Package | Version | Build Date | CVE Fixes | Changelogs |
---|---|---|---|---|
ciq-lts86-rocky-release | 8.6-6.el8 | 2023-02-10 | - | 2023-02-10 : - Fixed issues in source repository URLs |
stalld | 1.17.1-2.el8.ciqlts | 2023-01-10 | - | 2023-01-04 : - Rebuild against Rocky Linux base for CIQ LTS |
krb5 | 1.18.2-15.el8_6.0.ciqlts | 2023-10-07 |
|
2023-01-10 : - CIQ LTS 8.6 backport: Patch to fix integer overflows in PAC parsing (resolves CVE-2022-42898) |
dpdk | 21.11-3.el8.ciqlts | 2023-01-19 | - | 2023-01-19 : - Rebuilt against Rocky 8.6 for CIQ LTS. No code changes |
tzdata | 2023c-2.el8_6.ciqlts | 2023-10-25 | - | 2023-08-21 : - Bump release to test recent process changes. (RHEL-1326) 2023-03-28 : [Show All] 2023-08-21 : - Bump release to test recent process changes. (RHEL-1326) 2023-03-28 : - Rebase to tzdata-2023c - Lebanon reversed the change added in tzdata-2023b. 2023-03-24 : - Rebase to tzdata-2023b - Lebanon will transition to DST on April 20/21, not March 25/26. 2023-03-22 : - Rebase to tzdata-2023a - Egypt reintroduced DST, from April through October. - Morocco springs forward April 23, not April 30. - Palestine delayed the start of DST this year. 2023-01-06 : - Include leap-seconds.list in tzdata install. (#2154109) |
java-17-openjdk | 17.0.10.0.7-2.el8_6.ciqlts | 2024-01-19 | - | 2024-01-19 : - Set portablerelease/portableversion variables to match LTS 2024-01-17 : [Show All] 2024-01-19 : - Set portablerelease/portableversion variables to match LTS 2024-01-17 : - Build for Rocky Linux 8 using our own portable 2024-01-11 : - Update to jdk-17.0.10+7 (GA) - Sync the copy of the portable specfile with the latest update - Move to -P |
java-11-openjdk | 11.0.22.0.7-2.el8_6.ciqlts | 2024-01-19 | - | 2024-01-18 : - Set portablerelease/portableversion variables to match LTS 2024-01-18 : [Show All] 2024-01-18 : - Set portablerelease/portableversion variables to match LTS 2024-01-18 : - Build for Rocky Linux 8 using our own portable 2024-01-10 : - Update to jdk-11.0.22+7 (GA) - Sync the copy of the portable specfile with the latest update - Drop local copy of JDK-8312489 which is now included upstream - ** This tarball is embargoed until 2024-01-16 @ 1pm PT. ** - Resolves: RHEL-20981 2023-10-13 : - Update to jdk-11.0.21+9 (GA) - Sync the copy of the portable specfile with the latest update - Re-generate FIPS patch against 11.0.21+1 following backport of JDK-8155246 - Re-generate SHA3 patch following backport of JDK-8242151 - Bump libpng version to 1.6.39 following JDK-8305815 - Bump HarfBuzz version to 7.2.0 following JDK-8307301 - Bump freetype version to 2.13.0 following JDK-8306881 - Update generate_tarball.sh to be closer to upstream vanilla script inc. no more ECC removal - Update bug URL for RHEL to point to the Red Hat customer portal - Change top_level_dir_name to use the VCS tag, matching new upstream release style tarball - Apply all patches using -p1 - Drop local backport of JDK-8243210 which is upstream from 11.0.21+2 - Add missing JFR alternative ghost - Move jcmd to the headless package - ** This tarball is embargoed until 2023-10-17 @ 1pm PT. ** - Resolves: RHEL-12222 - Resolves: RHEL-13546 - Resolves: RHEL-13553 - Resolves: RHEL-13559 - Resolves: RHEL-13566 - Resolves: RHEL-13572 2023-09-08 : - Bump release number so we are newer than 8.6 - Related: rhbz#2236589 2023-09-05 : - Update to jdk-11.0.20.1+1 (GA) - Add backport of JDK-8312489 already upstream in 11.0.22 (see OPENJDK-2095) - Add backport of JDK-8243210 already upstream in 11.0.21 (see RH2229269) - Update openjdk_news script to specify subdirectory last - Add missing discover_trees script required by openjdk_news - Resolves: rhbz#2236589 2023-07-20 : - Fix tzdata requirement copy-and-paste error that led to two BuildRequires and no Requires - Resolves: rhbz#2224411 2023-07-15 : - Sync the copy of the portable specfile with the latest update - Add note at top of spec file about rebuilding - Related: rhbz#2221106 2023-07-14 : - Update to jdk-11.0.20.0+8 (GA) - Update release notes to 11.0.20.0+8 - Drop local inclusion of JDK-8274864 & JDK-8305113 as they are included in 11.0.20+1 - Bump tzdata requirement to 2023c now it is available in the buildroot - Bump bundled LCMS version to 2.15 as in jdk-11.0.20+1. - Bump bundled HarfBuzz version to 7.0.1 as in jdk-11.0.20+7 - Use tapsets from the misc tarball - Introduce 'prelease' for the portable release versioning, to handle EA builds - Make sure root installation directory is created first - Use in-place substitution for all but the first of the tapset changes - ** This tarball is embargoed until 2023-07-18 @ 1pm PT. ** - Resolves: rhbz#2217713 - Resolves: rhbz#2196318 - Resolves: rhbz#2221106 2023-04-26 : - Include the java-11-openjdk-portable.spec file with instructions on how to rebuild. - Related: rhbz#2189327 |
microcode_ctl | 20230808-2.20231009.1.el8_6.ciqlts | 2023-11-16 |
|
2023-11-01 : - Update Intel CPU microcode to microcode-20231009 release, addresses CVE-2023-23583 (RHEL-3684): [Show All] 2023-11-01 : - Update Intel CPU microcode to microcode-20231009 release, addresses CVE-2023-23583 (RHEL-3684): - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in intel-06-8c-01/intel-ucode/06-8c-01) from revision 0xac up to 0xb4; - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd0003a5 up to 0xd0003b9; - Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x1000230 up to 0x1000268; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xbc up to 0xc2; - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x2c up to 0x34; - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x46 up to 0x4e; - Update of 06-8f-04/0x10 microcode from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-04) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-04) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-04) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-04) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-04) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-04) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-04) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-05) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-05) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-05) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-05) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-05) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-06) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-06) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-06) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-06/0x10 microcode from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-06) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-06) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-06) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-08) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision 0x2c000271 up to 0x2c000290; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision 0x2b0004b1 up to 0x2b0004d0; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision 0x2e up to 0x32; - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x2e up to 0x32; - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x2e up to 0x32; - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x2e up to 0x32; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x2e up to 0x32; - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x2e up to 0x32; - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x2e up to 0x32; - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x2e up to 0x32; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x42c up to 0x430; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x42c up to 0x430; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x42c up to 0x430; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x42c up to 0x430; - Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0x4 up to 0x5; - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x59 up to 0x5d; - Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x119 up to 0x11d; - Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision 0x4119 up to 0x411c; - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-02) from revision 0x4119 up to 0x411c; - Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-03) from revision 0x4119 up to 0x411c; - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4119 up to 0x411c; - Update of 06-be-00/0x11 (ADL-N A0) microcode from revision 0x11 up to 0x12; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x2e up to 0x32; - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x2e up to 0x32; - Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x2e up to 0x32; - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x2e up to 0x32; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x2e up to 0x32; - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x2e up to 0x32; - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x2e up to 0x32; - Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x2e up to 0x32. 2023-08-22 : - Add support for the new, more correct, variant of dracut's default $fw_dir path in dracut_99microcode_ctl-fw_dir_override_module_init.sh. 2023-08-10 : - Update Intel CPU microcode to microcode-20230808 release, addresses CVE-2022-40982, CVE-2022-41804, CVE-2023-23908 (#2213125, #2223993, #2230678, - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006f05 up to 0x2007006; - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in intel-06-8c-01/intel-ucode/06-8c-01) from revision 0xaa up to 0xac; - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xf2 up to 0xf4; - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xf2 up to 0xf4; - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xf2 up to 0xf4; - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xf2 up to 0xf4; - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from revision 0xf6 up to 0xf8; - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xf2 up to 0xf4; - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xf2 up to 0xf4; - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xf2 up to 0xf4; - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xf2 up to 0xf4; - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xf8 up to 0xfa; - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000171 up to 0x1000181; - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003501 up to 0x4003604; - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision 0x5003501 up to 0x5003604; - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x7002601 up to 0x7002703; - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000390 up to 0xd0003a5; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xba up to 0xbc; - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x2a up to 0x2c; - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x44 up to 0x46; - Update of 06-8f-04/0x10 microcode