<?xml version='1.0' encoding='UTF-8'?>
<updates>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1695326199</id>
    <title>lz4: Fix of CVE-2021-3520</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-3520: Fix potential memory corruption with negative memmove() size</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-3520: Fix potential memory corruption with negative memmove() size</summary>
    <pushcount>0</pushcount>
    <issued date="2023-09-21 20:57:15 UTC" />
    <updated date="2023-09-21 20:57:15 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1695326199.html" id="CLSA-2023:1695326199" title="CLSA-2023:1695326199" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="lz4" release="1.el7.tuxcare.els1" src="lz4-1.8.3-1.el7.tuxcare.els1.src.rpm" version="1.8.3">
          <filename>lz4-1.8.3-1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">5335558b2177e7f2d82601c828adfa36538f69a0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="lz4" release="1.el7.tuxcare.els1" src="lz4-1.8.3-1.el7.tuxcare.els1.src.rpm" version="1.8.3">
          <filename>lz4-1.8.3-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">80c901d619bf31112141ebfa98d3b750a7c8929b</sum>
        </package>
        <package arch="i686" epoch="0" name="lz4-devel" release="1.el7.tuxcare.els1" src="lz4-1.8.3-1.el7.tuxcare.els1.src.rpm" version="1.8.3">
          <filename>lz4-devel-1.8.3-1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">633bbbfcbda91e3eeee225b162c2cfab8018792f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="lz4-devel" release="1.el7.tuxcare.els1" src="lz4-1.8.3-1.el7.tuxcare.els1.src.rpm" version="1.8.3">
          <filename>lz4-devel-1.8.3-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c6b4e7a07f10ee9cf520a043f7f528819f5a923f</sum>
        </package>
        <package arch="i686" epoch="0" name="lz4-static" release="1.el7.tuxcare.els1" src="lz4-1.8.3-1.el7.tuxcare.els1.src.rpm" version="1.8.3">
          <filename>lz4-static-1.8.3-1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">2f62417720d611116bd363e7857c22836a589268</sum>
        </package>
        <package arch="x86_64" epoch="0" name="lz4-static" release="1.el7.tuxcare.els1" src="lz4-1.8.3-1.el7.tuxcare.els1.src.rpm" version="1.8.3">
          <filename>lz4-static-1.8.3-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">588c300e0befdf3e1afa9c5d8a452933e40f8406</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1695406987</id>
    <title>libtasn1: Fix of CVE-2021-46848</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-46848: Fix ETYPE_OK off by one array size check.</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-46848: Fix ETYPE_OK off by one array size check.</summary>
    <pushcount>0</pushcount>
    <issued date="2023-09-22 18:23:11 UTC" />
    <updated date="2023-09-22 18:23:11 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1695406987.html" id="CLSA-2023:1695406987" title="CLSA-2023:1695406987" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libtasn1" release="1.el7.tuxcare.els1" src="libtasn1-4.10-1.el7.tuxcare.els1.src.rpm" version="4.10">
          <filename>libtasn1-4.10-1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">bb4ca6284c31053611f8f5d09d087a420efcf26d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtasn1" release="1.el7.tuxcare.els1" src="libtasn1-4.10-1.el7.tuxcare.els1.src.rpm" version="4.10">
          <filename>libtasn1-4.10-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f9c3a45d9b77349b6ac215e583a4a6a49a994887</sum>
        </package>
        <package arch="i686" epoch="0" name="libtasn1-devel" release="1.el7.tuxcare.els1" src="libtasn1-4.10-1.el7.tuxcare.els1.src.rpm" version="4.10">
          <filename>libtasn1-devel-4.10-1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">cee8fc0819b8500a09b8a97c724ecf8717480cb0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtasn1-devel" release="1.el7.tuxcare.els1" src="libtasn1-4.10-1.el7.tuxcare.els1.src.rpm" version="4.10">
          <filename>libtasn1-devel-4.10-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8f8ac6ad10d11dfa3e8a29c5c89371571fdf0dec</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtasn1-tools" release="1.el7.tuxcare.els1" src="libtasn1-4.10-1.el7.tuxcare.els1.src.rpm" version="4.10">
          <filename>libtasn1-tools-4.10-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">95da1c3092b62a96a51c51ab44d7eeec65166ce1</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1695752598</id>
    <title>httpd: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-23943: Fix out-of-bound write in mod_sed
- CVE-2022-22721: Fix integer overflow which resulted in out-of-bounds write
- CVE-2022-28615: Fix read beyond bounds in ap_strcmp_match()
- CVE-2022-31813: Fix possible bypass of IP based authentication</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-23943: Fix out-of-bound write in mod_sed
- CVE-2022-22721: Fix integer overflow which resulted in out-of-bounds write
- CVE-2022-28615: Fix read beyond bounds in ap_strcmp_match()
- CVE-2022-31813: Fix possible bypass of IP based authentication</summary>
    <pushcount>0</pushcount>
    <issued date="2023-09-26 18:23:22 UTC" />
    <updated date="2023-09-26 18:23:22 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1695752598.html" id="CLSA-2023:1695752598" title="CLSA-2023:1695752598" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.el7.centos.1.tuxcare.els1" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els1.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">abcebff4e25b456c277b446349e4f78de5adc010</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.el7.centos.1.tuxcare.els1" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els1.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0df38b144f249b1dcbe3873a697908608a9edd21</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.el7.centos.1.tuxcare.els1" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els1.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">7135ad62ce92a941e384ced7bdc93fb130a23ff0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.el7.centos.1.tuxcare.els1" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els1.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">62376f47b9f878e613a9642b8cf12e9e5ce0be2a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.el7.centos.1.tuxcare.els1" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els1.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c6d070bcd6b67267cb24e98ff2d6c965e8175e0e</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.el7.centos.1.tuxcare.els1" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els1.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">3698fe8eb955a70e0bd60a7e8297ea029f33c11f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.el7.centos.1.tuxcare.els1" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els1.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">d772a1b36c9387cc67b5f05a7a867d72488d6f97</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.el7.centos.1.tuxcare.els1" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els1.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f8ba02ee9b65ea554aae13f7087bc465cc4c8008</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1695834624</id>
    <title>python3: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-3177: Replace snprintf to prevent buffer overflow
- CVE-2022-48565: Reject XML entity declarations in plist files</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-3177: Replace snprintf to prevent buffer overflow
- CVE-2022-48565: Reject XML entity declarations in plist files</summary>
    <pushcount>0</pushcount>
    <issued date="2023-09-27 17:10:28 UTC" />
    <updated date="2023-09-27 17:10:28 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1695834624.html" id="CLSA-2023:1695834624" title="CLSA-2023:1695834624" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">ff0f7c541ae160786eca75805e0d32cfbe93309e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f49c04bfcd0b453ed60812c9ea6e3787f6951d14</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">89b19ae9b52c24c1549b191055522e045b382d23</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f7a0a47ae24dcf550ff4f159c5379b8e757f87c9</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">e5a09a3491aee9d9b31b802133fa138a3bf1bdfe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6aa32329e057f1ea20e45232e67bdc295f875089</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">2bd15f34dc8a940f0349b267bb7da1f6ed9c0075</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e36c7e71edaf38299abb42e54b2eeead1cc66883</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">593a39ac99294654bf73d2d2ca63d9e05af81bce</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">305fac9731bd59f4a597bf864259dfbe0a87fbd6</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">f8ef0171a9095e6cf804b9d517400e300f15ba43</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c99d9632a768e6de14dfb849fe413594268d0aa1</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">d0a997577fbc3900cca37c971c45eb9e382a37a0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="19.el7.tuxcare.els1" src="python3-3.6.8-19.el7.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8419a4d1a694af5f71346de8969e9b132475778b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1695834945</id>
    <title>openldap: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-29155: fix a SQL injection vulnerability in the back-sql backend
  to slapd
- CVE-2021-27212: fix denial of service (daemon exit) via a short timestamp
  if slapd is used</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-29155: fix a SQL injection vulnerability in the back-sql backend
  to slapd
- CVE-2021-27212: fix denial of service (daemon exit) via a short timestamp
  if slapd is used</summary>
    <pushcount>0</pushcount>
    <issued date="2023-09-27 17:15:49 UTC" />
    <updated date="2023-09-27 17:15:49 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1695834945.html" id="CLSA-2023:1695834945" title="CLSA-2023:1695834945" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="openldap" release="25.el7_9.tuxcare.els1" src="openldap-2.4.44-25.el7_9.tuxcare.els1.src.rpm" version="2.4.44">
          <filename>openldap-2.4.44-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">0beede14b5e790fa644584fa5a5bd1cec5f4e8fc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openldap" release="25.el7_9.tuxcare.els1" src="openldap-2.4.44-25.el7_9.tuxcare.els1.src.rpm" version="2.4.44">
          <filename>openldap-2.4.44-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">06fb1dbfdcc3a325f7a696c9d17bca97db4190b8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openldap-clients" release="25.el7_9.tuxcare.els1" src="openldap-2.4.44-25.el7_9.tuxcare.els1.src.rpm" version="2.4.44">
          <filename>openldap-clients-2.4.44-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">26a14c009d0962993942268ff93f44a5a8af3bd8</sum>
        </package>
        <package arch="i686" epoch="0" name="openldap-devel" release="25.el7_9.tuxcare.els1" src="openldap-2.4.44-25.el7_9.tuxcare.els1.src.rpm" version="2.4.44">
          <filename>openldap-devel-2.4.44-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">2dae8e81a8676d1301332623de4f1f84a5ad2cf4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openldap-devel" release="25.el7_9.tuxcare.els1" src="openldap-2.4.44-25.el7_9.tuxcare.els1.src.rpm" version="2.4.44">
          <filename>openldap-devel-2.4.44-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">674b5b06c67e95972dcbb5f8acd18147555d4ece</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openldap-servers" release="25.el7_9.tuxcare.els1" src="openldap-2.4.44-25.el7_9.tuxcare.els1.src.rpm" version="2.4.44">
          <filename>openldap-servers-2.4.44-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">160aa15e0841c681425725ac038d7e956a737ede</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openldap-servers-sql" release="25.el7_9.tuxcare.els1" src="openldap-2.4.44-25.el7_9.tuxcare.els1.src.rpm" version="2.4.44">
          <filename>openldap-servers-sql-2.4.44-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9b66fff95147f17a9309700f9290481046d32efe</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1696352100</id>
    <title>glib2: Fix of CVE-2021-27218</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-27218: gbytearray: Do not accept too large byte arrays
- Enable internal tests
- Skip several failed tests from the check</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-27218: gbytearray: Do not accept too large byte arrays
- Enable internal tests
- Skip several failed tests from the check</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-03 16:55:05 UTC" />
    <updated date="2023-10-03 16:55:05 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1696352100.html" id="CLSA-2023:1696352100" title="CLSA-2023:1696352100" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="glib2" release="9.el7_9.tuxcare.els1" src="glib2-2.56.1-9.el7_9.tuxcare.els1.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">8d95b19e06810735e439444f72563df8e7d1c7cb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2" release="9.el7_9.tuxcare.els1" src="glib2-2.56.1-9.el7_9.tuxcare.els1.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">32274ea04cb4bc0de9751a3d70dc52d09728c65f</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els1" src="glib2-2.56.1-9.el7_9.tuxcare.els1.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">a53ec1271e9c78caad7bb52c4f06866ad09e453e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els1" src="glib2-2.56.1-9.el7_9.tuxcare.els1.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9defde80bf6e762dd4a92c343a0b606ed57c032b</sum>
        </package>
        <package arch="noarch" epoch="0" name="glib2-doc" release="9.el7_9.tuxcare.els1" src="glib2-2.56.1-9.el7_9.tuxcare.els1.src.rpm" version="2.56.1">
          <filename>glib2-doc-2.56.1-9.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">391fe71cc4ca47157c0d30f6302eec945eb20df4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-fam" release="9.el7_9.tuxcare.els1" src="glib2-2.56.1-9.el7_9.tuxcare.els1.src.rpm" version="2.56.1">
          <filename>glib2-fam-2.56.1-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">673dc55537e03e1ea8fed1878669ab329dba1213</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els1" src="glib2-2.56.1-9.el7_9.tuxcare.els1.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">c10f5ddef12ec9378bf6c0aebf0e651fedef0236</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els1" src="glib2-2.56.1-9.el7_9.tuxcare.els1.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">46ff7152639eaacbde6817a2596da0d2423541c0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-tests" release="9.el7_9.tuxcare.els1" src="glib2-2.56.1-9.el7_9.tuxcare.els1.src.rpm" version="2.56.1">
          <filename>glib2-tests-2.56.1-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c7c35916aed2ebd026f249a048d16221c76cdec6</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1696536930</id>
    <title>httpd: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-26690: Fix NULL pointer dereference in mod_session
- CVE-2022-22719: Fix possible process crash due to unnoticed failures in mod_lua
- CVE-2022-29404: Fix possible DoS due to no default limit on possible input size
  in mod_lua
- CVE-2022-26377: Fix possible HTTP request smuggling in mod_proxy_ajp</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-26690: Fix NULL pointer dereference in mod_session
- CVE-2022-22719: Fix possible process crash due to unnoticed failures in mod_lua
- CVE-2022-29404: Fix possible DoS due to no default limit on possible input size
  in mod_lua
- CVE-2022-26377: Fix possible HTTP request smuggling in mod_proxy_ajp</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-05 20:15:34 UTC" />
    <updated date="2023-10-05 20:15:34 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1696536930.html" id="CLSA-2023:1696536930" title="CLSA-2023:1696536930" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.el7.centos.1.tuxcare.els2" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els2.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">8457081a779136e2455d91a593e78702d66f3142</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.el7.centos.1.tuxcare.els2" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els2.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">5e0ff81be6bc38ff2a5e1b699b739b79a44e6407</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.el7.centos.1.tuxcare.els2" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els2.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">78998f720701b87eb8a031ec1d767bae891d6252</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.el7.centos.1.tuxcare.els2" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els2.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">1ac6e08d603add02654d8babeca7fec4d5d0ff3e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.el7.centos.1.tuxcare.els2" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els2.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">595b84b2e24b20cd18670df68cac0f627b4b3db6</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.el7.centos.1.tuxcare.els2" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els2.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">cd1de0eaa2a4e846a7e6741165df05c6e9c5105f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.el7.centos.1.tuxcare.els2" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els2.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">7596090f0b5a9d6727c24fbbca840e2899ffc813</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.el7.centos.1.tuxcare.els2" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els2.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">86c41b836ea727c7f7295bed70044c2683e8a2c8</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1696537106</id>
    <title>libxml2: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-3517: fix flaw in the xml entity encoding
- CVE-2021-3518: fix dangling pointers in entity reference nodes
- CVE-2022-23308: fix use-after-free of ID and IDREF attributes
- CVE-2022-40303: fix integer counters overflow when parsing a multi-gigabyte XML
- CVE-2022-40304: fix double free as a result of an invalid XML entity
- fix testapi.c to avoid false positive test errors
- fix a parser and fix a null pointer dereference</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-3517: fix flaw in the xml entity encoding
- CVE-2021-3518: fix dangling pointers in entity reference nodes
- CVE-2022-23308: fix use-after-free of ID and IDREF attributes
- CVE-2022-40303: fix integer counters overflow when parsing a multi-gigabyte XML
- CVE-2022-40304: fix double free as a result of an invalid XML entity
- fix testapi.c to avoid false positive test errors
- fix a parser and fix a null pointer dereference</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-05 20:18:30 UTC" />
    <updated date="2023-10-05 20:18:30 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1696537106.html" id="CLSA-2023:1696537106" title="CLSA-2023:1696537106" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libxml2" release="6.el7_9.6.tuxcare.els1" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els1.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.el7_9.6.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">8b71b0db977448bbdda9dd955d0c9cde68331999</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2" release="6.el7_9.6.tuxcare.els1" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els1.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.el7_9.6.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b966212b8ff87a83e3d4516bd2b06bc2a1e374a4</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-devel" release="6.el7_9.6.tuxcare.els1" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els1.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.el7_9.6.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">ef815c5e75c65301daae8033cc2541d06cec16da</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-devel" release="6.el7_9.6.tuxcare.els1" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els1.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.el7_9.6.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ca97c5fb9e5353e51f2eb285d41d04fed94e1fd1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-python" release="6.el7_9.6.tuxcare.els1" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els1.src.rpm" version="2.9.1">
          <filename>libxml2-python-2.9.1-6.el7_9.6.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f3dc45d5d820029a8bfd62b93afdeaa5c8a84d80</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-static" release="6.el7_9.6.tuxcare.els1" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els1.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.el7_9.6.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">ecbcc180a370e2d9a6122cb4f49e07a05bd9b5b8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-static" release="6.el7_9.6.tuxcare.els1" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els1.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.el7_9.6.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f25767e14a196f3e7e69504cb8087fb0c4b2c8bd</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1696877581</id>
    <title>binutils: Fix of 9 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2017-16831: Fix excessive memory allocation attempts and possible integer
  overflows when attempting to read a COFF binary with a corrupt symbol count
- CVE-2020-19726: Fix parsing a corrupt PE format file
- CVE-2021-45078: Fix out-of-bounds write in stab_xcoff_builtin_type
- CVE-2021-46174: Fix buffer overflow in read_section_stabs_debugging_info
- CVE-2022-44840: Fix possible heap buffer overflow in find_section_in_set() in readelf.c
- CVE-2022-45703: Combine sanity checks, calculate element counts, not word
  counts, fix typo
- CVE-2022-47695: Test symbol flags to exclude section and synthetic symbols
  before attempting to check flavour
- CVE-2022-47696: Fix uninitialised field `the_bfd` of `asymbol`
- CVE-2022-47673: Fix lack of bounds checking in vms-alpha.c</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2017-16831: Fix excessive memory allocation attempts and possible integer
  overflows when attempting to read a COFF binary with a corrupt symbol count
- CVE-2020-19726: Fix parsing a corrupt PE format file
- CVE-2021-45078: Fix out-of-bounds write in stab_xcoff_builtin_type
- CVE-2021-46174: Fix buffer overflow in read_section_stabs_debugging_info
- CVE-2022-44840: Fix possible heap buffer overflow in find_section_in_set() in readelf.c
- CVE-2022-45703: Combine sanity checks, calculate element counts, not word
  counts, fix typo
- CVE-2022-47695: Test symbol flags to exclude section and synthetic symbols
  before attempting to check flavour
- CVE-2022-47696: Fix uninitialised field `the_bfd` of `asymbol`
- CVE-2022-47673: Fix lack of bounds checking in vms-alpha.c</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-09 18:53:05 UTC" />
    <updated date="2023-10-09 18:53:05 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1696877581.html" id="CLSA-2023:1696877581" title="CLSA-2023:1696877581" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="binutils" release="44.base.el7_9.1.tuxcare.els1" src="binutils-2.27-44.base.el7_9.1.tuxcare.els1.src.rpm" version="2.27">
          <filename>binutils-2.27-44.base.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">db3088e64f1b1e386ac79846298123538eec6c61</sum>
        </package>
        <package arch="i686" epoch="0" name="binutils-devel" release="44.base.el7_9.1.tuxcare.els1" src="binutils-2.27-44.base.el7_9.1.tuxcare.els1.src.rpm" version="2.27">
          <filename>binutils-devel-2.27-44.base.el7_9.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">59bb18516a3dba44d119fd06708c2662661788a0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="binutils-devel" release="44.base.el7_9.1.tuxcare.els1" src="binutils-2.27-44.base.el7_9.1.tuxcare.els1.src.rpm" version="2.27">
          <filename>binutils-devel-2.27-44.base.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">acbfd87fbe8a031e1250a8727a372923a920753e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1696877712</id>
    <title>expat: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-23990: lib: prevent integer overflow in function doProlog
- CVE-2022-43680: fix overeager DTD destruction in
  XML_ExternalEntityParserCreate</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-23990: lib: prevent integer overflow in function doProlog
- CVE-2022-43680: fix overeager DTD destruction in
  XML_ExternalEntityParserCreate</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-09 18:55:16 UTC" />
    <updated date="2023-10-09 18:55:16 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1696877712.html" id="CLSA-2023:1696877712" title="CLSA-2023:1696877712" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="expat" release="15.el7_9.tuxcare.els1" src="expat-2.1.0-15.el7_9.tuxcare.els1.src.rpm" version="2.1.0">
          <filename>expat-2.1.0-15.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">f1ea6a6ec0498e7f83ddc545134d26e3c9456a1a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat" release="15.el7_9.tuxcare.els1" src="expat-2.1.0-15.el7_9.tuxcare.els1.src.rpm" version="2.1.0">
          <filename>expat-2.1.0-15.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">825fee740f53e2f518deb1dac27f0d3bc6f355d5</sum>
        </package>
        <package arch="i686" epoch="0" name="expat-devel" release="15.el7_9.tuxcare.els1" src="expat-2.1.0-15.el7_9.tuxcare.els1.src.rpm" version="2.1.0">
          <filename>expat-devel-2.1.0-15.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">2fbe968a1606e65dd4cb486fda3e74cf18d2715a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat-devel" release="15.el7_9.tuxcare.els1" src="expat-2.1.0-15.el7_9.tuxcare.els1.src.rpm" version="2.1.0">
          <filename>expat-devel-2.1.0-15.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">61b1d88492df6045e8fc214d44ebf1e69c7884de</sum>
        </package>
        <package arch="i686" epoch="0" name="expat-static" release="15.el7_9.tuxcare.els1" src="expat-2.1.0-15.el7_9.tuxcare.els1.src.rpm" version="2.1.0">
          <filename>expat-static-2.1.0-15.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">295167ac3c991bade45f806bcd924c1d45ac35cc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat-static" release="15.el7_9.tuxcare.els1" src="expat-2.1.0-15.el7_9.tuxcare.els1.src.rpm" version="2.1.0">
          <filename>expat-static-2.1.0-15.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">dbe964c8a3045d1e9b2b9749bfb83a44b9e8d234</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1696877835</id>
    <title>python: Fix of CVE-2022-48565</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-48565: Reject XML entity declarations in plist files</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-48565: Reject XML entity declarations in plist files</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-09 18:57:19 UTC" />
    <updated date="2023-10-09 18:57:19 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1696877835.html" id="CLSA-2023:1696877835" title="CLSA-2023:1696877835" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="92.el7_9.tuxcare.els1" src="python-2.7.5-92.el7_9.tuxcare.els1.src.rpm" version="2.7.5">
          <filename>python-2.7.5-92.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">915579284dc8e594b50d28293a38c7443dd51db4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="92.el7_9.tuxcare.els1" src="python-2.7.5-92.el7_9.tuxcare.els1.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-92.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">99a0dfc939bebbdeb8a7de50ff1af2f03ea14168</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="92.el7_9.tuxcare.els1" src="python-2.7.5-92.el7_9.tuxcare.els1.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-92.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7e2c2f835a4d4cc9a57dc428026f4c4e5d2aa18a</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="92.el7_9.tuxcare.els1" src="python-2.7.5-92.el7_9.tuxcare.els1.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-92.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">be64f0e26e21ac25850a628041d6e84d308fffef</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="92.el7_9.tuxcare.els1" src="python-2.7.5-92.el7_9.tuxcare.els1.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-92.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">753bab9de02f034362ae2e059ff14e5aa90716e7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="92.el7_9.tuxcare.els1" src="python-2.7.5-92.el7_9.tuxcare.els1.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-92.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">95bf46065e05cc11c7df29ac8013595120a25940</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="92.el7_9.tuxcare.els1" src="python-2.7.5-92.el7_9.tuxcare.els1.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-92.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">d5ac0bdb002baee41f37b05bea554ebeaa9e90d1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="92.el7_9.tuxcare.els1" src="python-2.7.5-92.el7_9.tuxcare.els1.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-92.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">3c386f785b4d99d959e60affbbd3096aa8345156</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697135138</id>
    <title>bind: Fix of CVE-2023-3341</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Limit isccc_cc_fromwire recursion depth (CVE-2023-3341)</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Limit isccc_cc_fromwire recursion depth (CVE-2023-3341)</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-12 18:25:42 UTC" />
    <updated date="2023-10-12 18:25:42 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697135138.html" id="CLSA-2023:1697135138" title="CLSA-2023:1697135138" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="32" name="bind" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">88168d9825e7eb737b5303faf98e325734ad95bd</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">5518f13b6099eac365f6a328f85d4a90017d9883</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7.14.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">49da1fb11e70f054e8d0cc0c39810c095e430e74</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">87dd6f2dd1b26643c0de9712a5a64e803e5ae650</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7.14.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">b7f24d1c432e2ead3d841ff33a73d1eca2c21e4e</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a6e3b095201dccdf245fe4a58f106f1a7c45ecfc</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7.14.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">59807d283471b0a66cdfb7037a58dac6c0df3f7c</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">67626712a07814766979e66c236f3417faa8eef9</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7.14.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">97a8f0e296c2346f4ebbc83c631222408b49590e</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b0b692a5df5dd14db9351b44337e5ebdaf472d11</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7.14.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">0cc964857a3d36971772b1630f0888a749c940ac</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7d4495947d780a8fed63039f9dab3577a8d94018</sum>
        </package>
        <package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7.14.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">9feaa2ba6c0a3c5eac28014bd19946bdbfc91c50</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7.14.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">03fd846327d8322927066c14431598769a01c623</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f509540aa33f2be58bc2812aee614592e0a75c37</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">56b2fa3d579cc899daa778385f00a65dc3a9fe88</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7.14.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">08e578b62c3bc6abe1920719209265ecc023bd33</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0417f2ef2ca675a8f4b87d1527a2a8c8c90e67ad</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7.14.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">44a2d60883d94182fafec67ddcf268ef2aea6024</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6553039b2b8338a7c8e3c83f3c0b5b444d6c76fe</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6289298a02892ee9147be3e1ec9f24d7e65b4595</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">2de281186a5db360d6d5651ca5c8e3c8ccc34fbc</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e90ef5d99c868c9366893ee4ef92053464979797</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7.14.tuxcare.els1" src="bind-9.11.4-26.P2.el7.14.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e813aef0405650979f393b442cfb4d28adf0fa2b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697135256</id>
    <title>glib2: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-29499: Fix GVariant offset table entry size which is not checked
  in is_normal()
- CVE-2023-32611: Fix an issue where g_variant_byteswap() can take a long time
  with some non-normal inputs
- CVE-2023-32665: Fix GVariant deserialisation which does not match spec
  for non-normal data
- CVE-2023-32636: Fix a wrong timeout in fuzz_variant_text()
- CVE-2023-32643: Fix a heap-buffer-overflow in g_variant_serialised_get_child()
- Fix g_test_bug assertion in gvariant test</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-29499: Fix GVariant offset table entry size which is not checked
  in is_normal()
- CVE-2023-32611: Fix an issue where g_variant_byteswap() can take a long time
  with some non-normal inputs
- CVE-2023-32665: Fix GVariant deserialisation which does not match spec
  for non-normal data
- CVE-2023-32636: Fix a wrong timeout in fuzz_variant_text()
- CVE-2023-32643: Fix a heap-buffer-overflow in g_variant_serialised_get_child()
- Fix g_test_bug assertion in gvariant test</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-12 18:27:40 UTC" />
    <updated date="2023-10-12 18:27:40 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697135256.html" id="CLSA-2023:1697135256" title="CLSA-2023:1697135256" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="glib2" release="9.el7_9.tuxcare.els2" src="glib2-2.56.1-9.el7_9.tuxcare.els2.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">9643a317420b78befa8e76fcffc0b123b0f04490</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2" release="9.el7_9.tuxcare.els2" src="glib2-2.56.1-9.el7_9.tuxcare.els2.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">8ecd35ea0bded1178ee5cfd2eda7a83430f29372</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els2" src="glib2-2.56.1-9.el7_9.tuxcare.els2.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">99a3e920ff0d5b45a4166d3c49efc27739b4ab8b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els2" src="glib2-2.56.1-9.el7_9.tuxcare.els2.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">313ae814c1ce6e4893f21b5e58c7f09c7e8ecca4</sum>
        </package>
        <package arch="noarch" epoch="0" name="glib2-doc" release="9.el7_9.tuxcare.els2" src="glib2-2.56.1-9.el7_9.tuxcare.els2.src.rpm" version="2.56.1">
          <filename>glib2-doc-2.56.1-9.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">90fdce49ab767693d93a0b995a62ea4a24329da8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-fam" release="9.el7_9.tuxcare.els2" src="glib2-2.56.1-9.el7_9.tuxcare.els2.src.rpm" version="2.56.1">
          <filename>glib2-fam-2.56.1-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">3a3e8616260fd26c252d21e524ac3ed209a20e6d</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els2" src="glib2-2.56.1-9.el7_9.tuxcare.els2.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">4a3ea3934f6f46f6ef15226db7a6fed7f8f33d68</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els2" src="glib2-2.56.1-9.el7_9.tuxcare.els2.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">e512fa76e33935b14171e0880bfb3de7e4e07a7a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-tests" release="9.el7_9.tuxcare.els2" src="glib2-2.56.1-9.el7_9.tuxcare.els2.src.rpm" version="2.56.1">
          <filename>glib2-tests-2.56.1-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">3efb02cdd3b1dd15ece27989efa933fddc3a2bc9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697463947</id>
    <title>curl: Fix of CVE-2023-38546</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-38546: cookie: remove unnecessary struct fields
- Rebuild expired test certificates</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-38546: cookie: remove unnecessary struct fields
- Rebuild expired test certificates</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-16 13:45:51 UTC" />
    <updated date="2023-10-16 13:45:51 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697463947.html" id="CLSA-2023:1697463947" title="CLSA-2023:1697463947" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="curl" release="59.el7_9.1.tuxcare.els1" src="curl-7.29.0-59.el7_9.1.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>curl-7.29.0-59.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">5bf1afaaa96ddb3b00765b7941fd8380ed99d233</sum>
        </package>
        <package arch="i686" epoch="0" name="libcurl" release="59.el7_9.1.tuxcare.els1" src="curl-7.29.0-59.el7_9.1.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>libcurl-7.29.0-59.el7_9.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">0047b200928a6c2e141841317caa5ea0e8e7e9b5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcurl" release="59.el7_9.1.tuxcare.els1" src="curl-7.29.0-59.el7_9.1.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>libcurl-7.29.0-59.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">19a25bf0acee34803687097da4d59ead48a97eb4</sum>
        </package>
        <package arch="i686" epoch="0" name="libcurl-devel" release="59.el7_9.1.tuxcare.els1" src="curl-7.29.0-59.el7_9.1.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>libcurl-devel-7.29.0-59.el7_9.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">83199959cbdbd2ff4be735bfb1b3abf7ba9fd2d9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcurl-devel" release="59.el7_9.1.tuxcare.els1" src="curl-7.29.0-59.el7_9.1.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>libcurl-devel-7.29.0-59.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">fedbc5eb1c9f0ef1360342abdc82292a3a6dd404</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697464069</id>
    <title>python: Fix of CVE-2022-48566</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-48566: Make compare_digest more constant-time</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-48566: Make compare_digest more constant-time</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-16 13:47:53 UTC" />
    <updated date="2023-10-16 13:47:53 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697464069.html" id="CLSA-2023:1697464069" title="CLSA-2023:1697464069" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="92.el7_9.tuxcare.els2" src="python-2.7.5-92.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-2.7.5-92.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">93e1e91e9536ad44e7caeb3cdaea00707b8a98cb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="92.el7_9.tuxcare.els2" src="python-2.7.5-92.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-92.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">a48ce581e1852f5d8120b965b57747e1d8301e0a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="92.el7_9.tuxcare.els2" src="python-2.7.5-92.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-92.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">398f57daa0a252080cba3067df218d9acbc0326d</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="92.el7_9.tuxcare.els2" src="python-2.7.5-92.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-92.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">47d73e54648b1b16c78c62657a3aa3e107836045</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="92.el7_9.tuxcare.els2" src="python-2.7.5-92.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-92.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">a263b5aa40ad27cb0e5dda090b71714637237a17</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="92.el7_9.tuxcare.els2" src="python-2.7.5-92.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-92.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">0b0f1378e0f7066d9cfe1086311bdd1e3780642f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="92.el7_9.tuxcare.els2" src="python-2.7.5-92.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-92.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">852d85cfa2834b111718757635a9b4e8b17a76f9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="92.el7_9.tuxcare.els2" src="python-2.7.5-92.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-92.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">15bc277e37fac2a18be809181a113a22fd8c14d2</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697464186</id>
    <title>sysstat: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-39377: check an overflow and exit if it be
- CVE-2023-33204: fix possible buffer overflow in an incomplete fix for
  CVE-2022-39377</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-39377: check an overflow and exit if it be
- CVE-2023-33204: fix possible buffer overflow in an incomplete fix for
  CVE-2022-39377</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-16 13:49:50 UTC" />
    <updated date="2023-10-16 13:49:50 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697464186.html" id="CLSA-2023:1697464186" title="CLSA-2023:1697464186" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="sysstat" release="20.el7_9.tuxcare.els1" src="sysstat-10.1.5-20.el7_9.tuxcare.els1.src.rpm" version="10.1.5">
          <filename>sysstat-10.1.5-20.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">480369f6523658531baa8f5895f4aaa1484f82b5</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697739575</id>
    <title>python3: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-3737: Fix http client infinite line reading (DoS) after a
  HTTP 100 Continue
- CVE-2021-28861: Fix an open redirection vulnerability in http.server
- CVE-2022-0391: Make urllib.parse sanitize urls containing ASCII newline and
  tabs
- CVE-2022-45061: Fix quadratic time idna decoding</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-3737: Fix http client infinite line reading (DoS) after a
  HTTP 100 Continue
- CVE-2021-28861: Fix an open redirection vulnerability in http.server
- CVE-2022-0391: Make urllib.parse sanitize urls containing ASCII newline and
  tabs
- CVE-2022-45061: Fix quadratic time idna decoding</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-19 18:19:40 UTC" />
    <updated date="2023-10-19 18:19:40 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697739575.html" id="CLSA-2023:1697739575" title="CLSA-2023:1697739575" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-19.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">3a9f843d4a1d72ef21645655e0ec2d45cb0eb168</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-19.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">836e1f59189ef2a0965ea411bb87cec0d38ec294</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-19.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">116f697c9b00f5e4348d30e34b661f2c861ebe97</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-19.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">7ca60e05e62f1a2f0de9857441ef76192eba4036</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-19.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">638289003e5c0a4cd06e97c074cb1265eeba615f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-19.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">5425fe6abed15fffea07f2490b1a82f265471b33</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-19.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">571d17b3dc9beb1ae4ae5d7207e487c759735aaf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-19.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">3ab993eb231d037e4e38a1b5ca072bb88f1d448a</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-19.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">cbe0a1b7689d82e8264b0e60fb8e55879fc24f25</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-19.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">bf75827c2cc2110826cf42c8992b3c188619bf8c</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-19.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">4c6185cc86ccdc4e951f3f8376b0f07ddc6a24a3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-19.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">b03a13d161add2d5e54bb12f3ed5bfab46d82c6c</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-19.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">38e44754b55d7280ec9246c1055f18d98076a994</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="19.el7.tuxcare.els2" src="python3-3.6.8-19.el7.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-19.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">73ce38d5a37dd46a31b7e9f76c1c6c08c8fdd87e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697739734</id>
    <title>python: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-45061: fix quadratic time idna decoding
- CVE-2021-3737: fix http client infinite line reading (DoS) after a HTTP 100
  Continue</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-45061: fix quadratic time idna decoding
- CVE-2021-3737: fix http client infinite line reading (DoS) after a HTTP 100
  Continue</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-19 18:22:18 UTC" />
    <updated date="2023-10-19 18:22:18 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697739734.html" id="CLSA-2023:1697739734" title="CLSA-2023:1697739734" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="92.el7_9.tuxcare.els3" src="python-2.7.5-92.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-2.7.5-92.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">a9426def5f17f926f28a68396868c56774389a10</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="92.el7_9.tuxcare.els3" src="python-2.7.5-92.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-92.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">5b67e92fe71cd8470f16e6fbaf634b6b4054cf22</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="92.el7_9.tuxcare.els3" src="python-2.7.5-92.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-92.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">bf10ca97c5b76d47c88bdfef06596d85233b1342</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="92.el7_9.tuxcare.els3" src="python-2.7.5-92.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-92.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">fbed06bcd7b232d1a51399809425e00930da9903</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="92.el7_9.tuxcare.els3" src="python-2.7.5-92.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-92.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">d5aef9f838e8f45cbe1c420ebe72d615d77b50bc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="92.el7_9.tuxcare.els3" src="python-2.7.5-92.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-92.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">c729c328ce22635d53e3d67ff254587b78f58e96</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="92.el7_9.tuxcare.els3" src="python-2.7.5-92.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-92.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">511280c2057bf8eced73b4fedb177886c1d78421</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="92.el7_9.tuxcare.els3" src="python-2.7.5-92.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-92.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">160e520dfcd88b86ef6188f739a57255e0ee4cfb</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697741309</id>
    <title>python3: Fix of CVE-2022-48560</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-48560: fix posible crash in heapq with custom comparison operators</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-48560: fix posible crash in heapq with custom comparison operators</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-19 18:48:34 UTC" />
    <updated date="2023-10-19 18:48:34 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697741309.html" id="CLSA-2023:1697741309" title="CLSA-2023:1697741309" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-19.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">100c44f6d5a99b08a9718fd343a9a3103a4ce110</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-19.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">660fa8d678e05c73c8f8ebe733c4619ca7ef3033</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-19.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">e4f10dc7ca9ecd4d15203af04c4bb32d4e7a8985</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-19.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">3788ddf57dc6dc7100ce9ed9b8603f0ada1775a6</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-19.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">732cc2ac6c7e114a2ca239c6fbac230b87eb8d92</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-19.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">2e8c369467bea663f70d865771172263d56a5924</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-19.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">9d2d920dee7b4a0d1ab37a3f485a1c1000c78c86</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-19.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">9cef7593f0fe578d4a7feeadee80ee9bbdf05577</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-19.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">0377da7f61f1ca57ab28c5c87e7f4717f32a3d81</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-19.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">672da5c6d86218aea45f5228ef90ba2a1b520feb</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-19.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">4e1f1690095fe24ac39c8db71bb9c6863242ec69</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-19.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">45100434fcdaa75b17b9abb5f3e6c8152063c9ee</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-19.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">49b88f55c68e1d5777b4aa9c3848eaf592af91e9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="19.el7.tuxcare.els3" src="python3-3.6.8-19.el7.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-19.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">4da70700291ed710983e4385d4875158a24a4861</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697816385</id>
    <title>curl: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-27782: check additional TLS or SSH connection parameters that should
  have prohibited connection reuse
- CVE-2023-27534: fix SFTP path '~' resolving discrepancy
- fix read off end of array for SCP home directory case</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-27782: check additional TLS or SSH connection parameters that should
  have prohibited connection reuse
- CVE-2023-27534: fix SFTP path '~' resolving discrepancy
- fix read off end of array for SCP home directory case</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-20 15:39:49 UTC" />
    <updated date="2023-10-20 15:39:49 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697816385.html" id="CLSA-2023:1697816385" title="CLSA-2023:1697816385" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="curl" release="59.el7_9.1.tuxcare.els2" src="curl-7.29.0-59.el7_9.1.tuxcare.els2.src.rpm" version="7.29.0">
          <filename>curl-7.29.0-59.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">c6b8cd1d033f66ec092dd6ec364d6e1bb22b513e</sum>
        </package>
        <package arch="i686" epoch="0" name="libcurl" release="59.el7_9.1.tuxcare.els2" src="curl-7.29.0-59.el7_9.1.tuxcare.els2.src.rpm" version="7.29.0">
          <filename>libcurl-7.29.0-59.el7_9.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">d779dd419635c2558f2f45cbac233ca2659ff107</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcurl" release="59.el7_9.1.tuxcare.els2" src="curl-7.29.0-59.el7_9.1.tuxcare.els2.src.rpm" version="7.29.0">
          <filename>libcurl-7.29.0-59.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">7e7587538c86987f9c8a0b96915525a5e013ab09</sum>
        </package>
        <package arch="i686" epoch="0" name="libcurl-devel" release="59.el7_9.1.tuxcare.els2" src="curl-7.29.0-59.el7_9.1.tuxcare.els2.src.rpm" version="7.29.0">
          <filename>libcurl-devel-7.29.0-59.el7_9.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">a696267b1ffa00bc5dfa92272e487a1bdf77e189</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcurl-devel" release="59.el7_9.1.tuxcare.els2" src="curl-7.29.0-59.el7_9.1.tuxcare.els2.src.rpm" version="7.29.0">
          <filename>libcurl-devel-7.29.0-59.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">d8fe927577f34acaf86d37f68430ef4dcc3e21d3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1697816511</id>
    <title>python: Fix of CVE-2022-48560</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-48560: Fix SIGSEGV in Python via heappushpop in heapq</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-48560: Fix SIGSEGV in Python via heappushpop in heapq</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-20 15:41:55 UTC" />
    <updated date="2023-10-20 15:41:55 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1697816511.html" id="CLSA-2023:1697816511" title="CLSA-2023:1697816511" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="92.el7_9.tuxcare.els4" src="python-2.7.5-92.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-2.7.5-92.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">ebe3aaa883d646e63e233a992dec5ab7ed596bb6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="92.el7_9.tuxcare.els4" src="python-2.7.5-92.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-92.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">e619f1a91f8573b6b17f5869f38f3add902cc0b6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="92.el7_9.tuxcare.els4" src="python-2.7.5-92.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-92.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">0e74cf9a9587dec08d13cae522d092a266f6a9ab</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="92.el7_9.tuxcare.els4" src="python-2.7.5-92.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-92.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha">4be0057856b95ad2a13905a1340ceb01600cea62</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="92.el7_9.tuxcare.els4" src="python-2.7.5-92.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-92.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">82b9dba185b3a6d44bc741210c603f7134359217</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="92.el7_9.tuxcare.els4" src="python-2.7.5-92.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-92.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">f86f4061ed4bf7ea6ae8ef2bd2dbd36b94dde6f5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="92.el7_9.tuxcare.els4" src="python-2.7.5-92.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-92.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">f6e9ca627c3467886c8765196cb0e9d6dfe8c050</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="92.el7_9.tuxcare.els4" src="python-2.7.5-92.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-92.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">744288fb35ee3dd2a824673954381aff5219e07f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1698180296</id>
    <title>zlib: Fix of CVE-2023-45853</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-45853: Reject overflows of zip header fields in minizip</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-45853: Reject overflows of zip header fields in minizip</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-24 20:45:01 UTC" />
    <updated date="2023-10-24 20:45:01 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1698180296.html" id="CLSA-2023:1698180296" title="CLSA-2023:1698180296" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="minizip" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>minizip-1.2.7-21.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">b001a6bad36b4fd28ceb9858b89bfa6e74357c65</sum>
        </package>
        <package arch="x86_64" epoch="0" name="minizip" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>minizip-1.2.7-21.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a9f30b0fe736a6c6e19c4a085c3d6076053f2b2f</sum>
        </package>
        <package arch="i686" epoch="0" name="minizip-devel" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>minizip-devel-1.2.7-21.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">e061263e340be843d2c801420730339d1cc430b1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="minizip-devel" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>minizip-devel-1.2.7-21.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f27d2afe6b5495815868dcbcb023b79ee6d38f65</sum>
        </package>
        <package arch="i686" epoch="0" name="zlib" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-1.2.7-21.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">18668ec89b1894995751a0301f0c3f653d94a1b7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="zlib" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-1.2.7-21.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7cc0349a1850f2a3fcfc8f2252736347db84500e</sum>
        </package>
        <package arch="i686" epoch="0" name="zlib-devel" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-devel-1.2.7-21.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">1585906c9c773738177d01b8530140383231be1b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="zlib-devel" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-devel-1.2.7-21.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">2716756879c36019ff4dd28274b9900de39aa4ed</sum>
        </package>
        <package arch="i686" epoch="0" name="zlib-static" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-static-1.2.7-21.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">3e9f44673bb62f7fbec4cf0e10adaa5f9ce67bcf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="zlib-static" release="21.el7.tuxcare.els1" src="zlib-1.2.7-21.el7.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-static-1.2.7-21.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">d7d52fee9377e2d94e79c533071d8b19bfa5e07f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1698312967</id>
    <title>perl: Fix of CVE-2023-31484</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-31484: add verify_SSL=&gt;1 to HTTP::Tiny to verify https server
 identity</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-31484: add verify_SSL=&gt;1 to HTTP::Tiny to verify https server
 identity</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-26 09:36:11 UTC" />
    <updated date="2023-10-26 09:36:11 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1698312967.html" id="CLSA-2023:1698312967" title="CLSA-2023:1698312967" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="4" name="perl" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="5.16.3">
          <filename>perl-5.16.3-299.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">caf09945a7a3a458f2d847dcb9e6f0f6870e1201</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-CPAN" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="1.9800">
          <filename>perl-CPAN-1.9800-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">106277248b4fff2fbb68a24811f10e498ee0e1a4</sum>
        </package>
        <package arch="noarch" epoch="1" name="perl-ExtUtils-CBuilder" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="0.28.2.6">
          <filename>perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">8dc59965712f88066d2b0e4b6b9cf6cf4c24a9e5</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-ExtUtils-Embed" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="1.30">
          <filename>perl-ExtUtils-Embed-1.30-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">7f58a07bf0c6340d63d47233cb5fbd9667a595bf</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-ExtUtils-Install" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="1.58">
          <filename>perl-ExtUtils-Install-1.58-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">0eabc5ab6bd28b35ab71b2973fb1e5306df9b33a</sum>
        </package>
        <package arch="noarch" epoch="1" name="perl-IO-Zlib" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="1.10">
          <filename>perl-IO-Zlib-1.10-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">a330e86163c2100277c9a83198eb1b801be3e670</sum>
        </package>
        <package arch="noarch" epoch="1" name="perl-Locale-Maketext-Simple" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="0.21">
          <filename>perl-Locale-Maketext-Simple-0.21-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">c52adc55e97ad656a0a443d748951e15241468eb</sum>
        </package>
        <package arch="noarch" epoch="1" name="perl-Module-CoreList" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="2.76.02">
          <filename>perl-Module-CoreList-2.76.02-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">220a1e762557a2e60e0aca8720585160582696d6</sum>
        </package>
        <package arch="noarch" epoch="1" name="perl-Module-Loaded" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="0.08">
          <filename>perl-Module-Loaded-0.08-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">607113ca2152e7660b365294805c1868cde5af63</sum>
        </package>
        <package arch="noarch" epoch="1" name="perl-Object-Accessor" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="0.42">
          <filename>perl-Object-Accessor-0.42-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">75ff6e66a43b1830b68c6e98ce222d325bf75ab8</sum>
        </package>
        <package arch="noarch" epoch="1" name="perl-Package-Constants" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="0.02">
          <filename>perl-Package-Constants-0.02-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">bd3501bb0368dfa36abbfda904c8c980fd2b30e0</sum>
        </package>
        <package arch="noarch" epoch="1" name="perl-Pod-Escapes" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="1.04">
          <filename>perl-Pod-Escapes-1.04-299.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">39941d0a1a4d9fc20e089385b0eb531638ae0346</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perl-Time-Piece" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>perl-Time-Piece-1.20.1-299.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0f5ee2c9e5d070f377c346f85023d7ad6f760dfa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perl-core" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="5.16.3">
          <filename>perl-core-5.16.3-299.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b7809b3bb4e5ee878d83b2a9e7239b57bbe08b87</sum>
        </package>
        <package arch="i686" epoch="4" name="perl-devel" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="5.16.3">
          <filename>perl-devel-5.16.3-299.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">17b15007c56ad917786cdbdf8402b5f789bd3e54</sum>
        </package>
        <package arch="x86_64" epoch="4" name="perl-devel" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="5.16.3">
          <filename>perl-devel-5.16.3-299.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">d4b372ff51bed03b24b43196250e33c93a328a90</sum>
        </package>
        <package arch="i686" epoch="4" name="perl-libs" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="5.16.3">
          <filename>perl-libs-5.16.3-299.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">218de637bf0206ddf47bb586c86d4aa5c7156bca</sum>
        </package>
        <package arch="x86_64" epoch="4" name="perl-libs" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="5.16.3">
          <filename>perl-libs-5.16.3-299.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0fe8aeccb4d6292c793c28c3cf9d5e4b51da32cb</sum>
        </package>
        <package arch="x86_64" epoch="4" name="perl-macros" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="5.16.3">
          <filename>perl-macros-5.16.3-299.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">74bbbcdfb15c572056bc25e599498638c0a0fe98</sum>
        </package>
        <package arch="x86_64" epoch="4" name="perl-tests" release="299.el7_9.tuxcare.els1" src="perl-5.16.3-299.el7_9.tuxcare.els1.src.rpm" version="5.16.3">
          <filename>perl-tests-5.16.3-299.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b5ad450e277959709d1d3ceb7ab3236d9cd84a35</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1698690423</id>
    <title>systemd: Fix of CVE-2023-26604</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-26604: use only less as a pager and restrict its functionality
  (e.g stop running external shell) unless environment variable
  SYSTEMD_PAGERSECURE is defined</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-26604: use only less as a pager and restrict its functionality
  (e.g stop running external shell) unless environment variable
  SYSTEMD_PAGERSECURE is defined</summary>
    <pushcount>0</pushcount>
    <issued date="2023-10-30 18:27:08 UTC" />
    <updated date="2023-10-30 18:27:08 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1698690423.html" id="CLSA-2023:1698690423" title="CLSA-2023:1698690423" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libgudev1" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>libgudev1-219-78.el7_9.7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">3f733a97866dc4d51901483e086d8fc0a3fa169f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgudev1" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>libgudev1-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">cc4d2489ba001aba7bd0442f33419093e481fc11</sum>
        </package>
        <package arch="i686" epoch="0" name="libgudev1-devel" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>libgudev1-devel-219-78.el7_9.7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">669d4ce1aec4fcef2420b8f9e3da88fd097c800b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgudev1-devel" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>libgudev1-devel-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">81f97eef29880b35b821dd3d76e234e036b0a2ea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">1cb6cf6500d83932e2eff2d835892d753a95dfe2</sum>
        </package>
        <package arch="i686" epoch="0" name="systemd-devel" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-devel-219-78.el7_9.7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">480c54313409aaba5a47e3cc104f54f707d26048</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-devel" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-devel-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">592f51061240820ea951d15bfd20ba778628fafb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-journal-gateway" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-journal-gateway-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">602a84352916078f23d9878e048ec0558a4f9ecc</sum>
        </package>
        <package arch="i686" epoch="0" name="systemd-libs" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-libs-219-78.el7_9.7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">5b96068e0effdb9c2c17c42f64521df5f7575a2e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-libs" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-libs-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4cffa90aac744e0df6e46d8994b1f646d124aac6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-networkd" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-networkd-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">923b830450f3d478561ecd934982869ee289d9fb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-python" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-python-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">fbb2651f98afab35ac5aaaedc9e839e826356fc0</sum>
        </package>
        <package arch="i686" epoch="0" name="systemd-resolved" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-resolved-219-78.el7_9.7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">35631a78a8dbf506eecfe3c5038ec2c5873e23cd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-resolved" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-resolved-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9db1ac9c5c9d4bac544508b714c74549de11e883</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-sysv" release="78.el7_9.7.tuxcare.els1" src="systemd-219-78.el7_9.7.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-sysv-219-78.el7_9.7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">20d904b6eb36be0d3ccef5ee094bf92175167fd3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1698945053</id>
    <title>libgcrypt: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2013-4576: Normalize the MPIs to prevent possible side-channel
  attacks
- CVE-2014-3591: Use ciphertext blinding for Elgamal to prevent
  possible side-channel attacks
- CVE-2021-33560: Use of smaller K for ephemeral key in ElGamal
  prevent generation of weak keys
- CVE-2021-40528: Add exponent blinding as well to mitigate
  side-channel attack on mpi_powm
- tests: Add a benchmark for Elgamal</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2013-4576: Normalize the MPIs to prevent possible side-channel
  attacks
- CVE-2014-3591: Use ciphertext blinding for Elgamal to prevent
  possible side-channel attacks
- CVE-2021-33560: Use of smaller K for ephemeral key in ElGamal
  prevent generation of weak keys
- CVE-2021-40528: Add exponent blinding as well to mitigate
  side-channel attack on mpi_powm
- tests: Add a benchmark for Elgamal</summary>
    <pushcount>0</pushcount>
    <issued date="2023-11-02 17:10:57 UTC" />
    <updated date="2023-11-02 17:10:57 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1698945053.html" id="CLSA-2023:1698945053" title="CLSA-2023:1698945053" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libgcrypt" release="14.el7.tuxcare.els1" src="libgcrypt-1.5.3-14.el7.tuxcare.els1.src.rpm" version="1.5.3">
          <filename>libgcrypt-1.5.3-14.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">f8497ed9d31f9974715a42a721e0a6877b809950</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgcrypt" release="14.el7.tuxcare.els1" src="libgcrypt-1.5.3-14.el7.tuxcare.els1.src.rpm" version="1.5.3">
          <filename>libgcrypt-1.5.3-14.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0e7241b1a1b53774b334f4fe6f9f98f54213c8eb</sum>
        </package>
        <package arch="i686" epoch="0" name="libgcrypt-devel" release="14.el7.tuxcare.els1" src="libgcrypt-1.5.3-14.el7.tuxcare.els1.src.rpm" version="1.5.3">
          <filename>libgcrypt-devel-1.5.3-14.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">ea176ccdf06315d8724a3a3855383149a10bf5c1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgcrypt-devel" release="14.el7.tuxcare.els1" src="libgcrypt-1.5.3-14.el7.tuxcare.els1.src.rpm" version="1.5.3">
          <filename>libgcrypt-devel-1.5.3-14.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">242b8feb95b6795d19a51de8ebe1ffb9b80ebac5</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1698945913</id>
    <title>python3: Fix of CVE-2020-26116</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2020-26116: prevent header injection in http methods</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2020-26116: prevent header injection in http methods</summary>
    <pushcount>0</pushcount>
    <issued date="2023-11-02 17:25:18 UTC" />
    <updated date="2023-11-02 17:25:18 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1698945913.html" id="CLSA-2023:1698945913" title="CLSA-2023:1698945913" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-19.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha">6ceaa21ae5b2e6b18c27dd8578e4e6741d2a7339</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-19.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">c6b97d996a30ae3b8dcff12f3c552454950c4bb1</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-19.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha">dcec123dc0d050735a00c1abafec2e2d64213be6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-19.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">4e41aaff50e907720f26dccc54b5600f67648e8b</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-19.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha">792b881b47f78b627f45eb1e1ebc721e242f9b95</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-19.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">26e81e4a4d564dad7fd1a0612992422bea8da27c</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-19.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha">a63b949a95b82c85d2af43f3ca307014a429a5ec</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-19.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">e869849fc3d2586d215c9985b7be212b5d7219b8</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-19.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha">b14c35d228844ea4ca467eb85364736398ec3ecb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-19.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">4f79abb1a3a8f6bd33b3548d5ace06caafb071c1</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-19.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha">123cd4d16c683beca0be5e1d63cd3586252827f8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-19.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">bc293286458e878224e70ff855e7e6b97bec07fc</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-19.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha">2d5443a2aff47f1bb6db29d7ba04db51bc5df1ce</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="19.el7_9.tuxcare.els4" src="python3-3.6.8-19.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-19.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">73423b4dc7473ac268028e59ea9909586b293353</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1698946014</id>
    <title>sqlite: Fix of CVE-2022-35737</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-35737: increase the size of loop variables in the printf()
  implementation</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-35737: increase the size of loop variables in the printf()
  implementation</summary>
    <pushcount>0</pushcount>
    <issued date="2023-11-02 17:26:59 UTC" />
    <updated date="2023-11-02 17:26:59 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1698946014.html" id="CLSA-2023:1698946014" title="CLSA-2023:1698946014" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="lemon" release="8.el7_7.1.tuxcare.els1" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els1.src.rpm" version="3.7.17">
          <filename>lemon-3.7.17-8.el7_7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">de22a512bfe3a451f976fe9de52c3999c0c7a45c</sum>
        </package>
        <package arch="i686" epoch="0" name="sqlite" release="8.el7_7.1.tuxcare.els1" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els1.src.rpm" version="3.7.17">
          <filename>sqlite-3.7.17-8.el7_7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">a938bf9e568ddfaee179564b7799a18c7e696a41</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sqlite" release="8.el7_7.1.tuxcare.els1" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els1.src.rpm" version="3.7.17">
          <filename>sqlite-3.7.17-8.el7_7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f6717a7214ea5935dbab3aedca462c5407704e91</sum>
        </package>
        <package arch="i686" epoch="0" name="sqlite-devel" release="8.el7_7.1.tuxcare.els1" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els1.src.rpm" version="3.7.17">
          <filename>sqlite-devel-3.7.17-8.el7_7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">c005f36aacfa24ae5ef2655bfa3356d50842367c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sqlite-devel" release="8.el7_7.1.tuxcare.els1" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els1.src.rpm" version="3.7.17">
          <filename>sqlite-devel-3.7.17-8.el7_7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c31e8e8733ec0eb8785b6e08fdf09dd87cc3c540</sum>
        </package>
        <package arch="noarch" epoch="0" name="sqlite-doc" release="8.el7_7.1.tuxcare.els1" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els1.src.rpm" version="3.7.17">
          <filename>sqlite-doc-3.7.17-8.el7_7.1.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">806f7df903ec00725b1cc3ad22731d944f3dd7fa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sqlite-tcl" release="8.el7_7.1.tuxcare.els1" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els1.src.rpm" version="3.7.17">
          <filename>sqlite-tcl-3.7.17-8.el7_7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7c89a6090c54d668ff59f58ed6327e488ee8ec86</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1698949696</id>
    <title>httpd: Fix of CVE-2023-31122</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-31122: mod_macro: Fix out-of-bounds read vulnerability
  by using own strncmp function</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-31122: mod_macro: Fix out-of-bounds read vulnerability
  by using own strncmp function</summary>
    <pushcount>0</pushcount>
    <issued date="2023-11-02 18:28:20 UTC" />
    <updated date="2023-11-02 18:28:20 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1698949696.html" id="CLSA-2023:1698949696" title="CLSA-2023:1698949696" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.el7.centos.1.tuxcare.els3" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els3.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.el7.centos.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">1333c75013de20c579b423d1981433e5c86a8a4d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.el7.centos.1.tuxcare.els3" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els3.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">64b1815668be41f36d74c4323186d11d939dfa2e</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.el7.centos.1.tuxcare.els3" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els3.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">104eb078949f9cb48cbd6af0ea3d4ee1aee12ba0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.el7.centos.1.tuxcare.els3" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els3.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">4cc954d66a5046489d83bc9c7d57da22c804bb98</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.el7.centos.1.tuxcare.els3" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els3.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">6c7112ba70003d6c1e07f05875780fcf43e2cb7d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.el7.centos.1.tuxcare.els3" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els3.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">7f1b1c5005d3366c35e16ea02011004f299afa5a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.el7.centos.1.tuxcare.els3" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els3.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.el7.centos.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">934934367dcda00aadb42ffb6362b2f9c6dd7591</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.el7.centos.1.tuxcare.els3" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els3.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">d5996a9241e2ac1a2b877a17296d9294c9eaa4f6</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1699379448</id>
    <title>libcap: Fix of CVE-2023-2603</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-2603: integer overflow if the input string is close to 4GiB.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-2603: integer overflow if the input string is close to 4GiB.</summary>
    <pushcount>0</pushcount>
    <issued date="2023-11-07 17:50:52 UTC" />
    <updated date="2023-11-07 17:50:52 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1699379448.html" id="CLSA-2023:1699379448" title="CLSA-2023:1699379448" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libcap" release="11.el7.tuxcare.els1" src="libcap-2.22-11.el7.tuxcare.els1.src.rpm" version="2.22">
          <filename>libcap-2.22-11.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">dd4440e3053be743806c899672aecb38d0a0a558</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcap" release="11.el7.tuxcare.els1" src="libcap-2.22-11.el7.tuxcare.els1.src.rpm" version="2.22">
          <filename>libcap-2.22-11.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4451119880599fb308a9e298f6df87bf4deebbac</sum>
        </package>
        <package arch="i686" epoch="0" name="libcap-devel" release="11.el7.tuxcare.els1" src="libcap-2.22-11.el7.tuxcare.els1.src.rpm" version="2.22">
          <filename>libcap-devel-2.22-11.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">f098c98dfcbe287532b9b4f684f6328ccda301e2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcap-devel" release="11.el7.tuxcare.els1" src="libcap-2.22-11.el7.tuxcare.els1.src.rpm" version="2.22">
          <filename>libcap-devel-2.22-11.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f4fa558351fd4ea407d267618f244bb0d8523c99</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1699380056</id>
    <title>rsync: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2018-25032: fix a bug that can crash deflate on some input when using
  Z_FIXED
- CVE-2022-37434: fix zlib bug with a large gzip header extra field</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2018-25032: fix a bug that can crash deflate on some input when using
  Z_FIXED
- CVE-2022-37434: fix zlib bug with a large gzip header extra field</summary>
    <pushcount>0</pushcount>
    <issued date="2023-11-07 18:01:00 UTC" />
    <updated date="2023-11-07 18:01:00 UTC" />
    <references href="https://errata.cloudlinux.com/centos7-els/CLSA-2023-1699380056.html" id="CLSA-2023:1699380056" title="CLSA-2023:1699380056" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="rsync" release="12.el7_9.tuxcare.els1" src="rsync-3.1.2-12.el7_9.tuxcare.els1.src.rpm" version="3.1.2">
          <filename>rsync-3.1.2-12.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">fef3b38615daaa146cab47bc09a687d1cd757380</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1699909692</id>
    <title>sudo: Fix of CVE-2023-23240</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-23240: Add security checks before using temp files for SELinux RBAC sudoedit</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-23240: Add security checks before using temp files for SELinux RBAC sudoedit</summary>
    <pushcount>0</pushcount>
    <issued date="2023-11-13 21:08:16 UTC" />
    <updated date="2023-11-13 21:08:16 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2023-1699909692.html" id="CLSA-2023:1699909692" title="CLSA-2023:1699909692" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="sudo" release="10.el7_9.3.tuxcare.els1" src="sudo-1.8.23-10.el7_9.3.tuxcare.els1.src.rpm" version="1.8.23">
          <filename>sudo-1.8.23-10.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">38e5c2ea9d9c0eb9f6f063025aa34ee8b15ceabc</sum>
        </package>
        <package arch="i686" epoch="0" name="sudo-devel" release="10.el7_9.3.tuxcare.els1" src="sudo-1.8.23-10.el7_9.3.tuxcare.els1.src.rpm" version="1.8.23">
          <filename>sudo-devel-1.8.23-10.el7_9.3.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">aa5dbb9cb9954b74e59aa655f6ab606c00bac2a8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sudo-devel" release="10.el7_9.3.tuxcare.els1" src="sudo-1.8.23-10.el7_9.3.tuxcare.els1.src.rpm" version="1.8.23">
          <filename>sudo-devel-1.8.23-10.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4dda7ed55d8c92e6648d70d81407085b0ea8d0e7</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1701444720</id>
    <title>microcode_ctl: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update Intel CPU microcode to microcode-20231114 release, addresses
  CVE-2022-40982 (INTEL-SA-00828), CVE-2022-41804 (INTEL-SA-00837),
  CVE-2023-23908 (INTEL-SA-00836), CVE-2023-23583 (INTEL-SA-00950):
  - Addition of 06-9a-04/0x40 microcode (in 06-9a-04) at revision 0x5;
  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-02) at revision 0x411c;
  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-02) at revision 0x411c;
  - Addition of 06-ba-03/0xe0 microcode (in 06-ba-02) at revision 0x411c;
  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-03) at revision 0x411c;
  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-03) at revision 0x411c;
  - Addition of 06-ba-03/0xe0 microcode (in 06-ba-03) at revision 0x411c;
  - Addition of 06-be-00/0x11 microcode (in 06-be-00) at revision 0x12;
  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-02) at revision 0x410e;
  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-02) at revision 0x410e;
  - Removal of 06-ba-03/0xc0 microcode (in 06-ba-02) at revision 0x410e;
  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-03) at revision 0x410e;
  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-03) at revision 0x410e;
  - Removal of 06-ba-03/0xc0 microcode (in 06-ba-03) at revision 0x410e;
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode (in 06-55-03) from revision
    0x1000161 up to 0x1000181;
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in 06-55-04)
    from revision 0x2006e05 up to 0x2007006;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode (in 06-55-06) from revision
    0x4003303 up to 0x4003604;
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode (in 06-55-07) from
    revision 0x5003303 up to 0x5003604;
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode (in 06-55-0b) from revision
    0x7002503 up to 0x7002703;
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode (in 06-6a-06) from revision
    0xd000389 up to 0xd0003b9;
  - Update of 06-6c-01/0x10 (ICL-D B0) microcode (in 06-6c-01) from revision
    0x1000211 up to 0x1000268;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode (in 06-7e-05) from revision
    0xb8 up to 0xc2;
  - Update of 06-8a-01/0x10 (LKF B2/B3) microcode (in 06-8a-01) from revision
    0x32 up to 0x33;
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in 06-8c-01) from
    revision 0xa6 up to 0xb4;
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode (in 06-8c-02) from revision
    0x28 up to 0x34;
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode (in 06-8d-01) from revision
    0x42 up to 0x4e;
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in 06-8e-09) from
    revision 0xf0 up to 0xf4;
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in 06-8e-09) from
    revision 0xf0 up to 0xf4;
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in 06-8e-0a)
    from revision 0xf0 up to 0xf4;
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in 06-8e-0b) from revision
    0xf0 up to 0xf4;
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode
    (in 06-8e-0c) from revision 0xf4 up to 0xf8;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-04) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-04) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-04) from revision
    0x2c000170 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-04) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-04) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-04) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-04) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000170;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000170;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision
    0x2b000181;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-05) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-05) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-05) from revision
    0x2c000170 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-05) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-05) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-05) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-05) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000170;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000170;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision
    0x2b000181;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-06) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-06) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-06) from revision
    0x2c000170 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-06) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-06) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-06) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-06) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000170;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000170;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision
    0x2b000181;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-07) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-07) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-07) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-07) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision
    0x2b000181;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-08) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-08) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-08) from revision
    0x2c000170 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-08) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-08) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-08) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-08) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000170;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000170;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision
    0x2b000181;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x2c;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x2c;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-02) from
    revision 0x2c up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2c
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2c
    up to 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x2c;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x2c;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-05) from
    revision 0x2c up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2c
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2c
    up to 0x32;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x430;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x430;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x429;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x429;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-03) from
    revision 0x429 up to 0x430;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x430;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x430;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x429;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x429;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-04) from
    revision 0x429 up to 0x430;
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in 06-9e-09)
    from revision 0xf0 up to 0xf4;
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in 06-9e-0a) from
    revision 0xf0 up to 0xf4;
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in 06-9e-0b) from
    revision 0xf0 up to 0xf4;
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in 06-9e-0c) from
    revision 0xf0 up to 0xf4;
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in 06-9e-0d) from
    revision 0xf4 up to 0xfa;
  - Update of 06-a5-02/0x20 (CML-H R1) microcode (in 06-a5-02) from revision
    0xf4 up to 0xf8;
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode (in 06-a5-03) from
    revision 0xf4 up to 0xf8;
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode (in 06-a5-05) from
    revision 0xf4 up to 0xf8;
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode (in 06-a6-00) from
    revision 0xf4 up to 0xf8;
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode (in 06-a6-01) from
    revision 0xf4 up to 0xf8;
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode (in 06-a7-01) from revision
    0x57 up to 0x5d;
  - Update of 06-b7-01/0x32 (RPL-S S0) microcode (in 06-b7-01) from revision
    0x112 up to 0x11d;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x2c;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x2c;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-02) from
    revision 0x2c up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2c
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2c
    up to 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x2c;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x2c;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-05) from
    revision 0x2c up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2c
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2c
    up to 0x32;
- gen_update2.py was updated to output strings having restricted length.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update Intel CPU microcode to microcode-20231114 release, addresses
  CVE-2022-40982 (INTEL-SA-00828), CVE-2022-41804 (INTEL-SA-00837),
  CVE-2023-23908 (INTEL-SA-00836), CVE-2023-23583 (INTEL-SA-00950):
  - Addition of 06-9a-04/0x40 microcode (in 06-9a-04) at revision 0x5;
  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-02) at revision 0x411c;
  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-02) at revision 0x411c;
  - Addition of 06-ba-03/0xe0 microcode (in 06-ba-02) at revision 0x411c;
  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-03) at revision 0x411c;
  - Addition of 06-ba-02/0xe0 microcode (in 06-ba-03) at revision 0x411c;
  - Addition of 06-ba-03/0xe0 microcode (in 06-ba-03) at revision 0x411c;
  - Addition of 06-be-00/0x11 microcode (in 06-be-00) at revision 0x12;
  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-02) at revision 0x410e;
  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-02) at revision 0x410e;
  - Removal of 06-ba-03/0xc0 microcode (in 06-ba-02) at revision 0x410e;
  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-03) at revision 0x410e;
  - Removal of 06-ba-02/0xc0 microcode (in 06-ba-03) at revision 0x410e;
  - Removal of 06-ba-03/0xc0 microcode (in 06-ba-03) at revision 0x410e;
  - Update of 06-55-03/0x97 (SKX-SP B1) microcode (in 06-55-03) from revision
    0x1000161 up to 0x1000181;
  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in 06-55-04)
    from revision 0x2006e05 up to 0x2007006;
  - Update of 06-55-06/0xbf (CLX-SP B0) microcode (in 06-55-06) from revision
    0x4003303 up to 0x4003604;
  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode (in 06-55-07) from
    revision 0x5003303 up to 0x5003604;
  - Update of 06-55-0b/0xbf (CPX-SP A1) microcode (in 06-55-0b) from revision
    0x7002503 up to 0x7002703;
  - Update of 06-6a-06/0x87 (ICX-SP D0) microcode (in 06-6a-06) from revision
    0xd000389 up to 0xd0003b9;
  - Update of 06-6c-01/0x10 (ICL-D B0) microcode (in 06-6c-01) from revision
    0x1000211 up to 0x1000268;
  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode (in 06-7e-05) from revision
    0xb8 up to 0xc2;
  - Update of 06-8a-01/0x10 (LKF B2/B3) microcode (in 06-8a-01) from revision
    0x32 up to 0x33;
  - Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode (in 06-8c-01) from
    revision 0xa6 up to 0xb4;
  - Update of 06-8c-02/0xc2 (TGL-R C0) microcode (in 06-8c-02) from revision
    0x28 up to 0x34;
  - Update of 06-8d-01/0xc2 (TGL-H R0) microcode (in 06-8d-01) from revision
    0x42 up to 0x4e;
  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in 06-8e-09) from
    revision 0xf0 up to 0xf4;
  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in 06-8e-09) from
    revision 0xf0 up to 0xf4;
  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in 06-8e-0a)
    from revision 0xf0 up to 0xf4;
  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in 06-8e-0b) from revision
    0xf0 up to 0xf4;
  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode
    (in 06-8e-0c) from revision 0xf4 up to 0xf8;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-04) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-04) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-04) from revision
    0x2c000170 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-04) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-04) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-04) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-04) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000170;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-04) at revision
    0x2c000170;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-04) at revision
    0x2b000181;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-05) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-05) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-05) from revision
    0x2c000170 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-05) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-05) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-05) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-05) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000170;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-05) at revision
    0x2c000170;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-05) at revision
    0x2b000181;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-06) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-06) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-06) from revision
    0x2c000170 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-06) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-06) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-06) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-06) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000170;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-06) at revision
    0x2c000170;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-06) at revision
    0x2b000181;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-07) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-07) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-07) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-07) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-07) at revision
    0x2b000181;
  - Update of 06-8f-04/0x10 microcode (in 06-8f-08) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in 06-8f-08) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in 06-8f-08) from revision
    0x2c000170 up to 0x2c000290;
  - Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in 06-8f-08) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-06/0x10 microcode (in 06-8f-08) from revision 0x2c000170 up
    to 0x2c000290;
  - Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in 06-8f-08) from revision
    0x2b000181 up to 0x2b0004d0;
  - Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in 06-8f-08) from
    revision 0x2b000181 up to 0x2b0004d0;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000290;
  - Addition of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000290;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000170;
  - Removal of 06-8f-08/0x10 (SPR-HBM B3) microcode (in 06-8f-08) at revision
    0x2c000170;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at
    revision 0x2b0004d0;
  - Addition of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at
    revision 0x2b0004d0;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision
    0x2b000181;
  - Removal of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in 06-8f-08) at revision
    0x2b000181;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x2c;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-02) at
    revision 0x2c;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-02) from
    revision 0x2c up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2c
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-02) from revision 0x2c
    up to 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x2c;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-97-05) at
    revision 0x2c;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-97-05) from
    revision 0x2c up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2c
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-97-05) from revision 0x2c
    up to 0x32;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x430;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x430;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x429;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-03) at
    revision 0x429;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-03) from
    revision 0x429 up to 0x430;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x430;
  - Addition of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x430;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x429;
  - Removal of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in 06-9a-04) at
    revision 0x429;
  - Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in 06-9a-04) from
    revision 0x429 up to 0x430;
  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in 06-9e-09)
    from revision 0xf0 up to 0xf4;
  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in 06-9e-0a) from
    revision 0xf0 up to 0xf4;
  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in 06-9e-0b) from
    revision 0xf0 up to 0xf4;
  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in 06-9e-0c) from
    revision 0xf0 up to 0xf4;
  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in 06-9e-0d) from
    revision 0xf4 up to 0xfa;
  - Update of 06-a5-02/0x20 (CML-H R1) microcode (in 06-a5-02) from revision
    0xf4 up to 0xf8;
  - Update of 06-a5-03/0x22 (CML-S 6+2 G1) microcode (in 06-a5-03) from
    revision 0xf4 up to 0xf8;
  - Update of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode (in 06-a5-05) from
    revision 0xf4 up to 0xf8;
  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode (in 06-a6-00) from
    revision 0xf4 up to 0xf8;
  - Update of 06-a6-01/0x80 (CML-U 6+2 v2 K1) microcode (in 06-a6-01) from
    revision 0xf4 up to 0xf8;
  - Update of 06-a7-01/0x02 (RKL-S B0) microcode (in 06-a7-01) from revision
    0x57 up to 0x5d;
  - Update of 06-b7-01/0x32 (RPL-S S0) microcode (in 06-b7-01) from revision
    0x112 up to 0x11d;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x2c;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-02) at
    revision 0x2c;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-02) from
    revision 0x2c up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2c
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-02) from revision 0x2c
    up to 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x32;
  - Addition of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x32;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x2c;
  - Removal of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in 06-bf-05) at
    revision 0x2c;
  - Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in 06-bf-05) from
    revision 0x2c up to 0x32;
  - Update of 06-bf-02/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2c
    up to 0x32;
  - Update of 06-bf-05/0x07 (ADL C0) microcode (in 06-bf-05) from revision 0x2c
    up to 0x32;
- gen_update2.py was updated to output strings having restricted length.</summary>
    <pushcount>0</pushcount>
    <issued date="2023-12-01 15:32:04 UTC" />
    <updated date="2023-12-01 15:32:04 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2023-1701444720.html" id="CLSA-2023:1701444720" title="CLSA-2023:1701444720" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="microcode_ctl" release="73.16.el7_9.tuxcare.els1" src="microcode_ctl-2.1-73.16.el7_9.tuxcare.els1.src.rpm" version="2.1">
          <filename>microcode_ctl-2.1-73.16.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9ed3e8ad6d115fc75d272cc8c77dd3df0e5c1adf</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2023:1703612912</id>
    <title>openssh: Fix of CVE-2023-51385</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-51385: ban user/hostnames with most shell metacharacters in
  command line</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-51385: ban user/hostnames with most shell metacharacters in
  command line</summary>
    <pushcount>0</pushcount>
    <issued date="2023-12-26 17:48:35 UTC" />
    <updated date="2023-12-26 17:48:35 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2023-1703612912.html" id="CLSA-2023:1703612912" title="CLSA-2023:1703612912" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="openssh" release="23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-7.4p1-23.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">edbed619f94ac534b814fe95630d1268b677aeca</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-askpass" release="23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-askpass-7.4p1-23.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">cde687661d4b4009f2acfec7163b24dd2d8041fc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-cavs" release="23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-cavs-7.4p1-23.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6df167f7ba307b1289b6e2c577f3167cab8ad23c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-clients" release="23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-clients-7.4p1-23.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">2cd529fcdbbe84f8d309c419fbbe22377185f7fa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-keycat" release="23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-keycat-7.4p1-23.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">27547546f0ec2402a491386921b5a24cf21d232d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-ldap" release="23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-ldap-7.4p1-23.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">756392880ad5f77d1da719693556aba7c1aebca9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-server" release="23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-server-7.4p1-23.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">39303f852903e50dec9ebaf7c3f04c8d42e57689</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-server-sysvinit" release="23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-server-sysvinit-7.4p1-23.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">153362ae7bfa5623553668f66f13c8bdbb181a34</sum>
        </package>
        <package arch="i686" epoch="0" name="pam_ssh_agent_auth" release="2.23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="0.10.3">
          <filename>pam_ssh_agent_auth-0.10.3-2.23.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">bb7cfaf0e9fae5c15b3c5c7f078feeac51aa5f8d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="pam_ssh_agent_auth" release="2.23.el7_9.tuxcare.els1" src="openssh-7.4p1-23.el7_9.tuxcare.els1.src.rpm" version="0.10.3">
          <filename>pam_ssh_agent_auth-0.10.3-2.23.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c0dcad557496c654cdd840b696018ff13bf3533b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1705941805</id>
    <title>Update of ca-certificates</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update to CKBI 2.64_v7.0.306 from NSS 3.95
- Removing:
-     # Certificate "AC1 RAIZ MTIN"
-     # Certificate "ACNLB"
-     # Certificate "Actalis Authentication CA G1"
-     # Certificate "AddTrust External CA Root"
-     # Certificate "AdminCA-CD-T01"
-     # Certificate "Admin-Root-CA"
-     # Certificate "ADOCA02"
-     # Certificate "ANF Server CA"
-     # Certificate "A-Trust-Qual-03"
-     # Certificate "A-Trust-Root-05"
-     # Certificate "Autoridade Certificadora Raiz Brasileira v1"
-     # Certificate "Autoridade Certificadora Raiz Brasileira v2"
-     # Certificate "CA Disig"
-     # Certificate "CCA India 2011"
-     # Certificate "Certipost E-Trust Primary Normalised CA"
-     # Certificate "Certipost E-Trust Primary Qualified CA"
-     # Certificate "Class 1 Primary CA"
-     # Certificate "Cybertrust Global Root"
-     # Certificate "D-TRUST Root Class 2 CA 2007"
-     # Certificate "D-TRUST Root Class 3 CA 2007"
-     # Certificate "EBG Elektronik Sertifika Hizmet Sağlayıcısı"
-     # Certificate "e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi"
-     # Certificate "Equifax"
-     # Certificate "Equifax Secure Global eBusiness CA-1"
-     # Certificate "E-Tugra Certification Authority"
-     # Certificate "GeoTrust Global CA"
-     # Certificate "GeoTrust Global CA 2"
-     # Certificate "GTE CyberTrust Global Root"
-     # Certificate "Halcom CA FO"
-     # Certificate "Halcom CA PO 2"
-     # Certificate "Hongkong Post Root CA 1"
-     # Certificate "I.CA - Qualified Certification Authority, 09/2009"
-     # Certificate "I.CA - Qualified root certificate"
-     # Certificate "I.CA - Standard Certification Authority, 09/2009"
-     # Certificate "I.CA - Standard root certificate"
-     # Certificate "IGC/A"
-     # Certificate "Japanese Government"
-     # Certificate "Juur-SK"
-     # Certificate "KEYNECTIS ROOT CA"
-     # Certificate "LGPKI"
-     # Certificate "LuxTrust Global Root"
-     # Certificate "Macao Post eSignTrust Root Certification Authority (G02)"
-     # Certificate "Microsec e-Szigno Root CA"
-     # Certificate "Microsoft Root Authority"
-     # Certificate "Microsoft Root Certificate Authority"
-     # Certificate "NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado"
-     # Certificate "QuoVadis Root Certification Authority"
-     # Certificate "Root CA Generalitat Valenciana"
-     # Certificate "SITHS CA v3"
-     # Certificate "Sonera Class2 CA"
-     # Certificate "Staat der Nederlanden Root CA"
-     # Certificate "Staat der Nederlanden Root CA - G2"
-     # Certificate "state-institutions"
-     # Certificate "Symantec Class 1 Public Primary Certification Authority - G6"
-     # Certificate "Symantec Class 2 Public Primary Certification Authority - G6"
-     # Certificate "Thawte Premium Server CA"
-     # Certificate "Thawte Server CA"
-     # Certificate "TrustCor ECA-1"
-     # Certificate "TrustCor RootCert CA-1"
-     # Certificate "TrustCor RootCert CA-2"
-     # Certificate "TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3"
-     # Certificate "UTN-USERFirst-Object"
-     # Certificate "Verisign Class 1 Public Primary Certification Authority - G3"
-     # Certificate "Verisign Class 2 Public Primary Certification Authority - G3"
-     # Certificate "VeriSign, Inc."
-    Adding:
-     # Certificate "Atos TrustedRoot Root CA ECC G2 2020"
-     # Certificate "Atos TrustedRoot Root CA ECC TLS 2021"
-     # Certificate "Atos TrustedRoot Root CA RSA G2 2020"
-     # Certificate "Atos TrustedRoot Root CA RSA TLS 2021"
-     # Certificate "CommScope Public Trust ECC Root-01"
-     # Certificate "CommScope Public Trust ECC Root-02"
-     # Certificate "CommScope Public Trust RSA Root-01"
-     # Certificate "CommScope Public Trust RSA Root-02"
-     # Certificate "LAWtrust Root CA2 (4096)"
-     # Certificate "Sectigo Public Email Protection Root E46"
-     # Certificate "Sectigo Public Email Protection Root R46"
-     # Certificate "Sectigo Public Server Authentication Root E46"
-     # Certificate "Sectigo Public Server Authentication Root R46"
-     # Certificate "SSL.com Client ECC Root CA 2022"
-     # Certificate "SSL.com Client RSA Root CA 2022"
-     # Certificate "SSL.com TLS ECC Root CA 2022"
-     # Certificate "SSL.com TLS RSA Root CA 2022"
-     # Certificate "TrustAsia Global Root CA G3"
-     # Certificate "TrustAsia Global Root CA G4"</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update to CKBI 2.64_v7.0.306 from NSS 3.95
- Removing:
-     # Certificate "AC1 RAIZ MTIN"
-     # Certificate "ACNLB"
-     # Certificate "Actalis Authentication CA G1"
-     # Certificate "AddTrust External CA Root"
-     # Certificate "AdminCA-CD-T01"
-     # Certificate "Admin-Root-CA"
-     # Certificate "ADOCA02"
-     # Certificate "ANF Server CA"
-     # Certificate "A-Trust-Qual-03"
-     # Certificate "A-Trust-Root-05"
-     # Certificate "Autoridade Certificadora Raiz Brasileira v1"
-     # Certificate "Autoridade Certificadora Raiz Brasileira v2"
-     # Certificate "CA Disig"
-     # Certificate "CCA India 2011"
-     # Certificate "Certipost E-Trust Primary Normalised CA"
-     # Certificate "Certipost E-Trust Primary Qualified CA"
-     # Certificate "Class 1 Primary CA"
-     # Certificate "Cybertrust Global Root"
-     # Certificate "D-TRUST Root Class 2 CA 2007"
-     # Certificate "D-TRUST Root Class 3 CA 2007"
-     # Certificate "EBG Elektronik Sertifika Hizmet Sağlayıcısı"
-     # Certificate "e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi"
-     # Certificate "Equifax"
-     # Certificate "Equifax Secure Global eBusiness CA-1"
-     # Certificate "E-Tugra Certification Authority"
-     # Certificate "GeoTrust Global CA"
-     # Certificate "GeoTrust Global CA 2"
-     # Certificate "GTE CyberTrust Global Root"
-     # Certificate "Halcom CA FO"
-     # Certificate "Halcom CA PO 2"
-     # Certificate "Hongkong Post Root CA 1"
-     # Certificate "I.CA - Qualified Certification Authority, 09/2009"
-     # Certificate "I.CA - Qualified root certificate"
-     # Certificate "I.CA - Standard Certification Authority, 09/2009"
-     # Certificate "I.CA - Standard root certificate"
-     # Certificate "IGC/A"
-     # Certificate "Japanese Government"
-     # Certificate "Juur-SK"
-     # Certificate "KEYNECTIS ROOT CA"
-     # Certificate "LGPKI"
-     # Certificate "LuxTrust Global Root"
-     # Certificate "Macao Post eSignTrust Root Certification Authority (G02)"
-     # Certificate "Microsec e-Szigno Root CA"
-     # Certificate "Microsoft Root Authority"
-     # Certificate "Microsoft Root Certificate Authority"
-     # Certificate "NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado"
-     # Certificate "QuoVadis Root Certification Authority"
-     # Certificate "Root CA Generalitat Valenciana"
-     # Certificate "SITHS CA v3"
-     # Certificate "Sonera Class2 CA"
-     # Certificate "Staat der Nederlanden Root CA"
-     # Certificate "Staat der Nederlanden Root CA - G2"
-     # Certificate "state-institutions"
-     # Certificate "Symantec Class 1 Public Primary Certification Authority - G6"
-     # Certificate "Symantec Class 2 Public Primary Certification Authority - G6"
-     # Certificate "Thawte Premium Server CA"
-     # Certificate "Thawte Server CA"
-     # Certificate "TrustCor ECA-1"
-     # Certificate "TrustCor RootCert CA-1"
-     # Certificate "TrustCor RootCert CA-2"
-     # Certificate "TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3"
-     # Certificate "UTN-USERFirst-Object"
-     # Certificate "Verisign Class 1 Public Primary Certification Authority - G3"
-     # Certificate "Verisign Class 2 Public Primary Certification Authority - G3"
-     # Certificate "VeriSign, Inc."
-    Adding:
-     # Certificate "Atos TrustedRoot Root CA ECC G2 2020"
-     # Certificate "Atos TrustedRoot Root CA ECC TLS 2021"
-     # Certificate "Atos TrustedRoot Root CA RSA G2 2020"
-     # Certificate "Atos TrustedRoot Root CA RSA TLS 2021"
-     # Certificate "CommScope Public Trust ECC Root-01"
-     # Certificate "CommScope Public Trust ECC Root-02"
-     # Certificate "CommScope Public Trust RSA Root-01"
-     # Certificate "CommScope Public Trust RSA Root-02"
-     # Certificate "LAWtrust Root CA2 (4096)"
-     # Certificate "Sectigo Public Email Protection Root E46"
-     # Certificate "Sectigo Public Email Protection Root R46"
-     # Certificate "Sectigo Public Server Authentication Root E46"
-     # Certificate "Sectigo Public Server Authentication Root R46"
-     # Certificate "SSL.com Client ECC Root CA 2022"
-     # Certificate "SSL.com Client RSA Root CA 2022"
-     # Certificate "SSL.com TLS ECC Root CA 2022"
-     # Certificate "SSL.com TLS RSA Root CA 2022"
-     # Certificate "TrustAsia Global Root CA G3"
-     # Certificate "TrustAsia Global Root CA G4"</summary>
    <pushcount>0</pushcount>
    <issued date="2024-01-22 16:43:28 UTC" />
    <updated date="2024-01-22 16:43:28 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1705941805.html" id="CLSA-2024:1705941805" title="CLSA-2024:1705941805" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="ca-certificates" release="72.el7_9.tuxcare.els1" src="ca-certificates-2023.2.64_v7.0.306-72.el7_9.tuxcare.els1.src.rpm" version="2023.2.64_v7.0.306">
          <filename>ca-certificates-2023.2.64_v7.0.306-72.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">7feddba1b5c6e8fbfdf4863955ec120aa40bead4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1706698462</id>
    <title>java-1.8.0-openjdk: Fix of 6 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to shenandoah-jdk8u402-b06. That fixes following CVEs:
- CVE-2024-20918: Array out-of-bounds access due to missing range check in C1 compiler
- CVE-2024-20919: JVM class file verifier flaw allows unverified bytecode execution
- CVE-2024-20921: Range check loop optimization issue
- CVE-2024-20926: Arbitrary Java code execution in Nashorn
- CVE-2024-20945: Logging of digital signature private keys
- CVE-2024-20952: RSA padding issue and timing side-channel attack against TLS
- Remove JDK-8312489 patch which is already in the sources</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to shenandoah-jdk8u402-b06. That fixes following CVEs:
- CVE-2024-20918: Array out-of-bounds access due to missing range check in C1 compiler
- CVE-2024-20919: JVM class file verifier flaw allows unverified bytecode execution
- CVE-2024-20921: Range check loop optimization issue
- CVE-2024-20926: Arbitrary Java code execution in Nashorn
- CVE-2024-20945: Logging of digital signature private keys
- CVE-2024-20952: RSA padding issue and timing side-channel attack against TLS
- Remove JDK-8312489 patch which is already in the sources</summary>
    <pushcount>0</pushcount>
    <issued date="2024-01-31 10:54:25 UTC" />
    <updated date="2024-01-31 10:54:25 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1706698462.html" id="CLSA-2024:1706698462" title="CLSA-2024:1706698462" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">985a45c8261c59abac4a44948037a6cc2d56e620</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ef4381e2d45cad05764579260dc995563441e132</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">8160994f0cd9bad149e5a90fc0cb17d9140cf4ed</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0fcc4e0970849055e2282c3bc8114065c7107037</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4479fe7464c92190454afd066e277023d919f6fc</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-debug-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9e86d9d96f9e181378702495a2bf70164acd85c6</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">a0485fe0478294ff032f4c14e6c477ac3994fb8b</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c04b4d849b0ea094fee35a171ba4a44c7370d725</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-demo-debug-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">887249dcbe96685426c54e90c41f0027c8c3e504</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">1261c82741d6eb32f635f4e1780c024f8089575f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">52ec594951a776a02f0df7053dc5a7571b88258f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-devel-debug-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b7a0efd04304fc2a8b1bcbcb0a819b6f08df4039</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">d74e69ba4033f60f66a6c655947de5ea1504ec86</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ba1beebb093fff1eb59ed81ff287cfa8a6bda89e</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-headless-debug-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">1e7d15c7b51cf0c3a6112f1f6888a340f23a9ea5</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">00fae0753cef9a26e8b57febffe45c478c351c09</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.402.b06-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">e6d9837df19a63c42b250d29cfe55e637375df0f</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">ea34729369f2f754d4106fc50b4c3e102189ed0f</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.402.b06-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">5ae85d29e6f1f326df3edb4f86c9329bdd0c0125</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">23a9388afe4eb4bfbe36f1ae237eb28d2fc9441c</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f840b1b5df6ba65175fedc433c404160f18e3762</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.402.b06">
          <filename>java-1.8.0-openjdk-src-debug-1.8.0.402.b06-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ab2e31664231ea3bf64774767b18ad387d490a11</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1706700142</id>
    <title>php: Fix of 8 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-21702: Fix null pointer crash because of malformed
  SOAP server response
- CVE-2021-21703: Fix error in php fpm shared memory organization
  leading to privilage escalation
- CVE-2022-31625: Fix freeing of uninitialized memory leading to RCE
- CVE-2022-31626: Fix buffer overflow in mysqlnd driver leading to RCE
- CVE-2023-0568: Fix array overrun when appending slash to paths
  in DOM and XML cases
- CVE-2023-0662: Fix DOS vulnerabality by limiting number of parsed
  multipart body parts and printing upload limit exceed error
  message only once
- CVE-2023-3823: Fix external entity loading in XML without enabling it,
  by sanitizing libxml2 globals before parsing
- CVE-2023-3824: Fix buffer mismanagement in phar_dir_read()</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-21702: Fix null pointer crash because of malformed
  SOAP server response
- CVE-2021-21703: Fix error in php fpm shared memory organization
  leading to privilage escalation
- CVE-2022-31625: Fix freeing of uninitialized memory leading to RCE
- CVE-2022-31626: Fix buffer overflow in mysqlnd driver leading to RCE
- CVE-2023-0568: Fix array overrun when appending slash to paths
  in DOM and XML cases
- CVE-2023-0662: Fix DOS vulnerabality by limiting number of parsed
  multipart body parts and printing upload limit exceed error
  message only once
- CVE-2023-3823: Fix external entity loading in XML without enabling it,
  by sanitizing libxml2 globals before parsing
- CVE-2023-3824: Fix buffer mismanagement in phar_dir_read()</summary>
    <pushcount>0</pushcount>
    <issued date="2024-01-31 11:22:25 UTC" />
    <updated date="2024-01-31 11:22:25 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1706700142.html" id="CLSA-2024:1706700142" title="CLSA-2024:1706700142" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9680d4f83839998fbbc573c763e52d38eff7d7f7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">5b79e924a515c8fccc3b277164ac261d01bc9604</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">047e34da7ee4f304bcf0d73dc2f8c111a7a2d823</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f140115eaba2dc9c9fc3e8215f7ffc3ddffaeda1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">28fadfc1b2b6cd6791b1f70c9ac8fed5a32ff822</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ea0cf62c95f3c80c35add18057ad13540ddaeae7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9c54b3120ecaae74256339e947a6a5695347aec9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f6db7357949d50b7a9915a3961c68139d341fa54</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">74aa3fabc38f8fc345db50e3885dd9fe3113f6ff</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">eec57ec10a4b6dcdd2dd766db7733bc8a5fedb30</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6530dbd9d5ad7a095389ce988d0c221c1ee3d25d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0501c1639360479e62744d8b02b9b86055484e79</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">997ad8de250710bfaa069fb35206700d6dc7303b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">bf7ea2af2196e2a7949bdc19ceda35989d9c3e4f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">752baac7ab2c13204eee3c97f1b8c7a98462da9a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">37c3cb0c4c76c0868af9071f4cd814508973051a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">10c245c93617a8607e45786dd487b1b809d5569f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">469bb9f34d74f5e24b1d74e4cf42d058f47c9211</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b0c3602c30bd2834bdce05e266c2691e91907209</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f07dd1600ef6dcff80dd38900cab5a9dfa682ca5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">fdbd10a6f94b7c15a746ee8fac4ba858e2b94cc9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">66d81093531fa2f392fcd195b2410db476f87b19</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">85448bcbbe56434909d288b221a35a607867dd2b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">29f0632ef163f5a2e26fb3ac023800c75fe985fd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els1" src="php-5.4.16-48.el7.tuxcare.els1.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">01b42a2bafbf16cfef05c64184cb9e147d6f081a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1707919380</id>
    <title>openssh: Fix of CVE-2023-48795</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-48795: implement "strict key exchange" in ssh and sshd
- Moved ELS patches to the top to avoid patch conflicts</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-48795: implement "strict key exchange" in ssh and sshd
- Moved ELS patches to the top to avoid patch conflicts</summary>
    <pushcount>0</pushcount>
    <issued date="2024-02-14 14:03:03 UTC" />
    <updated date="2024-02-14 14:03:03 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1707919380.html" id="CLSA-2024:1707919380" title="CLSA-2024:1707919380" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="openssh" release="23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="7.4p1">
          <filename>openssh-7.4p1-23.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">add92be02b6d782b2083e92ebb70bd1c076b2dd6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-askpass" release="23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="7.4p1">
          <filename>openssh-askpass-7.4p1-23.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">e38a020c7bbacbe347c6031b1ea2b7d30845aee6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-cavs" release="23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="7.4p1">
          <filename>openssh-cavs-7.4p1-23.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">ca03959afe114454bceae32b821ffe70a22bb628</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-clients" release="23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="7.4p1">
          <filename>openssh-clients-7.4p1-23.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">295e9b1a752cd00ea2bc1519bc5d2635c3c02ef7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-keycat" release="23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="7.4p1">
          <filename>openssh-keycat-7.4p1-23.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">9a83b13d97f05fa85024a7620fafed5b45939c74</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-ldap" release="23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="7.4p1">
          <filename>openssh-ldap-7.4p1-23.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">e0f017ec7e626e008dff93577d632462e26a9662</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-server" release="23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="7.4p1">
          <filename>openssh-server-7.4p1-23.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">42a83385dc6a0edbcacd30f75c6aa479b11d149f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-server-sysvinit" release="23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="7.4p1">
          <filename>openssh-server-sysvinit-7.4p1-23.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">19ce58d35308b933496dd2feec904feb31074402</sum>
        </package>
        <package arch="i686" epoch="0" name="pam_ssh_agent_auth" release="2.23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="0.10.3">
          <filename>pam_ssh_agent_auth-0.10.3-2.23.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">7f114bc027bd1b665b3b2265d5b6492a65313a03</sum>
        </package>
        <package arch="x86_64" epoch="0" name="pam_ssh_agent_auth" release="2.23.el7_9.tuxcare.els2" src="openssh-7.4p1-23.el7_9.tuxcare.els2.src.rpm" version="0.10.3">
          <filename>pam_ssh_agent_auth-0.10.3-2.23.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">694398c494e6601ec374ac1ec07bc616eddcd9e5</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1708417192</id>
    <title>libxml2: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2017-7375: add validation for parsed entity references
- CVE-2017-7376: fix buffer overflow in URL handling
- CVE-2017-8872: free input buffer in xmlHaltParser</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2017-7375: add validation for parsed entity references
- CVE-2017-7376: fix buffer overflow in URL handling
- CVE-2017-8872: free input buffer in xmlHaltParser</summary>
    <pushcount>0</pushcount>
    <issued date="2024-02-20 08:19:55 UTC" />
    <updated date="2024-02-20 08:19:55 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1708417192.html" id="CLSA-2024:1708417192" title="CLSA-2024:1708417192" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libxml2" release="6.el7_9.6.tuxcare.els3" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els3.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.el7_9.6.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">9214f528ef5a5911e6f29a2dd28c0fef59437ea4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2" release="6.el7_9.6.tuxcare.els3" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els3.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.el7_9.6.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">a08f218df8faed30a40d4cc17202bebbb635f0ea</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-devel" release="6.el7_9.6.tuxcare.els3" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els3.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.el7_9.6.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">5cde1a7605d681cb8e42c2f495f377815d479645</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-devel" release="6.el7_9.6.tuxcare.els3" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els3.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.el7_9.6.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">b01a1f3711245fe08bcf1c6ef07db38de5a0b29d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-python" release="6.el7_9.6.tuxcare.els3" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els3.src.rpm" version="2.9.1">
          <filename>libxml2-python-2.9.1-6.el7_9.6.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">6625a7ca31068c5c845dd9bcb512eb24803bfee1</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-static" release="6.el7_9.6.tuxcare.els3" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els3.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.el7_9.6.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">135d15940ef38ecb8d6ba94821fe8671f6fd5623</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-static" release="6.el7_9.6.tuxcare.els3" src="libxml2-2.9.1-6.el7_9.6.tuxcare.els3.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.el7_9.6.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">abce4ce166a9e14fa87571b897de93a2010427db</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1709550046</id>
    <title>bind: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-50387: Resolved CPU exhaustion from specially crafted DNSSEC-signed
  zone responses
- CVE-2023-50868: Resolved CPU exhaustion from DNSSEC-signed zones using NSEC3</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-50387: Resolved CPU exhaustion from specially crafted DNSSEC-signed
  zone responses
- CVE-2023-50868: Resolved CPU exhaustion from DNSSEC-signed zones using NSEC3</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-04 11:00:49 UTC" />
    <updated date="2024-03-04 11:00:49 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1709550046.html" id="CLSA-2024:1709550046" title="CLSA-2024:1709550046" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="32" name="bind" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">fe2a7cd869562e3ba20be19cb675e6952806c18a</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">9eb1b11324b786544d1c4a0b38403659375eca2e</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7.14.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">415b9651285c74584bdb3585904c244ef01c0cf0</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">0da77ee697b3c95774d36b6e1395f009a640dd0c</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7.14.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">c0236bc639e28a954fb214d17782abf3974d435e</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">199f15094dae68c173a96859bc5c50a494ef3573</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7.14.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">55e7f51d1b1c14edc487c3073e8258728e9e32b2</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">16736bf483fa15ab33838a3191409394c508edaf</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7.14.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">66e7b5a1e480ddaf7aec614ee0e1120bb399a87a</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">1406ee012927425762e41fdff6b3c6f49bef9e3a</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7.14.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">e2c5ac52078c5eb4a61b28856cb1286920d80975</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">fdf58adb34f0fc3358f481ad5ccd97d603694c5c</sum>
        </package>
        <package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">c58ede0bd8b11f22588c0b0a5a28305c925a7309</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7.14.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">fa0f9557aab88d20abecbfb446c4b6ef7b62bbea</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">16950a1353e6fc53e537c27152cec7aa7fa1e834</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">18273a8c69ebd60a7b99421d92155b181767e5e4</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7.14.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">e3e45b5de9f5c28a17e3092d4f5b3935f4b59904</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">e8d4a7471b37bc7ab3a51ef536e61dd4df4f8a36</sum>
        </package>
        <package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7.14.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">6e6aae3522f9d376e8092451a544132cfe14c5e5</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">74fee7f6c94f2da2631e2e47f64758992c003e43</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">4124b0e50256105b156bbff46ac46ba6a93a6ea6</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">008a2263f42bb4884c9e013547decfdba677ed90</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">0a90433f20ebbe87dcfd6c511bbbb4194bddadaf</sum>
        </package>
        <package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7.14.tuxcare.els2" src="bind-9.11.4-26.P2.el7.14.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">f706efc7749d642e68b785ce825300f15974c5fa</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1709727025</id>
    <title>linux-firmware: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update AMD CPU microcode to 2023-12-05:
  - Update AMD CPU microcode for processor family 19h: sig 0x00a10f12,
    sig 0x00aa0f02, sig 0x00aa0f01, sig 0x00a10f11
- Update AMD CPU microcode for processor family 17h: sig 0x00830f10
- Fix CVE-2023-20569, CVE-2023-20593
- Use tuxcare.els suffixes for all packages</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update AMD CPU microcode to 2023-12-05:
  - Update AMD CPU microcode for processor family 19h: sig 0x00a10f12,
    sig 0x00aa0f02, sig 0x00aa0f01, sig 0x00a10f11
- Update AMD CPU microcode for processor family 17h: sig 0x00830f10
- Fix CVE-2023-20569, CVE-2023-20593
- Use tuxcare.els suffixes for all packages</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-06 12:10:29 UTC" />
    <updated date="2024-03-06 12:10:29 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1709727025.html" id="CLSA-2024:1709727025" title="CLSA-2024:1709727025" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="iwl100-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="39.31.5.1">
          <filename>iwl100-firmware-39.31.5.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">62b263a06b9eb84d7439d8de12682e33d8894e11</sum>
        </package>
        <package arch="noarch" epoch="1" name="iwl1000-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="39.31.5.1">
          <filename>iwl1000-firmware-39.31.5.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">ed62d248bdbb91e618d3e6ad9880319fa571de5e</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl105-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl105-firmware-18.168.6.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">9648db3b145dc96fc2081bd1d2ccd752aeaade21</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl135-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl135-firmware-18.168.6.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">e998813e681c51779daad0a52d30314ed007984a</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2000-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl2000-firmware-18.168.6.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">4a3bd116a1ed82e9621821a0323804b47f1ae91d</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2030-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl2030-firmware-18.168.6.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">4d98ff8c98f33c55eea843c56eee2acdfbb429f8</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3160-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="25.30.13.0">
          <filename>iwl3160-firmware-25.30.13.0-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">7646e5088e9eb33905b145c096c1a9023f9db0ec</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3945-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="15.32.2.9">
          <filename>iwl3945-firmware-15.32.2.9-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">ca2b054760c356b7164fe87d4f83d3108da562ac</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl4965-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="228.61.2.24">
          <filename>iwl4965-firmware-228.61.2.24-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">26d05fddb8c51f0b9c8caffef5b22f2481cd21db</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5000-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="8.83.5.1_1">
          <filename>iwl5000-firmware-8.83.5.1_1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">6522a2f96c1f1465ec33e1ca99942aac8db86234</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5150-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="8.24.2.2">
          <filename>iwl5150-firmware-8.24.2.2-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">2b0cb7728b14fc02660db9a8bebaab367355659e</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="9.221.4.1">
          <filename>iwl6000-firmware-9.221.4.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">e4db79c53211b0abfa72bdf7825f1fc232039412</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2a-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2a-firmware-18.168.6.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">1a204c5344437a1789c87765f8a931b6446db84c</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2b-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2b-firmware-18.168.6.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">17f0c10115ec2e7196f9eb29821b0a2333a66d50</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6050-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="41.28.5.1">
          <filename>iwl6050-firmware-41.28.5.1-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">7fe7c1c38d1aacf636191b0e710b5fdf7203bbad</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl7260-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="25.30.13.0">
          <filename>iwl7260-firmware-25.30.13.0-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">846f14b5817df35dbb60fd1ef35a5239a47a640b</sum>
        </package>
        <package arch="noarch" epoch="0" name="linux-firmware" release="81.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.src.rpm" version="20200421">
          <filename>linux-firmware-20200421-81.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">3725157da6a2ed9c81c7d4f6d68d47ae8bba31cb</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1709839956</id>
    <title>nettle: Fix of CVE-2018-16869</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Port side-channel silent functions from 3.4.1. Partially fix
  for CVE-2018-16869
- CVE-2018-16869: Add side-channel silent memory, math, PKCS1,
  RSA functions
- Added tests for side-channel silent implementations</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Port side-channel silent functions from 3.4.1. Partially fix
  for CVE-2018-16869
- CVE-2018-16869: Add side-channel silent memory, math, PKCS1,
  RSA functions
- Added tests for side-channel silent implementations</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-07 19:32:39 UTC" />
    <updated date="2024-03-07 19:32:39 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1709839956.html" id="CLSA-2024:1709839956" title="CLSA-2024:1709839956" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="nettle" release="9.el7_9.tuxcare.els1" src="nettle-2.7.1-9.el7_9.tuxcare.els1.src.rpm" version="2.7.1">
          <filename>nettle-2.7.1-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">30f41bf7bc176294c15b0efccbb36d21274322cf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nettle" release="9.el7_9.tuxcare.els1" src="nettle-2.7.1-9.el7_9.tuxcare.els1.src.rpm" version="2.7.1">
          <filename>nettle-2.7.1-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b98ab37c581e43a03714e5c47c3aec86b358d0b2</sum>
        </package>
        <package arch="i686" epoch="0" name="nettle-devel" release="9.el7_9.tuxcare.els1" src="nettle-2.7.1-9.el7_9.tuxcare.els1.src.rpm" version="2.7.1">
          <filename>nettle-devel-2.7.1-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">5ebbc1172282115841b35850ea6d1fe0ddb3f282</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nettle-devel" release="9.el7_9.tuxcare.els1" src="nettle-2.7.1-9.el7_9.tuxcare.els1.src.rpm" version="2.7.1">
          <filename>nettle-devel-2.7.1-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">12794a8f50421d6713ecadf904cd7e17ba5c1501</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1709840060</id>
    <title>Update of nss</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update to CKBI 2.64 from NSS 3.95
- Removed:
-     # Certificate "E-Tugra Certification Authority"
-     # Certificate "Hongkong Post Root CA 1"
-     # Certificate "Symantec Class 1 Public Primary Certification Authority - G6"
-     # Certificate "Symantec Class 2 Public Primary Certification Authority - G6"
-     # Certificate "TrustCor ECA-1"
-     # Certificate "TrustCor RootCert CA-1"
-     # Certificate "TrustCor RootCert CA-2"
-     # Certificate "Verisign Class 1 Public Primary Certification Authority - G3"
-     # Certificate "Verisign Class 2 Public Primary Certification Authority - G3"
- Added:
-     # Certificate "Atos TrustedRoot Root CA ECC G2 2020"
-     # Certificate "Atos TrustedRoot Root CA ECC TLS 2021"
-     # Certificate "Atos TrustedRoot Root CA RSA G2 2020"
-     # Certificate "Atos TrustedRoot Root CA RSA TLS 2021"
-     # Certificate "CommScope Public Trust ECC Root-01"
-     # Certificate "CommScope Public Trust ECC Root-02"
-     # Certificate "CommScope Public Trust RSA Root-01"
-     # Certificate "CommScope Public Trust RSA Root-02"
-     # Certificate "LAWtrust Root CA2 (4096)"
-     # Certificate "Sectigo Public Email Protection Root E46"
-     # Certificate "Sectigo Public Email Protection Root R46"
-     # Certificate "Sectigo Public Server Authentication Root E46"
-     # Certificate "Sectigo Public Server Authentication Root R46"
-     # Certificate "SSL.com Client ECC Root CA 2022"
-     # Certificate "SSL.com Client RSA Root CA 2022"
-     # Certificate "SSL.com TLS ECC Root CA 2022"
-     # Certificate "SSL.com TLS RSA Root CA 2022"
-     # Certificate "TrustAsia Global Root CA G3"
-     # Certificate "TrustAsia Global Root CA G4"
- Update test certificates
- Tests were activated
- dbtests.sh waiting time was increased to pass the test on slow VM</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update to CKBI 2.64 from NSS 3.95
- Removed:
-     # Certificate "E-Tugra Certification Authority"
-     # Certificate "Hongkong Post Root CA 1"
-     # Certificate "Symantec Class 1 Public Primary Certification Authority - G6"
-     # Certificate "Symantec Class 2 Public Primary Certification Authority - G6"
-     # Certificate "TrustCor ECA-1"
-     # Certificate "TrustCor RootCert CA-1"
-     # Certificate "TrustCor RootCert CA-2"
-     # Certificate "Verisign Class 1 Public Primary Certification Authority - G3"
-     # Certificate "Verisign Class 2 Public Primary Certification Authority - G3"
- Added:
-     # Certificate "Atos TrustedRoot Root CA ECC G2 2020"
-     # Certificate "Atos TrustedRoot Root CA ECC TLS 2021"
-     # Certificate "Atos TrustedRoot Root CA RSA G2 2020"
-     # Certificate "Atos TrustedRoot Root CA RSA TLS 2021"
-     # Certificate "CommScope Public Trust ECC Root-01"
-     # Certificate "CommScope Public Trust ECC Root-02"
-     # Certificate "CommScope Public Trust RSA Root-01"
-     # Certificate "CommScope Public Trust RSA Root-02"
-     # Certificate "LAWtrust Root CA2 (4096)"
-     # Certificate "Sectigo Public Email Protection Root E46"
-     # Certificate "Sectigo Public Email Protection Root R46"
-     # Certificate "Sectigo Public Server Authentication Root E46"
-     # Certificate "Sectigo Public Server Authentication Root R46"
-     # Certificate "SSL.com Client ECC Root CA 2022"
-     # Certificate "SSL.com Client RSA Root CA 2022"
-     # Certificate "SSL.com TLS ECC Root CA 2022"
-     # Certificate "SSL.com TLS RSA Root CA 2022"
-     # Certificate "TrustAsia Global Root CA G3"
-     # Certificate "TrustAsia Global Root CA G4"
- Update test certificates
- Tests were activated
- dbtests.sh waiting time was increased to pass the test on slow VM</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-07 19:34:23 UTC" />
    <updated date="2024-03-07 19:34:23 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1709840060.html" id="CLSA-2024:1709840060" title="CLSA-2024:1709840060" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="nss" release="2.el7_9.tuxcare.els1" src="nss-3.90.0-2.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-3.90.0-2.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">41fdf5f6f078b578bb8712e112d05e7f03f11a9a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss" release="2.el7_9.tuxcare.els1" src="nss-3.90.0-2.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-3.90.0-2.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6001e08e383d7cc3a7bceb9ab2178399839e172d</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-devel" release="2.el7_9.tuxcare.els1" src="nss-3.90.0-2.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-devel-3.90.0-2.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">f45016cbc6140436f636439c32d2eb951916f048</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-devel" release="2.el7_9.tuxcare.els1" src="nss-3.90.0-2.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-devel-3.90.0-2.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c4cb6f3dec5352bae3d129e1a26ee6b680f79c5e</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-pkcs11-devel" release="2.el7_9.tuxcare.els1" src="nss-3.90.0-2.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-pkcs11-devel-3.90.0-2.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">88573377d386ec6feac2a109c13cc7bbaaccc427</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-pkcs11-devel" release="2.el7_9.tuxcare.els1" src="nss-3.90.0-2.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-pkcs11-devel-3.90.0-2.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">97b5b56c41bcb022582065842c48fa3fe2eba0f8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-sysinit" release="2.el7_9.tuxcare.els1" src="nss-3.90.0-2.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-sysinit-3.90.0-2.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">cf3da6398612132fe1ee2d7ac485b2ca7e874c12</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-tools" release="2.el7_9.tuxcare.els1" src="nss-3.90.0-2.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-tools-3.90.0-2.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4b70ccb086b4942413216bd36c998c26eeb01b41</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1710184311</id>
    <title>freetype: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-27404: Fix buffer overflow in sfnt_init_face
- CVE-2022-27405: Fix segmentation violation via FNT_Size_Request
- CVE-2022-27406: Fix segmentation violation via FT_Request_Size</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-27404: Fix buffer overflow in sfnt_init_face
- CVE-2022-27405: Fix segmentation violation via FNT_Size_Request
- CVE-2022-27406: Fix segmentation violation via FT_Request_Size</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-11 19:11:54 UTC" />
    <updated date="2024-03-11 19:11:54 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1710184311.html" id="CLSA-2024:1710184311" title="CLSA-2024:1710184311" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="freetype" release="14.el7_9.1.tuxcare.els1" src="freetype-2.8-14.el7_9.1.tuxcare.els1.src.rpm" version="2.8">
          <filename>freetype-2.8-14.el7_9.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">310bddbdc6a3a7a2bbc27b50f33efbe319c6fa51</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freetype" release="14.el7_9.1.tuxcare.els1" src="freetype-2.8-14.el7_9.1.tuxcare.els1.src.rpm" version="2.8">
          <filename>freetype-2.8-14.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ab1aad5e24796950103363de6322aaaca273b9d3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freetype-demos" release="14.el7_9.1.tuxcare.els1" src="freetype-2.8-14.el7_9.1.tuxcare.els1.src.rpm" version="2.8">
          <filename>freetype-demos-2.8-14.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">1d547f06f3a862232efbc2059faa8a6b0beea2bb</sum>
        </package>
        <package arch="i686" epoch="0" name="freetype-devel" release="14.el7_9.1.tuxcare.els1" src="freetype-2.8-14.el7_9.1.tuxcare.els1.src.rpm" version="2.8">
          <filename>freetype-devel-2.8-14.el7_9.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">88cb215e9623a038016dd3d23f9ce99ba863f11c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freetype-devel" release="14.el7_9.1.tuxcare.els1" src="freetype-2.8-14.el7_9.1.tuxcare.els1.src.rpm" version="2.8">
          <filename>freetype-devel-2.8-14.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7f16fc3510d564bad5d344b059472d9827cfc82e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1710184399</id>
    <title>gnutls: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Keep the broken pkcs11 tests disabled.
- Added CVE-2024-0567 PoC test.
- CVE-2023-5981-pre1: improve level of randomness for each operations,
  always use _gnutls_switch_lib_state for pk wrappers.
- CVE-2023-5981-pre2: add constant time/cache operations to prevent
  or minimaze timining or cache side channel attacks.
- CVE-2023-5981: removes branching that depends on secret data to
  prevent potential side-channel attack.
- CVE-2024-0553: minimize branching after decryption.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Keep the broken pkcs11 tests disabled.
- Added CVE-2024-0567 PoC test.
- CVE-2023-5981-pre1: improve level of randomness for each operations,
  always use _gnutls_switch_lib_state for pk wrappers.
- CVE-2023-5981-pre2: add constant time/cache operations to prevent
  or minimaze timining or cache side channel attacks.
- CVE-2023-5981: removes branching that depends on secret data to
  prevent potential side-channel attack.
