<?xml-stylesheet type="text/xsl" href="updateinfo.xsl"?>
<updates><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4180-1</id><title>Kernel Bug Fix Update</title><description>This update fixes the following bugs:

* kernel: scsi: ses: don't ask for diagnostic pages repeatedly during probe

* OVS drops secondary SCTP connection

* Unable to insert 'i10nm_edac.ko' EDAC kernel module on JVL after CPU upgraded

* File corruption when a 1 MB (or bigger) file is pulled from a container running memory mapped AF_PACKET TX ring

* [mlx5] kernel crash at mlx5e_encap_take()

The system must be rebooted for this update to take effect.</description><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.2.1.el7.noarch.rpm</filename><sum type="sha256">ee38276592d03247c195503a3a84bb788acf4f2375852d5e37e53aa10e5e14ec</sum></package><package arch="x86_64" name="kernel-headers" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">305ee7b1e141efb86dad88ce8f64d891d4499515a0b86cc2492a7afe7354f2cc</sum></package><package arch="x86_64" name="kernel-tools" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">47e102d549470ebe722222c158bf8bbe23ce7edaa9f6dbcf3ac2522f29f4f841</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">05238fa7733a2854c8da926c1cfc153aefeb49566288f67f02062c65d3f5d183</sum></package><package arch="x86_64" name="python-perf" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">ddca29711b7c5250cc0031df2c682dc3642d51de1ba6b31c4d3fee300d97abde</sum></package><package arch="x86_64" name="kernel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">f64734816b193587747ba3f6f37cef54cb714507a9a60de8dcd9de5e30f6174b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">12e0cf4a6ac5e1725da5c23f45471c5137290387f7dc775f1a3ab186307231cb</sum></package><package arch="x86_64" name="bpftool" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">cbd170a26667e7100abca4aabfa06d0d24d6bd8ab65264cfb8e8e767de442a5c</sum></package><package arch="x86_64" name="kernel-devel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">72a1ee6bb71ce33bc004874f657bbdb022ac6f31d44a5f9b87164617d4693673</sum></package><package arch="x86_64" name="kernel-debug" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">5134deda0899e9a38e7e47fd0e23fe5b02271f2c23fc669bc6716c59f0a46170</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">542cbe64be29e0eee7ba6662f92806774a6f86524e5857bb9ebe2a35d9cb552d</sum></package><package arch="noarch" name="kernel-doc" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.2.1.el7.noarch.rpm</filename><sum type="sha256">367bf3076424250e2b5a936305fd9d34309323521cbc12c90ccd88ec4f96a989</sum></package><package arch="x86_64" name="perf" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">e1e87432d6037c047a0c13b2fa71288d378d6cf91d2cd94f3d7298c4b980c1a1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4180" id="RHBA-2020:4180-1" title="Rhba-2020:4180-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4282-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020b, which addresses recent time zone changes. Notably:

* Yukon timezones represented by America/Whitehorse and America/Dawson will change time zone rules from -08/-07 to permanent -07 on November 01, 2020, not on August 03, 2020, contrary to what was in the version 2020a.

* The most recent winter(+08)/summer(+11) transition for Casey Station, Antarctica was on April 04, 2020 at 00:01.

* Obsolete pacificnew, systemv, and yearistype.sh files have been removed from the distribution.</description><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="3.el7" src="tzdata-2020b-3.el7.src.rpm" version="2020b"><filename>tzdata-2020b-3.el7.noarch.rpm</filename><sum type="sha256">bae5d3ba085cab34024698659c79a9f30feb14b936052f6a4e1ad4af87ac9ce0</sum></package><package arch="noarch" name="tzdata-java" release="3.el7" src="tzdata-2020b-3.el7.src.rpm" version="2020b"><filename>tzdata-java-2020b-3.el7.noarch.rpm</filename><sum type="sha256">e2e2a484a6f1ee84161056075eb83c7c1fb9608b45fb487cfa3ccf4623f5629c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4282" id="RHBA-2020:4282-1" title="Rhba-2020:4282-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4329-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020d, which addresses recent time zone changes. Notably:

* Fiji starts the daylight saving time (DST) later than usual on December 20, 2020, rather than the predicted November O8, 2020.

* Palestine will end summer time on October 24, 2020 rather than the predicted October 31, 2020.</description><release>Scientific Linux</release><issued date="2020-10-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="2.el7" src="tzdata-2020d-2.el7.src.rpm" version="2020d"><filename>tzdata-java-2020d-2.el7.noarch.rpm</filename><sum type="sha256">e86d66eb32256341996577a3468858f80ccc4b9e24f0049daf6bb64f596d23e6</sum></package><package arch="noarch" name="tzdata" release="2.el7" src="tzdata-2020d-2.el7.src.rpm" version="2020d"><filename>tzdata-2020d-2.el7.noarch.rpm</filename><sum type="sha256">32dcd49fca4845c52d8522bcd6ee06a92751dbd5bf2f8449c49d779f56716432</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4329" id="RHBA-2020:4329-1" title="Rhba-2020:4329-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5017-1</id><title>Openscap Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* Huge memory leak in probe_rpmverifyfile

* OpenSCAP doesn't take advantage of gzip compression when downloading remote content.</description><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openscap-engine-sce" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">26a432b346c85143df5fdde282d9c47924e375ed738a6d801c45e1889c8bfbb0</sum></package><package arch="i686" name="openscap-engine-sce-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">55deefdf2b8baccf6dcfe7257b32da1358ffad07cf45c4774b6d2da7f42958f4</sum></package><package arch="x86_64" name="openscap-scanner" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">88b70d5aff9e78052b1ef48e3ef10e440554a5c0306783325f1f213c1b5f2de1</sum></package><package arch="noarch" name="openscap-containers" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-13.el7_9.noarch.rpm</filename><sum type="sha256">c1ace00cb7cc2d0d459c60346f512dd63fc382408c65f15647f43f0fd262d2cd</sum></package><package arch="x86_64" name="openscap-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">64a29549d82f9078cb03fd0e266169dcfbab9789a34103b1a314a26944eec89a</sum></package><package arch="x86_64" name="openscap-utils" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">b589b72959da4539156217de78bc14092ecd190bf5d5b9959e6850117fe6124d</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">3adb46260adf0b3729fb688454a01a951bef015104991962f74a481da3628919</sum></package><package arch="x86_64" name="openscap-extra-probes" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">3d8d218227e06c86640e9048c0727f9448126b03d50998f86968af7a7fba4e02</sum></package><package arch="i686" name="openscap-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">6611815a691ea4ef9286b3dbe25ca75872e61dd1b821777aa27898bc7e926549</sum></package><package arch="x86_64" name="openscap-python" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">9eda95b4bf068a4dd42578893cec8d34023919dcc2d6d1e5f43e9ae2e04c3f3b</sum></package><package arch="x86_64" name="openscap" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">0f431fc0de2d54d27ef73e8763305530fdafe7e75e8d14971ef6d6dd456740ec</sum></package><package arch="i686" name="openscap-engine-sce" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">02a2970fe161c63ce93bba1e1800f38b3e7bf320f728029a7a08e948297071d7</sum></package><package arch="i686" name="openscap" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">e172cb1bfb4d2cb42fdf435dbc33fce6ffb9db9419388628508591f6d41530f3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5017" id="RHBA-2020:5017-1" title="Rhba-2020:5017-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861300" id="1861300" title="Huge Memory Leak In Probe_Rpmverifyfile [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1870147" id="1870147" title="Openscap Doesn'T Take Advantage Of Gzip Compression When Downloading Remote Content. [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5027-1</id><title>Selinux-Policy Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* [SL-7.9]- Selinux policy need to be updated for RHGS to fix permission issues

* Selinux prevents nss from creating directory inside the certs directory.</description><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-devel" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">bf544dffd42e2c80a47b65fbfb4490df371130b42ec4467e85b20839b3ffb0d0</sum></package><package arch="noarch" name="selinux-policy-doc" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">ff9576077bc32507c027488b37dc29449d1687a5859e8c9dd6183804f2f65cd8</sum></package><package arch="noarch" name="selinux-policy-minimum" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">4c4425d26098ce827f3d90fb9055b74ad86caaf510c5786578f15f3e97a9ad42</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">d30d91abee991346cbe1e380d0ec23b629bfe2e39cdaf821f892963542506751</sum></package><package arch="noarch" name="selinux-policy-mls" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">a7e1b16a3019fe3300dafdd834094cc64b70668c4afb1e2a448a5afe3774a0b2</sum></package><package arch="noarch" name="selinux-policy-targeted" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">b55b489fad47589263e056c0967fb2386b7504d965aff36c7beb7a936e3cb5e7</sum></package><package arch="noarch" name="selinux-policy" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">57914f4194867a8f2455b8d04689c9b5b7f83402a400a1ec5183b01ff64d8533</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5027" id="RHBA-2020:5027-1" title="Rhba-2020:5027-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1867995" id="1867995" title="[Rhel-7.9]- Selinux Policy Need To Be Updated For Rhgs To Fix Permission Issues [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5032-1</id><title>Python-Blivet Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* Not closing the fd  if blivet fails to read the device</description><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="python-blivet" release="1.el7_9" src="python-blivet-0.61.15.76-1.el7_9.src.rpm" version="0.61.15.76"><filename>python-blivet-0.61.15.76-1.el7_9.noarch.rpm</filename><sum type="sha256">4ae70a3b7c5aa57c7c8b891f6d4cd92afd4f8e708e75955cbc5e3414fabcc366</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5032" id="RHBA-2020:5032-1" title="Rhba-2020:5032-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1879920" id="1879920" title="Not Closing The Fd  If Blivet Fails To Read The Device [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5451-1</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* The "DISA STIG for Scientific Linux 7" profile in the SCAP Security Guide has been updated to the latest version V3R1. This update adds more coverage and fixes reference problems. The profile is now also more stable and better aligns with the SL7 STIG benchmark provided by the Defense Information Systems Agency (DISA).

You should use only the current version of this profile because the older versions of this profile are no longer valid. The OVAL checks for several rules have changed, and scans using the V3R1 version will fail for systems that were hardened using older versions of SCAP Security Guide. You can fix the rules automatically by running the remediation with the new version of SCAP Security Guide.

WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first.

The following rules have been changed:

CCE-80224-9:: The default value of this SSHD configuration has changed from "delayed" to "yes". You must now provide a value according to recommendations. Check the rule description for information about fixing this problem or run the remediation to fix it automatically.

CCE-80393-2:: xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon CCE-80394-0:: xccdf_org.ssgproject.content_rule_audit_rules_execution_restorecon CCE-80391-6:: xccdf_org.ssgproject.content_rule_audit_rules_execution_semanage CCE-80660-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setfiles CCE-80392-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setsebool CCE-82362-5:: xccdf_org.ssgproject.content_rule_audit_rules_execution_seunshare CCE-80398-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage CCE-80404-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh CCE-80410-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_crontab CCE-80397-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd CCE-80403-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp CCE-80411-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_pam_timestamp_check CCE-27437-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands CCE-80395-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd CCE-80406-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postdrop CCE-80407-0:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_postqueue CCE-80408-8:: xccdf_org.ssgproject.content_rule_audit_rule s_privileged_commands_ssh_keysign CCE-80402-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit CCE-80401-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo CCE-80400-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su CCE-80405-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_umount CCE-80396-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_unix_chkpwd CCE-80399-9:: xccdf_org.ssgproject.content_rule_audit_ru les_privileged_commands_userhelper</description><release>Scientific Linux</release><issued date="2020-12-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-doc" release="2.sl7_9" src="scap-security-guide-0.1.52-2.sl7_9.src.rpm" version="0.1.52"><filename>scap-security-guide-doc-0.1.52-2.sl7_9.noarch.rpm</filename><sum type="sha256">a76226596f9cf1af0cf1fb7a48a9bd48b064fb4ea543aa8bf5672aad2b08c5bc</sum></package><package arch="noarch" name="scap-security-guide" release="2.sl7_9" src="scap-security-guide-0.1.52-2.sl7_9.src.rpm" version="0.1.52"><filename>scap-security-guide-0.1.52-2.sl7_9.noarch.rpm</filename><sum type="sha256">c3f704db0ab1790e4b3b80c95b321134d3fd4bef2ad363890a0892ff8f12a9d2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5451" id="RHBA-2020:5451-1" title="Rhba-2020:5451-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665233" id="1665233" title="Latest Rhel7 Stig Is Not Present In Latest Version Of Scap-Security-Guide. [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:0013-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2020f, which addresses recent time zone changes. Notably:

* Europe/Volgograd will change from UTC+04 to UTC+03 on December 27, 2020.</description><release>Scientific Linux</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2020f-1.el7.src.rpm" version="2020f"><filename>tzdata-2020f-1.el7.noarch.rpm</filename><sum type="sha256">c37375a99001e0ec3742ba21f8b5a51f2034945b5b7e54a211166c3e76ad451d</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2020f-1.el7.src.rpm" version="2020f"><filename>tzdata-java-2020f-1.el7.noarch.rpm</filename><sum type="sha256">8539392e7e8de6c9aecd029b448821e59301400a279fd44b232bc6f76473cfcc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:0013" id="RHBA-2021:0013-1" title="Rhba-2021:0013-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:0276-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2021a, which addresses recent time zone changes. Notably:

* South Sudan will change from UTC+03 to UTC+02 on February 1, 2021.</description><release>Scientific Linux</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2021a-1.el7.src.rpm" version="2021a"><filename>tzdata-2021a-1.el7.noarch.rpm</filename><sum type="sha256">e4e436444c61697321d0ce5167151f9c6997ad25cbb4f76b349d4096c59d127a</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2021a-1.el7.src.rpm" version="2021a"><filename>tzdata-java-2021a-1.el7.noarch.rpm</filename><sum type="sha256">665540ad82981076b64025f9f7818c8e13241edc37cc0917f95d810de3efdccd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:0276" id="RHBA-2021:0276-1" title="Rhba-2021:0276-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4072-1</id><title>Libcroco</title><description>Security Fix(es): 
* libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libcroco" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-0.6.12-6.el7_9.x86_64.rpm</filename><sum type="sha256">d87d08920dc0d6fc8115db1658235f5de735757dd37422431369a61fa249bc82</sum></package><package arch="i686" name="libcroco-devel" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-devel-0.6.12-6.el7_9.i686.rpm</filename><sum type="sha256">4b512395a6822fa76d4c0fbc4014b8f33e37eca0dd449e27b22c5393b5532837</sum></package><package arch="i686" name="libcroco" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-0.6.12-6.el7_9.i686.rpm</filename><sum type="sha256">4b4a8dbf07510cc58a5400f60b2f8e517bfe51567f1cb13fc26df73e19798391</sum></package><package arch="x86_64" name="libcroco-devel" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-devel-0.6.12-6.el7_9.x86_64.rpm</filename><sum type="sha256">bf8fdd5833f8236b37fe8bc05897aa99e052984c436bfda0351d38cc387973bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825" id="CVE-2020-12825" title="Cve-2020-12825" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4072" id="RHSA-2020:4072-1" title="Rhsa-2020:4072-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835377" id="1835377" title="Cve-2020-12825 Libcroco: Stack Overflow In Function Cr_Parser_Parse_Any_Core In Cr-Parser.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4076-1</id><title>Nss And Nspr</title><description>Security Fix(es): 
* nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) 
* nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) 
* nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) 
* nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) 
* nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) 
* nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) 
* nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) 
* nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) 
* nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) 
* nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-sysinit" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-sysinit-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">15a101e35a98f34fac1b771804494d4c6301eff549833e5e78786fb9feacc8ad</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-devel-3.53.1-1.el7_9.i686.rpm</filename><sum type="sha256">60683f92b2008461920e8aefda0a27b834a00c7faf48ecb927eaae4d44292177</sum></package><package arch="i686" name="nspr-devel" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-devel-4.25.0-2.el7_9.i686.rpm</filename><sum type="sha256">3fa4d956eae89cfce468432d9c19af7d360fe488c4e0e6f05e5afa2b9fbae8a1</sum></package><package arch="i686" name="nss-util" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-3.53.1-1.el7_9.i686.rpm</filename><sum type="sha256">9262d3904ffb913894939f0d81393714589b96d493ddba11f6ef0dbf62e79022</sum></package><package arch="x86_64" name="nspr" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-4.25.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">e08439dde765b18f4e224a91ae854eeae94dc7dc8f37a60fde90504ab233d7bf</sum></package><package arch="i686" name="nss-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-3.el7_9.i686.rpm</filename><sum type="sha256">0e0db7d4094860e358678dc2afd7975797eb597cee877b304953603ca2e2f5c5</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">6431e62f2f37e81f770ef6c16adf677c8d181bfbbd1a6751ab6852a3a42312ca</sum></package><package arch="i686" name="nss" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-3.el7_9.i686.rpm</filename><sum type="sha256">5dd111c183707e7ceb015f79188e924f397b034aca7c7d274b336cf993c68b2b</sum></package><package arch="i686" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">cae33d2ff8fd02ddf817a0b2ba3293d31b3d563276e4d274205aac710cd30c1b</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">25e1bf14fd9e2ace713eb7f595db1ee2e60d6099813d5f1fcd98a9970be276ac</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">cbcdecdc2c895a1b0fc34ae177210bbdc8a94f583f59e47c1c64b7f8db0c17b2</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">ce95acdf422ce3fc7b3662005438988b14f6bcd6195a429730e16d44bec1a098</sum></package><package arch="x86_64" name="nss-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">4fdcf0080023ce61c49172ad09c2e9b10d47698b82a79433039d3ff87ce3f64d</sum></package><package arch="i686" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">e96391c99b548cc3fe9f16fe843cfda2d20d5e6d39204401aafc0e1a5492f73f</sum></package><package arch="x86_64" name="nss-util" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-3.53.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">fc0d30529d44c6c4edd76892d8700f7f24074c3a0448172bc76bca0df143652c</sum></package><package arch="i686" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-devel-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">3f1b6bf28bb95723ac1c3e7ac8b0fba7c45bb42472b4fe44bef21aaa36b48fd5</sum></package><package arch="x86_64" name="nss" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">50faf714fa7d06ecc9cabcfa5e31bfdd489b5a6e1a18e20736f8575c128b032b</sum></package><package arch="x86_64" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">0d0cac5d697578932de17afb870c3df1b9c244b0d9b718a127079b18531b3487</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm</filename><sum type="sha256">5e12474924151c097b3f2bde740bbdd83c387afd02498a1baefc13829bb7cb75</sum></package><package arch="x86_64" name="nss-tools" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-tools-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">a1f9fa142ea8067c25ed2764b30e0e813ec4d1650d0fb278c73afc1f64fbc787</sum></package><package arch="x86_64" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">4875de4d0a8cda97d3e56860fbecd2284818e04a30520087d0f0e84fd958bce3</sum></package><package arch="x86_64" name="nspr-devel" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-devel-4.25.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">dc2cbeebe55c53402d9a5a92ec9bc3f0e479b8e5b26d2fb7ab73370586edd447</sum></package><package arch="i686" name="nspr" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-4.25.0-2.el7_9.i686.rpm</filename><sum type="sha256">b2a769c0f5a9bf9cd471371b1ce23fb1db144a7fd1e4147634136668b6fd9349</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-devel-3.53.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">216d1def1e80a5867a486fb4d2412663739458dd2ad8b11039291f32e307265d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756" id="CVE-2019-11756" title="Cve-2019-11756" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" id="CVE-2019-17006" title="Cve-2019-17006" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023" id="CVE-2019-17023" title="Cve-2019-17023" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400" id="CVE-2020-12400" title="Cve-2020-12400" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401" id="CVE-2020-12401" title="Cve-2020-12401" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" id="CVE-2020-12402" title="Cve-2020-12402" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403" id="CVE-2020-12403" title="Cve-2020-12403" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829" id="CVE-2020-6829" title="Cve-2020-6829" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4076" id="RHSA-2020:4076-1" title="Rhsa-2020:4076-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1688958" id="1688958" title="Memory Leak: Libcurl Leaks 120 Bytes On Each Connection [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724251" id="1724251" title="Make Tls 1.3 Work In Fips Mode [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728436" id="1728436" title="Cve-2019-11719 Nss: Out-Of-Bounds Read When Importing Curve25519 Private Key" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730988" id="1730988" title="Cve-2019-11727 Nss: Pkcs#1 V1.5 Signatures Can Be Used For Tls 1.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737910" id="1737910" title="Name Constraints Validation: Cn Treated As Dns Name Even When Syntactically Invalid As Dns Name [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774835" id="1774835" title="Cve-2019-11756 Nss: Use-After-Free In Sftk_Freesession Due To Improper Refcounting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775916" id="1775916" title="Cve-2019-17006 Nss: Check Length Of Inputs For Cryptographic Primitives" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779325" id="1779325" title="When Nss_Sdb_Use_Cache Not Set, After Curl Access Https, Dentry Increase But Never Released - Consider Alternative Algorithm For Benchmarking Access Call In Sdb_Measureaccess" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791225" id="1791225" title="Cve-2019-17023 Nss: Tls 1.3 Helloretryrequest Downgrade Request Sets Client Into Invalid State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1804015" id="1804015" title="Running Ipa-Backup Continuously Causes Httpd To Crash And Makes It Irrecoverable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1826187" id="1826187" title="Cve-2020-6829 Nss: Side Channel Attack On Ecdsa Signature Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1826231" id="1826231" title="Cve-2020-12402 Nss: Side Channel Vulnerabilities During Rsa Key Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1851294" id="1851294" title="Cve-2020-12401 Nss: Ecdsa Timing Attack Mitigation Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1853983" id="1853983" title="Cve-2020-12400 Nss: P-384 And P-521 Implementation Uses A Side-Channel Vulnerable Modular Inversion Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868931" id="1868931" title="Cve-2020-12403 Nss: Chacha20-Poly1305 Decryption With Undersized Tag Leads To Out-Of-Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1870885" id="1870885" title="Kdf-Self-Tests-Induced Changes For Nss In Rhel 7.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4079-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) 
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">cc234b4588abcd0ace2c803e27f48acda0fdbd096ca6f37c4165f7b9af872a60</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">780e0463b252a18a14de1b3be1627dfd4eff587bfe3e83a798a52422463cf1f4</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">8176a5ae74de01a8446831210e7e4ac7d83a5eafaa628b4e447fbf28d716ba63</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">6bbc2982e31448005f29f6958c4a3cf6103d542e2ae8395d4163eb14fe7cabf8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" id="CVE-2020-14364" title="Cve-2020-14364" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983" id="CVE-2020-1983" title="Cve-2020-1983" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4079" id="RHSA-2020:4079-1" title="Rhsa-2020:4079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829825" id="1829825" title="Cve-2020-1983 Qemu: Slirp: Use-After-Free In Ip_Reass() Function In Ip_Input.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869201" id="1869201" title="Cve-2020-14364 Qemu: Usb: Out-Of-Bounds R/W Access Issue While Processing Usb Packets" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4080-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) 
* Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (CVE-2020-12422) 
* Mozilla: X-Frame-Options bypass using object or embed tags (CVE-2020-15648) 
* Mozilla: Bypassing iframe sandbox when allowing popups (CVE-2020-15653) 
* Mozilla: Type confusion for special arguments in IonMonkey (CVE-2020-15656) 
* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) 
* Mozilla: Download origin spoofing via redirect (CVE-2020-15677) 
* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678) 
* Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process (CVE-2020-12424) 
* Mozilla: Out of bound read in Date.parse() (CVE-2020-12425) 
* Mozilla: Custom cursor can overlay user interface (CVE-2020-15654) 
* Mozilla: Overriding file type when saving to disk (CVE-2020-15658)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.3.0-1.el7_9.src.rpm" version="78.3.0"><filename>firefox-78.3.0-1.el7_9.i686.rpm</filename><sum type="sha256">60d7ccbae0fb2e7efd40487513ffa31855c8ffc70640fa40f3fc0632303be2fd</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.3.0-1.el7_9.src.rpm" version="78.3.0"><filename>firefox-78.3.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">d32524acf8d66c8f275ec8f19eac5c77f0c48f37d45eb3086f01118fa87a5862</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12422" id="CVE-2020-12422" title="Cve-2020-12422" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12424" id="CVE-2020-12424" title="Cve-2020-12424" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12425" id="CVE-2020-12425" title="Cve-2020-12425" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15648" id="CVE-2020-15648" title="Cve-2020-15648" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15653" id="CVE-2020-15653" title="Cve-2020-15653" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15654" id="CVE-2020-15654" title="Cve-2020-15654" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15656" id="CVE-2020-15656" title="Cve-2020-15656" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15658" id="CVE-2020-15658" title="Cve-2020-15658" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" id="CVE-2020-15673" title="Cve-2020-15673" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" id="CVE-2020-15676" title="Cve-2020-15676" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" id="CVE-2020-15677" title="Cve-2020-15677" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" id="CVE-2020-15678" title="Cve-2020-15678" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4080" id="RHSA-2020:4080-1" title="Rhsa-2020:4080-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861645" id="1861645" title="Cve-2020-15653 Mozilla: Bypassing Iframe Sandbox When Allowing Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861646" id="1861646" title="Cve-2020-15656 Mozilla: Type Confusion For Special Arguments In Ionmonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861647" id="1861647" title="Cve-2020-15658 Mozilla: Overriding File Type When Saving To Disk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861649" id="1861649" title="Cve-2020-15654 Mozilla: Custom Cursor Can Overlay User Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868842" id="1868842" title="Warnings Displayed When Removing Firefox Package [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872537" id="1872537" title="Cve-2020-15648 Mozilla: X-Frame-Options Bypass Using Object Or Embed Tags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872538" id="1872538" title="Cve-2020-12422 Mozilla: Integer Overflow In Nsjpegencoder::Emptyoutputbuffer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872539" id="1872539" title="Cve-2020-12424 Mozilla: Webrtc Permission Prompt Could Have Been Bypassed By A Compromised Content Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872540" id="1872540" title="Cve-2020-12425 Mozilla: Out Of Bound Read In Date.Parse()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881664" id="1881664" title="Cve-2020-15677 Mozilla: Download Origin Spoofing Via Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881665" id="1881665" title="Cve-2020-15676 Mozilla: Xss When Pasting Attacker-Controlled Data Into A Contenteditable Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881666" id="1881666" title="Cve-2020-15678 Mozilla: When Recursing Through Layers While Scrolling, An Iterator May Have Become Invalid, Resulting In A Potential Use-After-Free Scenario" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881667" id="1881667" title="Cve-2020-15673 Mozilla: Memory Safety Bugs Fixed In Firefox 81 And Firefox Esr 78.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4082-1</id><title>Squid</title><description>Security Fix(es): 
* squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) 
* squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) 
* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) 
* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) 
* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) 
* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) 
* squid: Improper input validation could result in a DoS (CVE-2020-24606)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.4" src="squid-3.5.20-17.el7_9.4.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.4.x86_64.rpm</filename><sum type="sha256">8b1a3a2a254b270fd04a7dd2f33021ff52c0e5a558ad766f1130305e0b5229c8</sum></package><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.4" src="squid-3.5.20-17.el7_9.4.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.4.x86_64.rpm</filename><sum type="sha256">ecd073112bc98e8306973eadf51161a824607ae734f6035cf67e1d6b648e4b1c</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.4" src="squid-3.5.20-17.el7_9.4.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.4.x86_64.rpm</filename><sum type="sha256">23e389475386958ead15f709c786b5aef35748f47648d7ef0fb23fcf0b218c67</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12528" id="CVE-2019-12528" title="Cve-2019-12528" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15049" id="CVE-2020-15049" title="Cve-2020-15049" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810" id="CVE-2020-15810" title="Cve-2020-15810" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811" id="CVE-2020-15811" title="Cve-2020-15811" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24606" id="CVE-2020-24606" title="Cve-2020-24606" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8449" id="CVE-2020-8449" title="Cve-2020-8449" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8450" id="CVE-2020-8450" title="Cve-2020-8450" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4082" id="RHSA-2020:4082-1" title="Rhsa-2020:4082-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798534" id="1798534" title="Cve-2019-12528 Squid: Information Disclosure Issue In Ftp Gateway" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798540" id="1798540" title="Cve-2020-8449 Squid: Improper Input Validation Issues In Http Request Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798552" id="1798552" title="Cve-2020-8450 Squid: Buffer Overflow In Reverse-Proxy Configurations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1852550" id="1852550" title="Cve-2020-15049 Squid: Request Smuggling And Poisoning Attack Against The Http Cache" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1871700" id="1871700" title="Cve-2020-15810 Squid: Http Request Smuggling Could Result In Cache Poisoning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1871702" id="1871702" title="Cve-2020-15811 Squid: Http Request Splitting Could Result In Cache Poisoning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1871705" id="1871705" title="Cve-2020-24606 Squid: Improper Input Validation Could Result In A Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4163-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) 
* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) 
* Mozilla: Download origin spoofing via redirect (CVE-2020-15677) 
* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.3.1-1.el7_9.src.rpm" version="78.3.1"><filename>thunderbird-78.3.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">8cb9469cd9c20428bd5bf8d36bc3fc27f29a59bb3479ebc96ab319f2ce2aabdb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4163" id="RHSA-2020:4163-1" title="Rhsa-2020:4163-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4187-1</id><title>Important: Spice And Spice-Gtk</title><description>The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol.

Security Fix(es):

