791af0ba5c020e2a9e36f12a88SLSA-2023:5217-1Open-Vm-ToolsSecurity Fix(es): * open-vm-tools: SAML token signature bypass (CVE-2023-20900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7open-vm-tools-test-11.0.5-3.el7_9.7.x86_64.rpm823f5bcaaa0eb97d719b79e3db244c2dd67d202054be1d9caef4383f73acc19fopen-vm-tools-desktop-11.0.5-3.el7_9.7.x86_64.rpm6abe1fc243914c55f8b9c4a529ee935f0c75fb9d8249afd6de81c1b72b9c160dopen-vm-tools-11.0.5-3.el7_9.7.x86_64.rpm5a7d14bd74c028a57867ba8c1d1ba693c9dd4a71176b504fe402adceae895764open-vm-tools-devel-11.0.5-3.el7_9.7.x86_64.rpmb9640d3d9d1264d159ccd03d4dc2a7ebd04170172e455b679e8c2046765becb7SLSA-2023:5461-1ImagemagickSecurity Fix(es): * ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS (CVE-2021-40211) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7ImageMagick-6.9.10.68-7.el7_9.i686.rpm88d53e3471be404073aacd2022f843d43aa504f504e01aaa542f1dfce7c30ef4ImageMagick-c++-6.9.10.68-7.el7_9.x86_64.rpmf1ef8a6d1457af646a1c6dc6f4c946a41d36b8fc073c2f40982be49691898167ImageMagick-devel-6.9.10.68-7.el7_9.i686.rpmb6bf0c4cc6844c9403adc6d56117609c51ee7422f0d38ee24b914f721b7208a9ImageMagick-c++-devel-6.9.10.68-7.el7_9.i686.rpm1935210bdf75f03b17edbea60aafce80c36c751efbd7e710642bb3f47338a94cImageMagick-6.9.10.68-7.el7_9.x86_64.rpm7aed22ca7f0431ae1c663475b14a974c97ff1c8acd8be1903ed9e103c637f3a2ImageMagick-perl-6.9.10.68-7.el7_9.x86_64.rpmfb473c30a12109a02292af2b0109fa82b076c6c1868be07bedc1bb9fb743c208ImageMagick-doc-6.9.10.68-7.el7_9.x86_64.rpme66939f63c2e5a10e45ff7583c0f6a5e66a7f2b92e8cf14ac6ef2a3b552b46d7ImageMagick-devel-6.9.10.68-7.el7_9.x86_64.rpm9bd618b50bc740fe658ac25a4e8f4a2d683ccd4104c8c0f84652b388c2b5a03dImageMagick-c++-6.9.10.68-7.el7_9.i686.rpm2ceb28d62d9233df28ab04ede1331fc5e70c2e1a400e8c179b1a0486b14774d3ImageMagick-c++-devel-6.9.10.68-7.el7_9.x86_64.rpm554f282b8a2f8ecda2b76fa9b51b4b9e2121579f5e4ca9ff1aeea6576a298136SLSA-2023:5475-1ThunderbirdThis update upgrades Thunderbird to version 115.3.1. Security Fix(es): * firefox: use-after-free in workers (CVE-2023-3600) * Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169) * Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171) * Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176) * libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-115.3.1-1.el7_9.x86_64.rpm8cab323b2f5657da63859e1c00c841e58c2d089d5cf0fa15633f5065c28579deSLSA-2023:5477-1FirefoxThis update upgrades Firefox to version 115.3.1 ESR. Security Fix(es): * firefox: use-after-free in workers (CVE-2023-3600) * Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169) * Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171) * Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176) * libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-115.3.1-1.el7_9.i686.rpm7f4e2228d5d9d2949d16d30256d62fd9bf0ba6b0a2e2d47fe78ce28140e53ef0firefox-115.3.1-1.el7_9.x86_64.rpma4a269e22d3ff050ca22f748f613c9a75f87601b4c6f69dd657bb3e7bef41aa0SLSA-2023:5615Moderate: Libssh2 Security UpdateThe libssh2 packages provide a library that implements the SSH2 protocol. Security Fix(es): * libssh2: use-of-uninitialized-value in _libssh2_transport_read (CVE-2020-22218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7libssh2-devel-1.8.0-4.el7_9.1.i686.rpm009dbbbfdc6c1bbc675cce7495a9e81969032fc5c5ae59d06f1e05bd10769440libssh2-devel-1.8.0-4.el7_9.1.x86_64.rpmceafa4b990b4ff47b9232a9544bc5b7396e6d9300a0c4bcdeca6ba4ce1371521libssh2-1.8.0-4.el7_9.1.x86_64.rpm6f0a7a53236ae0d600edfd672bc8d32fae6195edefd1680fd75ef358115faf10libssh2-docs-1.8.0-4.el7_9.1.noarch.rpm650f40d7ebbeca8d4c1ac5d73e0e22f5a985ad0880700d6681a2bd5ac77d5a87libssh2-1.8.0-4.el7_9.1.i686.rpm5a3128e54547a71535b164de231c5b3027ed4ca833aab74478d77d773b81b146SLSA-2023:5616Important: Python-Reportlab Security UpdatePython-reportlab is a library used for generation of PDF documents. Security Fix(es): * python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7python-reportlab-2.5-11.el7_9.x86_64.rpm6aa94a449302c953ce792df4055fc1a3f90f43a4331b8f20449ad3cf5b7372ffpython-reportlab-docs-2.5-11.el7_9.x86_64.rpmcb7cee39beb801352402cce7e897d37a3dd27f7214894296337b6406712eec8aSLSA-2023:5622Important: Kernel Security And Bug Fix UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609) * kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233) * kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Low memory deadlock with md devices and external (imsm) metadata handling (BZ#1703180) * cifs: memory leak in smb2_query_symlink (BZ#2166706) * bnxt_en: panic in bnxt_tx_int Redux (BZ#2175062) * NFS client loop in BIND_CONN_TO_SESSION (BZ#2219604) importantScientific Linux 7python-perf-3.10.0-1160.102.1.el7.x86_64.rpma575dc41a38b86ba6a5810695c921e7619e1e2f3cc851b7191772556c8445fc6perf-3.10.0-1160.102.1.el7.x86_64.rpme13f03ef1dbecc2f0401b1d2d37cf13112668a74de4528e3699c9162e000fce7kernel-3.10.0-1160.102.1.el7.x86_64.rpm8456ae2be668b8c01e3404760d5c5c20101fe93cc7e475a9add9e165bcb8744dkernel-tools-libs-3.10.0-1160.102.1.el7.x86_64.rpm955dfd4ad62fbde7414671c80983250683118e07db34d953eb2b2728dacb38efkernel-doc-3.10.0-1160.102.1.el7.noarch.rpm5c92588d3271e91f0d85560f158e9b6e7b04446a911c436632f0518e2d136901kernel-debug-devel-3.10.0-1160.102.1.el7.x86_64.rpmc8586683d09e71c02c70d426ef7e7968c7685ed3df97d3ae02e6476bac054c26kernel-tools-libs-devel-3.10.0-1160.102.1.el7.x86_64.rpm7a4a9eba9ac8bcd99d3892f35744aa1687f3d631a3841e2e8eb62ed0bfd4874ekernel-devel-3.10.0-1160.102.1.el7.x86_64.rpm2b3eac029ce5cc3ebe613fd987c2cc5755ed4b779f64aff27e1dfdfb8651771cbpftool-3.10.0-1160.102.1.el7.x86_64.rpmf2ecdcd661c5d2880bc243b18d61eade1612a0fa12d1e2b646f53fc4c481f458kernel-tools-3.10.0-1160.102.1.el7.x86_64.rpm394b4a4157f66ce62e0972a0a55cce0f9d2db44d925e09490d2810081f0b0d5ekernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm7b4094d89b5e84246ea6c31607f1f362da35b5932c63d97df6dd14b608238b9ekernel-debug-3.10.0-1160.102.1.el7.x86_64.rpm7ee96c98d694bbd669f5882f922b4b663d951d2fcfe07d7831e4e2e96e9cd8f9kernel-headers-3.10.0-1160.102.1.el7.x86_64.rpmfac89ec17332ba89ae0a8080edf732968ba6e1e16be9254c43f7a771fce7a164SLSA-2023:5691Important: Bind Security UpdateThe Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7bind-license-9.11.4-26.P2.el7_9.15.noarch.rpm1f2d553f8f24279612612680dbafddface901a6d1452b5d34a6ad88af38757f1bind-export-devel-9.11.4-26.P2.el7_9.15.i686.rpm95f585ef51d565420ddfe4b9dfce1622d3792cbf10af8d2c3f548d9b63d2eb8ebind-sdb-chroot-9.11.4-26.P2.el7_9.15.x86_64.rpm58471fb7e9d0ccf639ac4ebeddc9b966a23875505b5bbf4368e9080cf8c0ae39bind-libs-9.11.4-26.P2.el7_9.15.i686.rpm5df9ba6db0f2f8cc95f80fe842f43c409bd92b8c1a2d765ebfe2c0c6d50701ffbind-libs-9.11.4-26.P2.el7_9.15.x86_64.rpma168ea75edb8a7b39c15699c8febed2520ea1d99df02fa2d5440beaedaceeaffbind-export-devel-9.11.4-26.P2.el7_9.15.x86_64.rpmb32d0d507b984496b55516e0ec02eeae22030905f6ef8b74080722f0adde637bbind-devel-9.11.4-26.P2.el7_9.15.i686.rpme6650a58dc11021770d67bb32617b4c04540d9df62c721351acc7726ece9d3bbbind-pkcs11-utils-9.11.4-26.P2.el7_9.15.x86_64.rpm4eed10bb667dfc4971c95d9d93ade897fe93c4e7d221b8393462eee7501e150cbind-pkcs11-libs-9.11.4-26.P2.el7_9.15.x86_64.rpma705ea82b76f5ecd7c4632abc398745bad874d9cf14e0a674fe2cb9e1e1d6644bind-9.11.4-26.P2.el7_9.15.x86_64.rpmba891837c78bb03773d1b1e143a6769cefab02d2de47807948e69b783a397df4bind-sdb-9.11.4-26.P2.el7_9.15.x86_64.rpm6513a176e8b138a53fceecbe776c3b65ea4f31f8335eb485cb3334f05093fcb6bind-pkcs11-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm06992c1c6d9fa589d842073956eee1be92738fbd0b353a7e3b67774051cb42d3bind-utils-9.11.4-26.P2.el7_9.15.x86_64.rpmb10a650abea629a5b6e188287df5a45bc11e4147ea40dd087fe5d7c498183260bind-export-libs-9.11.4-26.P2.el7_9.15.i686.rpme1502396e3614ad3a8c7e51b30ad949380482473a8260a9391252c04c20c200ebind-lite-devel-9.11.4-26.P2.el7_9.15.i686.rpm4d7662bc5de69a43871484c65c73012998fb326d2e1cc770fb35ae5fffd5e995bind-export-libs-9.11.4-26.P2.el7_9.15.x86_64.rpm35fbd8117dfd541a110aaa5a30912cd15872f4701d9ce9e1e4dad76ad0f6d6bbbind-lite-devel-9.11.4-26.P2.el7_9.15.x86_64.rpmff3504db59f1af9765994d69f88c383447c70bf6ba23d3775d061be66e631191bind-chroot-9.11.4-26.P2.el7_9.15.x86_64.rpm1b044d428ce288b1b20083566f75f11524349db9fd060aae6b4ea7df2dc3ff4fbind-pkcs11-libs-9.11.4-26.P2.el7_9.15.i686.rpm6f4720e6664eab7dc8c0b9d43b52c1c577e2bcee1336234ab36079cefb81a7cabind-libs-lite-9.11.4-26.P2.el7_9.15.x86_64.rpm076d2419997ecf088330d9c732e699549026def60522c69730109edc94bb4f2ebind-pkcs11-devel-9.11.4-26.P2.el7_9.15.i686.rpm715efff7432a568ce183f654b9f4c69350cd92adaec5bef9ddebb74d29a9de10bind-pkcs11-9.11.4-26.P2.el7_9.15.x86_64.rpmbfac0bd5c2364efc678b08c266cee4929ec9b582f7c50a80ace8ffb28ac46738bind-libs-lite-9.11.4-26.P2.el7_9.15.i686.rpm51bfe6c18c927b4aa3922c703401d708be836b3bbb7d485f136e374abf132a67bind-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm9bc7a0fda0b7aad5df7f421582b7fe6f585daf922054aecccb961c1122878d2aSLSA-2023:5736Moderate: Java-11-Openjdk Security And Bug Fix UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 11.0.20 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 11.0.20.1, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true. (RHBZ#2236229) * A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. (RHEL-13217) * The serviceability agent would print an exception when encountering null addresses while producing thread dumps. These null values are now handled appropriately. (JDK-8243210) * The /usr/bin/jfr alternative is now owned by the java-11-openjdk package (RHEL-11320) * The jcmd tool is now provided by the java-11-openjdk-headless package, rather than java-1.8.0-openjdk-devel, to make it more accessible (RHEL-13227) moderateScientific Linux 7java-11-openjdk-debug-11.0.21.0.9-1.el7_9.x86_64.rpm852d5ebdda7e6e0a361e70d04a503a6103768771503e8bfd5106681681622faajava-11-openjdk-devel-11.0.21.0.9-1.el7_9.x86_64.rpm31573a285a0ce978a16cd2c795a604c932b450d1b870ff837c33674d71d21c44java-11-openjdk-devel-debug-11.0.21.0.9-1.el7_9.x86_64.rpmd5958af0dfdc7c5b371b50cbbc421223629494c767cd923987398b82b7dd5a47java-11-openjdk-jmods-11.0.21.0.9-1.el7_9.x86_64.rpm83585a3bbadda28e6c98442d96aeb494f16729be4b77d8c9e5d25bbafdf96187java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9.x86_64.rpm65299f6ccbee7059e1542ca7db8d3e8f4885c2e26734d3a3a1ccb76529d2cd64java-11-openjdk-src-debug-11.0.21.0.9-1.el7_9.x86_64.rpm99a2016d3f40a3ccd73128756b22f143a8b9cfcf585acb5ed46b81468717af8cjava-11-openjdk-headless-debug-11.0.21.0.9-1.el7_9.x86_64.rpm2f1424773b3bf97109decbfbce83982ef90361700ca9bcd4e6c483ff7abfdd65java-11-openjdk-headless-debug-11.0.21.0.9-1.el7_9.i686.rpm867892df7b5ab9817c033f87d563690c8decdd9907f0932f66ad4827115b8394java-11-openjdk-devel-11.0.21.0.9-1.el7_9.i686.rpmeef4f88bea160aa6f3c213e3a3f8ffb7505ba8deacbde9871ea272046d1770d9java-11-openjdk-jmods-debug-11.0.21.0.9-1.el7_9.i686.rpm2b789ee027e297e9f6070c80624d1710aa44a1186f3d9ea81156ba947af7c62fjava-11-openjdk-javadoc-debug-11.0.21.0.9-1.el7_9.i686.rpmc87e82c8da8b407bd91a6b8c354ad494e4866a636fc9d58b6f5b7888279aaa53java-11-openjdk-javadoc-debug-11.0.21.0.9-1.el7_9.x86_64.rpm7dd0a1317bb451d71bf25e6898de171800448281ad5865fac3aba2361ab4797ejava-11-openjdk-src-debug-11.0.21.0.9-1.el7_9.i686.rpmef60fc8284635089a6a4e90a3daa4f7568066e984c8a935e3b4c7911df3fe7e4java-11-openjdk-static-libs-debug-11.0.21.0.9-1.el7_9.x86_64.rpm73236b4177b331b6182ded512b3964293092c169af420ff89e0d1ea0c0894d5ejava-11-openjdk-demo-debug-11.0.21.0.9-1.el7_9.x86_64.rpm83b5369cb37704d4e8c55b13b69c71835e5cc208df9b266211dcff06d9dd8010java-11-openjdk-src-11.0.21.0.9-1.el7_9.i686.rpm3fbd264abeb17ed7058526340788bdd44ed40eee3cd6a3c2d9b66a2dcb3fe4adjava-11-openjdk-11.0.21.0.9-1.el7_9.x86_64.rpmca02127332588becfad797011fbeee87663499d1d05caea52f61697392e69cf8java-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9.x86_64.rpm9b7f0e8d335fd74f8cda722e4cc0e1fc3c7afc98c03dae7b7982cb1fede98301java-11-openjdk-jmods-debug-11.0.21.0.9-1.el7_9.x86_64.rpm27fe7c8fa43755c6207dfb71ab365fdba13452d5d08a16b8282eeaaac791eacbjava-11-openjdk-devel-debug-11.0.21.0.9-1.el7_9.i686.rpm79d52c2faa70d6c36fe8db4c76d02c669be81949390abb2bbb2eec606adfc1f1java-11-openjdk-static-libs-11.0.21.0.9-1.el7_9.x86_64.rpmcbdd1d4c981960e812db20fc18392044094608c8aa47d1797342dc1fbaf647dcjava-11-openjdk-demo-11.0.21.0.9-1.el7_9.i686.rpm17b85cd96008ab269b824ad60eb2387310af37ef49ff057620299647190fd6cajava-11-openjdk-demo-11.0.21.0.9-1.el7_9.x86_64.rpm6b64894d3055d23192b286d5a29f1dbaa42b94c0639a14aee9e48e6d908067bfjava-11-openjdk-javadoc-zip-debug-11.0.21.0.9-1.el7_9.x86_64.rpmf7a2f24c0a950cd6be1535aefb47f15088778c8a20a4323b69874539a109fcf0java-11-openjdk-jmods-11.0.21.0.9-1.el7_9.i686.rpm532b08c6ba673d428336e8cad5d42ce0de15065f218a93190949fddf858060ffjava-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9.i686.rpm70170123103b1590d4a9330b995f642a10d677ec34ca872adb927d829bdcebbdjava-11-openjdk-debug-11.0.21.0.9-1.el7_9.i686.rpm88a4f0f227ded151ac7a1aa4ab1e538f2cc8314eef93b08bc14681e148db3732java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9.i686.rpmf5cf09cf91f67fa17b9023ea064e84edb5915a6e5958cfb3450b5a77ac2c9d49java-11-openjdk-src-11.0.21.0.9-1.el7_9.x86_64.rpme602c08e8604c159064411ae0655ee92d7b6422abbef5c7a13e27fc2ee92dc8ejava-11-openjdk-11.0.21.0.9-1.el7_9.i686.rpma16956c879fd4befa343beb4eb1af596f2925cdaa0a5b6fb03a364593a9ed314java-11-openjdk-headless-11.0.21.0.9-1.el7_9.x86_64.rpm0569be2009302b5f1b9d2728285d563a1d031340591b2054384502482a17e1a5java-11-openjdk-demo-debug-11.0.21.0.9-1.el7_9.i686.rpmd6469bf88d85c6c3a1e20039bda579eec4957c26e68e223d554cb82bbf0774f7java-11-openjdk-javadoc-zip-debug-11.0.21.0.9-1.el7_9.i686.rpm451678b8e4f2b5e8f619def5c5b2f079f2e68683c07db695bddccfa0200f0e71java-11-openjdk-headless-11.0.21.0.9-1.el7_9.i686.rpmb9c4db2d2ae4a6d14d207725a0914da14ad214c0ca4081436debbf9441af8011SLSA-2023:5761Moderate: Java-1.8.0-Openjdk Security UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: IOR deserialization issue in CORBA (8303384) (CVE-2023-22067) * OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. (RHEL-13576) * The /usr/bin/jfr alternative is now owned by the java-1.8.0-openjdk package (RHEL-11319) moderateScientific Linux 