var-202101-0119
Vulnerability from variot

The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: glibc security, bug fix, and enhancement update Advisory ID: RHSA-2021:1585-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:1585 Issue date: 2021-05-18 CVE Names: CVE-2016-10228 CVE-2019-9169 CVE-2019-25013 CVE-2020-27618 CVE-2021-3326 ==================================================================== 1. Summary:

An update for glibc is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64

  1. Description:

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1428290 - CVE-2016-10228 glibc: iconv program can hang when invoked with the -c option 1684057 - CVE-2019-9169 glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read 1704868 - CVE-2016-10228 glibc: iconv: Fix converter hangs and front end option parsing for //TRANSLIT and //IGNORE [rhel-8] 1855790 - glibc: Update Intel CET support from upstream 1856398 - glibc: Build with -moutline-atomics on aarch64 1868106 - glibc: Transaction ID collisions cause slow DNS lookups in getaddrinfo 1871385 - glibc: Improve auditing implementation (including DT_AUDIT, and DT_DEPAUDIT) 1871387 - glibc: Improve IBM POWER9 architecture performance 1871394 - glibc: Fix AVX2 off-by-one error in strncmp (swbz#25933) 1871395 - glibc: Improve IBM Z (s390x) Performance 1871396 - glibc: Improve use of static TLS surplus for optimizations. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

aarch64: compat-libpthread-nonshared-2.28-151.el8.aarch64.rpm glibc-debuginfo-2.28-151.el8.aarch64.rpm glibc-utils-2.28-151.el8.aarch64.rpm

ppc64le: compat-libpthread-nonshared-2.28-151.el8.ppc64le.rpm glibc-debuginfo-2.28-151.el8.ppc64le.rpm glibc-debuginfo-common-2.28-151.el8.ppc64le.rpm glibc-utils-2.28-151.el8.ppc64le.rpm

s390x: compat-libpthread-nonshared-2.28-151.el8.s390x.rpm glibc-debuginfo-2.28-151.el8.s390x.rpm glibc-debuginfo-common-2.28-151.el8.s390x.rpm glibc-utils-2.28-151.el8.s390x.rpm

x86_64: compat-libpthread-nonshared-2.28-151.el8.x86_64.rpm glibc-debuginfo-2.28-151.el8.x86_64.rpm glibc-debuginfo-common-2.28-151.el8.x86_64.rpm glibc-utils-2.28-151.el8.x86_64.rpm

Red Hat Enterprise Linux BaseOS (v. 8):

Source: glibc-2.28-151.el8.src.rpm

aarch64: glibc-2.28-151.el8.aarch64.rpm glibc-all-langpacks-2.28-151.el8.aarch64.rpm glibc-common-2.28-151.el8.aarch64.rpm glibc-debuginfo-2.28-151.el8.aarch64.rpm glibc-devel-2.28-151.el8.aarch64.rpm glibc-headers-2.28-151.el8.aarch64.rpm glibc-langpack-aa-2.28-151.el8.aarch64.rpm glibc-langpack-af-2.28-151.el8.aarch64.rpm glibc-langpack-agr-2.28-151.el8.aarch64.rpm glibc-langpack-ak-2.28-151.el8.aarch64.rpm glibc-langpack-am-2.28-151.el8.aarch64.rpm glibc-langpack-an-2.28-151.el8.aarch64.rpm glibc-langpack-anp-2.28-151.el8.aarch64.rpm glibc-langpack-ar-2.28-151.el8.aarch64.rpm glibc-langpack-as-2.28-151.el8.aarch64.rpm glibc-langpack-ast-2.28-151.el8.aarch64.rpm glibc-langpack-ayc-2.28-151.el8.aarch64.rpm glibc-langpack-az-2.28-151.el8.aarch64.rpm glibc-langpack-be-2.28-151.el8.aarch64.rpm glibc-langpack-bem-2.28-151.el8.aarch64.rpm glibc-langpack-ber-2.28-151.el8.aarch64.rpm glibc-langpack-bg-2.28-151.el8.aarch64.rpm glibc-langpack-bhb-2.28-151.el8.aarch64.rpm glibc-langpack-bho-2.28-151.el8.aarch64.rpm glibc-langpack-bi-2.28-151.el8.aarch64.rpm glibc-langpack-bn-2.28-151.el8.aarch64.rpm glibc-langpack-bo-2.28-151.el8.aarch64.rpm glibc-langpack-br-2.28-151.el8.aarch64.rpm glibc-langpack-brx-2.28-151.el8.aarch64.rpm glibc-langpack-bs-2.28-151.el8.aarch64.rpm glibc-langpack-byn-2.28-151.el8.aarch64.rpm glibc-langpack-ca-2.28-151.el8.aarch64.rpm glibc-langpack-ce-2.28-151.el8.aarch64.rpm glibc-langpack-chr-2.28-151.el8.aarch64.rpm glibc-langpack-cmn-2.28-151.el8.aarch64.rpm glibc-langpack-crh-2.28-151.el8.aarch64.rpm glibc-langpack-cs-2.28-151.el8.aarch64.rpm glibc-langpack-csb-2.28-151.el8.aarch64.rpm glibc-langpack-cv-2.28-151.el8.aarch64.rpm glibc-langpack-cy-2.28-151.el8.aarch64.rpm glibc-langpack-da-2.28-151.el8.aarch64.rpm glibc-langpack-de-2.28-151.el8.aarch64.rpm glibc-langpack-doi-2.28-151.el8.aarch64.rpm glibc-langpack-dsb-2.28-151.el8.aarch64.rpm glibc-langpack-dv-2.28-151.el8.aarch64.rpm glibc-langpack-dz-2.28-151.el8.aarch64.rpm glibc-langpack-el-2.28-151.el8.aarch64.rpm glibc-langpack-en-2.28-151.el8.aarch64.rpm glibc-langpack-eo-2.28-151.el8.aarch64.rpm glibc-langpack-es-2.28-151.el8.aarch64.rpm glibc-langpack-et-2.28-151.el8.aarch64.rpm glibc-langpack-eu-2.28-151.el8.aarch64.rpm glibc-langpack-fa-2.28-151.el8.aarch64.rpm glibc-langpack-ff-2.28-151.el8.aarch64.rpm glibc-langpack-fi-2.28-151.el8.aarch64.rpm glibc-langpack-fil-2.28-151.el8.aarch64.rpm glibc-langpack-fo-2.28-151.el8.aarch64.rpm glibc-langpack-fr-2.28-151.el8.aarch64.rpm glibc-langpack-fur-2.28-151.el8.aarch64.rpm glibc-langpack-fy-2.28-151.el8.aarch64.rpm glibc-langpack-ga-2.28-151.el8.aarch64.rpm glibc-langpack-gd-2.28-151.el8.aarch64.rpm glibc-langpack-gez-2.28-151.el8.aarch64.rpm glibc-langpack-gl-2.28-151.el8.aarch64.rpm glibc-langpack-gu-2.28-151.el8.aarch64.rpm glibc-langpack-gv-2.28-151.el8.aarch64.rpm glibc-langpack-ha-2.28-151.el8.aarch64.rpm glibc-langpack-hak-2.28-151.el8.aarch64.rpm glibc-langpack-he-2.28-151.el8.aarch64.rpm glibc-langpack-hi-2.28-151.el8.aarch64.rpm glibc-langpack-hif-2.28-151.el8.aarch64.rpm glibc-langpack-hne-2.28-151.el8.aarch64.rpm glibc-langpack-hr-2.28-151.el8.aarch64.rpm glibc-langpack-hsb-2.28-151.el8.aarch64.rpm glibc-langpack-ht-2.28-151.el8.aarch64.rpm glibc-langpack-hu-2.28-151.el8.aarch64.rpm glibc-langpack-hy-2.28-151.el8.aarch64.rpm glibc-langpack-ia-2.28-151.el8.aarch64.rpm glibc-langpack-id-2.28-151.el8.aarch64.rpm glibc-langpack-ig-2.28-151.el8.aarch64.rpm glibc-langpack-ik-2.28-151.el8.aarch64.rpm glibc-langpack-is-2.28-151.el8.aarch64.rpm glibc-langpack-it-2.28-151.el8.aarch64.rpm glibc-langpack-iu-2.28-151.el8.aarch64.rpm glibc-langpack-ja-2.28-151.el8.aarch64.rpm glibc-langpack-ka-2.28-151.el8.aarch64.rpm glibc-langpack-kab-2.28-151.el8.aarch64.rpm glibc-langpack-kk-2.28-151.el8.aarch64.rpm glibc-langpack-kl-2.28-151.el8.aarch64.rpm glibc-langpack-km-2.28-151.el8.aarch64.rpm glibc-langpack-kn-2.28-151.el8.aarch64.rpm glibc-langpack-ko-2.28-151.el8.aarch64.rpm glibc-langpack-kok-2.28-151.el8.aarch64.rpm glibc-langpack-ks-2.28-151.el8.aarch64.rpm glibc-langpack-ku-2.28-151.el8.aarch64.rpm glibc-langpack-kw-2.28-151.el8.aarch64.rpm glibc-langpack-ky-2.28-151.el8.aarch64.rpm glibc-langpack-lb-2.28-151.el8.aarch64.rpm glibc-langpack-lg-2.28-151.el8.aarch64.rpm glibc-langpack-li-2.28-151.el8.aarch64.rpm glibc-langpack-lij-2.28-151.el8.aarch64.rpm glibc-langpack-ln-2.28-151.el8.aarch64.rpm glibc-langpack-lo-2.28-151.el8.aarch64.rpm glibc-langpack-lt-2.28-151.el8.aarch64.rpm glibc-langpack-lv-2.28-151.el8.aarch64.rpm glibc-langpack-lzh-2.28-151.el8.aarch64.rpm glibc-langpack-mag-2.28-151.el8.aarch64.rpm glibc-langpack-mai-2.28-151.el8.aarch64.rpm glibc-langpack-mfe-2.28-151.el8.aarch64.rpm glibc-langpack-mg-2.28-151.el8.aarch64.rpm glibc-langpack-mhr-2.28-151.el8.aarch64.rpm glibc-langpack-mi-2.28-151.el8.aarch64.rpm glibc-langpack-miq-2.28-151.el8.aarch64.rpm glibc-langpack-mjw-2.28-151.el8.aarch64.rpm glibc-langpack-mk-2.28-151.el8.aarch64.rpm glibc-langpack-ml-2.28-151.el8.aarch64.rpm glibc-langpack-mn-2.28-151.el8.aarch64.rpm glibc-langpack-mni-2.28-151.el8.aarch64.rpm glibc-langpack-mr-2.28-151.el8.aarch64.rpm glibc-langpack-ms-2.28-151.el8.aarch64.rpm glibc-langpack-mt-2.28-151.el8.aarch64.rpm glibc-langpack-my-2.28-151.el8.aarch64.rpm glibc-langpack-nan-2.28-151.el8.aarch64.rpm glibc-langpack-nb-2.28-151.el8.aarch64.rpm glibc-langpack-nds-2.28-151.el8.aarch64.rpm glibc-langpack-ne-2.28-151.el8.aarch64.rpm glibc-langpack-nhn-2.28-151.el8.aarch64.rpm glibc-langpack-niu-2.28-151.el8.aarch64.rpm glibc-langpack-nl-2.28-151.el8.aarch64.rpm glibc-langpack-nn-2.28-151.el8.aarch64.rpm glibc-langpack-nr-2.28-151.el8.aarch64.rpm glibc-langpack-nso-2.28-151.el8.aarch64.rpm glibc-langpack-oc-2.28-151.el8.aarch64.rpm glibc-langpack-om-2.28-151.el8.aarch64.rpm glibc-langpack-or-2.28-151.el8.aarch64.rpm glibc-langpack-os-2.28-151.el8.aarch64.rpm glibc-langpack-pa-2.28-151.el8.aarch64.rpm glibc-langpack-pap-2.28-151.el8.aarch64.rpm glibc-langpack-pl-2.28-151.el8.aarch64.rpm glibc-langpack-ps-2.28-151.el8.aarch64.rpm glibc-langpack-pt-2.28-151.el8.aarch64.rpm glibc-langpack-quz-2.28-151.el8.aarch64.rpm glibc-langpack-raj-2.28-151.el8.aarch64.rpm glibc-langpack-ro-2.28-151.el8.aarch64.rpm glibc-langpack-ru-2.28-151.el8.aarch64.rpm glibc-langpack-rw-2.28-151.el8.aarch64.rpm glibc-langpack-sa-2.28-151.el8.aarch64.rpm glibc-langpack-sah-2.28-151.el8.aarch64.rpm glibc-langpack-sat-2.28-151.el8.aarch64.rpm glibc-langpack-sc-2.28-151.el8.aarch64.rpm glibc-langpack-sd-2.28-151.el8.aarch64.rpm glibc-langpack-se-2.28-151.el8.aarch64.rpm glibc-langpack-sgs-2.28-151.el8.aarch64.rpm glibc-langpack-shn-2.28-151.el8.aarch64.rpm glibc-langpack-shs-2.28-151.el8.aarch64.rpm glibc-langpack-si-2.28-151.el8.aarch64.rpm glibc-langpack-sid-2.28-151.el8.aarch64.rpm glibc-langpack-sk-2.28-151.el8.aarch64.rpm glibc-langpack-sl-2.28-151.el8.aarch64.rpm glibc-langpack-sm-2.28-151.el8.aarch64.rpm glibc-langpack-so-2.28-151.el8.aarch64.rpm glibc-langpack-sq-2.28-151.el8.aarch64.rpm glibc-langpack-sr-2.28-151.el8.aarch64.rpm glibc-langpack-ss-2.28-151.el8.aarch64.rpm glibc-langpack-st-2.28-151.el8.aarch64.rpm glibc-langpack-sv-2.28-151.el8.aarch64.rpm glibc-langpack-sw-2.28-151.el8.aarch64.rpm glibc-langpack-szl-2.28-151.el8.aarch64.rpm glibc-langpack-ta-2.28-151.el8.aarch64.rpm glibc-langpack-tcy-2.28-151.el8.aarch64.rpm glibc-langpack-te-2.28-151.el8.aarch64.rpm glibc-langpack-tg-2.28-151.el8.aarch64.rpm glibc-langpack-th-2.28-151.el8.aarch64.rpm glibc-langpack-the-2.28-151.el8.aarch64.rpm glibc-langpack-ti-2.28-151.el8.aarch64.rpm glibc-langpack-tig-2.28-151.el8.aarch64.rpm glibc-langpack-tk-2.28-151.el8.aarch64.rpm glibc-langpack-tl-2.28-151.el8.aarch64.rpm glibc-langpack-tn-2.28-151.el8.aarch64.rpm glibc-langpack-to-2.28-151.el8.aarch64.rpm glibc-langpack-tpi-2.28-151.el8.aarch64.rpm glibc-langpack-tr-2.28-151.el8.aarch64.rpm glibc-langpack-ts-2.28-151.el8.aarch64.rpm glibc-langpack-tt-2.28-151.el8.aarch64.rpm glibc-langpack-ug-2.28-151.el8.aarch64.rpm glibc-langpack-uk-2.28-151.el8.aarch64.rpm glibc-langpack-unm-2.28-151.el8.aarch64.rpm glibc-langpack-ur-2.28-151.el8.aarch64.rpm glibc-langpack-uz-2.28-151.el8.aarch64.rpm glibc-langpack-ve-2.28-151.el8.aarch64.rpm glibc-langpack-vi-2.28-151.el8.aarch64.rpm glibc-langpack-wa-2.28-151.el8.aarch64.rpm glibc-langpack-wae-2.28-151.el8.aarch64.rpm glibc-langpack-wal-2.28-151.el8.aarch64.rpm glibc-langpack-wo-2.28-151.el8.aarch64.rpm glibc-langpack-xh-2.28-151.el8.aarch64.rpm glibc-langpack-yi-2.28-151.el8.aarch64.rpm glibc-langpack-yo-2.28-151.el8.aarch64.rpm glibc-langpack-yue-2.28-151.el8.aarch64.rpm glibc-langpack-yuw-2.28-151.el8.aarch64.rpm glibc-langpack-zh-2.28-151.el8.aarch64.rpm glibc-langpack-zu-2.28-151.el8.aarch64.rpm glibc-locale-source-2.28-151.el8.aarch64.rpm glibc-minimal-langpack-2.28-151.el8.aarch64.rpm libnsl-2.28-151.el8.aarch64.rpm nscd-2.28-151.el8.aarch64.rpm nss_db-2.28-151.el8.aarch64.rpm

