CIQ Rocky LTS 8.6 Packages

A look at CIQ LTS-8.6 packages, publication times, CVE fixes, and summary.

Showing builds from 2022-12-15 and later.

This page was generated on 2024-01-30 18:25:02 (EDT)



Package Version Build Date CVE Fixes Changelogs
ciq-lts86-rocky-release 8.6-6.el8 2023-02-10 - 2023-02-10 :
- Fixed issues in source repository URLs
stalld 1.17.1-2.el8.ciqlts 2023-01-10 - 2023-01-04 :
- Rebuild against Rocky Linux base for CIQ LTS
krb5 1.18.2-15.el8_6.0.ciqlts 2023-10-07
  • CVE-2022-42898
2023-01-10 :
- CIQ LTS 8.6 backport: Patch to fix integer overflows in PAC parsing (resolves CVE-2022-42898)
dpdk 21.11-3.el8.ciqlts 2023-01-19 - 2023-01-19 :
- Rebuilt against Rocky 8.6 for CIQ LTS. No code changes
tzdata 2023c-2.el8_6.ciqlts 2023-10-25 - 2023-08-21 :
- Bump release to test recent process changes. (RHEL-1326)
2023-03-28 :

[Show All]
2023-08-21  :  
- Bump release to test recent process changes. (RHEL-1326)
2023-03-28  :  
- Rebase to tzdata-2023c
  - Lebanon reversed the change added in tzdata-2023b.
2023-03-24  :  
- Rebase to tzdata-2023b
  - Lebanon will transition to DST on April 20/21, not March 25/26.
2023-03-22  :  
- Rebase to tzdata-2023a
  - Egypt reintroduced DST, from April through October.
  - Morocco springs forward April 23, not April 30.
  - Palestine delayed the start of DST this year.
2023-01-06  :  
- Include leap-seconds.list in tzdata install. (#2154109)
java-17-openjdk 17.0.10.0.7-2.el8_6.ciqlts 2024-01-19 - 2024-01-19 :
- Set portablerelease/portableversion variables to match LTS
2024-01-17 :

[Show All]
2024-01-19  :  
- Set portablerelease/portableversion variables to match LTS
2024-01-17  :  
- Build for Rocky Linux 8 using our own portable
2024-01-11  :  
- Update to jdk-17.0.10+7 (GA)
- Sync the copy of the portable specfile with the latest update
- Move to -P usage for patch macro which works on all RPM versions
- Remove RH1648644 patch not in portable build (and so not applied to binary used)
- Re-enable DEFAULT_PROMOTED_VERSION_PRE check disabled for the July 2023 release
- generate_source_tarball.sh: Add --sort=name to tar invocation for reproducibility
- ** This tarball is embargoed until 2024-01-16 @ 1pm PT. **
- Resolves: RHEL-20969
2024-01-11  :  
- Update to jdk-17.0.10+6 (EA)
- fips-17u-d63771ea660.patch: Regenerate from gnu-andrew branch
- generate_source_tarball.sh: Add WITH_TEMP environment variable
- generate_source_tarball.sh: Multithread xz on all available cores
- generate_source_tarball.sh: Add OPENJDK_LATEST environment variable
- generate_source_tarball.sh: Update comment about tarball naming
- generate_source_tarball.sh: Remove REPO_NAME from FILE_NAME_ROOT
- generate_source_tarball.sh: Set compile-command in Emacs
- generate_source_tarball.sh: Reformat comment header
- generate_source_tarball.sh: Reformat and update help output
- generate_source_tarball.sh: Move PROJECT_NAME and REPO_NAME checks
- generate_source_tarball.sh: Do a shallow clone, for speed
- generate_source_tarball.sh: Append -ea designator when required
- generate_source_tarball.sh: Eliminate some removal prompting
- generate_source_tarball.sh: Make tarball reproducible
- generate_source_tarball.sh: Prefix temporary directory with temp-
- generate_source_tarball.sh: shellcheck: Remove x-prefixes since we use Bash
- generate_source_tarball.sh: shellcheck: Double-quote variable references
- generate_source_tarball.sh: shellcheck: Do not use -a
- generate_source_tarball.sh: shellcheck: Do not use $ in expression
- generate_source_tarball.sh: Remove temporary directory exit conditions
- generate_source_tarball.sh: Add note on network usage of OPENJDK_LATEST
- Related: RHEL-20969
2023-10-12  :  
- Update to jdk-17.0.9+9 (GA)
- Sync the copy of the portable specfile with the latest update
- Re-generate FIPS patch against 17.0.9+1 following backport of JDK-8209398
- Bump libpng version to 1.6.39 following JDK-8305815
- Bump HarfBuzz version to 7.2.0 following JDK-8307301
- Bump freetype version to 2.13.0 following JDK-8306881
- Update generate_tarball.sh to be closer to upstream vanilla script inc. no more ECC removal
- Sync generate_tarball.sh with 11u version
- Update bug URL for RHEL to point to the Red Hat customer portal
- Change top_level_dir_name to use the VCS tag, matching new upstream release style tarball
- Use upstream release URL for OpenJDK source
- Apply all patches using -p1
- Temporarily turn off 'fresh_libjvm' due to removal of JVM_IsThreadAlive (JDK-8305425)
- Add missing JFR and jpackage alternative ghosts
- Move jcmd to the headless package
- ** This tarball is embargoed until 2023-10-17 @ 1pm PT. **
- Resolves: RHEL-12204
- Resolves: RHEL-13670
- Resolves: RHEL-13680
- Resolves: RHEL-13689
- Resolves: RHEL-13708
- Resolves: RHEL-13658
2023-09-04  :  
- Bump release number so we are newer than 9.0
- Related: rhbz#2236591
2023-09-02  :  
- Update to jdk-17.0.8.1+1 (GA)
- Update release notes to 17.0.8.1+1
- Add backport of JDK-8312489 already upstream in 17.0.10 (see OPENJDK-2095)
- Update openjdk_news script to specify subdirectory last
- Add missing discover_trees script required by openjdk_news
- Synchronise runtime and buildtime tzdata requirements
- Resolves: rhbz#2236591
2023-07-19  :  
- Bump release number so we are newer than 8.6
- Related: rhbz#2221106
2023-07-14  :  
- Update to jdk-17.0.8+7 (GA)
- Update release notes to 17.0.8+7
- Switch to GA mode for final release.
- Sync the copy of the portable specfile with the latest update
- Add note at top of spec file about rebuilding
- * This tarball is embargoed until 2023-07-18 @ 1pm PT. *
- Resolves: rhbz#2221106
2023-07-13  :  
- Update to jdk-17.0.8+6 (EA)
- Sync the copy of the portable specfile with the latest update
- Resolves: rhbz#2217714
java-11-openjdk 11.0.22.0.7-2.el8_6.ciqlts 2024-01-19 - 2024-01-18 :
- Set portablerelease/portableversion variables to match LTS
2024-01-18 :

[Show All]
2024-01-18  :  
- Set portablerelease/portableversion variables to match LTS
2024-01-18  :  
- Build for Rocky Linux 8 using our own portable
2024-01-10  :  
- Update to jdk-11.0.22+7 (GA)
- Sync the copy of the portable specfile with the latest update
- Drop local copy of JDK-8312489 which is now included upstream
- ** This tarball is embargoed until 2024-01-16 @ 1pm PT. **
- Resolves: RHEL-20981
2023-10-13  :  
- Update to jdk-11.0.21+9 (GA)
- Sync the copy of the portable specfile with the latest update
- Re-generate FIPS patch against 11.0.21+1 following backport of JDK-8155246
- Re-generate SHA3 patch following backport of JDK-8242151
- Bump libpng version to 1.6.39 following JDK-8305815
- Bump HarfBuzz version to 7.2.0 following JDK-8307301
- Bump freetype version to 2.13.0 following JDK-8306881
- Update generate_tarball.sh to be closer to upstream vanilla script inc. no more ECC removal
- Update bug URL for RHEL to point to the Red Hat customer portal
- Change top_level_dir_name to use the VCS tag, matching new upstream release style tarball
- Apply all patches using -p1
- Drop local backport of JDK-8243210 which is upstream from 11.0.21+2
- Add missing JFR alternative ghost
- Move jcmd to the headless package
- ** This tarball is embargoed until 2023-10-17 @ 1pm PT. **
- Resolves: RHEL-12222
- Resolves: RHEL-13546
- Resolves: RHEL-13553
- Resolves: RHEL-13559
- Resolves: RHEL-13566
- Resolves: RHEL-13572
2023-09-08  :  
- Bump release number so we are newer than 8.6
- Related: rhbz#2236589
2023-09-05  :  
- Update to jdk-11.0.20.1+1 (GA)
- Add backport of JDK-8312489 already upstream in 11.0.22 (see OPENJDK-2095)
- Add backport of JDK-8243210 already upstream in 11.0.21 (see RH2229269)
- Update openjdk_news script to specify subdirectory last
- Add missing discover_trees script required by openjdk_news
- Resolves: rhbz#2236589
2023-07-20  :  
- Fix tzdata requirement copy-and-paste error that led to two BuildRequires and no Requires
- Resolves: rhbz#2224411
2023-07-15  :  
- Sync the copy of the portable specfile with the latest update
- Add note at top of spec file about rebuilding
- Related: rhbz#2221106
2023-07-14  :  
- Update to jdk-11.0.20.0+8 (GA)
- Update release notes to 11.0.20.0+8
- Drop local inclusion of JDK-8274864 & JDK-8305113 as they are included in 11.0.20+1
- Bump tzdata requirement to 2023c now it is available in the buildroot
- Bump bundled LCMS version to 2.15 as in jdk-11.0.20+1.
- Bump bundled HarfBuzz version to 7.0.1 as in jdk-11.0.20+7
- Use tapsets from the misc tarball
- Introduce 'prelease' for the portable release versioning, to handle EA builds
- Make sure root installation directory is created first
- Use in-place substitution for all but the first of the tapset changes
- ** This tarball is embargoed until 2023-07-18 @ 1pm PT. **
- Resolves: rhbz#2217713
- Resolves: rhbz#2196318
- Resolves: rhbz#2221106
2023-04-26  :  
- Include the java-11-openjdk-portable.spec file with instructions on how to rebuild.
- Related: rhbz#2189327
microcode_ctl 20230808-2.20231009.1.el8_6.ciqlts 2023-11-16
  • CVE-2023-23583
  • CVE-2022-40982
  • CVE-2022-41804
  • CVE-2023-23908
  • CVE-2022-21216
  • CVE-2022-33196
  • CVE-2022-33972
  • CVE-2022-38090
2023-11-01 :
- Update Intel CPU microcode to microcode-20231009 release, addresses
CVE-2023-23583 (RHEL-3684):