7java-1.8.0-openjdk-debug-1.8.0.392.b08-2.el7_9.i686.rpm6d4e5f1ff90bc3c870c319b24b7cdbd0581bf1884eeee55a3a867103989da885java-1.8.0-openjdk-demo-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm7b531fc824bc53d0abb38ba0e791591b64025ea9089eaa65ff216419a6197b46java-1.8.0-openjdk-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm4b7ee7cb710573dbea4fb24a1c749a2b9434f35bb36626d86a8a59ecc96fdf70java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9.x86_64.rpm8951375cb2e20465100207c6130e226777bfce5762d57b3223467d98f2aedaa7java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9.i686.rpm0ff901d0c87829836df0499cc8f050a7c78aab35a06ed4bdeb4822feea48ec25java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.392.b08-2.el7_9.noarch.rpm8bde934721aa324b5b9764220e0c1b962de3f0855fe5e23b3a5dbd585bd704e3java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9.i686.rpm2efe8409b7d03beac4ebd8b78af58260d081ba1ff32fac107cf0ff2d4ead4c67java-1.8.0-openjdk-demo-debug-1.8.0.392.b08-2.el7_9.i686.rpm26d16630cfa11ac24776e2b350acda9a0a37b984a14d9fe092f79a94e23e691bjava-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-2.el7_9.noarch.rpm634b546eed00b6c45a2840094ba4420ec53b8c3de17c653d20d8a988dc9b84c7java-1.8.0-openjdk-headless-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm3c97d5503a057f4f3c9b0f824ba80233b203a547b12643351a388d5cfc8ca5efjava-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9.x86_64.rpm2b7ca53c76ffc6276f180e58660b5ac5001598d6c8065f75813d0623850e353bjava-1.8.0-openjdk-devel-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm5cd42567e4d7a4f162c012cf15c361cc029ea6600566e5d92133824af9c4cdbcjava-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9.i686.rpmc60dba6b1acc4e87d7e438c23c5c580b6eb35568518b8b4e85cd5150ac9aa13bjava-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9.i686.rpm79007f62ab4acc856f5c43abe124c3bfaa357cb9a3eddf7a495e20b322a61d54java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.i686.rpm519a0eb6d8b1904eb1654b9d3629bf6602005d4f48cb753c5b3f7f1030d4b0bejava-1.8.0-openjdk-accessibility-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm8bcb60f5f3ae465e3b17b6909719e446f3d8adaba73bfed62cd66c95ec743b91java-1.8.0-openjdk-javadoc-debug-1.8.0.392.b08-2.el7_9.noarch.rpmf4362e1341e135258824db551a80726f36017494058809085f93b2c69db69449java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.x86_64.rpm4f87d75a902f3896ae48e19f294116d334a09d032d925c4377cebf534b7c3bb0java-1.8.0-openjdk-headless-debug-1.8.0.392.b08-2.el7_9.i686.rpmd5ed498c8a3b53ec876d437bf2b245542e10de259dd96b786e1d91a0b4229873java-1.8.0-openjdk-accessibility-debug-1.8.0.392.b08-2.el7_9.i686.rpm47777a46061d05d7fc4a847b92468c40a80dcd64e4f8568e50c4cd67eaa60a31java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9.i686.rpmac9c0d53c1758d6d034d7f7239a2880d166ae8826ed99ea84d6ee622894f58e6java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9.x86_64.rpmf506e6ef5df5605321d537f68ff40d42d711a6f209d68556661d5e2a3c719eaajava-1.8.0-openjdk-javadoc-1.8.0.392.b08-2.el7_9.noarch.rpmd6086529ae7184f6ec7febbe66827324e584b18ad408731b120628934aab753bjava-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9.x86_64.rpm929ca13dd5b34103354a198b3a1734d85fb4db61b2e3e4f1025a2fc4baefb9c0java-1.8.0-openjdk-src-debug-1.8.0.392.b08-2.el7_9.i686.rpmd634bf2b90dd1b8177b18892fdb09d02ba538cf1810c5ec84d01aa5170293661java-1.8.0-openjdk-src-debug-1.8.0.392.b08-2.el7_9.x86_64.rpmff953990d41ff63f07054e8d929eb6e417835271f48fa6e9c67eb22bc65928f4java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9.x86_64.rpm4083134d733b18d2b411902de71ee6684bdd9f719b2bab0e490ba3810f0e8acbjava-1.8.0-openjdk-devel-debug-1.8.0.392.b08-2.el7_9.i686.rpm5117393083e60828018763fbccd46a6ec79b4761d11e92c2927edf5a9817a79aSLSA-2023:6162Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.4.0 ESR. Security Fix(es): * Mozilla: Queued up rendering could have allowed websites to clickjack (CVE-2023-5721) * Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 (CVE-2023-5730) * libvpx: crash related to VP9 encoding in libvpx (CVE-2023-44488) * Mozilla: Large WebGL draw could have led to a crash (CVE-2023-5724) * Mozilla: WebExtensions could open arbitrary URLs (CVE-2023-5725) * Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. (CVE-2023-5728) * Mozilla: Address bar spoofing via bidirectional characters (CVE-2023-5732) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.4.0-1.el7_9.x86_64.rpma2818ee16f2bfb49528f3b587a82a53d82d9f516d64e9f27e4e63949ed6ead0cfirefox-115.4.0-1.el7_9.i686.rpmc464ce10d380ecde30caa7b063c2748fa296105fd15a56027d421fafe3f01c5dSLSA-2023:6193Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.4.1. Security Fix(es): For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7thunderbird-115.4.1-1.el7_9.x86_64.rpm4f12854f23f8507d9d17cd74099d024209bb120fc19de04179bb106de2b5f4fdSLSA-2023:6802Important: Xorg-X11-Server Security UpdateX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7xorg-x11-server-Xnest-1.20.4-24.el7_9.x86_64.rpm8b3af76b71595eafb3bc9e2357ae8f623eb7423afb54d8d73e655cf62dd808abxorg-x11-server-Xephyr-1.20.4-24.el7_9.x86_64.rpmf9b4df66849c9cc337987ce2622fa0ab9a8c46dda81aefd4d0ea9aa97c307c7exorg-x11-server-common-1.20.4-24.el7_9.x86_64.rpm1c89d6eb315ad483c31508533e687d1886a5ac9f57027d6c3c4cb64f2bcedf88xorg-x11-server-Xvfb-1.20.4-24.el7_9.x86_64.rpmdd61c82ae5cdd1ef658d696d111e1924727a8253be6b5905944ae86e34381783xorg-x11-server-devel-1.20.4-24.el7_9.x86_64.rpm85a7f65d174bf3a9d3be9759e63fa4770c1d49af7c2b2e821c07b370e766d381xorg-x11-server-devel-1.20.4-24.el7_9.i686.rpm75848218f62955bc8d5de3dea78d57d0c7e8a363d2126c2fa154ee40db68ac9fxorg-x11-server-Xwayland-1.20.4-24.el7_9.x86_64.rpma7658c5cc062175358e0b62294a8999b0327f5d1f60ff76b58c4684e489fb916xorg-x11-server-Xorg-1.20.4-24.el7_9.x86_64.rpmb529043f249d8d59b71689536112144a2b460d400e0eabf614db73c2f90c30ebxorg-x11-server-Xdmx-1.20.4-24.el7_9.x86_64.rpm08309adbef8892114d0d25caccb90286fb43ff27a8c8c93d53e71ac76c6b5a93xorg-x11-server-source-1.20.4-24.el7_9.noarch.rpm1846a73cc6684722f4bfcf6da7d2b6658bf132ac87414e2432e8d25b86ca5505SLSA-2023:6805Critical: Squid Security UpdateSquid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. criticalScientific Linux 7squid-sysvinit-3.5.20-17.el7_9.9.x86_64.rpm215cd76ccdf876aba2684bea20ee92b1b8e95e92e092dbb9eb2e24cd2d61cb9dsquid-3.5.20-17.el7_9.9.x86_64.rpmd9400d537dffeb41d81419bb5a6de65cceac4c2cfcafcbcc36519e0880e4a60fsquid-migration-script-3.5.20-17.el7_9.9.x86_64.rpm693170496ba38a2921ad1cb175cf751dc80ec6fb94e7f444747e6e6aa866cf66SLSA-2023:6823Important: Python3 Security UpdatePython is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: TLS handshake bypass (CVE-2023-40217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7python3-test-3.6.8-21.el7_9.x86_64.rpm003c6c9c7020b4c7692c2c1c69cca45f48cf8a3c25e191b468b87bee36d73ca7python3-devel-3.6.8-21.el7_9.x86_64.rpm44c4e07a148f340dd3fc28d49493897663eb3f715ca54d8bcfaf17b4098106d9python3-3.6.8-21.el7_9.x86_64.rpm399a05764db67bc42803f45bb1b1b9133ebec0ea4140a6592d811e787f5eafc8python3-tkinter-3.6.8-21.el7_9.i686.rpm7911bfb953c2e1231eee3b516010f4dbefb5bff7d05dde735b844d64744b0f1bpython3-libs-3.6.8-21.el7_9.x86_64.rpm07b358ba123d2092e863ad59356750f8a6b69242c2941651e6e05f65070ecf1bpython3-devel-3.6.8-21.el7_9.i686.rpm0a91791ffb00ea9c47b1ff8e4611adf9887a58dc50276b6f60770f0cc764fad5python3-debug-3.6.8-21.el7_9.i686.rpm7d01ff505a3b881128ff44ad0e889ac1be03d859366fb033096dfa17438fc063python3-debug-3.6.8-21.el7_9.x86_64.rpmd9e4f392ed5495d446a99746a8dcb296d542ab66f9b30892168b1ff0a841c1e0python3-idle-3.6.8-21.el7_9.x86_64.rpmf20da14ddb766b44e71d481c3d622a541f9d744d2e2f4886e78f3e6fea63706dpython3-idle-3.6.8-21.el7_9.i686.rpmd7db2cdbb53476bcd10b225cf13884b9c299ef8fb5193a3abbf719e9fcd1e5c5python3-tkinter-3.6.8-21.el7_9.x86_64.rpmcb7dc766ba29afe689685ec4027d4218f2f3741409027162e8b129617942fd08python3-libs-3.6.8-21.el7_9.i686.rpm4c538f38c63d09975be3e3665a9eb615a5ba026664e6904beebcb6cdad32439fpython3-3.6.8-21.el7_9.i686.rpmfdcc1331f8c544a07788a0de89bf6181901458deac5b6eb506282f8637672f5cpython3-test-3.6.8-21.el7_9.i686.rpmf751495dad7bae107ae8919706d9e764fdb53654e81a5f33aca49726c6ef2d54SLSA-2023:6885PythonPython is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: TLS handshake bypass (CVE-2023-40217) --- This content is derived from https://access.redhat.com/errata/SLSA-2023:6885importantScientific LinuxScientific Linux 7tkinter-2.7.5-94.el7_9.x86_64.rpmb5b12bc491c983056da3d1bdf7a91feaa35bfa4efd8a905df65b2b9d575cb3e8python-devel-2.7.5-94.el7_9.x86_64.rpm7c8420d15e676e7537aa0c3a8583b385f774ca4f3d4b672d9375ad456373beb3python-debug-2.7.5-94.el7_9.x86_64.rpm6237b6e4118e2a52df74dab852be4a7bdb1939ad74bb4dcd67047203cd1fbdffpython-test-2.7.5-94.el7_9.x86_64.rpm52990a46e591ce98221560cfe2f7a892b9569c43b81c27e4d5b3ac8cb9711ae8python-libs-2.7.5-94.el7_9.x86_64.rpm4cc413074240bc16ce253acf8d95c1b13cb2488bb26346231fc3608c3518c367python-tools-2.7.5-94.el7_9.x86_64.rpm92eb690460d473bc548c0e792d41f57cf478f33857589c4f9d3d53abfa40fd30python-2.7.5-94.el7_9.x86_64.rpm3dc36426859b8749f3533a2417d688a30c7046388dc97788081ee1d3a862fa50python-libs-2.7.5-94.el7_9.i686.rpm1036daab80d95a984294968dd161f04ef98733546f39e22485bdfaa75a905b48SLSA-2023:6886Important: Plexus-Archiver Security UpdateThe Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives. Security Fix(es): * plexus-archiver: Arbitrary File Creation in AbstractUnArchiver (CVE-2023-37460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7plexus-archiver-2.4.2-6.el7_9.noarch.rpmd4c40b7fcd518ff9c13322420bd4e38055be3009a0bc846abb5e604a27abddceplexus-archiver-javadoc-2.4.2-6.el7_9.noarch.rpm427b6286b12481cfd22c1f1d8857aee030e72469a4d5e1343b77fd0bf028e2c4SLSA-2023:7279Important: Open-Vm-Tools Security UpdateThe Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: SAML token signature bypass (CVE-2023-34058) * open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper (CVE-2023-34059) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7open-vm-tools-test-11.0.5-3.el7_9.9.x86_64.rpmd3c481bf0ca3f463f9c194381f37b1aa29795ae5b2a16d6bf93066b1dcc3e299open-vm-tools-desktop-11.0.5-3.el7_9.9.x86_64.rpma8808cfcef5c51215d5a6859ac8970fece174ce74b28d00b3fdb3b9b4c5fddb7open-vm-tools-11.0.5-3.el7_9.9.x86_64.rpmd178a2ea870f10652fcbe438a7d80518b3e263596e90e6e3ac78ce786c60162eopen-vm-tools-devel-11.0.5-3.el7_9.9.x86_64.rpmb894408477d4d6e9d7bbf1ac573dd8ce2b91745916e216fa276749d9bb15c816SLSA-2023:7423Important: Kernel Security UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead (CVE-2023-3611) * kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) * kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208) * hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7kernel-tools-3.10.0-1160.105.1.el7.x86_64.rpm2626b9dfed1509c5d518ab7f6c6aafdc2ac1003e85a7a341680dbf082eb675delinux-firmware-20200421-81.git78c0348.el7_9.noarch.rpmdf92d3c5083d8aa8892d0c60397f4e5ed92f19b8e1cb20967370262dc6513906kernel-3.10.0-1160.105.1.el7.x86_64.rpm17f6ff299f9ee45086367edcb5312448b91b08287558b87397e3adda04189482kernel-debug-3.10.0-1160.105.1.el7.x86_64.rpm529ccc3acba2d1f77afe89b0e91415cf2df73c41a2fc65cf81cd93e6412f4dd2kernel-tools-libs-3.10.0-1160.105.1.el7.x86_64.rpme0d906e1caf586eeb54910cd1ab6941fc9188f6f87644ca7e944614102be189dkernel-debug-devel-3.10.0-1160.105.1.el7.x86_64.rpmef9efb4624b6383bf095ea126f9c83db7e2d75c24641d224f821f315e1ce52b9kernel-tools-libs-devel-3.10.0-1160.105.1.el7.x86_64.rpm6c01fddfc2f36476e1615b0037ab28f12c8b23d55570d44fd276f09ba30c9806kernel-abi-whitelists-3.10.0-1160.105.1.el7.noarch.rpm91b1b60b76eed2a552f5780def812b0b560ac6053d08ce4de2f200898c4506f6python-perf-3.10.0-1160.105.1.el7.x86_64.rpm59b5a6771869a09d85d43c7899cdd647e6d6f1a44d252c140747089c1d7c9e6fkernel-devel-3.10.0-1160.105.1.el7.x86_64.rpm6dbe2b4a6bbc85bc3526043ccc99b836dc91f22c4f70b35ce9177f908a219f0fperf-3.10.0-1160.105.1.el7.x86_64.rpm44f8e68a25de3ca31ab898319a0768308bf36a22ebe83aa04855d0f77f572249kernel-doc-3.10.0-1160.105.1.el7.noarch.rpmd9a95a80164f06a428809429fc003aa85748cdcd17e4d2df6d5e56ebe7104470bpftool-3.10.0-1160.105.1.el7.x86_64.rpm194c7f40dbdce9e5ad2d9e9ac561404c7e38531b1de65216289fefaf22857bf0kernel-headers-3.10.0-1160.105.1.el7.x86_64.rpm5ade4d77f73184c7baf9df4f1a6bf22a1a19813ebcff5c24561c9631c104611fSLSA-2023:7428Important: Tigervnc Security UpdateVirtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367) * xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7tigervnc-1.8.0-26.el7_9.x86_64.rpm998439e463a45278039ae8c8d47baeaf104aadf5ae3e203f1e6e63dd74787c64tigervnc-server-minimal-1.8.0-26.el7_9.x86_64.rpm7b1cdc67c45fb5b81f7323467f567268cea46b944ecc148c8fd33ba14cd59ceatigervnc-server-1.8.0-26.el7_9.x86_64.rpm1d138a871600959bbe9892e61b525cfa71389c2e40afb487bffe47c94cba0450tigervnc-server-applet-1.8.0-26.el7_9.noarch.rpm996d53bf0fdc75fd9c57dc7de4e7147fc276b8554bad6d70847605d3abcd1565tigervnc-icons-1.8.0-26.el7_9.noarch.rpmef6956ab3eaa71c40204278fba657f27c0e11df730a3f7847c3c640946ce5e72tigervnc-license-1.8.0-26.el7_9.noarch.rpm2aa6154d19d1ed9182e8c3b9d302b06424744ff0679ec404402d90d42ec0dc59tigervnc-server-module-1.8.0-26.el7_9.x86_64.rpm382433626ff6aebd55f5916957ee588933b97e128b2426a81a0bc9879d476b12SLSA-2023:7505Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.5.0. Security Fix(es): * Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204) * Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205) * Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206) * Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207) * Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212) * Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) * Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7thunderbird-115.5.0-1.el7_9.x86_64.rpm5db75bde8daaf46ff7868d3752016f4d526c9070257c816e496b8b854328f66fSLSA-2023:7509Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.5.0 ESR. Security Fix(es): * Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204) * Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205) * Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206) * Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207) * Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212) * Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) * Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.5.0-1.el7_9.i686.rpm58b1191d09f569ca50c90861a01fcc770c6b2e028dc183df026135250539e2d1firefox-115.5.0-1.el7_9.x86_64.rpmba1012b0871603647ec5923b92aab013438b1e5103c8071e806fda840e612157SLSA-2023:7513Moderate: Linux-Firmware Security UpdateThe linux-firmware packages contain all of the firmware files that are required by various devices to operate. Security Fix(es): * hw amd: Return Address Predictor vulnerability leading to information disclosure (CVE-2023-20569) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7iwl2030-firmware-18.168.6.1-81.el7_9.noarch.rpmc80b56035c2231f62f39e828347adff98e06df09a972f4abe7ea09ec48259624iwl1000-firmware-39.31.5.1-81.el7_9.noarch.rpm0f34e9c6569a174840bda606a5788431fc09bd24adf91d82b80c4d1f2eb54dd7iwl135-firmware-18.168.6.1-81.el7_9.noarch.rpme5e3bab7f8f5589ee6a17eb313d12254953c3c21f63a08826d85ec2020d55284iwl5000-firmware-8.83.5.1_1-81.el7_9.noarch.rpmfc1ce06c78cdd48debb695745efea63eaad5284f2699eefc719d12c167fb2fd9iwl105-firmware-18.168.6.1-81.el7_9.noarch.rpmb879c2d7580862a690a51ae3a181e5d5776ac19aa212b674d0f807623a296ee5iwl4965-firmware-228.61.2.24-81.el7_9.noarch.rpmd03d86d600173989e9041041e9a468b2290325fbaf25ffd822609e233931fc8aiwl6000-firmware-9.221.4.1-81.el7_9.noarch.rpm162f3331cb3d5e64a061141c3a9e2f322f6fbb1e12d0b1a9fd931a5a9fee4e16iwl2000-firmware-18.168.6.1-81.el7_9.noarch.rpmae840c8717376e1d523b22f2386ec667ca1b635aba1fb6e20ae732da6869d05aiwl3160-firmware-25.30.13.0-81.el7_9.noarch.rpm41525ac7e6724bd4c9ea6831ded4b7866e8af5eaa7d0159d2517aa687d477209iwl5150-firmware-8.24.2.2-81.el7_9.noarch.rpm1e9c0a37d2b6a5b32105e6b1de05ed59d775eb38340533b2b6c71774c38d6460iwl100-firmware-39.31.5.1-81.el7_9.noarch.rpm8a7bf5a100adddff48301066d9cf50ba07dc49e8fe3e878c051ea4f2615fb170iwl6000g2a-firmware-18.168.6.1-81.el7_9.noarch.rpm723dba92e8f1c1c00498793b267d9c14e7e556ec0e01c597782dd1c8db999ddbiwl3945-firmware-15.32.2.9-81.el7_9.noarch.rpmface3fe8de08de6afc25fb51bd5b178813993c0a452d2767363b9ac2ae652f71iwl6000g2b-firmware-18.168.6.1-81.el7_9.noarch.rpm600345a505c735c250632a3d57da21b4e200e7a2f44e42edb6d58ab796366391iwl6050-firmware-41.28.5.1-81.el7_9.noarch.rpmb4f6feadde05b546328da0e0f2eb3559b34308e6170986220ff367fd99a12f54iwl7260-firmware-25.30.13.0-81.el7_9.noarch.rpma23ab5114a38337497f7bf572b518395bb7f162859fbdef592c104cacb74004aSLSA-2023:7743Low: Curl Security UpdateThe curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: Use-after-free triggered by an HTTP proxy deny response (CVE-2022-43552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. lowScientific Linux 7libcurl-devel-7.29.0-59.el7_9.2.i686.rpm498441bce0334939d92470989ef0bf8e02a2083d5797b49d89fc415356ca0cfelibcurl-7.29.0-59.el7_9.2.i686.rpmc7e5a1ff315c48a648de2d245401e7fec04c6eb5a9b8eb59a726d1e8c90de1cflibcurl-devel-7.29.0-59.el7_9.2.x86_64.rpmb3aa7055b00066c3754a1704e4ef12dae91b8b2e25ab5e8e9d27459db17d0036curl-7.29.0-59.el7_9.2.x86_64.rpmb1d71a1adf87744cfbd15084b3f7a06e72d51c58118ed7b6224ae5b4505723aalibcurl-7.29.0-59.el7_9.2.x86_64.rpmc52b5493c22bcb5e3b7995c1aebf4ba1b005ac1d65a61f4074146b2b03779792SLSA-2023:7783Important: Postgresql Security UpdatePostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Buffer overrun from integer overflow in array modification (CVE-2023-5869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7postgresql-contrib-9.2.24-9.el7_9.x86_64.rpm741a1dae7293037727b600dba20c327722f4b1df3b95c135b03aefcbebd87a3cpostgresql-libs-9.2.24-9.el7_9.i686.rpm5c4ad860099c03846bee5ca107b5d0f6a2a6e91a82ab2b09bc9f1dee0e44117epostgresql-server-9.2.24-9.el7_9.x86_64.rpm10d7427c5a7f618ab4a37ec4235346c5b67e05a6c31907c37a10f657aa028a9cpostgresql-plpython-9.2.24-9.el7_9.x86_64.rpm44d0882ae7e3b0682c6b3abd5a980a150f2938d1aa1dae66e1119e429cd09124postgresql-test-9.2.24-9.el7_9.x86_64.rpm9845a8aaad4bceea3ee21d571fc84ecd3aa61f1308260c42cf0954c4c519a0bdpostgresql-libs-9.2.24-9.el7_9.x86_64.rpm5588f9ad921a40763be94440941d88fceb1d546fc6f7137bfe104067579780ddpostgresql-docs-9.2.24-9.el7_9.x86_64.rpm9086c9558b5b164b54dbf963a0237d3bab03a30db662d100adcfb72bd267f211postgresql-9.2.24-9.el7_9.i686.rpma48fad0888f1b99f77b9983c25cf914cedc9362001926489cb57f56b1973b3bapostgresql-upgrade-9.2.24-9.el7_9.x86_64.rpm5abaf994b9145b83697a417448faeb7c2c20ddbbaceedc8812cb00ad1700c22fpostgresql-devel-9.2.24-9.el7_9.i686.rpm6ec387d40f42de7229a454500fd0f493f4956913fa46145a94a2f14ab56fd910postgresql-devel-9.2.24-9.el7_9.x86_64.rpmc3fa01e3b69d1d1b5f321eac8f16188fe5eb3ae4964a6a283b9bdff9c1a326dbpostgresql-static-9.2.24-9.el7_9.i686.rpmcbb2f795ef8f7fb625aa63da0a311b8e3bd52639d904af9f34460aba44b87460postgresql-static-9.2.24-9.el7_9.x86_64.rpm295fc83d94836a9f03421dd47666204ed6588016a9b4bf408d1a48654d1ac0ddpostgresql-plperl-9.2.24-9.el7_9.x86_64.rpm4b5f50ad4677c2daccaea86737614f874b91ceaf618230c20994385917400679postgresql-9.2.24-9.el7_9.x86_64.rpmc902d80d63e50b7a4a56cf08053e31dd8de500fbc8e082238408279fb29b99fcpostgresql-pltcl-9.2.24-9.el7_9.x86_64.rpmbe26b19fd4a14836d1b1c60182ef90ae89674923226c04056ef27806cfb3a7a7SLSA-2024:0006Important: Tigervnc Security UpdateVirtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377) * xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7tigervnc-1.8.0-28.el7_9.x86_64.rpmd878ad53279d73a821eef6745e41475a13bf6423283929db83f80053934f9d91tigervnc-server-1.8.0-28.el7_9.x86_64.rpm4bf2bbb9e4b440fd8038341ae34a1568265ca33bf972538d5ae62c87fcf8bb57tigervnc-server-minimal-1.8.0-28.el7_9.x86_64.rpmf6d8b483b8f323a5d4421ef6ba62d6e49197813c5f80678794eff811746353bftigervnc-server-applet-1.8.0-28.el7_9.noarch.rpm67ceb09f8df51f16ab3fd644f1786a7b852bcb3aa254778657d553de5ba6da21tigervnc-server-module-1.8.0-28.el7_9.x86_64.rpma3860b641fa0d7eab0e113b080bd00faaf4be3d0aa40bdac4931ada911042945tigervnc-license-1.8.0-28.el7_9.noarch.rpm725cfd357b9e8cc80ab130a699df3de04f5e9f4d928e0b1894aeef8eda1b49actigervnc-icons-1.8.0-28.el7_9.noarch.rpma3c23f2b1a100a6c51e6b64162508b88c19f746dd453419871ef026be260547dSLSA-2024:0009Important: Xorg-X11-Server Security UpdateX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377) * xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7xorg-x11-server-Xephyr-1.20.4-25.el7_9.x86_64.rpmcee49abea6f49e118f90cc707b18ae33b6dc79604abbca789e699da46987d0ddxorg-x11-server-Xdmx-1.20.4-25.el7_9.x86_64.rpm840305e25a4a9e6849ed74c7c0abe5ff8f18eec807b11356bba40ba959498f2bxorg-x11-server-Xorg-1.20.4-25.el7_9.x86_64.rpm6d7a7c45531423fa11b19377c136e5b5762df48fa0f7c0fcb47e9ddb26c63a36xorg-x11-server-devel-1.20.4-25.el7_9.x86_64.rpm042254433f043342a8daffc045a0f1baf62ef247337be8a01ecbc28fe0fae13dxorg-x11-server-Xvfb-1.20.4-25.el7_9.x86_64.rpm32e6a01863c31a84c3203c98f3d8c5b75c4b42c18369d2e2002e17ea646d9476xorg-x11-server-devel-1.20.4-25.el7_9.i686.rpm89731ae94097e917ae4b164b58a0a9bb7bc739e427f6e5fdfe4347fdcc913ed9xorg-x11-server-source-1.20.4-25.el7_9.noarch.rpm9f08f449f6688a64c204989c7e636b14856398128f86df97b31a841c4c4f01d5xorg-x11-server-common-1.20.4-25.el7_9.x86_64.rpm3c3e3412caaef346ee605ffd15be54c3cf9de01db7e37f13c9cd36d9869ad100xorg-x11-server-Xwayland-1.20.4-25.el7_9.x86_64.rpm57b02626f21e3385750bbd68a73ca20b32fa8b5cd788d343fecd6e7b556c38e2xorg-x11-server-Xnest-1.20.4-25.el7_9.x86_64.rpme2f0a21015a38018eab2cf043f99c0c0dfcac6555a729c866ae1ae4167bef845SLSA-2024:0013Important: Gstreamer1-Plugins-Bad-Free Security UpdateGStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7gstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9.x86_64.rpm1c7679ecfb7c3e30c43580ee577edd1f7a4bebced66fa7cc49cf45894f055a02gstreamer1-plugins-bad-free-1.10.4-4.el7_9.x86_64.rpm98e891ff0ba2d212f81e6fcffe2f6ac670c72919a71da83c6a71dea4663473ddgstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9.i686.rpm0422289588e8fbc4fcea0da7706e2b1d7b67f4b1e0ae8f5ac894434016837713gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9.x86_64.rpmb2d48cf4954af8b2f90c0022a13d3e4d6fd0c9244562d721e1131bfe226e9b99gstreamer1-plugins-bad-free-1.10.4-4.el7_9.i686.rpmc23b206afed8176086ea06f99b1fd0ce60b41b7fc61fbbc04f903eb0a29df041gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9.i686.rpmb61e9981b5e312b3704c1e020036b8de4a1707248a2e1ac1587687067a7c2da9SLSA-2024:0026Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.6.0 ESR. Security Fix(es): * Mozilla: Heap-buffer-overflow affecting WebGL &lt;code&gt;DrawElementsInstanced&lt;/code&gt; method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: Potential exposure of uninitialized data in &lt;code&gt;EncryptingOutputStream&lt;/code&gt; (CVE-2023-6865) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in &lt;code&gt;nsTextFragment&lt;/code&gt; (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to &lt;code&gt;VideoBridge&lt;/code&gt; lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected &lt;code&gt;nsWindow::PickerOpen(void)&lt;/code&gt; in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in &lt;code&gt;nsDNSService&lt;/code&gt; (CVE-2023-6862) * Mozilla: Clickjacking permission prompts using the popup transition (CVE-2023-6867) * Mozilla: Undefined behavior in &lt;code&gt;ShutdownObserver()&lt;/code&gt; (CVE-2023-6863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.6.0-1.el7_9.i686.rpm69c640581c71c0fcbcc844e1c7ab75ce5967a37ef63077b83e49b20fe2262066firefox-115.6.0-1.el7_9.x86_64.rpm4537288ea302f365b22fa97445e724ca45ecdd860cffc10bd515a0bb469ff0d4SLSA-2024:0027Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.6.0. Security Fix(es): * Mozilla: Heap-buffer-overflow affecting WebGL &lt;code&gt;DrawElementsInstanced&lt;/code&gt; method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761) * Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in &lt;code&gt;nsTextFragment&lt;/code&gt; (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to &lt;code&gt;VideoBridge&lt;/code&gt; lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected &lt;code&gt;nsWindow::PickerOpen(void)&lt;/code&gt; in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in &lt;code&gt;nsDNSService&lt;/code&gt; (CVE-2023-6862) * Mozilla: Undefined behavior in &lt;code&gt;ShutdownObserver()&lt;/code&gt; (CVE-2023-6863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7thunderbird-115.6.0-1.el7_9.x86_64.rpm85c44c0c883e100578a0a631f899fed79f62dbec9ab43577a196f35601ce6491SLSA-2024:0145Moderate: Ipa Security UpdateRed Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * ipa: Invalid CSRF protection (CVE-2023-5455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7python2-ipaclient-4.6.8-5.sl7_9.16.noarch.rpmd7449b964ca0d93bd691b3924ebd4597c3b8facd93bf8a73d9cf9054d24e9a8fpython2-ipalib-4.6.8-5.sl7_9.16.noarch.rpm56e0cc913272d59c7bac25811815868a011c1fc23ace80a1dfb2e3b33e7e270aipa-server-common-4.6.8-5.sl7_9.16.noarch.rpm96243f825077947b9477fcc8b7a86ab5c4e9b866cfa4d1dbf347a5f72c5f3eb9ipa-server-4.6.8-5.sl7_9.16.x86_64.rpmf03862146dd4db15a83b169823cf14d89da885a51ac03510e7a08c5d5b30ac50ipa-python-compat-4.6.8-5.sl7_9.16.noarch.rpmafcf62d93d9c6a91c28564972d424fe96ecaeeb9ed15257c86cfaa7012870c73ipa-client-common-4.6.8-5.sl7_9.16.noarch.rpmf2091a24905e839d934bdaf36f89f52383937115fb0d809400ea63c071a3c41dipa-common-4.6.8-5.sl7_9.16.noarch.rpm8fea5b8c00ef9078db6c29ef767d003d4a5da6740b0db0d89644e69bb3af8321ipa-server-dns-4.6.8-5.sl7_9.16.noarch.rpme2e99bf84ccba419a2df4125eba8aed8e354faa2708417d7700e9d12a8d55e95ipa-client-4.6.8-5.sl7_9.16.x86_64.rpmda0d5ed9a7a6dfe1a4e0b203e502ae5b9e8e775b3d6cd40ea148201e26240d71python2-ipaserver-4.6.8-5.sl7_9.16.noarch.rpm9bd9a40c83b465f0f89ca7f784244c957a9c600914737dad342867a9296e32b8ipa-server-trust-ad-4.6.8-5.sl7_9.16.x86_64.rpmd7f66d4c07be14d31442e011c376c15eeafb0c8133224eeb4d6836e36fcc446fSLSA-2024:0223Important: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918) * OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952) * OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919) * OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921) * OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926) * OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In the previous release in October 2023 (8u392), the RPMs were changed to use Provides for java, jre, java-headless, jre-headless, java-devel and java-sdk which included the full RPM version. This prevented the Provides being used to resolve a dependency on Java 1.8.0 (for example, "Requires: java-headless 1:1.8.0"). This change has now been reverted to the old "1:1.8.0" value. (RHEL-19630) importantScientific Linux 7java-1.8.0-openjdk-src-debug-1.8.0.402.b06-1.el7_9.x86_64.rpmdde02384d8965b1b5d6ac02d5562395e8fe7d3f32b169d0b51cc0f2dfb631fbbjava-1.8.0-openjdk-javadoc-debug-1.8.0.402.b06-1.el7_9.noarch.rpm7361b0a79cea7ab301e84e9020b9b80196032be58382076647de5d2b948e49f3java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.x86_64.rpme853059da15e811a901a2457d3f4e76c1b27a5373c129ad9f86bf0eddf06fc49java-1.8.0-openjdk-accessibility-debug-1.8.0.402.b06-1.el7_9.i686.rpmc519dc68deaa751bc3dcbbc630673277ddb8f59797ed806b82fd67e85f786fefjava-1.8.0-openjdk-headless-debug-1.8.0.402.b06-1.el7_9.i686.rpm620c3d2bb18afd18943ed7b931a59c98ce4e51172dc10098177bb7103f182343java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.i686.rpm52a2a65f175019a84d92d4e7bd10f7d4a2a1620549121bd84bd693877805471ejava-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.x86_64.rpme43196032476954d2186cde0d31f0d67a9370dee47e19b264e92180af5a684d6java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.x86_64.rpmc339e64ff249c0a41c74e0d45b4b815bab631775f0e020b764e158578ae46c1bjava-1.8.0-openjdk-src-debug-1.8.0.402.b06-1.el7_9.i686.rpm085e1ecffc8fa3229546ab90c2832c853b65822ac6f0fe89e7ebfb780eaf654djava-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9.noarch.rpm9aa443b30c29acafad890abd5905f52b22ba1b164609c1acedfc98b9ce4d5352java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.x86_64.rpm00ebf212d95b5f39a4d75a7a276972e1d57a8f069205ad78137c2b4234c9fe9cjava-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.x86_64.rpm74553d6272ba331071b0a8aa47bd77d1b45c025546a41fbe983d2afa1b8706d9java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.i686.rpm889e875141b1f5df42a57d5c71f58a8548998bfb66863a2a03b5d1c5a8ad52d0java-1.8.0-openjdk-headless-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm8b162f48db9c44de048a8cfadcf5c0d85378b8ee263bb29bfbc3ab366ca1dae3java-1.8.0-openjdk-debug-1.8.0.402.b06-1.el7_9.x86_64.rpmdac003986595c8b61e70b30a52b004ca526cb97e301b427cbed01379cdedb2bdjava-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.x86_64.rpm68d1d750ab3b071cdbbb360cc5ddc03e0ebadbabcc1f2638539fc1d5956a4313java-1.8.0-openjdk-demo-debug-1.8.0.402.b06-1.el7_9.i686.rpm8fb9d89cb92135c8fc87718624113eddd9147d572168cc7d2caab086bd6693f4java-1.8.0-openjdk-demo-debug-1.8.0.402.b06-1.el7_9.x86_64.rpmfa1ee407187fa3705573e8fb1c7d2667ff9e0cd286f3c00bb74fcad74cc54d5bjava-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.i686.rpm2eb2056b396149fceec9129c4f5d2384b123f0b519d48435af4f64f3119bcf26java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.i686.rpmeca089b02540431718b5f4ef73a50cece50caac23128e11c39153f3ee3f7ebb1java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.402.b06-1.el7_9.noarch.rpmffc2d73db443bdc8c362d206da1484d0cf3f1563ca371a9c05ef734371ad962djava-1.8.0-openjdk-accessibility-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm8d37d5dadbd56eefc491794e0a76f2299ab8ae87610534eea0bac073170a5091java-1.8.0-openjdk-devel-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm08934624c43913ef01469cdb07033cb665925dc6b56d56924292e8cc8e584d6fjava-1.8.0-openjdk-debug-1.8.0.402.b06-1.el7_9.i686.rpm15db9a206370da709910dbb60050fc3e3d0a02caaba117531056355b9c0c0c02java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.i686.rpm6d4d26428da44b62bf2a54be4e62df24b42d6c7296d9edd6c637b7bcf5d487fdjava-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.i686.rpm2d2672bbf31410f48b8ea2820549fef9e3f3e7a657a6f11e5d93e68ce947b92ajava-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9.noarch.rpm32af6a7462dc10af31dab9f263885d789bbc4584699f3f005605131fd1d83a41java-1.8.0-openjdk-devel-debug-1.8.0.402.b06-1.el7_9.i686.rpmfc441b4c2acf427b4df871fde7a41cdcc91ada1fa9366ea47279e04f1b9bbcf2SLSA-2024:0232Important: Java-11-Openjdk Security UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918) * OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952) * OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919) * OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921) * OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926) * OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-11-openjdk-demo-11.0.22.0.7-1.el7_9.x86_64.rpm95576be2076e94f321be597b82c012c86361c5356cf844f86619cc6dd62c5e53java-11-openjdk-demo-debug-11.0.22.0.7-1.el7_9.i686.rpmb77dab4d298a73238d6e19e59114793eb49ccc4b03f8b3745f88f663a258b461java-11-openjdk-headless-debug-11.0.22.0.7-1.el7_9.x86_64.rpm6d197aafe764af0160b0da23049f3ccc5fdf7770a7dc473499cb49f1877e0556java-11-openjdk-javadoc-debug-11.0.22.0.7-1.el7_9.i686.rpm5f505af6d49f833135800b8034e962058f24a2cdc6fd6e2416e6dd1c5a33416ajava-11-openjdk-11.0.22.0.7-1.el7_9.i686.rpm44871757e5397e5f0ff59df1eb7d11c5e476976427db8a992bfe76678a5ef976java-11-openjdk-11.0.22.0.7-1.el7_9.x86_64.rpm0621d1509b6394e973480a59b6cab842c967101d2f8142acd7992a5835b7abf6java-11-openjdk-javadoc-zip-debug-11.0.22.0.7-1.el7_9.x86_64.rpm117319bd032a4ef64d49cb6a3414626071a4db2c0a48675251aa76d58ef0ef45java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.i686.rpm7d94af7086999a9b14e8120cbe8b493fc641a3f9a85ac573050754b086ca4983java-11-openjdk-demo-11.0.22.0.7-1.el7_9.i686.rpm0a870fe20b25057c5548716e32ce90d1cf6b9b48b62ddd5897ff858d015a1241java-11-openjdk-devel-debug-11.0.22.0.7-1.el7_9.i686.rpmc7dbfe21bc4a71451e335a05a632b07cc1adb551e534c024a5132c93a9a77ce6java-11-openjdk-demo-debug-11.0.22.0.7-1.el7_9.x86_64.rpmf379918409d5321ce1d3e56701ae947f73fd7de655c676ef1ebb481da5dc4d0ajava-11-openjdk-src-11.0.22.0.7-1.el7_9.x86_64.rpm4d8de6773a7251746e3e975e65506206690bb5076927eb54b75b4f88586da265java-11-openjdk-headless-debug-11.0.22.0.7-1.el7_9.i686.rpm270bc9bd8a9e1788d554e01da8e07b794033669407fe0dc1b634c4e83abe9016java-11-openjdk-debug-11.0.22.0.7-1.el7_9.x86_64.rpm14c0faebea0f99195f73da800562e386075b28e459a8625e3e201d8e63402563java-11-openjdk-headless-11.0.22.0.7-1.el7_9.i686.rpm6f3305d38383c213fd8a31bf5e7e1e16283a81f3742f6eb3bf2767ac8c7f063ajava-11-openjdk-static-libs-debug-11.0.22.0.7-1.el7_9.x86_64.rpmb52efc2014e5e6f6d00b9da4f106a7de1d850bf2760d565d8b28636016bc67bajava-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.x86_64.rpma864487011f9047034551d8e309d9d5ff322b53faf35a191a2288ce5843af83bjava-11-openjdk-src-debug-11.0.22.0.7-1.el7_9.i686.rpm9e08bbbe35f812b16a16638c2d1fef2f52f8e61e61b2019485ceceac51e22c70java-11-openjdk-devel-11.0.22.0.7-1.el7_9.x86_64.rpm9042cb7ac96e9b3ee54b2247c2a1460f0a681ba4d518cec61cf4b2faddb8676ajava-11-openjdk-jmods-debug-11.0.22.0.7-1.el7_9.x86_64.rpm7fa496f97aeb3506611bc0a20c3d5fa84c17ae51a859d73309f751503ffba7d5java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.x86_64.rpmc4ed4a0b8d0e7c33b78a5c12d4401bb736d56959dd573c5e26515307bb64a057java-11-openjdk-javadoc-zip-debug-11.0.22.0.7-1.el7_9.i686.rpmfd710de29dcdf89cf4e6a233122b7f1b405b370f13681049f6783212255b7829java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.i686.rpm9faa8250912a2be04d4498daa3fc0b40eacde1c144076c6837ae5e359414f50djava-11-openjdk-static-libs-11.0.22.0.7-1.el7_9.x86_64.rpm16b90f808a79a23246d661893064bea524dda0549caddd283e53cdc6fe06e110java-11-openjdk-javadoc-debug-11.0.22.0.7-1.el7_9.x86_64.rpm63aa077fca3bd0309ad6339aa8b14d691f4a9b755adf23584a99e68160085564java-11-openjdk-jmods-debug-11.0.22.0.7-1.el7_9.i686.rpm93a3522634768c262c2df5da341d0091fd8fe113222a0ce5ffaded281821fecejava-11-openjdk-devel-11.0.22.0.7-1.el7_9.i686.rpmceccfdbf84e12de9260cf94520f64154cdc6d1360fa74a1c89b232487d28280ajava-11-openjdk-headless-11.0.22.0.7-1.el7_9.x86_64.rpm1c8872e428cd92d18a092ac69b51494d8b91985e7bc91f71bb692468fe0a2efejava-11-openjdk-src-debug-11.0.22.0.7-1.el7_9.x86_64.rpm4f78d38cc22c0000c60437b76a9dd1ace7e0119b374a855849814b98a96d438cjava-11-openjdk-src-11.0.22.0.7-1.el7_9.i686.rpm61b2000c37c25a6f56e4b7a88453ac8e857d9ed505827d272dee685fb1d498e7java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.x86_64.rpm4febd8135ba4cbcfab1e3fa238eaf5fceb4953c4a302af5d76a0db173b025779java-11-openjdk-debug-11.0.22.0.7-1.el7_9.i686.rpm9e92a308ae9678956078aa4a638cf58cc7fe992fba72cc9ff3a922dd6a31faa0java-11-openjdk-devel-debug-11.0.22.0.7-1.el7_9.x86_64.rpmf69b67b651639c1296a154fc500e02fc359a0e90c11e825ae415abfcf8ff130ejava-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.i686.rpm0cbc4940043b1c9dded3f2e731211cf11c11667c64c68e2cc825b580799f0525SLSA-2024:0279Important: Gstreamer-Plugins-Bad-Free Security UpdateGStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7gstreamer-plugins-bad-free-0.10.23-24.el7_9.i686.rpm46c922e1d24d8284170b98e0f142a0e17802842adc3da065bd8330dd6c081de8gstreamer-plugins-bad-free-0.10.23-24.el7_9.x86_64.rpm0934f97f08c806631a7f63644847e920c09a8f047d70e4dd76a35325a5af8bfcgstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.x86_64.rpm1802aadbbbf0087d8e2cce0dea743ecbcfb25e897183784bc0d88b004d3ec389gstreamer-plugins-bad-free-devel-docs-0.10.23-24.el7_9.x86_64.rpm8bb33140410d396a3c1e09e1e7636cfad5641d474c614dc8ee90434eab1ff9e8gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.i686.rpm5a20bfc364ce0109eb22d83a993604bbec573e15b5e42800f244dc945aaaeae5SLSA-2024:0320Important: Xorg-X11-Server Security UpdateX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816) * xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229) * xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408) * xorg-x11-server: SELinux context corruption (CVE-2024-0409) * xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885) * xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7xorg-x11-server-Xvfb-1.20.4-27.el7_9.x86_64.rpm6778e751e0074379445b1d618d7fb380c5b8271870391f2b1986b1bd1fe67941xorg-x11-server-Xnest-1.20.4-27.el7_9.x86_64.rpmcd1e3e50fd368947479e8e5a01613c78f88daba8f7e94234e7a486955b0f9c82xorg-x11-server-Xephyr-1.20.4-27.el7_9.x86_64.rpmaa8c44d5d0f90ec0e98953a3b942cbe1f5b3ef92c45406d0567237ab7aa01731xorg-x11-server-devel-1.20.4-27.el7_9.x86_64.rpm85adcaa8f4a114ef75b8f463a7f43cec7a4b0338b5d93d8113ad76b98f8a1647xorg-x11-server-Xorg-1.20.4-27.el7_9.x86_64.rpmf798bbfc8b5c38c89aa7580f8fcd9736d7fd8ea62cd463bde9226f0a81377da5xorg-x11-server-source-1.20.4-27.el7_9.noarch.rpmb91c387e09a82405d1b5936f85986ce2291a9efad65f4748183f9a74f9dfcdcaxorg-x11-server-Xwayland-1.20.4-27.el7_9.x86_64.rpmea9f77b8cd412fc9783b1337bffef758dfcb3f7c91723c38b1d9489afe87ce20xorg-x11-server-devel-1.20.4-27.el7_9.i686.rpm217bf7588963dcd2af78b1400a42ec3855b517a4b1add62c3dc961e707cdf8ecxorg-x11-server-Xdmx-1.20.4-27.el7_9.x86_64.rpm18d38bc6740bc3142d0035dc752c5df83be63f5fc7378db267c809bfdc988e38xorg-x11-server-common-1.20.4-27.el7_9.x86_64.rpmd97635105ed33d28798a218a9f1c3d98e74c9b36553f9b7786954b83e3f66984SLSA-2024:0343Moderate: Libraw Security UpdateLibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others). Security Fix(es): * LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp (CVE-2021-32142) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7LibRaw-static-0.19.4-2.el7_9.i686.rpmc07f0c388d53ef358304fbf5a890c8ed27ae53ac3562bf722810321531fd361eLibRaw-devel-0.19.4-2.el7_9.i686.rpmafe924b0d2eb987ea4ed17a7c86e6ce9a2aaa2203672a0e501e8f4542ce26df2LibRaw-devel-0.19.4-2.el7_9.x86_64.rpm9be290004a20cff637d7db3a166196299147d69eb4cfb37827fa64eb33766220LibRaw-0.19.4-2.el7_9.i686.rpm21fa8b7b6ecf815d8cbcb1a7a3246c238e96be77a9b0fbc6df94b230dd376b04LibRaw-static-0.19.4-2.el7_9.x86_64.rpm2efa6f2fff664a9e8d805395dd44f71dfb756e1fca4e1de635ea410afe69d9fdLibRaw-0.19.4-2.el7_9.x86_64.rpm2cd76b61d30079714ab546a2d5d8270a6da702c9b19f6b947fec49d03fed2b96SLSA-2024:0345Moderate: Python-Pillow Security UpdateThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (CVE-2023-44271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7python-pillow-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm81413d6b0956aff03a592b4b9dda1e107ea340a40c841e9f49fc0b8dcb778a61python-pillow-sane-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm7df5cda96de4345301564233d4f73210ecc6f5d4774f993730f56f7757b5ba0bpython-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm54388931d055924d06b0cd6dd8873d868143563199de035e45c51b6037afd611python-pillow-2.0.0-24.gitd1c6db8.el7_9.i686.rpm9f082ca45e31f71798f6cd9e202c15f116b73edcdb1e89449c37c22cecd24e1cpython-pillow-qt-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm754ea3a6ce7134fbc594c534a2a81bf845b369423871c9ad49f9afe6c9782099python-pillow-doc-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm5d329a9892fb932b1b2024236976baad22bd5ca3d6432851931ec97869baa662python-pillow-tk-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpmf871880a43e6660c4103602b302e99e38455494651f2e6bb410535f45868d30cpython-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.i686.rpmb3a8eb943b033ae352a9449ade64acf785c669c3036d1f0bd7ad5e90e1208ecfSLSA-2024:0346Important: Kernel Security And Bug Fix UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: netfilter: potential slab-out-of-bound access due to integer underflow (CVE-2023-42753) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * gfs2: kernel BUG at fs/gfs2/lops.c:135 (BZ#2196280) * ax88179_178a 2-6:1.0 (unregistered net_device) (uninitialized): Failed to read reg index 0x0006: -71 (RHEL-6302) importantScientific Linux 7kernel-tools-3.10.0-1160.108.1.el7.x86_64.rpm8ed03cdee3c6f96583e0d7213404eabcc01aea6a0df53bad7b20cb96666838f6kernel-abi-whitelists-3.10.0-1160.108.1.el7.noarch.rpme199f6b0dda918678870e94fd82b6509db5d1d81c304e2ec7ad19b2a8fbd12c2kernel-tools-libs-3.10.0-1160.108.1.el7.x86_64.rpm4d46be2e7f1aea69880cfb02c600953d0f848c3a5ea502388989bd44584e1956bpftool-3.10.0-1160.108.1.el7.x86_64.rpm5babb17a292aa655c2458056ebb1073456db49e369a7d1f10786a4bcc4acaf86kernel-3.10.0-1160.108.1.el7.x86_64.rpm8a44907d63ba2c431265cc97f497ed4998d58b0d716422b81ddfd3afbf936ba7kernel-devel-3.10.0-1160.108.1.el7.x86_64.rpm43098b52ac40ae5c5f3080ff5a42fc09262e882a822cb5e5947ced3dbdc2c2f4python-perf-3.10.0-1160.108.1.el7.x86_64.rpm0e68ec2adb0238e252e1999ecac0efb5b3bcfa1bf4994bd14f075785357dc109kernel-tools-libs-devel-3.10.0-1160.108.1.el7.x86_64.rpm43586f28a7c20ebfba8ae2fcf35a91780bf656a7a7a1207260a8d4b40891ad73kernel-debug-3.10.0-1160.108.1.el7.x86_64.rpmb8fd50e3df21e313479ea3dbd5a21d07fa1b057b799a1b8ada709fcaceebeb7dkernel-headers-3.10.0-1160.108.1.el7.x86_64.rpmd7d0b7a0b00169816abd24f0536b7af24067e2f68be53d15db85556474e0b6e8perf-3.10.0-1160.108.1.el7.x86_64.rpmafa2282ea672e08045f6e7e20b3f52587719e7a0c403ccdfb3ac75513028615bkernel-debug-devel-3.10.0-1160.108.1.el7.x86_64.rpm1ae9bb5868083ed0ac71b848de353773db99073a37d54e27867400e1dbb9c0a5kernel-doc-3.10.0-1160.108.1.el7.noarch.rpm4cdc3a356924241aae99ad3debebaa1c8e2294e2eb6a86c96c94fe7694ab834fSLSA-2024:0600Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.7.0 ESR. Security Fix(es): * Mozilla: Out of bounds write in ANGLE (CVE-2024-0741) * Mozilla: Failure to update user input timestamp (CVE-2024-0742) * Mozilla: Crash when listing printers on Linux (CVE-2024-0746) * Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747) * Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750) * Mozilla: Privilege escalation through devtools (CVE-2024-0751) * Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753) * Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.7.0-1.el7_9.x86_64.rpmea22ef001519caa8ff417d9c87f6b375b1082727fcec2747802342a6e993b3b4firefox-115.7.0-1.el7_9.i686.rpm07313088232c6184aaa18e6cd5f3a64d0bf5a4373276de8e6b05ec4a1a1c03e6SLSA-2024:0601Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.7.0. Security Fix(es): * Mozilla: Out of bounds write in ANGLE (CVE-2024-0741) * Mozilla: Failure to update user input timestamp (CVE-2024-0742) * Mozilla: Crash when listing printers on Linux (CVE-2024-0746) * Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747) * Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750) * Mozilla: Privilege escalation through devtools (CVE-2024-0751) * Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753) * Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7thunderbird-115.7.0-1.el7_9.x86_64.rpma8d93b2a5cfc9fd072a7304a659f1c3fdec5ad7756d516d0fc2b9aa00d0fbb79SLSA-2024:0629Important: Tigervnc Security UpdateVirtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816) * xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229) * xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885) * xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7tigervnc-server-minimal-1.8.0-31.el7_9.x86_64.rpmb63f27490a21ca002b9b142c768efef20e9c395d54e892057bb58608cc204fa8tigervnc-1.8.0-31.el7_9.x86_64.rpm4b100d9b5c7636dfdfdfe41a637d0526490bce975df2325af3d0922939dd67catigervnc-server-1.8.0-31.el7_9.x86_64.rpmba082c4d938772188057ad42edcce544b2dcecc2a610d34c61c4ee758d772ed3tigervnc-icons-1.8.0-31.el7_9.noarch.rpm07a9abca01452eaa3c9dbfd9c5f9fb66ddcdef37278b8e4443d44e3fe33b27catigervnc-server-applet-1.8.0-31.el7_9.noarch.rpm1d4bb14474a252b9009725af3d0853209f7723cdaf3892644aef511b9cb15578tigervnc-license-1.8.0-31.el7_9.noarch.rpm160eddd328e690a5339dd325e0dd8209d4a6cf237f8895dbf0be2052411960a6tigervnc-server-module-1.8.0-31.el7_9.x86_64.rpmb0ca8ac5f2622ea90ff9de469ead08695c1b43cdcce2779c53ea534521fc95deSLSA-2024:0753Moderate: Linux-Firmware Security UpdateThe linux-firmware packages contain all of the firmware files that are required by various devices to operate. Security