* spice: multiple buffer overflow vulnerabilities in QUIC decoding code (CVE-2020-14355)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-server" release="9.el7_9.1" src="spice-0.14.0-9.el7_9.1.src.rpm" version="0.14.0"><filename>spice-server-0.14.0-9.el7_9.1.x86_64.rpm</filename><sum type="sha256">30ddab719cd3bda859be66754d7d019ffca626947b292b067a2a72dfe1a01a6d</sum></package><package arch="x86_64" name="spice-gtk3-vala" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-vala-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">262d414824db1a2bb0e8ee584ec73af35c3c7db6055033e89edc18aa4fd668a7</sum></package><package arch="x86_64" name="spice-glib-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-devel-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">5668c3958f2bd0877b5c7434b6ecb4978e0477f7a16563bb3bfa182819435de7</sum></package><package arch="i686" name="spice-glib-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-devel-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">6b893540268d67f008da133de195375193a3762a0d193247364e5d35047c66ce</sum></package><package arch="i686" name="spice-glib" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">9e0dabdc7afa3624b57a12126fc0ce4332d48a001957581c671df2452588e965</sum></package><package arch="x86_64" name="spice-gtk3-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-devel-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">f1e2dba59dec195d5ab66ee51017e2c82d0f693d1da1a486030708b353c79849</sum></package><package arch="x86_64" name="spice-gtk3" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">1d890fc3d9e7b196242546c79cfd32d16da1136b607656068dc6e494ae0432f1</sum></package><package arch="x86_64" name="spice-glib" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">27dac680038754a54a867169760f0bde6a9c0de366c074ba11a3316893bd5e83</sum></package><package arch="i686" name="spice-gtk3" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">2ff0e30297f5cc7bad06deabaf27e3f4358401c3cdb42dfefd2a15d7389efe5a</sum></package><package arch="i686" name="spice-gtk3-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-devel-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">ad0df4223041cd1c29b64383f16fc2695653d6501c31ecb9bd9dce0994238855</sum></package><package arch="x86_64" name="spice-gtk-tools" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk-tools-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">a689d51b6ae85dbbd313c4dd9733e45ab054009104bfd8cdd4f53ddfabe8f7d0</sum></package><package arch="x86_64" name="spice-server-devel" release="9.el7_9.1" src="spice-0.14.0-9.el7_9.1.src.rpm" version="0.14.0"><filename>spice-server-devel-0.14.0-9.el7_9.1.x86_64.rpm</filename><sum type="sha256">2b766e8ccc48003a1738820137238bc972b83cc48a6c1295d680c105fd7a51ad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355" id="CVE-2020-14355" title="Cve-2020-14355" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4187" id="RHSA-2020:4187-1" title="Rhsa-2020:4187-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868435" id="1868435" title="Cve-2020-14355 Spice: Multiple Buffer Overflow Vulnerabilities In Quic Decoding Code" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4276-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351) 
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bpftool" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">47cc98d79612c44ee4c50be036ff1202c827bacc377befbbe255b5e964fe5134</sum></package><package arch="noarch" name="kernel-doc" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.2.2.el7.noarch.rpm</filename><sum type="sha256">727a63e696b987d5633e3b1f12ac7506e0e6c8de8afa32f85e45451effb2aff2</sum></package><package arch="x86_64" name="kernel-headers" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">da5331ece8f1ff9c937d00d93ec8c1c92274df24d1e7b195011c9bacea3a120a</sum></package><package arch="x86_64" name="kernel-tools" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">222d55b53701eb15e5f6faff4c9efbb061f6c50214ccab31f16c010eb3cc958a</sum></package><package arch="x86_64" name="python-perf" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">0dc203103a8e108ebd3e9035912ca0c3c036b2495e563b21611cae6ce04b9ae1</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">243e81730c77eecf1958dcee6298e81ed0a91814ebcc940f777ac975caac5142</sum></package><package arch="x86_64" name="kernel-devel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">e6af572c94419b586d36fa4592d7f067100928b0977cab2367d22cdaa053678e</sum></package><package arch="x86_64" name="perf" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">4f8c8280a6df9babc06d5b037f4e9892dd15a5814df3794afeebae843de1661e</sum></package><package arch="x86_64" name="kernel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">6c14fb888501068824f2ed38908bb795a5dced8da3ca3a110e10b291b79084b2</sum></package><package arch="x86_64" name="kernel-debug" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">95227e1a8230974169c9b94c54634753c92c01eff32a5387731e006b4dceb4f8</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">8fc5c8d4c4b9c8824a39c471e5b7b1a7f2fbb955875cb93ee8ae5f2aa389bdb9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.2.2.el7.noarch.rpm</filename><sum type="sha256">7a19019424a7b2bb7896b09adcc4e479eb6d809b7efff3d1e9387fa579f96b3f</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">545d852acb5f838546dd9015a7c2dda4a03847b8fd77d35373ccbfd1ee6c50ef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4276" id="RHSA-2020:4276-1" title="Rhsa-2020:4276-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4307-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) 
* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) 
* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) 
* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) 
* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) 
* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) 
* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-static-libs-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">7773fe9ab00a5e8c1fa37599c574b80af7c1ee660b6c99e28a71207d48ced107</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">785df6e2691fd683771687fa700cff34019c9eb04cb47b8889d6ac893bb37be1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">dfdba17e9f0906b0f52585265c332e327a2a82f69723e8751c5d44cb735adb16</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">4bf919398968b3130277688dc7cfcfa05884ff3075f03a968b2483ee714a7a92</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">27f5b0fbd8d539fab8c1a4ea03126541add9095f6eb6a5117f17e91a5e89b81f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">fce83dfde7f0630f6f930fbd5397f0bed2fb0aa112ad8a717766dfe72382a090</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">00d0710ee0f2d7fb402b45cc52980e660c7fd3c073124f5ab8d5a8c8fa1c05d2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">7aaee6e13b69540fa095cf098931f029d21869f2f620cf21b8e04d1ffb78126d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">b357ecf4582909f59a3c364cc226ee82afe3b3a1ff6f4640abd93163eabf7b9b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">a00bf0b70968ee49ec3a963c94ad6ae7e3aec54b16592b9af8a7b6aae4165507</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">e454ea47a65bf2a519a48a11562b81125f4879bea34a5a8f3f06a7ad1fc4dca5</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">fd1c5e53b94b26df626a313c7db3b0c152f8ce9de178876b29ab259269b42341</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">7646e5a15007012257dae0968a551100a2a1097760531d183b8028a02d41ea5a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">6d036817e9eff8bd9ab8b2c6579e62b1bd65e5d6deb3e63e7fcb1ac58d17f54d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">d62dc9f69a52e7342d29a506d12f244ff1ed71c35bb9d98e9463b80896699839</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">843c4d95590a7a3f422307ecad5a20705513c70ea54d3c384ba0499e4423bb80</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">a34d858422fd29ddaeca302b07a4ae044c1df031e7fbdd9e85d80405ebd3d84e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">14b2f5753b2aaa759ab0f96933f8ce6e26c91b6edd91a5545d3a2dd3ad39490a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">d6208d100a97ed19eecc9f95cca5ce4d7f635c6c4caff6805a86b34dfde8bad6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">980fdd5684afb67ba596416cd0ddb2883f0957474269e36b86e5063a43855b6f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">3c57bd28c1411992c646173d8a33781d72a541ea82d98483398fef0793276115</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">c7c73df4d3bf0a3af20c68f89b944f55df8ac09ab84cb4c16c5e4b53cfe48317</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">927bcc99f1a34ca8fa03cdcd6e6adacc2443d4d20ed3a66350d6f330620c64ed</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">8996bc1bf68f25eacd32125341f0fd1650b6e1ba3a7d482c77bb348c58f2a45d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">9463ccd7aefcf1ab73ae5fe04106befaeef8b28a0366ba35b2d03dc604f29bbd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">f996fcb1bae7301ace4b33f230c7237d608983c1b357c30b92596293af396be9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-static-libs-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">290b0863990ac66b00fb4083c4fa0cd5652aa7dd425b6d7d0125f55add12540b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">7406a9cbd48f8589fe8d021f10a10e13087b1d25ba804f38899e45af24af7648</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">60c79a1a8ead07a961e19e44366f566b078c1e072ed131ca67b8fb8e4c449df0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">75b390535e29603b8704b9f7a10850d6ec91bb8513c78638bf71dac9dd29c4b0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">cf2e2b4b7d6b2a08ececc865b2db978d4c8ac3e5ab27bc1bdbb22628d6badc00</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">976242e401e45c3996fceab5cdac2d634b5b8fe950e37f1702b881557951ef71</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">2dea15a7b85e8b1588d2903733f00dcc9f960170d0e46d94cbb178e847b5205f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">8f33384eb89293e170cc12a5699a793ea71f7d2bd7b116da06375d6a8062449d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4307" id="RHSA-2020:4307-1" title="Rhsa-2020:4307-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4310-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) 
* chromium-browser: Use after free in WebRTC (CVE-2020-15969)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.4.0-1.el7_9.src.rpm" version="78.4.0"><filename>firefox-78.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">0f7cecb12ce176dfe68f58e23a8658f885e895967d328d6dddf495a467874d40</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.4.0-1.el7_9.src.rpm" version="78.4.0"><filename>firefox-78.4.0-1.el7_9.i686.rpm</filename><sum type="sha256">5368bac75f97a694f3d50cc99544bb65499f5d8bc09af1b0212e2a7b49b5590d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4310" id="RHSA-2020:4310-1" title="Rhsa-2020:4310-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4350-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) 
* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) 
* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) 
* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) 
* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) 
* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) 
* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">8e53e8a1970a57d292b99eafb9991e560ec8637365609a3beee02c75712490d3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">84315cb088343d080c977e86a915e6409155b31470e1dd809df045148936bf74</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">19c42b5702f1772fb858a7dd625a9b7b25ae36a5a446343251b25d688f52344e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">1aa199552998d535623ef176edb0599d6e3ce6ea5c2b304c46e91633ca9c42dd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">291c256aaa593a5b2fadc2c71892cc2cfd49cac62877de65c4d7333d6d1e2766</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">11da3b9851328b21be471ff58700b9b2f5bd82687423bb4aeff49ad5fe74bde7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">0166f48d73f52d1b4960002169d5fdc6a3bc2dee12fb8cd565131982b16df6ac</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">23e32a42c36201c41a19045602fe6a68c373dc8a114ceea2847e3ff69c95af67</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">427823d292ddc2e1912dbc3efd235617a03bcc39f55eb6ab6c73999879440526</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">de17e98792cf998ea57892d253aa9a014d87b676323cb00ffe23ffc808a855c1</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">2fff35aad1f8f8087da29e944b74e864cf77a51390c4b6a8da086ea967ffb7dd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">3e2f48307168177298cebba77c02b2add7e979bb11604f1884e6ac3e5c7ae81b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">75a2baf703633777a09a0843420f231b218fb5ccf667034b9217546011a5f1f4</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">e6a43a8ce33d46f21008e0f57a5e9274718a5846f796b6fd574fd749ad0cd256</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">e4ff55c6a3974510ed0d5a27e453efe217672a67b02dcaf63899407789e101aa</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">9652581e291a509533b2e4ee788ace94e553dbaaeee77f9bea281899d9280f6b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">cb363849f85f163f11d69c5721b4171bae4f79393951dd15de33b722872d9d0c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">944ae8a673c37a87563b11c7a02b258b99e4ee270605ef31999f3e742fa7b203</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">f69ec149f70f7f866239649eb6f5c5a4c0b8fd826fc431f07b08aa8d93a3c054</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">c32d7e9e4972acc71800876a40238760a778cca2fb2c037511180e03720602c8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">5f035231f2a2dfb229860b0c91dac5dc62d9fe8e22f095fc467d08875dc80a5f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">d16c13b69c6aa06ee4183431a1edeb59292c109ae4c060ae4ad634d8edca96e3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">daaa6fd0a3d4bacf1db37e863d92ecee085d896317a68639f52ed55426d1581c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">42bf03a22cc2276874f1429ebc2578e1c28675d80ff51a26adcfca2400c960fc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">ccb82da1647e57bbc6d08fdc599b42fd105616c8daa1899f3729ea126caa883a</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">9a8f96cf3e2853d9be82443633e43a8e6e6272b20a9c2d38fbb40f4621c941a5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">787f313e98da032ef62f0dfb22807715b5919725bb31240e48f28826aeb1b884</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">4b751ddb7f6a4e3be1a7475be83045a254e457b2320ef35a477e8aa79e0c7eef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4350" id="RHSA-2020:4350-1" title="Rhsa-2020:4350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4907-1</id><title>Freetype</title><description>Security Fix(es): 
* freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png (CVE-2020-15999)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freetype-demos" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-demos-2.8-14.el7_9.1.x86_64.rpm</filename><sum type="sha256">4bfcf2c7e50e92c1f2d9409f26c5831b3896ec5ce1f8e47ffa61da84870812b6</sum></package><package arch="i686" name="freetype" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-2.8-14.el7_9.1.i686.rpm</filename><sum type="sha256">856e5771864d72fc764d1a8042323f58fa6a121257e801239a8283d4034dd58c</sum></package><package arch="x86_64" name="freetype-devel" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-devel-2.8-14.el7_9.1.x86_64.rpm</filename><sum type="sha256">a55d3145c81d7f556319415342886d99a289c7a2c055ff488a8e8ec4eaeb56c3</sum></package><package arch="x86_64" name="freetype" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-2.8-14.el7_9.1.x86_64.rpm</filename><sum type="sha256">0a2506c221bec596a80aac2b5f9956724acd36ff358e33a36d7a72ab9028ed34</sum></package><package arch="i686" name="freetype-devel" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-devel-2.8-14.el7_9.1.i686.rpm</filename><sum type="sha256">b490be3e3b925087ecd0ba1133a0fb1f6d84b413a04d69e80a0a3c4040a6d12c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4907" id="RHSA-2020:4907-1" title="Rhsa-2020:4907-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4908-1</id><title>Libx11</title><description>Security Fix(es): 
* libX11: integer overflow leads to double free in locale handling (CVE-2020-14363)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libX11" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">6e8e14ca7f672249ccf93b21f9a05353d9f869e8c9e82c21e193d279eacf068d</sum></package><package arch="x86_64" name="libX11-devel" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">f19a029ec329dc1e1243c645ea26b5a7f62dabf74c5b549969d58b13561ffacd</sum></package><package arch="noarch" name="libX11-common" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-common-1.6.7-3.el7_9.noarch.rpm</filename><sum type="sha256">381c93461e119984e0434b571d08714051e8aa858e2e2094b1bf2d0d1edc6d75</sum></package><package arch="i686" name="libX11-devel" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-3.el7_9.i686.rpm</filename><sum type="sha256">1dde8930cae65481b398449efa31c5cfb59d23826f5fa96d9e52cb282f70b99f</sum></package><package arch="i686" name="libX11" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-3.el7_9.i686.rpm</filename><sum type="sha256">fafea10ff0634bedb1da4a7f7bd5dc1d0ac3b3d282e8c0db6348a5cc6311c657</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4908" id="RHSA-2020:4908-1" title="Rhsa-2020:4908-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4909-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) 
* chromium-browser: Use after free in WebRTC (CVE-2020-15969)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.4.0-1.el7_9.src.rpm" version="78.4.0"><filename>thunderbird-78.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">25bc3fd79765278178210c5f457310376fb4fdc89b63a3716d1622c585ef860f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4909" id="RHSA-2020:4909-1" title="Rhsa-2020:4909-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4910-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) 
* xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) 
* xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) 
* xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xvfb" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">f6838ab4d46d3054257b828a7aa09da6f020cb48bf424014e1be418934f66c74</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">59a891a6804e0ea057830bf640a4a7e10fd3488c6fd198af5ff0ccaa60ebafdb</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">5b1c4f1a7d447b4905e86e7f92cc9afe83d803cadacd5e87d2e0cbf650f0f8d9</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">09033bb3f0b3195c416ec4fd68f5def0470d5a45fb96b8ac599fcf8db93c9ec5</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">e030ba439f9e18e27c1304a0037acde04069f35196f4d1edcb1e520ebb5b9a56</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">9ebc5b0228dc8be2571033eb26e2cb3cee0ac8bb36f72b7366734efbf3c25748</sum></package><package arch="noarch" name="xorg-x11-server-source" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-12.el7_9.noarch.rpm</filename><sum type="sha256">a61f91a5c7e074ebe99958241cf0e74824ed077b38d3eed8ce45ade8cd175ae6</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">10e5862388d8b6540d5d679da3bdd3164dcfd8bf2f7719cdbabb6921943bc62b</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">36769b74f79e05de43a4c183a16bcd665b4d5c8e9015f7bcebdbfbbd472521c7</sum></package><package arch="i686" name="xorg-x11-server-devel" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-12.el7_9.i686.rpm</filename><sum type="sha256">91ea49af08c78dbd43a08054b978fc8c15fed8ff793db9324e1388e9f68989d4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4910" id="RHSA-2020:4910-1" title="Rhsa-2020:4910-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5002-1</id><title>Curl</title><description /><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="curl" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>curl-7.29.0-59.el7_9.1.x86_64.rpm</filename><sum type="sha256">ba54d7541f99b9c1b96d3b33b9c2e18d90849d7cb66887cc3a1bc986b7c7f482</sum></package><package arch="i686" name="libcurl-devel" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.1.i686.rpm</filename><sum type="sha256">5807aead12a31810010e2917c43ef8bc265f212fb924fb1601e9ccf1704807d8</sum></package><package arch="i686" name="libcurl" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.1.i686.rpm</filename><sum type="sha256">a1e0db291e8a9c734565c398e9a27b6c860183f135ea3a9d7cc5c228584dd083</sum></package><package arch="x86_64" name="libcurl" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.1.x86_64.rpm</filename><sum type="sha256">10d4a066a84d6742cd80208aa0113d24ee91fa5f9920eb44afb28547ed632f79</sum></package><package arch="x86_64" name="libcurl-devel" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.1.x86_64.rpm</filename><sum type="sha256">498795c1e33bc252ef6ba34b65cae08deff1823ffc0ba48263b049e343cea197</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177" id="CVE-2020-8177" title="Cve-2020-8177" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5002" id="RHSA-2020:5002-1" title="Rhsa-2020:5002-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1847915" id="1847915" title="Cve-2020-8177 Curl: Incorrect Argument Check Can Allow Remote Servers To Overwrite Local Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5003-1</id><title>Fence-Agents</title><description /><severity>low</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="fence-agents-amt-ws" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-amt-ws-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">19c1b59f34566a07a680e1125699a5601016c4f319a0b75705d98377c2492973</sum></package><package arch="x86_64" name="fence-agents-brocade" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-brocade-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">f02e59eb643f3e54fc7b389da7546ae132453de6cacbde4abbd99385e56ea2e5</sum></package><package arch="x86_64" name="fence-agents-heuristics-ping" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-heuristics-ping-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">94d69c86f62a895488c9b506d6f5cfae82631017a45cb41c0ca9c35c8e1d215a</sum></package><package arch="x86_64" name="fence-agents-aws" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-aws-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">625fa195bf09fd0b2ff93c606f5a10b4b48607c4e7c658eef69c693e2a4349ad</sum></package><package arch="x86_64" name="fence-agents-ifmib" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ifmib-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">f8f38967fe30cdad7aad67901ffaa6bf47b8469b46d6c0e1e3d11aaf7afee7b8</sum></package><package arch="x86_64" name="fence-agents-apc-snmp" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-apc-snmp-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">5a6ed6aaba21a98dcdd9f4401143fc147a0c989312f25d7cbe1db6834b413402</sum></package><package arch="x86_64" name="fence-agents-cisco-ucs" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-cisco-ucs-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">e80734486c4d4890d8320ff21ae677068bca71fe5fe2ba91ff0f5829b4940c1c</sum></package><package arch="x86_64" name="fence-agents-ipmilan" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ipmilan-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">ecf3927df5579f5a536b62f71366d279a3915439e331cd613df65b75c8a8ceed</sum></package><package arch="x86_64" name="fence-agents-emerson" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-emerson-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">93e973edf16a36d9dce880b159f61ff25e2e8ec26970ea2a50ddf29bc65f9b54</sum></package><package arch="x86_64" name="fence-agents-eaton-snmp" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-eaton-snmp-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">87cf4a8df3796539e14f2e45e097ddff5962023dab57efce4dae747dc8706a87</sum></package><package arch="x86_64" name="fence-agents-bladecenter" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-bladecenter-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">97effd14d1127ea087f512a63b22ed75bec9dc9b3cc841f314ffca633bd5a723</sum></package><package arch="x86_64" name="fence-agents-ipdu" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ipdu-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">06e39bab1ee277ae744255675cfbb44271fd3f3c903323f1a0917f1f7c322f14</sum></package><package arch="x86_64" name="fence-agents-ilo-mp" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo-mp-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">9d8ff4d2b0dd185e45ba025d522050a6642a47d963f089b3d899c3e757e15ec8</sum></package><package arch="x86_64" name="fence-agents-eps" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-eps-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">acda91e12e2d0ac30de4dcf54773de27a5ddf0d8d2c59ac643733ef5d7d0d725</sum></package><package arch="x86_64" name="fence-agents-compute" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-compute-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">b1a61cc6f553521b7e4e4056b66462718b8e5b59466f1ea3d18c75603bad5cfc</sum></package><package arch="x86_64" name="fence-agents-hpblade" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-hpblade-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">21d3e84059bb8d99d386f4e742374915338e840d53b783e2f45c5bca9fd43138</sum></package><package arch="x86_64" name="fence-agents-azure-arm" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-azure-arm-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">1d8b493c7e010d1bebcde306db5209fddc3e122f7ef2ac1332d13fd044061e9e</sum></package><package arch="x86_64" name="fence-agents-aliyun" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-aliyun-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">decc5ac47e2f630fffdbb821ca6ebf7b38269bbae0565bb8410589351ba59a31</sum></package><package arch="x86_64" name="fence-agents-cisco-mds" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-cisco-mds-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">02a116fb8545da6c0b78a4c1122e6aa029ed2baded2336a6539bd3744f282103</sum></package><package arch="x86_64" name="fence-agents-gce" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-gce-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">6d650ff5a7bc1d93d552eed702fb8ff4af0e255a6e012e1ddb3971204bc91755</sum></package><package arch="x86_64" name="fence-agents-redfish" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-redfish-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">07122c2fadde5f1434def7ae61dd0550c73eb7309b3f87b309c0a2991b14b217</sum></package><package arch="x86_64" name="fence-agents-vmware-soap" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-vmware-soap-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">afac04d76ee59901927a64348eb93e4ea0c48a164cc0e2029847e8b26edc0ddc</sum></package><package arch="x86_64" name="fence-agents-kdump" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-kdump-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">8d6a4bc8e0c2082f7bb2fc692d41ccd385925ae94b94fe095591a846c940c7ce</sum></package><package arch="x86_64" name="fence-agents-rhevm" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-rhevm-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">798e4abc8535513ab7c780003067d0d787535100f412f57adad927899771c7c9</sum></package><package arch="x86_64" name="fence-agents-rsa" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-rsa-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">891ca7ba40226f9600a88b4c203b435de729c7aad318c3d08794bf769091c792</sum></package><package arch="x86_64" name="fence-agents-intelmodular" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-intelmodular-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">9d4cf92a8bd0efc8af62ffa59e709ac8ea92a414e65d08dcb1915cae96da714f</sum></package><package arch="x86_64" name="fence-agents-scsi" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-scsi-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">17c615fffd7a175d4158fe6c35728dd9b713c112f9e99529fc0708769b90fb70</sum></package><package arch="x86_64" name="fence-agents-ilo-moonshot" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo-moonshot-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">7a5a2b4de31ed4b73eb64ea6166a28dca4bc14a5a6ed7d2ac80c8d1e5e18260a</sum></package><package arch="x86_64" name="fence-agents-common" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-common-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">3113ef7fa8701385c7a5c6f61e717ac7835c22d5799875b014af41ab19820f98</sum></package><package arch="x86_64" name="fence-agents-wti" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-wti-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">c68f45aa1282b59a0f376da3c37f2f012d3bae05ea7c9c38c304b04359cb989e</sum></package><package arch="x86_64" name="fence-agents-sbd" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-sbd-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">7d1d59df509363d91c0363179db6fcc242c229a2d617512faad157605bb5b391</sum></package><package arch="x86_64" name="fence-agents-drac5" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-drac5-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">39f494fb8d21bdde0e273d8a4c3110f811ba071cf2e9bb1a137ff0bc70799f05</sum></package><package arch="x86_64" name="fence-agents-mpath" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-mpath-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">77d14651c7a89a3873fcb841320bc6c4f37aa9bbcb4b118c292899eb16afad4b</sum></package><package arch="x86_64" name="fence-agents-all" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-all-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">af1d5dde503828705086ed1cfd537bafb76e83b568ad1063e3ae8374cbe99153</sum></package><package arch="x86_64" name="fence-agents-rsb" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-rsb-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">b4ddaf6fcca6625e8b557cd3c7de1d0a230f23a22a0888d793ab0b0ebf9dbb48</sum></package><package arch="x86_64" name="fence-agents-ilo-ssh" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo-ssh-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">57abe5040417b44ca1df4883b214df169899cfd1775a2d76c76389f600741506</sum></package><package arch="x86_64" name="fence-agents-ibmblade" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ibmblade-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">c3cf909e55970318c1441c421986aace5355b213f0f27fd605c1929384f6d03c</sum></package><package arch="x86_64" name="fence-agents-lpar" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-lpar-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">b268844e144424fb2899eb26e623c12278f50a473077c04f46012cb21459cc7d</sum></package><package arch="x86_64" name="fence-agents-vmware-rest" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-vmware-rest-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">9cfec09f827118a1a090fd807df6f879dc8c0c728d097cdc1c32225d4d967a25</sum></package><package arch="x86_64" name="fence-agents-virsh" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-virsh-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">68430c1c9dd9c303ef148a63c8ae963e773a7baad7617607883d068bb71d43a7</sum></package><package arch="x86_64" name="fence-agents-ilo2" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo2-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">41ee415447647eed027bb185416b14ded13e68e705ac15690df996d2d3c48084</sum></package><package arch="x86_64" name="fence-agents-apc" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-apc-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">8d62c1b3065122e397a7cb931437908eee8860e1f8174171619a6fa1c01fe69d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11078" id="CVE-2020-11078" title="Cve-2020-11078" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5003" id="RHSA-2020:5003-1" title="Rhsa-2020:5003-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1845937" id="1845937" title="Cve-2020-11078 Python-Httplib2: Crlf Injection Via An Attacker Controlled Unescaped Part Of Uri For Httplib2.Http.Request Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1860545" id="1860545" title="Fence_Lpar: Long Username, Hmc Hostname, Or Managed System Name Causes Failures [Rhel 7] [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862024" id="1862024" title="Instanceha Does Not Evacuate Instances Created With Private Flavor In Tenant Project (Rhel7)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5004-1</id><title>Resource-Agents</title><description /><severity>low</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="resource-agents-aliyun" release="61.el7_9.4" src="resource-agents-4.1.1-61.el7_9.4.src.rpm" version="4.1.1"><filename>resource-agents-aliyun-4.1.1-61.el7_9.4.x86_64.rpm</filename><sum type="sha256">6741e110d07ae95142ad9c8ae7ce0b4ee1d84fa4d443de2263c0efffc0faea0a</sum></package><package arch="x86_64" name="resource-agents-gcp" release="61.el7_9.4" src="resource-agents-4.1.1-61.el7_9.4.src.rpm" version="4.1.1"><filename>resource-agents-gcp-4.1.1-61.el7_9.4.x86_64.rpm</filename><sum type="sha256">24113aaad452a826353ff1a9bb70cd501196a5e195fb1af3a339e6cbd1ab0329</sum></package><package arch="x86_64" name="resource-agents" release="61.el7_9.4" src="resource-agents-4.1.1-61.el7_9.4.src.rpm" version="4.1.1"><filename>resource-agents-4.1.1-61.el7_9.4.x86_64.rpm</filename><sum type="sha256">c655d13e0a6b3232dcb85372644ad9a0e41bd2b42ba00a1ed919d79f31a588f4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5004" id="RHSA-2020:5004-1" title="Rhsa-2020:5004-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5009-1</id><title>Python</title><description>Security Fix(es): 