[Show All]
2023-11-01  :  
- Update Intel CPU microcode to microcode-20231009 release, addresses
  CVE-2023-23583 (RHEL-3684):
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
    intel-06-8c-01/intel-ucode/06-8c-01) from revision 0xac up to 0xb4;
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd0003a5
    up to 0xd0003b9;
  - Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x1000230
    up to 0x1000268;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xbc
    up to 0xc2;
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x2c up
    to 0x34;
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x46 up
    to 0x4e;
  - Update of 06-8f-04/0x10 microcode from revision 0x2c000271 up to
    0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-04) from revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-04) from
    revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-04) from revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from
    revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision
    0x2c000271 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b0004b1
    up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from
    revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-05) from revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from
    revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-06) from revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode from revision 0x2c000271 up to
    0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b0004b1
    up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-06) from revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
    revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-08) from revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
    revision 0x2c000271 up to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
    0x2c000271 up to 0x2c000290;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
    0x2b0004b1 up to 0x2b0004d0;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
    0x2e up to 0x32;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-97-02) from revision 0x2e up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
    from revision 0x2e up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
    from revision 0x2e up to 0x32;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-97-05) from revision 0x2e up to 0x32;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x2e
    up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
    from revision 0x2e up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
    from revision 0x2e up to 0x32;
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
    0x42c up to 0x430;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
    intel-ucode/06-9a-03) from revision 0x42c up to 0x430;
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    intel-ucode/06-9a-04) from revision 0x42c up to 0x430;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x42c
    up to 0x430;
  - Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0x4 up
    to 0x5;
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x59 up
    to 0x5d;
  - Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x119 up
    to 0x11d;
  - Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
    0x4119 up to 0x411c;
  - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
    intel-ucode/06-ba-02) from revision 0x4119 up to 0x411c;
  - Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    intel-ucode/06-ba-03) from revision 0x4119 up to 0x411c;
  - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4119
    up to 0x411c;
  - Update of 06-be-00/0x11 (ADL-N A0) microcode from revision 0x11 up
    to 0x12;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-bf-02) from revision 0x2e up to 0x32;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-bf-02) from revision 0x2e up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x2e up
    to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
    from revision 0x2e up to 0x32;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-bf-05) from revision 0x2e up to 0x32;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-bf-05) from revision 0x2e up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
    from revision 0x2e up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x2e up
    to 0x32.
2023-08-22  :  
- Add support for the new, more correct, variant of dracut's default
  $fw_dir path in dracut_99microcode_ctl-fw_dir_override_module_init.sh.
2023-08-10  :  
- Update Intel CPU microcode to microcode-20230808 release, addresses
  CVE-2022-40982, CVE-2022-41804, CVE-2023-23908 (#2213125, #2223993, #2230678,
    - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006f05 up
    to 0x2007006;
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
    intel-06-8c-01/intel-ucode/06-8c-01) from revision 0xaa up to 0xac;
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xf2 up
    to 0xf4;
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xf2 up
    to 0xf4;
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xf2 up
    to 0xf4;
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xf2 up
    to 0xf4;
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
    revision 0xf6 up to 0xf8;
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xf2 up
    to 0xf4;
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xf2 up
    to 0xf4;
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xf2 up
    to 0xf4;
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xf2 up
    to 0xf4;
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xf8 up
    to 0xfa;
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000171
    up to 0x1000181;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003501
    up to 0x4003604;
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
    0x5003501 up to 0x5003604;
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x7002601
    up to 0x7002703;
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000390
    up to 0xd0003a5;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xba
    up to 0xbc;
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x2a up
    to 0x2c;
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x44 up
    to 0x46;
  - Update of 06-8f-04/0x10 microcode from revision 0x2c0001d1 up to
    0x2c000271;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-04) from revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-04) from
    revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-04) from revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from
    revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b000461
    up to 0x2b0004b1;
  - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from
    revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-05) from revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from
    revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-06) from revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-06/0x10 microcode from revision 0x2c0001d1 up to
    0x2c000271;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b000461
    up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-06) from revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
    revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-08) from revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
    revision 0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b000461 up to 0x2b0004b1;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
    0x2c0001d1 up to 0x2c000271;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
    0x2b000461 up to 0x2b0004b1;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
    0x2c up to 0x2e;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-97-02) from revision 0x2c up to 0x2e;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
    from revision 0x2c up to 0x2e;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
    from revision 0x2c up to 0x2e;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-97-05) from revision 0x2c up to 0x2e;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x2c
    up to 0x2e;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
    from revision 0x2c up to 0x2e;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
    from revision 0x2c up to 0x2e;
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
    0x42a up to 0x42c;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
    intel-ucode/06-9a-03) from revision 0x42a up to 0x42c;
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    intel-ucode/06-9a-04) from revision 0x42a up to 0x42c;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x42a
    up to 0x42c;
  - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xf6 up
    to 0xf8;
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xf6
    up to 0xf8;
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xf6
    up to 0xf8;
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xf6
    up to 0xf8;
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode from revision
    0xf6 up to 0xf8;
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x58 up
    to 0x59;
  - Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x113 up
    to 0x119;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-bf-02) from revision 0x2c up to 0x2e;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-bf-02) from revision 0x2c up to 0x2e;
  - Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x2c up
    to 0x2e;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
    from revision 0x2c up to 0x2e;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-bf-05) from revision 0x2c up to 0x2e;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-bf-05) from revision 0x2c up to 0x2e;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
    from revision 0x2c up to 0x2e;
  - Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x2c up
    to 0x2e;
  - Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
    0x4112 up to 0x4119 (old pf 0xc0);
  - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
    intel-ucode/06-ba-02) from revision 0x4112 up to 0x4119 (old pf 0xc0);
  - Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    intel-ucode/06-ba-03) from revision 0x4112 up to 0x4119 (old pf 0xc0);
  - Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4112
    up to 0x4119 (old pf 0xc0);
  - Update of 06-be-00/0x11 (ADL-N A0) microcode from revision 0x10 up
    to 0x11 (old pf 0x1).
2023-08-07  :  
- Update Intel CPU microcode to microcode-20230516 release (#2213125):
  - Addition of 06-be-00/0x01 (ADL-N A0) microcode at revision 0x10;
  - Addition of 06-9a-04/0x40 (AZB A0) microcode at revision 0x4;
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in
    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006e05 up
    to 0x2006f05;
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
    intel-06-8c-01/intel-ucode/06-8c-01) from revision 0xa6 up to 0xaa;
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xf0 up
    to 0xf2;
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xf0 up
    to 0xf2;
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xf0 up
    to 0xf2;
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xf0 up
    to 0xf2;
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
    revision 0xf4 up to 0xf6;
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xf0 up
    to 0xf2;
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xf0 up
    to 0xf2;
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xf0 up
    to 0xf2;
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xf0 up
    to 0xf2;
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xf4 up
    to 0xf8;
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000161
    up to 0x1000171;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003303
    up to 0x4003501;
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
    0x5003303 up to 0x5003501;
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x7002503
    up to 0x7002601;
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000389
    up to 0xd000390;
  - Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x1000211
    up to 0x1000230;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb8
    up to 0xba;
  - Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x32 up
    to 0x33;
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x28 up
    to 0x2a;
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x42 up
    to 0x44;
  - Update of 06-8f-04/0x10 microcode from revision 0x2c000170 up to
    0x2c0001d1;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode from revision
    0x2b000181 up to 0x2b000461;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-04) from revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-04) from
    revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-04) from revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-04) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from
    revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision
    0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b000181
    up to 0x2b000461;
  - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from
    revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-05) from revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-05) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from
    revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-06) from revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-06/0x10 microcode from revision 0x2c000170 up to
    0x2c0001d1;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b000181
    up to 0x2b000461;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-06) from revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-06) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
    0x2b000181 up to 0x2b000461;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-07) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
    revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-08) from revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
    revision 0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-08) from revision 0x2b000181 up to 0x2b000461;
  - Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
    0x2c000170 up to 0x2c0001d1;
  - Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
    0x2b000181 up to 0x2b000461;
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
    0x429 up to 0x42a;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
    intel-ucode/06-9a-03) from revision 0x429 up to 0x42a;
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    intel-ucode/06-9a-04) from revision 0x429 up to 0x42a;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x429
    up to 0x42a;
  - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xf4 up
    to 0xf6;
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xf4
    up to 0xf6;
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xf4
    up to 0xf6;
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xf4
    up to 0xf6;
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode from revision
    0xf4 up to 0xf6;
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x57 up
    to 0x58;
  - Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x112 up
    to 0x113;
  - Update of 06-ba-02/0xc0 (RPL-H 6+8/P 6+8 J0) microcode from revision
    0x410e up to 0x4112;
  - Update of 06-ba-03/0xc0 (RPL-U 2+8 Q0) microcode (in
    intel-ucode/06-ba-02) from revision 0x410e up to 0x4112;
  - Update of 06-ba-02/0xc0 (RPL-H 6+8/P 6+8 J0) microcode (in
    intel-ucode/06-ba-03) from revision 0x410e up to 0x4112;
  - Update of 06-ba-03/0xc0 (RPL-U 2+8 Q0) microcode from revision 0x410e
    up to 0x4112.
2023-08-01  :  
- Avoid spurious find failures due to calls on directories that may not exist
  (#2231065).
2023-06-28  :  
- Force locale to C in check_caveats, reload_microcode, and update_ucode
  (#2218096).
2023-06-06  :  
- Cleanup the dangling symlinks in update_ucode (#2135376).
2023-02-15  :  
- Update Intel CPU microcode to microcode-20230214 release, addresses
  CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, CVE-2022-38090 (#2171234,
    - Addition of 06-6c-01/0x10 (ICL-D B0) microcode at revision 0x1000211;
  - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode at revision
    0x2b000181;
  - Addition of 06-8f-04/0x10 microcode at revision 0x2c000170;
  - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-04) at revision 0x2b000181;
  - Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-04) at revision 0x2c000170;
  - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-04) at revision 0x2b000181;
  - Addition of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-04) at
    revision 0x2c000170;
  - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-04) at revision 0x2b000181;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-04) at revision 0x2b000181;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-04) at revision 0x2c000170;
  - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-05) at revision 0x2b000181;
  - Addition of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) at
    revision 0x2c000170;
  - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode at revision
    0x2b000181;
  - Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode at revision
    0x2c000170;
  - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-05) at revision 0x2b000181;
  - Addition of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) at
    revision 0x2c000170;
  - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-05) at revision 0x2b000181;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-05) at revision 0x2b000181;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-05) at revision 0x2c000170;
  - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-06) at revision 0x2b000181;
  - Addition of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) at
    revision 0x2c000170;
  - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-06) at revision 0x2b000181;
  - Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-06) at revision 0x2c000170;
  - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode at revision
    0x2b000181;
  - Addition of 06-8f-06/0x10 microcode at revision 0x2c000170;
  - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-06) at revision 0x2b000181;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-06) at revision 0x2b000181;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
    intel-ucode/06-8f-06) at revision 0x2c000170;
  - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-07) at revision 0x2b000181;
  - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-07) at revision 0x2b000181;
  - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-07) at revision 0x2b000181;
  - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode at revision
    0x2b000181;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
    intel-ucode/06-8f-07) at revision 0x2b000181;
  - Addition of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
    intel-ucode/06-8f-08) at revision 0x2b000181;
  - Addition of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) at
    revision 0x2c000170;
  - Addition of 06-8f-05/0x87 (SPR-SP E2) microcode (in
    intel-ucode/06-8f-08) at revision 0x2b000181;
  - Addition of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
    intel-ucode/06-8f-08) at revision 0x2c000170;
  - Addition of 06-8f-06/0x87 (SPR-SP E3) microcode (in
    intel-ucode/06-8f-08) at revision 0x2b000181;
  - Addition of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) at
    revision 0x2c000170;
  - Addition of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
    intel-ucode/06-8f-08) at revision 0x2b000181;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode at revision
    0x2b000181;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode at revision
    0x2c000170;
  - Addition of 06-b7-01/0x32 (RPL-S S0) microcode at revision 0x112;
  - Addition of 06-ba-02/0xc0 microcode at revision 0x410e;
  - Addition of 06-ba-03/0xc0 microcode (in intel-ucode/06-ba-02) at
    revision 0x410e;
  - Addition of 06-ba-02/0xc0 microcode (in intel-ucode/06-ba-03) at
    revision 0x410e;
  - Addition of 06-ba-03/0xc0 microcode at revision 0x410e;
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in
    intel-06-8c-01/intel-ucode/06-8c-01) from revision 0xa4 up to 0xa6;
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)
    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from
    revision 0xf0 up to 0xf4;
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xf0 up
    to 0xf4;
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x100015e
    up to 0x1000161;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4003302
    up to 0x4003303;
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision
    0x5003302 up to 0x5003303;
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode from revision 0x7002501
    up to 0x7002503;
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000375
    up to 0xd000389;
  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x3c up
    to 0x3e;
  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x20 up
    to 0x22;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xb2
    up to 0xb8;
  - Update of 06-8a-01/0x10 (LKF B2/B3) microcode from revision 0x31 up
    to 0x32;
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x40 up
    to 0x42;
  - Update of 06-96-01/0x01 (EHL B1) microcode from revision 0x16 up
    to 0x17;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
    0x22 up to 0x2c (old pf 0x3);
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-97-02) from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
    from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
    from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-97-05) from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x22
    up to 0x2c (old pf 0x3);
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
    from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
    from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
    0x421 up to 0x429;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
    intel-ucode/06-9a-03) from revision 0x421 up to 0x429;
  - Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    intel-ucode/06-9a-04) from revision 0x421 up to 0x429;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x421
    up to 0x429;
  - Update of 06-9c-00/0x01 (JSL A0/A1) microcode from revision 0x24000023
    up to 0x24000024;
  - Update of 06-a5-02/0x20 (CML-H R1) microcode from revision 0xf0 up
    to 0xf4;
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode from revision 0xf0
    up to 0xf4;
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode from revision 0xf0
    up to 0xf4;
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xf0
    up to 0xf4;
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode from revision
    0xf0 up to 0xf4;
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x54 up
    to 0x57;
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-bf-02) from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-bf-02) from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x22 up to
    0x2c (old pf 0x3);
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
    from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
    intel-ucode/06-bf-05) from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
    intel-ucode/06-bf-05) from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
    from revision 0x22 up to 0x2c (old pf 0x3);
  - Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x22 up to
    0x2c (old pf 0x3).
libXpm 3.5.12-9.el8_6.0.ciqlts 2023-10-07
  • CVE-2022-46285
  • CVE-2022-44617
  • CVE-2022-4883
2023-01-16 :
- Fix CVE-2022-46285: infinite loop on unclosed comments (#2161800)
- Fix CVE-2022-44617: runaway loop with width of 0 (#2161808)

[Show All]
2023-01-16  :  
- Fix CVE-2022-46285: infinite loop on unclosed comments (#2161800)
- Fix CVE-2022-44617: runaway loop with width of 0 (#2161808)
- Fix CVE-2022-4883: compression depends on $PATH (#2160238)
sudo 1.8.29-8.el8.ciqlts.1 2023-01-28
  • CVE-2023-22809
2023-01-11 :
RHEL 8.7.0.Z ERRATUM
- CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user

[Show All]
2023-01-11  :  
RHEL 8.7.0.Z ERRATUM
- CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user
Resolves: rhbz#2161220
java-1.8.0-openjdk 1.8.0.402.b06-2.el8_6.ciqlts 2024-01-19 - 2024-01-19 :
- Set portablerelease/portableversion variables to match LTS
2024-01-17 :