from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-04) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-04) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-04) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-04) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-04) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-04) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-04) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-05) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-05) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-05) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-05) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-05) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-06) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-06) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-06) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-06/0x10 microcode from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-06) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-06) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-06) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-08) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision 0x2c0001d1 up to 0x2c000271; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision 0x2b000461 up to 0x2b0004b1; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision 0x2c up to 0x2e; - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x2c up to 0x2e; - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x2c up to 0x2e; - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x2c up to 0x2e; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x2c up to 0x2e; - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x2c up to 0x2e; - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x2c up to 0x2e; - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x2c up to 0x2e; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x42a up to 0x42c; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x42a up to 0x42c; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x42a up to 0x42c; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x42a up to 0x42c; - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xf6 up to 0xf8; - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xf6 up to 0xf8; - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xf6 up to 0xf8; - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xf6 up to 0xf8; - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode from revision 0xf6 up to 0xf8; - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x58 up to 0x59; - Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x113 up to 0x119; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x2c up to 0x2e; - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x2c up to 0x2e; - Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x2c up to 0x2e; - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x2c up to 0x2e; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x2c up to 0x2e; - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x2c up to 0x2e; - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x2c up to 0x2e; - Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x2c up to 0x2e; - Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision 0x4112 up to 0x4119 (old pf 0xc0); - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-02) from revision 0x4112 up to 0x4119 (old pf 0xc0); - Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-03) from revision 0x4112 up to 0x4119 (old pf 0xc0); - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4112 up to 0x4119 (old pf 0xc0); - Update of 06-be-00/0x11 (ADL-N A0) microcode from revision 0x10 up to 0x11 (old pf 0x1). 2023-08-07 : - Update Intel CPU microcode to microcode-20230516 release (#2213125): - Addition of 06-be-00/0x01 (ADL-N A0) microcode at revision 0x10; - Addition of 06-9a-04/0x40 (AZB A0) microcode at revision 0x4; - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006e05 up to 0x2006f05; - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in intel-06-8c-01/intel-ucode/06-8c-01) from revision 0xa6 up to 0xaa; - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xf0 up to 0xf2; - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xf0 up to 0xf2; - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xf0 up to 0xf2; - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xf0 up to 0xf2; - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from revision 0xf4 up to 0xf6; - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xf0 up to 0xf2; - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xf0 up to 0xf2; - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xf0 up to 0xf2; - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xf0 up to 0xf2; - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xf4 up to 0xf8; - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000161 up to 0x1000171; - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003303 up to 0x4003501; - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision 0x5003303 up to 0x5003501; - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x7002503 up to 0x7002601; - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000389 up to 0xd000390; - Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x1000211 up to 0x1000230; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb8 up to 0xba; - Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x32 up to 0x33; - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x28 up to 0x2a; - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x42 up to 0x44; - Update of 06-8f-04/0x10 microcode from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-04) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-04) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-04) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-04) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-04) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-04) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-04) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-05) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-05) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-05) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-05) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-05) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-06) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-06) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-06) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-06/0x10 microcode from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-06) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-06) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-06) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-08) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000181 up to 0x2b000461; - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision 0x2c000170 up to 0x2c0001d1; - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision 0x2b000181 up to 0x2b000461; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x429 up to 0x42a; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x429 up to 0x42a; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x429 up to 0x42a; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x429 up to 0x42a; - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xf4 up to 0xf6; - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xf4 up to 0xf6; - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xf4 up to 0xf6; - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xf4 up to 0xf6; - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode from revision 0xf4 up to 0xf6; - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x57 up to 0x58; - Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x112 up to 0x113; - Update of 06-ba-02/0xc0 (RPL-H 6+8/P 6+8 J0) microcode from revision 0x410e up to 0x4112; - Update of 06-ba-03/0xc0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-02) from revision 0x410e up to 0x4112; - Update of 06-ba-02/0xc0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-03) from revision 0x410e up to 0x4112; - Update of 06-ba-03/0xc0 (RPL-U 2+8 Q0) microcode from revision 0x410e up to 0x4112. 2023-08-01 : - Avoid spurious find failures due to calls on directories that may not exist (#2231065). 2023-06-28 : - Force locale to C in check_caveats, reload_microcode, and update_ucode (#2218096). 2023-06-06 : - Cleanup the dangling symlinks in update_ucode (#2135376). 2023-02-15 : - Update Intel CPU microcode to microcode-20230214 release, addresses CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, CVE-2022-38090 (#2171234, - Addition of 06-6c-01/0x10 (ICL-D B0) microcode at revision 0x1000211; - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode at revision 0x2b000181; - Addition of 06-8f-04/0x10 microcode at revision 0x2c000170; - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-04) at revision 0x2b000181; - Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-04) at revision 0x2c000170; - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-04) at revision 0x2b000181; - Addition of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-04) at revision 0x2c000170; - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-04) at revision 0x2b000181; - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-04) at revision 0x2b000181; - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-04) at revision 0x2c000170; - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-05) at revision 0x2b000181; - Addition of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) at revision 0x2c000170; - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode at revision 0x2b000181; - Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode at revision 0x2c000170; - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-05) at revision 0x2b000181; - Addition of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) at revision 0x2c000170; - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-05) at revision 0x2b000181; - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-05) at revision 0x2b000181; - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-05) at revision 0x2c000170; - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-06) at revision 0x2b000181; - Addition of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) at revision 0x2c000170; - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-06) at revision 0x2b000181; - Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-06) at revision 0x2c000170; - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode at revision 0x2b000181; - Addition of 06-8f-06/0x10 microcode at revision 0x2c000170; - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-06) at revision 0x2b000181; - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-06) at revision 0x2b000181; - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in intel-ucode/06-8f-06) at revision 0x2c000170; - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) at