Fix(es): * (RCVE-2023-20592) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7iwl6050-firmware-41.28.5.1-82.el7_9.noarch.rpmbede749692b47135cac3d83f3811deaaa856821d340a49e23c281a4da586f3bciwl6000g2b-firmware-18.168.6.1-82.el7_9.noarch.rpm141487a55bbc7dbdf9f830b07f80cbf8e2d34c75aac27fb2ac98237e6f2ab244iwl1000-firmware-39.31.5.1-82.el7_9.noarch.rpm54b17ad5fd3c9c574dfcefefb2a8834656fdd82cf152caf8b9ba308cebf7d1bdiwl5150-firmware-8.24.2.2-82.el7_9.noarch.rpmb7c434a206a59763ca232a0bb8e49701aa018d93b0d1cc041814e6d94bf50c4biwl6000g2a-firmware-18.168.6.1-82.el7_9.noarch.rpm0d692533b2a5ed4ed28868c7bb8334525076497de50353ad813da6fe07734284iwl135-firmware-18.168.6.1-82.el7_9.noarch.rpm95bfaba9b5653a83e20c9932b2930eb6bda85d510059a5c43cf550a53ae448e7linux-firmware-20200421-82.git78c0348.el7_9.noarch.rpma8777329c0b6e715eac602ff58a6429bca76e76ac70603206312441bf247a2adiwl7260-firmware-25.30.13.0-82.el7_9.noarch.rpme64a97d5c671efc4fa415bd4c532464a6262f62b1a9fa98a799c03487433ad0diwl105-firmware-18.168.6.1-82.el7_9.noarch.rpm3d0b10f45e5f0c5ae891adcb8584696e241ebe689ac0cfa747f6fccf7a5849aciwl3160-firmware-25.30.13.0-82.el7_9.noarch.rpmaf80422a01927bfdb8b5205ef9d97360eaa757c898688dc506466eca6f067406iwl2000-firmware-18.168.6.1-82.el7_9.noarch.rpmaf3ed29b25df5c8a78f4b10a974cdd2ebc5dbfc7a3ee9e2d5ef010fe20851f30iwl6000-firmware-9.221.4.1-82.el7_9.noarch.rpmdc0489d581ae27ffc1ce06e394aab2912de78a3f6f3bce244e7bab0692373006iwl2030-firmware-18.168.6.1-82.el7_9.noarch.rpm77d06de2dc9b5b81939baafdb9150ec3b9a5f407cb384ee53d17e1d0596d3aa5iwl5000-firmware-8.83.5.1_1-82.el7_9.noarch.rpme02af43fa4eead018ef3b96bc5e13b1753bfaad664429845c0aef433765ef060iwl100-firmware-39.31.5.1-82.el7_9.noarch.rpm91f90c313410f56aed94e461a0e925b6df6d91a3a93d1376dbcddc7e7e0fd5adiwl4965-firmware-228.61.2.24-82.el7_9.noarch.rpmda898bc4b4e3150cf1460c4eeda3405a39f7ce8892e7094414c529d30a296422iwl3945-firmware-15.32.2.9-82.el7_9.noarch.rpm097176fa2cb3c3f5caf9d1fa228090fd6d5c9dd78f8d212fcdc96ecf711a55cdSLSA-2024:0857Important: Python-Pillow Security UpdateThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * pillow: Arbitrary Code Execution via the environment parameter (CVE-2023-50447) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7python-pillow-tk-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm15ae81d0c24e554168f090c91b0bc2b5581f0d142a5bef76c9e770d4a7c29802python-pillow-2.0.0-25.gitd1c6db8.el7_9.i686.rpm791474fa898b4d6fa0ebdb548ed5799c07682da9ada08418be98c027169e4f32python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm0e5b6de2c1553be4d41141f38ee00540dee7f7bac9856cd13e3a5577bc44e79dpython-pillow-doc-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm7913772aeb3a93c0c8f76445b344a0e683bd79d3a9d15080fdb4a08d22c57993python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9.i686.rpm38a8568a5a6917fed7d4ca98920d155a2a4391e7172ea37054f73fe7c4afdb1epython-pillow-sane-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpmbc9b15bb3548fca39106e1dd305aafcfecdddb850043ac44e12acaa19d73175dpython-pillow-qt-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm4d006721fe89a5c6fa877246ae5304b6c0c98ca697495886f0d15e4cb52d2acepython-pillow-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm4e40b851a547086a74959ca0b2a31dfa750e1882e98dd5a8a56534c2f033e53aSLSA-2024:0957Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.8.0. Security Fix(es): * Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546) * Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547) * Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553) * Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548) * Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549) * Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550) * Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551) * Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Scientific Linux 7thunderbird-115.8.0-1.el7_9.x86_64.rpmb93f4388564d33caa2064835d37d025d08c1b8d66e51e872a3921bc0f40645d6SLSA-2024:0976Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.8.0 ESR. Security Fix(es): * Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546) * Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547) * Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553) * Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548) * Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549) * Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550) * Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551) * Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Scientific Linux 7firefox-115.8.0-1.el7_9.x86_64.rpm19645f18638c73e54e5a9ab313bc9cd6fd7f9324afe5a071c4b777a21e1ad939firefox-115.8.0-1.el7_9.i686.rpmf08e3beb43fee16a6bce5a10defd482ad304f42980b9ca9b7be65555bce9fc2aSLSA-2024:1249Important: Kernel Security And Bug Fix UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * (CVE-2024-26602, ?) * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921) * kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871) * kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment (CVE-2023-38409) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [rhel-7] INFO: possible circular locking dependency detected: store+0x70/0xe0 kernfs_fop_write+0xe3/0x190 (BZ#2161654) * qedf: Reading /sys/kernel/debug/qedf/hostX/stop_io_on_error can cause panic (BZ#2224973) importantScientific Linux 7python-perf-3.10.0-1160.114.2.el7.x86_64.rpm6219ccf626b63bfab99d033de385dba6b35d64154246c6fd87812ec21e8e9567kernel-devel-3.10.0-1160.114.2.el7.x86_64.rpmfda8c918fc3432c34e4268978b46c786654968f2a0601c6abdfe2d643733f990kernel-tools-libs-3.10.0-1160.114.2.el7.x86_64.rpm203be60922d3278b1b6d9471c79cab6f9bfa2a0fd05b05dc5fdca7042aa6fb6ekernel-headers-3.10.0-1160.114.2.el7.x86_64.rpm0a74334fadf5e361e000cdfd3914bab8064753102fdf58527a4c1f18e88ed0eaperf-3.10.0-1160.114.2.el7.x86_64.rpmb5912c34f83560f9865f6f1fba4f654f7eea21409398c0b15be377e95e45cf5bkernel-debug-devel-3.10.0-1160.114.2.el7.x86_64.rpm791452b00d72645b5e5c89f1f04b9d21efbce3b90009de08924f5b4797d8903bkernel-tools-libs-devel-3.10.0-1160.114.2.el7.x86_64.rpma76baaa0c86b21c117e3b32b9378a3dc132095b00cba8c207c9c0293b4cba73dbpftool-3.10.0-1160.114.2.el7.x86_64.rpma734e79d3bc421f931d2d82589a7103260a56804728153892a0411b268848840kernel-abi-whitelists-3.10.0-1160.114.2.el7.noarch.rpm8451aa49628585a9f0906f5104d7d6ba5087251161b07861149fa5a68f34f516kernel-debug-3.10.0-1160.114.2.el7.x86_64.rpm6d80eb63b24244233b797ebcb16866ce03198e8bd8d097de606bad6f046bac58kernel-doc-3.10.0-1160.114.2.el7.noarch.rpm3d9873984d98e433540c1af5b1d24fed7014cee60c834f5793708a0f651dd30dkernel-tools-3.10.0-1160.114.2.el7.x86_64.rpm8a07d2f79c4bbcf23b91292c704d658bd4ea30c4d82402774a36dbd95a172f0bkernel-3.10.0-1160.114.2.el7.x86_64.rpm49c52b78daffac4caa1ac6602573916787864be7bb05d7a94416bfb7544b3922SLSA-2024:1486Critical: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.9.1 ESR. Security Fix(es): * nss: timing attack against RSA decryption (CVE-2023-5388) * Mozilla: Crash in NSS TLS method (CVE-2024-0743) * Mozilla: JIT code failed to save return registers on Armv7-A (CVE-2024-2607) * Mozilla: Integer overflow could have led to out of bounds write (CVE-2024-2608) * Mozilla: Improve handling of out-of-memory conditions in ICU (CVE-2024-2616) * Mozilla: Improper handling of html and body tags enabled CSP nonce leakage (CVE-2024-2610) * Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions (CVE-2024-2611) * Mozilla: Self referencing object could have potentially led to a use-after-free (CVE-2024-2612) * Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 (CVE-2024-2614) * Mozilla: Privileged JavaScript Execution via Event Handlers (CVE-2024-29944) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. criticalScientific Linux 7firefox-115.9.1-1.el7_9.x86_64.rpmf288a71162f7c339c59ad0bdca178fcb27e415e0866b00db0cd176c57dbd1706firefox-115.9.1-1.el7_9.i686.rpm9518d749a87e95259d1331d59693d6a74d7e9eee033f5a31d1676c914155d44bSLSA-2024:1498Moderate: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.9.0. Security Fix(es): * nss: timing attack against RSA decryption (CVE-2023-5388) * Mozilla: Crash in NSS TLS method (CVE-2024-0743) * Mozilla: Leaking of encrypted email subjects to other conversations (CVE-2024-1936) * Mozilla: JIT code failed to save return registers on Armv7-A (CVE-2024-2607) * Mozilla: Integer overflow could have led to out of bounds write (CVE-2024-2608) * Mozilla: Improper handling of html and body tags enabled CSP nonce leakage (CVE-2024-2610) * Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions (CVE-2024-2611) * Mozilla: Self referencing object could have potentially led to a use-after-free (CVE-2024-2612) * Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 (CVE-2024-2614) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7thunderbird-115.9.0-1.el7_9.x86_64.rpm633ac61bf649cbb0a8af1fe19bf02629b6aa72b06a1f7bc010f3e0191c081bf1SLSA-2024:1785Important: X.Org Server Security UpdateX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7xorg-x11-server-devel-1.20.4-29.el7_9.x86_64.rpm9cd2ecb63df9fb22b407d4985082354910087069eb12747b1a3c8dbd91a376c8xorg-x11-server-Xephyr-1.20.4-29.el7_9.x86_64.rpm36081c9b9c87022032141d87cee179ca1e4bb24b8e3cec5f810f3ab3292b9879xorg-x11-server-common-1.20.4-29.el7_9.x86_64.rpmae83d82858bf83da7eb37ddae61f71b588879adba1aee004ba37fa6c2d6d282exorg-x11-server-Xnest-1.20.4-29.el7_9.x86_64.rpma8f92d3db45455d068361ebaa8af64275d656af1a44d0d7cf1c3db6e0ed91e53xorg-x11-server-Xvfb-1.20.4-29.el7_9.x86_64.rpm75f7bf39ae5ecfa5c37a5fda81409b7a747e3ea195240253b07e5e2fbde9fbdexorg-x11-server-Xwayland-1.20.4-29.el7_9.x86_64.rpm3f71c6f0a460e254f7fa38a4f70022c2c16b0434b7420d55c85b95c33edfe2caxorg-x11-server-Xorg-1.20.4-29.el7_9.x86_64.rpm0592fe7d3f6d6942ecef2e6f48163fac7cf59b2d760479fb6110f81b240b650fxorg-x11-server-devel-1.20.4-29.el7_9.i686.rpmf7a93733b242167bb472f01c0d7ba503dbfa21a96eca2e2707ab2967e47c3791xorg-x11-server-source-1.20.4-29.el7_9.noarch.rpmb575bab4e5c503acc122713aa952b48ec27c1f2e2d71abe1d9a7e2e310d01e87xorg-x11-server-Xdmx-1.20.4-29.el7_9.x86_64.rpm3387269f61804f0b2b7a9606c3a1344123086b21b9ae3e253996b289b54daa30SLSA-2024:1787Important: Squid Security UpdateSquid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: denial of service in HTTP header parser (CVE-2024-25617) * squid: denial of service in HTTP request parsing (CVE-2023-50269) * squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285) * squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286) * squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728) * squid: Denial of Service in SSL Certificate validation (CVE-2023-46724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7squid-3.5.20-17.el7_9.10.x86_64.rpm535a00517c6bfbc2eca005ca05996bec350f327132f69dc9810e100b756d33b9squid-migration-script-3.5.20-17.el7_9.10.x86_64.rpm1e1ad8c5ac62df286ba1a1efb4176f3191425f71477815589b05339e2df1d1a2squid-sysvinit-3.5.20-17.el7_9.10.x86_64.rpm5730d09504f1aece6838c90069bffc2f453f55cf5381b7ff8a93a4031c6f26eeSLSA-2024:1817Moderate: Java-1.8.0-Openjdk Security UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.i686.rpmdd01fc33cf37f8a54346df5d03f247bc4d1c8065d17be7e0dc44bce99c32630ejava-1.8.0-openjdk-devel-debug-1.8.0.412.b08-1.el7_9.i686.rpmb76d6c84c2a51474607dd5b89ad367198739336bf4d0d717fe379a4b107a1194java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.i686.rpmd6d71f3df48a3ed75ac0a571754ead18c5bc889da18c3ac6e7cec74bbc25e110java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.i686.rpm8b7774447a244305f377bfb98fb92dccf701eb683776599a2c434451bed39e4ejava-1.8.0-openjdk-javadoc-debug-1.8.0.412.b08-1.el7_9.noarch.rpm32bc114411b39d13ebf0af4da7ce0d616d3d468dcb79216083faf5c157b03574java-1.8.0-openjdk-demo-debug-1.8.0.412.b08-1.el7_9.i686.rpm6233de7740a123225cfc809c5dd0ca69df02afbd5c4c3617ab65430c0f91fbb8java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.x86_64.rpm4b8f078d24919936a039b9a6a20ae2eb785df559b2768b8bd03f9f2e75cc75cejava-1.8.0-openjdk-demo-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm6929e42135cc5b3160118cca0a986785bcd307dd581a4e9ebf6fde91bb59e5e6java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.412.b08-1.el7_9.noarch.rpm94cfa62d890d71ee0423d68a84ca416efa73088f89fd28aa08bd254071ea0dc8java-1.8.0-openjdk-devel-debug-1.8.0.412.b08-1.el7_9.x86_64.rpmbb8720a43b0770f702a2a69d7eb270cdb045e73007fce293a10345e250c09917java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.i686.rpm88c0c30ef0a8545ceb2fca04440af566161c59dbf80592eaf32fd279a6d96057java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.x86_64.rpm5523d2b121cb76c5a23a0d7a0dd3e9fd938e5f25a5b398b79077570f0915a36ejava-1.8.0-openjdk-accessibility-debug-1.8.0.412.b08-1.el7_9.i686.rpmc0a1975cbe1fe4c1361671feeb62ec6b042b7857ffc6c16fdd3a44afe6f7cd99java-1.8.0-openjdk-accessibility-debug-1.8.0.412.b08-1.el7_9.x86_64.rpmdb697d3e8d1962d53c672af785b1660088386812b6283f7e4411faead1501646java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.i686.rpmd3f92ce1c50bcb1f3d2f20321ee32cebcacaccac3d641d2ba4f557c28bc47dc4java-1.8.0-openjdk-src-debug-1.8.0.412.b08-1.el7_9.i686.rpm1e18f402b9c193cdbb34f248883971b11cc93698b212a6939e9a39804a76785cjava-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.x86_64.rpm502e113cb2543a3a4799877c200a64611d442bb8fffb7bcd44e50689866ce726java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.x86_64.rpm8a95eeea1fb14c5468160dd9015fd10e7323043f5cdee0eb301e88d8baaa3a6djava-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9.noarch.rpm51d609b53a3edd23c2b078777e77bd319dc039533ad3a208bfb16b3a29af2c38java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.x86_64.rpma9d12d3814fde3710d495b3aa7014690427bdf0048df08200fa30df1cc9af6cdjava-1.8.0-openjdk-debug-1.8.0.412.b08-1.el7_9.i686.rpm80e519bed885acf426e7abafe523f22b410a4738b99d422abcad3e1f121f799fjava-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.x86_64.rpm4c8d2f27d85e9b6b854a7845dfd33dd362e517a68898ff465e7a7fd13eaa80efjava-1.8.0-openjdk-headless-debug-1.8.0.412.b08-1.el7_9.i686.rpm86f31659058f688c5d9fb31cb83b1e8a61a0f1609448613d7b58f2aad6025143java-1.8.0-openjdk-headless-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm1894fd71dfa3138964caa76cbbfaf358a833d2897d72d6500ebc32a799320362java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.i686.rpmb61062c1696adf1365012cdb2d60c4557f7b54b96b6b07f3a0c987cb7cad38c3java-1.8.0-openjdk-src-debug-1.8.0.412.b08-1.el7_9.x86_64.rpmdc6dc3d2a74a97e5c60ab5e0175706aa7b0e2f9b8d74159d7965cc12479a1fffjava-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9.noarch.rpmfae992f04223ed32dcc4c439a82ab270df358fe5e7f95ca14ea9d6f3b8c9234ajava-1.8.0-openjdk-debug-1.8.0.412.b08-1.el7_9.x86_64.rpmec52dc8077894df0b9eafe9b63a0f6478081b8ffc6b5a01cc48aab78106833b8SLSA-2024:1821Moderate: Java-11-Openjdk Security UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7java-11-openjdk-javadoc-zip-debug-11.0.23.0.9-2.el7_9.x86_64.rpm83bf9c4398525ee7235519d471d34273b1eab0a40c397efbb926105051049d04java-11-openjdk-src-debug-11.0.23.0.9-2.el7_9.x86_64.rpm433671636d3ff2ed55052ae80016a5bf3cc10113b000be4e054d38340c1fa348java-11-openjdk-headless-11.0.23.0.9-2.el7_9.x86_64.rpm4fcec7872a4167f05a2253652cd1080227bb44714c997916cc428c7dfeb7e72bjava-11-openjdk-javadoc-debug-11.0.23.0.9-2.el7_9.i686.rpm2287b02610b5ca856eef97c4399a7c05098956fe60f54c163b81bbd72d046135java-11-openjdk-static-libs-debug-11.0.23.0.9-2.el7_9.x86_64.rpm76348cd9945afc43080010a400c33dbe2f3caae0a92f79c52e4dd89a660fb45ajava-11-openjdk-javadoc-debug-11.0.23.0.9-2.el7_9.x86_64.rpmc4840f9613e6ed3d1e856759f8ae2b64c39dadc5a6a0796a955744b1326c84c0java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9.i686.rpm66d7708d57587d0bbb7f3aa5da321a292b9a3ece5bc795f8a93ca187888a4f39java-11-openjdk-headless-debug-11.0.23.0.9-2.el7_9.x86_64.rpmf54a1040f9ff05f7c90bfd476058e20983715f79fe14e709ecb98fb8dcf8eee6java-11-openjdk-devel-debug-11.0.23.0.9-2.el7_9.x86_64.rpmddf698e9510fc5f9ebe182220b487f28838d9f0643f0d672f8205d4c081fb571java-11-openjdk-jmods-11.0.23.0.9-2.el7_9.i686.rpm8e8db98b1336dc22e9f6260200f7cf67fe6e41ab873dabe2d6da8233a5af5eb0java-11-openjdk-11.0.23.0.9-2.el7_9.i686.rpmc816cdd66389a18294ccd7d1f7daaf4e76e70c652ab59649ce25c61bff610cf1java-11-openjdk-demo-debug-11.0.23.0.9-2.el7_9.i686.rpm256ac25644e7dd3d70c4780b8ab3cbf37551086087ce78b6a20c5189b202f309java-11-openjdk-demo-11.0.23.0.9-2.el7_9.x86_64.rpm4d62abd5413d28dec9654b5538b1a048c9bfa1143edb7b9dfbbfd0027246a157java-11-openjdk-src-11.0.23.0.9-2.el7_9.x86_64.rpm73fcd8c65d03fd78b26fb9a5b37dfde0bb13a7536216b3cddd40d4f4d47401c2java-11-openjdk-javadoc-zip-debug-11.0.23.0.9-2.el7_9.i686.rpm0a63ee84ae817929cab3f49b5d8695161dba65b7afdaba91c208c647089b0a3djava-11-openjdk-demo-11.0.23.0.9-2.el7_9.i686.rpm275f3d258d3d6ec26e355436793272b83dd2333fcf504d9c954e6b5bf68ab735java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9.x86_64.rpm93b23fbbf28a017c1ce8b6adc2d68f6af0707cb664887246c334caa9c194701fjava-11-openjdk-demo-debug-11.0.23.0.9-2.el7_9.x86_64.rpmb1b6ee1e6944ff30f1b9fb7115caed23f4763fb38f08db5bd0389715532592a6java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9.x86_64.rpm8db4502addde63a3d96670c3a5c036dc93285bd28634f1d10d28d4d0f519295fjava-11-openjdk-headless-debug-11.0.23.0.9-2.el7_9.i686.rpmb92fafe1e4203272638d4871d2d5c87b17a94af5560426e97deb419dacb882c6java-11-openjdk-debug-11.0.23.0.9-2.el7_9.i686.rpm28d755e9c43b1d35a38ee0be97dc1383047b60341a0f054cca72ba9054d952e3java-11-openjdk-devel-11.0.23.0.9-2.el7_9.x86_64.rpm81c86fe4a514adee5f88ec8459181b1de99df7ed6982e9ed2c8dce31be634357java-11-openjdk-jmods-debug-11.0.23.0.9-2.el7_9.i686.rpme3893ad0cc9afa1d48812473113d15b0a69b9091e83c1bc1462589fef73b8cc8java-11-openjdk-devel-debug-11.0.23.0.9-2.el7_9.i686.rpmb78ba6a368741f19c8d8e34add033eb125d3146948b4e7fd6541b82e1dffbf0ajava-11-openjdk-debug-11.0.23.0.9-2.el7_9.x86_64.rpm42e0262d4474aaf0389974ee13fa2d981e491bbb07683f7b4c6329edf6557d83java-11-openjdk-headless-11.0.23.0.9-2.el7_9.i686.rpmd6ad00980db65031bf41c48fa478db9c382eb95e54302a445595034f1730aa0djava-11-openjdk-jmods-11.0.23.0.9-2.el7_9.x86_64.rpmd8dfa59d0f2dd9a44a3631795e37ab959edcb3877fbf631dc5a9ef2f99a76df6java-11-openjdk-devel-11.0.23.0.9-2.el7_9.i686.rpm9c9120e36d54a44510c9d8861582a75d6e6aad532ed4d28f57d2a960448564c9java-11-openjdk-src-debug-11.0.23.0.9-2.el7_9.i686.rpm40d48da8a29c49d1fa3e7bfe26af46afc08a5af9feeff7a65050876117edbbc3java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9.x86_64.rpm44d581cf158533a72118a6461a310d4da57a5b45aed55b41e97c27a29e277e7ajava-11-openjdk-11.0.23.0.9-2.el7_9.x86_64.rpm7bb1431fad617ee085a71171ba969888296b01db0f3fde4bbbc0178bad08cccejava-11-openjdk-javadoc-11.0.23.0.9-2.el7_9.i686.rpm7e33c0ced954204da3edbf3fe83aa47c1a89367b01943da62947679f686e75cajava-11-openjdk-src-11.0.23.0.9-2.el7_9.i686.rpmda5a45e8546769c6a9fb143e6392357a5b7219676762c3314699251c92d6b958java-11-openjdk-jmods-debug-11.0.23.0.9-2.el7_9.x86_64.rpmc15a40f868117eb65143aef6ce9a4dd5e62a2848fbe4ceef0ad576ae4233329fSLSA-2024:1910Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.10.0 ESR. Security Fix(es): * GetBoundName in the JIT returned the wrong object (CVE-2024-3852) * Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854) * Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857) * Permission prompt input delay could expire when not in focus (CVE-2024-2609) * Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859) * Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861) * Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.10.0-1.el7_9.i686.rpm7aa2b7e271c8808b35f2e8c47723c3842c4604ae0ebbeec74b2b64f89c658cbbfirefox-115.10.0-1.el7_9.x86_64.rpmd474c789af4e006b84209b179f4e0c6be2a1a86df34b65a9c1b4b4944eba55a1SLSA-2024:1935Low: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.10.0. Security Fix(es): * Mozilla: Denial of Service using HTTP/2 CONTINUATION frames (CVE-2024-3302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. lowScientific Linux 7thunderbird-115.10.0-2.el7_9.x86_64.rpm3696d5d5fb5df0d910ac63a3812b6b8dcbd4f73d94a8e492276e66cd49d1d3a1SLSA-2024:1959Important: Shim Security UpdateThe shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Security Fix(es): * shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547) * shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548) * shim: Out-of-bounds read printing error messages (CVE-2023-40546) * shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549) * shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550) * shim: out of bounds read when parsing MZ binaries (CVE-2023-40551) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. IMPORTANT: The new shim revokes ALL VERSIONS of GRUB2 before grub2-2.02-0.87.el7_9.14. Therefore GRUB2 MUST be updated to the latest version: grub2-2.02-0.87.el7_9.14 BEFORE or SIMULTANEOUSLY with this shim in order for Secure Boot to continue to work. Failure to update GRUB2 will result in an UNBOOTABLE system. importantScientific Linux 7shim-unsigned-ia32-15.8-3.el7.x86_64.rpme205f2d8305e0b78da2a23ae1ec4d74aab02e8666f7ac0573866fdbf52ca7d5dshim-ia32-15.8-1.el7.x86_64.rpmf9b40dc9c290d5b52191e1ee291cb54f54bd2decf7caff9846910f154d7a87d3shim-unsigned-x64-15.8-3.el7.x86_64.rpm1960322489956f7c9e0fee46c0b1f582aa9f8f421121d9bb40fdee4ef68191bbshim-x64-15.8-1.el7.x86_64.rpm22cbf183fedbf7bd3f9d2d686e657129a007b4d766f3498f6633df7de49997c7mokutil-15.8-1.el7.x86_64.rpmc0381e57fd3d566a9d884ed245c28a97fb5db1c6f56b62d93a63077d718a1caaSLSA-2024:2002Moderate: Grub2 Security UpdateThe grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7grub2-pc-modules-2.02-0.87.sl7_9.14.noarch.rpmde553d66e74eb6e3b7291f750da30dbb325c1c4eb33c4503ee423eebfa6049d4grub2-efi-x64-2.02-0.87.sl7_9.14.x86_64.rpm5f59ec5b5ba3c614f0f6472378271d2b953a6a574efee9bc5bd3eca363cb01edgrub2-pc-2.02-0.87.sl7_9.14.x86_64.rpm108388534ab5669c827705a133cc30f5e1641a6ecfbc597074fe1c98fd198215grub2-efi-x64-modules-2.02-0.87.sl7_9.14.noarch.rpmabb1623323af16e8fd73f12c1dba456f6b92b4a57d94672fc75150a79e8045ddgrub2-tools-minimal-2.02-0.87.sl7_9.14.x86_64.rpm9f04dd1ad4933b1c0e401399052fe39d4c87fa9af4983150928cd5dcc7f4d77fgrub2-efi-x64-cdboot-2.02-0.87.sl7_9.14.x86_64.rpm5de060c344853637840847f2dd6643619fb84110543232a75b7bbbff64326da4grub2-efi-ia32-2.02-0.87.sl7_9.14.x86_64.rpmb0752bb4a2a765df6f934dc5e17464bca7e00f5f5815c029c145afa6986c9641grub2-tools-extra-2.02-0.87.sl7_9.14.x86_64.rpm8a17558cb3dc6d0c38515fb2f16fefc7a0e1ed8b825c0f1ee8477bf43adbc06egrub2-efi-ia32-modules-2.02-0.87.sl7_9.14.noarch.rpm72fe341a890b11586020e592b63e0ec987d05506b3f1a23b53418e605a7f5d96grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.14.x86_64.rpm92183c4ed0632506a9dfa50d34fac96dc53b4ebdb641d69e1f705377fdf5db16grub2-2.02-0.87.sl7_9.14.x86_64.rpm516bae7d6c7518b69717c806a9cf27281aee56cfa3e37be492ebdd3c1db09675grub2-common-2.02-0.87.sl7_9.14.noarch.rpm9c52b9c63bdce728d5bf47d2c8c7a1de03c87359b8da295581efdce3ac56b976grub2-tools-2.02-0.87.sl7_9.14.x86_64.rpm926e8500cb90ae1aa6ae3931f1d2990822c04cb72f6a3a68ef2e735796469767SLSA-2024:2004Important: Kernel Security And Bug Fix UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security fixes: * kernel: use after free in unix_stream_sendpage (CVE-2023-4622) * Kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * kernel: irdma: Improper access control (CVE-2023-25775) * kernel: net/sched: sch_hfsc UAF (CVE-2023-4623) * kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) This update also fixes the following bugs: * NFS client closes active connection (RHEL-22193) * kernel panic at __list_del_entry from smb2_reconnect_server (RHEL-26301) * kernel: race condition when call to VT_RESIZEX ioctl and vc_cons[i].d is already NULL, causing a NULL pointer dereference. (RHEL-28639) * kernel: net/sched: sch_hfsc UAF (RHEL-16458) * kernel: irdma: Improper access control (RHEL-6299) * The message in RHEL 7 ?stack-protector: Kernel stack is corrupted in:? is triggered because perf_trace_buf_prepare() does not verify that per_cpu array perf_trace_buf has allocated per_cpu buffers in it. (RHEL-18052) * [rhel7] gfs2: Invalid metadata access in punch_hole (RHEL-28785) * UDP packets dropped due to SELinux denial (RHEL-27751) * Boot fails with kernel panic at acpi_device_hid+0x6 (RHEL-8721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7kernel-devel-3.10.0-1160.118.1.el7.x86_64.rpm85c7c3767f97a197245c84b2d5d239e52a212f765679a2013ff68f6b5660fc0akernel-3.10.0-1160.118.1.el7.x86_64.rpma215bf9176ac171af3703f8c45d6e6621d6f6d2ce4c2ea29341a7493e621608abpftool-3.10.0-1160.118.1.el7.x86_64.rpm17c07e3477c895a66bb5c88501f56574d18b9212f014105fb2699c78b52ed894kernel-headers-3.10.0-1160.118.1.el7.x86_64.rpm1f1abf69033db1dd3be82b519f1fae78b9df2de0ed9ae8ddb293a58726748b72kernel-tools-3.10.0-1160.118.1.el7.x86_64.rpme7c74b0039e8ab1b1bbb5ea76ca60ac8fcf39cc7cae5be1c8a2e402d110eb944kernel-tools-libs-devel-3.10.0-1160.118.1.el7.x86_64.rpmf679408054e52eef048fa610a3e07716247e545532cc89f912203db8407a7e92kernel-debug-devel-3.10.0-1160.118.1.el7.x86_64.rpm5faa45f1201c00caf00a824b5d0bef925ca3036d4cf259aec024b0ce5450c54dpython-perf-3.10.0-1160.118.1.el7.x86_64.rpm88255385c921df551bea5f3d19750b17a2eee06689d6b91a3f89eccf45f89913kernel-tools-libs-3.10.0-1160.118.1.el7.x86_64.rpm6a15f0c30a63a29a9fb0bcabab646c9d9ee1b32fd92514e6b5a68a2b1b3e8dc9perf-3.10.0-1160.118.1.el7.x86_64.rpmcf3cc9c6705a2cbe65cd973ed0addde6d273fcac8437cecf5351a2ffbc98c213kernel-doc-3.10.0-1160.118.1.el7.noarch.rpm9b4424bfbc18595a30c25a73762427674af6836540345ff342cd74a998cb3d1akernel-abi-whitelists-3.10.0-1160.118.1.el7.noarch.rpm7d8361f62fafbcfaa2d6ec717398c300db78c693c85387ed4351ead083beb4bbkernel-debug-3.10.0-1160.118.1.el7.x86_64.rpm7a1fb05bbeaaa66ba9f9f65a88b7cfb485dada88626e074b6fccf90b5e194406SLSA-2024:2080Important: Tigervnc Security UpdateVirtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7tigervnc-icons-1.8.0-33.el7_9.noarch.rpmfbb4c6d0df2b7888ffdd23d8b5619d0ac83f946c8b39084b08b95cdf80de40fetigervnc-server-1.8.0-33.el7_9.x86_64.rpm39886431c1b102e3aef949be9fe7107c0710a22ca042910dfe6462ced503dcb1tigervnc-server-minimal-1.8.0-33.el7_9.x86_64.rpma9dd08cdddf52dae3391416ea2ee088e60c58672abf9cb11b5c4ac55d735bc47tigervnc-server-applet-1.8.0-33.el7_9.noarch.rpmfdaa2953aba5d18d06f8d606541a1b2ec1b74cfef56f022ee0bc02f60c18889dtigervnc-license-1.8.0-33.el7_9.noarch.rpm194bd13249ee6ad299694362025856b55fe23b4054243b1c4e68abcb55cdbbd9tigervnc-server-module-1.8.0-33.el7_9.x86_64.rpmd7aa613f092e0e42839c77c6b97cb2a2a75091b3bbd0d42b00ef1cd14817735ftigervnc-1.8.0-33.el7_9.x86_64.rpm940566e6ba4ba98b4c9ed8c06be7ed68d2471417c41d545b2f6e5854198ede2cSLSA-2024:2881Important: Firefox Security UpdateThis update upgrades Firefox to version 115.11.0 ESR. Security Fix(es): * firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) * firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) * firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) * firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769) * firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) * firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777) importantScientific Linux 7firefox-115.11.0-1.el7_9.x86_64.rpm55b3f7841e4098f37f5a346f303ee689395bc9be8e5efe3b0e96a1e5ccb54f3afirefox-115.11.0-1.el7_9.i686.rpmfcb8f9aa002e42dfc510d097a721581620a8463d40e7b727bff2e5e03f417f29SLSA-2024:2913Important: Thunderbird Security Update This update upgrades Thunderbird to version 115.11.0. Security Fix(es): firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769) firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777)importantScientific Linux 7thunderbird-115.11.0-1.el7_9.x86_64.rpmf95888eca1b9df9142fbc591b71f10682ab0ffd6264ed25f746e3f2d612ba572SLSA-2024:3304Important: Libreoffice Security Fix UpdateLibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution (CVE-2023-6185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Scientific Linux 