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">4e752d78be10a3150e118f067de4a2c1741192fa3a1b1ccccc7cacb2a1d55ada</sum></package><package arch="x86_64" name="python-devel" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">6fb703ebfb6d07fc86aee57f61ebab154a48b3392f9099feb0f862c34dc60570</sum></package><package arch="x86_64" name="tkinter" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">d3887158f3657a31a93bb8a42b504368e58bd61a76a727d1c5d849cd123e8362</sum></package><package arch="x86_64" name="python-test" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">8d4fbc682f98395e2a3b2bd59bfdbc00148c0046f3a93674ef17515ecbd500de</sum></package><package arch="x86_64" name="python-libs" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">fbe061a1f6a0f7e4c2c206db5a149e0fbf9a5e07101a22c47f5850913cd6b10c</sum></package><package arch="x86_64" name="python-tools" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">028b8c625d2bbbc8ddba8669893ce2244b9c34d746b9cd2a11d853ff0de8a2c8</sum></package><package arch="i686" name="python-libs" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-90.el7.i686.rpm</filename><sum type="sha256">2a375c1e3a4738e095ec03be404443859dd6b779f5e580b5bc1eaf005734c925</sum></package><package arch="x86_64" name="python-debug" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">c2ff66a4cfe90e016335af67c6f9119b924f27fc10d839788bef5b13de7db1a3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5009" id="RHSA-2020:5009-1" title="Rhsa-2020:5009-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5010-1</id><title>Python3</title><description>Security Fix(es): 
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) 
* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="python3-libs" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">a7660e2a2f3125d61888433e08d9b119eabfbfee7814b5956f641daaac3d16e7</sum></package><package arch="x86_64" name="python3-devel" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">43aa3c0434b1412eae7822f4051ba310a53d1c3096d9758d21ff6652fbeadcc9</sum></package><package arch="x86_64" name="python3-tkinter" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">e10cafc4bd4ff0c1a0ddbf36d5c7fc9446fafa85804e1ae63c8410cfe65822f2</sum></package><package arch="i686" name="python3-tkinter" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">317fd91d642bdf926eca2d224aec7b948873ca9f78379436fb32cd2d01ac63d4</sum></package><package arch="x86_64" name="python3-debug" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">c533139272942d0922d04eb19a99e44fde769aa9f76a93c0cdfa8d9fa1497d37</sum></package><package arch="x86_64" name="python3-libs" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">17b2a06a86a63c0a24c38aca3f59357bb05f561bb409f13c8092423c0084f60b</sum></package><package arch="i686" name="python3-idle" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">a59689e48b4c5506ac5031f9d6a3c4f529576283504531c5c70e9439a8cf2d9f</sum></package><package arch="i686" name="python3-devel" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">38bfd095c97c53712cd65a01f6ec085a53ec6a7b043fad17da3a850a0584aeb8</sum></package><package arch="x86_64" name="python3" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">16d6911fd5e4e2d70be8d42e87fb416477baff5c313c3e251f010af76df67b49</sum></package><package arch="i686" name="python3-test" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">87478d3ab6ff72a3be98c75fcf0cf08a0668c71e8d030671ebeb7579ff5bfa7f</sum></package><package arch="x86_64" name="python3-test" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">1d09983f1cf741814abec6324ed5c1e8aff39a249e854538ac774ce447973e9a</sum></package><package arch="i686" name="python3-debug" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">aed68cdc24710bf3087d20dc03abb64dbff1a5fbd9d7fa002637558108e158a7</sum></package><package arch="i686" name="python3" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">7f812c3e6f365f2e84fdbac137a6976e42f0f3a5f5c1b5fa95aed1c0a784bb15</sum></package><package arch="x86_64" name="python3-idle" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">8d4219b8ff1bc224f28bd8ad7d6bfc5c993aead45dcda9bdb2364414a3984cf0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5010" id="RHSA-2020:5010-1" title="Rhsa-2020:5010-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5011-1</id><title>Bind</title><description /><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">6e55a724a60ef42a4e13b4bd0f32a3abf34323df4958482ae7662740d6d223bb</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">aac0b90e4609b7004d2027c64a3e27da3b92969c8fbad97d0d053f41f8cac10d</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">d473992a2a6512f6bd697e4200b71804f572691556f4c398170305cc7ec4223c</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">caea82264b0e1e6c343dccf95cc52f257fed2e135b0e15d4d3e5defbc810f433</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">ed3d5cbf0009188355cb6fe08fa821cb0bb6013b6b2f560c3c28a6053f4fc0b7</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">601f32234eb3bc2aaaa8c34b7b814bca3974368c5bcd14b3b20e3391075fc37e</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">f209b01442c24e01c0dbf9b26af008c58b811c96f758b2e58db3985146b10a63</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">568c85d08f58ab6c94e2f8dd086448b0295ba44be1669d80600c780dad7c1831</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">eec76e247d93cbd1f7a186b88afc0f06111d005d9a21e92861f98222488a46bc</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">dd0ef240b3a27a372f8677ad72902b7ca400c4d6d99a8949e123b8b7fd6c09f3</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">98c7ca6154305aeab368688f1c27a1e05fbc2de5e742b32ed3218bd7fc1f544c</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">35c0bd5b784f981951eb890d7e96f670a92cca814aafde0c84790be6f65d2a9e</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">b1435d0c8da81b0a72b274eca170649f9b76349b539f6421ab4a2687a8fb64a8</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">af95fc594e7fd389c1077dc9950675416f28bbfef92e60bb9d1db4e8054bad3e</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">ba84e4f9783f4a9c8e8d0314626d596326644b918391d562eab30c32a28f97be</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">2455b597f2205f173708218e701b1a898dfb109b1b3ff6a04e0808b2417d0fb9</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">1137d00e19fe5e5304f4beac20b234bf52ab2cd1df0f0aecaddf6936cd14d078</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">d6bd50edb212bde63536e11a4ca1a861fc56b7096b2ab4953614ad3de87381ca</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.2.noarch.rpm</filename><sum type="sha256">91a402777de0497989837c462b009b8a4c06d9536038f7b2ce28ab4003396004</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">adfbe5e8a9b3385e09f7c2e56341682c55a23e8fe1100868dd15e08d3e5dee34</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">a062858ee2760dc527dc773c645df312b22e5440d711a0bf9105450bd563815a</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">273e674dedfdc72bb0c9762512c41a5ed7c3323bc79888dfd46352cd41558ff5</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">b28870f9473211a5aab4761aaf1811a52d8f7d737a53892e03fb98700da4e032</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">682d4b7e4aa8fe2d2eee80929a26956290c764782a27195eaa18ddb39cbabe00</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" id="CVE-2020-8623" title="Cve-2020-8623" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" id="CVE-2020-8624" title="Cve-2020-8624" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5011" id="RHSA-2020:5011-1" title="Rhsa-2020:5011-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869473" id="1869473" title="Bind: Truncated Tsig Response Can Lead To An" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869477" id="1869477" title="Cve-2020-8623 Bind: Remotely Triggerable Assertion Failure In Pk11.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869480" id="1869480" title="Cve-2020-8624 Bind: Incorrect Enforcement Of Update-Policy Rules Of Type &quot;Subdomain&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1884530" id="1884530" title="Bind Stops Dnskey Lookup In Get_Dst_Key() When A Key With Unsupported Algorithm Is Found First [Rhel7]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5012-1</id><title>Librepo</title><description /><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="librepo-devel" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-devel-1.8.1-8.el7_9.i686.rpm</filename><sum type="sha256">5e9aa35a981d2840134692f84d2e65150bd03a045a1df0f2432b0c46f8e24f44</sum></package><package arch="i686" name="librepo" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-1.8.1-8.el7_9.i686.rpm</filename><sum type="sha256">54ac0b83a5980f0fe79f81d89bbc74511e224e96f3aa6acc5b69f30f2ba73f4d</sum></package><package arch="x86_64" name="librepo-devel" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-devel-1.8.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">842b884bcff0768ce4bcf18fafeb9f1ab99bd8d1e6249607717fa18cd58b9109</sum></package><package arch="x86_64" name="librepo" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-1.8.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">818449bd35f4147b579a34e08feb2b30eccdb473abe5bcdf6a069186449e303a</sum></package><package arch="x86_64" name="python-librepo" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>python-librepo-1.8.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">b29277245dc259c20968baf397c933cc0ec2a338941c8e11b46ac3d016d038b8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14352" id="CVE-2020-14352" title="Cve-2020-14352" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5012" id="RHSA-2020:5012-1" title="Rhsa-2020:5012-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1866498" id="1866498" title="Cve-2020-14352 Librepo: Missing Path Validation In Repomd.Xml May Lead To Directory Traversal" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5020-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2020-1935)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-admin-webapps" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">aa6977941c1bd2072e8fb52668afe505c2954183b66b3542044143bf50d5a61f</sum></package><package arch="noarch" name="tomcat" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">9278de0d20e9970c899c261f58a8f877dfda254c508e807a26543581b5f2a1cb</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">21603edf7a3c774277bf9bd700aa3094ba96a1202a280e3b47028eca16978998</sum></package><package arch="noarch" name="tomcat-javadoc" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">5cf6522a174594dc8829b733123119299d4b28d31cc1517b9ba363d2e1502949</sum></package><package arch="noarch" name="tomcat-lib" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">7b0ac0b8e2b581ecfcdd755f439d5d9f8d1177b580d36862164e42614f57befc</sum></package><package arch="noarch" name="tomcat-jsvc" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">ab625888831656616637f61767d19ed69855e9bc8b5613b1f2b21a614d4c9fa4</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">f32c86c05713f79a60c47dc334f63927ee9b7e4c2882a0ec800cf568da8d75d5</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">bae2181cfc1afb37bbb46b70c86db7759a895db94e4d2532e82885dec4ad6a76</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">6d36a3c8047de2d05a4432fb9e3a2ef78553a6a23865860d8490688bd4f34d27</sum></package><package arch="noarch" name="tomcat-webapps" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">e143514d193ed8743b67b9e1a19c66408778aa408d716b211c28a4e923a3f833</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5020" id="RHSA-2020:5020-1" title="Rhsa-2020:5020-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5021-1</id><title>Qt And Qt5-Qtbase</title><description>Security Fix(es): 
* qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp (CVE-2020-17507)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="qt-postgresql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">2f990625aac0eaefe277e1d90296642a9b1769a0ab847d974fc6286a24a7c032</sum></package><package arch="x86_64" epoch="1" name="qt" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">f465ebe6ef7078025b0aef2d83521766c0193731dd513dd340f86e97c40ad4b6</sum></package><package arch="x86_64" name="qt5-qtbase-doc" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-doc-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">2357df991d7653d7a563cff583d91c69ec6f2a4a8b540b12b8ec0fbe40647975</sum></package><package arch="x86_64" epoch="1" name="qt-odbc" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">be734a03e61cd155d5157f9293d70582a3dec56a806f6d159263e2e43df3453b</sum></package><package arch="i686" name="qt5-qtbase-mysql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">929dc10998613b29239d2d0c0df5ff67bfbf9ae456727ec0f4ab2ac7496a9f11</sum></package><package arch="i686" name="qt5-qtbase-devel" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">5ba87d3495269210ce50d1d1d8f9f85aca324920ec8afd356a9f1e264e0063ac</sum></package><package arch="i686" name="qt5-qtbase-postgresql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">0a15d3c8e425c94919803f505f5c16e79ee114bfa4a0728e8d6c5fea205dc7e6</sum></package><package arch="i686" name="qt5-qtbase" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">496b6233b011be7d3c40f8ca6ba7099784979e45792a5248866fd658d8f3e41f</sum></package><package arch="i686" epoch="1" name="qt-mysql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">a929b6861f8b6c71c5b8806107be20a35a566658b50f679f7ec99a516832966d</sum></package><package arch="noarch" epoch="1" name="qt-doc" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-doc-4.8.7-9.el7_9.noarch.rpm</filename><sum type="sha256">b1f0394efc9e9b5c449853c0a4b7985aa41366fb86f0b0a5b2a1a04c4a5e21bf</sum></package><package arch="i686" name="qt5-qtbase-odbc" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">39a8424c0f12bf955a09694a34d9d52554f1d69487bd25f7bfaefbea7eedf1c5</sum></package><package arch="x86_64" epoch="1" name="qt-qdbusviewer" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-qdbusviewer-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">c31cd6a5bc81ed156dc959959be0c07c9a77eae076fab9e71bd31c425dc9580f</sum></package><package arch="noarch" name="qt5-rpm-macros" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-rpm-macros-5.9.7-5.el7_9.noarch.rpm</filename><sum type="sha256">477f92195f9f353679121b03e73d2c4b1a890938adba3e8de175814c3c5b2203</sum></package><package arch="x86_64" name="qt5-qtbase-static" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">e6c9d053df810165e1f2ceed63ff22ffc9223f392eac16b7c0446017e7d8bad2</sum></package><package arch="x86_64" epoch="1" name="qt-postgresql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">149eaca53c75a7f7715efa7375b2df5b9e7825188b555992a4bd55aa0d3a4b6a</sum></package><package arch="i686" epoch="1" name="qt-devel" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">9e89c257e4ca088f35aaa05d178f8fc7500e8aad245912921618dfad3c3f4539</sum></package><package arch="i686" epoch="1" name="qt" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">99a1970527986d3b3cf24e7c62f6b13abecc10a37afb1d5185e37f5913043a19</sum></package><package arch="x86_64" epoch="1" name="qt-qvfb" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-qvfb-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">7c7dfcdb90154564be2c0bb73e0c60527fa1e3293115df89d59dccc529ee1f6d</sum></package><package arch="noarch" name="qt5-qtbase-common" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-common-5.9.7-5.el7_9.noarch.rpm</filename><sum type="sha256">1bd4ac9a033b7f25c252543ac7663d0b33543e34b8cc11b6628e6a2535a5ac84</sum></package><package arch="x86_64" epoch="1" name="qt-devel" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">5d24d57c02883634e33c1d9ffb5ce1b6fcb0159ad1c355eb3d49db7b325628f1</sum></package><package arch="i686" name="qt5-qtbase-static" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">f9be3f2d2203d1e2fcca65c02e36c78a22cecb1f9e11d8585ff624120f847bcb</sum></package><package arch="x86_64" epoch="1" name="qt-assistant" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-assistant-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">cb546610e2a63c8897ebbae15c0c09c5df5dd8cfc8339dee8a9697fc5b98567e</sum></package><package arch="x86_64" name="qt5-qtbase-odbc" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">ddd010fb1e2ac6f97354294d8f0b4fabbe246258d2ee3a8ebd278813a1382fd8</sum></package><package arch="x86_64" name="qt5-qtbase-mysql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">c0e467fe03493409c25efa83cd410e575e50bf5efb6592d7548fdc194873c39d</sum></package><package arch="i686" name="qt5-qtbase-gui" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">8410d859b7b9b6895b658d281e39f178f170fffb144fa4a96cf695b8d3f181a2</sum></package><package arch="x86_64" name="qt5-qtbase-examples" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-examples-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">fde83ba6b73398217a03eacb43561b1efe091402f0e46c8bafb7b2c39e129ea1</sum></package><package arch="i686" epoch="1" name="qt-odbc" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">266ec15244d156419688218c64525e94997973c67cd35fcd430cf705691701c9</sum></package><package arch="x86_64" epoch="1" name="qt-examples" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-examples-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">eafba1d14ae64d4274b6c589e86ec5469654769e36a98ad2c045e854c79d627e</sum></package><package arch="x86_64" epoch="1" name="qt-mysql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">c78b158f03cd6cd903729cce4953053c132ef22fa81777395da63ea4fbfae809</sum></package><package arch="x86_64" epoch="1" name="qt-config" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-config-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">4fd2cea00c844b2380defbe708ee6002c8a61625f882effe9faad668f8946803</sum></package><package arch="x86_64" name="qt5-qtbase-gui" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">1bdf02c469fd8c928c5f7bc4577cf91d538e5948c64d99dd3cce9717fa353a08</sum></package><package arch="i686" epoch="1" name="qt-x11" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">998752272c7d54ce4a591d170f4f8197ef8c7a373c5ca88230adb00b199eb56a</sum></package><package arch="x86_64" name="qt5-qtbase-devel" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">f88198b4c90ff9433ca2a2051df7211a64a455f9d78a234769c486c9986ac744</sum></package><package arch="x86_64" name="qt5-qtbase-postgresql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">c666834945473919c0e820375fc1f95feb723453ddab373bc21413acf4056d0e</sum></package><package arch="x86_64" name="qt5-qtbase" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">4e32bb93412d4410552a25aee3725c4e54e83cde7570a39112c0fd22c91467f0</sum></package><package arch="x86_64" epoch="1" name="qt-x11" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">e6d8cf8f67ced43c167000c58fc99685d0279f60bf240565e821ecad0c1f67e7</sum></package><package arch="noarch" epoch="1" name="qt-devel-private" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-devel-private-4.8.7-9.el7_9.noarch.rpm</filename><sum type="sha256">5340530c5e9e64293ae99b4eec8571eb6b5bb68e23ee1e54c806ebf25a337ae1</sum></package><package arch="x86_64" epoch="1" name="qt-demos" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-demos-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">b138388f394bccf5081a71cbfe11077b9d1293aab2cfabbc8d645e828dd2fd00</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5021" id="RHSA-2020:5021-1" title="Rhsa-2020:5021-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5023-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: buffer over write in vgacon_scroll (CVE-2020-14331) 
* kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811) 
Bug Fix(es): 
* [OSP13,mlx5] SRIOV VF still sending traffic when PF is down 
* gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk 
* GPF panic in qlt_free_session_done+626 
* [ Brazos ] "Core(s) per socket" and "Socket" values are interchanged in lscpu output. (kernel) 
* megaraid Aero: call trace observed during reboots 
* Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool 
* The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced 
* tcp_fragment() limit causes packet drop under normal TCP load 
* ip link command shows state as UNKNOWN for MACVLAN interface 
* Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug 
* [SL-7/mlx4]  ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] 
* Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV 
* kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome 
* Null ptr deref after nf_reinject-&gt;nf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct()</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">fa43ac3b28b2a8ab4caaaff4c501aaa62eb34f17d175b59668859842a2dfc67b</sum></package><package arch="x86_64" name="kernel-debug" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">be5779f6ededf4a8c550a4c6ed791e39823ebd7af2ee0aefa2042ae67ebb33da</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">ae5303acd4a7d66ac9451fd20e8165b57d9049c0ba2c78c5447419aebc511406</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">6f1b80feb6f65d1f20927fce25cee1c4070164eeb39a4e0247cf7cafa574fffe</sum></package><package arch="x86_64" name="perf" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">e8d3cf4b090395d832d9b94609de61cc6e05b8882aaa11c0bce3f2467bbee963</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.6.1.el7.noarch.rpm</filename><sum type="sha256">a22cea3e44550afadd16969a5e1e921fcb265865c06e12a02f28a45048c6c12c</sum></package><package arch="x86_64" name="kernel-tools" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">35379a584782bb5df8ca0f8ce2d9aeab27ce17bf5c63d748d6cf49a2f4686b08</sum></package><package arch="x86_64" name="kernel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">b8a8c00cf831a57b9ba0ddcc51dda482b846d42992c80ae25b23f54429b4a697</sum></package><package arch="x86_64" name="kernel-headers" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">b5cf9d49c2f50a57f515fda688ac10e942090ce5336eda682507913e9cc6692c</sum></package><package arch="x86_64" name="bpftool" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">eb459b8bea04b524153136161e04a74bdc58d71fbbdcecf2c5312c67abac7349</sum></package><package arch="noarch" name="kernel-doc" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.6.1.el7.noarch.rpm</filename><sum type="sha256">56f33f85d9f3a92f5b629f9b0e6533bcbba80e6aaf7636c660214210f6313ade</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">f70f095585c8e87bfadb97237bf57c2bcab6d063838b2de7ed3e3bd6b07a5129</sum></package><package arch="x86_64" name="python-perf" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">3cad1140ec4766ed2b2b01cd82d19d1f706fd5b2f813c63d97c5d804a7ab1166</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5023" id="RHSA-2020:5023-1" title="Rhsa-2020:5023-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5040-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libvirt-nss" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">2834e674277a3d4e5c7b920b64448cd37bd2adc9ad0b75c0673a883b5cb42af0</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">e52837fd79aa0d9826502e8fc0fc99fe6040d6d83650ed563e063623cfab3276</sum></package><package arch="i686" name="libvirt-libs" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">46b60bd7c943bde038f8269c067525f00f0a93a8ba84daaadb4a8baff822fe78</sum></package><package arch="x86_64" name="libvirt-nss" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">7234513bca5e17ca7de87da8f24343e09ea045c9e45fa1349b5d391b53d046f2</sum></package><package arch="x86_64" name="libvirt-daemon" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">d39fae834251654f0e4be3f781d29f24b50126708581f7db9983f195d84debf6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">eb732df91cd5bfefea2c0e1ef932e89a2ab33cb3eb0215cbe3aa3d8175c53902</sum></package><package arch="x86_64" name="libvirt-admin" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">7aa1a1b7fd3f1ca0cf554f60e93d42021762187e81a733e813184f208e275955</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">ba769f4988875848ca17fce27df881b29a65f835e8ac237c7f7a8575a40d7973</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">73bf5e1ce2f47e28417ca23a447dd3bfed734385d78204c930458c3deaebeee7</sum></package><package arch="x86_64" name="libvirt-client" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">cb146dff7ec24a5bf7cd1a26acb894693db3c5edb11344ccd3c3bf945bab20a0</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">a02e55e98bac0ae38460a3dee0335f4c09db03805b94c3e8a5406dacdf32a152</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">59f3951acf83f1ec0815442186beb088b5da8c52d531f1d94816e8a300703fa3</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">c029da9d94f4e235fb8c6e39e2c5bbbf7351bd2ac3393e59812213fbd7e90999</sum></package><package arch="x86_64" name="libvirt-login-shell" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">454d51418987da1014849d4132925cdef134737d1d08fb1cfa779c89c19a3924</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">050ef515b3c64595620bf6d53a462b54936c3dfe4126a4fdc609cc9a53d9dda1</sum></package><package arch="x86_64" name="libvirt-docs" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">0235ba04c3a98a9b5d2d31e85027b2a62fda74d77152debd17e4e99064e8a3e7</sum></package><package arch="i686" name="libvirt-devel" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">e02dccd71df37070314abbf77e7e94e6eb1bae0729fe537cc6e981013716fa58</sum></package><package arch="x86_64" name="libvirt-bash-completion" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">3dfc31f773bb1efa5ef5e687088ab0f1b47fdaf91cd7e929a6f7c385541ccb37</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">0efbfbc232bcaca3fedfd060b20a8283fc7613f565f6048d0518818441c089c0</sum></package><package arch="x86_64" name="libvirt" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">157e09bbc77984eafc509c3191726f1dc17fa954ae54bdf641158f7fe20cf557</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">93fbbb3a834d068f53db7b551ba09e14ecb5b2e3fd93582f968124aede4d96dc</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">1b59823c76125992f394d22eb838c8c0478a1f5deca52420b620ef0fcb6932f9</sum></package><package arch="x86_64" name="libvirt-devel" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">7d0ec88254e280eeb07bdf1bb1252c900681099c26df13ad3245a7e3bde7b64a</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">57452d96f8978a1410c3ef2338fe270c97148911d03e9debba47513a2cdb9c1b</sum></package><package arch="x86_64" name="libvirt-libs" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">e4860ecebc9088da31ce413a567de94ecf49d342e5bbcaae46ebe7087cface77</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">1f62e1ba3e85b38d3025b12c077dd9caf6641a553330ddd49f01479942dfafbf</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">505fdac487bef830c4d4567539061bf5c9fed6948c86ae44b98fd191025af572</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">664362fcb2c8a7b8ee0bdfaf8c52138a82c9483bd9218a414850e9a21f4aaed6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">f5bf6a17338facb41aa3bb9612efa5e11af562e49ebfdef125efaecfa993cedb</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">b83688c176dbdd74fb82d3ce011884783b08005d08bd554dffd76245bd1d5405</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">5cf289a88e882a0dc6dfffd8e313c4fc5c957a4f3b4f352a04a1ae18226f94b1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">10f8c9d89b219b32a7d6f3d52e2f9431d37878c6a14c8c463148e6921bdb38ea</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">9b80a91b5a9f66eafe3468984eea8a0972f7b87dd2cc42f4c75491d687e0b1b7</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">9c92d5f80c668de652d744c66676942226c077b22154a8834a69ff2ba0d9b75f</sum></package><package arch="i686" name="libvirt-client" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">14bb3afa97114d6eeffeb31b1eb538b277f938a05301296d515b7678e4061d07</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5040" id="RHSA-2020:5040-1" title="Rhsa-2020:5040-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5083-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) 
* hw: Vector Register Leakage-Active (CVE-2020-8696) 
* hw: Fast forward store predictor (CVE-2020-8698)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.2.el7_9" src="microcode_ctl-2.1-73.2.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.2.el7_9.x86_64.rpm</filename><sum type="sha256">69c381a9699c988fbdc4fd0b3bf8fa247e4ecd50868a7e2dda3900188d845d0e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5083" id="RHSA-2020:5083-1" title="Rhsa-2020:5083-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5099-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2020-11-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.4.1-1.el7_9.src.rpm" version="78.4.1"><filename>firefox-78.4.1-1.el7_9.i686.rpm</filename><sum type="sha256">e94ecc4b20facf2606282703cebc3026a4dedd3039002f228c9c9c7e379fb682</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.4.1-1.el7_9.src.rpm" version="78.4.1"><filename>firefox-78.4.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">ba519645c1953d71030a3ab3e27da0c317a547ef9d7fdd4fcb158af75e5f3fa6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5099" id="RHSA-2020:5099-1" title="Rhsa-2020:5099-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5163-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.4.3.