revision 0x2b000181; - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) at revision 0x2b000181; - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) at revision 0x2b000181; - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode at revision 0x2b000181; - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) at revision 0x2b000181; - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) at revision 0x2b000181; - Addition of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) at revision 0x2c000170; - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) at revision 0x2b000181; - Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-08) at revision 0x2c000170; - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) at revision 0x2b000181; - Addition of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) at revision 0x2c000170; - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) at revision 0x2b000181; - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode at revision 0x2b000181; - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode at revision 0x2c000170; - Addition of 06-b7-01/0x32 (RPL-S S0) microcode at revision 0x112; - Addition of 06-ba-02/0xc0 microcode at revision 0x410e; - Addition of 06-ba-03/0xc0 microcode (in intel-ucode/06-ba-02) at revision 0x410e; - Addition of 06-ba-02/0xc0 microcode (in intel-ucode/06-ba-03) at revision 0x410e; - Addition of 06-ba-03/0xc0 microcode at revision 0x410e; - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in intel-06-8c-01/intel-ucode/06-8c-01) from revision 0xa4 up to 0xa6; - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from revision 0xf0 up to 0xf4; - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xf0 up to 0xf4; - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015e up to 0x1000161; - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003302 up to 0x4003303; - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision 0x5003302 up to 0x5003303; - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x7002501 up to 0x7002503; - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000375 up to 0xd000389; - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x3c up to 0x3e; - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x20 up to 0x22; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb2 up to 0xb8; - Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x31 up to 0x32; - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x40 up to 0x42; - Update of 06-96-01/0x01 (EHL B1) microcode from revision 0x16 up to 0x17; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x421 up to 0x429; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x421 up to 0x429; - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x421 up to 0x429; - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x421 up to 0x429; - Update of 06-9c-00/0x01 (JSL A0/A1) microcode from revision 0x24000023 up to 0x24000024; - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xf0 up to 0xf4; - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xf0 up to 0xf4; - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xf0 up to 0xf4; - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xf0 up to 0xf4; - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode from revision 0xf0 up to 0xf4; - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x54 up to 0x57; - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x22 up to 0x2c (old pf 0x3); - Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x22 up to 0x2c (old pf 0x3). |
libXpm | 3.5.12-9.el8_6.0.ciqlts | 2023-10-07 |
|
2023-01-16 : - Fix CVE-2022-46285: infinite loop on unclosed comments (#2161800) - Fix CVE-2022-44617: runaway loop with width of 0 (#2161808) [Show All] 2023-01-16 : - Fix CVE-2022-46285: infinite loop on unclosed comments (#2161800) - Fix CVE-2022-44617: runaway loop with width of 0 (#2161808) - Fix CVE-2022-4883: compression depends on $PATH (#2160238) |
sudo | 1.8.29-8.el8.ciqlts.1 | 2023-01-28 |
|
2023-01-11 : RHEL 8.7.0.Z ERRATUM - CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user [Show All] 2023-01-11 : RHEL 8.7.0.Z ERRATUM - CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user Resolves: rhbz#2161220 |
java-1.8.0-openjdk | 1.8.0.402.b06-2.el8_6.ciqlts | 2024-01-19 | - | 2024-01-19 : - Set portablerelease/portableversion variables to match LTS 2024-01-17 : [Show All] 2024-01-19 : - Set portablerelease/portableversion variables to match LTS 2024-01-17 : - Build for Rocky Linux 8 using our own portable 2024-01-11 : - Update to shenandoah-jdk8u402-b06 (GA) - Sync the copy of the portable specfile with the latest update - Drop local copy of JDK-8312489 which is now included upstream - ** This tarball is embargoed until 2024-01-16 @ 1pm PT. ** - Resolves: RHEL-21477 - Resolves: RHEL-20975 2023-12-16 : - Restore %{epoch}:%{javaver} versioning to jre, java, jre-headless, java-headless, java-devel & java-sdk - Resolves: RHEL-19636 2023-10-16 : - Revert jcmd move as jcmd will not operate without tools.jar - Related: RHEL-13612 2023-10-16 : - Add a compatibility symlink from bin/jcmd to jre/bin/jcmd - Related: RHEL-13612 2023-10-10 : - Update to shenandoah-jdk8u392-b08 (GA) - Sync the copy of the portable specfile with the latest update - Update generate_tarball.sh to be closer to upstream vanilla script inc. no more ECC removal - Update bug URL for RHEL to point to the Red Hat customer portal - Change top_level_dir_name to use the VCS tag, matching new upstream release style tarball - Regenerate PR2462 patch following JDK-8315135 - Bump version of bundled libpng to 1.6.39 - Add backport of JDK-8312489 heading upstream for 8u402 (see OPENJDK-2095) - Add missing JFR, alt-java, jre-* and java-* alternative ghosts - Move jcmd to the headless package - ** This tarball is embargoed until 2023-10-17 @ 1pm PT. ** - Resolves: RHEL-12309 - Resolves: RHEL-13600 - Resolves: RHEL-13628 - Resolves: RHEL-13635 - Resolves: RHEL-13641 - Resolves: RHEL-13612 - Resolves: RHEL-13621 2023-10-10 : - For non debug subpackages, ghosted all alternatives (rhbz1649776) - For non system JDKs, if-outed versionless provides. - Aligned versions to be %{epoch}:%{version}-%{release} instead of chaotic - Related: RHEL-13641 2023-07-19 : - Bump release number so we are newer than 8.6 - Related: rhbz#2221106 2023-07-14 : - Update to shenandoah-jdk8u372-b05 (GA) - Sync the copy of the portable specfile with the latest update - Add note at top of spec file about rebuilding - Use tapsets from the misc tarball - Make sure root installation directory is created first - Use in-place substitution for all but the first of the tapset changes - The 'prelease' variable should refer to 'portablerelease', not 'rpmrelease' - ** This tarball is embargoed until 2023-07-18 @ 1pm PT. ** - Resolves: rhbz#2221106 |
libksba | 1.3.5-9.el8_6.0.ciqlts | 2023-10-07 |
|
2023-01-25 : - Fix for CVE-2022-47629 (#2161571) |
rt-setup | 2.1-4.el8_6.ciqlts.0.1 | 2023-02-16 | - | 2023-02-16 : - Fix rt-setup post script on spec file rhbz#2168478 |
tar | 1.30-9.el8_6.0.ciqlts | 2023-10-11 |
|
2023-02-09 : - Fix CVE-2022-48303 - Resolves: CVE-2022-48303 |
curl | 7.61.1-30.el8_6.ciqlts.3 | 2023-11-15 |
|
2023-06-13 : - fix GSS delegation too eager connection re-use (CVE-2023-27536) - rebuild certs with 2048-bit RSA keys [Show All] 2023-06-13 : - fix GSS delegation too eager connection re-use (CVE-2023-27536) - rebuild certs with 2048-bit RSA keys - fix host name wildcard checking (CVE-2023-28321) 2023-04-20 : - sftp: do not specify O_APPEND when not in append mode (#2187717) 2023-03-24 : - fix FTP too eager connection reuse (CVE-2023-27535) 2023-02-15 : - fix HTTP multi-header compression denial of service (CVE-2023-23916) 2023-02-07 : - h2: lower initial window size to 32 MiB (#2166254) 2022-12-21 : - smb/telnet: fix use-after-free when HTTP proxy denies tunnel (CVE-2022-43552) |
python3 | 3.6.8-51.el8_6.ciqlts.2.rocky.0 | 2023-11-03 |
|
2023-10-23 : - Add rocky to supported dists 2023-09-27 : [Show All] 2023-10-23 : - Add rocky to supported dists 2023-09-27 : - Security fix for CVE-2023-40217 Resolves: RHEL-2933 2023-05-31 : - Security fix for CVE-2023-24329 Resolves: rhbz#2173917 2023-01-24 : - Properly strip the LTO bytecode from python.o Resolves: rhbz#2137707 2022-12-21 : - Security fix for CVE-2022-45061 - Strip the LTO bytecode from python.o Resolves: rhbz#2144072, rhbz#2137707 |
webkit2gtk3 | 2.36.7-1.el8_6.ciqlts.6 | 2023-12-18 |
|
2023-11-21 : - Port patches for CVE-2023-32435 CVE-2023-32439 CVE-2023-37450 CVE-2023-41993 Resolves: #2218789 #2218799 [Show All] 2023-11-21 : - Port patches for CVE-2023-32435 CVE-2023-32439 CVE-2023-37450 CVE-2023-41993 Resolves: #2218789 #2218799 2023-06-06 : - Port patches for CVE-2023-28204 CVE-2023-32373 Resolves: #2209744 #2209727 2023-04-12 : - Add patch for CVE-2023-28205 Resolves: #2185740 2023-02-15 : - Add patch for CVE-2023-23529 Resolves: #2170007 2022-12-21 : - Add patch for CVE-2022-42856 Resolves: #2153735 |
pesign | 0.112-27.el8_6.ciqlts | 2023-04-05 |
|
2023-04-05 : - Adding local signing cert 2023-04-05 : [Show All] 2023-04-05 : - Adding local signing cert 2023-04-05 : - fix pesign build issues 2023-01-18 : - Deprecate pesign-authorize and drop ACL - Resolves: CVE-2022-3560 |
openssl | 1.1.1k-9.el8_6.0.ciqlts | 2023-10-07 |
|
2023-02-08 : - Fixed Timing Oracle in RSA Decryption Resolves: CVE-2022-4304 [Show All] 2023-02-08 : - Fixed Timing Oracle in RSA Decryption Resolves: CVE-2022-4304 - Fixed Double free after calling PEM_read_bio_ex Resolves: CVE-2022-4450 - Fixed Use-after-free following BIO_new_NDEF Resolves: CVE-2023-0215 - Fixed X.400 address type confusion in X.509 GeneralName Resolves: CVE-2023-0286 |
m17n-db | 1.8.0-3.el8_6.ciqlts | 2023-04-24 | - | 2018-02-19 : - Add BuildRequires: gcc as per packaging guidelines |
m17n-lib | 1.8.0-2.el8_6.ciqlts | 2023-04-24 | - | 2018-06-06 : - Drop Anthy support in favor of libkkc - Resolves: rh#1587975 |
emacs | 26.1-7.el8_6.ciqlts.1 | 2023-04-24 | - | 2023-04-06 : - Fix ob-latex.el command injection vulnerability (#2180585) |
libwebp | 1.0.0-8.el8_6.0.ciqlts.1 | 2023-10-07 |
|
2023-09-15 : - Bump the release to fix upgrade path 2023-09-15 : [Show All] 2023-09-15 : - Bump the release to fix upgrade path 2023-09-15 : - Added fix for mzbz#1819244 2023-09-15 : - Added fix for CVE-2023-4863 |
expat | 2.2.5-11.el8_6.0.ciqlts | 2023-10-07 |
|
2022-11-14 : - CVE-2022-43680 expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate - Resolves: CVE-2022-43680 |
dbus | 1.12.8-24.el8_6.0.ciqlts.1 | 2023-10-07 |
|
2023-06-19 : - Fix CVE-2023-34969 (#2213399) |
libxml2 | 2.9.7-16.el8_6.0.ciqlts.1 | 2023-10-07 |
|
2023-07-14 : - Fix CVE-2023-28484 (#2186691) - Fix CVE-2023-29469 (#2186691) |
fribidi | 1.0.4-9.el8_6.0.ciqlts | 2023-10-07 |
|
2022-04-14 : - Fix security issues CVE-2022-25308, CVE-2022-25309, CVE-2022-25310. Resolves: rhbz#2050085, rhbz#2050068, rhbz#2050062 [Show All] 2022-04-14 : - Fix security issues CVE-2022-25308, CVE-2022-25309, CVE-2022-25310. Resolves: rhbz#2050085, rhbz#2050068, rhbz#2050062 - Drop --disable-docs from %configure. no such options available. |