[Show All]
2024-01-19  :  
- Set portablerelease/portableversion variables to match LTS
2024-01-17  :  
- Build for Rocky Linux 8 using our own portable
2024-01-11  :  
- Update to shenandoah-jdk8u402-b06 (GA)
- Sync the copy of the portable specfile with the latest update
- Drop local copy of JDK-8312489 which is now included upstream
- ** This tarball is embargoed until 2024-01-16 @ 1pm PT. **
- Resolves: RHEL-21477
- Resolves: RHEL-20975
2023-12-16  :  
- Restore %{epoch}:%{javaver} versioning to jre, java, jre-headless, java-headless, java-devel & java-sdk
- Resolves: RHEL-19636
2023-10-16  :  
- Revert jcmd move as jcmd will not operate without tools.jar
- Related: RHEL-13612
2023-10-16  :  
- Add a compatibility symlink from bin/jcmd to jre/bin/jcmd
- Related: RHEL-13612
2023-10-10  :  
- Update to shenandoah-jdk8u392-b08 (GA)
- Sync the copy of the portable specfile with the latest update
- Update generate_tarball.sh to be closer to upstream vanilla script inc. no more ECC removal
- Update bug URL for RHEL to point to the Red Hat customer portal
- Change top_level_dir_name to use the VCS tag, matching new upstream release style tarball
- Regenerate PR2462 patch following JDK-8315135
- Bump version of bundled libpng to 1.6.39
- Add backport of JDK-8312489 heading upstream for 8u402 (see OPENJDK-2095)
- Add missing JFR, alt-java, jre-* and java-* alternative ghosts
- Move jcmd to the headless package
- ** This tarball is embargoed until 2023-10-17 @ 1pm PT. **
- Resolves: RHEL-12309
- Resolves: RHEL-13600
- Resolves: RHEL-13628
- Resolves: RHEL-13635
- Resolves: RHEL-13641
- Resolves: RHEL-13612
- Resolves: RHEL-13621
2023-10-10  :  
- For non debug subpackages, ghosted all alternatives (rhbz1649776)
- For non system JDKs, if-outed versionless provides.
- Aligned versions to be %{epoch}:%{version}-%{release} instead of chaotic
- Related: RHEL-13641
2023-07-19  :  
- Bump release number so we are newer than 8.6
- Related: rhbz#2221106
2023-07-14  :  
- Update to shenandoah-jdk8u372-b05 (GA)
- Sync the copy of the portable specfile with the latest update
- Add note at top of spec file about rebuilding
- Use tapsets from the misc tarball
- Make sure root installation directory is created first
- Use in-place substitution for all but the first of the tapset changes
- The 'prelease' variable should refer to 'portablerelease', not 'rpmrelease'
- ** This tarball is embargoed until 2023-07-18 @ 1pm PT. **
- Resolves: rhbz#2221106
libksba 1.3.5-9.el8_6.0.ciqlts 2023-10-07
  • CVE-2022-47629
2023-01-25 :
- Fix for CVE-2022-47629 (#2161571)
rt-setup 2.1-4.el8_6.ciqlts.0.1 2023-02-16 - 2023-02-16 :
- Fix rt-setup post script on spec file rhbz#2168478
tar 1.30-9.el8_6.0.ciqlts 2023-10-11
  • CVE-2022-48303
2023-02-09 :
- Fix CVE-2022-48303
- Resolves: CVE-2022-48303
curl 7.61.1-30.el8_6.ciqlts.3 2023-11-15
  • CVE-2023-27536
  • CVE-2023-28321
  • CVE-2023-27535
  • CVE-2023-23916
  • CVE-2022-43552
2023-06-13 :
- fix GSS delegation too eager connection re-use (CVE-2023-27536)
- rebuild certs with 2048-bit RSA keys

[Show All]
2023-06-13  :  
- fix GSS delegation too eager connection re-use (CVE-2023-27536)
- rebuild certs with 2048-bit RSA keys
- fix host name wildcard checking (CVE-2023-28321)
2023-04-20  :  
- sftp: do not specify O_APPEND when not in append mode (#2187717)
2023-03-24  :  
- fix FTP too eager connection reuse (CVE-2023-27535)
2023-02-15  :  
- fix HTTP multi-header compression denial of service (CVE-2023-23916)
2023-02-07  :  
- h2: lower initial window size to 32 MiB (#2166254)
2022-12-21  :  
- smb/telnet: fix use-after-free when HTTP proxy denies tunnel (CVE-2022-43552)
python3 3.6.8-51.el8_6.ciqlts.2.rocky.0 2023-11-03
  • CVE-2023-40217
  • CVE-2023-24329
  • CVE-2022-45061
2023-10-23 :
- Add rocky to supported dists
2023-09-27 :

[Show All]
2023-10-23  :  
- Add rocky to supported dists
2023-09-27  :  
- Security fix for CVE-2023-40217
Resolves: RHEL-2933
2023-05-31  :  
- Security fix for CVE-2023-24329
Resolves: rhbz#2173917
2023-01-24  :  
- Properly strip the LTO bytecode from python.o
Resolves: rhbz#2137707
2022-12-21  :  
- Security fix for CVE-2022-45061
- Strip the LTO bytecode from python.o
Resolves: rhbz#2144072, rhbz#2137707
webkit2gtk3 2.36.7-1.el8_6.ciqlts.6 2023-12-18
  • CVE-2023-32435
  • CVE-2023-32439
  • CVE-2023-37450
  • CVE-2023-41993
  • CVE-2023-28204
  • CVE-2023-32373
  • CVE-2023-28205
  • CVE-2023-23529
  • CVE-2022-42856
2023-11-21 :
- Port patches for CVE-2023-32435 CVE-2023-32439 CVE-2023-37450 CVE-2023-41993
Resolves: #2218789 #2218799

[Show All]
2023-11-21  :  
- Port patches for CVE-2023-32435 CVE-2023-32439 CVE-2023-37450 CVE-2023-41993
  Resolves: #2218789 #2218799
2023-06-06  :  
- Port patches for CVE-2023-28204 CVE-2023-32373
  Resolves: #2209744 #2209727
2023-04-12  :  
- Add patch for CVE-2023-28205
  Resolves: #2185740
2023-02-15  :  
- Add patch for CVE-2023-23529
  Resolves: #2170007
2022-12-21  :  
- Add patch for CVE-2022-42856
  Resolves: #2153735
pesign 0.112-27.el8_6.ciqlts 2023-04-05
  • CVE-2022-3560
2023-04-05 :
- Adding local signing cert
2023-04-05 :

[Show All]
2023-04-05  :  
- Adding local signing cert
2023-04-05  :  
- fix pesign build issues
2023-01-18  :  
- Deprecate pesign-authorize and drop ACL
- Resolves: CVE-2022-3560
openssl 1.1.1k-9.el8_6.0.ciqlts 2023-10-07
  • CVE-2022-4304
  • CVE-2022-4450
  • CVE-2023-0215
  • CVE-2023-0286
2023-02-08 :
- Fixed Timing Oracle in RSA Decryption
Resolves: CVE-2022-4304

[Show All]
2023-02-08  :  
- Fixed Timing Oracle in RSA Decryption
  Resolves: CVE-2022-4304
- Fixed Double free after calling PEM_read_bio_ex
  Resolves: CVE-2022-4450
- Fixed Use-after-free following BIO_new_NDEF
  Resolves: CVE-2023-0215
- Fixed X.400 address type confusion in X.509 GeneralName
  Resolves: CVE-2023-0286
m17n-db 1.8.0-3.el8_6.ciqlts 2023-04-24 - 2018-02-19 :
- Add BuildRequires: gcc as per packaging guidelines
m17n-lib 1.8.0-2.el8_6.ciqlts 2023-04-24 - 2018-06-06 :
- Drop Anthy support in favor of libkkc
- Resolves: rh#1587975
emacs 26.1-7.el8_6.ciqlts.1 2023-04-24 - 2023-04-06 :
- Fix ob-latex.el command injection vulnerability (#2180585)
libwebp 1.0.0-8.el8_6.0.ciqlts.1 2023-10-07
  • CVE-2023-4863
2023-09-15 :
- Bump the release to fix upgrade path
2023-09-15 :

[Show All]
2023-09-15  :  
- Bump the release to fix upgrade path
2023-09-15  :  
- Added fix for mzbz#1819244
2023-09-15  :  
- Added fix for CVE-2023-4863
expat 2.2.5-11.el8_6.0.ciqlts 2023-10-07
  • CVE-2022-43680
2022-11-14 :
- CVE-2022-43680 expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
- Resolves: CVE-2022-43680
dbus 1.12.8-24.el8_6.0.ciqlts.1 2023-10-07
  • CVE-2023-34969
2023-06-19 :
- Fix CVE-2023-34969 (#2213399)
libxml2 2.9.7-16.el8_6.0.ciqlts.1 2023-10-07
  • CVE-2023-28484
  • CVE-2023-29469
2023-07-14 :
- Fix CVE-2023-28484 (#2186691)
- Fix CVE-2023-29469 (#2186691)
fribidi 1.0.4-9.el8_6.0.ciqlts 2023-10-07
  • CVE-2022-25308
  • CVE-2022-25309
  • CVE-2022-25310
2022-04-14 :
- Fix security issues CVE-2022-25308, CVE-2022-25309, CVE-2022-25310.
Resolves: rhbz#2050085, rhbz#2050068, rhbz#2050062

[Show All]
2022-04-14  :  
- Fix security issues CVE-2022-25308, CVE-2022-25309, CVE-2022-25310.
  Resolves: rhbz#2050085, rhbz#2050068, rhbz#2050062
- Drop --disable-docs from %configure. no such options available.
freetype 2.9.1-9.el8_6.0.ciqlts 2023-10-07 - 2022-05-27 :
- Guard face->size
- Resolves: #2079279
libtiff 4.0.9-29.el8_6.ciqlts 2023-11-15
  • CVE-2023-0800
  • CVE-2023-0801
  • CVE-2023-0802
  • CVE-2023-0803
  • CVE-2023-0804
  • CVE-2022-48281
  • CVE-2022-3627
  • CVE-2022-3970
2023-08-08 :
- Fix CVE-2023-0800 CVE-2023-0801 CVE-2023-0802 CVE-2023-0803 CVE-2023-0804
- Resolves: RHEL-5075 RHEL-5078 RHEL-5079 RHEL-5080 RHEL-5081

[Show All]
2023-08-08  :  
- Fix CVE-2023-0800 CVE-2023-0801 CVE-2023-0802 CVE-2023-0803 CVE-2023-0804
- Resolves: RHEL-5075 RHEL-5078 RHEL-5079 RHEL-5080 RHEL-5081
2023-05-16  :  
- Fix CVE-2022-48281
- Resolves: CVE-2022-48281
2023-01-16  :  
- Fix various CVEs
- Resolves: CVE-2022-3627 CVE-2022-3970
rsync 3.1.3-19.el8_6.ciqlts.1 2023-05-17 - 2022-11-02 :
- Resolves: #2139118 - rsync-daemon fail on 3.1.3
usbguard 1.0.0-13.el8_6.0.ciqlts 2023-10-07 - 2023-01-12 :
- Set OOMScoreAdjust to -1000 in service file
Resolves: rhbz#2159411

[Show All]
2023-01-12  :  
- Set OOMScoreAdjust to -1000 in service file
Resolves: rhbz#2159411
- Fix race condition in usbguard-daemon when forking
Resolves: rhbz#2159409
- Add missing files to documentation
Resolves: rhbz#2159412
- Disable logging to console, logging to syslog is still enabled
- Store permanent rules even if RuleFile is not set but RuleFolder is
- Neither RuleFolder nor RuleFile exists bugfix
Resolves: rhbz#2159413
- Remove build for i686 arch
Resolves: rhbz#2105091
xorg-x11-server-Xwayland 21.1.3-10.el8_6.ciqlts 2023-05-17
  • CVE-2023-0494
  • CVE-2022-46340
2023-02-07 :
- Fix CVE-2023-0494 (#2166972)
2022-12-19 :

[Show All]
2023-02-07  :  
- Fix CVE-2023-0494 (#2166972)
2022-12-19  :  
- Follow-up fix for CVE-2022-46340 (#2151777)
xorg-x11-server 1.20.11-15.el8_6.ciqlts 2023-05-17
  • CVE-2023-0494
  • CVE-2022-46340
2023-02-22 :
- Rebuild for the missing debuginfo
Related: rhbz#2169522

[Show All]
2023-02-22  :  
- Rebuild for the missing debuginfo
  Related: rhbz#2169522
2023-02-21  :  
- Fix xvfb-run script with --listen-tcp
  Resolves: rhbz#2169522
2023-02-03  :  
- Fix CVE-2023-0494 (#2166977)
2022-12-19  :  
- Follow-up fix for CVE-2022-46340 (#2151774)
gnutls 3.6.16-8.el8_6.ciqlts 2024-01-24 - 2023-12-06 :
- auth/rsa_psk: side-step potential side-channel (RHEL-16753)
2023-06-26 :

[Show All]
2023-12-06  :  
- auth/rsa_psk: side-step potential side-channel (RHEL-16753)
2023-06-26  :  
- Clear server's session ticket indication at rehandshake (#2089817)
2023-02-23  :  
- Fix x86_64 CPU feature detection when AVX is not available (#2131152)
- Fix timing side-channel in TLS RSA key exchange (#2162598)
bind 9.11.36-8.el8_6.0.ciqlts.2 2023-10-08
  • CVE-2023-3341
  • CVE-2023-2828
2023-09-19 :
- Prevent exahustion of memory from control channel (CVE-2023-3341)
2023-06-22 :