Security Fix(es):

* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.4.3-1.el7_9.src.rpm" version="78.4.3"><filename>thunderbird-78.4.3-1.el7_9.x86_64.rpm</filename><sum type="sha256">92c042553512da9c96c8ee1f78a34771072021043df5e88a87657128ef708ae9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950" id="CVE-2020-26950" title="Mozilla: Write Side Effects In Mcallgetproperty Opcode Not Accounted For" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5163" id="RHSA-2020:5163-1" title="Rhsa-2020:5163-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1896306" id="1896306" title="Mozilla: Write Side Effects In Mcallgetproperty Opcode Not Accounted For" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5235-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.5.0. 
Security Fix(es): 
* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) 
* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) 
* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) 
* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) 
* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) 
* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) 
* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) 
* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) 
* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) 
* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.5.0-1.el7_9.src.rpm" version="78.5.0"><filename>thunderbird-78.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">4aeda6a0fc5b123d030ff8d61dbe999dbc7911a850bd5ec4dc587824b0165205</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" id="CVE-2020-16012" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" id="CVE-2020-26951" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" id="CVE-2020-26953" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" id="CVE-2020-26956" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" id="CVE-2020-26958" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" id="CVE-2020-26959" title="Mozilla: Use-After-Free In Webrequestservice" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" id="CVE-2020-26960" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" id="CVE-2020-26961" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" id="CVE-2020-26965" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" id="CVE-2020-26968" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5235" id="RHSA-2020:5235-1" title="Rhsa-2020:5235-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898731" id="1898731" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898732" id="1898732" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898733" id="1898733" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898734" id="1898734" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898735" id="1898735" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898736" id="1898736" title="Mozilla: Use-After-Free In Webrequestservice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898737" id="1898737" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898738" id="1898738" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898739" id="1898739" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898741" id="1898741" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5239-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.5.0 ESR. 
Security Fix(es): 
* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) 
* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) 
* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) 
* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) 
* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) 
* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) 
* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) 
* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) 
* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) 
* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.5.0-1.el7_9.src.rpm" version="78.5.0"><filename>firefox-78.5.0-1.el7_9.i686.rpm</filename><sum type="sha256">a01136ebd107e00f13819a1ff47a00f4cbfeb618cdbf488899e2a52c75436684</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.5.0-1.el7_9.src.rpm" version="78.5.0"><filename>firefox-78.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">2a9ea789628f4859bab83c8ccf1e5fb214ddecae7f670f550109871358f6f0c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" id="CVE-2020-16012" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" id="CVE-2020-26951" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" id="CVE-2020-26953" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" id="CVE-2020-26956" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" id="CVE-2020-26958" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" id="CVE-2020-26959" title="Mozilla: Use-After-Free In Webrequestservice" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" id="CVE-2020-26960" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" id="CVE-2020-26961" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" id="CVE-2020-26965" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" id="CVE-2020-26968" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5239" id="RHSA-2020:5239-1" title="Rhsa-2020:5239-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898731" id="1898731" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898732" id="1898732" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898733" id="1898733" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898734" id="1898734" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898735" id="1898735" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898736" id="1898736" title="Mozilla: Use-After-Free In Webrequestservice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898737" id="1898737" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898738" id="1898738" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898739" id="1898739" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898741" id="1898741" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5350-1</id><title>Net-Snmp</title><description>Security Fix(es): 
* net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution (CVE-2020-15862)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="net-snmp" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">5f6a4f07a16a430a5b5bfba0cdb49f4bfc4d1e82080aea19d098c9b941d9dbe5</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">6413cc63e27157a63f2213d9d33f8c3d0dd24d69c57973a0c5c54bcd2b35419c</sum></package><package arch="i686" epoch="1" name="net-snmp-devel" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.1.i686.rpm</filename><sum type="sha256">28dff9113f62a657c99729c6b0820921088723d1e2e36f196f4397e59ea9ba16</sum></package><package arch="x86_64" epoch="1" name="net-snmp-perl" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-perl-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">aacc4173eeb02c57b5cc603e87ff09dc3a4ef9e0a2a56b1c222d24ffe71d0378</sum></package><package arch="x86_64" epoch="1" name="net-snmp-gui" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-gui-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">0ef72584b2f56c25f567db0b159846d0faf805414aa22a99d0a2a9124df784a2</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.1.i686.rpm</filename><sum type="sha256">5784605d171bbbd0bd502566b65fcf1fd6a7fcd2f265986217732a1a38dbee40</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-python-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">8bf9e96031cfb8602feea8e199798171335e163802f8142bb6de4eadfcc732ae</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-utils-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">583d10cddad6c1df718a9d6240aae5d363b041f98f6297f5db023169b5cd3b93</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">4db5985d46f717d6201094c9d68072769154cfb8cf8ad20bd8ba5483aba0c9cb</sum></package><package arch="i686" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.1.i686.rpm</filename><sum type="sha256">9844acef0228629f571c059899ca877686ded22a947c3273c28ce700a142a27d</sum></package><package arch="x86_64" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">4772c5fea319e3ef852b4455691ab029d4376fada1b836c313b524699f279811</sum></package><package arch="x86_64" epoch="1" name="net-snmp-sysvinit" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-sysvinit-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">51b05cd2c54b3e2bd5925721e2bb6fbe877dcf442c355aeb026b2ab7ef226f1a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15862" id="CVE-2020-15862" title="Net-Snmp: Improper Privilege Management In Extend Mib May Lead To Privileged Commands Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5350" id="RHSA-2020:5350-1" title="Rhsa-2020:5350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1873038" id="1873038" title="Net-Snmp: Improper Privilege Management In Extend Mib May Lead To Privileged Commands Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5400-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes (CVE-2020-26970)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.5.1-1.el7_9.src.rpm" version="78.5.1"><filename>thunderbird-78.5.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">7204232e5916e30474537b49e8e3c380d323cb508133e2a3f272e2675f6c6b17</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5400" id="RHSA-2020:5400-1" title="Rhsa-2020:5400-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5402-1</id><title>Libexif</title><description>Security Fix(es): 
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libexif" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-0.6.22-2.el7_9.x86_64.rpm</filename><sum type="sha256">efbb1fc8a925b088d782730b192f4f3261c241540dbc16525fda27d7fef82897</sum></package><package arch="i686" name="libexif-devel" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-2.el7_9.i686.rpm</filename><sum type="sha256">2074ac598018d8710f20fde5efeef22a67981e962c305d38de81c36dfbe22cde</sum></package><package arch="i686" name="libexif" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-0.6.22-2.el7_9.i686.rpm</filename><sum type="sha256">6dc932c606a8b0b97108d1313fe5d3b59706d7feaa9d4ea4404b25eed3b2422e</sum></package><package arch="x86_64" name="libexif-devel" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-2.el7_9.x86_64.rpm</filename><sum type="sha256">390e5bc8b3656b1360b772fd168205e8632a1bbe2c3c20340e617ee5d4f9ef2d</sum></package><package arch="x86_64" name="libexif-doc" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-doc-0.6.22-2.el7_9.x86_64.rpm</filename><sum type="sha256">037a55132984a0bd769eb3194ef66167ad9badf0f745e36d5cd34f40e88b48d5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5402" id="RHSA-2020:5402-1" title="Rhsa-2020:5402-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5408-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) 
* xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) 
* xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xephyr" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">1dd324a9b38007b9921ab6ca548aef439afa6b55470d00a8549f6d93eb4c43f5</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">e0ac1be16eddcef7251eab2e5914fbe32fa46053d7e52c533a3529dbf537fdf1</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">bd4762bed5392c807dfe22257611857ae4ff9775f8864505a2c88f549d561f61</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">97c2405899a3c2cc2e38b12158a34ef817b67bc043c72a1da2b1aa67f6608699</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">b43f75f93755916cd7662809f920674ff0ee386549c0c1425cc08a180aef832b</sum></package><package arch="i686" name="xorg-x11-server-devel" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-15.el7_9.i686.rpm</filename><sum type="sha256">21aba054790d48f8b74cd55320fea0b6b2b8bd4afde2619f98143688b977283f</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">cccae5645a379eb7651f950e94e10ff2c9b9eb125ff58b3482125c9e41e461ec</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">b3c791887936cc4ae55234af68d275037b4d90c2f0823745aa024e7b6cc7b138</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">ce9b2f9a96cb6f7e910bee5639099c84ce13bb87dc6a8d001c67dccb4195668d</sum></package><package arch="noarch" name="xorg-x11-server-source" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-15.el7_9.noarch.rpm</filename><sum type="sha256">28092e85516bb3ad3abaaa0a8b12b886194e9a4ab782b91d22231fecb2c2b59d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5408" id="RHSA-2020:5408-1" title="Rhsa-2020:5408-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5434-1</id><title>Targetcli</title><description>Security Fix(es): 
* targetcli: weak permissions for /etc/target and backup files (CVE-2020-13867)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="targetcli" release="1.el7_9" src="targetcli-2.1.53-1.el7_9.src.rpm" version="2.1.53"><filename>targetcli-2.1.53-1.el7_9.noarch.rpm</filename><sum type="sha256">f1961207eea2a46a9b25e2d7d57195737a0fe1065b3b41498db025f6c36b0b49</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5434" id="RHSA-2020:5434-1" title="Rhsa-2020:5434-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5435-1</id><title>Python-Rtslib</title><description>Security Fix(es): 
* python-rtslib: weak permissions for /etc/target/saveconfig.json (CVE-2020-14019)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-rtslib-doc" release="1.el7_9" src="python-rtslib-2.1.74-1.el7_9.src.rpm" version="2.1.74"><filename>python-rtslib-doc-2.1.74-1.el7_9.noarch.rpm</filename><sum type="sha256">38c2d69ce491410d16dcc623d71d2ba6d7cd30792f3efd20768cbe67df54f372</sum></package><package arch="noarch" name="python-rtslib" release="1.el7_9" src="python-rtslib-2.1.74-1.el7_9.src.rpm" version="2.1.74"><filename>python-rtslib-2.1.74-1.el7_9.noarch.rpm</filename><sum type="sha256">34ed38fcd5a5d16bf9c664b9a92f7daf7464ec726c1e79df4b99d50df1737d45</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5435" id="RHSA-2020:5435-1" title="Rhsa-2020:5435-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5437-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385) 
* kernel: The flow_dissector feature allows device tracking (CVE-2019-18282) 
* kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. (CVE-2020-10769) 
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314) 
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394) 
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212) 
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.11.1.el7.noarch.rpm</filename><sum type="sha256">8c4901a1254d52706a8026f9afa5b964c896fa61d871a47079c886e5434978bb</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">074a2ca70735365ae82e9859c9fb8820f3d264b5eebd7f7384fddb980c8d44be</sum></package><package arch="x86_64" name="perf" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">3e60b1603a251cb4af8f03c0bc08ef03504dda7ef9e0d50efc34f888cb7bc920</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">f3984b7e00b733ed304ad9d2d1ad2c6d9030b3e8a3cc5430f7cf112a2ff1ce12</sum></package><package arch="x86_64" name="kernel-tools" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">0756af1a558d435b5a1b5788bba4d62c3ce18384bea6d923907834a4d391ca89</sum></package><package arch="x86_64" name="kernel-headers" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">18f207344f466c5b6e74407601a61ea3185e644570f53fdb7df45290e5857e99</sum></package><package arch="x86_64" name="bpftool" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">613af626396059c1078e7f852972e17b69faf1df7b048d6b581f4298a67460f3</sum></package><package arch="x86_64" name="python-perf" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">f074050a3bde5f5f20b5402b58a3aab71f9cb94edbd5bef991c127e9f463bde7</sum></package><package arch="x86_64" name="kernel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">cf318a19af37dcd5a560f417ec291a5766a60ec24e9eb2d762f936beb26e6a47</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">91db286c495fd0f265c5bc0289268239c2d0303c21844bf1415b0310ca867a66</sum></package><package arch="noarch" name="kernel-doc" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.11.1.el7.noarch.rpm</filename><sum type="sha256">4b790062be5b1197903241e00a4ce71a06e3b3952ee700a67880eebdd161b388</sum></package><package arch="x86_64" name="kernel-debug" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">01b2018f24bebe98aa6e01b7c5459bf12743278485212b48fe8f9bddd59eb947</sum></package><package arch="x86_64" name="kernel-devel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">01b394eb16a7a6be9c376e088f71a0c44eb4249a28c05fe9a72d53631fb08a81</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5437" id="RHSA-2020:5437-1" title="Rhsa-2020:5437-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5439-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Netlogon elevation of privilege vulnerability (Zerologon) (CVE-2020-1472) 
* samba: Missing handle permissions check in SMB1/2/3 ChangeNotify (CVE-2020-14318) 
* samba: Unprivileged user can crash winbind (CVE-2020-14323)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">b076a9f33db35192bbe69ddc9517f2144661cb2756de1d628b5de2ab5a334c7b</sum></package><package arch="noarch" name="samba-pidl" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-9.el7_9.noarch.rpm</filename><sum type="sha256">3a45929ff73f086c20b0a688e69ef39579cf32ef1e9c5c96c7710496c79ffadb</sum></package><package arch="i686" name="samba-test-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">440286e7959b0a2cf2a559cfc8bf7c5842d258b6f43a0b2a02247cb90f44d6a1</sum></package><package arch="x86_64" name="samba-common-tools" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">00c9de7f1cee8e94b586633ba12a1646f89d9575bfc324aa6e9893adbd412b8c</sum></package><package arch="i686" name="samba-winbind-modules" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">2efb086f89ba6912cef4104107b9dc01431fdfa669245c1fc061a97749b406b4</sum></package><package arch="i686" name="libwbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">e86d831cbb14eea16e57267c13a3bfdf06cdec971de24c476e14371a01006b89</sum></package><package arch="x86_64" name="samba-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">38f0416a4ecb0e7ebb6bb334f9a75709e2c8e2188270fefea9966db2e6a69ffb</sum></package><package arch="x86_64" name="ctdb" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">612a9671a5afdfbb3e174a8b747bf1c96e2c5bfb515bf7a93df196c71d5d139b</sum></package><package arch="x86_64" name="samba-krb5-printing" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">d78679a5aa74bcda36d9974620f0b8cfedec6e1f47a91fbce65ae5e23d5b3490</sum></package><package arch="x86_64" name="samba-test-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">0b91a59f9c5d32bae9d04b11b50595a48e404f15b4028c9dae01329507923dd8</sum></package><package arch="i686" name="samba-python" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">40217003284ac87071f9769e54b664943c738205ae94df6c9f13321692a77a04</sum></package><package arch="x86_64" name="samba" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">abf987af637efa73be4eac3641569c7bc4cfee8b251450d6a1370756a74cb1d2</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">031218649908fa353e5a8c2af61e9054cb39ffcfc8264ee8ac7a677440b4d9d4</sum></package><package arch="x86_64" name="samba-test" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3ab1e89086f913190e3587876a6da9484d97916ccc0302bd04884a9913c55919</sum></package><package arch="i686" name="samba-client-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">f80fded3dda885bdf26417baaa147b6d4d7961990adc48677e2e419d3a5b56c2</sum></package><package arch="x86_64" name="samba-winbind-clients" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e4fab9053b7ba9b38722867bfdfb42fe7c990e577baaedefe6b50c7e0c75dfd0</sum></package><package arch="x86_64" name="samba-winbind" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e3ea6c53cd4e4a8dd2ad0a380c0d55f72d28c563ff59e6cdb5464de51951d18d</sum></package><package arch="i686" name="libsmbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">4db73018e1489cf37ea5ed6abdfc1250946046971a05741eb565a17d513c4471</sum></package><package arch="x86_64" name="samba-common-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">46407be156046b26ccbcf0cf131c8a692ce20c4fbfd186d31939e623f5defb39</sum></package><package arch="i686" name="samba-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">519e0a4e6bb18214cfa971b232228ff43feda3f36ed123c177ff2ce00feb5b52</sum></package><package arch="x86_64" name="ctdb-tests" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">b5ecc1bc7a4e2f1a0c2083725d83c7e9d14a464e2d5fe429bb516da24a5e7b6e</sum></package><package arch="i686" name="samba-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">090851bfc72aebe18ed191ca16a3cc57251a653a9381c485872cea5f58232254</sum></package><package arch="x86_64" name="samba-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3920df3a2074dcb6633966fda57013415d63549b3a51e8fa993c57af2d8b0e19</sum></package><package arch="x86_64" name="samba-dc" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">f271d4c8fc59778b3b8546be5c012d971833fff265e96060c707ea6a9cb543ab</sum></package><package arch="i686" name="libsmbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">56efcdcd4fe1755029a174cb76499b2bfece3ec8f226435265a7b1d18f3444be</sum></package><package arch="noarch" name="samba-common" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-9.el7_9.noarch.rpm</filename><sum type="sha256">8042e4e4498238bd6f4eeeef17522327228b39708be95839399d54209c0cf126</sum></package><package arch="i686" name="libwbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">bfae295faf35a3784d08fd0cc0e76ab928dfe85a67e8542b97318740b7ac5cc2</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3132857bdc0fcec518e8acb2b76662447c28bc201249fa6acb401b75da54dad6</sum></package><package arch="x86_64" name="libwbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">facd100d567679a5e3aa45f595cedbfa4197d17c4521c3fb59dd58696491aaa1</sum></package><package arch="x86_64" name="samba-winbind-modules" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">efe3852c88c046489eecb30a7b8a61e8fc9f02b0115a70f058721293394c21ac</sum></package><package arch="x86_64" name="samba-client-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e326f21e78e4f94efcd3c3d83cfc199c4e73af0b5feb4a2726c784fa11b409aa</sum></package><package arch="x86_64" name="samba-python" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e8cca8a7f801b65b906a85bf563bb92a26cd1f1cea813b09c411a24a6825c2de</sum></package><package arch="x86_64" name="samba-dc-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">2909b4efe04c93c004227897e2fb7a63a02d8bf698b8ced94d01c672d69cde93</sum></package><package arch="x86_64" name="samba-python-test" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">2a3764105780fcec87cfc7bfd12f80e964d091148cc161ec6f2e8b8d5c6a50af</sum></package><package arch="x86_64" name="samba-client" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">66843da5bf400fc5a2b51436f14a76168fe62e236105023477f2de19c4110b8d</sum></package><package arch="x86_64" name="libsmbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">9ffb0c883afdde797002ba30d19b5e199cbbe4c7606cbabe8b1822cb3a6d131b</sum></package><package arch="i686" name="samba-common-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">a9501b4b0918e9be3d9fef799513020f2f61a6dac411d9c87427d70b1df1b002</sum></package><package arch="x86_64" name="libsmbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3358e17bd6642a2f9ca9247da03aaf13d2b635b0c225a12a5a25064c0b5c8f15</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5439" id="RHSA-2020:5439-1" title="Rhsa-2020:5439-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5443-1</id><title>Gd</title><description>Security Fix(es): 