7libreoffice-langpack-bg-5.3.6.1-26.el7_9.x86_64.rpmef9622f9bd1d4eb951525595543a22050bba30dc1e3d0089bea6fa58065dd567libreoffice-langpack-st-5.3.6.1-26.el7_9.x86_64.rpmb5b2d90f8468a6c8fc833cb41acb323728f26727ebac7a27350abf013cfc35c6autocorr-de-5.3.6.1-26.el7_9.noarch.rpma3b47cac2b8fb9f3d0f229138c054be941af5c5381759fd1cce395d3f27ac166libreoffice-help-sv-5.3.6.1-26.el7_9.x86_64.rpm25bb9c3bb53e3675929599cb36b225fbee3073d6d44a1af01d4cf9821b3c1a65libreoffice-help-nn-5.3.6.1-26.el7_9.x86_64.rpm67f5137567d9ad9d16fb01a97f0c8fd8f17d171e9934bfd17f751675eb113678autocorr-sk-5.3.6.1-26.el7_9.noarch.rpm24f444d6954d85cd78c3fb489ce745f252fedcce1ab8892d8b1f5d8bc49ed5aaautocorr-fi-5.3.6.1-26.el7_9.noarch.rpm30db863d976679c99cb04ef3c7b435a0736c70b30795e3dba6909028a72f5169libreoffice-langpack-nl-5.3.6.1-26.el7_9.x86_64.rpmbb2257b24f1427cd0565223008ee7e702ff516159428db37349d2610cb37c3e7libreoffice-langpack-ru-5.3.6.1-26.el7_9.x86_64.rpm8f82f7a62de024c68b823355e638d6b8f64e351974c45d0d83d1a3372b03684flibreoffice-help-de-5.3.6.1-26.el7_9.x86_64.rpm80005d57bd471955774fec5d0e74152e3453f581711d2ef418c947727899cabblibreoffice-help-bn-5.3.6.1-26.el7_9.x86_64.rpmd6c44cae2de2955fc1496abc321fd8c5d1462105e14f363bca7c69546aa0fd92libreoffice-gdb-debug-support-5.3.6.1-26.el7_9.x86_64.rpm2cb747b449861a615682d21f10a6a55152455dc5a3f662c6769b4ca583b506fblibreoffice-postgresql-5.3.6.1-26.el7_9.x86_64.rpm459cb7ef55e54282a337cffe2e8118286c4a267d2d253348d9b9c59ab9b40b79libreoffice-help-et-5.3.6.1-26.el7_9.x86_64.rpma97a3949effcb6229a2e286d6e1a02d3458134353143dfa5f53b2e524ded6ffelibreoffice-help-da-5.3.6.1-26.el7_9.x86_64.rpm3eaa1fb335f4572b3bb75bbc744805f61fd173248a97384aed2f2c99695c7a71autocorr-sv-5.3.6.1-26.el7_9.noarch.rpmf54dae95768f650fbe80910d4d8fa72ebed2e95279d2b5bc475f6637c4d2dc5alibreofficekit-5.3.6.1-26.el7_9.x86_64.rpm9132367e34cb94680daabaca9391e60997147e2ad4274a5ae752cb695d394882libreoffice-langpack-de-5.3.6.1-26.el7_9.x86_64.rpm770e2a95f0cdc63a3a98368378cd40a82e8d8cab2b63851b8a0502b9e2446b58libreoffice-help-pl-5.3.6.1-26.el7_9.x86_64.rpm74d441b41d8b72166b9f635fc0c57ca0eb0a64a636707e5a32fdcbcd466133ablibreoffice-help-ta-5.3.6.1-26.el7_9.x86_64.rpm3a9e919d0f16df1ed3c5212d2151a8f1d71a5c81ab6c7f6ec5e5ab4fb527e5f1libreoffice-langpack-ts-5.3.6.1-26.el7_9.x86_64.rpmf00644d6bb6ef121a6be50f319bc7267f48a81c43f1026c0a86270e3b6b74fa8libreoffice-langpack-en-5.3.6.1-26.el7_9.x86_64.rpm01e0851ef4d5e5d558b8830384cc22e7b4485d35dd2ad557f2f418277dcc19a8autocorr-da-5.3.6.1-26.el7_9.noarch.rpm503abfb816613a202f375dc0a186b136efbb56583be231d4c47bde605ab2ff2blibreoffice-help-fi-5.3.6.1-26.el7_9.x86_64.rpmfeb8a5c95863c1607a74cf9f9f8d34b0aac63f0516c7318e4c0636f094a97e29libreoffice-help-nb-5.3.6.1-26.el7_9.x86_64.rpmccd149e01dbddbd8561581401786f22fb5abf8d17d89ccdbe98fb8e7567ca0e9libreoffice-langpack-ta-5.3.6.1-26.el7_9.x86_64.rpmfc6876fc64f592dbef2a82fcedcb89ff128940d1f1d3efb158cec7d8dfdfb546libreoffice-langpack-gu-5.3.6.1-26.el7_9.x86_64.rpm33f07e83cc97c56b8afb6f778a1d2726549addc0465442ff19a5dbccae35046clibreoffice-5.3.6.1-26.el7_9.x86_64.rpmb3c9af8786aec0e834aa04e420696eb699c249d7c6ae5ec500b000ac6b32170elibreoffice-langpack-zu-5.3.6.1-26.el7_9.x86_64.rpme8da43cee532d8081c9b6429803b745ef2870a64f3c21ede5df42bbfe4c59152libreoffice-help-pt-PT-5.3.6.1-26.el7_9.x86_64.rpm8ec1f5d1872b8993b1e272c5aab60966468c9700a052111915f7f0327d88d841autocorr-zh-5.3.6.1-26.el7_9.noarch.rpm9cc018b9c6e5a082f269bbc697500c07efc76b269ce60d0dc2eb311071174349libreoffice-help-es-5.3.6.1-26.el7_9.x86_64.rpm995ba00e29d88d777c737afb75a7d72c6a52e6cebf777749fc359c4e2e7394e1libreoffice-help-gl-5.3.6.1-26.el7_9.x86_64.rpmc34ef81db96a84c9b660d5328a9a1547568c819d286f6e20096bb41a032d805blibreoffice-langpack-eu-5.3.6.1-26.el7_9.x86_64.rpm2f9062dc7c74b65d1fe46a6aa16bff321ceef6cdf8709230296b2aa0b90f1edflibreoffice-langpack-nso-5.3.6.1-26.el7_9.x86_64.rpm8d40d448b472cf9ebf321e7bb72e9c352281913a7925249b3677f8650d71101flibreoffice-help-ca-5.3.6.1-26.el7_9.x86_64.rpm89c2d9397d0860f1cb5b554751bbe3f2dafd7334570e85f302bba63cd0d8494blibreoffice-help-ko-5.3.6.1-26.el7_9.x86_64.rpm7a2ec1147fba8a3ec5e7e20e808062f31b5cabfd9762063a29faa8f7b0f76e03libreoffice-langpack-uk-5.3.6.1-26.el7_9.x86_64.rpmb85f75b2fdefaab2dc7d9717cca1706b118ac8fb7167627feeb249f5cf9ddf34libreoffice-langpack-tn-5.3.6.1-26.el7_9.x86_64.rpme9256b8f39feb3541a0672034d4d310d1bbd973d23cdb977a4cf21b111f0530alibreoffice-rhino-5.3.6.1-26.el7_9.x86_64.rpm75732ab688cfa9f7989cacbadd50a0b5174f23b9dbf5f241beb5b8800232e244libreoffice-langpack-he-5.3.6.1-26.el7_9.x86_64.rpm0692fe12d41bd5b23726291d7d1469bb765abb3dcb9f4bce4f6c33309c406d72libreoffice-help-hr-5.3.6.1-26.el7_9.x86_64.rpm5cac849c307b75917fca18076120b5ca54640dedffa241b68af804ee27f1c638autocorr-pl-5.3.6.1-26.el7_9.noarch.rpme43f3b46401a800a651b87d46da09b528d7d5a186cf162e0a550176dd22115aelibreoffice-help-lt-5.3.6.1-26.el7_9.x86_64.rpmf5e99e8e1e3b2ae179f644ec4dfda2548d01a48bd36c9b4f0684b0536eaa0ac0libreoffice-langpack-hr-5.3.6.1-26.el7_9.x86_64.rpm952f84efdbdfdac386ed99332b7bae48a7b8362ab556d4b3c6ee8cb37fb1d1aclibreoffice-langpack-hu-5.3.6.1-26.el7_9.x86_64.rpmd1d86d10eab53d20db4f444912c986720d6975803fead8fc0b1ae5354cb35f42libreoffice-langpack-xh-5.3.6.1-26.el7_9.x86_64.rpme4d2182982dc57b03a81af5110930d01e8a2bfd0457226049a258b31f8742061autocorr-sl-5.3.6.1-26.el7_9.noarch.rpm1a5e3e534c20ed4a998986e5c76b18f5ae726a403b63bd9c348bb5bb07455cbelibreoffice-gtk2-5.3.6.1-26.el7_9.x86_64.rpm835c40cb3c82c537695f4f0560535b6f7351422b17726f8b1d77b789d0cac57clibreoffice-filters-5.3.6.1-26.el7_9.x86_64.rpmbee9125a5a79fd5187b4db55de62b35eefea3633f51ebaaaad641c60d5655177libreoffice-help-cs-5.3.6.1-26.el7_9.x86_64.rpmeced567a62efb7becdae271e06bd653ac2982d6d4cbf4eef3e5029ce99e938a7libreoffice-writer-5.3.6.1-26.el7_9.x86_64.rpm6d7855be03d7d7b110eeafcb94398cd9c02027580411502df9b8371986b4fbeblibreoffice-langpack-da-5.3.6.1-26.el7_9.x86_64.rpm12b4ece3442cb939c0656517f906c8f84fda97be5a329555806c249c58f8e2e1libreoffice-langpack-cs-5.3.6.1-26.el7_9.x86_64.rpm1a8c71e08c7ec16b62edac787e5a4811fa0a816d9f93a6fa7b46cd6c8b958770libreoffice-officebean-5.3.6.1-26.el7_9.x86_64.rpm35f836a30502d60be98021719b9b0e1b24685e3c00cf5d0c668a95b120086c57autocorr-bg-5.3.6.1-26.el7_9.noarch.rpm263fa0cbe9f9c0e1be623195c1e7735ffda6bc58d705c8191ff8f429ba6e4c7eautocorr-ko-5.3.6.1-26.el7_9.noarch.rpmf0884bafc9de29300689a3114fbfc8ab4836bd65896fc37b9f39f25d90aeec44libreoffice-langpack-te-5.3.6.1-26.el7_9.x86_64.rpma4cad8fba4738a8c92a2721c93676bc60ccbb9767d400a1492c2097f31e005belibreoffice-langpack-nb-5.3.6.1-26.el7_9.x86_64.rpm4d252c52077a4288157f9d320970da33401a5a01e75a0f82af9741993d2d85a3libreoffice-langpack-ve-5.3.6.1-26.el7_9.x86_64.rpmeb589da6e7c4f3654fb12401fde271ce537768915b27b470e9039bad20348b3flibreoffice-help-sl-5.3.6.1-26.el7_9.x86_64.rpm8f006eebe057cc3e00d8fe40be12661d8dcab825f1fa39caa96d8a07329445b0libreoffice-help-uk-5.3.6.1-26.el7_9.x86_64.rpm8f6e2a26dd16041ca5bdb463039b6a4ee48896b1abbb2118359b59e9b3d37d4aautocorr-fa-5.3.6.1-26.el7_9.noarch.rpm3a22bc47f4d7d964cdd0d40e7c9918b3c6af71b5cefd9fd26204fbfddcaf7c9alibreoffice-langpack-nr-5.3.6.1-26.el7_9.x86_64.rpm3c2d060d95957da026eedcf0df7fbe78d18f9ff8d8b935f985c9cd4d7afe536cautocorr-ga-5.3.6.1-26.el7_9.noarch.rpmf87bbbec6c230a2543c8673dee70f84d13c2898857703047c9fa1b547ef42438autocorr-en-5.3.6.1-26.el7_9.noarch.rpm0e385e4782a6e3c95d5da3a50811c48d9420ac033626956d5ccfc3004710c1f7libreoffice-langpack-ar-5.3.6.1-26.el7_9.x86_64.rpm5c7cb5980bf2fd2a93526a0c34d31c822b8c95b61289a1fa08c489ec7e4bd974libreoffice-help-sk-5.3.6.1-26.el7_9.x86_64.rpm8df067fa0f0f155a2517b52a8f39dff9fdf58146ac3b1d4c919deeafd62e3814libreoffice-langpack-bn-5.3.6.1-26.el7_9.x86_64.rpmee199201fb21b69e8e25b9c29526e40ee4bd652e4b9fe6a6c65801be41c079cflibreoffice-officebean-common-5.3.6.1-26.el7_9.noarch.rpm334f80ce2aab0f6c0f33e3f1f2b9bf05f6e0ad655703244ba6e3d4ef97890219libreoffice-langpack-zh-Hans-5.3.6.1-26.el7_9.x86_64.rpmec9274963208072c1f6c4470df6218e8b4ea9ac14737ceff7dd740ae4637085elibreoffice-help-tr-5.3.6.1-26.el7_9.x86_64.rpmf5a010af43e703876c4a74f30c3ee7af4a0c3991938ee093998e4f875b9748f6libreoffice-langpack-pt-BR-5.3.6.1-26.el7_9.x86_64.rpm333d7fbf850c543ac052c68dda2215ba101649262c2806ea36a79adfff503836libreoffice-help-ja-5.3.6.1-26.el7_9.x86_64.rpm81f10f5b9362393c38f4f74862b43e409ffbba4d54abae792ed40da4b2be054alibreoffice-langpack-br-5.3.6.1-26.el7_9.x86_64.rpmd332519afe269f839027e500eed27758f17f7b4eac67572a6cee419fa23b2a3flibreoffice-ure-5.3.6.1-26.el7_9.x86_64.rpm48854e4dc8f6413a9f690cc09c49b28206647460b08a37a6e33fa57fb9bcbc4alibreoffice-help-it-5.3.6.1-26.el7_9.x86_64.rpm41b57fac5e159ac5690d69197802663581feedb27870b12c8c82ab2054c82423autocorr-lb-5.3.6.1-26.el7_9.noarch.rpmdb63268d90efacc2f86247c92ab4c488eb43177c046719bb6584426319e6f24dlibreoffice-langpack-nn-5.3.6.1-26.el7_9.x86_64.rpmec645e165a51e39ee0435ecdd7a697235e3c9ac9e880837f6c9eeff36ec8a8d9autocorr-is-5.3.6.1-26.el7_9.noarch.rpmff4ef613698619f75c15a019e09c690f64ea2d1a1ebd795f75d3c6262271d589libreoffice-gtk3-5.3.6.1-26.el7_9.x86_64.rpm3687079db1ff18a60b37e231b27bdf87d5d3a7f71fa66c23aef0443ad4525089libreoffice-langpack-mr-5.3.6.1-26.el7_9.x86_64.rpm1fd217d63028a4ef826e52d84c1fd8dad8c5fc3c0c24687bb57fb732e5b2677elibreoffice-langpack-et-5.3.6.1-26.el7_9.x86_64.rpm288ceb03920fc5f0a86b05912f10672773c2a1fc254875ff2e2beee0cfd6c1dcautocorr-ru-5.3.6.1-26.el7_9.noarch.rpm25c50dd0bb305a7ece72c2df068c383cdfc037ea996211f31326c2c9c4616b96autocorr-ca-5.3.6.1-26.el7_9.noarch.rpm21be9612e49226d7289f16ff17af4bc3e1a12631a2508c136be57e66c4be8c0elibreoffice-calc-5.3.6.1-26.el7_9.x86_64.rpm1a17f28e96cdde37d2ad0fa5ee0c326f282ce2b88271e9ea79f60d57f2328ad1libreoffice-langpack-ja-5.3.6.1-26.el7_9.x86_64.rpm6687646ea51414a2551f2c7a0d744ccfdca6a61697545afd6abd187eae26cdf9libreoffice-data-5.3.6.1-26.el7_9.noarch.rpm00efa97a7fe7c760f897a3cb717062501892d5dc992b3b7038c07035ca53274cautocorr-mn-5.3.6.1-26.el7_9.noarch.rpm4b257004d48893b2a2abeeeaaeddbc5c85dcf157d1ae583e3f51ea9f9a7115b0libreoffice-help-id-5.3.6.1-26.el7_9.x86_64.rpm36716fca79c44542452d4129d51873cf51d0ed9a8ef1d57b7cd5adc4d85f46c5libreoffice-langpack-zh-Hant-5.3.6.1-26.el7_9.x86_64.rpm824536c5233463106a41b7b722f583086968eec27528fe875797cb5c7cf51f9clibreoffice-langpack-el-5.3.6.1-26.el7_9.x86_64.rpm62d5df20e227175ae561ec2ce7ddd47092664842dbf122f9723b642c08ab4502libreoffice-help-pt-BR-5.3.6.1-26.el7_9.x86_64.rpmd2d74225259875f0673655306938564bab0fae9fd84cf62608b3d78359663a22libreoffice-help-fr-5.3.6.1-26.el7_9.x86_64.rpm46f22749f99bc1581165da3234e3cb3b1ca323691c86b5fd1c37851ea273aa06autocorr-tr-5.3.6.1-26.el7_9.noarch.rpm54183d51af640e75658296d35bb8f066eab608baf98ae60fd1e2baed646ae44eautocorr-ro-5.3.6.1-26.el7_9.noarch.rpmfb0b63ce7c88d76be88f892e27ce54d77c8b1615e78480007d24dabd833341d0libreoffice-langpack-af-5.3.6.1-26.el7_9.x86_64.rpm6110c4ebca1618ddf81ae018ea17daa41f706aef71d980a7234489dee4989739libreoffice-help-hu-5.3.6.1-26.el7_9.x86_64.rpm0cde7a2b19ddc7fd5e1182cd683be4b8a057a8c7798c52eb3099c4f169b11d9elibreoffice-langpack-mai-5.3.6.1-26.el7_9.x86_64.rpm523b178440946fad18b97182bab88fe329e09b5066e99e2e290eb7cec888733dautocorr-hr-5.3.6.1-26.el7_9.noarch.rpm3dfbd19ff767da26f4d39f2bc17138451560210143eb01929feb4c03c37fa572autocorr-es-5.3.6.1-26.el7_9.noarch.rpmba23453b2fc17a40dec5b4369c25cc18c051dd885c686a87fdc31389cb2922d3libreoffice-langpack-or-5.3.6.1-26.el7_9.x86_64.rpma5761c8380a85423d4ccfd9f76e9576a3b36ca188d3b049c8572d67eb42caad9libreoffice-langpack-kk-5.3.6.1-26.el7_9.x86_64.rpmd78dbe6fc27e8c6548bd63a233a1b730ba4dcc886535395617a20fae00062e0clibreofficekit-devel-5.3.6.1-26.el7_9.x86_64.rpm0a878b76c7266a437493e95de61d472ed74f376777149100fba53a328e75dd89autocorr-hu-5.3.6.1-26.el7_9.noarch.rpm03a142f4d6c65427bee84e6d0c2183368347c16c102f5a1bd502ffb32243f487libreoffice-help-lv-5.3.6.1-26.el7_9.x86_64.rpme3eae24e2368fc10c93aa3c362971ac4de8cfebb765406901df5731a6d941720autocorr-vi-5.3.6.1-26.el7_9.noarch.rpmae4097650f241639b5c19eff8de2aa1a21476787f7827e816652130261870ed7autocorr-fr-5.3.6.1-26.el7_9.noarch.rpmd851171b4adec774afb0e2e51cc1bac0bdeb284b1152b8201f7ef1083f6d4238libreoffice-langpack-ga-5.3.6.1-26.el7_9.x86_64.rpmbd903c8d3132bbb7d6560c03135ee372cdf94191e9c0532f0e93f071573554c8libreoffice-langpack-fa-5.3.6.1-26.el7_9.x86_64.rpm900eeac9034f995c1167ff5d923325719fbfdcc3658a59b30746decad89ca707libreoffice-ure-common-5.3.6.1-26.el7_9.noarch.rpmfea4a0314953a510d994c065168bb8232ef9c8b59ccc51b7812c7d97bc597a7clibreoffice-langpack-lt-5.3.6.1-26.el7_9.x86_64.rpm0b07524e0d217876e66e60cf4da6ee8044e2970986a4b292d43eee1b5e45850flibreoffice-langpack-fr-5.3.6.1-26.el7_9.x86_64.rpmfcd175d83ea8b1a746990f1122f38c0bca2e24e3c263f2252378d515276f0647libreoffice-help-gu-5.3.6.1-26.el7_9.x86_64.rpm34bb7c1405956a5ef18327b95c1ee5f50c3193f56d763463f56a34490a683dcflibreoffice-ogltrans-5.3.6.1-26.el7_9.x86_64.rpm08576a8f22c052528909f8c2c353ddac1b7be69eff91b43f774ca5388c61accdlibreoffice-x11-5.3.6.1-26.el7_9.x86_64.rpm6b13eb1ba3ec8391015d8f7449445978c3a7dd78e36b832e57a2401a7903eed8libreoffice-pyuno-5.3.6.1-26.el7_9.x86_64.rpmf5103765444de86e1f0ae5ac0ad0151c8a677276a8040102c2ac60b1dab72a04libreoffice-langpack-as-5.3.6.1-26.el7_9.x86_64.rpm3e13d987ab00908acc8acc301757c292c99a39fee6338cc62e20a3c02ca6cc66libreoffice-impress-5.3.6.1-26.el7_9.x86_64.rpm2d83d8093b8a33ac201107a1033384681084230f96c2a0fb3c5c04e6e73bc465libreoffice-core-5.3.6.1-26.el7_9.x86_64.rpme2dbc3f59ac23d790170a212d1ecd32479264af09f8c861d497dbc4bd4b3f99alibreoffice-help-el-5.3.6.1-26.el7_9.x86_64.rpm52b51d96924f8dda4101302a14e2c5d4235396446bbb83bc649ec96056b6e623libreoffice-langpack-id-5.3.6.1-26.el7_9.x86_64.rpm273ed25018114ade0859ecba406f22f583eb45d97e4c04069da6b36bcf82430elibreoffice-langpack-pt-PT-5.3.6.1-26.el7_9.x86_64.rpm9c32f7dcb80371360a266b61a8c079b3056068ae280d702a05ce1134060a918blibreoffice-langpack-kn-5.3.6.1-26.el7_9.x86_64.rpm40210b470382e6a8e8a735f0f46dbfeed39baddcb4cd42ff28dfbb6d7411e347libreoffice-langpack-cy-5.3.6.1-26.el7_9.x86_64.rpmc74f06e24587429d98cc8061bef080838afeceb9f7716813418740ebd8273e18autocorr-nl-5.3.6.1-26.el7_9.noarch.rpm6e89ea348468878aa44181b4960d1a000db0a9508f07409cfc497c74beb28b00libreoffice-help-nl-5.3.6.1-26.el7_9.x86_64.rpme745e70ab7050fd535b37d8519da0c9593a94139c9e932f189937276cb86fba6autocorr-it-5.3.6.1-26.el7_9.noarch.rpm19a45ccd5f50ed266d11730b04ee76ac2a82d08aaba1934c0fd1e1ac6886ab81libreoffice-langpack-ro-5.3.6.1-26.el7_9.x86_64.rpmc9d2c929ba2e6f77324b8a0d0000286e9d2f5b35cb8672be20580b367e3f7d07libreoffice-help-he-5.3.6.1-26.el7_9.x86_64.rpm66ef1a83208d83739a80d830c0784cdf31e1b3adc85b268d53600cdfd8e459b5autocorr-af-5.3.6.1-26.el7_9.noarch.rpm9f0aee2ce44078eece54d5efedf9472cdd17e5b721083bd24a68fae7b8077489libreoffice-langpack-hi-5.3.6.1-26.el7_9.x86_64.rpm10a8d0d0c113f8ed3ea7c7eb8de006e306d4b8125fbc7dbc0c161088466acaf2libreoffice-bsh-5.3.6.1-26.el7_9.x86_64.rpm0b03509e72ea4609309321ec64ff1daf6239cb5159594ade10aa4916fe9f26bcautocorr-sr-5.3.6.1-26.el7_9.noarch.rpmeabeb1624e04b2e8e1e4b026c3db53592eafbc89510834ba9358386e8fbb4070autocorr-lt-5.3.6.1-26.el7_9.noarch.rpmadc1951c23af6b856d8e53a934536c42f522cc21ff6579c0275579db8c77302blibreoffice-nlpsolver-5.3.6.1-26.el7_9.x86_64.rpm7d6c23a3e0b5848db9023e790378fbb7d0f3bad8a1b2eb1df1023dc513da33delibreoffice-emailmerge-5.3.6.1-26.el7_9.x86_64.rpm2c58cb593f2e801b523a884e5117defd8eff181fd3a037b2baa3ade8c26a93c2libreoffice-help-bg-5.3.6.1-26.el7_9.x86_64.rpm66b7e7596c7ab3df5f3fd0182811b11837f5e84a0f96febc44857a0a69bcbe73libreoffice-langpack-ko-5.3.6.1-26.el7_9.x86_64.rpm57379ba16ce0de4f414f07417310bbe575380bed1a5defe9541c2680da83cfe6libreoffice-langpack-pa-5.3.6.1-26.el7_9.x86_64.rpmf2df0d8663d1f81b965e1f07f86905fe33316b436161bbfffec1a0e3c6634839libreoffice-sdk-5.3.6.1-26.el7_9.x86_64.rpmdca5a1fe45d1658c1d892adf7f350cd423a7696fd70add7c2852195e8f7291adlibreoffice-graphicfilter-5.3.6.1-26.el7_9.x86_64.rpmb061cbb168be3d761ccec90bacacc8685a405796b5abc8edb8193565b56e4164libreoffice-help-zh-Hant-5.3.6.1-26.el7_9.x86_64.rpm4c1723f66ce9ac592922eda9c8b22365c37037afd020126589f6abf841c9a8d1libreoffice-help-hi-5.3.6.1-26.el7_9.x86_64.rpm28713067ec261e59919feb54b5daf1f59d89629cb8ebbcc31d69e997642a2b7flibreoffice-help-ru-5.3.6.1-26.el7_9.x86_64.rpmbae1548b3606ea5073e3f08868648bdbe8843445