[Show All]
2023-09-19  :  
- Prevent exahustion of memory from control channel (CVE-2023-3341)
2023-06-22  :  
- Prevent the cache going over the configured limit (CVE-2023-2828)
scap-security-guide 0.1.66-2.el8_6.ciqlts.rocky.0.1 2023-06-05 - 2023-05-16 :
- Make Rocky Linux a derivative of RHEL
2023-02-13 :

[Show All]
2023-05-16  :  
- Make Rocky Linux a derivative of RHEL
2023-02-13  :  
- Unselect rule logind_session_timeout (RHBZ#2158404)
2023-02-06  :  
- Rebase to a new upstream release 0.1.66 (RHBZ#2158404)
- Update RHEL8 STIG profile to V1R9 (RHBZ#2152658)
- Fix levels of CIS rules (RHBZ#2162803)
- Remove unused RHEL8 STIG control file (RHBZ#2156192)
- Fix accounts_password_pam_unix_remember's check and remediations (RHBZ#2153547)
- Fix handling of space in sudo_require_reauthentication (RHBZ#2152208)
- Add rule for audit immutable login uids (RHBZ#2151553)
- Fix remediation of audit watch rules (RHBZ#2119356)
- Align file_permissions_sshd_private_key with DISA Benchmark (RHBZ#2115343)
- Fix applicability of kerberos rules (RHBZ#2099394)
- Add support rainer scripts in rsyslog rules (RHBZ#2072444)
2023-01-10  :  
- Update RHEL8 STIG profile to V1R8 (RHBZ#2148446)
- Add rule warning for sysctl IPv4 forwarding config (RHBZ#2118758)
- Fix remediation for firewalld_sshd_port_enabled (RHBZ#2116474)
- Fix compatibility with Ansible 2.14
bridge-utils 1.7.1-2.el8_6.ciqlts 2023-06-05 - 2021-03-15 :
- Use make macros
- https://fedoraproject.org/wiki/Changes/UseMakeBuildInstallMacro
strongswan 5.9.10-1.el8_6.ciqlts 2023-06-06
  • CVE-2023-26463
2023-03-02 :
- Update to 5.9.10
2023-02-28 :

[Show All]
2023-03-02  :  
- Update to 5.9.10
2023-02-28  :  
- Resolves: CVE-2023-26463 authorization bypass in TLS-based EAP methods
2023-01-16  :  
- Use configure paths in manual pages (#2106120)
2023-01-15  :  
- Update to 5.9.9 (#2157850)
c-ares 1.13.0-6.el8_6.0.ciqlts.2 2023-10-07
  • CVE-2023-32067
2023-05-31 :
- Resolves: rhbz#2209516 - CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service [rhel-8.8.0.z]
device-mapper-multipath 0.8.4-37.el8_6.0.ciqlts 2023-10-07 - 2023-02-03 :
- Fix bugzilla linked to the changes (was previously linked to
the wrong bug, 2162537)

[Show All]
2023-02-03  :  
- Fix bugzilla linked to the changes (was previously linked to
  the wrong bug, 2162537)
- Resolves: bz #2166468
2023-02-01  :  
- Add 0129-libmultipath-select-resize-action-even-if-reload-is-.patch
- Add 0130-libmultipath-cleanup-ACT_CREATE-code-in-select_actio.patch
- Add 0131-libmultipath-keep-renames-from-stopping-other-multip.patch
- Resolves: bz #2166468
2023-01-16  :  
- Add 0127-libmultipath-don-t-leak-memory-on-invalid-strings.patch
- Add 0128-libmutipath-validate-the-argument-count-of-config-st.patch
- Resolves: bz #2155560
gdisk 1.0.3-11.el8_6.ciqlts 2023-07-07 - 2022-03-15 :
- Fix double byteswap on big-endian systems also while reading partition names
resolves: #2065205
e2fsprogs 1.45.6-5.el8_6.0.ciqlts 2023-10-08 - 2022-05-11 :
- Update e2fsprogs with upstream fixes and improvements (#2083621)
- Fix out-of-bounds read/write via crafter filesystem (#2073548)
python-setuptools 39.2.0-7.el8_6.ciqlts 2023-07-07
  • CVE-2022-40897
2023-01-11 :
- Security fix for CVE-2022-40897
Resolves: rhbz#2158559
systemd 239-74.el8_6.0.ciqlts.3 2023-10-07 - 2023-08-08 :
- Remove support URL patch
2023-07-20 :

[Show All]
2023-08-08  :  
- Remove support URL patch
2023-07-20  :  
- login: add a missing error check for session_set_leader() (#2223602)
- logind: reset session leader if we know for a fact that it is gone (#2223602)
2023-05-18  :  
- pstore: fix crash and forward dummy arguments instead of NULL (#2190153)
- ci: workflow for gathering metadata for source-git automation (#2190153)
- ci: first part of the source-git automation - commit linter (#2190153)
2023-04-18  :  
- pager: set $LESSSECURE whenver we invoke a pager (#2175623)
- test-login: always test sd_pid_get_owner_uid(), modernize (#2175623)
- pager: make pager secure when under euid is changed or explicitly requested (#2175623)
- test: ignore ENOMEDIUM error from sd_pid_get_cgroup() (#2175623)
2023-03-14  :  
- journald-server: always create state file in signal handler (#2174645)
- journald-server: move relinquish code into function (#2174645)
- journald-server: always touch state file in signal handler (#2174645)
2023-02-27  :  
- journald: add API to move logging from /var to /run again (#1873540)
- journalctl: add new --relinquish and --smart-relinquish options (#1873540)
- units: automatically revert to /run logging on shutdown if necessary (#1873540)
- pstore: Tool to archive contents of pstore (#2158832)
- meson: drop redundant line (#2158832)
- pstore: drop unnecessary initializations (#2158832)
- pstopre: fix return value of list_files() (#2158832)
- pstore: remove temporary file on failure (#2158832)
- pstore: do not add FILE= journal entry if content_size == 0 (#2158832)
- pstore: run only when /sys/fs/pstore is not empty (#2158832)
- pstore: fix use after free (#2158832)
- pstore: refuse to run if arguments are specified (#2158832)
- pstore: allow specifying src and dst dirs are arguments (#2158832)
- pstore: rework memory handling for dmesg (#2158832)
- pstore: fixes for dmesg.txt reconstruction (#2158832)
- pstore: Don't start systemd-pstore.service in containers (#2158832)
- units: pull in systemd-pstore.service from sysinit.target (#2158832)
- units: drop dependency on systemd-remount-fs.service from systemd-pstore.service (#2158832)
- units: make sure systemd-pstore stops at shutdown (#2158832)
- pstore: Run after modules are loaded (#2158832)
- pstore: do not try to load all known pstore modules (#2158832)
- logind-session: make stopping of idle session visible to admins (#2156780)
- journald: Increase stdout buffer size sooner, when almost full (#2029426)
- journald: rework end of line marker handling to use a field table (#2029426)
- journald: use the fact that client_context_release() returns NULL (#2029426)
- journald: rework pid change handling (#2029426)
- test: Add a test case for #15654 (#2029426)
- test: Stricter test case for #15654 (Add more checks) (#2029426)
- man: document the new _LINE_BREAK= type (#2029426)
2023-02-17  :  
- test: import logind test from debian/ubuntu test suite (#1866955)
- test: introduce inst_recursive() helper function (#1866955)
- tests: verify that Lock D-Bus signal is sent when IdleAction=lock (#1866955)
- systemctl: simplify halt_main() (#2053273)
- systemctl: shutdown don't fallback on auth fail (#2053273)
- systemctl: reintroduce the original halt_main() (#2053273)
- systemctl: preserve old behavior unless requested (#2053273)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (#2170084)
- udev/net_id: introduce naming scheme for RHEL-8.8 (#2170499)
- pam: add a call to pam_namespace (#1861836)
2023-01-31  :  
- manager: limit access to private dbus socket (#2119405)
- journalctl: do not treat EINTR as an error when waiting for events (#2161683)
- core: bring manager_startup() and manager_reload() more inline (#2059633)
- pam: add a call to pam_namespace (#1861836)
- virt: Support detection for ARM64 Hyper-V guests (#2158307)
- virt: Fix the detection for Hyper-V VMs (#2158307)
- basic: add STRERROR() wrapper for strerror_r() (#2155520)
- coredump: put context array into a struct (#2155520)
- coredump: do not allow user to access coredumps with changed uid/gid/capabilities (#2155520)
2023-01-16  :  
- basic: recognize pdfs filesystem as a network filesystem (#2094661)
- core: move reset_arguments() to the end of main's finish (#2127131)
- manager: move inc. of n_reloading into a function (#2136869)
- core: Add new DBUS properties UnitsReloadStartTimestamp and UnitsLoadTimestampMontonic (#2136869)
- core: Indicate the time when the manager started loading units the last time (#2136869)
- core: do not touch /run/systemd/systemd-units-load from user session instances (#2136869)
- sysctl: downgrade message when we have no permission (#2158160)
- core: respect SELinuxContext= for socket creation (#2136738)
- manager: use target process context to set socket context (#2136738)
- virt: detect Amazon EC2 Nitro instance (#2117948)
- machine-id-setup: generate machine-id from DMI product ID on Amazon EC2 (#2117948)
- virt: use string table to detect VM or container (#2117948)
- fileio: introduce read_full_virtual_file() for reading virtual files in sysfs, procfs (#2117948)
- Use BIOS characteristics to distinguish EC2 bare-metal from VMs (#2117948)
- device: drop refuse_after (#2043524)
open-vm-tools 12.2.5-3.el8_6.ciqlts.1 2023-12-01
  • CVE-2023-34058
  • CVE-2023-34059
  • CVE-2023-20900
  • CVE-2023-20867
2023-11-16 :
- Add aarch64 to plus
2023-11-02 :

[Show All]
2023-11-16  :  
- Add aarch64 to plus
2023-11-02  :  
- ovt-Don-t-accept-tokens-with-unrelated-certs.patch [RHEL-14648]
- ovt-File-descriptor-vulnerability-in-the-open-vm-tools-v.patch [RHEL-14682]
- Resolves: RHEL-14648
  (CVE-2023-34058 open-vm-tools: SAML token signature bypass [rhel-8.9.0])
- Resolves: RHEL-14682
  (CVE-2023-34059 open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper [rhel-8.9.0])
2023-09-28  :  
- ovt-Provide-alternate-method-to-allow-expected-pre-froze.patch [RHEL-2447]
- Resolves: RHEL-2447
  ([RHEL8.9][ESXi]Latest version of open-vm-tools breaks VM backups)
2023-09-17  :  
- ovt-VGAuth-Allow-only-X509-certs-to-verify-the-SAML-toke.patch [bz#2236543]
- Resolves: bz#2236543
  (CVE-2023-20900 open-vm-tools: SAML token signature bypass [rhel-8])
2023-07-11  :  
- Rebase to open-vm-tools 12.2.5 [bz#2214861]
- Resolves: bz#2214861
  ([ESXi][RHEL8]open-vm-tools version 12.2.5 has been released - please rebase)
- Resolves: bz#2216415
  ([ESXi][RHEL8] URL in service unit files are started from http instead of https)
2023-06-28  :  
- ovt-Remove-some-dead-code.patch [bz#2215563]
- Resolves: bz#2215563
  ([CISA Major Incident] CVE-2023-20867 open-vm-tools: authentication bypass vulnerability in the vgauth module [rhel-8])
2023-05-03  :  
- Rebase to open-vm-tools 12.2.0 [bz#2177068]
- Resolves: bz#2177068
  ([ESXi][RHEL8]open-vm-tools version 12.2.0 has been released - please rebase)
libssh 0.9.6-10.el8_6.0.ciqlts 2023-10-08
  • CVE-2023-1667
  • CVE-2023-2283
2023-05-15 :
- Fix loglevel regression
- Related: rhbz#2189968, rhbz#2189741

[Show All]
2023-05-15  :  
- Fix loglevel regression
- Related: rhbz#2189968, rhbz#2189741
2023-05-03  :  
- Fix covscan issue found at gating
- Related: rhbz#2189968, rhbz#2189741
2023-05-02  :  
- Backport test fixing commits to make the build pass
- Relates: rhbz#2189968, rhbz#2189741
2023-04-25  :  
- Fix NULL dereference during rekeying with algorithm guessing 
  GHSL-2023-032 / CVE-2023-1667 
- Fix possible authentication bypass
  GHSL 2023-085 / CVE-2023-2283
- Resolves: rhbz#2189968, rhbz#2189741
2023-01-06  :  
- Enable client and server testing build time
- Fix failing rekey test on arch s390x
- Resolves: rhbz#2126342
container-selinux 2.205.0-2.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-03-21 :
- remove watch statements breaking the build on RHEL8.8
- Related: #2179466