* gd: Integer overflow in _gd2GetHeader() resulting in heap overflow (CVE-2016-5766)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gd-devel" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-devel-2.0.35-27.el7_9.x86_64.rpm</filename><sum type="sha256">649bdfb3f448048e424b079817af7ac828e5133323f87bd84aeea5fac6c348ca</sum></package><package arch="x86_64" name="gd" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-2.0.35-27.el7_9.x86_64.rpm</filename><sum type="sha256">8b22d155263ae48053312e120ad698f6691a26cbdcb53a29352683ed3c58ef31</sum></package><package arch="i686" name="gd-devel" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-devel-2.0.35-27.el7_9.i686.rpm</filename><sum type="sha256">6098eaf3c89f9adc5feb38e58ebc2cbd2740ba4e3fc45e79edb50c313ff4fe77</sum></package><package arch="i686" name="gd" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-2.0.35-27.el7_9.i686.rpm</filename><sum type="sha256">b6a019ac8d2811b6eb3296ab2c7e6a72c0bb66a0c848d53764d54111c462c601</sum></package><package arch="x86_64" name="gd-progs" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-progs-2.0.35-27.el7_9.x86_64.rpm</filename><sum type="sha256">c1a23e3027865afcf15a1d2e06244f0b21f0ce8db329622b8d14e7e81704db26</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5443" id="RHSA-2020:5443-1" title="Rhsa-2020:5443-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5453-1</id><title>Pacemaker</title><description>Security Fix(es): 
* pacemaker: ACL restrictions bypass (CVE-2020-25654)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pacemaker" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">ae3bba33a30bb03d79e842d929b208994522c37c9977689e76b884755b38dec6</sum></package><package arch="x86_64" name="pacemaker-cts" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cts-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">f7ab16be28c957f828ec50d955adfb38bfe761e1227191b1d0f81dd5f2ed8eb8</sum></package><package arch="x86_64" name="pacemaker-cli" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cli-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">d0087929e1f47f53190f5fbf4d8fe27e38a25bc761ca9ba9588ea414ba4d7657</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-devel-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">7cec82a8fa695ce95c8dc6a9afd2a81953378a288b588f3bc9625de7919da188</sum></package><package arch="x86_64" name="pacemaker-remote" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-remote-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">51d1edcf063c3879e8ab0eea384d56bed87768ca583037f2be802612ead7bf59</sum></package><package arch="x86_64" name="pacemaker-doc" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-doc-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">993efca7ba035e125ad01223a8b75047cf4db2c60a2d463655c1cbecc8e38725</sum></package><package arch="x86_64" name="pacemaker-nagios-plugins-metadata" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-nagios-plugins-metadata-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">e0bba6c20f230d4333a2b050b2fc240886d29b28aca71b1675efe08397bd4a10</sum></package><package arch="i686" name="pacemaker-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-1.1.23-1.el7_9.1.i686.rpm</filename><sum type="sha256">02d2eb1cf8b91bb2e0c736fafd47e28f0f2f721980e93a7f3ac7d7ca85e10075</sum></package><package arch="i686" name="pacemaker-libs-devel" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-devel-1.1.23-1.el7_9.1.i686.rpm</filename><sum type="sha256">e31001032b9a817b564d4c6c391c732fcce21415a6286678668fef5a87b0e9ea</sum></package><package arch="x86_64" name="pacemaker-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">a0ea29234910e70b9d1fa10fd7f12dab0a432c90dd75fc5c556e5e83c131253f</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cluster-libs-1.1.23-1.el7_9.1.i686.rpm</filename><sum type="sha256">b323aa8453cb317274a80e53f4b62ad3a90fc6aa19354a9f555e9c8656cacd90</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cluster-libs-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">83b6faf7f1326a0139ff3b89a28d8e314962a83618d819a1fd9033638c3b020a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5453" id="RHSA-2020:5453-1" title="Rhsa-2020:5453-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5561-1</id><title>Firefox</title><description>Security Fix(es): 
* chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) 
* Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) 
* Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free (CVE-2020-26974) 
* Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) 
* Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.6.0-1.el7_9.src.rpm" version="78.6.0"><filename>firefox-78.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">0d6c4bd288c7d0a631ae8312388c5237d3f3d49d362067931f0c964cbac8b520</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.6.0-1.el7_9.src.rpm" version="78.6.0"><filename>firefox-78.6.0-1.el7_9.i686.rpm</filename><sum type="sha256">5c1c1f487c0ee722a18c9d0a2d1773a488d2035cd91be329429dfc49017c2fff</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5561" id="RHSA-2020:5561-1" title="Rhsa-2020:5561-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5566-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-libs" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">4ab783a4b56a43eaa048038f945673f33909a21827029d5ee93b4c81b2f4d92e</sum></package><package arch="i686" epoch="1" name="openssl-static" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-21.el7_9.i686.rpm</filename><sum type="sha256">5324134a3422bb4d2e370d8fd60b425f256ffce1ca7b2f9b5f1766915a5ae87b</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">25730dc215dab87a5e0cba02d8dc32feb2ad2b924d97e568eb75d86c2377ab8d</sum></package><package arch="x86_64" epoch="1" name="openssl" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">4099de643d8ffb0d9d7adfd5fcd3b57be8aa259b40a444e71e2bdbfe398ec449</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-21.el7_9.i686.rpm</filename><sum type="sha256">2f99416e28a3c658927d78ec90fccfc640eb34bc303f9fa15688a0f049acfb86</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">d3f15aa14d37b7458ce9c8f81ad92b40434161a838e064006949813cadecffc1</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">2ff54248f85df13efadba6fe2669cfb9cbc7cfd6901218fb56f02821dc6255c7</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-21.el7_9.i686.rpm</filename><sum type="sha256">6b0eba3b5d8c40fc55a6cbb70138d15c50baf2325cf5f637ff2696afcda2d7a0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" id="CVE-2020-1971" title="Openssl: Edipartyname Null Pointer De-Reference" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5566" id="RHSA-2020:5566-1" title="Rhsa-2020:5566-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1903409" id="1903409" title="Openssl: Edipartyname Null Pointer De-Reference" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5618-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.6.0. 
Security Fix(es): 
* chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) 
* Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) 
* Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use- after-free (CVE-2020-26974) 
* Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) 
* Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.6.0-1.el7_9.src.rpm" version="78.6.0"><filename>thunderbird-78.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">24422101a4101285534840c54c1008ac45327f0e93b99ebec74e41c60d009b27</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" id="CVE-2020-16042" title="Chromium-Browser: Uninitialized Use In V8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" id="CVE-2020-26971" title="Mozilla: Heap Buffer Overflow In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" id="CVE-2020-26973" title="Mozilla: Css Sanitizer Performed Incorrect Sanitization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" id="CVE-2020-26974" title="Mozilla: Incorrect Cast Of Stylegenericflexbasis Resulted In A Heap Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" id="CVE-2020-26978" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" id="CVE-2020-35111" title="Mozilla: The Proxy.Onrequest Api Did Not Catch View-Source Urls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" id="CVE-2020-35113" title="Mozilla: Memory Safety Bugs Fixed In Firefox 84 And Firefox Esr 78.6" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5618" id="RHSA-2020:5618-1" title="Rhsa-2020:5618-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1904515" id="1904515" title="Chromium-Browser: Uninitialized Use In V8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908022" id="1908022" title="Mozilla: Heap Buffer Overflow In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908023" id="1908023" title="Mozilla: Css Sanitizer Performed Incorrect Sanitization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908024" id="1908024" title="Mozilla: Incorrect Cast Of Stylegenericflexbasis Resulted In A Heap Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908025" id="1908025" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908027" id="1908027" title="Mozilla: The Proxy.Onrequest Api Did Not Catch View-Source Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908029" id="1908029" title="Mozilla: Memory Safety Bugs Fixed In Firefox 84 And Firefox Esr 78.6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0024-1</id><title>Imagemagick</title><description>Security Fix(es): 
* ImageMagick: Shell injection via PDF password could result in arbitrary code execution (CVE-2020-29599)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ImageMagick-perl" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-perl-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">35ed20c4a1405b7be51394d2770f8a6cb1ce8727ae75d6d3dd7e11d21181344b</sum></package><package arch="i686" name="ImageMagick-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">38a5bc8854084aea0e436621674b7342c734829122be1f2058521c6a81b1df89</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">c2557d70027530bb4e624c9789ba066907eb63145e00bcc4191d80800f6f14a9</sum></package><package arch="x86_64" name="ImageMagick-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">263a8c54000db5a2c00dc0d1c8c6eb6c498857eaa6dfcc32979da35f66bdbaa7</sum></package><package arch="x86_64" name="ImageMagick-doc" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-doc-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">1902faa24f58f417c8470021e076e97d10952b55e960a365d261c3badc438d29</sum></package><package arch="x86_64" name="ImageMagick" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">007a874cbb5e96e0ec9d091dc1e1375f5163bc7b51fb924b588b4a9e89693d33</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">b456d51876febb32c76dac09baa9c049c2a05189e8faf5b3b031170cf506b943</sum></package><package arch="i686" name="ImageMagick" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">962a00fd6dd0394c38fa745e7b153b4fc4604d16450524ee89d4c89d2c4ae7df</sum></package><package arch="i686" name="ImageMagick-c++" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">8c7cb49693f69f88cfce4cee36178f33bbb1569e4f2b33f3c279dfffc162bf40</sum></package><package arch="x86_64" name="ImageMagick-c++" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">203e4810eb5b87904246399de6deec2bb5476e647432cc3fb3cb783a63f969f2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2021:0024" id="RHSA-2021:0024-1" title="Rhsa-2021:0024-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0053-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.6.1 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-01-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.6.1-1.el7_9.src.rpm" version="78.6.1"><filename>firefox-78.6.1-1.el7_9.i686.rpm</filename><sum type="sha256">4f8f75fe33d42ec9e805e56187ee91e42c099a99a22371bdd370f5acdf4717a0</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.6.1-1.el7_9.src.rpm" version="78.6.1"><filename>firefox-78.6.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">8b08548589ca2d090a5090b87ad796bc4b16114224126f9945f0c0f89a03a6de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" id="CVE-2020-16044" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0053" id="RHSA-2021:0053-1" title="Rhsa-2021:0053-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1913503" id="1913503" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0087-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.6.1. 
Security Fix(es): 
* Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-01-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.6.1-1.el7_9.src.rpm" version="78.6.1"><filename>thunderbird-78.6.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">a9297af8abb6b9ee3f7c109429da762fde47e129d27893f0aec68f2cfb840ce8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" id="CVE-2020-16044" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0087" id="RHSA-2021:0087-1" title="Rhsa-2021:0087-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1913503" id="1913503" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0153-1</id><title>Dnsmasq</title><description>Security Fix(es): 
* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684) 
* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685) 
* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="dnsmasq" release="16.el7_9.1" src="dnsmasq-2.76-16.el7_9.1.src.rpm" version="2.76"><filename>dnsmasq-2.76-16.el7_9.1.x86_64.rpm</filename><sum type="sha256">6729ababc68f71a67e57ee1a7c0b81375a2804a4081a054fa0f8d03fcdcc046b</sum></package><package arch="x86_64" name="dnsmasq-utils" release="16.el7_9.1" src="dnsmasq-2.76-16.el7_9.1.src.rpm" version="2.76"><filename>dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm</filename><sum type="sha256">d6187f9c7b3e1aab9110e2fd2a764e32f9e4e46af3419d745a1c54aa6423e585</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25684" id="CVE-2020-25684" title="Dnsmasq: Loose Address/Port Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25685" id="CVE-2020-25685" title="Dnsmasq: Loose Query Name Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25686" id="CVE-2020-25686" title="Dnsmasq: Multiple Queries Forwarded For The Same Name Makes Forging Replies Easier For An Off-Path Attacker" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0153" id="RHSA-2021:0153-1" title="Rhsa-2021:0153-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1889686" id="1889686" title="Dnsmasq: Loose Address/Port Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1889688" id="1889688" title="Dnsmasq: Loose Query Name Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1890125" id="1890125" title="Dnsmasq: Multiple Queries Forwarded For The Same Name Makes Forging Replies Easier For An Off-Path Attacker" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0162-1</id><title>Xstream</title><description>Security Fix(es): 
* XStream: remote code execution due to insecure XML deserialization when relying on blocklists (CVE-2020-26217)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xstream-javadoc" release="12.el7_9" src="xstream-1.3.1-12.el7_9.src.rpm" version="1.3.1"><filename>xstream-javadoc-1.3.1-12.el7_9.noarch.rpm</filename><sum type="sha256">d1c3984fcbe1a1b24baec7263e375eadc97b343c9a463f934c92e43a4e1cf0ff</sum></package><package arch="noarch" name="xstream" release="12.el7_9" src="xstream-1.3.1-12.el7_9.src.rpm" version="1.3.1"><filename>xstream-1.3.1-12.el7_9.noarch.rpm</filename><sum type="sha256">72fb816c08d0492a3c4beddb831f9b13718f36bd9c071a40576baebea1d75bfd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26217" id="CVE-2020-26217" title="Xstream: Remote Code Execution Due To Insecure Xml Deserialization When Relying On Blocklists" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0162" id="RHSA-2021:0162-1" title="Rhsa-2021:0162-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898907" id="1898907" title="Xstream: Remote Code Execution Due To Insecure Xml Deserialization When Relying On Blocklists" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0221-1</id><title>Sudo</title><description>Security Fix(es): 
* sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo" release="10.el7_9.1" src="sudo-1.8.23-10.el7_9.1.src.rpm" version="1.8.23"><filename>sudo-1.8.23-10.el7_9.1.x86_64.rpm</filename><sum type="sha256">5423b800533b588b826b3262e43317d7483ded52bec632b31e2ad6a7196959a3</sum></package><package arch="x86_64" name="sudo-devel" release="10.el7_9.1" src="sudo-1.8.23-10.el7_9.1.src.rpm" version="1.8.23"><filename>sudo-devel-1.8.23-10.el7_9.1.x86_64.rpm</filename><sum type="sha256">70d08e1e1e5a472c05109310f94e7080642cb63861cf299c0c4461b4a0fdd814</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156" id="CVE-2021-3156" title="Sudo: Heap Buffer Overflow In Argument Parsing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0221" id="RHSA-2021:0221-1" title="Rhsa-2021:0221-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917684" id="1917684" title="Sudo: Heap Buffer Overflow In Argument Parsing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0290-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.7.0 ESR. 
Security Fix(es): 
* Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) 
* Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) 
* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) 
* Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) 
* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-78.7.0-2.el7_9.src.rpm" version="78.7.0"><filename>firefox-78.7.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">aefb9ecf93045e1f02b4d18b8454ea6a069d36374d511813302be771e372b6ca</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-78.7.0-2.el7_9.src.rpm" version="78.7.0"><filename>firefox-78.7.0-2.el7_9.i686.rpm</filename><sum type="sha256">fcf145cb6953a4256c0a7ee96f328579e3a0f81fc046931f75aabff454ec4dad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" id="CVE-2020-26976" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" id="CVE-2021-23953" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" id="CVE-2021-23954" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" id="CVE-2021-23960" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" id="CVE-2021-23964" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0290" id="RHSA-2021:0290-1" title="Rhsa-2021:0290-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920646" id="1920646" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920648" id="1920648" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920649" id="1920649" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920650" id="1920650" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920651" id="1920651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0297-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.7.0. 
Security Fix(es): 
* Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) 
* Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) 
* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) 
* Mozilla: IMAP Response Injection when using STARTTLS (CVE-2020-15685) 
* Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) 
* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.7.0-1.el7_9.src.rpm" version="78.7.0"><filename>thunderbird-78.7.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">da24d84fbba521a1fd1d55d856a97ac7be93b07dd9850ee602f76e37e112e419</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685" id="CVE-2020-15685" title="Mozilla: Imap Response Injection When Using Starttls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" id="CVE-2020-26976" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" id="CVE-2021-23953" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" id="CVE-2021-23954" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" id="CVE-2021-23960" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" id="CVE-2021-23964" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0297" id="RHSA-2021:0297-1" title="Rhsa-2021:0297-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920646" id="1920646" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920648" id="1920648" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920649" id="1920649" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920650" id="1920650" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920651" id="1920651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1921543" id="1921543" title="Mozilla: Imap Response Injection When Using Starttls" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0336-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in fs/block_dev.c (CVE-2020-15436) 
* kernel: Nfsd failure to clear umask after processing an open or create (CVE-2020-35513) 
Bug Fix(es): 
* double free issue in filelayout_alloc_commit_info 
* Regression: Plantronics Device SHS2355-11 PTT button does not work after update to 7.7 
* Openstack network node reports unregister_netdevice: waiting for qr- 3cec0c92-9a to become free. Usage count = 1 
* dlm: add ability to interrupt waiting for acquire POSIX lock 
* [Azure][SL7] soft lockups and performance loss occurring during final fsync with parallel dd writes to xfs filesystem in azure instance 
* Guest crashed when hotplug vcpus on booting kernel stage 
* soft lockup occurs while a thread group leader is waiting on tasklist_waiters in mm_update_next_owner() where a huge number of the thread group members are exiting and trying to take the tasklist_lock. 
* [DELL EMC 7.6 BUG] Kioxia CM6 NVMe drive fails to enumerate 
* [Hyper-V][SL7] Request to included a commit that adds a timeout to vmbus_wait_for_unload 
* Unable to discover the LUNs from new storage port 
* SL 7.9 Kernel panic at ceph_put_snap_realm+0x21 
* A hard lockup occurrs where one task is looping in an sk_lock spinlock that has been taken by another task running timespec64_add_ns(). 
* ethtool/mlx5_core provides incorrect SFP module info 
* SL7.7 - zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl 
* SL7.7 - s390/dasd: Fix zero write for FBA devices 
* [Azure]IP forwarding issue in netvsc[7.9.z] 
* Security patch for CVE-2020-25212 breaks directory listings via 'ls' on NFS V4.2 shares mounted with selinux enabled labels 
Enhancement(s): 
* RFE : handle better ERRbaduid on SMB1</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">4819a3eb9dca66f723dfa5c13d6373518d260cde9d2c6f060a94d0b1e77b0b3e</sum></package><package arch="x86_64" name="bpftool" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">f157c6631d357e858553558139fb5cb505ca50b43e3602c2d0736df2c18bed82</sum></package><package arch="x86_64" name="python-perf" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">641f97a285f424556bbe68a21bf178e0ef2ef20905b29aab3210af75d103fe47</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">fe660577b9eaf88827f03c8381566415ad8e1bb3f1650e927c13ecbec550cbd2</sum></package><package arch="x86_64" name="kernel-devel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">6e2d1b4c71950f840f62fc5181b4b8896f0715df42b1776df145f66fc8807109</sum></package><package arch="x86_64" name="kernel-tools" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">011bf1357ed906b856da1da696aa34b0363f0eded1c76a912905c9eed2072391</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">e5e98d69d8bf787726353d7de45385c0473b6d619cfd0231181dd27fa36eb526</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">f68403ea1737e930fb238d3bf1366df3b6427cedc9549ee2d921d114ba1574df</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.15.2.el7.noarch.rpm</filename><sum type="sha256">05e3ce588d2f58ff8b8657f7f34d05ae57d7c27621e6186af6ecf4ccc23e8566</sum></package><package arch="x86_64" name="kernel-headers" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">366f98be9c759b1a0c83154a9e3a2de474e4afbf6600c12149628ed46f2e14a2</sum></package><package arch="x86_64" name="kernel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">220521bb5eac456a87ce0f75842a5f6e283dd26f69ebc503e9a2fa145c185884</sum></package><package arch="noarch" name="kernel-doc" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.15.2.el7.noarch.rpm</filename><sum type="sha256">a403da577d61eca9239b730a897039157a0631dcb86dca6f68feb8fdc21a0282</sum></package><package arch="x86_64" name="perf" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">90114f195d468dfecac0fb18a9ce5729b7d851a4cb0bcf939bf32d5a58dfdfcd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15436" id="CVE-2020-15436" title="Kernel: Use-After-Free In Fs/Block_Dev.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35513" id="CVE-2020-35513" title="Kernel: Nfsd Failure To Clear Umask After Processing An Open Or Create" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0336" id="RHSA-2021:0336-1" title="Rhsa-2021:0336-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1901168" id="1901168" title="Kernel: Use-After-Free In Fs/Block_Dev.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1911309" id="1911309" title="Kernel: Nfsd Failure To Clear Umask After Processing An Open Or Create" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917504" id="1917504" title="Security Patch For Cve-2020-25212 Breaks Directory Listings Via 'Ls' On Nfs V4.2 Shares Mounted With Selinux Enabled Labels" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0339-1</id><title>Linux-Firmware</title><description>Security Fix(es): 