freetype | 2.9.1-9.el8_6.0.ciqlts | 2023-10-07 | - | 2022-05-27 : - Guard face->size - Resolves: #2079279 |
libtiff | 4.0.9-29.el8_6.ciqlts | 2023-11-15 |
|
2023-08-08 : - Fix CVE-2023-0800 CVE-2023-0801 CVE-2023-0802 CVE-2023-0803 CVE-2023-0804 - Resolves: RHEL-5075 RHEL-5078 RHEL-5079 RHEL-5080 RHEL-5081 [Show All] 2023-08-08 : - Fix CVE-2023-0800 CVE-2023-0801 CVE-2023-0802 CVE-2023-0803 CVE-2023-0804 - Resolves: RHEL-5075 RHEL-5078 RHEL-5079 RHEL-5080 RHEL-5081 2023-05-16 : - Fix CVE-2022-48281 - Resolves: CVE-2022-48281 2023-01-16 : - Fix various CVEs - Resolves: CVE-2022-3627 CVE-2022-3970 |
rsync | 3.1.3-19.el8_6.ciqlts.1 | 2023-05-17 | - | 2022-11-02 : - Resolves: #2139118 - rsync-daemon fail on 3.1.3 |
usbguard | 1.0.0-13.el8_6.0.ciqlts | 2023-10-07 | - | 2023-01-12 : - Set OOMScoreAdjust to -1000 in service file Resolves: rhbz#2159411 [Show All] 2023-01-12 : - Set OOMScoreAdjust to -1000 in service file Resolves: rhbz#2159411 - Fix race condition in usbguard-daemon when forking Resolves: rhbz#2159409 - Add missing files to documentation Resolves: rhbz#2159412 - Disable logging to console, logging to syslog is still enabled - Store permanent rules even if RuleFile is not set but RuleFolder is - Neither RuleFolder nor RuleFile exists bugfix Resolves: rhbz#2159413 - Remove build for i686 arch Resolves: rhbz#2105091 |
xorg-x11-server-Xwayland | 21.1.3-10.el8_6.ciqlts | 2023-05-17 |
|
2023-02-07 : - Fix CVE-2023-0494 (#2166972) 2022-12-19 : [Show All] 2023-02-07 : - Fix CVE-2023-0494 (#2166972) 2022-12-19 : - Follow-up fix for CVE-2022-46340 (#2151777) |
xorg-x11-server | 1.20.11-15.el8_6.ciqlts | 2023-05-17 |
|
2023-02-22 : - Rebuild for the missing debuginfo Related: rhbz#2169522 [Show All] 2023-02-22 : - Rebuild for the missing debuginfo Related: rhbz#2169522 2023-02-21 : - Fix xvfb-run script with --listen-tcp Resolves: rhbz#2169522 2023-02-03 : - Fix CVE-2023-0494 (#2166977) 2022-12-19 : - Follow-up fix for CVE-2022-46340 (#2151774) |
gnutls | 3.6.16-8.el8_6.ciqlts | 2024-01-24 | - | 2023-12-06 : - auth/rsa_psk: side-step potential side-channel (RHEL-16753) 2023-06-26 : [Show All] 2023-12-06 : - auth/rsa_psk: side-step potential side-channel (RHEL-16753) 2023-06-26 : - Clear server's session ticket indication at rehandshake (#2089817) 2023-02-23 : - Fix x86_64 CPU feature detection when AVX is not available (#2131152) - Fix timing side-channel in TLS RSA key exchange (#2162598) |
bind | 9.11.36-8.el8_6.0.ciqlts.2 | 2023-10-08 |
|
2023-09-19 : - Prevent exahustion of memory from control channel (CVE-2023-3341) 2023-06-22 : [Show All] 2023-09-19 : - Prevent exahustion of memory from control channel (CVE-2023-3341) 2023-06-22 : - Prevent the cache going over the configured limit (CVE-2023-2828) |
scap-security-guide | 0.1.66-2.el8_6.ciqlts.rocky.0.1 | 2023-06-05 | - | 2023-05-16 : - Make Rocky Linux a derivative of RHEL 2023-02-13 : [Show All] 2023-05-16 : - Make Rocky Linux a derivative of RHEL 2023-02-13 : - Unselect rule logind_session_timeout (RHBZ#2158404) 2023-02-06 : - Rebase to a new upstream release 0.1.66 (RHBZ#2158404) - Update RHEL8 STIG profile to V1R9 (RHBZ#2152658) - Fix levels of CIS rules (RHBZ#2162803) - Remove unused RHEL8 STIG control file (RHBZ#2156192) - Fix accounts_password_pam_unix_remember's check and remediations (RHBZ#2153547) - Fix handling of space in sudo_require_reauthentication (RHBZ#2152208) - Add rule for audit immutable login uids (RHBZ#2151553) - Fix remediation of audit watch rules (RHBZ#2119356) - Align file_permissions_sshd_private_key with DISA Benchmark (RHBZ#2115343) - Fix applicability of kerberos rules (RHBZ#2099394) - Add support rainer scripts in rsyslog rules (RHBZ#2072444) 2023-01-10 : - Update RHEL8 STIG profile to V1R8 (RHBZ#2148446) - Add rule warning for sysctl IPv4 forwarding config (RHBZ#2118758) - Fix remediation for firewalld_sshd_port_enabled (RHBZ#2116474) - Fix compatibility with Ansible 2.14 |
bridge-utils | 1.7.1-2.el8_6.ciqlts | 2023-06-05 | - | 2021-03-15 : - Use make macros - https://fedoraproject.org/wiki/Changes/UseMakeBuildInstallMacro |
strongswan | 5.9.10-1.el8_6.ciqlts | 2023-06-06 |
|
2023-03-02 : - Update to 5.9.10 2023-02-28 : [Show All] 2023-03-02 : - Update to 5.9.10 2023-02-28 : - Resolves: CVE-2023-26463 authorization bypass in TLS-based EAP methods 2023-01-16 : - Use configure paths in manual pages (#2106120) 2023-01-15 : - Update to 5.9.9 (#2157850) |
c-ares | 1.13.0-6.el8_6.0.ciqlts.2 | 2023-10-07 |
|
2023-05-31 : - Resolves: rhbz#2209516 - CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service [rhel-8.8.0.z] |
device-mapper-multipath | 0.8.4-37.el8_6.0.ciqlts | 2023-10-07 | - | 2023-02-03 : - Fix bugzilla linked to the changes (was previously linked to the wrong bug, 2162537) [Show All] 2023-02-03 : - Fix bugzilla linked to the changes (was previously linked to the wrong bug, 2162537) - Resolves: bz #2166468 2023-02-01 : - Add 0129-libmultipath-select-resize-action-even-if-reload-is-.patch - Add 0130-libmultipath-cleanup-ACT_CREATE-code-in-select_actio.patch - Add 0131-libmultipath-keep-renames-from-stopping-other-multip.patch - Resolves: bz #2166468 2023-01-16 : - Add 0127-libmultipath-don-t-leak-memory-on-invalid-strings.patch - Add 0128-libmutipath-validate-the-argument-count-of-config-st.patch - Resolves: bz #2155560 |
gdisk | 1.0.3-11.el8_6.ciqlts | 2023-07-07 | - | 2022-03-15 : - Fix double byteswap on big-endian systems also while reading partition names resolves: #2065205 |
e2fsprogs | 1.45.6-5.el8_6.0.ciqlts | 2023-10-08 | - | 2022-05-11 : - Update e2fsprogs with upstream fixes and improvements (#2083621) - Fix out-of-bounds read/write via crafter filesystem (#2073548) |
python-setuptools | 39.2.0-7.el8_6.ciqlts | 2023-07-07 |
|
2023-01-11 : - Security fix for CVE-2022-40897 Resolves: rhbz#2158559 |
systemd | 239-74.el8_6.0.ciqlts.3 | 2023-10-07 | - | 2023-08-08 : - Remove support URL patch 2023-07-20 : [Show All] 2023-08-08 : - Remove support URL patch 2023-07-20 : - login: add a missing error check for session_set_leader() (#2223602) - logind: reset session leader if we know for a fact that it is gone (#2223602) 2023-05-18 : - pstore: fix crash and forward dummy arguments instead of NULL (#2190153) - ci: workflow for gathering metadata for source-git automation (#2190153) - ci: first part of the source-git automation - commit linter (#2190153) 2023-04-18 : - pager: set $LESSSECURE whenver we invoke a pager (#2175623) - test-login: always test sd_pid_get_owner_uid(), modernize (#2175623) - pager: make pager secure when under euid is changed or explicitly requested (#2175623) - test: ignore ENOMEDIUM error from sd_pid_get_cgroup() (#2175623) 2023-03-14 : - journald-server: always create state file in signal handler (#2174645) - journald-server: move relinquish code into function (#2174645) - journald-server: always touch state file in signal handler (#2174645) 2023-02-27 : - journald: add API to move logging from /var to /run again (#1873540) - journalctl: add new --relinquish and --smart-relinquish options (#1873540) - units: automatically revert to /run logging on shutdown if necessary (#1873540) - pstore: Tool to archive contents of pstore (#2158832) - meson: drop redundant line (#2158832) - pstore: drop unnecessary initializations (#2158832) - pstopre: fix return value of list_files() (#2158832) - pstore: remove temporary file on failure (#2158832) - pstore: do not add FILE= journal entry if content_size == 0 (#2158832) - pstore: run only when /sys/fs/pstore is not empty (#2158832) - pstore: fix use after free (#2158832) - pstore: refuse to run if arguments are specified (#2158832) - pstore: allow specifying src and dst dirs are arguments (#2158832) - pstore: rework memory handling for dmesg (#2158832) - pstore: fixes for dmesg.txt reconstruction (#2158832) - pstore: Don't start systemd-pstore.service in containers (#2158832) - units: pull in systemd-pstore.service from sysinit.target (#2158832) - units: drop dependency on systemd-remount-fs.service from systemd-pstore.service (#2158832) - units: make sure systemd-pstore stops at shutdown (#2158832) - pstore: Run after modules are loaded (#2158832) - pstore: do not try to load all known pstore modules (#2158832) - logind-session: make stopping of idle session visible to admins (#2156780) - journald: Increase stdout buffer size sooner, when almost full (#2029426) - journald: rework end of line marker handling to use a field table (#2029426) - journald: use the fact that client_context_release() returns NULL (#2029426) - journald: rework pid change handling (#2029426) - test: Add a test case for #15654 (#2029426) - test: Stricter test case for #15654 (Add more checks) (#2029426) - man: document the new _LINE_BREAK= type (#2029426) 2023-02-17 : - test: import logind test from debian/ubuntu test suite (#1866955) - test: introduce inst_recursive() helper function (#1866955) - tests: verify that Lock D-Bus signal is sent when IdleAction=lock (#1866955) - systemctl: simplify halt_main() (#2053273) - systemctl: shutdown don't fallback on auth fail (#2053273) - systemctl: reintroduce the original halt_main() (#2053273) - systemctl: preserve old behavior unless requested (#2053273) - pam_systemd: suppress LOG_DEBUG log messages if debugging is off (#2170084) - udev/net_id: introduce naming scheme for RHEL-8.8 (#2170499) - pam: add a call to pam_namespace (#1861836) 2023-01-31 : - manager: limit access to private dbus socket (#2119405) - journalctl: do not treat EINTR as an error when waiting for events (#2161683) - core: bring manager_startup() and manager_reload() more inline (#2059633) - pam: add a call to pam_namespace (#1861836) - virt: Support detection for ARM64 Hyper-V guests (#2158307) - virt: Fix the detection for Hyper-V VMs (#2158307) - basic: add STRERROR() wrapper for strerror_r() (#2155520) - coredump: put context array into a struct (#2155520) - coredump: do not allow user to access coredumps with changed uid/gid/capabilities (#2155520) 2023-01-16 : - basic: recognize pdfs filesystem as a network filesystem (#2094661) - core: move reset_arguments() to the end of main's finish (#2127131) - manager: move inc. of n_reloading into a function (#2136869) - core: Add new DBUS properties UnitsReloadStartTimestamp and UnitsLoadTimestampMontonic (#2136869) - core: Indicate the time when the manager started loading units the last time (#2136869) - core: do not touch /run/systemd/systemd-units-load from user session instances (#2136869) - sysctl: downgrade message when we have no permission (#2158160) - core: respect SELinuxContext= for socket creation (#2136738) - manager: use target process context to set socket context (#2136738) - virt: detect Amazon EC2 Nitro instance (#2117948) - machine-id-setup: generate machine-id from DMI product ID on Amazon EC2 (#2117948) - virt: use string table to detect VM or container (#2117948) - fileio: introduce read_full_virtual_file() for reading virtual files in sysfs, procfs (#2117948) - Use BIOS characteristics to distinguish EC2 bare-metal from VMs (#2117948) - device: drop refuse_after (#2043524) |