[Show All]
2023-03-21  :  
- remove watch statements breaking the build on RHEL8.8
- Related: #2179466
2023-03-21  :  
- update to https://github.com/containers/container-selinux/releases/tag/v2.205.0
- remove user_namespace class, thanks to Lokesh Mandvekar
- Resolves: #2179466
2023-02-07  :  
- revert back to https://github.com/containers/container-selinux/releases/tag/v2.199.0
  (2.200.0 fails to build as it relies on the new selinux-policy which is not there yet)
- Related: #2123641
2023-02-07  :  
- update to https://github.com/containers/container-selinux/releases/tag/v2.200.0
- Related: #2123641
2023-01-30  :  
- update to https://github.com/containers/container-selinux/releases/tag/v2.199.0
- Related: #2123641
2023-01-06  :  
- update to https://github.com/containers/container-selinux/releases/tag/v2.198.0
- Related: #2123641
2023-01-05  :  
- update to https://github.com/containers/container-selinux/releases/tag/v2.197.0
- Related: #2123641
containernetworking-plugins 1.2.0-1.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-01-17 :
- update to https://github.com/containernetworking/plugins/releases/tag/v1.2.0
- Related: #2123641
cockpit-podman 63.1-1.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-02-28 :
- update to https://github.com/cockpit-project/cockpit-podman/releases/tag/63.1
- Related: #2123641

[Show All]
2023-02-28  :  
- update to https://github.com/cockpit-project/cockpit-podman/releases/tag/63.1
- Related: #2123641
2023-02-27  :  
- update to https://github.com/cockpit-project/cockpit-podman/releases/tag/63
- Related: #2123641
2023-02-08  :  
- update to https://github.com/cockpit-project/cockpit-podman/releases/tag/62
- Related: #2123641
2023-01-26  :  
- update to https://github.com/cockpit-project/cockpit-podman/releases/tag/61
- Related: #2123641
2023-01-13  :  
- update to https://github.com/cockpit-project/cockpit-podman/releases/tag/60
- Related: #2123641
2023-01-02  :  
- update to https://github.com/cockpit-project/cockpit-podman/releases/tag/59
- Related: #2123641
podman 4.4.1-14.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-06-15 :
- update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel
(https://github.com/containers/podman/commit/ff30585)

[Show All]
2023-06-15  :  
- update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel
  (https://github.com/containers/podman/commit/ff30585)
- Resolves: #2213843
2023-06-06  :  
- update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel
  (https://github.com/containers/podman/commit/bcea446)
- Resolves: #2210111
2023-04-26  :  
- update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel
  (https://github.com/containers/podman/commit/aa5db47)
- Resolves: #2189593
2023-04-14  :  
- update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel
  (https://github.com/containers/podman/commit/fd0ea3b)
- Resolves: #2176833
2023-04-03  :  
- update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel
  (https://github.com/containers/podman/commit/05037d3)
- Resolves: #2183601
2023-03-30  :  
- update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel
  (https://github.com/containers/podman/commit/67f7e1e)
- Resolves: #2182491
2023-03-21  :  
- update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel
  (https://github.com/containers/podman/commit/bf400bd)
- Resolves: #2180125
2023-02-22  :  
- use ldd directly to check for static link - avoid broken file utility
- Related: #2123641
2023-02-22  :  
- see the output of 'file catatonit' in the log to figure out why it is not
  statically linked
- Related: #2123641
2023-02-21  :  
- update to the latest content of https://github.com/containers/podman/tree/v4.4.1-rhel
  (https://github.com/containers/podman/commit/e1703bb)
- Related: #2123641
netavark 1.5.1-2.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-06-07 :
- update to 1.5.1 bugfix release
- Resolves: #2211989

[Show All]
2023-06-07  :  
- update to 1.5.1 bugfix release
- Resolves: #2211989
2023-04-20  :  
- fix --dns-add command is not functioning
- Resolves: #2182897
2023-02-03  :  
- exclude i686
- Related: #2123641
2023-02-03  :  
- update build parameters
- Related: #2123641
2023-02-03  :  
- always stay offline during build
- Related: #2123641
2023-02-03  :  
- update to https://github.com/containers/netavark/releases/tag/v1.5.0
- Related: #2123641
buildah 1.29.1-2.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-04-03 :
- update to the latest content of https://github.com/containers/buildah/tree/release-1.29
(https://github.com/containers/buildah/commit/f07d2c9)

[Show All]
2023-04-03  :  
- update to the latest content of https://github.com/containers/buildah/tree/release-1.29
  (https://github.com/containers/buildah/commit/f07d2c9)
- Resolves: #2166195
2023-02-16  :  
- update to the latest content of https://github.com/containers/buildah/tree/release-1.29
  (https://github.com/containers/buildah/commit/7fa17a8)
- Related: #2123641
2023-02-10  :  
- update to the latest content of https://github.com/containers/buildah/tree/release-1.29
  (https://github.com/containers/buildah/commit/c822cc6)
- Related: #2123641
2023-01-31  :  
- update to the latest content of https://github.com/containers/buildah/tree/release-1.29
  (https://github.com/containers/buildah/commit/94b723c)
- Related: #2123641
2023-01-30  :  
- update to the latest content of https://github.com/containers/buildah/tree/release-1.29.0
  (https://github.com/containers/buildah/commit/)
- Related: #2123641
2023-01-27  :  
- update to the latest content of https://github.com/containers/buildah/tree/release-1.29.0
  (https://github.com/containers/buildah/commit/94b723c)
- Related: #2123641
2023-01-25  :  
- update to the latest content of https://github.com/containers/buildah/tree/main
  (https://github.com/containers/buildah/commit/078a7ff)
- Related: #2123641
2023-01-24  :  
- update to the latest content of https://github.com/containers/buildah/tree/main
  (https://github.com/containers/buildah/commit/4b72f05)
- Related: #2123641
2023-01-18  :  
- update to the latest content of https://github.com/containers/buildah/tree/main
  (https://github.com/containers/buildah/commit/c541c35)
- Related: #2123641
2023-01-17  :  
- update to the latest content of https://github.com/containers/buildah/tree/main
  (https://github.com/containers/buildah/commit/39dfa73)
- Related: #2123641
crun 1.8.4-2.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-04-17 :
- Apply additional criu fix
- Resolves: #2184221

[Show All]
2023-04-17  :  
- Apply additional criu fix
- Resolves: #2184221
2023-04-14  :  
- update to https://github.com/containers/crun/releases/tag/1.8.4
- Resolves: #2184221
2023-04-04  :  
- fix could not find symbol criu_set_lsm_mount_context in libcriu.so
- Resolves: #2184221
2023-03-20  :  
- add BR: criu-devel
- Resolves: #2179195
2023-02-28  :  
- update to https://github.com/containers/crun/releases/tag/1.8.1
- Related: #2123641
2023-02-02  :  
- update to https://github.com/containers/crun/releases/tag/1.8
- Related: #2123641
2023-01-05  :  
- require libgcrypt-devel and add criu weak dep
- Resolves: #2158084
conmon 2.1.6-1.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-02-07 :
- update to https://github.com/containers/conmon/releases/tag/v2.1.6
- Related: #2123641
toolbox 0.0.99.3-7.module+el8.6.0+1546+268a7833 2023-08-03
  • CVE-2022-41717
2023-02-06 :
- Rebuild for CVE-2022-41717
Resolves: #2163743

[Show All]
2023-02-06  :  
- Rebuild for CVE-2022-41717
Resolves: #2163743
2023-01-30  :  
- Support RHEL 9 Toolbx containers
Resolves: #2163759
aardvark-dns 1.5.0-2.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-02-03 :
- always stay offline during build
- Related: #2123641

[Show All]
2023-02-03  :  
- always stay offline during build
- Related: #2123641
2023-02-03  :  
- update to https://github.com/containers/aardvark-dns/releases/tag/v1.5.0
- Related: #2123641
oci-seccomp-bpf-hook 1.2.8-1.module+el8.6.0+1546+268a7833 2023-08-03 - 2022-10-18 :
- update to https://github.com/containers/oci-seccomp-bpf-hook/releases/tag/v1.2.8
- Related: #2123641
python-podman 4.4.1-1.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-02-27 :
- update to https://github.com/containers/podman-py/releases/tag/v4.4.1
- Related: #2123641

[Show All]
2023-02-27  :  
- update to https://github.com/containers/podman-py/releases/tag/v4.4.1
- Related: #2123641
2023-02-15  :  
- update to python-podman-4.4.0
- Related: #2123641
slirp4netns 1.2.0-2.module+el8.6.0+1546+268a7833 2023-08-03 - 2022-05-11 :
- BuildRequires: /usr/bin/go-md2man
- Related: #2061390
fuse-overlayfs 1.11-1.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-04-11 :
- update to https://github.com/containers/fuse-overlayfs/releases/tag/v1.11
- Resolves: #2185132
containers-common 1-64.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-04-05 :
- be sure SYS_CHROOT is in containers.conf + update vendored components
- Resolves: #2183667

[Show All]
2023-04-05  :  
- be sure SYS_CHROOT is in containers.conf + update vendored components
- Resolves: #2183667
2023-03-21  :  
- update vendored components and configuration files
- Resolves: #2180125
2023-02-22  :  
- improve shortnames generation
- Related: #2123641
2023-02-17  :  
- update vendored components and configuration files
- Related: #2123641
2023-01-31  :  
- add missing systemd directories
- Related: #2123641
2023-01-27  :  
- always define default_capablities in RHEL8
- Related: #2123641
2023-01-27  :  
- update vendored components and configuration files
- Related: #2123641
2023-01-25  :  
- fix vendoring script
- Related: #2123641
2023-01-25  :  
- update vendored components and configuration files
- Related: #2123641
2023-01-24  :  
- update vendored components and configuration files
- Related: #2123641
skopeo 1.11.2-0.2.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-02-22 :
- fix build
- Related: #2123641

[Show All]
2023-02-22  :  
- fix build
- Related: #2123641
2023-02-21  :  
- update to the latest content of https://github.com/containers/skopeo/tree/release-1.11
  (https://github.com/containers/skopeo/commit/3f98753)
- Related: #2123641
2023-02-17  :  
- update to https://github.com/containers/skopeo/releases/tag/v1.11.1
- Related: #2123641
2023-01-27  :  
- update to https://github.com/containers/skopeo/releases/tag/v1.11.0
  (https://github.com/containers/skopeo/commit/968670116c56023d37e9e98b48346478599c6801)
- Related: #2123641
2023-01-24  :  
- update to the latest content of https://github.com/containers/skopeo/tree/main
  (https://github.com/containers/skopeo/commit/fe15a36)
- Related: #2123641
2023-01-17  :  
- update to the latest content of https://github.com/containers/skopeo/tree/main
  (https://github.com/containers/skopeo/commit/8e09e64)
- Related: #2123641
2023-01-13  :  
- update to the latest content of https://github.com/containers/skopeo/tree/main
  (https://github.com/containers/skopeo/commit/2817510)
- Related: #2123641
udica 0.2.6-20.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-01-12 :
- bump release to preserve update path
- Related: #2139052
runc 1.1.8-0.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-07-21 :
- Rebasing to 1.1.8 , with CPU affinity patch to try and solve realtime kernel issue
criu 3.15-4.module+el8.6.0+1546+268a7833 2023-08-03 - 2023-06-09 :
- added patch to support CRIU on Sapphire Rapids
- Resolves: #2203296
libslirp 4.4.0-1.module+el8.6.0+1546+268a7833 2023-08-03
  • CVE-2021-3592
  • CVE-2021-3593
  • CVE-2021-3594
  • CVE-2021-3595
2021-06-28 :
- Fix CVE-2021-3592 CVE-2021-3593 CVE-2021-3594 CVE-2021-3595 out-of-bounds access
- Related: #1934415
mod_auth_openidc 2.4.9.4-1.module+el8.6.0+1548+0fd6d7b9 2023-08-03 - 2022-04-08 :
- Resolves: rhbz#2025368 - Rebase to new version
cjose 0.6.1-3.module+el8.6.0+1548+0fd6d7b9 2023-08-03 - 2023-07-19 :
- cjose: AES GCM decryption uses the Tag length from the actual Authentication
Tag provided in the JWE [rhel-8.8.0.z]

[Show All]
2023-07-19  :  
- cjose: AES GCM decryption uses the Tag length from the actual Authentication
  Tag provided in the JWE [rhel-8.8.0.z]
  Resolves: rhbz#2223491
openssh 8.0p1-19.el8_6.ciqlts 2023-08-15
  • CVE-2023-38408
2023-07-20 :
- rebuilt
2023-07-20 :

[Show All]
2023-07-20  :  
- rebuilt
2023-07-20  :  
- Avoid remote code execution in ssh-agent PKCS#11 support
  Resolves: CVE-2023-38408
2022-12-20  :  
- Fix parsing of IPv6 IPs in sftp client (#2151334)
- Avoid ssh banner one-byte overflow (#2138344)
- Avoid crash of sshd when Include folder does not exist (#2133087)
cups 2.2.6-51.el8_6.0.ciqlts 2023-10-07 - 2022-12-14 :
- 2130391 - Kerberized IPP Printing Fails
libcap 2.48-5.el8_6.0.ciqlts 2023-10-07
  • CVE-2023-2603
  • CVE-2023-2602
2023-06-26 :
- Fix integer overflow in _libcap_strdup() (CVE-2023-2603)
Resolves: rhbz#2210636

[Show All]
2023-06-26  :  
- Fix integer overflow in _libcap_strdup() (CVE-2023-2603)
  Resolves: rhbz#2210636
- Correctly check pthread_create() return value to avoid memory leak (CVE-2023-2602)
  Resolves: rhbz#2222197
sqlite 3.26.0-19.el8_6.ciqlts 2024-01-19
  • CVE-2023-7104
  • CVE-2022-24736
2024-01-03 :
- Fixed CVE-2023-7104
2023-04-14 :