ppc64le: glibc-2.28-151.el8.ppc64le.rpm glibc-all-langpacks-2.28-151.el8.ppc64le.rpm glibc-common-2.28-151.el8.ppc64le.rpm glibc-debuginfo-2.28-151.el8.ppc64le.rpm glibc-debuginfo-common-2.28-151.el8.ppc64le.rpm glibc-devel-2.28-151.el8.ppc64le.rpm glibc-headers-2.28-151.el8.ppc64le.rpm glibc-langpack-aa-2.28-151.el8.ppc64le.rpm glibc-langpack-af-2.28-151.el8.ppc64le.rpm glibc-langpack-agr-2.28-151.el8.ppc64le.rpm glibc-langpack-ak-2.28-151.el8.ppc64le.rpm glibc-langpack-am-2.28-151.el8.ppc64le.rpm glibc-langpack-an-2.28-151.el8.ppc64le.rpm glibc-langpack-anp-2.28-151.el8.ppc64le.rpm glibc-langpack-ar-2.28-151.el8.ppc64le.rpm glibc-langpack-as-2.28-151.el8.ppc64le.rpm glibc-langpack-ast-2.28-151.el8.ppc64le.rpm glibc-langpack-ayc-2.28-151.el8.ppc64le.rpm glibc-langpack-az-2.28-151.el8.ppc64le.rpm glibc-langpack-be-2.28-151.el8.ppc64le.rpm glibc-langpack-bem-2.28-151.el8.ppc64le.rpm glibc-langpack-ber-2.28-151.el8.ppc64le.rpm glibc-langpack-bg-2.28-151.el8.ppc64le.rpm glibc-langpack-bhb-2.28-151.el8.ppc64le.rpm glibc-langpack-bho-2.28-151.el8.ppc64le.rpm glibc-langpack-bi-2.28-151.el8.ppc64le.rpm glibc-langpack-bn-2.28-151.el8.ppc64le.rpm glibc-langpack-bo-2.28-151.el8.ppc64le.rpm glibc-langpack-br-2.28-151.el8.ppc64le.rpm glibc-langpack-brx-2.28-151.el8.ppc64le.rpm glibc-langpack-bs-2.28-151.el8.ppc64le.rpm glibc-langpack-byn-2.28-151.el8.ppc64le.rpm glibc-langpack-ca-2.28-151.el8.ppc64le.rpm glibc-langpack-ce-2.28-151.el8.ppc64le.rpm glibc-langpack-chr-2.28-151.el8.ppc64le.rpm glibc-langpack-cmn-2.28-151.el8.ppc64le.rpm glibc-langpack-crh-2.28-151.el8.ppc64le.rpm glibc-langpack-cs-2.28-151.el8.ppc64le.rpm glibc-langpack-csb-2.28-151.el8.ppc64le.rpm glibc-langpack-cv-2.28-151.el8.ppc64le.rpm glibc-langpack-cy-2.28-151.el8.ppc64le.rpm glibc-langpack-da-2.28-151.el8.ppc64le.rpm glibc-langpack-de-2.28-151.el8.ppc64le.rpm glibc-langpack-doi-2.28-151.el8.ppc64le.rpm glibc-langpack-dsb-2.28-151.el8.ppc64le.rpm glibc-langpack-dv-2.28-151.el8.ppc64le.rpm glibc-langpack-dz-2.28-151.el8.ppc64le.rpm glibc-langpack-el-2.28-151.el8.ppc64le.rpm glibc-langpack-en-2.28-151.el8.ppc64le.rpm glibc-langpack-eo-2.28-151.el8.ppc64le.rpm glibc-langpack-es-2.28-151.el8.ppc64le.rpm glibc-langpack-et-2.28-151.el8.ppc64le.rpm glibc-langpack-eu-2.28-151.el8.ppc64le.rpm glibc-langpack-fa-2.28-151.el8.ppc64le.rpm glibc-langpack-ff-2.28-151.el8.ppc64le.rpm glibc-langpack-fi-2.28-151.el8.ppc64le.rpm glibc-langpack-fil-2.28-151.el8.ppc64le.rpm glibc-langpack-fo-2.28-151.el8.ppc64le.rpm glibc-langpack-fr-2.28-151.el8.ppc64le.rpm glibc-langpack-fur-2.28-151.el8.ppc64le.rpm glibc-langpack-fy-2.28-151.el8.ppc64le.rpm glibc-langpack-ga-2.28-151.el8.ppc64le.rpm glibc-langpack-gd-2.28-151.el8.ppc64le.rpm glibc-langpack-gez-2.28-151.el8.ppc64le.rpm glibc-langpack-gl-2.28-151.el8.ppc64le.rpm glibc-langpack-gu-2.28-151.el8.ppc64le.rpm glibc-langpack-gv-2.28-151.el8.ppc64le.rpm glibc-langpack-ha-2.28-151.el8.ppc64le.rpm glibc-langpack-hak-2.28-151.el8.ppc64le.rpm glibc-langpack-he-2.28-151.el8.ppc64le.rpm glibc-langpack-hi-2.28-151.el8.ppc64le.rpm glibc-langpack-hif-2.28-151.el8.ppc64le.rpm glibc-langpack-hne-2.28-151.el8.ppc64le.rpm glibc-langpack-hr-2.28-151.el8.ppc64le.rpm glibc-langpack-hsb-2.28-151.el8.ppc64le.rpm glibc-langpack-ht-2.28-151.el8.ppc64le.rpm glibc-langpack-hu-2.28-151.el8.ppc64le.rpm glibc-langpack-hy-2.28-151.el8.ppc64le.rpm glibc-langpack-ia-2.28-151.el8.ppc64le.rpm glibc-langpack-id-2.28-151.el8.ppc64le.rpm glibc-langpack-ig-2.28-151.el8.ppc64le.rpm glibc-langpack-ik-2.28-151.el8.ppc64le.rpm glibc-langpack-is-2.28-151.el8.ppc64le.rpm glibc-langpack-it-2.28-151.el8.ppc64le.rpm glibc-langpack-iu-2.28-151.el8.ppc64le.rpm glibc-langpack-ja-2.28-151.el8.ppc64le.rpm glibc-langpack-ka-2.28-151.el8.ppc64le.rpm glibc-langpack-kab-2.28-151.el8.ppc64le.rpm glibc-langpack-kk-2.28-151.el8.ppc64le.rpm glibc-langpack-kl-2.28-151.el8.ppc64le.rpm glibc-langpack-km-2.28-151.el8.ppc64le.rpm glibc-langpack-kn-2.28-151.el8.ppc64le.rpm glibc-langpack-ko-2.28-151.el8.ppc64le.rpm glibc-langpack-kok-2.28-151.el8.ppc64le.rpm glibc-langpack-ks-2.28-151.el8.ppc64le.rpm glibc-langpack-ku-2.28-151.el8.ppc64le.rpm glibc-langpack-kw-2.28-151.el8.ppc64le.rpm glibc-langpack-ky-2.28-151.el8.ppc64le.rpm glibc-langpack-lb-2.28-151.el8.ppc64le.rpm glibc-langpack-lg-2.28-151.el8.ppc64le.rpm glibc-langpack-li-2.28-151.el8.ppc64le.rpm glibc-langpack-lij-2.28-151.el8.ppc64le.rpm glibc-langpack-ln-2.28-151.el8.ppc64le.rpm glibc-langpack-lo-2.28-151.el8.ppc64le.rpm glibc-langpack-lt-2.28-151.el8.ppc64le.rpm glibc-langpack-lv-2.28-151.el8.ppc64le.rpm glibc-langpack-lzh-2.28-151.el8.ppc64le.rpm glibc-langpack-mag-2.28-151.el8.ppc64le.rpm glibc-langpack-mai-2.28-151.el8.ppc64le.rpm glibc-langpack-mfe-2.28-151.el8.ppc64le.rpm glibc-langpack-mg-2.28-151.el8.ppc64le.rpm glibc-langpack-mhr-2.28-151.el8.ppc64le.rpm glibc-langpack-mi-2.28-151.el8.ppc64le.rpm glibc-langpack-miq-2.28-151.el8.ppc64le.rpm glibc-langpack-mjw-2.28-151.el8.ppc64le.rpm glibc-langpack-mk-2.28-151.el8.ppc64le.rpm glibc-langpack-ml-2.28-151.el8.ppc64le.rpm glibc-langpack-mn-2.28-151.el8.ppc64le.rpm glibc-langpack-mni-2.28-151.el8.ppc64le.rpm glibc-langpack-mr-2.28-151.el8.ppc64le.rpm glibc-langpack-ms-2.28-151.el8.ppc64le.rpm glibc-langpack-mt-2.28-151.el8.ppc64le.rpm glibc-langpack-my-2.28-151.el8.ppc64le.rpm glibc-langpack-nan-2.28-151.el8.ppc64le.rpm glibc-langpack-nb-2.28-151.el8.ppc64le.rpm glibc-langpack-nds-2.28-151.el8.ppc64le.rpm glibc-langpack-ne-2.28-151.el8.ppc64le.rpm glibc-langpack-nhn-2.28-151.el8.ppc64le.rpm glibc-langpack-niu-2.28-151.el8.ppc64le.rpm glibc-langpack-nl-2.28-151.el8.ppc64le.rpm glibc-langpack-nn-2.28-151.el8.ppc64le.rpm glibc-langpack-nr-2.28-151.el8.ppc64le.rpm glibc-langpack-nso-2.28-151.el8.ppc64le.rpm glibc-langpack-oc-2.28-151.el8.ppc64le.rpm glibc-langpack-om-2.28-151.el8.ppc64le.rpm glibc-langpack-or-2.28-151.el8.ppc64le.rpm glibc-langpack-os-2.28-151.el8.ppc64le.rpm glibc-langpack-pa-2.28-151.el8.ppc64le.rpm glibc-langpack-pap-2.28-151.el8.ppc64le.rpm glibc-langpack-pl-2.28-151.el8.ppc64le.rpm glibc-langpack-ps-2.28-151.el8.ppc64le.rpm glibc-langpack-pt-2.28-151.el8.ppc64le.rpm glibc-langpack-quz-2.28-151.el8.ppc64le.rpm glibc-langpack-raj-2.28-151.el8.ppc64le.rpm glibc-langpack-ro-2.28-151.el8.ppc64le.rpm glibc-langpack-ru-2.28-151.el8.ppc64le.rpm glibc-langpack-rw-2.28-151.el8.ppc64le.rpm glibc-langpack-sa-2.28-151.el8.ppc64le.rpm glibc-langpack-sah-2.28-151.el8.ppc64le.rpm glibc-langpack-sat-2.28-151.el8.ppc64le.rpm glibc-langpack-sc-2.28-151.el8.ppc64le.rpm glibc-langpack-sd-2.28-151.el8.ppc64le.rpm glibc-langpack-se-2.28-151.el8.ppc64le.rpm glibc-langpack-sgs-2.28-151.el8.ppc64le.rpm glibc-langpack-shn-2.28-151.el8.ppc64le.rpm glibc-langpack-shs-2.28-151.el8.ppc64le.rpm glibc-langpack-si-2.28-151.el8.ppc64le.rpm glibc-langpack-sid-2.28-151.el8.ppc64le.rpm glibc-langpack-sk-2.28-151.el8.ppc64le.rpm glibc-langpack-sl-2.28-151.el8.ppc64le.rpm glibc-langpack-sm-2.28-151.el8.ppc64le.rpm glibc-langpack-so-2.28-151.el8.ppc64le.rpm glibc-langpack-sq-2.28-151.el8.ppc64le.rpm glibc-langpack-sr-2.28-151.el8.ppc64le.rpm glibc-langpack-ss-2.28-151.el8.ppc64le.rpm glibc-langpack-st-2.28-151.el8.ppc64le.rpm glibc-langpack-sv-2.28-151.el8.ppc64le.rpm glibc-langpack-sw-2.28-151.el8.ppc64le.rpm glibc-langpack-szl-2.28-151.el8.ppc64le.rpm glibc-langpack-ta-2.28-151.el8.ppc64le.rpm glibc-langpack-tcy-2.28-151.el8.ppc64le.rpm glibc-langpack-te-2.28-151.el8.ppc64le.rpm glibc-langpack-tg-2.28-151.el8.ppc64le.rpm glibc-langpack-th-2.28-151.el8.ppc64le.rpm glibc-langpack-the-2.28-151.el8.ppc64le.rpm glibc-langpack-ti-2.28-151.el8.ppc64le.rpm glibc-langpack-tig-2.28-151.el8.ppc64le.rpm glibc-langpack-tk-2.28-151.el8.ppc64le.rpm glibc-langpack-tl-2.28-151.el8.ppc64le.rpm glibc-langpack-tn-2.28-151.el8.ppc64le.rpm glibc-langpack-to-2.28-151.el8.ppc64le.rpm glibc-langpack-tpi-2.28-151.el8.ppc64le.rpm glibc-langpack-tr-2.28-151.el8.ppc64le.rpm glibc-langpack-ts-2.28-151.el8.ppc64le.rpm glibc-langpack-tt-2.28-151.el8.ppc64le.rpm glibc-langpack-ug-2.28-151.el8.ppc64le.rpm glibc-langpack-uk-2.28-151.el8.ppc64le.rpm glibc-langpack-unm-2.28-151.el8.ppc64le.rpm glibc-langpack-ur-2.28-151.el8.ppc64le.rpm glibc-langpack-uz-2.28-151.el8.ppc64le.rpm glibc-langpack-ve-2.28-151.el8.ppc64le.rpm glibc-langpack-vi-2.28-151.el8.ppc64le.rpm glibc-langpack-wa-2.28-151.el8.ppc64le.rpm glibc-langpack-wae-2.28-151.el8.ppc64le.rpm glibc-langpack-wal-2.28-151.el8.ppc64le.rpm glibc-langpack-wo-2.28-151.el8.ppc64le.rpm glibc-langpack-xh-2.28-151.el8.ppc64le.rpm glibc-langpack-yi-2.28-151.el8.ppc64le.rpm glibc-langpack-yo-2.28-151.el8.ppc64le.rpm glibc-langpack-yue-2.28-151.el8.ppc64le.rpm glibc-langpack-yuw-2.28-151.el8.ppc64le.rpm glibc-langpack-zh-2.28-151.el8.ppc64le.rpm glibc-langpack-zu-2.28-151.el8.ppc64le.rpm glibc-locale-source-2.28-151.el8.ppc64le.rpm glibc-minimal-langpack-2.28-151.el8.ppc64le.rpm libnsl-2.28-151.el8.ppc64le.rpm nscd-2.28-151.el8.ppc64le.rpm nss_db-2.28-151.el8.ppc64le.rpm

s390x: glibc-2.28-151.el8.s390x.rpm glibc-all-langpacks-2.28-151.el8.s390x.rpm glibc-common-2.28-151.el8.s390x.rpm glibc-debuginfo-2.28-151.el8.s390x.rpm glibc-debuginfo-common-2.28-151.el8.s390x.rpm glibc-devel-2.28-151.el8.s390x.rpm glibc-headers-2.28-151.el8.s390x.rpm glibc-langpack-aa-2.28-151.el8.s390x.rpm glibc-langpack-af-2.28-151.el8.s390x.rpm glibc-langpack-agr-2.28-151.el8.s390x.rpm glibc-langpack-ak-2.28-151.el8.s390x.rpm glibc-langpack-am-2.28-151.el8.s390x.rpm glibc-langpack-an-2.28-151.el8.s390x.rpm glibc-langpack-anp-2.28-151.el8.s390x.rpm glibc-langpack-ar-2.28-151.el8.s390x.rpm glibc-langpack-as-2.28-151.el8.s390x.rpm glibc-langpack-ast-2.28-151.el8.s390x.rpm glibc-langpack-ayc-2.28-151.el8.s390x.rpm glibc-langpack-az-2.28-151.el8.s390x.rpm glibc-langpack-be-2.28-151.el8.s390x.rpm glibc-langpack-bem-2.28-151.el8.s390x.rpm glibc-langpack-ber-2.28-151.el8.s390x.rpm glibc-langpack-bg-2.28-151.el8.s390x.rpm glibc-langpack-bhb-2.28-151.el8.s390x.rpm glibc-langpack-bho-2.28-151.el8.s390x.rpm glibc-langpack-bi-2.28-151.el8.s390x.rpm glibc-langpack-bn-2.28-151.el8.s390x.rpm glibc-langpack-bo-2.28-151.el8.s390x.rpm glibc-langpack-br-2.28-151.el8.s390x.rpm glibc-langpack-brx-2.28-151.el8.s390x.rpm glibc-langpack-bs-2.28-151.el8.s390x.rpm glibc-langpack-byn-2.28-151.el8.s390x.rpm glibc-langpack-ca-2.28-151.el8.s390x.rpm glibc-langpack-ce-2.28-151.el8.s390x.rpm glibc-langpack-chr-2.28-151.el8.s390x.rpm glibc-langpack-cmn-2.28-151.el8.s390x.rpm glibc-langpack-crh-2.28-151.el8.s390x.rpm glibc-langpack-cs-2.28-151.el8.s390x.rpm glibc-langpack-csb-2.28-151.el8.s390x.rpm glibc-langpack-cv-2.28-151.el8.s390x.rpm glibc-langpack-cy-2.28-151.el8.s390x.rpm glibc-langpack-da-2.28-151.el8.s390x.rpm glibc-langpack-de-2.28-151.el8.s390x.rpm glibc-langpack-doi-2.28-151.el8.s390x.rpm glibc-langpack-dsb-2.28-151.el8.s390x.rpm glibc-langpack-dv-2.28-151.el8.s390x.rpm glibc-langpack-dz-2.28-151.el8.s390x.rpm glibc-langpack-el-2.28-151.el8.s390x.rpm glibc-langpack-en-2.28-151.el8.s390x.rpm glibc-langpack-eo-2.28-151.el8.s390x.rpm glibc-langpack-es-2.28-151.el8.s390x.rpm glibc-langpack-et-2.28-151.el8.s390x.rpm glibc-langpack-eu-2.28-151.el8.s390x.rpm glibc-langpack-fa-2.28-151.el8.s390x.rpm glibc-langpack-ff-2.28-151.el8.s390x.rpm glibc-langpack-fi-2.28-151.el8.s390x.rpm glibc-langpack-fil-2.28-151.el8.s390x.rpm glibc-langpack-fo-2.28-151.el8.s390x.rpm glibc-langpack-fr-2.28-151.el8.s390x.rpm glibc-langpack-fur-2.28-151.el8.s390x.rpm glibc-langpack-fy-2.28-151.el8.s390x.rpm glibc-langpack-ga-2.28-151.el8.s390x.rpm glibc-langpack-gd-2.28-151.el8.s390x.rpm glibc-langpack-gez-2.28-151.el8.s390x.rpm glibc-langpack-gl-2.28-151.el8.s390x.rpm glibc-langpack-gu-2.28-151.el8.s390x.rpm glibc-langpack-gv-2.28-151.el8.s390x.rpm glibc-langpack-ha-2.28-151.el8.s390x.rpm glibc-langpack-hak-2.28-151.el8.s390x.rpm glibc-langpack-he-2.28-151.el8.s390x.rpm glibc-langpack-hi-2.28-151.el8.s390x.rpm glibc-langpack-hif-2.28-151.el8.s390x.rpm glibc-langpack-hne-2.28-151.el8.s390x.rpm glibc-langpack-hr-2.28-151.el8.s390x.rpm glibc-langpack-hsb-2.28-151.el8.s390x.rpm glibc-langpack-ht-2.28-151.el8.s390x.rpm glibc-langpack-hu-2.28-151.el8.s390x.rpm glibc-langpack-hy-2.28-151.el8.s390x.rpm glibc-langpack-ia-2.28-151.el8.s390x.rpm glibc-langpack-id-2.28-151.el8.s390x.rpm glibc-langpack-ig-2.28-151.el8.s390x.rpm glibc-langpack-ik-2.28-151.el8.s390x.rpm glibc-langpack-is-2.28-151.el8.s390x.rpm glibc-langpack-it-2.28-151.el8.s390x.rpm glibc-langpack-iu-2.28-151.el8.s390x.rpm glibc-langpack-ja-2.28-151.el8.s390x.rpm glibc-langpack-ka-2.28-151.el8.s390x.rpm glibc-langpack-kab-2.28-151.el8.s390x.rpm glibc-langpack-kk-2.28-151.el8.s390x.rpm glibc-langpack-kl-2.28-151.el8.s390x.rpm glibc-langpack-km-2.28-151.el8.s390x.rpm glibc-langpack-kn-2.28-151.el8.s390x.rpm glibc-langpack-ko-2.28-151.el8.s390x.rpm glibc-langpack-kok-2.28-151.el8.s390x.rpm glibc-langpack-ks-2.28-151.el8.s390x.rpm glibc-langpack-ku-2.28-151.el8.s390x.rpm glibc-langpack-kw-2.28-151.el8.s390x.rpm glibc-langpack-ky-2.28-151.el8.s390x.rpm glibc-langpack-lb-2.28-151.el8.s390x.rpm glibc-langpack-lg-2.28-151.el8.s390x.rpm glibc-langpack-li-2.28-151.el8.s390x.rpm glibc-langpack-lij-2.28-151.el8.s390x.rpm glibc-langpack-ln-2.28-151.el8.s390x.rpm glibc-langpack-lo-2.28-151.el8.s390x.rpm glibc-langpack-lt-2.28-151.el8.s390x.rpm glibc-langpack-lv-2.28-151.el8.s390x.rpm glibc-langpack-lzh-2.28-151.el8.s390x.rpm glibc-langpack-mag-2.28-151.el8.s390x.rpm glibc-langpack-mai-2.28-151.el8.s390x.rpm glibc-langpack-mfe-2.28-151.el8.s390x.rpm glibc-langpack-mg-2.28-151.el8.s390x.rpm glibc-langpack-mhr-2.28-151.el8.s390x.rpm glibc-langpack-mi-2.28-151.el8.s390x.rpm glibc-langpack-miq-2.28-151.el8.s390x.rpm glibc-langpack-mjw-2.28-151.el8.s390x.rpm glibc-langpack-mk-2.28-151.el8.s390x.rpm glibc-langpack-ml-2.28-151.el8.s390x.rpm glibc-langpack-mn-2.28-151.el8.s390x.rpm glibc-langpack-mni-2.28-151.el8.s390x.rpm glibc-langpack-mr-2.28-151.el8.s390x.rpm glibc-langpack-ms-2.28-151.el8.s390x.rpm glibc-langpack-mt-2.28-151.el8.s390x.rpm glibc-langpack-my-2.28-151.el8.s390x.rpm glibc-langpack-nan-2.28-151.el8.s390x.rpm glibc-langpack-nb-2.28-151.el8.s390x.rpm glibc-langpack-nds-2.28-151.el8.s390x.rpm glibc-langpack-ne-2.28-151.el8.s390x.rpm glibc-langpack-nhn-2.28-151.el8.s390x.rpm glibc-langpack-niu-2.28-151.el8.s390x.rpm glibc-langpack-nl-2.28-151.el8.s390x.rpm glibc-langpack-nn-2.28-151.el8.s390x.rpm glibc-langpack-nr-2.28-151.el8.s390x.rpm glibc-langpack-nso-2.28-151.el8.s390x.rpm glibc-langpack-oc-2.28-151.el8.s390x.rpm glibc-langpack-om-2.28-151.el8.s390x.rpm glibc-langpack-or-2.28-151.el8.s390x.rpm glibc-langpack-os-2.28-151.el8.s390x.rpm glibc-langpack-pa-2.28-151.el8.s390x.rpm glibc-langpack-pap-2.28-151.el8.s390x.rpm glibc-langpack-pl-2.28-151.el8.s390x.rpm glibc-langpack-ps-2.28-151.el8.s390x.rpm glibc-langpack-pt-2.28-151.el8.s390x.rpm glibc-langpack-quz-2.28-151.el8.s390x.rpm glibc-langpack-raj-2.28-151.el8.s390x.rpm glibc-langpack-ro-2.28-151.el8.s390x.rpm glibc-langpack-ru-2.28-151.el8.s390x.rpm glibc-langpack-rw-2.28-151.el8.s390x.rpm glibc-langpack-sa-2.28-151.el8.s390x.rpm glibc-langpack-sah-2.28-151.el8.s390x.rpm glibc-langpack-sat-2.28-151.el8.s390x.rpm glibc-langpack-sc-2.28-151.el8.s390x.rpm glibc-langpack-sd-2.28-151.el8.s390x.rpm glibc-langpack-se-2.28-151.el8.s390x.rpm glibc-langpack-sgs-2.28-151.el8.s390x.rpm glibc-langpack-shn-2.28-151.el8.s390x.rpm glibc-langpack-shs-2.28-151.el8.s390x.rpm glibc-langpack-si-2.28-151.el8.s390x.rpm glibc-langpack-sid-2.28-151.el8.s390x.rpm glibc-langpack-sk-2.28-151.el8.s390x.rpm glibc-langpack-sl-2.28-151.el8.s390x.rpm glibc-langpack-sm-2.28-151.el8.s390x.rpm glibc-langpack-so-2.28-151.el8.s390x.rpm glibc-langpack-sq-2.28-151.el8.s390x.rpm glibc-langpack-sr-2.28-151.el8.s390x.rpm glibc-langpack-ss-2.28-151.el8.s390x.rpm glibc-langpack-st-2.28-151.el8.s390x.rpm glibc-langpack-sv-2.28-151.el8.s390x.rpm glibc-langpack-sw-2.28-151.el8.s390x.rpm glibc-langpack-szl-2.28-151.el8.s390x.rpm glibc-langpack-ta-2.28-151.el8.s390x.rpm glibc-langpack-tcy-2.28-151.el8.s390x.rpm glibc-langpack-te-2.28-151.el8.s390x.rpm glibc-langpack-tg-2.28-151.el8.s390x.rpm glibc-langpack-th-2.28-151.el8.s390x.rpm glibc-langpack-the-2.28-151.el8.s390x.rpm glibc-langpack-ti-2.28-151.el8.s390x.rpm glibc-langpack-tig-2.28-151.el8.s390x.rpm glibc-langpack-tk-2.28-151.el8.s390x.rpm glibc-langpack-tl-2.28-151.el8.s390x.rpm glibc-langpack-tn-2.28-151.el8.s390x.rpm glibc-langpack-to-2.28-151.el8.s390x.rpm glibc-langpack-tpi-2.28-151.el8.s390x.rpm glibc-langpack-tr-2.28-151.el8.s390x.rpm glibc-langpack-ts-2.28-151.el8.s390x.rpm glibc-langpack-tt-2.28-151.el8.s390x.rpm glibc-langpack-ug-2.28-151.el8.s390x.rpm glibc-langpack-uk-2.28-151.el8.s390x.rpm glibc-langpack-unm-2.28-151.el8.s390x.rpm glibc-langpack-ur-2.28-151.el8.s390x.rpm glibc-langpack-uz-2.28-151.el8.s390x.rpm glibc-langpack-ve-2.28-151.el8.s390x.rpm glibc-langpack-vi-2.28-151.el8.s390x.rpm glibc-langpack-wa-2.28-151.el8.s390x.rpm glibc-langpack-wae-2.28-151.el8.s390x.rpm glibc-langpack-wal-2.28-151.el8.s390x.rpm glibc-langpack-wo-2.28-151.el8.s390x.rpm glibc-langpack-xh-2.28-151.el8.s390x.rpm glibc-langpack-yi-2.28-151.el8.s390x.rpm glibc-langpack-yo-2.28-151.el8.s390x.rpm glibc-langpack-yue-2.28-151.el8.s390x.rpm glibc-langpack-yuw-2.28-151.el8.s390x.rpm glibc-langpack-zh-2.28-151.el8.s390x.rpm glibc-langpack-zu-2.28-151.el8.s390x.rpm glibc-locale-source-2.28-151.el8.s390x.rpm glibc-minimal-langpack-2.28-151.el8.s390x.rpm libnsl-2.28-151.el8.s390x.rpm nscd-2.28-151.el8.s390x.rpm nss_db-2.28-151.el8.s390x.rpm