- CVE-2024-0553: minimize branching after decryption.</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-11 19:13:22 UTC" />
    <updated date="2024-03-11 19:13:22 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1710184399.html" id="CLSA-2024:1710184399" title="CLSA-2024:1710184399" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="gnutls" release="9.el7_9.tuxcare.els1" src="gnutls-3.3.29-9.el7_9.tuxcare.els1.src.rpm" version="3.3.29">
          <filename>gnutls-3.3.29-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">df8f25dac01b6abc52b74e3e39bbbe520723d4e1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls" release="9.el7_9.tuxcare.els1" src="gnutls-3.3.29-9.el7_9.tuxcare.els1.src.rpm" version="3.3.29">
          <filename>gnutls-3.3.29-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8461900ebaceb6425a4389b937f6c6899ab2691b</sum>
        </package>
        <package arch="i686" epoch="0" name="gnutls-c++" release="9.el7_9.tuxcare.els1" src="gnutls-3.3.29-9.el7_9.tuxcare.els1.src.rpm" version="3.3.29">
          <filename>gnutls-c++-3.3.29-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">ba0f50308a0e95f9dedbdd4c677e4030d428e8ed</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls-c++" release="9.el7_9.tuxcare.els1" src="gnutls-3.3.29-9.el7_9.tuxcare.els1.src.rpm" version="3.3.29">
          <filename>gnutls-c++-3.3.29-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">08ad1fee55b178c6b40e91204ae111f2997656b4</sum>
        </package>
        <package arch="i686" epoch="0" name="gnutls-dane" release="9.el7_9.tuxcare.els1" src="gnutls-3.3.29-9.el7_9.tuxcare.els1.src.rpm" version="3.3.29">
          <filename>gnutls-dane-3.3.29-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">427c670552afe57210ae6cfe3628d7ecc56cc6e4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls-dane" release="9.el7_9.tuxcare.els1" src="gnutls-3.3.29-9.el7_9.tuxcare.els1.src.rpm" version="3.3.29">
          <filename>gnutls-dane-3.3.29-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0f2ab15fdd7167bca864cad0bbea64887b0d0d49</sum>
        </package>
        <package arch="i686" epoch="0" name="gnutls-devel" release="9.el7_9.tuxcare.els1" src="gnutls-3.3.29-9.el7_9.tuxcare.els1.src.rpm" version="3.3.29">
          <filename>gnutls-devel-3.3.29-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">8b6dd527a1d651c4900fd42a78ae3ea214018d96</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls-devel" release="9.el7_9.tuxcare.els1" src="gnutls-3.3.29-9.el7_9.tuxcare.els1.src.rpm" version="3.3.29">
          <filename>gnutls-devel-3.3.29-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b871cbdd4c9b4608b44a825e3a8982d0a3e7218b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls-utils" release="9.el7_9.tuxcare.els1" src="gnutls-3.3.29-9.el7_9.tuxcare.els1.src.rpm" version="3.3.29">
          <filename>gnutls-utils-3.3.29-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f5f370f97d8d007288267dec683ab8e38292c3d2</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1710437461</id>
    <title>python3: Fix of CVE-2022-48564</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-48564: Improve validation of Plist files that prevent DoS</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-48564: Improve validation of Plist files that prevent DoS</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-14 17:31:05 UTC" />
    <updated date="2024-03-14 17:31:05 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1710437461.html" id="CLSA-2024:1710437461" title="CLSA-2024:1710437461" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">462389533a561eda76b69c096f47f7fef024354c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">24cd82f7a5ade9f8b52fed04c77dcdce9abdb8cd</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">ac8db8e21d11c707cd219a4043f015d3663853f8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">e5c8a445e5749adc070cf1fcb95bcefc91cc5194</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">aacf57743409b3a2e67ae4fc3438db27f4c5d0fe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">6315e8a17d3742f8b40e14db2934899ca839144e</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">81502c64373ae0930558475657ee14829c1b2f78</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">72bee843c858cee2a980d809a1f31eefe0d1fe3d</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">52fce478ac6a7c9f3e05e8638b8b6df9eb348dbf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">a0954f8d4b4b2564955cb08fb2a3c5c964f871d8</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">11cb08293651733661a17562df9372f5071731bd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">b2658406f5148a52d70d0ac0ba0e70265e5dc219</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">1c4409d9fc061adeff882813adeea5e62c1184f9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="21.el7_9.tuxcare.els2" src="python3-3.6.8-21.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">c45bbbfd95df822bcb6a95164333009fa635dc52</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1710789286</id>
    <title>ncurses: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-29491.patch: Mitigate vulnerability by building the packages with
  modified --disable-root-environ option which now limits usage of environment
  for setuid/setgid programs only
- CVE-2021-39537.patch: Add a check for end-of-string in cvtchar to handle a
  malformed string in infotocap</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-29491.patch: Mitigate vulnerability by building the packages with
  modified --disable-root-environ option which now limits usage of environment
  for setuid/setgid programs only
- CVE-2021-39537.patch: Add a check for end-of-string in cvtchar to handle a
  malformed string in infotocap</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-18 19:14:50 UTC" />
    <updated date="2024-03-18 19:14:50 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1710789286.html" id="CLSA-2024:1710789286" title="CLSA-2024:1710789286" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="ncurses" release="14.20130511.el7_4.tuxcare.els1" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els1.src.rpm" version="5.9">
          <filename>ncurses-5.9-14.20130511.el7_4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7622bf4a9f245736aca91a251693ab3a04038b26</sum>
        </package>
        <package arch="noarch" epoch="0" name="ncurses-base" release="14.20130511.el7_4.tuxcare.els1" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els1.src.rpm" version="5.9">
          <filename>ncurses-base-5.9-14.20130511.el7_4.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">183479f9b0b27856d48542de2e485d2435942b44</sum>
        </package>
        <package arch="i686" epoch="0" name="ncurses-devel" release="14.20130511.el7_4.tuxcare.els1" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els1.src.rpm" version="5.9">
          <filename>ncurses-devel-5.9-14.20130511.el7_4.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">9c0188412545af40b9057488f8cc5de913906ed7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ncurses-devel" release="14.20130511.el7_4.tuxcare.els1" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els1.src.rpm" version="5.9">
          <filename>ncurses-devel-5.9-14.20130511.el7_4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">3e46936a0dabf47c1197e8aefecd3c26523967e5</sum>
        </package>
        <package arch="i686" epoch="0" name="ncurses-libs" release="14.20130511.el7_4.tuxcare.els1" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els1.src.rpm" version="5.9">
          <filename>ncurses-libs-5.9-14.20130511.el7_4.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">56a86980b54c95d8686371cfde086c73153b4bf4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ncurses-libs" release="14.20130511.el7_4.tuxcare.els1" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els1.src.rpm" version="5.9">
          <filename>ncurses-libs-5.9-14.20130511.el7_4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f60b9a8a2ca4fed240ec3969b90dc8d92e089583</sum>
        </package>
        <package arch="i686" epoch="0" name="ncurses-static" release="14.20130511.el7_4.tuxcare.els1" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els1.src.rpm" version="5.9">
          <filename>ncurses-static-5.9-14.20130511.el7_4.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">307cbb68b416b647a92adab5760e11c79650951b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ncurses-static" release="14.20130511.el7_4.tuxcare.els1" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els1.src.rpm" version="5.9">
          <filename>ncurses-static-5.9-14.20130511.el7_4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">3dd9d204c2e8a93ff3c6d58513adcedae1749898</sum>
        </package>
        <package arch="noarch" epoch="0" name="ncurses-term" release="14.20130511.el7_4.tuxcare.els1" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els1.src.rpm" version="5.9">
          <filename>ncurses-term-5.9-14.20130511.el7_4.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">96e7a53040dcb3ee7648cd34a0d9f8233789f960</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1711476689</id>
    <title>e2fsprogs: Fix of CVE-2022-1304</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-1304.patch: libext2fs: add sanity check to extent manipulation</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-1304.patch: libext2fs: add sanity check to extent manipulation</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-26 18:11:32 UTC" />
    <updated date="2024-03-26 18:11:32 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1711476689.html" id="CLSA-2024:1711476689" title="CLSA-2024:1711476689" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="e2fsprogs" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>e2fsprogs-1.42.9-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7ca90ab80651cf2ea12616f3257c3440663ba649</sum>
        </package>
        <package arch="i686" epoch="0" name="e2fsprogs-devel" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>e2fsprogs-devel-1.42.9-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">cb0622cb615d65d2da5a8eefa1b8b0040a91e851</sum>
        </package>
        <package arch="x86_64" epoch="0" name="e2fsprogs-devel" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>e2fsprogs-devel-1.42.9-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b686dd8dc4a5d3cd0ca02420073cf9a16d3b18e9</sum>
        </package>
        <package arch="i686" epoch="0" name="e2fsprogs-libs" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>e2fsprogs-libs-1.42.9-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">7619362123ec54ec68c88b57fd22f4f71635eb1d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="e2fsprogs-libs" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>e2fsprogs-libs-1.42.9-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a64cc229a60dbb19864c99ba6e2818bc7984a43c</sum>
        </package>
        <package arch="i686" epoch="0" name="e2fsprogs-static" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>e2fsprogs-static-1.42.9-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">b1adb576dbb0f6297344e0d6579fcb5d775b0cbb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="e2fsprogs-static" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>e2fsprogs-static-1.42.9-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">84a63b84f0fb08b25ad4191c82301089b0f7a3b0</sum>
        </package>
        <package arch="i686" epoch="0" name="libcom_err" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>libcom_err-1.42.9-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">7a11423d2c03210fd3a116a36346a9b3062bc444</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcom_err" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>libcom_err-1.42.9-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e45e68f972493b18231b08c9bee9ccdb04c022eb</sum>
        </package>
        <package arch="i686" epoch="0" name="libcom_err-devel" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>libcom_err-devel-1.42.9-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">871a0a36a3ea4cba30081730d86883993b208699</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcom_err-devel" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>libcom_err-devel-1.42.9-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f7fd917fc6d0d085ee604f117461e1ca2fb0b47d</sum>
        </package>
        <package arch="i686" epoch="0" name="libss" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>libss-1.42.9-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">07506e9368bc24af93c4b1de0b16e61002431637</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libss" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>libss-1.42.9-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9bca2ff321677ef9d8b7af31e30231f7f6d36706</sum>
        </package>
        <package arch="i686" epoch="0" name="libss-devel" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>libss-devel-1.42.9-19.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">8aa8e0d231c0db85a293d654a54e62b1ecea7e3d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libss-devel" release="19.el7.tuxcare.els1" src="e2fsprogs-1.42.9-19.el7.tuxcare.els1.src.rpm" version="1.42.9">
          <filename>libss-devel-1.42.9-19.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9cf481f0b77c48f2904123fa5f226e5ee75eeee5</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1711477070</id>
    <title>gmp: Fix of CVE-2021-43618</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-43618: gmp security and enhancement update</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-43618: gmp security and enhancement update</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-26 18:17:53 UTC" />
    <updated date="2024-03-26 18:17:53 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1711477070.html" id="CLSA-2024:1711477070" title="CLSA-2024:1711477070" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="gmp" release="15.el7.tuxcare.els1" src="gmp-6.0.0-15.el7.tuxcare.els1.src.rpm" version="6.0.0">
          <filename>gmp-6.0.0-15.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">c7cabf95bad64a74ec37ebea2955038355eda69d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="gmp" release="15.el7.tuxcare.els1" src="gmp-6.0.0-15.el7.tuxcare.els1.src.rpm" version="6.0.0">
          <filename>gmp-6.0.0-15.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e20a31c4c4e9e992f36d04ed20285b50af78ccfa</sum>
        </package>
        <package arch="i686" epoch="1" name="gmp-devel" release="15.el7.tuxcare.els1" src="gmp-6.0.0-15.el7.tuxcare.els1.src.rpm" version="6.0.0">
          <filename>gmp-devel-6.0.0-15.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">b38f3bec2d79eb18d720c7b0e0dcea30820c9f12</sum>
        </package>
        <package arch="x86_64" epoch="1" name="gmp-devel" release="15.el7.tuxcare.els1" src="gmp-6.0.0-15.el7.tuxcare.els1.src.rpm" version="6.0.0">
          <filename>gmp-devel-6.0.0-15.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9c86c1d2eb72c38e6690fd19f52974160ff9f5e1</sum>
        </package>
        <package arch="i686" epoch="1" name="gmp-static" release="15.el7.tuxcare.els1" src="gmp-6.0.0-15.el7.tuxcare.els1.src.rpm" version="6.0.0">
          <filename>gmp-static-6.0.0-15.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">aa3e2e0be2d906e0cb489f226d619f6618267f3d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="gmp-static" release="15.el7.tuxcare.els1" src="gmp-6.0.0-15.el7.tuxcare.els1.src.rpm" version="6.0.0">
          <filename>gmp-static-6.0.0-15.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">60a5ff787fa75c1473000aa1e383602cf02c142a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1711491407</id>
    <title>python: Fix of CVE-2023-27043</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-27043: reject malformed addresses in email.parseaddr()</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-27043: reject malformed addresses in email.parseaddr()</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-26 22:16:50 UTC" />
    <updated date="2024-03-26 22:16:50 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1711491407.html" id="CLSA-2024:1711491407" title="CLSA-2024:1711491407" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="94.el7_9.tuxcare.els2" src="python-2.7.5-94.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-2.7.5-94.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">9a57d86a5ec37fde5878c459e5a78a51f16d4679</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="94.el7_9.tuxcare.els2" src="python-2.7.5-94.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-94.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">0cc2b5dc59c694887df1efd92e83c573b0e3b4fe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="94.el7_9.tuxcare.els2" src="python-2.7.5-94.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-94.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">f949b122a3ff8d11d99ca71a0883fb6b14bfdc74</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="94.el7_9.tuxcare.els2" src="python-2.7.5-94.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">a9b7e0b8ef88fd35573315083dc019618d066382</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="94.el7_9.tuxcare.els2" src="python-2.7.5-94.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">09c96ddcd72c2d0c1c2f70086ca5e95bab3a5261</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="94.el7_9.tuxcare.els2" src="python-2.7.5-94.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-94.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">9f0418bcfcd1b2551e8f813086a0d6d8db88364a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="94.el7_9.tuxcare.els2" src="python-2.7.5-94.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-94.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">d5f8f4cc625e3c7d7ad9620fc4918e3b61af7941</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="94.el7_9.tuxcare.els2" src="python-2.7.5-94.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-94.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">17773fcc3887cada40935e5dc70ed11ee66dc7f3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1711562558</id>
    <title>curl: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Moved tuxcare patches from 7.29.0-59.1.tuxcare.els2
- CVE-2023-38546: cookie: remove unnecessary struct fields
- CVE-2022-27782: check additional TLS or SSH connection parameters that should
  have prohibited connection reuse
- CVE-2023-27534: fix SFTP path '~' resolving discrepancy
- fix read off end of array for SCP home directory case</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Moved tuxcare patches from 7.29.0-59.1.tuxcare.els2
- CVE-2023-38546: cookie: remove unnecessary struct fields
- CVE-2022-27782: check additional TLS or SSH connection parameters that should
  have prohibited connection reuse
- CVE-2023-27534: fix SFTP path '~' resolving discrepancy
- fix read off end of array for SCP home directory case</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-27 18:02:41 UTC" />
    <updated date="2024-03-27 18:02:41 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1711562558.html" id="CLSA-2024:1711562558" title="CLSA-2024:1711562558" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="curl" release="59.el7_9.2.tuxcare.els1" src="curl-7.29.0-59.el7_9.2.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>curl-7.29.0-59.el7_9.2.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">41eec66a63677954a764a4d274c2066d5d2756e5</sum>
        </package>
        <package arch="i686" epoch="0" name="libcurl" release="59.el7_9.2.tuxcare.els1" src="curl-7.29.0-59.el7_9.2.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>libcurl-7.29.0-59.el7_9.2.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">7774267dd1dd8c29434016350a37450e67863ab6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcurl" release="59.el7_9.2.tuxcare.els1" src="curl-7.29.0-59.el7_9.2.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>libcurl-7.29.0-59.el7_9.2.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c3c2525f2cd0a9b884bfdf4890982918e7ce1d3b</sum>
        </package>
        <package arch="i686" epoch="0" name="libcurl-devel" release="59.el7_9.2.tuxcare.els1" src="curl-7.29.0-59.el7_9.2.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>libcurl-devel-7.29.0-59.el7_9.2.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">1723e81d78c94128adde4431980cacb86778349b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcurl-devel" release="59.el7_9.2.tuxcare.els1" src="curl-7.29.0-59.el7_9.2.tuxcare.els1.src.rpm" version="7.29.0">
          <filename>libcurl-devel-7.29.0-59.el7_9.2.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">70acfc58e39dd74948fd376cd9889f6a366069c7</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1711562715</id>
    <title>systemd: Fix of CVE-2023-26604</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Moved tuxcare patches from 219-78.7.tuxcare.els1
- CVE-2023-26604: use only less as a pager and restrict its functionality
  (e.g stop running external shell) unless environment variable
  SYSTEMD_PAGERSECURE is defined</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Moved tuxcare patches from 219-78.7.tuxcare.els1
- CVE-2023-26604: use only less as a pager and restrict its functionality
  (e.g stop running external shell) unless environment variable
  SYSTEMD_PAGERSECURE is defined</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-27 18:05:17 UTC" />
    <updated date="2024-03-27 18:05:17 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1711562715.html" id="CLSA-2024:1711562715" title="CLSA-2024:1711562715" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libgudev1" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>libgudev1-219-78.el7_9.9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">600ffbbc531d9525d5e6d75c82becd8cccc7624e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgudev1" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>libgudev1-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">443d73f6b44a0dc735e9e80891901ac88bbc6825</sum>
        </package>
        <package arch="i686" epoch="0" name="libgudev1-devel" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>libgudev1-devel-219-78.el7_9.9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">6c3f5ed36773f2c9bcacfa9efb496d42b5cf29d9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgudev1-devel" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>libgudev1-devel-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9fbd2eaed3fa1e2d3b85f071d8613c08851dee39</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">97fc576af15f53a2f5b80576af0e90d2dc5e43da</sum>
        </package>
        <package arch="i686" epoch="0" name="systemd-devel" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-devel-219-78.el7_9.9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">33f697690762a0dffb5242db914d4b4e91917483</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-devel" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-devel-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">3a19be1a47e9471e4d22e06725368164b4f4f974</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-journal-gateway" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-journal-gateway-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8125c44e813d3eda60e2aa7516ba6d8298484eab</sum>
        </package>
        <package arch="i686" epoch="0" name="systemd-libs" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-libs-219-78.el7_9.9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">c72e387afd05160e0bc5e0d75d7ddc2eabcb131e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-libs" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-libs-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9aaafca186a923a4a71a88ff84153f8e200616ea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-networkd" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-networkd-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b5e05ef9e532d7367b42d9faab2c8f2802f4da2e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-python" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-python-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a487989e9e3112d3390e9f22637f230e88691ebe</sum>
        </package>
        <package arch="i686" epoch="0" name="systemd-resolved" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-resolved-219-78.el7_9.9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">c66136c8fb847c9450d65f836517efd52262c1c3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-resolved" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-resolved-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8b068f8040965dc83c1d96ab57620301d696e83f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="systemd-sysv" release="78.el7_9.9.tuxcare.els1" src="systemd-219-78.el7_9.9.tuxcare.els1.src.rpm" version="219">
          <filename>systemd-sysv-219-78.el7_9.9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">782dd94fdf296da689b84ae79650205cb5031f1e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1711563079</id>
    <title>Update of zlib</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Rebuild with dist .el7_9</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Rebuild with dist .el7_9</summary>
    <pushcount>0</pushcount>
    <issued date="2024-03-27 18:11:22 UTC" />
    <updated date="2024-03-27 18:11:22 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1711563079.html" id="CLSA-2024:1711563079" title="CLSA-2024:1711563079" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="minizip" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>minizip-1.2.7-21.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">eaa78a1be0791d41b7dd18991a96e92b0db7e8ec</sum>
        </package>
        <package arch="x86_64" epoch="0" name="minizip" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>minizip-1.2.7-21.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">390f396704e82eed411fe0dc52bc449c6710bed6</sum>
        </package>
        <package arch="i686" epoch="0" name="minizip-devel" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>minizip-devel-1.2.7-21.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">e70ffd395a667025e25c576dbee6292bf74a883f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="minizip-devel" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>minizip-devel-1.2.7-21.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">90e927279e7350bf765b9a073fa1c048fff0fa7c</sum>
        </package>
        <package arch="i686" epoch="0" name="zlib" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-1.2.7-21.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">8eb5031cdc17ac4ecc82648f10709d3dbb655d62</sum>
        </package>
        <package arch="x86_64" epoch="0" name="zlib" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-1.2.7-21.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8421c6c66e2ff45ad09c042bcc5a514077278842</sum>
        </package>
        <package arch="i686" epoch="0" name="zlib-devel" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-devel-1.2.7-21.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">5744a3425cfe49caa4e3beea9f0acb00a8141607</sum>
        </package>
        <package arch="x86_64" epoch="0" name="zlib-devel" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-devel-1.2.7-21.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7be39e7d983d70dc550a1d5efa838f267277f232</sum>
        </package>
        <package arch="i686" epoch="0" name="zlib-static" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-static-1.2.7-21.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">f21e58039680ac4be0c8aec5c7ed013ba0075a86</sum>
        </package>
        <package arch="x86_64" epoch="0" name="zlib-static" release="21.el7_9.tuxcare.els1" src="zlib-1.2.7-21.el7_9.tuxcare.els1.src.rpm" version="1.2.7">
          <filename>zlib-static-1.2.7-21.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">bcff118c50f887a393a600dda456325bb2e4d13c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1712176685</id>
    <title>gawk: Fix of CVE-2023-4156</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fix CVE-2023-4156: builtin.c (format_tree): When collecting positional field
  widths or precisions, check for wrap around to negative values.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fix CVE-2023-4156: builtin.c (format_tree): When collecting positional field
  widths or precisions, check for wrap around to negative values.</summary>
    <pushcount>0</pushcount>
    <issued date="2024-04-03 20:38:08 UTC" />
    <updated date="2024-04-03 20:38:08 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1712176685.html" id="CLSA-2024:1712176685" title="CLSA-2024:1712176685" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="gawk" release="4.el7_3.1.tuxcare.els1" src="gawk-4.0.2-4.el7_3.1.tuxcare.els1.src.rpm" version="4.0.2">
          <filename>gawk-4.0.2-4.el7_3.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">797101704b7700a679ee05dc3ead40a8a8738dd8</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1712176929</id>
    <title>Update of libxslt</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fix use-after-free in xsltApplyTemplates</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fix use-after-free in xsltApplyTemplates</summary>
    <pushcount>0</pushcount>
    <issued date="2024-04-03 20:42:13 UTC" />
    <updated date="2024-04-03 20:42:13 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1712176929.html" id="CLSA-2024:1712176929" title="CLSA-2024:1712176929" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libxslt" release="6.el7.tuxcare.els1" src="libxslt-1.1.28-6.el7.tuxcare.els1.src.rpm" version="1.1.28">
          <filename>libxslt-1.1.28-6.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">795ec0871478b6ea66933e27d0a75f7c87fe1e46</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxslt" release="6.el7.tuxcare.els1" src="libxslt-1.1.28-6.el7.tuxcare.els1.src.rpm" version="1.1.28">
          <filename>libxslt-1.1.28-6.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">dd82d50ac0f2fcf5adad46492d33fdfb27ffcbe5</sum>
        </package>
        <package arch="i686" epoch="0" name="libxslt-devel" release="6.el7.tuxcare.els1" src="libxslt-1.1.28-6.el7.tuxcare.els1.src.rpm" version="1.1.28">
          <filename>libxslt-devel-1.1.28-6.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">23f0e55a508f05b336325f69c8cdfc524a87ae71</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxslt-devel" release="6.el7.tuxcare.els1" src="libxslt-1.1.28-6.el7.tuxcare.els1.src.rpm" version="1.1.28">
          <filename>libxslt-devel-1.1.28-6.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0cb54d5259dd02bdad58f5127307a14cc00321fe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxslt-python" release="6.el7.tuxcare.els1" src="libxslt-1.1.28-6.el7.tuxcare.els1.src.rpm" version="1.1.28">
          <filename>libxslt-python-1.1.28-6.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6c442a5cf3c7f3ec167c1a982e4b7722625e7248</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1712672449</id>
    <title>Update of cpio</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fix integer overflow in dstring.c ds_fgetstr that triggers
  an out-of-bounds heap write</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fix integer overflow in dstring.c ds_fgetstr that triggers
  an out-of-bounds heap write</summary>
    <pushcount>0</pushcount>
    <issued date="2024-04-09 14:21:57 UTC" />
    <updated date="2024-04-09 14:21:57 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1712672449.html" id="CLSA-2024:1712672449" title="CLSA-2024:1712672449" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="cpio" release="28.el7.tuxcare.els1" src="cpio-2.11-28.el7.tuxcare.els1.src.rpm" version="2.11">
          <filename>cpio-2.11-28.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">020be05b53b3af73aa9530637778f00234a346fa</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1712672592</id>
    <title>git: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-40330: forbid newlines in host and path in git_connect()
- CVE-2022-39260: shell - limit size of interactive commands</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-40330: forbid newlines in host and path in git_connect()
- CVE-2022-39260: shell - limit size of interactive commands</summary>
    <pushcount>0</pushcount>
    <issued date="2024-04-09 14:23:15 UTC" />
    <updated date="2024-04-09 14:23:15 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1712672592.html" id="CLSA-2024:1712672592" title="CLSA-2024:1712672592" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="emacs-git" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>emacs-git-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">0763c89032e34f99efdce908ac24dc774a74daa7</sum>
        </package>
        <package arch="noarch" epoch="0" name="emacs-git-el" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>emacs-git-el-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">2dbaea78f7d15ee16a8720e0e802694daacc2ba4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-1.8.3.1-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e44d20821999b2bd125d17554b490e862542da1e</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-all" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-all-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">669b99789cdb6b6c23f5b8197dade1e15a3fd87e</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-bzr" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-bzr-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">130ddf01d0817f8443a73f12bd6de48829affa1d</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-cvs" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-cvs-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">b95758c854b7d104fd01c3a9978c89fa891603a1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-daemon" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-daemon-1.8.3.1-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0e9c58b70cd3a0792a99d418c3d475643ad21c8d</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-email" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-email-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">45ab0487d627d17303c750055afe173524c62ca5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-gnome-keyring" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-gnome-keyring-1.8.3.1-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b854bab94f8a69a52b8fe7b9bb2d995217cdcd3c</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-gui" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-gui-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">e50d89fb6fb6c14430264d50dd8c30f7dd8843b5</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-hg" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-hg-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">96dbb7bdd17adc5c6cc3294c3aef6c0c48a95da7</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-instaweb" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-instaweb-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">cecff059eaf6f3800b32f73c9fdd8718752b9c8c</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-p4" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-p4-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">95082121668c5afa71003f6351039bbf1acb7ce2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-svn" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>git-svn-1.8.3.1-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">fa31144300189fe35db08ff45cb242b3302c9359</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitk" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>gitk-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">9346c3b747ab83261457f9f7cb3a84ae304a1e76</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitweb" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>gitweb-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">6cc3330291da83c7b72d93cbdad5ba7323b3c14d</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>perl-Git-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">11f5c9a03fbc34cb5321ec136daf8913e02d4da8</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git-SVN" release="25.el7_9.tuxcare.els1" src="git-1.8.3.1-25.el7_9.tuxcare.els1.src.rpm" version="1.8.3.1">
          <filename>perl-Git-SVN-1.8.3.1-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">53062d06a336280300977c31d0fe72671a9f9caf</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1712837808</id>
    <title>postgresql: Fix of CVE-2021-23214</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-23214: Reject extraneous data after SSL or GSS encryption handshake</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-23214: Reject extraneous data after SSL or GSS encryption handshake</summary>
    <pushcount>0</pushcount>
    <issued date="2024-04-11 12:16:52 UTC" />
    <updated date="2024-04-11 12:16:52 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1712837808.html" id="CLSA-2024:1712837808" title="CLSA-2024:1712837808" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">a6b1cd3f538346f4fea68aea350c14f4a2dadf6a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">d56882e00cb0ecd1f213f3f7007c1bc4323312ae</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-contrib" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-contrib-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">bf22f1e52cb2a8aaacc1bb887e6758a5c73e0f56</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">36fda0db50c7d743034f9685aa36c69ef26e96ac</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">2bb7a53367d6290520ca77b3b54059b96d73e54b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-docs" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-docs-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">bddb74800410ea4c06bc7b5b30fde00b43fcc11f</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">a3d9b40edfbdbd64aa74fbe3ecac3db996f431b4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e5af55ea2903778f50d721d93c70f5ee9c7f3560</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plperl" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-plperl-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">61337e67a8738fafa0004325aed6f301c7ae732d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plpython" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-plpython-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">dc364b71d69ef21c93aa0d3e47145a205ecbcebf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-pltcl" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-pltcl-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6d852b9ff60abb95a8b77b59a1ff787a7cae0c4d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-server" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-server-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">1fcce3936a27279acc29c3c4269aaf87896cabe5</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">e2e4e378702a057da09de185da073f742d3a16c3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">360345bdff1478b1bdf702559d2db6d1a02dc2ce</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-test" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-test-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">968753e1c0f53c5e2b835c7583e92c3850a72da2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-upgrade" release="9.el7_9.tuxcare.els1" src="postgresql-9.2.24-9.el7_9.tuxcare.els1.src.rpm" version="9.2.24">
          <filename>postgresql-upgrade-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">44d819a1f3031a0342654b8f13a51c70d1a688f7</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1712837970</id>
    <title>Update of microcode_ctl</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Moved tuxcare patches from 2:2.1-73.16.tuxcare.els1
  - gen_update2.py was updated to output strings having restricted length
  - Update Intel CPU microcode to microcode-20231114 release (it's the same
    as microcode-20231009)
- Update vendor patches</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Moved tuxcare patches from 2:2.1-73.16.tuxcare.els1
  - gen_update2.py was updated to output strings having restricted length
  - Update Intel CPU microcode to microcode-20231114 release (it's the same
    as microcode-20231009)
- Update vendor patches</summary>
    <pushcount>0</pushcount>
    <issued date="2024-04-11 12:19:33 UTC" />
    <updated date="2024-04-11 12:19:33 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1712837970.html" id="CLSA-2024:1712837970" title="CLSA-2024:1712837970" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="microcode_ctl" release="73.20.el7_9.tuxcare.els1" src="microcode_ctl-2.1-73.20.el7_9.tuxcare.els1.src.rpm" version="2.1">
          <filename>microcode_ctl-2.1-73.20.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">2968ff12bf5463499feffba75cc00765fcb19137</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1713346166</id>
    <title>ImageMagick: Fix of 6 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fix CVE-2022-32546 integer overflow at at coders/pcl.c.
- Fix CVE-2022-32545 outside the range of representable values at coders/psd.c.
- Fix CVE-2022-32547 misaligned address at MagickCore/property.c.
- Fix CVE-2021-20312 integer overflow in WriteTHUMBNAILImage of
  coders/thumbnail.c
- Fix CVE-2021-20313 cipher leak when the calculate signatures in
  TransformSignature
- Fix CVE-2021-20309 division by zero in WaveImage() of
  MagickCore/visual-effects.c</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fix CVE-2022-32546 integer overflow at at coders/pcl.c.
- Fix CVE-2022-32545 outside the range of representable values at coders/psd.c.
- Fix CVE-2022-32547 misaligned address at MagickCore/property.c.
- Fix CVE-2021-20312 integer overflow in WriteTHUMBNAILImage of
  coders/thumbnail.c
- Fix CVE-2021-20313 cipher leak when the calculate signatures in
  TransformSignature
- Fix CVE-2021-20309 division by zero in WaveImage() of
  MagickCore/visual-effects.c</summary>
    <pushcount>0</pushcount>
    <issued date="2024-04-17 09:29:35 UTC" />
    <updated date="2024-04-17 09:29:35 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1713346166.html" id="CLSA-2024:1713346166" title="CLSA-2024:1713346166" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">5fe3b81a5a7ee28d8472964012617a58dbee8bf0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9235765fa65752abf92bdbf3392a78dc971991ba</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">96fcda33d48f4e19e5efd90edd38b2f544554d75</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e5c1b098d6895794e3e515c771429d88a5b3e5a0</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">2c0ea801fe3c20eef3444ec6d24077c693d2247a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">991055e162ec215c750391ded96091afbbd5abc1</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">dd64086e72c9db91c2cdf0027252e1ec41a19b69</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">37edd04e2d33299e0bd518508e1fdd67d8e37cd1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">550f342a9eb1515cc21d8ccfcdc78c928555f9b6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.el7_9.tuxcare.els1" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els1.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9cc158239b154aeff9b4cf14fc1759d91353b419</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1713370315</id>
    <title>sudo: Fix of CVE-2023-42465</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-42465: Make sudo less vulnerable to ROWHAMMER attacks</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-42465: Make sudo less vulnerable to ROWHAMMER attacks</summary>
    <pushcount>0</pushcount>
    <issued date="2024-04-17 16:13:07 UTC" />
    <updated date="2024-04-17 16:13:07 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1713370315.html" id="CLSA-2024:1713370315" title="CLSA-2024:1713370315" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="sudo" release="10.el7_9.3.tuxcare.els2" src="sudo-1.8.23-10.el7_9.3.tuxcare.els2.src.rpm" version="1.8.23">
          <filename>sudo-1.8.23-10.el7_9.3.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">8b3e85faf7348cfa36a834edcab6283bf7e7c9ec</sum>
        </package>
        <package arch="i686" epoch="0" name="sudo-devel" release="10.el7_9.3.tuxcare.els2" src="sudo-1.8.23-10.el7_9.3.tuxcare.els2.src.rpm" version="1.8.23">
          <filename>sudo-devel-1.8.23-10.el7_9.3.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">a8d99655786b25d792adb15dc1f8e4eb43f6de26</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sudo-devel" release="10.el7_9.3.tuxcare.els2" src="sudo-1.8.23-10.el7_9.3.tuxcare.els2.src.rpm" version="1.8.23">
          <filename>sudo-devel-1.8.23-10.el7_9.3.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">e4f75670e7026f60c5151d099e338aef2ad3d57a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1714065925</id>
    <title>less: Fix of CVE-2022-48624</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fix CVE-2022-48624: filename.c (close_altfile): before 606 omits shell_quote
  calls for LESSCLOSE.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fix CVE-2022-48624: filename.c (close_altfile): before 606 omits shell_quote
  calls for LESSCLOSE.</summary>
    <pushcount>0</pushcount>
    <issued date="2024-04-25 17:25:27 UTC" />
    <updated date="2024-04-25 17:25:27 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1714065925.html" id="CLSA-2024:1714065925" title="CLSA-2024:1714065925" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="less" release="9.el7.tuxcare.els1" src="less-458-9.el7.tuxcare.els1.src.rpm" version="458">
          <filename>less-458-9.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4fbff308afca970560968b956a02cf0bd2d8a335</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1714728645</id>
    <title>git: Fix of CVE-2023-23946</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-23946: apply - fix writing behind newly created symbolic links</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-23946: apply - fix writing behind newly created symbolic links</summary>
    <pushcount>0</pushcount>
    <issued date="2024-05-03 09:30:48 UTC" />
    <updated date="2024-05-03 09:30:48 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1714728645.html" id="CLSA-2024:1714728645" title="CLSA-2024:1714728645" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="emacs-git" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>emacs-git-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">699cf41ee5ed67b61ee68d1a3c9068f6a6da6d48</sum>
        </package>
        <package arch="noarch" epoch="0" name="emacs-git-el" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>emacs-git-el-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">e0170f3cd1bd4ab2219e5d3a093f44b3c958a521</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-1.8.3.1-25.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">b3385033c7fd58d4907204536a10d441e1342b73</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-all" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-all-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">76831172dc99f3433b39d526928006436949adf2</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-bzr" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-bzr-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">4217a7f70c79dce080984b9e2df09f7267976288</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-cvs" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-cvs-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">041c2178ff70ef65ee3348c7a029d0629cddc679</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-daemon" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-daemon-1.8.3.1-25.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">bc63824a57c53ac281c822a9e5e16cdffaddbe20</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-email" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-email-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">a65fab1ce7a93c7258312b7c8c3e8fc07c7853a8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-gnome-keyring" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-gnome-keyring-1.8.3.1-25.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">b5d07f8df2825c5d7292454168101cbe202aef5c</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-gui" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-gui-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">83b0c8a1150951a9a568deaf4cda67df1fa26409</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-hg" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-hg-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">a0b16ba7a555c126b69588ca53249b9f9170eb15</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-instaweb" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-instaweb-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">959e2a527d8927c47620486d9e945679c828c91f</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-p4" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-p4-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">b8ef854bbdb29161d5a1dda68965c179b6101367</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-svn" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>git-svn-1.8.3.1-25.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">3129a0da7305ed9ee70132163cc1c927ac0da125</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitk" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>gitk-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">76dc3c8613b63df77c50cb4209147b9f66836009</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitweb" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>gitweb-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">5e365c81cabb54e23af1ae59b41662b505506647</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>perl-Git-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">73be34895c406d197c73cc1e25e97abae6822fcb</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git-SVN" release="25.el7_9.tuxcare.els2" src="git-1.8.3.1-25.el7_9.tuxcare.els2.src.rpm" version="1.8.3.1">
          <filename>perl-Git-SVN-1.8.3.1-25.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">d9084186acbe1bdbb9d37b2e4056a035ade8dad2</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1715280815</id>
    <title>nginx: Fix of CVE-2023-44487</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-44487: HTTP/2: per-iteration stream handling limit</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-44487: HTTP/2: per-iteration stream handling limit</summary>
    <pushcount>0</pushcount>
    <issued date="2024-05-09 18:53:38 UTC" />
    <updated date="2024-05-09 18:53:38 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1715280815.html" id="CLSA-2024:1715280815" title="CLSA-2024:1715280815" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="nginx" release="10.el7.tuxcare.els1" src="nginx-1.20.1-10.el7.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>nginx-1.20.1-10.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f42bb4e3e477d8b9ede1ad34f100a0ba4bcf00d5</sum>
        </package>
        <package arch="noarch" epoch="1" name="nginx-all-modules" release="10.el7.tuxcare.els1" src="nginx-1.20.1-10.el7.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>nginx-all-modules-1.20.1-10.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">926e9f1faa14ac0ec8c05e2aab693bf42707b1d1</sum>
        </package>
        <package arch="noarch" epoch="1" name="nginx-filesystem" release="10.el7.tuxcare.els1" src="nginx-1.20.1-10.el7.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>nginx-filesystem-1.20.1-10.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">4a0593fc8dd4698a52848d8c8993c4bd5efa1ae9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="nginx-mod-devel" release="10.el7.tuxcare.els1" src="nginx-1.20.1-10.el7.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>nginx-mod-devel-1.20.1-10.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">43dc00dc9376b8ce207ab6907c594b4ef42cd7e6</sum>
        </package>
        <package arch="x86_64" epoch="1" name="nginx-mod-http-image-filter" release="10.el7.tuxcare.els1" src="nginx-1.20.1-10.el7.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>nginx-mod-http-image-filter-1.20.1-10.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0c4a5fd6ce2f4aa97329e755140a1e77eb23b21e</sum>
        </package>
        <package arch="x86_64" epoch="1" name="nginx-mod-http-perl" release="10.el7.tuxcare.els1" src="nginx-1.20.1-10.el7.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>nginx-mod-http-perl-1.20.1-10.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">91d5447d418b2067e5945749a8c4db42a3b2f8d1</sum>
        </package>
        <package arch="x86_64" epoch="1" name="nginx-mod-http-xslt-filter" release="10.el7.tuxcare.els1" src="nginx-1.20.1-10.el7.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>nginx-mod-http-xslt-filter-1.20.1-10.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8034ea1c40309b87305212e4398a5fd3f7f34e3e</sum>
        </package>
        <package arch="x86_64" epoch="1" name="nginx-mod-mail" release="10.el7.tuxcare.els1" src="nginx-1.20.1-10.el7.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>nginx-mod-mail-1.20.1-10.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ada6be64de13a5ddbab5815327cb4b896c2bc953</sum>
        </package>
        <package arch="x86_64" epoch="1" name="nginx-mod-stream" release="10.el7.tuxcare.els1" src="nginx-1.20.1-10.el7.tuxcare.els1.src.rpm" version="1.20.1">
          <filename>nginx-mod-stream-1.20.1-10.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ae67ce5506124f82cb0ecf8dfd5148a4774c9bef</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1715672666</id>
    <title>less: Fix of CVE-2024-32487</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-32487: filename.c: quoting mishandling.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-32487: filename.c: quoting mishandling.</summary>
    <pushcount>0</pushcount>
    <issued date="2024-05-14 07:44:29 UTC" />
    <updated date="2024-05-14 07:44:29 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1715672666.html" id="CLSA-2024:1715672666" title="CLSA-2024:1715672666" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="less" release="9.el7.tuxcare.els2" src="less-458-9.el7.tuxcare.els2.src.rpm" version="458">
          <filename>less-458-9.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">b6280046e0ec97a5bf14e0b7c6d2a18a4b939d11</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1716272110</id>
    <title>ncurses: Fix of CVE-2023-50495</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-50495: check return value of _nc_save_str() (from upstream patch 20230424),
  add validity checks in _nc_parse_entry() (from upstream patch 20170826)</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-50495: check return value of _nc_save_str() (from upstream patch 20230424),
  add validity checks in _nc_parse_entry() (from upstream patch 20170826)</summary>
    <pushcount>0</pushcount>
    <issued date="2024-05-21 09:53:22 UTC" />
    <updated date="2024-05-21 09:53:22 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1716272110.html" id="CLSA-2024:1716272110" title="CLSA-2024:1716272110" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="ncurses" release="14.20130511.el7_4.tuxcare.els2" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els2.src.rpm" version="5.9">
          <filename>ncurses-5.9-14.20130511.el7_4.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">62da4d76d3d0255f30a781e37211e347a3a6fe83</sum>
        </package>
        <package arch="noarch" epoch="0" name="ncurses-base" release="14.20130511.el7_4.tuxcare.els2" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els2.src.rpm" version="5.9">
          <filename>ncurses-base-5.9-14.20130511.el7_4.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">f12427206b4b266c4803cccf782b94708484bafa</sum>
        </package>
        <package arch="i686" epoch="0" name="ncurses-devel" release="14.20130511.el7_4.tuxcare.els2" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els2.src.rpm" version="5.9">
          <filename>ncurses-devel-5.9-14.20130511.el7_4.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">047bf5e1b38b1d905c66332c1ccc8d73575181ed</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ncurses-devel" release="14.20130511.el7_4.tuxcare.els2" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els2.src.rpm" version="5.9">
          <filename>ncurses-devel-5.9-14.20130511.el7_4.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">311398d91ca74bd0125c65954109859eda5f369b</sum>
        </package>
        <package arch="i686" epoch="0" name="ncurses-libs" release="14.20130511.el7_4.tuxcare.els2" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els2.src.rpm" version="5.9">
          <filename>ncurses-libs-5.9-14.20130511.el7_4.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">0274920e98a1a5a8d60f4cf6ce96ff6b49088fd6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ncurses-libs" release="14.20130511.el7_4.tuxcare.els2" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els2.src.rpm" version="5.9">
          <filename>ncurses-libs-5.9-14.20130511.el7_4.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">1fe84404373c7b74c08978a584387e55fa391ea0</sum>
        </package>
        <package arch="i686" epoch="0" name="ncurses-static" release="14.20130511.el7_4.tuxcare.els2" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els2.src.rpm" version="5.9">
          <filename>ncurses-static-5.9-14.20130511.el7_4.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">70894de7987dc6f625bd26300d5a1ebcfec962a6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ncurses-static" release="14.20130511.el7_4.tuxcare.els2" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els2.src.rpm" version="5.9">
          <filename>ncurses-static-5.9-14.20130511.el7_4.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">031d03f88166dce885c2e342085aa3402ee1b162</sum>
        </package>
        <package arch="noarch" epoch="0" name="ncurses-term" release="14.20130511.el7_4.tuxcare.els2" src="ncurses-5.9-14.20130511.el7_4.tuxcare.els2.src.rpm" version="5.9">
          <filename>ncurses-term-5.9-14.20130511.el7_4.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha">48b0125355b2d8c5d69a3c8345c3295e908bf0b9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1716915845</id>
    <title>java-1.8.0-openjdk: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to shenandoah-jdk8u412-b08. That fixes the following CVEs:
- CVE-2024-21011: Denial of service due to long Exception message logging
- CVE-2024-21085: Pack200 excessive memory allocation
- CVE-2024-21068: Integer overflow in C1 compiler address generation
- CVE-2024-21094: Unauthorized data modification due to C2 compilation failure
  with "Exceeded _node_regs array"</description>
    <severity>Low</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to shenandoah-jdk8u412-b08. That fixes the following CVEs:
- CVE-2024-21011: Denial of service due to long Exception message logging
- CVE-2024-21085: Pack200 excessive memory allocation
- CVE-2024-21068: Integer overflow in C1 compiler address generation
- CVE-2024-21094: Unauthorized data modification due to C2 compilation failure
  with "Exceeded _node_regs array"</summary>
    <pushcount>0</pushcount>
    <issued date="2024-05-28 17:04:08 UTC" />
    <updated date="2024-05-28 17:04:08 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1716915845.html" id="CLSA-2024:1716915845" title="CLSA-2024:1716915845" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">01a40997ec803cfed5078c069caca1fd77846743</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">cf2c83051d60bc8c3f2cbfcb67e050b61760b5e1</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">db2a5bd41f466e869352702d82136cc6c0f01942</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">809bf03efacc328ca2b8e4ad1ffb8f56add94ef9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">32d81a0bc78d8348d2880d0acbd8eadc0ae2b2e4</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-debug-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f78ef6b81dab8db24285cacd79f402f7dd87e626</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">149c1c6df547d3382a91f64c98be1945f9d80c4a</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">55964626aa0983cccf5d5543b739b5cf9030b313</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-demo-debug-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">60583830f47e97e8c33c9b52d4861b604edf8911</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">7d650ab1a51509ef202b3057931ef188c17c841f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">fba589c98ea9254c46440da41809d3d773ebcd4f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-devel-debug-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7686958c6aa79ec46c85927c85f033804a2f7d72</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">b84547052b5e4e6ab79f5ec1eae4c09b02709ae8</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">82a40eea13104ddefa1e28d56eb42967ade10908</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-headless-debug-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">38f6de46e7b423a7f6aab2868976ec67c69098dc</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">f8642a3515383df2590594e025dc7fed2ab130a9</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.412.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">035dbfca6805e4c942920f7e36b5edf0788c5ccd</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">24bf700f119a22e53e3fab1f30584a98cf6ec6b7</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.412.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">3df0ba4587197f4e4e705eba95c93e4fcd233c65</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">6ad45bb2926765910190b23f969448a7744f8e91</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4d91a7a4820ff295662f318fb4043b83d24a3e40</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.412.b08">
          <filename>java-1.8.0-openjdk-src-debug-1.8.0.412.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">dfe1ea054b53af7a05fea127fdf61a43935b69b4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1716916085</id>
    <title>tomcat: Fix of CVE-2021-25329</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-25329: use consistent approach for sub-directory checking
- Fix javadoc build</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-25329: use consistent approach for sub-directory checking
- Fix javadoc build</summary>
    <pushcount>0</pushcount>
    <issued date="2024-05-28 17:08:07 UTC" />
    <updated date="2024-05-28 17:08:07 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1716916085.html" id="CLSA-2024:1716916085" title="CLSA-2024:1716916085" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="tomcat" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">3078c616f8d0ede897376d2a378ecebc45e20401</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-admin-webapps" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-admin-webapps-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">4bf0e3cab6883186ddbb6fef3586ac3a3f0753e8</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-docs-webapp" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-docs-webapp-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">04edc3114db44469b410d22b77d05cb3f3bdae2c</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-el-2.2-api" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-el-2.2-api-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">9f6afc7a11e61385051ba5de1cb98f3a9457ffb0</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-javadoc" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-javadoc-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">c1227d16084cc3f1363dde6ddd1af46850d07187</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-jsp-2.2-api" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-jsp-2.2-api-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">816af47712dc4137b377a3c4ea96d1d5e92544fd</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-jsvc" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-jsvc-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">9756f68eb34382a2b7748cbcd0ac07c906f3e582</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-lib" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-lib-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">6b153b839b3a59cf2cb018329c91f0d7e47151ba</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-servlet-3.0-api" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-servlet-3.0-api-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">06efec8109227d7d24a57b345ab6266a0e0db066</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-webapps" release="16.el7_9.tuxcare.els1" src="tomcat-7.0.76-16.el7_9.tuxcare.els1.src.rpm" version="7.0.76">
          <filename>tomcat-webapps-7.0.76-16.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">f5a2bf76bb6a21eab653fa409d024b1fd4b91a49</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1716917767</id>
    <title>unzip: Fix of CVE-2022-0530</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-0530: possible flaw occurance during the conversion of a wide string to a local string</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-0530: possible flaw occurance during the conversion of a wide string to a local string</summary>
    <pushcount>0</pushcount>
    <issued date="2024-05-28 17:36:24 UTC" />
    <updated date="2024-05-28 17:36:24 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1716917767.html" id="CLSA-2024:1716917767" title="CLSA-2024:1716917767" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="unzip" release="24.el7_9.tuxcare.els1" src="unzip-6.0-24.el7_9.tuxcare.els1.src.rpm" version="6.0">
          <filename>unzip-6.0-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">1c09d3953d00a66e6c5246d4db4c6056f77af220</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1717139314</id>
    <title>bind: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Moved tuxcare patches from 32:9.11.4-26.P2.14
- CVE-2023-50387: Resolved CPU exhaustion from specially crafted DNSSEC-signed
  zone responses
- CVE-2023-50868: Resolved CPU exhaustion from DNSSEC-signed zones using NSEC3</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Moved tuxcare patches from 32:9.11.4-26.P2.14
- CVE-2023-50387: Resolved CPU exhaustion from specially crafted DNSSEC-signed
  zone responses
- CVE-2023-50868: Resolved CPU exhaustion from DNSSEC-signed zones using NSEC3</summary>
    <pushcount>0</pushcount>
    <issued date="2024-05-31 07:08:36 UTC" />
    <updated date="2024-05-31 07:08:36 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1717139314.html" id="CLSA-2024:1717139314" title="CLSA-2024:1717139314" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="33" name="bind" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e5f1b69cc89c32ca54094de0c27f3143b1f50905</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-chroot" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7e06fd45f46711feb7eb878ecb131c28cfdd69cd</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-devel" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.15.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">b557fb6186f808831e0ee2b4564c56613c952289</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-devel" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">396c413043586924d4397fb249d5fae341515721</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-devel" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.15.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">cbdb68c4afa94cc1fa41d1f59c632892808a30c7</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-devel" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">dad8067eb8535c67b50819782ccd4629b789a66b</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-libs" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.15.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">50d0f630fc403f45889da1b193f2e81a84bf7cca</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-libs" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">01a4a51901b54553d8822a4b01933b3f40f55be6</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.15.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">7269e90f38a4715abfba4b061f1f5e59b1d58bc2</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">5e70cc46ecb7383e5daa67b3733ed195fce84fb4</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.15.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">d89873efc6024da5e11035c3cb9ab2b3390fcaed</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6949bb222e965424111b0e16f2ae8c4028596069</sum>
        </package>
        <package arch="noarch" epoch="33" name="bind-license" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7_9.15.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">e0136c765163f7c21fcbb12274d32eb58ae4cef0</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.15.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">bd933c8c41d686ed592974a79a4bdc12b055a5a4</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">63d2ea0cb2ad8b584677bd198a6b4047af5f934c</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">1bae7ebd15d1c2ad9afd7329e117e28ca036e400</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.15.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">b8e08c0a555bbe9db9a0923bb8d290ec8fa92d15</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b4cef18705fefbc0c9657c5b375e59a61d5dd839</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.15.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">f4fcfdad2c3b865e49f3699cfc98569c1b9f8944</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a307fa4b38250aca01434cd99425dba2d1bd3abc</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-utils" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">1dea6f31bea11f97a41ced8d7e3a9246da86ff9e</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">bb8ec89fff6dd321281c5ff6d33cd6eb4eb5e828</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb-chroot" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a52be827e2c005104e4fb423c41e0eac9afa2a2b</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-utils" release="26.P2.el7_9.15.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.15.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7_9.15.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">bb69275e2bce1b62d4639674037cb77a01b0c0ac</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1719925589</id>
    <title>openssl: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent
  command injection
- CVE-2022-2068: c_rehash: Fix file operations to prevent command injection
- Update expired smime certificates
- Add testing using old certificates (sha1) to have both types of
  certificates (sha1, sha256) checked with S/MIME</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent
  command injection
- CVE-2022-2068: c_rehash: Fix file operations to prevent command injection
- Update expired smime certificates
- Add testing using old certificates (sha1) to have both types of
  certificates (sha1, sha256) checked with S/MIME</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-02 13:06:32 UTC" />
    <updated date="2024-07-02 13:06:32 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1719925589.html" id="CLSA-2024:1719925589" title="CLSA-2024:1719925589" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="openssl" release="26.el7_9.tuxcare.els1" src="openssl-1.0.2k-26.el7_9.tuxcare.els1.src.rpm" version="1.0.2k">
          <filename>openssl-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7f66d4f4646a48cf26af75a49ba76037d780455e</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els1" src="openssl-1.0.2k-26.el7_9.tuxcare.els1.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">cc9802a636d98781be9c6f33f884e5a749fbf548</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els1" src="openssl-1.0.2k-26.el7_9.tuxcare.els1.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6c67a5c9104601eddfa402c055accc5d516c5523</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els1" src="openssl-1.0.2k-26.el7_9.tuxcare.els1.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">24a4bf025c9bb221679863f1a7c663f2d2c9fe3a</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els1" src="openssl-1.0.2k-26.el7_9.tuxcare.els1.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">459882a1f8f407d3f97b4de31e623831b6a2bf3f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-perl" release="26.el7_9.tuxcare.els1" src="openssl-1.0.2k-26.el7_9.tuxcare.els1.src.rpm" version="1.0.2k">
          <filename>openssl-perl-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">9040a5628791e15bb864207a25650ad6adaee0ad</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els1" src="openssl-1.0.2k-26.el7_9.tuxcare.els1.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">3bb08bb608d35424f6d7c114f99dac942d358096</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els1" src="openssl-1.0.2k-26.el7_9.tuxcare.els1.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4f5ec557e5c7c5fcada89869de9f5fab20040b94</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1720026957</id>
    <title>openssl: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-0215: bio_ndef: fix a UAF resulting from a bug in BIO_new_NDEF
- CVE-2023-0464: x509v3: Limit X.509 certificate tree size to avoid exponential
  use of computational resources</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-0215: bio_ndef: fix a UAF resulting from a bug in BIO_new_NDEF
- CVE-2023-0464: x509v3: Limit X.509 certificate tree size to avoid exponential
  use of computational resources</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-03 17:16:01 UTC" />
    <updated date="2024-07-03 17:16:01 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1720026957.html" id="CLSA-2024:1720026957" title="CLSA-2024:1720026957" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="openssl" release="26.el7_9.tuxcare.els2" src="openssl-1.0.2k-26.el7_9.tuxcare.els2.src.rpm" version="1.0.2k">
          <filename>openssl-1.0.2k-26.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">446066cf91732dfc6821264f5b7c7e0e83f0bf89</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els2" src="openssl-1.0.2k-26.el7_9.tuxcare.els2.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">37956c84bf4a23b9f95d56504dedabd86c685fb8</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els2" src="openssl-1.0.2k-26.el7_9.tuxcare.els2.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">50f60ebea4c27912d1ecb766a721d8d52193e9f7</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els2" src="openssl-1.0.2k-26.el7_9.tuxcare.els2.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">b984173d2b139d70805899720cf45e9f1c35bf6b</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els2" src="openssl-1.0.2k-26.el7_9.tuxcare.els2.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">7500aa434d331e1539f2e31d1a105c0a07292388</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-perl" release="26.el7_9.tuxcare.els2" src="openssl-1.0.2k-26.el7_9.tuxcare.els2.src.rpm" version="1.0.2k">
          <filename>openssl-perl-1.0.2k-26.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">abfadc09975107ec2c1fa870e71c846d3cabd514</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els2" src="openssl-1.0.2k-26.el7_9.tuxcare.els2.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha">9bdd05ba32da0c717ea1a113d3cbad0c4050250c</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els2" src="openssl-1.0.2k-26.el7_9.tuxcare.els2.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">792e2bc28af1c68b5963c6fe6b32b0eb0496fee6</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1720027216</id>
    <title>glibc: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-3999: getcwd - Set errno to ERANGE for size == 1
- CVE-2021-35942: wordexp - handle overflow in positional parameter number
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create
- CVE-2022-23219: Buffer overflow in sunrpc clnt_create for "unix"</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-3999: getcwd - Set errno to ERANGE for size == 1
- CVE-2021-35942: wordexp - handle overflow in positional parameter number
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create
- CVE-2022-23219: Buffer overflow in sunrpc clnt_create for "unix"</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-03 17:20:19 UTC" />
    <updated date="2024-07-03 17:20:19 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1720027216.html" id="CLSA-2024:1720027216" title="CLSA-2024:1720027216" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="glibc" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-2.17-326.el7_9.3.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">676302747e2b8ff3f37d6abc24173666aaebf386</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-2.17-326.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f65647df3d5736416f626a1b6b8fade0e68e601d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-common" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-common-2.17-326.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8bb15a82e44598b7205875f6b963f0a9647fec45</sum>
        </package>
        <package arch="i686" epoch="0" name="glibc-devel" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-devel-2.17-326.el7_9.3.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">b7dd8f4954b58fef8b10832835aa0b6ffa278808</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-devel" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-devel-2.17-326.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a5a754fb4d00d94201c109a9555269108b93c0d0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-headers" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-headers-2.17-326.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">3ee0b30315148a5b8fd678908237191bfe07dbd9</sum>
        </package>
        <package arch="i686" epoch="0" name="glibc-static" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-static-2.17-326.el7_9.3.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">788348c6c5665f4e9169886e4f203afd636791b9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-static" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-static-2.17-326.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">412cd54726adb18724780ccdd64925cc32c1e9d5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-utils" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-utils-2.17-326.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7a959bb00baf8bf546897172aa352fd8ffe0905c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nscd" release="326.el7_9.3.tuxcare.els1" src="glibc-2.17-326.el7_9.3.tuxcare.els1.src.rpm" version="2.17">
          <filename>nscd-2.17-326.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f736d7631314fe6aaee9cc59371c3fa094051693</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1720178510</id>
    <title>cups: Fix of CVE-2023-4504</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-4504: scan_ps(): check for null terminator after backslash character</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-4504: scan_ps(): check for null terminator after backslash character</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-05 11:21:53 UTC" />
    <updated date="2024-07-05 11:21:53 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1720178510.html" id="CLSA-2024:1720178510" title="CLSA-2024:1720178510" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="cups" release="52.el7_9.tuxcare.els1" src="cups-1.6.3-52.el7_9.tuxcare.els1.src.rpm" version="1.6.3">
          <filename>cups-1.6.3-52.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b44d2acb51a76227acd6ff4c230a1c6d12ff6639</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-client" release="52.el7_9.tuxcare.els1" src="cups-1.6.3-52.el7_9.tuxcare.els1.src.rpm" version="1.6.3">
          <filename>cups-client-1.6.3-52.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a2da278b5009d51eeaaa2f344aef3863caff1678</sum>
        </package>
        <package arch="i686" epoch="1" name="cups-devel" release="52.el7_9.tuxcare.els1" src="cups-1.6.3-52.el7_9.tuxcare.els1.src.rpm" version="1.6.3">
          <filename>cups-devel-1.6.3-52.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">c496cd15a42517a3699d7fa165aee74265a35efe</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-devel" release="52.el7_9.tuxcare.els1" src="cups-1.6.3-52.el7_9.tuxcare.els1.src.rpm" version="1.6.3">
          <filename>cups-devel-1.6.3-52.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">2941c597c2d7b56dc6fd4e4b89ea490ce78658a9</sum>
        </package>
        <package arch="noarch" epoch="1" name="cups-filesystem" release="52.el7_9.tuxcare.els1" src="cups-1.6.3-52.el7_9.tuxcare.els1.src.rpm" version="1.6.3">
          <filename>cups-filesystem-1.6.3-52.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">2591b106c83c4cf3060e59c5e8cc17d3a9addfd2</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-ipptool" release="52.el7_9.tuxcare.els1" src="cups-1.6.3-52.el7_9.tuxcare.els1.src.rpm" version="1.6.3">
          <filename>cups-ipptool-1.6.3-52.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e8b406f32d8386ce757e01cf7d8945dde8627dde</sum>
        </package>
        <package arch="i686" epoch="1" name="cups-libs" release="52.el7_9.tuxcare.els1" src="cups-1.6.3-52.el7_9.tuxcare.els1.src.rpm" version="1.6.3">
          <filename>cups-libs-1.6.3-52.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">160c6b4008cf92a520a8f56070aebc432cf45ae9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-libs" release="52.el7_9.tuxcare.els1" src="cups-1.6.3-52.el7_9.tuxcare.els1.src.rpm" version="1.6.3">
          <filename>cups-libs-1.6.3-52.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0a55bbd92f7d37012d329d27f5572ba5176be533</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-lpd" release="52.el7_9.tuxcare.els1" src="cups-1.6.3-52.el7_9.tuxcare.els1.src.rpm" version="1.6.3">
          <filename>cups-lpd-1.6.3-52.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">de55c456d078e8b5a666d02264a5613f7f600822</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1720179161</id>
    <title>dnsmasq: Fix of CVE-2023-28450</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- change EDNS.0 UDP packet size from 4096 to 1232
- CVE-2023-28450</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- change EDNS.0 UDP packet size from 4096 to 1232
- CVE-2023-28450</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-05 11:32:44 UTC" />
    <updated date="2024-07-05 11:32:44 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1720179161.html" id="CLSA-2024:1720179161" title="CLSA-2024:1720179161" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="dnsmasq" release="17.el7_9.3.tuxcare.els1" src="dnsmasq-2.76-17.el7_9.3.tuxcare.els1.src.rpm" version="2.76">
          <filename>dnsmasq-2.76-17.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">2096e319d77a415176a78c9f0e9cda11ddadfd32</sum>
        </package>
        <package arch="x86_64" epoch="0" name="dnsmasq-utils" release="17.el7_9.3.tuxcare.els1" src="dnsmasq-2.76-17.el7_9.3.tuxcare.els1.src.rpm" version="2.76">
          <filename>dnsmasq-utils-2.76-17.el7_9.3.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">1ebad9d7e39a6cf9f2fd1fd2bd160b2cd8ac7634</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1720468480</id>
    <title>kernel: Fix of 89 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- kvm: initialize all of the kvm_debugregs structure before sending it to userspace {CVE-2023-1513}
- wifi: mac80211: fix MBSSID parsing use-after-free {CVE-2022-42719}
- mac80211: always allocate struct ieee802_11_elems {CVE-2022-42719}
- netfilter: nf_tables: initialize registers in nft_do_chain() {CVE-2022-1016}
- xprtrdma: fix incorrect header size calculations {CVE-2022-0812}
- net: usb: fix memory leak in smsc75xx_bind {CVE-2021-47171}
- i2c: i801: Don't generate an interrupt on bus reset {CVE-2021-47153}
- pid: take a reference when initializing `cad_pid` {CVE-2021-47118}
- Input: appletouch - initialize work before device registration {CVE-2021-46932}
- HID: usbhid: fix info leak in hid_submit_ctrl {CVE-2021-46906}
- quota: check block number when reading the block in quota file {CVE-2021-45868}
- mwifiex: Fix skb_over_panic in mwifiex_usb_recv() {CVE-2021-43976}
- atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait {CVE-2021-43975}
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound {CVE-2021-43389}
- usb: hso: fix error handling code of hso_create_net_device {CVE-2021-37159}
- can: bcm: fix infoleak in struct bcm_msg_head {CVE-2021-34693}
- dm ioctl: fix out of bounds array access when no devices {CVE-2021-31916}
- KVM: x86: hyper-v: Fix Hyper-V context null-ptr-deref {CVE-2021-30178}
- perf/x86/intel: Fix a crash caused by zero PEBS status {CVE-2021-28971}
- btrfs: fix race when cloning extent buffer during rewind of an old root {CVE-2021-28964}
- ovl: fix missing negative dentry check in ovl_rename() {CVE-2021-20321}
- drm/ttm/nouveau: don't call tt destroy callback on alloc failure. {CVE-2021-20292}
- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() {CVE-2021-4159}
- btrfs: unlock newly allocated extent buffer after error {CVE-2021-4149}
- tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop. {CVE-2021-3679}
- net: mac802154: Fix general protection fault {CVE-2021-3659}
- nfsd4: readdirplus shouldn't return parent of export {CVE-2021-3178}
- Bluetooth: SMP: Fail if remote and local public keys are identical {CVE-2021-0129}
- drm/nouveau: clean up all clients on device removal {CVE-2020-27820}
- drm/nouveau: Add a dedicated mutex for the clients list {CVE-2020-27820}
- drm/nouveau: use drm_dev_unplug() during device removal {CVE-2020-27820}
- Bluetooth: SMP: Fail if remote and local public keys are identical {CVE-2020-26555}
- vsock: Fix memory leak in vsock_connect() {CVE-2022-3629}
- RDMA/core: Don't infoleak GRH fields {CVE-2021-3923}
- xen/netfront: force data bouncing when backend is untrusted {CVE-2022-33741}
- net: Rename and export copy_skb_header
- floppy: use a statically allocated error counter {CVE-2022-1652}
- fuse: fix pipe buffer lifetime for direct_io {CVE-2022-1011}
- aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts {CVE-2024-26898}
- smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752}
- media: pvrusb2: fix use after free on context disconnection {CVE-2023-52445}
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition {CVE-2023-35824}
- perf: Fix perf_event_validate_size() lockdep splat {CVE-2023-6931}
- perf: Fix perf_event_validate_size() {CVE-2023-6931}
- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- xfs: verify buffer contents when we skip log replay {CVE-2023-2124}
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition {CVE-2023-1989}
- Fix double fget() in vhost_net_set_backend() {CVE-2023-1838}
- net/sched: cls_tcindex: downgrade to imperfect hash {CVE-2023-1829}
- xen/netfront: fix leaking data in shared pages {CVE-2022-33740}
- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path {CVE-2022-28390}
- xen/blkfront: fix leaking data in shared pages {CVE-2022-26365}
- mISDN: fix use-after-free bugs in l1oip timer handlers {CVE-2022-3565}
- drm/vgem: Close use-after-free race in vgem_gem_create {CVE-2022-1419}
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type {CVE-2021-47194}
- net: fix use-after-free in tw_timer_handler {CVE-2021-46936}
- ext4: fix race writing to an inline_data file while its xattrs are changing {CVE-2021-40490}
- virtio_console: Assure used length from device is limited {CVE-2021-38160}
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() {CVE-2021-4157}
- Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg() {CVE-2021-3640}
- Input: joydev - prevent use of not validated data in JSIOCSBTNMAP ioctl {CVE-2021-3612}
- Input: joydev - prevent potential read overflow in ioctl {CVE-2021-3612}
- can: bcm: delay release of struct bcm_op after synchronize_rcu() {CVE-2021-3609}
- vt: keyboard: avoid signed integer overflow in k_ascii {CVE-2020-13974}
- i2c: Fix a potential use after free {CVE-2019-25162}
- drivers: net: slip: fix NPD bug in sl_tx_timeout() {CVE-2022-41858}
- Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934}
- btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() {CVE-2023-3111}
- memstick: r592: Fix UAF bug in r592_remove due to race condition {CVE-2023-3141}
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() {CVE-2023-1118}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380}
- tcp: Fix data races around icsk-&gt;icsk_af_ops. {CVE-2022-3566}
- staging: rtl8712: fix use after free bugs {CVE-2022-4095}
- ext4: fix kernel infoleak via ext4_extent_header {CVE-2022-0850}
- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register {CVE-2022-1353}
- misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os {CVE-2022-3424}
- x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit {CVE-2022-25265}
- x86/elf: Split READ_IMPLIES_EXEC from executable PT_GNU_STACK {CVE-2022-25265}
- x86/elf: Add table to document READ_IMPLIES_EXEC {CVE-2022-25265}
- ipv6: use prandom_u32() for ID generation {CVE-2021-45485}
- bpf: Fix integer overflow in prealloc_elems_and_freelist() {CVE-2021-41864}
- ipv4: make exception cache less predictible {CVE-2021-20322}
- ipv4: use siphash instead of Jenkins in fnhe_hashfun() {CVE-2021-20322}
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() {CVE-2023-4387}
- netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one {CVE-2023-39197}
- ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932}
- smb: client: fix potential OOB in smb2_dump_detail() {CVE-2023-6610}
- smb: client: fix OOB in smbCalcSize() {CVE-2023-6606}
- atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780}
- drm/amdgpu: Fix potential fence use-after-free v2 {CVE-2023-51042}
- sched/rt: pick_next_rt_entity(): check list_entry {CVE-2023-1077}
- ath9k: fix use-after-free in ath9k_hif_usb_rx_cb {CVE-2022-1679}
- net: prevent mss overflow in skb_segment() {CVE-2023-52435}
- drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-42753}
- debug: Lock down kgdb {CVE-2022-21499}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- kvm: initialize all of the kvm_debugregs structure before sending it to userspace {CVE-2023-1513}
- wifi: mac80211: fix MBSSID parsing use-after-free {CVE-2022-42719}
- mac80211: always allocate struct ieee802_11_elems {CVE-2022-42719}
- netfilter: nf_tables: initialize registers in nft_do_chain() {CVE-2022-1016}
- xprtrdma: fix incorrect header size calculations {CVE-2022-0812}
- net: usb: fix memory leak in smsc75xx_bind {CVE-2021-47171}
- i2c: i801: Don't generate an interrupt on bus reset {CVE-2021-47153}
- pid: take a reference when initializing `cad_pid` {CVE-2021-47118}
- Input: appletouch - initialize work before device registration {CVE-2021-46932}
- HID: usbhid: fix info leak in hid_submit_ctrl {CVE-2021-46906}
- quota: check block number when reading the block in quota file {CVE-2021-45868}
- mwifiex: Fix skb_over_panic in mwifiex_usb_recv() {CVE-2021-43976}
- atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait {CVE-2021-43975}
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound {CVE-2021-43389}
- usb: hso: fix error handling code of hso_create_net_device {CVE-2021-37159}
- can: bcm: fix infoleak in struct bcm_msg_head {CVE-2021-34693}
- dm ioctl: fix out of bounds array access when no devices {CVE-2021-31916}
- KVM: x86: hyper-v: Fix Hyper-V context null-ptr-deref {CVE-2021-30178}
- perf/x86/intel: Fix a crash caused by zero PEBS status {CVE-2021-28971}
- btrfs: fix race when cloning extent buffer during rewind of an old root {CVE-2021-28964}
- ovl: fix missing negative dentry check in ovl_rename() {CVE-2021-20321}
- drm/ttm/nouveau: don't call tt destroy callback on alloc failure. {CVE-2021-20292}
- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() {CVE-2021-4159}
- btrfs: unlock newly allocated extent buffer after error {CVE-2021-4149}
- tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop. {CVE-2021-3679}
- net: mac802154: Fix general protection fault {CVE-2021-3659}
- nfsd4: readdirplus shouldn't return parent of export {CVE-2021-3178}
- Bluetooth: SMP: Fail if remote and local public keys are identical {CVE-2021-0129}
- drm/nouveau: clean up all clients on device removal {CVE-2020-27820}
- drm/nouveau: Add a dedicated mutex for the clients list {CVE-2020-27820}
- drm/nouveau: use drm_dev_unplug() during device removal {CVE-2020-27820}
- Bluetooth: SMP: Fail if remote and local public keys are identical {CVE-2020-26555}
- vsock: Fix memory leak in vsock_connect() {CVE-2022-3629}
- RDMA/core: Don't infoleak GRH fields {CVE-2021-3923}
- xen/netfront: force data bouncing when backend is untrusted {CVE-2022-33741}
- net: Rename and export copy_skb_header
- floppy: use a statically allocated error counter {CVE-2022-1652}
- fuse: fix pipe buffer lifetime for direct_io {CVE-2022-1011}
- aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts {CVE-2024-26898}
- smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752}
- media: pvrusb2: fix use after free on context disconnection {CVE-2023-52445}
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition {CVE-2023-35824}
- perf: Fix perf_event_validate_size() lockdep splat {CVE-2023-6931}
- perf: Fix perf_event_validate_size() {CVE-2023-6931}
- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- xfs: verify buffer contents when we skip log replay {CVE-2023-2124}
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition {CVE-2023-1989}
- Fix double fget() in vhost_net_set_backend() {CVE-2023-1838}
- net/sched: cls_tcindex: downgrade to imperfect hash {CVE-2023-1829}
- xen/netfront: fix leaking data in shared pages {CVE-2022-33740}
- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path {CVE-2022-28390}
- xen/blkfront: fix leaking data in shared pages {CVE-2022-26365}
- mISDN: fix use-after-free bugs in l1oip timer handlers {CVE-2022-3565}
- drm/vgem: Close use-after-free race in vgem_gem_create {CVE-2022-1419}
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type {CVE-2021-47194}
- net: fix use-after-free in tw_timer_handler {CVE-2021-46936}
- ext4: fix race writing to an inline_data file while its xattrs are changing {CVE-2021-40490}
- virtio_console: Assure used length from device is limited {CVE-2021-38160}
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() {CVE-2021-4157}
- Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg() {CVE-2021-3640}
- Input: joydev - prevent use of not validated data in JSIOCSBTNMAP ioctl {CVE-2021-3612}
- Input: joydev - prevent potential read overflow in ioctl {CVE-2021-3612}
- can: bcm: delay release of struct bcm_op after synchronize_rcu() {CVE-2021-3609}
- vt: keyboard: avoid signed integer overflow in k_ascii {CVE-2020-13974}
- i2c: Fix a potential use after free {CVE-2019-25162}
- drivers: net: slip: fix NPD bug in sl_tx_timeout() {CVE-2022-41858}
- Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934}
- btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() {CVE-2023-3111}
- memstick: r592: Fix UAF bug in r592_remove due to race condition {CVE-2023-3141}
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() {CVE-2023-1118}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380}
- tcp: Fix data races around icsk-&gt;icsk_af_ops. {CVE-2022-3566}
- staging: rtl8712: fix use after free bugs {CVE-2022-4095}
- ext4: fix kernel infoleak via ext4_extent_header {CVE-2022-0850}
- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register {CVE-2022-1353}
- misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os {CVE-2022-3424}
- x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit {CVE-2022-25265}
- x86/elf: Split READ_IMPLIES_EXEC from executable PT_GNU_STACK {CVE-2022-25265}
- x86/elf: Add table to document READ_IMPLIES_EXEC {CVE-2022-25265}
- ipv6: use prandom_u32() for ID generation {CVE-2021-45485}
- bpf: Fix integer overflow in prealloc_elems_and_freelist() {CVE-2021-41864}
- ipv4: make exception cache less predictible {CVE-2021-20322}
- ipv4: use siphash instead of Jenkins in fnhe_hashfun() {CVE-2021-20322}
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() {CVE-2023-4387}
- netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one {CVE-2023-39197}
- ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932}
- smb: client: fix potential OOB in smb2_dump_detail() {CVE-2023-6610}
- smb: client: fix OOB in smbCalcSize() {CVE-2023-6606}
- atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780}
- drm/amdgpu: Fix potential fence use-after-free v2 {CVE-2023-51042}
- sched/rt: pick_next_rt_entity(): check list_entry {CVE-2023-1077}
- ath9k: fix use-after-free in ath9k_hif_usb_rx_cb {CVE-2022-1679}
- net: prevent mss overflow in skb_segment() {CVE-2023-52435}
- drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-42753}
- debug: Lock down kgdb {CVE-2022-21499}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-08 20:27:53 UTC" />
    <updated date="2024-07-08 20:27:53 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1720468480.html" id="CLSA-2024:1720468480" title="CLSA-2024:1720468480" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4d2a94ac1691a4d0416227ab227c31ebf6e96630</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">025e7d2dfd1ac9c8f360830992f7eb2f7dcc9827</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">310a4b45a13d497b36e400fc92fabadef08e1b83</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">89153b8660dbe10f1986857007c63ca0edb3172e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">36f4e4e9d29a7cb69d3ef04a461df8db6a89f321</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0d79108bec672e19fdc48e43f48ac29fde010963</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">257b107db14e73272fba29860411762948687279</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b0a49c8f8fffc8317443bd0a82ae5b9db0128475</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">bf6ec6573c44e19fc03cc5725e8d3583a316c748</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">349fdd85419932104a67057f01e63cc2a39606d6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c14a58e001e33bfb0edd6de9a29ee2452ba3ce51</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1720548714</id>
    <title>python3: Fix of CVE-2023-6597</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-6597: prevent tempfile.TemporaryDirectory class dereference symlinks</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-6597: prevent tempfile.TemporaryDirectory class dereference symlinks</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-09 18:11:57 UTC" />
    <updated date="2024-07-09 18:11:57 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1720548714.html" id="CLSA-2024:1720548714" title="CLSA-2024:1720548714" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">a029f8f6dc561cf032f43d5ba6fa1e7222f35681</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">027eda47b0b6a6eb381622aff005a4b533a619e8</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">a0735979cd020c6bb67dee06126a9c9bb03c83dd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">a0ab4edc3862a54c3dbf3cbdc6cc79918072d6d8</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">5da5585510238dad651864ed56292442bb54a919</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">dda9df186b0ea1bf18d886c38088ac7c1351465e</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">714e99af9aca8fb6ebf14264dbffa3ea0a1808c6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">9f186b6ad2f6dbf76060221a4710f2e3c436b8a2</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">185c57154f840161d4075a28aef4275e5bb74bf6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">02a4aec4b5a96df6ddd593ef63b44cfcbe7a88ec</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">af74a638b229a87682f982e6ac1b44bde9962a72</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">85310390b7c5865a57bd5f0f2a10efaca393b828</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha">e79eeb5d8260c8d3a8fbe5c2baf1ad1e09ef02b8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="21.el7_9.tuxcare.els3" src="python3-3.6.8-21.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">e13bccf6b0a4214aeef3016215fca10f0fb6a86f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1720776957</id>
    <title>vim: Fix of 10 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-0054: check the return value of vim_regsub()
- CVE-2023-0049: avoid going over the NUL at the end
- CVE-2023-0288: prevent the cursor from moving to line zero
- CVE-2023-0433: check for not going over the end of the line
- CVE-2023-2610: limit the text length to MAXCOL
- CVE-2023-4750: check buffer is valid before accessing it
- CVE-2023-4733: verify oldwin pointer after reset_VIsual()
- CVE-2023-4751: stop Visual mode when using :ball
- CVE-2023-5344: add NULL at end of buffer
- CVE-2024-22667: pass size of errbuf down the call stack, use snprintf()</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-0054: check the return value of vim_regsub()
- CVE-2023-0049: avoid going over the NUL at the end
- CVE-2023-0288: prevent the cursor from moving to line zero
- CVE-2023-0433: check for not going over the end of the line
- CVE-2023-2610: limit the text length to MAXCOL
- CVE-2023-4750: check buffer is valid before accessing it
- CVE-2023-4733: verify oldwin pointer after reset_VIsual()
- CVE-2023-4751: stop Visual mode when using :ball
- CVE-2023-5344: add NULL at end of buffer
- CVE-2024-22667: pass size of errbuf down the call stack, use snprintf()</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-12 09:36:00 UTC" />
    <updated date="2024-07-12 09:36:00 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1720776957.html" id="CLSA-2024:1720776957" title="CLSA-2024:1720776957" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="vim-X11" release="8.el7_9.tuxcare.els1" src="vim-7.4.629-8.el7_9.tuxcare.els1.src.rpm" version="7.4.629">
          <filename>vim-X11-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f3642e8f9d7253a2b8e2c71993c36d9ec21ff84f</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-common" release="8.el7_9.tuxcare.els1" src="vim-7.4.629-8.el7_9.tuxcare.els1.src.rpm" version="7.4.629">
          <filename>vim-common-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">fc069a7999ace03cd677554130f9b9df62573ecd</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-enhanced" release="8.el7_9.tuxcare.els1" src="vim-7.4.629-8.el7_9.tuxcare.els1.src.rpm" version="7.4.629">
          <filename>vim-enhanced-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ddb6866a85468cfdda27fa12c1e193fb21228162</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-filesystem" release="8.el7_9.tuxcare.els1" src="vim-7.4.629-8.el7_9.tuxcare.els1.src.rpm" version="7.4.629">
          <filename>vim-filesystem-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">5965b9af2a9c899137ce747dd4bf9462bc9502a3</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-minimal" release="8.el7_9.tuxcare.els1" src="vim-7.4.629-8.el7_9.tuxcare.els1.src.rpm" version="7.4.629">
          <filename>vim-minimal-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">abb84fc18498c7336c52bd4828546c6f55ae8422</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1720777265</id>
    <title>Update of linux-firmware</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Repack the linux-firmware to keep tuxcare updates</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Repack the linux-firmware to keep tuxcare updates</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-12 09:41:08 UTC" />
    <updated date="2024-07-12 09:41:08 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1720777265.html" id="CLSA-2024:1720777265" title="CLSA-2024:1720777265" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="iwl100-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="39.31.5.1">
          <filename>iwl100-firmware-39.31.5.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">c39a5a6d92b8eaf2e3fc9f920b408a71aa7487f1</sum>
        </package>
        <package arch="noarch" epoch="1" name="iwl1000-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="39.31.5.1">
          <filename>iwl1000-firmware-39.31.5.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">bb99821f38d64c185555b322b5c32de616cabba6</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl105-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl105-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">7ec589cee2f160d71efc785e319e48ca5477d4f8</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl135-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl135-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">8f4257918cd4b76892facc846e08e2498cd8aba2</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2000-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl2000-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">a24191af0d814e70d85856a3fa52949d1035ac16</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2030-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl2030-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">5d93a5abe1c954e3313b500125962013b8e65eea</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3160-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="25.30.13.0">
          <filename>iwl3160-firmware-25.30.13.0-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">671bf087e156a73df537cb6207dd33197efdc7e7</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3945-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="15.32.2.9">
          <filename>iwl3945-firmware-15.32.2.9-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">c00926d2aa0d0a918f42a67447f89003c8ba49c9</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl4965-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="228.61.2.24">
          <filename>iwl4965-firmware-228.61.2.24-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">daf3a107a2ed2c25f45920da7c0cbc5b0ee0da91</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5000-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="8.83.5.1_1">
          <filename>iwl5000-firmware-8.83.5.1_1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">5611066da63387974a4c48a777bffa6300bc9bf7</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5150-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="8.24.2.2">
          <filename>iwl5150-firmware-8.24.2.2-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">0f8f12d7ef424209d5d088532b649510b7d4cab2</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="9.221.4.1">
          <filename>iwl6000-firmware-9.221.4.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">731c8729abb203b2cf47db1f8f4257f5f44e6596</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2a-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2a-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">5b14755475f6130dca5860182a4d67990c38a8a2</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2b-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2b-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">2125a76c9bfae660527ce2c9cfdb9569f2608bdb</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6050-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="41.28.5.1">
          <filename>iwl6050-firmware-41.28.5.1-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">7559fe2fdbc620db667fb3c8b149faebc01bf3c4</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl7260-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="25.30.13.0">
          <filename>iwl7260-firmware-25.30.13.0-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">114b5de647e4f355c67881b8b45d52db7cfb829b</sum>
        </package>
        <package arch="noarch" epoch="0" name="linux-firmware" release="83.git78c0348.el7_9.tuxcare.els1" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.src.rpm" version="20200421">
          <filename>linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">17e1772d3bfff265888efb841b625d398a33f29f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1720777628</id>
    <title>Update of bind</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Bump the epoch to fix package upgrade</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Bump the epoch to fix package upgrade</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-12 09:47:11 UTC" />
    <updated date="2024-07-12 09:47:11 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1720777628.html" id="CLSA-2024:1720777628" title="CLSA-2024:1720777628" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="33" name="bind" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">620086843e26f2f1d4c10c2b1c110caa775b6d81</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-chroot" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4aec6dcba6ca07df1a069b6a047cf0c616fd6187</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">da1700dc80d1e22985b0f6f46bb68408c8a9e9d6</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">294df42e8ebfab80f494f80f3ad6bfc90b7cf8c4</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">eac02df11e01a71d6baaf4b60720a58c181051c4</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">047bfa000528b78605f1d8b131fd1cc2b944e3e3</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">746fbb92c10ce946725ed079425ddc7bb35d00c0</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">848c21b43b55996007d30d6b2b335bc48be9d488</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">0ef2cf5bdfc64b9c2efefa2291a8342040608480</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">90f499c66c411c7fc48eac0b41d0319c436779b5</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">23dfc29df8b6a178e2714d7abc013bb3f1172219</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">3bfed6e743081f480024e631fea76d38b4116f51</sum>
        </package>
        <package arch="noarch" epoch="33" name="bind-license" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7_9.16.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">1ccca31c19f476cc9db350dd7a77c3f1a3e871f1</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">630a862adb192d0406895f04fc46916b8931fdac</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">3ac9c556cc4b5c66ca05a06a4722fbcefaa608ef</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">f66ee7e7fc5c9a8ee2d62698373c705cfabdaee9</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">6947c16f154c242dcd8be011c6c594db16d523c7</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">c521d66794e34a90ebd705563d1d8e97c7f256bd</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">212fbb39a7e81f84bc59f4d8bd4b5b1862de2958</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">cf32e9ec0e87d538ee7dfd7c34dfb6dba7a7a598</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-utils" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b6a3a1437a01b5b9c6a33bff8cee568ad7fd6779</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b763eff720cbc3ff7b47b42667f64d3bfc65c4fe</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb-chroot" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6977fb6175c8e50ee6e97181579c963d5a1943db</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-utils" release="26.P2.el7_9.16.tuxcare.els1" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els1.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a61d23d1a9f931e2aabb433277b86c075cd0b200</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1721204317</id>
    <title>grub2: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-4692: ntfs: checks to ensure that NTFS drive's sector numbers are never
  written beyond the boundary
- CVE-2023-4693: ntfs: fix an out-of-bounds read flaw on NTFS filesystem driver</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-4692: ntfs: checks to ensure that NTFS drive's sector numbers are never
  written beyond the boundary
- CVE-2023-4693: ntfs: fix an out-of-bounds read flaw on NTFS filesystem driver</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-17 08:20:41 UTC" />
    <updated date="2024-07-17 08:20:41 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1721204317.html" id="CLSA-2024:1721204317" title="CLSA-2024:1721204317" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="grub2" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ecf6e75c8ab00ef2d859c5198e8fb80d84ce7b21</sum>
        </package>
        <package arch="noarch" epoch="1" name="grub2-common" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-common-2.02-0.87.0.2.el7.14.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">512c6cb3ca68d2926dd532c6df16be67fc961edc</sum>
        </package>
        <package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-2.02-0.87.0.2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">a7e6e19511ba0f307f556355113ccc3a841e8eeb</sum>
        </package>
        <package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-cdboot-2.02-0.87.0.2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6620c612835e54728bcf9212bfe9c05a90a3f4a9</sum>
        </package>
        <package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-modules-2.02-0.87.0.2.el7.14.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">05a9eb7d9c0f43034b1821eff6698392ede57d20</sum>
        </package>
        <package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-efi-x64-2.02-0.87.0.2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4a20371ed68d3108f9f0d893859926cd1f5e5461</sum>
        </package>
        <package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-efi-x64-cdboot-2.02-0.87.0.2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">2b573e057f7fb590ef5969a681153e338d933c55</sum>
        </package>
        <package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-efi-x64-modules-2.02-0.87.0.2.el7.14.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">0bc0e9346b95c31a8e1204a9faff18cb2566c378</sum>
        </package>
        <package arch="noarch" epoch="1" name="grub2-i386-modules" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-i386-modules-2.02-0.87.0.2.el7.14.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">d31b7cc00730ac1063a40670205a50e6a7436ee6</sum>
        </package>
        <package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-pc-2.02-0.87.0.2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8bfdd277ae1f880502a38dc1a993338e42654604</sum>
        </package>
        <package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-pc-modules-2.02-0.87.0.2.el7.14.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha">8e49f37fdef1102e7a2331177d2ae382804af7c3</sum>
        </package>
        <package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-tools-2.02-0.87.0.2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8bc13b7156d4e1be215fa6c6dc946dc89ed5b526</sum>
        </package>
        <package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-tools-extra-2.02-0.87.0.2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">20df08eaa11bdf5ad1c45d5f3a044a5aa7c5f83d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.0.2.el7.14.tuxcare.els1" src="grub2-2.02-0.87.0.2.el7.14.tuxcare.els1.src.rpm" version="2.02">
          <filename>grub2-tools-minimal-2.02-0.87.0.2.el7.14.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">635e692dc74aede7aea8900532b59858856a73e9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1721204645</id>
    <title>shim-signed: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Make this package installable on a system having a either 
  Centos or Cloudlinux signed kernel
- Update to shim-15.8 and fix the following CVEs:
  Resolves: CVE-2023-40546
  Resolves: CVE-2023-40547
  Resolves: СVE-2023-40548
  Resolves: СVE-2023-40549
  Resolves: CVE-2023-40550
  Resolves: CVE-2023-40551</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Make this package installable on a system having a either 
  Centos or Cloudlinux signed kernel
- Update to shim-15.8 and fix the following CVEs:
  Resolves: CVE-2023-40546
  Resolves: CVE-2023-40547
  Resolves: СVE-2023-40548
  Resolves: СVE-2023-40549
  Resolves: CVE-2023-40550
  Resolves: CVE-2023-40551</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-17 08:26:34 UTC" />
    <updated date="2024-07-17 08:26:34 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1721204645.html" id="CLSA-2024:1721204645" title="CLSA-2024:1721204645" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="mokutil" release="1.el7.tuxcare.els1" src="shim-signed-15.8-1.el7.tuxcare.els1.src.rpm" version="15.8">
          <filename>mokutil-15.8-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">34d8645c529bdabd967cebb4b041b24a8dc79b16</sum>
        </package>
        <package arch="x86_64" epoch="0" name="shim-ia32" release="1.el7.tuxcare.els1" src="shim-signed-15.8-1.el7.tuxcare.els1.src.rpm" version="15.8">
          <filename>shim-ia32-15.8-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">52271fb57431abc94ea7846576985a51bf84700d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="shim-x64" release="1.el7.tuxcare.els1" src="shim-signed-15.8-1.el7.tuxcare.els1.src.rpm" version="15.8">
          <filename>shim-x64-15.8-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">899a10faeb82c46d8bb37b94e10080ded9df9660</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1721204990</id>
    <title>Update of kernel</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Add dependency for updated shim and grub2 with new signing key</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Add dependency for updated shim and grub2 with new signing key</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-17 08:29:53 UTC" />
    <updated date="2024-07-17 08:29:53 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1721204990.html" id="CLSA-2024:1721204990" title="CLSA-2024:1721204990" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">71b821b79a0f81577fe351c5d7c236ca1b53d72c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">e673aa748df3328b2a34c460acf639bab5477e6b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">8677515a15fc1999b107e96a46f5479a2592fddc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">8c59ec973e021c6fc76881ee7d1a951f084033a0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">e2545e48f535f7a0dcdb229db8c71374b99b8d87</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">96496eda6d494e3ca74f77b8437a0194207ce584</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">3268142e07dab034fd18ee2678d7e3bc2ec74197</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">b4308fcaa024781c86b1ac971c24b9fa67eb4c89</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">a9f9e0f3e9acf6835d04f9f4e62145a5c98978e4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">c759d73748bc940bc389a16e497e44356fe95e09</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha">66bdfe463a40dce715bf482722dd7e4e601a701d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1721206783</id>
    <title>freerdp: Fix of 12 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-39352: add bound check in gdi_SolidFill
- CVE-2023-39353: check indices are within range
- CVE-2023-39356: fix checks for multi opaque rect
- CVE-2023-40181: fix cBitsRemaining calculation
- CVE-2023-40186: fix integer multiplications
- CVE-2023-40188: fix input length validation
- CVE-2023-40567: fix missing bounds checks
- CVE-2023-40569: fix missing destination checks
- CVE-2024-22211: check resolution for overflow
- CVE-2023-39351: free content of currentMessage on fail
- CVE-2023-39350: fix possible out of bound read
- CVE-2023-40589: properly verify all offsets while decoding data</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-39352: add bound check in gdi_SolidFill
- CVE-2023-39353: check indices are within range
- CVE-2023-39356: fix checks for multi opaque rect
- CVE-2023-40181: fix cBitsRemaining calculation
- CVE-2023-40186: fix integer multiplications
- CVE-2023-40188: fix input length validation
- CVE-2023-40567: fix missing bounds checks
- CVE-2023-40569: fix missing destination checks
- CVE-2024-22211: check resolution for overflow
- CVE-2023-39351: free content of currentMessage on fail
- CVE-2023-39350: fix possible out of bound read
- CVE-2023-40589: properly verify all offsets while decoding data</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-17 08:59:46 UTC" />
    <updated date="2024-07-17 08:59:46 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1721206783.html" id="CLSA-2024:1721206783" title="CLSA-2024:1721206783" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els1" src="freerdp-2.1.1-5.el7_9.tuxcare.els1.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">afb557972eb7b4d33d25c3ad64248245c195b643</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els1" src="freerdp-2.1.1-5.el7_9.tuxcare.els1.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">d4f03624edc9817a1dc308bd8fd2f7a4a336d361</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els1" src="freerdp-2.1.1-5.el7_9.tuxcare.els1.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7e80cb7d8691f95eeed56971d7f79906c5232781</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els1" src="freerdp-2.1.1-5.el7_9.tuxcare.els1.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">72137a781fbf6e2bb1d9543d2d1f28efed9fefff</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els1" src="freerdp-2.1.1-5.el7_9.tuxcare.els1.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">59448f80144dab0b1c31332dd212f26d9f73db29</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els1" src="freerdp-2.1.1-5.el7_9.tuxcare.els1.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">4cd1b3f85ccd56326d09812efe9e97452bf05510</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els1" src="freerdp-2.1.1-5.el7_9.tuxcare.els1.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">20a4180ee750a670d5a7f9a61d7462b6b13777a9</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els1" src="freerdp-2.1.1-5.el7_9.tuxcare.els1.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">94f59674ab24dbdd9a6d3daea4cc1552e89dd847</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els1" src="freerdp-2.1.1-5.el7_9.tuxcare.els1.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ca7d779ee67169aabea9510c2f6b481580051247</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1721206996</id>
    <title>poppler: Fix of CVE-2022-38784</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-38784: fix integer overflow in JBIG2 decoder</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-38784: fix integer overflow in JBIG2 decoder</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-17 09:03:19 UTC" />
    <updated date="2024-07-17 09:03:19 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1721206996.html" id="CLSA-2024:1721206996" title="CLSA-2024:1721206996" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="poppler" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-0.26.5-43.el7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">cb625182dbffadcf5fea4134cb4d65139139ca83</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ba28c974caddb05374904c5b8b76458e66864f06</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-cpp" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-cpp-0.26.5-43.el7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">cbde18d66b33ec1799aa94a059316966e01b8192</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-cpp" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-cpp-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">486d3217eea2f527e0f993562a8db05b5bbaaa7d</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-cpp-devel" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-cpp-devel-0.26.5-43.el7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">8a1ea5621f686cb72d37302d5c556607dc405213</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-cpp-devel" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-cpp-devel-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">b8e5b064fabb24a967846b1c501298ea21bf8590</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-demos" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-demos-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">19405ec13cead08c1ab27b343aeed12ec1fb9689</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-devel" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-devel-0.26.5-43.el7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">7ac84430e9d178ce4be775a2e4d252b9f026a4e3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-devel" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-devel-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">ae25fccbb5a548b99709a9aa4a0c464b86ba673b</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-glib" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-glib-0.26.5-43.el7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">4af5581b436efbda436c8c0679606c4037c7da4f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-glib" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-glib-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8fa6c2c2c58fffe4ecd2bef117e8911ef502c4ed</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-glib-devel" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-glib-devel-0.26.5-43.el7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">194790c3c1f3e64cc137b9b090ef1c752a2d65b0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-glib-devel" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-glib-devel-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">e885a2117d2ce4807deb3eef2eb3a24305f1a368</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-qt" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-qt-0.26.5-43.el7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">6f12e23cc0eedde9c8632efad6c8e0a41da2eb88</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-qt" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-qt-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">6c7ae4cfde394ea8981bc90db5906751358d4cd3</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-qt-devel" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-qt-devel-0.26.5-43.el7.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">3bbab414595fadbc23a5fb20d08d055b4d8b2f3b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-qt-devel" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-qt-devel-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">79d4728ab8833a4dee3ec95f1f20350294a3daac</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-utils" release="43.el7.1.tuxcare.els1" src="poppler-0.26.5-43.el7.1.tuxcare.els1.src.rpm" version="0.26.5">
          <filename>poppler-utils-0.26.5-43.el7.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">7bc12e40d3721f1c9d14599ae4932f8c723cd3ad</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1722003981</id>
    <title>httpd: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-38474: mod_rewrite: server weakness with encoded question marks
  in backreferences
- CVE-2024-38475: mod_rewrite: server weakness in mod_rewrite when first
  segment of substitution matches filesystem path
- CVE-2024-38477: mod_proxy: crash resulting in Denial of Service in
  mod_proxy via a malicious request
- CVE-2024-38476: http: server use exploitable/malicious backend application
  output to run local handlers via internal redirect
- CVE-2024-39573: mod_rewrite: proxy handler substitution</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-38474: mod_rewrite: server weakness with encoded question marks
  in backreferences
- CVE-2024-38475: mod_rewrite: server weakness in mod_rewrite when first
  segment of substitution matches filesystem path
- CVE-2024-38477: mod_proxy: crash resulting in Denial of Service in
  mod_proxy via a malicious request
- CVE-2024-38476: http: server use exploitable/malicious backend application
  output to run local handlers via internal redirect
- CVE-2024-39573: mod_rewrite: proxy handler substitution</summary>
    <pushcount>0</pushcount>
    <issued date="2024-07-26 14:26:24 UTC" />
    <updated date="2024-07-26 14:26:24 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1722003981.html" id="CLSA-2024:1722003981" title="CLSA-2024:1722003981" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">7d961f78651cc718c36dbc66fce19c9c2b3cc0ad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">0d8452290197a67530c5b398ac37275d7dbc7399</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha">dbf08f48e41f44c9d286240251f67c6dfbc3427e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">7f3f3a418be39ff57a332d8265427f8b2b11a3d4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">2aeb0c3f7b98cee7f0e7830c400b653b7a7e8d91</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">195b4b9f9177c384497680e78845df96ca53c109</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">a9f442976d4523d6650215c53b83fcad2d8ef17f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha">1f5cc7ae9affe8e1b307dfa8d76cf603e40d7d55</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1722529344</id>
    <title>git: Fix of CVE-2024-32004</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-32004: detect dubious ownership of local repositories,
  backport the necessary functions</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-32004: detect dubious ownership of local repositories,
  backport the necessary functions</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-01 16:22:28 UTC" />
    <updated date="2024-08-01 16:22:28 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1722529344.html" id="CLSA-2024:1722529344" title="CLSA-2024:1722529344" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="emacs-git" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>emacs-git-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">b0deeff09ddf25c0b06e99a573702096a1eb97d1</sum>
        </package>
        <package arch="noarch" epoch="0" name="emacs-git-el" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>emacs-git-el-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">70ff2407d30f97ce1d71dc67889ee27abc800fe1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-1.8.3.1-25.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">b0c1700d9774718991d53c10e3da2d04234dd9a9</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-all" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-all-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">a416044a33d7d765532a7c099ba1d7f8aa181203</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-bzr" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-bzr-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">8af88eeadb225d442482c6c624ef2a0c04758810</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-cvs" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-cvs-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">433602e5220f46973c0dcdf7f9ff70a94b6c2b6b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-daemon" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-daemon-1.8.3.1-25.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">3a43d6f9913773cfc82e1c32f98ef03f1148007a</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-email" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-email-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">08c18b56fb12a7bd5ccb9bd596f5c6a228bf8fd3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-gnome-keyring" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-gnome-keyring-1.8.3.1-25.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">11d3a0932993f44aaef938d433071ff767fce338</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-gui" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-gui-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">fd90a8aa5a89f9499ac3ff8f77e41eac44e6787e</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-hg" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-hg-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">339f0c3962ccb0c27cd0a4aad535076c717f1a2e</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-instaweb" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-instaweb-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">17520f98050e093d6ab4d24d346ca3a85aec1be4</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-p4" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-p4-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">7b9e9c81aa6b97d01280b8d4f5319cd4e897a1f7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-svn" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>git-svn-1.8.3.1-25.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha">07be89392ad2ec5b582d170d52ad28f71ed76b9d</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitk" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>gitk-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">9fd22481e62ad333631c3b6009ca7bca449350c9</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitweb" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>gitweb-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">e1401c833bbbecb49b29da8dfb12972ceda98574</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>perl-Git-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">55f04ebb4c769dbcd1d26b9dfdc447aa5a13798d</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git-SVN" release="25.el7_9.tuxcare.els3" src="git-1.8.3.1-25.el7_9.tuxcare.els3.src.rpm" version="1.8.3.1">
          <filename>perl-Git-SVN-1.8.3.1-25.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha">8f520fe3eac148fd8dc284365efd2a8ff66e960d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1722529534</id>
    <title>libtiff: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-52356: added proper validation and boundary checks to prevent
  the SEGV and potential heap-buffer overflow
- CVE-2023-52355: added functionality to set a maximum possible allocation size
  in bytes in order to prevent out-of-memory issues when opening a TIFF file and
  added memory limit option in tools</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-52356: added proper validation and boundary checks to prevent
  the SEGV and potential heap-buffer overflow
- CVE-2023-52355: added functionality to set a maximum possible allocation size
  in bytes in order to prevent out-of-memory issues when opening a TIFF file and
  added memory limit option in tools</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-01 16:25:37 UTC" />
    <updated date="2024-08-01 16:25:37 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1722529534.html" id="CLSA-2024:1722529534" title="CLSA-2024:1722529534" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libtiff" release="35.el7.tuxcare.els1" src="libtiff-4.0.3-35.el7.tuxcare.els1.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">46f0e0d5c8b8bc6e8242c60d18254ae94455af10</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff" release="35.el7.tuxcare.els1" src="libtiff-4.0.3-35.el7.tuxcare.els1.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">dff88e98858aaea1f05150e6b8121f8c77e9e5c7</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els1" src="libtiff-4.0.3-35.el7.tuxcare.els1.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">f9bd531c683b195d59b6bfaff68c5b24f98b0bf6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els1" src="libtiff-4.0.3-35.el7.tuxcare.els1.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">0f01f6ad70f8f3017de0c19b7d1993266ff03c2c</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els1" src="libtiff-4.0.3-35.el7.tuxcare.els1.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">becc9eed46f880cd553dd4bc1ae2767735f23f89</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els1" src="libtiff-4.0.3-35.el7.tuxcare.els1.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">afb9b292dfa41e9368581502d8d426d7fa410ea9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-tools" release="35.el7.tuxcare.els1" src="libtiff-4.0.3-35.el7.tuxcare.els1.src.rpm" version="4.0.3">
          <filename>libtiff-tools-4.0.3-35.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">8f32820e11e71434ef80dfe2b647d371439571be</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1722529717</id>
    <title>unbound: Fix of CVE-2023-50387</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-50387: enhanced DNS resolver performance and stability by optimizing
  the handling of DNSSEC responses, reducing the potential for resource exhaustion</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-50387: enhanced DNS resolver performance and stability by optimizing
  the handling of DNSSEC responses, reducing the potential for resource exhaustion</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-01 16:28:40 UTC" />
    <updated date="2024-08-01 16:28:40 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1722529717.html" id="CLSA-2024:1722529717" title="CLSA-2024:1722529717" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="unbound" release="5.el7_8.tuxcare.els1" src="unbound-1.6.6-5.el7_8.tuxcare.els1.src.rpm" version="1.6.6">
          <filename>unbound-1.6.6-5.el7_8.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">32b7279d9548893fb0563b7f343ad71f27b1ad0b</sum>
        </package>
        <package arch="i686" epoch="0" name="unbound-devel" release="5.el7_8.tuxcare.els1" src="unbound-1.6.6-5.el7_8.tuxcare.els1.src.rpm" version="1.6.6">
          <filename>unbound-devel-1.6.6-5.el7_8.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">240c0aa7d895f4b3eab672598d5ade3ebdf594e6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-devel" release="5.el7_8.tuxcare.els1" src="unbound-1.6.6-5.el7_8.tuxcare.els1.src.rpm" version="1.6.6">
          <filename>unbound-devel-1.6.6-5.el7_8.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">4b9ff36403e3e34362f1cc39638f74bae335d0db</sum>
        </package>
        <package arch="i686" epoch="0" name="unbound-libs" release="5.el7_8.tuxcare.els1" src="unbound-1.6.6-5.el7_8.tuxcare.els1.src.rpm" version="1.6.6">
          <filename>unbound-libs-1.6.6-5.el7_8.tuxcare.els1.i686.rpm</filename>
          <sum type="sha">31b07558d5c5129a5a49eacc875c9a745903150d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-libs" release="5.el7_8.tuxcare.els1" src="unbound-1.6.6-5.el7_8.tuxcare.els1.src.rpm" version="1.6.6">
          <filename>unbound-libs-1.6.6-5.el7_8.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">10bfdc30c93c44ee615f1cd7b11daec925c93efc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-python" release="5.el7_8.tuxcare.els1" src="unbound-1.6.6-5.el7_8.tuxcare.els1.src.rpm" version="1.6.6">
          <filename>unbound-python-1.6.6-5.el7_8.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha">049755022fa23ee9a4e611c99949bbbb0a39153e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1723059198</id>
    <title>httpd: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-39884: modules: source code disclosure with handlers configured via AddType.
  Resolving regression introduced by CVE-2024-38476 fix.
- CVE-2024-40725: modules: source code disclosure with handlers configured via AddType.
  Resolving regression introduced by CVE-2024-39884 fix.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-39884: modules: source code disclosure with handlers configured via AddType.
  Resolving regression introduced by CVE-2024-38476 fix.
- CVE-2024-40725: modules: source code disclosure with handlers configured via AddType.