open-vm-tools | 12.2.5-3.el8_6.ciqlts.1 | 2023-12-01 |
|
2023-11-16 : - Add aarch64 to plus 2023-11-02 : [Show All] 2023-11-16 : - Add aarch64 to plus 2023-11-02 : - ovt-Don-t-accept-tokens-with-unrelated-certs.patch [RHEL-14648] - ovt-File-descriptor-vulnerability-in-the-open-vm-tools-v.patch [RHEL-14682] - Resolves: RHEL-14648 (CVE-2023-34058 open-vm-tools: SAML token signature bypass [rhel-8.9.0]) - Resolves: RHEL-14682 (CVE-2023-34059 open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper [rhel-8.9.0]) 2023-09-28 : - ovt-Provide-alternate-method-to-allow-expected-pre-froze.patch [RHEL-2447] - Resolves: RHEL-2447 ([RHEL8.9][ESXi]Latest version of open-vm-tools breaks VM backups) 2023-09-17 : - ovt-VGAuth-Allow-only-X509-certs-to-verify-the-SAML-toke.patch [bz#2236543] - Resolves: bz#2236543 (CVE-2023-20900 open-vm-tools: SAML token signature bypass [rhel-8]) 2023-07-11 : - Rebase to open-vm-tools 12.2.5 [bz#2214861] - Resolves: bz#2214861 ([ESXi][RHEL8]open-vm-tools version 12.2.5 has been released - please rebase) - Resolves: bz#2216415 ([ESXi][RHEL8] URL in service unit files are started from http instead of https) 2023-06-28 : - ovt-Remove-some-dead-code.patch [bz#2215563] - Resolves: bz#2215563 ([CISA Major Incident] CVE-2023-20867 open-vm-tools: authentication bypass vulnerability in the vgauth module [rhel-8]) 2023-05-03 : - Rebase to open-vm-tools 12.2.0 [bz#2177068] - Resolves: bz#2177068 ([ESXi][RHEL8]open-vm-tools version 12.2.0 has been released - please rebase) |
libssh | 0.9.6-10.el8_6.0.ciqlts | 2023-10-08 |
|
2023-05-15 : - Fix loglevel regression - Related: rhbz#2189968, rhbz#2189741 [Show All] 2023-05-15 : - Fix loglevel regression - Related: rhbz#2189968, rhbz#2189741 2023-05-03 : - Fix covscan issue found at gating - Related: rhbz#2189968, rhbz#2189741 2023-05-02 : - Backport test fixing commits to make the build pass - Relates: rhbz#2189968, rhbz#2189741 2023-04-25 : - Fix NULL dereference during rekeying with algorithm guessing GHSL-2023-032 / CVE-2023-1667 - Fix possible authentication bypass GHSL 2023-085 / CVE-2023-2283 - Resolves: rhbz#2189968, rhbz#2189741 2023-01-06 : - Enable client and server testing build time - Fix failing rekey test on arch s390x - Resolves: rhbz#2126342 |
container-selinux | 2.205.0-2.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-03-21 : - remove watch statements breaking the build on RHEL8.8 - Related: #2179466 [Show All] 2023-03-21 : - remove watch statements breaking the build on RHEL8.8 - Related: #2179466 2023-03-21 : - update to https://github.com/containers/container-selinux/releases/tag/v2.205.0 - remove user_namespace class, thanks to Lokesh Mandvekar - Resolves: #2179466 2023-02-07 : - revert back to https://github.com/containers/container-selinux/releases/tag/v2.199.0 (2.200.0 fails to build as it relies on the new selinux-policy which is not there yet) - Related: #2123641 2023-02-07 : - update to https://github.com/containers/container-selinux/releases/tag/v2.200.0 - Related: #2123641 2023-01-30 : - update to https://github.com/containers/container-selinux/releases/tag/v2.199.0 - Related: #2123641 2023-01-06 : - update to https://github.com/containers/container-selinux/releases/tag/v2.198.0 - Related: #2123641 2023-01-05 : - update to https://github.com/containers/container-selinux/releases/tag/v2.197.0 - Related: #2123641 |
containernetworking-plugins | 1.2.0-1.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-01-17 : - update to https://github.com/containernetworking/plugins/releases/tag/v1.2.0 - Related: #2123641 |
cockpit-podman | 63.1-1.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-02-28 : - update to https://github.com/cockpit-project/cockpit-podman/releases/tag/63.1 - Related: #2123641 [Show All] 2023-02-28 : - update to https://github.com/cockpit-project/cockpit-podman/releases/tag/63.1 - Related: #2123641 2023-02-27 : - update to https://github.com/cockpit-project/cockpit-podman/releases/tag/63 - Related: #2123641 2023-02-08 : - update to https://github.com/cockpit-project/cockpit-podman/releases/tag/62 - Related: #2123641 2023-01-26 : - update to https://github.com/cockpit-project/cockpit-podman/releases/tag/61 - Related: #2123641 2023-01-13 : - update to https://github.com/cockpit-project/cockpit-podman/releases/tag/60 - Related: #2123641 2023-01-02 : - update to https://github.com/cockpit-project/cockpit-podman/releases/tag/59 - Related: #2123641 |
podman | 4.4.1-14.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-06-15 : - update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel (https://github.com/containers/podman/commit/ff30585) [Show All] 2023-06-15 : - update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel (https://github.com/containers/podman/commit/ff30585) - Resolves: #2213843 2023-06-06 : - update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel (https://github.com/containers/podman/commit/bcea446) - Resolves: #2210111 2023-04-26 : - update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel (https://github.com/containers/podman/commit/aa5db47) - Resolves: #2189593 2023-04-14 : - update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel (https://github.com/containers/podman/commit/fd0ea3b) - Resolves: #2176833 2023-04-03 : - update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel (https://github.com/containers/podman/commit/05037d3) - Resolves: #2183601 2023-03-30 : - update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel (https://github.com/containers/podman/commit/67f7e1e) - Resolves: #2182491 2023-03-21 : - update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel (https://github.com/containers/podman/commit/bf400bd) - Resolves: #2180125 2023-02-22 : - use ldd directly to check for static link - avoid broken file utility - Related: #2123641 2023-02-22 : - see the output of 'file catatonit' in the log to figure out why it is not statically linked - Related: #2123641 2023-02-21 : - update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel (https://github.com/containers/podman/commit/e1703bb) - Related: #2123641 |
netavark | 1.5.1-2.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-06-07 : - update to 1.5.1 bugfix release - Resolves: #2211989 [Show All] 2023-06-07 : - update to 1.5.1 bugfix release - Resolves: #2211989 2023-04-20 : - fix --dns-add command is not functioning - Resolves: #2182897 2023-02-03 : - exclude i686 - Related: #2123641 2023-02-03 : - update build parameters - Related: #2123641 2023-02-03 : - always stay offline during build - Related: #2123641 2023-02-03 : - update to https://github.com/containers/netavark/releases/tag/v1.5.0 - Related: #2123641 |
buildah | 1.29.1-2.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-04-03 : - update to the latest content of https://github.com/containers/buildah/tree/release-1.29 (https://github.com/containers/buildah/commit/f07d2c9) [Show All] 2023-04-03 : - update to the latest content of https://github.com/containers/buildah/tree/release-1.29 (https://github.com/containers/buildah/commit/f07d2c9) - Resolves: #2166195 2023-02-16 : - update to the latest content of https://github.com/containers/buildah/tree/release-1.29 (https://github.com/containers/buildah/commit/7fa17a8) - Related: #2123641 2023-02-10 : - update to the latest content of https://github.com/containers/buildah/tree/release-1.29 (https://github.com/containers/buildah/commit/c822cc6) - Related: #2123641 2023-01-31 : - update to the latest content of https://github.com/containers/buildah/tree/release-1.29 (https://github.com/containers/buildah/commit/94b723c) - Related: #2123641 2023-01-30 : - update to the latest content of https://github.com/containers/buildah/tree/release-1.29.0 (https://github.com/containers/buildah/commit/) - Related: #2123641 2023-01-27 : - update to the latest content of https://github.com/containers/buildah/tree/release-1.29.0 (https://github.com/containers/buildah/commit/94b723c) - Related: #2123641 2023-01-25 : - update to the latest content of https://github.com/containers/buildah/tree/main (https://github.com/containers/buildah/commit/078a7ff) - Related: #2123641 2023-01-24 : - update to the latest content of https://github.com/containers/buildah/tree/main (https://github.com/containers/buildah/commit/4b72f05) - Related: #2123641 2023-01-18 : - update to the latest content of https://github.com/containers/buildah/tree/main (https://github.com/containers/buildah/commit/c541c35) - Related: #2123641 2023-01-17 : - update to the latest content of https://github.com/containers/buildah/tree/main (https://github.com/containers/buildah/commit/39dfa73) - Related: #2123641 |
crun | 1.8.4-2.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-04-17 : - Apply additional criu fix - Resolves: #2184221 [Show All] 2023-04-17 : - Apply additional criu fix - Resolves: #2184221 2023-04-14 : - update to https://github.com/containers/crun/releases/tag/1.8.4 - Resolves: #2184221 2023-04-04 : - fix could not find symbol criu_set_lsm_mount_context in libcriu.so - Resolves: #2184221 2023-03-20 : - add BR: criu-devel - Resolves: #2179195 2023-02-28 : - update to https://github.com/containers/crun/releases/tag/1.8.1 - Related: #2123641 2023-02-02 : - update to https://github.com/containers/crun/releases/tag/1.8 - Related: #2123641 2023-01-05 : - require libgcrypt-devel and add criu weak dep - Resolves: #2158084 |
conmon | 2.1.6-1.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-02-07 : - update to https://github.com/containers/conmon/releases/tag/v2.1.6 - Related: #2123641 |
toolbox | 0.0.99.3-7.module+el8.6.0+1546+268a7833 | 2023-08-03 |
|
2023-02-06 : - Rebuild for CVE-2022-41717 Resolves: #2163743 [Show All] 2023-02-06 : - Rebuild for CVE-2022-41717 Resolves: #2163743 2023-01-30 : - Support RHEL 9 Toolbx containers Resolves: #2163759 |
aardvark-dns | 1.5.0-2.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-02-03 : - always stay offline during build - Related: #2123641 [Show All] 2023-02-03 : - always stay offline during build - Related: #2123641 2023-02-03 : - update to https://github.com/containers/aardvark-dns/releases/tag/v1.5.0 - Related: #2123641 |
oci-seccomp-bpf-hook | 1.2.8-1.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2022-10-18 : - update to https://github.com/containers/oci-seccomp-bpf-hook/releases/tag/v1.2.8 - Related: #2123641 |
python-podman | 4.4.1-1.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-02-27 : - update to https://github.com/containers/podman-py/releases/tag/v4.4.1 - Related: #2123641 [Show All] 2023-02-27 : - update to https://github.com/containers/podman-py/releases/tag/v4.4.1 - Related: #2123641 2023-02-15 : - update to python-podman-4.4.0 - Related: #2123641 |