x86_64: glibc-2.28-151.el8.i686.rpm glibc-2.28-151.el8.x86_64.rpm glibc-all-langpacks-2.28-151.el8.x86_64.rpm glibc-common-2.28-151.el8.x86_64.rpm glibc-debuginfo-2.28-151.el8.i686.rpm glibc-debuginfo-2.28-151.el8.x86_64.rpm glibc-debuginfo-common-2.28-151.el8.i686.rpm glibc-debuginfo-common-2.28-151.el8.x86_64.rpm glibc-devel-2.28-151.el8.i686.rpm glibc-devel-2.28-151.el8.x86_64.rpm glibc-headers-2.28-151.el8.i686.rpm glibc-headers-2.28-151.el8.x86_64.rpm glibc-langpack-aa-2.28-151.el8.x86_64.rpm glibc-langpack-af-2.28-151.el8.x86_64.rpm glibc-langpack-agr-2.28-151.el8.x86_64.rpm glibc-langpack-ak-2.28-151.el8.x86_64.rpm glibc-langpack-am-2.28-151.el8.x86_64.rpm glibc-langpack-an-2.28-151.el8.x86_64.rpm glibc-langpack-anp-2.28-151.el8.x86_64.rpm glibc-langpack-ar-2.28-151.el8.x86_64.rpm glibc-langpack-as-2.28-151.el8.x86_64.rpm glibc-langpack-ast-2.28-151.el8.x86_64.rpm glibc-langpack-ayc-2.28-151.el8.x86_64.rpm glibc-langpack-az-2.28-151.el8.x86_64.rpm glibc-langpack-be-2.28-151.el8.x86_64.rpm glibc-langpack-bem-2.28-151.el8.x86_64.rpm glibc-langpack-ber-2.28-151.el8.x86_64.rpm glibc-langpack-bg-2.28-151.el8.x86_64.rpm glibc-langpack-bhb-2.28-151.el8.x86_64.rpm glibc-langpack-bho-2.28-151.el8.x86_64.rpm glibc-langpack-bi-2.28-151.el8.x86_64.rpm glibc-langpack-bn-2.28-151.el8.x86_64.rpm glibc-langpack-bo-2.28-151.el8.x86_64.rpm glibc-langpack-br-2.28-151.el8.x86_64.rpm glibc-langpack-brx-2.28-151.el8.x86_64.rpm glibc-langpack-bs-2.28-151.el8.x86_64.rpm glibc-langpack-byn-2.28-151.el8.x86_64.rpm glibc-langpack-ca-2.28-151.el8.x86_64.rpm glibc-langpack-ce-2.28-151.el8.x86_64.rpm glibc-langpack-chr-2.28-151.el8.x86_64.rpm glibc-langpack-cmn-2.28-151.el8.x86_64.rpm glibc-langpack-crh-2.28-151.el8.x86_64.rpm glibc-langpack-cs-2.28-151.el8.x86_64.rpm glibc-langpack-csb-2.28-151.el8.x86_64.rpm glibc-langpack-cv-2.28-151.el8.x86_64.rpm glibc-langpack-cy-2.28-151.el8.x86_64.rpm glibc-langpack-da-2.28-151.el8.x86_64.rpm glibc-langpack-de-2.28-151.el8.x86_64.rpm glibc-langpack-doi-2.28-151.el8.x86_64.rpm glibc-langpack-dsb-2.28-151.el8.x86_64.rpm glibc-langpack-dv-2.28-151.el8.x86_64.rpm glibc-langpack-dz-2.28-151.el8.x86_64.rpm glibc-langpack-el-2.28-151.el8.x86_64.rpm glibc-langpack-en-2.28-151.el8.x86_64.rpm glibc-langpack-eo-2.28-151.el8.x86_64.rpm glibc-langpack-es-2.28-151.el8.x86_64.rpm glibc-langpack-et-2.28-151.el8.x86_64.rpm glibc-langpack-eu-2.28-151.el8.x86_64.rpm glibc-langpack-fa-2.28-151.el8.x86_64.rpm glibc-langpack-ff-2.28-151.el8.x86_64.rpm glibc-langpack-fi-2.28-151.el8.x86_64.rpm glibc-langpack-fil-2.28-151.el8.x86_64.rpm glibc-langpack-fo-2.28-151.el8.x86_64.rpm glibc-langpack-fr-2.28-151.el8.x86_64.rpm glibc-langpack-fur-2.28-151.el8.x86_64.rpm glibc-langpack-fy-2.28-151.el8.x86_64.rpm glibc-langpack-ga-2.28-151.el8.x86_64.rpm glibc-langpack-gd-2.28-151.el8.x86_64.rpm glibc-langpack-gez-2.28-151.el8.x86_64.rpm glibc-langpack-gl-2.28-151.el8.x86_64.rpm glibc-langpack-gu-2.28-151.el8.x86_64.rpm glibc-langpack-gv-2.28-151.el8.x86_64.rpm glibc-langpack-ha-2.28-151.el8.x86_64.rpm glibc-langpack-hak-2.28-151.el8.x86_64.rpm glibc-langpack-he-2.28-151.el8.x86_64.rpm glibc-langpack-hi-2.28-151.el8.x86_64.rpm glibc-langpack-hif-2.28-151.el8.x86_64.rpm glibc-langpack-hne-2.28-151.el8.x86_64.rpm glibc-langpack-hr-2.28-151.el8.x86_64.rpm glibc-langpack-hsb-2.28-151.el8.x86_64.rpm glibc-langpack-ht-2.28-151.el8.x86_64.rpm glibc-langpack-hu-2.28-151.el8.x86_64.rpm glibc-langpack-hy-2.28-151.el8.x86_64.rpm glibc-langpack-ia-2.28-151.el8.x86_64.rpm glibc-langpack-id-2.28-151.el8.x86_64.rpm glibc-langpack-ig-2.28-151.el8.x86_64.rpm glibc-langpack-ik-2.28-151.el8.x86_64.rpm glibc-langpack-is-2.28-151.el8.x86_64.rpm glibc-langpack-it-2.28-151.el8.x86_64.rpm glibc-langpack-iu-2.28-151.el8.x86_64.rpm glibc-langpack-ja-2.28-151.el8.x86_64.rpm glibc-langpack-ka-2.28-151.el8.x86_64.rpm glibc-langpack-kab-2.28-151.el8.x86_64.rpm glibc-langpack-kk-2.28-151.el8.x86_64.rpm glibc-langpack-kl-2.28-151.el8.x86_64.rpm glibc-langpack-km-2.28-151.el8.x86_64.rpm glibc-langpack-kn-2.28-151.el8.x86_64.rpm glibc-langpack-ko-2.28-151.el8.x86_64.rpm glibc-langpack-kok-2.28-151.el8.x86_64.rpm glibc-langpack-ks-2.28-151.el8.x86_64.rpm glibc-langpack-ku-2.28-151.el8.x86_64.rpm glibc-langpack-kw-2.28-151.el8.x86_64.rpm glibc-langpack-ky-2.28-151.el8.x86_64.rpm glibc-langpack-lb-2.28-151.el8.x86_64.rpm glibc-langpack-lg-2.28-151.el8.x86_64.rpm glibc-langpack-li-2.28-151.el8.x86_64.rpm glibc-langpack-lij-2.28-151.el8.x86_64.rpm glibc-langpack-ln-2.28-151.el8.x86_64.rpm glibc-langpack-lo-2.28-151.el8.x86_64.rpm glibc-langpack-lt-2.28-151.el8.x86_64.rpm glibc-langpack-lv-2.28-151.el8.x86_64.rpm glibc-langpack-lzh-2.28-151.el8.x86_64.rpm glibc-langpack-mag-2.28-151.el8.x86_64.rpm glibc-langpack-mai-2.28-151.el8.x86_64.rpm glibc-langpack-mfe-2.28-151.el8.x86_64.rpm glibc-langpack-mg-2.28-151.el8.x86_64.rpm glibc-langpack-mhr-2.28-151.el8.x86_64.rpm glibc-langpack-mi-2.28-151.el8.x86_64.rpm glibc-langpack-miq-2.28-151.el8.x86_64.rpm glibc-langpack-mjw-2.28-151.el8.x86_64.rpm glibc-langpack-mk-2.28-151.el8.x86_64.rpm glibc-langpack-ml-2.28-151.el8.x86_64.rpm glibc-langpack-mn-2.28-151.el8.x86_64.rpm glibc-langpack-mni-2.28-151.el8.x86_64.rpm glibc-langpack-mr-2.28-151.el8.x86_64.rpm glibc-langpack-ms-2.28-151.el8.x86_64.rpm glibc-langpack-mt-2.28-151.el8.x86_64.rpm glibc-langpack-my-2.28-151.el8.x86_64.rpm glibc-langpack-nan-2.28-151.el8.x86_64.rpm glibc-langpack-nb-2.28-151.el8.x86_64.rpm glibc-langpack-nds-2.28-151.el8.x86_64.rpm glibc-langpack-ne-2.28-151.el8.x86_64.rpm glibc-langpack-nhn-2.28-151.el8.x86_64.rpm glibc-langpack-niu-2.28-151.el8.x86_64.rpm glibc-langpack-nl-2.28-151.el8.x86_64.rpm glibc-langpack-nn-2.28-151.el8.x86_64.rpm glibc-langpack-nr-2.28-151.el8.x86_64.rpm glibc-langpack-nso-2.28-151.el8.x86_64.rpm glibc-langpack-oc-2.28-151.el8.x86_64.rpm glibc-langpack-om-2.28-151.el8.x86_64.rpm glibc-langpack-or-2.28-151.el8.x86_64.rpm glibc-langpack-os-2.28-151.el8.x86_64.rpm glibc-langpack-pa-2.28-151.el8.x86_64.rpm glibc-langpack-pap-2.28-151.el8.x86_64.rpm glibc-langpack-pl-2.28-151.el8.x86_64.rpm glibc-langpack-ps-2.28-151.el8.x86_64.rpm glibc-langpack-pt-2.28-151.el8.x86_64.rpm glibc-langpack-quz-2.28-151.el8.x86_64.rpm glibc-langpack-raj-2.28-151.el8.x86_64.rpm glibc-langpack-ro-2.28-151.el8.x86_64.rpm glibc-langpack-ru-2.28-151.el8.x86_64.rpm glibc-langpack-rw-2.28-151.el8.x86_64.rpm glibc-langpack-sa-2.28-151.el8.x86_64.rpm glibc-langpack-sah-2.28-151.el8.x86_64.rpm glibc-langpack-sat-2.28-151.el8.x86_64.rpm glibc-langpack-sc-2.28-151.el8.x86_64.rpm glibc-langpack-sd-2.28-151.el8.x86_64.rpm glibc-langpack-se-2.28-151.el8.x86_64.rpm glibc-langpack-sgs-2.28-151.el8.x86_64.rpm glibc-langpack-shn-2.28-151.el8.x86_64.rpm glibc-langpack-shs-2.28-151.el8.x86_64.rpm glibc-langpack-si-2.28-151.el8.x86_64.rpm glibc-langpack-sid-2.28-151.el8.x86_64.rpm glibc-langpack-sk-2.28-151.el8.x86_64.rpm glibc-langpack-sl-2.28-151.el8.x86_64.rpm glibc-langpack-sm-2.28-151.el8.x86_64.rpm glibc-langpack-so-2.28-151.el8.x86_64.rpm glibc-langpack-sq-2.28-151.el8.x86_64.rpm glibc-langpack-sr-2.28-151.el8.x86_64.rpm glibc-langpack-ss-2.28-151.el8.x86_64.rpm glibc-langpack-st-2.28-151.el8.x86_64.rpm glibc-langpack-sv-2.28-151.el8.x86_64.rpm glibc-langpack-sw-2.28-151.el8.x86_64.rpm glibc-langpack-szl-2.28-151.el8.x86_64.rpm glibc-langpack-ta-2.28-151.el8.x86_64.rpm glibc-langpack-tcy-2.28-151.el8.x86_64.rpm glibc-langpack-te-2.28-151.el8.x86_64.rpm glibc-langpack-tg-2.28-151.el8.x86_64.rpm glibc-langpack-th-2.28-151.el8.x86_64.rpm glibc-langpack-the-2.28-151.el8.x86_64.rpm glibc-langpack-ti-2.28-151.el8.x86_64.rpm glibc-langpack-tig-2.28-151.el8.x86_64.rpm glibc-langpack-tk-2.28-151.el8.x86_64.rpm glibc-langpack-tl-2.28-151.el8.x86_64.rpm glibc-langpack-tn-2.28-151.el8.x86_64.rpm glibc-langpack-to-2.28-151.el8.x86_64.rpm glibc-langpack-tpi-2.28-151.el8.x86_64.rpm glibc-langpack-tr-2.28-151.el8.x86_64.rpm glibc-langpack-ts-2.28-151.el8.x86_64.rpm glibc-langpack-tt-2.28-151.el8.x86_64.rpm glibc-langpack-ug-2.28-151.el8.x86_64.rpm glibc-langpack-uk-2.28-151.el8.x86_64.rpm glibc-langpack-unm-2.28-151.el8.x86_64.rpm glibc-langpack-ur-2.28-151.el8.x86_64.rpm glibc-langpack-uz-2.28-151.el8.x86_64.rpm glibc-langpack-ve-2.28-151.el8.x86_64.rpm glibc-langpack-vi-2.28-151.el8.x86_64.rpm glibc-langpack-wa-2.28-151.el8.x86_64.rpm glibc-langpack-wae-2.28-151.el8.x86_64.rpm glibc-langpack-wal-2.28-151.el8.x86_64.rpm glibc-langpack-wo-2.28-151.el8.x86_64.rpm glibc-langpack-xh-2.28-151.el8.x86_64.rpm glibc-langpack-yi-2.28-151.el8.x86_64.rpm glibc-langpack-yo-2.28-151.el8.x86_64.rpm glibc-langpack-yue-2.28-151.el8.x86_64.rpm glibc-langpack-yuw-2.28-151.el8.x86_64.rpm glibc-langpack-zh-2.28-151.el8.x86_64.rpm glibc-langpack-zu-2.28-151.el8.x86_64.rpm glibc-locale-source-2.28-151.el8.x86_64.rpm glibc-minimal-langpack-2.28-151.el8.x86_64.rpm libnsl-2.28-151.el8.i686.rpm libnsl-2.28-151.el8.x86_64.rpm nscd-2.28-151.el8.x86_64.rpm nss_db-2.28-151.el8.i686.rpm nss_db-2.28-151.el8.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64: glibc-benchtests-2.28-151.el8.aarch64.rpm glibc-debuginfo-2.28-151.el8.aarch64.rpm glibc-nss-devel-2.28-151.el8.aarch64.rpm glibc-static-2.28-151.el8.aarch64.rpm nss_hesiod-2.28-151.el8.aarch64.rpm