  Resolving regression introduced by CVE-2024-39884 fix.</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-07 19:33:21 UTC" />
    <updated date="2024-08-07 19:33:21 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1723059198.html" id="CLSA-2024:1723059198" title="CLSA-2024:1723059198" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">cf08ca63a37e4f86e3a0a5a9f177455317517c462ee1a7c488241013b4e04f39</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">b398a8d950c33a30e48cfb04af3f16649c43b0090398df6f8be819f6d85683fd</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">4d80233c6fb9fb8ff9ec9be1cac6ff066ca65a67190f75f32a18047ac53ed025</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">9876767cf61fc2d6b605b25f13c01473799f16a01ad6d1cd69961765fc3f7ab3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">09671dbb670122ce6c2af731fbfbf7590d40c1620cefe49161874a223036bc2d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">0f7c214839e6c51bdf2b0bc3d4aeec2c4d8c9a0e2893f39972f15579ed10f7a6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">c642bc6f03f6d0a34b7a51189df3812e693b82ca7887d4bda7a056f0d4707271</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">17dbfe78b2971bfed25bd9592bda849e863a8d5ee97b7f68ab014c7e23c6145e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1723060343</id>
    <title>Update of grub2</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update version and epoch</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update version and epoch</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-07 19:54:36 UTC" />
    <updated date="2024-08-07 19:54:36 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1723060343.html" id="CLSA-2024:1723060343" title="CLSA-2024:1723060343" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="grub2" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">21e9fa45ecd1d364aa50dc54565a1432a98d720eecddc6723ae518ed0774b681</sum>
        </package>
        <package arch="noarch" epoch="2" name="grub2-common" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-common-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">dcb84b66986d4ccecebaa43234ef071a68cd28c3f623acb0451b8f0a57f27b0b</sum>
        </package>
        <package arch="x86_64" epoch="2" name="grub2-efi-ia32" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">dc464731f0f4a0014db0703a4f675bf9cf637dfe0f857f25857a4a52086d382b</sum>
        </package>
        <package arch="x86_64" epoch="2" name="grub2-efi-ia32-cdboot" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-cdboot-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1a8c90764ec9aa73c7420b2ae6bddaa8e280d28f784b6c5612e2de4771cec5ce</sum>
        </package>
        <package arch="noarch" epoch="2" name="grub2-efi-ia32-modules" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-modules-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">35d12f83a601cf933a1988ab445ed075f6c9195bc88037d46e39b608a2799ef5</sum>
        </package>
        <package arch="x86_64" epoch="2" name="grub2-efi-x64" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-x64-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">246ee2e88c08cf655a71e7ee0cbf3c062fb8ce4e0e948788471a0e614b2ca579</sum>
        </package>
        <package arch="x86_64" epoch="2" name="grub2-efi-x64-cdboot" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-x64-cdboot-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">b72171c084a5150c91061a6fa7802467d56a62d95dc3823124d1d56337a5296d</sum>
        </package>
        <package arch="noarch" epoch="2" name="grub2-efi-x64-modules" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-x64-modules-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">c71863429a827700607ce7bc950cc5a68c2b2f4f88cbdc83afd9a267b92e0d3a</sum>
        </package>
        <package arch="noarch" epoch="2" name="grub2-i386-modules" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-i386-modules-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">f823f79eba1c9e68da8e308911f1022caec4c807f4a7047fab1617e65e95796a</sum>
        </package>
        <package arch="x86_64" epoch="2" name="grub2-pc" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-pc-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">898f391d896a3fab47de5b23ac352bfc0d26f60d8a43c18593db422ed6bccf5d</sum>
        </package>
        <package arch="noarch" epoch="2" name="grub2-pc-modules" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-pc-modules-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">c8471d4a20e445652272ff583a046d64b628c16944e9759559673756ae02bdb7</sum>
        </package>
        <package arch="x86_64" epoch="2" name="grub2-tools" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-tools-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f920e3d5bf434f3e231930eb0614be2bbeb5512a88a5fbaedebdb657c03ab736</sum>
        </package>
        <package arch="x86_64" epoch="2" name="grub2-tools-extra" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-tools-extra-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ea233dec970276927b90976451019572974390f7eab160da867ca1f7fae77b7e</sum>
        </package>
        <package arch="x86_64" epoch="2" name="grub2-tools-minimal" release="0.87.0.2.el7.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-tools-minimal-2.02-0.87.0.2.el7.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ce82fceb77c9eb7df36fa3fd4fccbf91aad8ee1a44883ec32ea84fe0811805ee</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1723060627</id>
    <title>tomcat: Fix of CVE-2021-25329</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fix file path bug introduced by the CVE-2021-25329 fix</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fix file path bug introduced by the CVE-2021-25329 fix</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-07 19:57:48 UTC" />
    <updated date="2024-08-07 19:57:48 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1723060627.html" id="CLSA-2024:1723060627" title="CLSA-2024:1723060627" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="tomcat" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">9d983a9f636921f0e58538824a3211060477177a8fced24dbfb560abdede02bb</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-admin-webapps" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-admin-webapps-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">bcc45b1a29d8b26561d6c5fec9a12fe2a93a577b44a7560b510cbdb8e472112c</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-docs-webapp" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-docs-webapp-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">084a9b7059103c827bf43af9cf7b2789fcec723ba9136754c70e6b63207903eb</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-el-2.2-api" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-el-2.2-api-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">3af1d932791b0605102ceb92271c040a19d187a76af089492532a2bcf6624ea2</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-javadoc" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-javadoc-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">44344eb8440c09b7cfa5aa61d99a1cb94c7be244363d3f313593c9b25f89e870</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-jsp-2.2-api" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-jsp-2.2-api-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">06cc7eac7814651426d53fd3ef1fe0460cac04d0ba0c32fa04237e45298ac8b3</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-jsvc" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-jsvc-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">0cf73f0f3efb72476d3b20c82cf8c517fca5276f85b4596f76749bf6716feabd</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-lib" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-lib-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">b60195aceef1da2206943432a0af7812f8a5e15dee05ed20ca5e50c56d5d164d</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-servlet-3.0-api" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-servlet-3.0-api-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">55c710446f24b3655869d49cd1f0baee2b5ca2dfd91b9f9b587a10942976ee8d</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-webapps" release="16.el7_9.tuxcare.els2" src="tomcat-7.0.76-16.el7_9.tuxcare.els2.src.rpm" version="7.0.76">
          <filename>tomcat-webapps-7.0.76-16.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">7587d8d6b229fc6ca1b41d753733e3d8abb7d444cb1576d72e436ef6fe083b6b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1723146304</id>
    <title>jasper: Fix of CVE-2023-51257</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-51257: fix an integer-overflow bug in the ICC profile parsing code</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-51257: fix an integer-overflow bug in the ICC profile parsing code</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-08 19:45:07 UTC" />
    <updated date="2024-08-08 19:45:07 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1723146304.html" id="CLSA-2024:1723146304" title="CLSA-2024:1723146304" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="jasper" release="33.el7.tuxcare.els1" src="jasper-1.900.1-33.el7.tuxcare.els1.src.rpm" version="1.900.1">
          <filename>jasper-1.900.1-33.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">638fc8bb9909908e62bc3eb80961482638a5312540ad810352ca2188efdddd34</sum>
        </package>
        <package arch="i686" epoch="0" name="jasper-devel" release="33.el7.tuxcare.els1" src="jasper-1.900.1-33.el7.tuxcare.els1.src.rpm" version="1.900.1">
          <filename>jasper-devel-1.900.1-33.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">1ae0aed9821871475b4ad62557315184118d67b15fa83bcbe955630e4862d6fb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="jasper-devel" release="33.el7.tuxcare.els1" src="jasper-1.900.1-33.el7.tuxcare.els1.src.rpm" version="1.900.1">
          <filename>jasper-devel-1.900.1-33.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d67ae955cd3d959149c4e332ee6d18772a1c8731ffe867d3c29217d1c28f64ce</sum>
        </package>
        <package arch="i686" epoch="0" name="jasper-libs" release="33.el7.tuxcare.els1" src="jasper-1.900.1-33.el7.tuxcare.els1.src.rpm" version="1.900.1">
          <filename>jasper-libs-1.900.1-33.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e43dd891ba810f449f76998478458fe5465e12095b58893d8d2c53e58afc2dcc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="jasper-libs" release="33.el7.tuxcare.els1" src="jasper-1.900.1-33.el7.tuxcare.els1.src.rpm" version="1.900.1">
          <filename>jasper-libs-1.900.1-33.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d71c698422aad6430412ea5ad2331289bae1a89835c12d572ffd3f716a7cdecf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="jasper-utils" release="33.el7.tuxcare.els1" src="jasper-1.900.1-33.el7.tuxcare.els1.src.rpm" version="1.900.1">
          <filename>jasper-utils-1.900.1-33.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">635b17d506cf981bb5da115d91ee0fba8bd52d64409035ee3fd6ca093de57de3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1723224273</id>
    <title>freerdp: Fix of CVE-2021-41159</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-41159: fix client out of memory</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-41159: fix client out of memory</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-09 17:24:36 UTC" />
    <updated date="2024-08-09 17:24:36 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1723224273.html" id="CLSA-2024:1723224273" title="CLSA-2024:1723224273" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els2" src="freerdp-2.1.1-5.el7_9.tuxcare.els2.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">d85cc7533204c8eb59ed962561248ab008a65650bfe3b63b1a2c30fee09dd4b7</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els2" src="freerdp-2.1.1-5.el7_9.tuxcare.els2.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">1e22be779604d8d97e78990628a10fe47dfa990f7cf3708fc57eb574d0f5d310</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els2" src="freerdp-2.1.1-5.el7_9.tuxcare.els2.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">091892b6d377f31fac4c4cb9bd6f6bbe6ec6c8e9807ad94db7153f1673127933</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els2" src="freerdp-2.1.1-5.el7_9.tuxcare.els2.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">3eb1637413a5906970754e580d409313c672ab42fdadb6f0222b5af902fc0370</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els2" src="freerdp-2.1.1-5.el7_9.tuxcare.els2.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f74c72ec2d3ec78eb4355492d7ab090d1c38f35f7ec4d5893c6e9b8424858523</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els2" src="freerdp-2.1.1-5.el7_9.tuxcare.els2.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">7a4462cd84563bfb5904c579f7d50c67357244d00415fc162d3b3985758881bb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els2" src="freerdp-2.1.1-5.el7_9.tuxcare.els2.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">0701dbf23ab52fa03df906b73c205a6cd31c4dd391372c1c03e5a3c14dfb42de</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els2" src="freerdp-2.1.1-5.el7_9.tuxcare.els2.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">8adc73b5220e6f4c7d5cacc927799e63d7d903a2440fca69973bb6d084a7759e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els2" src="freerdp-2.1.1-5.el7_9.tuxcare.els2.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ba3cdd98ac2d2f3c730624515f5427d0a55dbdef371b07d4e6d3452660cbd47e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1723623068</id>
    <title>java-1.8.0-openjdk: Fix of 6 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u422-b05. That fixes following CVEs:
- CVE-2024-21131: UTF8 size overflow
- CVE-2024-21138: Infinite loop vunlerability in SymbolTable
- CVE-2024-21140: Int overflow/underflow in Range Check Elimination (RCE)
- CVE-2024-21144: Invalid header validation leads to Pack200 excessive loading time
- CVE-2024-21145: Out-of-bounds access in MaskFill
- CVE-2024-21147: Out-of-bounds array index in Range Check Elimination (RCE)</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u422-b05. That fixes following CVEs:
- CVE-2024-21131: UTF8 size overflow
- CVE-2024-21138: Infinite loop vunlerability in SymbolTable
- CVE-2024-21140: Int overflow/underflow in Range Check Elimination (RCE)
- CVE-2024-21144: Invalid header validation leads to Pack200 excessive loading time
- CVE-2024-21145: Out-of-bounds access in MaskFill
- CVE-2024-21147: Out-of-bounds array index in Range Check Elimination (RCE)</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-14 08:11:11 UTC" />
    <updated date="2024-08-14 08:11:11 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1723623068.html" id="CLSA-2024:1723623068" title="CLSA-2024:1723623068" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">1b39ec6d025f842d8d6625e7dabd16b9c099d274901785bbd4a44b4688c78555</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d097d5c4f6fa0a8b388c724399a8b5778dec0692f403eb70442110d15fe9cb96</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.422.b05-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">6984c32519be294f3972d6867cb3f79b5a9fd8b0c4d39c382c2b90a908cf1edb</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2d6cbd2b6c933682ae36f407d90ce54ebb13fa926b6254a299dfb8ed5e3ab50d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6bd26d8f55e734a44a49c0d567e75fd2e01fb0416dc41657e6706a0cc536dcf9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-debug-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a9b57094feb64ccd6954d34a9eae41b1ce7251eb0e383460154e29c591f9edbb</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-demo-1.8.0.422.b05-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">35d356d55ebafa903003b49aeb13b35edc67264a8476fb922e09a49c3a4c3d11</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-demo-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">34c423711d5bee58bc6d461bda15e8ea62dd49e4446449df46cd00915faf8d18</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-demo-debug-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">93a3631a28f68a86adb1c19fe0ceefaae727e985eec8474f46182cd6af733c8c</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-devel-1.8.0.422.b05-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">5b8167f35fdc1ff39631784679e750e8dafc1780380977ce3fe92f79af43f3e8</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-devel-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a32b5fd312b4fe4649041a24fdf255d02dc717d071a8b62de95ec09dde116879</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-devel-debug-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">42413079f7cd06d53ba675f73d0c0095e58f9c8c044843cc4ccc1a9f5f53d495</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-headless-1.8.0.422.b05-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">9f1c1ba57c731b712aae95f4456e2865598f8b54c2e7ad33a22957af621b3c71</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-headless-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">69436469403b5ac352b6f5c434f7ce7b1290052737a6a8c0229982cd39712bee</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-headless-debug-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3708e13629069659370b124fcee084db9b2054072301ad005062cb83b9dfeda1</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-javadoc-1.8.0.422.b05-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">09c52832c473d846ea6a844e9c1f5f38fcb06862ad2c6fec9457842caf99ba91</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.422.b05-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">ca19d258b3f5ab0e27068ead8ae575b50ec9c93d55c696a240131e9181481a35</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">147f14088d606716c90c76b25c658dfeb6853d6a5bd13eeef974c505a7d477dc</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.422.b05-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">c97f7cf6eda8451cddcf195158139eaaec32b73acfe54413caf67d47862eac78</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-src-1.8.0.422.b05-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">8b8e8c7e5de88a2ed0b4bd953037508ac5edd71c1359352c129945b15c7464aa</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-src-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5a5c1ad8aaf5daaeaef6ca70433779fc42762ea8df9a9e0fc881360813d60663</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.422.b05">
          <filename>java-1.8.0-openjdk-src-debug-1.8.0.422.b05-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">90241f42a09c9ee5a3ddc4b36fd1a61331cd9877560123eca711f4a49da027dd</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1723795896</id>
    <title>harfbuzz: Fix of CVE-2023-25193</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-25193: optimize looking back for base glyphs in hb-ot-layout-gsubgpos-private.hh</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-25193: optimize looking back for base glyphs in hb-ot-layout-gsubgpos-private.hh</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-16 08:11:39 UTC" />
    <updated date="2024-08-16 08:11:39 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1723795896.html" id="CLSA-2024:1723795896" title="CLSA-2024:1723795896" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="harfbuzz" release="2.el7.tuxcare.els1" src="harfbuzz-1.7.5-2.el7.tuxcare.els1.src.rpm" version="1.7.5">
          <filename>harfbuzz-1.7.5-2.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e0ddb3eb6feb7f396b78992a3341af3f0ea66b65343a0a5dcdda14872917e8d8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="harfbuzz" release="2.el7.tuxcare.els1" src="harfbuzz-1.7.5-2.el7.tuxcare.els1.src.rpm" version="1.7.5">
          <filename>harfbuzz-1.7.5-2.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">466c8f2b8dbabe7714eee330eb5bb0636a3f0756a909e4b66079019bcb215f89</sum>
        </package>
        <package arch="i686" epoch="0" name="harfbuzz-devel" release="2.el7.tuxcare.els1" src="harfbuzz-1.7.5-2.el7.tuxcare.els1.src.rpm" version="1.7.5">
          <filename>harfbuzz-devel-1.7.5-2.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e37ac411ac510789c5e441e5676e08193974c19ebaa9e36e37cfa49d3190cdfe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="harfbuzz-devel" release="2.el7.tuxcare.els1" src="harfbuzz-1.7.5-2.el7.tuxcare.els1.src.rpm" version="1.7.5">
          <filename>harfbuzz-devel-1.7.5-2.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">91d7f962f5771a99e0c9bb34a85f8892c7626f4b12384c464568f32d3ce30791</sum>
        </package>
        <package arch="i686" epoch="0" name="harfbuzz-icu" release="2.el7.tuxcare.els1" src="harfbuzz-1.7.5-2.el7.tuxcare.els1.src.rpm" version="1.7.5">
          <filename>harfbuzz-icu-1.7.5-2.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">240ce416f0603f8e070f0b34e9a46ccc1ccd77f4351c21f621ee64c2294e1a21</sum>
        </package>
        <package arch="x86_64" epoch="0" name="harfbuzz-icu" release="2.el7.tuxcare.els1" src="harfbuzz-1.7.5-2.el7.tuxcare.els1.src.rpm" version="1.7.5">
          <filename>harfbuzz-icu-1.7.5-2.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c94b26bdd56a7851afc54eb8e9780e20abfb07aabb383d7c949f5acc70f40076</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1723796201</id>
    <title>wget: Fix of CVE-2024-38428</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-38428: properly re-implement userinfo parsing (rfc2396)</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-38428: properly re-implement userinfo parsing (rfc2396)</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-16 08:16:44 UTC" />
    <updated date="2024-08-16 08:16:44 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1723796201.html" id="CLSA-2024:1723796201" title="CLSA-2024:1723796201" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="wget" release="18.el7_6.1.tuxcare.els1" src="wget-1.14-18.el7_6.1.tuxcare.els1.src.rpm" version="1.14">
          <filename>wget-1.14-18.el7_6.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4a7ffb990b832ad34255b0c1c418a31dcc8cd13f302186bc38f183714273fa28</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1724259497</id>
    <title>libndp: Fix of CVE-2024-5564</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-5564: validate route information option length</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-5564: validate route information option length</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-21 16:58:20 UTC" />
    <updated date="2024-08-21 16:58:20 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1724259497.html" id="CLSA-2024:1724259497" title="CLSA-2024:1724259497" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libndp" release="9.el7.tuxcare.els1" src="libndp-1.2-9.el7.tuxcare.els1.src.rpm" version="1.2">
          <filename>libndp-1.2-9.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">0d21c313d967caa248b531bbb559e0100854390cca0e9094db3cfb6396de89c2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libndp" release="9.el7.tuxcare.els1" src="libndp-1.2-9.el7.tuxcare.els1.src.rpm" version="1.2">
          <filename>libndp-1.2-9.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f73b26c9f7e8fa32e55e33da5a38d496dfcbfa5911899b8aca0e3fdcc16c0789</sum>
        </package>
        <package arch="i686" epoch="0" name="libndp-devel" release="9.el7.tuxcare.els1" src="libndp-1.2-9.el7.tuxcare.els1.src.rpm" version="1.2">
          <filename>libndp-devel-1.2-9.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">a3d135a877889ed4e79aa512e6586facced48af9b7e3b9e6a14efa1cd49609b0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libndp-devel" release="9.el7.tuxcare.els1" src="libndp-1.2-9.el7.tuxcare.els1.src.rpm" version="1.2">
          <filename>libndp-devel-1.2-9.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">207d9afa0c14f04a956e5846d39fb82c05ebe06183c3004dbc20e148f54f80ed</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1724260558</id>
    <title>libcdio: Fix of CVE-2024-36600</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-36600: Allocate more space for buffer, prevent overflow,
  add input validation</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-36600: Allocate more space for buffer, prevent overflow,
  add input validation</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-21 17:16:01 UTC" />
    <updated date="2024-08-21 17:16:01 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1724260558.html" id="CLSA-2024:1724260558" title="CLSA-2024:1724260558" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libcdio" release="3.el7.tuxcare.els1" src="libcdio-0.92-3.el7.tuxcare.els1.src.rpm" version="0.92">
          <filename>libcdio-0.92-3.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">8361c915389938588af187c03a6ae45382d37c39949c5249006bdd59b84360e8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcdio" release="3.el7.tuxcare.els1" src="libcdio-0.92-3.el7.tuxcare.els1.src.rpm" version="0.92">
          <filename>libcdio-0.92-3.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2d3077c0f4e17adc7a39f4522b5ddd0ea47af06a2a725173e59238d623ca3d36</sum>
        </package>
        <package arch="i686" epoch="0" name="libcdio-devel" release="3.el7.tuxcare.els1" src="libcdio-0.92-3.el7.tuxcare.els1.src.rpm" version="0.92">
          <filename>libcdio-devel-0.92-3.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f27a180ff92a908aa19bb806165983414d74b0f5a503072960ac1e0b029f893f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libcdio-devel" release="3.el7.tuxcare.els1" src="libcdio-0.92-3.el7.tuxcare.els1.src.rpm" version="0.92">
          <filename>libcdio-devel-0.92-3.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b9dcf604e79fb2c4d9561cf7c2d276020341c78d126d410ff4879db75baccc58</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1724260726</id>
    <title>samba: Fix of CVE-2023-34966</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-34966: fix infinite loop vulnerability in mdssvc RPC service
- some tests were added as skipped</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-34966: fix infinite loop vulnerability in mdssvc RPC service
- some tests were added as skipped</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-21 17:18:49 UTC" />
    <updated date="2024-08-21 17:18:49 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1724260726.html" id="CLSA-2024:1724260726" title="CLSA-2024:1724260726" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="ctdb" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>ctdb-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2c2f5896bf18752a8bac136ad573717701c68f8f35b4746aa32c96c20a453253</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ctdb-tests" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>ctdb-tests-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6ab400dbc65d940afcf820a655a1ae0ce9e15bb360d6a5013fbdcf141881a9f3</sum>
        </package>
        <package arch="i686" epoch="0" name="libsmbclient" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>libsmbclient-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">72031a1e26b9b1c8ed971fd9b3b1328ed29a4b628f6e2faf52b110f1aa223f31</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsmbclient" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>libsmbclient-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">30644b483abc30a0cb20f2ae51b4b9734aae1c0e0e6e2e3cdf6ecd944e186e72</sum>
        </package>
        <package arch="i686" epoch="0" name="libsmbclient-devel" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>libsmbclient-devel-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">83fdfa734674d7075b24bdcfbde0114245f992ff7c066e6b6cf3bcf1a05ba453</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsmbclient-devel" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>libsmbclient-devel-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e696b04dded703d87e63e2eb46e7e9decbaf8d1e47eac5181f9e6533af347c3a</sum>
        </package>
        <package arch="i686" epoch="0" name="libwbclient" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>libwbclient-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">d262ef98937aac153df21cf109ec16912b636c872282b207aa4526e31e1b145f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwbclient" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>libwbclient-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">781381062920d4d1dae3be52dced3be78c2ffdb58dc0bcc3de571f8ff3df8079</sum>
        </package>
        <package arch="i686" epoch="0" name="libwbclient-devel" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>libwbclient-devel-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">fb78561b45951b2310ff3500c6ce12fa8f50298cda698ae825d08c28f7e54803</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwbclient-devel" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>libwbclient-devel-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">598d72c98aae3700cc0a39dad32968b78221f9ba28272d0e0253542410d7e4ed</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">33140fe984c9fadd078c5cd2bac9e8bdd0ebabca7f750e5c751c365aa21175f9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-client" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-client-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2ea3b93949de5a785d82c6b22a8c8bc00aba54412b0a9d306a9e8cd752b3f6e7</sum>
        </package>
        <package arch="i686" epoch="0" name="samba-client-libs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-client-libs-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e59a3df2f6d6a7921318fc26150ec57ed9463a03c8ce40a7580fd0c5df0efad4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-client-libs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-client-libs-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">defd9ed8c9307b03e39b82386989c81b9583166d08059b16859ca5df3219e89b</sum>
        </package>
        <package arch="noarch" epoch="0" name="samba-common" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-common-4.10.16-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">9febe3e6fb3f3a7f2b16287f10a072ea9d716ac99e757ff886b564fcbcf2a1b2</sum>
        </package>
        <package arch="i686" epoch="0" name="samba-common-libs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-common-libs-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">abd7a4cf3392d41ea5b03d74c7aa02aedea938014cdc3f2366a3097069f052ea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-common-libs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-common-libs-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3e4f6ae943f79926d86c2a8b314af3922263d4c4e6884ce5272f58e11439005b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-common-tools" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-common-tools-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d865f03f71b2de7a72da8614a385ace3013665138c3a22f8db18823e7e069c5a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-dc" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-dc-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">233e99a882e5d6873e5603262c1d12e069df450cdc050cc7210902d4e0392598</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-dc-libs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-dc-libs-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c15cec6bffe8476f677276b563b0df1d9502cefccef81a186edb524b79245c71</sum>
        </package>
        <package arch="i686" epoch="0" name="samba-devel" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-devel-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">c6e8d7931da35004ba13ca41b622110f970e2ceec954a4e0b543ced7adb4584c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-devel" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-devel-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">38d06b836c10c5bd66d3ebaba98ba12b660dc8e73cfa5d951ee1c09b82c95351</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-krb5-printing" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-krb5-printing-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">25008ac83b805d7ce934817be646c836e3496fff2c7b48578248b5c8c84b56bc</sum>
        </package>
        <package arch="i686" epoch="0" name="samba-libs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-libs-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">57615d9d76f6925fed28a8d198ed725b0c95722a88fcd330431cf9b016bf07fc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-libs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-libs-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ed671c64637bb258cc1445a5250ee192c6c37811295d99addabc7706f355f2d2</sum>
        </package>
        <package arch="noarch" epoch="0" name="samba-pidl" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-pidl-4.10.16-25.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">6a79efc6e034ecb4b9ae748617e5d38a7543b8259e29f3888c7ae40dc27e00ae</sum>
        </package>
        <package arch="i686" epoch="0" name="samba-python" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-python-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">c1b11a7789652dd4a5082bb9b4036f0f75c140e517884e5d176caefae7ab4665</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-python" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-python-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0b89f0ef572c65488cbddb7cec5b2ac13e71a709893b124047753a48c9c41de8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-python-test" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-python-test-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ed72028d6430a66a79333951f9a08a85517377e622d3f031a1b0a954c9e12d8b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-test" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-test-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">991017d15727ba7538589118c5f2d286c23c0bea404a627a9166d250243ae2a2</sum>
        </package>
        <package arch="i686" epoch="0" name="samba-test-libs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-test-libs-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">6e27f0e4efeb91ba25cde0aeb5e2dc6383aade3e6646955447a9ccbd25382f77</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-test-libs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-test-libs-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">290c5c55f2ba982d4ac8d705ea0cbc47aa50b0f542e307f15727f340a9486199</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-vfs-glusterfs" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-vfs-glusterfs-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1b9fcfef9ea2de4e3cdb7b01bcad4646e99b3314f569a5c719dbfa7f05f12046</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-winbind" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-winbind-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">997c9acf340de001e47047fdd72571ebde932c6ed9f0e25bc79ebf41ff0636ac</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-winbind-clients" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-winbind-clients-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8ee997c47c49aa7ef26027d266ffe578545d2d8bbab1fdf9b381965f340084c2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-winbind-krb5-locator" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-winbind-krb5-locator-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4df185760c28a888140007bdac4e595b99659e765b902ba32546c7bfb1c8974b</sum>
        </package>
        <package arch="i686" epoch="0" name="samba-winbind-modules" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-winbind-modules-4.10.16-25.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e54cbaa71ff09c8584a4ef856330cdce58aa68385d5a1f6be9a57138e5e73971</sum>
        </package>
        <package arch="x86_64" epoch="0" name="samba-winbind-modules" release="25.el7_9.tuxcare.els1" src="samba-4.10.16-25.el7_9.tuxcare.els1.src.rpm" version="4.10.16">
          <filename>samba-winbind-modules-4.10.16-25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">03ae74fe4089f8d561f96c88123198d20570e32487c1f863c88c74d96b207b56</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1724348053</id>
    <title>bind: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-1737: add a limit to the number of RRs in RRSets
  and RR types for single name
- CVE-2024-1975: remove support for SIG(0) message verification
- Fix the SYSTEMTEST section in the spec file</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-1737: add a limit to the number of RRs in RRSets
  and RR types for single name
- CVE-2024-1975: remove support for SIG(0) message verification
- Fix the SYSTEMTEST section in the spec file</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-22 17:34:16 UTC" />
    <updated date="2024-08-22 17:34:16 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1724348053.html" id="CLSA-2024:1724348053" title="CLSA-2024:1724348053" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="33" name="bind" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">4f4e8784dde132353df54e5634f8a9a7020a67e7e66d981440792522da6ec3a3</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-chroot" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">16cab55a3b7098986583e8321a1ff8c159cdd39b15f1197348c02920b4a22015</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">a1341189b02fdf7787eadfe85b14cfe80d276053e35b70cc79398e8b33123107</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">47c7bda9200dbbc2f49f9d1f59d961772608144bb7387bfb84f154079859555e</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">593f5ee550a57fac722fffebccbc8f099b32a8d400481513fb0ed1585a231f38</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">179e305e0fe5bb8bfdc3e13a44f96bdd9fb9748274dfa74908061ada148d70e4</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">1fdf049bcc6efb1472f8ae9e2d508270aed9abac5c1f350ab7d6e988f30e64c0</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">e4efa678124bb971d20f39bb465cc30827409707aeeebae9a239c3ec8beb1ab8</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">a49b6456c86c4e67f4ff63fce9cfa66d8db547832cf11df93f69e9693f5975ca</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">7b073ae98adfd5e146b33594350921d292540b2bb9a3ec33cd498b0682c313fa</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">47709daeab05b7587f9a551a9ff9dd9f9221192881970a97c16b8b8c89d2caa0</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">6ad122145575a9fd835026dc010b55d52c8bccbccf3d134f417c874edafc282c</sum>
        </package>
        <package arch="noarch" epoch="33" name="bind-license" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7_9.16.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">351cf531bd668ba6332235ec61fa646f381f45a44a9339a1661c618191183327</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">ae1ee3353d3fa0b4d35031020513ce040c19a372400e6664267ccecd4bb439c1</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">369e33bfdaee594de283ddb7bd2c181507441bdd702e24fa743da5db080ee688</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">8109a2ed957f482d5b90d25cc2b6d48268aa58f795ad7e4d161db9e861aeacd4</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">1a4fffc0db4ef7212f5a363429be857d6390dd12c9d1dc68ea0dcd68cf6348b0</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">472ff77d3d17eaa3188db5912bede509c1b22606a112a52caf9cedf8c11fdf1c</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">a16d85096941a82e85f478cfcfe8e30889be844af8bfc8a90dae0f7c6b793f96</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">5ace25618ddc1512277f9ca5e73b4b89208baa7f7a64ad9b46545b1741ea55f1</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-utils" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ee5629be925c7172b5d0e4e46bce831a842fdd54028e6ba4302471bf752d0e3c</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">dcbe28914d7c5d64b4e2aa0b18dfb63e762af8a24aaafefe3da63c8d4dc2670c</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb-chroot" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">aa31f5223092430c1132b53f7baf02473dec9989e1571dc8972dc1c6a7e126e0</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-utils" release="26.P2.el7_9.16.tuxcare.els2" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els2.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7_9.16.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">a43d7a085c0e3e8ee2442c551e1cf26cd9d4ae654eece40ed0c0131a1486a83a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1724693366</id>
    <title>kernel: Fix of 15 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() {CVE-2024-26855}
- tty: Fix out-of-bound vmalloc access in imageblit {CVE-2021-47383}
- drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960}
- Revert: GFS2: Skip dlm_unlock calls during unmount {CVE-2024-38570}
- Revert: GFS2: ignore unlock failures after withdraw {CVE-2024-38570}
- Revert: GFS2: fix skip unlock condition {CVE-2024-38570}
- ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494}
- netfilter: nft_limit: reject configurations that cause integer overflow {CVE-2024-26668}
- ipv6: remove max_size check inline with ipv4 {CVE-2023-52340}
- USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934}
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882}
- ip: validate header length on virtual device xmit
- ext4: improve error recovery code paths in __ext4_remount() {CVE-2024-0775}
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table {CVE-2023-52469}
- drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc {CVE-2024-42228}
- netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020}
- af_unix: Fix garbage collector racing against connect() {CVE-2024-26923}
- md/raid5: fix atomicity violation in raid5_cache_count {CVE-2024-23307}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() {CVE-2024-26855}
- tty: Fix out-of-bound vmalloc access in imageblit {CVE-2021-47383}
- drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960}
- Revert: GFS2: Skip dlm_unlock calls during unmount {CVE-2024-38570}
- Revert: GFS2: ignore unlock failures after withdraw {CVE-2024-38570}
- Revert: GFS2: fix skip unlock condition {CVE-2024-38570}
- ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494}
- netfilter: nft_limit: reject configurations that cause integer overflow {CVE-2024-26668}
- ipv6: remove max_size check inline with ipv4 {CVE-2023-52340}
- USB: core: Fix deadlock in usb_deauthorize_interface() {CVE-2024-26934}
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() {CVE-2024-26882}
- ip: validate header length on virtual device xmit
- ext4: improve error recovery code paths in __ext4_remount() {CVE-2024-0775}
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table {CVE-2023-52469}
- drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc {CVE-2024-42228}
- netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() {CVE-2024-27020}
- af_unix: Fix garbage collector racing against connect() {CVE-2024-26923}
- md/raid5: fix atomicity violation in raid5_cache_count {CVE-2024-23307}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-08-26 17:29:30 UTC" />
    <updated date="2024-08-26 17:29:30 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1724693366.html" id="CLSA-2024:1724693366" title="CLSA-2024:1724693366" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">f5788de6b933519739beaf9dd076b85cbd486b1cad4dd223e01f76737a5b6f55</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">8b6485df872df90f48b535531a12df5c9adef720c226880a58fd7eff68c25fc2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">712f1ae44e958ac03e1c1b44e392d76054ff951760cd34619bf838656bdaba8e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">befb295526a8acdb47f1d26b33ac6ce0dc21f3d5411791b845ca211cee3188c3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">ee3ead168211e5ab1d83f8ae590ba9be52e651955d02ce26dc08630df59d42b1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c4a1c3392c8a0875868a7798153f8b6c17c54945954509c9e5c5e04d13d79699</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7258aa97ff778ae1af2211e87e177e787e8027585d8ce039374438044d63863b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">30512e28c7c5b65a3bc8f9ab14bd4b260805c6c06ab6abb6e9f580863927d147</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">5dca7f0bd25b6fb88f63cfdde5243ba04c2436c97a4a72b43c5500d1b5a44763</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">8b3e9a8a2ed9621456ba4b3b71f299650f4d69ba2b3c90977cc857a87bec02e6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a2359c448f8e5b23988c4afe9ed3c6353d187aad3ff60a56478b36de6783e18a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1725382183</id>
    <title>httpd: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-38709: faulty input validation in the core of Apache allows
  malicious or exploitable backend/content generators to split HTTP responses
- CVE-2024-24795: HTTP response splitting in multiple modules allows an
  attacker that can inject malicious response headers into backend applications
  to cause an HTTP desynchronization attack</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-38709: faulty input validation in the core of Apache allows
  malicious or exploitable backend/content generators to split HTTP responses
- CVE-2024-24795: HTTP response splitting in multiple modules allows an
  attacker that can inject malicious response headers into backend applications
  to cause an HTTP desynchronization attack</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-03 16:49:46 UTC" />
    <updated date="2024-09-03 16:49:46 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1725382183.html" id="CLSA-2024:1725382183" title="CLSA-2024:1725382183" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">fdb737448bce0d46aa8659b000293c1945dedfb27d2f2ee540c3e1230e2652f7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">1c9196bba5d2f3ef0cceab961a60fdbc5e505269cb1790cbe82303e6c507db5a</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">9b46055e5a4516de55a05d9e3944593172aac762349c27c6a79ff4abd2846780</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">11bec23f36a45ea26437c1042ae97c1aafb05eefeb7ac733ba2b4a628a295ea6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">2ba75ddcce763889db7da85f5ba003b62ce119662b91a00e7121acff3ef0d298</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">f5e91f31141db1452fd0f6cda7b9db1cf68e63fcf32ac514b93480d7b070354a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">594c9fac228ad238203a1b3c5e82fe07e2faa08445ef73f73e40334092d6fcfe</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">3593e8b91cee88920c8f6bda1c27a762cdd2b8a55286970c8d4bdb8e4fa6622d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1725382525</id>
    <title>python: Fix of CVE-2023-27043</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Bugfix for CVE-2023-27043, use str instead of unicode, adjust tests
  according to python2 specification.</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Bugfix for CVE-2023-27043, use str instead of unicode, adjust tests
  according to python2 specification.</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-03 16:55:28 UTC" />
    <updated date="2024-09-03 16:55:28 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1725382525.html" id="CLSA-2024:1725382525" title="CLSA-2024:1725382525" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="94.el7_9.tuxcare.els3" src="python-2.7.5-94.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-2.7.5-94.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">8e8d356b99a7b14b0cbdbaddd3f971e519fcaba535f0e15d9171a22ab4ec6191</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="94.el7_9.tuxcare.els3" src="python-2.7.5-94.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-94.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">079de43bde2cb5976b61abd90724486c3e0b291526ae9a8e319c203f4456e02a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="94.el7_9.tuxcare.els3" src="python-2.7.5-94.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-94.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">5b0f5c2d585f5612de195720928bef4ac6e00ec33c29dc61674727d1b6c838d8</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="94.el7_9.tuxcare.els3" src="python-2.7.5-94.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">4c81b822a491b9a0c37b259fbab65dc5542bd6425ca34cfd0c1b8cfa81a24d74</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="94.el7_9.tuxcare.els3" src="python-2.7.5-94.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">4711718536ba74562dad2895dc2c4cbe75782a9a5dc730c8d4fe4905b8ce1524</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="94.el7_9.tuxcare.els3" src="python-2.7.5-94.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-94.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">cf535135696dc23dd466d54887796c879f198df45c1b4b2549f40e58dfc32376</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="94.el7_9.tuxcare.els3" src="python-2.7.5-94.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-94.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">69fa59ed0e6913d8ad747d3745be47e0038c79580de0b480aa0f84ba9f98bfdd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="94.el7_9.tuxcare.els3" src="python-2.7.5-94.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-94.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">4f2342ca04ff7e6455e4604b817b17575676d30016a69c2cff1c77f7d86b1a08</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1725389829</id>
    <title>kernel: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- xen/blkfront: force data bouncing when backend is untrusted {CVE-2022-33742}
- ALSA: Fix deadlocks with kctl removals at disconnection {CVE-2024-38600}
- net: fix out-of-bounds access in ops_init {CVE-2024-36883}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- xen/blkfront: force data bouncing when backend is untrusted {CVE-2022-33742}
- ALSA: Fix deadlocks with kctl removals at disconnection {CVE-2024-38600}
- net: fix out-of-bounds access in ops_init {CVE-2024-36883}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-03 18:57:17 UTC" />
    <updated date="2024-09-03 18:57:17 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1725389829.html" id="CLSA-2024:1725389829" title="CLSA-2024:1725389829" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">d648aedf085223df5e8f7ed905d8f9b72da0de0ad1f31d8843b81e194e50082a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">d93e258f5c1434d85e1fb1f752b5086fb292585b85d0b935ca6583d3e8491c83</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a59baf51a64d4b7d0fe6f0e8934f86952e78158aff75311fd45fc58e0a5132de</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">c44c35f84b1f769aeedf87fa3bcd9db6d26d446ee6ca2b0d53c44da3a5ee6341</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">d02fda27ccc0d98aa1beb1989b5df1c7b78df249dcbb8dc58a63a8e6bbd6da3b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">0721cafe08e14fcdce6c859bad0952c82113812d7cc815d50627fa9db0911d2b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">91fb0e6abe8a80165b37d17796030c798407b3721dc744261b88ab1767f0f55e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">ffb88e1279216c70a8a12614bc4144500b01e939ec29b05b02ae48c760f11b3c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">9c8e1bcd4a944ce809d089e3aefbf05f417a0537fcc6eaaf0856a2fa75f027a5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">c36ecdc9d02252d8046bc1617dd7cc17604afa376dadaeaf99bafdb01abc7865</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">5efaef24333126f976a8182c0dbd2ea54872962c2efe59685fc43b8e7c1b7587</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1725443754</id>
    <title>bind: Fix of CVE-2024-1737</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-1737: add environment variable DNS_RDATASET_MAX_RECORDS, DNS_RBTDB_MAX_RTYPES to
  override hardcoded limits DDNS_RDATASET_MAX_RECORDS and DDNS_RBTDB_MAX_RTYPES
- Fix man8 pages for dnssec utils</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-1737: add environment variable DNS_RDATASET_MAX_RECORDS, DNS_RBTDB_MAX_RTYPES to
  override hardcoded limits DDNS_RDATASET_MAX_RECORDS and DDNS_RBTDB_MAX_RTYPES
- Fix man8 pages for dnssec utils</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-04 09:55:57 UTC" />
    <updated date="2024-09-04 09:55:57 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1725443754.html" id="CLSA-2024:1725443754" title="CLSA-2024:1725443754" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="33" name="bind" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">8c51c8189d9c266c0506247ed03fdb607b66b2786ae665b48aa1c03a92cb771f</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-chroot" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">15046bbf6ecd39f68f24241e798d4b02eac20fc859c853e6442121b47a443e2e</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">bc9d91d3e496b3ca3400ea4406521cf565b885351fcc9202dc9eb86ffd879cdf</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">da81224834ce74b674e5d32e584c4a257c3d2e7714994869aedcceca86756066</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">dfc1bc92ca857e21713d13ddeb4bc769c14adcbdd81860b75d6fce7b192fdeb1</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">0af23600c981874d0f906c74c1c816631ea4faa5bcca3a9aa75f78877100fd07</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">ef3c658605841d7c95ed9aeef621b9486018a99efe0ed55058b71478f6d8b985</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">c136f59c1309fd696a5ad94a885f2e929a97e702f645037004f8ead4c1bfdb42</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">d67f6a751d0616f2ba6d4f311040d92b105ce26c9bb24ef3b9799c78dcfff1de</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">1f3ad381db736d5e9d35ad465b1e950a54465048184d183e1cfde190f0c19fdc</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">96881e319004b44a6f14a0ef724c63cae9a4ad5d7cf6915b390fda0a0d1480eb</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">ff9656fb3b745c208a3c18d3c57b9bd5b59226dfdd166f3066e2449541268bc7</sum>
        </package>
        <package arch="noarch" epoch="33" name="bind-license" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7_9.16.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">f6a29cea4d334d05badfb1150aded3d03667df3be95274ea6d292ff244a4ff63</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">d8de6710e0b89984b5b88a29863d2b4fa29213a8d22b4b7320c9c80c5eb64150</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">c8fed04c28c7c78555001a3f4e2e5b2e8a75112732bdd48ef028bf14b3a54103</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f6730d282414aef1abd6a0a5b9b46ba451fb872016c372651ed1fb2c9462cfb0</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">ea4e20d3f2fad73a1ee791e46480c798fb2af82bdd4ff05e269fbe869f1de4fd</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">8f61d4ac9334ad928c603e212f6945a96aa90d4493d71372fed1a8de2ef60c83</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">dcf426708aa1f9ad17cb977b232e12f151c806b82342df9e58241904547f119b</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">89611d7cbb1ca71abd0364126f6eed1beb6f18ee387483a67dc84dbb8e4f45c8</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-utils" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">eb4a283bb766e28a41cf2b31cb6ff9561db134996893eda8de6c36aab7fcaea9</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">0fc646ee5735a239ee8ec303cdf781d0f6b9da9b666d7402448bdf80fd94c24d</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb-chroot" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">0bb915ee445cd3c06c157aa729d91f2a04786913599ab60062373f698e008f8a</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-utils" release="26.P2.el7_9.16.tuxcare.els4" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els4.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7_9.16.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">051e23e5bc315681e9add0d601e71896b1b2e7d523b44f23c17d07737ff90230</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1725550629</id>
    <title>exim: Fix of CVE-2024-39929</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-39929: fix incorrectly parsing MIME parses filenames that are specified
  using multiple parameters</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-39929: fix incorrectly parsing MIME parses filenames that are specified
  using multiple parameters</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-05 15:37:13 UTC" />
    <updated date="2024-09-05 15:37:13 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1725550629.html" id="CLSA-2024:1725550629" title="CLSA-2024:1725550629" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="exim" release="1.el7.tuxcare.els1" src="exim-4.97.1-1.el7.tuxcare.els1.src.rpm" version="4.97.1">
          <filename>exim-4.97.1-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7d999c53fc1ac80a013150574673b6475113c038f8f81e470c863e9b9dcd955e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="exim-greylist" release="1.el7.tuxcare.els1" src="exim-4.97.1-1.el7.tuxcare.els1.src.rpm" version="4.97.1">
          <filename>exim-greylist-4.97.1-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">23a978e1612ac6bc139e17123b8aa0d257185098c844101a6401957dc561969f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="exim-mon" release="1.el7.tuxcare.els1" src="exim-4.97.1-1.el7.tuxcare.els1.src.rpm" version="4.97.1">
          <filename>exim-mon-4.97.1-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0f9a6a34c7419f0cb635aecfce16aacd0b2fa7b501b0fef36a3503475b886252</sum>
        </package>
        <package arch="x86_64" epoch="0" name="exim-mysql" release="1.el7.tuxcare.els1" src="exim-4.97.1-1.el7.tuxcare.els1.src.rpm" version="4.97.1">
          <filename>exim-mysql-4.97.1-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">edf9d83dc3fefb9f588461dedb28b7b9e07af06302a8848020796e3dcf3f2d9a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="exim-pgsql" release="1.el7.tuxcare.els1" src="exim-4.97.1-1.el7.tuxcare.els1.src.rpm" version="4.97.1">
          <filename>exim-pgsql-4.97.1-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c2ac02ead999312f7f542bdd177a272fe95c3c61647f967c203bcafe2b244efd</sum>
        </package>
        <package arch="noarch" epoch="0" name="exim-sysvinit" release="1.el7.tuxcare.els1" src="exim-4.97.1-1.el7.tuxcare.els1.src.rpm" version="4.97.1">
          <filename>exim-sysvinit-4.97.1-1.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">860c20e6b241b7c76584aa6fe1e78f8cacd0616428f2cd08798b06b4d2db6fda</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1725554505</id>
    <title>unbound: Fix of CVE-2022-3204</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-3204: add max number of lookups in the cache for target nameserver names</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-3204: add max number of lookups in the cache for target nameserver names</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-05 16:52:45 UTC" />
    <updated date="2024-09-05 16:52:45 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1725554505.html" id="CLSA-2024:1725554505" title="CLSA-2024:1725554505" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="unbound" release="5.el7_8.tuxcare.els2" src="unbound-1.6.6-5.el7_8.tuxcare.els2.src.rpm" version="1.6.6">
          <filename>unbound-1.6.6-5.el7_8.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">17b6e8792ef9e78ea91ecae0b62144afe83ed32eb12e65d55f318cde4298720a</sum>
        </package>
        <package arch="i686" epoch="0" name="unbound-devel" release="5.el7_8.tuxcare.els2" src="unbound-1.6.6-5.el7_8.tuxcare.els2.src.rpm" version="1.6.6">
          <filename>unbound-devel-1.6.6-5.el7_8.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">f33f48c6f9f759e30d5aa1c6a55a40f4c57fd80bd450b0b3aac00e63a5cf14e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-devel" release="5.el7_8.tuxcare.els2" src="unbound-1.6.6-5.el7_8.tuxcare.els2.src.rpm" version="1.6.6">
          <filename>unbound-devel-1.6.6-5.el7_8.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">9e462338d39540ef1f00b19321ea705ab65f27a186df27cf7b1de2b9856bebb6</sum>
        </package>
        <package arch="i686" epoch="0" name="unbound-libs" release="5.el7_8.tuxcare.els2" src="unbound-1.6.6-5.el7_8.tuxcare.els2.src.rpm" version="1.6.6">
          <filename>unbound-libs-1.6.6-5.el7_8.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">5eda194435c34536009e6957a7b89d118e3bf8d4093be83b0b6e12ef27eb0ed9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-libs" release="5.el7_8.tuxcare.els2" src="unbound-1.6.6-5.el7_8.tuxcare.els2.src.rpm" version="1.6.6">
          <filename>unbound-libs-1.6.6-5.el7_8.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">715f4f5fd1f4a251c176076966af1e5b993a2d3cc2b4e6062343e9408c98bd31</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-python" release="5.el7_8.tuxcare.els2" src="unbound-1.6.6-5.el7_8.tuxcare.els2.src.rpm" version="1.6.6">
          <filename>unbound-python-1.6.6-5.el7_8.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ffe2e769446a70f38c0948a6f144dc28ec05395cee4a089833c5ce8e78eeffa3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1725650489</id>
    <title>orc: Fix of CVE-2024-40897</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-40897: fix stack buffer overflow while construct error messages
- Disable gtk-doc building due lack of gtkdoc-mktmpl command in gtk-doc-1.28-2.el7</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-40897: fix stack buffer overflow while construct error messages
- Disable gtk-doc building due lack of gtkdoc-mktmpl command in gtk-doc-1.28-2.el7</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-06 19:21:33 UTC" />
    <updated date="2024-09-06 19:21:33 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1725650489.html" id="CLSA-2024:1725650489" title="CLSA-2024:1725650489" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="orc" release="1.el7.tuxcare.els1" src="orc-0.4.26-1.el7.tuxcare.els1.src.rpm" version="0.4.26">
          <filename>orc-0.4.26-1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">689f84599045d82b95324c08279ccf04f72611a0e268eb7a5cd97de824787ad4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="orc" release="1.el7.tuxcare.els1" src="orc-0.4.26-1.el7.tuxcare.els1.src.rpm" version="0.4.26">
          <filename>orc-0.4.26-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1f24ff18c0fb37ac4bb6165f047950840bcb948c66eca755f820e840a974fbed</sum>
        </package>
        <package arch="x86_64" epoch="0" name="orc-compiler" release="1.el7.tuxcare.els1" src="orc-0.4.26-1.el7.tuxcare.els1.src.rpm" version="0.4.26">
          <filename>orc-compiler-0.4.26-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">48176814d2ed4d31de4aacadccdba628343fec4c9839db5703d03b9278fdc220</sum>
        </package>
        <package arch="i686" epoch="0" name="orc-devel" release="1.el7.tuxcare.els1" src="orc-0.4.26-1.el7.tuxcare.els1.src.rpm" version="0.4.26">
          <filename>orc-devel-0.4.26-1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">924bc0dd84a3b4005655d227fbea0c4a8d2cbbbfa63fddd178b546413ada3e2f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="orc-devel" release="1.el7.tuxcare.els1" src="orc-0.4.26-1.el7.tuxcare.els1.src.rpm" version="0.4.26">
          <filename>orc-devel-0.4.26-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">520b12295e1090506e46bd4b85a25fce69625188a3ea1a4b1a51579d3992fdad</sum>
        </package>
        <package arch="noarch" epoch="0" name="orc-doc" release="1.el7.tuxcare.els1" src="orc-0.4.26-1.el7.tuxcare.els1.src.rpm" version="0.4.26">
          <filename>orc-doc-0.4.26-1.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">d07d172f4d11e25662a00d5aca7c26a213e9bd487eef9a3e65f875be8de8c588</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1725882897</id>
    <title>kernel: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- media: dvb-core: Fix use-after-free due on race condition at dvb_net {CVE-2022-45886}
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 {CVE-2022-45919}
- bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() {CVE-2024-39487}
- net: fix __dst_negative_advice() race {CVE-2024-36971}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- media: dvb-core: Fix use-after-free due on race condition at dvb_net {CVE-2022-45886}
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 {CVE-2022-45919}
- bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() {CVE-2024-39487}
- net: fix __dst_negative_advice() race {CVE-2024-36971}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-09 11:55:01 UTC" />
    <updated date="2024-09-09 11:55:01 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1725882897.html" id="CLSA-2024:1725882897" title="CLSA-2024:1725882897" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">e9bb01ba9418370734f98d1e613eedec9f6b696bec2336c1491fead7bfccd5e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">ae8ee1b6b4c54ba86778097e7bea0dc801ee85dd2122d6863f201aad05a79fe6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">cff165a3237b06d31735cc5bd6006e920e01a3290f5147e279d1897e293aed44</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">71c1d4bfc46da248be31c3e3e5fb47d8b67f2db4149d0a2d0d9acb2c4b55d8b7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">9352ac9acd91131641a734acbed4fe2a6f8f2aadf8c6be5efc2b80eb8c21a7ec</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">7ba1a12fcd72fcc4a9909bbef13ebecadf4fbb77db204bd4939f35004abe9f8c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">a66a9860e7abcad4cb6ac8a4cc0212d4b90c8371b1b2b56b9d782550eb4cef0c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">ae3daec61dc3b151e222a78bea326ab0c54ef961bc87c7aa4fc695c52e0b9e18</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">5b5e2d732f5712e633af5dbcccc5ff614bf0b0dae88b4cb07473fcd6fa9653c8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">1d6a0704db8d8a7db91d432b5a4ec532f3f57cf1e51da8376ec387b746fa1e5d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els5" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els5.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">d18068da76bf525f87c24645f6fdddcd3a8e24d6b189da2958ed5ef20f5ccf4b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1726313380</id>
    <title>flatpak: Fix of CVE-2024-42472</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-42472: access to files outside sandbox for apps using persistent
  directories</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-42472: access to files outside sandbox for apps using persistent
  directories</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-14 11:29:44 UTC" />
    <updated date="2024-09-14 11:29:44 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1726313380.html" id="CLSA-2024:1726313380" title="CLSA-2024:1726313380" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="flatpak" release="13.el7_9.tuxcare.els1" src="flatpak-1.0.9-13.el7_9.tuxcare.els1.src.rpm" version="1.0.9">
          <filename>flatpak-1.0.9-13.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6ca0b442b555dbb5da201eb80c8d04f3307ce38a6af78fdd8d97f464696963cd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="flatpak-builder" release="13.el7_9.tuxcare.els1" src="flatpak-1.0.9-13.el7_9.tuxcare.els1.src.rpm" version="1.0.0">
          <filename>flatpak-builder-1.0.0-13.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0364689a1542360681cfc4887ae4b5a9cd6b6dd0429658e3f43ed3cb3bcbe39c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="flatpak-devel" release="13.el7_9.tuxcare.els1" src="flatpak-1.0.9-13.el7_9.tuxcare.els1.src.rpm" version="1.0.9">
          <filename>flatpak-devel-1.0.9-13.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ad19d31dffb2c4de4c595356b1e4bbdeab7771bbcac5fd8892fdec206ebf9e19</sum>
        </package>
        <package arch="x86_64" epoch="0" name="flatpak-libs" release="13.el7_9.tuxcare.els1" src="flatpak-1.0.9-13.el7_9.tuxcare.els1.src.rpm" version="1.0.9">
          <filename>flatpak-libs-1.0.9-13.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e8cce63b47c7ab72c2b1e35d01936a1ef5492a2df743b28307618d0088b7a254</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1726314403</id>
    <title>Update of httpd</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- mod_proxy: Fix ProxySourceAddress binding failure with AH00938</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- mod_proxy: Fix ProxySourceAddress binding failure with AH00938</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-14 11:46:46 UTC" />
    <updated date="2024-09-14 11:46:46 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1726314403.html" id="CLSA-2024:1726314403" title="CLSA-2024:1726314403" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">4fec53163dbdda346b75ec6aec34300ab7d6f4c6472e9ce3b0e9fa71fd79d3b2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">8b0c8bea40562dab0ea6600a9da434fbb6f8ef449bc2b09ff5bc751ed650b060</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">d8131b32ed21266b832a3bb218f417101124481b377623475d43e7647926ad16</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">2223c7f4454e34edf5d86e43a9b05da8914a3f0ce8e7ec048747ffb5139ce4de</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">4a2d8b6111a3b427b442081cf95708de9812576395ce3933d9aac3d38c9490c0</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">6760f799f866f6299bd7f5037b0bb3d479b7b4e4a94fd00a1dbeb407b3c74faa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">326ab803a44690612e6c409bbd43117393cced60157a10d5cc2e2c0e2e8e69f9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">a8535ef2ed8e875077dd55a220c2088c8dd7137319902adab4a6b93a72bdd757</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1726608591</id>
    <title>expat: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-45490: Reject negative length for XML_ParseBuffer in xmlparse.c
- CVE-2024-45491: Detect integer overflow in dtdCopy on 32-bit platforms
- CVE-2024-45492: Detect integer overflow in nextScaffoldPart on 32-bit platforms</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-45490: Reject negative length for XML_ParseBuffer in xmlparse.c
- CVE-2024-45491: Detect integer overflow in dtdCopy on 32-bit platforms
- CVE-2024-45492: Detect integer overflow in nextScaffoldPart on 32-bit platforms</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-17 21:29:54 UTC" />
    <updated date="2024-09-17 21:29:54 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1726608591.html" id="CLSA-2024:1726608591" title="CLSA-2024:1726608591" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="expat" release="15.el7_9.tuxcare.els2" src="expat-2.1.0-15.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-2.1.0-15.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">ae2d96373978a1429bddd5b33be8f1b92e35000aec2f17743bb9fc5e4971ea2c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat" release="15.el7_9.tuxcare.els2" src="expat-2.1.0-15.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-2.1.0-15.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">b713302cfc1bcc7b4800361bdda6d2db4a35bd54986f68c5efbf395876d877f8</sum>
        </package>
        <package arch="i686" epoch="0" name="expat-devel" release="15.el7_9.tuxcare.els2" src="expat-2.1.0-15.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-devel-2.1.0-15.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">877f7999b4e86f581798823d5c6276ccbb86f162afe66f81b88a6bba08be172e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat-devel" release="15.el7_9.tuxcare.els2" src="expat-2.1.0-15.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-devel-2.1.0-15.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">7bf9cd00f13fe37ac283a4431ac701b27ab574564e46a72517301a19f72583d4</sum>
        </package>
        <package arch="i686" epoch="0" name="expat-static" release="15.el7_9.tuxcare.els2" src="expat-2.1.0-15.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-static-2.1.0-15.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">83ccf7c2f94d61895b718b5fe40c3ac3b58eb86335fe4278201b749a4755e584</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat-static" release="15.el7_9.tuxcare.els2" src="expat-2.1.0-15.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-static-2.1.0-15.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">fac642c8af9dca8faebaf780b3a5c06222ff8cd63faa0f83197106293766033f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1726651745</id>
    <title>kernel: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- drm/vmwgfx: Validate the box size for the snooped cursor {CVE-2022-36280}
- USB: ene_usb6250: Allocate enough memory for full object {CVE-2023-45862}
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory {CVE-2022-42895}
- stm class: Fix a double free in stm_register_device() {CVE-2024-38627}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- drm/vmwgfx: Validate the box size for the snooped cursor {CVE-2022-36280}
- USB: ene_usb6250: Allocate enough memory for full object {CVE-2023-45862}
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory {CVE-2022-42895}
- stm class: Fix a double free in stm_register_device() {CVE-2024-38627}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-18 09:29:08 UTC" />
    <updated date="2024-09-18 09:29:08 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1726651745.html" id="CLSA-2024:1726651745" title="CLSA-2024:1726651745" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">5a704460e51250eed4c9cb125466f628e54566e8cf1948eeb6e16e2b1097f011</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">df8b18201545f4c20232a3f0f2087f59392818cc9436704ed843c40b31a9f4e9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">944d415e1a02d55fe3d81256680012875e1c4814eeeb123e5e62916994092604</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">20fc73a0c82a4e98d8ca79876680abaeb38f4ceaf13cec4e6039728819ac0420</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">271828abf3017914fb573863e28b52c3dbbf7ec09df5163dc7c0ad088776351b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">2f75bd903e9b1404ee7d437799ee9d4a795e83f6cccd427f27487b4ad247c629</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">c02d70bc10d0ae1700513873f5c12a0dad621a27320afada1f14b746a61698ba</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">c3a6cf753d929ff41205e8e34412737ea56a6f251339d2a9bd09fdb17e1fdb72</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">86a6f5b3edc1dc132d2c78b179385feeed551921b0dc6221e14443249d5f0516</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">705bef00253a1f2660ff758d9586f9b27b775add9f0b6c0e72233b0be7633bcf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els6" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els6.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">9d5004e29effa928f3a714957752c46c38e5ea0cafbdf9dfa33ba15552be8385</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1726840907</id>
    <title>krb5: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-37370: prevent modification of Extra Count field in GSS krb5 wrap
  token to avoid appearing truncated to application
- CVE-2024-37371: fix invalid memory reads during GSS message token handling</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-37370: prevent modification of Extra Count field in GSS krb5 wrap
  token to avoid appearing truncated to application
- CVE-2024-37371: fix invalid memory reads during GSS message token handling</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-20 14:05:33 UTC" />
    <updated date="2024-09-20 14:05:33 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1726840907.html" id="CLSA-2024:1726840907" title="CLSA-2024:1726840907" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="krb5-devel" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>krb5-devel-1.15.1-55.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">63e772536988063d2b45ea00a0b9f0c525e84d3f5a34418ffaebcfdb14c9e8f3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-devel" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>krb5-devel-1.15.1-55.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5f8fe636de3de015de357b1cc053e6b1ca1b7910751bb0d09a70dbec95f8f2ba</sum>
        </package>
        <package arch="i686" epoch="0" name="krb5-libs" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>krb5-libs-1.15.1-55.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">4587eda79d19a6a91378a3a45df616f7e3c94c554d28c1f03fb8b4728fcf4251</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-libs" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>krb5-libs-1.15.1-55.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">db466ad7a32237ae7d651a9f99c441956e9b52d14f83ae28e38435b65fb8d5ff</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-pkinit" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>krb5-pkinit-1.15.1-55.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">70b69adc25fffd68ace6a7852bd6d78ac18518143d7a1a80554b82d07132b015</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-server" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>krb5-server-1.15.1-55.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e53c1c78f3d4f9f0d59da8f3277d9ceac3270680567c313c4b423ca247c63b4c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-server-ldap" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>krb5-server-ldap-1.15.1-55.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e0c199eb6c77026b5adc28e09dd5d9d726a2ec84855f8c6bcedc7570802f2095</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-workstation" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>krb5-workstation-1.15.1-55.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c1777177b43028ac82bae70f65f69a3c3b60485be94cb5e7f977d214c6a785ba</sum>
        </package>
        <package arch="i686" epoch="0" name="libkadm5" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>libkadm5-1.15.1-55.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">039244923ab4e5cf5cac98e6cba5fc45b12d78535643959fd1e71b1e0b9e8fba</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libkadm5" release="55.el7_9.tuxcare.els1" src="krb5-1.15.1-55.el7_9.tuxcare.els1.src.rpm" version="1.15.1">
          <filename>libkadm5-1.15.1-55.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c2f7b6d8c77abf8e8ac1e7fb8581f15f8a02e2e7c0c4f3aa32808738a5f05cb1</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1727115733</id>
    <title>ruby: Fix of CVE-2021-41819</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-41819: when parsing cookies, only decode the values</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-41819: when parsing cookies, only decode the values</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-23 18:22:16 UTC" />
    <updated date="2024-09-23 18:22:16 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1727115733.html" id="CLSA-2024:1727115733" title="CLSA-2024:1727115733" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="ruby" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.0.648">
          <filename>ruby-2.0.0.648-39.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">5c5be6d491830bb1d1156e5552c1296bdacf706995d2e314a628690fa7a99daf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-devel" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.0.648">
          <filename>ruby-devel-2.0.0.648-39.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">ce55cd1e524e64c8853879e707c990eaaaedf512e93972c714e78640767995b4</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-doc" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.0.648">
          <filename>ruby-doc-2.0.0.648-39.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">05dfa268b4124f4740b61e3a6f5a7426328b1600b9b6055855167f0f344de8a4</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-irb" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.0.648">
          <filename>ruby-irb-2.0.0.648-39.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">16aa3828a6bc093de2548dac79aa70e4edbd346b401c488d3c60b126727ab6b2</sum>
        </package>
        <package arch="i686" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">deccc265640c08f9eb8092702f7d95af06f657e7a80f0652430c2c1621154a69</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">ea2c04febe601f2ec70a00b3afe7504ae68d49621dafcdeb411df8ff3e6dff1b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-tcltk" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.0.648">
          <filename>ruby-tcltk-2.0.0.648-39.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">a0dc76f78dc2c95e1af2924f0e37810865f012c20f353ac24e3f6b9cecd881b7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-bigdecimal" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="1.2.0">
          <filename>rubygem-bigdecimal-1.2.0-39.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">05ff0e106108c34035439618d1c9f5b5cd44c92f7d0c9ed6c025d64d0b151eca</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-io-console" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="0.4.2">
          <filename>rubygem-io-console-0.4.2-39.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">aa59cff917d931e58f3da620f2a2c2b0833b24ff953aacd5e258fd81f0d604de</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-json" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="1.7.7">
          <filename>rubygem-json-1.7.7-39.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">6048f1f40838ab944004ee1885326f2192cd0d90b72e90b78202f13007c1bd7e</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-minitest" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="4.3.2">
          <filename>rubygem-minitest-4.3.2-39.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">a9b647f05c3ac23635a51a3bd891b59fc45f7f6063c45c57b7fbfa5756185f73</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-psych" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.0">
          <filename>rubygem-psych-2.0.0-39.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">09ec84ae7682f3b7833bdff218e75ebdf7fffff188812646c078f03577bca3a2</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rake" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="0.9.6">
          <filename>rubygem-rake-0.9.6-39.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">7b5dd1a1e599b9a76bf55139c5721f99e120c4265b814194a88336e296cbd2a1</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rdoc" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="4.0.0">
          <filename>rubygem-rdoc-4.0.0-39.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">bbc40475b08db0d6c22fa96177d0bc8c88b2f41dad120c6e94f8095498df3e2d</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.14.1">
          <filename>rubygems-2.0.14.1-39.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">b2a92d4928071ef1f25a294c08b8f5442679d053471a6ba3f19e048ec49eb73a</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems-devel" release="39.el7_9.tuxcare.els5" src="ruby-2.0.0.648-39.el7_9.tuxcare.els5.src.rpm" version="2.0.14.1">
          <filename>rubygems-devel-2.0.14.1-39.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">31ab7bed3850080a4540e11e404b650ca34c239eac33dc34b8a961b45ba4f86c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1727167500</id>
    <title>kernel: Fix of 11 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- wifi: mac80211: Avoid address calculations via out of bounds array indexing {CVE-2024-41071}
- bnx2x: Fix multiple UBSAN array-index-out-of-bounds {CVE-2024-42148}
- exec: Fix ToCToU between perm check and set-uid/gid usage {CVE-2024-43882}
- scsi: aacraid: Fix double-free on probe failure {CVE-2024-46673}
- ipv6: prevent UAF in ip6_send_skb() {CVE-2024-44987}
- fou: remove warn in gue_gro_receive on unsupported protocol {CVE-2024-44940}
- media: xc2028: avoid use-after-free in load_firmware_cb() {CVE-2024-43900}
- dev/parport: fix the array out-of-bounds risk {CVE-2024-42301}
- mISDN: Fix a use after free in hfcmulti_tx() {CVE-2024-42280}
- netfilter: nftables: exthdr: fix 4-byte stack OOB write {CVE-2023-52628}
- Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg {CVE-2023-51779}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- wifi: mac80211: Avoid address calculations via out of bounds array indexing {CVE-2024-41071}
- bnx2x: Fix multiple UBSAN array-index-out-of-bounds {CVE-2024-42148}
- exec: Fix ToCToU between perm check and set-uid/gid usage {CVE-2024-43882}
- scsi: aacraid: Fix double-free on probe failure {CVE-2024-46673}
- ipv6: prevent UAF in ip6_send_skb() {CVE-2024-44987}
- fou: remove warn in gue_gro_receive on unsupported protocol {CVE-2024-44940}
- media: xc2028: avoid use-after-free in load_firmware_cb() {CVE-2024-43900}
- dev/parport: fix the array out-of-bounds risk {CVE-2024-42301}
- mISDN: Fix a use after free in hfcmulti_tx() {CVE-2024-42280}
- netfilter: nftables: exthdr: fix 4-byte stack OOB write {CVE-2023-52628}
- Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg {CVE-2023-51779}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-24 08:49:55 UTC" />
    <updated date="2024-09-24 08:49:55 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1727167500.html" id="CLSA-2024:1727167500" title="CLSA-2024:1727167500" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b30ce17e019314a558643fe0f0567739cec7b5cb32965f050ff978b49915d1ac</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">8a36c9a229dc9fa3de95139d343860cfae85dcf71fd9bc8b51dc742d2ea2b7e1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">a9ae4472c9132b5424e4a32486d342b27864119bd9fa8fc2dfd2721a1ca9767f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">f5ddec77b77dea557d2ecbf29d042ff1d5496ec33de7e8bea867f7801397e7d6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">3be7a16207c71204f06a841be5ef29d87801b55f2726f4873aeca7bd956621b9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b07f37818d84332cae6c6d83f3230bc9e9f2c02178847fd477bec2068d3ad5c8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">fd7c4fb774421190b7cd4c0274c1e4e8ab08caa16ac2dbc9599c5cddcf045c32</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">34b96af261184fd3114e25dd62c1690a34a9d18f46693bc308739f0047598f09</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">51968d99b3ff38fa3e9fce6ec3b13cbae32931885b73a47ad4e8c1d5f71e934f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">3315c6f82e9df63de078cff7775dcf3b5855bf972b6d938898a57bd10c53b861</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els7" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els7.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">5537ea7013f0f10c4b90987b244f01573719d5cfb806e87c4eaa110764773791</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1727287647</id>
    <title>emacs: Fix of CVE-2024-48337</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-48337: fix etags local command injection vulnerability</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-48337: fix etags local command injection vulnerability</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-25 18:12:44 UTC" />
    <updated date="2024-09-25 18:12:44 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1727287647.html" id="CLSA-2024:1727287647" title="CLSA-2024:1727287647" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="emacs" release="23.el7_9.1.tuxcare.els1" src="emacs-24.3-23.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-24.3-23.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f1d74034e1fd85a29ddbce0b44671475ae22c5e85ea9a079fed974be58e47ecd</sum>
        </package>
        <package arch="x86_64" epoch="1" name="emacs-common" release="23.el7_9.1.tuxcare.els1" src="emacs-24.3-23.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-common-24.3-23.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cc46e7d81c6b448149df304ce09a36de92dfc3decf5ed4effba96d428bbc3893</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-el" release="23.el7_9.1.tuxcare.els1" src="emacs-24.3-23.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-el-24.3-23.el7_9.1.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">d70f1bd2e4ab91549b4ecbddc67dba8b1c6665e7e46227460217ee3b569adcb2</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-filesystem" release="23.el7_9.1.tuxcare.els1" src="emacs-24.3-23.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-filesystem-24.3-23.el7_9.1.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">08405240700bf4a5a66bcf91a2a713ec13a02dca44b04f950373b650d478f7b5</sum>
        </package>
        <package arch="x86_64" epoch="1" name="emacs-nox" release="23.el7_9.1.tuxcare.els1" src="emacs-24.3-23.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-nox-24.3-23.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">16b36f2e8e18f802e5c0caa3deff37f148f14371bf0029b184ab26dd544f77a1</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-terminal" release="23.el7_9.1.tuxcare.els1" src="emacs-24.3-23.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-terminal-24.3-23.el7_9.1.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">646e80f307b097b69b4bd656a791a8ef3fa0627532d99d443a9ac2290a38bcda</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1727288321</id>
    <title>linux-firmware: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update AMD CPU microcode for processor family 0x19:
  cpuid:0x00A00F10(ver:0x0A00107A), cpuid:0x00A10F12(ver:0x0A101248),
  cpuid:0x00AA0F02(ver:0x0AA00215), cpuid:0x00A00F12(ver:0x0A001238),
  cpuid:0x00A10F11(ver:0x0A101148), cpuid:0x00A00F11(ver:0x0A0011D5);
- Update AMD CPU microcode for processor family 0x17:
  cpuid:0x00800F12(ver:0x0800126F), cpuid:0x00830F10(ver:0x0830107C);
- Fix CVE-2023-31315 (AMD-SB-7014), CVE-2023-20592 (AMD-SB-3005)
- Update AMD CPU microcode to 2024-08-11</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update AMD CPU microcode for processor family 0x19:
  cpuid:0x00A00F10(ver:0x0A00107A), cpuid:0x00A10F12(ver:0x0A101248),
  cpuid:0x00AA0F02(ver:0x0AA00215), cpuid:0x00A00F12(ver:0x0A001238),
  cpuid:0x00A10F11(ver:0x0A101148), cpuid:0x00A00F11(ver:0x0A0011D5);
- Update AMD CPU microcode for processor family 0x17:
  cpuid:0x00800F12(ver:0x0800126F), cpuid:0x00830F10(ver:0x0830107C);
- Fix CVE-2023-31315 (AMD-SB-7014), CVE-2023-20592 (AMD-SB-3005)
- Update AMD CPU microcode to 2024-08-11</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-25 18:18:46 UTC" />
    <updated date="2024-09-25 18:18:46 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1727288321.html" id="CLSA-2024:1727288321" title="CLSA-2024:1727288321" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="iwl100-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="39.31.5.1">
          <filename>iwl100-firmware-39.31.5.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">972a45746c118820f9580a0dc2fa8350e754741f6ffbb9817ea1abb95482dd1b</sum>
        </package>
        <package arch="noarch" epoch="1" name="iwl1000-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="39.31.5.1">
          <filename>iwl1000-firmware-39.31.5.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">4eeb982a0880e099445e605041075973b839905bf3bad37778ad73ea48ec1447</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl105-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="18.168.6.1">
          <filename>iwl105-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">80197e7824b424222f1019b69d5bf9700189d23e4385ed7f37694988e2f63ac3</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl135-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="18.168.6.1">
          <filename>iwl135-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">3c3d118822d3c059ace345d308f3945ecd8cf2d723492a252a9e39344cab1ce0</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2000-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="18.168.6.1">
          <filename>iwl2000-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">dba7c2091bdac96b2abb6fd90bdcad5bfa9580726ae059255afe20b14968c0bd</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2030-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="18.168.6.1">
          <filename>iwl2030-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">77f72940a00eee64df66dbf3b2e484deeb6b31f44e5573750fb932b7269e6a2e</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3160-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="25.30.13.0">
          <filename>iwl3160-firmware-25.30.13.0-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">8249c7a3cec20f4fc7f48faa1aa5a6de8c462a2ab84e68361befbae6dfb0f0e9</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3945-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="15.32.2.9">
          <filename>iwl3945-firmware-15.32.2.9-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">8a49153c461480cf55bbda858f76c639d82f551b4c9e5babec8f8ca633826c02</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl4965-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="228.61.2.24">
          <filename>iwl4965-firmware-228.61.2.24-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">279ca7f090e4097ac32590b4d4d3294605aec2973f95970bc5a10ea0028b8863</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5000-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="8.83.5.1_1">
          <filename>iwl5000-firmware-8.83.5.1_1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">66bdcd352dbf0dad246b6427f4b268349416615b9de642042f444773128044f3</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5150-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="8.24.2.2">
          <filename>iwl5150-firmware-8.24.2.2-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">f9f3aa6691aa76433268554100f833ba115de8dd4c04d5c3c6e45df266f8fc0b</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="9.221.4.1">
          <filename>iwl6000-firmware-9.221.4.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">75e3a39cb350f1cb3b86e12ee249188f9abeebe3dc8928f271035782026bf083</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2a-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2a-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">0138971c7f404ac5eacf3199a22a9b6f56bba8e4d9b1a0a0770fbba0c35cd8c1</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2b-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2b-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">32d670fd74bb0ad74086b25ce1884cd060700a72b558a70ea1bb987f9a766a5c</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6050-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="41.28.5.1">
          <filename>iwl6050-firmware-41.28.5.1-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">d4dfd922dc7b34dff910293b473957c59385f83da3b2d7300ab5b10b9c9625c1</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl7260-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="25.30.13.0">
          <filename>iwl7260-firmware-25.30.13.0-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">94b4f82646e76d7d03c6774eaa862270d21493fd99c08a4d8cfdab17f215e227</sum>
        </package>
        <package arch="noarch" epoch="0" name="linux-firmware" release="83.git78c0348.el7_9.tuxcare.els2" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.src.rpm" version="20200421">
          <filename>linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">ac05923d38bc42ea87323ee40dd8d8387986d3ee6b9027ad872065fc966fb4bf</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1727288730</id>
    <title>php: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2020-7071: fix URL validation with functions like
  filter_var($url, FILTER_VALIDATE_URL)
- CVE-2021-21705: fix URL validation functionality via filter_var() function
  with FILTER_VALIDATE_URL parameter when an URL with invalid password field
  can be accepted as valid</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2020-7071: fix URL validation with functions like
  filter_var($url, FILTER_VALIDATE_URL)
- CVE-2021-21705: fix URL validation functionality via filter_var() function
  with FILTER_VALIDATE_URL parameter when an URL with invalid password field
  can be accepted as valid</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-25 18:25:35 UTC" />
    <updated date="2024-09-25 18:25:35 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1727288730.html" id="CLSA-2024:1727288730" title="CLSA-2024:1727288730" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">91b96e592deef81589c491e475181ebdf470f512f68525e335e9777583a1fb45</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">82125b8f28d81b53fd393e0bcb4d2aad0d4af1e7fc447342731e06e052a986f4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">616ea1249ee17763608b47ce06c46009b95e2fe81caef69e68e18531f6188165</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">237d09043ceb63c0603dae79843f06cf0ef7982a47a9f2e325f6da17f79ba87c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">c9ab93628bfafa0b11e84a5eac1c501b1631f91719fe5e9b31dd9a12522de5dd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">e7c609ce08d0864957842a5acc49fd271c28477a73c6096ff63d1fda16ac9431</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3dfc5399761cce7afe98bd6ff5026e1af0bd305af6377302a871f66ef8a86d9e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">24f3a9509415ef9acd5fdacc494d460034177b084c813dd4993da4dbc8d6c7db</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">face77e0d662e27366f4e7566355e0b251390531d9653ab84f1aae880b197d97</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ac1969c02eac9bda199a14d8d555a3e89f6d34c64dc0c64e84874d2e232b1622</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">74f82f7a8a7b1ae2ac63e7d0884b71aacb2573d67733e70fe29be5b0fe039938</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">a8e417d65265bfdf16c50948ec976a098bc49b4c88a21263c64677cc1562602a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">9a146dc91ccb8ba33e275c989a0fa2ec2dd051a55cb5e25938ed28881407e168</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">fc73a4edd4148fcf91f45a07485e836b320260f3ff207e721b14706b808fe896</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">57dbf9c80e9f3ef9c0861bd3ada198170fc5a9d668b1480d4d31fcd1daf88c03</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">4df45113ac6c13950983986e0d595f37e4855b31938be597c150450adf5e35b7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1c0eba16e0ea248cb6deceb15f8596c350102e32518f28455acc668a984fa40c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">da6e3b289cf8e9dccb9f39e893afd3dd5acad95224896e2477859ea57d3f68cd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">13e9361bc7b713f32de3fe3c155fd9a074c936dd271dbef9ae6136bc25b812db</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">87273b7ed8fd579a4ff42883dc4d4bf5bececff2c8c4e5330debe7c1f5c1b950</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">bb14bb347d2915c3b44f5fdf77d9b4fcd66990046edc33e84bf61f2616e08641</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">b6805a8e9780203c53d4c71859aa6e25215198b3e1195b9c327ef8c946387aa4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">49ea299924b52de5a18d0227cafb6169fbff57ecdb02542825ee0c6eca1d2a90</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">a461739866d642872691e721f5c1450b1497ac7fe3e3d7043b3fbfceca99c458</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els2" src="php-5.4.16-48.el7.tuxcare.els2.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">cee2281d806b0314e73c262fe4caf971152e2d6ff16e26f2698dd1601ee7fa7a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1727289133</id>
    <title>python3: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-6232: remove backtracking when parsing tarfile headers
- CVE-2024-7592: fix quadratic complexity in parsing "-quoted cookie values
  with backslashes</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-6232: remove backtracking when parsing tarfile headers
- CVE-2024-7592: fix quadratic complexity in parsing "-quoted cookie values
  with backslashes</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-25 18:32:18 UTC" />
    <updated date="2024-09-25 18:32:18 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1727289133.html" id="CLSA-2024:1727289133" title="CLSA-2024:1727289133" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">bc2e4502e1fabf66232ff0f43f1151788d90e14c448d6c1ca284a7d0db11203b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">018928f7ecf11b7758489cf664b022dd2b8261c9bd48560d332b8743cdee54d4</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">4359722a03158295398fed6b755812ca88507a034003c895c3ad2bf90c0b1070</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">10bbd5639e9bb81b98f10c36039f9ad1d3e96f939ebe53b6eaaa738d396a5bb3</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">5a2032eac3c5367015c63a6017245cdb0cf43ba00a726ce2cbc1cc049ea5b8d2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">5fdef25a3109a005fa60e4e8e34d1e1fc7838b68b53934445eabb57d74616f71</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">b8b082040eda32e39efe352458ef6f375429ebc533d78a3a7f835d1d3371be71</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">eacf88a4509dd5c65be6f9b54746b3e8f6d22557d9b80cdb78c521d207d11145</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">bd6d0fd326e16db6145fcfa8abd73c9d2183b90506a230c929e85668236fd354</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">3bfb8d3df2d5b13a921cd102f614a0c5fc540a57c133d58bbaa20557c8e4c0ac</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">f801d80020c7a340a27c943822ec341ea65a0b65c15b3c6267dbe2dea8b36965</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">7cfb03fc4ee2b473f1d5d01aed96122ce247938d9ed6141c35686bd3e69b30f2</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">9ad11a66ba70d403360cbee149f2128290581761d2529cd030d9b762eb061283</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="21.el7_9.tuxcare.els4" src="python3-3.6.8-21.el7_9.tuxcare.els4.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">294e8ea7c05e97e60c59f0dbf4cf35a3e349d91da787db72cfb24fc72621d903</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1727289456</id>
    <title>python: Fix of CVE-2024-6232</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-6232: fixed regular expressions that allowed excessive
  backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS
  via specifically-crafted tar archives.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-6232: fixed regular expressions that allowed excessive
  backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS
  via specifically-crafted tar archives.</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-25 18:37:41 UTC" />
    <updated date="2024-09-25 18:37:41 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1727289456.html" id="CLSA-2024:1727289456" title="CLSA-2024:1727289456" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="94.el7_9.tuxcare.els4" src="python-2.7.5-94.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-2.7.5-94.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">84ddd876f26a6a87440641144dd8358445e414d0b491f54bd995bf8a4dceecac</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="94.el7_9.tuxcare.els4" src="python-2.7.5-94.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-94.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f1aaeb71dc3f410e7c1dfa89fd877a8e727356c885378fbc3732c1f9f4622238</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="94.el7_9.tuxcare.els4" src="python-2.7.5-94.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-94.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">c62ef0c759a86b15187c9547802f3694954e36520563f5b618c4d0ca347f98d1</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="94.el7_9.tuxcare.els4" src="python-2.7.5-94.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">59a0bbb309c161a5082e8142fbb15f1589f32c45d6a23ef3e0a3010a8c0b345d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="94.el7_9.tuxcare.els4" src="python-2.7.5-94.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">b46c246b21227c46c617bb933f2d6acfb0945c5df60739cf1fdf3e94c2106870</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="94.el7_9.tuxcare.els4" src="python-2.7.5-94.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-94.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">ee2c8d8e72326779f61f003bb5a151050ba8ed903429d23b91dfc187bafb56a1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="94.el7_9.tuxcare.els4" src="python-2.7.5-94.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-94.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">532fdf0290bfed042fc0e808c9ec5d05b0d5829ee5f88a9feb165124d1f0bee0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="94.el7_9.tuxcare.els4" src="python-2.7.5-94.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-94.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a3cf13aa9f33939c214389f5e646327285e7b18d469c5cf7e75e61a75063b6b2</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1727692412</id>
    <title>kernel: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- sch/netem: fix use after free in netem_dequeue {CVE-2024-46800}
- VMCI: Fix use-after-free when removing resource in vmci_resource_remove() {CVE-2024-46738}
- drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number {CVE-2024-46724}
- drm/amdgpu: fix ucode out-of-bounds read warning {CVE-2024-46723}
- drm/amdgpu: fix mc_data out-of-bounds read warning {CVE-2024-46722}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- sch/netem: fix use after free in netem_dequeue {CVE-2024-46800}
- VMCI: Fix use-after-free when removing resource in vmci_resource_remove() {CVE-2024-46738}
- drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number {CVE-2024-46724}
- drm/amdgpu: fix ucode out-of-bounds read warning {CVE-2024-46723}
- drm/amdgpu: fix mc_data out-of-bounds read warning {CVE-2024-46722}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-09-30 10:33:35 UTC" />
    <updated date="2024-09-30 10:33:35 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1727692412.html" id="CLSA-2024:1727692412" title="CLSA-2024:1727692412" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">97df0e85d02dc921e402d7cac7a8225949b5b0a0245bc6126fab143edf7b377e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">35202408c77d7b5e927c35a067fbfea716607e8e8176709feebc4069788daa5a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">6ac9d7ce91df0264b9890dfc4dc0e046bbbb01b69cee4d3582a6659aae60d55d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">38c751776590bd4f6695a86b157b9f9e9540bfd4cdb1ed25fd3eace03c7809d1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">4bee98ef7aa42e117610fc61489b17d99e6d2dc6469030e29a2f92a7b96bec38</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">25346b7ba17d9aab0ab1e87fac5c793ad0704acea7f85ea29edee4f84a761d49</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">149c1b71327a7596004725dd9682e10d1211091f19ec0b3fb5689f2097bed1bd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">a0afe2252411bd8a2b80d7c8770653502af55bd5e36df784b35b9c65c2e1e682</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">ab38a0b23c7c2952d48ae78790012b2b48053c9e7462a9d90cbe238b7da28b99</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">9f57debf1af47dcb0217a9d473e267b89bd1561f1e800e07b93dbb32e8ac9798</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els8" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els8.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">9c198c6778caf1c2791521085f5aadeaa403ae3f7ae7213eef64896087838ba4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1727980155</id>
    <title>python: Fix of CVE-2024-7592</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-7592: fix algorithm with quadratic complexity to avoid using excess
  CPU resources while parsing the cookie value.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-7592: fix algorithm with quadratic complexity to avoid using excess
  CPU resources while parsing the cookie value.</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-03 18:29:19 UTC" />
    <updated date="2024-10-03 18:29:19 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1727980155.html" id="CLSA-2024:1727980155" title="CLSA-2024:1727980155" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="94.el7_9.tuxcare.els5" src="python-2.7.5-94.el7_9.tuxcare.els5.src.rpm" version="2.7.5">
          <filename>python-2.7.5-94.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">458f1959ee24a74c42bc7a44abf96f3b6a0571b0eb014c9eda9035e7219d4b53</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="94.el7_9.tuxcare.els5" src="python-2.7.5-94.el7_9.tuxcare.els5.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-94.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">1b221a91c6d5f3144118b239f9d2320da0e2f2296718cf2002b26da6bca7c02b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="94.el7_9.tuxcare.els5" src="python-2.7.5-94.el7_9.tuxcare.els5.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-94.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">3a7528aa0cfe5c7326b17494f64d4be314778707fbac2b7f5170e6c83ed73f3c</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="94.el7_9.tuxcare.els5" src="python-2.7.5-94.el7_9.tuxcare.els5.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">a436b91e7b21e9df5ce1ff1de8add8cbf25b4305d95f3390afefedf41fe42b35</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="94.el7_9.tuxcare.els5" src="python-2.7.5-94.el7_9.tuxcare.els5.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">beb13236051ba6f39129b4b670eec1b54d1a52db49ffde6ac84fc912a52fcf72</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="94.el7_9.tuxcare.els5" src="python-2.7.5-94.el7_9.tuxcare.els5.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-94.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">74228514a2c3edd15a1231f27ccefcc708d0b90f738d164e4c169a8fadb2b608</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="94.el7_9.tuxcare.els5" src="python-2.7.5-94.el7_9.tuxcare.els5.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-94.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">a1094755449666c47622bf641abd122939112a9534897ae6dcf46ed05db0ddc6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="94.el7_9.tuxcare.els5" src="python-2.7.5-94.el7_9.tuxcare.els5.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-94.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">908e0e7e0478b565fbf087decb5795bcc917e9b3a9871439b78dc569aa6d004c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1728055873</id>
    <title>emacs: Fix of CVE-2022-45939</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-45939: fix ctags local command injection vulnerability</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-45939: fix ctags local command injection vulnerability</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-04 15:31:16 UTC" />
    <updated date="2024-10-04 15:31:16 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1728055873.html" id="CLSA-2024:1728055873" title="CLSA-2024:1728055873" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="emacs" release="23.el7_9.1.tuxcare.els2" src="emacs-24.3-23.el7_9.1.tuxcare.els2.src.rpm" version="24.3">
          <filename>emacs-24.3-23.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3fac01b08a9b2b36f021f78146e11a9ba1d752f4d08752de079618b7926474c2</sum>
        </package>
        <package arch="x86_64" epoch="1" name="emacs-common" release="23.el7_9.1.tuxcare.els2" src="emacs-24.3-23.el7_9.1.tuxcare.els2.src.rpm" version="24.3">
          <filename>emacs-common-24.3-23.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">d36aebaa43b36d88dc3e8748f784a0bb7b99405cb440b7a719f9822361474c72</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-el" release="23.el7_9.1.tuxcare.els2" src="emacs-24.3-23.el7_9.1.tuxcare.els2.src.rpm" version="24.3">
          <filename>emacs-el-24.3-23.el7_9.1.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">05656bc05f85c73f3d8232d05da9250ae2533748de686d3bd7276fc0b69c3ea7</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-filesystem" release="23.el7_9.1.tuxcare.els2" src="emacs-24.3-23.el7_9.1.tuxcare.els2.src.rpm" version="24.3">
          <filename>emacs-filesystem-24.3-23.el7_9.1.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">fba14e9a91e33c96686bb035bf45b4c749fbf0ce70abba6c16eac466d4e800c4</sum>
        </package>
        <package arch="x86_64" epoch="1" name="emacs-nox" release="23.el7_9.1.tuxcare.els2" src="emacs-24.3-23.el7_9.1.tuxcare.els2.src.rpm" version="24.3">
          <filename>emacs-nox-24.3-23.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3c0b011e6e2242d432815ed55665c737ba84524773a7ab47988cb4c5607cf961</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-terminal" release="23.el7_9.1.tuxcare.els2" src="emacs-24.3-23.el7_9.1.tuxcare.els2.src.rpm" version="24.3">
          <filename>emacs-terminal-24.3-23.el7_9.1.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">041a4137cb48c9af12b978935f7a240d30cab630f9fe788bdd54bdd0ae770043</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1728056039</id>
    <title>gtk3: Fix of CVE-2024-6655</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-6655: fix loading library from unstrusted search path</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-6655: fix loading library from unstrusted search path</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-04 15:34:03 UTC" />
    <updated date="2024-10-04 15:34:03 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1728056039.html" id="CLSA-2024:1728056039" title="CLSA-2024:1728056039" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="gtk-update-icon-cache" release="8.el7_9.tuxcare.els1" src="gtk3-3.22.30-8.el7_9.tuxcare.els1.src.rpm" version="3.22.30">
          <filename>gtk-update-icon-cache-3.22.30-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fa425078b1643b37210e3e00de791c6545c982b490fffd29e7392c8af4bf27fb</sum>
        </package>
        <package arch="i686" epoch="0" name="gtk3" release="8.el7_9.tuxcare.els1" src="gtk3-3.22.30-8.el7_9.tuxcare.els1.src.rpm" version="3.22.30">
          <filename>gtk3-3.22.30-8.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">5f4032175927765b7a928a908310b4c219316c4a09024076ea68cd8fbfb2945e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gtk3" release="8.el7_9.tuxcare.els1" src="gtk3-3.22.30-8.el7_9.tuxcare.els1.src.rpm" version="3.22.30">
          <filename>gtk3-3.22.30-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">44f7174e33ad124134ae0e42ad2ab8167f4df1f90d83f2ae71909fdae7a7f1e7</sum>
        </package>
        <package arch="i686" epoch="0" name="gtk3-devel" release="8.el7_9.tuxcare.els1" src="gtk3-3.22.30-8.el7_9.tuxcare.els1.src.rpm" version="3.22.30">
          <filename>gtk3-devel-3.22.30-8.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">cc6daf73983c6753432e49453349b7bef4512a1f852c60989b383ce8681ec0b0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gtk3-devel" release="8.el7_9.tuxcare.els1" src="gtk3-3.22.30-8.el7_9.tuxcare.els1.src.rpm" version="3.22.30">
          <filename>gtk3-devel-3.22.30-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">817ec1382680bef91f8a451295583703b04841f9867be259af9f37e642979277</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gtk3-devel-docs" release="8.el7_9.tuxcare.els1" src="gtk3-3.22.30-8.el7_9.tuxcare.els1.src.rpm" version="3.22.30">
          <filename>gtk3-devel-docs-3.22.30-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6de049e9ee3b32dbc7a4ffa0910607875a6b365dce52f8ed6af5c767833220ea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gtk3-immodule-xim" release="8.el7_9.tuxcare.els1" src="gtk3-3.22.30-8.el7_9.tuxcare.els1.src.rpm" version="3.22.30">
          <filename>gtk3-immodule-xim-3.22.30-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cc016935577144145587f50a92e4c82f2f3833f6e04b5bf854ea6051776e28b0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gtk3-immodules" release="8.el7_9.tuxcare.els1" src="gtk3-3.22.30-8.el7_9.tuxcare.els1.src.rpm" version="3.22.30">
          <filename>gtk3-immodules-3.22.30-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">bc0ca6a028ed811e8dc163857782bd5b275eca27de1df10a02a419cce3b3efd4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gtk3-tests" release="8.el7_9.tuxcare.els1" src="gtk3-3.22.30-8.el7_9.tuxcare.els1.src.rpm" version="3.22.30">
          <filename>gtk3-tests-3.22.30-8.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f59fda2b94beaa556dc9206bad91b47cd2a41d65350b26098b378445618c4183</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1728297353</id>
    <title>kernel: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- drm/amd/pm: fix the Out-of-bounds read warning {CVE-2024-46731}
- hwmon: (w83627ehf) Fix underflows seen when writing limit attributes {CVE-2024-46756}
- hwmon: (lm95234) Fix underflows seen when writing limit attributes {CVE-2024-46758}
- hwmon: (nct6775-core) Fix underflows seen when writing limit attributes {CVE-2024-46757}
- kernel/exit.c: avoid undefined behaviour when calling wait4() {CVE-2018-10087}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- drm/amd/pm: fix the Out-of-bounds read warning {CVE-2024-46731}
- hwmon: (w83627ehf) Fix underflows seen when writing limit attributes {CVE-2024-46756}
- hwmon: (lm95234) Fix underflows seen when writing limit attributes {CVE-2024-46758}
- hwmon: (nct6775-core) Fix underflows seen when writing limit attributes {CVE-2024-46757}
- kernel/exit.c: avoid undefined behaviour when calling wait4() {CVE-2018-10087}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-07 10:35:57 UTC" />
    <updated date="2024-10-07 10:35:57 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1728297353.html" id="CLSA-2024:1728297353" title="CLSA-2024:1728297353" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">5cd1482096bec2293a219efa7b5e4818c88188dc2c23a29d66349f76886a2c07</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">b90f672950d3784cce0f87ab79acaee264f7dfc80e4f2d87273bff1ec596d380</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">12abfe328eb10c044869c8300ed8a0c9438af9f7ac2f23e7a9dd70ffabca18bf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">df722cd5c50d2b0dced5c57c668f2d45be3b118fd1464687f939da5d85265a2e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">d0daf8004ace74cd77a19127847f4d1b731aa4359160e068b5ff8500d6bb0aea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">1fcd66051e5791fe5ef150a4a8ad51c6d4da06e8b0b37ff202a0af288eff4075</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">086bb96816ca37b5788b3c370f0711ac8c776d23eea78c378b704a0b57a240cc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">61daaae06407041abd869fe88afea08094430bb4a434752552540bbddc03ae09</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">573269f54a8015a92a626d1af2b3058233f3fd1c462e644247e38a95df73e8a3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">92022c1b3d694bea05c7f6385a0e9f5082a76a44ed9afc87319b976daeab1066</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els9" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els9.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">1c998fe49c371eee228025a6ac191dfbf937c95f3a49781dba2591d69db2a8df</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1728934930</id>
    <title>emacs: Fix of CVE-2024-39331</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-39331: do not expand  link abbrevs that contain unsafe function</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-39331: do not expand  link abbrevs that contain unsafe function</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-14 19:42:13 UTC" />
    <updated date="2024-10-14 19:42:13 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1728934930.html" id="CLSA-2024:1728934930" title="CLSA-2024:1728934930" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="emacs" release="23.el7_9.1.tuxcare.els3" src="emacs-24.3-23.el7_9.1.tuxcare.els3.src.rpm" version="24.3">
          <filename>emacs-24.3-23.el7_9.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a51710636afbf87ea07b5ac6fd47a862faf6e5f38d68d91930c9c0e2ed88ab83</sum>
        </package>
        <package arch="x86_64" epoch="1" name="emacs-common" release="23.el7_9.1.tuxcare.els3" src="emacs-24.3-23.el7_9.1.tuxcare.els3.src.rpm" version="24.3">
          <filename>emacs-common-24.3-23.el7_9.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">e2aa5131cb96d61e2d39f9791259c76813581b55333bd2afbd5fbe137b847a14</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-el" release="23.el7_9.1.tuxcare.els3" src="emacs-24.3-23.el7_9.1.tuxcare.els3.src.rpm" version="24.3">
          <filename>emacs-el-24.3-23.el7_9.1.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">45cfd5d1ed8f02274423bd2cea54b287eaec6e7838d28f02a10993aafdc998c1</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-filesystem" release="23.el7_9.1.tuxcare.els3" src="emacs-24.3-23.el7_9.1.tuxcare.els3.src.rpm" version="24.3">
          <filename>emacs-filesystem-24.3-23.el7_9.1.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">2c99f8ac8e50bf32ba123593cd0cbbb6796b224f2a9739224d0a3314fb9460e2</sum>
        </package>
        <package arch="x86_64" epoch="1" name="emacs-nox" release="23.el7_9.1.tuxcare.els3" src="emacs-24.3-23.el7_9.1.tuxcare.els3.src.rpm" version="24.3">
          <filename>emacs-nox-24.3-23.el7_9.1.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">48cb7344cdc7877c963a17bc9c8d19469aa7fe50f9bb0a7c16d1a05c1924be35</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-terminal" release="23.el7_9.1.tuxcare.els3" src="emacs-24.3-23.el7_9.1.tuxcare.els3.src.rpm" version="24.3">
          <filename>emacs-terminal-24.3-23.el7_9.1.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">cdc74a32f6e6bb4b8d35c81adeac6d0575331e688b1d7a346fd55d4721a79b0d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1728935304</id>
    <title>kernel: Fix of 12 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- xfs: don't walk off the end of a directory data block {CVE-2024-41013}
- net/sched: cls_u32: fix netns refcount changes in u32_change() {CVE-2022-29581}
- net/packet: fix slab-out-of-bounds access in packet_recvmsg() {CVE-2022-20368}
- openvswitch: fix OOB access in reserve_sfa_size() {CVE-2022-2639}
- net: sched: fix use-after-free in tc_new_tfilter() {CVE-2022-1055}
- wifi: cfg80211: fix BSS refcounting bugs {CVE-2022-42720}
- wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() {CVE-2022-41674}
- igmp: Add ip_mc_list lock in ip_check_mc_rcu {CVE-2022-20141}
- af_key: Do not call xfrm_probe_algs in parallel {CVE-2022-3028}
- drm/amd/display: Check gpio_id before used as array index {CVE-2024-46818}
- drm/amd/display: Check link_index before accessing dc-&gt;links[] {CVE-2024-46813}
- Squashfs: sanity check symbolic link size {CVE-2024-46744}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- xfs: don't walk off the end of a directory data block {CVE-2024-41013}
- net/sched: cls_u32: fix netns refcount changes in u32_change() {CVE-2022-29581}
- net/packet: fix slab-out-of-bounds access in packet_recvmsg() {CVE-2022-20368}
- openvswitch: fix OOB access in reserve_sfa_size() {CVE-2022-2639}
- net: sched: fix use-after-free in tc_new_tfilter() {CVE-2022-1055}
- wifi: cfg80211: fix BSS refcounting bugs {CVE-2022-42720}
- wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans() {CVE-2022-41674}
- igmp: Add ip_mc_list lock in ip_check_mc_rcu {CVE-2022-20141}
- af_key: Do not call xfrm_probe_algs in parallel {CVE-2022-3028}
- drm/amd/display: Check gpio_id before used as array index {CVE-2024-46818}
- drm/amd/display: Check link_index before accessing dc-&gt;links[] {CVE-2024-46813}
- Squashfs: sanity check symbolic link size {CVE-2024-46744}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-14 19:53:58 UTC" />
    <updated date="2024-10-14 19:53:58 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1728935304.html" id="CLSA-2024:1728935304" title="CLSA-2024:1728935304" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">53b989659b024c32af63b247bd3af9cfd5854df49df28f064b436fea7c7f40ad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">89bc4cac8b8efac970d5f00dcef004410fd25f4ed234ea32ce540782069ad972</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">a16f430b40fa68a5e462589ea1bd6f2d3bdf69f10a574ebce1bb275bffe733dc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">89dea9017746e030e5630d133a52547cc0504e85a2229644ef74c42c273c8e99</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">8a9e78584e9df243b57f97fe0fd7c0af317b0e74b0d2afcba61643b67247a4c5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">f15defb7a720a57b534471f19ff7348b8d71682b5d92aada816f306fe15bbb9e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">64e93d500ff631069d3728d9dd99c5c473a40b826ac1f39f37258de88253c28f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">b7e6ddb8bf73dc2dc029b5aaca56b745d8a1b9f94b7bb83b9f6e0c677a4076cc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">4fa9af4436e6c1e627af5383440eb0b8aaeddd01639bf896166c4668e8f7ba8c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">9e5077685ed8fe3bf3535d27ed33b3dea8abcb4bfeef28173204650cfc2b399d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els10" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els10.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">45454fc2e41dc9e8bb13fc202f36eee19f04cac6c41c22fe055ba4fd3a39db4c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1729512774</id>
    <title>python-pip: Fix of CVE-2024-37891</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-37891: strip Proxy-Authorization header on redirects</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-37891: strip Proxy-Authorization header on redirects</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-21 12:12:58 UTC" />
    <updated date="2024-10-21 12:12:58 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1729512774.html" id="CLSA-2024:1729512774" title="CLSA-2024:1729512774" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python3-pip" release="8.el7.tuxcare.els1" src="python-pip-9.0.3-8.el7.tuxcare.els1.src.rpm" version="9.0.3">
          <filename>python3-pip-9.0.3-8.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">a9d2d61394c21551134d18ef051e068887f828135ea9c6631f0b96d632ed3e5d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1729513208</id>
    <title>unbound: Fix of CVE-2023-50868</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-50868: avoid availabiluty of the remote attackers to cause a
  denial of service using DNSSEC</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-50868: avoid availabiluty of the remote attackers to cause a
  denial of service using DNSSEC</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-21 12:20:12 UTC" />
    <updated date="2024-10-21 12:20:12 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1729513208.html" id="CLSA-2024:1729513208" title="CLSA-2024:1729513208" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="unbound" release="5.el7_8.tuxcare.els3" src="unbound-1.6.6-5.el7_8.tuxcare.els3.src.rpm" version="1.6.6">
          <filename>unbound-1.6.6-5.el7_8.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a132545f34cf0706b21f527fa5bd2742128080e0135f829ed783d8a1d88cd22a</sum>
        </package>
        <package arch="i686" epoch="0" name="unbound-devel" release="5.el7_8.tuxcare.els3" src="unbound-1.6.6-5.el7_8.tuxcare.els3.src.rpm" version="1.6.6">
          <filename>unbound-devel-1.6.6-5.el7_8.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">15f60a115d85f869a0aa90c3ef1e2d55863de5b097d3a39543294273dd8cfbf5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-devel" release="5.el7_8.tuxcare.els3" src="unbound-1.6.6-5.el7_8.tuxcare.els3.src.rpm" version="1.6.6">
          <filename>unbound-devel-1.6.6-5.el7_8.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7ac1f09f7c88bdd78241ced4b4f514d75f79e3166afe9f9c7ad0a15c7f9a2e5e</sum>
        </package>
        <package arch="i686" epoch="0" name="unbound-libs" release="5.el7_8.tuxcare.els3" src="unbound-1.6.6-5.el7_8.tuxcare.els3.src.rpm" version="1.6.6">
          <filename>unbound-libs-1.6.6-5.el7_8.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">68529e2e355673f3c5670b69252eec62e3bbf4f2b31d2ff60d72efe4890f202a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-libs" release="5.el7_8.tuxcare.els3" src="unbound-1.6.6-5.el7_8.tuxcare.els3.src.rpm" version="1.6.6">
          <filename>unbound-libs-1.6.6-5.el7_8.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7ed3d7d86af5e7d2ed238601e8e397aa0756db054e4fe490b50b7a35354a7ec6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-python" release="5.el7_8.tuxcare.els3" src="unbound-1.6.6-5.el7_8.tuxcare.els3.src.rpm" version="1.6.6">
          <filename>unbound-python-1.6.6-5.el7_8.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7de7987a2cf44ac9932a3e25696a05a8865a8436c48d40a4872d099dc959f092</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1729546973</id>
    <title>libtiff: Fix of CVE-2024-7006</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-7006: check return value of _TIFFCreateAnonField()</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-7006: check return value of _TIFFCreateAnonField()</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-21 21:42:56 UTC" />
    <updated date="2024-10-21 21:42:56 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1729546973.html" id="CLSA-2024:1729546973" title="CLSA-2024:1729546973" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libtiff" release="35.el7.tuxcare.els2" src="libtiff-4.0.3-35.el7.tuxcare.els2.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">2cd77bde84147349654353887e19f26b76641db0a0b082a42e528629f06df9a6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff" release="35.el7.tuxcare.els2" src="libtiff-4.0.3-35.el7.tuxcare.els2.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">91738eefb26a1df5267d49b100edc60f676f5a6a8d80b768deadf016fef88a20</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els2" src="libtiff-4.0.3-35.el7.tuxcare.els2.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">3e27671824faa9e89a28a782efe97b5e287e577c7ed530acd5785ba5dd96504e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els2" src="libtiff-4.0.3-35.el7.tuxcare.els2.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">6a31876e08323eab9a6ab850183648befdcb74a88ab304a86ed0593a61de3cf2</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els2" src="libtiff-4.0.3-35.el7.tuxcare.els2.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">63cf40eb0e24f3edb45b6b8d263502bec9134fe1e6378d27e840498caeff47d1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els2" src="libtiff-4.0.3-35.el7.tuxcare.els2.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">873d0c4a9c83a7626a1f4933825a14abc7a81f9fe68a7f53c8df4eddb816994d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-tools" release="35.el7.tuxcare.els2" src="libtiff-4.0.3-35.el7.tuxcare.els2.src.rpm" version="4.0.3">
          <filename>libtiff-tools-4.0.3-35.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">422fb8fb9189919e8b8ba4e516a960a1639ea48a229d22b3e7f1857a01874a2f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1729628764</id>
    <title>php: Fix of CVE-2024-8927</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-8927: Fix bypass of cgi.force_redirect configuration</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-8927: Fix bypass of cgi.force_redirect configuration</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-22 20:26:08 UTC" />
    <updated date="2024-10-22 20:26:08 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1729628764.html" id="CLSA-2024:1729628764" title="CLSA-2024:1729628764" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">387a2c4f23e7837cc611f3de4d4ecb1670766a91fa3dd3f2e8c7a4a2a8a5c6d9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">dc5ff40b54c3a100a6b63b12e9793386324f5a78f9f83d09a74456b87dc2b32c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">2e1bfae07bdc63164b39e2809e1db16cff07130468db9b3b058ece0b185b81d9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">862e023bbf8551a8c8bf38ff1b24160886b55d7bc003b79ea5df86464b95def1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">9fc3c69d8ccf8eceb41d5729f39a50b5e34487eb25ec5ddf8f324e31ea2c817b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">4d521228f84916f1eef125be10316068c291fd3896ca656e91bb504c87456378</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">68bf0ac0ae3dc216e477f7321262ee76a949b66bc6380c062f3c6823aab5e838</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">0f843c964ddf8a062cb6b45a645d1cad12d804908660b2b9990228f601842dbe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">6f454b18e1470b046aeafec19f8c6bc61bef93099915155d85acad3ec9cd1fec</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">face26db9412d007ecc6bb14f4755f69decd949915455458cf74a9e78db53e8e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">229bcbf128ace2df44dbe8b3c1d0e2b15cd8a7226a019c73865bfe3082b66caa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">b16f9afdd49d8a9ae884c3297de4ee7964da7bc8d860487e6e7f0d704e04f991</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">b335f1eb78b0878d2f7f62148e7e9d15f5b3b53bc6d51c832bc85b806fe37b9b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">8d678660e26bc09c000ede32cab8bd51acf7653b3e5c69fdc344883720bdce7d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">fb5c18c77cd9744de411b4aec34804822aed195b37e22f9e04bd277f99a9bdc3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">681766ea467b5fdffa274354f5a790be359e32b53dba58ca23172f068c5b9e5c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">cfe2b879af44b643e20db054e54394c16573b097e990a41639bb52b3303c6b0d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">d826aa733952d7ee856d2c55e3adebf2fb794de2191d7a97e8ab673238126d79</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">350dda2244bf7bf58ef19e988c044b84060116860e322155c8ed1737883279e9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">0b00ee0ceea0a3769fd7ad213776858f9950467450dfed2a9d2a99b38ea10f47</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">501e7b821cc90fa0e276c9fb7881e2a35d8d6b7271ce3430eb57b5b35914e96c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c396e0d2b4a4bba2a817af287208d715a97b1943a12f6e10e6bee210c8115bd3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">0bfdd76ca5e418423ad3de93de788ae8c7e95761ca3ced9df68da7398c875e05</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">6b184d42e4861103f63616c6cd03e543bda4b9d5e9e5454cd4d85026dcbaea43</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els3" src="php-5.4.16-48.el7.tuxcare.els3.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">1d27f3a830bb24bfad6491f1811e11caca4700808a53fc3dd4ac675c6b834cea</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1729629058</id>
    <title>python-lxml: Fix of CVE-2021-43818</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2021-43818: prevent certain crafted script content passing
  through in HTML Cleaner</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2021-43818: prevent certain crafted script content passing
  through in HTML Cleaner</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-22 20:31:05 UTC" />
    <updated date="2024-10-22 20:31:05 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1729629058.html" id="CLSA-2024:1729629058" title="CLSA-2024:1729629058" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python-lxml" release="4.el7.tuxcare.els1" src="python-lxml-3.2.1-4.el7.tuxcare.els1.src.rpm" version="3.2.1">
          <filename>python-lxml-3.2.1-4.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">92a16c452c1cce219ac9204ab7e461762a0b186efac71a6545cb64bd278e3d06</sum>
        </package>
        <package arch="noarch" epoch="0" name="python-lxml-docs" release="4.el7.tuxcare.els1" src="python-lxml-3.2.1-4.el7.tuxcare.els1.src.rpm" version="3.2.1">
          <filename>python-lxml-docs-3.2.1-4.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">02b09bda667ef686d25a6dee1a16a32589ab5bcd04bede9d386447d802b4c35c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1730141462</id>
    <title>php: Fix of CVE-2024-8925</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-8925: Fix data integrity violation while parsing multipart/form-data
  boundaries larger than the read buffer</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-8925: Fix data integrity violation while parsing multipart/form-data
  boundaries larger than the read buffer</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-28 18:51:05 UTC" />
    <updated date="2024-10-28 18:51:05 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1730141462.html" id="CLSA-2024:1730141462" title="CLSA-2024:1730141462" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">dc9004a41866e50744ac343ea5172ca9d8d1ba5c02b48c3827a6cc2c8f844644</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">20a352b742b4de41455830bfb572d7806dd25f2672e900899d15b452b6bf8d08</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a167f2b88f836809bed2a26275a952646879c92b3084f4a1b493ffd722574cf6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a5ec1a406eaac9ed19969c9d198a9a05386bf724647aa65dcd50f21e606cd82e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">9f2299fc775b2b1dc7dd188483e928a358ac1db51b9fce6cad43c1efa601deae</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">990b6b1c1411fd54d1b9cdce6df08d41f2ec5018f255f5502e56079680ba5f27</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">6575f90cc605fc58dd4cf5fefd149c7451952f05ebe3c194a5f81b78d65e432a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f4d8c754f2ae7ad679956584cf14d9c43645d949b82346c3e065d5dcafa1023f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">4f035ccedd3717b5d775980c88965547f7831fc451516bb010620a8ffb429510</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f151d842bf7b9c18cc21ce99890ce2383066814cc1e6dd86941ae5b1c61cfd95</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">72d9f6d425f4b102aaa5c9078cbfcdc5e7ac3ef208d954feea15f07a40868481</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">831e5b2605a9de18e6f6a5ee1471e783fb2fbb87e72018aeabc4dfdeabac9d84</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a133d22c28fe7343f01c087ff8feb1616483767fb5cd4d648b10283dd5494680</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">3a0fa6882e2df47075c580d8c1ad0f5e06150aaad4fe9e51682a642da9868caa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">4bfeafd4d3c19cd4dd6cbfb943213f97facb9c7169daa3420a1dd7702857aeff</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">fb66c9eda0d8156f481c0da980e5b8a60bcdfceb488f59903e6e68e0ab4d012f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">6f28898c9b331dc291cdbf51ba36ea7a895009d7e95840994b5ea51d6b180615</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">1a8f00f727a16ec9b7201353c6303d3d2b5e3759f48998cae94eccf267410bc1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">19d87749f0c7a8dff26f3bcaa88bedebf6b6ebfcd64196342fc4dec98f6564eb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">339db7c4909891a6577ef0956959e0df1a2520c25b4ee74f63c77fbbca720068</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">96d8249667a288f1f1f528448c56f508a339dc9b8214a773d8a0746bd940d0ad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">766c848d33c151b0e6c94f5976b4fe0409c9231d93990c450835f1e479d106ab</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">67b04d40821052acad65dd1e966291c7a3b2b23465c14bce70208ce88448c5c1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">1101980d7ccc6fcfdf5abdbc4d233f6c4437bcc8c676bbda5ada9ceb136a237a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els4" src="php-5.4.16-48.el7.tuxcare.els4.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">e7cad3360f95d5f9b54e5f357134021f15c20cf55e3c144578d8dc83c3a506d8</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1730142448</id>
    <title>python-setuptools: Fix of CVE-2024-6345</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-6345: modernize package_index VCS handling</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-6345: modernize package_index VCS handling</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-28 19:07:31 UTC" />
    <updated date="2024-10-28 19:07:31 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1730142448.html" id="CLSA-2024:1730142448" title="CLSA-2024:1730142448" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python-setuptools" release="7.el7.tuxcare.els1" src="python-setuptools-0.9.8-7.el7.tuxcare.els1.src.rpm" version="0.9.8">
          <filename>python-setuptools-0.9.8-7.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">2d65a9578ff7341068662edfbbf01af000fa40acc47043307fd4a93b5d809d9a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1730142536</id>
    <title>python-urllib3: Fix of CVE-2024-37891</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-37891: strip Proxy-Authorization header on redirects</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-37891: strip Proxy-Authorization header on redirects</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-28 19:09:00 UTC" />
    <updated date="2024-10-28 19:09:00 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1730142536.html" id="CLSA-2024:1730142536" title="CLSA-2024:1730142536" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python-urllib3" release="7.el7.tuxcare.els1" src="python-urllib3-1.10.2-7.el7.tuxcare.els1.src.rpm" version="1.10.2">
          <filename>python-urllib3-1.10.2-7.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">746ccf29a96cf40f83d12e8e51be8acf8b621138de70d14dd4f7a77232cedf2b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1730298688</id>
    <title>Update of microcode_ctl</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update Intel CPU microcode to 20240813:
  - Addition of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000390;
  - Addition of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Addition of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x35;
  - Addition of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x433;
  - Addition of cpuid:A06A4/0xe6 microcode (in microcode.dat) at revision 0x1e;
  - Addition of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4121;
  - Addition of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) at
    revision 0x4121;
  - Addition of cpuid:B06A8/0xe0 microcode (in microcode.dat) at revision
    0x4121;
  - Addition of cpuid:C06F1/0x87 microcode (in microcode.dat) at revision
    0x21000230;
  - Addition of cpuid:C06F2/0x87 microcode (in microcode.dat) at revision
    0x21000230;
  - Removal of cpuid:806F4/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F6/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x32;
  - Removal of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x430;
  - Removal of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x411c;
  - Update of cpuid:50653/0x97 (SKX-SP B1) microcode (in microcode.dat) from
    revision 0x1000181 up to 0x1000191;
  - Update of cpuid:50656/0xbf (CLX-SP B0) microcode (in microcode.dat) from
    revision 0x4003604 up to 0x4003605;
  - Update of cpuid:50657/0xbf (CLX-SP/W/X B1/L1) microcode (in microcode.dat)
    from revision 0x5003604 up to 0x5003707;
  - Update of cpuid:5065B/0xbf (CPX-SP A1) microcode (in microcode.dat) from
    revision 0x7002703 up to 0x7002904;
  - Update of cpuid:50665/0x10 (BDX-NS A0/A1, HWL A1) microcode (in
    microcode.dat) from revision 0xe000014 up to 0xe000015;
  - Update of cpuid:506F1/0x01 (DNV B0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3e;
  - Update of cpuid:606A6/0x87 (ICX-SP D0) microcode (in microcode.dat) from
    revision 0xd0003b9 up to 0xd0003e7;
  - Update of cpuid:606C1/0x10 (ICL-D B0) microcode (in microcode.dat) from
    revision 0x1000268 up to 0x10002b0;
  - Update of cpuid:706A1/0x01 (GLK B0) microcode (in microcode.dat) from
    revision 0x3e up to 0x42;
  - Update of cpuid:706A8/0x01 (GLK-R R0) microcode (in microcode.dat) from
    revision 0x22 up to 0x24;
  - Update of cpuid:706E5/0x80 (ICL-U/Y D1) microcode (in microcode.dat) from
    revision 0xc2 up to 0xc6;
  - Update of cpuid:806C1/0x80 (TGL-UP3/UP4 B1) microcode (in microcode.dat)
    from revision 0xb4 up to 0xb8;
  - Update of cpuid:806C2/0xc2 (TGL-R C0) microcode (in microcode.dat) from
    revision 0x34 up to 0x38;
  - Update of cpuid:806D1/0xc2 (TGL-H R0) microcode (in microcode.dat) from
    revision 0x4e up to 0x52;
  - Update of cpuid:806E9/0x10 (AML-Y 2+2 H0) microcode (in microcode.dat) from
    revision 0xf4 up to 0xf6;
  - Update of cpuid:806E9/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
    microcode.dat) from revision 0xf4 up to 0xf6;
  - Update of cpuid:806EA/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
    microcode.dat) from revision 0xf4 up to 0xf6;
  - Update of cpuid:806EB/0xd0 (WHL-U W0) microcode (in microcode.dat) from
    revision 0xf4 up to 0xf6;
  - Update of cpuid:806EC/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode
    (in microcode.dat) from revision 0xf8 up to 0xfc;
  - Update of cpuid:806F4/0x10 microcode (in microcode.dat) from revision
    0x2c000290 up to 0x2c000390;
  - Update of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) from
    revision 0x2c000290 up to 0x2c000390;
  - Update of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:806F6/0x10 microcode (in microcode.dat) from revision
    0x2c000290 up to 0x2c000390;
  - Update of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:90661/0x01 (EHL B1) microcode (in microcode.dat) from
    revision 0x17 up to 0x1a;
  - Update of cpuid:90675/0x07 (ADL-S 6+0 K0) microcode (in microcode.dat) from
    revision 0x32 up to 0x35;
  - Update of cpuid:906A4/0x40 (AZB A0) microcode (in microcode.dat) from
    revision 0x5 up to 0x7;
  - Update of cpuid:906A4/0x80 (ADL-P 2+8 R0) microcode (in microcode.dat) from
    revision 0x430 up to 0x433;
  - Update of cpuid:906C0/0x01 (JSL A0/A1) microcode (in microcode.dat) from
    revision 0x24000024 up to 0x24000026;
  - Update of cpuid:906E9/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
    microcode.dat) from revision 0xf4 up to 0xf8;
  - Update of cpuid:906EA/0x22 (CFL-H/S/Xeon E U0) microcode (in microcode.dat)
    from revision 0xf4 up to 0xf8;
  - Update of cpuid:906EB/0x02 (CFL-E/H/S B0) microcode (in microcode.dat) from
    revision 0xf4 up to 0xf6;
  - Update of cpuid:906EC/0x22 (CFL-H/S/Xeon E P0) microcode (in microcode.dat)
    from revision 0xf4 up to 0xf8;
  - Update of cpuid:906ED/0x22 (CFL-H/S/Xeon E R0) microcode (in microcode.dat)
    from revision 0xfa up to 0x100;
  - Update of cpuid:A0652/0x20 (CML-H R1) microcode (in microcode.dat) from
    revision 0xf8 up to 0xfc;
  - Update of cpuid:A0653/0x22 (CML-S 6+2 G1) microcode (in microcode.dat) from
    revision 0xf8 up to 0xfc;
  - Update of cpuid:A0655/0x22 (CML-S 10+2 Q0) microcode (in microcode.dat)
    from revision 0xf8 up to 0xfc;
  - Update of cpuid:A0660/0x80 (CML-U 6+2 A0) microcode (in microcode.dat) from
    revision 0xf8 up to 0xfe;
  - Update of cpuid:A0661/0x80 (CML-U 6+2 v2 K1) microcode (in microcode.dat)
    from revision 0xf8 up to 0xfc;
  - Update of cpuid:A0671/0x02 (RKL-S B0) microcode (in microcode.dat) from
    revision 0x5d up to 0x62;
  - Update of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) from
    revision 0x11d up to 0x123;
  - Update of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) from
    revision 0x411c up to 0x4121;
  - Update of cpuid:B06E0/0x11 (ADL-N A0) microcode (in microcode.dat) from
    revision 0x12 up to 0x17;
  - Update of cpuid:B06F2/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x32 up to 0x35;
  - Update of cpuid:B06F5/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x32 up to 0x35;</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update Intel CPU microcode to 20240813:
  - Addition of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000390;
  - Addition of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Addition of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x35;
  - Addition of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x433;
  - Addition of cpuid:A06A4/0xe6 microcode (in microcode.dat) at revision 0x1e;
  - Addition of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4121;
  - Addition of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) at
    revision 0x4121;
  - Addition of cpuid:B06A8/0xe0 microcode (in microcode.dat) at revision
    0x4121;
  - Addition of cpuid:C06F1/0x87 microcode (in microcode.dat) at revision
    0x21000230;
  - Addition of cpuid:C06F2/0x87 microcode (in microcode.dat) at revision
    0x21000230;
  - Removal of cpuid:806F4/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F6/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x32;
  - Removal of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x430;
  - Removal of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x411c;
  - Update of cpuid:50653/0x97 (SKX-SP B1) microcode (in microcode.dat) from
    revision 0x1000181 up to 0x1000191;
  - Update of cpuid:50656/0xbf (CLX-SP B0) microcode (in microcode.dat) from
    revision 0x4003604 up to 0x4003605;
  - Update of cpuid:50657/0xbf (CLX-SP/W/X B1/L1) microcode (in microcode.dat)
    from revision 0x5003604 up to 0x5003707;
  - Update of cpuid:5065B/0xbf (CPX-SP A1) microcode (in microcode.dat) from
    revision 0x7002703 up to 0x7002904;
  - Update of cpuid:50665/0x10 (BDX-NS A0/A1, HWL A1) microcode (in
    microcode.dat) from revision 0xe000014 up to 0xe000015;
  - Update of cpuid:506F1/0x01 (DNV B0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3e;
  - Update of cpuid:606A6/0x87 (ICX-SP D0) microcode (in microcode.dat) from
    revision 0xd0003b9 up to 0xd0003e7;
  - Update of cpuid:606C1/0x10 (ICL-D B0) microcode (in microcode.dat) from
    revision 0x1000268 up to 0x10002b0;
  - Update of cpuid:706A1/0x01 (GLK B0) microcode (in microcode.dat) from
    revision 0x3e up to 0x42;
  - Update of cpuid:706A8/0x01 (GLK-R R0) microcode (in microcode.dat) from
    revision 0x22 up to 0x24;
  - Update of cpuid:706E5/0x80 (ICL-U/Y D1) microcode (in microcode.dat) from
    revision 0xc2 up to 0xc6;
  - Update of cpuid:806C1/0x80 (TGL-UP3/UP4 B1) microcode (in microcode.dat)
    from revision 0xb4 up to 0xb8;
  - Update of cpuid:806C2/0xc2 (TGL-R C0) microcode (in microcode.dat) from
    revision 0x34 up to 0x38;
  - Update of cpuid:806D1/0xc2 (TGL-H R0) microcode (in microcode.dat) from
    revision 0x4e up to 0x52;
  - Update of cpuid:806E9/0x10 (AML-Y 2+2 H0) microcode (in microcode.dat) from
    revision 0xf4 up to 0xf6;
  - Update of cpuid:806E9/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in
    microcode.dat) from revision 0xf4 up to 0xf6;
  - Update of cpuid:806EA/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in
    microcode.dat) from revision 0xf4 up to 0xf6;
  - Update of cpuid:806EB/0xd0 (WHL-U W0) microcode (in microcode.dat) from
    revision 0xf4 up to 0xf6;
  - Update of cpuid:806EC/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode
    (in microcode.dat) from revision 0xf8 up to 0xfc;
  - Update of cpuid:806F4/0x10 microcode (in microcode.dat) from revision
    0x2c000290 up to 0x2c000390;
  - Update of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) from
    revision 0x2c000290 up to 0x2c000390;
  - Update of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:806F6/0x10 microcode (in microcode.dat) from revision
    0x2c000290 up to 0x2c000390;
  - Update of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) from
    revision 0x2b0004d0 up to 0x2b0005c0;
  - Update of cpuid:90661/0x01 (EHL B1) microcode (in microcode.dat) from
    revision 0x17 up to 0x1a;
  - Update of cpuid:90675/0x07 (ADL-S 6+0 K0) microcode (in microcode.dat) from
    revision 0x32 up to 0x35;
  - Update of cpuid:906A4/0x40 (AZB A0) microcode (in microcode.dat) from
    revision 0x5 up to 0x7;
  - Update of cpuid:906A4/0x80 (ADL-P 2+8 R0) microcode (in microcode.dat) from
    revision 0x430 up to 0x433;
  - Update of cpuid:906C0/0x01 (JSL A0/A1) microcode (in microcode.dat) from
    revision 0x24000024 up to 0x24000026;
  - Update of cpuid:906E9/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in
    microcode.dat) from revision 0xf4 up to 0xf8;
  - Update of cpuid:906EA/0x22 (CFL-H/S/Xeon E U0) microcode (in microcode.dat)
    from revision 0xf4 up to 0xf8;
  - Update of cpuid:906EB/0x02 (CFL-E/H/S B0) microcode (in microcode.dat) from
    revision 0xf4 up to 0xf6;
  - Update of cpuid:906EC/0x22 (CFL-H/S/Xeon E P0) microcode (in microcode.dat)
    from revision 0xf4 up to 0xf8;
  - Update of cpuid:906ED/0x22 (CFL-H/S/Xeon E R0) microcode (in microcode.dat)
    from revision 0xfa up to 0x100;
  - Update of cpuid:A0652/0x20 (CML-H R1) microcode (in microcode.dat) from
    revision 0xf8 up to 0xfc;
  - Update of cpuid:A0653/0x22 (CML-S 6+2 G1) microcode (in microcode.dat) from
    revision 0xf8 up to 0xfc;
  - Update of cpuid:A0655/0x22 (CML-S 10+2 Q0) microcode (in microcode.dat)
    from revision 0xf8 up to 0xfc;
  - Update of cpuid:A0660/0x80 (CML-U 6+2 A0) microcode (in microcode.dat) from
    revision 0xf8 up to 0xfe;
  - Update of cpuid:A0661/0x80 (CML-U 6+2 v2 K1) microcode (in microcode.dat)
    from revision 0xf8 up to 0xfc;
  - Update of cpuid:A0671/0x02 (RKL-S B0) microcode (in microcode.dat) from
    revision 0x5d up to 0x62;
  - Update of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) from
    revision 0x11d up to 0x123;
  - Update of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) from
    revision 0x411c up to 0x4121;
  - Update of cpuid:B06E0/0x11 (ADL-N A0) microcode (in microcode.dat) from
    revision 0x12 up to 0x17;
  - Update of cpuid:B06F2/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x32 up to 0x35;
  - Update of cpuid:B06F5/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x32 up to 0x35;</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-30 14:31:31 UTC" />
    <updated date="2024-10-30 14:31:31 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1730298688.html" id="CLSA-2024:1730298688" title="CLSA-2024:1730298688" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="microcode_ctl" release="73.21.el7_9.tuxcare.els1" src="microcode_ctl-2.1-73.21.el7_9.tuxcare.els1.src.rpm" version="2.1">
          <filename>microcode_ctl-2.1-73.21.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b10c96237c12335d91399b98cc2e69695b8e84cf8fede3a77444b8e7ba4ede7d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1730374841</id>
    <title>Update of orc</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Backport orc_malloc() and orc_realloc()</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Backport orc_malloc() and orc_realloc()</summary>
    <pushcount>0</pushcount>
    <issued date="2024-10-31 11:40:45 UTC" />