slirp4netns | 1.2.0-2.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2022-05-11 : - BuildRequires: /usr/bin/go-md2man - Related: #2061390 |
fuse-overlayfs | 1.11-1.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-04-11 : - update to https://github.com/containers/fuse-overlayfs/releases/tag/v1.11 - Resolves: #2185132 |
containers-common | 1-64.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-04-05 : - be sure SYS_CHROOT is in containers.conf + update vendored components - Resolves: #2183667 [Show All] 2023-04-05 : - be sure SYS_CHROOT is in containers.conf + update vendored components - Resolves: #2183667 2023-03-21 : - update vendored components and configuration files - Resolves: #2180125 2023-02-22 : - improve shortnames generation - Related: #2123641 2023-02-17 : - update vendored components and configuration files - Related: #2123641 2023-01-31 : - add missing systemd directories - Related: #2123641 2023-01-27 : - always define default_capablities in RHEL8 - Related: #2123641 2023-01-27 : - update vendored components and configuration files - Related: #2123641 2023-01-25 : - fix vendoring script - Related: #2123641 2023-01-25 : - update vendored components and configuration files - Related: #2123641 2023-01-24 : - update vendored components and configuration files - Related: #2123641 |
skopeo | 1.11.2-0.2.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-02-22 : - fix build - Related: #2123641 [Show All] 2023-02-22 : - fix build - Related: #2123641 2023-02-21 : - update to the latest content of https://github.com/containers/skopeo/tree/release-1.11 (https://github.com/containers/skopeo/commit/3f98753) - Related: #2123641 2023-02-17 : - update to https://github.com/containers/skopeo/releases/tag/v1.11.1 - Related: #2123641 2023-01-27 : - update to https://github.com/containers/skopeo/releases/tag/v1.11.0 (https://github.com/containers/skopeo/commit/968670116c56023d37e9e98b48346478599c6801) - Related: #2123641 2023-01-24 : - update to the latest content of https://github.com/containers/skopeo/tree/main (https://github.com/containers/skopeo/commit/fe15a36) - Related: #2123641 2023-01-17 : - update to the latest content of https://github.com/containers/skopeo/tree/main (https://github.com/containers/skopeo/commit/8e09e64) - Related: #2123641 2023-01-13 : - update to the latest content of https://github.com/containers/skopeo/tree/main (https://github.com/containers/skopeo/commit/2817510) - Related: #2123641 |
udica | 0.2.6-20.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-01-12 : - bump release to preserve update path - Related: #2139052 |
runc | 1.1.8-0.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-07-21 : - Rebasing to 1.1.8 , with CPU affinity patch to try and solve realtime kernel issue |
criu | 3.15-4.module+el8.6.0+1546+268a7833 | 2023-08-03 | - | 2023-06-09 : - added patch to support CRIU on Sapphire Rapids - Resolves: #2203296 |
libslirp | 4.4.0-1.module+el8.6.0+1546+268a7833 | 2023-08-03 |
|
2021-06-28 : - Fix CVE-2021-3592 CVE-2021-3593 CVE-2021-3594 CVE-2021-3595 out-of-bounds access - Related: #1934415 |
mod_auth_openidc | 2.4.9.4-1.module+el8.6.0+1548+0fd6d7b9 | 2023-08-03 | - | 2022-04-08 : - Resolves: rhbz#2025368 - Rebase to new version |
cjose | 0.6.1-3.module+el8.6.0+1548+0fd6d7b9 | 2023-08-03 | - | 2023-07-19 : - cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE [rhel-8.8.0.z] [Show All] 2023-07-19 : - cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE [rhel-8.8.0.z] Resolves: rhbz#2223491 |
openssh | 8.0p1-19.el8_6.ciqlts | 2023-08-15 |
|
2023-07-20 : - rebuilt 2023-07-20 : [Show All] 2023-07-20 : - rebuilt 2023-07-20 : - Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408 2022-12-20 : - Fix parsing of IPv6 IPs in sftp client (#2151334) - Avoid ssh banner one-byte overflow (#2138344) - Avoid crash of sshd when Include folder does not exist (#2133087) |
cups | 2.2.6-51.el8_6.0.ciqlts | 2023-10-07 | - | 2022-12-14 : - 2130391 - Kerberized IPP Printing Fails |
libcap | 2.48-5.el8_6.0.ciqlts | 2023-10-07 |
|
2023-06-26 : - Fix integer overflow in _libcap_strdup() (CVE-2023-2603) Resolves: rhbz#2210636 [Show All] 2023-06-26 : - Fix integer overflow in _libcap_strdup() (CVE-2023-2603) Resolves: rhbz#2210636 - Correctly check pthread_create() return value to avoid memory leak (CVE-2023-2602) Resolves: rhbz#2222197 |
sqlite | 3.26.0-19.el8_6.ciqlts | 2024-01-19 |
|
2024-01-03 : - Fixed CVE-2023-7104 2023-04-14 : [Show All] 2024-01-03 : - Fixed CVE-2023-7104 2023-04-14 : - Fixed CVE-2022-24736 |
flac | 1.3.2-9.el8_6.0.ciqlts.1 | 2023-10-07 |
|
2023-08-31 : - don't free memory that is still used after realloc() error (CVE-2020-22219) |
mod_md | 2.0.8-8.module+el8.6.0+1721+718a1d2c | 2023-09-12 | - | 2020-05-28 : - Resolves: #1832844 - mod_md does not work with ACME server that does not provide keyChange or revokeCert resources |
mod_http2 | 1.15.7-8.module+el8.6.0+1721+718a1d2c.3 | 2023-09-12 |
|
2023-03-18 : - Resolves: #2177748 - CVE-2023-25690 httpd:2.4/httpd: HTTP request splitting with mod_rewrite and mod_proxy |
httpd | 2.4.37-56.module+el8.6.0+1721+718a1d2c.6 | 2023-09-12 |
|
2023-04-27 : - Resolves: #2190133 - mod_rewrite regression with CVE-2023-25690 2023-03-18 : [Show All] 2023-04-27 : - Resolves: #2190133 - mod_rewrite regression with CVE-2023-25690 2023-03-18 : - Resolves: #2177748 - CVE-2023-25690 httpd:2.4/httpd: HTTP request splitting with mod_rewrite and mod_proxy 2023-01-31 : - Resolves: #2162499 - CVE-2006-20001 httpd: mod_dav: out-of-bounds read/write of zero byte - Resolves: #2162485 - CVE-2022-37436 httpd: mod_proxy: HTTP response splitting - Resolves: #2162509 - CVE-2022-36760 httpd: mod_proxy_ajp: Possible request smuggling 2023-01-26 : - Resolves: #2155961 - prevent sscg creating /dhparams.pem |
glibc | 2.28-225.el8_6.ciqlts.6 | 2023-10-19 |
|
2023-09-20 : - CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation (RHEL-3035) 2023-09-19 : [Show All] 2023-09-20 : - CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation (RHEL-3035) 2023-09-19 : - Revert: Always call destructors in reverse constructor order (#2237433) 2023-09-18 : - CVE-2023-4806: potential use-after-free in getaddrinfo (RHEL-2422) 2023-09-15 : - CVE-2023-4813: potential use-after-free in gaih_inet (RHEL-2434) 2023-09-15 : - CVE-2023-4527: Stack read overflow in getaddrinfo in no-aaaa mode (#2234713) 2023-09-12 : - Always call destructors in reverse constructor order (#2237433) 2023-01-20 : - Enforce a specififc internal ordering for tunables (#2154914) |
openscap | 1.3.7-1.el8_6.0.ciqlts.rocky.1.0 | 2023-10-07 | - | 2023-05-16 : - Add Rocky to openscap 2023-01-27 : [Show All] 2023-05-16 : - Add Rocky to openscap 2023-01-27 : - Upgrade to the latest upstream release (rhbz#2159290) - Fix error when processing OVAL filters (rhbz#2126882) - Don't emit xmlfilecontent items if XPath doesn't match (rhbz#2139060) |
libvpx | 1.7.0-10.el8_6.0.ciqlts | 2023-10-11 |
|
2023-10-05 : - Add patch for CVE-2023-5217 - Resolves: RHEL-10610 [Show All] 2023-10-05 : - Add patch for CVE-2023-5217 - Resolves: RHEL-10610 2023-10-03 : - Add patch for CVE-2023-44488 - Resolves: RHEL-11613 |
sscg | 3.0.0-7.el8_6.0.ciqlts | 2023-10-11 | - | 2022-12-08 : - Correctly apply the patch for default dhparams - Resolves: rhbz#2143206 |
texlive | 20180414-29.el8_6.0.ciqlts | 2023-10-08 |
|
2023-05-25 : - Resolves: #2209870, CVE-2023-32700 |
nghttp2 | 1.33.0-5.el8_6.ciqlts | 2023-10-17 |
|
2023-10-13 : - fix HTTP/2 Rapid Reset (CVE-2023-44487) |
grafana | 7.5.15-5.el8_6.ciqlts | 2023-10-19 |
|
2023-10-17 : - resolve RHEL-13284 - resolve CVE-2023-39325 CVE-2023-44487 rapid stream resets can cause excessive work [Show All] 2023-10-17 : - resolve RHEL-13284 - resolve CVE-2023-39325 CVE-2023-44487 rapid stream resets can cause excessive work - testing is turned off due to test failures caused by testing date mismatch |
nodejs-nodemon | 2.0.20-3.module+el8.6.0+1993+e6768fd0 | 2023-10-21 |
|
2023-03-06 : - Backport fix for CVE-2021-35065 Resolves: CVE-2021-35065 |
nodejs | 14.21.3-1.module+el8.6.0+1993+e6768fd0 | 2023-10-21 |
|
2023-03-06 : - Rebase to 14.21.3 Resolves: rhbz#2153712 [Show All] 2023-03-06 : - Rebase to 14.21.3 Resolves: rhbz#2153712 Resolves: CVE-2022-25881 CVE-2023-23918 CVE-2023-23920 CVE-2022-38900 Resolves: CVE-2022-4904 |
nodejs-packaging | 23-3.module+el8.6.0+1993+e6768fd0 | 2023-10-21 | - | 2020-05-06 : - Updated - Removed pathfix.py |
varnish-modules | 0.15.0-6.module+el8.6.0+2037+55f4982e | 2023-10-27 | - | 2021-07-26 : - Related: #1982862 - rebuild for new varnish version |
varnish | 6.0.8-3.module+el8.6.0+2037+55f4982e.1 | 2023-10-27 |
|
2023-10-18 : - Add parameters h2_rst_allowance and h2_rst_allowance_period to mitigate CVE-2023-44487 - Resolves: RHEL-12812 |
python39 | 3.9.16-1.module+el8.6.0+2074+35788527.2 | 2023-11-07 |
|
2023-09-20 : - Security fix for CVE-2023-40217 Resolves: RHEL-3237 [Show All] 2023-09-20 : - Security fix for CVE-2023-40217 Resolves: RHEL-3237 2023-05-29 : - Security fix for CVE-2023-24329 Resolves: rhbz#2173917 |
scipy | 1.5.4-3.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-18 : - Specify LDFLAGS explicitly - Force preprocessing of Fortran sources to make annobin record proper flags [Show All] 2021-01-18 : - Specify LDFLAGS explicitly - Force preprocessing of Fortran sources to make annobin record proper flags - Resolves: rhbz#1778983 rhbz#1877430 |
numpy | 1.19.4-3.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-08-05 : - Adjusted the postun scriptlets to enable upgrading to RHEL 9 - Resolves: rhbz#1933055 |
python-lxml | 4.6.5-1.module+el8.6.0+2074+35788527 | 2023-11-07 |
|
2022-01-06 : - Update to 4.6.5 - Security fix for CVE-2021-43818 [Show All] 2022-01-06 : - Update to 4.6.5 - Security fix for CVE-2021-43818 Resolves: rhbz#2032569 |
mod_wsgi | 4.7.1-5.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2022-09-08 : - Core dumped upon file upload >= 1GB Resolves: rhbz#2125172 |
python3x-setuptools | 50.3.2-4.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-08-05 : - Adjusted the postun scriptlets to enable upgrading to RHEL 9 - Resolves: rhbz#1933055 |
python-psycopg2 | 2.8.6-2.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-15 : - Convert from Fedora to the python39 module in RHEL8 - Resolves: rhbz#1877430 |
python-cffi | 1.14.3-2.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-05-31 : - Replace 'python_sitesearch' with 'python2_sitesearch' |
python-requests | 2.25.0-2.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-18 : - Convert from Fedora to the python39 module in RHEL8 - Resolves: rhbz#1877430 |
python-wheel | 0.35.1-4.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-08-05 : - Adjusted the postun scriptlets to enable upgrading to RHEL 9 - Resolves: rhbz#1933055 |
python-pysocks | 1.7.1-4.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python-urllib3 | 1.25.10-4.module+el8.6.0+2074+35788527 | 2023-11-07 |
|
2021-06-29 : - Fix for CVE-2021-33503 Catastrophic backtracking in URL authority parser Resolves: rhbz#1968074 |