[Show All]
2024-01-03  :  
- Fixed CVE-2023-7104
2023-04-14  :  
- Fixed CVE-2022-24736
flac 1.3.2-9.el8_6.0.ciqlts.1 2023-10-07
  • CVE-2020-22219
2023-08-31 :
- don't free memory that is still used after realloc() error (CVE-2020-22219)
mod_md 2.0.8-8.module+el8.6.0+1721+718a1d2c 2023-09-12 - 2020-05-28 :
- Resolves: #1832844 - mod_md does not work with ACME server that does not
provide keyChange or revokeCert resources
mod_http2 1.15.7-8.module+el8.6.0+1721+718a1d2c.3 2023-09-12
  • CVE-2023-25690
2023-03-18 :
- Resolves: #2177748 - CVE-2023-25690 httpd:2.4/httpd: HTTP request splitting
with mod_rewrite and mod_proxy
httpd 2.4.37-56.module+el8.6.0+1721+718a1d2c.6 2023-09-12
  • CVE-2023-25690
  • CVE-2023-25690
  • CVE-2006-20001
  • CVE-2022-37436
  • CVE-2022-36760
2023-04-27 :
- Resolves: #2190133 - mod_rewrite regression with CVE-2023-25690
2023-03-18 :

[Show All]
2023-04-27  :  
- Resolves: #2190133 - mod_rewrite regression with CVE-2023-25690
2023-03-18  :  
- Resolves: #2177748 - CVE-2023-25690 httpd:2.4/httpd: HTTP request splitting
  with mod_rewrite and mod_proxy
2023-01-31  :  
- Resolves: #2162499 - CVE-2006-20001 httpd: mod_dav: out-of-bounds read/write
  of zero byte
- Resolves: #2162485 - CVE-2022-37436 httpd: mod_proxy: HTTP response splitting
- Resolves: #2162509 - CVE-2022-36760 httpd: mod_proxy_ajp: Possible request
  smuggling
2023-01-26  :  
- Resolves: #2155961 - prevent sscg creating /dhparams.pem
glibc 2.28-225.el8_6.ciqlts.6 2023-10-19
  • CVE-2023-4911
  • CVE-2023-4806
  • CVE-2023-4527
2023-09-20 :
- CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation (RHEL-3035)
2023-09-19 :

[Show All]
2023-09-20  :  
- CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation (RHEL-3035)
2023-09-19  :  
- Revert: Always call destructors in reverse constructor order (#2237433)
2023-09-18  :  
- CVE-2023-4806: potential use-after-free in getaddrinfo (RHEL-2422)
2023-09-15  :  
- CVE-2023-4813: potential use-after-free in gaih_inet (RHEL-2434)
2023-09-15  :  
- CVE-2023-4527: Stack read overflow in getaddrinfo in no-aaaa mode (#2234713)
2023-09-12  :  
- Always call destructors in reverse constructor order (#2237433)
2023-01-20  :  
- Enforce a specififc internal ordering for tunables (#2154914)
openscap 1.3.7-1.el8_6.0.ciqlts.rocky.1.0 2023-10-07 - 2023-05-16 :
- Add Rocky to openscap
2023-01-27 :

[Show All]
2023-05-16  :  
- Add Rocky to openscap
2023-01-27  :  
- Upgrade to the latest upstream release (rhbz#2159290)
- Fix error when processing OVAL filters (rhbz#2126882)
- Don't emit xmlfilecontent items if XPath doesn't match (rhbz#2139060)
libvpx 1.7.0-10.el8_6.0.ciqlts 2023-10-11
  • CVE-2023-5217
  • CVE-2023-44488
2023-10-05 :
- Add patch for CVE-2023-5217
- Resolves: RHEL-10610

[Show All]
2023-10-05  :  
- Add patch for CVE-2023-5217
- Resolves: RHEL-10610
2023-10-03  :  
- Add patch for CVE-2023-44488
- Resolves: RHEL-11613
sscg 3.0.0-7.el8_6.0.ciqlts 2023-10-11 - 2022-12-08 :
- Correctly apply the patch for default dhparams
- Resolves: rhbz#2143206
texlive 20180414-29.el8_6.0.ciqlts 2023-10-08
  • CVE-2023-32700
2023-05-25 :
- Resolves: #2209870, CVE-2023-32700
nghttp2 1.33.0-5.el8_6.ciqlts 2023-10-17
  • CVE-2023-44487
2023-10-13 :
- fix HTTP/2 Rapid Reset (CVE-2023-44487)
grafana 7.5.15-5.el8_6.ciqlts 2023-10-19
  • CVE-2023-39325
  • CVE-2023-44487
2023-10-17 :
- resolve RHEL-13284
- resolve CVE-2023-39325 CVE-2023-44487 rapid stream resets can cause excessive work

[Show All]
2023-10-17  :  
- resolve RHEL-13284
- resolve CVE-2023-39325 CVE-2023-44487 rapid stream resets can cause excessive work
- testing is turned off due to test failures caused by testing date mismatch
nodejs-nodemon 2.0.20-3.module+el8.6.0+1993+e6768fd0 2023-10-21
  • CVE-2021-35065
2023-03-06 :
- Backport fix for CVE-2021-35065
Resolves: CVE-2021-35065
nodejs 14.21.3-1.module+el8.6.0+1993+e6768fd0 2023-10-21
  • CVE-2022-25881
  • CVE-2023-23918
  • CVE-2023-23920
  • CVE-2022-38900
  • CVE-2022-4904
2023-03-06 :
- Rebase to 14.21.3
Resolves: rhbz#2153712

[Show All]
2023-03-06  :  
- Rebase to 14.21.3
  Resolves: rhbz#2153712
  Resolves: CVE-2022-25881 CVE-2023-23918 CVE-2023-23920 CVE-2022-38900
  Resolves: CVE-2022-4904
nodejs-packaging 23-3.module+el8.6.0+1993+e6768fd0 2023-10-21 - 2020-05-06 :
- Updated
- Removed pathfix.py
varnish-modules 0.15.0-6.module+el8.6.0+2037+55f4982e 2023-10-27 - 2021-07-26 :
- Related: #1982862 - rebuild for new varnish version
varnish 6.0.8-3.module+el8.6.0+2037+55f4982e.1 2023-10-27
  • CVE-2023-44487
2023-10-18 :
- Add parameters h2_rst_allowance and h2_rst_allowance_period to mitigate CVE-2023-44487
- Resolves: RHEL-12812
python39 3.9.16-1.module+el8.6.0+2074+35788527.2 2023-11-07
  • CVE-2023-40217
  • CVE-2023-24329
2023-09-20 :
- Security fix for CVE-2023-40217
Resolves: RHEL-3237

[Show All]
2023-09-20  :  
- Security fix for CVE-2023-40217
Resolves: RHEL-3237
2023-05-29  :  
- Security fix for CVE-2023-24329
Resolves: rhbz#2173917
scipy 1.5.4-3.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-18 :
- Specify LDFLAGS explicitly
- Force preprocessing of Fortran sources to make annobin record proper flags

[Show All]
2021-01-18  :  
- Specify LDFLAGS explicitly
- Force preprocessing of Fortran sources to make annobin record proper flags
- Resolves: rhbz#1778983 rhbz#1877430
numpy 1.19.4-3.module+el8.6.0+2074+35788527 2023-11-07 - 2021-08-05 :
- Adjusted the postun scriptlets to enable upgrading to RHEL 9
- Resolves: rhbz#1933055
python-lxml 4.6.5-1.module+el8.6.0+2074+35788527 2023-11-07
  • CVE-2021-43818
2022-01-06 :
- Update to 4.6.5
- Security fix for CVE-2021-43818

[Show All]
2022-01-06  :  
- Update to 4.6.5
- Security fix for CVE-2021-43818
Resolves: rhbz#2032569
mod_wsgi 4.7.1-5.module+el8.6.0+2074+35788527 2023-11-07 - 2022-09-08 :
- Core dumped upon file upload >= 1GB
Resolves: rhbz#2125172
python3x-setuptools 50.3.2-4.module+el8.6.0+2074+35788527 2023-11-07 - 2021-08-05 :
- Adjusted the postun scriptlets to enable upgrading to RHEL 9
- Resolves: rhbz#1933055
python-psycopg2 2.8.6-2.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-15 :
- Convert from Fedora to the python39 module in RHEL8
- Resolves: rhbz#1877430
python-cffi 1.14.3-2.module+el8.6.0+2074+35788527 2023-11-07 - 2021-05-31 :
- Replace 'python_sitesearch' with 'python2_sitesearch'
python-requests 2.25.0-2.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-18 :
- Convert from Fedora to the python39 module in RHEL8
- Resolves: rhbz#1877430
python-wheel 0.35.1-4.module+el8.6.0+2074+35788527 2023-11-07 - 2021-08-05 :
- Adjusted the postun scriptlets to enable upgrading to RHEL 9
- Resolves: rhbz#1933055
python-pysocks 1.7.1-4.module+el8.6.0+2074+35788527 2023-11-07 - 2019-12-13 :
- Exclude unsupported i686 arch
python-urllib3 1.25.10-4.module+el8.6.0+2074+35788527 2023-11-07
  • CVE-2021-33503
2021-06-29 :
- Fix for CVE-2021-33503 Catastrophic backtracking in URL authority parser
Resolves: rhbz#1968074
python3x-pip 20.2.4-7.module+el8.6.0+2074+35788527 2023-11-07 - 2021-10-14 :
- Remove bundled windows executables
- Resolves: rhbz#2006790
python3x-six 1.15.0-3.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-12 :
- Convert from Fedora to the python39 module in RHEL8
- Resolves: rhbz#1877430
python-toml 0.10.1-5.module+el8.6.0+2074+35788527 2023-11-07 - 2020-12-01 :
- Convert spec for python39 module in RHEL8
- Revert usage of pyproject-rpm-macros

[Show All]
2020-12-01  :  
- Convert spec for python39 module in RHEL8
- Revert usage of pyproject-rpm-macros
- Resolves: rhbz#1877430
python-ply 3.11-10.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-05 :
- Extract and ship license file (#1912893)
- Resolves: rhbz#1877430
PyYAML 5.4.1-1.module+el8.6.0+2074+35788527 2023-11-07
  • CVE-2020-14343
2021-03-23 :
- Rebase to version 5.4.1 to fix CVE-2020-14343
- Resolves: rhbz#1860466
python-psutil 5.8.0-4.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-15 :
- Convert from Fedora to the python39 module in RHEL8
- Resolves: rhbz#1877430
python-chardet 3.0.4-19.module+el8.6.0+2074+35788527 2023-11-07 - 2019-12-13 :
- Exclude unsupported i686 arch
python-idna 2.10-3.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-13 :
- Convert from Fedora to the python39 module in RHEL8
- Resolves: rhbz#1877430
python-cryptography 3.3.1-2.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-18 :
- Convert from Fedora to the python39 module in RHEL8
- Resolves: rhbz#1877430
python-PyMySQL 0.10.1-2.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-18 :
- Convert from Fedora to the python39 module in RHEL8
- Resolves: rhbz#1877430
python-pycparser 2.20-3.module+el8.6.0+2074+35788527 2023-11-07 - 2021-01-18 :
- Convert from Fedora to the python39 module in RHEL8
- Resolves: rhbz#1877430
libtasn1 4.13-4.el8_6.ciqlts 2023-11-10 - 2022-11-30 :
- Resolves: rhbz#2140600
git 2.39.3-1.el8_6.ciqlts 2023-11-13 - 2023-04-27 :
- Update to 2.39.3
- Resolves: #2188364, #2188373, #2190157, #2190158

[Show All]
2023-04-27  :  
- Update to 2.39.3
- Resolves: #2188364, #2188373, #2190157, #2190158
2023-01-19  :  
- Update to 2.39.1
- Resolves: rhbz#2162064
2022-12-19  :  
- Update to 2.39.0
- Resolves: rhbz#2139378
xmlrpc-c 1.51.0-8.el8_6.ciqlts 2023-11-13 - 2022-04-14 :
- Address some Coverity issues in the patch set
yajl 2.1.0-11.el8_6.ciqlts 2023-11-13
  • CVE-2022-24795
2022-04-27 :
- fix CVE-2022-24795
- Related: #2061390
subscription-manager 1.28.36-3.el8_6.ciqlts.rocky.0.1 2023-11-13 - 2023-08-22 :
- Remove Red Hat specific references and certificates
2023-08-08 :