    <updated date="2024-10-31 11:40:45 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1730374841.html" id="CLSA-2024:1730374841" title="CLSA-2024:1730374841" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="orc" release="1.el7.tuxcare.els2" src="orc-0.4.26-1.el7.tuxcare.els2.src.rpm" version="0.4.26">
          <filename>orc-0.4.26-1.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">9f192d9cb02863ea50299181721a1ed0c46508ef63a03a013ed3c70d0425130d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="orc" release="1.el7.tuxcare.els2" src="orc-0.4.26-1.el7.tuxcare.els2.src.rpm" version="0.4.26">
          <filename>orc-0.4.26-1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">e5bace760fca4283d43002d3888c0ccf6906248650283078540783a808e10a77</sum>
        </package>
        <package arch="x86_64" epoch="0" name="orc-compiler" release="1.el7.tuxcare.els2" src="orc-0.4.26-1.el7.tuxcare.els2.src.rpm" version="0.4.26">
          <filename>orc-compiler-0.4.26-1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">b505ee5c33037c3763ede5506ca66a8a18fcfae2d2bce21c51e0126f19e2e82b</sum>
        </package>
        <package arch="i686" epoch="0" name="orc-devel" release="1.el7.tuxcare.els2" src="orc-0.4.26-1.el7.tuxcare.els2.src.rpm" version="0.4.26">
          <filename>orc-devel-0.4.26-1.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">b357a9329a8f5528db69eaeab0d7ee027f61c9aa0a1a3db6d6fd78634c4544ee</sum>
        </package>
        <package arch="x86_64" epoch="0" name="orc-devel" release="1.el7.tuxcare.els2" src="orc-0.4.26-1.el7.tuxcare.els2.src.rpm" version="0.4.26">
          <filename>orc-devel-0.4.26-1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">eca1d156cd7d09670031ff00a1b1c44af6763ed3cd4c161067f486e3b0c6eb7a</sum>
        </package>
        <package arch="noarch" epoch="0" name="orc-doc" release="1.el7.tuxcare.els2" src="orc-0.4.26-1.el7.tuxcare.els2.src.rpm" version="0.4.26">
          <filename>orc-doc-0.4.26-1.el7.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">07e814046c277b059790d1eb17d17e58fcab81867d5d40114ef94e997e3d1d69</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1730912568</id>
    <title>Update of nss</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- update to CKBI 2.70 from NSS 3.104
- updated certificates:
-     # Certificate "GLOBALTRUST 2020"
-     # Certificate "certSIGN ROOT CA"
-     # Certificate "ACCVRAIZ1"
-     # Certificate "OISTE WISeKey Global Root GC CA"
- removed certificates:
-     # Certificate "Security Communication Root CA"
-     # Certificate "Camerfirma Chambers of Commerce Root"
-     # Certificate "Chambers of Commerce Root - 2008"
-     # Certificate "Global Chambersign Root - 2008"
-     # Certificate "E-Tugra Global Root CA RSA v3"
-     # Certificate "E-Tugra Global Root CA ECC v3"
- added certificates:
-     # Certificate "D-Trust SBR Root CA 1 2022"
-     # Certificate "D-Trust SBR Root CA 2 2022"
-     # Certificate "Telekom Security SMIME ECC Root 2021"
-     # Certificate "Telekom Security TLS ECC Root 2020"
-     # Certificate "Telekom Security SMIME RSA Root 2023"
-     # Certificate "Telekom Security TLS RSA Root 2023"
-     # Certificate "FIRMAPROFESIONAL CA ROOT-A WEB"
-     # Certificate "TWCA CYBER Root CA"
-     # Certificate "TWCA Global Root CA G2"
-     # Certificate "SecureSign Root CA12"
-     # Certificate "SecureSign Root CA14"
-     # Certificate "SecureSign Root CA15"</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- update to CKBI 2.70 from NSS 3.104
- updated certificates:
-     # Certificate "GLOBALTRUST 2020"
-     # Certificate "certSIGN ROOT CA"
-     # Certificate "ACCVRAIZ1"
-     # Certificate "OISTE WISeKey Global Root GC CA"
- removed certificates:
-     # Certificate "Security Communication Root CA"
-     # Certificate "Camerfirma Chambers of Commerce Root"
-     # Certificate "Chambers of Commerce Root - 2008"
-     # Certificate "Global Chambersign Root - 2008"
-     # Certificate "E-Tugra Global Root CA RSA v3"
-     # Certificate "E-Tugra Global Root CA ECC v3"
- added certificates:
-     # Certificate "D-Trust SBR Root CA 1 2022"
-     # Certificate "D-Trust SBR Root CA 2 2022"
-     # Certificate "Telekom Security SMIME ECC Root 2021"
-     # Certificate "Telekom Security TLS ECC Root 2020"
-     # Certificate "Telekom Security SMIME RSA Root 2023"
-     # Certificate "Telekom Security TLS RSA Root 2023"
-     # Certificate "FIRMAPROFESIONAL CA ROOT-A WEB"
-     # Certificate "TWCA CYBER Root CA"
-     # Certificate "TWCA Global Root CA G2"
-     # Certificate "SecureSign Root CA12"
-     # Certificate "SecureSign Root CA14"
-     # Certificate "SecureSign Root CA15"</summary>
    <pushcount>0</pushcount>
    <issued date="2024-11-06 17:02:54 UTC" />
    <updated date="2024-11-06 17:02:54 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1730912568.html" id="CLSA-2024:1730912568" title="CLSA-2024:1730912568" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="nss" release="2.el7_9.tuxcare.els2" src="nss-3.90.0-2.el7_9.tuxcare.els2.src.rpm" version="3.90.0">
          <filename>nss-3.90.0-2.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">56b17c0403e655389fd9f668568438a373a6006185a2cdc1ee64bcac1bf915fd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss" release="2.el7_9.tuxcare.els2" src="nss-3.90.0-2.el7_9.tuxcare.els2.src.rpm" version="3.90.0">
          <filename>nss-3.90.0-2.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">e0883bf93500b651662d9154e6338c3e1fe12d0cbf942f1b92b27a348616eddf</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-devel" release="2.el7_9.tuxcare.els2" src="nss-3.90.0-2.el7_9.tuxcare.els2.src.rpm" version="3.90.0">
          <filename>nss-devel-3.90.0-2.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">76014741810c6fe4bf5a059d7f941242c9858f37443385417f46792b49157991</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-devel" release="2.el7_9.tuxcare.els2" src="nss-3.90.0-2.el7_9.tuxcare.els2.src.rpm" version="3.90.0">
          <filename>nss-devel-3.90.0-2.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f5f94f63cc52aec155f31be3dfa87ee79ecc5da0c0cb1e9059efdb157fe89cbc</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-pkcs11-devel" release="2.el7_9.tuxcare.els2" src="nss-3.90.0-2.el7_9.tuxcare.els2.src.rpm" version="3.90.0">
          <filename>nss-pkcs11-devel-3.90.0-2.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">898f87456585a2f231844e20c96e30dd652338d1e11c524a528f91b287f21bef</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-pkcs11-devel" release="2.el7_9.tuxcare.els2" src="nss-3.90.0-2.el7_9.tuxcare.els2.src.rpm" version="3.90.0">
          <filename>nss-pkcs11-devel-3.90.0-2.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">6124bfef08f6996471aa5685640740c76bfdf4e8d73df67130d62bee44d3f9fe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-sysinit" release="2.el7_9.tuxcare.els2" src="nss-3.90.0-2.el7_9.tuxcare.els2.src.rpm" version="3.90.0">
          <filename>nss-sysinit-3.90.0-2.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">b7a5017362890400c229ac30c16ec7fcdba33165f8f761217aa2286ae369739f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-tools" release="2.el7_9.tuxcare.els2" src="nss-3.90.0-2.el7_9.tuxcare.els2.src.rpm" version="3.90.0">
          <filename>nss-tools-3.90.0-2.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">6477f1f45bda964e1ea5794e06b00f8690722336342bd1f0cdd5a2e53a4c87ea</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1731432106</id>
    <title>ImageMagick: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2020-27751: fix undefined behavior due to an overly large shift exponent
  in quantum-export.c
- CVE-2020-27768: fix NaN being outside the range of representable values issue
  in quantum-private.h</description>
    <severity>Low</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2020-27751: fix undefined behavior due to an overly large shift exponent
  in quantum-export.c
- CVE-2020-27768: fix NaN being outside the range of representable values issue
  in quantum-private.h</summary>
    <pushcount>0</pushcount>
    <issued date="2024-11-12 17:21:52 UTC" />
    <updated date="2024-11-12 17:21:52 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1731432106.html" id="CLSA-2024:1731432106" title="CLSA-2024:1731432106" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">030ce594206ffd929b9808837e274a1681233c54c5c0cc91b21a0f22ce7b4de2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">d6c69f7d7560c807821e48b8b030d1510319694f2cc6f7bdd9ce63151da78c28</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">e0082ae55a93464dcef73ff3b7e2bff64949ef1770e8529c0b827c04b117a44f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">9921eddf542aa58f43da58af9d2991f023c3ac12b552068c887c9ab0dc47c25b</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">f61bfd2393323757b4b495cac05b580549b3c172262c1e6f0931a806a0a5f1be</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">143b1d3d8a9416eb2705b933d453593c1c6d48ca7ffeac08e53000f819f29941</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">fdc06ce4639d7c2be8af6b9e8e11be2e86b5ecce1185d5a17c17d55114e379c7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1de1414e6c71466f2d8ae4d0332449c744331666b41a3ef530c31def7f337d16</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">cb27e3568d6ecb011ad5aa4179094d8086decd908e15e9735096f7774c07c718</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1104da9270ec716eed0dd68c3f38712ec14d2d6d0c556cb0c8e4ea4a2a3972b9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1731348593</id>
    <title>kernel: Fix of 18 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745}
- slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033}
- drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991}
- firmware_loader: Block path traversal {CVE-2024-47742}
- ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701}
- tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073}
- Bluetooth: L2CAP: Fix uaf in l2cap_connect {CVE-2024-49950}
- ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889}
- driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055}
- ext4: fix timer use-after-free on failed mount {CVE-2024-49960}
- smack: tcp: ipv4, fix incorrect labeling {CVE-2024-47659}
- ppp: fix ppp_async_encode() illegal access {CVE-2024-50035}
- ALSA: asihpi: Fix potential OOB array access {CVE-2024-50007}
- ext4: no need to continue when the number of entries is 1 {CVE-2024-49967}
- drm/amd/display: Fix index out of bounds in degamma hardware format translation {CVE-2024-49894}
- ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882}
- ACPI: sysfs: validate return type of _STR method {CVE-2024-49860}
- bna: adjust 'name' buf size of bna_tcb and bna_ccb structures {CVE-2024-43839}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745}
- slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033}
- drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991}
- firmware_loader: Block path traversal {CVE-2024-47742}
- ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701}
- tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073}
- Bluetooth: L2CAP: Fix uaf in l2cap_connect {CVE-2024-49950}
- ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889}
- driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055}
- ext4: fix timer use-after-free on failed mount {CVE-2024-49960}
- smack: tcp: ipv4, fix incorrect labeling {CVE-2024-47659}
- ppp: fix ppp_async_encode() illegal access {CVE-2024-50035}
- ALSA: asihpi: Fix potential OOB array access {CVE-2024-50007}
- ext4: no need to continue when the number of entries is 1 {CVE-2024-49967}
- drm/amd/display: Fix index out of bounds in degamma hardware format translation {CVE-2024-49894}
- ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882}
- ACPI: sysfs: validate return type of _STR method {CVE-2024-49860}
- bna: adjust 'name' buf size of bna_tcb and bna_ccb structures {CVE-2024-43839}</summary>
    <pushcount>0</pushcount>
    <issued date="2024-11-11 18:09:59 UTC" />
    <updated date="2024-11-11 18:09:59 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1731348593.html" id="CLSA-2024:1731348593" title="CLSA-2024:1731348593" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">a943e60ddd6c00b395f9ab38bfb1bca63dfb1073ea7346f8ff699a3978e066be</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">5b128ee8dfdc4113cb5cda50dbc86e571b966cd65675e2ba141ece0297deeb91</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">c695b67990e067c955ade5cbfbc3ea8f2c335dcf8e008d263a81c7e41a09bfc5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">246711799dc8faad648fe9b7a39865bab5dc21464be9eaf25c067423070afc6a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">74c3e1de9779329e4c0e400021cea0cad4ff882cfd9933291c5716769afd55b7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">ad0c4aae0b9429b2bd236579668222c60f163e07857091133a1e1ec958d0bf96</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">f3e4b311df7984242b40aafd823c512ea6d82a267f990c0e81907fe2ccd9b15c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">212acf284903015740cb34d923a6818b17b3bb7378ae8a0649331569a97e9246</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">42b03cc2e8bfccf3ee3a0b3a67419c1fd3477081674af473be51706d5d4fdeb5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">d470c706442cbcb3861b9815988faa12b405e732fdfb6482834d248326c0a632</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els12" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els12.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">9640ef3e1fa9c8b7e6d99fdb606a981d7568cca2cac68a096207c1ca9ff9d92c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1730910767</id>
    <title>Update of ca-certificates</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- update to CKBI 2.69 from NSS 3.103
- updated certificates:
-     # Certificate "GLOBALTRUST 2020"
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Baltimore CyberTrust Root"
-     # Certificate "Entrust Root Certification Authority"
-     # Certificate "Certum Root CA"
-     # Certificate "Comodo AAA Services root"
-     # Certificate "QuoVadis Root CA 2"
-     # Certificate "QuoVadis Root CA 3"
-     # Certificate "XRamp Global CA Root"
-     # Certificate "Go Daddy Class 2 CA"
-     # Certificate "Starfield Class 2 CA"
-     # Certificate "DigiCert Assured ID Root CA"
-     # Certificate "DigiCert Global Root CA"
-     # Certificate "DigiCert High Assurance EV Root CA"
-     # Certificate "SwissSign Gold CA - G2"
-     # Certificate "SwissSign Silver CA - G2"
-     # Certificate "SecureTrust CA"
-     # Certificate "Secure Global CA"
-     # Certificate "COMODO ECC Certification Authority"
-     # Certificate "OISTE WISeKey Global Root GA CA"
-     # Certificate "Certigna"
-     # Certificate "ePKI Root Certification Authority"
-     # Certificate "certSIGN ROOT CA"
-     # Certificate "SecureSign RootCA11"
-     # Certificate "Microsec e-Szigno Root CA 2009"
-     # Certificate "GlobalSign Root CA - R3"
-     # Certificate "Go Daddy Root Certificate Authority - G2"
-     # Certificate "Starfield Root Certificate Authority - G2"
-     # Certificate "Starfield Services Root Certificate Authority - G2"
-     # Certificate "AffirmTrust Commercial"
-     # Certificate "AffirmTrust Networking"
-     # Certificate "AffirmTrust Premium"
-     # Certificate "AffirmTrust Premium ECC"
-     # Certificate "Certum Trusted Network CA"
-     # Certificate "TWCA Root Certification Authority"
-     # Certificate "Security Communication RootCA2"
-     # Certificate "Actalis Authentication Root CA"
-     # Certificate "D-TRUST Root Class 3 CA 2 2009"
-     # Certificate "D-TRUST Root Class 3 CA 2 EV 2009"
-     # Certificate "CA Disig Root R2"
-     # Certificate "ACCVRAIZ1"
-     # Certificate "TWCA Global Root CA"
-     # Certificate "Atos TrustedRoot 2011"
-     # Certificate "QuoVadis Root CA 1 G3"
-     # Certificate "QuoVadis Root CA 2 G3"
-     # Certificate "QuoVadis Root CA 3 G3"
-     # Certificate "DigiCert Assured ID Root G2"
-     # Certificate "DigiCert Assured ID Root G3"
-     # Certificate "DigiCert Global Root G2"
-     # Certificate "DigiCert Global Root G3"
-     # Certificate "DigiCert Trusted Root G4"
-     # Certificate "COMODO RSA Certification Authority"
-     # Certificate "USERTrust RSA Certification Authority"
-     # Certificate "USERTrust ECC Certification Authority"
-     # Certificate "GlobalSign ECC Root CA - R5"
-     # Certificate "IdenTrust Commercial Root CA 1"
-     # Certificate "Entrust Root Certification Authority - G2"
-     # Certificate "Entrust Root Certification Authority - EC1"
-     # Certificate "CFCA EV ROOT"
-     # Certificate "OISTE WISeKey Global Root GB CA"
-     # Certificate "Certum Trusted Network CA 2"
-     # Certificate "Hellenic Academic and Research Institutions RootCA 2015"
-     # Certificate "Hellenic Academic and Research Institutions ECC RootCA 2015"
-     # Certificate "AC RAIZ FNMT-RCM"
-     # Certificate "Amazon Root CA 2"
-     # Certificate "SSL.com Root Certification Authority RSA"
-     # Certificate "SSL.com Root Certification Authority ECC"
-     # Certificate "SSL.com EV Root Certification Authority RSA R2"
-     # Certificate "SSL.com EV Root Certification Authority ECC"
-     # Certificate "GlobalSign Root CA - R6"
-     # Certificate "OISTE WISeKey Global Root GC CA"
-     # Certificate "UCA Global G2 Root"
-     # Certificate "UCA Extended Validation Root"
-     # Certificate "Certigna Root CA"
-     # Certificate "emSign ECC Root CA - G3"
-     # Certificate "emSign ECC Root CA - C3"
-     # Certificate "Entrust Root Certification Authority - G4"
-     # Certificate "e-Szigno Root CA 2017"
-     # Certificate "Trustwave Global Certification Authority"
-     # Certificate "Trustwave Global ECC P256 Certification Authority"
-     # Certificate "Trustwave Global ECC P384 Certification Authority"
-     # Certificate "Certum EC-384 CA"
-     # Certificate "Certum Trusted Root CA"
-     # Certificate "GlobalSign ECC Root CA - R4"
-     # Certificate "Security Communication RootCA3"
-     # Certificate "Security Communication ECC RootCA1"
- removed certificates:
-     # Certificate "Security Communication Root CA"
-     # Certificate "Camerfirma Chambers of Commerce Root"
-     # Certificate "Chambers of Commerce Root - 2008"
-     # Certificate "Global Chambersign Root - 2008"
-     # Certificate "Certification Authority of WoSign G2"
-     # Certificate "CA WoSign ECC Root"
-     # Certificate "A-Trust-Qual-02"
-     # Certificate "Certification Authority of WoSign"
-     # Certificate "CA 沃通根证书"
-     # Certificate "StartCom Certification Authority G2"
-     # Certificate "China Internet Network Information Center EV Certificates Root"
-     # Certificate "VI Registru Centras RCSC (RootCA)"
-     # Certificate "StartCom Certification Authority"
-     # Certificate "CNNIC ROOT"
-     # Certificate "ANCERT Certificados CGN"
-     # Certificate "ANCERT Certificados Notariales"
-     # Certificate "ANCERT Corporaciones de Derecho Publico"
-     # Certificate "Global Chambersign Root"
-     # Certificate "CHAMBERS OF COMMERCE ROOT - 2016"
-     # Certificate "E-Tugra Global Root CA RSA v3"
-     # Certificate "E-Tugra Global Root CA ECC v3"
-     # Certificate "Tunisian Root Certificate Authority - TunRootCA2"
- added certificates:
-     # Certificate "D-Trust SBR Root CA 1 2022"
-     # Certificate "D-Trust SBR Root CA 2 2022"
-     # Certificate "Telekom Security SMIME ECC Root 2021"
-     # Certificate "Telekom Security TLS ECC Root 2020"
-     # Certificate "Telekom Security SMIME RSA Root 2023"
-     # Certificate "Telekom Security TLS RSA Root 2023"
-     # Certificate "FIRMAPROFESIONAL CA ROOT-A WEB"
- remove duplicated certificate record:
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- update to CKBI 2.69 from NSS 3.103
- updated certificates:
-     # Certificate "GLOBALTRUST 2020"
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Baltimore CyberTrust Root"
-     # Certificate "Entrust Root Certification Authority"
-     # Certificate "Certum Root CA"
-     # Certificate "Comodo AAA Services root"
-     # Certificate "QuoVadis Root CA 2"
-     # Certificate "QuoVadis Root CA 3"
-     # Certificate "XRamp Global CA Root"
-     # Certificate "Go Daddy Class 2 CA"
-     # Certificate "Starfield Class 2 CA"
-     # Certificate "DigiCert Assured ID Root CA"
-     # Certificate "DigiCert Global Root CA"
-     # Certificate "DigiCert High Assurance EV Root CA"
-     # Certificate "SwissSign Gold CA - G2"
-     # Certificate "SwissSign Silver CA - G2"
-     # Certificate "SecureTrust CA"
-     # Certificate "Secure Global CA"
-     # Certificate "COMODO ECC Certification Authority"
-     # Certificate "OISTE WISeKey Global Root GA CA"
-     # Certificate "Certigna"
-     # Certificate "ePKI Root Certification Authority"
-     # Certificate "certSIGN ROOT CA"
-     # Certificate "SecureSign RootCA11"
-     # Certificate "Microsec e-Szigno Root CA 2009"
-     # Certificate "GlobalSign Root CA - R3"
-     # Certificate "Go Daddy Root Certificate Authority - G2"
-     # Certificate "Starfield Root Certificate Authority - G2"
-     # Certificate "Starfield Services Root Certificate Authority - G2"
-     # Certificate "AffirmTrust Commercial"
-     # Certificate "AffirmTrust Networking"
-     # Certificate "AffirmTrust Premium"
-     # Certificate "AffirmTrust Premium ECC"
-     # Certificate "Certum Trusted Network CA"
-     # Certificate "TWCA Root Certification Authority"
-     # Certificate "Security Communication RootCA2"
-     # Certificate "Actalis Authentication Root CA"
-     # Certificate "D-TRUST Root Class 3 CA 2 2009"
-     # Certificate "D-TRUST Root Class 3 CA 2 EV 2009"
-     # Certificate "CA Disig Root R2"
-     # Certificate "ACCVRAIZ1"
-     # Certificate "TWCA Global Root CA"
-     # Certificate "Atos TrustedRoot 2011"
-     # Certificate "QuoVadis Root CA 1 G3"
-     # Certificate "QuoVadis Root CA 2 G3"
-     # Certificate "QuoVadis Root CA 3 G3"
-     # Certificate "DigiCert Assured ID Root G2"
-     # Certificate "DigiCert Assured ID Root G3"
-     # Certificate "DigiCert Global Root G2"
-     # Certificate "DigiCert Global Root G3"
-     # Certificate "DigiCert Trusted Root G4"
-     # Certificate "COMODO RSA Certification Authority"
-     # Certificate "USERTrust RSA Certification Authority"
-     # Certificate "USERTrust ECC Certification Authority"
-     # Certificate "GlobalSign ECC Root CA - R5"
-     # Certificate "IdenTrust Commercial Root CA 1"
-     # Certificate "Entrust Root Certification Authority - G2"
-     # Certificate "Entrust Root Certification Authority - EC1"
-     # Certificate "CFCA EV ROOT"
-     # Certificate "OISTE WISeKey Global Root GB CA"
-     # Certificate "Certum Trusted Network CA 2"
-     # Certificate "Hellenic Academic and Research Institutions RootCA 2015"
-     # Certificate "Hellenic Academic and Research Institutions ECC RootCA 2015"
-     # Certificate "AC RAIZ FNMT-RCM"
-     # Certificate "Amazon Root CA 2"
-     # Certificate "SSL.com Root Certification Authority RSA"
-     # Certificate "SSL.com Root Certification Authority ECC"
-     # Certificate "SSL.com EV Root Certification Authority RSA R2"
-     # Certificate "SSL.com EV Root Certification Authority ECC"
-     # Certificate "GlobalSign Root CA - R6"
-     # Certificate "OISTE WISeKey Global Root GC CA"
-     # Certificate "UCA Global G2 Root"
-     # Certificate "UCA Extended Validation Root"
-     # Certificate "Certigna Root CA"
-     # Certificate "emSign ECC Root CA - G3"
-     # Certificate "emSign ECC Root CA - C3"
-     # Certificate "Entrust Root Certification Authority - G4"
-     # Certificate "e-Szigno Root CA 2017"
-     # Certificate "Trustwave Global Certification Authority"
-     # Certificate "Trustwave Global ECC P256 Certification Authority"
-     # Certificate "Trustwave Global ECC P384 Certification Authority"
-     # Certificate "Certum EC-384 CA"
-     # Certificate "Certum Trusted Root CA"
-     # Certificate "GlobalSign ECC Root CA - R4"
-     # Certificate "Security Communication RootCA3"
-     # Certificate "Security Communication ECC RootCA1"
- removed certificates:
-     # Certificate "Security Communication Root CA"
-     # Certificate "Camerfirma Chambers of Commerce Root"
-     # Certificate "Chambers of Commerce Root - 2008"
-     # Certificate "Global Chambersign Root - 2008"
-     # Certificate "Certification Authority of WoSign G2"
-     # Certificate "CA WoSign ECC Root"
-     # Certificate "A-Trust-Qual-02"
-     # Certificate "Certification Authority of WoSign"
-     # Certificate "CA 沃通根证书"
-     # Certificate "StartCom Certification Authority G2"
-     # Certificate "China Internet Network Information Center EV Certificates Root"
-     # Certificate "VI Registru Centras RCSC (RootCA)"
-     # Certificate "StartCom Certification Authority"
-     # Certificate "CNNIC ROOT"
-     # Certificate "ANCERT Certificados CGN"
-     # Certificate "ANCERT Certificados Notariales"
-     # Certificate "ANCERT Corporaciones de Derecho Publico"
-     # Certificate "Global Chambersign Root"
-     # Certificate "CHAMBERS OF COMMERCE ROOT - 2016"
-     # Certificate "E-Tugra Global Root CA RSA v3"
-     # Certificate "E-Tugra Global Root CA ECC v3"
-     # Certificate "Tunisian Root Certificate Authority - TunRootCA2"
- added certificates:
-     # Certificate "D-Trust SBR Root CA 1 2022"
-     # Certificate "D-Trust SBR Root CA 2 2022"
-     # Certificate "Telekom Security SMIME ECC Root 2021"
-     # Certificate "Telekom Security TLS ECC Root 2020"
-     # Certificate "Telekom Security SMIME RSA Root 2023"
-     # Certificate "Telekom Security TLS RSA Root 2023"
-     # Certificate "FIRMAPROFESIONAL CA ROOT-A WEB"
- remove duplicated certificate record:
-     # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068"</summary>
    <pushcount>0</pushcount>
    <issued date="2024-11-06 16:32:53 UTC" />
    <updated date="2024-11-06 16:32:53 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1730910767.html" id="CLSA-2024:1730910767" title="CLSA-2024:1730910767" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="ca-certificates" release="72.el7_9.tuxcare.els1" src="ca-certificates-2024.2.69_v7.0.306-72.el7_9.tuxcare.els1.src.rpm" version="2024.2.69_v7.0.306">
          <filename>ca-certificates-2024.2.69_v7.0.306-72.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">5922e538c8077e4683e23042810fefdeaaa0958784e22b2689244df4f30be2c3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1732267577</id>
    <title>kernel: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538}
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885}
- Fix: Revert "smb: client: fix use-after-free bug in cifs_debug_data_proc_show()" double lock</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538}
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885}
- Fix: Revert "smb: client: fix use-after-free bug in cifs_debug_data_proc_show()" double lock</summary>
    <pushcount>0</pushcount>
    <issued date="2024-11-22 09:26:22 UTC" />
    <updated date="2024-11-22 09:26:22 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1732267577.html" id="CLSA-2024:1732267577" title="CLSA-2024:1732267577" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">e5da24135cb9c0508f34ae58cb899683c328bb2476432c78a06894c1a97a35e3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">282195fb69c35732b8e67267e1f2b5099777ded4aadf430ac853124d379d8c38</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">bd528059fd94b90498db92bd1a12a804acda183b29871c915c78516f9a9ce96d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">7b70ea72c5bdd152897d3b3f87bc9c87ced3ef77f6a16e05b6c10a10bffca5ee</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">a622b0610750e15e7d709bd30731e0b598b9094d5c01fb026355c8f1770d68df</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">20c0c65664e97202b08ff4e166a843440f75c6b49c46e7d613f89098a55d8c31</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">0e939d4322c2e98251628ae7ce16b1bbf1dfd235a59fdc8eea620436d14a8d15</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">c9ba32c7e1ff5af24439b2e8c52d14ad75926832ddd63cfd0b02b7272c8b72ea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">52658efc9551aa0c4216a23a8991be7df3825f7fa794196359cfe01dac7bd4e1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">362bde16799495fd5818bb9687ec99be9ca54d154bcd5473aae0e5952eb9e574</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els13" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els13.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">009bd7a770728f040ce850cc7d3812b49113542e5d3a35bc2bdb44b8cff97fde</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1733158948</id>
    <title>php: Fix of CVE-2024-11234</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-11234: fix HTTP fulluri CRLF injection</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-11234: fix HTTP fulluri CRLF injection</summary>
    <pushcount>0</pushcount>
    <issued date="2024-12-02 17:02:35 UTC" />
    <updated date="2024-12-02 17:02:35 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1733158948.html" id="CLSA-2024:1733158948" title="CLSA-2024:1733158948" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">06d6d925eff794def3b096ade202b28e9d9fe3c32ee13419346d1d7503a405e6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">59bb500a7cdb2a25cdf20ad1930a9bfa3295c1dcd7f1581e69211f4536bc354a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">f8425ad6043cc35b1e22d1f7de103088135db314da5efdf06cdc0125b0cdae05</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">b7fe19ac2377a7af1d4fbc7f59835095f3cd8e71b2159292dc9b213dd649b739</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">8b38100e5abd947c2cbc0bde5cc3a830e34ff8f1baac2548fb753c80096ae6b4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">c6f05216edbd420806fd30ab4f00c323ba6395b8449a6b6b8dbe5e262debe57a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">6297ddcd15ae68dddbd13cdf119fbfe02c6ebe6688109435f9818096caf231e3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">782638b5572eab8c13b95a27369befb8c4466b6a383673ba870e37cf5c3f243d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">e4d4f77b534aa6cab4dba85a15313be07fd788e9b3b40377f6a6f75bdfe9af36</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">2b77a84be5d90622ca8739e7b2e155682eb821e50da52cea3236e1546472847d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">2b517d45d2f5a75fa9dffed14cacbf459057d0f98b72ab43b2325c990196892e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">e37c3cb2aced769842fda440c59d35ae4330087f22a820d93fbb9e6af3578e51</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">07f00197f57c40bd339dc720b1829a54a4cf58d92d9717347b8c2d8acfb2fb13</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">b28ad75436a1ad2e7c4fd4cc9eb95895349938647db06dab3ac70a74fa953258</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">d13926651ab484ca496513c65060b69aa44e4cb68264ff3ec2f1c386d24e14f7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">af05264c4fb0bdbd2e76f9a9c8e096d5e8ca5096d92546f3207b939241f5d4e2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">4cf17961ceea9ebca84d8737f02d4918c4ad69d8db27320547160125f9b4829c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">66a9621ed33a897482c230b808141feba60c25c582ef4b48dd5ce6b59033cfbb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">f42e6716fd08264cc4702e25054dd38d374c564056677f6170e99c3513ceaf4e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">1755974720455e13d6b98b7fa8126c6b055bf87a6827e8179c979b52ac6c16b5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">b2b307e2f213135fcebbe798fcc5e90c5bc4dd7de8cee3a247855ed6c44a686d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">428234f0b3ed1ffe77b8c5ae4f5f60f261f6a4e4037855c2fa9045d72f104627</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">bca008758db4fb924de866ec50d32e14884bb1f21cb8bf147e004cfc0ffb8c16</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">65b025e476b9008bdfa372c89ea6e3735756bbcd2666620356e7167bfd6ddc0a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els5" src="php-5.4.16-48.el7.tuxcare.els5.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">d864c0b041ffa17ccbf45511ed599e36db5994e2ad135048080b6c542845fe08</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1733246329</id>
    <title>php: Fix of CVE-2024-11233</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-11233: fix buffer overflow vulnerability in convert.quoted-printable-decode
  filter</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-11233: fix buffer overflow vulnerability in convert.quoted-printable-decode
  filter</summary>
    <pushcount>0</pushcount>
    <issued date="2024-12-03 17:18:54 UTC" />
    <updated date="2024-12-03 17:18:54 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1733246329.html" id="CLSA-2024:1733246329" title="CLSA-2024:1733246329" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">201d0b30ffe86871a6d4eea341b4971c14f551ca6499eeba08b44c25ca075944</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">5527bb3adac14981e969c2c10cbdbba80678c29c48b5bbcc5d8792190f0d60eb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">ce7738e3d2bef702a412f3296e139494a535cfb7c1250524cf5185096efafa6e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">e35933efca262c97685b57cbada64457691b7c9bcd3091ae8c3bee70b2c5466f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">09f6cc9b14cb87d280997d1c7f15f1fd6266998ca0cacd022fcc52778b7d2c34</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">e1b9bd81bad7cc914b90336fa8f06f7ee1eecff704e1892aa92c4021e3e0cdce</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">15911f5d7727a571754c211af69e5511e975f53dea4857f61dd65df650540ee5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">c2aed1e8e1d6e16fb370bc923c2d99839367b7602355485fb4086af92bf58192</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">5253792691b8150f2b95de6e7276eb664d66641bfad6e683ffe85c46c36f096b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">c231796787c167cf44160c0ef2e38633cbc5151a8c63c12b32509ba9adbfff50</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">b60966935050716a73a2e74cc0bf18ae2c10e2af39580f8627864bf2dd524d7c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">b35b3eaa48e6cfc1ddd67476b1436c90fe671ea7b844bbf8b7545ac25c0226b3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">839b7b8c1f9a49c32b2524f6a7cd02d80303c4b06852cc0b788292ef1bc1e68f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">834ee96f6b0b18f42b8b680615e67d1da87c3b562034cf8b2f8de03ba1c4139f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">a52681bbbfd941ddd63cb02d2939c7d5fd1d163874218badbe5fa3ca4c8425f0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">1e87d329f66b9e4ae208aecaa6e867fdd33efa8bc86dba798ffb6f46acde4c17</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">b13a0f8fe1283100d3f71ed5119cc056802b6732ae2b50154a8ed32c679c9401</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">dc1ecbb6498029e8250969aae057e26d274be09ae746b4aa24b701a05e5610b3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">c403d696760cfdf2ed390a870e1493f917e184d135c3649213093a9b3fd03c70</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">463e245d93bd50cfea1d70a75e4276a8cd8b78c42b5c689dd1f81a9811300485</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">f7e9ef91942cb40d2cc4e49032660effb88342c3eb31344cac55c12523e4d316</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">f5eb57cffb9bc946ccdfc5893f037bed2fb70f97b27b41e2b894562afba3d4b0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">c03728b98957ae3325a6d00e8f8de6dd33a91a0cefb212507cc3f458705b891c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">f4af1a3ec0138571726f61777068a262b132c10cc46ae6ecba95e162a946cef3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els6" src="php-5.4.16-48.el7.tuxcare.els6.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">1e8747bdce2e9d1ba4c1c0d4bfaa765a8b37c3b834a1dde16141848a998d8ff0</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1734041590</id>
    <title>Update of grub2</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update version and epoch</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update version and epoch</summary>
    <pushcount>0</pushcount>
    <issued date="2024-12-12 22:13:16 UTC" />
    <updated date="2024-12-12 22:13:16 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1734041590.html" id="CLSA-2024:1734041590" title="CLSA-2024:1734041590" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="3" name="grub2" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">4537271ee6ca2fb395db75b005636443eba93cfac8c840463745c149352b63e5</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-common" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-common-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">aa5b6f21c1c116356f240d976a64dc21f6b8245137bf77f662c9084800a1207a</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-ia32" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">da6282b8d1bf08c228ae8e6e4ed99ef622a58cf26b67aaf4b0a3d790acf79073</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-ia32-cdboot" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-cdboot-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3b446b4d552e9d079eb480ce483a9e11ad6f68e72325eb45a2522e4defa02f93</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-efi-ia32-modules" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">4863c82ad5f6d3c05e63e92a8b7d4d5d996d7d31bf0c5d6b508b5d1ed2b1ea82</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-x64" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-x64-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3af31e1dd9aee93f3d0069aae9ba1a79dc6dec5fc0dd2be97490eb7b403f2600</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-x64-cdboot" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-x64-cdboot-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">2a5991f0cad3c38ce20522bb90b31b3d00143f53f9b87bd9b0a55e1dd9c8ef81</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-efi-x64-modules" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-efi-x64-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">f750a3fbfa92ed9f1fd9d7cb0c02cb9586cedd4c8aeecbd31ed31011d023470f</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-i386-modules" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-i386-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">543d0e1eb6a919496494d773cbdcd8301171f7b5acb559a7bb0ddb8103518896</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-pc" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-pc-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ed8c58ae36804d18f4a743484473c54934b486728bf56b5143ce64200425e89f</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-pc-modules" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-pc-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">cc71f54abb31b3c41d5b071c415346dbffa5d0b2dec021ab4231dbe68a7bcddb</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-tools-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">2b1f98b8b5c851993980c07f18ca7d97419b22fdab9c616a135b3f8db1810ac4</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools-extra" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-tools-extra-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">c93a1a41b9b7d5a3720aa6b45475fe4e572245708bb2f279988ee975471c59c1</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools-minimal" release="0.87.0.2.el7.centos.14.tuxcare.els2" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.src.rpm" version="2.02">
          <filename>grub2-tools-minimal-2.02-0.87.0.2.el7.centos.14.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">88329cb9eb346be6d398df07e280e31bb05e56fb811924cb0e2c08afec73740f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1734372021</id>
    <title>postgresql: Fix of CVE-2024-10979</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-10979: Prevent trusted PL/Perl code from changing environment
  variables</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-10979: Prevent trusted PL/Perl code from changing environment
  variables</summary>
    <pushcount>0</pushcount>
    <issued date="2024-12-16 18:00:27 UTC" />
    <updated date="2024-12-16 18:00:27 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1734372021.html" id="CLSA-2024:1734372021" title="CLSA-2024:1734372021" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">aa0b29db924af77397fb69f9dad0051586a6de2c5bd1f54afa2fe616b1247477</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">281ff12ec665cb04da51d7f911f4dd180d3bfb6fc398c2e03b5d9a5e5c8c2c86</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-contrib" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-contrib-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">bd73f5baf3ad94aa0a50fe9b03c5567e907e78723fbf1ba9626fbc42f82dae81</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">08c850a043815001cb35b6507be93cebb47e6d0aaa14409515543656e7f9f922</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">93d581accb5087064e4fa48b6f5fa7b373534a6bc619eb2a0c3907b114b7b47e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-docs" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-docs-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">2969e14fc3517dbc838839fa31726b3b503b66094e132f99f2d99e2f08105204</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">883594fe1e280b5c504c81591cb238cc4e735c795006b0f4a1f774e4b8606999</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">34b94aeca3a62ea273f43c38f60aed7ca0f286bce043295b1cf871d777faba21</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plperl" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-plperl-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">37c4fecea75e6ede1f288e0edbfc6ee7e1ad3f2ad77957f858d36e4fb25e3b08</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plpython" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-plpython-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3b4a406e79f758b9580bcf192b531bae85594386411c21a721b1cc4d31e7d27a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-pltcl" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-pltcl-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">5ec1b6ac042f5996627bf1a51b67550111e8edd1e73e31f9ed89afef16df0509</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-server" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-server-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">25874aa2f4e229005286bc8df9a26b0316c5a831e959ce7e9d26844a55d152a7</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">7669bd2f8c733dc203e8b996937fb06721fea8eb6bda6cb30870f1cc394e3827</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">b3f1e568ab554f46feebfc4f4aa0e68b9bbb6354043e8467d3067e3fd2ee86ba</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-test" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-test-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3aefc716d1377ad805f0833dfc4001b6d654dc289efbc714c5f71b8176b3fa37</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-upgrade" release="9.el7_9.tuxcare.els2" src="postgresql-9.2.24-9.el7_9.tuxcare.els2.src.rpm" version="9.2.24">
          <filename>postgresql-upgrade-9.2.24-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">6ff32f38a6919bfaefcd6483801dbda4a6459c66ad1a7608ca1318c651e65498</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1735300286</id>
    <title>gnome-shell: Fix of CVE-2024-36472</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-36472: fix portal helper from launching automatically based on
  network responses to prevent loading untrusted JavaScript code</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-36472: fix portal helper from launching automatically based on
  network responses to prevent loading untrusted JavaScript code</summary>
    <pushcount>0</pushcount>
    <issued date="2024-12-27 11:51:32 UTC" />
    <updated date="2024-12-27 11:51:32 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1735300286.html" id="CLSA-2024:1735300286" title="CLSA-2024:1735300286" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="gnome-shell" release="34.el7_9.tuxcare.els1" src="gnome-shell-3.28.3-34.el7_9.tuxcare.els1.src.rpm" version="3.28.3">
          <filename>gnome-shell-3.28.3-34.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8fa37c166f2c541669e5d6326309c4114a29eee50b6512468b3408cf7840c7d8</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2024:1735311722</id>
    <title>bind: Fix of CVE-2023-2828</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Removed the bind-9.11.4-CVE-2023-2828-fixup.patch which caused problems with named-pkcs11</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Removed the bind-9.11.4-CVE-2023-2828-fixup.patch which caused problems with named-pkcs11</summary>
    <pushcount>0</pushcount>
    <issued date="2024-12-27 15:02:08 UTC" />
    <updated date="2024-12-27 15:02:08 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1735311722.html" id="CLSA-2024:1735311722" title="CLSA-2024:1735311722" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="33" name="bind" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">c8b7a61e5db91c19cddfde900da28703e23be6a6d0e18a5e2fb20f39a8c65d1c</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-chroot" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">a60e13ef7afb9f4f717efe5b18dedd0b831a0ef2948d6eab1ebd077221a4ab69</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">2069466d1065184aaae071edfd04861a5467f6acfd198066839824f92d8a4b91</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">60a934f8153f3ee3a3758f3701c29897ae96e2551d0371d108d5e5531dae042e</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">7489f06b8b96b597b8b7c3d295e71ed2ee56928af8950fa43339f5cfdbbbea1f</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">f6c8fd8a49aa6d4b51eebdb55d28ec86369f84742a6593185880e599e44344b0</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">3010a9080c1fdb5bc996b872d75b54fd1f1f11c6bd3cf7e3cd9a636af284269b</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">d8cdebfdf9a07b17f5cb47bca017e634ab65db721874ccbfaeaadbd3df57cb7e</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">643e02ccf532ae6809f7c22cf53ff9fd5f6a9f22c64105c58bb24cafd9fc902b</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">392aa757974874b91b79fb35036d8de9d7842eec8df55a9b4b2979e69a6f3725</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">3f89b7f3ba23547e39e61a368767ddcc474bf603796f9545551a5aa562fabfbe</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">177c1d1c7c152ec20fd59865bf875ecde7b8eb732340c6691d85aba5f4dcc169</sum>
        </package>
        <package arch="noarch" epoch="33" name="bind-license" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7_9.16.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">de9447d3a012f29b113285fa7fa93486e05b4110eef20619b0c617fecd98bd8f</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">0ae74cc8011cd898358afdbc2f4ed3d4b4e9744c2a025bd5bdd2b28a25d9d6fd</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">3dcc1d447a828a78fb343747a65631fb357eb8dd86b054cf55984d615f241c75</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">05e4f7041b921c4813786fb827ef30e5c7a28501a5f34261d8a4a76642292e41</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">eced85db9b6011733d574a9fc509803f1e3f92c6e2c90a92b16bd19245c09405</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">b140d5f83a4d2f0fd3a8b87829a826dc6242576d5fa12e11b60856042560f5bb</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">88dfe9070a7c02fe25928089d0534fe00ea7aa5ed0a6b660495a57415c782433</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">7e13451a38aed1b6c887a578e6c8f2ffc2ed44ea86bd20e38251fe93709f4e69</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-utils" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">5b17a53b9d56d90142c813157cb706d4dd4f8b2b7193939300d32ddf7e5f8985</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">9c7831987686ac20a70e1f31dbb1ba2d63109998648f3e48ba56ab050877d12e</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb-chroot" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">72b8493bdac5033b74a76fc8c95d2a588852519fb6ec0f00d4fdaca2111c8ef3</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-utils" release="26.P2.el7_9.16.tuxcare.els5" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els5.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7_9.16.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">778235647936091712cf298a226751841707b2e3ccb0fcfe0c12091a064f8218</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2024:1735125596</id>
    <title>Update of httpd</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- mod_session: Fix separator parsing</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- mod_session: Fix separator parsing</summary>
    <pushcount>0</pushcount>
    <issued date="2024-12-25 11:20:01 UTC" />
    <updated date="2024-12-25 11:20:01 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2024-1735125596.html" id="CLSA-2024:1735125596" title="CLSA-2024:1735125596" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">b17a842900953d7ec2e5982b160fc149ffc6e6f66210f4fd1ea2fc68802bb9a2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">ac1c0b3e8d902e366a9150a727ff70925010009733e9d72bb96caeb49b8d532e</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">2aa58aa31454d5b60530522eb3e339cd93cb95a74be837e146cdf1509f2a0f6f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">223cfda2ccb972d5630e7e9f32a3e55deb6bee7376cdb9894863b8ef3eee2b0e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">48decd7c6cfdb1b4ca8411a6a658876640f1cb1457240f12f02c77760f90afed</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">1034142e47778822fffb07c07e7ccb6d83b3dedc13cad826b2dd121f35d6a2b3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">dd047cb2390b43dfd09d6bc80f84e33bf953f5ebf326dcf3087ce0c4491f5ddc</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">920bdf8fc3c6865abcbffa56ee8931ec2d5d9c39eff4234982dc9b2144ff3e57</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1737468474</id>
    <title>kernel: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- media: edia: dvbdev: fix a use-after-free {CVE-2024-27043}
- btrfs: dev-replace: properly validate device names {CVE-2024-26791}
- KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory {CVE-2024-50115}
- net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT {CVE-2024-53057}
- ipc/sem.c: bugfix for semctl(,,GETZCNT)
- Increase KEXEC_AUTO_RESERVED_SIZE to 256M
- x86/apic/x2apic: set affinity of a single interrupt to one cpu
- bonding:avoid repeated display of same link status change
- xen/netfront: stop tx queues during live migration
- xen/balloon: Support xend-based toolstack
- md/raid5: fix oops during stripe resizing
- block: fix null pointer dereference in blk_mq_rq_timed_out()
- block: init flush rq ref count to 1
- blk-mq: Remove generation seqeunce
- Revert "driver core: bus: Fix double free in driver API bus_register()"</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- media: edia: dvbdev: fix a use-after-free {CVE-2024-27043}
- btrfs: dev-replace: properly validate device names {CVE-2024-26791}
- KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory {CVE-2024-50115}
- net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT {CVE-2024-53057}
- ipc/sem.c: bugfix for semctl(,,GETZCNT)
- Increase KEXEC_AUTO_RESERVED_SIZE to 256M
- x86/apic/x2apic: set affinity of a single interrupt to one cpu
- bonding:avoid repeated display of same link status change
- xen/netfront: stop tx queues during live migration
- xen/balloon: Support xend-based toolstack
- md/raid5: fix oops during stripe resizing
- block: fix null pointer dereference in blk_mq_rq_timed_out()
- block: init flush rq ref count to 1
- blk-mq: Remove generation seqeunce
- Revert "driver core: bus: Fix double free in driver API bus_register()"</summary>
    <pushcount>0</pushcount>
    <issued date="2025-01-21 14:08:00 UTC" />
    <updated date="2025-01-21 14:08:00 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1737468474.html" id="CLSA-2025:1737468474" title="CLSA-2025:1737468474" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">25c8d179523cceaca58f4e759c6d6a876d1a8687c12cdb6cd32ff85d57eb6d1c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">0b24225b81eceaecb5e15ea92acfa4b315f920cbe0170bc68f1597084efd4222</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">5dc5d6ff59419b8ecb76b53695ec0ba2f84f59393c90235b1eb5ef854766dc68</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">bc52da38d9d459b71d378ac7eec9f9e85145b0ff7c701b31e2cdd5e40cb1b1e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">d8052d4ee01ae1bafa0250b47526c45cbb1a58957f28dea92ecbe8b8a2682526</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">a48567eafde5846a6d3bf44b19718367cb7a3a69556a5bad9ffb153b87612a74</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">c82ff4a1b895d318039202640e6c4ba66145e12aa4c2587e695816c2d72aff29</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">0ba63876a2fbb322503d3bc6e341994897fa96fbf3b927cd1504de6d8e33aa4b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">6f9b6c7b24341b99f26a78a1b4604aa20f5ff80f732fa92a29d82b90451fe93c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">21b5e8e0cc26001b60d45c0292055eaa54c29d87b56e145790fac08e89a03753</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els14" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els14.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">ba09ffcde39c08cbbf234f67a1132193be406e4cca1a27fc2380c821d1efa2c4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1737569565</id>
    <title>rsync: Fix of CVE-2024-12085</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-12085: fix to prevent information leak off the stack</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-12085: fix to prevent information leak off the stack</summary>
    <pushcount>0</pushcount>
    <issued date="2025-01-22 18:12:51 UTC" />
    <updated date="2025-01-22 18:12:51 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1737569565.html" id="CLSA-2025:1737569565" title="CLSA-2025:1737569565" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="rsync" release="12.el7_9.tuxcare.els2" src="rsync-3.1.2-12.el7_9.tuxcare.els2.src.rpm" version="3.1.2">
          <filename>rsync-3.1.2-12.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">679fb3334c8ec1c2bd3caafa73adcace6410c4a8fd114efada89b9688835d4a3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1737993791</id>
    <title>postgresql: Fix of CVE-2024-7348</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-7348: Fix TOCTOU race condition in pg_dump</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-7348: Fix TOCTOU race condition in pg_dump</summary>
    <pushcount>0</pushcount>
    <issued date="2025-01-27 16:03:18 UTC" />
    <updated date="2025-01-27 16:03:18 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1737993791.html" id="CLSA-2025:1737993791" title="CLSA-2025:1737993791" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">0b426c19356ba042d2e62bae4d39bf33cead3d2fdd67b5a9d1a17f3453f2d5fd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">6d1a441fb28232493360f4ef467fb5688001e8b1248d661496159dd96a2c8b0b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-contrib" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-contrib-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">73659d77fa59789f3138230a5e3cc868f6590935ebc56002ac00646405c95750</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">8e7245aaafae7fd3ac3d31d16cc11b3acb02c8ad00be9d165d13c37358019970</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">698c3ed1edeb78f1e2fa5d58139f39a8fc993872f4b2db29403973a0251231e6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-docs" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-docs-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">812c105aa767b6575bf616fec5d6487f3195eb0ed545ed54932932c17082c880</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">59b3066e669fb3c7100cec74652142734dbc85f875cdbb430ed997dee42fc488</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">4e060b18daf4f50b93cbd322b016c9362195f614afe69253ab3927e20d496bfd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plperl" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-plperl-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">cc96c980663dff4b4e73a6f6d0b8891cd24cd4e6eaa6f56deb46d2abb272a6f3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plpython" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-plpython-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">1ba66f0e958cec34ec00725e7edef529e1f8707981bee370bdabc744bcedd62e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-pltcl" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-pltcl-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">cd9fdb36339774d4735317daeb1c624b96a5a1d816e3323b7d6baa287aa7633d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-server" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-server-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">0beca8e39132953b3706d08c88fc49c3766f2b7b25d9edc571e54e70277d22b2</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">04498ef71077e48979e9a1e0ba251c0e79203c2eaf840aac49f5004f473eacfb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">110696a2383762bcca7babd12d25b00c4e8abc0d6a61091adec8284bb66a7877</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-test" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-test-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">eed5eb1b946fbe715a6fe397adeb2a70b97fde75dcdd0e977bc99731c0074ecc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-upgrade" release="9.el7_9.tuxcare.els3" src="postgresql-9.2.24-9.el7_9.tuxcare.els3.src.rpm" version="9.2.24">
          <filename>postgresql-upgrade-9.2.24-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">6a4f76f3dfd812245148192df2f08b56b80bd3f4abfcf465c00411b3aab3bd44</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1738672047</id>
    <title>kernel: Fix of 15 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() {CVE-2024-50282}
- drm/amdgpu: fix usage slab after free {CVE-2024-56551}
- Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del() {CVE-2022-3640}
- netfilter: ipset: add missing range check in bitmap_ip_uadt {CVE-2024-53141}
- ceph: prevent use-after-free in encode_cap_msg() {CVE-2024-26689}
- net: af_can: do not leave a dangling sk pointer in can_create() {CVE-2024-56603}
- NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173}
- netfilter: x_tables: fix LED ID check in led_tg_check() {CVE-2024-56650}
- scsi: bfa: Fix use-after-free in bfad_im_module_exit() {CVE-2024-53227}
- af_packet: avoid erroring out after sock_init_data() in packet_create() {CVE-2024-56606}
- Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() {CVE-2024-56605}
- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() {CVE-2024-53156}
- Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() {CVE-2024-56604}
- initramfs: avoid filename buffer overrun {CVE-2024-53142}
- hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling pointer {CVE-2024-53103}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() {CVE-2024-50282}
- drm/amdgpu: fix usage slab after free {CVE-2024-56551}
- Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del() {CVE-2022-3640}
- netfilter: ipset: add missing range check in bitmap_ip_uadt {CVE-2024-53141}
- ceph: prevent use-after-free in encode_cap_msg() {CVE-2024-26689}
- net: af_can: do not leave a dangling sk pointer in can_create() {CVE-2024-56603}
- NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173}
- netfilter: x_tables: fix LED ID check in led_tg_check() {CVE-2024-56650}
- scsi: bfa: Fix use-after-free in bfad_im_module_exit() {CVE-2024-53227}
- af_packet: avoid erroring out after sock_init_data() in packet_create() {CVE-2024-56606}
- Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() {CVE-2024-56605}
- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() {CVE-2024-53156}
- Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() {CVE-2024-56604}
- initramfs: avoid filename buffer overrun {CVE-2024-53142}
- hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling pointer {CVE-2024-53103}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-04 12:27:33 UTC" />
    <updated date="2025-02-04 12:27:33 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1738672047.html" id="CLSA-2025:1738672047" title="CLSA-2025:1738672047" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">f6f5fc3c40f2f8642b37ec69c27b48a20928442ff59677f6099f8c9afb937fd5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">ede3dd7bc1882f29fb9b5125283808b4d261793b055647097019a1de2496c4d2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">ad1a2509c348d59e591f9e3c4913b124ede5debe80f955e577952ca0b6177c28</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">3d6452d3de2f86e1e66eeded4555728665eefeeb82bef4b546aeb3676bba5f9a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">e5cc03ceeed9b3075cc95adf407949f956b951523dee61ece7d8fb9712f46c0a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">b46d6c8febf598f57f01105c715c29226a61c72528b68ecc7a76e8be69f4c871</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">758f15b5af9233335262ec604d287c9431c7fa8e97edd87c4dc2ad0ec247c60b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">fe74af4e92bbdf203f9b983c3402bda97f4531f5083b056d1151d4857075bdad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">fd396242bc943fa2cc97d8dc0f6cb9ec8cce5e317144aeaa12c3ced42e61ddcd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">b33b21036b0d5735e9af1e0b9b9bdd99047cdb6d170eb9a62291ce2153831e99</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els15" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els15.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">51ccd300b4dbd935580b63acead1418b39775f96310b300a6666ba8a8156ca78</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1738852614</id>
    <title>rsync: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-12087: fix path traversal vulnerability in rsync enabled by the '--inc-recursive' option
- CVE-2024-12088: make --safe-links stricter</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-12087: fix path traversal vulnerability in rsync enabled by the '--inc-recursive' option
- CVE-2024-12088: make --safe-links stricter</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-06 14:37:00 UTC" />
    <updated date="2025-02-06 14:37:00 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1738852614.html" id="CLSA-2025:1738852614" title="CLSA-2025:1738852614" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="rsync" release="12.el7_9.tuxcare.els3" src="rsync-3.1.2-12.el7_9.tuxcare.els3.src.rpm" version="3.1.2">
          <filename>rsync-3.1.2-12.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">b298ea8b5dab0c23ab57977bd047b0e7ae6d23af2607ce11b4612ca3cecdcb01</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1738695324</id>
    <title>php: Fix of CVE-2024-8929</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-8929: fix various heap buffer over-reads</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-8929: fix various heap buffer over-reads</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-04 18:55:30 UTC" />
    <updated date="2025-02-04 18:55:30 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1738695324.html" id="CLSA-2025:1738695324" title="CLSA-2025:1738695324" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">e4d060420008fc644819bbe5b2bc27a9e06cc29d13fdaee3f52b69a25837cf94</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">0b6f320761635602d071930690b25213c77832ae746101aedaefdf71860e98c8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">61476f4f09735304f0bc7a5bb4daa2e52be9f6208b8ec42ba81dcd7b4c917ee6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">d41c01e62d8cbcecfca0b3c9945160ec0386b9f0203ca35cc9d2c8ab06efff08</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b55faccaef37d3ff538ea85a5a9f84bdb237cb50303325c06fef3aad0a1d534b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">9e89a92524589406375d2501d325b0bb6bf5830e0aa4c466555fff33daa343be</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b3be03891eb0dbc54a7e69ba1cf74dcbdb90453dbe7ddcfb2953f4e55b87ac84</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">f6fd63c5500e0f8611394ccca21d6014f76e34a9e9f0392baf1ad5871971a42f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">8bfe56bfc47a0363e7c4e31c68ea515bb2d65101a0cc8ea635e248dfd4776e6b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b2f78208169a7f6f88d7f6eab336d80be666022c7550ac525d968664ec9e7aa1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">c3187cc3897774ceba656ddc1156ab3c9c2e782cfab2efbe6ccd29091e6f35bd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">dcfbe150e09473a29ab3d554527e7e95aae86f2ec49f5615c2c4bb3a66af036a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">0e7cf5ec20ef155488dd51d74741a7d0a84ff575cda47d2f8efd1bf329e6458d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">4d52159d54ffca911f88ca59ef6a3a189fb84719b60c4f2319b4a9b0c9ec04e3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">97b9f069eb74a9616389427d4dfea71bd80fb6a9cc71c36fe3932b56bab8b9c1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">33dbd95092a028dd09284c487b47d3238cf7c558b34fcd74840e0952b4d35d5d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b73e22952d79fe052cb0843f29e75ff356dcb74976fb5bd0f5d636d6b43cf9d3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">1190ccbec666fde6e0dfa3024ccf608aa3c864b3c9a0c8b54e998d982cccd21f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">eb1ec288b5cfe888421d7bd468832ac44c87ad849485fa0f23374745fa8fd663</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">03817e9790d459eb3e81c7324a3af92f8ff5300c4dadf10cf4174171a3b00dc8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">65d8529951684564fde15ebed55dc629738b49f7781904bdbe275c466a6319c4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">8cea4fc6f2292a39d19e6171ca68cb4ce26736e24530f80d55085bd8b499c3de</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">91fa98e870dc8201674d2c8fc3ae2c2f968b8393718a5c5ea7ae0a73ea628ea0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">93697000ab1c0236f4f2bcddbd306f429cfbe8bcaee7bddd9e91fd9e1ca425f3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els7" src="php-5.4.16-48.el7.tuxcare.els7.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">534af8e0f2d44916849274286e9ea0b822e78883b26719d84e71e381387f6ed4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1739387995</id>
    <title>krb5: Fix of CVE-2024-3596</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-3596: implement support for Message-Authenticator in libkrad</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-3596: implement support for Message-Authenticator in libkrad</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-12 19:20:00 UTC" />
    <updated date="2025-02-12 19:20:00 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1739387995.html" id="CLSA-2025:1739387995" title="CLSA-2025:1739387995" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="krb5-devel" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>krb5-devel-1.15.1-55.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">8505963082efbfe88cdefb8021ae0f2ef9385c338ef142a7534398874a8a04f2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-devel" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>krb5-devel-1.15.1-55.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">87ce6fe40c83b3f6400217f7289da8bf4dfd0944596e998efe587b2545f01087</sum>
        </package>
        <package arch="i686" epoch="0" name="krb5-libs" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>krb5-libs-1.15.1-55.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">0c9d982cb5207e4cc44af0c56250b02c5b229b28229c20cdaa125e045072a349</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-libs" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>krb5-libs-1.15.1-55.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ca9a20517fa351cc4649d49a98b612c7a48dbda8abcf6c107c2ba27d7bb00720</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-pkinit" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>krb5-pkinit-1.15.1-55.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">089d5eecdbce72e0135abb68aac1a343b3a7204cdc0f2653461f5c07c00e1752</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-server" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>krb5-server-1.15.1-55.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1436f4ecd0578016772ec475b8a50581e42a43b293303adbc28027f0d9100d93</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-server-ldap" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>krb5-server-ldap-1.15.1-55.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">dcd9da37680d275429e2129ba042206b4402abc3a0c8fd2963e2520701562ffa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="krb5-workstation" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>krb5-workstation-1.15.1-55.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1d19aa1d37ceb7972ab61035d1d24f73a6d80a7a2f73dece39811c791d01cb27</sum>
        </package>
        <package arch="i686" epoch="0" name="libkadm5" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>libkadm5-1.15.1-55.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">4c70d19e603d11387131a475beb5b91f57642da4eaa5c171b00c6d4b1a71d68f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libkadm5" release="55.el7_9.tuxcare.els2" src="krb5-1.15.1-55.el7_9.tuxcare.els2.src.rpm" version="1.15.1">
          <filename>libkadm5-1.15.1-55.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">5616e0c2856cc7380b8f9b49f52df6b8b78006ae14a45b0db8ea40c2bfca626d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1739388106</id>
    <title>libevent: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2016-10195: fix an out-of-bounds stack read in the name_parse function
- CVE-2016-10196: fix a stack-based buffer overflow in the
  evutil_parse_sockaddr_port function
- CVE-2016-10197: fix DoS via an empty hostname in the search_make_new function</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2016-10195: fix an out-of-bounds stack read in the name_parse function
- CVE-2016-10196: fix a stack-based buffer overflow in the
  evutil_parse_sockaddr_port function
- CVE-2016-10197: fix DoS via an empty hostname in the search_make_new function</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-12 19:21:52 UTC" />
    <updated date="2025-02-12 19:21:52 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1739388106.html" id="CLSA-2025:1739388106" title="CLSA-2025:1739388106" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libevent" release="4.el7.tuxcare.els1" src="libevent-2.0.21-4.el7.tuxcare.els1.src.rpm" version="2.0.21">
          <filename>libevent-2.0.21-4.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e5d1749887d34ce121444f147b1ed17f0d7a32ad1275eb34404f3f5c3aa7b626</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libevent" release="4.el7.tuxcare.els1" src="libevent-2.0.21-4.el7.tuxcare.els1.src.rpm" version="2.0.21">
          <filename>libevent-2.0.21-4.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ee3624af3ed6d4d10034c014b7ca3c801924b36ef8ccc59de235f4cef245acb0</sum>
        </package>
        <package arch="i686" epoch="0" name="libevent-devel" release="4.el7.tuxcare.els1" src="libevent-2.0.21-4.el7.tuxcare.els1.src.rpm" version="2.0.21">
          <filename>libevent-devel-2.0.21-4.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f88efe2761ed6b97882f2df15d262afaedfb8ca083ad683bedfed76a548ff697</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libevent-devel" release="4.el7.tuxcare.els1" src="libevent-2.0.21-4.el7.tuxcare.els1.src.rpm" version="2.0.21">
          <filename>libevent-devel-2.0.21-4.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a84e0d1331c3a865f38a86723c60221d459af5bfde913f554d28230f144ef4f9</sum>
        </package>
        <package arch="noarch" epoch="0" name="libevent-doc" release="4.el7.tuxcare.els1" src="libevent-2.0.21-4.el7.tuxcare.els1.src.rpm" version="2.0.21">
          <filename>libevent-doc-2.0.21-4.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">a95871e43a3f56c50615decd0d0d95869d5c42c0584fd6ccc91f4b8b9bf65b90</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1739388237</id>
    <title>rsync: Fix of CVE-2024-12747</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-12747: fix symlink race condition in sender</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-12747: fix symlink race condition in sender</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-12 19:24:04 UTC" />
    <updated date="2025-02-12 19:24:04 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1739388237.html" id="CLSA-2025:1739388237" title="CLSA-2025:1739388237" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="rsync" release="12.el7_9.tuxcare.els4" src="rsync-3.1.2-12.el7_9.tuxcare.els4.src.rpm" version="3.1.2">
          <filename>rsync-3.1.2-12.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">67afbc36e8a8238a1a37f576369443908f510f5414e68b64985176e3e0ef441d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1739825397</id>
    <title>freerdp: Fix of 6 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-32458: fix missing input length checks
- CVE-2024-32459: fix missing input length check
- CVE-2024-32460: fix out-of-bound read in interleaved_decompress
- CVE-2024-32039: fix integer overflow
- CVE-2024-32040: fix missing check
- CVE-2024-32041: fix integer overflow</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-32458: fix missing input length checks
- CVE-2024-32459: fix missing input length check
- CVE-2024-32460: fix out-of-bound read in interleaved_decompress
- CVE-2024-32039: fix integer overflow
- CVE-2024-32040: fix missing check
- CVE-2024-32041: fix integer overflow</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-17 20:50:02 UTC" />
    <updated date="2025-02-17 20:50:02 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1739825397.html" id="CLSA-2025:1739825397" title="CLSA-2025:1739825397" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els4" src="freerdp-2.1.1-5.el7_9.tuxcare.els4.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">cfd7ff75fe86733fed32c6763207c1bfa4cc207be59882926fd112194da6ca32</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els4" src="freerdp-2.1.1-5.el7_9.tuxcare.els4.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">7c163ee8f771a6ca4ed1b8da57a4f1ed6e78236f016a99783acb749579ca60e0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els4" src="freerdp-2.1.1-5.el7_9.tuxcare.els4.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">b4bfbc0a2a9a72ce6b69fa74ec12e0a9586a35ff43eb7fda58812d98cb80f09d</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els4" src="freerdp-2.1.1-5.el7_9.tuxcare.els4.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">7832afad3da5fd9b7f2c5ee0bd6ac85518617d93104d143f47e7712f1673286f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els4" src="freerdp-2.1.1-5.el7_9.tuxcare.els4.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">4e5622754463086809570ab3049edb18e27210b3a5ee81f41eff8d4dc07fb6c0</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els4" src="freerdp-2.1.1-5.el7_9.tuxcare.els4.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">b6814a45bc20e82718180fe0fe50baa18ef1e48b73318022265af2cbf179183e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els4" src="freerdp-2.1.1-5.el7_9.tuxcare.els4.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">0865e0287cda7ef73119d291a29d69f5b0447f29c2a2982d7fdee633491a95cb</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els4" src="freerdp-2.1.1-5.el7_9.tuxcare.els4.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">a2234e3f7cbf1ff9460c56699f856ac5a161bf2d36e57c27a25e71eb2ad6db19</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els4" src="freerdp-2.1.1-5.el7_9.tuxcare.els4.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">3d003130f20a7c09184dca94c8de0010c286026380fe1a87e4e6224f12446fea</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1739823342</id>
    <title>httpd: Fix of CVE-2022-30522</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-30522: fix possible DoS</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-30522: fix possible DoS</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-17 20:15:49 UTC" />
    <updated date="2025-02-17 20:15:49 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1739823342.html" id="CLSA-2025:1739823342" title="CLSA-2025:1739823342" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.el7.centos.1.tuxcare.els9" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els9.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.el7.centos.1.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">cd6fbd0bdacaf27c96951d9b2ee020e40aa76141bae95cf3f645aeba7b6d54a1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.el7.centos.1.tuxcare.els9" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els9.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.el7.centos.1.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">23d70d183ab199f060f878671a194c4bbcf2b002fd4ffd243cb299b6d7c0249e</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.el7.centos.1.tuxcare.els9" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els9.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.el7.centos.1.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">5edb33c5c92cb889c27866cc95694b89618d2ae4b66d5529ab880844b2e65880</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.el7.centos.1.tuxcare.els9" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els9.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.el7.centos.1.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">0fc46b003e087f60e997772f257e07641c53b96b73381ce28fc93738ba804f0c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.el7.centos.1.tuxcare.els9" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els9.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.el7.centos.1.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">ffc1a8f9368ad8402b902306a08470c366c5a234c3d6b232e2ef2f801db64a81</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.el7.centos.1.tuxcare.els9" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els9.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.el7.centos.1.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">b7de9cd111ce1512e22eb2b9ce685f92ccc31e7cbbb75651a8cba6617c9c4f2e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.el7.centos.1.tuxcare.els9" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els9.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.el7.centos.1.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">0532ae2e897773d127d0ab8a4c9e7e2ba5a26af4192ba6d8ffc20c986a36b66d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.el7.centos.1.tuxcare.els9" src="httpd-2.4.6-99.el7.centos.1.tuxcare.els9.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.el7.centos.1.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">24044537c6d17d194ad6228e76475c1e105ab6acae5e6ff5ead80305bc6bddc4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1739975489</id>
    <title>nss-softokn: Fix of CVE-2023-5388</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-5388: fix timing attack against RSA decryption
- Bug 1784253: avoid processing unexpected inputs by checking for m_exptmod base sign
- Bug 1911912: avoid misuse of ctype(3) functions</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-5388: fix timing attack against RSA decryption
- Bug 1784253: avoid processing unexpected inputs by checking for m_exptmod base sign
- Bug 1911912: avoid misuse of ctype(3) functions</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-19 14:31:35 UTC" />
    <updated date="2025-02-19 14:31:35 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1739975489.html" id="CLSA-2025:1739975489" title="CLSA-2025:1739975489" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="nss-softokn" release="6.el7_9.tuxcare.els1" src="nss-softokn-3.90.0-6.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-softokn-3.90.0-6.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f9f43968a5f9eed26c68205ffef19d5cc8f55e3cc0571442b3b3a55e9000778b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-softokn" release="6.el7_9.tuxcare.els1" src="nss-softokn-3.90.0-6.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-softokn-3.90.0-6.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">65c2267134dadc54faf595e089306fea0e042fe861f31928d3a5c6d2adeba95f</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-softokn-devel" release="6.el7_9.tuxcare.els1" src="nss-softokn-3.90.0-6.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-softokn-devel-3.90.0-6.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">9bf32ce73ab4031cfde0aef8d7606b1554c84b67291aa25f54cfa32147dc78ef</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-softokn-devel" release="6.el7_9.tuxcare.els1" src="nss-softokn-3.90.0-6.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-softokn-devel-3.90.0-6.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7ce0abae7cda0903c20cc6a72bbcf37a1fe9c0517c7b37ee727322bd5c3bf1c7</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-softokn-freebl" release="6.el7_9.tuxcare.els1" src="nss-softokn-3.90.0-6.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-softokn-freebl-3.90.0-6.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">fbcf9e1009f406220b93f4d75b8bcf2cef47cf62bd67c0da2ebc406686d5c921</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-softokn-freebl" release="6.el7_9.tuxcare.els1" src="nss-softokn-3.90.0-6.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-softokn-freebl-3.90.0-6.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ba7bd413e289d0ecd937075f534d963f732e1df7c20fba45f1ff49ce98927618</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-softokn-freebl-devel" release="6.el7_9.tuxcare.els1" src="nss-softokn-3.90.0-6.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-softokn-freebl-devel-3.90.0-6.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">67c48ef6c4f8ac114037b73efba1a1ad29403d02e014cbb09b0c3738224e1882</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-softokn-freebl-devel" release="6.el7_9.tuxcare.els1" src="nss-softokn-3.90.0-6.el7_9.tuxcare.els1.src.rpm" version="3.90.0">
          <filename>nss-softokn-freebl-devel-3.90.0-6.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cb7a29dc357f6d3d5e69d5652e154edd1d1a3a73f415d693416a39dda09c1efa</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1740075135</id>
    <title>kernel: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format {CVE-2024-53104}
- ALSA: 6fire: Release resources at card release {CVE-2024-53239}
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() {CVE-2024-35849}
- btrfs: fix use-after-free when COWing tree bock and tracing is enabled {CVE-2024-56759}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format {CVE-2024-53104}
- ALSA: 6fire: Release resources at card release {CVE-2024-53239}
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() {CVE-2024-35849}
- btrfs: fix use-after-free when COWing tree bock and tracing is enabled {CVE-2024-56759}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-20 18:12:22 UTC" />
    <updated date="2025-02-20 18:12:22 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1740075135.html" id="CLSA-2025:1740075135" title="CLSA-2025:1740075135" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">c7d5e6635b927c8a5233d3695c4e88ed06407de9deba15cd3dd37ed8cb0d9e68</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">4fb8da3b2d9ffa5c8027011a9f43abca386fad93ec13bbdc3bb6ba1026f7836b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">8a0baef9649bcb6b30fceb160bf28bf423f142037eef4ca19ceccd6c4a3b5f9b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">fcf6cb1841b6d77ae7bb44d5c5ec9fa19362a6a388127cfcb48ae8a630b7a8bb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">9839891592e213eaef385a82d5e432051723b029bcbeefcbd9fa859483a4a7b2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">be821a09624a163ec8ca2fd573468e9f130e6d22afbee59a76f132735eadb433</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">02abdfb6580a740939a289e35166d1ab5c2a3dad9000ba4e2f48c8e98765509b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">19905f7f44d801e46a1be4bdd810a00c924745b4d85326939683a66bcb5aaea2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">41d53dbaaaae72f33822388533bdc6ce0a5e15c9484442dc9c79874c718ba882</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">af7dc2343b9e1816f26164ef50da061806c7e33bc745181375272ebd895d970a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els16" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els16.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm</filename>
          <sum type="sha256">f0bd9e2f5c85e0af3cbc2c3cdad8e6e4eb9f18b15ff734e57c90782e037aaaca</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1740133056</id>
    <title>python3: Fix of CVE-2024-9287</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-9287: fix path names quoting to prevent command injection in virtual
  environment activation scripts</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-9287: fix path names quoting to prevent command injection in virtual
  environment activation scripts</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-21 10:17:42 UTC" />
    <updated date="2025-02-21 10:17:42 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1740133056.html" id="CLSA-2025:1740133056" title="CLSA-2025:1740133056" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">b1beeb989c36fce188a6da430f5a524db460d8628996eaf09af466a68744d989</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">22d3a480635c86833f145175272fdbcaa781118d55b48048ad6bdf754cb429f6</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">6e0dcd1dfec8b1995fcdc7f0d598baf071bca5004b06bee6ebcaef1a50be5d39</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">2c9f9af238452ecc1dac27268ae2411efcddff33f2e170b3a625caca4f017214</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">b226fb6a00bd1d0b8288fbbaf3b54ff78cc3eb023af9cb23e5bf6019a41f77df</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">fe7f12e56b829b3abd471ac626626a2e4fe58669929af90cfcf0a0acba961774</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">94c2464dd8623962e3082615375ce46abf78ec7eca886952638674b950780a0e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">dd71ef2d80555d38a78041356c73f1ba7e7ded3b794ddc1eb08ff2ca1b196b36</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">7e28503264d95111a9ee1ec512d0a3efd2407aa23ff7a280c1d2233dc160700f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1b454a6a422f62cfbfbc896be8753404d4a494b843e799f3f143f9b8fd44e84f</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">09922f50b079b39b31abcb1ecd4f84da14f5260673789650e5c646d64815858e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ac99c6d0607bd3a44f67257b1b3b781a2ff782d68b8fe794b01b1e4e57d3a707</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">eaaada2bcb5014f3d47959276c4e0b10b958f1476ba6a4adb63d24d0cfecb9c2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="21.0.1.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">47329830c97adc638f129c55aa7c3b260bbe4a82c2c23dc08f116f85ca7364b1</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1740242864</id>
    <title>php: Fix of CVE-2024-8929</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fixup for CVE-2024-8929: support COM_FIELD_LIST</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fixup for CVE-2024-8929: support COM_FIELD_LIST</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-22 16:47:50 UTC" />
    <updated date="2025-02-22 16:47:50 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1740242864.html" id="CLSA-2025:1740242864" title="CLSA-2025:1740242864" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">6420505192c433c0cd16c2e253e63c5992de665bc0b6ffb27177433637746a28</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">c78c1136a5f6bced5349dc72e2f33494383c7cf378dbe61a46adfc52f630efc2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">559b31ce5bf5d962448eb6747ab9badbdacaa05b909aacf93831b800cf9e2f49</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">229213af2dab910d46793f90e393cb8014a8778e2777e4695aba75ded76fb16e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">2e6e7c945ca8a50fdf7ec9ae8ca417b9918fa22b81f24c4cd0499ffe51c0de78</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">5cc4754a2b3e25edd315b539fc20889ec987d56f37297949174e7321d2061118</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">fb73f15465fe6cb8bcc59eda6d566dde356dc6d062c32625b0c69771df425cdd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">9ca851dd268fab85e55ab7eb6d90dd1d2b48696f8ceb336d8749c1f6568957f3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">3aa0aa8d9768fe314812b6c8f30362a185c558562af830d7ac1a9330502ad404</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">59bc4871aa57871fc732dee58a8efb53af3f5ddbe5df7c555755e5cc016886bc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">193c1ced6cdb3f535399945e4f1ea5aee46d0907dac3b00748a84f000320e1bc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">4c1a8e5a61b8b7d2f5fb43cc57723db5fcbb27c451e864b02ccd687d71bc026c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">f2ee71b57579f6732a64c471e94063ecf1303e4c213b5074b0694f4f47ca97ea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">34259f6229fff4f321eb19f6690d4dcb9aed3b6db2f26313ea6be1c25ece2ae9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">820cf7241890b9dfcc91a3c3f0090d686c9093c0340a583ef5e4a8d5f33e7c2a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">6b254cea4f9e9328ad6bc54da80447ba400b05daa9e0ee44f13f88f5019e3abd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">d0e4e01b530287fc6ca4f1fc665a31b82b2b47ac53e73b912bdb2d5956cbf208</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">a9b42f18c25f975fed13576f380fed183cf58d5ef3c92cfef2e01a4754957d66</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">08d0cc2907eed274c38e17d3aad230a2a150ee155360e09d7ecb287ac045281d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">f6562ac8532fd92cd7214cde16f162e62e5023aafed597f8fa39879e447e9197</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">57e925980b7d75912793b8792dc203ef79e8a7cbda3a3bc5520be0cb10cc94fd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">551208955862572fe60bb10fe97fae9bdb774360b0026609f5f2fced9390a6dc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">3b4533482dfef43268aafc93a2debece3c14d0a418d2786cc6270ec8e33eb4c8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">3b14393905f3d52d403ab850778f8df3394e3be94ff6920fecf97352850f8a0d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els8" src="php-5.4.16-48.el7.tuxcare.els8.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">ebca101d631072d589dc41972cc07dbba3ce990b543b11db63511f07efcb6e8a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1740649075</id>
    <title>kernel: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- ALSA: usb-audio: Fix out of bounds reads when finding clock sources {CVE-2024-53150}
- drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() {CVE-2024-57798}
- els15 crashes accessing CephFS storage from a cluster {CVE-2024-26689}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- ALSA: usb-audio: Fix out of bounds reads when finding clock sources {CVE-2024-53150}
- drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() {CVE-2024-57798}
- els15 crashes accessing CephFS storage from a cluster {CVE-2024-26689}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-02-27 09:38:00 UTC" />
    <updated date="2025-02-27 09:38:00 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1740649075.html" id="CLSA-2025:1740649075" title="CLSA-2025:1740649075" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">9eae48fa65ad5f649afa394e146043e4a5fbc4e7430d153428f46733a2fa2dcf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">afd8a59a62c7d8abb3f546bf30262ffb1d48e7d512ebfd326e68fe04f6a00813</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">8064f819cf41a32eed0b9d0163cc446aaade28532f1caf8ab4658e2339215fed</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">8b23cec1845ad41d8f6e71790336051c51bd18c6d4fb89500d1d3f4fdbf393cd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">e402cb82f8da84a75cbc11bfc69091877603d670b1f990dd94901acc6b51f64a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">d43cef2b1da48741ce2ef20c3f32b16a79dac4b8b7ab7342f0b7558e2e6c0fb7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">409368636cee97f3caaa9f2d080707a7f9f8efe371e03aceafe0329ded7256fa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">6038ab0717605f225e9e7d592e93b8bf9610c6c4084d50e16d2dc23b37bb47de</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">af2241510ae2350cf736a579ae2021657be5dad3a4f7c1b819ddf8f68adc439a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">370061d2b15f91382bb4a3ad1247e0be69e73e64a2ed43ce3f699b86bdcac535</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els17" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els17.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">773b3b3eabfd621a6417c6d12f41e812b581d65ce459178011bdec37ca75c321</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1741291888</id>
    <title>libxml2: Fix of CVE-2025-27113</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-27113: fix compilation of explicit child axis</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-27113: fix compilation of explicit child axis</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-06 20:11:33 UTC" />
    <updated date="2025-03-06 20:11:33 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1741291888.html" id="CLSA-2025:1741291888" title="CLSA-2025:1741291888" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libxml2" release="6.0.3.el7_9.6.tuxcare.els2" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els2.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">9230357b5ac13fe0c7f4e0d470369c8e50a7e89073f8112186d7b6267fe53b70</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2" release="6.0.3.el7_9.6.tuxcare.els2" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els2.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ce28af90b457006ffdbab419724d30f1c5c19b28d4cf3565aea9a26314c5483e</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-devel" release="6.0.3.el7_9.6.tuxcare.els2" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els2.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.0.3.el7_9.6.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">84b7c93dc2a868a9c0ad1738d5d06b4ce0b40e94a19318d4b2b899b0b0a89b5c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-devel" release="6.0.3.el7_9.6.tuxcare.els2" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els2.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.0.3.el7_9.6.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">baf4e61270c8e30df6dfa49dfd5cd11f968973df156788f4ea90ac557dca41e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-python" release="6.0.3.el7_9.6.tuxcare.els2" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els2.src.rpm" version="2.9.1">
          <filename>libxml2-python-2.9.1-6.0.3.el7_9.6.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ce1aa86919b24d16bd37f37c2ca2f60ef48ec717ec24398403bc60c34467f036</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-static" release="6.0.3.el7_9.6.tuxcare.els2" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els2.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.0.3.el7_9.6.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">63ded894c575efc78999241b74a0999ccc76bbb2d0a9e487eee94a6e20d3fd34</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-static" release="6.0.3.el7_9.6.tuxcare.els2" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els2.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.0.3.el7_9.6.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3ea572ca03ccc6b4b36c088b323b7a41d9a4e19e6957b882173dbffc9bee8116</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1741216880</id>
    <title>bind: Fix of CVE-2024-11187</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-11187: fix Denial of Service via Additional Section Resource Exhaustion in BIND 9</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-11187: fix Denial of Service via Additional Section Resource Exhaustion in BIND 9</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-05 23:21:25 UTC" />
    <updated date="2025-03-05 23:21:25 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1741216880.html" id="CLSA-2025:1741216880" title="CLSA-2025:1741216880" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="33" name="bind" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">f027f8961b4eb2e2d52e89f3c4e1bd8bba97923fda68ebab2b24974773c0d2ac</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-chroot" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">2de3c9c428e153280ef7382f976ff0cf52a769cd1bc5343b0f8a96883a0ddc70</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">a709e657ebb7d23dd2180b523075f878793c71209814220690ef010e8ec31568</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">85858c0f6fb05e3f92e73c82b1777add44920fe24aa63f4d68eb3c7fc9aec8b6</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">9d5d91ecef579b7803f9d4225dd0430df4959e7ce7b2da4629c03234e892aaad</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">fcc9d047542ab5fd4698d9587234ff0376bfd54e2edaf810533f57a9903a1d1a</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">5b9d03730c184b362e6014b607cd739f552c51e46bfcc31e02869fd9c98f80d2</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">455c66ccb39f06ef7b0dbff61babd937aa34b1d77c50921c5ee7c974b736970c</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">2b46d38241b146f2c0a50befaf43bfc7e6b47632f927b38c9c2e2260660376cf</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">983adb2dc742512e04b45ef1682fe310d44862ad702a7012e339c6df61241086</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">5048299a908b9836602e3dd77535d653318ad1f6a49266324872a74b92bc3c04</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">38e077744a18a46bfbbf5e96c50d3bdef4d3e79a92e84c1ff1403c7baeecf213</sum>
        </package>
        <package arch="noarch" epoch="33" name="bind-license" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7_9.16.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">7402583f5a9f3a20514401e152d3c3404ffa3c0e615b4af06de94a833540bf02</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">0e33ca09ec586dd5ae2d38cea8390fd1fb97771699930466fb41aaf36bb3fd8d</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">f5e4bf3bd1d726faba9d336175fef074a90e929db88c74b6ea53d8d6293c8ca7</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">3a428ea3231d8b69f81c436c838feb7c789f95481a1d00da7a567313824a9c8a</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">42d8c0b57e7313b982b728f61ed65834546bfce17aef10d22129fd214c3a1767</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">54c068b1c015962c0d55edb5ec183d8fc038aecd0c31bc1116dfa1e10b962946</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">3a232460ef44fa06e1619e6f8f1aacaf661b9aee9b04d3d2a1fa17189aede0d1</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">d0a33079ce2e2dd6e1dd1f6db0851cc13078089089a991b1d179258edd91bba4</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-utils" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">00701123da326ca385e60d7c782ddc71a7d240db5efb3d97e59ea096cb5ef3fb</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">a24cc176133774f5163ceb81a733442baa4bf70ea390f4bf45d6b752252316e9</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb-chroot" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">920685fab412d1acc74c6c8576ca8015cf73e545ea0acb1d1ebad8105eab53c2</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-utils" release="26.P2.el7_9.16.tuxcare.els6" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els6.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7_9.16.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">7efa291f7a0c2d6830f5e46932235533d57cdcd5aafc4bf3525b294c8c4abdde</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1741787747</id>
    <title>binutils: Fix of CVE-2025-0840</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-0840: fix stack-buffer-overflow at objdump disassemble_bytes</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-0840: fix stack-buffer-overflow at objdump disassemble_bytes</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-12 13:55:54 UTC" />
    <updated date="2025-03-12 13:55:54 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1741787747.html" id="CLSA-2025:1741787747" title="CLSA-2025:1741787747" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="binutils" release="44.base.el7_9.1.tuxcare.els2" src="binutils-2.27-44.base.el7_9.1.tuxcare.els2.src.rpm" version="2.27">
          <filename>binutils-2.27-44.base.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">58400707ccae548994e214d05559f9821483781e4b4db36124425691ebefa91a</sum>
        </package>
        <package arch="i686" epoch="0" name="binutils-devel" release="44.base.el7_9.1.tuxcare.els2" src="binutils-2.27-44.base.el7_9.1.tuxcare.els2.src.rpm" version="2.27">
          <filename>binutils-devel-2.27-44.base.el7_9.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">8b6e296f098544ea750cdc5cf2c6ee17cbdc6a16b12454805cbc2498991ae0a8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="binutils-devel" release="44.base.el7_9.1.tuxcare.els2" src="binutils-2.27-44.base.el7_9.1.tuxcare.els2.src.rpm" version="2.27">
          <filename>binutils-devel-2.27-44.base.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">da02687d581a2cb907d94ef3f3e921f9880e84a0fd6bc9f1b76444420db8dbaf</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1741624133</id>
    <title>kernel: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- HID: core: zero-initialize the report buffer {CVE-2024-50302}
- Revert "drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()"
- drm/amd/amdgpu: Fix GPR read from debugfs (v2) {CVE-2024-50282}
- USB: serial: io_edgeport: fix use after free in debug printk {CVE-2024-50267}
- wifi: iwlegacy: Clear stale interrupts before resuming device {CVE-2024-50234}
- udf: fix uninit-value use in udf_get_fileshortad {CVE-2024-50143}
- Update dependency for shim and signing key</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- HID: core: zero-initialize the report buffer {CVE-2024-50302}
- Revert "drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()"
- drm/amd/amdgpu: Fix GPR read from debugfs (v2) {CVE-2024-50282}
- USB: serial: io_edgeport: fix use after free in debug printk {CVE-2024-50267}
- wifi: iwlegacy: Clear stale interrupts before resuming device {CVE-2024-50234}
- udf: fix uninit-value use in udf_get_fileshortad {CVE-2024-50143}
- Update dependency for shim and signing key</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-10 16:28:58 UTC" />
    <updated date="2025-03-10 16:28:58 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1741624133.html" id="CLSA-2025:1741624133" title="CLSA-2025:1741624133" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">623e119df8eaf24ae0d44d5096fe0d52cb0759aaca604caf12c83e5f265991c0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">10f0bd5570e354e9a46eed639714822de499375cf491a2972bcb6d4c278128a5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">9462f60bf2ab0a318c3f85414044ec31ae71ada1cfc77e2d8da843cced139bd7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">7a839203e811e40d32b12f0df344898c3b2feb0d9892469279699e2d6338595e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">42289c73b1ae8afefd64bb78ae4058619988bf1799fc9b1dd63fc55003f89dc7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">d25797fd681ae45f237662574c1138c7d0b49947f9ec55c93acb3408706a3ede</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">c9f0f3d4af5833afd2f270862d9b8e9877bddd404f8a1b1d2ab49b47873c263f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">a52186413ff4a529d857eb29abf9762f7b379ae6035821bf937182f9cde8e273</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">1cea210c3aeb6f044fe3c17bc57ea00f6f9da00b5969e0cbfcd5ee3474e91c2f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">85604647c27391d98b374a9b308c0c1dfc75080ba504095287b7b08bb396e21a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els18" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els18.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">3ef41d1378cffdcc7850c0ddef42d648d6fbd34cd6478000c79e6e3175291861</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1742474086</id>
    <title>bind: Fix of CVE-2022-3094</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-3094: fix resources exhaustion issue caused by flood of dynamic
  DNS updates</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-3094: fix resources exhaustion issue caused by flood of dynamic
  DNS updates</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-20 12:34:52 UTC" />
    <updated date="2025-03-20 12:34:52 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1742474086.html" id="CLSA-2025:1742474086" title="CLSA-2025:1742474086" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="33" name="bind" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">a0e9c7745dc5565347119be0b00cf028ed59123319cb248430a8939c33c6b718</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-chroot" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">134d713721425c4e78ef30f1da287e32b7042bb51a31bfba2f203d7c1cd659d5</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">2a53a4bfdef920826b0db400319d1e4d4a36aea639ba114fbaa99034313e857d</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">6201c63791da528e3ccf7efbdb213c386fee175f68707018f6b78c1dbb4561ee</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">1cd7e57a0fb314f8623130e81ffbff4048aa6830a37cab23a3a5368b5157d376</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">ced3886aed415e225389860bdbaa5b077e106b6a1ac397a422b8ff0b980656c5</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">d678a7c4fd888493eb852a85633a62e0a09bd5914169d690bc1491cbc2cde14e</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">7693a1f8775125c965a2d203533deddd4d3640d3393bb8ad7d36f730776b248d</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">4bd238cd0644f30a5b828aa6a1ff8c644ffe05d4f6ff6cf6e8425e89081912e9</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">15ba0ebd94f54e22a5d660fb60107c77430605ef2fb30de93cf9592bea56539c</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">76f9ddf46fa8819af8ac21458426b018baf0116e9673f0c1ae9999b439d0b1d9</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">572c9623afdb026606c7eaf142df46f394403e1ff7f6b85841606b100716ceb5</sum>
        </package>
        <package arch="noarch" epoch="33" name="bind-license" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7_9.16.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">27163cb80827660c120d4b3d5f12fb44cbd470ef7a6ca3c41127c67a42306128</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">72525855a157ed94478934cca319d071509680d025a2bd484cd1e94032dab46b</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">9e3da8c246e93da3869444a1e978500ee6161df3cb4cefefffd15c832462e4e9</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">3093b8be19fe726a99f75de21f2de320c5c08bbaa948c81a3c927c58d969566d</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">7265cb1734cceb2f2ad71b9196a56f552ddbd8fa4f44421e715e02db20444504</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b2c6292d77659b65909f8b9a4b15cfc9ab1d2666a63cece2f247b7745d57c04e</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">b3bc760a1d620f0d69a57442d19f3ad75c3207d49fb48e4530778c641e62af35</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">23ffe440cea772a8b2fb843d8f8af3fde6f2c2893ad8c8324b4dd34f6f871ab0</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-utils" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">a265ccb471736dbfae3bab33920c35da4db019c00df40a6b68943b40af0b39fd</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">038b953863c6bd7eaa841a4188440828d9c38bf2231b968dd9850fba93d84474</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb-chroot" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">cad5eee4faf86643cc29d0d0b6da3bdb5e2703f61c91d0eef3ed7ce33b58a7d9</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-utils" release="26.P2.el7_9.16.tuxcare.els7" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els7.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7_9.16.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b161d20f2b4355653fa9862c4355c2b224f31232a2ffe0c652c8eb276fc3e348</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1742319123</id>
    <title>java-11-openjdk: Fix of 11 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to openjdk-11.0.26+4. The following CVEs were fixed:
- CVE-2024-21131: potential UTF8 size overflow
- CVE-2024-21138: excessive symbol length can lead to infinite loop
- CVE-2024-21140: range Check Elimination (RCE) pre-loop limit overflow
- CVE-2024-21144: Pack200 increase loading time due to improper header
  validation
- CVE-2024-21145: out-of-bounds access in 2D image handling
- CVE-2024-21147: RangeCheckElimination array index overflow
- CVE-2024-21208: HTTP client improper handling of maxHeaderSize
- CVE-2024-21210: array indexing integer overflow
- CVE-2024-21217: unbounded allocation leads to out-of-memory error
- CVE-2024-21235: integer conversion error leads to incorrect range check
- CVE-2025-21502: enhance array handling</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to openjdk-11.0.26+4. The following CVEs were fixed:
- CVE-2024-21131: potential UTF8 size overflow
- CVE-2024-21138: excessive symbol length can lead to infinite loop
- CVE-2024-21140: range Check Elimination (RCE) pre-loop limit overflow
- CVE-2024-21144: Pack200 increase loading time due to improper header
  validation
- CVE-2024-21145: out-of-bounds access in 2D image handling
- CVE-2024-21147: RangeCheckElimination array index overflow
- CVE-2024-21208: HTTP client improper handling of maxHeaderSize
- CVE-2024-21210: array indexing integer overflow
- CVE-2024-21217: unbounded allocation leads to out-of-memory error
- CVE-2024-21235: integer conversion error leads to incorrect range check
- CVE-2025-21502: enhance array handling</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-18 17:32:09 UTC" />
    <updated date="2025-03-18 17:32:09 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1742319123.html" id="CLSA-2025:1742319123" title="CLSA-2025:1742319123" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">70c9436fd498fcf052a80ca576ad83767fb605a4c68e63e63802f0f0df0856d9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6f660300cd92728106efe436170d1477c74493b25c6ff4e254c40a3067bed5dc</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-debug-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">95083dd5b8bf8d8ae09eca79112bbb537349c9b99715b74453060c5601c33303</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-demo-11.0.26.0.4-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">d1a45c3d5c08d049c56331844dac550176f74eee52d85229f909321774f65c9f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-demo-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0842c3ad42e8b17c22551ce907a0a81a7c7275567a1306752749acaf0562bb5a</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-demo-debug-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5d5d57ece5942ce47bdb76b0a63f552e553144750e4243bc1e41ebf54030643d</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-devel-11.0.26.0.4-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">ea5b300d7e511701c8ea64b5be92426b1d02b3f22dd625ce9edfe067533ca2c0</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-devel-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ef30e01b15b4913e085549d4fe24791f45d1be91bcecccdb487b7582f811a2b7</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-devel-debug-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e19f41cde3a218934c529d18b13e64f5d1a0ed614d996179aff8b9d32ec65b87</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-headless-11.0.26.0.4-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">5144f75b41a024ef1fc241af2c3f7f62d687b8f0900936ca3d05c027b0e2c089</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-headless-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b5066b5019b9a20b65af5e8e7ec86496312928271e884a55c22887e5aa36d06c</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-headless-debug-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ab10df9343a06a85971db2d216e3bd4bbd947ab2a26f65dc9e0c655a20b044c3</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-javadoc-11.0.26.0.4-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">bc1985234438dff69904314504cce84bf31dcb1fd0125717a5054ffa35e931da</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-javadoc-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">21c3ff4f82fac8b6507f415855cab060f0adfb9d7fcea456eb55476cd57c5a17</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-javadoc-debug-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1da9abb75f31531f7e557f8d05e58cc1e7cb7da61fcf229de9cbc3bd0fc3a59c</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-javadoc-zip-11.0.26.0.4-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f1d037529130ae269690112b900b13a80eb73d49fbb6573cd070b143b007a131</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-javadoc-zip-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">bcd08917cd8c625eac529350051530c5e4a244a1bfb4c1167d3fd0a8c5474811</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-javadoc-zip-debug-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">81606c032f49d43f848b54339eda08e14f6f6992c0d1e11d50eb4eab432f0fc9</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-jmods-11.0.26.0.4-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">c73e8d531b763730b7ea32c4a0e16cf88fa7c274f3806062fa5a5ab50bac842b</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-jmods-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">59595e94b3cf49e5e5d709fb97e206aa9f1d478982f625dd973970ce1f356941</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-jmods-debug-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cb745337182bddd32822997f3d842fc39db32428eef2211234b43ee4b166652b</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-src-11.0.26.0.4-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">dc8d49011b9627003c414752402c75054a9480144e6a2473f9f151dd742bd30b</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-src-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">123a49c3956581119b3c345d11952d23906e84b4e2c0e4a9b0b0930d76973640</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-src-debug-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1b723d6287909e5fd75318343418701de42097c9f82be2210cdddca4bca3914b</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-static-libs-11.0.26.0.4-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e83ec788800cef322a773d6c5236352dcad117ff5a668157ce040a138027b373</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-static-libs-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8eb28e0af3b4a3bb36394ad95dd03f90d28d65ded51e7743b8d8edeeaf9673b5</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.26.0.4-1.el7_9.tuxcare.els1.src.rpm" version="11.0.26.0.4">
          <filename>java-11-openjdk-static-libs-debug-11.0.26.0.4-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fa78cdc869397d2e99675f872f13de3d13f0e993dc4c3e27d878d8fe1a7336af</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1742926277</id>
    <title>openssh: Fix of CVE-2025-26465</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-26465: fix vulnerability in OpenSSH when the VerifyHostKeyDNS option is enabled
- enlarge format buffer size for certificate serial number so the log message can record any 64-bit
  integer without truncation (openssh bz#3012) [Orabug: 30448895]</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-26465: fix vulnerability in OpenSSH when the VerifyHostKeyDNS option is enabled
- enlarge format buffer size for certificate serial number so the log message can record any 64-bit
  integer without truncation (openssh bz#3012) [Orabug: 30448895]</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-25 18:11:22 UTC" />
    <updated date="2025-03-25 18:11:22 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1742926277.html" id="CLSA-2025:1742926277" title="CLSA-2025:1742926277" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="openssh" release="23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">35f70cd9f34f270ebf42d65765b2e31e0d9dfba48da68d93eece8c9778806260</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-askpass" release="23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-askpass-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a01770dc68367c22714a8a35b153fe162857fc08d256780a1ac85ce2cfbd3e1e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-cavs" release="23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-cavs-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ddc28a0724579b812fd1530f6aff1ced95f1a8fda797c6ff21e6c3aab946b46a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-clients" release="23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-clients-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">9712fe8a255f2d982d15234a96735f7328fc71d5cc4e1d214460431d1b44bb31</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-keycat" release="23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-keycat-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6bcefbf2c687d8a8d3d324e10b6a5af8880118f5cdc6e78a89f83827e2a243ec</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-ldap" release="23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-ldap-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ab4b72e218a0c19154ba0b769e91cb746e8ac789e6a550d5a66fe8cbe73e5cda</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-server" release="23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-server-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b43183b99f1c4a21a1bfb0bd2305397659d25e9b41a16d27579a40d010e7c2d4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-server-sysvinit" release="23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="7.4p1">
          <filename>openssh-server-sysvinit-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">94550772325cbbc0bacfeb2b1228b4c29c8ebd8d7fc96ed23c51e0ebeb5e15a7</sum>
        </package>
        <package arch="i686" epoch="0" name="pam_ssh_agent_auth" release="2.23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="0.10.3">
          <filename>pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f8b7b15f0e10fa6935ac91127a2e7951dad00e32cddca0987e178eafa86b1405</sum>
        </package>
        <package arch="x86_64" epoch="0" name="pam_ssh_agent_auth" release="2.23.0.3.el7_9.tuxcare.els1" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.src.rpm" version="0.10.3">
          <filename>pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">21af54382dcb1c29ba96d7303391ef423528b0e50550c60c2dc707be98d3d67e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1742926404</id>
    <title>freetype: Fix of CVE-2025-27363</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-27363: fix OOB write when parsing font subglyph structures</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-27363: fix OOB write when parsing font subglyph structures</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-25 18:13:29 UTC" />
    <updated date="2025-03-25 18:13:29 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1742926404.html" id="CLSA-2025:1742926404" title="CLSA-2025:1742926404" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="freetype" release="14.el7_9.1.tuxcare.els2" src="freetype-2.8-14.el7_9.1.tuxcare.els2.src.rpm" version="2.8">
          <filename>freetype-2.8-14.el7_9.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">fb20746eabbcafe0887dacc29b5ff99dbe25880e1e77e63e6e7cb0406d1ad07b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freetype" release="14.el7_9.1.tuxcare.els2" src="freetype-2.8-14.el7_9.1.tuxcare.els2.src.rpm" version="2.8">
          <filename>freetype-2.8-14.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f28053c045e9d48579e804fb9891820cd6722281130e4d53cb42f16b1d6eff3d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freetype-demos" release="14.el7_9.1.tuxcare.els2" src="freetype-2.8-14.el7_9.1.tuxcare.els2.src.rpm" version="2.8">
          <filename>freetype-demos-2.8-14.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">0985513a4a735d0e16663c4b42cc7cc5870f3b6979ec938ce56119631391415e</sum>
        </package>
        <package arch="i686" epoch="0" name="freetype-devel" release="14.el7_9.1.tuxcare.els2" src="freetype-2.8-14.el7_9.1.tuxcare.els2.src.rpm" version="2.8">
          <filename>freetype-devel-2.8-14.el7_9.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">e051fd807c6c5990716bb055151c40584e3e20ef6263e0a8de91ee41a4aa5abf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freetype-devel" release="14.el7_9.1.tuxcare.els2" src="freetype-2.8-14.el7_9.1.tuxcare.els2.src.rpm" version="2.8">
          <filename>freetype-devel-2.8-14.el7_9.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">b5ae1b2c2bb0caf6d1e43939a9e689f1782bea518edfc7a66c45e0cd0344e573</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1742929277</id>
    <title>Update of shim-signed</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Add support for oraclelinux7</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Add support for oraclelinux7</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-25 19:01:42 UTC" />
    <updated date="2025-03-25 19:01:42 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1742929277.html" id="CLSA-2025:1742929277" title="CLSA-2025:1742929277" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="mokutil" release="2.el7.tuxcare.els1" src="shim-signed-15.8-2.el7.tuxcare.els1.src.rpm" version="15.8">
          <filename>mokutil-15.8-2.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">432d79a39b8587471d47e5ae701722710563fb6a70ef5627bb29ed5c877f45b9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="shim-ia32" release="2.el7.tuxcare.els1" src="shim-signed-15.8-2.el7.tuxcare.els1.src.rpm" version="15.8">
          <filename>shim-ia32-15.8-2.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4ecc1e860df79cb567cab36d4cce3c66d32f19cd2124c9198aeb76953184b050</sum>
        </package>
        <package arch="x86_64" epoch="0" name="shim-x64" release="2.el7.tuxcare.els1" src="shim-signed-15.8-2.el7.tuxcare.els1.src.rpm" version="15.8">
          <filename>shim-x64-15.8-2.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f75d5f0514923546115b4e8bb72cefde2e40381b57aa1a0bfa770c1aac0fa9ee</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1743184619</id>
    <title>bind: Fix of CVE-2023-4408</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Remove bind-9.11.4-CVE-2023-4408.patch which introduces an ABI change that
  breaks bind-dyndb-ldap
- Enforce that bind-dyndb-ldap is updated after ABI changes introduced in 9.11.4-26.P2.15
  update</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Remove bind-9.11.4-CVE-2023-4408.patch which introduces an ABI change that
  breaks bind-dyndb-ldap
- Enforce that bind-dyndb-ldap is updated after ABI changes introduced in 9.11.4-26.P2.15
  update</summary>
    <pushcount>0</pushcount>
    <issued date="2025-03-28 17:57:04 UTC" />
    <updated date="2025-03-28 17:57:04 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1743184619.html" id="CLSA-2025:1743184619" title="CLSA-2025:1743184619" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="33" name="bind" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">c9b145e620308495576d7fc2977264eea0725bd5a7829422680fcbf2a8371fd5</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-chroot" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">00bb2054c1a5a92199b177c7c09fd3e3e97105a12e478cd2ae5328ad4c8e2e3d</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">07670e2efe5a90a41907c0ae146e23969b2b63a7df589fc4abec492036090dc4</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-devel" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-devel-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">f8bc0f5be0e6c7369cc456f5718b23bfdc280405a3e3788d568c4731e63eba36</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">76543c5f2ab47496a2666ab64bfa8fd66da7f2645d67bf87b701750e0a9d408d</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-devel" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-export-devel-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">b965fd09fbe006836022e9dcb6c6c1dbe524f5dfa56c6e46e2322b75af43dc5e</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">9d10ae4b0371e6b125b204480377bb115ed00086913aa55925bfd1a6f53789b5</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-export-libs" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-export-libs-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">21055280250a5a6ec47670fef45098dabac9b487f2bc98da6f04363ea9753a58</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">3f8239ed6fbdb8ba3c766c0f0e963101c50ded8b15927d57ec51303aec534e1f</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-libs-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">b67edee4717448a7de7e4c5193dbac9ec0a3cd9f2ad9bd87ea461ea93a3313fa</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">3d59b4ba38cdd3a396b56bbfab82883183181749d1c01be0836f86804415ffbe</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-libs-lite" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">eec0f60b2c0e4820e5ed2b2a003ed4b951ea67da3cef3ecf1536e72fe46eb944</sum>
        </package>
        <package arch="noarch" epoch="33" name="bind-license" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-license-9.11.4-26.P2.el7_9.16.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">096306b06c3eb80b1b8582484ccbb03d71c23f9d876e09f4b7d9e6a79e5ec547</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">23bb0e83e9df1e735b4d59dadf5e1f3ffb5d9787a725560dc10c8900d4a606ed</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-lite-devel" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">8a621fce09e02c20b5a5ac295421dba807ca8910ec8c03607af89a7a36fb053b</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">9e976427b5a4630b7d185e784d918ed356bc65cd724227ef5afb01a6c1bbe69b</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">8c616092cb5b6e6a78fa3f0b4b2a01ed4d55403ce371dacc1ea3453abe6fe2a5</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-devel" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">d8b59dbb82dfa62cc44a78e28d2f716c57cb108c5876089e348c48ae2b2d77e1</sum>
        </package>
        <package arch="i686" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">0b45119677459aad66b41b964f9fb5ea71016e3aa8208ee115b8c6260b56212b</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-libs" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">65629b83ab33e7a3aa3a6149d5e4af0b6422d86a0b65f024ce684175bfa446d1</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-pkcs11-utils" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">ff68a9b89f98d1c2562efbebc392b66e023909e0be1200453e0691930d609975</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-sdb-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">85a65c14ed0e96ca4efa3a1b1baa1275400e5e1e749a3d4a82dfbce47c9d85e7</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-sdb-chroot" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">3aaecd68916db5b5eca0d39c4dad16f1f3950bc3670c4c237e8a5d332d637ba5</sum>
        </package>
        <package arch="x86_64" epoch="33" name="bind-utils" release="26.P2.el7_9.16.tuxcare.els8" src="bind-9.11.4-26.P2.el7_9.16.tuxcare.els8.src.rpm" version="9.11.4">
          <filename>bind-utils-9.11.4-26.P2.el7_9.16.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">b32347d16d9699a8b62ce129893db23bda0f5a3aaece403dce1d1b56719dd029</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1743676155</id>
    <title>kernel: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- drm: nv04: Fix out of bounds access {CVE-2024-27008}
- media: uvcvideo: Fix double free in error path {CVE-2024-57980}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- drm: nv04: Fix out of bounds access {CVE-2024-27008}
- media: uvcvideo: Fix double free in error path {CVE-2024-57980}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-03 10:29:20 UTC" />
    <updated date="2025-04-03 10:29:20 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1743676155.html" id="CLSA-2025:1743676155" title="CLSA-2025:1743676155" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">c4d9a7247eb151f1e71810c9442a72c646b33c7e35c21fa59ad7267389da3509</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">7cb85dc9dd035886de7bcc83acd53e98c6500f46be7e6ee481c83b846089e51a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">eebed0943d00b73fd75f4a28537f17a7a7b92f628067a3f6b3dd184fe9595cee</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">dfac976f278aab87012c4d1c92dff6b016a0664158c994fd44ccb92ff7389903</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">d2ff39fb2a223c0f1ef4e4410f8b5dfd62902cf05a731827bcc5ccc2cf17ed30</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">06ae52f61ccbd903739e058cac84793ad1df58c084559459f23c2adbfe2b857b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">3120e0660d5282e12323892981cb12a137bd7bdd514c2a65bfa0d620990d69ee</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">29a8ed6ef5134b137de910686b41561435785f179ebf16e4fa2fc3a6f4fa56e3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">3c7b1b8cfd03bf00067e9bdbcf6b6b6411126a8f33e276b13222ce7885fb1059</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">fcb490111fe66e90dc336ad722297154dacb4d4dda881354613e1e108f8d8f2a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els19" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els19.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">3deeaf5357439fe901c290399db84aaec361fb7fc0db8e1cd288f08bede12f78</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1743763948</id>
    <title>libxslt: Fix of CVE-2025-24855</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-24855: fix use-after-free issue in numbers.c by restoring XPath
  context node in nested XPath evaluations</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-24855: fix use-after-free issue in numbers.c by restoring XPath
  context node in nested XPath evaluations</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-04 10:52:33 UTC" />
    <updated date="2025-04-04 10:52:33 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1743763948.html" id="CLSA-2025:1743763948" title="CLSA-2025:1743763948" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libxslt" release="6.el7.tuxcare.els2" src="libxslt-1.1.28-6.el7.tuxcare.els2.src.rpm" version="1.1.28">
          <filename>libxslt-1.1.28-6.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">e1b37adcd960f1480fd8ca901343132105f892a92220666b09d4c3dc8ac43a9d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxslt" release="6.el7.tuxcare.els2" src="libxslt-1.1.28-6.el7.tuxcare.els2.src.rpm" version="1.1.28">
          <filename>libxslt-1.1.28-6.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">095c36492365a6c40d7f34a7edd25464b5419d43abfea26b049661291941d3d4</sum>
        </package>
        <package arch="i686" epoch="0" name="libxslt-devel" release="6.el7.tuxcare.els2" src="libxslt-1.1.28-6.el7.tuxcare.els2.src.rpm" version="1.1.28">
          <filename>libxslt-devel-1.1.28-6.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">4f965b026cf128d33b24a123c7dbcc98a4dac856185c5d98f1e22a7cb83ad939</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxslt-devel" release="6.el7.tuxcare.els2" src="libxslt-1.1.28-6.el7.tuxcare.els2.src.rpm" version="1.1.28">
          <filename>libxslt-devel-1.1.28-6.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">78cbf5d391d50004d7c7cda284a825e24492c79400c98b81f6a1a41fd8632110</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxslt-python" release="6.el7.tuxcare.els2" src="libxslt-1.1.28-6.el7.tuxcare.els2.src.rpm" version="1.1.28">
          <filename>libxslt-python-1.1.28-6.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ba2fe0f3531233dae7857527fe75d2b1179dd76f1533324165b2027fde3a9ca0</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1744623757</id>
    <title>libxslt: Fix of CVE-2024-55549</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-55549: fix use-after-free issue related to exclusion
  of result prefixes</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-55549: fix use-after-free issue related to exclusion
  of result prefixes</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-14 09:42:43 UTC" />
    <updated date="2025-04-14 09:42:43 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1744623757.html" id="CLSA-2025:1744623757" title="CLSA-2025:1744623757" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libxslt" release="6.el7.tuxcare.els3" src="libxslt-1.1.28-6.el7.tuxcare.els3.src.rpm" version="1.1.28">
          <filename>libxslt-1.1.28-6.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">2996432bcc07e56a879c2502992f22947175c62c5045f17c97c4ba8d613fcb24</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxslt" release="6.el7.tuxcare.els3" src="libxslt-1.1.28-6.el7.tuxcare.els3.src.rpm" version="1.1.28">
          <filename>libxslt-1.1.28-6.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a264315ab3565910b95abac9b0ae099336040f693bfe02962d529a275e2d6a8a</sum>
        </package>
        <package arch="i686" epoch="0" name="libxslt-devel" release="6.el7.tuxcare.els3" src="libxslt-1.1.28-6.el7.tuxcare.els3.src.rpm" version="1.1.28">
          <filename>libxslt-devel-1.1.28-6.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">16e44ecbc781f312f723d71889215d0e9382465d851e5b9967e5f11c3acb098b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxslt-devel" release="6.el7.tuxcare.els3" src="libxslt-1.1.28-6.el7.tuxcare.els3.src.rpm" version="1.1.28">
          <filename>libxslt-devel-1.1.28-6.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">3f67f538e56af38d7be6c1464c5e395c138b4f92ba082964f2b0fe31aa941cd8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxslt-python" release="6.el7.tuxcare.els3" src="libxslt-1.1.28-6.el7.tuxcare.els3.src.rpm" version="1.1.28">
          <filename>libxslt-python-1.1.28-6.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">e7901ec7dbac871b7386b8c8a33bc9807dbb7a2a3dca4809228f5b637b754b00</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1744724536</id>
    <title>grub2: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-0624: net: Out-of-bounds write in grub_net_search_configfile()
- CVE-2025-0690: read: Integer overflow may lead to out-of-bounds write
- CVE-2025-1118: commands/dump: The dump command is not in lockdown when
  secure boot is enabled
- CVE-2025-0678: squash4: Integer overflow may lead to heap based
  out-of-bounds write when reading data
- CVE-2025-1125: fs/hfs: Integer overflow may lead to heap based
  out-of-bounds write</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-0624: net: Out-of-bounds write in grub_net_search_configfile()
- CVE-2025-0690: read: Integer overflow may lead to out-of-bounds write
- CVE-2025-1118: commands/dump: The dump command is not in lockdown when
  secure boot is enabled
- CVE-2025-0678: squash4: Integer overflow may lead to heap based
  out-of-bounds write when reading data
- CVE-2025-1125: fs/hfs: Integer overflow may lead to heap based
  out-of-bounds write</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-15 13:42:21 UTC" />
    <updated date="2025-04-15 13:42:21 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1744724536.html" id="CLSA-2025:1744724536" title="CLSA-2025:1744724536" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="3" name="grub2" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">d5b2454d89c894f7728227ae72399632b48e72905f239034283f4cc5e87f6250</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-common" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-common-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">e8660fc02747ba305700b3ecc58df1e1cc7202f836e39679b54411ed06c25426</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-ia32" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">5c729bb4a5679ea349b73c12a7eceaeee1aa107ee330928c12501ef00a66b962</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-ia32-cdboot" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-cdboot-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">2e085f568d9db8dee28478a5408f8be9461c05f16fe8f31a9f07775598a64953</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-efi-ia32-modules" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">72d9602ddc8a2ca5b6192473a25aac6a282f1ac3dce11f55a4ad37d2fb9be7ef</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-x64" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-efi-x64-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">679856d7b8802e9d74176be20aec95130bd312f21d23261df50d901f300bd5e7</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-x64-cdboot" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-efi-x64-cdboot-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">257a28a7963ee69b969c8f407e533df5371712e1ba0f2d1f8092fd4101b4e51b</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-efi-x64-modules" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-efi-x64-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">60aee0fe3c832396ea805d83abef626b5209370823404efcf8cd5dba9df32a6d</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-i386-modules" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-i386-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">09fbdfb24a5b5ac399d7bbccf6fa0ff774db699870d4090da3cc7adbd1040a57</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-pc" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-pc-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">c7e6e8211fb541f2fc807fa3d0c0ac60e8caed283c16afeaa14a3a75084440c7</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-pc-modules" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-pc-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">bbd972e0ce809ff4657024d32dc7f2a86dc48a11eefb233184a320dc6827e230</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-tools-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">850c0f75e5afdee787ace6e241f37f4dcb5a7ca7ff0616a0cecb313cb20b464a</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools-extra" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-tools-extra-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">6549d428d213de14f2630faefd8ef4f57e9848b1307e19a9d2f6e1c6e2c5d4a4</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools-minimal" release="0.87.0.2.el7.centos.14.tuxcare.els6" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.src.rpm" version="2.02">
          <filename>grub2-tools-minimal-2.02-0.87.0.2.el7.centos.14.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">e4e2bd29af37c9f1e353b9edb81065570807ce8e763e7b1a041e065827f0367c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1744926275</id>
    <title>libsoup: Fix of CVE-2024-52531</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-52531: fix buffer overflow caused by conversion to UTF-8</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-52531: fix buffer overflow caused by conversion to UTF-8</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-17 21:44:41 UTC" />
    <updated date="2025-04-17 21:44:41 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1744926275.html" id="CLSA-2025:1744926275" title="CLSA-2025:1744926275" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libsoup" release="2.0.1.el7.tuxcare.els3" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els3.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.1.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">6a2d8a65c594f93cf712be3af754fb42b4f1027085340ea1c3729adbe98481ef</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup" release="2.0.1.el7.tuxcare.els3" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els3.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a35dd4bf7dfd6636eb0c46a1ff006c8b432e7444c9e247bb125c1d12bf3856ba</sum>
        </package>
        <package arch="i686" epoch="0" name="libsoup-devel" release="2.0.1.el7.tuxcare.els3" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els3.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.1.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">136b38c38302be0461f916ab98b25e05f36c09c2116e467b7498432413f17fc6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup-devel" release="2.0.1.el7.tuxcare.els3" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els3.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">df618e0a7a5a7516eea92426b43db3dfe1cd79d6f4168bd88b9fcd499469db24</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1744926159</id>
    <title>Update of openssl</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Backport the implicit rejection mechanism for RSA PKCS#1 v1.5 to
  prevent Bleichenbacher attacks; add an option to disable the mechanism</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Backport the implicit rejection mechanism for RSA PKCS#1 v1.5 to
  prevent Bleichenbacher attacks; add an option to disable the mechanism</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-17 21:42:45 UTC" />
    <updated date="2025-04-17 21:42:45 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1744926159.html" id="CLSA-2025:1744926159" title="CLSA-2025:1744926159" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="openssl" release="26.el7_9.tuxcare.els3" src="openssl-1.0.2k-26.el7_9.tuxcare.els3.src.rpm" version="1.0.2k">
          <filename>openssl-1.0.2k-26.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">e22876a7469cbd962a3423933c22929c4307a500bba28c2f524747240399d6fa</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els3" src="openssl-1.0.2k-26.el7_9.tuxcare.els3.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">018b5f4786af97c0c8b51f3a79e8a351993ef6661fbabb6b50f7bbb4dd1e8b7c</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els3" src="openssl-1.0.2k-26.el7_9.tuxcare.els3.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c0019bf9e5a34f82314521463f338fab7dc2514a951edd314ba7600f4f999c71</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els3" src="openssl-1.0.2k-26.el7_9.tuxcare.els3.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">391603e41c6004fe7542144578b268ef79f57b155b007bfcfb9af73df62f8300</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els3" src="openssl-1.0.2k-26.el7_9.tuxcare.els3.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">4aebd206e2163c3e9bea5ef30359e58b22ae07e4e35e337ca4898a5756eec20a</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-perl" release="26.el7_9.tuxcare.els3" src="openssl-1.0.2k-26.el7_9.tuxcare.els3.src.rpm" version="1.0.2k">
          <filename>openssl-perl-1.0.2k-26.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c5605dc05449a886c60a33f784f77056d57445716775b7a5ec4406588c04405e</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els3" src="openssl-1.0.2k-26.el7_9.tuxcare.els3.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">5b4b4905f1265e701e3dc9ffdc2b20b212f199a99fe57347b27a529a23a06f50</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els3" src="openssl-1.0.2k-26.el7_9.tuxcare.els3.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c7c5aa19050bea75d312afe76b15d7bd5e4756dedf31e949c4a7b13c219a5a6b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1744892440</id>
    <title>Update of libsoup</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Bump up version</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Bump up version</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-17 12:20:46 UTC" />
    <updated date="2025-04-17 12:20:46 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1744892440.html" id="CLSA-2025:1744892440" title="CLSA-2025:1744892440" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libsoup" release="2.0.1.el7.tuxcare.els1" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els1.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">7409eda1d2845d653b6162b630c75f6ec06e16608de5f675638f729783b657b4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup" release="2.0.1.el7.tuxcare.els1" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els1.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">89a370de42d91971709bf72e02fb68ff586e098f995e7afe65cfb280394593e6</sum>
        </package>
        <package arch="i686" epoch="0" name="libsoup-devel" release="2.0.1.el7.tuxcare.els1" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els1.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">6959218a95656e3593c2bd0c27e2bc9f7290bc7a4b67b32efea0c46c5b597214</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup-devel" release="2.0.1.el7.tuxcare.els1" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els1.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0deb6f44e696317314359d7060ba9b3cd557f0c23292525cd88a67e391cce1ba</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1744892170</id>
    <title>gcc: Fix of CVE-2020-11023</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2020-11023: sanitize HTML content passed to DOM manipulation methods to
  prevent execution of untrusted code</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2020-11023: sanitize HTML content passed to DOM manipulation methods to
  prevent execution of untrusted code</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-17 12:16:16 UTC" />
    <updated date="2025-04-17 12:16:16 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1744892170.html" id="CLSA-2025:1744892170" title="CLSA-2025:1744892170" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="cpp" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>cpp-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">012a033c7ae83af919fa4e0bceffbbdfb7fae937d80fa6ae83fb110d5e2522b4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gcc" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>gcc-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a427354981de8351c4894b413617e7e11f886de0f6264bc17c16e5bbdd193fcc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gcc-c++" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>gcc-c++-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">15f6bd25d4f62aa3b6715bfa0790f9df32623d97c0a18cc54a6ead300e1eab00</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gcc-gfortran" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>gcc-gfortran-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b451ea4eda75c1724ebc8f13186d7ddfb4bb7d79263c8c942b0444f3bd5b6f3c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gcc-gnat" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>gcc-gnat-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0111609a02be5f8a4079167fdf446d775f0924ad355cc64fdab553c27beee286</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gcc-go" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>gcc-go-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">79eca6b01a66a4f2774408fbb0d6a14e490ccd0bfc70da34632edff4370bf7b1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gcc-objc++" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>gcc-objc++-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">84caebda2ca4fec4b991af6310fd29d85eb0bb4704236c1af8dfc2d871096d5c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gcc-objc" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>gcc-objc-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">269942ce3a6b1b2e727a9eca3e15514c0112c1daa07fd2c50f0ef3bae10eb53c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gcc-plugin-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>gcc-plugin-devel-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">731764bcb017d4611fa507607efeeb1fb3612f07bbc273b3eae9bd5374a7a855</sum>
        </package>
        <package arch="i686" epoch="0" name="libasan" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libasan-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">6f13581ce9a8575c19a7ae2ee1568daf7d483d995d05f183a425787749719ab0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libasan" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libasan-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0268d33cd3585326c1b1a162436ecfe8e03fb1fcb0109dee8ef18d296db0191f</sum>
        </package>
        <package arch="i686" epoch="0" name="libasan-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libasan-static-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">bcd3bba7f5d8b9af1778dfe8a8f30012a4530a8fae8277440c26cc9db9b79fcc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libasan-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libasan-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">32eec8d0e882a6252c3d88eeaace6260cf6a8a8553a5a89411e1463404f4ad9f</sum>
        </package>
        <package arch="i686" epoch="0" name="libatomic" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libatomic-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e3d2c5e0b6db11d69cdeb5361112ffa852986a6849f96fc83ec6eef47f60bbad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libatomic" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libatomic-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">da8b9da64dc4898261e37e781689668ea68cfd549b1dd826b29989090b6016d1</sum>
        </package>
        <package arch="i686" epoch="0" name="libatomic-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libatomic-static-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">40f37d0c125c8d1f9207c683d4ff6669daeaf128247aa1c4b35680b97de1ae0e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libatomic-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libatomic-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">818f355c4d296c69227f85cdc8945bd308fd34d9f3743463025c6c3d3362733c</sum>
        </package>
        <package arch="i686" epoch="0" name="libgcc" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgcc-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">570649ff0be27a6f2fb6210b0ceb1791eab53a26f7d4cdf42567420ced67bbae</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgcc" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgcc-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cfc5c90258788fc6509f1e815d630887773083d883b5401f76b6991c3319321a</sum>
        </package>
        <package arch="i686" epoch="0" name="libgfortran" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgfortran-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">c11536319c97344e277bfd2c06567c2267045a984f9fc6d6b5a5f792d1abe71c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgfortran" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgfortran-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">609140910f01cd1ae32476b0764c413fa5a6612344a301927f1a9c416bce0cf9</sum>
        </package>
        <package arch="i686" epoch="0" name="libgfortran-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgfortran-static-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">a8fa69133af93382cc87ff74cc73b4100f8301eafebbc191348891aeb2966fad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgfortran-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgfortran-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">549a4049a8a9ab0c55a592640d422e45f4813a675c52524eb0a6f2cce9f63543</sum>
        </package>
        <package arch="i686" epoch="0" name="libgnat" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgnat-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">9a6857a8090b5adb9c827592285bc394d08d1c9aac5f8c7f03ddd6b54042e1aa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgnat" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgnat-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4469fa0fedc0340f1399a040473592c20d730defa56ac9ce4912e759b7fc3cbf</sum>
        </package>
        <package arch="i686" epoch="0" name="libgnat-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgnat-devel-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">1f874dc3d6bb06d37c0f2eecc2798227241a6f3e21c48ed8f0520d1d825e8580</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgnat-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgnat-devel-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c7bbe5642921756fb9ae703bb08b8cf7155a88fef96da4051a4e4356c08fca5f</sum>
        </package>
        <package arch="i686" epoch="0" name="libgnat-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgnat-static-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">99c6c22836f334b9fedefa9be3c6cfa50b6775c26e76c0af96481b83b0331f15</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgnat-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgnat-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3c8c24b36689be5d137bd93441c72e2a39d839bb6f72af35bf25ce747ab12f52</sum>
        </package>
        <package arch="i686" epoch="0" name="libgo" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgo-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">c568e867fef59790b753fe2d3f0adb5668be16e5933499d542ebe31c3337c7da</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgo" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgo-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">838fd1adcee4973bef4d9e5b4b1535f2d35fe5027554343e1ad39825d4592c45</sum>
        </package>
        <package arch="i686" epoch="0" name="libgo-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgo-devel-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f2286f51f83e95f84b80e1c3eb5ed0d813fee6d1902bb1fda8b75f51361764c2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgo-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgo-devel-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">641f9a9564ac9d37ded032ed0afa32187c8e5da8b55668aa35fedc67086a8210</sum>
        </package>