ppc64le: glibc-benchtests-2.28-151.el8.ppc64le.rpm glibc-debuginfo-2.28-151.el8.ppc64le.rpm glibc-debuginfo-common-2.28-151.el8.ppc64le.rpm glibc-nss-devel-2.28-151.el8.ppc64le.rpm glibc-static-2.28-151.el8.ppc64le.rpm nss_hesiod-2.28-151.el8.ppc64le.rpm

s390x: glibc-benchtests-2.28-151.el8.s390x.rpm glibc-debuginfo-2.28-151.el8.s390x.rpm glibc-debuginfo-common-2.28-151.el8.s390x.rpm glibc-nss-devel-2.28-151.el8.s390x.rpm glibc-static-2.28-151.el8.s390x.rpm nss_hesiod-2.28-151.el8.s390x.rpm

x86_64: glibc-benchtests-2.28-151.el8.x86_64.rpm glibc-debuginfo-2.28-151.el8.i686.rpm glibc-debuginfo-2.28-151.el8.x86_64.rpm glibc-debuginfo-common-2.28-151.el8.i686.rpm glibc-debuginfo-common-2.28-151.el8.x86_64.rpm glibc-nss-devel-2.28-151.el8.i686.rpm glibc-nss-devel-2.28-151.el8.x86_64.rpm glibc-static-2.28-151.el8.i686.rpm glibc-static-2.28-151.el8.x86_64.rpm nss_hesiod-2.28-151.el8.i686.rpm nss_hesiod-2.28-151.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2016-10228 https://access.redhat.com/security/cve/CVE-2019-9169 https://access.redhat.com/security/cve/CVE-2019-25013 https://access.redhat.com/security/cve/CVE-2020-27618 https://access.redhat.com/security/cve/CVE-2021-3326 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYKPuENzjgjWX9erEAQi9vw//WZ4SvQsaE50S6H2/awuIPpTwqS9G8F1e Rb3LxhoDtMidhwTtLX7GxvPUngmjG9gD9F2ySLYYltNYXGeI4RaRwwgaAJbJuaEG POBR+tUKvTr/2qgNOuvvTkI5VIVSuFHL4szD4DLpntnD4fBVWTrKrSy4ZBmuH8lD 65l2JvjTQgwxqFIIEbZz6quulCLYY7y080tLKJPCIqBTJWsS7VR3/4jo8YGwzls0 u7zMsDcAhx7Y5mFSjZEds+KyT0kYQUW8N7SioeEKwfz3jteEbx7I+vyQUOYy9FZn o13BjgNrfNktX6jV48d9Mj/t1+YGFYRu7GIuct9EjYLs4qE9LIKn8MCxVE3uwT+P o4BlYwuXKZ5xBHBwU5nIElfttpyBynX6JuDXI9uw4On2p2ZWp4sqOwxm2Hpg3mK0 Bl5QR3sf3xIfnK8ZqEfR98H4QlY9bAwnLup2SgAxCiEPxsXlxBLeLRbaDlWBrvL2 6KhUSLKCWNO3qAlDzVsqxbTXdbfVXkTut4bhdJz6tqfSD9fYpfqrMuSTQyKWMFm9 FJ/l7yctRxZKC4D5CMrc+YAe9R/LLzokU83R9NA4NoViASuVXkYP6sBli0U9A8aw FTGqEOMIdVrT7C1C4NHM7dZgnAvjL22CbavMzjdnAySMRQxl5Je+vuK6jiZqTFwQ ouzI0iwzGJs=R8FH -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce .

Bug Fix(es):

  • WMCO patch pub-key-hash annotation to Linux node (BZ#1945248)

  • LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath (BZ#1952917)

  • Telemetry info not completely available to identify windows nodes (BZ#1955319)

  • WMCO incorrectly shows node as ready after a failed configuration (BZ#1956412)

  • kube-proxy service terminated unexpectedly after recreated LB service (BZ#1963263)

  • Solution:

For Windows Machine Config Operator upgrades, see the following documentation:

https://docs.openshift.com/container-platform/4.7/windows_containers/window s-node-upgrades.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

1945248 - WMCO patch pub-key-hash annotation to Linux node 1946538 - CVE-2021-25736 kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM 1952917 - LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath 1955319 - Telemetry info not completely available to identify windows nodes 1956412 - WMCO incorrectly shows node as ready after a failed configuration 1963263 - kube-proxy service terminated unexpectedly after recreated LB service

  1. Bugs fixed (https://bugzilla.redhat.com/):

1937901 - CVE-2021-27918 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader 1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header 1965503 - CVE-2021-33196 golang: archive/zip: Malformed archive may cause panic or memory exhaustion 1971445 - Release of OpenShift Serverless Serving 1.16.0 1971448 - Release of OpenShift Serverless Eventing 1.16.0

  1. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.13. See the following advisory for the RPM packages for this release:

https://access.redhat.com/errata/RHSA-2021:2122

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html

This update fixes the following bug among others:

  • Previously, resources for the ClusterOperator were being created early in the update process, which led to update failures when the ClusterOperator had no status condition while Operators were updating. This bug fix changes the timing of when these resources are created. As a result, updates can take place without errors. (BZ#1959238)

Security Fix(es):

  • gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)

You may download the oc tool and use it to inspect release image metadata as follows:

(For x86_64 architecture)

$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-x86_64

The image digest is sha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4

(For s390x architecture)

$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-s390x

The image digest is sha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd

(For ppc64le architecture)

$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le

The image digest is sha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36

All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor

  1. Solution:

For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html

Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923268 - [Assisted-4.7] [Staging] Using two both spelling "canceled" "cancelled" 1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go 1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list 1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits 1959238 - CVO creating cloud-controller-manager too early causing upgrade failures 1960103 - SR-IOV obliviously reboot the node 1961941 - Local Storage Operator using LocalVolume CR fails to create PV's when backend storage failure is simulated 1962302 - packageserver clusteroperator does not set reason or message for Available condition 1962312 - Deployment considered unhealthy despite being available and at latest generation 1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone 1963115 - Test verify /run filesystem contents failing

  1. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images

Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.3/html/release_notes/

Security:

  • fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321)

  • fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21322)

  • nodejs-netmask: improper input validation of octal input data (CVE-2021-28918)

  • redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)

  • redis: Integer overflow via COPY command for large intsets (CVE-2021-29478)

  • nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)

  • nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500)

  • golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing

  • -u- extension (CVE-2020-28851)

  • golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)

  • nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)

  • oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)

  • redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309)

  • nodejs-lodash: command injection via template (CVE-2021-23337)

  • nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)

  • browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) (CVE-2021-23364)

  • nodejs-postcss: Regular expression denial of service during source map parsing (CVE-2021-23368)

  • nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option (CVE-2021-23369)

  • nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js (CVE-2021-23382)

  • nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option (CVE-2021-23383)

  • openssl: integer overflow in CipherUpdate (CVE-2021-23840)

  • openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)

  • nodejs-ua-parser-js: ReDoS via malicious User-Agent header (CVE-2021-27292)

  • grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358)

  • nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)

  • nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character (CVE-2021-29418)

  • ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)

  • normalize-url: ReDoS for data URLs (CVE-2021-33502)

  • nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)

  • nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)

  • html-parse-stringify: Regular Expression DoS (CVE-2021-23346)

  • openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)

For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.

Bugs:

  • RFE Make the source code for the endpoint-metrics-operator public (BZ# 1913444)

  • cluster became offline after apiserver health check (BZ# 1942589)

  • Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):

1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension 1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag 1913444 - RFE Make the source code for the endpoint-metrics-operator public 1921286 - CVE-2021-21272 oras: zip-slip vulnerability via oras-pull 1927520 - RHACM 2.3.0 images 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions 1930294 - CVE-2021-23839 openssl: incorrect SSLv2 rollback protection 1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash() 1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate 1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms 1936427 - CVE-2021-3377 nodejs-ansi_up: XSS due to insufficient URL sanitization 1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string 1940196 - View Resource YAML option shows 404 error when reviewing a Subscription for an application 1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header 1941024 - CVE-2021-27358 grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call 1941675 - CVE-2021-23346 html-parse-stringify: Regular Expression DoS 1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service 1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service 1942589 - cluster became offline after apiserver health check 1943208 - CVE-2021-23362 nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() 1944822 - CVE-2021-29418 nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character 1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data 1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service 1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option 1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing 1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js 1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service 1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) 1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option 1956818 - CVE-2021-23343 nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe 1957410 - CVE-2021-29477 redis: Integer overflow via STRALGO LCS command 1957414 - CVE-2021-29478 redis: Integer overflow via COPY command for large intsets 1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs 1966615 - CVE-2021-33623 nodejs-trim-newlines: ReDoS in .end() method 1968122 - clusterdeployment fails because hiveadmission sc does not have correct permissions 1972703 - Subctl fails to join cluster, since it cannot auto-generate a valid cluster id 1983131 - Defragmenting an etcd member doesn't reduce the DB size (7.5GB) on a setup with ~1000 spoke clusters

  1. Description:

Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes. Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/):