python3x-pip | 20.2.4-7.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-10-14 : - Remove bundled windows executables - Resolves: rhbz#2006790 |
python3x-six | 1.15.0-3.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-12 : - Convert from Fedora to the python39 module in RHEL8 - Resolves: rhbz#1877430 |
python-toml | 0.10.1-5.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2020-12-01 : - Convert spec for python39 module in RHEL8 - Revert usage of pyproject-rpm-macros [Show All] 2020-12-01 : - Convert spec for python39 module in RHEL8 - Revert usage of pyproject-rpm-macros - Resolves: rhbz#1877430 |
python-ply | 3.11-10.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-05 : - Extract and ship license file (#1912893) - Resolves: rhbz#1877430 |
PyYAML | 5.4.1-1.module+el8.6.0+2074+35788527 | 2023-11-07 |
|
2021-03-23 : - Rebase to version 5.4.1 to fix CVE-2020-14343 - Resolves: rhbz#1860466 |
python-psutil | 5.8.0-4.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-15 : - Convert from Fedora to the python39 module in RHEL8 - Resolves: rhbz#1877430 |
python-chardet | 3.0.4-19.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python-idna | 2.10-3.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-13 : - Convert from Fedora to the python39 module in RHEL8 - Resolves: rhbz#1877430 |
python-cryptography | 3.3.1-2.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-18 : - Convert from Fedora to the python39 module in RHEL8 - Resolves: rhbz#1877430 |
python-PyMySQL | 0.10.1-2.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-18 : - Convert from Fedora to the python39 module in RHEL8 - Resolves: rhbz#1877430 |
python-pycparser | 2.20-3.module+el8.6.0+2074+35788527 | 2023-11-07 | - | 2021-01-18 : - Convert from Fedora to the python39 module in RHEL8 - Resolves: rhbz#1877430 |
libtasn1 | 4.13-4.el8_6.ciqlts | 2023-11-10 | - | 2022-11-30 : - Resolves: rhbz#2140600 |
git | 2.39.3-1.el8_6.ciqlts | 2023-11-13 | - | 2023-04-27 : - Update to 2.39.3 - Resolves: #2188364, #2188373, #2190157, #2190158 [Show All] 2023-04-27 : - Update to 2.39.3 - Resolves: #2188364, #2188373, #2190157, #2190158 2023-01-19 : - Update to 2.39.1 - Resolves: rhbz#2162064 2022-12-19 : - Update to 2.39.0 - Resolves: rhbz#2139378 |
xmlrpc-c | 1.51.0-8.el8_6.ciqlts | 2023-11-13 | - | 2022-04-14 : - Address some Coverity issues in the patch set |
yajl | 2.1.0-11.el8_6.ciqlts | 2023-11-13 |
|
2022-04-27 : - fix CVE-2022-24795 - Related: #2061390 |
subscription-manager | 1.28.36-3.el8_6.ciqlts.rocky.0.1 | 2023-11-13 | - | 2023-08-22 : - Remove Red Hat specific references and certificates 2023-08-08 : [Show All] 2023-08-22 : - Remove Red Hat specific references and certificates 2023-08-08 : - 2225442: Fix D-Bus policy (jhnidek@redhat.com) 2023-02-22 : - Translated using Weblate (French) (ljanda@redhat.com) - Translated using Weblate (French) (suanand@redhat.com) - Translated using Weblate (Korean) (jsefler@redhat.com) - 2168576: cockpit: insights: fix spawn_error_to_string in more cases (ptoscano@redhat.com) - cockpit: Fix the issue, when it is not possible to install insights-client (jhnidek@redhat.com) - ENT-5542: Build package using GitHub Actions (mhorky@redhat.com) - 2166317: gui: do not use an empty environment string (ptoscano@redhat.com) - Test libdnf plugin using GitHub Actions (mhorky@redhat.com) - libdnf: fix return value of findProductId() (ptoscano@redhat.com) - 1938878: Fix issues discovered by static code analyzers (#2644) (jhnidek@redhat.com) - ENT-5541: Publish PR coverage (mhorky@redhat.com) - 2166623: gui: use UnknownContentException instead of NetworkException (ptoscano@redhat.com) - ENT-3759: Test on GitHub Actions (mhorky@redhat.com) - Alter import of rhsm.config functions (mhorky@redhat.com) - ENT-5536: Fix FileMonitor tests (mhorky@redhat.com) - tests: drop test_po_files.py (ptoscano@redhat.com) - Ensure tests don't fail when run under root (mhorky@redhat.com) - build: pin pytest to < 7 (ptoscano@redhat.com) - rhsm: drop custom which() implementation (ptoscano@redhat.com) - facts: switch to shutil.which() (ptoscano@redhat.com) - Fix tests for Python 3.6 runner (mhorky@redhat.com) - Stop calling pytest with --failed-first (mhorky@redhat.com) - Handle tests in containers better (mhorky@redhat.com) 2023-01-20 : - Translated using Weblate (Spanish) (ptoscano@redhat.com) - Translated using Weblate (Georgian) (temuri.doghonadze@gmail.com) - Translated using Weblate (Chinese (Simplified) (zh_CN)) (ljanda@redhat.com) - Translated using Weblate (Korean) (simmon@nplob.com) - Update translation files (noreply@weblate.org) - Translated using Weblate (German) (atalanttore@googlemail.com) - New extraction for translatable strings (ptoscano@redhat.com) - Base DBusServerStubProvider on SubManFixture (mhorky@redhat.com) - Mark D-Bus tests (mhorky@redhat.com) - Remove unused classes of DBus tests (mhorky@redhat.com) - ENT-5533: Update D-Bus tests of Unregister (mhorky@redhat.com) - ENT-5350: Implement "force" register option in rhsm dbus python bindings (mhorky@redhat.com) - ENT-5533: Fix failures of D-Bus' Register tests (mhorky@redhat.com) - ENT-5533: Update D-Bus tests of Register (mhorky@redhat.com) - ENT-5533: Update D-Bus tests of Products (mhorky@redhat.com) - ENT-5533: Update D-Bus tests of AllFacts (mhorky@redhat.com) - ENT-5533: Update D-Bus tests of Entitlement (mhorky@redhat.com) - Fix typo in method name of EntitlementService (mhorky@redhat.com) - ENT-5533: Update D-Bus tests of Consumer (mhorky@redhat.com) - ENT-5533: Update D-Bus tests of Attach (mhorky@redhat.com) - ENT-5533: Update D-Bus tests of Config (mhorky@redhat.com) - Skip AsyncPool tests (mhorky@redhat.com) - Catch generic OSError during BaseRestLib._request() (ptoscano@redhat.com) - Catch also CertificateLoadingError for identity cert loading (ptoscano@redhat.com) - Fix formatting of proxy errors w/o errno (ptoscano@redhat.com) - Improve formatting of CertificateLoadingError (ptoscano@redhat.com) - Raise a new CertificateLoadingError on X.509 loading failures (ptoscano@redhat.com) - Improve formatting of UnknownContentException (ptoscano@redhat.com) - connection: improve the internal UnknownContentException (ptoscano@redhat.com) - utils: add terminal_printable_content (ptoscano@redhat.com) - connection: rename NetworkException to UnknownContentException (ptoscano@redhat.com) - Improve formatting of ProxyException (ptoscano@redhat.com) - connection: improve the internal ProxyException (ptoscano@redhat.com) - Improve formatting of socket.gaierror (ptoscano@redhat.com) - Improve formatting of ConnectionError (ptoscano@redhat.com) - Improve formatting of BadCertificateException (ptoscano@redhat.com) - connection: extend BadCertificateException w/ SSL exception (ptoscano@redhat.com) - connection: drop dead code (ptoscano@redhat.com) - ENT-4286: Additional fix for exception handling (jajerome@redhat.com) - ENT-4286: Simplify exception reporting with system_exit() (jajerome@redhat.com) - Cloud-what: Make saving token file more robust (jhnidek@redhat.com) - Remove deprecated function call (mhorky@redhat.com) - Fix failures of D-Bus' Register tests (mhorky@redhat.com) - Show locals in pytest output (mhorky@redhat.com) |
dovecot | 2.3.16-3.el8_6.ciqlts | 2023-11-13 | - | 2022-07-19 : - fix possible privilege escalation when similar master and non-master passdbs are used (#2106231) |
gstreamer1-plugins-good | 1.16.1-3.el8_6.ciqlts | 2023-11-14 |
|
2022-07-14 : - Add patches for matroskademux. CVE-2021-3497 - Resolves: rhbz#1948942 |
dnsmasq | 2.79-26.el8_6.ciqlts | 2023-11-14 |
|
2023-02-15 : - Avoid DHCPv6 relayed replies with Client Link-Layer Address (#2169355) 2023-01-26 : [Show All] 2023-02-15 : - Avoid DHCPv6 relayed replies with Client Link-Layer Address (#2169355) 2023-01-26 : - Use upstream change for CVE-2022-0934 (#2164859) |
libreswan | 4.9-3.el8_6.ciqlts | 2023-11-14 |
|
2023-05-05 : - Fix CVE-2023-30570: Malicious IKEv1 Aggressive Mode packets can crash libreswan [Show All] 2023-05-05 : - Fix CVE-2023-30570: Malicious IKEv1 Aggressive Mode packets can crash libreswan - Resolves: rhbz#2187179 2023-04-25 : - Update libreswan-4.9-2176248-authby-rsasig.patch 2023-04-14 : - Resolves: rhbz#2187647 authby=rsasig fails in FIPS policy 2023-04-04 : - Fix CVE-2023-23009: remote DoS via crafted TS payload with an incorrect selector length (rhbz#2186127) 2023-01-09 : - Resolves: rhbz#2128672 Rebase libreswan to 4.9 - Remove libreswan-4.4-ikev1-disable-diagnostics.patch no longer necessary |
qt5 | 5.15.3-1.el8_6.ciqlts | 2023-11-14 | - | 2022-03-24 : - 5.15.3 Resolves: bz#2061377 |
flatpak-builder | 1.0.14-2.el8_6.ciqlts | 2023-11-14 |
|
2022-04-01 : - Fix CVE-2022-21682 (#2042007) |
grafana-pcp | 3.2.0-3.el8_6.ciqlts | 2023-11-14 |
|
2022-11-01 : - resolve CVE-2022-27664 grafana-pcp: golang: net/http: handle server errors after sending GOAWAY |
unbound | 1.16.2-5.el8_6.ciqlts | 2023-11-15 | - | 2022-10-15 : - Stop creating wrong devel manual pages (#2135322) |
iperf3 | 3.5-7.el8_6.ciqlts | 2023-11-15 | - | 2023-07-26 : - Resolves: #2224443 - memory allocation hazard and crash |
openjpeg2 | 2.4.0-5.el8_6.ciqlts | 2023-11-15 |
|
2022-06-15 : - Fix CVE-2022-1122 |
protobuf | 3.5.0-15.el8_6.ciqlts | 2023-11-15 |
|
2022-03-21 : - Applied patch for for CVE-2021-22570 (#2050494) |
wavpack | 5.1.0-16.el8_6.ciqlts | 2023-11-15 |
|
2022-05-17 : - CVE-2021-44269 wavpack: heap Out-of-bounds Read - Resolves: CVE-2021-44269 |
libldb | 2.4.1-1.el8_6.ciqlts | 2023-11-16 | - | 2021-11-25 : - resolves: rhbz#2013605 - Rebase to version 2.4.1 |
mutt | 2.0.7-2.el8_6.ciqlts | 2023-11-15 |
|
2022-07-21 : - Fix CVE-2022-1328 (#2109247) |
poppler | 20.11.0-6.el8_6.ciqlts | 2023-11-17 | - | 2022-09-20 : - Check for overflow when computing number of symbols - in JBIG2 text region [Show All] 2022-09-20 : - Check for overflow when computing number of symbols - in JBIG2 text region - Resolves: #2126361 |
galera | 25.3.37-1.module+el8.6.0+2165+d757b3ab | 2023-11-17 | - | 2023-07-04 : - Rebase to 25.3.37 |
mariadb | 10.3.39-1.module+el8.6.0+2165+d757b3ab | 2023-11-17 |
|
2023-06-22 : - Rebase to 10.3.39 - CVEs fixed: [Show All] 2023-06-22 : - Rebase to 10.3.39 - CVEs fixed: CVE-2022-47015, CVE-2018-25032, CVE-2022-32091, CVE-2022-32084 |
Judy | 1.0.5-18.module+el8.6.0+2165+d757b3ab | 2023-11-17 | - | 2018-10-11 : - Remove README.Fedora; no longer needed since 1.0.5 version - Resolves: #1638717 |
python38 | 3.8.17-2.module+el8.6.0+2188+67ab3082 | 2023-11-18 |
|
2023-08-09 : - Fix symlink handling in the fix for CVE-2023-24329 Resolves: rhbz#263261 [Show All] 2023-08-09 : - Fix symlink handling in the fix for CVE-2023-24329 Resolves: rhbz#263261 2023-08-07 : - Update to 3.8.17 - Security fix for CVE-2023-24329 - Add filters for tarfile extraction (CVE-2007-4559, PEP-706) Resolves: rhbz#2173917, rhbz#263261 2023-07-18 : - Strip the LTO bytecode from python.o Resolves: rhbz#2213526 |