        <package arch="i686" epoch="0" name="libgo-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgo-static-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">efd4d5ce8db725ed4954ab0a066e3a28777ff231cce710f875d5711c0aed9243</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgo-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgo-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">61fff0cd5f011f53c5f09c38ff3afd54044efa35ea86ca27ec349fe3377234b9</sum>
        </package>
        <package arch="i686" epoch="0" name="libgomp" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgomp-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e6082b927e4298f152d650d9a64a6aaa6a0a7f1e066f0409688ad2b58ccc4941</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libgomp" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libgomp-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">de585430ab2b5616ef5c75a8f40dea674719c2e40bd7fa842e7eab67266497d7</sum>
        </package>
        <package arch="i686" epoch="0" name="libitm" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libitm-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e3c2b0cc90c2976029b884699be7d8e60d51e3ecf7a0708a7148895988364ec0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libitm" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libitm-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3f5a866e9b8304424ce349c579f623d6be516b273d7a15bf2bba27003d8fb7f7</sum>
        </package>
        <package arch="i686" epoch="0" name="libitm-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libitm-devel-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">412111aa8cf4eab4810948cc68fb20847b8b0dc585de0af7fd10fd1ca9bf7ade</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libitm-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libitm-devel-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">99816020d14e6956e1e2cdcb012ec1fef1dc5fec78b133c75f967b4fe68c7e46</sum>
        </package>
        <package arch="i686" epoch="0" name="libitm-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libitm-static-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">a0c8e9d9f06d561d0fb22618b6ddd527ee8afffac072fad3bdee74f634e1aed4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libitm-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libitm-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1d88371430abd17008ddaf3713af91cead1d4016f3d827e0f835eb83ecd4c6e8</sum>
        </package>
        <package arch="i686" epoch="0" name="libmudflap" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libmudflap-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">02c060adb89922ff8193098210459242d2add4512d27e4fc358b6e40b23df78c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libmudflap" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libmudflap-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">737acbd877b6d0b6073d5f64239f88c085c8bf6031202fe09e944a38109b4159</sum>
        </package>
        <package arch="i686" epoch="0" name="libmudflap-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libmudflap-devel-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">5a74df66f707fef3f3a6f06120732384c4e062bb90a207a0f72579346a7ffc17</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libmudflap-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libmudflap-devel-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">bc2e92b4894710f55f8879676004582e79dd0ff27aee78bf020b47334f951e88</sum>
        </package>
        <package arch="i686" epoch="0" name="libmudflap-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libmudflap-static-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e7f169f2a8b1a94c3169027ccd0c7ad2b341cda60e88bd55c6907cecd21291f9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libmudflap-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libmudflap-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b59c2792f300643e9de4faf6d1a2f7accadec13c58052241ab45111a8ba912af</sum>
        </package>
        <package arch="i686" epoch="0" name="libobjc" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libobjc-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e26ddb9200de011214fdc9ff531bfe29d179c79eb2c7ed015be100999a4a3dda</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libobjc" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libobjc-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5a4c9790448e27d3366d759a135b57ae89f309348e56045ecd0be0cfa23b0a90</sum>
        </package>
        <package arch="i686" epoch="0" name="libquadmath" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libquadmath-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">b0cca91b8da15fee0e93ceea6fb9ec4e23132d123b83f9dd71622bef1ba28c52</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libquadmath" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libquadmath-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c49822eab42690e0d5143f2fdff83bd6d9fecf96314e075becd610994716066c</sum>
        </package>
        <package arch="i686" epoch="0" name="libquadmath-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libquadmath-devel-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">92f370679a412d0ca844fedad86f0c36b9cd0f58bacf2074fcbb7f1577a47672</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libquadmath-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libquadmath-devel-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e938c15f8c715eacc001f35431dde8d4b4ccb99268050075adabf1041033083d</sum>
        </package>
        <package arch="i686" epoch="0" name="libquadmath-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libquadmath-static-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">d2c12aaed77ee95081621c71f36b6c5bff3129c201bccebcfe3f366e3af78bda</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libquadmath-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libquadmath-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0cf1d83afc1763b77c41f6bb335e1cbf767cabf717ab2afca9444f2cb0d06de5</sum>
        </package>
        <package arch="i686" epoch="0" name="libstdc++" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libstdc++-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">2bc751cdfdb56aae3f19097fe446c64d967c35b3fa4182d4fcf102d49897c738</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libstdc++" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libstdc++-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">65eec590dbc55d2814b4cccf6713334180c66e39ccdd8d5c6139c73fbce18b7d</sum>
        </package>
        <package arch="i686" epoch="0" name="libstdc++-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libstdc++-devel-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">3d0208b62a0789b268f1b288544dfa57b81c5363edfedad7d512d34e925f8ba0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libstdc++-devel" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libstdc++-devel-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7431f217fe45aeaf20c6ffb3a385b9b8700ff4699cc6e8dd896b097c1192d021</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libstdc++-docs" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libstdc++-docs-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a97b0342c11132a1ab502e73ae344ae5f033fc8a22467827493ee7ed35e38f93</sum>
        </package>
        <package arch="i686" epoch="0" name="libstdc++-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libstdc++-static-4.8.5-44.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">18c55a9383b696c1a324889496a6fc0e1ee86415f9b1dc9fab74e0b7354d422b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libstdc++-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libstdc++-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">081c8d6c376e1df539f1d94cfeea9c619cea7744ebe2782febe2c107d6f2cafd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtsan" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libtsan-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">93c203222f3a628f04c14711decc004a9b63125fe350e663adc8a95ff4cb4b9e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtsan-static" release="44.el7.tuxcare.els1" src="gcc-4.8.5-44.el7.tuxcare.els1.src.rpm" version="4.8.5">
          <filename>libtsan-static-4.8.5-44.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5d99c6564601371e26c16e3f2dde3d617856a7f6617a530f8ca6d70ce46e6aaf</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1745836038</id>
    <title>Update of els-os-release</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Initial package</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Initial package</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-28 10:27:23 UTC" />
    <updated date="2025-04-28 10:27:23 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1745836038.html" id="CLSA-2025:1745836038" title="CLSA-2025:1745836038" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="els-os-release" release="0.el7" src="els-os-release-1.0.0-0.el7.src.rpm" version="1.0.0">
          <filename>els-os-release-1.0.0-0.el7.x86_64.rpm</filename>
          <sum type="sha256">f667bfa167dcbd13ba4e40fff07a75c941f6776073726e10a8f8e56fa83860c8</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1745585192</id>
    <title>ruby: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-27219: fix a potential Denial of Service (DoS) vulnerability in
  cookie parsing
- CVE-2025-27220: fix ReDoS vulnerability exists in the escapeElement
  method
- CVE-2025-27221: fix he URI handling methods (URI.join, URI#merge, URI#+)</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-27219: fix a potential Denial of Service (DoS) vulnerability in
  cookie parsing
- CVE-2025-27220: fix ReDoS vulnerability exists in the escapeElement
  method
- CVE-2025-27221: fix he URI handling methods (URI.join, URI#merge, URI#+)</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-25 12:46:37 UTC" />
    <updated date="2025-04-25 12:46:37 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1745585192.html" id="CLSA-2025:1745585192" title="CLSA-2025:1745585192" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="ruby" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.0.648">
          <filename>ruby-2.0.0.648-39.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">19ec9a4d9af22a44801074cb49d04835d90689c8e4d030a665f002e027444344</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-devel" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.0.648">
          <filename>ruby-devel-2.0.0.648-39.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">3a820a0f62620c11f7efa4699f476379357c6f02a46340e863937d50f1c69451</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-doc" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.0.648">
          <filename>ruby-doc-2.0.0.648-39.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">0afca55feb516e8c26ba82692c0a37fa00014821a4037f3700a310f9348d4af6</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-irb" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.0.648">
          <filename>ruby-irb-2.0.0.648-39.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">2b8d7e88442d72937b65af2d92205aaebd9a89532b9cae0004a37ade96cbc49c</sum>
        </package>
        <package arch="i686" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">4cb377c0799d7069bf8097bad06df3002344afe6c4332944c1015f8da98979fe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">4bb473e7a0b6efc062935ee9f007e157c25554dad8aecc1b90afcb7a0bdbb325</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-tcltk" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.0.648">
          <filename>ruby-tcltk-2.0.0.648-39.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">459c8e0bd3f275afe53577b1d02c96bb80f0ff23969d360965a657aaa556006c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-bigdecimal" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="1.2.0">
          <filename>rubygem-bigdecimal-1.2.0-39.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b55895302b43321d25a6fcb6182f2f66c07a4d71de3c0c0306bb9105b775c959</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-io-console" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="0.4.2">
          <filename>rubygem-io-console-0.4.2-39.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">3b32b071f427fe370cb145ad922a86698dbd49fb9a71a6654bc565b2fe8e6de0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-json" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="1.7.7">
          <filename>rubygem-json-1.7.7-39.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">37c9e1a8a3e52b298db8ea87c5a97dda299ca9c60f50f290c23f5d953e3ea9f4</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-minitest" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="4.3.2">
          <filename>rubygem-minitest-4.3.2-39.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">ba2edf4607a3a556278c2cec53bab782482acffcb4c78e382e1aa8fca502c60b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-psych" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.0">
          <filename>rubygem-psych-2.0.0-39.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">41f13f29d33caf002a0709e47083ed423f4c89b8efe8c9e3af942ce3e29f5c13</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rake" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="0.9.6">
          <filename>rubygem-rake-0.9.6-39.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">ec94930985f7e52cff0e345bfa27439c44dc160dfe50b22a3855e182050707f2</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rdoc" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="4.0.0">
          <filename>rubygem-rdoc-4.0.0-39.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">8c1b904560e0c0e676a520df940a5cc3cfe73054b5647b72b8d2ed4f57657f6c</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.14.1">
          <filename>rubygems-2.0.14.1-39.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">9b8f9856dcf17acb4e48b8f3cbaab44c2015c0a68617dc366dad244d8552c5d0</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems-devel" release="39.el7_9.tuxcare.els7" src="ruby-2.0.0.648-39.el7_9.tuxcare.els7.src.rpm" version="2.0.14.1">
          <filename>rubygems-devel-2.0.14.1-39.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">d458eb210d5a37111b874ed8dc44335cdfba4bba932539026ea39fedc16a3afe</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1745585902</id>
    <title>libvirt: Fix of CVE-2024-2496</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-2496: Fix NULL pointer dereference in udevConnectListAllInterfaces()
  function</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-2496: Fix NULL pointer dereference in udevConnectListAllInterfaces()
  function</summary>
    <pushcount>0</pushcount>
    <issued date="2025-04-25 12:58:27 UTC" />
    <updated date="2025-04-25 12:58:27 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1745585902.html" id="CLSA-2025:1745585902" title="CLSA-2025:1745585902" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="libvirt" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6278946f1bf584a1d98518f7f1903d1b9424041ae91b2f1dc0e3227d75bef855</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-admin" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-admin-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0a2f28b2f0c88742540a70055a42cf2f280e487ce44e580ce7650c6536e9c929</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-bash-completion" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-bash-completion-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1df46e989ee297964a8fb9844e67809614e5a8f3c2aa467381d2cbd4758e0bec</sum>
        </package>
        <package arch="i686" epoch="0" name="libvirt-client" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-client-4.5.0-36.el7_9.5.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">527b6a8b0e011f87e52b21e55e8ea359d1a8004a0eae7ed2c036522a82767c7e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-client" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-client-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">04688bb771794b9d1e61a5dec6a5ed4468f1f33c4b5b681cbed73e0422fbc887</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">172c580da56ae4602467f2e9b95e689f9ebdf8a11a155345d235be3c8ec1af21</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-config-network" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-config-network-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0cfcb8cd31fd9eded8f7a2c52ce52b8ecbb39c75c930ee591f9b5a7338865d2f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-config-nwfilter" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-config-nwfilter-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">eedd3c5d1df664eabed4d5d0dc39bcce39f945962c2f6baaf3c9b0c082edb6df</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-interface" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-interface-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f88428922690f460f6fabf83f18a907525dce48cc2fa6cc2caf5fef3c6bf94dd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-lxc" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-lxc-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">792c73907ae33b721c326538cb8222c0b4a522dc06fe21b20b0124fe64fec0aa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-network" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-network-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f3b99dded6d5d7f07b8002b75b21cec550023e9172258b55848a23a4ba3e33cc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-nodedev" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-nodedev-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ea4304aab5a2fd1602611a768e54f23b77494c6799be3f04f3d273339e981f79</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-nwfilter" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-nwfilter-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8e53bc0c82f5efa4d732b600be5aae19ef3ea773565198c42d18f3c80352ef21</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-qemu" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-qemu-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cd0ac30905cee3fd4fd926291ca0cb0d2125f402945ba833c41ecafc8df17683</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-secret" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-secret-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5047acfa3ea79776b54738ad3b187ba8f4f29d5f8c061c442f074572d584d8fe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-storage" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-storage-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">73f2062b55575b7b0d360e03811bff3454cf6c1971a824ebef6c4b14994d11b3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-storage-core" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-storage-core-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">94361cede0ce0f32b867680293bc7cca760cb78eb8742b22b38faa34bdcccf91</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-storage-disk" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-storage-disk-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a83d46813da9b8ec6a9ef49d4441c97e68eaf028fdb4e10b67c70482d241ec92</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-storage-gluster" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-storage-gluster-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cb8ad952d3bba172f884f42ffb43760c1b24751a8ebc02f2350aeaa64b54a91f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-storage-iscsi" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">35c162266e85c9b3b0c9add9d568befb43dc48584d0c21767fbd5e8ee45bf6a0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-storage-logical" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-storage-logical-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">26e00f0b1f3e5dc6869871763647b937b370bbe9cec851732b84bf7f30764e15</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-storage-mpath" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-storage-mpath-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">aa5eb79cb198469917983a9069c261f71a200362f738bd678ce198e2cc5a957b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-storage-rbd" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-storage-rbd-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7a311a4601febd299d37e782f23efe3503c7e2f640074bf9b63d86af563f0cb5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-driver-storage-scsi" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-driver-storage-scsi-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3ecc798f5d5e7e587b0b890aba07e859c80706f535ae2e6d08d4f2b4b365265b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-kvm" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-kvm-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">096871814c3e4ad112700978cbf26ac081310941791030198224467328858166</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-daemon-lxc" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-daemon-lxc-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">73293c16a99302940a4485470b0539c12affe03988992a700135cc46e61cb71b</sum>
        </package>
        <package arch="i686" epoch="0" name="libvirt-devel" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-devel-4.5.0-36.el7_9.5.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">412b8925d9157b058979b5bfe091737dd279d903b97bb78a77d19822ddc492af</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-devel" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-devel-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cc6c7870ef025298382fe4865af0c771fb5765e010aad235626cfd750d651348</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-docs" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-docs-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0e7600bd6fcccd13473663cbd544300d17861b61210ca0d96a8ca4d4a74065aa</sum>
        </package>
        <package arch="i686" epoch="0" name="libvirt-libs" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-libs-4.5.0-36.el7_9.5.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">22b33d6d74bc880c70e310b7c2798d22a4c07781282d6eca35babb01230b1285</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-libs" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-libs-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e054a2330e6bd2b3e5f4777ae6fac5af104911ded4c36ec6465f44205b1cb468</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-lock-sanlock" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-lock-sanlock-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ca985616c3e20edd587a6d0ae5aaace3224058101dedf17d84e6380b4c224cd8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-login-shell" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-login-shell-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f3408e35b81603d0e5f6e855ab1834590be6272220fc53cec74fa682cc6b6a70</sum>
        </package>
        <package arch="i686" epoch="0" name="libvirt-nss" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-nss-4.5.0-36.el7_9.5.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">635569da713c8300a8b27066b77ab75142b638d03cfe476fd0184ca55800ac86</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libvirt-nss" release="36.el7_9.5.tuxcare.els1" src="libvirt-4.5.0-36.el7_9.5.tuxcare.els1.src.rpm" version="4.5.0">
          <filename>libvirt-nss-4.5.0-36.el7_9.5.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">26ecdd1aa39a4b2b3ac115571489aa7f088c6953550eb352f94fa088a3e0b88a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1747058033</id>
    <title>libxml2: Fix of CVE-2025-32415</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-32415: fix heap buffer overflow in xmlSchemaIDCFillNodeTables</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-32415: fix heap buffer overflow in xmlSchemaIDCFillNodeTables</summary>
    <pushcount>0</pushcount>
    <issued date="2025-05-12 13:53:58 UTC" />
    <updated date="2025-05-12 13:53:58 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1747058033.html" id="CLSA-2025:1747058033" title="CLSA-2025:1747058033" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libxml2" release="6.0.3.el7_9.6.tuxcare.els4" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els4.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">4cc975e7477a679c85921348d95c5cb5e7e87d7615afae92251fdbd2df57b7b9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2" release="6.0.3.el7_9.6.tuxcare.els4" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els4.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">89bebc9b0646fb74078019c601667135b159d90eaece1489b51155e3ba00faf2</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-devel" release="6.0.3.el7_9.6.tuxcare.els4" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els4.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.0.3.el7_9.6.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">1e18a7999569ae4a7a53740f3301d0826bbdc6a6d595964e20c40e635b6a6130</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-devel" release="6.0.3.el7_9.6.tuxcare.els4" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els4.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.0.3.el7_9.6.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">5f3525b9b735d241c80ca170205413cdcc97d6967e70b78da13915b0507bd7ad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-python" release="6.0.3.el7_9.6.tuxcare.els4" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els4.src.rpm" version="2.9.1">
          <filename>libxml2-python-2.9.1-6.0.3.el7_9.6.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">281d39c951513bc008d70b187b1855bd5f6d054c7f6297e1422e07232de71e31</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-static" release="6.0.3.el7_9.6.tuxcare.els4" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els4.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.0.3.el7_9.6.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">7cecc86c4674b4f8da96a521408d6d5955fdab37906e058fcadbe89cf25ba14f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-static" release="6.0.3.el7_9.6.tuxcare.els4" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els4.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.0.3.el7_9.6.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">72c9f6035862f703d709d684b258bdeea0b78afa5dad60ac6d438ba0b18bfcb4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1747260502</id>
    <title>kernel: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices {CVE-2024-53197}
- Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd {CVE-2025-21969}
- ext4: fix OOB read when checking dotdot dir {CVE-2025-37785}
- iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() {CVE-2025-21993}
- vlan: enforce underlying device type {CVE-2025-21920}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices {CVE-2024-53197}
- Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd {CVE-2025-21969}
- ext4: fix OOB read when checking dotdot dir {CVE-2025-37785}
- iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() {CVE-2025-21993}
- vlan: enforce underlying device type {CVE-2025-21920}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-05-14 22:08:27 UTC" />
    <updated date="2025-05-14 22:08:27 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1747260502.html" id="CLSA-2025:1747260502" title="CLSA-2025:1747260502" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">4a213be2a67b5ab3d8c3f0080afd50bf599708a546c603d2208f7ad81f929173</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">6048224e98ffb86857a5680a6f9803f8b62fad57cca96582ba061411198ff4e0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">0f6cdc29f9e2ab4efd12ec8cd2d8a09dbeb0b47c6635d4a4cd72032628cac68a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">04b227e70500229cb24884314095c3b3f6d4d45505eedf5a0fd174f8cc9720de</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">34b2870c89e13dca8480cf919929af0cd073fdadd5a884384fac3766b6361516</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">38d2870f8a171d93a6dba281ec7118c869fa6a96455f6c91191c923329497c99</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">58f15f70d841102c81e70bc16c5f4ea0e0e72364ed116e5d39db45960efb1a12</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">4bf2e1a8ef337a7089fe8e81c8cd1ade1fe5e57ea38e2afd59bf34c3fefb46eb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">2367025a7f665308bb58e2b1499f773e23e09e5037fcfec7bf55e7f521149120</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">3db5d0247ce51c72962bafa2ca0c348623d52e4bd0ac917eb444ff87b8847211</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els20" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els20.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els20.x86_64.rpm</filename>
          <sum type="sha256">6e4f8bc97bbafd843303e256c0206d43d629e4d6f28d3c70337302cde5362588</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1747739840</id>
    <title>Update of microcode_ctl</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update Intel CPU microcode to 20250211:
  - Addition of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c0003e0;
  - Addition of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000620;
  - Addition of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x38;
  - Addition of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x436;
  - Addition of cpuid:A06F3/0x01 (SRF-SP C0) microcode (in microcode.dat) at
    revision 0x3000330;
  - Addition of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x12c;
  - Addition of cpuid:B0674/0x32 microcode (in microcode.dat) at revision
    0x12c;
  - Addition of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4124;
  - Addition of cpuid:B06E0/0x19 (ADL-N A0) microcode (in microcode.dat) at
    revision 0x1c;
  - Addition of cpuid:B06F6/0x07 microcode (in microcode.dat) at revision 0x38;
  - Addition of cpuid:B06F7/0x07 microcode (in microcode.dat) at revision 0x38;
  - Addition of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x21000291;
  - Removal of cpuid:806F4/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F4/0x10 microcode (in microcode.dat) at revision
    0x2c000390;
  - Removal of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) at
    revision 0x2c000390;
  - Removal of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:806F6/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F6/0x10 microcode (in microcode.dat) at revision
    0x2c000390;
  - Removal of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000390;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x35;
  - Removal of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x433;
  - Removal of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x123;
  - Removal of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4121;
  - Removal of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) at
    revision 0x4121;
  - Removal of cpuid:B06A8/0xe0 microcode (in microcode.dat) at revision
    0x4121;
  - Removal of cpuid:B06E0/0x11 (ADL-N A0) microcode (in microcode.dat) at
    revision 0x17;
  - Removal of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x21000230;
  - Update of cpuid:606A6/0x87 (ICX-SP D0) microcode (in microcode.dat) from
    revision 0xd0003e7 up to 0xd0003f5;
  - Update of cpuid:606C1/0x10 (ICL-D B0) microcode (in microcode.dat) from
    revision 0x10002b0 up to 0x10002c0;
  - Update of cpuid:806F4/0x10 microcode (in microcode.dat) from revision
    0x2c000390 up to 0x2c0003e0;
  - Update of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) from
    revision 0x2b0005c0 up to 0x2b000620;
  - Update of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) from
    revision 0x2c000390 up to 0x2c0003e0;
  - Update of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) from
    revision 0x2b0005c0 up to 0x2b000620;
  - Update of cpuid:806F6/0x10 microcode (in microcode.dat) from revision
    0x2c000390 up to 0x2c0003e0;
  - Update of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) from
    revision 0x2b0005c0 up to 0x2b000620;
  - Update of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) from
    revision 0x2b0005c0 up to 0x2b000620;
  - Update of cpuid:90675/0x07 (ADL-S 6+0 K0) microcode (in microcode.dat) from
    revision 0x35 up to 0x38;
  - Update of cpuid:906A4/0x40 (AZB A0) microcode (in microcode.dat) from
    revision 0x7 up to 0x9;
  - Update of cpuid:906A4/0x80 (ADL-P 2+8 R0) microcode (in microcode.dat) from
    revision 0x433 up to 0x436;
  - Update of cpuid:906EA/0x22 (CFL-H/S/Xeon E U0) microcode (in microcode.dat)
    from revision 0xf8 up to 0xfa;
  - Update of cpuid:906ED/0x22 (CFL-H/S/Xeon E R0) microcode (in microcode.dat)
    from revision 0x100 up to 0x102;
  - Update of cpuid:A0671/0x02 (RKL-S B0) microcode (in microcode.dat) from
    revision 0x62 up to 0x63;
  - Update of cpuid:A06A4/0xe6 (MTL-H/U C0) microcode (in microcode.dat) from
    revision 0x1e up to 0x20;
  - Update of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) from
    revision 0x4121 up to 0x4124;
  - Update of cpuid:B06A8/0xe0 microcode (in microcode.dat) from revision
    0x4121 up to 0x4124;
  - Update of cpuid:B06F2/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x35 up to 0x38;
  - Update of cpuid:B06F5/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x35 up to 0x38;
  - Update of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) from
    revision 0x21000230 up to 0x21000291;
- Remove old firmware versions: 06-8f-04, 06-8f-05, 06-8f-06, 06-ba-08;</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update Intel CPU microcode to 20250211:
  - Addition of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c0003e0;
  - Addition of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000620;
  - Addition of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x38;
  - Addition of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x436;
  - Addition of cpuid:A06F3/0x01 (SRF-SP C0) microcode (in microcode.dat) at
    revision 0x3000330;
  - Addition of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x12c;
  - Addition of cpuid:B0674/0x32 microcode (in microcode.dat) at revision
    0x12c;
  - Addition of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4124;
  - Addition of cpuid:B06E0/0x19 (ADL-N A0) microcode (in microcode.dat) at
    revision 0x1c;
  - Addition of cpuid:B06F6/0x07 microcode (in microcode.dat) at revision 0x38;
  - Addition of cpuid:B06F7/0x07 microcode (in microcode.dat) at revision 0x38;
  - Addition of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x21000291;
  - Removal of cpuid:806F4/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F4/0x10 microcode (in microcode.dat) at revision
    0x2c000390;
  - Removal of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) at
    revision 0x2c000390;
  - Removal of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:806F6/0x10 microcode (in microcode.dat) at revision
    0x2c000290;
  - Removal of cpuid:806F6/0x10 microcode (in microcode.dat) at revision
    0x2c000390;
  - Removal of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000290;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000390;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0004d0;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b0005c0;
  - Removal of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x35;
  - Removal of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x433;
  - Removal of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x123;
  - Removal of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4121;
  - Removal of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) at
    revision 0x4121;
  - Removal of cpuid:B06A8/0xe0 microcode (in microcode.dat) at revision
    0x4121;
  - Removal of cpuid:B06E0/0x11 (ADL-N A0) microcode (in microcode.dat) at
    revision 0x17;
  - Removal of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x21000230;
  - Update of cpuid:606A6/0x87 (ICX-SP D0) microcode (in microcode.dat) from
    revision 0xd0003e7 up to 0xd0003f5;
  - Update of cpuid:606C1/0x10 (ICL-D B0) microcode (in microcode.dat) from
    revision 0x10002b0 up to 0x10002c0;
  - Update of cpuid:806F4/0x10 microcode (in microcode.dat) from revision
    0x2c000390 up to 0x2c0003e0;
  - Update of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) from
    revision 0x2b0005c0 up to 0x2b000620;
  - Update of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) from
    revision 0x2c000390 up to 0x2c0003e0;
  - Update of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) from
    revision 0x2b0005c0 up to 0x2b000620;
  - Update of cpuid:806F6/0x10 microcode (in microcode.dat) from revision
    0x2c000390 up to 0x2c0003e0;
  - Update of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) from
    revision 0x2b0005c0 up to 0x2b000620;
  - Update of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) from
    revision 0x2b0005c0 up to 0x2b000620;
  - Update of cpuid:90675/0x07 (ADL-S 6+0 K0) microcode (in microcode.dat) from
    revision 0x35 up to 0x38;
  - Update of cpuid:906A4/0x40 (AZB A0) microcode (in microcode.dat) from
    revision 0x7 up to 0x9;
  - Update of cpuid:906A4/0x80 (ADL-P 2+8 R0) microcode (in microcode.dat) from
    revision 0x433 up to 0x436;
  - Update of cpuid:906EA/0x22 (CFL-H/S/Xeon E U0) microcode (in microcode.dat)
    from revision 0xf8 up to 0xfa;
  - Update of cpuid:906ED/0x22 (CFL-H/S/Xeon E R0) microcode (in microcode.dat)
    from revision 0x100 up to 0x102;
  - Update of cpuid:A0671/0x02 (RKL-S B0) microcode (in microcode.dat) from
    revision 0x62 up to 0x63;
  - Update of cpuid:A06A4/0xe6 (MTL-H/U C0) microcode (in microcode.dat) from
    revision 0x1e up to 0x20;
  - Update of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) from
    revision 0x4121 up to 0x4124;
  - Update of cpuid:B06A8/0xe0 microcode (in microcode.dat) from revision
    0x4121 up to 0x4124;
  - Update of cpuid:B06F2/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x35 up to 0x38;
  - Update of cpuid:B06F5/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x35 up to 0x38;
  - Update of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) from
    revision 0x21000230 up to 0x21000291;
- Remove old firmware versions: 06-8f-04, 06-8f-05, 06-8f-06, 06-ba-08;</summary>
    <pushcount>0</pushcount>
    <issued date="2025-05-20 11:17:24 UTC" />
    <updated date="2025-05-20 11:17:24 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1747739840.html" id="CLSA-2025:1747739840" title="CLSA-2025:1747739840" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="microcode_ctl" release="73.22.el7_9.tuxcare.els1" src="microcode_ctl-2.1-73.22.el7_9.tuxcare.els1.src.rpm" version="2.1">
          <filename>microcode_ctl-2.1-73.22.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2ebabfab6f329cb8f2786e14392654ced8bf3e1e5257a9a95c367a9a7fbdc5ab</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1747740986</id>
    <title>php: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-1217: fix handling of folded headers by the http stream parser
- CVE-2025-1734: fix validation of http headers with missing colon
- CVE-2025-1861: fix incorrect http redirect location truncation</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-1217: fix handling of folded headers by the http stream parser
- CVE-2025-1734: fix validation of http headers with missing colon
- CVE-2025-1861: fix incorrect http redirect location truncation</summary>
    <pushcount>0</pushcount>
    <issued date="2025-05-20 11:36:31 UTC" />
    <updated date="2025-05-20 11:36:31 UTC" />
    <references href="https://errata.tuxcare.com/centos7-els/CLSA-2025-1747740986.html" id="CLSA-2025:1747740986" title="CLSA-2025:1747740986" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">6280c406d4fe50e8f3477d813303fb34fcacf5b1361aebc4dc84544b0d022169</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">e7f300a5bfea71e7e6ee6cdf7211f75ee4a64b237c8cc18e4fda9a6d58ed254c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">78a78474728bcc1ee22f94f5f94b76d526a048f7798c38422a47b087c0db0229</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">28f300530c41959977ac3046a91f136f8507285315b2688d8eefd23146950189</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">9821528f61dc917d473894aad8f7fe26636a6f3a75b75db976183329f63c25a7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">2aa4f023c67134b023157b6766a790e934f6d1d4c2b82e93ae0ed0702b2d3208</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">78ec2ce797c204996836a5129f1f10e508b6bfa6d2f53527b7070363373d9333</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">f835cc1739852f0aeaaed5b6c0947b1014df7da186bea7429e2db180c790f307</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">42ebd42abe925a5a0a9bd57866a2b35886ad6afa484a5dfd4e918c7077fcd219</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">9000e3032ea7ee5b57388d88ac943df966c3a21fc86e0716ec189ad7ae5d88ed</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">6554b1f9881be40e3a5858f69a07fbfea67b5daa5be518904b47bccf4c2706fc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">33c174cdaba5e266d4b09db92d797a62a7795bff83aa12fed670a4cd080d11aa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">a2d105393ac620aeacbde611aa3479f3ce76a49bab8a1c5667eb7fb157b5f909</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">c589f461b6f81821358155bdc6633fc914eb6c098c3b52a34aaeae29500ca402</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">31e11c4a01a036cf49232f9f16b3a7a9118b25d380b3f3ab8b041d2c7d4682b2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">3d96cfb66b49ebfa7fcf36cf1a84710b304c88f95208065a750d92715ca7d06e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">88354b381a25b61c88952f3dd73912e3aa2dcf6f0f1cd4d52c0283b51f3eb2f6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">2b05e05b505c5a67d734ace95a3db4b4fc5090f6538b1e3923edd0b43e69c3e7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">5fe0b3a602a92eb2d2d4315016b971c08ac2d99b804b6c04ee1e0c3095971c85</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">ada1570e7ffe095829b12dba9af98c670d3829375bd15b6cb0c913a8230f7960</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">29a463e1c79fc8e599a752ffea180c328ba0d131c37e9bfff9f3ddd3a718d637</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">441bc676fae85b22808c7e9ae728bc471942e066171ce197aeac93f8cdf4f443</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">ab68f3e8199ef4a03f9dde7e815ed4d598bd0cefae3d988ed51e422f75841814</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">f92ffcc4782d97f9395e26be8c84f815007184adc415435f6d553308f8fad09b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els9" src="php-5.4.16-48.el7.tuxcare.els9.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">b87a5630af27de55428ec90366c66a2c8889bb76e51f6c4b73aab31931dfaf95</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1748629141</id>
    <title>Update of linux-firmware</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Addition AMD CPU microcode for processor family 0x19:
  cpuid:0x00A70FC0(ver:0x0A70C005), cpuid:0x00A70F52(ver:0x0A705206),
  cpuid:0x00A00F82(ver:0x0A00820C), cpuid:0x00A40F41(ver:0x0A404107),
  cpuid:0x00A70F80(ver:0x0A708007), cpuid:0x00A20F10(ver:0x0A20102D),
  cpuid:0x00A70F41(ver:0x0A704107), cpuid:0x00A60F12(ver:0x0A601209),
  cpuid:0x00A10F81(ver:0x0A108108), cpuid:0x00A50F00(ver:0x0A500011),
  cpuid:0x00A20F12(ver:0x0A201210);
- Addition AMD CPU microcode for processor family 0x17:
  cpuid:0x00870F10(ver:0x08701034), cpuid:0x00860F01(ver:0x0860010D),
  cpuid:0x00860F81(ver:0x08608108);
- Update AMD CPU microcode for processor family 0x17:
  cpuid:0x008A0F00(ver:0x08A0000A);</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Addition AMD CPU microcode for processor family 0x19:
  cpuid:0x00A70FC0(ver:0x0A70C005), cpuid:0x00A70F52(ver:0x0A705206),
  cpuid:0x00A00F82(ver:0x0A00820C), cpuid:0x00A40F41(ver:0x0A404107),
  cpuid:0x00A70F80(ver:0x0A708007), cpuid:0x00A20F10(ver:0x0A20102D),
  cpuid:0x00A70F41(ver:0x0A704107), cpuid:0x00A60F12(ver:0x0A601209),
  cpuid:0x00A10F81(ver:0x0A108108), cpuid:0x00A50F00(ver:0x0A500011),
  cpuid:0x00A20F12(ver:0x0A201210);
- Addition AMD CPU microcode for processor family 0x17:
  cpuid:0x00870F10(ver:0x08701034), cpuid:0x00860F01(ver:0x0860010D),
  cpuid:0x00860F81(ver:0x08608108);
- Update AMD CPU microcode for processor family 0x17:
  cpuid:0x008A0F00(ver:0x08A0000A);</summary>
    <pushcount>0</pushcount>
    <issued date="2025-05-30 18:19:06 UTC" />
    <updated date="2025-05-30 18:19:06 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1748629141.html" id="CLSA-2025:1748629141" title="CLSA-2025:1748629141" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="iwl100-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="39.31.5.1">
          <filename>iwl100-firmware-39.31.5.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">757eb12dc9b2e4874aae834b265583637697a74c2591e6b22f70dc09f9f53932</sum>
        </package>
        <package arch="noarch" epoch="1" name="iwl1000-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="39.31.5.1">
          <filename>iwl1000-firmware-39.31.5.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">62f570dc45da6280d791d95ec16437d1504c101243dfd8e4231f3afbf235a9a2</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl105-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="18.168.6.1">
          <filename>iwl105-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">7deb92c00d7803d1ac9b632676ba714c0489b385fef54c571f4a3949a009ea25</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl135-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="18.168.6.1">
          <filename>iwl135-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">0c8d0d2a3471e016b7278ec1493dc2c8e647d676a839f901686d19e2f7c29d3a</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2000-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="18.168.6.1">
          <filename>iwl2000-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">108f8a92c81a50fbc737725005fbe6b8aa5f60ffbc43f7da26276669d4b19a9b</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2030-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="18.168.6.1">
          <filename>iwl2030-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">a37ba91d8e934b56e6f76853f3c19cb4632b42b6110a815c24267a3cb325dd70</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3160-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="25.30.13.0">
          <filename>iwl3160-firmware-25.30.13.0-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">49ae22a4df0aa27aba4bb8ae85a12fb2eb1c395e8c5e92d4ae2d1cdbd1e053ee</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3945-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="15.32.2.9">
          <filename>iwl3945-firmware-15.32.2.9-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">55328759607a6401b377ff676d0e1168ec89f74c736778d2f6c3e038245b0267</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl4965-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="228.61.2.24">
          <filename>iwl4965-firmware-228.61.2.24-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">a29606797bcf67b8ba280ff47ae30e9957e982aa609848e8ac26138f56f8766c</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5000-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="8.83.5.1_1">
          <filename>iwl5000-firmware-8.83.5.1_1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">4f6bd6e66b386492d5e2998d56def8249a491342b53f51a6c3040608440b63d5</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5150-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="8.24.2.2">
          <filename>iwl5150-firmware-8.24.2.2-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">99198ce381c7af5255a919ec0b911e0edeac38f4b63057407e658615b047c12c</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="9.221.4.1">
          <filename>iwl6000-firmware-9.221.4.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">1471e5e62507529a8456cb1295a1d780aa388bf7b2f33f3b4b38ecaf78c68c5f</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2a-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2a-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">6521988301ca4c0cf48773a3d250053e1ef110d2e09f5effc839d007f667946a</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2b-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2b-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">027a60fa48d7d0e974baa3d4d34cd59a19997556fb4e0231773c53189fcd6584</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6050-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="41.28.5.1">
          <filename>iwl6050-firmware-41.28.5.1-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">361991f199c02add1a613752821d39c7aa148193d218364e13df4dc27973c345</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl7260-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="25.30.13.0">
          <filename>iwl7260-firmware-25.30.13.0-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">312bf17504a5b1f98f489b3500ede2cbb4c45d50b235abd1cb13e93d88f22bc3</sum>
        </package>
        <package arch="noarch" epoch="0" name="linux-firmware" release="83.git78c0348.el7_9.tuxcare.els3" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.src.rpm" version="20200421">
          <filename>linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">424f1790148607bbf6723bcc7c2158acf5e36a259a48ba876ed8cc5d96a94579</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1748629384</id>
    <title>Update of less</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Merge package with 458-10 release</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Merge package with 458-10 release</summary>
    <pushcount>0</pushcount>
    <issued date="2025-05-30 18:23:08 UTC" />
    <updated date="2025-05-30 18:23:08 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1748629384.html" id="CLSA-2025:1748629384" title="CLSA-2025:1748629384" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="less" release="10.el7_9.tuxcare.els1" src="less-458-10.el7_9.tuxcare.els1.src.rpm" version="458">
          <filename>less-458-10.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ae70f22786e16a07a1d1b6797e879082a72a785deac47a382f98f25f09223570</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1748629211</id>
    <title>java-11-openjdk: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to openjdk-11.0.27+6 (GA). The following CVEs were fixed:
- CVE-2025-21587: fix TLS connection support to avoid unauthorized
  access to critical data
- CVE-2025-30698: fix buffered image handling to avoid unauthorized
  access to accessible data
- CVE-2025-30691: improve compiler transformations to avoid unauthorized
  access to accessible data</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to openjdk-11.0.27+6 (GA). The following CVEs were fixed:
- CVE-2025-21587: fix TLS connection support to avoid unauthorized
  access to critical data
- CVE-2025-30698: fix buffered image handling to avoid unauthorized
  access to accessible data
- CVE-2025-30691: improve compiler transformations to avoid unauthorized
  access to accessible data</summary>
    <pushcount>0</pushcount>
    <issued date="2025-05-30 18:20:16 UTC" />
    <updated date="2025-05-30 18:20:16 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1748629211.html" id="CLSA-2025:1748629211" title="CLSA-2025:1748629211" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">afebf693e266b842ec61b582229d14371f1e510899db43b623ad02b4b3efe4ec</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">39d9cf99abf81c098d48361f6604e18abd46bd4a43fdb85535f8b259755e2cca</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-debug-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">da56128fed4d4e4c8113f0adcd96d12ae39199967c938fe9a94b1796cdb4fb6c</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-demo-11.0.27.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">238f2a55051a5b070a56aa2ad5eef5457b0477d246e31be968e46b252be063be</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-demo-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0920e5036c067d3983d6786c71f632cc98f06d2735c800a7e0ac46918f276037</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e6a025457e84abfe4c4a582d9cf449516d2f9edc1a019cf2549dcf3430ff60cb</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-devel-11.0.27.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">de7432137f238e6f33f3b6947e975b742894f5c1d7b0d1e1fa42be5b0846f2c9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-devel-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ad0c8883eac29907ec02427106bca4d7b0f458b8e2c79d2976ebc504e8badd12</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0b479e9ed817482a3eb0a65ada4017dbef494cc0d24fc1b9008e19f0d2c3064c</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-headless-11.0.27.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">826fa301e57ee110f481c1fb2e4ddde823f4221deb860ab6b2ce53e80d65257d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-headless-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">265b4ae89ddd574d8a42d4d8110b54cc3d0d3f0129a164ab32f2c8ad065e8c2c</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f29ad7fb3d0f227839fb2e7e8c768271429b659d83e309f70d78e04741e3e9c7</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-javadoc-11.0.27.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">b7833094c662cf43d3f78ee47142ac366c4c2aab735184c2a4e9b8e415654e99</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-javadoc-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">423233b45d20b0e300d6ccf6e22e7109451f8ce4ed7a6c99f9d1cf9e839254f3</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">84ed8ec8363a1f4539195840063fc0055376c23fe5bb4a239d4aef8efa14fb18</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e097bec0b2ec1f9811425b1b8f431d345bb46ca4b855d23385cb3d67a39cd495</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3ca461a84226040bf7f9ba00c8bf977840cdac7ea090d8697cad77e7c522e138</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">36684d145fc63d3ded24afca260169c8027e0717a954e83496aa74e166aca263</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-jmods-11.0.27.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">d087e2f2f2f80ee332808cbf8458c6fbc52100e0532d6c9fbec7c83540a2a3a6</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-jmods-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">67d7e7f8bbdb83bb34405fa316b03d81fe8155d1561915ac1ae341737b70a488</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5b5b12c814160d4ec77e165452314a00c025a275d92394ac4d844ed7d66e34b0</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-src-11.0.27.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">87a82a8b878d3ffb7a23352bee4df359379ab3621b311c824d422373feebec6c</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-src-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">789447890e1185cb0afc00ee913f11930df59c740d4d32822ff1eb07a8a3a91f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3bbad9d57e4e7f9f11acf25ea2ccc5c056253cf3fb5cd4c4197cacd78bea9be3</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-static-libs-11.0.27.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">53c9b0411632ef2b0f2b0e7a4a796113f928543717f161a872d8ed406c456c9a</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-static-libs-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cb73ae4652d09c0f7d6097d58232bdc22557cf9545511008559306ae65b9478b</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.27.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.27.0.6">
          <filename>java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7339c1618d67e3ed5b749c4178d0756e9462499cba101a8ed17647e15cee726f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1748967240</id>
    <title>sssd: Fix of CVE-2023-3758</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-3758: fix race condition in ad_gpo</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-3758: fix race condition in ad_gpo</summary>
    <pushcount>0</pushcount>
    <issued date="2025-06-03 16:14:05 UTC" />
    <updated date="2025-06-03 16:14:05 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1748967240.html" id="CLSA-2025:1748967240" title="CLSA-2025:1748967240" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libipa_hbac" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libipa_hbac-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">480da63c82d49e394c02948a995a126dd58f49ab59c6653379fd106f8fd554e9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libipa_hbac" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libipa_hbac-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">aac7fe87ca15fce9cdf673e38b38558d5760af901581a3f2e1b34a046022127b</sum>
        </package>
        <package arch="i686" epoch="0" name="libipa_hbac-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libipa_hbac-devel-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">fb791b5a32ea409fcae8ab8f24026f62910324cefb15b3c28726500ac06a8f9c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libipa_hbac-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libipa_hbac-devel-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">03bcb13cd9d21ea3ba2f36c52e96437d26ebbe777fcd007792c723773ba63b2f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_autofs" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_autofs-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ad87d37d5a7fa08ae3017eb25f9c2f975e281ac1979a14ac0bf7366ea1bd667f</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_certmap" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_certmap-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">5b41edac85fd0956b4f6057914fb342f456a650ead81de700691c4d89607572f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_certmap" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_certmap-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">50b2915cd70c59cd35790cd070ef93b6481e3e70b8d47b4f593bee758ae1804f</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_certmap-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_certmap-devel-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">d34d0a07dda773ed1ae7ee85d76f9937af15f870ded8b435e9096e3a2460d693</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_certmap-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_certmap-devel-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">da6991126ce32d741d0b2c0fc52cb4a98916ac0741c5e1bd350bb439206af533</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_idmap" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_idmap-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">2b49f8f6879593f5cf11f65d42ef5ccdfb207344c09ab843b72e2c1e739e22f2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_idmap" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_idmap-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f898a375a21bcff83f87bf3c002ee3c2240c722ea5e2bc28b02cbc52fe7b5fc5</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_idmap-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_idmap-devel-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">9550ac72a86ed32c4d930d5a6f820dc5593260a2014a8ab780cb418f87400fa6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_idmap-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_idmap-devel-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d1cf5a92cb440c8bf72a6518c035cb287f7adb8ea0fc6c4ebff0a0f3b758bb68</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_nss_idmap" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_nss_idmap-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">fefbfb1eddaef5fd4097c3089e4a5aa91985f18802ee08eadd7e5b63c9efac29</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_nss_idmap" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_nss_idmap-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b4da7eeca55268d42a7377b66c9feee419069dd2e46c0098adb91dea08c29abb</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_nss_idmap-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">256541c4cd1c90a0c95093557e53e817c3b0d55a75eb8d106ebfc0aa0444371f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_nss_idmap-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a1a40003dbf68e64bd89d25b5d1de4e7f6a9df45cf94eab6989164c8a7a82cca</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_simpleifp" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_simpleifp-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">7d6322e13c3631d77b2241da5c3f007e34e8a5eea47cda782dcabd012bf44620</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_simpleifp" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_simpleifp-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3814c606f6a98d44eb69d855ed7b998fa35ebc0e25412fa784d3543e5b1d7adc</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_simpleifp-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_simpleifp-devel-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e8742c6c7dc85eb823b04921b364caf11450f4bd689df8b26334a1970edf72be</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_simpleifp-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_simpleifp-devel-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4bd35b52da342ad7394528fc77465749454d7da8bf5de67559f776293fd45a07</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_sudo" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_sudo-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a9d03d9589bfc746532e6463029ac758406bb31770da2be59f94fd510eb639e9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libipa_hbac" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-libipa_hbac-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f34009422329c6b6716c44fe93dc818450929ef3271bfab467b445e9cb346412</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libsss_nss_idmap" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-libsss_nss_idmap-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">608064819ded8cef448041b23f47cdd53cbec1cc87c967e0a05eb67045618e8e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-sss" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-sss-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">9884ebe4f56a820b13b854f41e9c53e8bc9455e5372e8a78fd72bf39e3a1d96f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-sss-murmur" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-sss-murmur-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6504e4a5f450eb51aeba0c642e8939d2cfcb5eabe4a292f25507977daa70e4dd</sum>
        </package>
        <package arch="noarch" epoch="0" name="python-sssdconfig" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-sssdconfig-1.16.5-10.el7_9.16.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">a88f8d5a69bc3ab5467d97561f2686caebd13f1983a6d4eb6db0a5429ab17f49</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fafe5385f0970153b5a0b11894ad7041a56bee2a4339f6d6f652215a75d650fe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-ad" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-ad-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2f02db60d83beb921d256536ae7cbfea60210e97e562740d6b791cdc91699d5c</sum>
        </package>
        <package arch="i686" epoch="0" name="sssd-client" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-client-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">0fee6e9ad8d40562c28c35816c4629567b56eeb08dbb656ec783dcbc477c7f6c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-client" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-client-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">431153919d3fb11310ccb6f891c8596e973340cf1484886431b163453302a244</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-common" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-common-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">22782a675fcb2e4f926b8a6cac2600f66fda34d7b506be1d88854f67e2887bfb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-common-pac" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-common-pac-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4bbe4e818c41ccdc32a0da5fdbc6a6a897165068acd34e998a06d0b3319aa7c9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-dbus" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-dbus-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">68ec969bd011b90b8a4eb5060b0ac4d5b1b0bf4595ffe8b9967bb819eee9b85e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-ipa" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-ipa-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">31d75b5570265c6ab464398085fa56e2f1eb109ae2c49330ac38433b7a88e64d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-kcm" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-kcm-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d4ade62498fe3c6219fb5c2803847849d42c048469f1914d0cca8138a8b962e2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-krb5" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-krb5-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">670df2903e2a622299f14df9ffbbb74bf5e1e4a07765ff7177465548dfad69d4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-krb5-common" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-krb5-common-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">715d9f1cd6c973ebde891bfebd73a89d13702e5e94ab284960685af5e564d184</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-ldap" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-ldap-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7ef69da9f35527892cab471f558852ddf72bb18dfbd16bb52e946ade3e9367b0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-libwbclient" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-libwbclient-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2048cf4d946256e93e5299ded33dce87c2e2be548c2f5c3fc4c137f13f20ad1d</sum>
        </package>
        <package arch="i686" epoch="0" name="sssd-libwbclient-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-libwbclient-devel-1.16.5-10.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">33aba6a983221f50e8487dbbbb54fa5da805ec752fa0f911a9205a2e4fa10d4b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-libwbclient-devel" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-libwbclient-devel-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5e1e04922bf5c466cbb93987a3a1ab8abae98c897f21c377e5acc01016a1550e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-polkit-rules" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-polkit-rules-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">846219f0325e9455d8a666bb32465f8160c37ac7b4b615d1367a3ff514971e52</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-proxy" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-proxy-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1b2d8a712ae1e949ae3dea2c8d17bae14198a37f371f4eabf9c120edfd4aa38c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-tools" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-tools-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e578da62aff3ed9f9d32a94bfcfe615f84f3ee549176ea34162d4b2a87489c17</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-winbind-idmap" release="10.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-winbind-idmap-1.16.5-10.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">97d48420caab7968b002f921d60fd1ea2b9bdba9b3b08e9472aeff64f8bd44d2</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1750176020</id>
    <title>kernel: Fix of 6 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- pfifo_tail_enqueue: Drop new packet when sch-&gt;limit == 0 {CVE-2025-21702}
- xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014}
- netfilter: validate user input for expected length {CVE-2024-35896}
- nfs: fix UAF in direct writes {CVE-2024-26958}
- Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982}
- RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- pfifo_tail_enqueue: Drop new packet when sch-&gt;limit == 0 {CVE-2025-21702}
- xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014}
- netfilter: validate user input for expected length {CVE-2024-35896}
- nfs: fix UAF in direct writes {CVE-2024-26958}
- Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982}
- RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-06-17 16:00:25 UTC" />
    <updated date="2025-06-17 16:00:25 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1750176020.html" id="CLSA-2025:1750176020" title="CLSA-2025:1750176020" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">3ab5bf2d1b1c87a0c44e4696903b94dfe7955437271a4311b30fb5a03bd16e0f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">05abeae66d5430c72d6b715219f575f5542c371b159f46117b0192915b806d3b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">c240cd0dfd329ec63d1788bed8f8280dea600af322e018af4a600600069a0daa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">7148e193f38f1614698a05e4bbeea1e2023a140e207fafa5577fd8e323582eac</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">406e09f344aa0efdb2800513cb41302590b72b1e56cf1f65d0dd4a32258b0c5d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">799cc396b5865b88c37f971559ce257bcb9e461a0e3eab81b3ed31cfee180911</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">65134a0dd2b1b99308466c07daf6744fef11c2d8ac40fb5bc49b90123480388a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">56ff02d4af1ae6ad7e1156839d220de411ede0c6092c6a742db2657e676a2aa6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">4a1d816d0c69370895407309bef2a6d06134c648b38bd4f638233b2a76b7b7ca</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">c9d4f84bdb6323e6bc05f1f9f72eb32336011dc421b68163d455b290fdefb526</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els21" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els21.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm</filename>
          <sum type="sha256">4da41b83e6e210369abec3efab0fa918d4515bb80cf0c2c8c2de7123bc8e19e1</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1750953703</id>
    <title>Update of tzdata</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to tzdata-2025b
  - New zone for Aysén Region in Chile which moves from -04/-03 to -03.
  - Paraguay adopted permanent -03 starting spring 2024.
  - Improve pre-1991 data for the Philippines.
  - Etc/Unknown is now reserved.
  - Improve historical data for Mexico, Mongolia, and Portugal.
  - System V names are now obsolescent.
  - The main data form now uses %z.
  - The code now conforms to RFC 8536 for early timestamps.
  - Support POSIX.1-2024, which removes asctime_r and ctime_r.
  - Assume POSIX.2-1992 or later for shell scripts.
  - SUPPORT_C89 now defaults to 1.
- Include leap-seconds.list in tzdata install.</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to tzdata-2025b
  - New zone for Aysén Region in Chile which moves from -04/-03 to -03.
  - Paraguay adopted permanent -03 starting spring 2024.
  - Improve pre-1991 data for the Philippines.
  - Etc/Unknown is now reserved.
  - Improve historical data for Mexico, Mongolia, and Portugal.
  - System V names are now obsolescent.
  - The main data form now uses %z.
  - The code now conforms to RFC 8536 for early timestamps.
  - Support POSIX.1-2024, which removes asctime_r and ctime_r.
  - Assume POSIX.2-1992 or later for shell scripts.
  - SUPPORT_C89 now defaults to 1.
- Include leap-seconds.list in tzdata install.</summary>
    <pushcount>0</pushcount>
    <issued date="2025-06-26 16:01:47 UTC" />
    <updated date="2025-06-26 16:01:47 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1750953703.html" id="CLSA-2025:1750953703" title="CLSA-2025:1750953703" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="tzdata" release="1.el7.tuxcare.els1" src="tzdata-2025b-1.el7.tuxcare.els1.src.rpm" version="2025b">
          <filename>tzdata-2025b-1.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">d5fd7f6cb1721730ec1bbbc27ef7bd1415969305aeacd8237407c4c6a97b3836</sum>
        </package>
        <package arch="noarch" epoch="0" name="tzdata-java" release="1.el7.tuxcare.els1" src="tzdata-2025b-1.el7.tuxcare.els1.src.rpm" version="2025b">
          <filename>tzdata-java-2025b-1.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">f84aa25020084f869347100f6efe89978b1b3af1ec413a43e10d35c9b585574a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1751143694</id>
    <title>libarchive: Fix of CVE-2025-5914</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-5914: fix double free with over 4 billion nodes</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-5914: fix double free with over 4 billion nodes</summary>
    <pushcount>0</pushcount>
    <issued date="2025-06-28 20:48:19 UTC" />
    <updated date="2025-06-28 20:48:19 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1751143694.html" id="CLSA-2025:1751143694" title="CLSA-2025:1751143694" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bsdcpio" release="14.el7_7.tuxcare.els1" src="libarchive-3.1.2-14.el7_7.tuxcare.els1.src.rpm" version="3.1.2">
          <filename>bsdcpio-3.1.2-14.el7_7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0ab2d21b8db6dadc3edbc16b54b8a5ade78f8a783881b868037ce1df814196d6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="bsdtar" release="14.el7_7.tuxcare.els1" src="libarchive-3.1.2-14.el7_7.tuxcare.els1.src.rpm" version="3.1.2">
          <filename>bsdtar-3.1.2-14.el7_7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">524273ab7bedc39b8d4859c891f4dfafa66859d16979a48ea4340220dc365ff7</sum>
        </package>
        <package arch="i686" epoch="0" name="libarchive" release="14.el7_7.tuxcare.els1" src="libarchive-3.1.2-14.el7_7.tuxcare.els1.src.rpm" version="3.1.2">
          <filename>libarchive-3.1.2-14.el7_7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">7e17707d6b8366075c5dd88e8a0f2729eeef38c11499a28b605692ed201c6840</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libarchive" release="14.el7_7.tuxcare.els1" src="libarchive-3.1.2-14.el7_7.tuxcare.els1.src.rpm" version="3.1.2">
          <filename>libarchive-3.1.2-14.el7_7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0c6bdf0d07d763259df5f63e551dfca3f69db567ab0a82dc46fe53335cf52ff7</sum>
        </package>
        <package arch="i686" epoch="0" name="libarchive-devel" release="14.el7_7.tuxcare.els1" src="libarchive-3.1.2-14.el7_7.tuxcare.els1.src.rpm" version="3.1.2">
          <filename>libarchive-devel-3.1.2-14.el7_7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e7d678dabfd0ffc92fe2dbc4166156b3c8586537e1d4bd0d67feba43fa6670ed</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libarchive-devel" release="14.el7_7.tuxcare.els1" src="libarchive-3.1.2-14.el7_7.tuxcare.els1.src.rpm" version="3.1.2">
          <filename>libarchive-devel-3.1.2-14.el7_7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2932138b5dfd08c00d09638a724a9619baa5e9697f6785f18ec805558aff8a6d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1751271968</id>
    <title>openssl: Fix of CVE-2019-1563</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2019-1563: fix information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey</description>
    <severity>Low</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2019-1563: fix information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey</summary>
    <pushcount>0</pushcount>
    <issued date="2025-06-30 08:26:13 UTC" />
    <updated date="2025-06-30 08:26:13 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1751271968.html" id="CLSA-2025:1751271968" title="CLSA-2025:1751271968" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="openssl" release="26.el7_9.tuxcare.els4" src="openssl-1.0.2k-26.el7_9.tuxcare.els4.src.rpm" version="1.0.2k">
          <filename>openssl-1.0.2k-26.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">c492099f5ba0637a114062ddeab99a68f632f0f3955fd2e3500387365aca9458</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els4" src="openssl-1.0.2k-26.el7_9.tuxcare.els4.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">c44f515a6be48bc622fcf16139a2601a86170f2d7a63636eabb524fc075a1ea1</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els4" src="openssl-1.0.2k-26.el7_9.tuxcare.els4.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">9231ff154f04c0ef5e82387f8399aa84ca21fb719be32afa5ad5929a2f3bd622</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els4" src="openssl-1.0.2k-26.el7_9.tuxcare.els4.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">a8816d45964a7323853dbfd9b1ab8c199af895b748ea0b1f52ebc76376bb2bf3</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els4" src="openssl-1.0.2k-26.el7_9.tuxcare.els4.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">3f450b513a68fd25c9e43337c2c69ad448f2b5bdb35357d3a1dcafed5cf462b9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-perl" release="26.el7_9.tuxcare.els4" src="openssl-1.0.2k-26.el7_9.tuxcare.els4.src.rpm" version="1.0.2k">
          <filename>openssl-perl-1.0.2k-26.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">2edd015ed666bdbdcfd3f650fea3e08888bb73c79dd858e5840f309cbaf0c90c</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els4" src="openssl-1.0.2k-26.el7_9.tuxcare.els4.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">9c2329394aef5744872c333a0839e0779dc7bd46aa90496251da3f544c812f02</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els4" src="openssl-1.0.2k-26.el7_9.tuxcare.els4.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">3847b8d721d2b638950affa839dc692cdaf50d01fbeda035459624dd5953a1a9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1751271625</id>
    <title>httpd: Fix of CVE-2020-35452</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2020-35452: mod_auth_digest: Fix single zero byte stack overflow</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2020-35452: mod_auth_digest: Fix single zero byte stack overflow</summary>
    <pushcount>0</pushcount>
    <issued date="2025-06-30 08:20:30 UTC" />
    <updated date="2025-06-30 08:20:30 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1751271625.html" id="CLSA-2025:1751271625" title="CLSA-2025:1751271625" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.0.5.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">85acffc05cb1bc1bcf599225fbe90864fd781784bc8ead25aa968ecbf4c804e7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.0.5.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">95d9f44ca5664c4b54504dbcbb27736df1331b60ab67b016c5c656a10beb2b86</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.0.5.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">e93886d9dbc0d650225237ef6965e73314a098f377c5bff10970e2e3bc671dc3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.0.5.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">cd723f726f77573d00b5d839175271eaa9f9cc381990a174016dcf64615b180b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.0.5.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">7ad54f972efe561bf8cfb479ac37a3f64d792e5e5d8b0e824dcec1a669d8f839</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.0.5.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">1751aece546fb1956f6b6a63c36a580382b9f36223331dbee5b0e9182e2c3b64</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.0.5.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">6a808573d6b9169a758ca5495e54d449edc9fce71b04b95080b06570b089a626</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.0.5.el7.centos.1.tuxcare.els4" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.0.5.el7.centos.1.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">30bd8617da85e50cbb13554bf7a22b090a880701e49683f0eae9d8e5ff13df51</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1752126372</id>
    <title>libsoup: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-32906: fix out-of-bound read vulnerability
- CVE-2025-32911: fix use-after-free vulnerability
- CVE-2025-32913: fix NULL pointer dereference</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-32906: fix out-of-bound read vulnerability
- CVE-2025-32911: fix use-after-free vulnerability
- CVE-2025-32913: fix NULL pointer dereference</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-10 05:46:17 UTC" />
    <updated date="2025-07-10 05:46:17 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1752126372.html" id="CLSA-2025:1752126372" title="CLSA-2025:1752126372" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libsoup" release="2.0.1.el7.tuxcare.els4" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els4.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.1.el7.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">9a36ffefb62bd97b3e56d8d1f0c2ceea0820fd547c2cccf95b2bccb054b694ea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup" release="2.0.1.el7.tuxcare.els4" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els4.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">6dc2d9b21d2d8e9e529a93da99e29c72c4f2c6304063e8c546f3d4372007d359</sum>
        </package>
        <package arch="i686" epoch="0" name="libsoup-devel" release="2.0.1.el7.tuxcare.els4" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els4.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.1.el7.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">e69a6a070b6bc5118bbd886752aeda419baf53fb4e53cd68e4adf26605df59f7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup-devel" release="2.0.1.el7.tuxcare.els4" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els4.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">685237f300653856fe6a9a73e7d743596710913dbf95ee89c2b1efd44fed5810</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1752126532</id>
    <title>httpd: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2014-8109: mod_lua: fix LuaAuthzProvider argument handling issue
- CVE-2019-10092: mod_proxy: fix limited cross-site scripting in mod_proxy error page</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2014-8109: mod_lua: fix LuaAuthzProvider argument handling issue
- CVE-2019-10092: mod_proxy: fix limited cross-site scripting in mod_proxy error page</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-10 05:48:57 UTC" />
    <updated date="2025-07-10 05:48:57 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1752126532.html" id="CLSA-2025:1752126532" title="CLSA-2025:1752126532" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.0.5.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">30b74e09dc00ff187b85dc8cfbe7aadfb90699ee8b1d4246e2089c7c81807c3f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.0.5.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">9b1bd17a8aeffabe2a2d6716abc1021251ffb674ef95782376e82bb59f88dd78</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.0.5.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">516e27aa58957973043f9e6c7275d6e5670bf15c6c8b20aca0c790b736391d6b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.0.5.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">97f48efce36bdca8fe5c923b87ee7fdb60682dc6fae3e2677384b8a3ce77e4f7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.0.5.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">509cbfd5dc2a3c58ecd902f62ba397cf70ce26a345a6945d1ec8901fdd9dd1ee</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.0.5.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">d3c57a7eec4156f520340521407be8af16a8d5d20a623862d62d2c00ebd5822e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.0.5.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">540f74cb5b072e2c68cb1b8376474ef5d0897b7c754880ac2c4717f5d7e1b268</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.0.5.el7.centos.1.tuxcare.els5" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.0.5.el7.centos.1.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">810eef8766ab8afd3991b1f747410c9c181da9a771429225242006283e023d2b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1751900234</id>
    <title>sudo: Fix of CVE-2025-32462</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-32462: fix privilege escalation vulnerability by restricting
  unauthorized users from gaining elevated system privileges via the Sudo host
  option</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-32462: fix privilege escalation vulnerability by restricting
  unauthorized users from gaining elevated system privileges via the Sudo host
  option</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-07 14:57:19 UTC" />
    <updated date="2025-07-07 14:57:19 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1751900234.html" id="CLSA-2025:1751900234" title="CLSA-2025:1751900234" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="sudo" release="10.el7_9.3.tuxcare.els3" src="sudo-1.8.23-10.el7_9.3.tuxcare.els3.src.rpm" version="1.8.23">
          <filename>sudo-1.8.23-10.el7_9.3.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">8b19fd2844f6f74416fef6c20005f7db40f62466683c8d1edc34c84f542fbb3d</sum>
        </package>
        <package arch="i686" epoch="0" name="sudo-devel" release="10.el7_9.3.tuxcare.els3" src="sudo-1.8.23-10.el7_9.3.tuxcare.els3.src.rpm" version="1.8.23">
          <filename>sudo-devel-1.8.23-10.el7_9.3.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">9acb45a5085a0e34e2b83aee7fe3cdc53d0195fe2e5809b1e94e459c2e320657</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sudo-devel" release="10.el7_9.3.tuxcare.els3" src="sudo-1.8.23-10.el7_9.3.tuxcare.els3.src.rpm" version="1.8.23">
          <filename>sudo-devel-1.8.23-10.el7_9.3.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">1d0f3c5dba805a07c0c0faa0a7a072221802788b9187adb55db8fec6c8953712</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1752086731</id>
    <title>Update of ca-certificates</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- update to CKBI 2.74 from NSS 3.110
- updated certificates:
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Entrust Root Certification Authority"
-     # Certificate "AffirmTrust Commercial"
-     # Certificate "AffirmTrust Networking"
-     # Certificate "AffirmTrust Premium"
-     # Certificate "AffirmTrust Premium ECC"
-     # Certificate "Entrust Root Certification Authority - G2"
-     # Certificate "Entrust Root Certification Authority - EC1"
-     # Certificate "certSIGN ROOT CA"
-     # Certificate "ACCVRAIZ1"
-     # Certificate "Entrust Root Certification Authority - G4"
-     # Certificate "Security Communication ECC RootCA1"
-     # Certificate "BJCA Global Root CA1"
-     # Certificate "BJCA Global Root CA2"
- removed certificates:
-     # Certificate "CCA India 2015 SPL"
-     # Certificate "VAS Latvijas Pasts SSI(RCA)"
- added certificates:
-     # Certificate "TWCA CYBER Root CA"
-     # Certificate "TWCA Global Root CA G2"
-     # Certificate "SecureSign Root CA12"
-     # Certificate "SecureSign Root CA14"
-     # Certificate "SecureSign Root CA15"
-     # Certificate "D-TRUST BR Root CA 2 2023"
-     # Certificate "D-TRUST EV Root CA 2 2023"
- removed unsupported certificates:
-     # Certificate "Verisign Class 1 Public Primary Certification Authority-G3"
-     # Certificate "Verisign Class 2 Public Primary Certification Authority-G3"
-     # Certificate "Symantec Class 1 Public Primary Certification Authority-G6"
-     # Certificate "Symantec Class 2 Public Primary Certification Authority-G6"</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- update to CKBI 2.74 from NSS 3.110
- updated certificates:
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Entrust Root Certification Authority"
-     # Certificate "AffirmTrust Commercial"
-     # Certificate "AffirmTrust Networking"
-     # Certificate "AffirmTrust Premium"
-     # Certificate "AffirmTrust Premium ECC"
-     # Certificate "Entrust Root Certification Authority - G2"
-     # Certificate "Entrust Root Certification Authority - EC1"
-     # Certificate "certSIGN ROOT CA"
-     # Certificate "ACCVRAIZ1"
-     # Certificate "Entrust Root Certification Authority - G4"
-     # Certificate "Security Communication ECC RootCA1"
-     # Certificate "BJCA Global Root CA1"
-     # Certificate "BJCA Global Root CA2"
- removed certificates:
-     # Certificate "CCA India 2015 SPL"
-     # Certificate "VAS Latvijas Pasts SSI(RCA)"
- added certificates:
-     # Certificate "TWCA CYBER Root CA"
-     # Certificate "TWCA Global Root CA G2"
-     # Certificate "SecureSign Root CA12"
-     # Certificate "SecureSign Root CA14"
-     # Certificate "SecureSign Root CA15"
-     # Certificate "D-TRUST BR Root CA 2 2023"
-     # Certificate "D-TRUST EV Root CA 2 2023"
- removed unsupported certificates:
-     # Certificate "Verisign Class 1 Public Primary Certification Authority-G3"
-     # Certificate "Verisign Class 2 Public Primary Certification Authority-G3"
-     # Certificate "Symantec Class 1 Public Primary Certification Authority-G6"
-     # Certificate "Symantec Class 2 Public Primary Certification Authority-G6"</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-09 18:45:36 UTC" />
    <updated date="2025-07-09 18:45:36 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1752086731.html" id="CLSA-2025:1752086731" title="CLSA-2025:1752086731" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="ca-certificates" release="72.el7_9.tuxcare.els1" src="ca-certificates-2025.2.74_v7.0.306-72.el7_9.tuxcare.els1.src.rpm" version="2025.2.74_v7.0.306">
          <filename>ca-certificates-2025.2.74_v7.0.306-72.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">93f72cf118d75b90cca5583de7f16e9a804e1cc2cacc2e28bf7601a73c80b04c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1752091182</id>
    <title>Update of tzdata</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fix incorrect tzdb.dat by harding links</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fix incorrect tzdb.dat by harding links</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-10 11:39:41 UTC" />
    <updated date="2025-07-10 11:39:41 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1752091182.html" id="CLSA-2025:1752091182" title="CLSA-2025:1752091182" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="tzdata" release="1.el7.tuxcare.els2" src="tzdata-2025b-1.el7.tuxcare.els2.src.rpm" version="2025b">
          <filename>tzdata-2025b-1.el7.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">adb4f514588b2d5402427ed22c83920d677a9de2d59f2185c7792c734a3f355c</sum>
        </package>
        <package arch="noarch" epoch="0" name="tzdata-java" release="1.el7.tuxcare.els2" src="tzdata-2025b-1.el7.tuxcare.els2.src.rpm" version="2025b">
          <filename>tzdata-java-2025b-1.el7.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">0c44c7e54838f9a29254befe624f3092d0091de1681c8d443f7d5ceb506a1adb</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1752655814</id>
    <title>git: Fix of CVE-2025-48384</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-48384: config: quote values containing CR character</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-48384: config: quote values containing CR character</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-16 08:50:19 UTC" />
    <updated date="2025-07-16 08:50:19 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1752655814.html" id="CLSA-2025:1752655814" title="CLSA-2025:1752655814" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="emacs-git" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>emacs-git-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">88fc9edd8210646f6baa6d83eee6bc60093e0f06d9825f085a9a4fbcf41ba54b</sum>
        </package>
        <package arch="noarch" epoch="0" name="emacs-git-el" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>emacs-git-el-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">e5f177a67874aa77f00a1cbf4474a73554bb95e1eddd4b1dd154eba6d0952916</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-1.8.3.1-25.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a407822561bab36d2c25e4c196e035009b771218962aa80e0e97c94254166e8e</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-all" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-all-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">e72251a99e0292cd22b2a9291f063d1795d9d69b67a6873aa1821e6d46bc92ef</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-bzr" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-bzr-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">12c799cb40137ccbd7e0e259d86c6d56cbfd864069bae8ae7511d273319e06b4</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-cvs" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-cvs-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">108a101b51c8c6baa9e51fad7c932aa6c9b0934e957131334bca2853f3830e27</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-daemon" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-daemon-1.8.3.1-25.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">aa599bc29ec0ec6395dc5525b114006f3c5e0f0b3c941a735817c52bf7e701ab</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-email" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-email-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">9b8503903c1b88353ce1f38d5e7ab47e96c15249d1956cc01f89d615f7f88ee7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-gnome-keyring" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-gnome-keyring-1.8.3.1-25.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">47d47038bd89a0fcc8888602f546483f66c3d9b5468569e7289d972cbe46987c</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-gui" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-gui-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">e7b98e3787eaae955d8a3467ce1d1a3045c6502f2dc02164590fa2203ec082d6</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-hg" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-hg-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">33b812108145fa3f816ec8afa9932e340db7038dc9bcfe7a03e950e99e7b38ed</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-instaweb" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-instaweb-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">62b267469a9810707ea01dd0f2fe32b5febbbab3d0ade684c5d5c1517ff477ce</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-p4" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-p4-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">21278657b0e391fb7f6360758235f6b94ab2557df82e5e649fa1f0a733db91bb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-svn" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>git-svn-1.8.3.1-25.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">314288b5bffdd768fdebe3ffeb04f748d3a966b39478dd4f8ab15675691f72f5</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitk" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>gitk-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">c626d415f539f357c1067207a1574fe9718f4f40a16984900ab3090949b95c22</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitweb" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>gitweb-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">e56875e51316b1c846e40b8b2c1f02f8ccfb1bd30788322099d14d715460fde5</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>perl-Git-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">cd569054d0c4057b7b79308cd93bde09c5e62f436f878fc9e087f901cab2a8ae</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git-SVN" release="25.el7_9.tuxcare.els4" src="git-1.8.3.1-25.el7_9.tuxcare.els4.src.rpm" version="1.8.3.1">
          <filename>perl-Git-SVN-1.8.3.1-25.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">9a5d6000886e2a91293a886c3ff412adbe26a909fd16633d0ec6790094579b90</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1753131065</id>
    <title>libsoup: Fix of 7 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-32050: fix overflow in append_param_quoted()
- CVE-2025-32052: fix heap buffer overflow in soup_content_sniffer_sniff()
- CVE-2025-32053: fix heap buffer overflow in sniff_feed_or_html()
- CVE-2025-32907: soup-message-headers: correct merge of ranges
- CVE-2025-46420: fix leak in soup_header_parse_quality_list()
- CVE-2025-46421: strip authentication credentails on cross-origin redirect
- CVE-2025-2784: fix heap buffer over-read when sniffing content via the
  skip_insight_whitespace() function</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-32050: fix overflow in append_param_quoted()
- CVE-2025-32052: fix heap buffer overflow in soup_content_sniffer_sniff()
- CVE-2025-32053: fix heap buffer overflow in sniff_feed_or_html()
- CVE-2025-32907: soup-message-headers: correct merge of ranges
- CVE-2025-46420: fix leak in soup_header_parse_quality_list()
- CVE-2025-46421: strip authentication credentails on cross-origin redirect
- CVE-2025-2784: fix heap buffer over-read when sniffing content via the
  skip_insight_whitespace() function</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-21 20:51:09 UTC" />
    <updated date="2025-07-21 20:51:09 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1753131065.html" id="CLSA-2025:1753131065" title="CLSA-2025:1753131065" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libsoup" release="2.0.1.el7.tuxcare.els5" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els5.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.1.el7.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">77b504701139e34061d0cfd9383d6921ef51f49320d1b3d5729e44ef81b0b7e9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup" release="2.0.1.el7.tuxcare.els5" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els5.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">27512ab8563eac07e856f997c07025e9481bd47b551ae6320173a6bf7842e26b</sum>
        </package>
        <package arch="i686" epoch="0" name="libsoup-devel" release="2.0.1.el7.tuxcare.els5" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els5.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.1.el7.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">4f0c4e830eddbcdac5578940bfa64cb5b00c6bd353ed55d36037b7ce70528f5b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup-devel" release="2.0.1.el7.tuxcare.els5" src="libsoup-2.62.2-2.0.1.el7.tuxcare.els5.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.1.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">25ca687df8581c2d3828d055d4790203e0dd0972ba09f0337121ff782e8aecb1</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1753131177</id>
    <title>libblockdev: Fix of CVE-2025-6019</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-6019: don't allow suid and dev set on fs resize</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-6019: don't allow suid and dev set on fs resize</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-21 20:53:02 UTC" />
    <updated date="2025-07-21 20:53:02 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1753131177.html" id="CLSA-2025:1753131177" title="CLSA-2025:1753131177" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libblockdev" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">58846fd8ca3eb217f14600d41277d74e5147ab68b281c3cc66a775a2acd56503</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1f97017e3c73f8327949e9a6b1e7046006d968d0a57dbbeb3f7f8dc63aeca2e4</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-btrfs" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-btrfs-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">01812470d177010dfaf7ec3bc8f1b8026e4a54b53b94d58257b21d3727b995f2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-btrfs" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-btrfs-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0248ed2e2bc5262062290316487c8b49d2cad8ac34bf34eabbbc67ed5436cfbf</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-btrfs-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-btrfs-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">7e9add6cd293f8966463f2be6b0f7578f15c29ab4df41079ed75ba7c77c6fa47</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-btrfs-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-btrfs-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e31d24d80707483ab67df45e522e47d111437a96db3668cf3493486a34bb613e</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-crypto" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-crypto-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">a6a5f5573c402397fd11468ccfa9ad2c09bb9c6010ee5ca0f3282cd1d708cb5f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-crypto" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-crypto-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">81965a3d6151748af4f76f8ee67757680ed2665a7a64541d0e9508905d78f34e</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-crypto-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-crypto-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">a17be672a79262f1367d850a99dc6b254739619bb532bd02b9c845916015612d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-crypto-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-crypto-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0d981d3f459ee9b9f5b4037220dbeae25253f50f4f892caed1423723383d8254</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">8c5c53d9f88cd0e2e0cd80c4e5bd4eac748c76fa3db32e581f290b5740d9d9c8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ef703c964304d402f0f55d917e97ae2cfcf74146007d2ad034a2710d27e05f6b</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-dm" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-dm-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">530477081a552af2b611ab6312b340a936c0e4fc9ff09dd3d9b94306f0db22f0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-dm" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-dm-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">64cb2e522d58174842a083f213554a06c93e427d3ae351cf599becb29575c9cd</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-dm-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-dm-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">21b53fde9485f67c2a591033ce387fe524cda6009907181bd3db80094a821a24</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-dm-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-dm-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ab65768bbbc4a9644b37072532dd821d98c90c522332aa2896e87d704ecbf3dd</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-fs" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-fs-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">68e5e95d33e515f53023f0c25188bde5b188ce9b6eed42ca4d5a55804c6f070e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-fs" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-fs-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6298c9fd916d2c91b12bebf6932e37d718da4b317c22202a57e2ef544b62d0d7</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-fs-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-fs-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">64358e96bb06781724bc19f5c6ab365afca6dc535391184a878045e49ef3a4cf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-fs-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-fs-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">99569874f0221abf15a162a9bac6be31ee70d1d1a9920aaf9f19c171e8481094</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-kbd" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-kbd-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">671de97e6c15ce7e74edb32568be883cebe328f74ec84986cde76b4031a8ccff</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-kbd" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-kbd-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fb98a3b715650ef39fe2756b72eb64e18a7f3e70df178a2becba554a6eee5a83</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-kbd-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-kbd-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">fd87256b5e1e0de1633e3065641be6173dd67c0cf760f4738039636a191a3b08</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-kbd-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-kbd-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1d1fe2f8ae06c4ffe3bab089d1653b90b0fa263e4a227707ea83348d5eb571c8</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-loop" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-loop-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">788bcc963fae80a8a8730569fd5d9acda3282d6d61bd51e7716eab4712fb049e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-loop" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-loop-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">32a8e047963b421d680a822371ac8a4949fec1fbadbdfc5998fa0fa000d2f8a1</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-loop-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-loop-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">54120ab9c9606212c62c468ae97b4e3e5ffdcc19fd4c8f794c84642979346c33</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-loop-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-loop-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c2e451e4b8828df63daa6d45849edb8c379ba777146725dbd920c9d3f1b41a00</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-lvm" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-lvm-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e1dd384f534c1eede9a6dabd2338901ee079e814db3ea909fc5bdb0f8748e4e7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-lvm" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-lvm-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e92424aaf6de5b74dd673be39d274f05fa69c1ea7fca36c25d498901656d7dda</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-lvm-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-lvm-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">08c6dd98106238ab312a39ecec24c1cae1642f8a4c18473ed2d9388fbf286f7f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-lvm-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-lvm-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">466b71038292c108e34947bac8f9ec46050d6a505cd162d52b11d0bd4216bbfe</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-mdraid" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-mdraid-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">dd9676aced1bdebca5c5d461a880f2180652fdf66d6b22c222b93e9aa0405356</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-mdraid" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-mdraid-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">72e9d589eb110403a0183d0034676409c3fbb99766d3c1758faff5b5d939a7f8</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-mdraid-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-mdraid-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">8182c96e106eb4262b398a2fbc3f68ae52e33a11aaf925fada6e1d075a2ed2a3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-mdraid-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-mdraid-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4978f204da210e80d0a1a0902d71b90df9d6b240e3697c0529b233f6092f9b3c</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-mpath" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-mpath-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">bbb07b126f8988c008a41bf7d0cf37d4a422a0632b3beffb9efa5dc21a504dbd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-mpath" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-mpath-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">197936da6ba077bc560869531275ed9e9065c170ab87eaaabc31b75b1b605171</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-mpath-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-mpath-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">7471ab3c36fc86cc384514e70f31196b426e14e078f90dd1db7b076231d30740</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-mpath-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-mpath-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5e543cc669d7d5ebe60314c997da6ba01c4deb23aef0c5be17fefe1e512d5eb3</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-nvdimm" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-nvdimm-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">5b02a0be7a9f37d06f0c74fcc95c1996c3f7d43142c7fcb3122cd678cc715a10</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-nvdimm" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-nvdimm-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">acd4d42754665e322f05077e7d019eba86d9c386f10d6a22b7cb0511af71a650</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-nvdimm-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-nvdimm-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">3ccebce9a6ef4bb82893d0b4beeb97f2ed23ee8d5435c8d5aed55163eb5668dd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-nvdimm-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-nvdimm-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6dc5ea609a6d76e3e1441d609df14070a4d188f27ee9381da7a3b38032a57162</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-part" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-part-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">3c491d42c915520c4cd6ed45fe253a1e2e914870f318722a0efd8f01b263f04c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-part" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-part-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1dbb45af112f47b4084d39fc5cd31e7c9c783f14b05823f9a4636d3250e423d7</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-part-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-part-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">74a0bdb0e662893824e606449c48027ed9bd2bcca16d6b8347a80f1ea582661d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-part-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-part-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fc5c9320b4dcb99f8f0cf61da8fd8ed14f4a81568a30c9ab394debff0bf5453e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-plugins-all" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-plugins-all-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e3b4bee3873b2a87a7c0aeb62559a8747a4d114da1efa1a7d4ee4be2ff14e803</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-swap" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-swap-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">73f62fb0825612fdbae313607890e6579e5f79911e7aa9eff6211cd8d310442d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-swap" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-swap-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e903d7b4d75f606180615134f009ee620ca9faad9d0f3a40ba0a7a3c8df360fd</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-swap-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-swap-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">068b1dcc1c25df143cd5d123788d35642a2d0a155104e43a744dbbdb4b7b5012</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-swap-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-swap-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">226f53176e747a2110f8b69b04e0baabded9b6cbaa2740a216d699c724c45611</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-utils" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-utils-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">d10e639572e418e33885bb1022001aa45b8b602742ce11d4ab86f7b71fe2a943</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-utils" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-utils-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8aa6f42b52d4866644c2ae163218f1a9d082cabfc48a50b6b131b01a44a7fe71</sum>
        </package>
        <package arch="i686" epoch="0" name="libblockdev-utils-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-utils-devel-2.18-5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">3308f9fae7228fb6853a17e5ebfc435364def1a111b02822f2c0c123c4d7d3d3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-utils-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-utils-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5f32e9f067963ab8023f253ff7c0b17b808016420c78acc4ef6622f8e17d424d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-vdo" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-vdo-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">81166e536fc18740959c4516ddd0ac0697c4da4809b3fed69ff4fad266eff8ba</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libblockdev-vdo-devel" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>libblockdev-vdo-devel-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">02a0e83234c4fa3d903375d2e4fa1c7617a2e37f3dc62cda89f90f58027d568f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python2-blockdev" release="5.el7.tuxcare.els1" src="libblockdev-2.18-5.el7.tuxcare.els1.src.rpm" version="2.18">
          <filename>python2-blockdev-2.18-5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">de82009e1fc88d2d1fcbe08866f6b0d7536d906ebb460b0c31a21be11611256e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1753303283</id>
    <title>libxml2: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-49794: fix memory safety issues in xmlSchematronReportOutput when parsing
  XPath elements
- CVE-2025-49796: fix memory corruption issue triggered by processing sch:name
  elements in input XML file</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-49794: fix memory safety issues in xmlSchematronReportOutput when parsing
  XPath elements
- CVE-2025-49796: fix memory corruption issue triggered by processing sch:name
  elements in input XML file</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-23 20:41:27 UTC" />
    <updated date="2025-07-23 20:41:27 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1753303283.html" id="CLSA-2025:1753303283" title="CLSA-2025:1753303283" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libxml2" release="6.0.3.el7_9.6.tuxcare.els5" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els5.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">31b0e44872dd009a13444b9f19aad23d654e2c02cceb3ead8ade043e936c817d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2" release="6.0.3.el7_9.6.tuxcare.els5" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els5.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">5d3a506cac70eb3d2f3164896df2f6f6058e742c21dcd368653f94fbc99f3fa9</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-devel" release="6.0.3.el7_9.6.tuxcare.els5" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els5.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.0.3.el7_9.6.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">f53699193b825f07ae16a4bc6b40ccc6ec7b21f56ead5aa7baf1f6283482714e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-devel" release="6.0.3.el7_9.6.tuxcare.els5" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els5.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.0.3.el7_9.6.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">18f3e77aa19094f940995c9c341ef4aa1aee844488603dde07da4d137302ae4c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-python" release="6.0.3.el7_9.6.tuxcare.els5" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els5.src.rpm" version="2.9.1">
          <filename>libxml2-python-2.9.1-6.0.3.el7_9.6.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">e837b8aa076914c9c45337206ab80cb9338c709f84c8c12f73f9172c2e947382</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-static" release="6.0.3.el7_9.6.tuxcare.els5" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els5.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.0.3.el7_9.6.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">5e1e5d90a080094ffdc7e0a22558e4b7c90faba91419eb7ceed68fd018db8342</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-static" release="6.0.3.el7_9.6.tuxcare.els5" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els5.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.0.3.el7_9.6.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">ddfd78b10307a2faa0a108b0794117357db0e842c9a6dc6c48d0ab8a453d12a1</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1753780622</id>
    <title>php: Fix of CVE-2025-1220</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-1220: error if host contains null bytes in the middle of the string</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-1220: error if host contains null bytes in the middle of the string</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-29 09:17:06 UTC" />
    <updated date="2025-07-29 09:17:06 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1753780622.html" id="CLSA-2025:1753780622" title="CLSA-2025:1753780622" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">bbc82fbef70345d5a0ba216649c19dcb22e47230cd3061e5ba50869efd4e8be5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">7904caf0342838139dd7bb84777dc8a665bee3b8f8cbd8dfcfb4e79a6bd95068</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">1c38672fe8d734129c02704989ecef07ef29d11c6f20049acb50afbf2a61ec4b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">80702e2c1e88c1655b04b33eaf7680fe780a7e3485a77459ca940228077b6292</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">3badcb748fd7f19c37968dadf4b46c42b41b93b836e75f648f987f026df9ee80</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">527d91ba3b111c16d0eb9e82fcd80a6c9957aabce5d9283160651039e211c753</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">a24420475983d9709aa3d37d81eeed6a3c8eb8d0adc3d022f9bcceb6225272e9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">65f8d487ba8de0cf79ff57792c9704e554f88cf0b684315df838e260f0391afc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">c6ef07123a5cc2371122f59d2ef14cadd25fc57894f112f67e1e93fc23ff77e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">2753c14d9acd4dfbb0d22e79f6f6262d74ba8617d4fd9b76c4118fa187960748</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">7d9a5ed4e95bcc85bef49d7fab47ccbf44cd3047fcccc80b35bf3f90b0e83d77</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">8b12911619770772fd75d18e4182484bd5980d880a5423ae38809a7853568463</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">ca3cb794a48b2877519611b7370a01b4883e1abe690deead2eedf969ebe0a5bb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">46de0fe8a600153c760816ac634850e566c4ba285e806ed81678024e2db3db3e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">a3788ecf6983f253784b6cf5ff911b96138bbd3ed2fdd0c55997dfae0f647fbd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">f977cce64a6d64ba491d88aaf99937a16d1b3e610b10672fef48fa249342abd0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">820bcfa419bfd6056924529aa9526b47a246c8c258ec74063f1328db33b1bd08</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">33e06985eadffeca134e58191a28579f99a749baebd7b41822054186b87d357b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">18c0e45750ff0116fe9d9855357bae9ff8a8ecec87de581677e8df32e3910e00</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">9e718096b45478e8cce08a193d24d13e6134ddf5115982606c12a9dcb82b9035</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">61042ece8778b0adb2c43a6243f007f2cdaff0343b00b08845c1c98610af3fee</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">c2f9c675758b543235848f82b679a6513adb480a58024d6c112df24f30e583fc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">960b9e0d3a6c45485f7593573f8be43c8aa25f055f47814384f0f6cbf53e0bcf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">1d3aacd94a3cc7bdee0a322467cf5ed51a0d1642331815e30ee970611594899a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els10" src="php-5.4.16-48.el7.tuxcare.els10.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">0629491e1370c46302d544259993c6f509eb6b3e87f5a168781a503b70971b8b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1753377742</id>
    <title>libarchive: Fix of CVE-2025-25724</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-25724: fix buffer overflow vulnerability in libarchive</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-25724: fix buffer overflow vulnerability in libarchive</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-24 17:22:26 UTC" />
    <updated date="2025-07-24 17:22:26 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1753377742.html" id="CLSA-2025:1753377742" title="CLSA-2025:1753377742" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bsdcpio" release="14.el7_7.tuxcare.els2" src="libarchive-3.1.2-14.el7_7.tuxcare.els2.src.rpm" version="3.1.2">
          <filename>bsdcpio-3.1.2-14.el7_7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">449681e21ad2e8567cff0feca4ff5108ad881c9d80ca809401e2b1d956aee4cb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="bsdtar" release="14.el7_7.tuxcare.els2" src="libarchive-3.1.2-14.el7_7.tuxcare.els2.src.rpm" version="3.1.2">
          <filename>bsdtar-3.1.2-14.el7_7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">9f76bf0b434cce6a3169846613a78187d2875233ab8155117b6832d805cd5e89</sum>
        </package>
        <package arch="i686" epoch="0" name="libarchive" release="14.el7_7.tuxcare.els2" src="libarchive-3.1.2-14.el7_7.tuxcare.els2.src.rpm" version="3.1.2">
          <filename>libarchive-3.1.2-14.el7_7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">54b17eadc4a7554980126ecafd45f5b006e5b67945298e22936b8b52927c5255</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libarchive" release="14.el7_7.tuxcare.els2" src="libarchive-3.1.2-14.el7_7.tuxcare.els2.src.rpm" version="3.1.2">
          <filename>libarchive-3.1.2-14.el7_7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f43eca881fd1b8ff9cf62a259925c78631d96f891279615cf4ba453f2106a94d</sum>
        </package>
        <package arch="i686" epoch="0" name="libarchive-devel" release="14.el7_7.tuxcare.els2" src="libarchive-3.1.2-14.el7_7.tuxcare.els2.src.rpm" version="3.1.2">
          <filename>libarchive-devel-3.1.2-14.el7_7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">880ad3deb7891b5922caae0355f1596cdeec94a1a3ad37132f238de85c84b5fa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libarchive-devel" release="14.el7_7.tuxcare.els2" src="libarchive-3.1.2-14.el7_7.tuxcare.els2.src.rpm" version="3.1.2">
          <filename>libarchive-devel-3.1.2-14.el7_7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f1bf33d1067640c2af100c4bae234836860c19379dc18ff6bb9d8ae49fee2ed9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1753982295</id>
    <title>java-1.8.0-openjdk: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u462-b08 (GA). That fixes following CVEs:
- CVE-2025-30749: better Glyph drawing
- CVE-2025-30754: enhance TLS protocol support
- CVE-2025-30761: improve scripting supports
- CVE-2025-50106: glyph out-of-memory access and crash</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u462-b08 (GA). That fixes following CVEs:
- CVE-2025-30749: better Glyph drawing
- CVE-2025-30754: enhance TLS protocol support
- CVE-2025-30761: improve scripting supports
- CVE-2025-50106: glyph out-of-memory access and crash</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-31 17:18:19 UTC" />
    <updated date="2025-07-31 17:18:19 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1753982295.html" id="CLSA-2025:1753982295" title="CLSA-2025:1753982295" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">619672ea7e2621a1c2d9196835f707af72670a5aed1e6234f35746d3ffe257da</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7df651235eedff2feb571892d925cc0c8da36f4c3b614b16c8a0aee3205bbb3c</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.462.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">7825ebc7f8066bd449abc8040d3aae08c75fae652d9de891ff7e9e60f61c70f8</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ac894bf3e465904abd5e1c6f1e81429ad6f2d9c5959326b0b2e519ed921266a9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">382bf8063bb0c2698cea0fa2997e837239684ab751b7f4031dae812015446503</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-debug-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">99c8e8aef09912a53d9afe4f0b629385e8a436198d45e6b22859a30be72cbe00</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-demo-1.8.0.462.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e38d574bca71773f08b6b65f09868a4c4f7a7d828d2a093d114a5fd759f52921</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-demo-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">94adcadaeb1dab27ec82fc69f47cea91de02fa3444d312774500a612d32ffec0</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-demo-debug-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">eaf4f89cf487c2fe402cfa1bd81e59d74c2b03ce161967ab1884f23e51bd36c0</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-devel-1.8.0.462.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">4f321af6a250023d361802e941e1c11ece696005d9122a8fc94934c046f54dfe</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-devel-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0b7a41ffeb1db7bd9ca34d1f8e87b3e644945942e955da95396e51f40c2778b7</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-devel-debug-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">59be05786d65ac3fbbceea68e4e387155e2bb69e375863f9c98f4a4e61de20e3</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-headless-1.8.0.462.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">74f468f52898db326021bf46b6ea37262a11afaead3187e0c00a3855f9fa3a74</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-headless-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a2c1c92e1be1b36f47587ab32682580c78947635d065aff822f95ccaf3964eaf</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-headless-debug-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2a0679e98870bfbe03aa5db153211b71d2a77da9b307b19f5a8ed63f557cef27</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-javadoc-1.8.0.462.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">64060b4a6edcdab266e3d70255487fd5462f7f14122061e0e638e5228a4258e5</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.462.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">85e476381a6eac16ac5a972a29780708e1e09c320fcf17ccc40294c408d4a983</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">2fad3fce0f07b7846c9ef7a0b59b26bbf8feaf846856840d6f7f0e609b4e62f7</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.462.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">373b7ce827f1fcaf977113974d762053f6b4155aebfe8e24d4606af0bf9ff0f9</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-src-1.8.0.462.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f43b9595f2f97c3dc27850beb734c188bd193d72afcc18bc9434d52bcdc2aa3f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-src-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5958deb7c7e4e831a708061f8a0a2a134e77b70a6ac01e344e256335f39f5733</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.462.b08">
          <filename>java-1.8.0-openjdk-src-debug-1.8.0.462.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2d665eb0f8f66f4c03d4d86a46063c87a4f228f0d973c9e47eff4dac3205795c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1753982448</id>
    <title>php: Fix of CVE-2025-1735</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-1735: add error checking for pgsql extension escape functions,
  mainly to fix possible issues with multi-byte encoding of Postgres databases</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-1735: add error checking for pgsql extension escape functions,
  mainly to fix possible issues with multi-byte encoding of Postgres databases</summary>
    <pushcount>0</pushcount>
    <issued date="2025-07-31 17:20:52 UTC" />
    <updated date="2025-07-31 17:20:52 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1753982448.html" id="CLSA-2025:1753982448" title="CLSA-2025:1753982448" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">31fa6af4c1dfc04bd2b0a903102cedd892cfd0bf4401c4cb81b374f56ecb9064</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">cca14e4a4017bd1c6b905dfa55acb2d620cd7b1611fa9dada4d3915d3fd49941</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">f77b84663c23b8b5ff5db389e0dc88215c2dd79e2b1486b4a6b4d60fc1d4516c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">c81cca6195ae68333447bc8139aedadecd6473c013a3e6828d205c62286bde2a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">473fbc59f36eb392da178c2a3a5b564bf4d2568677095b1c64f5b57afa42731a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">e9fe75ffcbfb948be69325953f3bcaf6c4d409a4118e5bd0b1821e87370c311e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">f1e97d06d772754d3d1803ed0a7b27e39bb0aedf1697e47d9f4f3a6dede7c4e8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">3de76c246ae110c56449cbee596c8a12ba01fc4ba0bf6ae8377e645e51e24a56</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">25de95637e774fdd4a613971bb1b665422382da9f3a321befc1f852ccf201148</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">b24f5561a7fa37736c5c65a1e84d9402a161b7d24aaf805b579a2b38f64c2c5b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">a49cb33eac979e4c670e25bddcd5ce3c8eeb043ec3a28a8469bb536ab3493b10</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">231dbd0b83ccdef31b2258bb567078f8c09291b1efb5332f55cc652b0a84f3c3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">1f03ceb6e0e3894418bb8c8e9ba06bc52fe4fc0fba7a77c32d6e8f297528e1bd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">00fe8e407e2b040ed2eddc26f513a653ebd5a7f2292c18bb0428726f6454b0a0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">369747dcdedb367af2ac8743f449ba58642d488a6a4cc7ecb0672d29bdc7f0ce</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">7c3a584c124841fb5332127b2f0f4706228604270b63c76a9691d4dbb24dce6c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">bf9a15403b96d3a0b03a0b79182819483fbd0def73368e1745dd64a6f1dc7679</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">d95056ca971bd1abb702248f4cc991278efbc067545370665bcc28a2e86dd858</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">c66915bbb941c7149200203585406fb1b31f69b46202b8b26597ee9b30917afa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">4819f0d6e8c0e62b080845b2244d63dcabc5e9c9875ef8590113f340f716c326</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">3ea10ef2f6f3dcdb1a6e213ddcb8e5057645dec9393fa25a3b702cee098920e7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">4129e487c38577c21f039b1a57cbedec8d2517981caa511da8d6d3e388385909</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">5cc4f27c97e98113ba11485c7b216ef98c2d190f541ce868cebe3bf0933300a6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">58abb6e61536b0f1030b9d6e00d93bb0b699827cf9075b99f2c4b30e6de31544</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els11" src="php-5.4.16-48.el7.tuxcare.els11.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">ee1739c3e931e61ba81385a5a02568cc275bb39f7dc5222820d911379cc8ec44</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1754340339</id>
    <title>sqlite: Fix of CVE-2025-6965</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-6965: fix memory corruption issue caused by a query where the number
  of aggregate terms could exceed the number of columns available.</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-6965: fix memory corruption issue caused by a query where the number
  of aggregate terms could exceed the number of columns available.</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-04 20:45:42 UTC" />
    <updated date="2025-08-04 20:45:42 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1754340339.html" id="CLSA-2025:1754340339" title="CLSA-2025:1754340339" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="lemon" release="8.el7_7.1.tuxcare.els2" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els2.src.rpm" version="3.7.17">
          <filename>lemon-3.7.17-8.el7_7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">affa068ec2ecb2f85b685cf4f92855365bea3e2467f1950a35ba98b286d33b39</sum>
        </package>
        <package arch="i686" epoch="0" name="sqlite" release="8.el7_7.1.tuxcare.els2" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els2.src.rpm" version="3.7.17">
          <filename>sqlite-3.7.17-8.el7_7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">123de9999eda652fb22082c7337b07c87d66023e72cba5ca19e65849a7343908</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sqlite" release="8.el7_7.1.tuxcare.els2" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els2.src.rpm" version="3.7.17">
          <filename>sqlite-3.7.17-8.el7_7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">360b5ef6985fbb74d8b8a6ec32c7e3e67253f32b38c7b4aab66f165b0c9dbe69</sum>
        </package>
        <package arch="i686" epoch="0" name="sqlite-devel" release="8.el7_7.1.tuxcare.els2" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els2.src.rpm" version="3.7.17">
          <filename>sqlite-devel-3.7.17-8.el7_7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">26f581017419b4d48f3fcadbcb127081cae6a9de622f7a27f1dc37d662c92ed1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sqlite-devel" release="8.el7_7.1.tuxcare.els2" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els2.src.rpm" version="3.7.17">
          <filename>sqlite-devel-3.7.17-8.el7_7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3c5b222328de70f97eb28c99cdc48921951670c641cc45d5d31d2f0754b36f86</sum>
        </package>
        <package arch="noarch" epoch="0" name="sqlite-doc" release="8.el7_7.1.tuxcare.els2" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els2.src.rpm" version="3.7.17">
          <filename>sqlite-doc-3.7.17-8.el7_7.1.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">3eb7cf7c656d9991cf9bc9c63322b01b4c18a62625a63872cb30458e909945e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sqlite-tcl" release="8.el7_7.1.tuxcare.els2" src="sqlite-3.7.17-8.el7_7.1.tuxcare.els2.src.rpm" version="3.7.17">
          <filename>sqlite-tcl-3.7.17-8.el7_7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">8453d11720f166477d2b5a6d68b9cca98884abb4f9089f5e5e0ac4b244237b7c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1754382311</id>
    <title>Update of nss</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- update to CKBI 2.74 from NSS 3.110
- updated certificates:
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Entrust Root Certification Authority"
-     # Certificate "AffirmTrust Commercial"
-     # Certificate "AffirmTrust Networking"
-     # Certificate "AffirmTrust Premium"
-     # Certificate "AffirmTrust Premium ECC"
-     # Certificate "Entrust Root Certification Authority - G2"
-     # Certificate "Entrust Root Certification Authority - EC1"
-     # Certificate "Entrust Root Certification Authority - G4"
-     # Certificate "Security Communication ECC RootCA1"
-     # Certificate "BJCA Global Root CA1"
-     # Certificate "BJCA Global Root CA2"
- added certificates:
-     # Certificate "D-TRUST BR Root CA 2 2023"
-     # Certificate "D-TRUST EV Root CA 2 2023"</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- update to CKBI 2.74 from NSS 3.110
- updated certificates:
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Entrust Root Certification Authority"
-     # Certificate "AffirmTrust Commercial"
-     # Certificate "AffirmTrust Networking"
-     # Certificate "AffirmTrust Premium"
-     # Certificate "AffirmTrust Premium ECC"
-     # Certificate "Entrust Root Certification Authority - G2"
-     # Certificate "Entrust Root Certification Authority - EC1"
-     # Certificate "Entrust Root Certification Authority - G4"
-     # Certificate "Security Communication ECC RootCA1"
-     # Certificate "BJCA Global Root CA1"
-     # Certificate "BJCA Global Root CA2"
- added certificates:
-     # Certificate "D-TRUST BR Root CA 2 2023"
-     # Certificate "D-TRUST EV Root CA 2 2023"</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-05 08:25:15 UTC" />
    <updated date="2025-08-05 08:25:15 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1754382311.html" id="CLSA-2025:1754382311" title="CLSA-2025:1754382311" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="nss" release="2.el7_9.tuxcare.els3" src="nss-3.90.0-2.el7_9.tuxcare.els3.src.rpm" version="3.90.0">
          <filename>nss-3.90.0-2.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">34a0758f251e945c164a07af2199138df990c9aa9b1515f114eb6fe41da11061</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss" release="2.el7_9.tuxcare.els3" src="nss-3.90.0-2.el7_9.tuxcare.els3.src.rpm" version="3.90.0">
          <filename>nss-3.90.0-2.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">81679dd306a2cc5807990b09c34421eeba0d0c2de307df94bdb9926f6ae4556a</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-devel" release="2.el7_9.tuxcare.els3" src="nss-3.90.0-2.el7_9.tuxcare.els3.src.rpm" version="3.90.0">
          <filename>nss-devel-3.90.0-2.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">e31274ae51a02fcc40f995d74f5ea96cb7e1149fbffb29aef98b1fc946391624</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-devel" release="2.el7_9.tuxcare.els3" src="nss-3.90.0-2.el7_9.tuxcare.els3.src.rpm" version="3.90.0">
          <filename>nss-devel-3.90.0-2.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">010703ade11693b5b64f33ba6800bd6fd8f0f2199fe6ec5768fa1e5781bbb5fb</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-pkcs11-devel" release="2.el7_9.tuxcare.els3" src="nss-3.90.0-2.el7_9.tuxcare.els3.src.rpm" version="3.90.0">
          <filename>nss-pkcs11-devel-3.90.0-2.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">e7e6f817abcc043e2fdd83517fb514765306df7e67b78070be92617a5bab65b0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-pkcs11-devel" release="2.el7_9.tuxcare.els3" src="nss-3.90.0-2.el7_9.tuxcare.els3.src.rpm" version="3.90.0">
          <filename>nss-pkcs11-devel-3.90.0-2.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">b415ceffa58066be1789c9ace27986cf521a667354dbb44ef089d3ffc7d1b2e4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-sysinit" release="2.el7_9.tuxcare.els3" src="nss-3.90.0-2.el7_9.tuxcare.els3.src.rpm" version="3.90.0">
          <filename>nss-sysinit-3.90.0-2.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a4284308a7f46455c6e32abf6874e78671ff1e0a7635deaa1aa074bbf8548894</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-tools" release="2.el7_9.tuxcare.els3" src="nss-3.90.0-2.el7_9.tuxcare.els3.src.rpm" version="3.90.0">
          <filename>nss-tools-3.90.0-2.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a902a9a45d30bd4528f239c72fa1d9cae74bef05c8e492213029e54b56dea3f5</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1754384758</id>
    <title>php: Fix of CVE-2025-6491</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-6491: fix buffer overflow vulnerability</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-6491: fix buffer overflow vulnerability</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-05 09:06:02 UTC" />
    <updated date="2025-08-05 09:06:02 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1754384758.html" id="CLSA-2025:1754384758" title="CLSA-2025:1754384758" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">ed7b50250dd60130b69a5e049d4f90a13f4ffaf25f1809500543b04a5e4a3b9c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">57a14b6c1e0759a37c0305d94533a2f12b2a0cc7a89bbb05db304dba5355dd92</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">154083e1edb34482da95401a29c8b947fba8a34bd7ab9b71ff208af72c3ba24c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">9e7cd706a55d95d86eb865141d24b197081bfd5f8dac79968f6837479d17c84d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">f4d1caea439a0bd95f9f4fca6d2e959d284e21755a6a8eb6564b60b84c996fe0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">b06a89845f4792f9bb7c4d9431a5cd8097cfd6f6ad58c5fbe79d2fb9ff03ea33</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">f32c0819271dbf1ca290b5f140f969f4620755a6ab07830e70f3bed9545e5e5b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">12131ed0419ebc522b37984162c4e5b9d70efe4e6d5a932edee2111e84ae1667</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">094a09cc01e311314de910e02b31331da677d84e27b1d4eddafa3d9723cc094d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">b214a059ef3728b2540f6dbb9b89dbf4995f7ba0ec372b28a96a2871bfdb7978</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">2fe3c10a33abcb03f5eb04dc747d55757e5eb4103c884b49a443e8fbaee89662</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">4e43e104645a51f8ed0a22f5ab0c7342840b0c26a5c077d977bf83864d8683db</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">a5c4964b1c61eb5044269277dd1dac81265bbf9337044a4466637196c3cf19c0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">824a0063df7f8076f39a4f24c60153653e4302c4ab3cd086125c4d84e98793e7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">f03833e2a072606d0cc5a5edb7850dd210bdcadbe0f9306e4708ed5bb2546909</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">100becb143ab6a4a50d3e31a815db77692b05e7b1c9a367acd869e98bc242a69</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">530d67437d8f34bab53fd2341afee32e91643aebfb980f6c2b22b977cb4037eb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">19939fab436b1ab6f4c95982d9bb3afcf682b1f1c5cef76f330b3e7df5b214ac</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">ac1c2c6426056be9aaa5e340fd5c0ce402901f66deff194b12c4ec2fb7ddd5b0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">de1095bb35a2920e1d9cd3c9dd55386a4fcfc1bdbe012bd0e626ee1effe1cafe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">8c514d611031529a1098da01e012165bb50ae0ef51718407c005b67cf743b972</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">c6d5434d44c1f309c75344105db4cf8c59556dd59ee0b2a80864f2b77dcc8737</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">ff5b7525d88c6a5f8bc1daf56ef73345b4a320918a5a8e74f129fe65a3570de2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">1e842228f18c6cdbdb765ec0c6887b3dd8b5faf2428c36d865632a614c2ddf0a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els12" src="php-5.4.16-48.el7.tuxcare.els12.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">59cbc69db63fb815f53acd13b0a0cdcb715b5e0cab59730278f8d1c2be1bd3a6</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1755272015</id>
    <title>tomcat: Fix of CVE-2025-24813</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-24813: fix path equivalence vulnerability leading to remote code
  execution and information disclosure</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-24813: fix path equivalence vulnerability leading to remote code
  execution and information disclosure</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-15 15:33:39 UTC" />
    <updated date="2025-08-15 15:33:39 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1755272015.html" id="CLSA-2025:1755272015" title="CLSA-2025:1755272015" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="tomcat" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">1fc27d9168491cd27f44dbe5cf83baec47c6b17821a085b141a3441254865775</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-admin-webapps" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-admin-webapps-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">7fd39db5a13cdd1ccd906dd295a3889d8d705752b1665e0e5ec1d555b7ca24bb</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-docs-webapp" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-docs-webapp-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">68e9ea9eb17037ac20bd1ff8112b47ae07a2e8c2cea8719306a6224d71ac0daf</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-el-2.2-api" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-el-2.2-api-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">1701ad9685989c545208865f69f5bf6e95031451df599af1a250e10a1572388b</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-javadoc" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-javadoc-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">d7e2afc9a5e1c821069946483ef2abdadc3272bcd78c88de428ed558b5424ae2</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-jsp-2.2-api" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-jsp-2.2-api-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">be98f82066cf466337c9a9f2a508024c83a438b6aa184932c2e77592c918de5e</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-jsvc" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-jsvc-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">cb99077fd409f94ef7d4f69fb017276c023f902068c5312d22d12c386859a18d</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-lib" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-lib-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">14051d39f254920472ce52bce681264863d946064c99522c9ff0b7c529ae0ed3</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-servlet-3.0-api" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-servlet-3.0-api-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">687a3bf7045d679c9ed6e2a036bbc9f171a06f2ed2a0544beb00ee3f49eebb92</sum>
        </package>
        <package arch="noarch" epoch="0" name="tomcat-webapps" release="16.el7_9.tuxcare.els3" src="tomcat-7.0.76-16.el7_9.tuxcare.els3.src.rpm" version="7.0.76">
          <filename>tomcat-webapps-7.0.76-16.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">01b0ce076c674a26a37f260f7e33ab710439d40e22078737e88879c2075493d3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1754941109</id>
    <title>git: Fix of CVE-2025-27613</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-27613: fix issue where untrusted repositories could create and
  truncate files, with the fix implemented in versions 2.43.7 and later</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-27613: fix issue where untrusted repositories could create and
  truncate files, with the fix implemented in versions 2.43.7 and later</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-11 19:38:33 UTC" />
    <updated date="2025-08-11 19:38:33 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1754941109.html" id="CLSA-2025:1754941109" title="CLSA-2025:1754941109" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="emacs-git" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>emacs-git-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">1a856aa51b8fc298bacd556a16f74b042ed1daf3de6ee2c4cae19112c10d48ba</sum>
        </package>
        <package arch="noarch" epoch="0" name="emacs-git-el" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>emacs-git-el-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">903a756a8ad7e9aba641abbba99df67d8309dc3448c909c42c002a0495453bf6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-1.8.3.1-25.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">34b6226cc67a260f25405fd6d5169434959f8e76695a996cc08a32c0c83fd67c</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-all" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-all-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">40244e2bd864cbdc0bf941977ed0393594ce5c3d38f30276febbb5f2c898a5a9</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-bzr" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-bzr-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">ed16648a9d77dd939792297794b8f0bd4b97ef0c01bd775c06c92419edfcf2f3</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-cvs" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-cvs-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">b560cc50e4d7f4926c1e4ea871423a1a5fdccdca0aec8041eb61ad60b7db567a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-daemon" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-daemon-1.8.3.1-25.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">31f38f118009d2b39754057da39bd97661e2c694f5b47bbd2b82561f90c46c07</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-email" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-email-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">83360bcf2adf1c9e5b1026ceb13d3f94ed9c9b1dc711977e39c7ad5cc9638aa3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-gnome-keyring" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-gnome-keyring-1.8.3.1-25.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">720449ea8b71b734353afc9aa26d86b8b3ebc4661cd65017c8989ea4a28b4139</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-gui" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-gui-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">ad30b0dd86b45ad1c1b17d2ddbbfcf0b09236ea2d8980c8c35023f589888ad52</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-hg" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-hg-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">0e73656d33cf1eaf1fe2c17e15519cf5b8909f2a3d3e176fa6eb9baef1618468</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-instaweb" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-instaweb-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">354576075b20ef67076c934a253f842023c6dd8c087d5fd11cb6d2cbd32a5a3e</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-p4" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-p4-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">0515f575baa9773b18975bc38ec2b1a22db085304e1f768dcac04810f624aab3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-svn" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>git-svn-1.8.3.1-25.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">9d75da3c47b3311edef1e6bcfd469edabbbe412979a530f6ad91db6d061172e4</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitk" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>gitk-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">7ae16271881a60817b376e8c1005e603847309853129dd909a0721bb43132c30</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitweb" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>gitweb-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">d847357151b95f6ed369cdc5a061db1e548df499f44f89e09ea4d89ac10f9b93</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>perl-Git-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">50e7a586cb91f9a7d70a7b7a2e71e80e062a1709022838e1e76717ccf8c3467d</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git-SVN" release="25.el7_9.tuxcare.els5" src="git-1.8.3.1-25.el7_9.tuxcare.els5.src.rpm" version="1.8.3.1">
          <filename>perl-Git-SVN-1.8.3.1-25.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">e8a64ef6f5e4b351938218b6d7b6db8aedab8786b4fa96a4f4fad40975dfb31b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1754941200</id>
    <title>openssh: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2018-20685: fix a vulnerability scp client where a malicious server
  could bypass intended access restrictions and modify target directory
  permissions via crafted filenames
- CVE-2019-6109: fix scp client where a malicious server could manipulate
  the client's progress display output due to missing character encoding
- CVE-2019-6111: fix scp client vulnerability that allowed a malicious
  server to overwrite arbitrary files in the client's target directory,
  including subdirectories, when performing transfers</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2018-20685: fix a vulnerability scp client where a malicious server
  could bypass intended access restrictions and modify target directory
  permissions via crafted filenames
- CVE-2019-6109: fix scp client where a malicious server could manipulate
  the client's progress display output due to missing character encoding
- CVE-2019-6111: fix scp client vulnerability that allowed a malicious
  server to overwrite arbitrary files in the client's target directory,
  including subdirectories, when performing transfers</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-11 19:40:04 UTC" />
    <updated date="2025-08-11 19:40:04 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1754941200.html" id="CLSA-2025:1754941200" title="CLSA-2025:1754941200" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="openssh" release="23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="7.4p1">
          <filename>openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">073af0110f76b1ad40777ff41537ac23067fe290013150e479fec0edb503c5a3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-askpass" release="23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="7.4p1">
          <filename>openssh-askpass-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c1680b42ce01f8affa71da83c30900e22a045e2e03cfa6a0129723a7d27f53f8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-cavs" release="23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="7.4p1">
          <filename>openssh-cavs-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">e769d52cef63c2be7a87a78e2d7bbd84855c897f44600e77d6690812c6b78b53</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-clients" release="23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="7.4p1">
          <filename>openssh-clients-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">da4423817235a7ff6e58e56f8570b099a233d3772cb6d2596b0470c1515c17de</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-keycat" release="23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="7.4p1">
          <filename>openssh-keycat-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">b2dbfebd70dddc4c902d3d218ecad5865594c4c6a13c51d9a52d52dad0ab11ea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-ldap" release="23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="7.4p1">
          <filename>openssh-ldap-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">1c66f1e3b1c159a9a321def0fec4ab380511c7b4876bfb4b92a146cf1a4de149</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-server" release="23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="7.4p1">
          <filename>openssh-server-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">e29faaee09c8485c0f673879006bf620ae2bf3429bb9b1f5f866b71500f8f2ba</sum>
        </package>
        <package arch="x86_64" epoch="0" name="openssh-server-sysvinit" release="23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="7.4p1">
          <filename>openssh-server-sysvinit-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">d0ecb8f07402ad03f569f39d3e9d3dd1183fc1c07c305da6c36c1a0e2af1969a</sum>
        </package>
        <package arch="i686" epoch="0" name="pam_ssh_agent_auth" release="2.23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="0.10.3">
          <filename>pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">8d60ea7614593f3cfd85fb1f26f0304d20f120c175037b4c32202572dfab24dc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="pam_ssh_agent_auth" release="2.23.0.3.el7_9.tuxcare.els3" src="openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.src.rpm" version="0.10.3">
          <filename>pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">9a4edcf21d3ee9ad8d798ba6fa73997772fc8600be6e9428f7226bd6d9bc6793</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1755681456</id>