2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read

5

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0119",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "32"
      },
      {
        "model": "ontap select deploy administration utility",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "fabric operating system",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": "glibc",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "gnu",
        "version": "2.32"
      },
      {
        "model": "a250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "service processor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "500f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "33"
      },
      {
        "model": "fas/aff baseboard management controller 500f",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "c library",
        "scope": null,
        "trust": 0.8,
        "vendor": "gnu",
        "version": null
      },
      {
        "model": "fedora",
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": "service processor",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "fabric operating system",
        "scope": null,
        "trust": 0.8,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": "ontap select deploy administration utility",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "fas/aff baseboard management controller a250",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-25013"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "162634"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163257"
      },
      {
        "db": "PACKETSTORM",
        "id": "163496"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "163747"
      },
      {
        "db": "PACKETSTORM",
        "id": "168011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      }
    ],
    "trust": 1.3
  },
  "cve": "CVE-2019-25013",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2019-25013",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.2,
            "id": "CVE-2019-25013",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 5.9,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2019-25013",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-25013",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-25013",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202101-048",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-25013",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-25013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-25013"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Moderate: glibc security, bug fix, and enhancement update\nAdvisory ID:       RHSA-2021:1585-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:1585\nIssue date:        2021-05-18\nCVE Names:         CVE-2016-10228 CVE-2019-9169 CVE-2019-25013\n                   CVE-2020-27618 CVE-2021-3326\n====================================================================\n1. Summary:\n\nAn update for glibc is now available for Red Hat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe glibc packages provide the standard C libraries (libc), POSIX thread\nlibraries (libpthread), standard math libraries (libm), and the name\nservice cache daemon (nscd) used by multiple programs on the system. \nWithout these libraries, the Linux system cannot function correctly. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.4 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the glibc library\nmust be restarted, or the system rebooted. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1428290 - CVE-2016-10228 glibc: iconv program can hang when invoked with the -c option\n1684057 - CVE-2019-9169 glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read\n1704868 - CVE-2016-10228 glibc: iconv: Fix converter hangs and front end option parsing for //TRANSLIT and //IGNORE [rhel-8]\n1855790 - glibc: Update Intel CET support from upstream\n1856398 - glibc: Build with -moutline-atomics on aarch64\n1868106 - glibc: Transaction ID collisions cause slow DNS lookups in getaddrinfo\n1871385 - glibc: Improve auditing implementation (including DT_AUDIT, and DT_DEPAUDIT)\n1871387 - glibc: Improve IBM POWER9 architecture performance\n1871394 - glibc: Fix AVX2 off-by-one error in strncmp (swbz#25933)\n1871395 - glibc: Improve IBM Z (s390x) Performance\n1871396 - glibc: Improve use of static TLS surplus for optimizations. Package List:\n\nRed Hat Enterprise Linux AppStream (v. 8):\n\naarch64:\ncompat-libpthread-nonshared-2.28-151.el8.aarch64.rpm\nglibc-debuginfo-2.28-151.el8.aarch64.rpm\nglibc-utils-2.28-151.el8.aarch64.rpm\n\nppc64le:\ncompat-libpthread-nonshared-2.28-151.el8.ppc64le.rpm\nglibc-debuginfo-2.28-151.el8.ppc64le.rpm\nglibc-debuginfo-common-2.28-151.el8.ppc64le.rpm\nglibc-utils-2.28-151.el8.ppc64le.rpm\n\ns390x:\ncompat-libpthread-nonshared-2.28-151.el8.s390x.rpm\nglibc-debuginfo-2.28-151.el8.s390x.rpm\nglibc-debuginfo-common-2.28-151.el8.s390x.rpm\nglibc-utils-2.28-151.el8.s390x.rpm\n\nx86_64:\ncompat-libpthread-nonshared-2.28-151.el8.x86_64.rpm\nglibc-debuginfo-2.28-151.el8.x86_64.rpm\nglibc-debuginfo-common-2.28-151.el8.x86_64.rpm\nglibc-utils-2.28-151.el8.x86_64.rpm\n\nRed Hat Enterprise Linux BaseOS (v. 8):\n\nSource:\nglibc-2.28-151.el8.src.rpm\n\naarch64:\nglibc-2.28-151.el8.aarch64.rpm\nglibc-all-langpacks-2.28-151.el8.aarch64.rpm\nglibc-common-2.28-151.el8.aarch64.rpm\nglibc-debuginfo-2.28-151.el8.aarch64.rpm\nglibc-devel-2.28-151.el8.aarch64.rpm\nglibc-headers-2.28-151.el8.aarch64.rpm\nglibc-langpack-aa-2.28-151.el8.aarch64.rpm\nglibc-langpack-af-2.28-151.el8.aarch64.rpm\nglibc-langpack-agr-2.28-151.el8.aarch64.rpm\nglibc-langpack-ak-2.28-151.el8.aarch64.rpm\nglibc-langpack-am-2.28-151.el8.aarch64.rpm\nglibc-langpack-an-2.28-151.el8.aarch64.rpm\nglibc-langpack-anp-2.28-151.el8.aarch64.rpm\nglibc-langpack-ar-2.28-151.el8.aarch64.rpm\nglibc-langpack-as-2.28-151.el8.aarch64.rpm\nglibc-langpack-ast-2.28-151.el8.aarch64.rpm\nglibc-langpack-ayc-2.28-151.el8.aarch64.rpm\nglibc-langpack-az-2.28-151.el8.aarch64.rpm\nglibc-langpack-be-2.28-151.el8.aarch64.rpm\nglibc-langpack-bem-2.28-151.el8.aarch64.rpm\nglibc-langpack-ber-2.28-151.el8.aarch64.rpm\nglibc-langpack-bg-2.28-151.el8.aarch64.rpm\nglibc-langpack-bhb-2.28-151.el8.aarch64.rpm\nglibc-langpack-bho-2.28-151.el8.aarch64.rpm\nglibc-langpack-bi-2.28-151.el8.aarch64.rpm\nglibc-langpack-bn-2.28-151.el8.aarch64.rpm\nglibc-langpack-bo-2.28-151.el8.aarch64.rpm\nglibc-langpack-br-2.28-151.el8.aarch64.rpm\nglibc-langpack-brx-2.28-151.el8.aarch64.rpm\nglibc-langpack-bs-2.28-151.el8.aarch64.rpm\nglibc-langpack-byn-2.28-151.el8.aarch64.rpm\nglibc-langpack-ca-2.28-151.el8.aarch64.rpm\nglibc-langpack-ce-2.28-151.el8.aarch64.rpm\nglibc-langpack-chr-2.28-151.el8.aarch64.rpm\nglibc-langpack-cmn-2.28-151.el8.aarch64.rpm\nglibc-langpack-crh-2.28-151.el8.aarch64.rpm\nglibc-langpack-cs-2.28-151.el8.aarch64.rpm\nglibc-langpack-csb-2.28-151.el8.aarch64.rpm\nglibc-langpack-cv-2.28-151.el8.aarch64.rpm\nglibc-langpack-cy-2.28-151.el8.aarch64.rpm\nglibc-langpack-da-2.28-151.el8.aarch64.rpm\nglibc-langpack-de-2.28-151.el8.aarch64.rpm\nglibc-langpack-doi-2.28-151.el8.aarch64.rpm\nglibc-langpack-dsb-2.28-151.el8.aarch64.rpm\nglibc-langpack-dv-2.28-151.el8.aarch64.rpm\nglibc-langpack-dz-2.28-151.el8.aarch64.rpm\nglibc-langpack-el-2.28-151.el8.aarch64.rpm\nglibc-langpack-en-2.28-151.el8.aarch64.rpm\nglibc-langpack-eo-2.28-151.el8.aarch64.rpm\nglibc-langpack-es-2.28-151.el8.aarch64.rpm\nglibc-langpack-et-2.28-151.el8.aarch64.rpm\nglibc-langpack-eu-2.28-151.el8.aarch64.rpm\nglibc-langpack-fa-2.28-151.el8.aarch64.rpm\nglibc-langpack-ff-2.28-151.el8.aarch64.rpm\nglibc-langpack-fi-2.28-151.el8.aarch64.rpm\nglibc-langpack-fil-2.28-151.el8.aarch64.rpm\nglibc-langpack-fo-2.28-151.el8.aarch64.rpm\nglibc-langpack-fr-2.28-151.el8.aarch64.rpm\nglibc-langpack-fur-2.28-151.el8.aarch64.rpm\nglibc-langpack-fy-2.28-151.el8.aarch64.rpm\nglibc-langpack-ga-2.28-151.el8.aarch64.rpm\nglibc-langpack-gd-2.28-151.el8.aarch64.rpm\nglibc-langpack-gez-2.28-151.el8.aarch64.rpm\nglibc-langpack-gl-2.28-151.el8.aarch64.rpm\nglibc-langpack-gu-2.28-151.el8.aarch64.rpm\nglibc-langpack-gv-2.28-151.el8.aarch64.rpm\nglibc-langpack-ha-2.28-151.el8.aarch64.rpm\nglibc-langpack-hak-2.28-151.el8.aarch64.rpm\nglibc-langpack-he-2.28-151.el8.aarch64.rpm\nglibc-langpack-hi-2.28-151.el8.aarch64.rpm\nglibc-langpack-hif-2.28-151.el8.aarch64.rpm\nglibc-langpack-hne-2.28-151.el8.aarch64.rpm\nglibc-langpack-hr-2.28-151.el8.aarch64.rpm\nglibc-langpack-hsb-2.28-151.el8.aarch64.rpm\nglibc-langpack-ht-2.28-151.el8.aarch64.rpm\nglibc-langpack-hu-2.28-151.el8.aarch64.rpm\nglibc-langpack-hy-2.28-151.el8.aarch64.rpm\nglibc-langpack-ia-2.28-151.el8.aarch64.rpm\nglibc-langpack-id-2.28-151.el8.aarch64.rpm\nglibc-langpack-ig-2.28-151.el8.aarch64.rpm\nglibc-langpack-ik-2.28-151.el8.aarch64.rpm\nglibc-langpack-is-2.28-151.el8.aarch64.rpm\nglibc-langpack-it-2.28-151.el8.aarch64.rpm\nglibc-langpack-iu-2.28-151.el8.aarch64.rpm\nglibc-langpack-ja-2.28-151.el8.aarch64.rpm\nglibc-langpack-ka-2.28-151.el8.aarch64.rpm\nglibc-langpack-kab-2.28-151.el8.aarch64.rpm\nglibc-langpack-kk-2.28-151.el8.aarch64.rpm\nglibc-langpack-kl-2.28-151.el8.aarch64.rpm\nglibc-langpack-km-2.28-151.el8.aarch64.rpm\nglibc-langpack-kn-2.28-151.el8.aarch64.rpm\nglibc-langpack-ko-2.28-151.el8.aarch64.rpm\nglibc-langpack-kok-2.28-151.el8.aarch64.rpm\nglibc-langpack-ks-2.28-151.el8.aarch64.rpm\nglibc-langpack-ku-2.28-151.el8.aarch64.rpm\nglibc-langpack-kw-2.28-151.el8.aarch64.rpm\nglibc-langpack-ky-2.28-151.el8.aarch64.rpm\nglibc-langpack-lb-2.28-151.el8.aarch64.rpm\nglibc-langpack-lg-2.28-151.el8.aarch64.rpm\nglibc-langpack-li-2.28-151.el8.aarch64.rpm\nglibc-langpack-lij-2.28-151.el8.aarch64.rpm\nglibc-langpack-ln-2.28-151.el8.aarch64.rpm\nglibc-langpack-lo-2.28-151.el8.aarch64.rpm\nglibc-langpack-lt-2.28-151.el8.aarch64.rpm\nglibc-langpack-lv-2.28-151.el8.aarch64.rpm\nglibc-langpack-lzh-2.28-151.el8.aarch64.rpm\nglibc-langpack-mag-2.28-151.el8.aarch64.rpm\nglibc-langpack-mai-2.28-151.el8.aarch64.rpm\nglibc-langpack-mfe-2.28-151.el8.aarch64.rpm\nglibc-langpack-mg-2.28-151.el8.aarch64.rpm\nglibc-langpack-mhr-2.28-151.el8.aarch64.rpm\nglibc-langpack-mi-2.28-151.el8.aarch64.rpm\nglibc-langpack-miq-2.28-151.el8.aarch64.rpm\nglibc-langpack-mjw-2.28-151.el8.aarch64.rpm\nglibc-langpack-mk-2.28-151.el8.aarch64.rpm\nglibc-langpack-ml-2.28-151.el8.aarch64.rpm\nglibc-langpack-mn-2.28-151.el8.aarch64.rpm\nglibc-langpack-mni-2.28-151.el8.aarch64.rpm\nglibc-langpack-mr-2.28-151.el8.aarch64.rpm\nglibc-langpack-ms-2.28-151.el8.aarch64.rpm\nglibc-langpack-mt-2.28-151.el8.aarch64.rpm\nglibc-langpack-my-2.28-151.el8.aarch64.rpm\nglibc-langpack-nan-2.28-151.el8.aarch64.rpm\nglibc-langpack-nb-2.28-151.el8.aarch64.rpm\nglibc-langpack-nds-2.28-151.el8.aarch64.rpm\nglibc-langpack-ne-2.28-151.el8.aarch64.rpm\nglibc-langpack-nhn-2.28-151.el8.aarch64.rpm\nglibc-langpack-niu-2.28-151.el8.aarch64.rpm\nglibc-langpack-nl-2.28-151.el8.aarch64.rpm\nglibc-langpack-nn-2.28-151.el8.aarch64.rpm\nglibc-langpack-nr-2.28-151.el8.aarch64.rpm\nglibc-langpack-nso-2.28-151.el8.aarch64.rpm\nglibc-langpack-oc-2.28-151.el8.aarch64.rpm\nglibc-langpack-om-2.28-151.el8.aarch64.rpm\nglibc-langpack-or-2.28-151.el8.aarch64.rpm\nglibc-langpack-os-2.28-151.el8.aarch64.rpm\nglibc-langpack-pa-2.28-151.el8.aarch64.rpm\nglibc-langpack-pap-2.28-151.el8.aarch64.rpm\nglibc-langpack-pl-2.28-151.el8.aarch64.rpm\nglibc-langpack-ps-2.28-151.el8.aarch64.rpm\nglibc-langpack-pt-2.28-151.el8.aarch64.rpm\nglibc-langpack-quz-2.28-151.el8.aarch64.rpm\nglibc-langpack-raj-2.28-151.el8.aarch64.rpm\nglibc-langpack-ro-2.28-151.el8.aarch64.rpm\nglibc-langpack-ru-2.28-151.el8.aarch64.rpm\nglibc-langpack-rw-2.28-151.el8.aarch64.rpm\nglibc-langpack-sa-2.28-151.el8.aarch64.rpm\nglibc-langpack-sah-2.28-151.el8.aarch64.rpm\nglibc-langpack-sat-2.28-151.el8.aarch64.rpm\nglibc-langpack-sc-2.28-151.el8.aarch64.rpm\nglibc-langpack-sd-2.28-151.el8.aarch64.rpm\nglibc-langpack-se-2.28-151.el8.aarch64.rpm\nglibc-langpack-sgs-2.28-151.el8.aarch64.rpm\nglibc-langpack-shn-2.28-151.el8.aarch64.rpm\nglibc-langpack-shs-2.28-151.el8.aarch64.rpm\nglibc-langpack-si-2.28-151.el8.aarch64.rpm\nglibc-langpack-sid-2.28-151.el8.aarch64.rpm\nglibc-langpack-sk-2.28-151.el8.aarch64.rpm\nglibc-langpack-sl-2.28-151.el8.aarch64.rpm\nglibc-langpack-sm-2.28-151.el8.aarch64.rpm\nglibc-langpack-so-2.28-151.el8.aarch64.rpm\nglibc-langpack-sq-2.28-151.el8.aarch64.rpm\nglibc-langpack-sr-2.28-151.el8.aarch64.rpm\nglibc-langpack-ss-2.28-151.el8.aarch64.rpm\nglibc-langpack-st-2.28-151.el8.aarch64.rpm\nglibc-langpack-sv-2.28-151.el8.aarch64.rpm\nglibc-langpack-sw-2.28-151.el8.aarch64.rpm\nglibc-langpack-szl-2.28-151.el8.aarch64.rpm\nglibc-langpack-ta-2.28-151.el8.aarch64.rpm\nglibc-langpack-tcy-2.28-151.el8.aarch64.rpm\nglibc-langpack-te-2.28-151.el8.aarch64.rpm\nglibc-langpack-tg-2.28-151.el8.aarch64.rpm\nglibc-langpack-th-2.28-151.el8.aarch64.rpm\nglibc-langpack-the-2.28-151.el8.aarch64.rpm\nglibc-langpack-ti-2.28-151.el8.aarch64.rpm\nglibc-langpack-tig-2.28-151.el8.aarch64.rpm\nglibc-langpack-tk-2.28-151.el8.aarch64.rpm\nglibc-langpack-tl-2.28-151.el8.aarch64.rpm\nglibc-langpack-tn-2.28-151.el8.aarch64.rpm\nglibc-langpack-to-2.28-151.el8.aarch64.rpm\nglibc-langpack-tpi-2.28-151.el8.aarch64.rpm\nglibc-langpack-tr-2.28-151.el8.aarch64.rpm\nglibc-langpack-ts-2.28-151.el8.aarch64.rpm\nglibc-langpack-tt-2.28-151.el8.aarch64.rpm\nglibc-langpack-ug-2.28-151.el8.aarch64.rpm\nglibc-langpack-uk-2.28-151.el8.aarch64.rpm\nglibc-langpack-unm-2.28-151.el8.aarch64.rpm\nglibc-langpack-ur-2.28-151.el8.aarch64.rpm\nglibc-langpack-uz-2.28-151.el8.aarch64.rpm\nglibc-langpack-ve-2.28-151.el8.aarch64.rpm\nglibc-langpack-vi-2.28-151.el8.aarch64.rpm\nglibc-langpack-wa-2.28-151.el8.aarch64.rpm\nglibc-langpack-wae-2.28-151.el8.aarch64.rpm\nglibc-langpack-wal-2.28-151.el8.aarch64.rpm\nglibc-langpack-wo-2.28-151.el8.aarch64.rpm\nglibc-langpack-xh-2.28-151.el8.aarch64.rpm\nglibc-langpack-yi-2.28-151.el8.aarch64.rpm\nglibc-langpack-yo-2.28-151.el8.aarch64.rpm\nglibc-langpack-yue-2.28-151.el8.aarch64.rpm\nglibc-langpack-yuw-2.28-151.el8.aarch64.rpm\nglibc-langpack-zh-2.28-151.el8.aarch64.rpm\nglibc-langpack-zu-2.28-151.el8.aarch64.rpm\nglibc-locale-source-2.28-151.el8.aarch64.rpm\nglibc-minimal-langpack-2.28-151.el8.aarch64.rpm\nlibnsl-2.28-151.el8.aarch64.rpm\nnscd-2.28-151.el8.aarch64.rpm\nnss_db-2.28-151.el8.aarch64.rpm\n\nppc64le:\nglibc-2.28-151.el8.ppc64le.rpm\nglibc-all-langpacks-2.28-151.el8.ppc64le.rpm\nglibc-common-2.28-151.el8.ppc64le.rpm\nglibc-debuginfo-2.28-151.el8.ppc64le.rpm\nglibc-debuginfo-common-2.28-151.el8.ppc64le.rpm\nglibc-devel-2.28-151.el8.ppc64le.rpm\nglibc-headers-2.28-151.el8.ppc64le.rpm\nglibc-langpack-aa-2.28-151.el8.ppc64le.rpm\nglibc-langpack-af-2.28-151.el8.ppc64le.rpm\nglibc-langpack-agr-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ak-2.28-151.el8.ppc64le.rpm\nglibc-langpack-am-2.28-151.el8.ppc64le.rpm\nglibc-langpack-an-2.28-151.el8.ppc64le.rpm\nglibc-langpack-anp-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ar-2.28-151.el8.ppc64le.rpm\nglibc-langpack-as-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ast-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ayc-2.28-151.el8.ppc64le.rpm\nglibc-langpack-az-2.28-151.el8.ppc64le.rpm\nglibc-langpack-be-2.28-151.el8.ppc64le.rpm\nglibc-langpack-bem-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ber-2.28-151.el8.ppc64le.rpm\nglibc-langpack-bg-2.28-151.el8.ppc64le.rpm\nglibc-langpack-bhb-2.28-151.el8.ppc64le.rpm\nglibc-langpack-bho-2.28-151.el8.ppc64le.rpm\nglibc-langpack-bi-2.28-151.el8.ppc64le.rpm\nglibc-langpack-bn-2.28-151.el8.ppc64le.rpm\nglibc-langpack-bo-2.28-151.el8.ppc64le.rpm\nglibc-langpack-br-2.28-151.el8.ppc64le.rpm\nglibc-langpack-brx-2.28-151.el8.ppc64le.rpm\nglibc-langpack-bs-2.28-151.el8.ppc64le.rpm\nglibc-langpack-byn-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ca-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ce-2.28-151.el8.ppc64le.rpm\nglibc-langpack-chr-2.28-151.el8.ppc64le.rpm\nglibc-langpack-cmn-2.28-151.el8.ppc64le.rpm\nglibc-langpack-crh-2.28-151.el8.ppc64le.rpm\nglibc-langpack-cs-2.28-151.el8.ppc64le.rpm\nglibc-langpack-csb-2.28-151.el8.ppc64le.rpm\nglibc-langpack-cv-2.28-151.el8.ppc64le.rpm\nglibc-langpack-cy-2.28-151.el8.ppc64le.rpm\nglibc-langpack-da-2.28-151.el8.ppc64le.rpm\nglibc-langpack-de-2.28-151.el8.ppc64le.rpm\nglibc-langpack-doi-2.28-151.el8.ppc64le.rpm\nglibc-langpack-dsb-2.28-151.el8.ppc64le.rpm\nglibc-langpack-dv-2.28-151.el8.ppc64le.rpm\nglibc-langpack-dz-2.28-151.el8.ppc64le.rpm\nglibc-langpack-el-2.28-151.el8.ppc64le.rpm\nglibc-langpack-en-2.28-151.el8.ppc64le.rpm\nglibc-langpack-eo-2.28-151.el8.ppc64le.rpm\nglibc-langpack-es-2.28-151.el8.ppc64le.rpm\nglibc-langpack-et-2.28-151.el8.ppc64le.rpm\nglibc-langpack-eu-2.28-151.el8.ppc64le.rpm\nglibc-langpack-fa-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ff-2.28-151.el8.ppc64le.rpm\nglibc-langpack-fi-2.28-151.el8.ppc64le.rpm\nglibc-langpack-fil-2.28-151.el8.ppc64le.rpm\nglibc-langpack-fo-2.28-151.el8.ppc64le.rpm\nglibc-langpack-fr-2.28-151.el8.ppc64le.rpm\nglibc-langpack-fur-2.28-151.el8.ppc64le.rpm\nglibc-langpack-fy-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ga-2.28-151.el8.ppc64le.rpm\nglibc-langpack-gd-2.28-151.el8.ppc64le.rpm\nglibc-langpack-gez-2.28-151.el8.ppc64le.rpm\nglibc-langpack-gl-2.28-151.el8.ppc64le.rpm\nglibc-langpack-gu-2.28-151.el8.ppc64le.rpm\nglibc-langpack-gv-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ha-2.28-151.el8.ppc64le.rpm\nglibc-langpack-hak-2.28-151.el8.ppc64le.rpm\nglibc-langpack-he-2.28-151.el8.ppc64le.rpm\nglibc-langpack-hi-2.28-151.el8.ppc64le.rpm\nglibc-langpack-hif-2.28-151.el8.ppc64le.rpm\nglibc-langpack-hne-2.28-151.el8.ppc64le.rpm\nglibc-langpack-hr-2.28-151.el8.ppc64le.rpm\nglibc-langpack-hsb-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ht-2.28-151.el8.ppc64le.rpm\nglibc-langpack-hu-2.28-151.el8.ppc64le.rpm\nglibc-langpack-hy-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ia-2.28-151.el8.ppc64le.rpm\nglibc-langpack-id-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ig-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ik-2.28-151.el8.ppc64le.rpm\nglibc-langpack-is-2.28-151.el8.ppc64le.rpm\nglibc-langpack-it-2.28-151.el8.ppc64le.rpm\nglibc-langpack-iu-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ja-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ka-2.28-151.el8.ppc64le.rpm\nglibc-langpack-kab-2.28-151.el8.ppc64le.rpm\nglibc-langpack-kk-2.28-151.el8.ppc64le.rpm\nglibc-langpack-kl-2.28-151.el8.ppc64le.rpm\nglibc-langpack-km-2.28-151.el8.ppc64le.rpm\nglibc-langpack-kn-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ko-2.28-151.el8.ppc64le.rpm\nglibc-langpack-kok-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ks-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ku-2.28-151.el8.ppc64le.rpm\nglibc-langpack-kw-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ky-2.28-151.el8.ppc64le.rpm\nglibc-langpack-lb-2.28-151.el8.ppc64le.rpm\nglibc-langpack-lg-2.28-151.el8.ppc64le.rpm\nglibc-langpack-li-2.28-151.el8.ppc64le.rpm\nglibc-langpack-lij-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ln-2.28-151.el8.ppc64le.rpm\nglibc-langpack-lo-2.28-151.el8.ppc64le.rpm\nglibc-langpack-lt-2.28-151.el8.ppc64le.rpm\nglibc-langpack-lv-2.28-151.el8.ppc64le.rpm\nglibc-langpack-lzh-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mag-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mai-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mfe-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mg-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mhr-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mi-2.28-151.el8.ppc64le.rpm\nglibc-langpack-miq-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mjw-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mk-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ml-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mn-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mni-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mr-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ms-2.28-151.el8.ppc64le.rpm\nglibc-langpack-mt-2.28-151.el8.ppc64le.rpm\nglibc-langpack-my-2.28-151.el8.ppc64le.rpm\nglibc-langpack-nan-2.28-151.el8.ppc64le.rpm\nglibc-langpack-nb-2.28-151.el8.ppc64le.rpm\nglibc-langpack-nds-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ne-2.28-151.el8.ppc64le.rpm\nglibc-langpack-nhn-2.28-151.el8.ppc64le.rpm\nglibc-langpack-niu-2.28-151.el8.ppc64le.rpm\nglibc-langpack-nl-2.28-151.el8.ppc64le.rpm\nglibc-langpack-nn-2.28-151.el8.ppc64le.rpm\nglibc-langpack-nr-2.28-151.el8.ppc64le.rpm\nglibc-langpack-nso-2.28-151.el8.ppc64le.rpm\nglibc-langpack-oc-2.28-151.el8.ppc64le.rpm\nglibc-langpack-om-2.28-151.el8.ppc64le.rpm\nglibc-langpack-or-2.28-151.el8.ppc64le.rpm\nglibc-langpack-os-2.28-151.el8.ppc64le.rpm\nglibc-langpack-pa-2.28-151.el8.ppc64le.rpm\nglibc-langpack-pap-2.28-151.el8.ppc64le.rpm\nglibc-langpack-pl-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ps-2.28-151.el8.ppc64le.rpm\nglibc-langpack-pt-2.28-151.el8.ppc64le.rpm\nglibc-langpack-quz-2.28-151.el8.ppc64le.rpm\nglibc-langpack-raj-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ro-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ru-2.28-151.el8.ppc64le.rpm\nglibc-langpack-rw-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sa-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sah-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sat-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sc-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sd-2.28-151.el8.ppc64le.rpm\nglibc-langpack-se-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sgs-2.28-151.el8.ppc64le.rpm\nglibc-langpack-shn-2.28-151.el8.ppc64le.rpm\nglibc-langpack-shs-2.28-151.el8.ppc64le.rpm\nglibc-langpack-si-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sid-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sk-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sl-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sm-2.28-151.el8.ppc64le.rpm\nglibc-langpack-so-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sq-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sr-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ss-2.28-151.el8.ppc64le.rpm\nglibc-langpack-st-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sv-2.28-151.el8.ppc64le.rpm\nglibc-langpack-sw-2.28-151.el8.ppc64le.rpm\nglibc-langpack-szl-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ta-2.28-151.el8.ppc64le.rpm\nglibc-langpack-tcy-2.28-151.el8.ppc64le.rpm\nglibc-langpack-te-2.28-151.el8.ppc64le.rpm\nglibc-langpack-tg-2.28-151.el8.ppc64le.rpm\nglibc-langpack-th-2.28-151.el8.ppc64le.rpm\nglibc-langpack-the-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ti-2.28-151.el8.ppc64le.rpm\nglibc-langpack-tig-2.28-151.el8.ppc64le.rpm\nglibc-langpack-tk-2.28-151.el8.ppc64le.rpm\nglibc-langpack-tl-2.28-151.el8.ppc64le.rpm\nglibc-langpack-tn-2.28-151.el8.ppc64le.rpm\nglibc-langpack-to-2.28-151.el8.ppc64le.rpm\nglibc-langpack-tpi-2.28-151.el8.ppc64le.rpm\nglibc-langpack-tr-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ts-2.28-151.el8.ppc64le.rpm\nglibc-langpack-tt-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ug-2.28-151.el8.ppc64le.rpm\nglibc-langpack-uk-2.28-151.el8.ppc64le.rpm\nglibc-langpack-unm-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ur-2.28-151.el8.ppc64le.rpm\nglibc-langpack-uz-2.28-151.el8.ppc64le.rpm\nglibc-langpack-ve-2.28-151.el8.ppc64le.rpm\nglibc-langpack-vi-2.28-151.el8.ppc64le.rpm\nglibc-langpack-wa-2.28-151.el8.ppc64le.rpm\nglibc-langpack-wae-2.28-151.el8.ppc64le.rpm\nglibc-langpack-wal-2.28-151.el8.ppc64le.rpm\nglibc-langpack-wo-2.28-151.el8.ppc64le.rpm\nglibc-langpack-xh-2.28-151.el8.ppc64le.rpm\nglibc-langpack-yi-2.28-151.el8.ppc64le.rpm\nglibc-langpack-yo-2.28-151.el8.ppc64le.rpm\nglibc-langpack-yue-2.28-151.el8.ppc64le.rpm\nglibc-langpack-yuw-2.28-151.el8.ppc64le.rpm\nglibc-langpack-zh-2.28-151.el8.ppc64le.rpm\nglibc-langpack-zu-2.28-151.el8.ppc64le.rpm\nglibc-locale-source-2.28-151.el8.ppc64le.rpm\nglibc-minimal-langpack-2.28-151.el8.ppc64le.rpm\nlibnsl-2.28-151.el8.ppc64le.rpm\nnscd-2.28-151.el8.ppc64le.rpm\nnss_db-2.28-151.el8.ppc64le.rpm\n\ns390x:\nglibc-2.28-151.el8.s390x.rpm\nglibc-all-langpacks-2.28-151.el8.s390x.rpm\nglibc-common-2.28-151.el8.s390x.rpm\nglibc-debuginfo-2.28-151.el8.s390x.rpm\nglibc-debuginfo-common-2.28-151.el8.s390x.rpm\nglibc-devel-2.28-151.el8.s390x.rpm\nglibc-headers-2.28-151.el8.s390x.rpm\nglibc-langpack-aa-2.28-151.el8.s390x.rpm\nglibc-langpack-af-2.28-151.el8.s390x.rpm\nglibc-langpack-agr-2.28-151.el8.s390x.rpm\nglibc-langpack-ak-2.28-151.el8.s390x.rpm\nglibc-langpack-am-2.28-151.el8.s390x.rpm\nglibc-langpack-an-2.28-151.el8.s390x.rpm\nglibc-langpack-anp-2.28-151.el8.s390x.rpm\nglibc-langpack-ar-2.28-151.el8.s390x.rpm\nglibc-langpack-as-2.28-151.el8.s390x.rpm\nglibc-langpack-ast-2.28-151.el8.s390x.rpm\nglibc-langpack-ayc-2.28-151.el8.s390x.rpm\nglibc-langpack-az-2.28-151.el8.s390x.rpm\nglibc-langpack-be-2.28-151.el8.s390x.rpm\nglibc-langpack-bem-2.28-151.el8.s390x.rpm\nglibc-langpack-ber-2.28-151.el8.s390x.rpm\nglibc-langpack-bg-2.28-151.el8.s390x.rpm\nglibc-langpack-bhb-2.28-151.el8.s390x.rpm\nglibc-langpack-bho-2.28-151.el8.s390x.rpm\nglibc-langpack-bi-2.28-151.el8.s390x.rpm\nglibc-langpack-bn-2.28-151.el8.s390x.rpm\nglibc-langpack-bo-2.28-151.el8.s390x.rpm\nglibc-langpack-br-2.28-151.el8.s390x.rpm\nglibc-langpack-brx-2.28-151.el8.s390x.rpm\nglibc-langpack-bs-2.28-151.el8.s390x.rpm\nglibc-langpack-byn-2.28-151.el8.s390x.rpm\nglibc-langpack-ca-2.28-151.el8.s390x.rpm\nglibc-langpack-ce-2.28-151.el8.s390x.rpm\nglibc-langpack-chr-2.28-151.el8.s390x.rpm\nglibc-langpack-cmn-2.28-151.el8.s390x.rpm\nglibc-langpack-crh-2.28-151.el8.s390x.rpm\nglibc-langpack-cs-2.28-151.el8.s390x.rpm\nglibc-langpack-csb-2.28-151.el8.s390x.rpm\nglibc-langpack-cv-2.28-151.el8.s390x.rpm\nglibc-langpack-cy-2.28-151.el8.s390x.rpm\nglibc-langpack-da-2.28-151.el8.s390x.rpm\nglibc-langpack-de-2.28-151.el8.s390x.rpm\nglibc-langpack-doi-2.28-151.el8.s390x.rpm\nglibc-langpack-dsb-2.28-151.el8.s390x.rpm\nglibc-langpack-dv-2.28-151.el8.s390x.rpm\nglibc-langpack-dz-2.28-151.el8.s390x.rpm\nglibc-langpack-el-2.28-151.el8.s390x.rpm\nglibc-langpack-en-2.28-151.el8.s390x.rpm\nglibc-langpack-eo-2.28-151.el8.s390x.rpm\nglibc-langpack-es-2.28-151.el8.s390x.rpm\nglibc-langpack-et-2.28-151.el8.s390x.rpm\nglibc-langpack-eu-2.28-151.el8.s390x.rpm\nglibc-langpack-fa-2.28-151.el8.s390x.rpm\nglibc-langpack-ff-2.28-151.el8.s390x.rpm\nglibc-langpack-fi-2.28-151.el8.s390x.rpm\nglibc-langpack-fil-2.28-151.el8.s390x.rpm\nglibc-langpack-fo-2.28-151.el8.s390x.rpm\nglibc-langpack-fr-2.28-151.el8.s390x.rpm\nglibc-langpack-fur-2.28-151.el8.s390x.rpm\nglibc-langpack-fy-2.28-151.el8.s390x.rpm\nglibc-langpack-ga-2.28-151.el8.s390x.rpm\nglibc-langpack-gd-2.28-151.el8.s390x.rpm\nglibc-langpack-gez-2.28-151.el8.s390x.rpm\nglibc-langpack-gl-2.28-151.el8.s390x.rpm\nglibc-langpack-gu-2.28-151.el8.s390x.rpm\nglibc-langpack-gv-2.28-151.el8.s390x.rpm\nglibc-langpack-ha-2.28-151.el8.s390x.rpm\nglibc-langpack-hak-2.28-151.el8.s390x.rpm\nglibc-langpack-he-2.28-151.el8.s390x.rpm\nglibc-langpack-hi-2.28-151.el8.s390x.rpm\nglibc-langpack-hif-2.28-151.el8.s390x.rpm\nglibc-langpack-hne-2.28-151.el8.s390x.rpm\nglibc-langpack-hr-2.28-151.el8.s390x.rpm\nglibc-langpack-hsb-2.28-151.el8.s390x.rpm\nglibc-langpack-ht-2.28-151.el8.s390x.rpm\nglibc-langpack-hu-2.28-151.el8.s390x.rpm\nglibc-langpack-hy-2.28-151.el8.s390x.rpm\nglibc-langpack-ia-2.28-151.el8.s390x.rpm\nglibc-langpack-id-2.28-151.el8.s390x.rpm\nglibc-langpack-ig-2.28-151.el8.s390x.rpm\nglibc-langpack-ik-2.28-151.el8.s390x.rpm\nglibc-langpack-is-2.28-151.el8.s390x.rpm\nglibc-langpack-it-2.28-151.el8.s390x.rpm\nglibc-langpack-iu-2.28-151.el8.s390x.rpm\nglibc-langpack-ja-2.28-151.el8.s390x.rpm\nglibc-langpack-ka-2.28-151.el8.s390x.rpm\nglibc-langpack-kab-2.28-151.el8.s390x.rpm\nglibc-langpack-kk-2.28-151.el8.s390x.rpm\nglibc-langpack-kl-2.28-151.el8.s390x.rpm\nglibc-langpack-km-2.28-151.el8.s390x.rpm\nglibc-langpack-kn-2.28-151.el8.s390x.rpm\nglibc-langpack-ko-2.28-151.el8.s390x.rpm\nglibc-langpack-kok-2.28-151.el8.s390x.rpm\nglibc-langpack-ks-2.28-151.el8.s390x.rpm\nglibc-langpack-ku-2.28-151.el8.s390x.rpm\nglibc-langpack-kw-2.28-151.el8.s390x.rpm\nglibc-langpack-ky-2.28-151.el8.s390x.rpm\nglibc-langpack-lb-2.28-151.el8.s390x.rpm\nglibc-langpack-lg-2.28-151.el8.s390x.rpm\nglibc-langpack-li-2.28-151.el8.s390x.rpm\nglibc-langpack-lij-2.28-151.el8.s390x.rpm\nglibc-langpack-ln-2.28-151.el8.s390x.rpm\nglibc-langpack-lo-2.28-151.el8.s390x.rpm\nglibc-langpack-lt-2.28-151.el8.s390x.rpm\nglibc-langpack-lv-2.28-151.el8.s390x.rpm\nglibc-langpack-lzh-2.28-151.el8.s390x.rpm\nglibc-langpack-mag-2.28-151.el8.s390x.rpm\nglibc-langpack-mai-2.28-151.el8.s390x.rpm\nglibc-langpack-mfe-2.28-151.el8.s390x.rpm\nglibc-langpack-mg-2.28-151.el8.s390x.rpm\nglibc-langpack-mhr-2.28-151.el8.s390x.rpm\nglibc-langpack-mi-2.28-151.el8.s390x.rpm\nglibc-langpack-miq-2.28-151.el8.s390x.rpm\nglibc-langpack-mjw-2.28-151.el8.s390x.rpm\nglibc-langpack-mk-2.28-151.el8.s390x.rpm\nglibc-langpack-ml-2.28-151.el8.s390x.rpm\nglibc-langpack-mn-2.28-151.el8.s390x.rpm\nglibc-langpack-mni-2.28-151.el8.s390x.rpm\nglibc-langpack-mr-2.28-151.el8.s390x.rpm\nglibc-langpack-ms-2.28-151.el8.s390x.rpm\nglibc-langpack-mt-2.28-151.el8.s390x.rpm\nglibc-langpack-my-2.28-151.el8.s390x.rpm\nglibc-langpack-nan-2.28-151.el8.s390x.rpm\nglibc-langpack-nb-2.28-151.el8.s390x.rpm\nglibc-langpack-nds-2.28-151.el8.s390x.rpm\nglibc-langpack-ne-2.28-151.el8.s390x.rpm\nglibc-langpack-nhn-2.28-151.el8.s390x.rpm\nglibc-langpack-niu-2.28-151.el8.s390x.rpm\nglibc-langpack-nl-2.28-151.el8.s390x.rpm\nglibc-langpack-nn-2.28-151.el8.s390x.rpm\nglibc-langpack-nr-2.28-151.el8.s390x.rpm\nglibc-langpack-nso-2.28-151.el8.s390x.rpm\nglibc-langpack-oc-2.28-151.el8.s390x.rpm\nglibc-langpack-om-2.28-151.el8.s390x.rpm\nglibc-langpack-or-2.28-151.el8.s390x.rpm\nglibc-langpack-os-2.28-151.el8.s390x.rpm\nglibc-langpack-pa-2.28-151.el8.s390x.rpm\nglibc-langpack-pap-2.28-151.el8.s390x.rpm\nglibc-langpack-pl-2.28-151.el8.s390x.rpm\nglibc-langpack-ps-2.28-151.el8.s390x.rpm\nglibc-langpack-pt-2.28-151.el8.s390x.rpm\nglibc-langpack-quz-2.28-151.el8.s390x.rpm\nglibc-langpack-raj-2.28-151.el8.s390x.rpm\nglibc-langpack-ro-2.28-151.el8.s390x.rpm\nglibc-langpack-ru-2.28-151.el8.s390x.rpm\nglibc-langpack-rw-2.28-151.el8.s390x.rpm\nglibc-langpack-sa-2.28-151.el8.s390x.rpm\nglibc-langpack-sah-2.28-151.el8.s390x.rpm\nglibc-langpack-sat-2.28-151.el8.s390x.rpm\nglibc-langpack-sc-2.28-151.el8.s390x.rpm\nglibc-langpack-sd-2.28-151.el8.s390x.rpm\nglibc-langpack-se-2.28-151.el8.s390x.rpm\nglibc-langpack-sgs-2.28-151.el8.s390x.rpm\nglibc-langpack-shn-2.28-151.el8.s390x.rpm\nglibc-langpack-shs-2.28-151.el8.s390x.rpm\nglibc-langpack-si-2.28-151.el8.s390x.rpm\nglibc-langpack-sid-2.28-151.el8.s390x.rpm\nglibc-langpack-sk-2.28-151.el8.s390x.rpm\nglibc-langpack-sl-2.28-151.el8.s390x.rpm\nglibc-langpack-sm-2.28-151.el8.s390x.rpm\nglibc-langpack-so-2.28-151.el8.s390x.rpm\nglibc-langpack-sq-2.28-151.el8.s390x.rpm\nglibc-langpack-sr-2.28-151.el8.s390x.rpm\nglibc-langpack-ss-2.28-151.el8.s390x.rpm\nglibc-langpack-st-2.28-151.el8.s390x.rpm\nglibc-langpack-sv-2.28-151.el8.s390x.rpm\nglibc-langpack-sw-2.28-151.el8.s390x.rpm\nglibc-langpack-szl-2.28-151.el8.s390x.rpm\nglibc-langpack-ta-2.28-151.el8.s390x.rpm\nglibc-langpack-tcy-2.28-151.el8.s390x.rpm\nglibc-langpack-te-2.28-151.el8.s390x.rpm\nglibc-langpack-tg-2.28-151.el8.s390x.rpm\nglibc-langpack-th-2.28-151.el8.s390x.rpm\nglibc-langpack-the-2.28-151.el8.s390x.rpm\nglibc-langpack-ti-2.28-151.el8.s390x.rpm\nglibc-langpack-tig-2.28-151.el8.s390x.rpm\nglibc-langpack-tk-2.28-151.el8.s390x.rpm\nglibc-langpack-tl-2.28-151.el8.s390x.rpm\nglibc-langpack-tn-2.28-151.el8.s390x.rpm\nglibc-langpack-to-2.28-151.el8.s390x.rpm\nglibc-langpack-tpi-2.28-151.el8.s390x.rpm\nglibc-langpack-tr-2.28-151.el8.s390x.rpm\nglibc-langpack-ts-2.28-151.el8.s390x.rpm\nglibc-langpack-tt-2.28-151.el8.s390x.rpm\nglibc-langpack-ug-2.28-151.el8.s390x.rpm\nglibc-langpack-uk-2.28-151.el8.s390x.rpm\nglibc-langpack-unm-2.28-151.el8.s390x.rpm\nglibc-langpack-ur-2.28-151.el8.s390x.rpm\nglibc-langpack-uz-2.28-151.el8.s390x.rpm\nglibc-langpack-ve-2.28-151.el8.s390x.rpm\nglibc-langpack-vi-2.28-151.el8.s390x.rpm\nglibc-langpack-wa-2.28-151.el8.s390x.rpm\nglibc-langpack-wae-2.28-151.el8.s390x.rpm\nglibc-langpack-wal-2.28-151.el8.s390x.rpm\nglibc-langpack-wo-2.28-151.el8.s390x.rpm\nglibc-langpack-xh-2.28-151.el8.s390x.rpm\nglibc-langpack-yi-2.28-151.el8.s390x.rpm\nglibc-langpack-yo-2.28-151.el8.s390x.rpm\nglibc-langpack-yue-2.28-151.el8.s390x.rpm\nglibc-langpack-yuw-2.28-151.el8.s390x.rpm\nglibc-langpack-zh-2.28-151.el8.s390x.rpm\nglibc-langpack-zu-2.28-151.el8.s390x.rpm\nglibc-locale-source-2.28-151.el8.s390x.rpm\nglibc-minimal-langpack-2.28-151.el8.s390x.rpm\nlibnsl-2.28-151.el8.s390x.rpm\nnscd-2.28-151.el8.s390x.rpm\nnss_db-2.28-151.el8.s390x.rpm\n\nx86_64:\nglibc-2.28-151.el8.i686.rpm\nglibc-2.28-151.el8.x86_64.rpm\nglibc-all-langpacks-2.28-151.el8.x86_64.rpm\nglibc-common-2.28-151.el8.x86_64.rpm\nglibc-debuginfo-2.28-151.el8.i686.rpm\nglibc-debuginfo-2.28-151.el8.x86_64.rpm\nglibc-debuginfo-common-2.28-151.el8.i686.rpm\nglibc-debuginfo-common-2.28-151.el8.x86_64.rpm\nglibc-devel-2.28-151.el8.i686.rpm\nglibc-devel-2.28-151.el8.x86_64.rpm\nglibc-headers-2.28-151.el8.i686.rpm\nglibc-headers-2.28-151.el8.x86_64.rpm\nglibc-langpack-aa-2.28-151.el8.x86_64.rpm\nglibc-langpack-af-2.28-151.el8.x86_64.rpm\nglibc-langpack-agr-2.28-151.el8.x86_64.rpm\nglibc-langpack-ak-2.28-151.el8.x86_64.rpm\nglibc-langpack-am-2.28-151.el8.x86_64.rpm\nglibc-langpack-an-2.28-151.el8.x86_64.rpm\nglibc-langpack-anp-2.28-151.el8.x86_64.rpm\nglibc-langpack-ar-2.28-151.el8.x86_64.rpm\nglibc-langpack-as-2.28-151.el8.x86_64.rpm\nglibc-langpack-ast-2.28-151.el8.x86_64.rpm\nglibc-langpack-ayc-2.28-151.el8.x86_64.rpm\nglibc-langpack-az-2.28-151.el8.x86_64.rpm\nglibc-langpack-be-2.28-151.el8.x86_64.rpm\nglibc-langpack-bem-2.28-151.el8.x86_64.rpm\nglibc-langpack-ber-2.28-151.el8.x86_64.rpm\nglibc-langpack-bg-2.28-151.el8.x86_64.rpm\nglibc-langpack-bhb-2.28-151.el8.x86_64.rpm\nglibc-langpack-bho-2.28-151.el8.x86_64.rpm\nglibc-langpack-bi-2.28-151.el8.x86_64.rpm\nglibc-langpack-bn-2.28-151.el8.x86_64.rpm\nglibc-langpack-bo-2.28-151.el8.x86_64.rpm\nglibc-langpack-br-2.28-151.el8.x86_64.rpm\nglibc-langpack-brx-2.28-151.el8.x86_64.rpm\nglibc-langpack-bs-2.28-151.el8.x86_64.rpm\nglibc-langpack-byn-2.28-151.el8.x86_64.rpm\nglibc-langpack-ca-2.28-151.el8.x86_64.rpm\nglibc-langpack-ce-2.28-151.el8.x86_64.rpm\nglibc-langpack-chr-2.28-151.el8.x86_64.rpm\nglibc-langpack-cmn-2.28-151.el8.x86_64.rpm\nglibc-langpack-crh-2.28-151.el8.x86_64.rpm\nglibc-langpack-cs-2.28-151.el8.x86_64.rpm\nglibc-langpack-csb-2.28-151.el8.x86_64.rpm\nglibc-langpack-cv-2.28-151.el8.x86_64.rpm\nglibc-langpack-cy-2.28-151.el8.x86_64.rpm\nglibc-langpack-da-2.28-151.el8.x86_64.rpm\nglibc-langpack-de-2.28-151.el8.x86_64.rpm\nglibc-langpack-doi-2.28-151.el8.x86_64.rpm\nglibc-langpack-dsb-2.28-151.el8.x86_64.rpm\nglibc-langpack-dv-2.28-151.el8.x86_64.rpm\nglibc-langpack-dz-2.28-151.el8.x86_64.rpm\nglibc-langpack-el-2.28-151.el8.x86_64.rpm\nglibc-langpack-en-2.28-151.el8.x86_64.rpm\nglibc-langpack-eo-2.28-151.el8.x86_64.rpm\nglibc-langpack-es-2.28-151.el8.x86_64.rpm\nglibc-langpack-et-2.28-151.el8.x86_64.rpm\nglibc-langpack-eu-2.28-151.el8.x86_64.rpm\nglibc-langpack-fa-2.28-151.el8.x86_64.rpm\nglibc-langpack-ff-2.28-151.el8.x86_64.rpm\nglibc-langpack-fi-2.28-151.el8.x86_64.rpm\nglibc-langpack-fil-2.28-151.el8.x86_64.rpm\nglibc-langpack-fo-2.28-151.el8.x86_64.rpm\nglibc-langpack-fr-2.28-151.el8.x86_64.rpm\nglibc-langpack-fur-2.28-151.el8.x86_64.rpm\nglibc-langpack-fy-2.28-151.el8.x86_64.rpm\nglibc-langpack-ga-2.28-151.el8.x86_64.rpm\nglibc-langpack-gd-2.28-151.el8.x86_64.rpm\nglibc-langpack-gez-2.28-151.el8.x86_64.rpm\nglibc-langpack-gl-2.28-151.el8.x86_64.rpm\nglibc-langpack-gu-2.28-151.el8.x86_64.rpm\nglibc-langpack-gv-2.28-151.el8.x86_64.rpm\nglibc-langpack-ha-2.28-151.el8.x86_64.rpm\nglibc-langpack-hak-2.28-151.el8.x86_64.rpm\nglibc-langpack-he-2.28-151.el8.x86_64.rpm\nglibc-langpack-hi-2.28-151.el8.x86_64.rpm\nglibc-langpack-hif-2.28-151.el8.x86_64.rpm\nglibc-langpack-hne-2.28-151.el8.x86_64.rpm\nglibc-langpack-hr-2.28-151.el8.x86_64.rpm\nglibc-langpack-hsb-2.28-151.el8.x86_64.rpm\nglibc-langpack-ht-2.28-151.el8.x86_64.rpm\nglibc-langpack-hu-2.28-151.el8.x86_64.rpm\nglibc-langpack-hy-2.28-151.el8.x86_64.rpm\nglibc-langpack-ia-2.28-151.el8.x86_64.rpm\nglibc-langpack-id-2.28-151.el8.x86_64.rpm\nglibc-langpack-ig-2.28-151.el8.x86_64.rpm\nglibc-langpack-ik-2.28-151.el8.x86_64.rpm\nglibc-langpack-is-2.28-151.el8.x86_64.rpm\nglibc-langpack-it-2.28-151.el8.x86_64.rpm\nglibc-langpack-iu-2.28-151.el8.x86_64.rpm\nglibc-langpack-ja-2.28-151.el8.x86_64.rpm\nglibc-langpack-ka-2.28-151.el8.x86_64.rpm\nglibc-langpack-kab-2.28-151.el8.x86_64.rpm\nglibc-langpack-kk-2.28-151.el8.x86_64.rpm\nglibc-langpack-kl-2.28-151.el8.x86_64.rpm\nglibc-langpack-km-2.28-151.el8.x86_64.rpm\nglibc-langpack-kn-2.28-151.el8.x86_64.rpm\nglibc-langpack-ko-2.28-151.el8.x86_64.rpm\nglibc-langpack-kok-2.28-151.el8.x86_64.rpm\nglibc-langpack-ks-2.28-151.el8.x86_64.rpm\nglibc-langpack-ku-2.28-151.el8.x86_64.rpm\nglibc-langpack-kw-2.28-151.el8.x86_64.rpm\nglibc-langpack-ky-2.28-151.el8.x86_64.rpm\nglibc-langpack-lb-2.28-151.el8.x86_64.rpm\nglibc-langpack-lg-2.28-151.el8.x86_64.rpm\nglibc-langpack-li-2.28-151.el8.x86_64.rpm\nglibc-langpack-lij-2.28-151.el8.x86_64.rpm\nglibc-langpack-ln-2.28-151.el8.x86_64.rpm\nglibc-langpack-lo-2.28-151.el8.x86_64.rpm\nglibc-langpack-lt-2.28-151.el8.x86_64.rpm\nglibc-langpack-lv-2.28-151.el8.x86_64.rpm\nglibc-langpack-lzh-2.28-151.el8.x86_64.rpm\nglibc-langpack-mag-2.28-151.el8.x86_64.rpm\nglibc-langpack-mai-2.28-151.el8.x86_64.rpm\nglibc-langpack-mfe-2.28-151.el8.x86_64.rpm\nglibc-langpack-mg-2.28-151.el8.x86_64.rpm\nglibc-langpack-mhr-2.28-151.el8.x86_64.rpm\nglibc-langpack-mi-2.28-151.el8.x86_64.rpm\nglibc-langpack-miq-2.28-151.el8.x86_64.rpm\nglibc-langpack-mjw-2.28-151.el8.x86_64.rpm\nglibc-langpack-mk-2.28-151.el8.x86_64.rpm\nglibc-langpack-ml-2.28-151.el8.x86_64.rpm\nglibc-langpack-mn-2.28-151.el8.x86_64.rpm\nglibc-langpack-mni-2.28-151.el8.x86_64.rpm\nglibc-langpack-mr-2.28-151.el8.x86_64.rpm\nglibc-langpack-ms-2.28-151.el8.x86_64.rpm\nglibc-langpack-mt-2.28-151.el8.x86_64.rpm\nglibc-langpack-my-2.28-151.el8.x86_64.rpm\nglibc-langpack-nan-2.28-151.el8.x86_64.rpm\nglibc-langpack-nb-2.28-151.el8.x86_64.rpm\nglibc-langpack-nds-2.28-151.el8.x86_64.rpm\nglibc-langpack-ne-2.28-151.el8.x86_64.rpm\nglibc-langpack-nhn-2.28-151.el8.x86_64.rpm\nglibc-langpack-niu-2.28-151.el8.x86_64.rpm\nglibc-langpack-nl-2.28-151.el8.x86_64.rpm\nglibc-langpack-nn-2.28-151.el8.x86_64.rpm\nglibc-langpack-nr-2.28-151.el8.x86_64.rpm\nglibc-langpack-nso-2.28-151.el8.x86_64.rpm\nglibc-langpack-oc-2.28-151.el8.x86_64.rpm\nglibc-langpack-om-2.28-151.el8.x86_64.rpm\nglibc-langpack-or-2.28-151.el8.x86_64.rpm\nglibc-langpack-os-2.28-151.el8.x86_64.rpm\nglibc-langpack-pa-2.28-151.el8.x86_64.rpm\nglibc-langpack-pap-2.28-151.el8.x86_64.rpm\nglibc-langpack-pl-2.28-151.el8.x86_64.rpm\nglibc-langpack-ps-2.28-151.el8.x86_64.rpm\nglibc-langpack-pt-2.28-151.el8.x86_64.rpm\nglibc-langpack-quz-2.28-151.el8.x86_64.rpm\nglibc-langpack-raj-2.28-151.el8.x86_64.rpm\nglibc-langpack-ro-2.28-151.el8.x86_64.rpm\nglibc-langpack-ru-2.28-151.el8.x86_64.rpm\nglibc-langpack-rw-2.28-151.el8.x86_64.rpm\nglibc-langpack-sa-2.28-151.el8.x86_64.rpm\nglibc-langpack-sah-2.28-151.el8.x86_64.rpm\nglibc-langpack-sat-2.28-151.el8.x86_64.rpm\nglibc-langpack-sc-2.28-151.el8.x86_64.rpm\nglibc-langpack-sd-2.28-151.el8.x86_64.rpm\nglibc-langpack-se-2.28-151.el8.x86_64.rpm\nglibc-langpack-sgs-2.28-151.el8.x86_64.rpm\nglibc-langpack-shn-2.28-151.el8.x86_64.rpm\nglibc-langpack-shs-2.28-151.el8.x86_64.rpm\nglibc-langpack-si-2.28-151.el8.x86_64.rpm\nglibc-langpack-sid-2.28-151.el8.x86_64.rpm\nglibc-langpack-sk-2.28-151.el8.x86_64.rpm\nglibc-langpack-sl-2.28-151.el8.x86_64.rpm\nglibc-langpack-sm-2.28-151.el8.x86_64.rpm\nglibc-langpack-so-2.28-151.el8.x86_64.rpm\nglibc-langpack-sq-2.28-151.el8.x86_64.rpm\nglibc-langpack-sr-2.28-151.el8.x86_64.rpm\nglibc-langpack-ss-2.28-151.el8.x86_64.rpm\nglibc-langpack-st-2.28-151.el8.x86_64.rpm\nglibc-langpack-sv-2.28-151.el8.x86_64.rpm\nglibc-langpack-sw-2.28-151.el8.x86_64.rpm\nglibc-langpack-szl-2.28-151.el8.x86_64.rpm\nglibc-langpack-ta-2.28-151.el8.x86_64.rpm\nglibc-langpack-tcy-2.28-151.el8.x86_64.rpm\nglibc-langpack-te-2.28-151.el8.x86_64.rpm\nglibc-langpack-tg-2.28-151.el8.x86_64.rpm\nglibc-langpack-th-2.28-151.el8.x86_64.rpm\nglibc-langpack-the-2.28-151.el8.x86_64.rpm\nglibc-langpack-ti-2.28-151.el8.x86_64.rpm\nglibc-langpack-tig-2.28-151.el8.x86_64.rpm\nglibc-langpack-tk-2.28-151.el8.x86_64.rpm\nglibc-langpack-tl-2.28-151.el8.x86_64.rpm\nglibc-langpack-tn-2.28-151.el8.x86_64.rpm\nglibc-langpack-to-2.28-151.el8.x86_64.rpm\nglibc-langpack-tpi-2.28-151.el8.x86_64.rpm\nglibc-langpack-tr-2.28-151.el8.x86_64.rpm\nglibc-langpack-ts-2.28-151.el8.x86_64.rpm\nglibc-langpack-tt-2.28-151.el8.x86_64.rpm\nglibc-langpack-ug-2.28-151.el8.x86_64.rpm\nglibc-langpack-uk-2.28-151.el8.x86_64.rpm\nglibc-langpack-unm-2.28-151.el8.x86_64.rpm\nglibc-langpack-ur-2.28-151.el8.x86_64.rpm\nglibc-langpack-uz-2.28-151.el8.x86_64.rpm\nglibc-langpack-ve-2.28-151.el8.x86_64.rpm\nglibc-langpack-vi-2.28-151.el8.x86_64.rpm\nglibc-langpack-wa-2.28-151.el8.x86_64.rpm\nglibc-langpack-wae-2.28-151.el8.x86_64.rpm\nglibc-langpack-wal-2.28-151.el8.x86_64.rpm\nglibc-langpack-wo-2.28-151.el8.x86_64.rpm\nglibc-langpack-xh-2.28-151.el8.x86_64.rpm\nglibc-langpack-yi-2.28-151.el8.x86_64.rpm\nglibc-langpack-yo-2.28-151.el8.x86_64.rpm\nglibc-langpack-yue-2.28-151.el8.x86_64.rpm\nglibc-langpack-yuw-2.28-151.el8.x86_64.rpm\nglibc-langpack-zh-2.28-151.el8.x86_64.rpm\nglibc-langpack-zu-2.28-151.el8.x86_64.rpm\nglibc-locale-source-2.28-151.el8.x86_64.rpm\nglibc-minimal-langpack-2.28-151.el8.x86_64.rpm\nlibnsl-2.28-151.el8.i686.rpm\nlibnsl-2.28-151.el8.x86_64.rpm\nnscd-2.28-151.el8.x86_64.rpm\nnss_db-2.28-151.el8.i686.rpm\nnss_db-2.28-151.el8.x86_64.rpm\n\nRed Hat CodeReady Linux Builder (v. 8):\n\naarch64:\nglibc-benchtests-2.28-151.el8.aarch64.rpm\nglibc-debuginfo-2.28-151.el8.aarch64.rpm\nglibc-nss-devel-2.28-151.el8.aarch64.rpm\nglibc-static-2.28-151.el8.aarch64.rpm\nnss_hesiod-2.28-151.el8.aarch64.rpm\n\nppc64le:\nglibc-benchtests-2.28-151.el8.ppc64le.rpm\nglibc-debuginfo-2.28-151.el8.ppc64le.rpm\nglibc-debuginfo-common-2.28-151.el8.ppc64le.rpm\nglibc-nss-devel-2.28-151.el8.ppc64le.rpm\nglibc-static-2.28-151.el8.ppc64le.rpm\nnss_hesiod-2.28-151.el8.ppc64le.rpm\n\ns390x:\nglibc-benchtests-2.28-151.el8.s390x.rpm\nglibc-debuginfo-2.28-151.el8.s390x.rpm\nglibc-debuginfo-common-2.28-151.el8.s390x.rpm\nglibc-nss-devel-2.28-151.el8.s390x.rpm\nglibc-static-2.28-151.el8.s390x.rpm\nnss_hesiod-2.28-151.el8.s390x.rpm\n\nx86_64:\nglibc-benchtests-2.28-151.el8.x86_64.rpm\nglibc-debuginfo-2.28-151.el8.i686.rpm\nglibc-debuginfo-2.28-151.el8.x86_64.rpm\nglibc-debuginfo-common-2.28-151.el8.i686.rpm\nglibc-debuginfo-common-2.28-151.el8.x86_64.rpm\nglibc-nss-devel-2.28-151.el8.i686.rpm\nglibc-nss-devel-2.28-151.el8.x86_64.rpm\nglibc-static-2.28-151.el8.i686.rpm\nglibc-static-2.28-151.el8.x86_64.rpm\nnss_hesiod-2.28-151.el8.i686.rpm\nnss_hesiod-2.28-151.el8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-10228\nhttps://access.redhat.com/security/cve/CVE-2019-9169\nhttps://access.redhat.com/security/cve/CVE-2019-25013\nhttps://access.redhat.com/security/cve/CVE-2020-27618\nhttps://access.redhat.com/security/cve/CVE-2021-3326\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nouzI0iwzGJs=R8FH\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBug Fix(es):\n\n* WMCO patch pub-key-hash annotation to Linux node (BZ#1945248)\n\n* LoadBalancer Service type with invalid external loadbalancer IP breaks\nthe datapath (BZ#1952917)\n\n* Telemetry info not completely available to identify windows nodes\n(BZ#1955319)\n\n* WMCO incorrectly shows node as ready after a failed configuration\n(BZ#1956412)\n\n* kube-proxy service terminated unexpectedly after recreated LB service\n(BZ#1963263)\n\n3. Solution:\n\nFor Windows Machine Config Operator upgrades, see the following\ndocumentation:\n\nhttps://docs.openshift.com/container-platform/4.7/windows_containers/window\ns-node-upgrades.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1945248 - WMCO patch pub-key-hash annotation to Linux node\n1946538 - CVE-2021-25736 kubernetes: LoadBalancer Service type don\u0027t create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM\n1952917 - LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath\n1955319 - Telemetry info not completely available to identify windows nodes\n1956412 - WMCO incorrectly shows node as ready after a failed configuration\n1963263 - kube-proxy service terminated unexpectedly after recreated LB service\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1937901 - CVE-2021-27918 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader\n1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header\n1965503 - CVE-2021-33196 golang: archive/zip: Malformed archive may cause panic or memory exhaustion\n1971445 - Release of OpenShift Serverless Serving 1.16.0\n1971448 - Release of OpenShift Serverless Eventing 1.16.0\n\n5. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. \n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.7.13. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2021:2122\n\nSpace precludes documenting all of the container images in this advisory. \nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nThis update fixes the following bug among others:\n\n* Previously, resources for the ClusterOperator were being created early in\nthe update process, which led to update failures when the ClusterOperator\nhad no status condition while Operators were updating. This bug fix changes\nthe timing of when these resources are created. As a result, updates can\ntake place without errors. (BZ#1959238)\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index\nvalidation (CVE-2021-3121)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n  $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-x86_64\n\nThe image digest is\nsha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4\n\n(For s390x architecture)\n\n  $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-s390x\n\nThe image digest is\nsha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd\n\n(For ppc64le architecture)\n\n  $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le\n\nThe image digest is\nsha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor\n\n3. Solution:\n\nFor OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n1923268 - [Assisted-4.7] [Staging] Using two both spelling \"canceled\"  \"cancelled\"\n1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go\n1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list\n1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits\n1959238 - CVO creating cloud-controller-manager too early causing upgrade failures\n1960103 - SR-IOV obliviously reboot the node\n1961941 - Local Storage Operator using LocalVolume CR fails to create PV\u0027s when backend storage failure is simulated\n1962302 - packageserver clusteroperator does not set reason or message for Available condition\n1962312 - Deployment considered unhealthy despite being available and at latest generation\n1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone\n1963115 - Test verify /run filesystem contents failing\n\n5. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.3.0 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in. See\nthe following Release Notes documentation, which will be updated shortly\nfor this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.3/html/release_notes/\n\nSecurity:\n\n* fastify-reply-from: crafted URL allows prefix scape of the proxied\nbackend service (CVE-2021-21321)\n\n* fastify-http-proxy: crafted URL allows prefix scape of the proxied\nbackend service (CVE-2021-21322)\n\n* nodejs-netmask: improper input validation of octal input data\n(CVE-2021-28918)\n\n* redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)\n\n* redis: Integer overflow via COPY command for large intsets\n(CVE-2021-29478)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions\n(CVE-2020-28500)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing\n- -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing\nbcp47 tag (CVE-2020-28852)\n\n* nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)\n\n* oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)\n\n* redis: integer overflow when configurable limit for maximum supported\nbulk input size is too big on 32-bit platforms (CVE-2021-21309)\n\n* nodejs-lodash: command injection via template (CVE-2021-23337)\n\n* nodejs-hosted-git-info: Regular Expression denial of service via\nshortcutMatch in fromUrl() (CVE-2021-23362)\n\n* browserslist: parsing of invalid queries could result in Regular\nExpression Denial of Service (ReDoS) (CVE-2021-23364)\n\n* nodejs-postcss: Regular expression denial of service during source map\nparsing (CVE-2021-23368)\n\n* nodejs-handlebars: Remote code execution when compiling untrusted compile\ntemplates with strict:true option (CVE-2021-23369)\n\n* nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in\nlib/previous-map.js (CVE-2021-23382)\n\n* nodejs-handlebars: Remote code execution when compiling untrusted compile\ntemplates with compat:true option (CVE-2021-23383)\n\n* openssl: integer overflow in CipherUpdate (CVE-2021-23840)\n\n* openssl: NULL pointer dereference in X509_issuer_and_serial_hash()\n(CVE-2021-23841)\n\n* nodejs-ua-parser-js: ReDoS via malicious User-Agent header\n(CVE-2021-27292)\n\n* grafana: snapshot feature allow an unauthenticated remote attacker to\ntrigger a DoS via a remote API call (CVE-2021-27358)\n\n* nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)\n\n* nodejs-netmask: incorrectly parses an IP address that has octal integer\nwith invalid character (CVE-2021-29418)\n\n* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service\n(CVE-2021-29482)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe\n(CVE-2021-23343)\n\n* html-parse-stringify: Regular Expression DoS (CVE-2021-23346)\n\n* openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)\n\nFor more details about the security issues, including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npages listed in the References section. \n\nBugs:\n\n* RFE Make the source code for the endpoint-metrics-operator public (BZ#\n1913444)\n\n* cluster became offline after apiserver health check (BZ# 1942589)\n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):\n\n1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension\n1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag\n1913444 - RFE Make the source code for the endpoint-metrics-operator public\n1921286 - CVE-2021-21272 oras: zip-slip vulnerability via oras-pull\n1927520 - RHACM 2.3.0 images\n1928937 - CVE-2021-23337 nodejs-lodash: command injection via template\n1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions\n1930294 - CVE-2021-23839 openssl: incorrect SSLv2 rollback protection\n1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()\n1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate\n1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms\n1936427 - CVE-2021-3377 nodejs-ansi_up: XSS due to insufficient URL sanitization\n1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string\n1940196 - View Resource YAML option shows 404 error when reviewing a Subscription for an application\n1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header\n1941024 - CVE-2021-27358 grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call\n1941675 - CVE-2021-23346 html-parse-stringify: Regular Expression DoS\n1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service\n1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service\n1942589 - cluster became offline after apiserver health check\n1943208 - CVE-2021-23362 nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()\n1944822 - CVE-2021-29418 nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character\n1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data\n1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service\n1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option\n1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing\n1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js\n1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service\n1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS)\n1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option\n1956818 - CVE-2021-23343 nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe\n1957410 - CVE-2021-29477 redis: Integer overflow via STRALGO LCS command\n1957414 - CVE-2021-29478 redis: Integer overflow via COPY command for large intsets\n1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs\n1966615 - CVE-2021-33623 nodejs-trim-newlines: ReDoS in .end() method\n1968122 - clusterdeployment fails because hiveadmission sc does not have correct permissions\n1972703 - Subctl fails to join cluster, since it cannot auto-generate a valid cluster id\n1983131 - Defragmenting an etcd member doesn\u0027t reduce the DB size (7.5GB) on a setup with ~1000 spoke clusters\n\n5. Description:\n\nService Telemetry Framework (STF) provides automated collection of\nmeasurements and data from remote clients, such as Red Hat OpenStack\nPlatform or third-party nodes. \nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/):\n\n2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read\n\n5",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-25013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-25013"
      },
      {
        "db": "PACKETSTORM",
        "id": "162634"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163257"
      },
      {
        "db": "PACKETSTORM",
        "id": "163496"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "163747"
      },
      {
        "db": "PACKETSTORM",
        "id": "168011"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-25013",
        "trust": 4.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-166-10",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU99464755",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162634",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162837",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163496",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162877",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163747",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "168011",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163789",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "163276",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "166279",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "163267",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "161254",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164192",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "163406",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0868",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.6426",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2228",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2180",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0875",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0373",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0728",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0743",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2711",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1866",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3141",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4058",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2657",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1820",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.5140",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1743",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.4222",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2604",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.1025",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2365",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2781",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022011038",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022031430",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021071310",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021070604",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021062703",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021062315",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021071516",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021122914",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021092220",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-048",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-25013",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163257",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-25013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "db": "PACKETSTORM",
        "id": "162634"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163257"
      },
      {
        "db": "PACKETSTORM",
        "id": "163496"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "163747"
      },
      {
        "db": "PACKETSTORM",
        "id": "168011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-25013"
      }
    ]
  },
  "id": "VAR-202101-0119",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.465277775
  },
  "last_update_date": "2024-09-19T20:40:43.272000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Bug\u00a024973 NetAppNetApp\u00a0Advisory",
        "trust": 0.8,
        "url": "https://www.broadcom.com/"
      },
      {
        "title": "GNU C Library Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=138312"
      },
      {
        "title": "Debian CVElist Bug Report Logs: glibc: CVE-2019-25013",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=7073abdc63eae799f90555726b8fbe41"
      },
      {
        "title": "Red Hat: Moderate: glibc security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210348 - Security Advisory"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2021-1599",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2021-1599"
      },
      {
        "title": "Ubuntu Security Notice: USN-5768-1: GNU C Library vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5768-1"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2019-25013 log"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2021-1511",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2021-1511"
      },
      {
        "title": "Arch Linux Advisories: [ASA-202102-18] glibc: denial of service",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202102-18"
      },
      {
        "title": "Arch Linux Advisories: [ASA-202102-17] lib32-glibc: denial of service",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202102-17"
      },
      {
        "title": "Red Hat: Moderate: Red Hat Advanced Cluster Management 2.1.3 security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20210607 - Security Advisory"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2021-1605",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2021-1605"
      },
      {
        "title": "Ubuntu Security Notice: USN-5310-1: GNU C Library vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5310-1"
      },
      {
        "title": "Red Hat: Important: Service Telemetry Framework 1.4 security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20225924 - Security Advisory"
      },
      {
        "title": "IBM: Security Bulletin: Cloud Pak for Security contains security vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=08f19f0be4d5dcf7486e5abcdb671477"
      },
      {
        "title": "Red Hat: Moderate: OpenShift Container Platform 4.10.3 security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20220056 - Security Advisory"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=ec6577109e640dac19a6ddb978afe82d"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/Live-Hack-CVE/CVE-2019-25013 "
      },
      {
        "title": "ecr-api",
        "trust": 0.1,
        "url": "https://github.com/YaleSpinup/ecr-api "
      },
      {
        "title": "sanction",
        "trust": 0.1,
        "url": "https://github.com/ctc-oss/sanction "
      },
      {
        "title": "release-the-code-litecoin",
        "trust": 0.1,
        "url": "https://github.com/brandoncamenisch/release-the-code-litecoin "
      },
      {
        "title": "interview_project",
        "trust": 0.1,
        "url": "https://github.com/domyrtille/interview_project "
      },
      {
        "title": "trivy-multiscanner",
        "trust": 0.1,
        "url": "https://github.com/onzack/trivy-multiscanner "
      },
      {
        "title": "spring-boot-app-with-log4j-vuln",
        "trust": 0.1,
        "url": "https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln "
      },
      {
        "title": "giant-squid",
        "trust": 0.1,
        "url": "https://github.com/dispera/giant-squid "
      },
      {
        "title": "devops-demo",
        "trust": 0.1,
        "url": "https://github.com/epequeno/devops-demo "
      },
      {
        "title": "spring-boot-app-using-gradle",
        "trust": 0.1,
        "url": "https://github.com/nedenwalker/spring-boot-app-using-gradle "
      },
      {
        "title": "xyz-solutions",
        "trust": 0.1,
        "url": "https://github.com/sauliuspr/xyz-solutions "
      },
      {
        "title": "myapp-container-jaxrs",
        "trust": 0.1,
        "url": "https://github.com/akiraabe/myapp-container-jaxrs "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-25013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-125",
        "trust": 1.0
      },
      {
        "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-25013"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25013"
      },
      {
        "trust": 1.6,
        "url": "https://security.netapp.com/advisory/ntap-20210205-0004/"
      },
      {
        "trust": 1.6,
        "url": "https://security.gentoo.org/glsa/202107-07"
      },
      {
        "trust": 1.6,
        "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
      },
      {
        "trust": 1.6,
        "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"
      },
      {
        "trust": 1.6,
        "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24973"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3cjira.kafka.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3cdev.kafka.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3cjira.kafka.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3cjira.kafka.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3cjira.kafka.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3cissues.zookeeper.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3cdev.zookeeper.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3cissues.zookeeper.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3cdev.mina.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4y6tx47p47kabsfol26fldnvcwxdkdez/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/tvcunlq3hxgs4vpuqkwtjgraw2ktfgxs/"
      },
      {
        "trust": 1.0,
        "url": "https://sourceware.org/git/?p=glibc.git%3ba=commit%3bh=ee7a3144c9922808181009b7b3e50e852fb4999b"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu99464755/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-10"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/cve/cve-2019-25013"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/cve/cve-2021-3326"
      },
      {
        "trust": 0.7,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10228"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/cve/cve-2016-10228"
      },
      {
        "trust": 0.7,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/cve/cve-2020-27618"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/cve/cve-2019-9169"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9169"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2020-15358"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2020-13434"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2020-29362"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2020-29361"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2020-8927"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2020-29363"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3cjira.kafka.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3cdev.zookeeper.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3cdev.kafka.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3cjira.kafka.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3cdev.mina.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3cissues.zookeeper.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/tvcunlq3hxgs4vpuqkwtjgraw2ktfgxs/"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3cissues.zookeeper.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3cjira.kafka.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4y6tx47p47kabsfol26fldnvcwxdkdez/"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3cjira.kafka.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164192/red-hat-security-advisory-2021-3556-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/168011/red-hat-security-advisory-2022-5924-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163789/red-hat-security-advisory-2021-3119-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-cloud-pak-for-security-contains-security-vulnerabilities/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1866"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2657"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1743"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1820"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2711"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021071310"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163747/red-hat-security-advisory-2021-3016-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2781"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.5140"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0373/"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022031430"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166279/red-hat-security-advisory-2022-0056-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2365"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2180"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021122914"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162634/red-hat-security-advisory-2021-1585-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163276/red-hat-security-advisory-2021-2543-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0875"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/glibc-out-of-bounds-memory-reading-via-iconv-euc-kr-encoding-34360"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.1025"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0728"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163496/red-hat-security-advisory-2021-2705-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0743"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2228"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021062703"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021092220"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0868"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6520474"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2604"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162837/red-hat-security-advisory-2021-2136-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163267/red-hat-security-advisory-2021-2532-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022011038"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/161254/red-hat-security-advisory-2021-0348-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021070604"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021071516"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162877/red-hat-security-advisory-2021-2121-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021062315"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4058"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.4222"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163406/gentoo-linux-security-advisory-202107-07.