[Show All]
2023-08-22  :  
- Remove Red Hat specific references and certificates
2023-08-08  :  
- 2225442: Fix D-Bus policy (jhnidek@redhat.com)
2023-02-22  :  
- Translated using Weblate (French) (ljanda@redhat.com)
- Translated using Weblate (French) (suanand@redhat.com)
- Translated using Weblate (Korean) (jsefler@redhat.com)
- 2168576: cockpit: insights: fix spawn_error_to_string in more cases
  (ptoscano@redhat.com)
- cockpit: Fix the issue, when it is not possible to install insights-client
  (jhnidek@redhat.com)
- ENT-5542: Build package using GitHub Actions (mhorky@redhat.com)
- 2166317: gui: do not use an empty environment string (ptoscano@redhat.com)
- Test libdnf plugin using GitHub Actions (mhorky@redhat.com)
- libdnf: fix return value of findProductId() (ptoscano@redhat.com)
- 1938878: Fix issues discovered by static code analyzers (#2644)
  (jhnidek@redhat.com)
- ENT-5541: Publish PR coverage (mhorky@redhat.com)
- 2166623: gui: use UnknownContentException instead of NetworkException
  (ptoscano@redhat.com)
- ENT-3759: Test on GitHub Actions (mhorky@redhat.com)
- Alter import of rhsm.config functions (mhorky@redhat.com)
- ENT-5536: Fix FileMonitor tests (mhorky@redhat.com)
- tests: drop test_po_files.py (ptoscano@redhat.com)
- Ensure tests don't fail when run under root (mhorky@redhat.com)
- build: pin pytest to < 7 (ptoscano@redhat.com)
- rhsm: drop custom which() implementation (ptoscano@redhat.com)
- facts: switch to shutil.which() (ptoscano@redhat.com)
- Fix tests for Python 3.6 runner (mhorky@redhat.com)
- Stop calling pytest with --failed-first (mhorky@redhat.com)
- Handle tests in containers better (mhorky@redhat.com)
2023-01-20  :  
- Translated using Weblate (Spanish) (ptoscano@redhat.com)
- Translated using Weblate (Georgian) (temuri.doghonadze@gmail.com)
- Translated using Weblate (Chinese (Simplified) (zh_CN)) (ljanda@redhat.com)
- Translated using Weblate (Korean) (simmon@nplob.com)
- Update translation files (noreply@weblate.org)
- Translated using Weblate (German) (atalanttore@googlemail.com)
- New extraction for translatable strings (ptoscano@redhat.com)
- Base DBusServerStubProvider on SubManFixture (mhorky@redhat.com)
- Mark D-Bus tests (mhorky@redhat.com)
- Remove unused classes of DBus tests (mhorky@redhat.com)
- ENT-5533: Update D-Bus tests of Unregister (mhorky@redhat.com)
- ENT-5350: Implement "force" register option in rhsm dbus python bindings
  (mhorky@redhat.com)
- ENT-5533: Fix failures of D-Bus' Register tests (mhorky@redhat.com)
- ENT-5533: Update D-Bus tests of Register (mhorky@redhat.com)
- ENT-5533: Update D-Bus tests of Products (mhorky@redhat.com)
- ENT-5533: Update D-Bus tests of AllFacts (mhorky@redhat.com)
- ENT-5533: Update D-Bus tests of Entitlement (mhorky@redhat.com)
- Fix typo in method name of EntitlementService (mhorky@redhat.com)
- ENT-5533: Update D-Bus tests of Consumer (mhorky@redhat.com)
- ENT-5533: Update D-Bus tests of Attach (mhorky@redhat.com)
- ENT-5533: Update D-Bus tests of Config (mhorky@redhat.com)
- Skip AsyncPool tests (mhorky@redhat.com)
- Catch generic OSError during BaseRestLib._request() (ptoscano@redhat.com)
- Catch also CertificateLoadingError for identity cert loading
  (ptoscano@redhat.com)
- Fix formatting of proxy errors w/o errno (ptoscano@redhat.com)
- Improve formatting of CertificateLoadingError (ptoscano@redhat.com)
- Raise a new CertificateLoadingError on X.509 loading failures
  (ptoscano@redhat.com)
- Improve formatting of UnknownContentException (ptoscano@redhat.com)
- connection: improve the internal UnknownContentException
  (ptoscano@redhat.com)
- utils: add terminal_printable_content (ptoscano@redhat.com)
- connection: rename NetworkException to UnknownContentException
  (ptoscano@redhat.com)
- Improve formatting of ProxyException (ptoscano@redhat.com)
- connection: improve the internal ProxyException (ptoscano@redhat.com)
- Improve formatting of socket.gaierror (ptoscano@redhat.com)
- Improve formatting of ConnectionError (ptoscano@redhat.com)
- Improve formatting of BadCertificateException (ptoscano@redhat.com)
- connection: extend BadCertificateException w/ SSL exception
  (ptoscano@redhat.com)
- connection: drop dead code (ptoscano@redhat.com)
- ENT-4286: Additional fix for exception handling (jajerome@redhat.com)
- ENT-4286: Simplify exception reporting with system_exit()
  (jajerome@redhat.com)
- Cloud-what: Make saving token file more robust (jhnidek@redhat.com)
- Remove deprecated function call (mhorky@redhat.com)
-  Fix failures of D-Bus' Register tests (mhorky@redhat.com)
- Show locals in pytest output (mhorky@redhat.com)
dovecot 2.3.16-3.el8_6.ciqlts 2023-11-13 - 2022-07-19 :
- fix possible privilege escalation when similar master and non-master passdbs are used (#2106231)
gstreamer1-plugins-good 1.16.1-3.el8_6.ciqlts 2023-11-14
  • CVE-2021-3497
2022-07-14 :
- Add patches for matroskademux. CVE-2021-3497
- Resolves: rhbz#1948942
dnsmasq 2.79-26.el8_6.ciqlts 2023-11-14
  • CVE-2022-0934
2023-02-15 :
- Avoid DHCPv6 relayed replies with Client Link-Layer Address (#2169355)
2023-01-26 :

[Show All]
2023-02-15  :  
- Avoid DHCPv6 relayed replies with Client Link-Layer Address (#2169355)
2023-01-26  :  
- Use upstream change for CVE-2022-0934 (#2164859)
libreswan 4.9-3.el8_6.ciqlts 2023-11-14
  • CVE-2023-30570
  • CVE-2023-23009
2023-05-05 :
- Fix CVE-2023-30570: Malicious IKEv1 Aggressive Mode packets can crash
libreswan

[Show All]
2023-05-05  :  
- Fix CVE-2023-30570: Malicious IKEv1 Aggressive Mode packets can crash
  libreswan
- Resolves: rhbz#2187179
2023-04-25  :  
- Update libreswan-4.9-2176248-authby-rsasig.patch
2023-04-14  :  
- Resolves: rhbz#2187647 authby=rsasig fails in FIPS policy
2023-04-04  :  
- Fix CVE-2023-23009: remote DoS via crafted TS payload with an
  incorrect selector length (rhbz#2186127)
2023-01-09  :  
- Resolves: rhbz#2128672 Rebase libreswan to 4.9
- Remove libreswan-4.4-ikev1-disable-diagnostics.patch no longer necessary
qt5 5.15.3-1.el8_6.ciqlts 2023-11-14 - 2022-03-24 :
- 5.15.3
Resolves: bz#2061377
flatpak-builder 1.0.14-2.el8_6.ciqlts 2023-11-14
  • CVE-2022-21682
2022-04-01 :
- Fix CVE-2022-21682 (#2042007)
grafana-pcp 3.2.0-3.el8_6.ciqlts 2023-11-14
  • CVE-2022-27664
2022-11-01 :
- resolve CVE-2022-27664 grafana-pcp: golang: net/http: handle server errors after sending GOAWAY
unbound 1.16.2-5.el8_6.ciqlts 2023-11-15 - 2022-10-15 :
- Stop creating wrong devel manual pages (#2135322)
iperf3 3.5-7.el8_6.ciqlts 2023-11-15 - 2023-07-26 :
- Resolves: #2224443 - memory allocation hazard and crash
openjpeg2 2.4.0-5.el8_6.ciqlts 2023-11-15
  • CVE-2022-1122
2022-06-15 :
- Fix CVE-2022-1122
protobuf 3.5.0-15.el8_6.ciqlts 2023-11-15
  • CVE-2021-22570
2022-03-21 :
- Applied patch for for CVE-2021-22570 (#2050494)
wavpack 5.1.0-16.el8_6.ciqlts 2023-11-15
  • CVE-2021-44269
2022-05-17 :
- CVE-2021-44269 wavpack: heap Out-of-bounds Read
- Resolves: CVE-2021-44269
libldb 2.4.1-1.el8_6.ciqlts 2023-11-16 - 2021-11-25 :
- resolves: rhbz#2013605 - Rebase to version 2.4.1
mutt 2.0.7-2.el8_6.ciqlts 2023-11-15
  • CVE-2022-1328
2022-07-21 :
- Fix CVE-2022-1328 (#2109247)
poppler 20.11.0-6.el8_6.ciqlts 2023-11-17 - 2022-09-20 :
- Check for overflow when computing number of symbols
- in JBIG2 text region

[Show All]
2022-09-20  :  
- Check for overflow when computing number of symbols
- in JBIG2 text region
- Resolves: #2126361
galera 25.3.37-1.module+el8.6.0+2165+d757b3ab 2023-11-17 - 2023-07-04 :
- Rebase to 25.3.37
mariadb 10.3.39-1.module+el8.6.0+2165+d757b3ab 2023-11-17
  • CVE-2022-47015
  • CVE-2018-25032
  • CVE-2022-32091
  • CVE-2022-32084
2023-06-22 :
- Rebase to 10.3.39
- CVEs fixed:

[Show All]
2023-06-22  :  
- Rebase to 10.3.39
- CVEs fixed:
  CVE-2022-47015, CVE-2018-25032, CVE-2022-32091, CVE-2022-32084
Judy 1.0.5-18.module+el8.6.0+2165+d757b3ab 2023-11-17 - 2018-10-11 :
- Remove README.Fedora; no longer needed since 1.0.5 version
- Resolves: #1638717
python38 3.8.17-2.module+el8.6.0+2188+67ab3082 2023-11-18
  • CVE-2023-24329
  • CVE-2023-24329
  • CVE-2007-4559
2023-08-09 :
- Fix symlink handling in the fix for CVE-2023-24329
Resolves: rhbz#263261

[Show All]
2023-08-09  :  
- Fix symlink handling in the fix for CVE-2023-24329
Resolves: rhbz#263261
2023-08-07  :  
- Update to 3.8.17
- Security fix for CVE-2023-24329
- Add filters for tarfile extraction (CVE-2007-4559, PEP-706)
Resolves: rhbz#2173917, rhbz#263261
2023-07-18  :  
- Strip the LTO bytecode from python.o
Resolves: rhbz#2213526
scipy 1.3.1-5.module+el8.6.0+2188+67ab3082 2023-11-18 - 2023-07-14 :
- Remove RPATH from certain shared object files
- Resolves: rhbz#2222717
numpy 1.17.3-7.module+el8.6.0+2188+67ab3082 2023-11-18 - 2023-07-17 :
- Skip TestCond.test_nan
- Resolves: rhbz#2217862
python-lxml 4.4.1-7.module+el8.6.0+2188+67ab3082 2023-11-18
  • CVE-2021-43818
2022-01-06 :
- Security fix for CVE-2021-43818
Resolves: rhbz#2032569
Cython 0.29.14-4.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
mod_wsgi 4.6.8-5.module+el8.6.0+2188+67ab3082 2023-11-18 - 2023-07-13 :
- Remove rpath
Resolves: rhbz#2213836
python-cffi 1.13.2-3.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
python-psycopg2 2.8.4-4.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
python-requests 2.22.0-9.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
python-urllib3 1.25.7-5.module+el8.6.0+2188+67ab3082 2023-11-18
  • CVE-2021-33503
2021-06-29 :
- Fix for CVE-2021-33503 Catastrophic backtracking in URL authority parser
Resolves: rhbz#1968074

[Show All]
2021-06-29  :  
- Fix for CVE-2021-33503 Catastrophic backtracking in URL authority parser
Resolves: rhbz#1968074
- Update RECENT_DATE dynamically
python3x-setuptools 41.6.0-5.module+el8.6.0+2188+67ab3082 2023-11-18 - 2021-08-02 :
- Adjusted the postun scriptlets to enable upgrading to RHEL 9
- Resolves: rhbz#1933055
python-idna 2.8-6.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
PyYAML 5.4.1-1.module+el8.6.0+2188+67ab3082 2023-11-18
  • CVE-2020-14343
2021-03-23 :
- Rebase to version 5.4.1 to fix CVE-2020-14343
- Resolves: rhbz#1860466
python-ply 3.11-10.module+el8.6.0+2188+67ab3082 2023-11-18 - 2021-01-05 :
- Extract and ship license file (#1912893)
- Resolves: rhbz#1877430
pytz 2019.3-4.module+el8.6.0+2188+67ab3082 2023-11-18 - 2023-06-27 :
- Fix FTBFS with newest tzdata
Resolves: rhbz#2217853
python-pycparser 2.19-3.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
python-markupsafe 1.1.1-6.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
python-wheel 0.33.6-6.module+el8.6.0+2188+67ab3082 2023-11-18 - 2021-08-02 :
- Adjusted the postun scriptlets to enable upgrading to RHEL 9
- Resolves: rhbz#1933055
python-chardet 3.0.4-19.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
python3x-pip 19.3.1-7.module+el8.6.0+2188+67ab3082 2023-11-18
  • CVE-2007-4559
2023-08-08 :
- Use tarfile.data_filter for extracting (CVE-2007-4559, PEP-721, PEP-706)
Resolves: RHBZ#2218267
python-cryptography 2.8-3.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
python3x-six 1.12.0-10.module+el8.6.0+2188+67ab3082 2023-11-18 - 2020-11-10 :
- Rebuild from a new component name
python-psutil 5.6.4-4.module+el8.6.0+2188+67ab3082 2023-11-18
  • CVE-2019-18874
2021-07-26 :
- Security fix for CVE-2019-18874: double free because of refcount mishandling
Resolves: rhbz#1772014
babel 2.7.0-11.module+el8.6.0+2188+67ab3082 2023-11-18
  • CVE-2021-20095
2021-05-12 :
- Fix CVE-2021-20095
Resolves: rhbz#1955615
python-PyMySQL 0.10.1-1.module+el8.6.0+2188+67ab3082 2023-11-18 - 2020-10-06 :
- Rebase to 0.10 version to add support for MariaDB ed25519 authentication mechanism
python-pysocks 1.7.1-4.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
python-asn1crypto 1.2.0-3.module+el8.6.0+2188+67ab3082 2023-11-18 - 2019-12-13 :
- Exclude unsupported i686 arch
python-jinja2 2.11.3-1.module+el8.6.0+2188+67ab3082 2023-11-18 - 2022-05-20 :
- Update to 2.11.3.
- Fix URL.