    <title>kernel: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- can: bcm: Fix UAF in bcm_proc_show() {CVE-2023-52922}
- udmabuf: fix a buf size overflow issue during udmabuf creation {CVE-2025-37803}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- can: bcm: Fix UAF in bcm_proc_show() {CVE-2023-52922}
- udmabuf: fix a buf size overflow issue during udmabuf creation {CVE-2025-37803}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-20 09:17:40 UTC" />
    <updated date="2025-08-20 09:17:40 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1755681456.html" id="CLSA-2025:1755681456" title="CLSA-2025:1755681456" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">7c783d826f41327a68df5f961a50a52430af1db635a64583e5797c15833cfdc5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">6b08445b188952ebe3a6e6ee6665380ebae5f9fb79ec03a54e7dc9e25eea95d0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">d914ac3c5bb030f22f39b96b6145508eee02bc8541b1cd4d0b8dbe61b1de9db4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">c0391671940412824880cdec4527170aea178dd1f47d1760e8552c6c7ee6c1f1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">9a8070b6e828a4083c412d53ce410db477dc31e0093dc127f66c96b34000fb60</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">a30ec8ddf04530cd3585ea8b1dd4c0fcf9e46b2534b14eed66a573b058db24d3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">6f48815924d0a32a91392e6335b51179b18d6115a5dfee7dfeca89ee9a9be61e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">12fa1c76aeda6a23879c7f503ac05adb668f9419048a63e157c58f0fd8568569</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">2b236151a355d37def4c34b6cd47d54dd8d2c7b8fdacae1d680780efe1a96f82</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">558cbe8ea0cfff129e8103bdbc7a4edac0478f2f59315461b2a333d152abfe85</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els22" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els22.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els22.x86_64.rpm</filename>
          <sum type="sha256">9bb2ba964c8f5c595369eabf175e6ccac103a94ed07aa6f464aee54b27fd7912</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1756409595</id>
    <title>clamav: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update to 1.4.3 LTS
- CVE-2025-20260: Fixed a possible buffer overflow write bug in
  the PDF file parser
- CVE-2025-20234: Fixed a possible buffer overflow read bug in
  the UDF file parser
- CVE-2025-20128: Fixed a possible buffer overflow read bug in
  the OLE2 file parser
- CVE-2024-20506: Changed the logging module to disable following
  symlinks on Linux and Unix systems so as to prevent an attacker
  with existing access to the 'clamd' or 'freshclam' services from
  using a symlink to corrupt system files</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update to 1.4.3 LTS
- CVE-2025-20260: Fixed a possible buffer overflow write bug in
  the PDF file parser
- CVE-2025-20234: Fixed a possible buffer overflow read bug in
  the UDF file parser
- CVE-2025-20128: Fixed a possible buffer overflow read bug in
  the OLE2 file parser
- CVE-2024-20506: Changed the logging module to disable following
  symlinks on Linux and Unix systems so as to prevent an attacker
  with existing access to the 'clamd' or 'freshclam' services from
  using a symlink to corrupt system files</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-28 19:33:18 UTC" />
    <updated date="2025-08-28 19:33:18 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1756409595.html" id="CLSA-2025:1756409595" title="CLSA-2025:1756409595" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="clamav" release="1.el7.tuxcare.els1" src="clamav-1.4.3-1.el7.tuxcare.els1.src.rpm" version="1.4.3">
          <filename>clamav-1.4.3-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d74f4f9c3171a7f44fb27197e75f3628a5e1b153d58f84050deb3b0e3c273a7b</sum>
        </package>
        <package arch="noarch" epoch="1" name="clamav-data" release="1.el7.tuxcare.els1" src="clamav-1.4.3-1.el7.tuxcare.els1.src.rpm" version="1.4.3">
          <filename>clamav-data-1.4.3-1.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">49435dea8a6baf072cb68958dc9540a07bd33b6c3349eee92582afe2bac8144a</sum>
        </package>
        <package arch="x86_64" epoch="1" name="clamav-devel" release="1.el7.tuxcare.els1" src="clamav-1.4.3-1.el7.tuxcare.els1.src.rpm" version="1.4.3">
          <filename>clamav-devel-1.4.3-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">dcc2e57f0cc8f48a545d814ce56413b450347ecd5a4f437e5e31968a67f2a6ab</sum>
        </package>
        <package arch="noarch" epoch="1" name="clamav-doc" release="1.el7.tuxcare.els1" src="clamav-1.4.3-1.el7.tuxcare.els1.src.rpm" version="1.4.3">
          <filename>clamav-doc-1.4.3-1.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">d394f0c6c0b137da736534f2d8cfca8a7c6fb5d50c3f32fe510d9f4fce8f12aa</sum>
        </package>
        <package arch="noarch" epoch="1" name="clamav-filesystem" release="1.el7.tuxcare.els1" src="clamav-1.4.3-1.el7.tuxcare.els1.src.rpm" version="1.4.3">
          <filename>clamav-filesystem-1.4.3-1.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">4a34275e473592d8a4e503a03f1f0614f6b9d2c585ce149993eb30990142fd46</sum>
        </package>
        <package arch="x86_64" epoch="1" name="clamav-freshclam" release="1.el7.tuxcare.els1" src="clamav-1.4.3-1.el7.tuxcare.els1.src.rpm" version="1.4.3">
          <filename>clamav-freshclam-1.4.3-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2655374a720802e53c392fb20599fff5f5b3589db13ec7bc119500e7fe792042</sum>
        </package>
        <package arch="x86_64" epoch="1" name="clamav-lib" release="1.el7.tuxcare.els1" src="clamav-1.4.3-1.el7.tuxcare.els1.src.rpm" version="1.4.3">
          <filename>clamav-lib-1.4.3-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5e69d39185fb183ff6c0849aa174f02438ebc0a2813709c5cce247c9feae93fb</sum>
        </package>
        <package arch="x86_64" epoch="1" name="clamav-milter" release="1.el7.tuxcare.els1" src="clamav-1.4.3-1.el7.tuxcare.els1.src.rpm" version="1.4.3">
          <filename>clamav-milter-1.4.3-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">af87327436a3d1a20c0eb2ff501eb21418ea17e8801c276b33f602b5770a2534</sum>
        </package>
        <package arch="x86_64" epoch="1" name="clamd" release="1.el7.tuxcare.els1" src="clamav-1.4.3-1.el7.tuxcare.els1.src.rpm" version="1.4.3">
          <filename>clamd-1.4.3-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f84c044c23d750022e2a05814e0124c62d2ac3eea19d7a02b111af04933d3f02</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1756322698</id>
    <title>php: Fix of CVE-2025-1736</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-1736: fix incorrect validation of CRLF in http headers</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-1736: fix incorrect validation of CRLF in http headers</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-27 19:25:02 UTC" />
    <updated date="2025-08-27 19:25:02 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1756322698.html" id="CLSA-2025:1756322698" title="CLSA-2025:1756322698" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">0bf0b44e8bc66a38482fe8b7570004237ac1a8e4d00c335c55bab76781b41c01</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">5bebe6d60ac01e96a14bb88f853e7f7e688013de554b7de56e6537081a09df6d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">a3130dcf438ae25e012ea270bb7415d639b278616043de31e6db6bfc942e99fc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">6d5b18ca5dca2f4ff2defdbead6fff93fe21b36de3ed70f4cc557a2ca2428008</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">1fc8afdca395b7adf1068b92583cd6e7330b4c874b4b2d6093b4a0b8f47cfce0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">223c8d5655a61aa247d8ac79b23e1de12b0ee159c2176848d74e8018a2b9c686</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">c17930ca7765ee274eabf92eab1c7ec610c172238a3f447db270d8a0bbbc5a1e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">f5c952f25a63057a51fc9f4cdc0cb8e792b3f00bd5f2a3befa26078c3413a41b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">64920c626eab9e23ef1a01f8de48882edde34db4d8ce5aa69379da6091a7716f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">ccaec1dd62d13bf304a32e04b555d991d303d73fe3af2a6eaa3b7ec67e80bb60</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">a939eefe8d4aa6a4c1438add02360ba62ac82d5a7eebfdcf45255dc2cc6dcbdb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">252c776618d200784cf6de3f675e4d38c676823da834f9904946f0fc139d36e9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">c54fdffd337ebcdf7590c29303b28e55c2bc4a75cb33d7fe80fc4a8a0668b9f9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">2cbc9cb4fa96c1fbf8e4fe14d5e23781e2df5c966bfe58f1b6695bf2deea5f55</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">35d7bf34f44b63552c789ed29989f8d3a7a87b4fd6d9c686402abbfbd24721cc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">bf4dfd0ea510ada178069260b538acb231e2527dd5a4d5011f4e46b86b9672f9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">40ce9b35552b8bb2001435aa890a6e2a673240c46ac7f7fcda55c95ee931cf76</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">3bc45ff552bc77f0565f0f590b27d22d922ee56c794c52ff0ff4c881f86eb8c9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">7424e59cf9f45b481d49ddc421f86497f0032f7fed1f346b1c64b61797a59489</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">58fdaa24238dfcdfbd511071b00980c8d62e613f2520dd709f81eeeae573758b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">f92f922c23a77eea65cffd60273c2e46e83820f53d4b668b1035bea416e0e5a1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">feaa35939c60c63dbf8cee168f52e15ea5ca0bd62c6b680cf40b9892dae3fc38</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">bf31e904b0804e154901734a895963936db7f1787c8006c060774848403461aa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">8d9a81e1bebe8b83a808185d80468fffe0debe61b6dd3db5fd1f0ae3ae12b58f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els13" src="php-5.4.16-48.el7.tuxcare.els13.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">c36c6f0f66848ddba37d6ed73674efd85a5eb5454c1ab39f4ff0362217d973a9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1756203636</id>
    <title>java-11-openjdk: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to openjdk-11.0.28+6 (GA).). The following CVEs were fixed:
- CVE-2025-30749: better Glyph drawing
- CVE-2025-30754: enhance TLS protocol support
- CVE-2025-30761: improve scripting supports
- CVE-2025-50059: improve HTTP client header handling
- CVE-2025-50106: better Glyph drawing redux</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to openjdk-11.0.28+6 (GA).). The following CVEs were fixed:
- CVE-2025-30749: better Glyph drawing
- CVE-2025-30754: enhance TLS protocol support
- CVE-2025-30761: improve scripting supports
- CVE-2025-50059: improve HTTP client header handling
- CVE-2025-50106: better Glyph drawing redux</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-26 10:20:40 UTC" />
    <updated date="2025-08-26 10:20:40 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1756203636.html" id="CLSA-2025:1756203636" title="CLSA-2025:1756203636" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">a55f9eef25f56c1d27698cda4f4bc0648db832b3e8229e31599724681fa4188e</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6cea98478f663a2bc02540cc7dde86c0d54d9b72640115a88eff02c01f4aa34b</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-debug-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d18dd46271fd961d45a767af8af3ad9a89e9d6244a2d04aa287f0332691318f6</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-demo-11.0.28.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">bc0efd9941528d8030ef7fcd0c4c558168d61cc8c6079288f28bc0971e2a7dd0</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-demo-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">af0922aa7f8a7169705b434839e2ed9f53a89be9f93ac4ec0154605412874402</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">aecd6529e12c6e6acd0560860733f77e763cfbaa1045b2e78635a6202cca0964</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-devel-11.0.28.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">9521404ca293b92d5e32411b25077de90314d4a706af06280da731657724d0a9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-devel-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">422c0b3a0128943750a858b9d06fbb5f45c13b0237ecc373371ed0f31b966fca</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0064a6e6d6ac1bd02a013fee90ce8b222aa265e81aba3aef5ae8806b705fcb8e</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-headless-11.0.28.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">fa3d7a4017c668ab595f8056398554f3d60eb820357e4e14c9c728db17f2bfd5</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-headless-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">84ef5f043e2ff635600ec6aa7238f35e929039304835bb3aed96cc1c336259af</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b99a9931e81ded852a9bb35867af25218b9c2fb5a3752cfc4479fbe310ed23fa</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-javadoc-11.0.28.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">815191b487eeba65ed416517f4acba64d0ad1feaa317181fa91aa80aa8b338cd</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-javadoc-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ea50628c69e391ee20b7916ce9ba7d2bf18141b1e89cc40307bc126808e17f48</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d620ab61c109ca366e948cdfdbed372e60a89a62a76eea1252e81901a2345811</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">24a6f7ae5cb5600f9dee3ca744d0fd060678d6341a455f75b830a44d83f3c442</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">48809e78568d3d25ed778ef0c29e16cde1797fcb3b87d99d45019af91a4f5ad8</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">be650bf11783f2be9ec4ebfa87b7c674245c374279e26273d64d859b3165e793</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-jmods-11.0.28.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">be6a0debb0a65dc877e8a562642e030158f6ea7488325ba098f785a5bf7e0017</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-jmods-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b700f2040abd6b48410e9cd7785f66a0e69e68718ad1a3b7af0116eadf1df716</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">eb15df2cb7e5eb67eea77f2819e126b7d6c10dec9a1ebc153226672e6a60478b</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-src-11.0.28.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">857da5302f5faa4c3e9f12be4afd10d49115f78b34a67f756c514f998640e72a</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-src-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">447500dd6757b3397a10ba19ee8e89e4941339b58189611c5f4bc1ad5f326688</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1b8a1957faf5490bca37c55f0e93b1e623fcde3583dbda0b086faba230cc7770</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-static-libs-11.0.28.0.6-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">898d3ca3ebcef3948f63c3227474c5ccaf8fec4b2e3c537f1a33317601471c85</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-static-libs-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fee5622371810d977da9f0fd7c9efa4e6872e032b675e717f0e752479a5100a1</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.28.0.6-1.el7_9.tuxcare.els1.src.rpm" version="11.0.28.0.6">
          <filename>java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">408b8707f12519d8cbd9d88b3f2f65d57b7e65d8ae3d21d4d46cfc5e1a2289d6</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1756409662</id>
    <title>xorg-x11-server: Fix of 8 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-26594: refuse to free the root cursor and keep its ref
- CVE-2025-26595: fix buffer overflow in XkbVModMaskText()
- CVE-2025-26596: xkb: fix computation of XkbSizeKeySyms
- CVE-2025-26597: xkb: fix buffer overflow in XkbChangeTypesOfKey()
- CVE-2025-26598: Xi: Fix barrier device search
- CVE-2025-26599: always initialize the border clip in compAllocPixmap()
- CVE-2025-26600: dix: Dequeue pending events on frozen device on removal
- CVE-2025-26601: postpone actual changes in SyncChangeAlarmAttributes()</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-26594: refuse to free the root cursor and keep its ref
- CVE-2025-26595: fix buffer overflow in XkbVModMaskText()
- CVE-2025-26596: xkb: fix computation of XkbSizeKeySyms
- CVE-2025-26597: xkb: fix buffer overflow in XkbChangeTypesOfKey()
- CVE-2025-26598: Xi: Fix barrier device search
- CVE-2025-26599: always initialize the border clip in compAllocPixmap()
- CVE-2025-26600: dix: Dequeue pending events on frozen device on removal
- CVE-2025-26601: postpone actual changes in SyncChangeAlarmAttributes()</summary>
    <pushcount>0</pushcount>
    <issued date="2025-08-28 19:34:26 UTC" />
    <updated date="2025-08-28 19:34:26 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1756409662.html" id="CLSA-2025:1756409662" title="CLSA-2025:1756409662" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xdmx" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xdmx-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e2b2d94c451edc59b59993ed61585701695b0e5ed74a4bfed1994098d4ac18fb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xephyr" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xephyr-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">47c103787bed29b8d66eaf6eca956feb585bb14eb7bff9d2c2211c5475834ccd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xnest" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xnest-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7a13da999df84812afa47e397f79469b4214f3eba0ed9806efddcdd423182db7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xorg" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xorg-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">621c679d4d5cc699bf4d761e672b6777043e19d33f0284c88006f06aa4199b63</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xvfb" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xvfb-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">686cb27064d332fb5a6d10b31686f13f13969b6f470eb04ef8401d7c9bed8dbb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xwayland" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xwayland-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d2a561b6abb6ce50bc33915ff6c59b5affbf66a07c0d52f4135367a6e85f2166</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-common" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-common-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">783a1da3a430a68f4d324080c2b83b89485a0647700cde3672f23a729a7fd9e0</sum>
        </package>
        <package arch="i686" epoch="0" name="xorg-x11-server-devel" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">799310b92fb44573dc8c9447ac02e1733ca0bc27561df20838e9d1b4fba20b55</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-devel" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fb3493b3042581c2300520c92bdfa9cf774bc761cf5233bbc895e940bc051de1</sum>
        </package>
        <package arch="noarch" epoch="0" name="xorg-x11-server-source" release="99.el7_9.tuxcare.els1" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els1.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-source-1.20.4-99.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">02605bd1e39d8e7c350ba68fe92dc0daf581b9d9f210c4d73754f55583368838</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1756928434</id>
    <title>python-setuptools: Fix of CVE-2025-47273</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-47273: fix path traversal vulnerability in PackageIndex</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-47273: fix path traversal vulnerability in PackageIndex</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-03 19:40:38 UTC" />
    <updated date="2025-09-03 19:40:38 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1756928434.html" id="CLSA-2025:1756928434" title="CLSA-2025:1756928434" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python-setuptools" release="7.el7.tuxcare.els2" src="python-setuptools-0.9.8-7.el7.tuxcare.els2.src.rpm" version="0.9.8">
          <filename>python-setuptools-0.9.8-7.el7.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">d492e1cd33ac2d6f2091adff28f521acbdfb1b681ba5d17a23afd15c43727f0f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757016400</id>
    <title>python3-setuptools: Fix of CVE-2025-47273</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-47273: fix path traversal vulnerability in PackageIndex</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-47273: fix path traversal vulnerability in PackageIndex</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-04 20:06:43 UTC" />
    <updated date="2025-09-04 20:06:43 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757016400.html" id="CLSA-2025:1757016400" title="CLSA-2025:1757016400" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python3-setuptools" release="10.el7.tuxcare.els1" src="python3-setuptools-39.2.0-10.el7.tuxcare.els1.src.rpm" version="39.2.0">
          <filename>python3-setuptools-39.2.0-10.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">3f33ebb42f21ce825ac187ae76a13a827116665ba1ce40afc009bbbc918459f5</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757012227</id>
    <title>ImageMagick: Fix of CVE-2025-53014</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-53014: fix heap buffer overflow in InterpretImageFilename</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-53014: fix heap buffer overflow in InterpretImageFilename</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-04 18:57:11 UTC" />
    <updated date="2025-09-04 18:57:11 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757012227.html" id="CLSA-2025:1757012227" title="CLSA-2025:1757012227" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">f7048f5190cc43504ad84e740d51872aed72b6866368750d6fbc93eca7165682</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">ba862a1968440866cd0728f2033f95825989d27e1c0cff9ebb7040a1a639239b</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">3e905f1bb3614e51e8e89328f1acbbf8f7216b07a023014f848b393ec18e7ab6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">ccce613bcb9c595b5b10012e71bd55a1f53d255f8d28aa8d846ae8fe253974a7</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">7f35d49f3875d2de6e18289578b4d1b64635ea46ccf96989acfff7f89076b7d6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">6dcfb2ef95b535529f378d1f9d394c4c1be774854da6d8ab5f71f7f158fcfd6a</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">31f587aab6f45eee974fcf5c20a9e5bf257c988ab740a0a37aba849d50cea9ca</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">11b4d991711f69c88081d16c8b340fa189ec94491156c6ad43f66e62d8aaffbb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c159360afc3b3d76830a908f01364da9482c586d520a4092d9ebc80988e9b5c4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7eec18a501eafb8332279b2fd077b1504aab481f251bed31f370d18fd755ae4f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757247437</id>
    <title>zlib: Fix of CVE-2016-9840</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2016-9840: fix undefined behavior in inftrees.c</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2016-9840: fix undefined behavior in inftrees.c</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-07 12:17:21 UTC" />
    <updated date="2025-09-07 12:17:21 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757247437.html" id="CLSA-2025:1757247437" title="CLSA-2025:1757247437" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="minizip" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>minizip-1.2.7-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">9e7a7e25e717d1e6ec0ddfd0e073f597cf78b77f5869ca578fa58a21d9a41b0d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="minizip" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>minizip-1.2.7-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">dc0da5317b59024e477ee4d988918b71381dee6fba51fb7ca6c603c9c3f60ce7</sum>
        </package>
        <package arch="i686" epoch="0" name="minizip-devel" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>minizip-devel-1.2.7-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">3e82d54bad66b5098634ddc827d7778c1487ad78ce9a64af4157a91c550ca070</sum>
        </package>
        <package arch="x86_64" epoch="0" name="minizip-devel" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>minizip-devel-1.2.7-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">a1352e7eb1bf4060e03704d0f22d37e2d3bfaacb4b1c02be259ae2a7f62c83aa</sum>
        </package>
        <package arch="i686" epoch="0" name="zlib" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>zlib-1.2.7-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">94677db800e7c63ad2d1c060165740844238e096c9c0f263096ce319e1578d00</sum>
        </package>
        <package arch="x86_64" epoch="0" name="zlib" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>zlib-1.2.7-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f7169591e1f9a58727fbd6b95708fdb0a229961c77c300f5ad70c348132cf090</sum>
        </package>
        <package arch="i686" epoch="0" name="zlib-devel" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>zlib-devel-1.2.7-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">4164cb3d693a7db68a60df9163e1309d5d54f7214bbe3186b5b3aba52130e3de</sum>
        </package>
        <package arch="x86_64" epoch="0" name="zlib-devel" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>zlib-devel-1.2.7-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">71b9778ba18d2ba8cb561fceebbc14361f0960c16ae62274cf44231837ba1a08</sum>
        </package>
        <package arch="i686" epoch="0" name="zlib-static" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>zlib-static-1.2.7-21.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">b961569007d583e96f814894514a32dc532f70bf347c7240b33032d639598753</sum>
        </package>
        <package arch="x86_64" epoch="0" name="zlib-static" release="21.el7_9.tuxcare.els2" src="zlib-1.2.7-21.el7_9.tuxcare.els2.src.rpm" version="1.2.7">
          <filename>zlib-static-1.2.7-21.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">8e39a676fb546a62603423f374a400d89c2dd97c194ecf84761045358206715d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757427840</id>
    <title>mpfr: Fix of CVE-2014-9474</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2014-9474: Fix of a buffer overflow due to incorrect GMP
  documentation for mpn_set_str</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2014-9474: Fix of a buffer overflow due to incorrect GMP
  documentation for mpn_set_str</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-09 14:24:04 UTC" />
    <updated date="2025-09-09 14:24:04 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757427840.html" id="CLSA-2025:1757427840" title="CLSA-2025:1757427840" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="mpfr" release="4.el7.tuxcare.els1" src="mpfr-3.1.1-4.el7.tuxcare.els1.src.rpm" version="3.1.1">
          <filename>mpfr-3.1.1-4.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">25c06e6a2c95d23118748856da17a6338fd3190a3ba20701d0d49a4d4dbeb244</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mpfr" release="4.el7.tuxcare.els1" src="mpfr-3.1.1-4.el7.tuxcare.els1.src.rpm" version="3.1.1">
          <filename>mpfr-3.1.1-4.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">afbe93396465a7b2f5c7e6dd1b9db2474f0fe5cdcb758b3be873ff0ecd8c0513</sum>
        </package>
        <package arch="i686" epoch="0" name="mpfr-devel" release="4.el7.tuxcare.els1" src="mpfr-3.1.1-4.el7.tuxcare.els1.src.rpm" version="3.1.1">
          <filename>mpfr-devel-3.1.1-4.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">c51e6e4c2ec3c902934d966106045f160ee9830fb9d45cdf290bbadcd9a6beca</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mpfr-devel" release="4.el7.tuxcare.els1" src="mpfr-3.1.1-4.el7.tuxcare.els1.src.rpm" version="3.1.1">
          <filename>mpfr-devel-3.1.1-4.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c3c8efe3e6f209ffc18eef40f6bcdc1fdd93d58cc8f88050e39ebaca497be640</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757427923</id>
    <title>libxml2: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-7425: fix heap-use-after-free in xmlFreeID caused by 'atype'
  corruption
- CVE-2025-6021: fix integer overflows in buffer size calculations</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-7425: fix heap-use-after-free in xmlFreeID caused by 'atype'
  corruption
- CVE-2025-6021: fix integer overflows in buffer size calculations</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-09 14:25:27 UTC" />
    <updated date="2025-09-09 14:25:27 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757427923.html" id="CLSA-2025:1757427923" title="CLSA-2025:1757427923" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libxml2" release="6.0.3.el7_9.6.tuxcare.els7" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els7.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">10438dc7a1e18864472b32024da0c54259caabd72ff01f5c53aafd465f932dad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2" release="6.0.3.el7_9.6.tuxcare.els7" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els7.src.rpm" version="2.9.1">
          <filename>libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">f29f195d221cf8f4f22339661caef70b0e2bdb0e817864fd4205031dec1619ed</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-devel" release="6.0.3.el7_9.6.tuxcare.els7" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els7.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.0.3.el7_9.6.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">147df060a155c90d04eb232f455f79a703d8913bc80caf0412ec488b286f6032</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-devel" release="6.0.3.el7_9.6.tuxcare.els7" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els7.src.rpm" version="2.9.1">
          <filename>libxml2-devel-2.9.1-6.0.3.el7_9.6.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">514ce35fb6e2a879071521cebe830ea8de4189a0f3e86a4c86879485ac3298d6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-python" release="6.0.3.el7_9.6.tuxcare.els7" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els7.src.rpm" version="2.9.1">
          <filename>libxml2-python-2.9.1-6.0.3.el7_9.6.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">350b175d1aab5a3520eadfdf755fee4837c53aca86314da38dc14d5a25f047b1</sum>
        </package>
        <package arch="i686" epoch="0" name="libxml2-static" release="6.0.3.el7_9.6.tuxcare.els7" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els7.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.0.3.el7_9.6.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">16184ec47afe5d2f2f57db6280cca94e03a926d236970f600be4ecf9a0bec899</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libxml2-static" release="6.0.3.el7_9.6.tuxcare.els7" src="libxml2-2.9.1-6.0.3.el7_9.6.tuxcare.els7.src.rpm" version="2.9.1">
          <filename>libxml2-static-2.9.1-6.0.3.el7_9.6.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">e8c37ccd7affd1a2f3a2b03f1989341feca346a1711bd87628b94cd003edd67b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757501564</id>
    <title>xorg-x11-server: Fix of CVE-2025-49180</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-49180: fix integer overflow in the RandR extension affecting the
  RRChangeProviderProperty function</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-49180: fix integer overflow in the RandR extension affecting the
  RRChangeProviderProperty function</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-10 10:52:48 UTC" />
    <updated date="2025-09-10 10:52:48 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757501564.html" id="CLSA-2025:1757501564" title="CLSA-2025:1757501564" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xdmx" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xdmx-1.20.4-99.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">395edaee175e02969718c5bba77d5386e63387fa6245ee1a0a162dab4b06a13f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xephyr" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xephyr-1.20.4-99.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">82f6ba501fe0cd825942239b4fd67dd1337deabc265327fc888fb9e1661d15d0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xnest" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xnest-1.20.4-99.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">898dd307b52ace2660ad547e91170942cbf819fc78af6d736d4253c06deb7c70</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xorg" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xorg-1.20.4-99.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">bf5b729d47fd90b8e7e72728d5244aed3316da0e94f8a8159983c52f72eaebf7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xvfb" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xvfb-1.20.4-99.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">faa685267e65c1f4d3320b279c10c031506608eaf9337a851c8105a6a072ba2c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xwayland" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xwayland-1.20.4-99.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">9385312285010a0507565b538e3d09872b1d4fd3bf05999aa1370ec99055cf77</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-common" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-common-1.20.4-99.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">8a8db89219f30c0ed97d7db18e548ac9ef84730e19caf45a93f885058dda08a7</sum>
        </package>
        <package arch="i686" epoch="0" name="xorg-x11-server-devel" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">742585929079a669682fd3cd0fc5f66bc6cfe444a3112b01cb8a3c523d6fbfe4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-devel" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">99cfd9afeda7d87d3282762358e93a5273dd275a3e3db5756a2a3cc8411890f1</sum>
        </package>
        <package arch="noarch" epoch="0" name="xorg-x11-server-source" release="99.el7_9.tuxcare.els4" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els4.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-source-1.20.4-99.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">45ba975a9979cc602d5816b998f00b8bef9ae31f84e45bf96bcd0735cd38c9e3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757532130</id>
    <title>pam: Fix of CVE-2025-6020</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-6020: fix potential privilege escalation in pam_namspace</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-6020: fix potential privilege escalation in pam_namspace</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-10 19:22:13 UTC" />
    <updated date="2025-09-10 19:22:13 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757532130.html" id="CLSA-2025:1757532130" title="CLSA-2025:1757532130" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="pam" release="23.0.1.el7.tuxcare.els2" src="pam-1.1.8-23.0.1.el7.tuxcare.els2.src.rpm" version="1.1.8">
          <filename>pam-1.1.8-23.0.1.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">fb7d70136d9e7d08243d535ecd5185e0c339afc125073dc1c74fb60e66a9e6dc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="pam" release="23.0.1.el7.tuxcare.els2" src="pam-1.1.8-23.0.1.el7.tuxcare.els2.src.rpm" version="1.1.8">
          <filename>pam-1.1.8-23.0.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">72684194d66eb7371090401a8a1768b8376325edfc80581e7e8ed6be61a3aae6</sum>
        </package>
        <package arch="i686" epoch="0" name="pam-devel" release="23.0.1.el7.tuxcare.els2" src="pam-1.1.8-23.0.1.el7.tuxcare.els2.src.rpm" version="1.1.8">
          <filename>pam-devel-1.1.8-23.0.1.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">0cd99a78f76db69c36cbb6ac89532a9608ebeeabc6785f9487be815fd05f2abc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="pam-devel" release="23.0.1.el7.tuxcare.els2" src="pam-1.1.8-23.0.1.el7.tuxcare.els2.src.rpm" version="1.1.8">
          <filename>pam-devel-1.1.8-23.0.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">680a772650ac4c63e9b00f0ae5b11c8c9561fd5839cb717e072f3102bbc0ab7b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758035329</id>
    <title>httpd: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-47252: escape user-supplied data in mod_ssl to prevent untrusted
  SSL/TLS clients from inserting escape characters into log files
- CVE-2025-49812: remove support for TLS upgrade to prevent HTTP
  desynchronisation attack</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-47252: escape user-supplied data in mod_ssl to prevent untrusted
  SSL/TLS clients from inserting escape characters into log files
- CVE-2025-49812: remove support for TLS upgrade to prevent HTTP
  desynchronisation attack</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-16 15:08:53 UTC" />
    <updated date="2025-09-16 15:08:53 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758035329.html" id="CLSA-2025:1758035329" title="CLSA-2025:1758035329" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.0.5.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">f0a52c5ea85c9a1ec992ff839782aed72730e38fcbd28108e8e464ee065c7cc7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.0.5.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">2e8f1c6935b851294b12fcd9ba38c910276ec5d259fb4ac2802510fa93c69db3</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.0.5.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">74356fed90579e5d42cb41f889a8b22d3e30854c585c1c6ebbfe6c04af75ab7b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.0.5.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">edcc4db4ed3adeb3389e01ce24c222c94f0daa7fa45b939c9b4ea29a3bee551f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.0.5.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">ff51274a8fd6b0a89136dd366503e77a1a6153f01135b5f3b865c7f2ba15f4b3</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.0.5.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">6ea9186431510ead037a36d1dede49d6ded14fc1699068e82378d94183a14f5d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.0.5.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">ab2c0ea56bf13deef948a20a98d5f7c8048f2044f7e07cb1e6124d52ee39b560</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.0.5.el7.centos.1.tuxcare.els6" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.0.5.el7.centos.1.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">ecf45c00e890444eb812230f4785c0c6fc683f83e78a29d8bbced14f5593e808</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757608893</id>
    <title>c-ares: Fix of CVE-2016-5180</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2016-5180: fix heap-based buffer overflow in the ares_create_query
  causing DoS</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2016-5180: fix heap-based buffer overflow in the ares_create_query
  causing DoS</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-11 16:41:36 UTC" />
    <updated date="2025-09-11 16:41:36 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757608893.html" id="CLSA-2025:1757608893" title="CLSA-2025:1757608893" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="c-ares" release="3.el7_9.1.tuxcare.els1" src="c-ares-1.10.0-3.el7_9.1.tuxcare.els1.src.rpm" version="1.10.0">
          <filename>c-ares-1.10.0-3.el7_9.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">29361eb33f0363cc75a635847bea9c4e7f33e49bed899bb44e815a326a48755c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="c-ares" release="3.el7_9.1.tuxcare.els1" src="c-ares-1.10.0-3.el7_9.1.tuxcare.els1.src.rpm" version="1.10.0">
          <filename>c-ares-1.10.0-3.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">9e3390b5e97c4986b44e879a427c92e6cbcde718b9306dbb8f464bec94da8f6d</sum>
        </package>
        <package arch="i686" epoch="0" name="c-ares-devel" release="3.el7_9.1.tuxcare.els1" src="c-ares-1.10.0-3.el7_9.1.tuxcare.els1.src.rpm" version="1.10.0">
          <filename>c-ares-devel-1.10.0-3.el7_9.1.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f647c0294da0bea30b9c50be6cf3579f477970b2310979bc2113e40ba6f6436d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="c-ares-devel" release="3.el7_9.1.tuxcare.els1" src="c-ares-1.10.0-3.el7_9.1.tuxcare.els1.src.rpm" version="1.10.0">
          <filename>c-ares-devel-1.10.0-3.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">850f4fbe878ee86d7036f0f09122c9e867ef88595b8ed67a073ee13e02406f2a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757666692</id>
    <title>libtiff: Fix of CVE-2017-9117</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2017-9117: add checks for all BMP reading operations to avoid
  buffer overflow</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2017-9117: add checks for all BMP reading operations to avoid
  buffer overflow</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-12 08:44:56 UTC" />
    <updated date="2025-09-12 08:44:56 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757666692.html" id="CLSA-2025:1757666692" title="CLSA-2025:1757666692" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libtiff" release="35.el7.tuxcare.els3" src="libtiff-4.0.3-35.el7.tuxcare.els3.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">6c7029907c6266e6cda8e4edaa7905c4b3246542b50720eb84aa0ca8a9dee690</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff" release="35.el7.tuxcare.els3" src="libtiff-4.0.3-35.el7.tuxcare.els3.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">daa88d62adf9018e53fccd54e62d7f7ccf04846cdbc48cbe88894ef12bb7dbe7</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els3" src="libtiff-4.0.3-35.el7.tuxcare.els3.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">1cc6d83c6862ea87b128d0595a62f8d3b076d74a4f03d537763a5dc67904e641</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els3" src="libtiff-4.0.3-35.el7.tuxcare.els3.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">fda052d3d39d5149e411e2f49b1d3362a0c592736a50a0a26e1e1293b37c8352</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els3" src="libtiff-4.0.3-35.el7.tuxcare.els3.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">1b90af751c47976da6b0bbaa4013d28d69cabec1c22ce323098abb7366861e9d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els3" src="libtiff-4.0.3-35.el7.tuxcare.els3.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">ace9aac9d211da618fcaf705310dd66b2ddfa5c32d06b3a89fc56b8937dbe134</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-tools" release="35.el7.tuxcare.els3" src="libtiff-4.0.3-35.el7.tuxcare.els3.src.rpm" version="4.0.3">
          <filename>libtiff-tools-4.0.3-35.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">1d5092c097cb5c1c5933f52c153439a4e161ebc073c2b662e3e394110c8160c9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757666588</id>
    <title>ruby: Fix of CVE-2017-9226</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2017-9226: fix a heap out-of-bounds write or read occurs in
  next_state_val() during regular expression compilation.</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2017-9226: fix a heap out-of-bounds write or read occurs in
  next_state_val() during regular expression compilation.</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-12 08:43:12 UTC" />
    <updated date="2025-09-12 08:43:12 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757666588.html" id="CLSA-2025:1757666588" title="CLSA-2025:1757666588" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="ruby" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.0.648">
          <filename>ruby-2.0.0.648-39.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">3a8466f8f0cef8dcd1f449f023edae0e6ed34b19f811e029f7b5618809245c30</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-devel" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.0.648">
          <filename>ruby-devel-2.0.0.648-39.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">34da56d818ddf17dc0b8d274826fa157df7e4b42cfa31b35949a9e54565c410a</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-doc" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.0.648">
          <filename>ruby-doc-2.0.0.648-39.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">0d7aa16572f80303a7eb1b746f45f306cfd4265df35a1e433caa7b7180ac2df9</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-irb" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.0.648">
          <filename>ruby-irb-2.0.0.648-39.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">29cbe3e275307567d077543aee4b32691e10c7b8b76322f9f71e76a956f10386</sum>
        </package>
        <package arch="i686" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">ebb7679b579f30de5ab25c4cd4c5813f26e66697cf366486500091eee98ba1a4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">7fbd647b05059ee97d9325f2a5ebec4c074e41d3fc616af63a355125d2a509ff</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-tcltk" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.0.648">
          <filename>ruby-tcltk-2.0.0.648-39.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">f164f2e12f8f48d6758ade4c0e4fc32bd37db3b815ea99bbb0f2dea1c0907553</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-bigdecimal" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="1.2.0">
          <filename>rubygem-bigdecimal-1.2.0-39.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">8f3dc1e4ba6ac4ee0bb5ca4375f9753ae839835601cdb568a1687278f987a245</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-io-console" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="0.4.2">
          <filename>rubygem-io-console-0.4.2-39.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">577bb424dd047ce70ea18f6b8e31fdba9834759631a03bef4a81a26c0a899334</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-json" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="1.7.7">
          <filename>rubygem-json-1.7.7-39.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">13829ce3ecc87dde9cd15af7b91ad5445dfddb862960f45b725401239c6b3c49</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-minitest" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="4.3.2">
          <filename>rubygem-minitest-4.3.2-39.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">44fc9c39fe1e7fad0755be75d29e294853ec86a82be373747cc0d06d88298257</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-psych" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.0">
          <filename>rubygem-psych-2.0.0-39.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">cf72b79816327b8579230708037de504a8fa00f8dc4bf1169b31acafb49828f7</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rake" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="0.9.6">
          <filename>rubygem-rake-0.9.6-39.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">de96ee1b99f6f46e204d52613583920c6f5f87d297dc7a84f09b59c147a4611b</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rdoc" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="4.0.0">
          <filename>rubygem-rdoc-4.0.0-39.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">3a21300da1ed373734e36c71b5a5e79588cdaa6edb451b78c0615f2851ccfcaa</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.14.1">
          <filename>rubygems-2.0.14.1-39.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">9e9f767ab326697fb1a6c46342497f9beec07033464809caaa8ecdcabbf660cf</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems-devel" release="39.el7_9.tuxcare.els8" src="ruby-2.0.0.648-39.el7_9.tuxcare.els8.src.rpm" version="2.0.14.1">
          <filename>rubygems-devel-2.0.14.1-39.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">38ecd8ff85b6a9a7db139c13d969e2e8ae5ecb77df05c7f0bfcfbf3bd73c2471</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757666519</id>
    <title>xorg-x11-server: Fix of CVE-2025-49178</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-49178: fix request handling flaw causing potential denial of service</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-49178: fix request handling flaw causing potential denial of service</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-12 08:42:03 UTC" />
    <updated date="2025-09-12 08:42:03 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757666519.html" id="CLSA-2025:1757666519" title="CLSA-2025:1757666519" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xdmx" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xdmx-1.20.4-99.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">30b2eb3f55dd2fb099391b8c1dfc9cbf98707120183a5e4f7eb2ed43623e18f1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xephyr" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xephyr-1.20.4-99.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">4ae6d4c27a5c0ac038dc7232a24d635a98a244545b9c327451413d3c4ac7c312</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xnest" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xnest-1.20.4-99.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">41c179733ffe55bf6876f8cbeed2f778b73e2e7e03bb9fbd78cd745e74a76076</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xorg" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xorg-1.20.4-99.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">a9ce2a79be6719e16f36ff5e62da96ff93e6b830f6fc6083542f637135faef84</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xvfb" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xvfb-1.20.4-99.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">180cfe2ab385c9c635790a76087c4c2bce9c91b11f6b3fc532ba68a92881e781</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xwayland" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xwayland-1.20.4-99.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">dea602d5c5931370b5c38d8f3052769d32e93e350d57816864f3372c6054f090</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-common" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-common-1.20.4-99.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">d213f208023d302f5a39eb515097c8df61a9aa5df81a1ca597924189276e6f96</sum>
        </package>
        <package arch="i686" epoch="0" name="xorg-x11-server-devel" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">39af211731766e1a2928ffb9c1639c20652896eba4652d513fd3db70b430dfc9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-devel" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">764754222da502884aadc1869c63144ff425927ac28af8f290b7c157ab98cd5c</sum>
        </package>
        <package arch="noarch" epoch="0" name="xorg-x11-server-source" release="99.el7_9.tuxcare.els6" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els6.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-source-1.20.4-99.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">9d0a77c5cb46e09e763c259477d6bcbaa6b3841351b8212c3b249a3f51133a30</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757947715</id>
    <title>php: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2017-9224: fix out-of-bounds read of a stack in match_at function
- CVE-2017-9226: fix out-of-bounds write or read of a heap in
  next_state_val function
- CVE-2017-9227: fix out-of-bounds read of a stack in mbc_enc_len function</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2017-9224: fix out-of-bounds read of a stack in match_at function
- CVE-2017-9226: fix out-of-bounds write or read of a heap in
  next_state_val function
- CVE-2017-9227: fix out-of-bounds read of a stack in mbc_enc_len function</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-15 14:48:39 UTC" />
    <updated date="2025-09-15 14:48:39 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757947715.html" id="CLSA-2025:1757947715" title="CLSA-2025:1757947715" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">24d6dddf3eb3eb2f7a87463988af59419cfb10d64c54934f2a129d83ff4030c1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">f92dfb5d8779e53c8f4aeab64a251ba60b336d2514a31b7bb28920bb6b1b2016</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">08becdb62e81934c09337e551a903cf41201e647d8f719f7c9ea85835c4b1d9d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">f947cd3f2bc3d540f350117085e70c461b6a7488ebb9ac046360f60ede7023c7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">3a2d02ef5dd7470929bdec2bf96b8d7bffd818f10dc310fa27bae821a895162e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">c6105add72e8bdf32cda8eb972be1f57ba86b1851fe59cdd64f8343f2dfda927</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">40081390722976e5313d51643a138b6e1106ad6d2ab701c6456afb3ad983f793</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">0a8a6e3920c82680dd56ca83b78b6d77b07d0f57d655a2d39b580112a482463e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">b5506c48e57a0fc63cfe17134c60197968a52217a031065433dbda277a0d0c39</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">0a676a86d502fd977c0290eb13317c216838bf9fd33a838f886a78b1718aacff</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">6367626a56c4fccd166b1a8dbf3aaa6d2b18ffbda8acfbdfa3218d1709dbe77b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">a57246f9630064f640d20b1a08a0a3cf0e2e1af04c759287a0e7148afa9f1ee7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">9ffea0b1f5ad7f55922581362ccedca6755e71e111755f96f611f7b595de4a2c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">3f5126feace1709d55f9bdca85c941e94cfaac5f5ac81d6a0731db11dbf7603b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">1adbf7c326106d7cd0583a3bf182b493af0888f0c749b4e34ba44ced27a34ffc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">cd95bb0b67d9365589c8e8d4b25635b1144adaac20dd207dbc7473d0d6ad0d51</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">3fefe8c0777f3e3216183012267f6d614b1d05575d9b372aa522e33a130dfa08</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">b782571dc09923d76cdea1a65965567cfb0163308006e731c6cd32a10ac751a7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">8bd9edf06c9fdc2f76022425d13a2ef9ce214260d70344a6334a7508194045b4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">4ee3bbc0814b2395f8882c2c26656ce846eff2ae195c7a9fd573a31ba3149fdb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">e81b10507245d4feef45880d8e13d38b8ee0bfe88e1695341f4a92b43d658496</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">975624029a9d40d233e3141e261ec1a81e49c2609f753cc0ccde05c3653f7e75</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">b25684e7a6d4163fa6cd459cf79a56ffc043929ec927fe8b174b50d7e1f74937</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">6a8712a127fb42fe67ef7b050e28eb816e40fdd8097971b1cfada66753d63dca</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els14" src="php-5.4.16-48.el7.tuxcare.els14.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">9d63330e257250b4f0b5d602c9b491cf33109a8fc6c9b35fa454b76c565b20a9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757967705</id>
    <title>kernel: Fix of 42 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- x86/kvm: Disable kvmclock on all CPUs on shutdown {CVE-2021-47110}
- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() {CVE-2025-38352}
- cifs: fix double free race when mount fails in cifs_get_root() {CVE-2022-48919}
- aio: mark AIO pseudo-fs noexec {CVE-2016-10044}
- cifs: potential buffer overflow in handling symlinks {CVE-2022-49058}
- NFSD: fix race between nfsd registration and exports_proc {CVE-2025-38232}
- nfsd: register pernet ops last, unregister first {CVE-2025-38232}
- net: atm: fix use after free in lec_send() {CVE-2025-22004}
- net: atlantic: fix aq_vec index out of range error {CVE-2022-50066}
- do_change_type(): refuse to operate on unmounted/not ours mounts {CVE-2025-38498}
- net: atm: fix /proc/net/atm/lec handling {CVE-2025-38180}
- net: atm: add lec_mutex {CVE-2025-38180}
- SUNRPC: make sure cache entry active before cache_show {CVE-2024-53174}
- scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() {CVE-2025-38399}
- scsi: target: Fix crash during SPEC_I_PT handling {CVE-2025-38399}
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race {CVE-2025-38085}
- drivers:md:fix a potential use-after-free bug {CVE-2022-50022}
- ext4: avoid resizing to a partial cluster size {CVE-2022-50020}
- HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() {CVE-2025-21928}
- net/sched: Abort __tc_modify_qdisc if parent class does not exist {CVE-2025-38457}
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() {CVE-2022-49788}
- dlm: fix plock invalid read {CVE-2022-49407}
- net: usb: smsc75xx: Limit packet length to skb-&gt;len {CVE-2023-53125}
- scsi: libfc: Fix use after free in fc_exch_abts_resp() {CVE-2022-49114}
- crypto: algif_hash - fix double free in hash_accept {CVE-2025-38079}
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}
- HID: core: ensure the allocated report buffer can contain the reserved report ID {CVE-2025-38495}
- ext4: Fix possible corruption when moving a directory {CVE-2023-53137}
- ceph: avoid putting the realm twice when decoding snaps fails {CVE-2022-49770}
- vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403}
- HID: core: do not bypass hid_hw_raw_request {CVE-2025-38494}
- sch_hfsc: make hfsc_qlen_notify() idempotent {CVE-2025-38177}
- ext4: check dot and dotdot of dx_root before making dir indexed {CVE-2024-42305}
- ALSA: bcd2000: Fix a UAF bug on the error path of probing {CVE-2022-50229}
- dm ioctl: prevent potential spectre v1 gadget {CVE-2022-49122}
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}
- md-raid10: fix KASAN warning {CVE-2022-50211}
- scsi: lpfc: Use memcpy() for BIOS version {CVE-2025-38332}
- ACPICA: Refuse to evaluate a method if arguments are missing {CVE-2025-38386}
- media: cxusb: no longer judge rbuf when the write fails {CVE-2025-38229}
- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}
- ext4: fix off-by-one error in do_split {CVE-2025-23150}
- perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init {CVE-2025-37878}
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() {CVE-2025-38000}
- i40e: fix MMIO write access to an invalid page in i40e_clear_hw {CVE-2025-38200}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- x86/kvm: Disable kvmclock on all CPUs on shutdown {CVE-2021-47110}
- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() {CVE-2025-38352}
- cifs: fix double free race when mount fails in cifs_get_root() {CVE-2022-48919}
- aio: mark AIO pseudo-fs noexec {CVE-2016-10044}
- cifs: potential buffer overflow in handling symlinks {CVE-2022-49058}
- NFSD: fix race between nfsd registration and exports_proc {CVE-2025-38232}
- nfsd: register pernet ops last, unregister first {CVE-2025-38232}
- net: atm: fix use after free in lec_send() {CVE-2025-22004}
- net: atlantic: fix aq_vec index out of range error {CVE-2022-50066}
- do_change_type(): refuse to operate on unmounted/not ours mounts {CVE-2025-38498}
- net: atm: fix /proc/net/atm/lec handling {CVE-2025-38180}
- net: atm: add lec_mutex {CVE-2025-38180}
- SUNRPC: make sure cache entry active before cache_show {CVE-2024-53174}
- scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() {CVE-2025-38399}
- scsi: target: Fix crash during SPEC_I_PT handling {CVE-2025-38399}
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race {CVE-2025-38085}
- drivers:md:fix a potential use-after-free bug {CVE-2022-50022}
- ext4: avoid resizing to a partial cluster size {CVE-2022-50020}
- HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() {CVE-2025-21928}
- net/sched: Abort __tc_modify_qdisc if parent class does not exist {CVE-2025-38457}
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() {CVE-2022-49788}
- dlm: fix plock invalid read {CVE-2022-49407}
- net: usb: smsc75xx: Limit packet length to skb-&gt;len {CVE-2023-53125}
- scsi: libfc: Fix use after free in fc_exch_abts_resp() {CVE-2022-49114}
- crypto: algif_hash - fix double free in hash_accept {CVE-2025-38079}
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}
- HID: core: ensure the allocated report buffer can contain the reserved report ID {CVE-2025-38495}
- ext4: Fix possible corruption when moving a directory {CVE-2023-53137}
- ceph: avoid putting the realm twice when decoding snaps fails {CVE-2022-49770}
- vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403}
- HID: core: do not bypass hid_hw_raw_request {CVE-2025-38494}
- sch_hfsc: make hfsc_qlen_notify() idempotent {CVE-2025-38177}
- ext4: check dot and dotdot of dx_root before making dir indexed {CVE-2024-42305}
- ALSA: bcd2000: Fix a UAF bug on the error path of probing {CVE-2022-50229}
- dm ioctl: prevent potential spectre v1 gadget {CVE-2022-49122}
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}
- md-raid10: fix KASAN warning {CVE-2022-50211}
- scsi: lpfc: Use memcpy() for BIOS version {CVE-2025-38332}
- ACPICA: Refuse to evaluate a method if arguments are missing {CVE-2025-38386}
- media: cxusb: no longer judge rbuf when the write fails {CVE-2025-38229}
- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}
- ext4: fix off-by-one error in do_split {CVE-2025-23150}
- perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init {CVE-2025-37878}
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() {CVE-2025-38000}
- i40e: fix MMIO write access to an invalid page in i40e_clear_hw {CVE-2025-38200}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-15 20:21:49 UTC" />
    <updated date="2025-09-15 20:21:49 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757967705.html" id="CLSA-2025:1757967705" title="CLSA-2025:1757967705" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">e555c3d9b640cbf2a9eaaed3185da1a0a8c01569705070c398b0a4ad564e9dce</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">a829da391927f6702a0d03995f25528679fd21bc1941e410dfaf37d7ecc6a321</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">8b2a22be17319b71f182e0082115409091882160cb1e000945c6d4a73ec3a0ed</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">cea6ebe1863472dceecf44841f2d79378e33d96a1bf3d440759dcab222835cd1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">f75a8346d497f1495dcb74c189fe1e83d38846c25dbb35f4d63345bcd90053b7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">f470a9cfab5382b0bcda6f1acb60404d21f7b8d468bd927771a846c8c489290e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">5844435379ec1e33abb97bf6869a27c3c3e9ca485548bc599b8e60114d391c62</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">f69d0b81f61a0ec78b34959197a7d51d3b636ea193ad718a4a1be081b2d463e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">c8cb198b0c9b055e77bc27b336cdcf2b5543baccd492e794fef925bf0d065fd4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">81cd7c07c73fcd62c048806a9aa97d89f259075ea929cae0877a4128d1d30454</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els24" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els24.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els24.x86_64.rpm</filename>
          <sum type="sha256">e4dfc24db9d88334e48c5a15a666a6567c076eb72ad3efbedb6a6f4fc2fd90f7</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758023679</id>
    <title>ruby: Fix of CVE-2016-2339</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2016-2339: fix heap overflow vulnerability in Fiddle::Function.new
  'initialize' function</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2016-2339: fix heap overflow vulnerability in Fiddle::Function.new
  'initialize' function</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-16 11:54:43 UTC" />
    <updated date="2025-09-16 11:54:43 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758023679.html" id="CLSA-2025:1758023679" title="CLSA-2025:1758023679" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="ruby" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.0.648">
          <filename>ruby-2.0.0.648-39.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">c49f5c0532e6e50839bf2f868175131ce964b498804c402e5636de10a0da8e84</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-devel" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.0.648">
          <filename>ruby-devel-2.0.0.648-39.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">c88e3d2da3d1f1329c7c7ab43d42c148ae5377ad923e59c8d3d52710cac65cdb</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-doc" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.0.648">
          <filename>ruby-doc-2.0.0.648-39.el7_9.tuxcare.els10.noarch.rpm</filename>
          <sum type="sha256">97ae1b1ada2b8a034c222b68baeff1e1522c8b1051d4ad1f276835296340c9d1</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-irb" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.0.648">
          <filename>ruby-irb-2.0.0.648-39.el7_9.tuxcare.els10.noarch.rpm</filename>
          <sum type="sha256">f7850eb4c08d85f4bf3662bda0a3d540fe467c50ba3a3ab3ed841b6caa3fca1a</sum>
        </package>
        <package arch="i686" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els10.i686.rpm</filename>
          <sum type="sha256">e1a4a7acde3a701e05660fd022f06982f40521ab94b9d2b5dd7c54a338b3d0f1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">bacfd4f2c5deee3531e0c8d94c33424cf5fb92c490a373597eeb941b13f080b8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-tcltk" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.0.648">
          <filename>ruby-tcltk-2.0.0.648-39.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">8b8e49b10a53550d745b8a72f40bc28919459330fa91c9fd5644ca46ffd951e1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-bigdecimal" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="1.2.0">
          <filename>rubygem-bigdecimal-1.2.0-39.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">bf860af268c04700684125a2e1a04a10107e34557047a167e8eabd68fddfa18d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-io-console" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="0.4.2">
          <filename>rubygem-io-console-0.4.2-39.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">0aa282e79844426b9b4cbfa9150cd0573bf180a0b1927f932465bf7cfa9330fc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-json" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="1.7.7">
          <filename>rubygem-json-1.7.7-39.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">0ef7b974d870961ad14ed3156c36c0c4bc1f50039edb6ae689b0f498006ba22f</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-minitest" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="4.3.2">
          <filename>rubygem-minitest-4.3.2-39.el7_9.tuxcare.els10.noarch.rpm</filename>
          <sum type="sha256">d9ba9923bd9ddd098d33771c855393c13fb238053d742c4a1557470ef419fd3f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-psych" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.0">
          <filename>rubygem-psych-2.0.0-39.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">6b8ac504ee5d5090f31b02ac0173d14d49df0d074e0fe1ba4834dfcfa64ae9b6</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rake" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="0.9.6">
          <filename>rubygem-rake-0.9.6-39.el7_9.tuxcare.els10.noarch.rpm</filename>
          <sum type="sha256">0c87f94a491e3f0c61f0595017bbda2f89e4c8a40b42f20361b8e7c8985f2645</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rdoc" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="4.0.0">
          <filename>rubygem-rdoc-4.0.0-39.el7_9.tuxcare.els10.noarch.rpm</filename>
          <sum type="sha256">3af0e0ef60fdcc2831c2d58df5f9fce3afee46930d663f4417d7afb5de1f2aca</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.14.1">
          <filename>rubygems-2.0.14.1-39.el7_9.tuxcare.els10.noarch.rpm</filename>
          <sum type="sha256">7c9bd529310c6d00d76c12e32f339b7dc30b920e7291ba7ecf77788eea6ef495</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems-devel" release="39.el7_9.tuxcare.els10" src="ruby-2.0.0.648-39.el7_9.tuxcare.els10.src.rpm" version="2.0.14.1">
          <filename>rubygems-devel-2.0.14.1-39.el7_9.tuxcare.els10.noarch.rpm</filename>
          <sum type="sha256">f981dbfaaeb78b9b56cb7798405c89fa08b801eeb3ca47db54b409f0b2f6ccf6</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758025991</id>
    <title>gnutls: Fix of CVE-2025-32990</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-32990: fix memory corruption in when parsing a template file</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-32990: fix memory corruption in when parsing a template file</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-16 12:33:14 UTC" />
    <updated date="2025-09-16 12:33:14 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758025991.html" id="CLSA-2025:1758025991" title="CLSA-2025:1758025991" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="gnutls" release="9.el7_9.tuxcare.els2" src="gnutls-3.3.29-9.el7_9.tuxcare.els2.src.rpm" version="3.3.29">
          <filename>gnutls-3.3.29-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">e9ee5f0ecadd682f5018a65aa555221c5ee5b67bce7d9f631392b75859bfc4a5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls" release="9.el7_9.tuxcare.els2" src="gnutls-3.3.29-9.el7_9.tuxcare.els2.src.rpm" version="3.3.29">
          <filename>gnutls-3.3.29-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f8dbf369439558fad561dc4a2b81bf708c13399d64fb9b908cd94f61800e7dfc</sum>
        </package>
        <package arch="i686" epoch="0" name="gnutls-c++" release="9.el7_9.tuxcare.els2" src="gnutls-3.3.29-9.el7_9.tuxcare.els2.src.rpm" version="3.3.29">
          <filename>gnutls-c++-3.3.29-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">cdddc15cccbe437ace5cbf6363efd8fa1ca5f70e3041f738b13ed8ba13d379f9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls-c++" release="9.el7_9.tuxcare.els2" src="gnutls-3.3.29-9.el7_9.tuxcare.els2.src.rpm" version="3.3.29">
          <filename>gnutls-c++-3.3.29-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">00480aa1526453bd2d462bf7975b09920eedce4aa7138664bda83616023be75b</sum>
        </package>
        <package arch="i686" epoch="0" name="gnutls-dane" release="9.el7_9.tuxcare.els2" src="gnutls-3.3.29-9.el7_9.tuxcare.els2.src.rpm" version="3.3.29">
          <filename>gnutls-dane-3.3.29-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">df4a83e6d3bbb99057b498aa3ea6f5fa695e8e1fa5452a7b3cdea171c11a7d43</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls-dane" release="9.el7_9.tuxcare.els2" src="gnutls-3.3.29-9.el7_9.tuxcare.els2.src.rpm" version="3.3.29">
          <filename>gnutls-dane-3.3.29-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">bcf1ff3ce04dd95c3a5a48bcdbe637d0a727d3029704d2f15aeb664e7420b5b4</sum>
        </package>
        <package arch="i686" epoch="0" name="gnutls-devel" release="9.el7_9.tuxcare.els2" src="gnutls-3.3.29-9.el7_9.tuxcare.els2.src.rpm" version="3.3.29">
          <filename>gnutls-devel-3.3.29-9.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">65845f4281ae890776cdd63830aacfcc122a773e21468c3bb8bf6640f0dbe645</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls-devel" release="9.el7_9.tuxcare.els2" src="gnutls-3.3.29-9.el7_9.tuxcare.els2.src.rpm" version="3.3.29">
          <filename>gnutls-devel-3.3.29-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">315a78178a86ec2a471566d586d5dc34fef79e822cbf05233e0d26d64f640ad1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gnutls-utils" release="9.el7_9.tuxcare.els2" src="gnutls-3.3.29-9.el7_9.tuxcare.els2.src.rpm" version="3.3.29">
          <filename>gnutls-utils-3.3.29-9.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">0e1aa1da832493705163ef0ae0b0aeb797a30808643be2d15dbb0e2de0120605</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757699919</id>
    <title>ruby: Fix of CVE-2016-2338</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2016-2338: fix heap overflow vulnerability in start_document function</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2016-2338: fix heap overflow vulnerability in start_document function</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-12 17:58:43 UTC" />
    <updated date="2025-09-12 17:58:43 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757699919.html" id="CLSA-2025:1757699919" title="CLSA-2025:1757699919" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="ruby" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.0.648">
          <filename>ruby-2.0.0.648-39.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">6fbafd5f961e6f6ad97e52c496e10cd309e999574584f4273b3627ae50203483</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-devel" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.0.648">
          <filename>ruby-devel-2.0.0.648-39.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">d6835e957d122574d24041dcbec023398bef373353ed6d121d49fe403ceda7d0</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-doc" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.0.648">
          <filename>ruby-doc-2.0.0.648-39.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">a6c2dfed307306ffb656785ab2e437dff5e630cad6038efaa22e3b1ce1248d91</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-irb" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.0.648">
          <filename>ruby-irb-2.0.0.648-39.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">00443a9d3a272d8b97f2b79ec255696b23ff402c1c4231483342a65257e208e8</sum>
        </package>
        <package arch="i686" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els9.i686.rpm</filename>
          <sum type="sha256">3f874203824bf051b44fa46ad429db4896e991dfa0fb89c4a77139145871ac15</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">3f26faf8680a27f032bfe5d19fb2a8e10d57ba102df6561c18b74db20122fc7f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-tcltk" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.0.648">
          <filename>ruby-tcltk-2.0.0.648-39.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">11302e49f3fbf0c891833a27e63870f1bd76c132175c98b90c5eae671cd38773</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-bigdecimal" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="1.2.0">
          <filename>rubygem-bigdecimal-1.2.0-39.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">0d48cccb09163506d143d672485aa8e971864093317b829bfa28652b24a13ad8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-io-console" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="0.4.2">
          <filename>rubygem-io-console-0.4.2-39.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">6832cae61c1b6cd75fe011b947b51de4eec1f1b443e615dfdf944cc32fafada5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-json" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="1.7.7">
          <filename>rubygem-json-1.7.7-39.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">e1b742fb90c858ac9ca9bbd4d4ef86725971a8d68393a0dee5cb20dbb28d97e1</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-minitest" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="4.3.2">
          <filename>rubygem-minitest-4.3.2-39.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">261b89d8faa636e99df93d667c72a9c01ff325e679c5bed7673d62c1d0178781</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-psych" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.0">
          <filename>rubygem-psych-2.0.0-39.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">6a6fd072b5951479b67eee3d50e2d1cc89d6bbf39082cb3c17a5e12c6d2952a2</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rake" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="0.9.6">
          <filename>rubygem-rake-0.9.6-39.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">4877f452f8c561ee3b0ec3d32c09a31193d05db4793cfe30f43dfecd423a535f</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rdoc" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="4.0.0">
          <filename>rubygem-rdoc-4.0.0-39.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">ff278e112f31dc073b67a8e37a72dec610e328855cf9067ccc62ccc413738269</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.14.1">
          <filename>rubygems-2.0.14.1-39.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">81da7140e8bc355d827a928da6f48d5ce271e46100f1e0728198662bc02a5e8a</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems-devel" release="39.el7_9.tuxcare.els9" src="ruby-2.0.0.648-39.el7_9.tuxcare.els9.src.rpm" version="2.0.14.1">
          <filename>rubygems-devel-2.0.14.1-39.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">291b7912b934a8edf3cb2efbd3e8b174a29b8f62cb45e33e47e294d71a234da0</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757700003</id>
    <title>glibc: Fix of CVE-2025-4802</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-4802: prevent untrusted LD_LIBRARY_PATH from loading
  dynamically shared libraries in statically compiled binaries that call
  dlopen</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-4802: prevent untrusted LD_LIBRARY_PATH from loading
  dynamically shared libraries in statically compiled binaries that call
  dlopen</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-12 18:00:07 UTC" />
    <updated date="2025-09-12 18:00:07 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757700003.html" id="CLSA-2025:1757700003" title="CLSA-2025:1757700003" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="glibc" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-2.17-326.el7_9.99.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">08af199ce6723f8ec08b724c2dbd284a86de0370f183abdcf9d37dd0528a2420</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-2.17-326.el7_9.99.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5f4546afac11fb5256ae574f43a25195872ab9b4ba401cc0c0a5ec2fb33a56e0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-common" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-common-2.17-326.el7_9.99.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">adecedb93b0e311b0d7e82563f90c1f904adfdd05ebcb2f21c739ab26d5c32fe</sum>
        </package>
        <package arch="i686" epoch="0" name="glibc-devel" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-devel-2.17-326.el7_9.99.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">0efe00520e56974d81e07c72be32137614ecde2daa4ab233f3b09cea88787202</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-devel" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-devel-2.17-326.el7_9.99.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fe337d2ce1c0bd762ab5d10d271541df1274242c99cc384a716d0c819c1075a4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-headers" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-headers-2.17-326.el7_9.99.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">71ddfe8febe7192f9457731a6df57f84f0ab7097fc6dcfe93b87ad20d022943f</sum>
        </package>
        <package arch="i686" epoch="0" name="glibc-static" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-static-2.17-326.el7_9.99.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">543794b404957c716a5bbacfa614d1fb4d813d19311d733ac4d07cb59b26d706</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-static" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-static-2.17-326.el7_9.99.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cbb4c72e8dd574a24970f9ed145d386335cc22b18081c1d783d1b755b57c7115</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-utils" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>glibc-utils-2.17-326.el7_9.99.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6d09a6fac4ab8d104707ad737e764b194bca3043022c171392fd743389d29e55</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nscd" release="326.el7_9.99.tuxcare.els1" src="glibc-2.17-326.el7_9.99.tuxcare.els1.src.rpm" version="2.17">
          <filename>nscd-2.17-326.el7_9.99.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">bf063c2b1f727d201c9b1a35692c7ffa7c7be250242cf871566e848da0743c61</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1757925072</id>
    <title>Update of microcode_ctl</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update Intel CPU microcode to 20250812:
  - Addition of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000401;
  - Addition of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000643;
  - Addition of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x3a;
  - Addition of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x437;
  - Addition of cpuid:A06D1/0x20 (GNR-AP/SP H0) microcode (in microcode.dat) at
    revision 0xa000100;
  - Addition of cpuid:A06D1/0x95 (GNR-AP/SP B0) microcode (in microcode.dat) at
    revision 0x10003d0;
  - Addition of cpuid:B0650/0x80 (ARL-U A1) microcode (in microcode.dat) at
    revision 0xa;
  - Addition of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x12f;
  - Addition of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4129;
  - Addition of cpuid:B06D1/0x80 (LNL B0) microcode (in microcode.dat) at
    revision 0x123;
  - Addition of cpuid:C0652/0x82 (ARL-H A1) microcode (in microcode.dat) at
    revision 0x119;
  - Addition of cpuid:C0662/0x82 (ARL-HX 8P/S B0) microcode (in microcode.dat)
    at revision 0x119;
  - Addition of cpuid:C0664/0x82 microcode (in microcode.dat) at revision
    0x119;
  - Addition of cpuid:C06A2/0x82 microcode (in microcode.dat) at revision
    0x119;
  - Addition of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x210002b3;
  - Removal of cpuid:50656/0xbf (CLX-SP B0) microcode (in microcode.dat) at
    revision 0x4003605;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c0003e0;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000620;
  - Removal of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x38;
  - Removal of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x436;
  - Removal of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x12c;
  - Removal of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4124;
  - Removal of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) at
    revision 0x21000291;
  - Removal of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x21000291;
  - Update of cpuid:50657/0xbf (CLX-SP/W/X B1/L1) microcode (in microcode.dat)
    from revision 0x5003707 up to 0x5003901;
  - Update of cpuid:5065B/0xbf (CPX-SP A1) microcode (in microcode.dat) from
    revision 0x7002904 up to 0x7002b01;
  - Update of cpuid:606A6/0x87 (ICX-SP D0) microcode (in microcode.dat) from
    revision 0xd0003f5 up to 0xd000410;
  - Update of cpuid:606C1/0x10 (ICL-D B0) microcode (in microcode.dat) from
    revision 0x10002c0 up to 0x10002e0;
  - Update of cpuid:706A8/0x01 (GLK-R R0) microcode (in microcode.dat) from
    revision 0x24 up to 0x26;
  - Update of cpuid:706E5/0x80 (ICL-U/Y D1) microcode (in microcode.dat) from
    revision 0xc6 up to 0xca;
  - Update of cpuid:806C1/0x80 (TGL-UP3/UP4 B1) microcode (in microcode.dat)
    from revision 0xb8 up to 0xbc;
  - Update of cpuid:806C2/0xc2 (TGL-R C0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3c;
  - Update of cpuid:806D1/0xc2 (TGL-H R0) microcode (in microcode.dat) from
    revision 0x52 up to 0x56;
  - Update of cpuid:806EC/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode
    (in microcode.dat) from revision 0xfc up to 0x100;
  - Update of cpuid:806F4/0x10 microcode (in microcode.dat) from revision
    0x2c0003e0 up to 0x2c000401;
  - Update of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) from
    revision 0x2b000620 up to 0x2b000643;
  - Update of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) from
    revision 0x2c0003e0 up to 0x2c000401;
  - Update of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) from
    revision 0x2b000620 up to 0x2b000643;
  - Update of cpuid:806F6/0x10 microcode (in microcode.dat) from revision
    0x2c0003e0 up to 0x2c000401;
  - Update of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) from
    revision 0x2b000620 up to 0x2b000643;
  - Update of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) from
    revision 0x2b000620 up to 0x2b000643;
  - Update of cpuid:90675/0x07 (ADL-S 6+0 K0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3a;
  - Update of cpuid:906A4/0x40 (AZB A0) microcode (in microcode.dat) from
    revision 0x9 up to 0xa;
  - Update of cpuid:906A4/0x80 (ADL-P 2+8 R0) microcode (in microcode.dat) from
    revision 0x436 up to 0x437;
  - Update of cpuid:906ED/0x22 (CFL-H/S/Xeon E R0) microcode (in microcode.dat)
    from revision 0x102 up to 0x104;
  - Update of cpuid:A0652/0x20 (CML-H R1) microcode (in microcode.dat) from
    revision 0xfc up to 0x100;
  - Update of cpuid:A0653/0x22 (CML-S 6+2 G1) microcode (in microcode.dat) from
    revision 0xfc up to 0x100;
  - Update of cpuid:A0655/0x22 (CML-S 10+2 Q0) microcode (in microcode.dat)
    from revision 0xfc up to 0x100;
  - Update of cpuid:A0660/0x80 (CML-U 6+2 A0) microcode (in microcode.dat) from
    revision 0xfe up to 0x102;
  - Update of cpuid:A0661/0x80 (CML-U 6+2 v2 K1) microcode (in microcode.dat)
    from revision 0xfc up to 0x100;
  - Update of cpuid:A0671/0x02 (RKL-S B0) microcode (in microcode.dat) from
    revision 0x63 up to 0x64;
  - Update of cpuid:A06A4/0xe6 (MTL-H/U C0) microcode (in microcode.dat) from
    revision 0x20 up to 0x25;
  - Update of cpuid:A06F3/0x01 (SRF-SP C0) microcode (in microcode.dat) from
    revision 0x3000330 up to 0x3000362;
  - Update of cpuid:B0674/0x32 microcode (in microcode.dat) from revision 0x12c
    up to 0x12f;
  - Update of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) from
    revision 0x4124 up to 0x4129;
  - Update of cpuid:B06A8/0xe0 microcode (in microcode.dat) from revision
    0x4124 up to 0x4129;
  - Update of cpuid:B06E0/0x19 (ADL-N A0) microcode (in microcode.dat) from
    revision 0x1c up to 0x1d;
  - Update of cpuid:B06F2/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3a;
  - Update of cpuid:B06F5/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3a;
  - Update of cpuid:B06F6/0x07 microcode (in microcode.dat) from revision 0x38
    up to 0x3a;
  - Update of cpuid:B06F7/0x07 microcode (in microcode.dat) from revision 0x38
    up to 0x3a;
  - Update of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) from
    revision 0x21000291 up to 0x210002b3;</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update Intel CPU microcode to 20250812:
  - Addition of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000401;
  - Addition of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000643;
  - Addition of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x3a;
  - Addition of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x437;
  - Addition of cpuid:A06D1/0x20 (GNR-AP/SP H0) microcode (in microcode.dat) at
    revision 0xa000100;
  - Addition of cpuid:A06D1/0x95 (GNR-AP/SP B0) microcode (in microcode.dat) at
    revision 0x10003d0;
  - Addition of cpuid:B0650/0x80 (ARL-U A1) microcode (in microcode.dat) at
    revision 0xa;
  - Addition of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x12f;
  - Addition of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4129;
  - Addition of cpuid:B06D1/0x80 (LNL B0) microcode (in microcode.dat) at
    revision 0x123;
  - Addition of cpuid:C0652/0x82 (ARL-H A1) microcode (in microcode.dat) at
    revision 0x119;
  - Addition of cpuid:C0662/0x82 (ARL-HX 8P/S B0) microcode (in microcode.dat)
    at revision 0x119;
  - Addition of cpuid:C0664/0x82 microcode (in microcode.dat) at revision
    0x119;
  - Addition of cpuid:C06A2/0x82 microcode (in microcode.dat) at revision
    0x119;
  - Addition of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x210002b3;
  - Removal of cpuid:50656/0xbf (CLX-SP B0) microcode (in microcode.dat) at
    revision 0x4003605;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c0003e0;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000620;
  - Removal of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x38;
  - Removal of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x436;
  - Removal of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x12c;
  - Removal of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4124;
  - Removal of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) at
    revision 0x21000291;
  - Removal of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x21000291;
  - Update of cpuid:50657/0xbf (CLX-SP/W/X B1/L1) microcode (in microcode.dat)
    from revision 0x5003707 up to 0x5003901;
  - Update of cpuid:5065B/0xbf (CPX-SP A1) microcode (in microcode.dat) from
    revision 0x7002904 up to 0x7002b01;
  - Update of cpuid:606A6/0x87 (ICX-SP D0) microcode (in microcode.dat) from
    revision 0xd0003f5 up to 0xd000410;
  - Update of cpuid:606C1/0x10 (ICL-D B0) microcode (in microcode.dat) from
    revision 0x10002c0 up to 0x10002e0;
  - Update of cpuid:706A8/0x01 (GLK-R R0) microcode (in microcode.dat) from
    revision 0x24 up to 0x26;
  - Update of cpuid:706E5/0x80 (ICL-U/Y D1) microcode (in microcode.dat) from
    revision 0xc6 up to 0xca;
  - Update of cpuid:806C1/0x80 (TGL-UP3/UP4 B1) microcode (in microcode.dat)
    from revision 0xb8 up to 0xbc;
  - Update of cpuid:806C2/0xc2 (TGL-R C0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3c;
  - Update of cpuid:806D1/0xc2 (TGL-H R0) microcode (in microcode.dat) from
    revision 0x52 up to 0x56;
  - Update of cpuid:806EC/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode
    (in microcode.dat) from revision 0xfc up to 0x100;
  - Update of cpuid:806F4/0x10 microcode (in microcode.dat) from revision
    0x2c0003e0 up to 0x2c000401;
  - Update of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) from
    revision 0x2b000620 up to 0x2b000643;
  - Update of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) from
    revision 0x2c0003e0 up to 0x2c000401;
  - Update of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) from
    revision 0x2b000620 up to 0x2b000643;
  - Update of cpuid:806F6/0x10 microcode (in microcode.dat) from revision
    0x2c0003e0 up to 0x2c000401;
  - Update of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) from
    revision 0x2b000620 up to 0x2b000643;
  - Update of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) from
    revision 0x2b000620 up to 0x2b000643;
  - Update of cpuid:90675/0x07 (ADL-S 6+0 K0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3a;
  - Update of cpuid:906A4/0x40 (AZB A0) microcode (in microcode.dat) from
    revision 0x9 up to 0xa;
  - Update of cpuid:906A4/0x80 (ADL-P 2+8 R0) microcode (in microcode.dat) from
    revision 0x436 up to 0x437;
  - Update of cpuid:906ED/0x22 (CFL-H/S/Xeon E R0) microcode (in microcode.dat)
    from revision 0x102 up to 0x104;
  - Update of cpuid:A0652/0x20 (CML-H R1) microcode (in microcode.dat) from
    revision 0xfc up to 0x100;
  - Update of cpuid:A0653/0x22 (CML-S 6+2 G1) microcode (in microcode.dat) from
    revision 0xfc up to 0x100;
  - Update of cpuid:A0655/0x22 (CML-S 10+2 Q0) microcode (in microcode.dat)
    from revision 0xfc up to 0x100;
  - Update of cpuid:A0660/0x80 (CML-U 6+2 A0) microcode (in microcode.dat) from
    revision 0xfe up to 0x102;
  - Update of cpuid:A0661/0x80 (CML-U 6+2 v2 K1) microcode (in microcode.dat)
    from revision 0xfc up to 0x100;
  - Update of cpuid:A0671/0x02 (RKL-S B0) microcode (in microcode.dat) from
    revision 0x63 up to 0x64;
  - Update of cpuid:A06A4/0xe6 (MTL-H/U C0) microcode (in microcode.dat) from
    revision 0x20 up to 0x25;
  - Update of cpuid:A06F3/0x01 (SRF-SP C0) microcode (in microcode.dat) from
    revision 0x3000330 up to 0x3000362;
  - Update of cpuid:B0674/0x32 microcode (in microcode.dat) from revision 0x12c
    up to 0x12f;
  - Update of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) from
    revision 0x4124 up to 0x4129;
  - Update of cpuid:B06A8/0xe0 microcode (in microcode.dat) from revision
    0x4124 up to 0x4129;
  - Update of cpuid:B06E0/0x19 (ADL-N A0) microcode (in microcode.dat) from
    revision 0x1c up to 0x1d;
  - Update of cpuid:B06F2/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3a;
  - Update of cpuid:B06F5/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x38 up to 0x3a;
  - Update of cpuid:B06F6/0x07 microcode (in microcode.dat) from revision 0x38
    up to 0x3a;
  - Update of cpuid:B06F7/0x07 microcode (in microcode.dat) from revision 0x38
    up to 0x3a;
  - Update of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) from
    revision 0x21000291 up to 0x210002b3;</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-15 08:31:16 UTC" />
    <updated date="2025-09-15 08:31:16 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757925072.html" id="CLSA-2025:1757925072" title="CLSA-2025:1757925072" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="microcode_ctl" release="73.25.el7_9.tuxcare.els1" src="microcode_ctl-2.1-73.25.el7_9.tuxcare.els1.src.rpm" version="2.1">
          <filename>microcode_ctl-2.1-73.25.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7eecf8131660594d23201cd79226ab68b07b6179515612dbb46cb5393de12886</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758300791</id>
    <title>glibc: Fix of CVE-2019-9169</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fix spec-file for CVE-2019-9169</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fix spec-file for CVE-2019-9169</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-19 16:53:15 UTC" />
    <updated date="2025-09-19 16:53:15 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758300791.html" id="CLSA-2025:1758300791" title="CLSA-2025:1758300791" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="glibc" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>glibc-2.17-326.el7_9.99.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">0a4aa81585e73d6ff5b83f243728d6c04e9c75754f57ac123f4772291eed2ae4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>glibc-2.17-326.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">f806e1c3b0ffa9c1eba81e43b42ee71c33bccb33eb85a6c366e182bee4cdc711</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-common" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>glibc-common-2.17-326.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7504786597cfe3b87a7f273378b22764a63fd32028323ab4c117b712f13d76ea</sum>
        </package>
        <package arch="i686" epoch="0" name="glibc-devel" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>glibc-devel-2.17-326.el7_9.99.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">bdbcbbb82f2ad88b6fa03e5efac7be0108337f6a016fedf3c18000e61850dfdb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-devel" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>glibc-devel-2.17-326.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">e7261ae790105973630f8dd3bbf7f22f4cd23916d26efbb030c527bd56ffea7d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-headers" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>glibc-headers-2.17-326.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a0290c347e51d230e4fbd297202b5cbd4c778f8121768079f37f5db241602f9b</sum>
        </package>
        <package arch="i686" epoch="0" name="glibc-static" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>glibc-static-2.17-326.el7_9.99.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">5d748ac9908c96e063e010686b2307bd11df3f834daac4799caf067f77e8c112</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-static" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>glibc-static-2.17-326.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">1e1188f44cd81ee69f68d572d41d2fe20fa1a23b26d4da7bf0979c2718ff20b3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-utils" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>glibc-utils-2.17-326.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">64c291924be5dba5ad3e76d2b340b70a6c8f79d4aea61d893ba5a1a487d47f29</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nscd" release="326.el7_9.99.tuxcare.els3" src="glibc-2.17-326.el7_9.99.tuxcare.els3.src.rpm" version="2.17">
          <filename>nscd-2.17-326.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">02e19d4f95038e61d3c12ab2e1894bc337c4e95707ebe1b17668d4cc610f9c4e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1757924940</id>
    <title>glibc: Fix of CVE-2019-9169</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2019-9169: fix heap-based buffer over-read in proceed_next_node function
  in posix/regexec.c</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2019-9169: fix heap-based buffer over-read in proceed_next_node function
  in posix/regexec.c</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-30 07:52:42 UTC" />
    <updated date="2025-09-30 07:52:42 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1757924940.html" id="CLSA-2025:1757924940" title="CLSA-2025:1757924940" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="glibc" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>glibc-2.17-326.el7_9.99.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">dd2a72b88b395361cfb425ee0f864ca28bf7236c0b696bfcba77befd5c0ac6e2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>glibc-2.17-326.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3e88f61e03da031924795275ddbf1e898d6b5e23e92dd19b2b0887c40f75c467</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-common" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>glibc-common-2.17-326.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">7271cfe06b08c3d871c6ad2741b2b0dfdc87661f52e3215d6c885f3e2861286d</sum>
        </package>
        <package arch="i686" epoch="0" name="glibc-devel" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>glibc-devel-2.17-326.el7_9.99.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">307d556ce61ed6772576b79fbcb75beecbe5236a75d45b217159c203348e7c9d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-devel" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>glibc-devel-2.17-326.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">281c9620c965ee0dfaca258dc0f27694cd8c4029ee9833a4497f59ce2acbcbd9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-headers" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>glibc-headers-2.17-326.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">660d6034e7456dbb8078c9693a2d3f8fce11a26e6bc2897eb070a3dfc6ce724e</sum>
        </package>
        <package arch="i686" epoch="0" name="glibc-static" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>glibc-static-2.17-326.el7_9.99.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">4e6d2896b0c422a5d2f8ff5e538d039ee07b5fa6205784f69f2be6858cb7c98f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-static" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>glibc-static-2.17-326.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">865fb0c44f03f5b8a61fd3ee394e10d4c93cbbe38e0a585e45ed38e1db4cca9c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glibc-utils" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>glibc-utils-2.17-326.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">8aff65db406036de129ff0cab3d264de661c40a4f7c844fa9df40091891425af</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nscd" release="326.el7_9.99.tuxcare.els2" src="glibc-2.17-326.el7_9.99.tuxcare.els2.src.rpm" version="2.17">
          <filename>nscd-2.17-326.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">fc09a14005964d78d362e1d54970eb41c21aae792eecb4bcbd49e0de822ef4c7</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758042045</id>
    <title>ImageMagick: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-53101: fix heap OOB write in BlobStream
- CVE-2025-57807: fix stack overflow through vsnprintf()</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-53101: fix heap OOB write in BlobStream
- CVE-2025-57807: fix stack overflow through vsnprintf()</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-16 17:00:49 UTC" />
    <updated date="2025-09-16 17:00:49 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758042045.html" id="CLSA-2025:1758042045" title="CLSA-2025:1758042045" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">2b3fa90e98b8d2cd1558e8be555c6c49f75999aa7861950a2f6e122d3c4aa101</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a7a4c0e707885d09e6bd0db33c87948c088bc85e9df4471ae246eb851ef0e682</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">1b9262d7c2c53d3aad788851062df3d65826281ee83f59d3daa3fcec77523a41</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f8c1dbbb48ffd55d33dcaf4f242467eccf64441c0cb6bfbf9a19b6b47c3bdb6d</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">7a8f5ed287f13ab1d72527236fc12456a5e8f46345b35816b4a5e0669ce9e944</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">223ca3fda8ed02aedb8eaf09d9b788dc3b56fd3dcb060f20ef49038c24ce11b5</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">a365c7482c79e6aa8d4f950bda725bb3b058e9b7ad277d5ff535ca17e42a2a06</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">97cd76a7bfa2bb9959fa633e98e4de13cf22764d758c26cfafe1afc7ff4128f7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">d6a6ccdfeeaef5af4e0b90cec95ff50329acb83173c25bfbd87599df9231dba5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f65c8a776ab8688eaf08039caff45aaa4700fad8a777c8619f4668e0a65e1f4b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758195721</id>
    <title>ImageMagick: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-55154: fix integer overflows in MNG magnification
- CVE-2025-55212: fix division by zero in ThumbnailImage
- CVE-2025-57803: fix 32-bit integer overflow when writing BMP scanline stride
- CVE-2025-55298: fix format string bug leading to RCE or heap overflow</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-55154: fix integer overflows in MNG magnification
- CVE-2025-55212: fix division by zero in ThumbnailImage
- CVE-2025-57803: fix 32-bit integer overflow when writing BMP scanline stride
- CVE-2025-55298: fix format string bug leading to RCE or heap overflow</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-18 11:42:05 UTC" />
    <updated date="2025-09-18 11:42:05 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758195721.html" id="CLSA-2025:1758195721" title="CLSA-2025:1758195721" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">98da66c2eb05b09f7f285cc48821aa29b9ecc882f447f81ad13053336165c49d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">6940c8cb6890b646b2aceea93ba84857087c32d9a5bb49fd063e20d04714ec42</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">99519908c210137531f093bd115db32799201e340a2955052b0a01e9927b7331</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">c29242df02d26fd961fb3b4cbcfa8b55db815b5ca7ce0ec101f35bff1433e055</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">579672bdd2e6e35f287e2b30700e6b25644af5fce9a36c8a3f06dcc7c1198823</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">762f9adcf72c836ccc867aa3228e894610eb4dc0028b3be50ed93429cdca06fa</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">805312eafec4218a5ef57cf7198ae50e63d534664242840709814292062b7ba4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">5bd8fee61aa8be470b42969bb690bb93a09536ff78239344b0421f542c531875</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">2aa02461951acd15ffb212a45af3994eaea6de536efa22d9f7ebf68c6189526b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">7e436d10726941d14f10bbb42a7e305f186f44a0ffed03765adceb5439ea8ab8</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758644444</id>
    <title>libtiff: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-8176: fix use after free in tools/tiffmedian.c
- CVE-2025-8177: fix buffer overflow in tools/thumbnail.c</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-8176: fix use after free in tools/tiffmedian.c
- CVE-2025-8177: fix buffer overflow in tools/thumbnail.c</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-23 16:20:48 UTC" />
    <updated date="2025-09-23 16:20:48 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758644444.html" id="CLSA-2025:1758644444" title="CLSA-2025:1758644444" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libtiff" release="35.el7.tuxcare.els4" src="libtiff-4.0.3-35.el7.tuxcare.els4.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">d0f44dcd96d2be11f661cb3c473271c4f1884709ac7c39475491988326d4ee9b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff" release="35.el7.tuxcare.els4" src="libtiff-4.0.3-35.el7.tuxcare.els4.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">06ac6f6598c74064c3065e354b6e7a4938b2a78d84abdcbfef74fa92ad46fa7f</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els4" src="libtiff-4.0.3-35.el7.tuxcare.els4.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">36e1673fb7229a32282d91fbd984cfe6cc2c35a1928b7161d3f363a6b92991e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els4" src="libtiff-4.0.3-35.el7.tuxcare.els4.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f1df5f07f70e59a354f5a809ce824ceda8dab69813bf709b8f328cce515687b3</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els4" src="libtiff-4.0.3-35.el7.tuxcare.els4.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">0960c43e08ba164e01c78fb0e473769834372bd84deab773282208dcb48c7fc3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els4" src="libtiff-4.0.3-35.el7.tuxcare.els4.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">86a26f3b1917bef5d2dee607c69714482e8844ababb28c3d8eec19c8108ac107</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-tools" release="35.el7.tuxcare.els4" src="libtiff-4.0.3-35.el7.tuxcare.els4.src.rpm" version="4.0.3">
          <filename>libtiff-tools-4.0.3-35.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a9e349ff394dc2349ba900439c01a0309189155851963b4598f1c07eba6de315</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758709327</id>
    <title>glib2: Fix of CVE-2024-52533</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-52533: fix off-by-one error leading to buffer overflow in
  gsocks4aproxy.c</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-52533: fix off-by-one error leading to buffer overflow in
  gsocks4aproxy.c</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-24 10:22:11 UTC" />
    <updated date="2025-09-24 10:22:11 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758709327.html" id="CLSA-2025:1758709327" title="CLSA-2025:1758709327" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="glib2" release="9.el7_9.tuxcare.els3" src="glib2-2.56.1-9.el7_9.tuxcare.els3.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">9b90cc68ad0e9f9c702f17a200a0bd817a084dedef8d45b0b9afef9220ca1842</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2" release="9.el7_9.tuxcare.els3" src="glib2-2.56.1-9.el7_9.tuxcare.els3.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">9b72daec1875ea6ac3a7afc59ac3f96b77e3ff697e1e50ffa8db3728e737db1f</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els3" src="glib2-2.56.1-9.el7_9.tuxcare.els3.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">095e97b0c93eeb38843e231cc30664e729d5e51fb29f4009158e50c4122702f0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els3" src="glib2-2.56.1-9.el7_9.tuxcare.els3.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a366b8468e0ee903664dab610d92ce1551faa624e09aedd7e3aa813e4e8ac0d9</sum>
        </package>
        <package arch="noarch" epoch="0" name="glib2-doc" release="9.el7_9.tuxcare.els3" src="glib2-2.56.1-9.el7_9.tuxcare.els3.src.rpm" version="2.56.1">
          <filename>glib2-doc-2.56.1-9.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">8751d6e13420d5a3da4e89d3a7cd8b58528e4b4809f66e89ed7720a42827d54e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-fam" release="9.el7_9.tuxcare.els3" src="glib2-2.56.1-9.el7_9.tuxcare.els3.src.rpm" version="2.56.1">
          <filename>glib2-fam-2.56.1-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">f1db00b954a62c0eb867ce37af954a65be5cc0ed8cfc17c5d3e292b506213779</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els3" src="glib2-2.56.1-9.el7_9.tuxcare.els3.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">b1d54523c01993765128e71cce636b1079d9a2c141f09b035c1b092e25b25138</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els3" src="glib2-2.56.1-9.el7_9.tuxcare.els3.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">b0c8c8c7cbb0db28e6f652b85f975ae90a1c0bb76a146e762250d69d21f1d10b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-tests" release="9.el7_9.tuxcare.els3" src="glib2-2.56.1-9.el7_9.tuxcare.els3.src.rpm" version="2.56.1">
          <filename>glib2-tests-2.56.1-9.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">6623c43c915d93ec7d762250050eb3c65cb732aa128a3e843240182d6af052b1</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758635382</id>
    <title>openssl: Fix of CVE-2023-3446</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-3446: fix DH_check() excessive time with over sized modulus</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-3446: fix DH_check() excessive time with over sized modulus</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-23 13:49:47 UTC" />
    <updated date="2025-09-23 13:49:47 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758635382.html" id="CLSA-2025:1758635382" title="CLSA-2025:1758635382" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="openssl" release="26.el7_9.tuxcare.els5" src="openssl-1.0.2k-26.el7_9.tuxcare.els5.src.rpm" version="1.0.2k">
          <filename>openssl-1.0.2k-26.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">816f1c5f921de82a104f0a4e39ec7b86513fbcd4c77161841b2e780a51ee1c49</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els5" src="openssl-1.0.2k-26.el7_9.tuxcare.els5.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">609f99b5961e964f376d1446e9a01d90000cbf4c798e6afbe40fd359ce5b0d0e</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els5" src="openssl-1.0.2k-26.el7_9.tuxcare.els5.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">03bd0202341a3c96aa3735e31d53f23f1be917e860ec7858b4af12f0970a22c4</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els5" src="openssl-1.0.2k-26.el7_9.tuxcare.els5.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">696c5d7679e9572b89209468c017b3c2922e34879f419960e0df1bc6f7510435</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els5" src="openssl-1.0.2k-26.el7_9.tuxcare.els5.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">fec54fe101c261abaa758414701cc98ae95182bb36fe15ae82d091252bb744bc</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-perl" release="26.el7_9.tuxcare.els5" src="openssl-1.0.2k-26.el7_9.tuxcare.els5.src.rpm" version="1.0.2k">
          <filename>openssl-perl-1.0.2k-26.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">2e9ee7962a1c174782d53754088e93d069386f7c92cd81264a0b3946c07de54a</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els5" src="openssl-1.0.2k-26.el7_9.tuxcare.els5.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">60720b965972b817d606a06f5933e332766983aabacb69429b2db3deace35019</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els5" src="openssl-1.0.2k-26.el7_9.tuxcare.els5.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">8eca07e35666ddd7967216da043a31b7a4ae5e3821d1da7710de566f2ce8e401</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758644330</id>
    <title>ImageMagick: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-53019: fix memory leak in StreamImage
- Fix the patch for CVE-2022-32546</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-53019: fix memory leak in StreamImage
- Fix the patch for CVE-2022-32546</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-23 16:18:54 UTC" />
    <updated date="2025-09-23 16:18:54 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758644330.html" id="CLSA-2025:1758644330" title="CLSA-2025:1758644330" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">dfae106fd0143c9a0631fbb2bde071ff54713fe4f2490bfb7ab1a2328d7a5c54</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">4db7ac0459cdf05f62e52f1044e5113cd2d06409a26d90fd8b92fb57dfe663be</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">99d0c9f0456207755fba69e66d8ee7fbfc245190d784df18385b2bc94034353c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">eb7e15774ce3861a864a4ac0721c14d9fae9cbaa0c11fb82e2c3bfe2541af2d2</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">e6a1591c520e6c2e888c68147e8cb6503ddb1d1b26aeb2ee3a45467abe914e38</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">a37dcd575ca7fba6a277729c72bb5afe4b0ba931a9f975eb7b115e4a301175cc</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">eb98f767dad5d791b14210b5495dca447424c9e65fc128a203dc7be642923b48</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">68a782f19649ceb819238e0e829f42f0846bf3ca898aacf974d7428b2e02dbfc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">c94f29dca27ad28f3a76a5916c0525fe1b3a35913bf174fd5bc27458c89b29a9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.el7_9.tuxcare.els6" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els6.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">6e986b2d404871d390a713b0da4cc2c95f46529b206f08b38ac6129a107ed7fc</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758891628</id>
    <title>grub2: Fix of CVE-2014-4607</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2014-4607: minilzo: Update to minilzo-2.08 to fix integer overflow</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2014-4607: minilzo: Update to minilzo-2.08 to fix integer overflow</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-26 13:00:32 UTC" />
    <updated date="2025-09-26 13:00:32 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758891628.html" id="CLSA-2025:1758891628" title="CLSA-2025:1758891628" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="3" name="grub2" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">cc966477bbe37de409763b3e677b060e14048d478dca425851a3c0d0cb76b110</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-common" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-common-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">2052e3eebd6d0aaa7a404fe2212140d5f2523ecada1b673e825114a92719d30e</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-ia32" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">cb59c8ec575a54179012f9ad51be594a08112c19e278c18587fb73f52aed9fd9</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-ia32-cdboot" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-cdboot-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b301d260b3c75cac959e52c79c3248c760fd0515aa9b5bb47ce03bf14247485b</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-efi-ia32-modules" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">5d36629ae95e28d0a79c4e151afb6ce1a38df19267f26c817a93c560265f54cd</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-x64" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-efi-x64-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">e7b5b8e4cd05d2c8a1826f2294443c087ebecfb4c64ff47052ac3356f1e07264</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-x64-cdboot" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-efi-x64-cdboot-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">3a0603fe061916bbde92d60da6a3d19cdf4f8ddc5d34a72eb857ee5ec34108bb</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-efi-x64-modules" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-efi-x64-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">355629aeb1732052d60dadf6d8a795edc0ca7414305c447c7d6990e67b92db7d</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-i386-modules" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-i386-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">14b39bb4360e19080e5aede8d2b8504d9f7b3617f0e56bfeaef57daf1791caea</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-pc" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-pc-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">b8515699e910f1e5a3faebd4ef937bfaa5d3ed2ff8dd44ef59d63693e7dcd63f</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-pc-modules" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-pc-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">894ccc79ed60be1865efce74f58d5d9afe55f404e106cbc0b2ce3251145e0f56</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-tools-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">1eeef937bb7ee4ed9ec55109ece8eb9042efb27e00a863d76043d0663b690513</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools-extra" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-tools-extra-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">ee43119161e61064bce9d6deea3192b8fe3d8f13e5a1f04da881400fc6d5e058</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools-minimal" release="0.87.0.2.el7.centos.14.tuxcare.els7" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.src.rpm" version="2.02">
          <filename>grub2-tools-minimal-2.02-0.87.0.2.el7.centos.14.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">c8e95cddff1adcbec1366949073b373dbad97ab07938aefea0bffa6c1f172f84</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758896312</id>
    <title>libtiff: Fix of CVE-2017-5225</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2017-5225: fix heap buffer overflow in tools/tiffcp by restricting
  BitsPerSample values</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2017-5225: fix heap buffer overflow in tools/tiffcp by restricting
  BitsPerSample values</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-26 14:18:35 UTC" />
    <updated date="2025-09-26 14:18:35 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758896312.html" id="CLSA-2025:1758896312" title="CLSA-2025:1758896312" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libtiff" release="35.el7.tuxcare.els5" src="libtiff-4.0.3-35.el7.tuxcare.els5.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">85ed423d14e2de0848e4f95ea527ff871077318753fabd0f5f69a69b6afaf0ea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff" release="35.el7.tuxcare.els5" src="libtiff-4.0.3-35.el7.tuxcare.els5.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">1534c223069d7ab46d9170148ebaab3a0b7960b00eac6827f07bb47dc31dd6a2</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els5" src="libtiff-4.0.3-35.el7.tuxcare.els5.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">7e5937ad7087c15799c8d30fafdc59e8387e88b735530f71d048bfbf78f37854</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els5" src="libtiff-4.0.3-35.el7.tuxcare.els5.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">3070ec8551d78ff68d8341358db1ebd9e69b2b3c424aa66cf3482956e630c767</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els5" src="libtiff-4.0.3-35.el7.tuxcare.els5.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">a43ee0916c70139ff61682626de7a4f2a8a5ee1bab27f04c26c545c84251c5b1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els5" src="libtiff-4.0.3-35.el7.tuxcare.els5.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">289a8346f5fbbaaf3c8c5f0ef8223dc0416164f582946be2db88350af77980ac</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-tools" release="35.el7.tuxcare.els5" src="libtiff-4.0.3-35.el7.tuxcare.els5.src.rpm" version="4.0.3">
          <filename>libtiff-tools-4.0.3-35.el7.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">98bb62051844696108596e50ad6c94f9dfb7c08cea82e0f1a781a8d3ade2df16</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758896091</id>
    <title>gdk-pixbuf2: Fix of CVE-2025-7345</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-7345: fix heap buffer overflow during base64 encoding in
  gdk_pixbuf__jpeg_image_load_increment()</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-7345: fix heap buffer overflow during base64 encoding in
  gdk_pixbuf__jpeg_image_load_increment()</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-26 14:14:58 UTC" />
    <updated date="2025-09-26 14:14:58 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758896091.html" id="CLSA-2025:1758896091" title="CLSA-2025:1758896091" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="gdk-pixbuf2" release="3.el7.tuxcare.els1" src="gdk-pixbuf2-2.36.12-3.el7.tuxcare.els1.src.rpm" version="2.36.12">
          <filename>gdk-pixbuf2-2.36.12-3.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">fcdb41149e4cd4cbd616c43e2f8fbc04f34f8b5b472b69ea1f2973f59dd92b5e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gdk-pixbuf2" release="3.el7.tuxcare.els1" src="gdk-pixbuf2-2.36.12-3.el7.tuxcare.els1.src.rpm" version="2.36.12">
          <filename>gdk-pixbuf2-2.36.12-3.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">9b8b2f39d09469a79a4661a78a8b8db17d8720e510614f41db07a3b12824481d</sum>
        </package>
        <package arch="i686" epoch="0" name="gdk-pixbuf2-devel" release="3.el7.tuxcare.els1" src="gdk-pixbuf2-2.36.12-3.el7.tuxcare.els1.src.rpm" version="2.36.12">
          <filename>gdk-pixbuf2-devel-2.36.12-3.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">1113218f120399954584843f5460ed9c184e27fedaae700a05aa8e031ce3aa13</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gdk-pixbuf2-devel" release="3.el7.tuxcare.els1" src="gdk-pixbuf2-2.36.12-3.el7.tuxcare.els1.src.rpm" version="2.36.12">
          <filename>gdk-pixbuf2-devel-2.36.12-3.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f5a212099784b3a167941e74080916194bdf5adbd03b71a447ce923cf6c12881</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gdk-pixbuf2-tests" release="3.el7.tuxcare.els1" src="gdk-pixbuf2-2.36.12-3.el7.tuxcare.els1.src.rpm" version="2.36.12">
          <filename>gdk-pixbuf2-tests-2.36.12-3.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e9ab35c24a3a0567478b02b4bc7cfa347781f0d2ad7c66c218a4e5d6fee05ee5</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758896397</id>
    <title>php: Fix of CVE-2017-9228</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2017-9228: fix heap out-of-bounds write in bitset_set_range() and
  parse_char_class() functions</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2017-9228: fix heap out-of-bounds write in bitset_set_range() and
  parse_char_class() functions</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-26 14:20:05 UTC" />
    <updated date="2025-09-26 14:20:05 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758896397.html" id="CLSA-2025:1758896397" title="CLSA-2025:1758896397" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="php" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">722ba1918ac0c828e22c85bb3426628bf4483cc7a3d44fbeb5e571f415ac1a52</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-bcmath" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-bcmath-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">cd00f34c1ed625e09a082e6f78714c071ef957992f85d3e3e274be473742bb1f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-cli" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-cli-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">ac0cb934af4f4d57516078a41f3845e9e7efa5d21f4b6b3c093600ecde7e2bc3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-common" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-common-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">dd94c9b9be7bc749001acddfe8e506ed9f78a45631898212b35e6b1860099707</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-dba" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-dba-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">e9c2b8cd98ea5fac23303a9a02d4b0ce3772a904e3634bb73e9589d55eeffed2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-devel" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-devel-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">1083497346de45a7e0bc84c68fff280b4fd01f4c99e24d054518f220245b5175</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-embedded" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-embedded-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">15da8c9794077b59f68b085523be0e9633af5f38ca81131fbc86ab59366b9eb2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-enchant" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-enchant-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">25e9bcfb8b368465ff79bf5907da24a9a5f86ff43115c059f66c75e06cc56dd5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-fpm" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-fpm-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">5699ac297a9ef4b4e37ef3f88eec05193c733de2f5060b872b9746c111116f06</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-gd" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-gd-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">a51b3be8f28c8b6587cee08fd150de2ea8565cf4074b694af25d36f393759e5f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-intl" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-intl-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">ff36d638d33df333bf1ef69e245bd30a49bdc8ffef54e2acc2b1b63e0592a28b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-ldap" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-ldap-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">2fc509849e1798f4e1a80d62201eab669d2889478dd9b5068bba55fd43409495</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mbstring" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-mbstring-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">e1e02f66a0a5cfa69d76d7f64a2a22f805be61c5035a86243e8195a744ce6b1f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysql" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-mysql-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">c701e0e4b66154d9e4b17bbe82a9bd013942a663839a7566b8452d3831e1ef8d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-mysqlnd" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-mysqlnd-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">7a7d154fafeb09e8c78b8174ee59a4581d837b234184870738bec3c3a18ea1b3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-odbc" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-odbc-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">eca00289589e6486041d5bc6f99c9acd9cd80aaa495d468f5280848f5a083e5a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pdo" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-pdo-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">40f0aa0b3b849e19e1568a290a14a6078167bdfda00fc9cade2fda64f438a734</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pgsql" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-pgsql-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">425fd7ebe7cd37ea54ab741820e0e05312c9033e45145c1952c0b8243f29691c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-process" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-process-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">1a64b881a3b7cc52c8ada1f622776f4c81573a32d9a7aa9c17ba55af64bd5fe7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-pspell" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-pspell-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">fd20f3b51cb2fd9cd8e3a0d9f0ad14895d86527d76f179eff1a49150cda7faec</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-recode" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-recode-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">001762dd2dce42df8cefd4aea3dc2da9a54f234a69da6a07a1ba137a58a95a4f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-snmp" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-snmp-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">f434aa118bd24bb14c4d8ec72c379b51f28e6e7de54b94987ceb008413a49b19</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-soap" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-soap-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">94910b6f82bbcac374575506d82d2189864801cd0dce4aa0252cabe3b1266733</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xml" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-xml-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">71b27097200c0a7438befbe6a823da26fbef2bbebdf7a3b4202ecfa368bd4c0d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="php-xmlrpc" release="48.el7.tuxcare.els15" src="php-5.4.16-48.el7.tuxcare.els15.src.rpm" version="5.4.16">
          <filename>php-xmlrpc-5.4.16-48.el7.tuxcare.els15.x86_64.rpm</filename>
          <sum type="sha256">9974c8d75a03a95463416243efc6e9a0fbf25ff1db63778bf734be26b5ba1bb9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1758920770</id>
    <title>cyrus-sasl: Fix of CVE-2019-19906</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2019-19906: fix out-of-bounds write leading to unauthenticated
  remote denial-of-service in OpenLDAP via a malformed LDAP packet</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2019-19906: fix out-of-bounds write leading to unauthenticated
  remote denial-of-service in OpenLDAP via a malformed LDAP packet</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-26 21:06:17 UTC" />
    <updated date="2025-09-26 21:06:17 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1758920770.html" id="CLSA-2025:1758920770" title="CLSA-2025:1758920770" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="cyrus-sasl" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">70967a26ee357e36d9042bffc859c7d219803415f7e97d2b9bc00217701f3235</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b9a00534d0d33f9f762a80e9eede4cc3b25236cd0cebcf30843629db6fabee0c</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-devel" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-devel-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">fed6390085a204511978b2f8fc3c19932b5039ca6ee2323ec356831ff58dcba8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-devel" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-devel-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b6d54a7219478c24ba626ac5636f2624a728ef6cef5b67f2f1462db0405df55f</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-gs2" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-gs2-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">9f73cbab85b46577375c2d1d6ddbf18e528ef773ef44c9145bcccca664941935</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-gs2" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-gs2-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ae4d0dbe839f154cdfc348fae035fc1547fd66d006358dcc9f766fafa2eced5f</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-gssapi" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-gssapi-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">e23b2f2f3341a615e793c3b97e39d6efc5df6c3f4f105df1e81b74d8a23aac4c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-gssapi" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-gssapi-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e8b08f25de1ee6bf2d01164c8d3cbc27ee3ac59fd2f2509fc5ce267798015227</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-ldap" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-ldap-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">662da1d15674f5d95492116585d82c9a71814f2902db69d0ed819c086e6815fc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-ldap" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-ldap-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5369f07419444e0d15b5b2a24cddcf318f9dd8a670fc187f9c526e08f4367b79</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-lib" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-lib-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">4a6c4864d4e44641388a641a731d8836470b96d898e5282a9235fa0b5f0ca33d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-lib" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-lib-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6ea3e341c0f85e54f23ac30f4e731b5b66df86dfb1cba7a0a6eab4142d37151c</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-md5" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-md5-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">36098e339b8971daf2458c88fdd1dbd48264eb0d79a1cba0d45ebd78289c1b17</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-md5" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-md5-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">63fd00f54a5f8a7ec7471e053dbbfb0345ac59793786b9b1ea04d234cb3684a8</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-ntlm" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-ntlm-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">b16f104c99dd80ed9ef0c90231a75fdaf6f23d17e47a99c65ad0bdbaf81eabe2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-ntlm" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-ntlm-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">070d99ae70b6ec4447b5e4c1f3d09712ff0e227e05ab57031da6d39730fe966c</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-plain" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-plain-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">af9bbffc2014eb61e63e9297471c3d2241942fc65790abe6151b7427672b98a3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-plain" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-plain-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">de57d6ad5a54fe70827d1166a4239fbfafb7bf0e05b1e99ab5555a34dad76c86</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-scram" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-scram-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">a236d2322718ccccf3e8a371a303f95f31827779008aaeb2efdd76e00dc0ff63</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-scram" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-scram-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0bb5badc7630c3be51f48ea1d903721beaab894e09928f2d2b88db90b6f9da18</sum>
        </package>
        <package arch="i686" epoch="0" name="cyrus-sasl-sql" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-sql-2.1.26-24.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">d7652870d89013057b030591bae93c463279e5d2171297d612fabd88049c6256</sum>
        </package>
        <package arch="x86_64" epoch="0" name="cyrus-sasl-sql" release="24.el7_9.tuxcare.els1" src="cyrus-sasl-2.1.26-24.el7_9.tuxcare.els1.src.rpm" version="2.1.26">
          <filename>cyrus-sasl-sql-2.1.26-24.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ed7a1290548a0ab9ad5645d767a0c9a6d8fafcc0b0e8f80271be8f5b3eac5007</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1759222758</id>
    <title>ruby: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2016-2337: Fix type confusion in _cancel_eval Ruby's TclTkIp class method
  to prevent arbitrary code execution
- CVE-2017-9224: Fix stack out-of-bounds read in match_at() during regular
  expression searching
- CVE-2017-9227: Fix stack out-of-bounds read in mbc_enc_len() and invalid
  pointer dereference in  forward_search_range()
- CVE-2017-9228: Fix heap out-of-bounds write in bitset_set_range() and
  parse_char_class() by initializing critical local variable</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2016-2337: Fix type confusion in _cancel_eval Ruby's TclTkIp class method
  to prevent arbitrary code execution
- CVE-2017-9224: Fix stack out-of-bounds read in match_at() during regular
  expression searching
- CVE-2017-9227: Fix stack out-of-bounds read in mbc_enc_len() and invalid
  pointer dereference in  forward_search_range()
- CVE-2017-9228: Fix heap out-of-bounds write in bitset_set_range() and
  parse_char_class() by initializing critical local variable</summary>
    <pushcount>0</pushcount>
    <issued date="2025-09-30 08:59:21 UTC" />
    <updated date="2025-09-30 08:59:21 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1759222758.html" id="CLSA-2025:1759222758" title="CLSA-2025:1759222758" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="ruby" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.0.648">
          <filename>ruby-2.0.0.648-39.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">c3e49804fd5ded1d3fbdc0244d3f9a0b7116cc3d60cfdacad71463437e52d37f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-devel" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.0.648">
          <filename>ruby-devel-2.0.0.648-39.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">94fb25cf61bf41193cf333afa5d6b51f96e9788e613e361e50d0646eabc1db85</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-doc" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.0.648">
          <filename>ruby-doc-2.0.0.648-39.el7_9.tuxcare.els11.noarch.rpm</filename>
          <sum type="sha256">ff1e619645b8da06df9a221a7b8e659f5a46cab2a267c4e575409d6d614ee036</sum>
        </package>
        <package arch="noarch" epoch="0" name="ruby-irb" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.0.648">
          <filename>ruby-irb-2.0.0.648-39.el7_9.tuxcare.els11.noarch.rpm</filename>
          <sum type="sha256">d90f4cb6e2b91dd1b69e34dfd21d7af128e94ac8124e62245149cb9aa8b9e8be</sum>
        </package>
        <package arch="i686" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els11.i686.rpm</filename>
          <sum type="sha256">29366c6cba778b6109c8096109c4ce746e3360ed734631a0d0a47c670dd89ba6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-libs" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.0.648">
          <filename>ruby-libs-2.0.0.648-39.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">0660df9e6739dc00b4d4144be42fb99a87a0acc0c81b43c909942b6222588b30</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ruby-tcltk" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.0.648">
          <filename>ruby-tcltk-2.0.0.648-39.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">8eefe8d8d0ccdfd5b2b49e9df427fd76fc2c1b90b8793ed92b1aad3666458f75</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-bigdecimal" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="1.2.0">
          <filename>rubygem-bigdecimal-1.2.0-39.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">e29f9a80b02f964bad53bb9a459ab8bcc3b6c9b30ccf947cf43eed86a46b4296</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-io-console" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="0.4.2">
          <filename>rubygem-io-console-0.4.2-39.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">0a6c77dbb0a6b96e6e7a5d735a3791629727d4ede5b014a5d6ae24011ceb25b6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-json" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="1.7.7">
          <filename>rubygem-json-1.7.7-39.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">e6fed85d0094d65ed970e85332a5b084ec05664c53864b24976594519505d7db</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-minitest" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="4.3.2">
          <filename>rubygem-minitest-4.3.2-39.el7_9.tuxcare.els11.noarch.rpm</filename>
          <sum type="sha256">243ede197f04fba5086e673a31c6451ab9ebac0bd68f1e9a99e9e99e63edb21d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="rubygem-psych" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.0">
          <filename>rubygem-psych-2.0.0-39.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">0f0754fc2a52706491f7839f09df4236ded2c4fe07cd754b1089f9c61366b951</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rake" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="0.9.6">
          <filename>rubygem-rake-0.9.6-39.el7_9.tuxcare.els11.noarch.rpm</filename>
          <sum type="sha256">93978728f2a83f84da5339aa8f2384a66d19e70da125954837c74185afe6628b</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygem-rdoc" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="4.0.0">
          <filename>rubygem-rdoc-4.0.0-39.el7_9.tuxcare.els11.noarch.rpm</filename>
          <sum type="sha256">d8e813020da4edede34490983f68357f93d7d216d7263294a2f3a91366b20706</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.14.1">
          <filename>rubygems-2.0.14.1-39.el7_9.tuxcare.els11.noarch.rpm</filename>
          <sum type="sha256">0e9ee63b3b85861168169d4d3672f5a196d3fc39b1e0150d15978ac5e2cf7eb4</sum>
        </package>
        <package arch="noarch" epoch="0" name="rubygems-devel" release="39.el7_9.tuxcare.els11" src="ruby-2.0.0.648-39.el7_9.tuxcare.els11.src.rpm" version="2.0.14.1">
          <filename>rubygems-devel-2.0.14.1-39.el7_9.tuxcare.els11.noarch.rpm</filename>
          <sum type="sha256">fa80aa8854778da2e56f1f16d25d14b316fa68e4b41026fdb4992b7581c3236a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1759431860</id>
    <title>kernel: Fix of 40 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- ASoC: topology: Clean up route loading {CVE-2024-41069}
- ASoC: topology: Fix references to freed memory {CVE-2024-41069}
- drm/dp_mst: Fix MST sideband message body length check {CVE-2024-56616}
- Bluetooth: L2CAP: Fix not validating setsockopt user input {CVE-2024-35965}
- Bluetooth: L2CAP: uninitialized variables in l2cap_sock_setsockopt() {CVE-2024-35965}
- usb: cdc-acm: Check control transfer buffer size before access {CVE-2025-21704}
- igb: Fix potential invalid memory access in igb_init_module() {CVE-2024-52332}
- vfio/pci: Properly hide first-in-list PCIe extended capability {CVE-2024-53214}
- Bluetooth: RFCOMM: Fix not validating setsockopt user input {CVE-2024-35966}
- Bluetooth: SCO: Fix not validating setsockopt user input {CVE-2024-35966}
- media: stk1160: fix bounds checking in stk1160_copy_video() {CVE-2024-38621}
- net/sched: Always pass notifications when child class becomes empty {CVE-2025-38350}
- sch_htb: make htb_qlen_notify() idempotent {CVE-2025-37932}
- codel: remove sch-&gt;q.qlen check before qdisc_tree_reduce_backlog() {CVE-2025-37798}
- sch_qfq: make qfq_qlen_notify() idempotent {CVE-2025-38350}
- sch_drr: make drr_qlen_notify() idempotent {CVE-2025-38350}
- sch_htb: make htb_deactivate() idempotent {CVE-2025-38350}
- sch_cbq: make cbq_qlen_notify() idempotent {CVE-2025-38000}
- inet: fully convert sk-&gt;sk_rx_dst to RCU rules {CVE-2021-47103}
- scsi: mpt3sas: Fix use-after-free warning {CVE-2022-48695}
- scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory {CVE-2024-40901}
- vmci: prevent speculation leaks by sanitizing event in event_deliver() {CVE-2024-39499}
- USB: core: Fix hang in usb_kill_urb by adding memory barriers {CVE-2022-48760}
- nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells {CVE-2021-47497}
- virtio-net: Add validation for used length {CVE-2021-47352}
- watchdog: Fix possible use-after-free by calling del_timer_sync() {CVE-2021-47321}
- scsi: qedi: Fix crash while reading debugfs attribute {CVE-2024-40978}
- wifi: iwlwifi: mvm: check n_ssids before accessing the ssids {CVE-2024-40929}
- wifi: iwlwifi: mvm: guard against invalid STA ID on removal {CVE-2024-36921}
- mac802154: fix llsec key resources release in mac802154_llsec_key_del {CVE-2024-26961}
- platform/x86: wmi: Fix opening of char device {CVE-2023-52864}
- media: gspca: cpia1: shift-out-of-bounds in set_flicker {CVE-2023-52764}
- wifi: mac80211: fix potential key use-after-free {CVE-2023-52530}
- net: fix information leakage in /proc/net/ptype {CVE-2022-48757}
- crypto: qat - resolve race condition during AER recovery {CVE-2024-26974}
- perf/core: Bail out early if the request AUX area is out of bound {CVE-2023-52835}
- net: ti: fix UAF in tlan_remove_one {CVE-2021-47310}
- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594}
- net: bridge: use DEV_STATS_INC() {CVE-2023-52578}
- net: add atomic_long_t to net_device_stats fields {CVE-2023-52578}
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884}
- media: dvb-core: Fix use-after-free on race condition at dvb_frontend {CVE-2022-45885}
- xen/gntalloc: don't use gnttab_query_foreign_access() {CVE-2022-23039}
- xen/netfront: don't use gnttab_query_foreign_access() for mapped status {CVE-2022-23037}
- xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23038}
- ovl: fail on invalid uid/gid mapping at copy up {CVE-2023-0386}
- ALSA: oss: Fix PCM OSS buffer allocation overflow {CVE-2022-49292}
- gfs2: Fix length of holes reported at end-of-file
- gfs2: Only do glock put in gfs2_create_inode for free inodes
- gfs2: Fix use-after-free in gfs2_logd after withdraw
- gfs2: fix use-after-free in trans_drain
- gfs2: Clean up revokes on normal withdraws
- GFS2: gfs2_free_extlen can return an extent that is too long
- gfs2: Wipe jdata and ail1 in gfs2_journal_wipe, formerly gfs2_meta_wipe
- GFS2: Refactor gfs2_remove_from_journal
- GFS2: Only set PageChecked for jdata pages
- gfs2: keep bios separate for each journal
- gfs2: Remove active journal side effect from gfs2_write_log_header
- gfs2: clean_journal improperly set sd_log_flush_head
- partial "GFS2: Introduce new gfs2_log_header_v2"
- gfs2: change from write to read lock for sd_log_flush_lock in journal replay
- GFS2: Reduce code redundancy writing log headers
- gfs2: Grab glock reference sooner in gfs2_add_revoke
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke
- gfs2: Fix occasional glock use-after-free
- gfs2: Make sure we don't miss any delayed withdraws
- gfs2: Fix bad comment for trans_drain
- gfs2: add some much needed cleanup for log flushes that fail
- gfs2: fix trans slab error when withdraw occurs inside log_flush
- gfs2: initialize transaction tr_ailX_lists earlier
- GFS2: Remove extra "if" in gfs2_log_flush()
- gfs2: fix use-after-free on transaction ail lists
- gfs2: Trim the ordered write list in gfs2_ordered_write()
- GFS2: Clean up releasepage
- gfs2: Only set PageChecked if we have a transaction
- gfs2: Fix case in which ail writes are done to jdata holes
- gfs2: simplify gfs2_block_map
- gfs2: Remove unused gfs2_iomap_alloc argument
- gfs2: Be more careful with the quota sync generation
- gfs2: Get rid of some unnecessary quota locking
- gfs2: Add some missing quota locking
- gfs2: Fold qd_fish into gfs2_quota_sync
- gfs2: quota need_sync cleanup
- gfs2: Fix and clean up function do_qc
- gfs2: Revert "Add quota_change type"
- gfs2: Revert "ignore negated quota changes"
- gfs2: qd_check_sync cleanups
- gfs2: Check quota consistency on mount
- gfs2: Minor gfs2_quota_init error path cleanup
- gfs2: fix kernel BUG in gfs2_quota_cleanup
- gfs2: Clean up quota.c:print_message
- gfs2: Clean up gfs2_alloc_parms initializers
- gfs2: Two quota=account mode fixes
- gfs2: Remove useless assignment
- gfs2: simplify slot_get
- gfs2: Simplify qd2offset
- gfs2: Remove quota allocation info from quota file
- gfs2: use constant for array size
- gfs2: Set qd_sync_gen in do_sync
- gfs2: Remove useless err set
- gfs2: Small gfs2_quota_lock cleanup
- gfs2: move qdsb_put and reduce redundancy
- gfs2: Don't try to sync non-changes
- gfs2: Simplify function need_sync
- gfs2: remove unneeded pg_oflow variable
- gfs2: remove unneeded variable done
- gfs2: pass sdp to gfs2_write_buf_to_page
- gfs2: pass sdp in to gfs2_write_disk_quota
- gfs2: Pass sdp to gfs2_adjust_quota
- gfs2: remove dead code for quota writes
- gfs2: Use qd_sbd more consequently
- gfs2: replace 'found' with dedicated list iterator variable
- gfs2: Some whitespace cleanups
- gfs2: Fix gfs2_qa_get imbalance in gfs2_quota_hold</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- ASoC: topology: Clean up route loading {CVE-2024-41069}
- ASoC: topology: Fix references to freed memory {CVE-2024-41069}
- drm/dp_mst: Fix MST sideband message body length check {CVE-2024-56616}
- Bluetooth: L2CAP: Fix not validating setsockopt user input {CVE-2024-35965}
- Bluetooth: L2CAP: uninitialized variables in l2cap_sock_setsockopt() {CVE-2024-35965}
- usb: cdc-acm: Check control transfer buffer size before access {CVE-2025-21704}
- igb: Fix potential invalid memory access in igb_init_module() {CVE-2024-52332}
- vfio/pci: Properly hide first-in-list PCIe extended capability {CVE-2024-53214}
- Bluetooth: RFCOMM: Fix not validating setsockopt user input {CVE-2024-35966}
- Bluetooth: SCO: Fix not validating setsockopt user input {CVE-2024-35966}
- media: stk1160: fix bounds checking in stk1160_copy_video() {CVE-2024-38621}
- net/sched: Always pass notifications when child class becomes empty {CVE-2025-38350}
- sch_htb: make htb_qlen_notify() idempotent {CVE-2025-37932}
- codel: remove sch-&gt;q.qlen check before qdisc_tree_reduce_backlog() {CVE-2025-37798}
- sch_qfq: make qfq_qlen_notify() idempotent {CVE-2025-38350}
- sch_drr: make drr_qlen_notify() idempotent {CVE-2025-38350}
- sch_htb: make htb_deactivate() idempotent {CVE-2025-38350}
- sch_cbq: make cbq_qlen_notify() idempotent {CVE-2025-38000}
- inet: fully convert sk-&gt;sk_rx_dst to RCU rules {CVE-2021-47103}
- scsi: mpt3sas: Fix use-after-free warning {CVE-2022-48695}
- scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory {CVE-2024-40901}
- vmci: prevent speculation leaks by sanitizing event in event_deliver() {CVE-2024-39499}
- USB: core: Fix hang in usb_kill_urb by adding memory barriers {CVE-2022-48760}
- nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells {CVE-2021-47497}
- virtio-net: Add validation for used length {CVE-2021-47352}
- watchdog: Fix possible use-after-free by calling del_timer_sync() {CVE-2021-47321}
- scsi: qedi: Fix crash while reading debugfs attribute {CVE-2024-40978}
- wifi: iwlwifi: mvm: check n_ssids before accessing the ssids {CVE-2024-40929}
- wifi: iwlwifi: mvm: guard against invalid STA ID on removal {CVE-2024-36921}
- mac802154: fix llsec key resources release in mac802154_llsec_key_del {CVE-2024-26961}
- platform/x86: wmi: Fix opening of char device {CVE-2023-52864}
- media: gspca: cpia1: shift-out-of-bounds in set_flicker {CVE-2023-52764}
- wifi: mac80211: fix potential key use-after-free {CVE-2023-52530}
- net: fix information leakage in /proc/net/ptype {CVE-2022-48757}
- crypto: qat - resolve race condition during AER recovery {CVE-2024-26974}
- perf/core: Bail out early if the request AUX area is out of bound {CVE-2023-52835}
- net: ti: fix UAF in tlan_remove_one {CVE-2021-47310}
- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594}
- net: bridge: use DEV_STATS_INC() {CVE-2023-52578}
- net: add atomic_long_t to net_device_stats fields {CVE-2023-52578}
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884}
- media: dvb-core: Fix use-after-free on race condition at dvb_frontend {CVE-2022-45885}
- xen/gntalloc: don't use gnttab_query_foreign_access() {CVE-2022-23039}
- xen/netfront: don't use gnttab_query_foreign_access() for mapped status {CVE-2022-23037}
- xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23038}
- ovl: fail on invalid uid/gid mapping at copy up {CVE-2023-0386}
- ALSA: oss: Fix PCM OSS buffer allocation overflow {CVE-2022-49292}
- gfs2: Fix length of holes reported at end-of-file
- gfs2: Only do glock put in gfs2_create_inode for free inodes
- gfs2: Fix use-after-free in gfs2_logd after withdraw
- gfs2: fix use-after-free in trans_drain
- gfs2: Clean up revokes on normal withdraws
- GFS2: gfs2_free_extlen can return an extent that is too long
- gfs2: Wipe jdata and ail1 in gfs2_journal_wipe, formerly gfs2_meta_wipe
- GFS2: Refactor gfs2_remove_from_journal
- GFS2: Only set PageChecked for jdata pages
- gfs2: keep bios separate for each journal
- gfs2: Remove active journal side effect from gfs2_write_log_header
- gfs2: clean_journal improperly set sd_log_flush_head
- partial "GFS2: Introduce new gfs2_log_header_v2"
- gfs2: change from write to read lock for sd_log_flush_lock in journal replay
- GFS2: Reduce code redundancy writing log headers
- gfs2: Grab glock reference sooner in gfs2_add_revoke
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke
- gfs2: Fix occasional glock use-after-free
- gfs2: Make sure we don't miss any delayed withdraws
- gfs2: Fix bad comment for trans_drain
- gfs2: add some much needed cleanup for log flushes that fail
- gfs2: fix trans slab error when withdraw occurs inside log_flush
- gfs2: initialize transaction tr_ailX_lists earlier
- GFS2: Remove extra "if" in gfs2_log_flush()
- gfs2: fix use-after-free on transaction ail lists
- gfs2: Trim the ordered write list in gfs2_ordered_write()
- GFS2: Clean up releasepage
- gfs2: Only set PageChecked if we have a transaction
- gfs2: Fix case in which ail writes are done to jdata holes
- gfs2: simplify gfs2_block_map
- gfs2: Remove unused gfs2_iomap_alloc argument
- gfs2: Be more careful with the quota sync generation
- gfs2: Get rid of some unnecessary quota locking
- gfs2: Add some missing quota locking
- gfs2: Fold qd_fish into gfs2_quota_sync
- gfs2: quota need_sync cleanup
- gfs2: Fix and clean up function do_qc
- gfs2: Revert "Add quota_change type"
- gfs2: Revert "ignore negated quota changes"
- gfs2: qd_check_sync cleanups
- gfs2: Check quota consistency on mount
- gfs2: Minor gfs2_quota_init error path cleanup
- gfs2: fix kernel BUG in gfs2_quota_cleanup
- gfs2: Clean up quota.c:print_message
- gfs2: Clean up gfs2_alloc_parms initializers
- gfs2: Two quota=account mode fixes
- gfs2: Remove useless assignment
- gfs2: simplify slot_get
- gfs2: Simplify qd2offset
- gfs2: Remove quota allocation info from quota file
- gfs2: use constant for array size
- gfs2: Set qd_sync_gen in do_sync
- gfs2: Remove useless err set
- gfs2: Small gfs2_quota_lock cleanup
- gfs2: move qdsb_put and reduce redundancy
- gfs2: Don't try to sync non-changes
- gfs2: Simplify function need_sync
- gfs2: remove unneeded pg_oflow variable
- gfs2: remove unneeded variable done
- gfs2: pass sdp to gfs2_write_buf_to_page
- gfs2: pass sdp in to gfs2_write_disk_quota
- gfs2: Pass sdp to gfs2_adjust_quota
- gfs2: remove dead code for quota writes
- gfs2: Use qd_sbd more consequently
- gfs2: replace 'found' with dedicated list iterator variable
- gfs2: Some whitespace cleanups
- gfs2: Fix gfs2_qa_get imbalance in gfs2_quota_hold</summary>
    <pushcount>0</pushcount>
    <issued date="2025-10-02 19:04:29 UTC" />
    <updated date="2025-10-02 19:04:29 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1759431860.html" id="CLSA-2025:1759431860" title="CLSA-2025:1759431860" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">32ef92b214f12593541ab648ac140ea1d016be79141e7f373441930db2db67fe</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">cbf67a4edc3a7bf749b2df46988c11053bdc2b9c156ab7d3cdc9eaefc0b21c00</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">3f9f11776aaa7e623c5a0c05b6089379dbc42fc288c660ebc0641becdf5cb268</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">a13712d172cd0417052b2cf3d08ba852aead128241cfe6d88438b8b31e47f367</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">2a9a766220706679ea69327358c80072713ce8ab2c30ad911182dbd3e9bb1338</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">06deb7239b8afd73214e5adb1d21ba257222edcd03f4ea8a7a7e208eccf26ab3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">2921735dba72c0f673bb9af2faf408b4eebbb657fe859437ca4c7a29f7a0bb97</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">4e4d4c14fadbe15033039bbcc3c3cf10ec89aac5465605e0f67bd80560adadea</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">b475a2c109d46df6383356a37ed6cbba64963b707161a64043125aaae0cc21ee</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">4d0ce770d8947f91f2f2709b59bb238d301bf8ea13556665a78a6d23a2477439</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.119.1.el7.tuxcare.els25" src="kernel-3.10.0-1160.119.1.el7.tuxcare.els25.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.119.1.el7.tuxcare.els25.x86_64.rpm</filename>