scipy | 1.3.1-5.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2023-07-14 : - Remove RPATH from certain shared object files - Resolves: rhbz#2222717 |
numpy | 1.17.3-7.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2023-07-17 : - Skip TestCond.test_nan - Resolves: rhbz#2217862 |
python-lxml | 4.4.1-7.module+el8.6.0+2188+67ab3082 | 2023-11-18 |
|
2022-01-06 : - Security fix for CVE-2021-43818 Resolves: rhbz#2032569 |
Cython | 0.29.14-4.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
mod_wsgi | 4.6.8-5.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2023-07-13 : - Remove rpath Resolves: rhbz#2213836 |
python-cffi | 1.13.2-3.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python-psycopg2 | 2.8.4-4.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python-requests | 2.22.0-9.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python-urllib3 | 1.25.7-5.module+el8.6.0+2188+67ab3082 | 2023-11-18 |
|
2021-06-29 : - Fix for CVE-2021-33503 Catastrophic backtracking in URL authority parser Resolves: rhbz#1968074 [Show All] 2021-06-29 : - Fix for CVE-2021-33503 Catastrophic backtracking in URL authority parser Resolves: rhbz#1968074 - Update RECENT_DATE dynamically |
python3x-setuptools | 41.6.0-5.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2021-08-02 : - Adjusted the postun scriptlets to enable upgrading to RHEL 9 - Resolves: rhbz#1933055 |
python-idna | 2.8-6.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
PyYAML | 5.4.1-1.module+el8.6.0+2188+67ab3082 | 2023-11-18 |
|
2021-03-23 : - Rebase to version 5.4.1 to fix CVE-2020-14343 - Resolves: rhbz#1860466 |
python-ply | 3.11-10.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2021-01-05 : - Extract and ship license file (#1912893) - Resolves: rhbz#1877430 |
pytz | 2019.3-4.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2023-06-27 : - Fix FTBFS with newest tzdata Resolves: rhbz#2217853 |
python-pycparser | 2.19-3.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python-markupsafe | 1.1.1-6.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python-wheel | 0.33.6-6.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2021-08-02 : - Adjusted the postun scriptlets to enable upgrading to RHEL 9 - Resolves: rhbz#1933055 |
python-chardet | 3.0.4-19.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python3x-pip | 19.3.1-7.module+el8.6.0+2188+67ab3082 | 2023-11-18 |
|
2023-08-08 : - Use tarfile.data_filter for extracting (CVE-2007-4559, PEP-721, PEP-706) Resolves: RHBZ#2218267 |
python-cryptography | 2.8-3.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python3x-six | 1.12.0-10.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2020-11-10 : - Rebuild from a new component name |
python-psutil | 5.6.4-4.module+el8.6.0+2188+67ab3082 | 2023-11-18 |
|
2021-07-26 : - Security fix for CVE-2019-18874: double free because of refcount mishandling Resolves: rhbz#1772014 |
babel | 2.7.0-11.module+el8.6.0+2188+67ab3082 | 2023-11-18 |
|
2021-05-12 : - Fix CVE-2021-20095 Resolves: rhbz#1955615 |
python-PyMySQL | 0.10.1-1.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2020-10-06 : - Rebase to 0.10 version to add support for MariaDB ed25519 authentication mechanism |
python-pysocks | 1.7.1-4.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python-asn1crypto | 1.2.0-3.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2019-12-13 : - Exclude unsupported i686 arch |
python-jinja2 | 2.11.3-1.module+el8.6.0+2188+67ab3082 | 2023-11-18 | - | 2022-05-20 : - Update to 2.11.3. - Fix URL. [Show All] 2022-05-20 : - Update to 2.11.3. - Fix URL. - Remove patch that is included in this release. Resolves: rhbz#2086141. |
delve | 1.20.2-1.module+el8.6.0+2208+489a80c2 | 2023-11-22 | - | 2023-05-26 : - Rebase to 1.20.2 - Resolves: rhbz#2186495 |
golang | 1.20.10-1.module+el8.6.0+2208+489a80c2 | 2023-11-22 |
|
2023-10-13 : - Update to Go 1.20.10 - Fix CVE-2023-39325 [Show All] 2023-10-13 : - Update to Go 1.20.10 - Fix CVE-2023-39325 - Midstream patches - Resolves: RHEL-12619 2023-08-14 : - Retire golang-race package - Resolves: rhbz#2230599 2023-07-25 : - Rebase to Go 1.20.6 - Resolves: rhbz#2217596 2023-05-29 : - Rebase to Go 1.20.4 - Resolves: rhbz#2204474 2023-04-11 : - Rebase to Go 1.20.3 - Remove race archives - Update static tests patches - Resolves: rhbz#2185260 2023-01-03 : - Fix memory leaks in EVP_{sign,verify}_raw - Resolves: rhbz#2132767 2022-12-21 : - Rebase to Go 1.19.4 - Fix ppc64le linker issue - Remove defunct patches - Remove downstream generated FIPS mode patches - Add golang-fips/go as the source for FIPS mode patches - Resolves: rhbz#2144542 |
go-toolset | 1.20.10-1.module+el8.6.0+2208+489a80c2 | 2023-11-22 |
|
2023-10-13 : - Update to Go 1.20.10 - Fix CVE-2023-39325 [Show All] 2023-10-13 : - Update to Go 1.20.10 - Fix CVE-2023-39325 - Midstream patches - Resolves: RHEL-12619 2023-08-01 : - Rebase to Go 1.20.6 - Resolves: rhbz#2226901 2023-05-31 : - Rebase to Go 1.20.4 - Resolves: rhbz#2204474 2023-04-11 : - Rebase to Go 1.20.3 - Remove race archives - Update static tests patches - Resolves: rhbz#2185260 2022-12-21 : - Rebase to Go 1.19.4 - Fix ppc64le linker issue - Remove defunct patches - Remove downstream generated FIPS mode patches - Add golang-fips/go as the source for FIPS mode patches - Resolves: rhbz#2144542 |
cups-filters | 1.20.0-29.el8_6.ciqlts.2 | 2023-11-17 |
|
2023-05-15 : - CVE-2023-24805 cups-filters: remote code execution in cups-filters, beh CUPS backend 2023-05-05 : [Show All] 2023-05-15 : - CVE-2023-24805 cups-filters: remote code execution in cups-filters, beh CUPS backend 2023-05-05 : - 2193390 - Edges cropped when printing PostScript document |
openblas | 0.3.15-4.el8_6.ciqlts | 2023-11-20 |
|
2022-06-15 : - Fix out-of-bounds read in *larrv - Resolves: CVE-2021-4048 |
ghostscript | 9.27-6.el8_6.ciqlts | 2023-11-27 | - | 2023-02-02 : - set the page size for A4 correctly in ESC/Page driver - Resolves: rhbz#2164603 |
selinux-policy | 3.14.3-96.el8_6.ciqlts.1 | 2023-12-04 | - | 2023-12-01 : - Add upstream patch to fix iptables /sys/fs/cgroup denial issue |
firefox | 115.7.0-1.el8_6.ciqlts | 2024-01-30 |
|
2024-01-30 : - Security backport build for CIQ LTS 8.6 2024-01-30 : [Show All] 2024-01-30 : - Security backport build for CIQ LTS 8.6 2024-01-30 : - Add debranding patches (Mustafa Gezen) - Add Rocky Linux default preferences (Louis Abel) 2024-01-16 : - Update to 115.7.0 build1 2023-12-12 : - Update to 115.6.0 build1 2023-11-14 : - Update to 115.5.0 build1 2023-10-17 : - Update to 115.4.0 build1 - Add fix for CVE-2023-44488 - Set homepage from os-release HOME_URL 2023-09-29 : - Update to 115.3.1 2023-09-21 : - Update to 115.3.0 ESR 2023-09-04 : - Update to 115.2.0 ESR 2023-08-02 : - Update to 115.1.0 ESR |
thunderbird | 115.7.0-1.el8_6.ciqlts | 2024-01-30 | - | 2024-01-30 : - Backport security build for CIQ LTS Rocky 8.6 2024-01-30 : [Show All] 2024-01-30 : - Backport security build for CIQ LTS Rocky 8.6 2024-01-30 : - Add Rocky Linux debranding 2024-01-22 : - Update to 115.7.0 build1 2023-12-18 : - Update to 115.6.0 build2 2023-11-21 : - Update to 115.5.0 build1 2023-10-25 : - Update to 115.4.1 build1 2023-10-24 : - Update to 115.4.0 build3 2023-10-21 : - Update to 115.4.0 build2 2023-10-20 : - Update to 115.4.0 build1 2023-09-29 : - Update to 115.3.1 build1 |
squid | 4.15-7.module+el8.6.0+2289+765e0959.3 | 2023-12-08 | - | 2023-11-30 : - Related: RHEL-14792 - squid: squid multiple issues in HTTP response caching - Fix mistake in the patch [Show All] 2023-11-30 : - Related: RHEL-14792 - squid: squid multiple issues in HTTP response caching - Fix mistake in the patch 2023-11-21 : - Resolves: RHEL-14792 - squid: squid multiple issues in HTTP response caching 2023-10-30 : - Resolves: RHEL-14801 - squid: squid: Denial of Service in HTTP Digest Authentication - Resolves: RHEL-14776 - squid: squid: Request/Response smuggling in HTTP/1.1 and ICAP 2023-08-16 : - Resolves: #2076717 - Crash with half_closed_client on |
libecap | 1.0.1-2.module+el8.6.0+2289+765e0959 | 2023-12-08 | - | 2019-08-23 : - Resolves: #1695587 - Ensure modular RPM upgrade path |
tracker-miners | 2.1.5-2.el8_6.ciqlts.1 | 2023-12-14 | - | 2023-12-06 : - Fix issues and missing syscalls in seccomp improvements backport Resolves: RHEL-12465 [Show All] 2023-12-06 : - Fix issues and missing syscalls in seccomp improvements backport Resolves: RHEL-12465 2023-12-05 : - Backport stricter seccomp jail Resolves: RHEL-12465 |
php-pecl-apcu | 5.1.12-2.module+el8.6.0+2378+6ed50a3e | 2023-12-14 | - | 2019-05-15 : - rebuild (#1695587) |
php-pecl-zip | 1.15.3-1.module+el8.6.0+2378+6ed50a3e | 2023-12-14 | - | 2018-06-12 : - Update to 1.15.3 |
php-pear | 1.10.5-9.module+el8.6.0+2378+6ed50a3e | 2023-12-14 | - | 2019-05-15 : - rebuild |
php | 7.2.24-1.module+el8.6.0+2378+6ed50a3e | 2023-12-14 | - | 2019-11-07 : - update to 7.2.24 #1726981 |
libzip | 1.5.1-2.module+el8.6.0+2378+6ed50a3e | 2023-12-14 | - | 2019-05-15 : - rebuild (#1695587) |
gstreamer1-plugins-bad-free | 1.16.1-2.el8_6.ciqlts | 2023-12-15 |
|
2023-12-13 : - Patch CVE-2023-44446: MXF demuxer use-after-free - Resolves: RHEL-17036 |
tigervnc | 1.12.0-15.el8_6.ciqlts.4 | 2024-01-05 |
|
2024-01-03 : - CVE Rollups from upstream: Patches by Jan Grulich - Fix CVE-2023-5380 tigervnc: xorg-x11-server: Use-after-free bug in DestroyWindow [Show All] 2024-01-03 : - CVE Rollups from upstream: Patches by Jan Grulich |
nss | 3.79.0-12.el8_6.ciqlts | 2024-01-16 |
|
2024-01-15 : - Fix CVE-2023-5388 - Fix expired test certs with NameConstraints_Certs.tar [Show All] 2024-01-15 : - Fix CVE-2023-5388 - Fix expired test certs with NameConstraints_Certs.tar - Upstream patches: https://gitlab.com/redhat/centos-stream/rpms/nss/-/commit/b604fc6eb5bf895a2f80f70ccf86d05b76641580 - And here: https://git.rockylinux.org/staging/rpms/nss/-/commit/1f7f7523b61a2ada2f461548c4160fbbf979c5dd 2023-03-08 : - Fix CVE-2023-0767 |
avahi | 0.7-21.el8_6.ciqlts.1 | 2024-01-17 |
|
2023-12-06 : - Fix CVE-2021-3468 (RHEL-18311) - Fix CVE-2023-38469 (RHEL-17783) [Show All] 2023-12-06 : - Fix CVE-2021-3468 (RHEL-18311) - Fix CVE-2023-38469 (RHEL-17783) - Fix CVE-2023-38470 (RHEL-17795) - Fix CVE-2023-38471 (RHEL-17789) - Fix CVE-2023-38472 (RHEL-17807) - Fix CVE-2023-38473 (RHEL-17801) 2023-08-23 : - Fix CVE-2023-1981 (#2186688) |
procps-ng | 3.3.15-14.el8_6.ciqlts | 2024-01-17 |
|
2023-08-15 : - CVE-2023-4016: ps: possible buffer overflow - Resolves: rhbz#2228503 [Show All] 2023-08-15 : - CVE-2023-4016: ps: possible buffer overflow - Resolves: rhbz#2228503 2023-01-17 : - version bump requested to create -devel subpkg for CRB inclusion - Resolves: rhbz#2164781 2023-01-17 : - ps: out-of-bonds read in quick mode - Resolves: rhbz#2153813 |
iscsi-initiator-utils | 6.2.1.4-8.git095f59c.el8_6.ciqlts | 2024-01-30 | - | 2023-06-15 : - fix gating test 2023-06-15 : [Show All] 2023-06-15 : - fix gating test 2023-06-15 : - move tests to tmt framework 2023-06-13 : - restore missing gating tests 2023-06-07 : - 2131090 fix idbm patch to not overwrite upstream changes in file mode |