* hardware: buffer overflow in bluetooth firmware (CVE-2020-12321)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="linux-firmware" release="80.git78c0348.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="20200421"><filename>linux-firmware-20200421-80.git78c0348.el7_9.noarch.rpm</filename><sum type="sha256">a04f0ec2d675e33d01959e1a83242c245a2d39a7a2c944c9ff1009cdf6e45167</sum></package><package arch="noarch" name="iwl3160-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl3160-firmware-25.30.13.0-80.el7_9.noarch.rpm</filename><sum type="sha256">b441c460e2aff73fff57433dc2c1a269499d061e7824dcc3a5f7e4776093ad9d</sum></package><package arch="noarch" name="iwl6050-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-80.el7_9.noarch.rpm</filename><sum type="sha256">09990683afec4d460dac7bfe114f290ebc74fa8713f0ac58085a21e7f86c6998</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2a-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">4fa1b02c8567b22d22a9160f692c5bf1964b5b6ce2c69247a257dcb5e95848ac</sum></package><package arch="noarch" name="iwl3945-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-80.el7_9.noarch.rpm</filename><sum type="sha256">359d7aad7d2f44daf6f9f5e8fb3a227f45b7aba607138f749fc647b09297c245</sum></package><package arch="noarch" name="iwl5150-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-80.el7_9.noarch.rpm</filename><sum type="sha256">1309fbd237fcad5bbaf316bc5374f2020ab43416535194e4fac7404730bd0895</sum></package><package arch="noarch" name="iwl5000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-80.el7_9.noarch.rpm</filename><sum type="sha256">a7da327f21ce36292d130875344e0e8a29685864c119177b2416a80190b9efde</sum></package><package arch="noarch" name="iwl105-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">6c35d887982d431759d462240adc49e8ee0cf75846a4cadbda700b42ea88d394</sum></package><package arch="noarch" name="iwl7260-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl7260-firmware-25.30.13.0-80.el7_9.noarch.rpm</filename><sum type="sha256">50f87a1a5e9d58a92daf1f05b74d1eb117127a54d0d2da5c7c507619612af72f</sum></package><package arch="noarch" name="iwl4965-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-80.el7_9.noarch.rpm</filename><sum type="sha256">3ff0d2ff99bfb7b9d6e7ea6f3159545ee33521dea7558a0f2a8ffa9e75898c93</sum></package><package arch="noarch" name="iwl2000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">b2376b69963be7591f80ee41efad20b6c7001d42d260ab5d229287d2ec8d3ae0</sum></package><package arch="noarch" name="iwl6000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-80.el7_9.noarch.rpm</filename><sum type="sha256">bf625e797575121e1d90ab40d4487d83578daf2dc8ee043453b4bd44c8cfdb21</sum></package><package arch="noarch" name="iwl100-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-80.el7_9.noarch.rpm</filename><sum type="sha256">707ce9d9cea1f66a7bb4e3c721711e9575cb5a927ec6644fedbbb30de12dd413</sum></package><package arch="noarch" name="iwl2030-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">0ccc1eeceda14b1c43ec3ba8060a006c0baa36948c3b6c13f60ab3342c7bc2f0</sum></package><package arch="noarch" name="iwl135-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">d7440a356a4d6c9feb4a573c817eb1e3dbcb37f4dc94dbdfeb6600e6f53f003c</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2b-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">61fac0b0aa5a70b9407d35efa59114947ff835794f071a1db6c66302b83e6115</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-80.el7_9.noarch.rpm</filename><sum type="sha256">c639d41f580e6ba17208031184ec07414e2e09241967dce78acfc1036386bab2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12321" id="CVE-2020-12321" title="Hardware: Buffer Overflow In Bluetooth Firmware" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0339" id="RHSA-2021:0339-1" title="Rhsa-2021:0339-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1893914" id="1893914" title="Hardware: Buffer Overflow In Bluetooth Firmware" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0343-1</id><title>Perl</title><description>Security Fix(es): 
* perl: heap-based buffer overflow in regular expression compiler leads to DoS (CVE-2020-10543) 
* perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS (CVE-2020-10878) 
* perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS (CVE-2020-12723)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="perl-Object-Accessor" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.42"><filename>perl-Object-Accessor-0.42-299.el7_9.noarch.rpm</filename><sum type="sha256">d64afc4f611b5fadf848454ebc5d24ba6d29fad9eceb01e1b1eb9ef47f82d186</sum></package><package arch="noarch" epoch="1" name="perl-IO-Zlib" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.10"><filename>perl-IO-Zlib-1.10-299.el7_9.noarch.rpm</filename><sum type="sha256">696a5ac2086dab867d43a0f6a9a8ed324d0887e3acf41c5a064c2c41122ac2b4</sum></package><package arch="x86_64" epoch="4" name="perl-devel" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-devel-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">96de282bb6995063683f9a9e03302fcc8e3259ad67bf4023f8d20ab9793f6a02</sum></package><package arch="x86_64" epoch="4" name="perl" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">8a1ebda5a8b0d73310ce9a196fa387435c6c86e2b570476b10f055c13481c86d</sum></package><package arch="noarch" epoch="1" name="perl-Pod-Escapes" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.04"><filename>perl-Pod-Escapes-1.04-299.el7_9.noarch.rpm</filename><sum type="sha256">068db7d933a580c661090d8a379621bcee2d174b33a1d8976f5317b2ff59df6e</sum></package><package arch="x86_64" epoch="4" name="perl-libs" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-libs-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">04d5bc27c7b13d66e657fd814dcbbe926f96552aa5805972137ccec6b9a23965</sum></package><package arch="x86_64" name="perl-core" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-core-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">1da5c538c63a3ecaa62da94d0bdc5d44ecc3f690ec2dda0632e2590c28092edd</sum></package><package arch="noarch" epoch="1" name="perl-Module-CoreList" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="2.76.02"><filename>perl-Module-CoreList-2.76.02-299.el7_9.noarch.rpm</filename><sum type="sha256">eb4fb6d9d0878452d5ffaeeec24440164ac1ad7ed67c47c6b0daaea384ebeeb6</sum></package><package arch="noarch" epoch="1" name="perl-Locale-Maketext-Simple" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.21"><filename>perl-Locale-Maketext-Simple-0.21-299.el7_9.noarch.rpm</filename><sum type="sha256">77c4bcc8c9ef5781b764dd9542a1596e8cf1b6a50edaaf11ca3a1b102aa2cc25</sum></package><package arch="i686" epoch="4" name="perl-devel" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-devel-5.16.3-299.el7_9.i686.rpm</filename><sum type="sha256">5ab0659408b632e1c380e0a22f046b28275a2ea546300491de5294deb3914044</sum></package><package arch="noarch" epoch="1" name="perl-Module-Loaded" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.08"><filename>perl-Module-Loaded-0.08-299.el7_9.noarch.rpm</filename><sum type="sha256">75b836eb19a38795869ec7bed3116c6ff0ffd00da7ca9ff9821e8ca47839b359</sum></package><package arch="noarch" epoch="1" name="perl-ExtUtils-CBuilder" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.28.2.6"><filename>perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.noarch.rpm</filename><sum type="sha256">85e6da0f6a6dd62d6dc5e93f54aadeb0132ce1a8be521478e0e0dc004bb20763</sum></package><package arch="noarch" epoch="1" name="perl-Package-Constants" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.02"><filename>perl-Package-Constants-0.02-299.el7_9.noarch.rpm</filename><sum type="sha256">c6625ac445d3b437ea31e7828492f99e7a9db3ab7edf9de0b9b24402756a989f</sum></package><package arch="noarch" name="perl-ExtUtils-Install" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.58"><filename>perl-ExtUtils-Install-1.58-299.el7_9.noarch.rpm</filename><sum type="sha256">37c2112c1518ee42c1df7e6f8fe87e262117d4f6ad41932686a04edc1b8ceea8</sum></package><package arch="x86_64" epoch="4" name="perl-tests" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-tests-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">592b542b405321165353857c4695891647bc7a67673d5c68676e60b0fdcaa4c9</sum></package><package arch="x86_64" epoch="4" name="perl-macros" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-macros-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">a879c7b50bb471730f8ee371ff90439aa238254bacf7b8cd7873afbe3b42538b</sum></package><package arch="i686" epoch="4" name="perl-libs" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-libs-5.16.3-299.el7_9.i686.rpm</filename><sum type="sha256">ac2d5dac30d4a5ce7ba68f7945408344ab95816306be5e169da469e58c0d7c5c</sum></package><package arch="noarch" name="perl-CPAN" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.9800"><filename>perl-CPAN-1.9800-299.el7_9.noarch.rpm</filename><sum type="sha256">e3c5ea3f13c03a16f5e33e284e704abdb353679e0cc3a4efd49921c39b8d867f</sum></package><package arch="noarch" name="perl-ExtUtils-Embed" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.30"><filename>perl-ExtUtils-Embed-1.30-299.el7_9.noarch.rpm</filename><sum type="sha256">e89ea9809b4a2d6e54e5beff03ee40da52b44c48e659e0f85f239db2841bf276</sum></package><package arch="x86_64" name="perl-Time-Piece" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.20.1"><filename>perl-Time-Piece-1.20.1-299.el7_9.x86_64.rpm</filename><sum type="sha256">43c6481cdb21258a36f8c8ecdb8a4512cb899ea3d99c5fd5709a1cee4e004463</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543" id="CVE-2020-10543" title="Perl: Heap-Based Buffer Overflow In Regular Expression Compiler Leads To Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878" id="CVE-2020-10878" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Integer Overflow Leads To Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723" id="CVE-2020-12723" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Recursive S_Study_Chunk() Calls Leads To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0343" id="RHSA-2021:0343-1" title="Rhsa-2021:0343-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837975" id="1837975" title="Perl: Heap-Based Buffer Overflow In Regular Expression Compiler Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837988" id="1837988" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Integer Overflow Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1838000" id="1838000" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Recursive S_Study_Chunk() Calls Leads To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0347-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: loader: OOB access while loading registered ROM may lead to code execution (CVE-2020-13765) 
* QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) 
Bug Fix(es): 
* qemu-kvm FTBFS on rhel7.9</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">3d983d02fae65d5d2d794245897da2c827f12948c7a4ee123f80ca80ae9acecc</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">a5d343cba227c6c6f03908786c70e3da960559910b7c92460d14db8c2a4c0f2a</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">c63f9feea8f5a3ed3c274cf5193209dd2390dbc612b647c2ea50e74c3442d4f2</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">3e53c4a294b534c01ee62b3f8659b72b3f66297c9fef4145c78ffe5d9e5e2929</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765" id="CVE-2020-13765" title="Qemu: Loader: Oob Access While Loading Registered Rom May Lead To Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" id="CVE-2020-16092" title="Qemu: Reachable Assertion Failure In Net_Tx_Pkt_Add_Raw_Fragment() In Hw/Net/Net_Tx_Pkt.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0347" id="RHSA-2021:0347-1" title="Rhsa-2021:0347-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1842912" id="1842912" title="Qemu: Loader: Oob Access While Loading Registered Rom May Lead To Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1860283" id="1860283" title="Qemu: Reachable Assertion Failure In Net_Tx_Pkt_Add_Raw_Fragment() In Hw/Net/Net_Tx_Pkt.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1884997" id="1884997" title="Qemu-Kvm Ftbfs On Rhel7.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0348-1</id><title>Glibc</title><description>Security Fix(es): 
* glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013) 
* glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE-2020-10029) 
* glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern (CVE-2020-29573) 
Bug Fix(es): 
* glibc: 64bit_strstr_via_64bit_strstr_sse2_unaligned detection fails with large device and inode numbers 
* glibc: Performance regression in ebizzy benchmark</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glibc" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-2.17-322.el7_9.i686.rpm</filename><sum type="sha256">eacc8efa6a1535da6f99f937267659b1ec828fcc3fa4a56f47093a9a8315a0ca</sum></package><package arch="x86_64" name="glibc-utils" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-utils-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">a155c586e5c649ea52af5ef4ff5dc331be482d4a9e5c4ab76cf7a5288dd9b444</sum></package><package arch="x86_64" name="nscd" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>nscd-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">f75977b94de6357ed40a544a2303b9c7b8718902a93c2167721c2afcc9838949</sum></package><package arch="x86_64" name="glibc-headers" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-headers-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">08a987cadf27a5435d8396d0aab85bc190e0c769adebb5d12441a18c54f5a6ee</sum></package><package arch="x86_64" name="glibc" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">7313f96fbe52fdf0ebe11d6f4104839038daa082391d8cebd0ce2ea53feaf182</sum></package><package arch="x86_64" name="glibc-common" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-common-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">8cbea99ed186c6a595b589a89239605dbf2e938c91f7c4163a3048d4e1e74e96</sum></package><package arch="x86_64" name="glibc-static" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-static-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">15893bf07ed763152dc3095f86c85e9d53b6fa08a4b88bd34ec084179d8c9f9b</sum></package><package arch="i686" name="glibc-static" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-static-2.17-322.el7_9.i686.rpm</filename><sum type="sha256">c0ddb6b8b1d2c5a02c0430a5c0f7e13c771bdc14316e37090c97beaea11feeff</sum></package><package arch="x86_64" name="glibc-devel" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-devel-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">c7e682d49ec90a9e70349e91dffb34b3e5542f8bde9305784e05b6e5988c9ea1</sum></package><package arch="i686" name="glibc-devel" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-devel-2.17-322.el7_9.i686.rpm</filename><sum type="sha256">f1012e0c66ae6b9a3d92cb167dd69f5096c1a450369f4bbdc677e3a52ffcfcf2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" id="CVE-2019-25013" title="Glibc: Buffer Over-Read In Iconv When Processing Invalid Multi-Byte Input Sequences In The Euc-Kr Encoding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" id="CVE-2020-10029" title="Glibc: Stack Corruption From Crafted Input In Cosl, Sinl, Sincosl, And Tanl Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573" id="CVE-2020-29573" title="Glibc: Stack-Based Buffer Overflow If The Input To Any Of The Printf Family Of Functions Is An 80-Bit Long Double With A Non-Canonical Bit Pattern" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0348" id="RHSA-2021:0348-1" title="Rhsa-2021:0348-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1810670" id="1810670" title="Glibc: Stack Corruption From Crafted Input In Cosl, Sinl, Sincosl, And Tanl Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1905213" id="1905213" title="Glibc: Stack-Based Buffer Overflow If The Input To Any Of The Printf Family Of Functions Is An 80-Bit Long Double With A Non-Canonical Bit Pattern" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1912960" id="1912960" title="Glibc: Buffer Over-Read In Iconv When Processing Invalid Multi-Byte Input Sequences In The Euc-Kr Encoding" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0411-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: sandbox escape via spawn portal (CVE-2021-21261)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-devel" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-10.el7_9.x86_64.rpm</filename><sum type="sha256">c61b58e307ac1e785724862fa5f80d57d397110acfe5376f714c6d64087cb797</sum></package><package arch="x86_64" name="flatpak" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-10.el7_9.x86_64.rpm</filename><sum type="sha256">d0145d8c5521f572cee69348e00b09664808dac4e662590d902cde19fa22dded</sum></package><package arch="x86_64" name="flatpak-builder" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">66b166ee3a30969fcbfd740f8798191aaf894a4056c4c2a7f7042a9669e71c5f</sum></package><package arch="x86_64" name="flatpak-libs" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-10.el7_9.x86_64.rpm</filename><sum type="sha256">53e599519edd6b04990f2649ab7bf1bde929af36f047272d2e76b9b41697686b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21261" id="CVE-2021-21261" title="Flatpak: Sandbox Escape Via Spawn Portal" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0411" id="RHSA-2021:0411-1" title="Rhsa-2021:0411-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917430" id="1917430" title="Flatpak: Sandbox Escape Via Spawn Portal" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0617-1</id><title>Xterm</title><description>Security Fix(es): 
* xterm: crash when processing combining characters (CVE-2021-27135) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xterm" release="3.el7_9.1" src="xterm-295-3.el7_9.1.src.rpm" version="295"><filename>xterm-295-3.el7_9.1.x86_64.rpm</filename><sum type="sha256">448e8b7f54e28e5c9703d5229aee2e63307a6bea9d70f84bd855c88859fc5a8c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27135" id="CVE-2021-27135" title="Xterm: Crash When Processing Combining Characters" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0617" id="RHSA-2021:0617-1" title="Rhsa-2021:0617-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1927559" id="1927559" title="Xterm: Crash When Processing Combining Characters" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0656-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.8.0 ESR. 
Security Fix(es): 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) 
* Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) 
* Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-02-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.8.0-1.el7_9.src.rpm" version="78.8.0"><filename>firefox-78.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">bffabc0d15725ce0f2db7e29a57216be2d3b29e90cf0e23635a246d57c21c2ca</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.8.0-1.el7_9.src.rpm" version="78.8.0"><filename>firefox-78.8.0-1.el7_9.i686.rpm</filename><sum type="sha256">538a8b1e2d4d02551f4ad78f403e7084b8f3fd3f64f30bc3365faba14fe7b146</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23968" id="CVE-2021-23968" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23969" id="CVE-2021-23969" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23973" id="CVE-2021-23973" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23978" id="CVE-2021-23978" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0656" id="RHSA-2021:0656-1" title="Rhsa-2021:0656-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932109" id="1932109" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932110" id="1932110" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932111" id="1932111" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932112" id="1932112" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0661-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.8.0. 
Security Fix(es): 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) 
* Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) 
* Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.8.0-1.el7_9.src.rpm" version="78.8.0"><filename>thunderbird-78.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">1aa130714f02d6a5c556311988160f3c524434952a6b6e37c8b5523300e692e3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23968" id="CVE-2021-23968" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23969" id="CVE-2021-23969" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23973" id="CVE-2021-23973" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23978" id="CVE-2021-23978" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0661" id="RHSA-2021:0661-1" title="Rhsa-2021:0661-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932109" id="1932109" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932110" id="1932110" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932111" id="1932111" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932112" id="1932112" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0671-1</id><title>Bind</title><description>Security Fix(es): 
* bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">9e5b6954ca3d6c7894e4f201dc81b3a44cc8cf313cb643ca80993250d9547edb</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.4.noarch.rpm</filename><sum type="sha256">d81fadde04be1fafc43fab22dc897c12cbb19a14fc937003d8d95ba767f91843</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">155fb158aedbbfa4309a2fc1adf9a9254c1e72832ec0430dbde5fd8000939dcb</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">38346b34188c8f02e33be391b9c1028daff131a0a07eb929d74946b40509a22c</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">b41e52f3edca20a46f973b6dd81fd78b02a2d0c135774557825a882f2af91f13</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">75de22a7c836f42186a20178c133abd0833d0c7f608cb1872a24ead5ae2b0596</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">3b21ac1132c5ac0564d420000174627746983bb56597497b7afa20ea1b190d44</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">ea67cc77ffa069331349999858a7be56379764c27f50aa00f11994ed1db6fa60</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">8ce0b348fce9caddf37e20278fe63d1e4bac52334a6403f1c4b4cb898d8d7eea</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">5f919bfe6e9caae3aeb37ac98f75fb8e1dd268d48a739a6f26e988f9cb5ffcdb</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">0e77cacde069f2e0f0d7cfd869a9bd2d68b63c6590cff598244fedf369b126ef</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">a5b9ea01e6d83a3239e98c5c2e8e6ca8197a99b540fd9892eadbac9228b5e94b</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">66663a2950103cfddb2b2f82893add4ddc1d4fb874136a91225bf566acb6d3ad</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">75a0b671d85195099bb672d52ce7bf7fb374f2def8985d6f2c8ad1be6185b8ac</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">3ddbdf296547fabaacae407f196f83ca4e63c7ce59bf70b98d7d54611641957e</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">0cb5b1e3f2f602e1b5303ccfc199c83effa19de2cecccb547d247f0c4184a099</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">e1645fffa1754662ae830cc70dea4f10d4b8bc0118a0418d0fb520dc4215eac5</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">c3863f0ffda833af04d3aabbb71c6855ecdb162552dbe1bb9a0909b2dd8d3a88</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">23d6d30f7a3e3d1a5ce04d5dca4b240fbac6e2ba56d0b5fc4f50706aa9f82cc7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">82e44e5a3424840261903624d40dab0f3bef3083778f2b39620e718284f247f3</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">6ff982494cc963eca0c9b8829b0c2e54bb1c40f199bb66e79111c7f17169a152</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">b2c9ec7a5b017591dbec8b4ce004c08404f77f88b6b86bab6a7425de98e969b7</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">1fa6d5cfee562631a69c72c711493521bb2ee0ce0781c824a931813e133eb96e</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">b6310e106c6c0a80ef9e0f873a5e7a774de6d8f5cba6ca65cb9e7abd23c62b60</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625" id="CVE-2020-8625" title="Bind: Buffer Overflow In The Spnego Implementation Affecting Gssapi Security Policy Negotiation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0671" id="RHSA-2021:0671-1" title="Rhsa-2021:0671-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1928486" id="1928486" title="Bind: Buffer Overflow In The Spnego Implementation Affecting Gssapi Security Policy Negotiation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0699-1</id><title>Grub2</title><description>Security Fix(es): 
* grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) 
* grub2: Use-after-free in rmmod command (CVE-2020-25632) 
* grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) 
* grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) 
* grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) 
* grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) 
* grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">211792b09de5351782267910616b09be86c67abe554507762bc029ab89f713ff</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">91c1cbec8dedb06f74858471953cc877a5897595d67ccdfcf76ec92f57f75a4c</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">c999bc78e1c7d24ce12dff9c26b89727827463f3ee2f11ad6ad55695ac479321</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">d9d357ee4502829702d4de4272c92a61df523bd845e715f0f95ba8a04b68357d</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">a610c089ce1abe1c02eb23d1a75f32d70130c8670f7e8e6b751b6f1d80988078</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">9be8073a973b51f8bf465f1ba7c590e9068250fd7379e83ca46bd83a52f5d2f3</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">af47dfa3848878a70d820bf584b6e27b477adfc7101a848e174f2a863fd0593d</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">bebee412feb48e7dd3053fe1436ae36d8dcb365da4e707c6e277d3510339dc66</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">f2b308408f69ad224c62a000f51ee6113a732caa79e13f048c6ca0dc3f3f9ec3</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">b7e8bbde9b06adc5a0547bc1a3eeaf5fd036048fd4b3f69ac9a6b5b4f4cd94db</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">bfd4e691d2d6adfe6486f9b58b48dad5c0f08ae2e264704e14be52fd9806a2ec</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">a5cce68e0bdd981b7e54b89917843063ffb01baa386511f618d6b3d3c7022d7b</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">0ff26046d5996a5ff945f544bbdf505d6c8486faa7944e7efefa2fa7fd15a66b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372" id="CVE-2020-14372" title="Grub2: Acpi Command Allows Privileged User To Load Crafted Acpi Tables When Secure Boot Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632" id="CVE-2020-25632" title="Grub2: Use-After-Free In Rmmod Command" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647" id="CVE-2020-25647" title="Grub2: Out-Of-Bounds Write In Grub_Usb_Device_Initialize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749" id="CVE-2020-27749" title="Grub2: Stack Buffer Overflow In Grub_Parser_Split_Cmdline()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779" id="CVE-2020-27779" title="Grub2: Cutmem Command Allows Privileged User To Remove Memory Regions When Secure Boot Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225" id="CVE-2021-20225" title="Grub2: Heap Out-Of-Bounds Write In Short Form Option Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233" id="CVE-2021-20233" title="Grub2: Heap Out-Of-Bounds Write Due To Miscalculation Of Space Required For Quoting" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0699" id="RHSA-2021:0699-1" title="Rhsa-2021:0699-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1873150" id="1873150" title="Grub2: Acpi Command Allows Privileged User To Load Crafted Acpi Tables When Secure Boot Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1879577" id="1879577" title="Grub2: Use-After-Free In Rmmod Command" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1886936" id="1886936" title="Grub2: Out-Of-Bounds Write In Grub_Usb_Device_Initialize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899966" id="1899966" title="Grub2: Stack Buffer Overflow In Grub_Parser_Split_Cmdline()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1900698" id="1900698" title="Grub2: Cutmem Command Allows Privileged User To Remove Memory Regions When Secure Boot Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1924696" id="1924696" title="Grub2: Heap Out-Of-Bounds Write In Short Form Option Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1926263" id="1926263" title="Grub2: Heap Out-Of-Bounds Write Due To Miscalculation Of Space Required For Quoting" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0742-1</id><title>Screen</title><description>Security Fix(es): 
* screen: crash when processing combining chars (CVE-2021-26937) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="screen" release="0.27.20120314git3c2946.el7_9" src="screen-4.1.0-0.27.20120314git3c2946.el7_9.src.rpm" version="4.1.0"><filename>screen-4.1.0-0.27.20120314git3c2946.el7_9.x86_64.rpm</filename><sum type="sha256">04b381686a62e297500b1341fea5c3bc9d8d3c2a9d9708a47b83290754881a02</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937" id="CVE-2021-26937" title="Screen: Crash When Processing Combining Chars" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0742" id="RHSA-2021:0742-1" title="Rhsa-2021:0742-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1927062" id="1927062" title="Screen: Crash When Processing Combining Chars" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0808-1</id><title>Wpa_Supplicant</title><description>Security Fix(es): 
* wpa_supplicant: Use-after-free in P2P provision discovery processing (CVE-2021-27803) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="wpa_supplicant" release="12.el7_9.2" src="wpa_supplicant-2.6-12.el7_9.2.src.rpm" version="2.6"><filename>wpa_supplicant-2.6-12.el7_9.2.x86_64.rpm</filename><sum type="sha256">9dc31d95856d46cb6ea4112361e906f5810c2e5fb807ed3171c9959c5764c7ff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27803" id="CVE-2021-27803" title="Wpa_Supplicant: Use-After-Free In P2P Provision Discovery Processing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0808" id="RHSA-2021:0808-1" title="Rhsa-2021:0808-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1933361" id="1933361" title="Wpa_Supplicant: Use-After-Free In P2P Provision Discovery Processing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0851-1</id><title>Pki-Core</title><description>Security Fix(es): 
* pki-core: Unprivileged users can renew any certificate (CVE-2021-20179) 
* pki-core: XSS in the certificate search results (CVE-2020-25715) 
* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) 
* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) 
* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) 
* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Add KRA Transport and Storage Certificates profiles, audit for IPA</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-server" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-server-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">27fbad63d48e3e5d745e3fa7226c4ff0c35826d1c159730c9dab129f41446f32</sum></package><package arch="x86_64" name="pki-symkey" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-symkey-10.5.18-12.el7_9.x86_64.rpm</filename><sum type="sha256">e8b4db9bf26442f9289a6ade6e8d75677b468c723c62a78555fef78dac9a052b</sum></package><package arch="x86_64" name="pki-tools" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-tools-10.5.18-12.el7_9.x86_64.rpm</filename><sum type="sha256">ecd82e0ce19a61c9f8e51befbcb13609b71dd3297b543dff15cd31a7c738bd75</sum></package><package arch="noarch" name="pki-base-java" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-base-java-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">b667db533d0b0466cd9a7f191ed2f46ff7b6343365895224fdc58b4ccfdf8dbb</sum></package><package arch="noarch" name="pki-base" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-base-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">0650738faad52eaabc98983e443017fb63828e5b482060b4c112d7c239c9f00b</sum></package><package arch="noarch" name="pki-kra" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-kra-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">7f670bc1e1e47d342b2576e33faa19251ea3b33eac328048705c167d0e486a4e</sum></package><package arch="noarch" name="pki-javadoc" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-javadoc-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">bdd7527f205895ae73cada65090a85605f39ab7185d081b4d36572e13e0b01c2</sum></package><package arch="noarch" name="pki-ca" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-ca-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">b25de0464afb617728604cf1bc4f9918c412182ca2720ef7f00193e098eaf5a4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10146" id="CVE-2019-10146" title="Pki-Core: Reflected Xss In 'Path Length' Constraint Field In Ca'S Agent Page" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10179" id="CVE-2019-10179" title="Pki-Core/Pki-Kra: Reflected Xss In Recoveryid Search Field At Kra'S Drm Agent Page In Authorize Recovery Tab" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10221" id="CVE-2019-10221" title="Pki-Core: Reflected Xss In Getcookies?Url= Endpoint In Ca" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1721" id="CVE-2020-1721" title="Pki-Core: Kra Vulnerable To Reflected Xss Via The Getpk12 Page" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25715" id="CVE-2020-25715" title="Pki-Core: Xss In The Certificate Search Results" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20179" id="CVE-2021-20179" title="Pki-Core: Unprivileged Users Can Renew Any Certificate" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0851" id="RHSA-2021:0851-1" title="Rhsa-2021:0851-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695901" id="1695901" title="Pki-Core/Pki-Kra: Reflected Xss In Recoveryid Search Field At Kra'S Drm Agent Page In Authorize Recovery Tab" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1710171" id="1710171" title="Pki-Core: Reflected Xss In 'Path Length' Constraint Field In Ca'S Agent Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732565" id="1732565" title="Pki-Core: Reflected Xss In Getcookies?Url= Endpoint In Ca" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777579" id="1777579" title="Pki-Core: Kra Vulnerable To Reflected Xss Via The Getpk12 Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883639" id="1883639" title="Add Kra Transport And Storage Certificates Profiles, Audit For Ipa" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1891016" id="1891016" title="Pki-Core: Xss In The Certificate Search Results" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1914379" id="1914379" title="Pki-Core: Unprivileged Users Can Renew Any Certificate" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0856-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211) 
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374) 
* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an  use- after-free (CVE-2020-29661) 
* kernel: malicious USB devices can lead to multiple out-of-bounds write (CVE-2019-19532) 
* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427) 
* kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c (CVE-2020-7053) 
* kernel: performance counters race condition use-after-free (CVE-2020-14351) 
* kernel: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints (CVE-2020-25645) 
* kernel: use-after-free in read in vt_do_kdgkb_ioctl (CVE-2020-25656) 
* kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705) 
* kernel: increase slab leak leads to DoS (CVE-2021-20265) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* BUG: scheduling while atomic: memory allocation under spinlock in scsi_register_device_handler() 
* WARNING in __iscsit_free_cmd during recovery Abort 
* lpfc does not issue adisc to fcp-2 devices, does not respond to nvme targer that send an adisc. 
* Panic in semctl_nolock.constprop.15+0x25b 
* [SL 7.7][md]Crash due to invalid pool workqueue pointer, work queue race 
* Guest crash on intel CPU with -cpu host,-spec-ctrl,+ibpb 
* SL7.9 - kernel/uv: handle length extension properly 
* Commit b144f013fc16a06d7a4b9a4be668a3583fafeda2 'i40e: don't report link up for a VF who hasn't enabled queues' introducing issues with VM using DPDK 
* writing to /sys/devices/(...)/net/eno49/queues/tx-16/xps_cpus triggers kernel panic 
* [Hyper-V][SL-7.9]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit 
* kvm-rhel7.9 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. 
* kernel: nvme nvme7: Connect command failed, error wo/DNR bit: 2 
* dm-mirror crashes from assuming underlying storage will have a non-NULL merge_bvec_fn 
* watchdog: use nmi registers snapshot in hardlockup handler 
* [DELL EMC 7.9 BUG] - Intel E810 NIC interfaces are not functional in SL 7.9 on system with AMD Rome CPUs 
* [DELL EMC BUG] SL system log shows AMD-Vi error when system connected with Gen 4 NVMe drives.</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.21.1.el7.noarch.rpm</filename><sum type="sha256">6094e9603b4da2bd6f6ba4f79b712d16a8d14b56191887cfcc8d668c5e2362d3</sum></package><package arch="x86_64" name="python-perf" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">038ef49230c56246614a9e976d4e48bf691c27dd1babf0c510652da1ecda040f</sum></package><package arch="x86_64" name="kernel-devel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">ff02f6293b776f7974a19d1df5e50d274398f2b81212892aa18f9004c1920919</sum></package><package arch="x86_64" name="kernel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">ef252a2debd82692426f4c01bf78fbc47a5fd2373952a6843a3bb47333493e49</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">62d08da1cc34e06dd21140d6be0ca0f6e7869848011f83c5a23144333caf3a2e</sum></package><package arch="x86_64" name="kernel-tools" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">d48e0daae8ef795b5f3cf826a5881096543adf966c215e3388fa49de360c058f</sum></package><package arch="x86_64" name="bpftool" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">f4f24d0198c3147ef985fad6a6f613c5aa3129c52651d6c13beb40148b07493f</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">8f972059f758fb7bee95648c26a782e740d4fdfa4df401a6a1148e86a46d9871</sum></package><package arch="x86_64" name="perf" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">6ffd6ee9056d8b8f8c7239bb253fd49c4e0a57d1dce37430e7feb045b84e089b</sum></package><package arch="x86_64" name="kernel-debug" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">a287d94257eaa061dbe260bb586cba664091cb667304204191a35dd9db5978aa</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">0100ae043f3b4577d767caf812e96a0c2347a2d109e71d143e3bc254b9b10ddb</sum></package><package arch="x86_64" name="kernel-headers" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">9aaef01ecab63328e3ee79422bf5342559480ec96b42b3e1ebf609a58030336e</sum></package><package arch="noarch" name="kernel-doc" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.21.1.el7.noarch.rpm</filename><sum type="sha256">adfcbf58602c4b3dbbd37b346c6368af906a4c0af87daa81824d1135b0976a3d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19532" id="CVE-2019-19532" title="Kernel: Malicious Usb Devices Can Lead To Multiple Out-Of-Bounds Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0427" id="CVE-2020-0427" title="Kernel: Out-Of-Bounds Reads In Pinctrl Subsystem." type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14351" id="CVE-2020-14351" title="Kernel: Performance Counters Race Condition Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211" id="CVE-2020-25211" title="Kernel: Local Buffer Overflow In Ctnetlink_Parse_Tuple_Filter In Net/Netfilter/Nf_Conntrack_Netlink.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25645" id="CVE-2020-25645" title="Kernel: Geneve/Ipsec Traffic May Be Unencrypted Between Two Geneve Endpoints" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656" id="CVE-2020-25656" title="Kernel: Use-After-Free In Read In Vt_Do_Kdgkb_Ioctl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25705" id="CVE-2020-25705" title="Kernel: Icmp Rate Limiting Can Be Used For Dns Poisoning Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374" id="CVE-2020-28374" title="Kernel: Scsi Target (Lio) Write To Any Block On Ilo Backstore" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661" id="CVE-2020-29661" title="Kernel: Locking Issue In Drivers/Tty/Tty_Jobctrl.C Can Lead To An Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7053" id="CVE-2020-7053" title="Kernel: Use-After-Free In I915_Ppgtt_Close In Drivers/Gpu/Drm/I915/I915_Gem_Gtt.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20265" id="CVE-2021-20265" title="Kernel: Increase Slab Leak Leads To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0856" id="RHSA-2021:0856-1" title="Rhsa-2021:0856-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781821" id="1781821" title="Kernel: Malicious Usb Devices Can Lead To Multiple Out-Of-Bounds Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795624" id="1795624" title="Kernel: Use-After-Free In I915_Ppgtt_Close In Drivers/Gpu/Drm/I915/I915_Gem_Gtt.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862849" id="1862849" title="Kernel: Performance Counters Race Condition Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877571" id="1877571" title="Kernel: Local Buffer Overflow In Ctnetlink_Parse_Tuple_Filter In Net/Netfilter/Nf_Conntrack_Netlink.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883988" id="1883988" title="Kernel: Geneve/Ipsec Traffic May Be Unencrypted Between Two Geneve Endpoints" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1888726" id="1888726" title="Kernel: Use-After-Free In Read In Vt_Do_Kdgkb_Ioctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1894579" id="1894579" title="Kernel: Icmp Rate Limiting Can Be Used For Dns Poisoning Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899804" id="1899804" title="Kernel: Scsi Target (Lio) Write To Any Block On Ilo Backstore" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1901064" id="1901064" title="Commit B144F013Fc16A06D7A4B9A4Be668A3583Fafeda2 'I40E: Don'T Report Link Up For A Vf Who Hasn'T Enabled Queues' Introducing Issues With Vm Using Dpdk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1906525" id="1906525" title="Kernel: Locking Issue In Drivers/Tty/Tty_Jobctrl.C Can Lead To An Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908827" id="1908827" title="Kernel: Increase Slab Leak Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1916589" id="1916589" title="Watchdog: Use Nmi Registers Snapshot In Hardlockup Handler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1919893" id="1919893" title="Kernel: Out-Of-Bounds Reads In Pinctrl Subsystem." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0992-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.9.0 ESR. 
Security Fix(es): 
* Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) 
* Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) 
* Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.9.0-1.el7_9.src.rpm" version="78.9.0"><filename>firefox-78.9.0-1.el7_9.i686.rpm</filename><sum type="sha256">449df14cbc360743a3ab34d43f07a97ec2ae373f63491b35c475434ecfb308c5</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.9.0-1.el7_9.src.rpm" version="78.9.0"><filename>firefox-78.9.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ad40a8508cce4f79864e7962536bb3f03c4fabb32ecc482d6995b438af64895f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" id="CVE-2021-23981" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" id="CVE-2021-23982" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" id="CVE-2021-23984" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" id="CVE-2021-23987" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0992" id="RHSA-2021:0992-1" title="Rhsa-2021:0992-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942783" id="1942783" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942785" id="1942785" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942786" id="1942786" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942787" id="1942787" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0996-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.9.0. 
Security Fix(es): 
* Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) 
* Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) 
* Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-78.9.0-3.el7_9.src.rpm" version="78.9.0"><filename>thunderbird-78.9.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">9166b8b1c37e08b4a4701b5003444858ecacb6bcdc9d9b193f7e4d3b351b924a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" id="CVE-2021-23981" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" id="CVE-2021-23982" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" id="CVE-2021-23984" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" id="CVE-2021-23987" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0996" id="RHSA-2021:0996-1" title="Rhsa-2021:0996-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942783" id="1942783" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942785" id="1942785" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942786" id="1942786" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942787" id="1942787" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1002-1</id><title>Flatpak</title><description>Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. 
Security Fix(es): 
* flatpak: "file forwarding" feature can be used to gain unprivileged access to files (CVE-2021-21381) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE </description><severity>important</severity><release>Scientific Linux</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-libs" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-11.el7_9.x86_64.rpm</filename><sum type="sha256">a0c8d1985df717702a00c219b1dfd9411914253a7af93163f746b240db61095c</sum></package><package arch="x86_64" name="flatpak-builder" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-11.el7_9.x86_64.rpm</filename><sum type="sha256">00b6c14edd3fba4506b7a3230dca8b89b5540cebc377e2a51f7db1bd3ca4597b</sum></package><package arch="x86_64" name="flatpak" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-11.el7_9.x86_64.rpm</filename><sum type="sha256">cf33c9234e001b7606a40cc1b452c7b75d25d06e6005bde9a65aa998a9ad0676</sum></package><package arch="x86_64" name="flatpak-devel" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-11.el7_9.x86_64.rpm</filename><sum type="sha256">6521ddac74e82ae43234671eddc5f24b795a47e80b72b9e7a97ff01c824d8094</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21381" id="CVE-2021-21381" title="Flatpak: &quot;File Forwarding&quot; Feature Can Be Used To Gain Unprivileged Access To Files" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1002" id="RHSA-2021:1002-1" title="Rhsa-2021:1002-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1936985" id="1936985" title="Flatpak: &quot;File Forwarding&quot; Feature Can Be Used To Gain Unprivileged Access To Files" type="bugzilla" /></references></update></updates>