          <sum type="sha256">4791b384d011a0666df18fd1ebe0a3e7f00dee30cf56bb562e99e6944a19b20a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1759497739</id>
    <title>perl-HTTP-Tiny: Fix of CVE-2023-31486</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-31486: fix insecure default TLS configuration
- Enable automated tests during build</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-31486: fix insecure default TLS configuration
- Enable automated tests during build</summary>
    <pushcount>0</pushcount>
    <issued date="2025-10-03 13:22:27 UTC" />
    <updated date="2025-10-03 13:22:27 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1759497739.html" id="CLSA-2025:1759497739" title="CLSA-2025:1759497739" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="perl-HTTP-Tiny" release="3.el7.tuxcare.els1" src="perl-HTTP-Tiny-0.033-3.el7.tuxcare.els1.src.rpm" version="0.033">
          <filename>perl-HTTP-Tiny-0.033-3.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">8b13848b302b401c5625589c266c692fcd9b57da197082a7c9d3c53f6d537d67</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1759857092</id>
    <title>python3: Fix of CVE-2007-4559</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2007-4559: implement PEP 706 - a filter in the tarfile module to
  prevent directory traversal vulnerability</description>
    <severity>Low</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2007-4559: implement PEP 706 - a filter in the tarfile module to
  prevent directory traversal vulnerability</summary>
    <pushcount>0</pushcount>
    <issued date="2025-10-07 17:11:36 UTC" />
    <updated date="2025-10-07 17:11:36 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1759857092.html" id="CLSA-2025:1759857092" title="CLSA-2025:1759857092" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">95b4284e3c7aaeb3279a66d2c8899b5c9fa34d1fb3dd99afa53416dcacfa6909</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">53968cdd78f42072faeb33fa1eb0a6704dbfa5e799264b780471966a2c211921</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">fd3fa0daee247a686301ba6a8e048eb0b5d53dc75c4fd22086a1c7624576c563</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">345fb2463d234d38a8d0fccc7b34371387513d7bec2e95d773d687dbdf0b3eea</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">fe2ca380e7321aabfceb30973a259bc176c8f75bdca33b2784eba9f5332f00fb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">4dcec17b459bd1e8f46a315d9681184176b09efe5436fdb1bc163d1b653449f3</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">55d27f14d122b144588b665e144211713c8817704c113d67d1b2f47135f74353</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">2eb4b3c435b4c9759483033e19f7621aa7006fe89ccb683f103833064d51dbb9</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">687368d6981829c0398f062e0963111590554fb9ba0847a5c39b1315418a0a81</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7ac9143f5400605eaf2031da3f21d809ff34d9b7093024b8d3e96ac764c8a9fd</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">ad700318dec56bf0661a59ab318d9b274963ecc42a0785270eefef1cb7f598a5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">97689bb94553359d2027e22164722d2e5e61b4a5beef179f70dcaf54b8cdf311</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">56039ae8f45de358a88750da3fc5cad4fa40628a07a262435cac61eb2f8e6e54</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="21.0.1.el7_9.tuxcare.els3" src="python3-3.6.8-21.0.1.el7_9.tuxcare.els3.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">f152c5ebf5353af7b38b0e26803f11c4ec93e4a1be505f109f1a789ff8ef0e95</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1759864646</id>
    <title>jasper: Fix of CVE-2025-8837</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-8837: fix use-after-free vulnerability in jpc_dec_dump()</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-8837: fix use-after-free vulnerability in jpc_dec_dump()</summary>
    <pushcount>0</pushcount>
    <issued date="2025-10-07 19:29:54 UTC" />
    <updated date="2025-10-07 19:29:54 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1759864646.html" id="CLSA-2025:1759864646" title="CLSA-2025:1759864646" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="jasper" release="33.el7.tuxcare.els2" src="jasper-1.900.1-33.el7.tuxcare.els2.src.rpm" version="1.900.1">
          <filename>jasper-1.900.1-33.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">94af35b102d5ef0225a220741ba761b6a2d9a22a5ecf5f784da3a5fd08897a93</sum>
        </package>
        <package arch="i686" epoch="0" name="jasper-devel" release="33.el7.tuxcare.els2" src="jasper-1.900.1-33.el7.tuxcare.els2.src.rpm" version="1.900.1">
          <filename>jasper-devel-1.900.1-33.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">2fffc41b049b292349b679f8cf14726fb4302b651fce6ff3d5698e0e63ff166a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="jasper-devel" release="33.el7.tuxcare.els2" src="jasper-1.900.1-33.el7.tuxcare.els2.src.rpm" version="1.900.1">
          <filename>jasper-devel-1.900.1-33.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ad68b5fc72ae28bec03f04c4ef8ae57cadff5fa6565a0c5ff5a915af8ee34d75</sum>
        </package>
        <package arch="i686" epoch="0" name="jasper-libs" release="33.el7.tuxcare.els2" src="jasper-1.900.1-33.el7.tuxcare.els2.src.rpm" version="1.900.1">
          <filename>jasper-libs-1.900.1-33.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">bf1f5ed8defd3b72ded2e931b78f37a516a5ce7f21e1751a5c76fe627cace7d5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="jasper-libs" release="33.el7.tuxcare.els2" src="jasper-1.900.1-33.el7.tuxcare.els2.src.rpm" version="1.900.1">
          <filename>jasper-libs-1.900.1-33.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">fa05dd3d899c60cc1aab7bd5d82c97e2d9cf94b55a9fd7789ae68164d9b1d260</sum>
        </package>
        <package arch="x86_64" epoch="0" name="jasper-utils" release="33.el7.tuxcare.els2" src="jasper-1.900.1-33.el7.tuxcare.els2.src.rpm" version="1.900.1">
          <filename>jasper-utils-1.900.1-33.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">68b8dd854b775283d61d6bb7071969032d67ef726869729d03d5140461b39aec</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1759864289</id>
    <title>git: Fix of CVE-2025-46835</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-46835: prevent malicious creating and overwriting of user's
  files</description>
    <severity>Low</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-46835: prevent malicious creating and overwriting of user's
  files</summary>
    <pushcount>0</pushcount>
    <issued date="2025-10-07 19:11:38 UTC" />
    <updated date="2025-10-07 19:11:38 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1759864289.html" id="CLSA-2025:1759864289" title="CLSA-2025:1759864289" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="emacs-git" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>emacs-git-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">08ed1c6ceaa1a4fc7b5db855dcb6199a4cc17325c30266333b5441dc6bcc2dfa</sum>
        </package>
        <package arch="noarch" epoch="0" name="emacs-git-el" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>emacs-git-el-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">a5e5dc210e9253e613908e2d5e7477cd61916f162027b649c06697b5e6b1e216</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-1.8.3.1-25.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">5a425c19c080a905718be1070c80c65375cba4788dc1cb0d0e91d4515bc42261</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-all" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-all-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">4f0a27cf69ff7b7d6313941bf4475bb0fa3ae09ba775825c7cb363bb27991fb5</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-bzr" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-bzr-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">76d157e2a1ded0fc15ce75fc9b4c05a0fb95990e41113e5bd9dadf1339487614</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-cvs" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-cvs-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">3353447772dc24f7bd9e51805a4948a6f735cfe479e4bd44d09049a3b6041e03</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-daemon" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-daemon-1.8.3.1-25.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">af94c9d4b125a31cddd078e11f55d7da28bdd6e9d71d3699610a232af55cf0bf</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-email" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-email-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">ce07c230faea8fc27143af69ca33afc2d178b53c52f32e0bbb2a10e2e0ee2307</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-gnome-keyring" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-gnome-keyring-1.8.3.1-25.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">9a34586f129c552f73d27c1c653308e16c4fe54f07fc286df4784795b9706ff8</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-gui" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-gui-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">654b5ddc703d26f6028c3f98179f1bbe78b7c47de64e83341ae83a5d0be477e8</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-hg" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-hg-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">98594b065ce5cfd0619b93feed7251f58d652241af00df4d4d2ecf2112cfa6c5</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-instaweb" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-instaweb-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">68f7d7f91d72f8266dd15d9f8b1af46badc3bd297513d102c0b9fb1540d91584</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-p4" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-p4-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">df4450e52fba8902d3ff31ac9ca03ba4de4fbd2d9b55421fab8f98a6a37cbd05</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-svn" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>git-svn-1.8.3.1-25.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">18d06cfcb5a6205f462435b153b680eff5a99c0a4164844138a52a5f67b147d8</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitk" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>gitk-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">a2848c0968e4dcad180a4df05d8ad200109cf353f93aec14892558e8a919a632</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitweb" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>gitweb-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">4fd2fdcccbc635ff9f7794025e487fe1a7fca4ac215cbb4ca355afc838427780</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>perl-Git-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">8c98e40a069754f05263e3ca6ec9270ce06335ed20b2ee7940f41580a49eca7a</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git-SVN" release="25.el7_9.tuxcare.els6" src="git-1.8.3.1-25.el7_9.tuxcare.els6.src.rpm" version="1.8.3.1">
          <filename>perl-Git-SVN-1.8.3.1-25.el7_9.tuxcare.els6.noarch.rpm</filename>
          <sum type="sha256">e158fc107b45d40a61946f0076b2947cb24b27b57f320f22cb432544d47bdfa9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1760029279</id>
    <title>openssl: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2019-1547: fix side-channel vulnerability in ECDSA when using explicit
  EC parameters without cofactor
- CVE-2025-9230: fix incorrect check of unwrapped key size</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2019-1547: fix side-channel vulnerability in ECDSA when using explicit
  EC parameters without cofactor
- CVE-2025-9230: fix incorrect check of unwrapped key size</summary>
    <pushcount>0</pushcount>
    <issued date="2025-10-09 17:01:30 UTC" />
    <updated date="2025-10-09 17:01:30 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1760029279.html" id="CLSA-2025:1760029279" title="CLSA-2025:1760029279" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="openssl" release="26.el7_9.tuxcare.els6" src="openssl-1.0.2k-26.el7_9.tuxcare.els6.src.rpm" version="1.0.2k">
          <filename>openssl-1.0.2k-26.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">fd0711997729673cf4396286ee8e4a84a5851d459df91ec4099c547fd5d27328</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els6" src="openssl-1.0.2k-26.el7_9.tuxcare.els6.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">cc05a47bb9453078506e8cbe0b821c236385f4dda500ec625803f2f0661680a9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els6" src="openssl-1.0.2k-26.el7_9.tuxcare.els6.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">74b1082758a7bffc21ea7ec4e357943b991b0555476fbe49dc780b372344bbd9</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els6" src="openssl-1.0.2k-26.el7_9.tuxcare.els6.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">50a82871e006968fb4e11e78a43ef837d81d119bdead2c493cfab5351a650202</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els6" src="openssl-1.0.2k-26.el7_9.tuxcare.els6.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">868c878d9074e1d308c0b019f5016c6612b3f94d09753606aa7bd18aab81c0a3</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-perl" release="26.el7_9.tuxcare.els6" src="openssl-1.0.2k-26.el7_9.tuxcare.els6.src.rpm" version="1.0.2k">
          <filename>openssl-perl-1.0.2k-26.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">13cbd31d28f8f911ff13292ca32a2419ba42ad619d8002876d4f67f4ac5a4fab</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els6" src="openssl-1.0.2k-26.el7_9.tuxcare.els6.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">c4ff6cdde65b127d911ea2aab511971a1e3d4091e224cf0d3e3e88479df9d6b8</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els6" src="openssl-1.0.2k-26.el7_9.tuxcare.els6.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">42607587c5488f318b496b8ef88f0d1ecb4ae2c845749bfe9effeac0950368de</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1760987651</id>
    <title>python3: Fix of CVE-2025-8194</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Bump package Release to 21.0.5
- CVE-2025-8194: tarfile: validate archives to ensure member offsets are
  non-negative</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Bump package Release to 21.0.5
- CVE-2025-8194: tarfile: validate archives to ensure member offsets are
  non-negative</summary>
    <pushcount>0</pushcount>
    <issued date="2025-10-20 19:14:15 UTC" />
    <updated date="2025-10-20 19:14:15 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1760987651.html" id="CLSA-2025:1760987651" title="CLSA-2025:1760987651" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">157ee816dca93129ec119b80f9b03bf7bf57ca5d77794f6bfb84204571429654</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6c7cf9b6d9bb710975598ef601e167dbb0d8d2eb11f1a412fb88ba9eccfa11d2</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">1610b41b23ddd7c6535e1d27eb3c28d82cacceee5658a73279efcf42b8a5c3c1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5d4ae80f9d660ea6eb456e2950ec2a240cacd4f988c1a6bdc895e74e95c80b33</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">0ccf302e6f35a35ad6c276dcd4e055c1f6c42b497d2c7b300d1453ad0c8f0534</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d2e5976f0eaca0e9c56cfdc5d76b169223496dc17df4347ee66013ada442c513</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">0590603a75324aaae7ce2fe91a897cd19ddadd889128fcde85949eacd2191bd3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0c23540b650d594db9272d6e8c75a35116edeea03821f20263488a4caf345d8e</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">1ad81dfa4b2ee9412787fe5f0685edc04251372b32fbb2823ac711f3f9f28840</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ddd998911b156618ca6d76439ef88c017a15ea4c7e8bedfdd38ef3b9e74dec18</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">afd6bb4c3c8ebbecb6fe16399670328a79a5f2c4df776f8ab2ceeb2854f4f69d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c7ee732a8118bec52534725708a23e9641fd53b80b983a57581f3aa44604b8ef</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.5.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">b872566622480686c76e66e146e75c087ea284fe00339e06aa2e8f16d6a39aae</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="21.0.5.el7_9.tuxcare.els1" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els1.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.5.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d77d833cc1464594e67d3d6e9276403df8ffc46ad935607abf3f793dff7e94b4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1761056282</id>
    <title>python3-setuptools: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2022-40897: fix Regular Expression Denial of Service (ReDoS) in package_index.py
- CVE-2024-6345: fix remote code execution in package_index module</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2022-40897: fix Regular Expression Denial of Service (ReDoS) in package_index.py
- CVE-2024-6345: fix remote code execution in package_index module</summary>
    <pushcount>0</pushcount>
    <issued date="2025-10-21 14:18:05 UTC" />
    <updated date="2025-10-21 14:18:05 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1761056282.html" id="CLSA-2025:1761056282" title="CLSA-2025:1761056282" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python3-setuptools" release="10.0.5.el7.tuxcare.els1" src="python3-setuptools-39.2.0-10.0.5.el7.tuxcare.els1.src.rpm" version="39.2.0">
          <filename>python3-setuptools-39.2.0-10.0.5.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">0abaa024cd640151d33a04470cd22be402d35d47255933cd203e3161dc00143f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1761074965</id>
    <title>jasper: Fix of CVE-2025-8836</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-8836: fix manipulation in function jpc_floorlog2 to prevent
  reachable assertion</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-8836: fix manipulation in function jpc_floorlog2 to prevent
  reachable assertion</summary>
    <pushcount>0</pushcount>
    <issued date="2025-10-21 19:29:29 UTC" />
    <updated date="2025-10-21 19:29:29 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1761074965.html" id="CLSA-2025:1761074965" title="CLSA-2025:1761074965" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="jasper" release="33.el7.tuxcare.els4" src="jasper-1.900.1-33.el7.tuxcare.els4.src.rpm" version="1.900.1">
          <filename>jasper-1.900.1-33.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">e083802e29a8674a7ac93d0747fdb2ae770d720c0d64e953252ef1c79ef81b01</sum>
        </package>
        <package arch="i686" epoch="0" name="jasper-devel" release="33.el7.tuxcare.els4" src="jasper-1.900.1-33.el7.tuxcare.els4.src.rpm" version="1.900.1">
          <filename>jasper-devel-1.900.1-33.el7.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">9468c481a8d881580b31153c8247c14b47dc56177d60fbd101ba97b434c1f52f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="jasper-devel" release="33.el7.tuxcare.els4" src="jasper-1.900.1-33.el7.tuxcare.els4.src.rpm" version="1.900.1">
          <filename>jasper-devel-1.900.1-33.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">d8e02f42c5a268d8664d3f78cfbcd6e36fb9aa81cd7770abce2f0bd396449817</sum>
        </package>
        <package arch="i686" epoch="0" name="jasper-libs" release="33.el7.tuxcare.els4" src="jasper-1.900.1-33.el7.tuxcare.els4.src.rpm" version="1.900.1">
          <filename>jasper-libs-1.900.1-33.el7.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">455bf18d9f656b42e82485bec1f73cb8fdb73b36d595e822f2456abf55f0a7f0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="jasper-libs" release="33.el7.tuxcare.els4" src="jasper-1.900.1-33.el7.tuxcare.els4.src.rpm" version="1.900.1">
          <filename>jasper-libs-1.900.1-33.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">069e1b5af4d453579f9c56897275ed14e5926a845a4b724e257fa676d5355df2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="jasper-utils" release="33.el7.tuxcare.els4" src="jasper-1.900.1-33.el7.tuxcare.els4.src.rpm" version="1.900.1">
          <filename>jasper-utils-1.900.1-33.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">c04d19743a6c7454a463357634cf9ceaf6bb7014e4117e73c5920998320cc5cb</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1762792127</id>
    <title>libsoup: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-4948: fix integer underflow in soup_multipart_new_from_message()
- CVE-2025-32049: fix Denial of Service attack to websocket server
- CVE-2025-32914: fix OOB Read through soup_multipart_new_from_message()</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-4948: fix integer underflow in soup_multipart_new_from_message()
- CVE-2025-32049: fix Denial of Service attack to websocket server
- CVE-2025-32914: fix OOB Read through soup_multipart_new_from_message()</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-10 16:28:53 UTC" />
    <updated date="2025-11-10 16:28:53 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762792127.html" id="CLSA-2025:1762792127" title="CLSA-2025:1762792127" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libsoup" release="2.0.5.el7.tuxcare.els1" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els1.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">0a7f78b3229286f63ca5980b4ff8ba6f45e78ca3db75bbd72852071cd85c4b5c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup" release="2.0.5.el7.tuxcare.els1" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els1.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8445ee71868c652fb281fa4c1ead5cee7d6db41e5b617bca84edd50217d9e5b3</sum>
        </package>
        <package arch="i686" epoch="0" name="libsoup-devel" release="2.0.5.el7.tuxcare.els1" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els1.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.5.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">bc65901e8acc778e3c818c79bdb2d879fe177be4ad81c9d704f4a76b1c49eed1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup-devel" release="2.0.5.el7.tuxcare.els1" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els1.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.5.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">da9e394928a9038f762faa96c65cb96a9c37b1cf3956c4c554631f7054ec1ead</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1762980908</id>
    <title>python3: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4435, CVE-2025-4517:
  fix multiple tarfile extraction filter bypasses (filter="tar"/filter="data")</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4435, CVE-2025-4517:
  fix multiple tarfile extraction filter bypasses (filter="tar"/filter="data")</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-12 20:55:12 UTC" />
    <updated date="2025-11-12 20:55:12 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762980908.html" id="CLSA-2025:1762980908" title="CLSA-2025:1762980908" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">ed7e40df29aaade9fa6e1d015df89cd6e7c5efb7e703638f229a043dfe982568</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">79b5b029524d37ed5d6e58cdc11cf08de03f85b2874c8fa335e14d33634986a7</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">c4e00d79e0fd96b8a2de2e4e60f9613f3bf299b60bedca4f0a1316bc0bfa5655</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ad1fe4b1a6ab3eaea30c89e2ae566581e6bdafa07393ee2a969ae3a9c05e7767</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">f0e7a075f3bb13ea6910a68c9d5926668d9f68d0208639e5c92407401aa6f076</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">31680e85701a71f676aa89f2e0ad19711c1bee3ec758f2b27f8f581eb0704017</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">ac1dced4a2ec837de60454ffa11cb73cc4d2cc0971ed3878d1310d1e20e95e90</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">9913a22533ac43982dded469baadb625fd88f7ed6f976789ee71f7d4e4f8e59f</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">6480eaa7178bb0b01da68019d72956bbefa49c3023fff9a9656a6eb84169fe15</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">48b493068026e6b3b54fe031dcc0774b639381af26108cc9176baef141a72e02</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">60a51382b241b3f0d66032d627d4746e8d5ec8d9eaada780b318c72c6a5d1831</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f5a99d4f6a62ae5d3af03ac591ac366d158fc1632f0050b982fd425efc2d3261</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.5.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">a705f9522caba31aa107ad60f88d1e26e8590c34c0e010b5a5e5a472d5d8d07b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="21.0.5.el7_9.tuxcare.els2" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els2.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.5.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">63b0e3a76b6e8e6d800d7454dee21e7ebe750c69ed2c800600bdc27ed8b8904c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1762981011</id>
    <title>Update of emacs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Bump release to 23.0.1.1.tuxcare.els1</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Bump release to 23.0.1.1.tuxcare.els1</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-12 20:56:54 UTC" />
    <updated date="2025-11-12 20:56:54 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762981011.html" id="CLSA-2025:1762981011" title="CLSA-2025:1762981011" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="emacs" release="23.0.1.el7_9.1.tuxcare.els1" src="emacs-24.3-23.0.1.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-24.3-23.0.1.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cdfe96df9224aeae2b02ea4f67b92094a3ca9ecaff5e4520cf9174eee64cf45d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="emacs-common" release="23.0.1.el7_9.1.tuxcare.els1" src="emacs-24.3-23.0.1.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-common-24.3-23.0.1.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0b8b69dd685c893807eff2f870a8a02708cf95e2be110a115141fdb89dfabbd8</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-el" release="23.0.1.el7_9.1.tuxcare.els1" src="emacs-24.3-23.0.1.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-el-24.3-23.0.1.el7_9.1.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">4316c8e1429bf1756bae4cdfd3f329077587da9b2113b4a0676df6447a626e0c</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-filesystem" release="23.0.1.el7_9.1.tuxcare.els1" src="emacs-24.3-23.0.1.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-filesystem-24.3-23.0.1.el7_9.1.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">451f2713607bd251f84af02292813bc6bae5add6c6aaa7ee21160b0f6fda8d84</sum>
        </package>
        <package arch="x86_64" epoch="1" name="emacs-nox" release="23.0.1.el7_9.1.tuxcare.els1" src="emacs-24.3-23.0.1.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-nox-24.3-23.0.1.el7_9.1.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8dea2524ee66ab3894c84430fec92903b6c835d1af4d39697f8b687ef0847081</sum>
        </package>
        <package arch="noarch" epoch="1" name="emacs-terminal" release="23.0.1.el7_9.1.tuxcare.els1" src="emacs-24.3-23.0.1.el7_9.1.tuxcare.els1.src.rpm" version="24.3">
          <filename>emacs-terminal-24.3-23.0.1.el7_9.1.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">5705beb9191d281b7e8a19e2235f1ab0580f793753be6939687aa7533043b1a0</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1762332910</id>
    <title>kernel: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- ext4: fix possible UAF when remounting r/o a mmp-protected file system {CVE-2021-47342}
- ext4: fix memory leak in ext4_fill_super
- net: defer final 'struct net' free in netns dismantle {CVE-2024-56658}
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477}
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701}
- fix: virtio-net: Add validation for used length {CVE-2021-47352}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- ext4: fix possible UAF when remounting r/o a mmp-protected file system {CVE-2021-47342}
- ext4: fix memory leak in ext4_fill_super
- net: defer final 'struct net' free in netns dismantle {CVE-2024-56658}
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477}
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701}
- fix: virtio-net: Add validation for used length {CVE-2021-47352}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-05 08:55:14 UTC" />
    <updated date="2025-11-05 08:55:14 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762332910.html" id="CLSA-2025:1762332910" title="CLSA-2025:1762332910" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">51fb3a1f124259300a9fbb577284b8e5c7c6440b92e2833f2277e83012a6d2c0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">d190ffd9906fa176bf5ac2994f8f8c249ae35fcf4ce7a550fac0d3578a167cdd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">28aa896b7e78145ec98fb31ef01d97a01fdd70478364d7201961aada0705bd2e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f5aaa3b41b4926b39f1f3f41618409223d26d996bacad29a71eaff5da1632ec6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">2a9ae5b413fa84513e7c03483010f67ffe0750c22134a8579c1639c19f4496d7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">12c4b06ed915241ae49f3c79afb3700b0005aab63008560ba37be3e89cfb37ef</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">6274ce7bc47d6e5a25a9b9ab3061f1f1221084af130e33dcc4382effc9ee04d2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">891d62faefcca6f7d83db3d3b5e12577790f68118a208d92aa40b66437464cc0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1fc72caa14f472ba018ae19438f25fc5829f3b64daa3e38713672eef04be9069</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">e8dafd56387bf6a1f711f26136d461e3ae667d7689a9b0251452a7f03d117186</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.139.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">eba0eae66fee21cdb003efd4622a8d3141e35816c267381f50071e82946ec7d7</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1762437868</id>
    <title>cups: Fix of CVE-2025-58060</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-58060: fix authentication bypass by checking password when AuthType
  is set to anything but Basic.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-58060: fix authentication bypass by checking password when AuthType
  is set to anything but Basic.</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-06 14:04:35 UTC" />
    <updated date="2025-11-06 14:04:35 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762437868.html" id="CLSA-2025:1762437868" title="CLSA-2025:1762437868" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="cups" release="52.el7_9.tuxcare.els2" src="cups-1.6.3-52.el7_9.tuxcare.els2.src.rpm" version="1.6.3">
          <filename>cups-1.6.3-52.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">be918c4ce4d7d633daef505a1a0e786e9ad8730a2d51443d4763ab6c38169bdd</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-client" release="52.el7_9.tuxcare.els2" src="cups-1.6.3-52.el7_9.tuxcare.els2.src.rpm" version="1.6.3">
          <filename>cups-client-1.6.3-52.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">08d724afc7a2e9cdc91cacca99255d19d6e6b3f8b674f8cc3145e665d12169e0</sum>
        </package>
        <package arch="i686" epoch="1" name="cups-devel" release="52.el7_9.tuxcare.els2" src="cups-1.6.3-52.el7_9.tuxcare.els2.src.rpm" version="1.6.3">
          <filename>cups-devel-1.6.3-52.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">347b4b3d43fd5805dbe858312bda22ee1b1b09cbf3b4c5fe5772dfedbea8cfc8</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-devel" release="52.el7_9.tuxcare.els2" src="cups-1.6.3-52.el7_9.tuxcare.els2.src.rpm" version="1.6.3">
          <filename>cups-devel-1.6.3-52.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">a695a36e3352ad1d6fae185f5f73652accf3e6bd5050394e470e4f1ee2e5230c</sum>
        </package>
        <package arch="noarch" epoch="1" name="cups-filesystem" release="52.el7_9.tuxcare.els2" src="cups-1.6.3-52.el7_9.tuxcare.els2.src.rpm" version="1.6.3">
          <filename>cups-filesystem-1.6.3-52.el7_9.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">f2032d314fd323e3d1acd34f6a962a8f9ccec46834ca09816df815847713e470</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-ipptool" release="52.el7_9.tuxcare.els2" src="cups-1.6.3-52.el7_9.tuxcare.els2.src.rpm" version="1.6.3">
          <filename>cups-ipptool-1.6.3-52.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">00cf2d5f544fd673b79e340a2ca17ab8a5e68ce8cd4ee085ea1011b149ceeb70</sum>
        </package>
        <package arch="i686" epoch="1" name="cups-libs" release="52.el7_9.tuxcare.els2" src="cups-1.6.3-52.el7_9.tuxcare.els2.src.rpm" version="1.6.3">
          <filename>cups-libs-1.6.3-52.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">1a5f9067d0596a42ef5c4c2432f5fb45c4790c8f6e00cb502e911bc90cabc9c9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-libs" release="52.el7_9.tuxcare.els2" src="cups-1.6.3-52.el7_9.tuxcare.els2.src.rpm" version="1.6.3">
          <filename>cups-libs-1.6.3-52.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">202d7a89ac8a5028dceb81ac2a13353477d3fcd5911402974d79bcc045fc5f02</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-lpd" release="52.el7_9.tuxcare.els2" src="cups-1.6.3-52.el7_9.tuxcare.els2.src.rpm" version="1.6.3">
          <filename>cups-lpd-1.6.3-52.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">7aaf5d2aacfc429e3193c3b37e4e8d69542190aff50c5c7a1860f11f795cee76</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1762544838</id>
    <title>cups: Fix of CVE-2024-35235</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-35235: patch arbitrary chmod vulnerability in cupsd process when
  starting server with symbolic link Listen configuration item</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-35235: patch arbitrary chmod vulnerability in cupsd process when
  starting server with symbolic link Listen configuration item</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-07 19:47:22 UTC" />
    <updated date="2025-11-07 19:47:22 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762544838.html" id="CLSA-2025:1762544838" title="CLSA-2025:1762544838" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="cups" release="52.el7_9.tuxcare.els3" src="cups-1.6.3-52.el7_9.tuxcare.els3.src.rpm" version="1.6.3">
          <filename>cups-1.6.3-52.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c50c1d2c4cee76cec6ad8786993a0116381bd98b94da2f7b37f68ad68bb028e2</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-client" release="52.el7_9.tuxcare.els3" src="cups-1.6.3-52.el7_9.tuxcare.els3.src.rpm" version="1.6.3">
          <filename>cups-client-1.6.3-52.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">af4d8c36315015d01b38b4d9298881af7a4e95f6f43b406b48bf737410128cc0</sum>
        </package>
        <package arch="i686" epoch="1" name="cups-devel" release="52.el7_9.tuxcare.els3" src="cups-1.6.3-52.el7_9.tuxcare.els3.src.rpm" version="1.6.3">
          <filename>cups-devel-1.6.3-52.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">b59d6e642512c0a226131225ee0ecc5e44c6c2281cec00e4280d7193241d4d30</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-devel" release="52.el7_9.tuxcare.els3" src="cups-1.6.3-52.el7_9.tuxcare.els3.src.rpm" version="1.6.3">
          <filename>cups-devel-1.6.3-52.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">ab507016b1036c6a61e9cf993ba332e865a1618b376a72c162c30da43812cc37</sum>
        </package>
        <package arch="noarch" epoch="1" name="cups-filesystem" release="52.el7_9.tuxcare.els3" src="cups-1.6.3-52.el7_9.tuxcare.els3.src.rpm" version="1.6.3">
          <filename>cups-filesystem-1.6.3-52.el7_9.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">46820552e96f6e4328f65699dae08667916547f4f069ed72e96aeef1c0253919</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-ipptool" release="52.el7_9.tuxcare.els3" src="cups-1.6.3-52.el7_9.tuxcare.els3.src.rpm" version="1.6.3">
          <filename>cups-ipptool-1.6.3-52.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">561798adf6b37c039d58116894461cc4cafef39526abd1fb2c35086925ed1e43</sum>
        </package>
        <package arch="i686" epoch="1" name="cups-libs" release="52.el7_9.tuxcare.els3" src="cups-1.6.3-52.el7_9.tuxcare.els3.src.rpm" version="1.6.3">
          <filename>cups-libs-1.6.3-52.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">e06360a347a50eceae93cd7582268620c2804868368bb84922d37a85dcf8d74f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-libs" release="52.el7_9.tuxcare.els3" src="cups-1.6.3-52.el7_9.tuxcare.els3.src.rpm" version="1.6.3">
          <filename>cups-libs-1.6.3-52.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">8c36e864217f288ff85c31d0a803bcbbd72f38dc6a24f3df50fa634b4395b1f9</sum>
        </package>
        <package arch="x86_64" epoch="1" name="cups-lpd" release="52.el7_9.tuxcare.els3" src="cups-1.6.3-52.el7_9.tuxcare.els3.src.rpm" version="1.6.3">
          <filename>cups-lpd-1.6.3-52.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">cb058e26881ad1e2cd1003f497f0cc9df23ccbd1b612f2c2edf3bacfcd6dbff3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1762544321</id>
    <title>giflib: Fix of CVE-2023-48161</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-48161: fix Buffer Overflow vulnerability in DumpSCreen2RGB function</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-48161: fix Buffer Overflow vulnerability in DumpSCreen2RGB function</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-07 19:38:44 UTC" />
    <updated date="2025-11-07 19:38:44 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762544321.html" id="CLSA-2025:1762544321" title="CLSA-2025:1762544321" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="giflib" release="9.el7.tuxcare.els1" src="giflib-4.1.6-9.el7.tuxcare.els1.src.rpm" version="4.1.6">
          <filename>giflib-4.1.6-9.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">accf89c34d0aa8ade35ee857ad05ae791223188332a6c2a30b62dd6454768f37</sum>
        </package>
        <package arch="x86_64" epoch="0" name="giflib" release="9.el7.tuxcare.els1" src="giflib-4.1.6-9.el7.tuxcare.els1.src.rpm" version="4.1.6">
          <filename>giflib-4.1.6-9.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d3c47bace1dec2b78c049d559327de1f714aaeac670f98b1390630ccb439e0c7</sum>
        </package>
        <package arch="i686" epoch="0" name="giflib-devel" release="9.el7.tuxcare.els1" src="giflib-4.1.6-9.el7.tuxcare.els1.src.rpm" version="4.1.6">
          <filename>giflib-devel-4.1.6-9.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">5267d3f268a3afbf98dee69f14efc84a1fa8435dfaecebf5008fd79a8de84eaa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="giflib-devel" release="9.el7.tuxcare.els1" src="giflib-4.1.6-9.el7.tuxcare.els1.src.rpm" version="4.1.6">
          <filename>giflib-devel-4.1.6-9.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">917d68b8d29e4a52d568ee15a67b1ca30a292f5a235fcedf0c539e4fc4608723</sum>
        </package>
        <package arch="x86_64" epoch="0" name="giflib-utils" release="9.el7.tuxcare.els1" src="giflib-4.1.6-9.el7.tuxcare.els1.src.rpm" version="4.1.6">
          <filename>giflib-utils-4.1.6-9.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">bd0e15e3edd263eaac38836e52d8d7b97dfa2340896baf29021daa30b3f66cc6</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1762544767</id>
    <title>gstreamer1-plugins-base: Fix of CVE-2024-47538</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-47538: fix stack-buffer overflow in
  vorbis_handle_identification_packet function by limiting writing beyond
  boundaries of position array</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-47538: fix stack-buffer overflow in
  vorbis_handle_identification_packet function by limiting writing beyond
  boundaries of position array</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-07 19:46:15 UTC" />
    <updated date="2025-11-07 19:46:15 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762544767.html" id="CLSA-2025:1762544767" title="CLSA-2025:1762544767" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="gstreamer1-plugins-base" release="2.el7.tuxcare.els2" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els2.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">44b7b8d9bb671a1b1a44327806552fdc1a00c5ac93ee6ba849d42c8dd234ef5c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gstreamer1-plugins-base" release="2.el7.tuxcare.els2" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els2.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">96b71219869f43baa046ddc1d30ff2930ba219ad47a40d6b49e9dc790d5fdd67</sum>
        </package>
        <package arch="i686" epoch="0" name="gstreamer1-plugins-base-devel" release="2.el7.tuxcare.els2" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els2.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-devel-1.10.4-2.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">d122d7d74bd2fcd73d1bd0980b26a08b96a7582e7197dbebf938329398386c98</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gstreamer1-plugins-base-devel" release="2.el7.tuxcare.els2" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els2.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-devel-1.10.4-2.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">8510a8e2b064255412223ea6f088fa532e0faf0c757450dd28043e4d6425a6c3</sum>
        </package>
        <package arch="noarch" epoch="0" name="gstreamer1-plugins-base-devel-docs" release="2.el7.tuxcare.els2" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els2.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-devel-docs-1.10.4-2.el7.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">7730beb7ef7f311b8d7bbc801acbc77dec298b9a037e3c0fe6e8c5bf2118ea87</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gstreamer1-plugins-base-tools" release="2.el7.tuxcare.els2" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els2.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-tools-1.10.4-2.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">5c43de2dbc508657ca8457cc27ff155cf8f9b76ea8935c1f72c0008cfe0ead15</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1762544201</id>
    <title>libtiff: Fix of CVE-2025-9900</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-9900: fix write-what-where vulnerability in processing TIFF image
  files</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-9900: fix write-what-where vulnerability in processing TIFF image
  files</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-07 19:36:50 UTC" />
    <updated date="2025-11-07 19:36:50 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762544201.html" id="CLSA-2025:1762544201" title="CLSA-2025:1762544201" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libtiff" release="35.el7.tuxcare.els6" src="libtiff-4.0.3-35.el7.tuxcare.els6.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">df0df36e89fc2d748cf1fbabc5670d6d9a7e229d53bea78c05b3d421ef4b6135</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff" release="35.el7.tuxcare.els6" src="libtiff-4.0.3-35.el7.tuxcare.els6.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">a6eec3799968818c0c54d23be5ee074bfa10a2a6550eb72e547e48c52948943f</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els6" src="libtiff-4.0.3-35.el7.tuxcare.els6.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">22b369027bd5285fa4ec6e03a9c8938a17a224fac9f99a7ff3f944df4b4146b8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els6" src="libtiff-4.0.3-35.el7.tuxcare.els6.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">859eee034bc77f8fd4f1f7771a05d05e48637c9fa2aa15f2c155d071451515a8</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els6" src="libtiff-4.0.3-35.el7.tuxcare.els6.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">f03e04f8da9ac73cccf97b6338e484d1b384424d9d832913ed2ea6b005624555</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els6" src="libtiff-4.0.3-35.el7.tuxcare.els6.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">7e2685c40194a257c8e6e8ff4e99c85c85de24fb5f54c77d98b5a7b38df12bb5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-tools" release="35.el7.tuxcare.els6" src="libtiff-4.0.3-35.el7.tuxcare.els6.src.rpm" version="4.0.3">
          <filename>libtiff-tools-4.0.3-35.el7.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">13e95080364d828d1cead54a9d1c258d7b61a7c38830e492f39e95e687c19d1c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1762544268</id>
    <title>rsync: Fix of CVE-2016-9840</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2016-9840: fix improper pointer arithmetic in inftrees.c</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2016-9840: fix improper pointer arithmetic in inftrees.c</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-07 19:37:52 UTC" />
    <updated date="2025-11-07 19:37:52 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1762544268.html" id="CLSA-2025:1762544268" title="CLSA-2025:1762544268" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="rsync" release="12.0.1.el7_9.tuxcare.els2" src="rsync-3.1.2-12.0.1.el7_9.tuxcare.els2.src.rpm" version="3.1.2">
          <filename>rsync-3.1.2-12.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">5bc9521c86456fffe87ecc1733e3d2551a3334db83142b905d086bde1a42ffba</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1763397525</id>
    <title>sssd: Fix of CVE-2025-11561</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-11561: prevent unexpected Kerberos principal-to-account mappings
  when SSSD's localauth plugin cannot resolve a principal</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-11561: prevent unexpected Kerberos principal-to-account mappings
  when SSSD's localauth plugin cannot resolve a principal</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-17 16:38:49 UTC" />
    <updated date="2025-11-17 16:38:49 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1763397525.html" id="CLSA-2025:1763397525" title="CLSA-2025:1763397525" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libipa_hbac" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libipa_hbac-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">368fee9aebf9b6334383e821bb8bc74e428dca07190a2060848a2ceae553e13f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libipa_hbac" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libipa_hbac-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c5d0b2ed7b97d9dc48617dd582fd88a943a9416b94e94c9c8fe0cec151f02611</sum>
        </package>
        <package arch="i686" epoch="0" name="libipa_hbac-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libipa_hbac-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">a8cf986c8093316ac1d5da1e1e44c08b2a3c4e31375ee4293067328d0e45e218</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libipa_hbac-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libipa_hbac-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">eae16f5cea020df38e5126e9ea41943b4b585623e3b862a636fcb985f80dc841</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_autofs" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_autofs-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2737a8e2275578b1fe7e5083edb93f8a05ec5e123bfc520c44abe70fd3740efb</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_certmap" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_certmap-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">57ea758b3cda4690c19d2cd559abbb65b316750914a5629e9082d358697b94c4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_certmap" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_certmap-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2162bbaa0e0904c4fd2d1659b2eb9263aab65764913bd96544281540b6ea3cf9</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_certmap-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_certmap-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">6a3a2e07ad872d8878cf46aa1611570654c9493e3fe4263cf065bb64824697cc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_certmap-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_certmap-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">304f3df2cb670932455902cb77a06be9ebd146faae7efa49f55587e89bc3aba5</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_idmap" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_idmap-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">376b9af04a80557de47b926325006222d55ccad669fd31ef59497952f6bc0a6b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_idmap" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_idmap-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2ad016c7d528957a786128267865be208a387d9ef51b07746bf9c8998ccf1823</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_idmap-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_idmap-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">21fea3aac543a3c7e553e49fec56c14f9b642f13ef7b5cc4e2918319d8d3fbf0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_idmap-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_idmap-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">627079356390241fb5d699f746f9f09db01f74ae8cb43f8b07e78cd30094b112</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_nss_idmap" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_nss_idmap-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">56cfaf7b8f71a057c836a393cb31026776dfd9cd8c14d5ac84e734b3cb072a2c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_nss_idmap" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_nss_idmap-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8877e1110829f9b7c7d0a5a812e2ffb2fd889f1ef4a270af7539650b1bd18953</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_nss_idmap-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_nss_idmap-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">74d64d8493bd9aa978d358d29795a9f07da374febad0432c2a22cd3af95ff9e7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_nss_idmap-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_nss_idmap-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0f08428758ce7127f1885ac9c22664dcd5a9fb8f11c0391751b1597e05afc854</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_simpleifp" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_simpleifp-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">72000a89ca763a80aaa32870224cfbbef19d55cf56de1177555bf1d82b6b3b4d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_simpleifp" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_simpleifp-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6758226768ff235380bd1fb624d09c192fa023a58f89a88e6b5a6bd471856ebe</sum>
        </package>
        <package arch="i686" epoch="0" name="libsss_simpleifp-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_simpleifp-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">efbf8ebd600b81bd97190493fe928e1d7f7dbfeb5c985033bb39c9cb1e97bd6b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_simpleifp-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_simpleifp-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">332fe5509939b7591c1e48e061b26924034f00d501e4415e8191c66f258a46d4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsss_sudo" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>libsss_sudo-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">02163908df7101c3866a6674610fd5e0b91ff9d67c00afa5b4e45a9336496292</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libipa_hbac" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-libipa_hbac-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2f877bf5a2926d2be487b5d270bc3b5a92ff89e0d2a9c3c87115e5b2dd98391c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libsss_nss_idmap" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-libsss_nss_idmap-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d27e3a4da4a3b5a7ef60a044f86cd1073bf7df5cd9a715cc209291495b5ad1ca</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-sss" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-sss-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7f5e8c29a8c8b86042e3d20e8eda8df88f82b0e9a2ad6067d796b56c95e45745</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-sss-murmur" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-sss-murmur-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a7d05aa369056cd48f4686451696f46972e19990809af4a149675eb74f05e5f1</sum>
        </package>
        <package arch="noarch" epoch="0" name="python-sssdconfig" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>python-sssdconfig-1.16.5-10.0.3.el7_9.16.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">5c4d65cf4bc14eebe1744efcf072173ee15a6148bc761c010a57bedf1a57a131</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">dc86a24c5ce7f26cb3442b4b2a1ab7ed731739d1eb020eb05a304ffd9773226a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-ad" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-ad-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c8b475a9495a1138432501a220005952f4801c6c0dce0931fdd5366a2658d76d</sum>
        </package>
        <package arch="i686" epoch="0" name="sssd-client" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-client-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">d9131a040adb3a84fb4c824e45a9a6e2f589752adb83f3ba627be6011b2548b3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-client" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-client-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b1ca0ef5a9966e0399338539c294a3ac14f1fd762b277d574f9810efe2273d94</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-common" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-common-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e45e68ad0b4b96cdb448507da544c534a10c073814bdb3778d52d22a43f1a560</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-common-pac" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-common-pac-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">432d9da383a636a595337d09a5b45a220b350ad5b2cab8f7574e777bef3e5a95</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-dbus" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-dbus-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">311df0a4c10165b0654239204d6ba2a4da985ed232f02571f699ab723ca4aecb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-ipa" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-ipa-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4de4918570a76581ce5f32bb55a2dcff8e98f06cc80ca43a3cf2a89d552e18ba</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-kcm" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-kcm-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f21b69f051ecb8605af7af951164734ec812745e6405c448b08751333a8bd96d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-krb5" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-krb5-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0fdfdde20e4f69ae1b9df13ea6fb5f302646ab4c45c2a7385d91d00b00517f05</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-krb5-common" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-krb5-common-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8b5fc779c73b0f7384da7f28dd90cfcc69314bda18de186b9ce890af091cc48c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-ldap" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-ldap-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">82df5c21a9f1a5e9bc37aef04bb74d7e90f53365b793b30d00d18955f936eba0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-libwbclient" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-libwbclient-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fc7a1ad9906f3f527ca6c1cd13592155e7cf581d2f5564f0e7ac970509dd632b</sum>
        </package>
        <package arch="i686" epoch="0" name="sssd-libwbclient-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-libwbclient-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">674d7f26a81343de0eda22d358848c13e44c79dc69cca05081bf8c9a6d662900</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-libwbclient-devel" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-libwbclient-devel-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f30cedf3becea762422c919b2df8bb07fc3241b94944bad87662f939c13e0f24</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-polkit-rules" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-polkit-rules-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">aa1bf409e039582e5ed7fef2ff96bbcc3bc8ae41fdc919d9703dc608c55a343d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-proxy" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-proxy-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d964e263055e793c59d90a55926e1fa3131405626c7b1b901eb84c8ba00207e1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-tools" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-tools-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0d9c83415b3f4b69d9094cfd3ac3f6927217f02efaf25ccf6cb1064c02325dc7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="sssd-winbind-idmap" release="10.0.3.el7_9.16.tuxcare.els1" src="sssd-1.16.5-10.0.3.el7_9.16.tuxcare.els1.src.rpm" version="1.16.5">
          <filename>sssd-winbind-idmap-1.16.5-10.0.3.el7_9.16.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cebd4ad047454bc7c8aba4f5490e338352ccf4103fd54f4c5a64d54952c952cf</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1763568610</id>
    <title>python-idna: Fix of CVE-2024-3651</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-3651: more efficient resolution of joiner contexts in idna
  library to avoid quadratic complexity that leads to a DoS condition</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-3651: more efficient resolution of joiner contexts in idna
  library to avoid quadratic complexity that leads to a DoS condition</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-19 16:10:20 UTC" />
    <updated date="2025-11-19 16:10:20 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1763568610.html" id="CLSA-2025:1763568610" title="CLSA-2025:1763568610" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python-idna" release="1.el7.tuxcare.els1" src="python-idna-2.4-1.el7.tuxcare.els1.src.rpm" version="2.4">
          <filename>python-idna-2.4-1.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">498a14d700139f190e6e3e4e62cd0ee2bb90651567b16a398247c01980d22521</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1763139862</id>
    <title>poppler: Fix of CVE-2025-32365</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-32365: fix segmentation fault due to an invalid memory read, occurring in JBIG2Bitmap::combine</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-32365: fix segmentation fault due to an invalid memory read, occurring in JBIG2Bitmap::combine</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-14 17:04:26 UTC" />
    <updated date="2025-11-14 17:04:26 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1763139862.html" id="CLSA-2025:1763139862" title="CLSA-2025:1763139862" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="poppler" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-0.26.5-43.el7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">ce98e15a910e7d7aa1a8b8f961f1762c157fc49b689130e05e7c675a611cddcb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">81030ec00680eb981ab3d32755b96b0a648320760db084d9345f542189384fc1</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-cpp" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-cpp-0.26.5-43.el7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">fb2a7de28af2e098af6466223f3c5cce92cea7db3fed2df06016e9e1261e0a8a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-cpp" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-cpp-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">c1efaa723bd304cb23fd779b68acebdf8d181953daf6002b2f7145191046e942</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-cpp-devel" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-cpp-devel-0.26.5-43.el7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">8122d2a9da8ca06f3ded310b6dd4a0f861396f7892b511213e1344e32215a338</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-cpp-devel" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-cpp-devel-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">a3d06c373a94d867e63b08fa8f46897b37d90f1223ae8426c05ca53501d8e25f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-demos" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-demos-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">82410c349515786a10b6e89643ba82c048903c9f61e29e4cfb2d3c3b8e3c77cc</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-devel" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-devel-0.26.5-43.el7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">f1d8b467d6f1cade341dc521c2cc90dac390c8811cb32c28d8d96e10249a113e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-devel" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-devel-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">39e7d804562f7c457d9ff09212fb1fa2b879478393f40468c54fdf4331c75e9f</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-glib" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-glib-0.26.5-43.el7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">897a5b4a5c9f1873fb9229d5e34506c168184cddb7eef963c45619f982f8033c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-glib" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-glib-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">9324092e97c462ebeae8f50af141952f00f8cfa90fe9ffa66f6a63f5809dae94</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-glib-devel" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-glib-devel-0.26.5-43.el7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">4f6e09e525da978e3e35fcc20805f99d87d938d9816d5a56f42fc4b014b0caee</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-glib-devel" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-glib-devel-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3a557da95da410ea351f9b790b927360b0a1ae0e65e2639f3557672d5a84e405</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-qt" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-qt-0.26.5-43.el7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">c24a266e2b24ec951a2821d76ecadea7f07f26cb4d3a3b8a85b0beb1b5a73b90</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-qt" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-qt-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3a18c29ea0125d9c8e40b8decb3bd9626afd25e172ffc87498d8432d5de8e1e1</sum>
        </package>
        <package arch="i686" epoch="0" name="poppler-qt-devel" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-qt-devel-0.26.5-43.el7.1.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">7b7f4f01a0d7e8b5390df7932eedf4e659ef274dbc7ef1a21d706dc8432b9f18</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-qt-devel" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-qt-devel-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">c531bd9ad8aed7455441bf90876c5d6ff11a88af567dc71b9b58ed51ef4d3799</sum>
        </package>
        <package arch="x86_64" epoch="0" name="poppler-utils" release="43.el7.1.tuxcare.els2" src="poppler-0.26.5-43.el7.1.tuxcare.els2.src.rpm" version="0.26.5">
          <filename>poppler-utils-0.26.5-43.el7.1.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">330d5336e8c781e3fab074c1cb28ee9a2298d50db48e807c6da4c84945b30021</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1763141692</id>
    <title>udisks2: Fix of CVE-2025-8067</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-8067: fix issue allowing unprivileged users to create loop devices
  with negative index values</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-8067: fix issue allowing unprivileged users to create loop devices
  with negative index values</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-14 17:34:56 UTC" />
    <updated date="2025-11-14 17:34:56 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1763141692.html" id="CLSA-2025:1763141692" title="CLSA-2025:1763141692" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libudisks2" release="1.el7.tuxcare.els1" src="udisks2-2.8.4-1.el7.tuxcare.els1.src.rpm" version="2.8.4">
          <filename>libudisks2-2.8.4-1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">76018a219f3c2d01db41db3f6eb87c82216f904c50c4abad4f6ac2e670bc6c4e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libudisks2" release="1.el7.tuxcare.els1" src="udisks2-2.8.4-1.el7.tuxcare.els1.src.rpm" version="2.8.4">
          <filename>libudisks2-2.8.4-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a2c25ee9d3c73123b0c7ba9433e2c2c8247b67416dcde11997fbca32b8f58028</sum>
        </package>
        <package arch="i686" epoch="0" name="libudisks2-devel" release="1.el7.tuxcare.els1" src="udisks2-2.8.4-1.el7.tuxcare.els1.src.rpm" version="2.8.4">
          <filename>libudisks2-devel-2.8.4-1.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">9d2b92b349914301dd4fd93be764e5c6c03aa93d7f1fb5578c7351e78b94630f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libudisks2-devel" release="1.el7.tuxcare.els1" src="udisks2-2.8.4-1.el7.tuxcare.els1.src.rpm" version="2.8.4">
          <filename>libudisks2-devel-2.8.4-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d53c07cfec9dd6808dfbc0f918f2c5886556e9f686a43af3897c1dcb375b066a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="udisks2" release="1.el7.tuxcare.els1" src="udisks2-2.8.4-1.el7.tuxcare.els1.src.rpm" version="2.8.4">
          <filename>udisks2-2.8.4-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3d1d5e25bcc6ceb59e36a02036741fd23a0bb46dce22114122f3f50b5274a190</sum>
        </package>
        <package arch="x86_64" epoch="0" name="udisks2-iscsi" release="1.el7.tuxcare.els1" src="udisks2-2.8.4-1.el7.tuxcare.els1.src.rpm" version="2.8.4">
          <filename>udisks2-iscsi-2.8.4-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5150b5a2c615ca8f85abac27f48e011f492e6b4b060f783ef833d2e2c8439aa3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="udisks2-lsm" release="1.el7.tuxcare.els1" src="udisks2-2.8.4-1.el7.tuxcare.els1.src.rpm" version="2.8.4">
          <filename>udisks2-lsm-2.8.4-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">822bf9379a3cdd9282ffc9c4f2c2fd52224d5e89751dc5887c244ada2878597c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="udisks2-lvm2" release="1.el7.tuxcare.els1" src="udisks2-2.8.4-1.el7.tuxcare.els1.src.rpm" version="2.8.4">
          <filename>udisks2-lvm2-2.8.4-1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f518704a297b627c15c610acbe3982471e60dd9e2bf3761be6dae3364beaf9f7</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1763139214</id>
    <title>gstreamer1-plugins-base: Fix of CVE-2024-47615</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-47615: fix OOB-Write in gst_parse_vorbis_setup_packet by validating
  integer size input to prevent memory corruption</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-47615: fix OOB-Write in gst_parse_vorbis_setup_packet by validating
  integer size input to prevent memory corruption</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-14 16:53:44 UTC" />
    <updated date="2025-11-14 16:53:44 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1763139214.html" id="CLSA-2025:1763139214" title="CLSA-2025:1763139214" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="gstreamer1-plugins-base" release="2.el7.tuxcare.els3" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els3.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">4394e3fa5393f76c1f983c9793da2f04b82e65b26cbb8b36415a6ae29b49d421</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gstreamer1-plugins-base" release="2.el7.tuxcare.els3" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els3.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c57dbd87f1bbe0191d155c4c30d36c0712ee68709a07cdd1f9d74217087367bd</sum>
        </package>
        <package arch="i686" epoch="0" name="gstreamer1-plugins-base-devel" release="2.el7.tuxcare.els3" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els3.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-devel-1.10.4-2.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">7c26c4df9c64e7683d1fb700f52437b77300aa749319ea59e66eaa389ba3f656</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gstreamer1-plugins-base-devel" release="2.el7.tuxcare.els3" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els3.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-devel-1.10.4-2.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">06b58b83f72dfff0f34e7d3458b15c3888ae3d987e0055305e8deb0bd84936f1</sum>
        </package>
        <package arch="noarch" epoch="0" name="gstreamer1-plugins-base-devel-docs" release="2.el7.tuxcare.els3" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els3.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-devel-docs-1.10.4-2.el7.tuxcare.els3.noarch.rpm</filename>
          <sum type="sha256">a565dd5ecadc69f04b7521780a9519d13072015cb3e52b00e3ec92ced8918fb5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gstreamer1-plugins-base-tools" release="2.el7.tuxcare.els3" src="gstreamer1-plugins-base-1.10.4-2.el7.tuxcare.els3.src.rpm" version="1.10.4">
          <filename>gstreamer1-plugins-base-tools-1.10.4-2.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">431f87878ec1ef1b219b9318b680cf16cf4b5f64acc1867accce53b87ae62485</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1764280893</id>
    <title>ImageMagick: Fix of CVE-2025-62171</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-62171: add overflow check before calculating extent in the BMP decoder</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-62171: add overflow check before calculating extent in the BMP decoder</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-27 22:12:27 UTC" />
    <updated date="2025-11-27 22:12:27 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1764280893.html" id="CLSA-2025:1764280893" title="CLSA-2025:1764280893" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">28e001ab5bf4095242c6a3f7a6e4cae1b863da85cc4b067a126d6411a8090cf7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">2e2ef5f05fd9c2c5dd3020d6c29d13242c8ac05b4d8888a09bf58f2bdc76e839</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">55bdb8ddb092f26a76a6b56ea7af9c8665292087982c38ebf10b084a20c3a801</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">a7023a6aea035ec7d378d1ed7866b487ddaa82a0e66432b36c83b9f6fa900131</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">0d0b7d80e64adcf4ce79442a87bcc4f63246e83855d3ccb00673e80f649d5f2c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">f85db892eb2b826a2889aa033a4c80bf88726a2fa90d87399486473ddb7c5f0f</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">9f7acb4a302233af56bc591beed7e2415710c0efc0e12a2ba9850dec929d64a7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">c0e6837ce881cb15057ec9999beb7e36f1ce5528a581e0a093d04421f6ca91f4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">f9d37d1c6c3d569907438c41962554f4184d0a9c3566f2c574e2931a0c7f71bb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.el7_9.tuxcare.els7" src="ImageMagick-6.9.10.68-7.el7_9.tuxcare.els7.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">afd493ddf4c02852555f5ef0f6123f0ce362e65c92d033ec52f2540132093c98</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1764281284</id>
    <title>squid: Fix of CVE-2025-62168</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-62168: fix failure to redact HTTP authentication credentials in error
  handling to prevent information disclosure
- email_err_data directive now defaults to 'off' for security (previously 'on')</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-62168: fix failure to redact HTTP authentication credentials in error
  handling to prevent information disclosure
- email_err_data directive now defaults to 'off' for security (previously 'on')</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-27 22:13:15 UTC" />
    <updated date="2025-11-27 22:13:15 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1764281284.html" id="CLSA-2025:1764281284" title="CLSA-2025:1764281284" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="7" name="squid" release="17.0.5.el7_9.99.tuxcare.els2" src="squid-3.5.20-17.0.5.el7_9.99.tuxcare.els2.src.rpm" version="3.5.20">
          <filename>squid-3.5.20-17.0.5.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">e38681fe3a93560d86bcdba1b65f1e4c9807d7231e6b5d4ac3b60a17b2e7ce6c</sum>
        </package>
        <package arch="x86_64" epoch="7" name="squid-migration-script" release="17.0.5.el7_9.99.tuxcare.els2" src="squid-3.5.20-17.0.5.el7_9.99.tuxcare.els2.src.rpm" version="3.5.20">
          <filename>squid-migration-script-3.5.20-17.0.5.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">a1b1a29129d9c98e45391e03d2b26abec4f8863583bef70139f649b732ff70cf</sum>
        </package>
        <package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.0.5.el7_9.99.tuxcare.els2" src="squid-3.5.20-17.0.5.el7_9.99.tuxcare.els2.src.rpm" version="3.5.20">
          <filename>squid-sysvinit-3.5.20-17.0.5.el7_9.99.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">61ca92c073fa0bc86c11f670e70ae109edf4c4565aba66e71c095dc68fc13d00</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1764598717</id>
    <title>gstreamer1: Fix of CVE-2024-47606</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-47606: allocator: avoid integer overflow when allocating sysmem
- Fix documentation build with the newer gtk-doc</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-47606: allocator: avoid integer overflow when allocating sysmem
- Fix documentation build with the newer gtk-doc</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-01 14:32:32 UTC" />
    <updated date="2025-12-01 14:32:32 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1764598717.html" id="CLSA-2025:1764598717" title="CLSA-2025:1764598717" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="gstreamer1" release="2.el7.tuxcare.els1" src="gstreamer1-1.10.4-2.el7.tuxcare.els1.src.rpm" version="1.10.4">
          <filename>gstreamer1-1.10.4-2.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">aca29fbb99d991cb3466c605b763f8399a5fa625ad0ba064b8b1565f0cc7839a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gstreamer1" release="2.el7.tuxcare.els1" src="gstreamer1-1.10.4-2.el7.tuxcare.els1.src.rpm" version="1.10.4">
          <filename>gstreamer1-1.10.4-2.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cd2699b723a90ed656a67eceb0b954a45373714902bef21e58b2f5ece4e32be2</sum>
        </package>
        <package arch="i686" epoch="0" name="gstreamer1-devel" release="2.el7.tuxcare.els1" src="gstreamer1-1.10.4-2.el7.tuxcare.els1.src.rpm" version="1.10.4">
          <filename>gstreamer1-devel-1.10.4-2.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">edffbd5286c0dc28a60475e3d5a78245056ee2f4eef87f1048193bd1a3053f05</sum>
        </package>
        <package arch="x86_64" epoch="0" name="gstreamer1-devel" release="2.el7.tuxcare.els1" src="gstreamer1-1.10.4-2.el7.tuxcare.els1.src.rpm" version="1.10.4">
          <filename>gstreamer1-devel-1.10.4-2.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b9c1f4199cabb6c5d5a047d45fd2307fe95f98e561c848a984ee82dbdd7da1e5</sum>
        </package>
        <package arch="noarch" epoch="0" name="gstreamer1-devel-docs" release="2.el7.tuxcare.els1" src="gstreamer1-1.10.4-2.el7.tuxcare.els1.src.rpm" version="1.10.4">
          <filename>gstreamer1-devel-docs-1.10.4-2.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">4cb8b7ea7785e4b1b614515fd80697c0b306e3c1a815731c2f24494b6a511177</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1764858353</id>
    <title>postgresql: Fix of CVE-2025-1094</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-1094: fix potential SQL injections allowed by an improper encoding
  validation in data quoting functions</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-1094: fix potential SQL injections allowed by an improper encoding
  validation in data quoting functions</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-12 16:22:51 UTC" />
    <updated date="2025-12-12 16:22:51 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1764858353.html" id="CLSA-2025:1764858353" title="CLSA-2025:1764858353" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">b9df4aaa0d85bc6e585bedee21de5372525c3dc65a42bbe9dd17afe4c829ffef</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">da6afeb09e6d8560182370728eb063c3152a802b3224f813ff94b9bf7eef81bd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-contrib" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-contrib-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">787ede215fca9b46ae6541ecc9f6337d7dd599537d6394b9fa3f66a4c5480c30</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">4adf985567e4e526b44c8494a7ea3352327619d9c5baaabc5b06ad0879d601a5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">bdc372ffc6617f2d4852e7dccf04ed87ec4de700bb0845c3e73d9b6eacec7c6e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-docs" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-docs-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">c708c73f6da76e06d7c6e488e3b31fcb3820fbeae04afff3904ea8d0dc9a8157</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">9dcb44555188ec4b3921a23ffda9dc8a778e1a624595c946a2f9e1a3f8016110</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">5abd3477c40f638cd376531080a3083ae6613e83eeb4fa45d2bebf8929731da0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plperl" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-plperl-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">c4fe72d81adc8ee34fa697931ec5c29716369b3a6372d59880b15b79d7a043e1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plpython" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-plpython-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">8ea527d5303cba403627ff81ee13d73eabc1357673f49eb4db0bfb7aa1f39cc6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-pltcl" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-pltcl-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">9633cb9c4b7a4a2627da33348d3b72c4a8b9a3996fab87a0c03df731d960e0f4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-server" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-server-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">79234f607c81ead563123093aa445f1d2db48e88a9bd1d7176274a0dd8a4dbb4</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">e7486855b5884798f2426b6168cf9f13d5879be81eb9f58d9f1f53b5ac17c2e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">d5fabb115cd6b7bd2d5c2ec7ae3ca6b6eb22326a9ff10a1041365df3a901498e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-test" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-test-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">42779a4dac6c01ff4efeacb9cc217399c4aa2c203df00a2b966cf15bc80f3531</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-upgrade" release="9.el7_9.tuxcare.els5" src="postgresql-9.2.24-9.el7_9.tuxcare.els5.src.rpm" version="9.2.24">
          <filename>postgresql-upgrade-9.2.24-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">5e196758e733bf83a5ea0083e8322fb44ce2d7e8791b933ec09919e15edca07a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1764773940</id>
    <title>postgresql: Fix of CVE-2025-8714</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-8714: Restrict restore-time code execution</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-8714: Restrict restore-time code execution</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-12 16:23:52 UTC" />
    <updated date="2025-12-12 16:23:52 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1764773940.html" id="CLSA-2025:1764773940" title="CLSA-2025:1764773940" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">b590536c3db4cf4f4f8d575de8e663e4118deee7c2d3bd98ece700779c989406</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">08f959fba8ff8d4aaaae2b7587e4c8304ce9b51b3ba1f5db5677a76273bd44e4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-contrib" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-contrib-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">cc8afef1f250373e5cbe371c01e680baaa983d14d97cf5178e9e15a738676d93</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">653c05d6a5c3f58b972551dec2bc2120b6fd5f8453e3a220782f055f0c3f1942</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-devel" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-devel-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">eb9fadaf5bf9af64871d11fa2b6d2887361db9ebaad7a379697425b331649a12</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-docs" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-docs-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">fc79e45e0e2df612427b721b277c461db34e5047ac7c07591be0908323c88e19</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">ab512a41724ad6fc9f79b8b288bdf604ba601aac15ef8aca92947ab3253e187a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-libs" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-libs-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">4eef06a7c94e1c5025213ac4cbb4ff26b4d554d55056fb7cf350c9962d4b27e0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plperl" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-plperl-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">d3d396b77d574a642168cfbfa0587007b95c0df91d56e9c497af2bfc08725aa2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-plpython" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-plpython-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">815b45b4d805f956964b75d47f15875c1f3034b78e4edb451f7a9ce0881b0456</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-pltcl" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-pltcl-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">954c1b1ee6f6ec26d8ff955bb9d2a10032e9ea7ca66df27107e62efdb7557543</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-server" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-server-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">22d398a81025565d56d306bd6afb88640dea5b93a4099dec0499f8754829ae34</sum>
        </package>
        <package arch="i686" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">abb1d46ecf8d9fe6e88916cae8df0546354991bd4f8dbf3e2ed4f50d78a88edd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-static" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-static-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">e9def1436dafd3e8f1c1f13329c437d1d36ee89b7a1b793d3e17c4927c456cee</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-test" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-test-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">9cdc88f35a8c40ef7995f3849bf288bdcf269032841df198e9ac2277328d932e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="postgresql-upgrade" release="9.el7_9.tuxcare.els4" src="postgresql-9.2.24-9.el7_9.tuxcare.els4.src.rpm" version="9.2.24">
          <filename>postgresql-upgrade-9.2.24-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">ce777389f4f3a1b96d1ff1c91ca94c010f8d366559fc00434d10713e09715f3c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1764769161</id>
    <title>libsoup: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-4945: fix integer overflow vulnerability in date/time parsing
- CVE-2025-11021: fix out-of-bounds memory read in cookie date handling logic</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-4945: fix integer overflow vulnerability in date/time parsing
- CVE-2025-11021: fix out-of-bounds memory read in cookie date handling logic</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-12 16:24:52 UTC" />
    <updated date="2025-12-12 16:24:52 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1764769161.html" id="CLSA-2025:1764769161" title="CLSA-2025:1764769161" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libsoup" release="2.0.5.el7.tuxcare.els2" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els2.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.5.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">c5b44841e427dd4b618b68f36c2c7ec946043027506ab233d04ad8cc5a737690</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup" release="2.0.5.el7.tuxcare.els2" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els2.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.5.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">82703d3fa08611b3b0edf5ab4473488212b08bd64f4a67aeedef848c758641e9</sum>
        </package>
        <package arch="i686" epoch="0" name="libsoup-devel" release="2.0.5.el7.tuxcare.els2" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els2.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.5.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">414a5323a1b29dc1577b6e68bde3a269179c5bdbebcac39aff0ab54050d94a50</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup-devel" release="2.0.5.el7.tuxcare.els2" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els2.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.5.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">2d2ba3293256a7a41b14aebb34a0e612b28299f575232b5e4ffd487bc95d3706</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1765310385</id>
    <title>Update of java-11-openjdk</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to openjdk-11.0.29+7 (GA).</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to openjdk-11.0.29+7 (GA).</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-09 19:59:49 UTC" />
    <updated date="2025-12-09 19:59:49 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1765310385.html" id="CLSA-2025:1765310385" title="CLSA-2025:1765310385" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">6651ff3a16c52a13b0eaa975ba2364f5547ef64b45b878e8f458dee1f7ab8588</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ec99c547b814624b420b6dc29c48351b6c1d66babe83db837e22622c0112e012</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-debug-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0d8597a001f5d839ba1aac420382d520c3e1fd6b8745d78a4e88d7866aff54c4</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-demo-11.0.29.0.7-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">1e9c832ed271caf2e97d5c9d6ee035b6db3185106e77a25ce63b4ceb3f4f3ed6</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-demo-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">996361decb1b46c32ed91d3a5278be527fc0ee63c136d9569804fa5107c5d20f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-demo-debug-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e43548972a3c11d398a74da7bc9565333179ee6ea8a695dd45cf9a6f45cf0c38</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-devel-11.0.29.0.7-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">8132b08dc734e5eb584b89c98611e317a0174f9c3a3ba697d798e25d4f62030e</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-devel-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b575e93fde7de43bbfe667258918cb5e4a29c51ef720a2ce04d0c7f384c201b0</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-devel-debug-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6c8ec7c97dbbdb972834d650dc5c03f1eb44d07a3cb8929bbc161a5cffb8989f</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-headless-11.0.29.0.7-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">03a33158f0f35253bee98742587d6fbabf0d1788730df5d69388736490dddaed</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-headless-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6bc771957e6558f167cad8cbc3a213a5190f7d1e4183a5875b0d4e5152e9a7e6</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-headless-debug-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">57fc41b893229dd29fda6844b03dc650f42cc323dd1895516435d0062e05cfba</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-javadoc-11.0.29.0.7-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">849d653ec91df9fa6930fac9789ab2532e0bded641470ec5758a79ed0ad48e72</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-javadoc-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">97e94a654ef6832c8fa22c511faa29bb7a267d844bb8a313057fc3ce1fc511a5</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-javadoc-debug-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">434e0b2e9c6f6be44a485b39997edb94884f1023bb3699f5e76fd84fb1ec409f</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-javadoc-zip-11.0.29.0.7-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">5be8876ab24b95991c86e8e465f6fe840779fa157ea539e0bd6bf75117f6ba7b</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-javadoc-zip-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d6743fbc66aca90e35f3e83e247c8f2565603adb47428cbb4b22d713d8025715</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-javadoc-zip-debug-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ffd5a46402a1630133af57f1c9a161a32afc3bb213caeba7f427f067efc5663b</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-jmods-11.0.29.0.7-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">3ef20f555f6b2694aeea59374a7ef7149f6260d5d27581f3e8309a214135f542</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-jmods-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1d91efc08dc71a11a2f716566aa8b22588710a137ca6ab0314319572d3363555</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-jmods-debug-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6b26d46ffb7c9835ec10170e0dc9640d1e0d2cb8ef08e8a9685bcb2b582a4067</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-src-11.0.29.0.7-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">17ab68f908166649c03651db98f05179ce8d09e4a5c80021118e57697f2cb6d2</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-src-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f0b7887e442a9018efb6f079895d855a845f56c415f28272e9dcc4d368a90603</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-src-debug-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1a55d2d151fa99a72c0b139205a375ddb155327452526679d6966a8ea5dc4d73</sum>
        </package>
        <package arch="i686" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-static-libs-11.0.29.0.7-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">88d6dfd3530a24d7bd286734b19106ad54d248448d54b8ad909ddb171646703b</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-static-libs-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">513a742af43e38633f0d012537514526ea66f81da81186dd1966f878ff79b010</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9.tuxcare.els1" src="java-11-openjdk-11.0.29.0.7-1.el7_9.tuxcare.els1.src.rpm" version="11.0.29.0.7">
          <filename>java-11-openjdk-static-libs-debug-11.0.29.0.7-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">b77d9e4bcbdd4ed294ac1acf2dca2aa15f1681be4982a63889ee371c5baed7e4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1765223770</id>
    <title>xorg-x11-server: Fix of 4 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-9632: fix buffer overflow in _XkbSetCompatMap()
- CVE-2025-62229: fix use-after-free condition due improper error handling
  during notification creation leading to DoS
- CVE-2025-62230: fix use-after-free condition due freeing certain data
  structures without properly detaching related resources
- CVE-2025-62231: fix unsigned short overflow in XkbSetCompatMap() function</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-9632: fix buffer overflow in _XkbSetCompatMap()
- CVE-2025-62229: fix use-after-free condition due improper error handling
  during notification creation leading to DoS
- CVE-2025-62230: fix use-after-free condition due freeing certain data
  structures without properly detaching related resources
- CVE-2025-62231: fix unsigned short overflow in XkbSetCompatMap() function</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-09 20:01:20 UTC" />
    <updated date="2025-12-09 20:01:20 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1765223770.html" id="CLSA-2025:1765223770" title="CLSA-2025:1765223770" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xdmx" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xdmx-1.20.4-99.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">e149a380c0907fb74559fdda58d4a1500a089165cd55550e4a26ec109d6128d1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xephyr" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xephyr-1.20.4-99.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">5702aced21db887f6febf0bc68a2741bd4995e59a2d21b43c78aac4de26eb8ab</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xnest" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xnest-1.20.4-99.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">b356e54becf650dd59721a8f9b2ff4c94cc2c7d636df4d77fb69cbd2e0961c6a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xorg" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xorg-1.20.4-99.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">bf2c95ed05b5029d207ed5407f4017a71390d43a298013314767131ee950a13c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xvfb" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xvfb-1.20.4-99.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">b6773e14e3a639e179a12f95972037dc836fde8856179ad645f94c62df9a7c45</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-Xwayland" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-Xwayland-1.20.4-99.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">940f3a8dd6cd608bcbaf2cc82e7c8cdd4d4a82da835f46e442c1fe7720855bd5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-common" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-common-1.20.4-99.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">34aabbf687057a24092c5583428f3f7af31c5ca64c63fb64235944a8332ab583</sum>
        </package>
        <package arch="i686" epoch="0" name="xorg-x11-server-devel" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">eb944c4fec56f81fef6e40b928e645a47b0b3763940dd65dc183cb016889fdad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="xorg-x11-server-devel" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-devel-1.20.4-99.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">03b78eac6cca03501262ff298b6c432873e6a56070b9d4e39318f0a0e18e66bc</sum>
        </package>
        <package arch="noarch" epoch="0" name="xorg-x11-server-source" release="99.el7_9.tuxcare.els8" src="xorg-x11-server-1.20.4-99.el7_9.tuxcare.els8.src.rpm" version="1.20.4">
          <filename>xorg-x11-server-source-1.20.4-99.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">29f7b23ca35fab83039e8b5368a5d686f5ea1bd7df9bfa14ebaa2a5b749f6d72</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2025:1765310530</id>
    <title>Update of java-1.8.0-openjdk</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u472-b08 (GA).</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u472-b08 (GA).</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-09 20:02:14 UTC" />
    <updated date="2025-12-09 20:02:14 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1765310530.html" id="CLSA-2025:1765310530" title="CLSA-2025:1765310530" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">beb6e4a319cf16687608b729a8639e2f92f298776a2fa792e95c023a8670f601</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">44c69123c05f4d039d9de7efbfc242625e7cf50e6f544f5a53685f75dc2f9c4c</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.472.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f2a16d2d19ef8411d6a2198d4f8b81820da392dfd277d7fe360d0835e11025c6</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6ae2d2ddb1a954d4410c5c3bbc0805e4d58ec86878dc091e3cf4b8267e894d61</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">eba7dbc757da3bc8a0e99997cf5c56e8c34d31f16236765410ee530e035cf3b0</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-debug-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4762dc07b8dc6060e2a1f93c1ac60924ddb8bb847e1687f744b79186420dac5e</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">bd4765663f5a7805ab79102cc8b804283686ef3f6dfa5437a3a881dc04ecd5fc</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">34d03f86784dccf8171148f59034feef7338ab416dc8636b6da20af60299a477</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-demo-debug-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f4c531db01d8f9e9f0e872903fd7f24f041e52ffe94084285c39da2a88ca48f2</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">7480a1dc4f735f11837cd11dd9e7f6af709b6e6c0a984829a18bab7660066aaa</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4aeae92d6d7d699578fd99b2784e9c7c0da5bd9b0bbbecc0e14c61c04800273d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-devel-debug-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e1d406415ea596e1bdf62b6165a553d17c4625aadc36a61baa4039b515b040a9</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">3beb18eada0d3fe2851a49ca9d4768edb831ab0e724ab7694201b12cf1f316a7</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c69baa085d3af2b37005361fc0762e5759b8f292d9df19edd743621ff88cce0d</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-headless-debug-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7c01b4381e1b00417ac0c360dfe926c4bb7ace322f6270fcb30373fafb2c4d71</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">f9efad70cd141626d46ed1b707fcb701b453e683df82d1db897de41315e9d0ca</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.472.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">40e2063deb0cbf7ebf641fc8d99ba4df11e01f1cc13d0f6b83e4af7b4421e42a</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">5aa7d2bc0126db50253b17df024b023c22dc3424424f453829c4ba926f0d41dd</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.472.b08-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">bd6f6ef49808710170d6a043b881133f24893843d25505bc612b310caeabd2b7</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-src-1.8.0.472.b08-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">c7d6e1528a39f11a5cf28940a6930053ae6774165fea9347bc2aac6aaa41d5db</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-src-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ee3eadf04b948ef0b0887043213d6a0d0aaada2b3d52101e37a3789b60a268b8</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.472.b08">
          <filename>java-1.8.0-openjdk-src-debug-1.8.0.472.b08-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7cc2e968da360f9179b0c2d545a22815805e7e51ef6496e6eda79a91957ee5bd</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1765310613</id>
    <title>python-jinja2: Fix of CVE-2024-56326</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-56326: fix format string vulnerability impacting users
  of applications which execute untrusted template</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-56326: fix format string vulnerability impacting users
  of applications which execute untrusted template</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-09 20:03:37 UTC" />
    <updated date="2025-12-09 20:03:37 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1765310613.html" id="CLSA-2025:1765310613" title="CLSA-2025:1765310613" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python-jinja2" release="4.el7.tuxcare.els1" src="python-jinja2-2.7.2-4.el7.tuxcare.els1.src.rpm" version="2.7.2">
          <filename>python-jinja2-2.7.2-4.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">d0e9b5e09d9db72456f653c783282b83ffe0854cef79eeae7db1df827f783032</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1765997462</id>
    <title>unbound: Fix of CVE-2024-8508</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-8508: limit number of name compression calculations per packet to
  prevent denial of service attacks.</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-8508: limit number of name compression calculations per packet to
  prevent denial of service attacks.</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-19 17:38:14 UTC" />
    <updated date="2025-12-19 17:38:14 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1765997462.html" id="CLSA-2025:1765997462" title="CLSA-2025:1765997462" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="unbound" release="5.el7_8.tuxcare.els4" src="unbound-1.6.6-5.el7_8.tuxcare.els4.src.rpm" version="1.6.6">
          <filename>unbound-1.6.6-5.el7_8.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f540d46b4239480166edaf915cda4fe3aafd1e9accbb485b68b9a188504ec00e</sum>
        </package>
        <package arch="i686" epoch="0" name="unbound-devel" release="5.el7_8.tuxcare.els4" src="unbound-1.6.6-5.el7_8.tuxcare.els4.src.rpm" version="1.6.6">
          <filename>unbound-devel-1.6.6-5.el7_8.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">159b71289b18b249ea31c0bc2edefe4672380cbd966aa7e24e86cf1cbc183566</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-devel" release="5.el7_8.tuxcare.els4" src="unbound-1.6.6-5.el7_8.tuxcare.els4.src.rpm" version="1.6.6">
          <filename>unbound-devel-1.6.6-5.el7_8.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">7fc13d7f7e6c217ce006fd3d8812357add5a8d6722b4aad8d2e0c9fd545cf18b</sum>
        </package>
        <package arch="i686" epoch="0" name="unbound-libs" release="5.el7_8.tuxcare.els4" src="unbound-1.6.6-5.el7_8.tuxcare.els4.src.rpm" version="1.6.6">
          <filename>unbound-libs-1.6.6-5.el7_8.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">c7a688afc36419fe0008247b7c851b5164a1f57b51cd697ca69d7bf0ebc2964d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-libs" release="5.el7_8.tuxcare.els4" src="unbound-1.6.6-5.el7_8.tuxcare.els4.src.rpm" version="1.6.6">
          <filename>unbound-libs-1.6.6-5.el7_8.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">3193fcb8497f22bdb3013bcafec10a75e52f6c3705fc1a4970544b8550234c04</sum>
        </package>
        <package arch="x86_64" epoch="0" name="unbound-python" release="5.el7_8.tuxcare.els4" src="unbound-1.6.6-5.el7_8.tuxcare.els4.src.rpm" version="1.6.6">
          <filename>unbound-python-1.6.6-5.el7_8.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">43cafabca1f8a445538f392dd9f29742a93b643dcf0c91fb56cdc4cee47fe285</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1766165929</id>
    <title>libpng: Fix of CVE-2025-64505</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-64505: fix heap buffer over-read vulnerability in png_do_quantize
  function by validating palette_lookup array bounds</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-64505: fix heap buffer over-read vulnerability in png_do_quantize
  function by validating palette_lookup array bounds</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-19 17:38:53 UTC" />
    <updated date="2025-12-19 17:38:53 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1766165929.html" id="CLSA-2025:1766165929" title="CLSA-2025:1766165929" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="2" name="libpng" release="8.el7.tuxcare.els1" src="libpng-1.5.13-8.el7.tuxcare.els1.src.rpm" version="1.5.13">
          <filename>libpng-1.5.13-8.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">80cb9368d04f06edeb6ebc3320238375b6b0cb0b37a8140ea68cae2212d580fb</sum>
        </package>
        <package arch="x86_64" epoch="2" name="libpng" release="8.el7.tuxcare.els1" src="libpng-1.5.13-8.el7.tuxcare.els1.src.rpm" version="1.5.13">
          <filename>libpng-1.5.13-8.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7d6ff0e7c2eb1cf138afebe7a969504e8d57118f31167798d72396e7b1dbeba4</sum>
        </package>
        <package arch="i686" epoch="2" name="libpng-devel" release="8.el7.tuxcare.els1" src="libpng-1.5.13-8.el7.tuxcare.els1.src.rpm" version="1.5.13">
          <filename>libpng-devel-1.5.13-8.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">853a76f52b4a69d914adb7dabac142e739be851e421fdd06abdfec5f894a1556</sum>
        </package>
        <package arch="x86_64" epoch="2" name="libpng-devel" release="8.el7.tuxcare.els1" src="libpng-1.5.13-8.el7.tuxcare.els1.src.rpm" version="1.5.13">
          <filename>libpng-devel-1.5.13-8.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ca52e4e0dc322fd08751d459984c22b29a45cbaa714e6051ee4aef7dbf519ace</sum>
        </package>
        <package arch="i686" epoch="2" name="libpng-static" release="8.el7.tuxcare.els1" src="libpng-1.5.13-8.el7.tuxcare.els1.src.rpm" version="1.5.13">
          <filename>libpng-static-1.5.13-8.el7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">97577b10764d0f0316c682285a23ffdf476e569709f33bea9078b301b9c4e81b</sum>
        </package>
        <package arch="x86_64" epoch="2" name="libpng-static" release="8.el7.tuxcare.els1" src="libpng-1.5.13-8.el7.tuxcare.els1.src.rpm" version="1.5.13">
          <filename>libpng-static-1.5.13-8.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">fa9d4c36be948f1a162a999c04d70e635c983bbcb3530ad9e3a3bc3bb911ce9f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1767970357</id>
    <title>httpd: Fix of CVE-2025-58098</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-58098: fix passes the shell-escaped query string to #exec cmd="..." directives</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-58098: fix passes the shell-escaped query string to #exec cmd="..." directives</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-09 14:54:44 UTC" />
    <updated date="2026-01-09 14:54:44 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1767970357.html" id="CLSA-2026:1767970357" title="CLSA-2026:1767970357" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.0.5.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">f612e12a8894d28ec1af9341a91651f4a3497af6f7ff2f05d9a455bcf7b895d0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.0.5.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">d73dfb7926e96dd6f3321c25ef70746e103b0188add973db2da05900dff07bb9</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.0.5.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">d6a219a45a4e68734c86b78dea899f3edd695be7fe5edc0770ac2a8de07eec1c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.0.5.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">fbe6e1e623d992ad44438f3d29b0ee1eaeef26e721693b1deef486ca044f8444</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.0.5.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">69e50f82e9b5f7da0d1d57890f00566ef6cd4d91bb0ee0a6e4ec9bdedfad5539</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.0.5.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">4631fadfc8eab248630da8fbbeab4d178addb42e73d7e387d3aa2240a8bdb07d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.0.5.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">fcb96ea4bff0e0f70ef16a6688a7e8b8145a58649e754faafe596c3c1a32a15e</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.0.5.el7.centos.1.tuxcare.els7" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.0.5.el7.centos.1.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">1aa5c7b9de01213b543ba4bf8036f71688049a563359105898ce3527711483e3</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1768310750</id>
    <title>git: Fix of CVE-2024-50349</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-50349: fix ANSI escape sequence vulnerability that occurs
  when asking for credentials interactively</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-50349: fix ANSI escape sequence vulnerability that occurs
  when asking for credentials interactively</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-13 13:25:53 UTC" />
    <updated date="2026-01-13 13:25:53 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1768310750.html" id="CLSA-2026:1768310750" title="CLSA-2026:1768310750" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="emacs-git" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>emacs-git-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">da415ab20fe538ae299f2e0ed2831984431264cea3f65e4d9f991886c736183b</sum>
        </package>
        <package arch="noarch" epoch="0" name="emacs-git-el" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>emacs-git-el-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">00df4d8b971ef5a0af03e8cdba43dfd30273ad70e0e3c42ea367d76e6b929992</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-1.8.3.1-25.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">bc44bc2f85b6d1aa4b964f2052abcaa309b6cbc98019fd16cb763f781ab0d7b0</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-all" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-all-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">2f46aaa5b4ad63779a58c9dd44cb5236caf633d29a0724b409eb4067e0b1269d</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-bzr" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-bzr-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">fb63a6ff59b939a6739e0927246692652bd492f7024356e1d240893a4403fc62</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-cvs" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-cvs-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">d5e47eef71b81cf30a37693dabc11ce7433fe3f3a4a4d71b3f75f8517772dbae</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-daemon" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-daemon-1.8.3.1-25.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">375f7795ed449859a50756b67086760e497d5a244a35840f152d2b72b4dcaedb</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-email" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-email-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">2635d2b0a973d63023aa5b99735393d1fa6e4f73c0aeb091f9b194c038078666</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-gnome-keyring" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-gnome-keyring-1.8.3.1-25.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">261703d83f746b79d07d5639c613807f00120c618fbc7dbaf0c0de00022d03cd</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-gui" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-gui-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">f1f934fedabc023528ce391727c361e43ef17b14e051f2bcf6fea79675915497</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-hg" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-hg-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">6473ec1c6e76b7f841b6c515774d2d027dc751c8bad1570bba2fbd45530fde95</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-instaweb" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-instaweb-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">f0814ff36aa497eccbf9028513f5a8e1aea0019e9953afbc1e7f585d55210abe</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-p4" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-p4-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">8933ff32b6abba53a59a277a6fe1d484f44925785e7b3c8e039664bbbb434363</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-svn" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>git-svn-1.8.3.1-25.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">a5f04e4b4bff05a932ea2d74eca1779a3b836146a5a7aa321ce0b58e1dc59e5a</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitk" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>gitk-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">ed9a3c99a21465cae4cc57720c7e0d06139a10369fb8f3c0b6e25e74077920bf</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitweb" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>gitweb-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">a2c74533b24001c25f1309b6602c5de8ccd48514f0f4207de715b0cf99ebc2df</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>perl-Git-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">4340af8a2717c3cacb851dc87b6e7311a2a602d64b5713f203c18831ae581d70</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git-SVN" release="25.el7_9.tuxcare.els9" src="git-1.8.3.1-25.el7_9.tuxcare.els9.src.rpm" version="1.8.3.1">
          <filename>perl-Git-SVN-1.8.3.1-25.el7_9.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">3b6d9ac12b31de1f82303349cd79303ef68a18d31ea4bdec387d5c26b7302b4a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1768110920</id>
    <title>kernel: Fix of 16 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- crypto: lzo - Fix compression buffer overrun {CVE-2025-38068}
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}
- NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945}
- tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect(). {CVE-2025-40186}
- can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004}
- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}
- ALSA: usb-audio: Validate UAC3 cluster segment descriptors {CVE-2025-39757}
- ext4: fix undefined behavior in bit shift for ext4_check_flag_values {CVE-2022-50403}
- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322}
- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978}
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too {CVE-2025-38729}
- ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886}
- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}
- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}
- atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}
- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- crypto: lzo - Fix compression buffer overrun {CVE-2025-38068}
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}
- NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945}
- tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect(). {CVE-2025-40186}
- can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004}
- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}
- ALSA: usb-audio: Validate UAC3 cluster segment descriptors {CVE-2025-39757}
- ext4: fix undefined behavior in bit shift for ext4_check_flag_values {CVE-2022-50403}
- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322}
- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978}
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too {CVE-2025-38729}
- ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886}
- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}
- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}
- atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}
- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-20 08:09:39 UTC" />
    <updated date="2026-01-20 08:09:39 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1768110920.html" id="CLSA-2026:1768110920" title="CLSA-2026:1768110920" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">05abe808d400c3f4ea3ecf90b00519d07869787dd5b146d05e7a878d99a02ee1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">dc39790544a64836bc9265d74e7de59911d5875dc3c46a0a8605a0faae9de670</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">830e8c456ce9aeb42219be1034fd77c0ff86825ce62395a417e1e014750bccaa</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">402c6de77adf780956f6b5ad5dc2a090cd9fb5d8209dde7361fb57f8723f4e73</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">282b9b63fc1a30120d5d9091ce2bea63c9189bd3dea95db13b2b1b2a435686ef</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">9d414cdc83f5b03960202b41f9b2af2e918bf525912b46b27533df8d9a5ade28</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">dcf2450a9bb78c92a56e60dadf371dcea172ad2a2744b46392d9d1a671284951</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">091d00b5fd09cad3392ca1ed2ec8674dc23752f14f493cd28ec69e0fa61312e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">943802c1b48bf4444f5070c371b754848454e4879df26b31cf7f845d2471a7a3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">48ce04605d85848d52774e974a01f1e9ff21994acbf0acc81de721ceb3abbeeb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.139.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.139.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">860a2b8fddd8e1c34d9de3a64fa28374db70ac84004e26edca36007920512507</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1763054281</id>
    <title>python: Fix of CVE-2025-8194</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-8194: fix infinite loop and deadlock in TarFile extraction and
  entry enumeration APIs</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-8194: fix infinite loop and deadlock in TarFile extraction and
  entry enumeration APIs</summary>
    <pushcount>0</pushcount>
    <issued date="2025-11-13 17:36:12 UTC" />
    <updated date="2025-11-13 17:36:12 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1763054281.html" id="CLSA-2025:1763054281" title="CLSA-2025:1763054281" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="94.0.1.el7_9.tuxcare.els2" src="python-2.7.5-94.0.1.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-2.7.5-94.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">41acec8ec37053bcebb88091c47611a7e1c76bb768af9e35779a3c2e0bdfa879</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="94.0.1.el7_9.tuxcare.els2" src="python-2.7.5-94.0.1.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-94.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">677a5a48a9958fcdb06946a1571f82fed2d7b69e236cc8c9ac52840ebedf2bcd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="94.0.1.el7_9.tuxcare.els2" src="python-2.7.5-94.0.1.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-94.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">e45e1837dde84aec5a61f68adc359dcc5b633fabc9bc291e4ae7a2cfacf0e23b</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="94.0.1.el7_9.tuxcare.els2" src="python-2.7.5-94.0.1.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">9ec2a69b386492e0c395abe33160a03300ef719d3ce601244769691431b0d7a5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="94.0.1.el7_9.tuxcare.els2" src="python-2.7.5-94.0.1.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">e8d047f0fc47f13bc7db918fbc6de7ca35a3da158321a4b1533ed49e31beebe4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="94.0.1.el7_9.tuxcare.els2" src="python-2.7.5-94.0.1.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-94.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">2e6097568a84916bfd51f95255c8bff9ad39e4fd18bb152e4839a236274142be</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="94.0.1.el7_9.tuxcare.els2" src="python-2.7.5-94.0.1.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-94.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">0c634e31fd858bdc5ccc37104a63b9248a1e4fd1ca9c613f531e8d94ddd31d27</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="94.0.1.el7_9.tuxcare.els2" src="python-2.7.5-94.0.1.el7_9.tuxcare.els2.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-94.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">b066d9a680c3d13468a9fd5d14991294ca33d31253e13095688fdb36d6a915ad</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2025:1766617167</id>
    <title>kernel: Fix of 27 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- xfrm: Duplicate SPI Handling {CVE-2025-39965}
- xfrm: state: use atomic_inc_not_zero to increment refcount
- padata: Fix pd UAF once and for all {CVE-2025-38584}
- padata: Remove broken queue flushing {CVE-2023-52854}
- padata: ensure padata_do_serial() runs on the correct CPU
- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}
- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718}
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}
- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386}
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put {CVE-2022-3640}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}
- ipvs: use explicitly signed chars
- vt: Clear selection before changing the font {CVE-2022-49948}
- fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117}
- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}
- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}
- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}
- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084}
- dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}
- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}
- Bluetooth: hci_core: Fix use-after-free in vhci_flush() {CVE-2025-38250}
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}
- jbd2: remove wrong sb-&gt;s_sequence check {CVE-2025-37839}
- net_sched: hfsc: Fix a UAF vulnerability in class handling
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- xfrm: Duplicate SPI Handling {CVE-2025-39965}
- xfrm: state: use atomic_inc_not_zero to increment refcount
- padata: Fix pd UAF once and for all {CVE-2025-38584}
- padata: Remove broken queue flushing {CVE-2023-52854}
- padata: ensure padata_do_serial() runs on the correct CPU
- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}
- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718}
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}
- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386}
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put {CVE-2022-3640}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}
- ipvs: use explicitly signed chars
- vt: Clear selection before changing the font {CVE-2022-49948}
- fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117}
- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}
- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}
- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}
- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084}
- dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}
- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}
- Bluetooth: hci_core: Fix use-after-free in vhci_flush() {CVE-2025-38250}
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}
- jbd2: remove wrong sb-&gt;s_sequence check {CVE-2025-37839}
- net_sched: hfsc: Fix a UAF vulnerability in class handling
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}</summary>
    <pushcount>0</pushcount>
    <issued date="2025-12-24 22:59:31 UTC" />
    <updated date="2025-12-24 22:59:31 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2025-1766617167.html" id="CLSA-2025:1766617167" title="CLSA-2025:1766617167" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">588dae0dd24ffcc327b99e7e71a05e7fc488b3b32eb18adba9e0f2ac515b55eb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">19ed29f7780385d8cff743ea6cf777d0404f9b43c830b0d293dd54da1ed1e88a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">d23b3136dcdff29b4eec802e3bb57ad0de3c877048963444eb63ef3aa0544322</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">532a0f32af39fd96f44b5c3fb43ce4ece1bcddfdd29a6847fa5b273b7990325a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7cc5ab4ebd870d3607a478a9426762cebc695c348cd77a796216a280c6fea2bd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7b5107ab66d81df943951b6a2c9a6b3a9e937d3491422809fea608cc6122ed62</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">879830865dec6bd1c4b4ba2302942d14dd07c69fdebc9288f777b9b660d05b63</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">9e7249b9fd07c12213672d955f1b2dc37cecf9594deeb3891733334fb5112588</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">365580f43d9ae7abaf453cfb18c596dd512bbba16122d078f69f1df6ab4ab66e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">866c6a0625f4389c28dc8e135c1644202e64d5ed45be416ae649bc1797454369</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.139.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.139.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">8359ef3a61bd22d6f399bbda39e05ae9c459053c6ab4014896a6565396354673</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1768385951</id>
    <title>freerdp: Fix of CVE-2024-32460</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-32460: fix regression due to bug in _aligned_recalloc</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-32460: fix regression due to bug in _aligned_recalloc</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-14 18:45:00 UTC" />
    <updated date="2026-01-14 18:45:00 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1768385951.html" id="CLSA-2026:1768385951" title="CLSA-2026:1768385951" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els5" src="freerdp-2.1.1-5.el7_9.tuxcare.els5.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">4a98344e19ea5462bf94ad9bb68f63aa1099bedf877ceffd3a96d6e91766261f</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els5" src="freerdp-2.1.1-5.el7_9.tuxcare.els5.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">a123654f3d0150e6138a04f02c804204ebcb81a2b534972af8dc044f0da29ea5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els5" src="freerdp-2.1.1-5.el7_9.tuxcare.els5.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">97b1b8e950b6e0e1d6bf8ad8c7c3dd959d6c58a40a4514528077637c41c2d558</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els5" src="freerdp-2.1.1-5.el7_9.tuxcare.els5.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">7b0ced6863fab73ebce6c5f1d88c9523bd055f3fd747972ac82e0ee919a8dee3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els5" src="freerdp-2.1.1-5.el7_9.tuxcare.els5.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">3678abe7e2fe369179c180a8e69b1e680297ae1a1c0861757e7009beb8ad0d82</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els5" src="freerdp-2.1.1-5.el7_9.tuxcare.els5.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">97224c79ac5227137d882ea3ae32ccab7e186efd9142f866d28dac69fb230a64</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els5" src="freerdp-2.1.1-5.el7_9.tuxcare.els5.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">2146b49d3bc3e29adb3f2d4790b380c352045c3b09fca92e6b89a946e7fbb3a2</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els5" src="freerdp-2.1.1-5.el7_9.tuxcare.els5.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">33f3a890ed0b92df5f2e5e9020e2a15c60dcdaad6bdc6b48670dee841f0ee7a1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els5" src="freerdp-2.1.1-5.el7_9.tuxcare.els5.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">2825023935a7c979400d39c885c67ebffeeccc9abb5cb045c31195726c51f978</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1768416342</id>
    <title>squid: Fix of CVE-2023-46846</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- fix regression in CVE-2023-46846 due to strict checks in CRLF parsing</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- fix regression in CVE-2023-46846 due to strict checks in CRLF parsing</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-14 18:45:45 UTC" />
    <updated date="2026-01-14 18:45:45 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1768416342.html" id="CLSA-2026:1768416342" title="CLSA-2026:1768416342" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="7" name="squid" release="17.0.5.el7_9.99.tuxcare.els3" src="squid-3.5.20-17.0.5.el7_9.99.tuxcare.els3.src.rpm" version="3.5.20">
          <filename>squid-3.5.20-17.0.5.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">9209d9ee53e97f893603e763512834c88877bd20f858166184b1478ace8281e9</sum>
        </package>
        <package arch="x86_64" epoch="7" name="squid-migration-script" release="17.0.5.el7_9.99.tuxcare.els3" src="squid-3.5.20-17.0.5.el7_9.99.tuxcare.els3.src.rpm" version="3.5.20">
          <filename>squid-migration-script-3.5.20-17.0.5.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">f1cd12265b4012d7ae5adab97883879ea4f58b80f6fbed0c43f343f3f8cbcd2a</sum>
        </package>
        <package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.0.5.el7_9.99.tuxcare.els3" src="squid-3.5.20-17.0.5.el7_9.99.tuxcare.els3.src.rpm" version="3.5.20">
          <filename>squid-sysvinit-3.5.20-17.0.5.el7_9.99.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">8208951208b6c2b346ce3f57a8c3bfa784e2d9999cb4bb443d09a0a62bb8a0f2</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1768589696</id>
    <title>ImageMagick: Fix of CVE-2025-55160</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-55160: fix function pointer type mismatch in Clone* functions</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-55160: fix function pointer type mismatch in Clone* functions</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-20 12:07:31 UTC" />
    <updated date="2026-01-20 12:07:31 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1768589696.html" id="CLSA-2026:1768589696" title="CLSA-2026:1768589696" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">d8a15cf51b744756720adf3b34737c59013fe3aaed52983ba98f5a8b7adf1c90</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">34ac23b12342c16c1ecad6be1ea2e5b33feeec698da0daf6674b042fae3f64e3</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">c68106aacbb5e733e6fde8eef826f64a281438bf47295319d0cf168473e15a7e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">5f0ff005ffb5061419bda18d628ad6912341f4f8b7416c9a48bc9c2a69e041c4</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">f56a16c2a1039c4c6be3c01a8a703f97dfe725591fbe0cd82f5f3c07b4ed488a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">6694b97ff7d94b87940d8c3b20e11040d23f88715fec4be73b353bd7286d78a2</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">ed66a0ad87a4ce91db3e9d4590a3ae0a428d813f2c35681eeed2e36704a517e1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">917e2a6d49401553ab624dc97ba13555bb0831e3d373a300a38b1d5dc12b7eca</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">a05dd00be1de80d2260d0a7ec636039b680ca3d073a6a5e8aef0b1c8db7cc31b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.0.3.el7_9.tuxcare.els2" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els2.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">fee873d133dc3a728d268487def2fd5c31745e44b052fd542bb997fe14257a0f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1768587600</id>
    <title>git: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-52005: add sideband.allowControlCharacters config which gives
  a possibility to avoid control characters in sideband
- CVE-2024-52006: fix newline confusion in credential helpers that can lead to
  credential exfiltration</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-52005: add sideband.allowControlCharacters config which gives
  a possibility to avoid control characters in sideband
- CVE-2024-52006: fix newline confusion in credential helpers that can lead to
  credential exfiltration</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-20 12:08:21 UTC" />
    <updated date="2026-01-20 12:08:21 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1768587600.html" id="CLSA-2026:1768587600" title="CLSA-2026:1768587600" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="emacs-git" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>emacs-git-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">51baf34ec2c7300f2e4ff195d50470af05f1b93801627eb8c4c26f49ba65300b</sum>
        </package>
        <package arch="noarch" epoch="0" name="emacs-git-el" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>emacs-git-el-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">b855f3240e319e66971d4edb46665a7999629abca065325f41b2157ebe5d8c47</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-1.8.3.1-25.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">4120ecabd4500d48432798e219d68886f4e7c8f7a45acca8b7c3fd1c0ddb4800</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-all" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-all-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">d86c99241587f0554bc9c0be2e1cae6dc50088c9e2febc99868dbde7eb1c2cac</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-bzr" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-bzr-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">1c1943f89204a066bc9307ad4da7d8337072b330e3a353a06efa144cd6802df7</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-cvs" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-cvs-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">d61b98758ddaf491abb10f5bb59ec4fb1579cae564fd6a7d1025336f00202161</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-daemon" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-daemon-1.8.3.1-25.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">af71567452ba60d26258efd21aa67ceeb59b2af09852d53e8ce569b7d8e39105</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-email" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-email-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">bb0deb3be49ac2a16ea48a3fcbdc5c97382e0dd621a1db2054ac677cc70c8b3e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-gnome-keyring" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-gnome-keyring-1.8.3.1-25.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">205318194ca272a82e0526ffb215c4dc7d0f64a858536b27af677cd5886677b8</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-gui" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-gui-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">c3b5a0ef0cd304a0a61801b393970e51dc1206220bc8299024355acec05e9d8a</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-hg" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-hg-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">97c85ea7b2214e2023e1a8e350aee507a10b48acd1705bb4d4e416934fddec91</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-instaweb" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-instaweb-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">b1c9d54d7334336206389c2437ab8156ab82a26118b35480cef6669781eccf59</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-p4" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-p4-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">2819bcc070509129a3d564970272b2fe9e999c20bc2eaa79f3d3f41ac04f9a5d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-svn" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>git-svn-1.8.3.1-25.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">868d4aa2013bfe1c12f64f68ed343498455fa8a68fa8b6f7a71a9f22ad28b04b</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitk" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>gitk-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">11c7f9aa05c40062e82b206cefe2eac1409231c7904a6f3936c299b8d2c16dc7</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitweb" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>gitweb-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">de70b303dff9fad9285b795fa4b91fb12562b5cd5b35c9cdac97d34f8aaa0dec</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>perl-Git-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">0d14337825dfba62653523707ccff15d39afa11a6ea050d5958fdaca0251d70c</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git-SVN" release="25.el7_9.tuxcare.els7" src="git-1.8.3.1-25.el7_9.tuxcare.els7.src.rpm" version="1.8.3.1">
          <filename>perl-Git-SVN-1.8.3.1-25.el7_9.tuxcare.els7.noarch.rpm</filename>
          <sum type="sha256">7bc310c7e4d6175620c808117179dca5dec88fe001b680aa2bcea0911055b148</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1768895798</id>
    <title>kernel: Fix of 7 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- fs/proc: fix uaf in proc_readdir_de() {CVE-2025-40271}
- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978}
- Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp {CVE-2023-53297}
- net: sched: sfb: fix null pointer access issue when sfb_init() fails {CVE-2022-50356}
- ALSA: usb-audio: Fix size validation in convert_chmap_v3()
- nfsd: don't ignore the return code of svc_proc_register() {CVE-2025-22026}
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull {CVE-2023-53104}
- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
- HID: stop exporting hid_snto32()
- HID: simplify snto32()
- HID: core: fix shift-out-of-bounds in hid_report_raw_event {CVE-2022-48978}
- HID: core: detect and skip invalid inputs to snto32()
- HID: core: don't use negative operands when shift</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- fs/proc: fix uaf in proc_readdir_de() {CVE-2025-40271}
- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978}
- Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp {CVE-2023-53297}
- net: sched: sfb: fix null pointer access issue when sfb_init() fails {CVE-2022-50356}
- ALSA: usb-audio: Fix size validation in convert_chmap_v3()
- nfsd: don't ignore the return code of svc_proc_register() {CVE-2025-22026}
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull {CVE-2023-53104}
- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
- HID: stop exporting hid_snto32()
- HID: simplify snto32()
- HID: core: fix shift-out-of-bounds in hid_report_raw_event {CVE-2022-48978}
- HID: core: detect and skip invalid inputs to snto32()
- HID: core: don't use negative operands when shift</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-20 12:09:21 UTC" />
    <updated date="2026-01-20 12:09:21 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1768895798.html" id="CLSA-2026:1768895798" title="CLSA-2026:1768895798" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">9524b4dda1276df6513a6b6579a82d16416179874e785c9a0156377fdf1cd95d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">0375efc337cea15314680179d5da36331e6b8fa5b118c84de73ad850eb7ba8ce</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ded936b6cfb5cf6ff3f7ce5be05bb108d07fc1447f83c8ce37aae9abe415e708</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7ba3370b6d52647cdebf9b06cd956ebcc9f3068ec60f0571c13eef0b571b1862</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">29fca2888fe379932eb6855ab1f81b218ce2240366082e26d186a80ae2a46e1d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">9be4701f62fac5ae86a8afccdab5fb7443870ce9b8f5ba0f15cf1e4d08b6d828</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">12d628d936a26c713adb3375f2e3925ed43b33c8b0c6cbf5eaea442292dc3309</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1537129a72daf623eb832c5b41ece66671a4024cc82e91b71c5c6a48cd21a63e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">202baa197e68ef1f527f101c9843edfa1fd0a93e1b76f07323b7b499a5a39bcf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">027a9cc94fd8c225b21e36641365d606fc16cd48c24a44a0476715a530abf148</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.142.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.142.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.142.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">879a07538950c79b823547744f3e0fe2491a92092959e4ae0c7e1aacb8c02e29</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1768917823</id>
    <title>git: Fix of CVE-2024-32021</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-32021: fix symlink bypass, abort when hardlinked source and target file differ</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-32021: fix symlink bypass, abort when hardlinked source and target file differ</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-20 20:39:35 UTC" />
    <updated date="2026-01-20 20:39:35 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1768917823.html" id="CLSA-2026:1768917823" title="CLSA-2026:1768917823" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="emacs-git" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>emacs-git-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">832841ace37cba925dcf7ba96ef683a63bcebf47208cf779b9d29775f00d59fd</sum>
        </package>
        <package arch="noarch" epoch="0" name="emacs-git-el" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>emacs-git-el-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">b5733201ec8d3fc29f3236b78319e5c0919f2f1f415bb1337c4481b1cf3d1cff</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-1.8.3.1-25.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">358d2469b37391240950319e13030805e2e335d8d075648262472f5ec7cd8055</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-all" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-all-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">480a19f2d9f5923f027ba83b48abb58d897765a07063d2e4f24903919627e3ae</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-bzr" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-bzr-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">dbd49e34d4b73cc707d2846beae7264d4f0e4d8e54586ab30654f8a727da872a</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-cvs" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-cvs-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">16e79a737e23c67eaa5e989651f1b195b41794be8b015d0849cd15abe8d716f2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-daemon" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-daemon-1.8.3.1-25.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">6b1c14ce137001e7f19bcb35ca7ea4fbc0bc85915dc34f9f523ad4a4cc3fc6df</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-email" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-email-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">1208dc912b5b351ee7caa4526fbd6ead80544837b48187ba1881bf6c36000241</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-gnome-keyring" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-gnome-keyring-1.8.3.1-25.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">968f11452d221ae1b6eb7309f85cc4d49b941ef86cef568d5ead358e6bf5a9e5</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-gui" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-gui-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">7c2b40412d5517f5d418838f32dd78c4775b674ad904b45d3a4d6035aea2eafe</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-hg" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-hg-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">6abb6d16731947d31fc6cea1f358d51c6d9fc426662159d19a47d9622137dd25</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-instaweb" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-instaweb-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">e708d8419057032442514fe6bc3080a9cc0d1ca46ad9751a0b8cfaa7676f7d38</sum>
        </package>
        <package arch="noarch" epoch="0" name="git-p4" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-p4-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">6cf5daca4b49666c1d51832fbf7aaa384f06140a0a161db75e01324ca5dd3568</sum>
        </package>
        <package arch="x86_64" epoch="0" name="git-svn" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>git-svn-1.8.3.1-25.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">90f534b98e605e5cbab5bbd6691c30e4e7dc49fa663b73c15f80c2a2d531f60c</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitk" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>gitk-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">d23427be140f7d026ef5934b299e6217dceef4bec0b48481bd7f549358368541</sum>
        </package>
        <package arch="noarch" epoch="0" name="gitweb" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>gitweb-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">5aa654f4a6421cf2451e726495a9f7ef29d7045eecd6671cbdcb24a8e16c5bb2</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>perl-Git-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">4005413efeaaf41091cc20abf67b3bbc47ceef4172e3b0c619c04d03d0d91958</sum>
        </package>
        <package arch="noarch" epoch="0" name="perl-Git-SVN" release="25.el7_9.tuxcare.els8" src="git-1.8.3.1-25.el7_9.tuxcare.els8.src.rpm" version="1.8.3.1">
          <filename>perl-Git-SVN-1.8.3.1-25.el7_9.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">1cd854adc49a8a0898727e479f786fcb2c07714abd65e308769d02973df195cd</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1768911013</id>
    <title>libpng: Fix of CVE-2025-64720</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-64720: fix buffer overflow in png_init_read_transformations function
  during palette compositing with optimized alpha</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-64720: fix buffer overflow in png_init_read_transformations function
  during palette compositing with optimized alpha</summary>
    <pushcount>0</pushcount>
    <issued date="2026-01-20 20:40:36 UTC" />
    <updated date="2026-01-20 20:40:36 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1768911013.html" id="CLSA-2026:1768911013" title="CLSA-2026:1768911013" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="2" name="libpng" release="8.el7.tuxcare.els2" src="libpng-1.5.13-8.el7.tuxcare.els2.src.rpm" version="1.5.13">
          <filename>libpng-1.5.13-8.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">5c72a9058b0c9dbbb1b92291a99923e96e8acdfafaf23846f16bcc44c76001b1</sum>
        </package>
        <package arch="x86_64" epoch="2" name="libpng" release="8.el7.tuxcare.els2" src="libpng-1.5.13-8.el7.tuxcare.els2.src.rpm" version="1.5.13">
          <filename>libpng-1.5.13-8.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">6d4b24d502cf59f308b2011ddd9aec5da1a2427bba3f8bfb91fb5346c6576fc3</sum>
        </package>
        <package arch="i686" epoch="2" name="libpng-devel" release="8.el7.tuxcare.els2" src="libpng-1.5.13-8.el7.tuxcare.els2.src.rpm" version="1.5.13">
          <filename>libpng-devel-1.5.13-8.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">4ca09a5573998dd46c4d7c23e5306ebdde7e150249e4913ddc53018716660849</sum>
        </package>
        <package arch="x86_64" epoch="2" name="libpng-devel" release="8.el7.tuxcare.els2" src="libpng-1.5.13-8.el7.tuxcare.els2.src.rpm" version="1.5.13">
          <filename>libpng-devel-1.5.13-8.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">7519f436b188d5355fa8762bc5555fe52797cc212c4449ccfdc97b8d95557e28</sum>
        </package>
        <package arch="i686" epoch="2" name="libpng-static" release="8.el7.tuxcare.els2" src="libpng-1.5.13-8.el7.tuxcare.els2.src.rpm" version="1.5.13">
          <filename>libpng-static-1.5.13-8.el7.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">d6cb6089578dd484b8cfac29dec1f4dce0ede2e863996b695311ef1ecb17c864</sum>
        </package>
        <package arch="x86_64" epoch="2" name="libpng-static" release="8.el7.tuxcare.els2" src="libpng-1.5.13-8.el7.tuxcare.els2.src.rpm" version="1.5.13">
          <filename>libpng-static-1.5.13-8.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">362c5e2c70583738019095e21ac23b3c20f1c9b50c852a38341e36023e57f3c2</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1770040438</id>
    <title>kernel: Fix of 14 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare {CVE-2025-39817}
- scsi: ses: Fix possible desc_ptr out-of-bounds accesses {CVE-2023-53675}
- ipv6: Fix out-of-bounds access in ipv6_find_tlv() {CVE-2023-53705}
- libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285}
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write {CVE-2023-53282}
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419}
- firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432}
- net: openvswitch: fix nested key length validation in the set() action
- wifi: mac80211_hwsim: drop short frames {CVE-2023-53321}
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422}
- fix: crypto: lzo - Fix compression buffer overrun
- fix: NFSD: Protect against send buffer overflow in NFSv2 READ
- cifs: fix oops during encryption {CVE-2022-50341}
- SMB3: Kernel oops mounting a encryptData share with CONFIG_DEBUG_VIRTUAL
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y
- Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp {CVE-2023-53297}
- iomap: iomap: fix memory corruption when recording errors during writeback {CVE-2022-50406}
- mm: zswap: fix missing folio cleanup in writeback race path {CVE-2024-26832}
- mm: fix zswap writeback race condition
- Bluetooth: prefetch channel before killing sock
- Bluetooth: Fix l2cap_disconnect_req deadlock
- Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} {CVE-2023-53827}
- Bluetooth: Fix refcount use-after-free issue
- Bluetooth: Check state in l2cap_disconnect_rsp
- Bluetooth: L2CAP: Fix build errors in some archs
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression
- Bluetooth: use the correct print format for L2CAP debug statements
- i40e: fix Jumbo Frame support after iPXE boot
- i40e: Report MFS in decimal base instead of hex
- i40e: Fix unexpected MFS warning message
- i40e: Add a check to see if MFS is set
- bitops: Add non-atomic bitops for pointers
- bitfield: Add FIELD_MODIFY() helper</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare {CVE-2025-39817}
- scsi: ses: Fix possible desc_ptr out-of-bounds accesses {CVE-2023-53675}
- ipv6: Fix out-of-bounds access in ipv6_find_tlv() {CVE-2023-53705}
- libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285}
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write {CVE-2023-53282}
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419}
- firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432}
- net: openvswitch: fix nested key length validation in the set() action
- wifi: mac80211_hwsim: drop short frames {CVE-2023-53321}
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422}
- fix: crypto: lzo - Fix compression buffer overrun
- fix: NFSD: Protect against send buffer overflow in NFSv2 READ
- cifs: fix oops during encryption {CVE-2022-50341}
- SMB3: Kernel oops mounting a encryptData share with CONFIG_DEBUG_VIRTUAL
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y
- Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp {CVE-2023-53297}
- iomap: iomap: fix memory corruption when recording errors during writeback {CVE-2022-50406}
- mm: zswap: fix missing folio cleanup in writeback race path {CVE-2024-26832}
- mm: fix zswap writeback race condition
- Bluetooth: prefetch channel before killing sock
- Bluetooth: Fix l2cap_disconnect_req deadlock
- Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} {CVE-2023-53827}
- Bluetooth: Fix refcount use-after-free issue
- Bluetooth: Check state in l2cap_disconnect_rsp
- Bluetooth: L2CAP: Fix build errors in some archs
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression
- Bluetooth: use the correct print format for L2CAP debug statements
- i40e: fix Jumbo Frame support after iPXE boot
- i40e: Report MFS in decimal base instead of hex
- i40e: Fix unexpected MFS warning message
- i40e: Add a check to see if MFS is set
- bitops: Add non-atomic bitops for pointers
- bitfield: Add FIELD_MODIFY() helper</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-02 13:54:02 UTC" />
    <updated date="2026-02-02 13:54:02 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1770040438.html" id="CLSA-2026:1770040438" title="CLSA-2026:1770040438" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c396268791e8d1740ec5a1eddd9c5b6b975010d503903a20986ba27ab200bc1b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">db71d155e623ef593813b50b00f8e65cc173ce87933e8de66db2a1e9ab0d06dd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">64bedc8fa8348c906c5ada954a13ae7ec68ba05c09de2d1da90bbc1050500b79</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">078efc300e93914129f8fe7cb5f62c2ee6d29723529c3f8ef14e9364cf303b63</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a5663460baa853188a8dfc28dc5907fa1f8c691e64d1904b88dfe3d0ac844088</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">ffa525d3caa0379903371f0f890e58b5e9cf059a5993910050bfbdce4f2a9f8b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">cb6c919d7baf0132a2ab98e66ecd5f4f6517f5e63766fced08b1da4b16ccf5bb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">4df82273b2167a562e75650ee57f88c951c757ca99f15186e24c15b427032340</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">8902e340477e1a4e4341bba32e93e39dd13c64709376a3fc168dec483462960b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">939b74d976fd8f522df15eb6b8f6a42dbd6c607caf4b93e5b39b287b9ab6f976</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.144.1.el7.tuxcare.els1" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els1.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.144.1.el7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f4d08bd0eddec515dbed3c2827f0b8ebafaac92972df4ff232efcad54e8d3e8d</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1769687040</id>
    <title>libsoup: Fix of CVE-2025-14523</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-14523: reject duplicate Host headers to prevent request smuggling,
  cache poisoning, and host-based access control bypass attacks</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-14523: reject duplicate Host headers to prevent request smuggling,
  cache poisoning, and host-based access control bypass attacks</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-03 11:45:32 UTC" />
    <updated date="2026-02-03 11:45:32 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1769687040.html" id="CLSA-2026:1769687040" title="CLSA-2026:1769687040" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libsoup" release="2.0.5.el7.tuxcare.els3" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els3.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.5.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">9ce6616944336f577559a807dc878a520545fc0027108b868649d3656f0649ad</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup" release="2.0.5.el7.tuxcare.els3" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els3.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.5.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">62372f566dcfe3a9153ab154961e711f6071a7b0a3b7a4d20c19fd498ac22394</sum>
        </package>
        <package arch="i686" epoch="0" name="libsoup-devel" release="2.0.5.el7.tuxcare.els3" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els3.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.5.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">0421985b48415068299c417da8c5793743ce18c9d9bdd7033418f2a6c3c78587</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup-devel" release="2.0.5.el7.tuxcare.els3" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els3.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.5.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">bc6d8b7da17a5376a81b497fdbc51b9cbea2a0080948ff9d4c40008c2617200a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1770119166</id>
    <title>java-1.8.0-openjdk: Fix of CVE-2026-21945</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update to openjdk-shenandoah-jdk8u-shenandoah-jdk8u482-b03.