fee75b0a2403920b1a1d5501libreoffice-langpack-ml-5.3.6.1-26.el7_9.x86_64.rpmf333b058fab1f284630e34b82048d54f948c7673b8ed7ff2c7ed224aefe0f977libreoffice-xsltfilter-5.3.6.1-26.el7_9.x86_64.rpm23d2b26cdcc91af44ce506930636e784e6f2b2b8c3f5b8152e7fca8698faaf18libreoffice-wiki-publisher-5.3.6.1-26.el7_9.x86_64.rpmfd29596b851b2930224e5f6e17976d821074ac141da6c47ae9091c434a16f990autocorr-ja-5.3.6.1-26.el7_9.noarch.rpmadbc8344ba0e583dd7bcd01b3831888f371e5c3bf21269cb8a408791051bc82elibreoffice-pdfimport-5.3.6.1-26.el7_9.x86_64.rpmd0c3a8418d14b6826a4c4fbcb183b38591e6e7b9e381e25a2a7adcb1eac9ecadlibreoffice-langpack-sr-5.3.6.1-26.el7_9.x86_64.rpme897a412b36520ab68996404bed0c71f8a4153fb957b2a8af8b6aa8d5e086ba9libreoffice-help-zh-Hans-5.3.6.1-26.el7_9.x86_64.rpm7be137e30909aae32b7c166c9b0f98c1b4153d97c36400873a7638a8c2670448libreoffice-langpack-fi-5.3.6.1-26.el7_9.x86_64.rpmd0157252bf2cedcc0bb2222319be3c75bb0064b6d84a0789a01db6c65186800dlibreoffice-librelogo-5.3.6.1-26.el7_9.x86_64.rpmdc83fdcb2f43ca05652f7927cf00cf5f6143438152da7a408bac3fe583081161libreoffice-base-5.3.6.1-26.el7_9.x86_64.rpm887102cc2db652b08fd0f58637b3d369f3473e5153b02f0588a0ee19f3db95d9autocorr-cs-5.3.6.1-26.el7_9.noarch.rpm013be391bb6fa2f2ffa93f94dbfa4edd4bfbd491dd9d831e43b8c3479a76d565libreoffice-sdk-doc-5.3.6.1-26.el7_9.x86_64.rpm67bc2d543bc622a9d633fe99e1c936b18e06509fbeffdb4594da4b7626ee16a7libreoffice-help-dz-5.3.6.1-26.el7_9.x86_64.rpm0c2a60070ad1da0e058dd41256e27533a983e224bb2887557bec928fbd239dc2libreoffice-math-5.3.6.1-26.el7_9.x86_64.rpmab630ec793f92a7f88a219094c8e04cedde06f7bb94cc05d1dce8f2c76c928e4libreoffice-langpack-it-5.3.6.1-26.el7_9.x86_64.rpm68e2261a2d676040bb18a21c6829562ef86f6f9cbc74410f58b80bd9e4b92bf6autocorr-pt-5.3.6.1-26.el7_9.noarch.rpmd0f87aef7a5feff20056de6819f24b2eb47cd8e396051492b8e74eeb209a7cfelibreoffice-langpack-si-5.3.6.1-26.el7_9.x86_64.rpm66706e23d5e356fbabbd9b1dd9c69cd5f1f2a0ec0ef8d7bba31cc5a9b55c9c79libreoffice-langpack-tr-5.3.6.1-26.el7_9.x86_64.rpm3151bae8d9e845b8820b79764f22bd2fa9d6426540586d098077eba36ca9d5e2libreoffice-glade-5.3.6.1-26.el7_9.x86_64.rpmd75a3342f47bff83ee73c8ea1b59026981c96f5eabf176581448a89a95b264cblibreoffice-langpack-lv-5.3.6.1-26.el7_9.x86_64.rpm231063843eecf371187f6a93f64da1fd64da0be46047094e24df3c84f18e87a1libreoffice-langpack-sl-5.3.6.1-26.el7_9.x86_64.rpm66c768f7007f7c7d414b7296ce61e0296937fae21c8a2039c9f63c2e56956991libreoffice-langpack-ca-5.3.6.1-26.el7_9.x86_64.rpm0e4a2ffcb832c103935da256e7d70f9489649921a15c0c19b3590afcef2831ealibreoffice-langpack-dz-5.3.6.1-26.el7_9.x86_64.rpmd6e5eef25576f02eeeb978707eb21b89801b277e69c36ec7867bd831af1d280elibreoffice-help-ar-5.3.6.1-26.el7_9.x86_64.rpm12fe3abfa03244318f8987e03b81a3caafe523b68877ef3edbdc88be7348bcd2libreoffice-help-eu-5.3.6.1-26.el7_9.x86_64.rpm2cf8ba3b420635ef922c4cb00f529b801a17d195c54ae12ec4b6251f9a18fecdlibreoffice-langpack-sk-5.3.6.1-26.el7_9.x86_64.rpm0b3f57772f97dbd58e94bba840fb36fd0e24e2931be45ab5f977f6eb20491cb9libreoffice-langpack-gl-5.3.6.1-26.el7_9.x86_64.rpm52ef4f9297e0e368c60f0ab98566fc36d9626232fb4f236e3e3ed98709e96654libreoffice-langpack-pl-5.3.6.1-26.el7_9.x86_64.rpm6e2085402b65195e469936a84c4e0ada2df03470098fa406ef14cb3d7abebaealibreoffice-langpack-sv-5.3.6.1-26.el7_9.x86_64.rpmaae7c8bf2edf349a3121d67bbd605f2d6b47e16b9fc02bff54bd75a1d9260c2clibreoffice-help-si-5.3.6.1-26.el7_9.x86_64.rpm733aa7715ca452e249242ef23a771ed3ed5a0e5c3c0af55bab664e084ee98699libreoffice-langpack-th-5.3.6.1-26.el7_9.x86_64.rpm7a02caf1b3e27b52f981aeeaf0b0fd23e83a9f73df7088d0a3421fca44026bd1libreoffice-opensymbol-fonts-5.3.6.1-26.el7_9.noarch.rpmc05ffb252ef26f4f92684828b6202a25c5e78218e4ad55c12973406bf1cd3d45libreoffice-langpack-es-5.3.6.1-26.el7_9.x86_64.rpmc43335de3d14ae55f043111782317c055cf2cf8cbb5fd533f7c1c83daa2aed35libreoffice-draw-5.3.6.1-26.el7_9.x86_64.rpm8fe78c5ec0028bd7e8a0862c9d4cf290fbf3f61f17b5644e82849ee8ba375ca7libreoffice-help-ro-5.3.6.1-26.el7_9.x86_64.rpm5be883281076f9071937161c50a136b6553ffb46c4a0a268b0309f952936272flibreoffice-langpack-ss-5.3.6.1-26.el7_9.x86_64.rpm9b1a8e7376040cef9dd8ead12ad46b24787373cac049a6da2aa84a908657ac87SLSA-2024:3588Important: Glibc Security UpdateThe glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961) * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7glibc-headers-2.17-326.el7_9.3.x86_64.rpm843dd0d3534fe6de4d95ad59b4e49ed8ec36148e16a5be1024bd64c62a17db0dglibc-static-2.17-326.el7_9.3.i686.rpmd39f99534f379dd0ec18247727d0a01ec9251de985d75d9f63f200337cfbebccglibc-utils-2.17-326.el7_9.3.x86_64.rpm7665222bf18b4e0b158a3e9bb6a4da884f20ef0e0c8db284bf10b7c5d0d89c5fglibc-static-2.17-326.el7_9.3.x86_64.rpm7670b83eefa3e11179becdbcb635147df98cc1c0331612d2b4f2d40317b738e4glibc-devel-2.17-326.el7_9.3.i686.rpmbb730c521722df672043b2b40f49625768e9bad4ffd700790e09bd63900d8500nscd-2.17-326.el7_9.3.x86_64.rpmbc1c535d0db6187e128a5af7965d1346c3cf0492045602b3cb2ecdb083bfed64glibc-devel-2.17-326.el7_9.3.x86_64.rpm4ab00831127885d667821613eae4e2dbed1d7eebb1287325c0c1fdc4dda42819glibc-2.17-326.el7_9.3.i686.rpmc8c61117617e6794ebadc6510b43c5e721fae3f77a1aea9fbb7e2b6a531e98b5glibc-common-2.17-326.el7_9.3.x86_64.rpm6e7f04ad6991bc8f7a6b8fb30137c2ca7760aba5f7d81572a2fb1d0a3cd560a9glibc-2.17-326.el7_9.3.x86_64.rpm8a4fd18dc3dae3f8f3c6f2595feb00b528d2cc3fd8104e7e8c794f5fff8e1c26SLSA-2024:3591Important: 389-Ds-Base Security Update389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657) * 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7389-ds-base-1.3.11.1-5.el7_9.x86_64.rpm4bb008c67054c254644ed9a188102cb4b1b0fd7db5f89b1abd1eaee2e7447aba389-ds-base-snmp-1.3.11.1-5.el7_9.x86_64.rpm2f6a187729fd8008655829d30a03a9815705703d6e6542300457e3c7c01cb463389-ds-base-devel-1.3.11.1-5.el7_9.x86_64.rpmc248d741ee208387787d00e8fc5b6495693ccb0ebf51e284d6e4da368a2e4dca389-ds-base-libs-1.3.11.1-5.el7_9.x86_64.rpm4243aa3daf6677e330b5d5070f6a23bc08189c76f4c7f7045d6572533a1dfbd5SLSA-2024:3669Important: Less Security UpdateThe "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors. Security Fix(es): * less: OS command injection (CVE-2024-32487) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7less-458-10.el7_9.x86_64.rpm7d95fae06c53a8ff59f8d569fe46081129eecf1d791b94d9ff3b6d46c8c9bd04SLSA-2024:3741Important: Bind, Bind-Dyndb-Ldap, And Dhcp Security UpdateThe Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bind-dyndb-ldap provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) * bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Scientific Linux 7bind-libs-lite-9.11.4-26.P2.el7_9.16.x86_64.rpmb044f5a4c39d1dd29ce2ccff898f9ca792351959be1c08b4610acba6a1fe58b9bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.i686.rpmd24c1e0b80bd65c8251468edf20361dce51914038ea58a76b78af3b36dd78f06bind-utils-9.11.4-26.P2.el7_9.16.x86_64.rpmfcef407deaff523bd33246988e7b8a225328b4b994edd029ab00d44294eaf4cdbind-sdb-9.11.4-26.P2.el7_9.16.x86_64.rpmfce5eb3650a9d7c2521368afbb5e605bc03375bf094563d2cd77d8ca45833e40bind-lite-devel-9.11.4-26.P2.el7_9.16.i686.rpm7239f50fe947c5ac7f39c1a01075306f971286044c9218e9d58f3cc101e0ca08dhcp-libs-4.2.5-83.sl7_9.2.i686.rpme0dff60c3ed7241a26409728873c760de880266ba724ce8142520a1ad5b1fee1bind-lite-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm0534337fe5307e8d85d0625084b5f624ce304d777f48191c12c50146f66853eebind-9.11.4-26.P2.el7_9.16.x86_64.rpmbd5e70a0212accd5936d046ed9fb4c5a8d2dddd4fa7ad8b75af8e091fb5bb8d2bind-chroot-9.11.4-26.P2.el7_9.16.x86_64.rpm8643b0b2c5e2f71c4df53fe6211e994ea852a88f631f910949dbbe2a58ee796cdhcp-devel-4.2.5-83.sl7_9.2.i686.rpmc3303bca874a8ac6dab1fb338cada5e9a2dbf59fedbe101cf48b2a4d1a5595febind-pkcs11-9.11.4-26.P2.el7_9.16.x86_64.rpm1b8aede2173ffa6bd9289d4bc77a420238c59d11b0ea3d1da9f66045c8e01805bind-export-libs-9.11.4-26.P2.el7_9.16.x86_64.rpma8311e89008970b7f435d37d08840003edc0485ca9452f3b9080062f4eec04cadhclient-4.2.5-83.sl7_9.2.x86_64.rpm8c2ff2529378c6abf141528f974b617367815d0197f11598a09ac8820edddde4bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.i686.rpmc40153a8d482a16f43689a92dd75bb0c130ebd094c294e7981c4f0a2292933c6bind-license-9.11.4-26.P2.el7_9.16.noarch.rpm3c6cfe6a108e6d941d432f6ebae3078f9325041699498eafc1ad3035185eacc7bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.x86_64.rpm9f9e9992dcbcbd5720ced850ac16d28a0326a39ef42f9669e3e80df4280cd525bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.x86_64.rpm56a99c96032ac99d323a9f83823a4917122ac100ab4bc6e1616cf78ce9f58928bind-export-devel-9.11.4-26.P2.el7_9.16.i686.rpm853121aefeeb2034ab53a9ba2fd9767de727d4e93183f3ababf92334c7c38d43bind-export-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm321f572da23c12f51a046c20862ecf1d7d0844778c944b9ba1d52e4e17335918dhcp-common-4.2.5-83.sl7_9.2.x86_64.rpm53490b53a48f1d43b8016ace88b6fb33690e6d0c2695f9670886c5c9db6dd9febind-export-libs-9.11.4-26.P2.el7_9.16.i686.rpm76cca9b75645f52f5edb6ed39fc5a1d160a5aad3a6970ae56df01dcb84e7260bdhcp-libs-4.2.5-83.sl7_9.2.x86_64.rpm20f7d3db9eff4dc2ca1e7980bff380be5b4715f98b6bc2d7cfb5320f0f86607bbind-libs-9.11.4-26.P2.el7_9.16.i686.rpm92c35f94753224ecbff8cd57f0dbf638a730c5c1eed246974f29c64e04bbce95bind-libs-lite-9.11.4-26.P2.el7_9.16.i686.rpmbf6c365df6a147fd248a08810bdc4ff6b818bfa957010fca0bbddab55cc9c485bind-sdb-chroot-9.11.4-26.P2.el7_9.16.x86_64.rpm3f058a758221e6b4a7fa74f29406c9779766f8f38a9828a1302a45caf9724a30bind-devel-9.11.4-26.P2.el7_9.16.i686.rpm031585ec8dc96c4fd5dfe1ce220340a60a557ae2bf7899df13c5be3d6f5a2ce5dhcp-4.2.5-83.sl7_9.2.x86_64.rpm834691aae0477a2f149b66ae29c42bd7b3066b4240836acaa5d5ef8719f24d68dhcp-devel-4.2.5-83.sl7_9.2.x86_64.rpm807f6702ae1bde7cdbb67ff748525b2209ae5497a2947cae53b9d9471758dd83bind-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm5adaafa30648022229bc65fd33b6676c658482a11aa919f733fa5ac68903656dbind-pkcs11-devel-9.11.4-26.P2.el7_9.16.x86_64.rpma78b617d9ea3cc0d893b0ab2c12fb4606e1bec7a1153d6c2174312a57e55f907bind-dyndb-ldap-11.1-7.el7_9.1.x86_64.rpm891a2dd866f20045a500b99c2e15b34d8d0f3c71ad6f27a26df9f03d4fabf1d0bind-libs-9.11.4-26.P2.el7_9.16.x86_64.rpm1ce23641aec877c25ea87627b60d907e1882bf8b51fe4eca4d6f72be97445686SLSA-2024:3760Important: Ipa Security UpdateRed Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * ipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7ipa-client-common-4.6.8-5.sl7_9.17.noarch.rpm7821701b54f781b31921062f9fe63e974a21123e9190ede8f5187a67d586d982ipa-client-4.6.8-5.sl7_9.17.x86_64.rpm93a87fc0e2212cf1e31ad00298ea392d9ad94739874fad14c04b0f2b7fb6410bipa-common-4.6.8-5.sl7_9.17.noarch.rpmfa2f9dd34d8046319715933616a82e39bae58008145c5c3492de1a296c2e1384python2-ipalib-4.6.8-5.sl7_9.17.noarch.rpm068d077c2c07089fe3edecc5e44ff8fb5aa2766136207a0ddb0473bae25ed422ipa-server-common-4.6.8-5.sl7_9.17.noarch.rpm8d67fb74ee961ff0b2f415baae48692945350964f9516117a217449423fa4d3aipa-server-trust-ad-4.6.8-5.sl7_9.17.x86_64.rpm3b0f0ad7a2147d1f1f10d932152de92d1dcb357df6730254e2e9559580d7733bipa-server-4.6.8-5.sl7_9.17.x86_64.rpm36f137526fceb17fe43af9a0ac6eab125cdb4df6c80c7c486ab8c74298d04a31ipa-python-compat-4.6.8-5.sl7_9.17.noarch.rpm8f54bcec34e770e33290bd3059dc06d38d3f315c93587a5693525c28dfdf5285python2-ipaclient-4.6.8-5.sl7_9.17.noarch.rpm36c75ccabfcc8b38143e63be8041ee675af3c9cd2f5dabfd72ec0fecda00a3fdpython2-ipaserver-4.6.8-5.sl7_9.17.noarch.rpmf763230923cb440bc060d9ac2280a90d77795a1ee5e26b7b7f06ea8219b6709fipa-server-dns-4.6.8-5.sl7_9.17.noarch.rpm91f72ff9818e271628763b73470d0af7890196d4878118288e30b18bd07be825SLSA-2024:3939Important: Linux-Firmware Security UpdateThe linux-firmware packages contain all of the firmware files that are required by various devices to operate. Security Fix(es): * hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi (CVE-2022-46329) * hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-27635) * hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-40964) * hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-36351) * hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-38076) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Scientific Linux 7iwl5000-firmware-8.83.5.1_1-83.el7_9.noarch.rpm971551d77a561506a1454c441d5127fc64f1e0ad7f40b39072602d9e3b4145d4linux-firmware-20200421-83.git78c0348.el7_9.noarch.rpmca8cb0dbabae917a72b4843c4d4f884cc381e8176bd65e0969b3665c96aa8312iwl135-firmware-18.168.6.1-83.el7_9.noarch.rpmdcf942aa2f2faf0e6a3b6ef4f1052dadc381159cb4ef4629b15c8a54db33febaiwl7260-firmware-25.30.13.0-83.el7_9.noarch.rpm946714c1fa268dbb4e08437b0300a82d7502b214f2fbce77802fa5628d326b13iwl6050-firmware-41.28.5.1-83.el7_9.noarch.rpm9f166724d8478f203194ac63efeab50449daa38d0cd0cc994dddee9511878cdfiwl3160-firmware-25.30.13.0-83.el7_9.noarch.rpme7177f501675aab4fac5cfc957f315fd4f80df283ee5460f2a95cddcf623a8beiwl100-firmware-39.31.5.1-83.el7_9.noarch.rpmda392ebb2385ed063ab4c8fbd17f3a9396ef72fb9d2a441bd5b4bdd8f6c31b9ciwl4965-firmware-228.61.2.24-83.el7_9.noarch.rpmcd2b70ee45202cacd7ded2c6904c3931cd2f665f4468d19d3046ed9d4b48d699iwl1000-firmware-39.31.5.1-83.el7_9.noarch.rpmb70316faf331baff817139200b7d02fb64bd6f60f7997af330bcd58c619c9367iwl6000g2a-firmware-18.168.6.1-83.el7_9.noarch.rpm1b433786cc7bf5829a3993953d376776a484893a76868b102e92de20f58e53d3iwl3945-firmware-15.32.2.9-83.el7_9.noarch.rpm39dfe518a7de51399501c7b8d8d35c6e9dfc54ac4bbfb69128a3cf98f3db34e1iwl6000g2b-firmware-18.168.6.1-83.el7_9.noarch.rpm4d77048815d0695d8f291972a83a9aed8b31382cafcab4fbc914a5b5987743f8iwl105-firmware-18.168.6.1-83.el7_9.noarch.rpma95c72b8a7a95e1382045ce454596ffeaaa69489565da2965939ae25b857fd49iwl6000-firmware-9.221.4.1-83.el7_9.noarch.rpm4f7099c4686c0a5e23b3a3aba6637a67680ac60ddf0357fcf2325d465d87dda5iwl2000-firmware-18.168.6.1-83.el7_9.noarch.rpma6f9f3d124b68eaa5cd65e78dce1cecca07fe5fed3042426dfc5a1db16f30554iwl2030-firmware-18.168.6.1-83.el7_9.noarch.rpmc9de442c37261b41d340289a80d0a501999d78517f39e35cf3fa4ea9b955a6c5iwl5150-firmware-8.24.2.2-83.el7_9.noarch.rpm9bed3e483a07f2f8106eba69a19f6ef97f370094cec44d03ef022392219a7d5bSLSA-2024:3951Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.12.0 ESR. Security Fix(es): * firefox: Use-after-free in networking (CVE-2024-5702) * firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688) * firefox: External protocol handlers leaked by timing attack (CVE-2024-5690) * firefox: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * firefox: Memory Corruption in Text Fragments (CVE-2024-5696) * firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Scientific Linux 7firefox-115.12.0-1.el7_9.i686.rpm41e8de5dbaf7edd561b02da9f156216c5982e2f4326644467119227a823fdae3firefox-115.12.0-1.el7_9.x86_64.rpm2feb1182f4e9c3847308dc41f7149bbe823c5079ed219674ceec70caf01b8355