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3141"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.6426"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2020-8286"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2020-28196"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2020-8231"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2020-8285"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2019-2708"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2708"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2020-8284"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27618"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2021-20305"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2019-3842"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-13776"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2020-24977"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13434"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3842"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-14502"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14502"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3326"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13776"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29362"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15358"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2021-27219"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29361"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28196"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14347"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-36322"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-12114"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25712"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12114"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-13543"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-27835"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-9951"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25704"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3121"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-10878"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19528"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-9948"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-13012"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0431"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-26116"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14363"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-13584"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-26137"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-18811"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14360"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-19528"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-12464"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14314"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-12362"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14356"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-27619"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-27786"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25643"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-9983"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3177"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-24394"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-0431"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-0342"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18811"
      },
      {
        "trust": 0.2,
        "url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14345"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14344"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-19523"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-23336"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14362"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14361"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10543"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25285"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-35508"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12362"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25212"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19523"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-28974"
      },
      {
        "trust": 0.2,
        "url": "https://issues.jboss.org/):"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-10543"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-15437"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13012"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-25284"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-14346"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10878"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11608"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-11608"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12464"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8284"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27219"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8285"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8286"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8927"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29363"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8231"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3449"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3450"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24977"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-20454"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-13050"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3520"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3537"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3518"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13050"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3516"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3517"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2018-1000858"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-14889"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-1730"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-3541"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-13627"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000858"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20454"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13627"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14889"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1585"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14346"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14345"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13543"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13584"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14347"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14360"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2136"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14314"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14344"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-u"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14356"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25736"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3450"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2130"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20305"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.7/windows_containers/window"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-25736"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3449"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27918"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2705"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31525"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-31525"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-27918"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33196"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33196"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25039"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-15586"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.7/updating/updating-cluster"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25037"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-36242"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25037"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28935"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25034"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-16845"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25035"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-14866"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25038"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14866"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21645"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25040"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-27783"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24330"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25042"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25042"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25038"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25659"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25032"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25041"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25036"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25032"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21643"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-25215"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24331"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25036"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-30465"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25035"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21644"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2121"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24332"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25039"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25040"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25041"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2122"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21642"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25034"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28469"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28500"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20934"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-29418"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28852"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33034"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-28092"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15903"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-20843"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28851"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1730"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33909"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-29482"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23337"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-32399"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-27358"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19906"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23369"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21321"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23368"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-11668"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23362"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23364"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23343"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21309"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33502"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23841"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23383"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-28918"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28851"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3560"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28852"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23840"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33033"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20934"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-25217"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28469"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3016"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3377"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-20271"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28500"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21272"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-29477"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-27292"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23346"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-29478"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11668"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23839"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-19906"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33623"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20843"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21322"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23382"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-15903"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33910"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-37750"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3867"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9805"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3894"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9807"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3899"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-30761"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8743"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8743"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8823"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3900"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9894"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33938"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8782"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8771"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9952"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8846"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-24407"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9915"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-1271"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8783"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-36222"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8625"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8813"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9806"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3885"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9802"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8764"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-22946"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8769"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8710"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-10018"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9895"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8811"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8710"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8819"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3862"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25032"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3868"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3895"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3865"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33930"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-14391"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3864"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9862"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33929"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8835"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8816"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3897"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8808"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8625"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-27218"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-22947"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8766"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-11793"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9803"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3521"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9850"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-30666"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-33928"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-30631"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8820"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9893"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-23852"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8844"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20807"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3902"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:5924"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8814"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8812"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8815"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9843"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3901"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8720"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-25032"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-30762"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20807"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9925"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0778"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-15503"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8720"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "db": "PACKETSTORM",
        "id": "162634"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163257"
      },
      {
        "db": "PACKETSTORM",
        "id": "163496"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "163747"
      },
      {
        "db": "PACKETSTORM",
        "id": "168011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-25013"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2019-25013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "db": "PACKETSTORM",
        "id": "162634"
      },
      {
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "db": "PACKETSTORM",
        "id": "163257"
      },
      {
        "db": "PACKETSTORM",
        "id": "163496"
      },
      {
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "db": "PACKETSTORM",
        "id": "163747"
      },
      {
        "db": "PACKETSTORM",
        "id": "168011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-25013"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-01-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-25013"
      },
      {
        "date": "2021-09-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "date": "2021-05-19T13:59:56",
        "db": "PACKETSTORM",
        "id": "162634"
      },
      {
        "date": "2021-05-27T13:28:54",
        "db": "PACKETSTORM",
        "id": "162837"
      },
      {
        "date": "2021-06-23T15:44:15",
        "db": "PACKETSTORM",
        "id": "163257"
      },
      {
        "date": "2021-07-14T15:02:07",
        "db": "PACKETSTORM",
        "id": "163496"
      },
      {
        "date": "2021-06-01T14:45:29",
        "db": "PACKETSTORM",
        "id": "162877"
      },
      {
        "date": "2021-08-06T14:02:37",
        "db": "PACKETSTORM",
        "id": "163747"
      },
      {
        "date": "2022-08-09T14:36:05",
        "db": "PACKETSTORM",
        "id": "168011"
      },
      {
        "date": "2021-01-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      },
      {
        "date": "2021-01-04T18:15:13.027000",
        "db": "NVD",
        "id": "CVE-2019-25013"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-11-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-25013"
      },
      {
        "date": "2023-06-16T05:32:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      },
      {
        "date": "2022-12-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      },
      {
        "date": "2023-11-09T14:44:33.733000",
        "db": "NVD",
        "id": "CVE-2019-25013"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "168011"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "GNU\u00a0C\u00a0Library\u00a0 Out-of-bounds read vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-016179"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-048"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.