[Show All]
2022-05-20  :  
- Update to 2.11.3.
- Fix URL.
- Remove patch that is included in this release.
Resolves: rhbz#2086141.
delve 1.20.2-1.module+el8.6.0+2208+489a80c2 2023-11-22 - 2023-05-26 :
- Rebase to 1.20.2
- Resolves: rhbz#2186495
golang 1.20.10-1.module+el8.6.0+2208+489a80c2 2023-11-22
  • CVE-2023-39325
2023-10-13 :
- Update to Go 1.20.10
- Fix CVE-2023-39325

[Show All]
2023-10-13  :  
- Update to Go 1.20.10
- Fix CVE-2023-39325
- Midstream patches
- Resolves: RHEL-12619
2023-08-14  :  
- Retire golang-race package
- Resolves: rhbz#2230599
2023-07-25  :  
- Rebase to Go 1.20.6
- Resolves: rhbz#2217596
2023-05-29  :  
- Rebase to Go 1.20.4
- Resolves: rhbz#2204474
2023-04-11  :  
- Rebase to Go 1.20.3
- Remove race archives
- Update static tests patches
- Resolves: rhbz#2185260
2023-01-03  :  
- Fix memory leaks in EVP_{sign,verify}_raw
- Resolves: rhbz#2132767
2022-12-21  :  
- Rebase to Go 1.19.4
- Fix ppc64le linker issue
- Remove defunct patches
- Remove downstream generated FIPS mode patches
- Add golang-fips/go as the source for FIPS mode patches
- Resolves: rhbz#2144542
go-toolset 1.20.10-1.module+el8.6.0+2208+489a80c2 2023-11-22
  • CVE-2023-39325
2023-10-13 :
- Update to Go 1.20.10
- Fix CVE-2023-39325

[Show All]
2023-10-13  :  
- Update to Go 1.20.10
- Fix CVE-2023-39325
- Midstream patches
- Resolves: RHEL-12619
2023-08-01  :  
- Rebase to Go 1.20.6
- Resolves: rhbz#2226901
2023-05-31  :  
- Rebase to Go 1.20.4
- Resolves: rhbz#2204474
2023-04-11  :  
- Rebase to Go 1.20.3
- Remove race archives
- Update static tests patches
- Resolves: rhbz#2185260
2022-12-21  :  
- Rebase to Go 1.19.4
- Fix ppc64le linker issue
- Remove defunct patches
- Remove downstream generated FIPS mode patches
- Add golang-fips/go as the source for FIPS mode patches
- Resolves: rhbz#2144542
cups-filters 1.20.0-29.el8_6.ciqlts.2 2023-11-17
  • CVE-2023-24805
2023-05-15 :
- CVE-2023-24805 cups-filters: remote code execution in cups-filters, beh CUPS backend
2023-05-05 :

[Show All]
2023-05-15  :  
- CVE-2023-24805 cups-filters: remote code execution in cups-filters, beh CUPS backend
2023-05-05  :  
- 2193390 - Edges cropped when printing PostScript document
openblas 0.3.15-4.el8_6.ciqlts 2023-11-20
  • CVE-2021-4048
2022-06-15 :
- Fix out-of-bounds read in *larrv
- Resolves: CVE-2021-4048
ghostscript 9.27-6.el8_6.ciqlts 2023-11-27 - 2023-02-02 :
- set the page size for A4 correctly in ESC/Page driver
- Resolves: rhbz#2164603
selinux-policy 3.14.3-96.el8_6.ciqlts.1 2023-12-04 - 2023-12-01 :
- Add upstream patch to fix iptables /sys/fs/cgroup denial issue
firefox 115.7.0-1.el8_6.ciqlts 2024-01-30
  • CVE-2023-44488
2024-01-30 :
- Security backport build for CIQ LTS 8.6
2024-01-30 :

[Show All]
2024-01-30  :  
- Security backport build for CIQ LTS 8.6
2024-01-30  :  
- Add debranding patches (Mustafa Gezen)
- Add Rocky Linux default preferences (Louis Abel)
2024-01-16  :  
- Update to 115.7.0 build1
2023-12-12  :  
- Update to 115.6.0 build1
2023-11-14  :  
- Update to 115.5.0 build1
2023-10-17  :  
- Update to 115.4.0 build1
- Add fix for CVE-2023-44488
- Set homepage from os-release HOME_URL
2023-09-29  :  
- Update to 115.3.1
2023-09-21  :  
- Update to 115.3.0 ESR
2023-09-04  :  
- Update to 115.2.0 ESR
2023-08-02  :  
- Update to 115.1.0 ESR
thunderbird 115.7.0-1.el8_6.ciqlts 2024-01-30 - 2024-01-30 :
- Backport security build for CIQ LTS Rocky 8.6
2024-01-30 :

[Show All]
2024-01-30  :  
- Backport security build for CIQ LTS Rocky 8.6
2024-01-30  :  
- Add Rocky Linux debranding
2024-01-22  :  
- Update to 115.7.0 build1
2023-12-18  :  
- Update to 115.6.0 build2
2023-11-21  :  
- Update to 115.5.0 build1
2023-10-25  :  
- Update to 115.4.1 build1
2023-10-24  :  
- Update to 115.4.0 build3
2023-10-21  :  
- Update to 115.4.0 build2
2023-10-20  :  
- Update to 115.4.0 build1
2023-09-29  :  
- Update to 115.3.1 build1
squid 4.15-7.module+el8.6.0+2289+765e0959.3 2023-12-08 - 2023-11-30 :
- Related: RHEL-14792 - squid: squid multiple issues in HTTP response caching
- Fix mistake in the patch

[Show All]
2023-11-30  :  
- Related: RHEL-14792 - squid: squid multiple issues in HTTP response caching
- Fix mistake in the patch
2023-11-21  :  
- Resolves: RHEL-14792 - squid: squid multiple issues in HTTP response caching
2023-10-30  :  
- Resolves: RHEL-14801 - squid: squid: Denial of Service in HTTP Digest
  Authentication
- Resolves: RHEL-14776 - squid: squid: Request/Response smuggling in HTTP/1.1
  and ICAP
2023-08-16  :  
- Resolves: #2076717 - Crash with half_closed_client on
libecap 1.0.1-2.module+el8.6.0+2289+765e0959 2023-12-08 - 2019-08-23 :
- Resolves: #1695587 - Ensure modular RPM upgrade path
tracker-miners 2.1.5-2.el8_6.ciqlts.1 2023-12-14 - 2023-12-06 :
- Fix issues and missing syscalls in seccomp improvements backport
Resolves: RHEL-12465

[Show All]
2023-12-06  :  
- Fix issues and missing syscalls in seccomp improvements backport
  Resolves: RHEL-12465
2023-12-05  :  
- Backport stricter seccomp jail
  Resolves: RHEL-12465
php-pecl-apcu 5.1.12-2.module+el8.6.0+2378+6ed50a3e 2023-12-14 - 2019-05-15 :
- rebuild (#1695587)
php-pecl-zip 1.15.3-1.module+el8.6.0+2378+6ed50a3e 2023-12-14 - 2018-06-12 :
- Update to 1.15.3
php-pear 1.10.5-9.module+el8.6.0+2378+6ed50a3e 2023-12-14 - 2019-05-15 :
- rebuild
php 7.2.24-1.module+el8.6.0+2378+6ed50a3e 2023-12-14 - 2019-11-07 :
- update to 7.2.24 #1726981
libzip 1.5.1-2.module+el8.6.0+2378+6ed50a3e 2023-12-14 - 2019-05-15 :
- rebuild (#1695587)
gstreamer1-plugins-bad-free 1.16.1-2.el8_6.ciqlts 2023-12-15
  • CVE-2023-44446
2023-12-13 :
- Patch CVE-2023-44446: MXF demuxer use-after-free
- Resolves: RHEL-17036
tigervnc 1.12.0-15.el8_6.ciqlts.4 2024-01-05
  • CVE-2023-5380
  • CVE-2023-5367
  • CVE-2023-6377
  • CVE-2023-6478
  • CVE-2022-46340
  • CVE-2022-4283
  • CVE-2022-46340
  • CVE-2022-46341
  • CVE-2022-46342
  • CVE-2022-46343
  • CVE-2022-46344
2024-01-03 :
- CVE Rollups from upstream: Patches by Jan Grulich
- Fix CVE-2023-5380 tigervnc: xorg-x11-server: Use-after-free bug in DestroyWindow

[Show All]
2024-01-03  :  
- CVE Rollups from upstream: Patches by Jan Grulich 
- Fix CVE-2023-5380 tigervnc: xorg-x11-server: Use-after-free bug in DestroyWindow
- Fix CVE-2023-5367 tigervnc: xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
  Resolves: RHEL-15229
- Fix CVE-2023-6377 tigervnc: xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions
  Resolves: RHEL-18409
- Fix CVE-2023-6478 tigervnc: xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty
  Resolves: RHEL-18421
- Updated fix for CVE-2023-6377 tigervnc: xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions
  Resolves: RHEL-18409
2023-03-27  :  
- xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
  Resolves: bz#2180305
2023-02-21  :  
- SELinux: allow vncsession create .vnc directory
  Resolves: bz#2164704
2023-02-15  :  
- Add sanity check when cleaning up keymap changes
  Resolves: bz#2169960
2023-02-06  :  
- xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
  Resolves: bz#2167058
2022-12-20  :  
- Rebuild for xorg-x11-server CVE-2022-46340 follow up fix
2022-12-16  :  
- Rebuild for xorg-x11-server CVEs
  Resolves: CVE-2022-4283 (bz#2154233)
  Resolves: CVE-2022-46340 (bz#2154220)
  Resolves: CVE-2022-46341 (bz#2154223)
  Resolves: CVE-2022-46342 (bz#2154225)
  Resolves: CVE-2022-46343 (bz#2154227)
  Resolves: CVE-2022-46344 (bz#2154229)
nss 3.79.0-12.el8_6.ciqlts 2024-01-16
  • CVE-2023-5388
  • CVE-2023-0767
2024-01-15 :
- Fix CVE-2023-5388
- Fix expired test certs with NameConstraints_Certs.tar

[Show All]
2024-01-15  :  
- Fix CVE-2023-5388
- Fix expired test certs with NameConstraints_Certs.tar
- Upstream patches: https://gitlab.com/redhat/centos-stream/rpms/nss/-/commit/b604fc6eb5bf895a2f80f70ccf86d05b76641580
- And here: https://git.rockylinux.org/staging/rpms/nss/-/commit/1f7f7523b61a2ada2f461548c4160fbbf979c5dd
2023-03-08  :  
- Fix CVE-2023-0767
avahi 0.7-21.el8_6.ciqlts.1 2024-01-17
  • CVE-2021-3468
  • CVE-2023-38469
  • CVE-2023-38470
  • CVE-2023-38471
  • CVE-2023-38472
  • CVE-2023-38473
  • CVE-2023-1981
2023-12-06 :
- Fix CVE-2021-3468 (RHEL-18311)
- Fix CVE-2023-38469 (RHEL-17783)

[Show All]
2023-12-06  :  
- Fix CVE-2021-3468 (RHEL-18311)
- Fix CVE-2023-38469 (RHEL-17783)
- Fix CVE-2023-38470 (RHEL-17795)
- Fix CVE-2023-38471 (RHEL-17789)
- Fix CVE-2023-38472 (RHEL-17807)
- Fix CVE-2023-38473 (RHEL-17801)
2023-08-23  :  
- Fix CVE-2023-1981 (#2186688)
procps-ng 3.3.15-14.el8_6.ciqlts 2024-01-17
  • CVE-2023-4016
2023-08-15 :
- CVE-2023-4016: ps: possible buffer overflow
- Resolves: rhbz#2228503

[Show All]
2023-08-15  :  
- CVE-2023-4016: ps: possible buffer overflow
- Resolves: rhbz#2228503
2023-01-17  :  
- version bump requested to create -devel subpkg for CRB inclusion
- Resolves: rhbz#2164781
2023-01-17  :  
- ps: out-of-bonds read in quick mode
- Resolves: rhbz#2153813
iscsi-initiator-utils 6.2.1.4-8.git095f59c.el8_6.ciqlts 2024-01-30 - 2023-06-15 :
- fix gating test
2023-06-15 :

[Show All]
2023-06-15  :  
- fix gating test
2023-06-15  :  
- move tests to tmt framework
2023-06-13  :  
- restore missing gating tests
2023-06-07  :  
- 2131090 fix idbm patch to not overwrite upstream changes in file mode