- CVE-2026-21945: Security component vulnerability allowing unauthenticated
  attacker with network access to cause hang or crash (DoS).</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update to openjdk-shenandoah-jdk8u-shenandoah-jdk8u482-b03.
- CVE-2026-21945: Security component vulnerability allowing unauthenticated
  attacker with network access to cause hang or crash (DoS).</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-03 11:46:10 UTC" />
    <updated date="2026-02-03 11:46:10 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1770119166.html" id="CLSA-2026:1770119166" title="CLSA-2026:1770119166" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">0462767a19f98d51af4a071729a4688f9a252e47e2429cb23c6518a612cde7bd</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">d8b3cee6794473ed0032662d9946531bd3e711e47743ed3b3e8778285abc4c5b</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.482.b03-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">bd70641c4443f5c759ce200abbae875f50a8627e1557dba281aaec3f8f9b9bdc</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">6aacc295e5fdcedada50cd8c6b1ba43c22f3db002353b79ce5480982034ccaaf</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">62149f3714f2ffeac36ca92c1e9e5109b6ac949424b79f4893607c87a8b6f215</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-debug-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">3ee5543920683e303376d8f7e0adc8d88d4b0d4779f2306b07ea55eed5241f2c</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-demo-1.8.0.482.b03-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">28890419fbd6e973682a349c475ad13463ddf41e6ad78be4c52c01abb28cd631</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-demo-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">73f60d088c6b865ea6b4ab61a83c16da8f8515a20a0f42c25439b2651806d831</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-demo-debug-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">68e2f4d650bf677c99f54eac6f8429c30d765aa62208be29b6bb3e78caf5913f</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-devel-1.8.0.482.b03-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">2a69f886e085ceb9a88d75649e59c1998bc5b0750cc427df60d04ed8cdc7d322</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-devel-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">e32a77b5c8ebdea124ec8efb63ad43a1193a17eec0bb71723a5c3d9a15d007c4</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-devel-debug-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">bb33c48ee57a5bc1da4595badfb90aadee1c474e8bd448aa51fe93dc1c666ca8</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-headless-1.8.0.482.b03-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">bdeb0d2e0992f9610fc83b0e2b6a685d1da68816d2932b6a58b2ac7780d8db01</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-headless-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">eb1ee0cddab0ec91220bb2971ab38cc05270f406804fb1ab7a7f3b62828d0d48</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-headless-debug-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">2af779bebbda251f26ea809efd2bbf4539ddbe019844c502fd6064562e5a0c94</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-javadoc-1.8.0.482.b03-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">6d028723d1440e3d06710fa6394e859a59d18e878fbb97e7f62a5a6518f35604</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.482.b03-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">4f94f5ecf7c353b8f3d045fcd1a4669c8cbfe50d508949d7b7719fa320ef073c</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b03-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">64ff1607fec5be1a0294d417202c3e2eb14c89993c5d1c097d74b836c1314f76</sum>
        </package>
        <package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.482.b03-1.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">315ae372bf9ce54564583490e8be6e88f4080bbf345fbb38752ef6ea3eef9efc</sum>
        </package>
        <package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-src-1.8.0.482.b03-1.el7_9.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">0f24279bfbdd164759316be09331b9ef3232056b7972fd4b334931eb8bd7b98e</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-src-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">5d74c2ba677defd3892389eed2a728736eaea5d156005ca40283924429c5e6ad</sum>
        </package>
        <package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9.tuxcare.els1" src="java-1.8.0-openjdk-1.8.0.482.b03-1.el7_9.tuxcare.els1.src.rpm" version="1.8.0.482.b03">
          <filename>java-1.8.0-openjdk-src-debug-1.8.0.482.b03-1.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">57d534a11c12892f40205a1acc8963f5ae172af9f6d0c3f7bd9e8fb6ff10d6a0</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1769774083</id>
    <title>net-snmp: Fix of CVE-2025-68615</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-68615: Fix buffer overflow issue in snmptrapd daemon to prevent
  crashes</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-68615: Fix buffer overflow issue in snmptrapd daemon to prevent
  crashes</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-03 11:47:22 UTC" />
    <updated date="2026-02-03 11:47:22 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1769774083.html" id="CLSA-2026:1769774083" title="CLSA-2026:1769774083" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="net-snmp" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">52b6cad18f30f9df55f118b743f9156aa728e9af58f976bfc3632a18602a1dc3</sum>
        </package>
        <package arch="i686" epoch="1" name="net-snmp-agent-libs" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-agent-libs-5.7.2-49.0.1.el7_9.4.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">361449e015574e71a4cd92b7cef26b40cb5b02d226e33971ef7883f761c8ee23</sum>
        </package>
        <package arch="x86_64" epoch="1" name="net-snmp-agent-libs" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-agent-libs-5.7.2-49.0.1.el7_9.4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">9365089971f490c9ef2f1b12c7c54f93a48e832453c7387950785e729cee3ba4</sum>
        </package>
        <package arch="i686" epoch="1" name="net-snmp-devel" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-devel-5.7.2-49.0.1.el7_9.4.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">f157868e767b906657a7ac4ea1056c7400993d5536af812272eb11157fd2aa26</sum>
        </package>
        <package arch="x86_64" epoch="1" name="net-snmp-devel" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-devel-5.7.2-49.0.1.el7_9.4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">a0190af4ab0e98ee22a29317f3b25a30ca1c30c24e0658c74575c734a3ae2502</sum>
        </package>
        <package arch="x86_64" epoch="1" name="net-snmp-gui" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-gui-5.7.2-49.0.1.el7_9.4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">dd25922371b16cb6bb639093fa842867888903fd1fd1433e9b25085031849f6b</sum>
        </package>
        <package arch="i686" epoch="1" name="net-snmp-libs" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-libs-5.7.2-49.0.1.el7_9.4.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">99b19c9595bfcdebd1af4744129efb41dae6c67edf6e2ab4494d226a78ef0181</sum>
        </package>
        <package arch="x86_64" epoch="1" name="net-snmp-libs" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-libs-5.7.2-49.0.1.el7_9.4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c0191fa3c25152dad27233c6e278b450ec7e34ba0a4c34e405a6359daf96f401</sum>
        </package>
        <package arch="x86_64" epoch="1" name="net-snmp-perl" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-perl-5.7.2-49.0.1.el7_9.4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f9e21142160cd38b75d739603de9c53d18b3db5a3b8a2f707250e5ff3f4cfa22</sum>
        </package>
        <package arch="x86_64" epoch="1" name="net-snmp-python" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-python-5.7.2-49.0.1.el7_9.4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">88293c45acfcee9d2013212fa5865f7d464e4304e66dfb549838009010ac6eb6</sum>
        </package>
        <package arch="x86_64" epoch="1" name="net-snmp-sysvinit" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-sysvinit-5.7.2-49.0.1.el7_9.4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">404470f3b7af16e5fff56e0f8b1086d8b9be398b059da193bbd4c4413ae48812</sum>
        </package>
        <package arch="x86_64" epoch="1" name="net-snmp-utils" release="49.0.1.el7_9.4.tuxcare.els1" src="net-snmp-5.7.2-49.0.1.el7_9.4.tuxcare.els1.src.rpm" version="5.7.2">
          <filename>net-snmp-utils-5.7.2-49.0.1.el7_9.4.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">f2f05aefe8fc6ab6c6828ee4d344d5ac608f5d2ab70ead66ec01858384c81149</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2026:1770373628</id>
    <title>Update of microcode_ctl</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Update Intel CPU microcode to 20251111:
  - Addition of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000410;
  - Addition of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000650;
  - Addition of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x3d;
  - Addition of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x43a;
  - Addition of cpuid:A06E1/0x97 microcode (in microcode.dat) at revision
    0x1000273;
  - Addition of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x132;
  - Addition of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x6133;
  - Addition of cpuid:C0662/0x82 (ARL-HX 8P/S B0) microcode (in microcode.dat)
    at revision 0x11a;
  - Addition of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x210002c0;
  - Removal of cpuid:50656/0xbf (CLX-SP B0) microcode (in microcode.dat) at
    revision 0x4003605;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000401;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000643;
  - Removal of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x3a;
  - Removal of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x437;
  - Removal of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x12f;
  - Removal of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4129;
  - Removal of cpuid:C0662/0x82 (ARL-HX 8P/S B0) microcode (in microcode.dat)
    at revision 0x119;
  - Removal of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) at
    revision 0x21000291;
  - Removal of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x21000291;
  - Removal of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x210002b3;
  - Update of cpuid:806F4/0x10 microcode (in microcode.dat) from revision
    0x2c000401 up to 0x2c000410;
  - Update of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) from
    revision 0x2b000643 up to 0x2b000650;
  - Update of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) from
    revision 0x2c000401 up to 0x2c000410;
  - Update of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) from
    revision 0x2b000643 up to 0x2b000650;
  - Update of cpuid:806F6/0x10 microcode (in microcode.dat) from revision
    0x2c000401 up to 0x2c000410;
  - Update of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) from
    revision 0x2b000643 up to 0x2b000650;
  - Update of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) from
    revision 0x2b000643 up to 0x2b000650;
  - Update of cpuid:90675/0x07 (ADL-S 6+0 K0) microcode (in microcode.dat) from
    revision 0x3a up to 0x3d;
  - Update of cpuid:906A4/0x40 (AZB A0) microcode (in microcode.dat) from
    revision 0xa up to 0xb;
  - Update of cpuid:906A4/0x80 (ADL-P 2+8 R0) microcode (in microcode.dat) from
    revision 0x437 up to 0x43a;
  - Update of cpuid:A06D1/0x20 (GNR-AP/SP H0) microcode (in microcode.dat) from
    revision 0xa000100 up to 0xa000124;
  - Update of cpuid:A06D1/0x95 (GNR-AP/SP B0) microcode (in microcode.dat) from
    revision 0x10003d0 up to 0x10003f0;
  - Update of cpuid:A06F3/0x01 (SRF-SP C0) microcode (in microcode.dat) from
    revision 0x3000362 up to 0x3000382;
  - Update of cpuid:B0674/0x32 microcode (in microcode.dat) from revision 0x12f
    up to 0x132;
  - Update of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) from
    revision 0x4129 up to 0x6133;
  - Update of cpuid:B06A8/0xe0 microcode (in microcode.dat) from revision
    0x4129 up to 0x6133;
  - Update of cpuid:B06D1/0x80 (LNL B0) microcode (in microcode.dat) from
    revision 0x123 up to 0x125;
  - Update of cpuid:B06E0/0x19 (ADL-N A0) microcode (in microcode.dat) from
    revision 0x1d up to 0x1e;
  - Update of cpuid:B06F2/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x3a up to 0x3d;
  - Update of cpuid:B06F5/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x3a up to 0x3d;
  - Update of cpuid:B06F6/0x07 microcode (in microcode.dat) from revision 0x3a
    up to 0x3d;
  - Update of cpuid:B06F7/0x07 microcode (in microcode.dat) from revision 0x3a
    up to 0x3d;
  - Update of cpuid:C0652/0x82 (ARL-H A1) microcode (in microcode.dat) from
    revision 0x119 up to 0x11a;
  - Update of cpuid:C0664/0x82 microcode (in microcode.dat) from revision 0x119
    up to 0x11a;
  - Update of cpuid:C06A2/0x82 microcode (in microcode.dat) from revision 0x119
    up to 0x11a;
  - Update of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) from
    revision 0x210002b3 up to 0x210002c0;</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Update Intel CPU microcode to 20251111:
  - Addition of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000410;
  - Addition of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000650;
  - Addition of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x3d;
  - Addition of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x43a;
  - Addition of cpuid:A06E1/0x97 microcode (in microcode.dat) at revision
    0x1000273;
  - Addition of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x132;
  - Addition of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x6133;
  - Addition of cpuid:C0662/0x82 (ARL-HX 8P/S B0) microcode (in microcode.dat)
    at revision 0x11a;
  - Addition of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x210002c0;
  - Removal of cpuid:50656/0xbf (CLX-SP B0) microcode (in microcode.dat) at
    revision 0x4003605;
  - Removal of cpuid:806F8/0x10 (SPR-HBM B3) microcode (in microcode.dat) at
    revision 0x2c000401;
  - Removal of cpuid:806F8/0x87 (SPR-SP E5/S3) microcode (in microcode.dat) at
    revision 0x2b000643;
  - Removal of cpuid:90672/0x07 (ADL-HX/S 8+8 C0) microcode (in microcode.dat)
    at revision 0x3a;
  - Removal of cpuid:906A3/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
    microcode.dat) at revision 0x437;
  - Removal of cpuid:B0671/0x32 (RPL-S B0) microcode (in microcode.dat) at
    revision 0x12f;
  - Removal of cpuid:B06A2/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
    microcode.dat) at revision 0x4129;
  - Removal of cpuid:C0662/0x82 (ARL-HX 8P/S B0) microcode (in microcode.dat)
    at revision 0x119;
  - Removal of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) at
    revision 0x21000291;
  - Removal of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x21000291;
  - Removal of cpuid:C06F2/0x87 (EMR-SP A1) microcode (in microcode.dat) at
    revision 0x210002b3;
  - Update of cpuid:806F4/0x10 microcode (in microcode.dat) from revision
    0x2c000401 up to 0x2c000410;
  - Update of cpuid:806F4/0x87 (SPR-SP E0/S1) microcode (in microcode.dat) from
    revision 0x2b000643 up to 0x2b000650;
  - Update of cpuid:806F5/0x10 (SPR-HBM B1) microcode (in microcode.dat) from
    revision 0x2c000401 up to 0x2c000410;
  - Update of cpuid:806F5/0x87 (SPR-SP E2) microcode (in microcode.dat) from
    revision 0x2b000643 up to 0x2b000650;
  - Update of cpuid:806F6/0x10 microcode (in microcode.dat) from revision
    0x2c000401 up to 0x2c000410;
  - Update of cpuid:806F6/0x87 (SPR-SP E3) microcode (in microcode.dat) from
    revision 0x2b000643 up to 0x2b000650;
  - Update of cpuid:806F7/0x87 (SPR-SP E4/S2) microcode (in microcode.dat) from
    revision 0x2b000643 up to 0x2b000650;
  - Update of cpuid:90675/0x07 (ADL-S 6+0 K0) microcode (in microcode.dat) from
    revision 0x3a up to 0x3d;
  - Update of cpuid:906A4/0x40 (AZB A0) microcode (in microcode.dat) from
    revision 0xa up to 0xb;
  - Update of cpuid:906A4/0x80 (ADL-P 2+8 R0) microcode (in microcode.dat) from
    revision 0x437 up to 0x43a;
  - Update of cpuid:A06D1/0x20 (GNR-AP/SP H0) microcode (in microcode.dat) from
    revision 0xa000100 up to 0xa000124;
  - Update of cpuid:A06D1/0x95 (GNR-AP/SP B0) microcode (in microcode.dat) from
    revision 0x10003d0 up to 0x10003f0;
  - Update of cpuid:A06F3/0x01 (SRF-SP C0) microcode (in microcode.dat) from
    revision 0x3000362 up to 0x3000382;
  - Update of cpuid:B0674/0x32 microcode (in microcode.dat) from revision 0x12f
    up to 0x132;
  - Update of cpuid:B06A3/0xe0 (RPL-U 2+8 Q0) microcode (in microcode.dat) from
    revision 0x4129 up to 0x6133;
  - Update of cpuid:B06A8/0xe0 microcode (in microcode.dat) from revision
    0x4129 up to 0x6133;
  - Update of cpuid:B06D1/0x80 (LNL B0) microcode (in microcode.dat) from
    revision 0x123 up to 0x125;
  - Update of cpuid:B06E0/0x19 (ADL-N A0) microcode (in microcode.dat) from
    revision 0x1d up to 0x1e;
  - Update of cpuid:B06F2/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x3a up to 0x3d;
  - Update of cpuid:B06F5/0x07 (ADL C0) microcode (in microcode.dat) from
    revision 0x3a up to 0x3d;
  - Update of cpuid:B06F6/0x07 microcode (in microcode.dat) from revision 0x3a
    up to 0x3d;
  - Update of cpuid:B06F7/0x07 microcode (in microcode.dat) from revision 0x3a
    up to 0x3d;
  - Update of cpuid:C0652/0x82 (ARL-H A1) microcode (in microcode.dat) from
    revision 0x119 up to 0x11a;
  - Update of cpuid:C0664/0x82 microcode (in microcode.dat) from revision 0x119
    up to 0x11a;
  - Update of cpuid:C06A2/0x82 microcode (in microcode.dat) from revision 0x119
    up to 0x11a;
  - Update of cpuid:C06F1/0x87 (EMR-SP A0) microcode (in microcode.dat) from
    revision 0x210002b3 up to 0x210002c0;</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-06 15:42:46 UTC" />
    <updated date="2026-02-06 15:42:46 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1770373628.html" id="CLSA-2026:1770373628" title="CLSA-2026:1770373628" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="microcode_ctl" release="73.26.el7_9.tuxcare.els1" src="microcode_ctl-2.1-73.26.el7_9.tuxcare.els1.src.rpm" version="2.1">
          <filename>microcode_ctl-2.1-73.26.el7_9.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c7889e7ecfbc3d344ff43b8c31d6bfc443d5c6609abad85ada59cb7694d5c487</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1770392599</id>
    <title>glib2: Fix of CVE-2025-13601</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-13601: Fix heap-based buffer overflow by correcting buffer size
  calculation in g_escape_uri_string() function</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-13601: Fix heap-based buffer overflow by correcting buffer size
  calculation in g_escape_uri_string() function</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-06 15:43:23 UTC" />
    <updated date="2026-02-06 15:43:23 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1770392599.html" id="CLSA-2026:1770392599" title="CLSA-2026:1770392599" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="glib2" release="9.el7_9.tuxcare.els4" src="glib2-2.56.1-9.el7_9.tuxcare.els4.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">1cf8480fd5deed36d4b76bebcc783433eeb53def3334eb1d7be111b1ee9a92f8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2" release="9.el7_9.tuxcare.els4" src="glib2-2.56.1-9.el7_9.tuxcare.els4.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">4bbecbc458ea5eefcb5768f1a8ddbc58f776a721110e108f1f6601d884150054</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els4" src="glib2-2.56.1-9.el7_9.tuxcare.els4.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">f2d2aa0438b0e7f3bacfd88b80ddc312ad7fef19558e471cda53ffd252cfea65</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els4" src="glib2-2.56.1-9.el7_9.tuxcare.els4.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">2931270484a436709967a77534ec6e2b02150f18f5c2da7f31a79611fe657764</sum>
        </package>
        <package arch="noarch" epoch="0" name="glib2-doc" release="9.el7_9.tuxcare.els4" src="glib2-2.56.1-9.el7_9.tuxcare.els4.src.rpm" version="2.56.1">
          <filename>glib2-doc-2.56.1-9.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">30aa463dd9449d207e3ebd75a4aaeba8e86ab85a6d99f4319ad36486165b55c4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-fam" release="9.el7_9.tuxcare.els4" src="glib2-2.56.1-9.el7_9.tuxcare.els4.src.rpm" version="2.56.1">
          <filename>glib2-fam-2.56.1-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a779c41b47b5cde7574ddf6a7b970514553043c6650f9c722a337fcde01d57c8</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els4" src="glib2-2.56.1-9.el7_9.tuxcare.els4.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">17429b7bac1a77cc3ff568b39730a003ceaf8bca9f4f57130d511511eabba7f5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els4" src="glib2-2.56.1-9.el7_9.tuxcare.els4.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">7844a153620cd9d541c0e005fb7c62b799da2dee25051872f136aaa90ce8c22e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-tests" release="9.el7_9.tuxcare.els4" src="glib2-2.56.1-9.el7_9.tuxcare.els4.src.rpm" version="2.56.1">
          <filename>glib2-tests-2.56.1-9.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">355f31ffa7d5c0605e3d8ca4604292eee6750b4f701135791509d2f3d485323a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1770735514</id>
    <title>expat: Fix of CVE-2026-24515</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-24515: Fix a null pointer dereference in the XML parser caused by the
  failure to copy user data for unknown encoding handlers</description>
    <severity>Low</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-24515: Fix a null pointer dereference in the XML parser caused by the
  failure to copy user data for unknown encoding handlers</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-13 19:27:31 UTC" />
    <updated date="2026-02-13 19:27:31 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1770735514.html" id="CLSA-2026:1770735514" title="CLSA-2026:1770735514" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="expat" release="15.0.1.el7_9.tuxcare.els2" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-2.1.0-15.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">39336f2f380d062a5adc4a8aaba3676d3399d20ba96b410c93886a964e25d621</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat" release="15.0.1.el7_9.tuxcare.els2" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-2.1.0-15.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">747363170fb10bad253146a5e50563ef50c5ef5aefcf8bf0e2246063dbfca8ed</sum>
        </package>
        <package arch="i686" epoch="0" name="expat-devel" release="15.0.1.el7_9.tuxcare.els2" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-devel-2.1.0-15.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">1035d3f7c19b46b49b8678d528d2d0d4c076bdfc10daba2322762987d00d122b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat-devel" release="15.0.1.el7_9.tuxcare.els2" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-devel-2.1.0-15.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">aa2427097c4994956f8428943b61e245d59c9cdcc39ff085ae04709c9ad06451</sum>
        </package>
        <package arch="i686" epoch="0" name="expat-static" release="15.0.1.el7_9.tuxcare.els2" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-static-2.1.0-15.0.1.el7_9.tuxcare.els2.i686.rpm</filename>
          <sum type="sha256">8075b650903b74b115efa528ffa3b377373c17c1b6397cca0d71a926b5971db3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat-static" release="15.0.1.el7_9.tuxcare.els2" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els2.src.rpm" version="2.1.0">
          <filename>expat-static-2.1.0-15.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1fb68c0fd24b34eaa1fd0551d0ef8ab66f26f1d6a5a0c0ce307df2a2c5894b7b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1770820858</id>
    <title>ImageMagick: Fix of CVE-2026-23876</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-23876: fix heap buffer overflow vulnerability in the XBM image decoder (ReadXBMImage)</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-23876: fix heap buffer overflow vulnerability in the XBM image decoder (ReadXBMImage)</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-13 19:33:16 UTC" />
    <updated date="2026-02-13 19:33:16 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1770820858.html" id="CLSA-2026:1770820858" title="CLSA-2026:1770820858" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">de9cd0644e0e2b14380747d7d85078e1850802f4f3fbe13392683053860cb5e6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">534ff4eb98ce66c5d2989b33f73c1de06f1264adc0439b6ef5705d6c2a882684</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">800b03e0ef43191a89e458762364329e440804d71280f4c298c6cec1b79467f2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">b9e598ef445ef576ebb165f61e2c34e709155b488d2d052b6b34222b933e50b4</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">e2143914d67ba54c5ab5b8dbf9885a79df052c67737e8b53596961541deb06f7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">2cb28802daa8e00537de22ab24d60424b4a15d52491d9c6583d35f7447bf3ade</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">8dd14a4de23ceebbc9a42b36754a860978235b5bf19f7cbf07881317a28247b7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7c4bd7d76577c9b175c9d4f1b2a1cdbd1d21270e6a0ae32e372dac10d696412c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">328c5914a0f70fadb2b5e496db26976ea0061d665d007e9153d67448c37030c3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.0.3.el7_9.tuxcare.els3" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els3.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">d9863ad57b3beb9a38c1705cd0da15bfc2ff4da8c5edab36d64778c011e0949c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771010890</id>
    <title>freerdp: Fix of 5 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-22859: fix out-of-bounds access due to missing interface
  index validation in urbdrc channel
- CVE-2026-23732: fix out-of-bounds read due to missing input length
  check in glyph conversion
- CVE-2026-23883: fix integer overflow in cursor pixel allocation and
  surface-to-surface rectangle clamping
- CVE-2026-22852: fix heap buffer overflow in audin_process_formats
  due to stale format count
- CVE-2026-23531: fix out-of-bounds read/write in clear_decompress
  due to missing glyphData bounds check</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-22859: fix out-of-bounds access due to missing interface
  index validation in urbdrc channel
- CVE-2026-23732: fix out-of-bounds read due to missing input length
  check in glyph conversion
- CVE-2026-23883: fix integer overflow in cursor pixel allocation and
  surface-to-surface rectangle clamping
- CVE-2026-22852: fix heap buffer overflow in audin_process_formats
  due to stale format count
- CVE-2026-23531: fix out-of-bounds read/write in clear_decompress
  due to missing glyphData bounds check</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-13 19:28:19 UTC" />
    <updated date="2026-02-13 19:28:19 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771010890.html" id="CLSA-2026:1771010890" title="CLSA-2026:1771010890" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els8" src="freerdp-2.1.1-5.el7_9.tuxcare.els8.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">25a390b6d699778df48804b4616b238bfed208e0870b734c7d975deb1d9366f9</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els8" src="freerdp-2.1.1-5.el7_9.tuxcare.els8.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">bf37fdabb43c0c5dd572661616d4e2064f6f67db2925ece1096eb469c84f566e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els8" src="freerdp-2.1.1-5.el7_9.tuxcare.els8.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">677d6704d671863728be4b73bcfd918e3b1b90fa1f3a072e742e9bfabe2fa728</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els8" src="freerdp-2.1.1-5.el7_9.tuxcare.els8.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">af862faf8ebc5bed40c4eb953bcaccb630de786c142348da38229047c900265c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els8" src="freerdp-2.1.1-5.el7_9.tuxcare.els8.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">146b9b6ecece0790406e403556bfc8ef3425a45e531d63c6b4528a13c6934266</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els8" src="freerdp-2.1.1-5.el7_9.tuxcare.els8.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">f9d12b227def7c6b88aa29f5ee88980e57e80b81303942388b6e4ef4242f58d0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els8" src="freerdp-2.1.1-5.el7_9.tuxcare.els8.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">fa5d516ce265a97991a550ed38b19451aa9d9064f934841bab0fb2652d14e09a</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els8" src="freerdp-2.1.1-5.el7_9.tuxcare.els8.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">752993dd033acb436b38bf93b5c92170f7011d6cf88d50b12212a67a39129e88</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els8" src="freerdp-2.1.1-5.el7_9.tuxcare.els8.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">3c75f84c2709e16fc7c447e546bb5c89fb617b7cd5ad29163239796e91260252</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771011053</id>
    <title>freerdp: Fix of CVE-2026-22855</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-22855: fix heap out-of-bounds read in smartcard SetAttrib path when
  cbAttrLen does not match the actual NDR buffer length</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-22855: fix heap out-of-bounds read in smartcard SetAttrib path when
  cbAttrLen does not match the actual NDR buffer length</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-13 19:31:20 UTC" />
    <updated date="2026-02-13 19:31:20 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771011053.html" id="CLSA-2026:1771011053" title="CLSA-2026:1771011053" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els11" src="freerdp-2.1.1-5.el7_9.tuxcare.els11.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">a1cf44ad68b1b69d71f2682ae807c987c9710a8db2114e10d48e03767f8ab8bb</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els11" src="freerdp-2.1.1-5.el7_9.tuxcare.els11.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els11.i686.rpm</filename>
          <sum type="sha256">e5d9c12358276b88299b507bdd2a406478e6de0a9fe16305fd68f905651e13cf</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els11" src="freerdp-2.1.1-5.el7_9.tuxcare.els11.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">d65382c0c172f659dfedb0d1fa33642b5114eb446e970720d3f3eddb9e74e20c</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els11" src="freerdp-2.1.1-5.el7_9.tuxcare.els11.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els11.i686.rpm</filename>
          <sum type="sha256">e7de266b5fea4efb1f73c98628418467c28954117bd8ae66585950fa56cf9d34</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els11" src="freerdp-2.1.1-5.el7_9.tuxcare.els11.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">8190765cda2548673a20a713238ec80e605812a5134f6ab0352d5d70a3207e7e</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els11" src="freerdp-2.1.1-5.el7_9.tuxcare.els11.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els11.i686.rpm</filename>
          <sum type="sha256">d643a0b116f5589f5f63aa4b8282acd9ab817145fd3c4ad093a8fc1b279f340f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els11" src="freerdp-2.1.1-5.el7_9.tuxcare.els11.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">bc8d06f6c1c12e9d783830322595919f647ace0bdb05e073fc47ceff6ae21dad</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els11" src="freerdp-2.1.1-5.el7_9.tuxcare.els11.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els11.i686.rpm</filename>
          <sum type="sha256">ccb6a5c8ed00e569da51e088284b1f21bc5397a513c99b296edae4787692b3c6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els11" src="freerdp-2.1.1-5.el7_9.tuxcare.els11.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els11.x86_64.rpm</filename>
          <sum type="sha256">0b67c918b687badc38ae7ae33f194dc84884ddff93d37fe26af9ec13dc34d06c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1770820922</id>
    <title>openssl: Fix of CVE-2025-69421</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-69421: fix NULL dereference in PKCS12_item_decrypt_d2i_ex()</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-69421: fix NULL dereference in PKCS12_item_decrypt_d2i_ex()</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-13 19:26:44 UTC" />
    <updated date="2026-02-13 19:26:44 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1770820922.html" id="CLSA-2026:1770820922" title="CLSA-2026:1770820922" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="1" name="openssl" release="26.el7_9.tuxcare.els7" src="openssl-1.0.2k-26.el7_9.tuxcare.els7.src.rpm" version="1.0.2k">
          <filename>openssl-1.0.2k-26.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">0cb40758ad5384a650ec452d5fb29f6385bca920222b45957f83834d86cee64f</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els7" src="openssl-1.0.2k-26.el7_9.tuxcare.els7.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">fe8de61d184afd241362634337a93b538a2c08b522eeaaf8a1c3e120b5cdabfe</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-devel" release="26.el7_9.tuxcare.els7" src="openssl-1.0.2k-26.el7_9.tuxcare.els7.src.rpm" version="1.0.2k">
          <filename>openssl-devel-1.0.2k-26.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">0b9e19a7725c342c601a8259dce923062c50a123ae17b45975ffc4cee5bfb851</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els7" src="openssl-1.0.2k-26.el7_9.tuxcare.els7.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">21b4b4654ae009dc16e6de30fe0e36dfea7c37a527cfb5cb0b5ca7cf7cccd24c</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-libs" release="26.el7_9.tuxcare.els7" src="openssl-1.0.2k-26.el7_9.tuxcare.els7.src.rpm" version="1.0.2k">
          <filename>openssl-libs-1.0.2k-26.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">ee65af7c98d8ccc46e8789536678e0bdf7694970c3754820195c8cbcc3b0ad37</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-perl" release="26.el7_9.tuxcare.els7" src="openssl-1.0.2k-26.el7_9.tuxcare.els7.src.rpm" version="1.0.2k">
          <filename>openssl-perl-1.0.2k-26.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">6086ab04912311ce3be0d92745658920e904eb3033681e71eac254df1d1f0d30</sum>
        </package>
        <package arch="i686" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els7" src="openssl-1.0.2k-26.el7_9.tuxcare.els7.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">67736914a859160badbf32c0c9f88007223c9db9191ac3cce91faad9c465412f</sum>
        </package>
        <package arch="x86_64" epoch="1" name="openssl-static" release="26.el7_9.tuxcare.els7" src="openssl-1.0.2k-26.el7_9.tuxcare.els7.src.rpm" version="1.0.2k">
          <filename>openssl-static-1.0.2k-26.el7_9.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">a96aa70f7bc6188c597201996ef51bcc17bbc099b208ec7d9ad23cb64a8240a1</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771011128</id>
    <title>freerdp: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-22857: fix heap use-after-free in irp_thread_func when
  serial_process_irp fails
- CVE-2026-23530: fix heap buffer overflow in planar bitmap decompression
  due to missing nSrcWidth/nSrcHeight validation</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-22857: fix heap use-after-free in irp_thread_func when
  serial_process_irp fails
- CVE-2026-23530: fix heap buffer overflow in planar bitmap decompression
  due to missing nSrcWidth/nSrcHeight validation</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-13 19:32:12 UTC" />
    <updated date="2026-02-13 19:32:12 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771011128.html" id="CLSA-2026:1771011128" title="CLSA-2026:1771011128" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els10" src="freerdp-2.1.1-5.el7_9.tuxcare.els10.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">8411dd1baf539b1ea83bf44e726a8e3ab843bcc08380a16a9b64b06064926cea</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els10" src="freerdp-2.1.1-5.el7_9.tuxcare.els10.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els10.i686.rpm</filename>
          <sum type="sha256">fc2317af68adb45ae424d04538e1bcac6eadf0c72b9fdc09b6ac8d33cf3c1148</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els10" src="freerdp-2.1.1-5.el7_9.tuxcare.els10.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">34ee2e2ad0426cefb91bcf86fbd9c753b1474e59d05b46e7bf2b931335c16929</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els10" src="freerdp-2.1.1-5.el7_9.tuxcare.els10.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els10.i686.rpm</filename>
          <sum type="sha256">033667490bd6fd999241a9fbfe6f70b7436b35272ef5c6f35e1c5e0592e8847f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els10" src="freerdp-2.1.1-5.el7_9.tuxcare.els10.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">91e7722fb275f0155733e43a2b0dd137da35626c999df3aedf446686ff6c55db</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els10" src="freerdp-2.1.1-5.el7_9.tuxcare.els10.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els10.i686.rpm</filename>
          <sum type="sha256">3929ae0ee943570cea5460c4285f7761b10c5ba4542af8d191b623015ac5c137</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els10" src="freerdp-2.1.1-5.el7_9.tuxcare.els10.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">a658f639ec4abbb943c9733dc2c0f9ca5cc250562c96107e44fa73e30a19c8cc</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els10" src="freerdp-2.1.1-5.el7_9.tuxcare.els10.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els10.i686.rpm</filename>
          <sum type="sha256">48bcc5ea99bb288180c806498cb89d2a47cd6488ecde14f8db7da909caa998db</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els10" src="freerdp-2.1.1-5.el7_9.tuxcare.els10.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els10.x86_64.rpm</filename>
          <sum type="sha256">0f14d0384e06eaf67028f697d2b787f7dc5cc3264b934753bc0b29722d5b5117</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2026:1771011008</id>
    <title>Update of nss</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- update to CKBI 2.82 from NSS 3.120
- updated certificates:
-     # Certificate "ePKI Root Certification Authority"
-     # Certificate "GlobalSign Root CA"
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Comodo AAA Services root"
-     # Certificate "XRamp Global CA Root"
-     # Certificate "Go Daddy Class 2 CA"
-     # Certificate "Starfield Class 2 CA"
- removed certificates:
-     # Certificate "Baltimore CyberTrust Root"
- added certificates:
-     # Certificate "TrustAsia SMIME ECC Root CA"
-     # Certificate "TrustAsia SMIME RSA Root CA"
-     # Certificate "TrustAsia TLS ECC Root CA"
-     # Certificate "TrustAsia TLS RSA Root CA"
-     # Certificate "SwissSign RSA SMIME Root CA 2022 - 1"
-     # Certificate "SwissSign RSA TLS Root CA 2022 - 1"
-     # Certificate "OISTE Client Root ECC G1"
-     # Certificate "OISTE Client Root RSA G1"
-     # Certificate "OISTE Server Root ECC G1"
-     # Certificate " OISTE Server Root RSA G1"</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- update to CKBI 2.82 from NSS 3.120
- updated certificates:
-     # Certificate "ePKI Root Certification Authority"
-     # Certificate "GlobalSign Root CA"
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Comodo AAA Services root"
-     # Certificate "XRamp Global CA Root"
-     # Certificate "Go Daddy Class 2 CA"
-     # Certificate "Starfield Class 2 CA"
- removed certificates:
-     # Certificate "Baltimore CyberTrust Root"
- added certificates:
-     # Certificate "TrustAsia SMIME ECC Root CA"
-     # Certificate "TrustAsia SMIME RSA Root CA"
-     # Certificate "TrustAsia TLS ECC Root CA"
-     # Certificate "TrustAsia TLS RSA Root CA"
-     # Certificate "SwissSign RSA SMIME Root CA 2022 - 1"
-     # Certificate "SwissSign RSA TLS Root CA 2022 - 1"
-     # Certificate "OISTE Client Root ECC G1"
-     # Certificate "OISTE Client Root RSA G1"
-     # Certificate "OISTE Server Root ECC G1"
-     # Certificate " OISTE Server Root RSA G1"</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-13 19:30:13 UTC" />
    <updated date="2026-02-13 19:30:13 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771011008.html" id="CLSA-2026:1771011008" title="CLSA-2026:1771011008" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="nss" release="2.el7_9.tuxcare.els4" src="nss-3.90.0-2.el7_9.tuxcare.els4.src.rpm" version="3.90.0">
          <filename>nss-3.90.0-2.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">9c76fe3e42f444b9ba6f25056b31affe69f93c8957c6763d0f99639dfa8ed501</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss" release="2.el7_9.tuxcare.els4" src="nss-3.90.0-2.el7_9.tuxcare.els4.src.rpm" version="3.90.0">
          <filename>nss-3.90.0-2.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f0abefb59c88882501fefe86dfe64b508b1189b5565949af002e37fa04a96a50</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-devel" release="2.el7_9.tuxcare.els4" src="nss-3.90.0-2.el7_9.tuxcare.els4.src.rpm" version="3.90.0">
          <filename>nss-devel-3.90.0-2.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">17d6ecf1dee647957543f75f60c65914dcd78fbe4505c41846d6a21b957e5ba5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-devel" release="2.el7_9.tuxcare.els4" src="nss-3.90.0-2.el7_9.tuxcare.els4.src.rpm" version="3.90.0">
          <filename>nss-devel-3.90.0-2.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">38df281d64705192d0a695a73cd600f5982852fb272b0f53632e67d016e3dfcd</sum>
        </package>
        <package arch="i686" epoch="0" name="nss-pkcs11-devel" release="2.el7_9.tuxcare.els4" src="nss-3.90.0-2.el7_9.tuxcare.els4.src.rpm" version="3.90.0">
          <filename>nss-pkcs11-devel-3.90.0-2.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">dd26ea6d409944b6a3f118d76ed6b6afb798c9fd7e52787f3912eb009356b56e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-pkcs11-devel" release="2.el7_9.tuxcare.els4" src="nss-3.90.0-2.el7_9.tuxcare.els4.src.rpm" version="3.90.0">
          <filename>nss-pkcs11-devel-3.90.0-2.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">3fa451497344fd8c41a813a4c852b3b8188d1a853a68a34b4b4be485c95cc759</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-sysinit" release="2.el7_9.tuxcare.els4" src="nss-3.90.0-2.el7_9.tuxcare.els4.src.rpm" version="3.90.0">
          <filename>nss-sysinit-3.90.0-2.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">394fdceedd4af0593308346b2489b58e3a999ff475344ecefbbd4a351a1ce0d7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="nss-tools" release="2.el7_9.tuxcare.els4" src="nss-3.90.0-2.el7_9.tuxcare.els4.src.rpm" version="3.90.0">
          <filename>nss-tools-3.90.0-2.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">3eda3118c56dd55f275758ff161c80259873c1d3a829bb9232d3dd4f115d297e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771407667</id>
    <title>freerdp: Fix of CVE-2026-22856</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-22856: fix heap use-after-free in create_irp_thread</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-22856: fix heap use-after-free in create_irp_thread</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-18 14:45:32 UTC" />
    <updated date="2026-02-18 14:45:32 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771407667.html" id="CLSA-2026:1771407667" title="CLSA-2026:1771407667" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els12" src="freerdp-2.1.1-5.el7_9.tuxcare.els12.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">57b6e73e7af13010d8bc39e4be3d8e66683876c83671d9134af2b7e20a8b4de6</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els12" src="freerdp-2.1.1-5.el7_9.tuxcare.els12.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els12.i686.rpm</filename>
          <sum type="sha256">f3d6eebe69b837aa00ef08a985ddd3c10c1b5b9cea9f819d775c050dd81c70ce</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els12" src="freerdp-2.1.1-5.el7_9.tuxcare.els12.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">4ae692f795af19d28fa74e11e9977c04f6c54443fbad431b236e2849f7db0afe</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els12" src="freerdp-2.1.1-5.el7_9.tuxcare.els12.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els12.i686.rpm</filename>
          <sum type="sha256">6f014edb3ae24a9cfac27fb17d50d2100f3edd7acee914e08ca119dcd00bc73f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els12" src="freerdp-2.1.1-5.el7_9.tuxcare.els12.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">7d2b5794688551d8384f2c0696c87f07e63de643eb3d83e9851c5f47ee389d9a</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els12" src="freerdp-2.1.1-5.el7_9.tuxcare.els12.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els12.i686.rpm</filename>
          <sum type="sha256">01bebd780c7380bff3148fbe6753639c505112d19f3c3057473a0806795a4221</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els12" src="freerdp-2.1.1-5.el7_9.tuxcare.els12.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">7b0d0bd0279e0aea30e132d8f5dfbee3d15e8de77d0d627547d110cd260890df</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els12" src="freerdp-2.1.1-5.el7_9.tuxcare.els12.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els12.i686.rpm</filename>
          <sum type="sha256">002591ab1d6e671013384cabf7ce28e7b93205f6b83e662b6040bb0b9631cc4c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els12" src="freerdp-2.1.1-5.el7_9.tuxcare.els12.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els12.x86_64.rpm</filename>
          <sum type="sha256">6e28c50ac9b538f8ce671f53efdafa98ee4ed75c2d4301adeb14a30af3fd81a0</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771425977</id>
    <title>ImageMagick: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-68618: fix DOS when processing a specially crafted malicious SVG file
- CVE-2025-69204: fix DOS due to buffer overflow during image processing of a specially
  crafted SVG image</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-68618: fix DOS when processing a specially crafted malicious SVG file
- CVE-2025-69204: fix DOS due to buffer overflow during image processing of a specially
  crafted SVG image</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-18 14:46:22 UTC" />
    <updated date="2026-02-18 14:46:22 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771425977.html" id="CLSA-2026:1771425977" title="CLSA-2026:1771425977" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">36c820f00157bde597de4b57981fe33ff75b4c7378f0b05f4a1ea403aba55c61</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">518920d9fc78ba47317ade71816dba89ed981f26a9c462d3b28a54facc770ee1</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">c8b9518a1a80b12bc9668c6c26b445982b6f67b820599c84baf4f84b39a34a6e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">55ea99922df4d411a1cde0caf981293b56d349219c49f4e36a512bb7cca892cd</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">5fc547aa4be51b14a565f495430400fc9d3c69ab5ca83c0dd97430b6e26e011d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">8c84d1c4a2bf3a6a64dfa9a3f2182eb348dfc7601a4d6372129e5c309f4a99bf</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">66c8fbadc3f8a184bff81edced88bd13dda693a7cebfdcf9aeecc8918e1f030b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">57f2d9f1bf727ec9a60ab38db6541fa22f43ba9470778ead55fe548bce4645d6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">34ab684d1b0be1b8f698acdd7c88b19dbc1b6bc3a3e1a95fa3fee6de4366ec7d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.0.3.el7_9.tuxcare.els4" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els4.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">ed6fc53f83fadd427c839c389c2d3e54274777675c5f63a62dd251bfe498b47b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771241609</id>
    <title>kernel: Fix of 13 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- vsock: Do not allow binding to VMADDR_PORT_ANY {CVE-2025-38618}
- cnic: Fix use-after-free bugs in cnic_delete_task {CVE-2025-39945}
- scsi: bfa: Double-free fix {CVE-2025-38699}
- pptp: ensure minimal skb length in pptp_xmit() {CVE-2025-38574}
- ipv6: reject malicious packets in ipv6_gso_segment() {CVE-2025-38572}
- fbdev: Fix vmalloc out-of-bounds write in fast_imageblit {CVE-2025-38685}
- fbdev: fix potential buffer overflow in do_register_framebuffer() {CVE-2025-38702}
- scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() {CVE-2023-53521}
- usb: core: config: Prevent OOB read in SS endpoint companion parsing {CVE-2025-39760}
- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() {CVE-2025-38680}
- fs/buffer: fix use-after-free when call bh_read() helper {CVE-2025-39691}
- bna: ensure the copied buf is NUL terminated {CVE-2024-36934}
- i40e: fix idx validation in config queues msg {CVE-2025-39971}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- vsock: Do not allow binding to VMADDR_PORT_ANY {CVE-2025-38618}
- cnic: Fix use-after-free bugs in cnic_delete_task {CVE-2025-39945}
- scsi: bfa: Double-free fix {CVE-2025-38699}
- pptp: ensure minimal skb length in pptp_xmit() {CVE-2025-38574}
- ipv6: reject malicious packets in ipv6_gso_segment() {CVE-2025-38572}
- fbdev: Fix vmalloc out-of-bounds write in fast_imageblit {CVE-2025-38685}
- fbdev: fix potential buffer overflow in do_register_framebuffer() {CVE-2025-38702}
- scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() {CVE-2023-53521}
- usb: core: config: Prevent OOB read in SS endpoint companion parsing {CVE-2025-39760}
- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() {CVE-2025-38680}
- fs/buffer: fix use-after-free when call bh_read() helper {CVE-2025-39691}
- bna: ensure the copied buf is NUL terminated {CVE-2024-36934}
- i40e: fix idx validation in config queues msg {CVE-2025-39971}</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-18 14:47:22 UTC" />
    <updated date="2026-02-18 14:47:22 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771241609.html" id="CLSA-2026:1771241609" title="CLSA-2026:1771241609" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">1b7e054748cb5af3d3a3f83ef669be5eeb85031eb171c99a6a3f468a3c10c17c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">f71bb2e94e9018a586e9cb20eda928c6eca3be83be84982a31bdaa915fc51e64</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">e9d6c339b279eac88bcf3cf9ddae088e5501fe9a4ea93fad7d6b8e0905dab5e2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">39025d885d757d416bc1b5fa17a7e26def14826b7c1c5a839299936ac2ec3ea2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">891304a8de34aa4161e77c3344f37e1d1661af3b88ebdd7a16abbef9944f27fb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">5db15ccc1bc9945da735c6971f7d8cf13f393696251a94d21ba5155be0df6290</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ed547aecaea40e0dd2ec0fab28a23ba45e05c4b6073c0a07a31c553323a95c79</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">b9acdc674e1ac6cfac2edcb3bd6334138dcee20993fc15ef62881729a3ded294</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">43e3efeb405bb4c20c86c0f5e1bc8b9712e0a237563c63caba1534e080bdfb4d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">3d9ba649dda5f65f48c0fc35be3b3042e2d879dd319e06932666adddccd29e55</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.144.1.el7.tuxcare.els2" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els2.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.144.1.el7.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">724b20216c976c1fa1d0dd08ea1980939729f4edac073cf5a2531ddda0588a46</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771332544</id>
    <title>grub2: Fix of CVE-2025-0689</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-0689: don't load UDF module in the lockdown mode</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-0689: don't load UDF module in the lockdown mode</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-18 14:48:16 UTC" />
    <updated date="2026-02-18 14:48:16 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771332544.html" id="CLSA-2026:1771332544" title="CLSA-2026:1771332544" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="3" name="grub2" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">cd1c2d16b913ff48b55eb35c94f1224e0e0f8943db930913860eef95d57d593e</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-common" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-common-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">4a1327be1519af1e2b5d2efaea4027a2a1b9b0bb5f18e216ce524d9664ca09c3</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-ia32" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">ee61bf164e32466309331df96b66a37b35d007865e8af114beaa5c29e3693b13</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-ia32-cdboot" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-cdboot-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">9f1ce1b26fe3e62d22a8ff9127d8ed7040da7265f051e1fc9ef90ea6a2ea85b0</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-efi-ia32-modules" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-efi-ia32-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">6ac20d5819baae50064f83bee8a68bd6b2c5f150225268f963e7146193fab927</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-x64" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-efi-x64-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">664bd96c339bdaed14b6a77ceaf83f6523183a62a2207fcc689d2fe4a0a358e2</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-efi-x64-cdboot" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-efi-x64-cdboot-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">4ed02811d376890a580a4c30683f13a2e0ed22f4555527ccbe928e766c291b2c</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-efi-x64-modules" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-efi-x64-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">c07d153fab6d86c4dbaee3f3e7449427dabd59b84a496f6418f38898891dc68c</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-i386-modules" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-i386-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">8e58a291283b358e1cfa764540e87a1c337fb84e41fc5d6c6e27a671ea4f9aa8</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-pc" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-pc-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">c62e1fcf7e7616d035201bf21459bb479b3c0e289e0bb20b6322a7e1a6514b39</sum>
        </package>
        <package arch="noarch" epoch="3" name="grub2-pc-modules" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-pc-modules-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.noarch.rpm</filename>
          <sum type="sha256">3c8eb5133d9b7c33ed7dd33ed87f18524026f389a99cc8f926d71a494c8df7e6</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-tools-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">25212fdddee4164b86002ac2460d23ac3ef5a54c023f1fc3e011a52e507d14c0</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools-extra" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-tools-extra-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">d1a3890a8375825c2f824a0041e251f0ac138bc5a4f83d15064849521c0eda22</sum>
        </package>
        <package arch="x86_64" epoch="3" name="grub2-tools-minimal" release="0.87.0.2.el7.centos.14.tuxcare.els9" src="grub2-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.src.rpm" version="2.02">
          <filename>grub2-tools-minimal-2.02-0.87.0.2.el7.centos.14.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">f7f37fd31639f05777e23a73049ca4249121939855084e4ce0da972234ff160b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2026:1771413627</id>
    <title>Update of linux-firmware</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Addition AMD CPU microcode for processor family 0x1a:
  cpuid:0x00B00F21(ver:0x0B002161), cpuid:0x00B00F81(ver:0x0B008121),
  cpuid:0x00B10F10(ver:0x0B101058), cpuid:0x00B20F40(ver:0x0B204037),
  cpuid:0x00B40F40(ver:0x0B404035), cpuid:0x00B40F41(ver:0x0B404108),
  cpuid:0x00B60F00(ver:0x0B600037), cpuid:0x00B60F80(ver:0x0B608038),
  cpuid:0x00B70F00(ver:0x0B700037);
- Update AMD CPU microcode for processor family 0x19:
  cpuid:0x00A00F11(ver:0x0A0011DE), cpuid:0x00A00F12(ver:0x0A001247),
  cpuid:0x00A00F82(ver:0x0A00820D), cpuid:0x00A10F11(ver:0x0A101158),
  cpuid:0x00A10F12(ver:0x0A101253), cpuid:0x00A10F81(ver:0x0A108109),
  cpuid:0x00A20F10(ver:0x0A20102E), cpuid:0x00A20F12(ver:0x0A201211),
  cpuid:0x00A40F41(ver:0x0A404108), cpuid:0x00A50F00(ver:0x0A500012),
  cpuid:0x00A60F12(ver:0x0A60120A), cpuid:0x00A70F41(ver:0x0A704108),
  cpuid:0x00A70F52(ver:0x0A705208), cpuid:0x00A70F80(ver:0x0A708008),
  cpuid:0x00A70FC0(ver:0x0A70C008), cpuid:0x00AA0F02(ver:0x0AA0021C);</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Addition AMD CPU microcode for processor family 0x1a:
  cpuid:0x00B00F21(ver:0x0B002161), cpuid:0x00B00F81(ver:0x0B008121),
  cpuid:0x00B10F10(ver:0x0B101058), cpuid:0x00B20F40(ver:0x0B204037),
  cpuid:0x00B40F40(ver:0x0B404035), cpuid:0x00B40F41(ver:0x0B404108),
  cpuid:0x00B60F00(ver:0x0B600037), cpuid:0x00B60F80(ver:0x0B608038),
  cpuid:0x00B70F00(ver:0x0B700037);
- Update AMD CPU microcode for processor family 0x19:
  cpuid:0x00A00F11(ver:0x0A0011DE), cpuid:0x00A00F12(ver:0x0A001247),
  cpuid:0x00A00F82(ver:0x0A00820D), cpuid:0x00A10F11(ver:0x0A101158),
  cpuid:0x00A10F12(ver:0x0A101253), cpuid:0x00A10F81(ver:0x0A108109),
  cpuid:0x00A20F10(ver:0x0A20102E), cpuid:0x00A20F12(ver:0x0A201211),
  cpuid:0x00A40F41(ver:0x0A404108), cpuid:0x00A50F00(ver:0x0A500012),
  cpuid:0x00A60F12(ver:0x0A60120A), cpuid:0x00A70F41(ver:0x0A704108),
  cpuid:0x00A70F52(ver:0x0A705208), cpuid:0x00A70F80(ver:0x0A708008),
  cpuid:0x00A70FC0(ver:0x0A70C008), cpuid:0x00AA0F02(ver:0x0AA0021C);</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-18 14:49:22 UTC" />
    <updated date="2026-02-18 14:49:22 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771413627.html" id="CLSA-2026:1771413627" title="CLSA-2026:1771413627" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="iwl100-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="39.31.5.1">
          <filename>iwl100-firmware-39.31.5.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">2fee14961cb2b8e41dc9ca137c6caa40cd7088116fea400977afa2cb0dcbb01a</sum>
        </package>
        <package arch="noarch" epoch="1" name="iwl1000-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="39.31.5.1">
          <filename>iwl1000-firmware-39.31.5.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">65af2d5c00cdd848973071926dd8f6d2ca9685c063cc9515a3db5f99f9d2d0bb</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl105-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="18.168.6.1">
          <filename>iwl105-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">67f0f537a3d7eeabb8781c1490b19e44ab17c11e3a5fd6072dc0368e11b55bca</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl135-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="18.168.6.1">
          <filename>iwl135-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">e32c769d3823d040315e5db498dce926c2aa388d316a708a668af9c72c63baf8</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2000-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="18.168.6.1">
          <filename>iwl2000-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">b5d3d4c827d1a6edd6ab479c9411745f781cab32dca23da8bb6c44a8bf10fbe0</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl2030-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="18.168.6.1">
          <filename>iwl2030-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">358da90ab20e30bfc1179b88391e4214ede7cc44d3d144842b8650f33ac7a4e1</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3160-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="25.30.13.0">
          <filename>iwl3160-firmware-25.30.13.0-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">d82b6688f8b1061f3c63a45b8b2774b145b114711a096a6a7355cb319b039cf0</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl3945-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="15.32.2.9">
          <filename>iwl3945-firmware-15.32.2.9-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">d73589c45348790beb9407ac817443e98c934560f0a5551d6fbef180cc117c71</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl4965-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="228.61.2.24">
          <filename>iwl4965-firmware-228.61.2.24-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">5420f094d63f61f24727aa2a6e5ea965223ba75f81e1d3288c49c0708dd0f307</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5000-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="8.83.5.1_1">
          <filename>iwl5000-firmware-8.83.5.1_1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">3f8dbd4c099b1f0eb1baac611d53b0b62ef72e3429705b5159990df75f2e5c89</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl5150-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="8.24.2.2">
          <filename>iwl5150-firmware-8.24.2.2-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">199abaa5b5f55d46c6e9e6bcd41edfdf140920d3a49a34a83bd14404b80d8b16</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="9.221.4.1">
          <filename>iwl6000-firmware-9.221.4.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">ea7d06b22418151b4e65fb119cd86ba5bd370142809ca9ca5b4b783977326216</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2a-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2a-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">96a3605f91b8eab68a7099ed486590e3430f5f698cb613854dbaf9db5b655c98</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6000g2b-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="18.168.6.1">
          <filename>iwl6000g2b-firmware-18.168.6.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">39c34fdf9a248d05cfdc9e95c4346d02d6ad2616f8f94d3d7eb8c115089f3307</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl6050-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="41.28.5.1">
          <filename>iwl6050-firmware-41.28.5.1-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">94d007681b8bf73d8345db1bff15f937fb20055bf46c11a5338d4a72d88289c1</sum>
        </package>
        <package arch="noarch" epoch="0" name="iwl7260-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="25.30.13.0">
          <filename>iwl7260-firmware-25.30.13.0-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">689d753b23da79b2d4b2956c1da33c314edb90216cd03ca03d19779210511996</sum>
        </package>
        <package arch="noarch" epoch="0" name="linux-firmware" release="83.git78c0348.el7_9.tuxcare.els4" src="linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.src.rpm" version="20200421">
          <filename>linux-firmware-20200421-83.git78c0348.el7_9.tuxcare.els4.noarch.rpm</filename>
          <sum type="sha256">244f377e4e5fed7c5f9db2c6ff44ef6fec95986ca1315ca01af416ccbfabd2df</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771519663</id>
    <title>libsoup: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-1761: fix stack-based buffer overflow in multipart HTTP response
  parsing caused by incorrect length calculation in
  soup_filter_input_stream_read_until()
- CVE-2026-0719: fix stack-based buffer overflow in NTLM authentication
  caused by integer overflow in md4sum() with excessively long passwords</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-1761: fix stack-based buffer overflow in multipart HTTP response
  parsing caused by incorrect length calculation in
  soup_filter_input_stream_read_until()
- CVE-2026-0719: fix stack-based buffer overflow in NTLM authentication
  caused by integer overflow in md4sum() with excessively long passwords</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-20 09:46:21 UTC" />
    <updated date="2026-02-20 09:46:21 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771519663.html" id="CLSA-2026:1771519663" title="CLSA-2026:1771519663" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libsoup" release="2.0.5.el7.tuxcare.els4" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els4.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.5.el7.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">a59451142daf5ccb02d41d210bc16620df7982d157ffab1cfa3a57e9d2d4187c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup" release="2.0.5.el7.tuxcare.els4" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els4.src.rpm" version="2.62.2">
          <filename>libsoup-2.62.2-2.0.5.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">cfee555386c728825353fb0230120776ecb1ad9279dfa8e902826d68639c13a7</sum>
        </package>
        <package arch="i686" epoch="0" name="libsoup-devel" release="2.0.5.el7.tuxcare.els4" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els4.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.5.el7.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">68006362ad5d056bc77e4fa4017f25c1dd15336d218677240de533b4714f2493</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libsoup-devel" release="2.0.5.el7.tuxcare.els4" src="libsoup-2.62.2-2.0.5.el7.tuxcare.els4.src.rpm" version="2.62.2">
          <filename>libsoup-devel-2.62.2-2.0.5.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">1797bc7cae626be1ff5f0d6f0964562bbac0879d6ec0e7e71d85212ec57ccef4</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771844092</id>
    <title>freerdp: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-24679: ensure InterfaceNumber is within range in URBDRC client
- CVE-2026-24675: do not free MsConfig on msusb_msinterface_replace() failure in
  urb_select_interface()</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-24679: ensure InterfaceNumber is within range in URBDRC client
- CVE-2026-24675: do not free MsConfig on msusb_msinterface_replace() failure in
  urb_select_interface()</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-26 23:00:48 UTC" />
    <updated date="2026-02-26 23:00:48 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771844092.html" id="CLSA-2026:1771844092" title="CLSA-2026:1771844092" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els13" src="freerdp-2.1.1-5.el7_9.tuxcare.els13.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">156734da6419fd31e7f30fa4bbcf0fb1b158ff9e524c1b49b22d852cb85801ec</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els13" src="freerdp-2.1.1-5.el7_9.tuxcare.els13.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els13.i686.rpm</filename>
          <sum type="sha256">f75994b2c4e08c51ec65333f997236f0ffe6241060996f39c3faef1ecc1b6be0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els13" src="freerdp-2.1.1-5.el7_9.tuxcare.els13.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">e71345aca0be76e43ee38dab956634a0025e85d7a133b7de973d378908a62dc6</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els13" src="freerdp-2.1.1-5.el7_9.tuxcare.els13.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els13.i686.rpm</filename>
          <sum type="sha256">89a0e5ef92846f41e9cf4c25a133ff820b1348fe985bf126241869941844f746</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els13" src="freerdp-2.1.1-5.el7_9.tuxcare.els13.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">1da3dae829a6bebfce332c46e2797f49c2d6f4bf110ac2d46e23fdff65af2e2f</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els13" src="freerdp-2.1.1-5.el7_9.tuxcare.els13.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els13.i686.rpm</filename>
          <sum type="sha256">b140f96351ef4c47072eb35bebb0fdd56957a4ae6f37548545f578e2314d1657</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els13" src="freerdp-2.1.1-5.el7_9.tuxcare.els13.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">51fe3ca9f5fa87227ff46851250051fa0fe960c5874be02bc9fe2a63a5047a32</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els13" src="freerdp-2.1.1-5.el7_9.tuxcare.els13.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els13.i686.rpm</filename>
          <sum type="sha256">c04d872f7f1a6cba36ff24b244d3e86766964c34238b7658dd04919df87f4099</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els13" src="freerdp-2.1.1-5.el7_9.tuxcare.els13.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els13.x86_64.rpm</filename>
          <sum type="sha256">bf465737dd3c7509b9a1830e434089a4f6679524981a3c5973f6e7bea0403f18</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771855171</id>
    <title>glib2: Fix of CVE-2025-14087</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-14087: fix integer overflow in GVariant parser leading to heap
  corruption via buffer underflow when processing malicious input strings</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-14087: fix integer overflow in GVariant parser leading to heap
  corruption via buffer underflow when processing malicious input strings</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-26 23:01:34 UTC" />
    <updated date="2026-02-26 23:01:34 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771855171.html" id="CLSA-2026:1771855171" title="CLSA-2026:1771855171" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="glib2" release="9.el7_9.tuxcare.els5" src="glib2-2.56.1-9.el7_9.tuxcare.els5.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">8254f4d542eccd74eec64abe556a0b9ae762ccfcaca73b053ae6b1adbde256a6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2" release="9.el7_9.tuxcare.els5" src="glib2-2.56.1-9.el7_9.tuxcare.els5.src.rpm" version="2.56.1">
          <filename>glib2-2.56.1-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">8eab164575ba8cbfa5efc031680733d93ef410e74fbba822143da85eed9a8a16</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els5" src="glib2-2.56.1-9.el7_9.tuxcare.els5.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">03020656b5e8728d12aaddf3b45d34d6b2dcf602b23d2b414a2af5f3d7e7bf9d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-devel" release="9.el7_9.tuxcare.els5" src="glib2-2.56.1-9.el7_9.tuxcare.els5.src.rpm" version="2.56.1">
          <filename>glib2-devel-2.56.1-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">5315a19cea99647551aaae0cd14426e536ffc11ae5ae61e43638120130f73ea9</sum>
        </package>
        <package arch="noarch" epoch="0" name="glib2-doc" release="9.el7_9.tuxcare.els5" src="glib2-2.56.1-9.el7_9.tuxcare.els5.src.rpm" version="2.56.1">
          <filename>glib2-doc-2.56.1-9.el7_9.tuxcare.els5.noarch.rpm</filename>
          <sum type="sha256">9df6e5dcea83f37fbb0110550d76c11be2c9b3a8fd13abb7f2b559e7affefd8b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-fam" release="9.el7_9.tuxcare.els5" src="glib2-2.56.1-9.el7_9.tuxcare.els5.src.rpm" version="2.56.1">
          <filename>glib2-fam-2.56.1-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">7da9da3a6857e4edb8247f6ad31a1e88c1d5fc00ec57d9da4cefec48a6068813</sum>
        </package>
        <package arch="i686" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els5" src="glib2-2.56.1-9.el7_9.tuxcare.els5.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">cd2c8f59c855922ae8fd6929ce9e276425b85d3c456521dfb044d6955c04a885</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-static" release="9.el7_9.tuxcare.els5" src="glib2-2.56.1-9.el7_9.tuxcare.els5.src.rpm" version="2.56.1">
          <filename>glib2-static-2.56.1-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">7b996d210c5e8c062fbad0133a31b48f789de7689fde87e3e87bd4d069f400bd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="glib2-tests" release="9.el7_9.tuxcare.els5" src="glib2-2.56.1-9.el7_9.tuxcare.els5.src.rpm" version="2.56.1">
          <filename>glib2-tests-2.56.1-9.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">5cb868ac7877af90c76fe91723421487b39e67f41c6f2fa4a6ef83becd4cd3bf</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771855894</id>
    <title>python-virtualenv: Fix of CVE-2024-53899</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-53899: Quote template strings in activation scripts</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-53899: Quote template strings in activation scripts</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-26 23:02:23 UTC" />
    <updated date="2026-02-26 23:02:23 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771855894.html" id="CLSA-2026:1771855894" title="CLSA-2026:1771855894" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python-virtualenv" release="7.el7_9.tuxcare.els1" src="python-virtualenv-15.1.0-7.el7_9.tuxcare.els1.src.rpm" version="15.1.0">
          <filename>python-virtualenv-15.1.0-7.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">b4bd8b82c71312efb31d4eb1e8f4b57756d3246160409b03ef7bba4354d7054f</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1771857838</id>
    <title>freerdp: Fix of 6 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-23948: fix missing NULL check in core/info
- CVE-2026-24491: reset channel_callback before close in drdynvc
- CVE-2026-24676: reset audin-&gt;format in channels/audin
- CVE-2026-24680: reset pointer after memory release in Wayland client
- CVE-2026-24681: cancel all USB transfers on channel close in urbdrc
- CVE-2026-24684: terminate rdpsnd thread before free</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-23948: fix missing NULL check in core/info
- CVE-2026-24491: reset channel_callback before close in drdynvc
- CVE-2026-24676: reset audin-&gt;format in channels/audin
- CVE-2026-24680: reset pointer after memory release in Wayland client
- CVE-2026-24681: cancel all USB transfers on channel close in urbdrc
- CVE-2026-24684: terminate rdpsnd thread before free</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-26 22:57:25 UTC" />
    <updated date="2026-02-26 22:57:25 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1771857838.html" id="CLSA-2026:1771857838" title="CLSA-2026:1771857838" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els14" src="freerdp-2.1.1-5.el7_9.tuxcare.els14.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">d76dd8d2b71859d0bc14eda7542d4157637107545529aaac257346da0b45639e</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els14" src="freerdp-2.1.1-5.el7_9.tuxcare.els14.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els14.i686.rpm</filename>
          <sum type="sha256">fafe2fcfb72021aaeae53e632afdafc298fb365221bc866b89d2542486937edd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els14" src="freerdp-2.1.1-5.el7_9.tuxcare.els14.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">f21411d583145e5095b6e3d1a81b63a00594da290f866e69d0dd388e634d90f8</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els14" src="freerdp-2.1.1-5.el7_9.tuxcare.els14.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els14.i686.rpm</filename>
          <sum type="sha256">7382bb0ce042e687c2f90c201be101f5a558cbf93cabf3aa06b03678f315bf24</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els14" src="freerdp-2.1.1-5.el7_9.tuxcare.els14.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">6f554569f95583c802e10fe6786278d6bdf20df5794f9c541dd1661aaf1306cd</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els14" src="freerdp-2.1.1-5.el7_9.tuxcare.els14.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els14.i686.rpm</filename>
          <sum type="sha256">9fe606f9eca614c73bec117238d45d3898975aee03f58381c567aaf37ffe1ee5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els14" src="freerdp-2.1.1-5.el7_9.tuxcare.els14.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">e154efe989a2b3619311972828f6236e8d24105323e1ca3b4d4c77b4bb9033ce</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els14" src="freerdp-2.1.1-5.el7_9.tuxcare.els14.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els14.i686.rpm</filename>
          <sum type="sha256">6e0335dfa5b3cd4e755f1a97ebd84acda9a278cb4625a67684d212d69837558d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els14" src="freerdp-2.1.1-5.el7_9.tuxcare.els14.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els14.x86_64.rpm</filename>
          <sum type="sha256">0e3eed42a39da6b61450e2150c7601b750d40e9bcf6642087efcb7c53b127c60</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1772146691</id>
    <title>libpng: Fix of CVE-2026-25646</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-25646: fix a heap buffer overflow in png_set_quantize()</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-25646: fix a heap buffer overflow in png_set_quantize()</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-26 22:58:15 UTC" />
    <updated date="2026-02-26 22:58:15 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1772146691.html" id="CLSA-2026:1772146691" title="CLSA-2026:1772146691" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="2" name="libpng" release="8.el7.tuxcare.els3" src="libpng-1.5.13-8.el7.tuxcare.els3.src.rpm" version="1.5.13">
          <filename>libpng-1.5.13-8.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">d900bf54468d3bc635cfefc524a25651b308fd213a9d2290eead03b10cf156cc</sum>
        </package>
        <package arch="x86_64" epoch="2" name="libpng" release="8.el7.tuxcare.els3" src="libpng-1.5.13-8.el7.tuxcare.els3.src.rpm" version="1.5.13">
          <filename>libpng-1.5.13-8.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">599dd43a0bdacae3e3ee0d3c6bb0b4b5608b2d52c4476c39a8509fb60080913f</sum>
        </package>
        <package arch="i686" epoch="2" name="libpng-devel" release="8.el7.tuxcare.els3" src="libpng-1.5.13-8.el7.tuxcare.els3.src.rpm" version="1.5.13">
          <filename>libpng-devel-1.5.13-8.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">e2319309ae8e018827ac567760e970ef8579d966c78efa4ee7519c4cd0c3f663</sum>
        </package>
        <package arch="x86_64" epoch="2" name="libpng-devel" release="8.el7.tuxcare.els3" src="libpng-1.5.13-8.el7.tuxcare.els3.src.rpm" version="1.5.13">
          <filename>libpng-devel-1.5.13-8.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">f15518ecfa8ab99e33d501dec71ae1a907f7333b8877f25a7487182c8cde8dd9</sum>
        </package>
        <package arch="i686" epoch="2" name="libpng-static" release="8.el7.tuxcare.els3" src="libpng-1.5.13-8.el7.tuxcare.els3.src.rpm" version="1.5.13">
          <filename>libpng-static-1.5.13-8.el7.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">6b0d0f60f47cc60c7212677887fabf1cd72bdfcb8cb221b3500004f847178921</sum>
        </package>
        <package arch="x86_64" epoch="2" name="libpng-static" release="8.el7.tuxcare.els3" src="libpng-1.5.13-8.el7.tuxcare.els3.src.rpm" version="1.5.13">
          <filename>libpng-static-1.5.13-8.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">21edaa26a6de9a937fb0a4b2803a79d147facd218ed72f7dd581741106043e64</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1772146735</id>
    <title>python: Fix of CVE-2015-20107</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2015-20107: fix shell command injection vulnerability in the mailcap module</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2015-20107: fix shell command injection vulnerability in the mailcap module</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-26 22:58:59 UTC" />
    <updated date="2026-02-26 22:58:59 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1772146735.html" id="CLSA-2026:1772146735" title="CLSA-2026:1772146735" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="94.0.1.el7_9.tuxcare.els3" src="python-2.7.5-94.0.1.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-2.7.5-94.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">25fbb51be197ce6d417f69b51c4d27125a6e0ae97c9590dfada3222eb8e5c4a9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="94.0.1.el7_9.tuxcare.els3" src="python-2.7.5-94.0.1.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-94.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">056d9e75d6f17f8e105da40b18df8551e8be89cbf08156c5492dc5f43f34b5e5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="94.0.1.el7_9.tuxcare.els3" src="python-2.7.5-94.0.1.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-94.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">f1ce37376031bc6a2f6c1a7a6b763f121092b76ab568a203156f0ada454b8374</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="94.0.1.el7_9.tuxcare.els3" src="python-2.7.5-94.0.1.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">4eb8231a2e4aa8689bb915cb3cb5d4da6960ce3cfbda5a86eeb127d387aee2b3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="94.0.1.el7_9.tuxcare.els3" src="python-2.7.5-94.0.1.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">77bc114e947837938dc62345749ebcf94b910f83315c8115e44ff6b049568dd8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="94.0.1.el7_9.tuxcare.els3" src="python-2.7.5-94.0.1.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-94.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">4de1dac06f4b1992d5685aef4fa08ae9303974a2a641c824ee9dcb97f0fddb94</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="94.0.1.el7_9.tuxcare.els3" src="python-2.7.5-94.0.1.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-94.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">70fe20bfd156cacf44af95de5e925f262e05687c9325c0e0fa21f73142939f87</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="94.0.1.el7_9.tuxcare.els3" src="python-2.7.5-94.0.1.el7_9.tuxcare.els3.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-94.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">1255722d0f05606c940432acbab134a2549d725d3066cae2fd5bf6a8739ba12b</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1772146785</id>
    <title>httpd: Fix of CVE-2024-42516</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2024-42516: fix HTTP response splitting by reordering header validation
  to occur after full response header assembly.</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2024-42516: fix HTTP response splitting by reordering header validation
  to occur after full response header assembly.</summary>
    <pushcount>0</pushcount>
    <issued date="2026-02-26 22:59:49 UTC" />
    <updated date="2026-02-26 22:59:49 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1772146785.html" id="CLSA-2026:1772146785" title="CLSA-2026:1772146785" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="httpd" release="99.0.5.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">b2d4393ecddd853d15328f733a05007c5f5413ef00ff54a7368964be13f50651</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-devel" release="99.0.5.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>httpd-devel-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">b291da1a4fcadc8492bcbf2dbca0f7adbf5b6517a7a09ed289f2af2827c73aca</sum>
        </package>
        <package arch="noarch" epoch="0" name="httpd-manual" release="99.0.5.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>httpd-manual-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.noarch.rpm</filename>
          <sum type="sha256">190f8f4be1ea749b9a3e52fc143c0832e6eda6cba93217e15cfb9d5bed3130d6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="httpd-tools" release="99.0.5.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>httpd-tools-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">f5b7735cbc010e7855f2d81e925252b15d716bbf23b473b436ea93be536ca630</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_ldap" release="99.0.5.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>mod_ldap-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">303410f52c82c209630886168a26f79346c34f805d98998098348aec646dabd4</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_proxy_html" release="99.0.5.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>mod_proxy_html-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">0c59e6d26b57dbdd450cb0d9a3cdcd1cd4339331509a07991565e0bd9e03c5e6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="mod_session" release="99.0.5.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>mod_session-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">b61b7bc1f0a7484d18699bd7443d89f1c89a44c8156cbc9da8fb8ea4bc066305</sum>
        </package>
        <package arch="x86_64" epoch="1" name="mod_ssl" release="99.0.5.el7.centos.1.tuxcare.els8" src="httpd-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.src.rpm" version="2.4.6">
          <filename>mod_ssl-2.4.6-99.0.5.el7.centos.1.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">a21e83b745644090ca7fbe18f495f463b1009223e8cb5a367dddfeb32c37b3fc</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1772574874</id>
    <title>libtiff: Fix of CVE-2025-61144</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-61144: fix stack-based buffer overflow occurs in tiffcrop</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-61144: fix stack-based buffer overflow occurs in tiffcrop</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-04 17:31:55 UTC" />
    <updated date="2026-03-04 17:31:55 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1772574874.html" id="CLSA-2026:1772574874" title="CLSA-2026:1772574874" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="libtiff" release="35.el7.tuxcare.els7" src="libtiff-4.0.3-35.el7.tuxcare.els7.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">b3cbda9caa336cc083b16a07edee161fc20c6fa952b79d783962c61818707093</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff" release="35.el7.tuxcare.els7" src="libtiff-4.0.3-35.el7.tuxcare.els7.src.rpm" version="4.0.3">
          <filename>libtiff-4.0.3-35.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">5445c00abba9777296b6ac0b387fae8c765f1cd37e842df77f4b01819d2857ae</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els7" src="libtiff-4.0.3-35.el7.tuxcare.els7.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">f0d48590c27d7f781777391eaf8455a12b7fa0fb35a775c2167b2381ceaefd8c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-devel" release="35.el7.tuxcare.els7" src="libtiff-4.0.3-35.el7.tuxcare.els7.src.rpm" version="4.0.3">
          <filename>libtiff-devel-4.0.3-35.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">c7d6c2a15782671a548725c1de6cdecfb747b9870699e35f7b2f5572ea49a5a8</sum>
        </package>
        <package arch="i686" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els7" src="libtiff-4.0.3-35.el7.tuxcare.els7.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els7.i686.rpm</filename>
          <sum type="sha256">859477c1a74b03a19ab62955b3223cedcd1e4d3edf53871cfee0c6a689cfc3be</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-static" release="35.el7.tuxcare.els7" src="libtiff-4.0.3-35.el7.tuxcare.els7.src.rpm" version="4.0.3">
          <filename>libtiff-static-4.0.3-35.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">93971e327f42ac0e6d177c5681b2bab44c83efc5cce4ed3f95b2f50db292b2c7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libtiff-tools" release="35.el7.tuxcare.els7" src="libtiff-4.0.3-35.el7.tuxcare.els7.src.rpm" version="4.0.3">
          <filename>libtiff-tools-4.0.3-35.el7.tuxcare.els7.x86_64.rpm</filename>
          <sum type="sha256">4463d3d419eefcdb4170d2c2aa9167fd0eda979e8024bd0955d4390245247793</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1772452097</id>
    <title>ImageMagick: Fix of 9 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-25798: fix NULL pointer dereference in ClonePixelCacheRepository
- CVE-2026-24481: fix heap information disclosure in PSD handler
- CVE-2026-25799: fix division-by-zero in YUV sampling factor validation
- CVE-2026-26284: fix out-of-bounds read in PCD Huffman decoder
- CVE-2026-25897: fix integer overflow in Sun decoder on 32-bit systems
- CVE-2026-26066: fix infinite loop in IPTCTEXT profile writing
- CVE-2026-26283: fix infinite loop in JPEG encoder extent binary search
- CVE-2026-25795: fix NULL pointer dereference in ReadSFWImage
- CVE-2026-25796: fix memory leak in ReadSTEGANOImage</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-25798: fix NULL pointer dereference in ClonePixelCacheRepository
- CVE-2026-24481: fix heap information disclosure in PSD handler
- CVE-2026-25799: fix division-by-zero in YUV sampling factor validation
- CVE-2026-26284: fix out-of-bounds read in PCD Huffman decoder
- CVE-2026-25897: fix integer overflow in Sun decoder on 32-bit systems
- CVE-2026-26066: fix infinite loop in IPTCTEXT profile writing
- CVE-2026-26283: fix infinite loop in JPEG encoder extent binary search
- CVE-2026-25795: fix NULL pointer dereference in ReadSFWImage
- CVE-2026-25796: fix memory leak in ReadSTEGANOImage</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-04 17:32:35 UTC" />
    <updated date="2026-03-04 17:32:35 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1772452097.html" id="CLSA-2026:1772452097" title="CLSA-2026:1772452097" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">930190ba0058d8be7143f4908f824b050eaaa5ea98a727e57593b7ce3b41ffd5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">db6d30c2f6e78b5a86dd4372556a5be8ce779052e4e02e2d8822f6b5b849e64d</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">f4ab138b0a72a3bb4bb4d9052c9e1c867ec5f984d69371f68cfa63d27cf0fb74</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">88c6ae1c95ce8d66b90e4e251a00c66457d08e35be09562203dee7e87e2b5b36</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">c830bca93919279fe272f17ee7bfabc3d9a52fea79b565d8d54d089293b68da7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">b872b324d4daba516633d6944c946dc4c4eb4cc3ecb9529199c43724444a8f17</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">e73269a6ae259d085a015a5603320caf291c5845980aa9f7df4b25ca441adc15</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">4df14658d35d0528e29239baed0ab2f5c9ecc60a2a2edfed1c5bff6415a2ece8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">1a61e29834bd34179f009ed799b6a084ff0fd4f5535a0d752befb7e0cc349536</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.0.3.el7_9.tuxcare.els5" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">2d6bbc2f6f7a0e662f4651ba9c160cfebc11985384bb5424d02138ce2c9e710e</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="bugfix" version="1">
    <id>CLSA-2026:1772645603</id>
    <title>Update of ca-certificates</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- update to CKBI 2.82 from NSS 3.120
- updated certificates:
-     # Certificate "GlobalSign Root CA"
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Comodo AAA Services root"
-     # Certificate "XRamp Global CA Root"
-     # Certificate "Go Daddy Class 2 CA"
-     # Certificate "Starfield Class 2 CA"
- removed certificates:
-     # Certificate "Baltimore CyberTrust Root"
-     # Certificate "Autoridad Certificadora Raiz de la Secretaria de Economia"
-     # Certificate "Certipost E-Trust TOP Root CA"
-     # Certificate "Swisscom Root CA 1"
-     # Certificate "A-Trust-nQual-03"
-     # Certificate "KISA RootCA 1"
- added certificates:
-     # Certificate "TrustAsia SMIME ECC Root CA"
-     # Certificate "TrustAsia SMIME RSA Root CA"
-     # Certificate "TrustAsia TLS ECC Root CA"
-     # Certificate "TrustAsia TLS RSA Root CA"
-     # Certificate "SwissSign RSA SMIME Root CA 2022 - 1"
-     # Certificate "SwissSign RSA TLS Root CA 2022 - 1"
-     # Certificate "OISTE Client Root ECC G1"
-     # Certificate "OISTE Client Root RSA G1"
-     # Certificate "OISTE Server Root ECC G1"
-     # Certificate " OISTE Server Root RSA G1"</description>
    <severity>None</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- update to CKBI 2.82 from NSS 3.120
- updated certificates:
-     # Certificate "GlobalSign Root CA"
-     # Certificate "Entrust.net Premium 2048 Secure Server CA"
-     # Certificate "Comodo AAA Services root"
-     # Certificate "XRamp Global CA Root"
-     # Certificate "Go Daddy Class 2 CA"
-     # Certificate "Starfield Class 2 CA"
- removed certificates:
-     # Certificate "Baltimore CyberTrust Root"
-     # Certificate "Autoridad Certificadora Raiz de la Secretaria de Economia"
-     # Certificate "Certipost E-Trust TOP Root CA"
-     # Certificate "Swisscom Root CA 1"
-     # Certificate "A-Trust-nQual-03"
-     # Certificate "KISA RootCA 1"
- added certificates:
-     # Certificate "TrustAsia SMIME ECC Root CA"
-     # Certificate "TrustAsia SMIME RSA Root CA"
-     # Certificate "TrustAsia TLS ECC Root CA"
-     # Certificate "TrustAsia TLS RSA Root CA"
-     # Certificate "SwissSign RSA SMIME Root CA 2022 - 1"
-     # Certificate "SwissSign RSA TLS Root CA 2022 - 1"
-     # Certificate "OISTE Client Root ECC G1"
-     # Certificate "OISTE Client Root RSA G1"
-     # Certificate "OISTE Server Root ECC G1"
-     # Certificate " OISTE Server Root RSA G1"</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-04 17:33:27 UTC" />
    <updated date="2026-03-04 17:33:27 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1772645603.html" id="CLSA-2026:1772645603" title="CLSA-2026:1772645603" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="ca-certificates" release="72.el7_9.tuxcare.els1" src="ca-certificates-2026.2.82_v7.0.306-72.el7_9.tuxcare.els1.src.rpm" version="2026.2.82_v7.0.306">
          <filename>ca-certificates-2026.2.82_v7.0.306-72.el7_9.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">8718e3609d0ebbf7d71251e867f57d5f933fc2d02e8cd46e2e1babda2891b695</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1772703383</id>
    <title>vim: Fix of CVE-2026-26269</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-26269: fix stack-based buffer overflow in NetBeans integration that
  could lead to a crash or arbitrary code execution via a malicious server.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-26269: fix stack-based buffer overflow in NetBeans integration that
  could lead to a crash or arbitrary code execution via a malicious server.</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-09 11:36:45 UTC" />
    <updated date="2026-03-09 11:36:45 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1772703383.html" id="CLSA-2026:1772703383" title="CLSA-2026:1772703383" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="vim-X11" release="8.0.1.el7_9.tuxcare.els2" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els2.src.rpm" version="7.4.629">
          <filename>vim-X11-7.4.629-8.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">62b4779db6754d73173be799435f82408a3f7e052b5166634eea37df7afde58e</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-common" release="8.0.1.el7_9.tuxcare.els2" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els2.src.rpm" version="7.4.629">
          <filename>vim-common-7.4.629-8.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">5b42e1b21cbfd1242f8a815ecc71f36b61803f29f4bfb33d96b25e41dbeb0c08</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-enhanced" release="8.0.1.el7_9.tuxcare.els2" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els2.src.rpm" version="7.4.629">
          <filename>vim-enhanced-7.4.629-8.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">d241eb5f8d48b389507c70fc80135dfad03648b6127ad4135de77219e074398d</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-filesystem" release="8.0.1.el7_9.tuxcare.els2" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els2.src.rpm" version="7.4.629">
          <filename>vim-filesystem-7.4.629-8.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">ce3d9441f284e64a156bf08bbc185a96754676d7371d115726658f20328ac322</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-minimal" release="8.0.1.el7_9.tuxcare.els2" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els2.src.rpm" version="7.4.629">
          <filename>vim-minimal-7.4.629-8.0.1.el7_9.tuxcare.els2.x86_64.rpm</filename>
          <sum type="sha256">a1c21745dfa7207887f44522f8f4642ae2d0c1c72e4cd3549e29714bf59a86fe</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1773056241</id>
    <title>kernel: Fix of 21 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path {CVE-2025-39911}
- media: rc: fix races with imon_disconnect() {CVE-2025-39993}
- VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify {CVE-2025-38102}
- partitions: mac: fix handling of bogus partition table {CVE-2025-21772}
- tracing: Fix oob write in trace_seq_to_buffer() {CVE-2025-37923}
- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE {CVE-2025-40277}
- Bluetooth: fix use-after-free in device_for_each_child() {CVE-2024-53237}
- net/atm: remove the atmdev_ops {get, set}sockopt methods {CVE-2022-50410}
- i40e: add validation for ring_len param {CVE-2025-39973}
- vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248}
- sctp: avoid NULL dereference when chunk data buffer is missing {CVE-2025-40240}
- nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() {CVE-2025-38724}
- VMCI: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF {CVE-2023-53259}
- wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() {CVE-2024-58014}
- isofs: Prevent the use of too small fid {CVE-2025-37780}
- net: ppp: Add bound checking for skb data on ppp_sync_txmung {CVE-2025-37749}
- Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() {CVE-2025-39860}
- i40e: Fix potential invalid access when MAC list is empty {CVE-2025-39853}
- ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249}
- fbdev: bitblit: bound-check glyph index in bit_putcs* {CVE-2025-40322}
- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds {CVE-2025-40304}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path {CVE-2025-39911}
- media: rc: fix races with imon_disconnect() {CVE-2025-39993}
- VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify {CVE-2025-38102}
- partitions: mac: fix handling of bogus partition table {CVE-2025-21772}
- tracing: Fix oob write in trace_seq_to_buffer() {CVE-2025-37923}
- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE {CVE-2025-40277}
- Bluetooth: fix use-after-free in device_for_each_child() {CVE-2024-53237}
- net/atm: remove the atmdev_ops {get, set}sockopt methods {CVE-2022-50410}
- i40e: add validation for ring_len param {CVE-2025-39973}
- vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248}
- sctp: avoid NULL dereference when chunk data buffer is missing {CVE-2025-40240}
- nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() {CVE-2025-38724}
- VMCI: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF {CVE-2023-53259}
- wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() {CVE-2024-58014}
- isofs: Prevent the use of too small fid {CVE-2025-37780}
- net: ppp: Add bound checking for skb data on ppp_sync_txmung {CVE-2025-37749}
- Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() {CVE-2025-39860}
- i40e: Fix potential invalid access when MAC list is empty {CVE-2025-39853}
- ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249}
- fbdev: bitblit: bound-check glyph index in bit_putcs* {CVE-2025-40322}
- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds {CVE-2025-40304}</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-09 11:37:25 UTC" />
    <updated date="2026-03-09 11:37:25 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1773056241.html" id="CLSA-2026:1773056241" title="CLSA-2026:1773056241" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">a67c07106d1e618a7042a0df154ca35b91ee9579542a9d18ff01ed56737d1dce</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">d889757dfcb8cc0a31164ec74eda4ea57f01a1703acb46d09b2503acbc355be3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">afd27c1b5b8136f4c14d06a9ebc22983f4b4f198509663f85542937c3436dc8c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">c434fecc8ffde4325d5f90e5019f39551c01802c73df2e698114f01c68c759b3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">86be608bcb04c14334ad853ad3b64215853b0ec3eea9c0f6f03e00911ce1b790</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">7a4b458d7871c29b3a176220eef45ae49898ce06c9f1c4df807642cf1a18a354</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">e02fbe9f3dc07d3ef038550434c56013e3cfc552bc47c4adf4567a0a5509b94d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">3f4869a3fa6a3dae3cca8c441a53cf7a8163c9435eed47e083a894928c7894e3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">3a096755498bb83637b588e5a63b1968bff8792b1fabd8f462e2a8ec0ce091d8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">b8071ae96a505805fbc83f2c99bb64429daa4054dfbb2781551e7681c15e3c22</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.144.1.el7.tuxcare.els3" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els3.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.144.1.el7.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">f5530a3e880b0cf173143c191f407398a3f0d4e0727abbc1705de6e642e8563c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1773480241</id>
    <title>python: Fix of CVE-2025-12084</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-12084: fix quadratic algorithm when building nested XML
  elements with appendChild</description>
    <severity>Moderate</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-12084: fix quadratic algorithm when building nested XML
  elements with appendChild</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-14 16:53:05 UTC" />
    <updated date="2026-03-14 16:53:05 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1773480241.html" id="CLSA-2026:1773480241" title="CLSA-2026:1773480241" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="94.0.1.el7_9.tuxcare.els4" src="python-2.7.5-94.0.1.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-2.7.5-94.0.1.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">f0719dfec969fd92fcd8a0bfba705217b9be07f1fa889c815288a503135386a0</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="94.0.1.el7_9.tuxcare.els4" src="python-2.7.5-94.0.1.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-94.0.1.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">8556f4e1e6989a5eb6689a5566c2a45eaa42bb4a745d7600b7578a1b245b3495</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="94.0.1.el7_9.tuxcare.els4" src="python-2.7.5-94.0.1.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-94.0.1.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">30a8ee85b7bab7ac33a886cdf585f4b6c349ec46187caa779ed99755b11eb0ec</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="94.0.1.el7_9.tuxcare.els4" src="python-2.7.5-94.0.1.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.0.1.el7_9.tuxcare.els4.i686.rpm</filename>
          <sum type="sha256">bd7698bbeaf31af0a1fcbb843f571636c95b831e9ded9cb84b5dff0d7f48544e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="94.0.1.el7_9.tuxcare.els4" src="python-2.7.5-94.0.1.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.0.1.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">09d61f3358094f7c24d18fb6babf41f5ca14db2857c479221a8bda6bbd8fbb3b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="94.0.1.el7_9.tuxcare.els4" src="python-2.7.5-94.0.1.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-94.0.1.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">9da628efde02ae758dbea1f8fb8af27e67ef74fb0379d31f35e5f9d180336fe1</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="94.0.1.el7_9.tuxcare.els4" src="python-2.7.5-94.0.1.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-94.0.1.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">283980e399649bff2226f6e59647d34afa7d21a2718e5f85c9f947c028ceb343</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="94.0.1.el7_9.tuxcare.els4" src="python-2.7.5-94.0.1.el7_9.tuxcare.els4.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-94.0.1.el7_9.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">83166d43e62746e9f02d7fc98d261c21c87cdd6bdb9c71024a486210003c25f5</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1774277303</id>
    <title>freerdp: Fix of CVE-2026-31806</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-31806: Fix heap buffer overflow in nsc_process_message</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-31806: Fix heap buffer overflow in nsc_process_message</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-23 14:48:28 UTC" />
    <updated date="2026-03-23 14:48:28 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1774277303.html" id="CLSA-2026:1774277303" title="CLSA-2026:1774277303" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els17" src="freerdp-2.1.1-5.el7_9.tuxcare.els17.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">db461f1efa1818a8e2723c045d8c763eac6c07a6e64c1665d83b41a97ba00143</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els17" src="freerdp-2.1.1-5.el7_9.tuxcare.els17.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els17.i686.rpm</filename>
          <sum type="sha256">a0f2e08ea5540ef93556ed0642e020c7e571eba93778bf6eb65e1a62ed69937f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els17" src="freerdp-2.1.1-5.el7_9.tuxcare.els17.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">83bb215246e8416e7566cab0d6e54d162ab89f2f34f428fd703cb7d0f524e9be</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els17" src="freerdp-2.1.1-5.el7_9.tuxcare.els17.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els17.i686.rpm</filename>
          <sum type="sha256">aec88d514bcc88322e61046e215d23ddc33ca5e523e178ca0d4a7bade8028609</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els17" src="freerdp-2.1.1-5.el7_9.tuxcare.els17.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">9cf8e79f26b1b262974c8523c5c1597e2dd196a4e7df936ebe723495fc8da11a</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els17" src="freerdp-2.1.1-5.el7_9.tuxcare.els17.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els17.i686.rpm</filename>
          <sum type="sha256">061bb6b63b2f70c6bc21f7e4ef180911fed2ec8099e954d2aade71c39a296000</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els17" src="freerdp-2.1.1-5.el7_9.tuxcare.els17.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">220c74a8c06d5029b3b26e914ea6aae073a903c815d094a94116c0ce7aff3c40</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els17" src="freerdp-2.1.1-5.el7_9.tuxcare.els17.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els17.i686.rpm</filename>
          <sum type="sha256">3aa43920c8503a08b2c17a011472848ce8cebc21d8a150b6aaaf0b918a831ff4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els17" src="freerdp-2.1.1-5.el7_9.tuxcare.els17.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els17.x86_64.rpm</filename>
          <sum type="sha256">486c901a476ee5b4577496b56f84d533930f1ae002b89079ae2723d5fdd1bfcc</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1774262622</id>
    <title>ImageMagick: Fix of CVE-2026-25983</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-25983: fix use-after-free in MSL decoder repage/roll handlers</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-25983: fix use-after-free in MSL decoder repage/roll handlers</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-23 14:49:20 UTC" />
    <updated date="2026-03-23 14:49:20 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1774262622.html" id="CLSA-2026:1774262622" title="CLSA-2026:1774262622" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">549b94d56ea2e88142dc7f16aa0089a153e94950bdbe1a8fede9ef98f9db8bb8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">200788d8c9a023a5f8d1ce9c78a27c9dea8fb7e62581768b80986e208f5aef03</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">8a299322060412884481188d5548f3eb114573a35c7a7d12a5fe83742922856d</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">74d7fdd745f12cc4dd52d7b2a7ec9bf8a8b2e8b02c48e5cb8d055ed4bc1f4ef4</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">08e4c5e6b2e9d8beab5a6f178090a1c3dad4b725ede76716201467673829154b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">6459a35117daaa51d8d692d5001eb45cfee8c601c189f419b3a3dd1f9fa5fbc1</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els8.i686.rpm</filename>
          <sum type="sha256">e3ded929264ff49b243bdb8051cca31755bdbcef02101becff0c9b100d9a35bd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">446161748cfd1224fd30e8a907e21d4479d99f3ac1fb7ddc6686a086809ed439</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">cdf8e0110238b9d233831be05f1ffc12927f5edc5feb0a7d179ce063e02b966c</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.0.3.el7_9.tuxcare.els8" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els8.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els8.x86_64.rpm</filename>
          <sum type="sha256">76a42330829358a026cf89d93671bb9a7934cb05042aef5849b308b43defe18a</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1774269500</id>
    <title>icu: Fix of CVE-2025-5222</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-5222: Fix stack buffer overflow in addTag handling that allowed
  subtag struct overflow leading to memory corruption and local arbitrary code
  execution</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-5222: Fix stack buffer overflow in addTag handling that allowed
  subtag struct overflow leading to memory corruption and local arbitrary code
  execution</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-23 14:50:17 UTC" />
    <updated date="2026-03-23 14:50:17 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1774269500.html" id="CLSA-2026:1774269500" title="CLSA-2026:1774269500" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="icu" release="4.el7_7.tuxcare.els1" src="icu-50.2-4.el7_7.tuxcare.els1.src.rpm" version="50.2">
          <filename>icu-50.2-4.el7_7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">1b261a2b758812883fbbe6f5bf09de94f0e53938e647acfd02901741b9dde59b</sum>
        </package>
        <package arch="i686" epoch="0" name="libicu" release="4.el7_7.tuxcare.els1" src="icu-50.2-4.el7_7.tuxcare.els1.src.rpm" version="50.2">
          <filename>libicu-50.2-4.el7_7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">d8db91ed0bba9453851b3ca4c0ca06c7dd5b52d06f34e5663c70d35da7fc0d14</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libicu" release="4.el7_7.tuxcare.els1" src="icu-50.2-4.el7_7.tuxcare.els1.src.rpm" version="50.2">
          <filename>libicu-50.2-4.el7_7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">7e96be45e5f40056cf627503813479ef1441117f318d708489f46e87b103879f</sum>
        </package>
        <package arch="i686" epoch="0" name="libicu-devel" release="4.el7_7.tuxcare.els1" src="icu-50.2-4.el7_7.tuxcare.els1.src.rpm" version="50.2">
          <filename>libicu-devel-50.2-4.el7_7.tuxcare.els1.i686.rpm</filename>
          <sum type="sha256">1e9a8eb7de7352dc9edb92f2ca5dedaaa0def028e8e16445f9e7be00ee0745ee</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libicu-devel" release="4.el7_7.tuxcare.els1" src="icu-50.2-4.el7_7.tuxcare.els1.src.rpm" version="50.2">
          <filename>libicu-devel-50.2-4.el7_7.tuxcare.els1.x86_64.rpm</filename>
          <sum type="sha256">c33c8be5db6c156b0427f17613d3f00c32d35f74b17db3d088322fe3e2c466ee</sum>
        </package>
        <package arch="noarch" epoch="0" name="libicu-doc" release="4.el7_7.tuxcare.els1" src="icu-50.2-4.el7_7.tuxcare.els1.src.rpm" version="50.2">
          <filename>libicu-doc-50.2-4.el7_7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">a499a8fcf9defc02b39da07a9e78307470f004816a2066adf0f981902cbbf419</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1773925534</id>
    <title>expat: Fix of CVE-2026-25210</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- Fix CVE-2026-25210: integer overflow in doContent tag buffer reallocation</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- Fix CVE-2026-25210: integer overflow in doContent tag buffer reallocation</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-23 14:50:55 UTC" />
    <updated date="2026-03-23 14:50:55 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1773925534.html" id="CLSA-2026:1773925534" title="CLSA-2026:1773925534" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="expat" release="15.0.1.el7_9.tuxcare.els3" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els3.src.rpm" version="2.1.0">
          <filename>expat-2.1.0-15.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">91a0a0656de82cf11c71e5d50bfb8fce0945d63ec29a2c246a3eabc6e08dffa9</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat" release="15.0.1.el7_9.tuxcare.els3" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els3.src.rpm" version="2.1.0">
          <filename>expat-2.1.0-15.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">5c857d0b4a0a775783957e12e4d76edcae6f2cc0011050d4790ddcb3629c271c</sum>
        </package>
        <package arch="i686" epoch="0" name="expat-devel" release="15.0.1.el7_9.tuxcare.els3" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els3.src.rpm" version="2.1.0">
          <filename>expat-devel-2.1.0-15.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">9aaaa8236c70b70c3137746b919f599f70af6274ac28ca7a4c86ad5279d3f3b8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat-devel" release="15.0.1.el7_9.tuxcare.els3" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els3.src.rpm" version="2.1.0">
          <filename>expat-devel-2.1.0-15.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">5ed0bfbf806445abd5e3d35c7555013c2fc22d30a889f8eced65c8867c431f01</sum>
        </package>
        <package arch="i686" epoch="0" name="expat-static" release="15.0.1.el7_9.tuxcare.els3" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els3.src.rpm" version="2.1.0">
          <filename>expat-static-2.1.0-15.0.1.el7_9.tuxcare.els3.i686.rpm</filename>
          <sum type="sha256">4fb31703db934346648232240105879e8a882e9467968ee0cb8e611b5e6d342a</sum>
        </package>
        <package arch="x86_64" epoch="0" name="expat-static" release="15.0.1.el7_9.tuxcare.els3" src="expat-2.1.0-15.0.1.el7_9.tuxcare.els3.src.rpm" version="2.1.0">
          <filename>expat-static-2.1.0-15.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">273d0d6d4afdf4cb3b3a9053747342fa696303179f94db3c54374ee517119ace</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1774438942</id>
    <title>freerdp: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-29774: heap buffer overflow in H.264 AVC420/AVC444 YUV-to-RGB conversion
- CVE-2026-31884: division by zero in ADPCM decoders when nBlockAlign is 0
- CVE-2026-29775: off-by-one in bitmap_cache_put</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-29774: heap buffer overflow in H.264 AVC420/AVC444 YUV-to-RGB conversion
- CVE-2026-31884: division by zero in ADPCM decoders when nBlockAlign is 0
- CVE-2026-29775: off-by-one in bitmap_cache_put</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-27 12:29:24 UTC" />
    <updated date="2026-03-27 12:29:24 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1774438942.html" id="CLSA-2026:1774438942" title="CLSA-2026:1774438942" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els18" src="freerdp-2.1.1-5.el7_9.tuxcare.els18.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">aa25e53f980544a7727ddd274ddc85f59b5fa63c88f5851cd24e0c018207b83a</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els18" src="freerdp-2.1.1-5.el7_9.tuxcare.els18.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els18.i686.rpm</filename>
          <sum type="sha256">e3b8ed7cc94308061463c1bd8af2b89c363447d9e80e4ff25df8bace13ce9b08</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els18" src="freerdp-2.1.1-5.el7_9.tuxcare.els18.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">f81cb15d476e08564e1e382b20f913b3bf8a8fd215f2d680778e4157cf052a0d</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els18" src="freerdp-2.1.1-5.el7_9.tuxcare.els18.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els18.i686.rpm</filename>
          <sum type="sha256">fddcc90517530f9d4d170bcd173d04e511986d0064f6e4041d004a5b7353728f</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els18" src="freerdp-2.1.1-5.el7_9.tuxcare.els18.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">b1ca4a7bf9beeaf7e8f026668854dbcc0856c8c889dda3475eab44fd8081ad91</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els18" src="freerdp-2.1.1-5.el7_9.tuxcare.els18.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els18.i686.rpm</filename>
          <sum type="sha256">e49e993e589c73aa28a3cbbede88b62f77c0576775f0b13b0e440a239565b771</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els18" src="freerdp-2.1.1-5.el7_9.tuxcare.els18.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">e027b939345581c201b39e5a440a40bfc29e5b8b91ca5faf9eea401d252a68fb</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els18" src="freerdp-2.1.1-5.el7_9.tuxcare.els18.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els18.i686.rpm</filename>
          <sum type="sha256">9022f7727e9878272ec34a324123a5989ee7deafd68b3aae9b3e03bd581a94b2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els18" src="freerdp-2.1.1-5.el7_9.tuxcare.els18.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els18.x86_64.rpm</filename>
          <sum type="sha256">4030281e895bf37b338da7ff2db015d8738248e5241941931b804869fabec698</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1774614606</id>
    <title>python3: Fix of CVE-2025-15366</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-15366: reject control characters in IMAP commands</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-15366: reject control characters in IMAP commands</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-27 12:30:10 UTC" />
    <updated date="2026-03-27 12:30:10 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1774614606.html" id="CLSA-2026:1774614606" title="CLSA-2026:1774614606" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="python3" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">432cd23f8c32fd58e260a80facce4ff2da99447a7907097ee621567e0b0b7029</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-3.6.8-21.0.5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">9c6fa5dfd19ea02b18a39046aa8985e64b1631fa78e4c8032560b691aceeec3c</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-debug" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">5a0681c10069072a9152e53029013e0b363846b79bf02931a831383003c51122</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-debug" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-debug-3.6.8-21.0.5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">4d60680d11ba5f73b899f7188cdb27c4cd0018136faf2d5012bdcd94ae749bcf</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-devel" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">71bbb6f7e777d387d964c53817b54f33ac43459a449d4fe0003beb77b8721758</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-devel" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-devel-3.6.8-21.0.5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">1c6543a07760baeedbb51445c77cbb7d7c9de5abab9b01fdf3fae75ab35666b3</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-idle" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">3599e69d09e23bce91e56d1217ef080de5b0fe97531be4a4fcdaebfe27cfde74</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-idle" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-idle-3.6.8-21.0.5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">367e2f2e8603df6a7a558cfde51b9c4e48f314c145328c7623a8d2427ed1ab97</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-libs" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">4106e55fdae192eda3dcd82c40849523493a75c12ef42b7bc613f65c54aed2bd</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-libs" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-libs-3.6.8-21.0.5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">47a326ef649645ff3976bedfe107ff183b8d4ee0010b648c446425669e4803fd</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-test" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">e55c6314351e25e8a08812c4d48a861da630516e3379c598f511769109b95c02</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-test" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-test-3.6.8-21.0.5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">c68b2337e36be1d5d9aac53761dccfb9f6011344cb4541d4b82513e2e2d145f1</sum>
        </package>
        <package arch="i686" epoch="0" name="python3-tkinter" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.5.el7_9.tuxcare.els5.i686.rpm</filename>
          <sum type="sha256">3c0c3a30eda72224926765b50baef222b51731c795637c93705aab2e6a8a2229</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python3-tkinter" release="21.0.5.el7_9.tuxcare.els5" src="python3-3.6.8-21.0.5.el7_9.tuxcare.els5.src.rpm" version="3.6.8">
          <filename>python3-tkinter-3.6.8-21.0.5.el7_9.tuxcare.els5.x86_64.rpm</filename>
          <sum type="sha256">20dcb11ccc293e325ebd0c383f8c202883ee22058c5a28a77dc19004f0375da9</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1774525825</id>
    <title>vim: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-28417: fix OS command injection in netrw plugin via crafted
  scp:// URIs by adding strict RFC1123 hostname validation and using
  shellescape() for hostname and port values.
- CVE-2026-28421: fix heap-buffer-overflow and SEGV in swap file recovery
  by adding bounds checks on pe_page_count, pe_bnum, pe_old_lnum and
  pe_line_count before descending into the block tree.</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-28417: fix OS command injection in netrw plugin via crafted
  scp:// URIs by adding strict RFC1123 hostname validation and using
  shellescape() for hostname and port values.
- CVE-2026-28421: fix heap-buffer-overflow and SEGV in swap file recovery
  by adding bounds checks on pe_page_count, pe_bnum, pe_old_lnum and
  pe_line_count before descending into the block tree.</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-27 12:31:14 UTC" />
    <updated date="2026-03-27 12:31:14 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1774525825.html" id="CLSA-2026:1774525825" title="CLSA-2026:1774525825" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="2" name="vim-X11" release="8.0.1.el7_9.tuxcare.els3" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els3.src.rpm" version="7.4.629">
          <filename>vim-X11-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">1a21d86168ecb1d830c768242a253af20ade5a805b5631325050f54a39a97b76</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-common" release="8.0.1.el7_9.tuxcare.els3" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els3.src.rpm" version="7.4.629">
          <filename>vim-common-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">6553b5fe226555a97613b811e61ddf10045a82ea82f18d8e1c4b6da021f03f4b</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-enhanced" release="8.0.1.el7_9.tuxcare.els3" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els3.src.rpm" version="7.4.629">
          <filename>vim-enhanced-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">dea589b34e2651ccd72db5c18df0021c06f04f38498b3ca21e9a622dddd30963</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-filesystem" release="8.0.1.el7_9.tuxcare.els3" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els3.src.rpm" version="7.4.629">
          <filename>vim-filesystem-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">062ae74da9d918f9ebb6d8d3bdb89a9cee4f6f2a52e0a4fa54472c674c300fc6</sum>
        </package>
        <package arch="x86_64" epoch="2" name="vim-minimal" release="8.0.1.el7_9.tuxcare.els3" src="vim-7.4.629-8.0.1.el7_9.tuxcare.els3.src.rpm" version="7.4.629">
          <filename>vim-minimal-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm</filename>
          <sum type="sha256">fefab4da22fc22c29d1f34f2e7f2acd219003e0a939cb40a862566d49fb31d93</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1774431305</id>
    <title>python-pyasn1: Fix of CVE-2026-23490</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-23490: fix DoS when malicious stream parsed</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-23490: fix DoS when malicious stream parsed</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-27 12:32:01 UTC" />
    <updated date="2026-03-27 12:32:01 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1774431305.html" id="CLSA-2026:1774431305" title="CLSA-2026:1774431305" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python2-pyasn1" release="7.el7.tuxcare.els1" src="python-pyasn1-0.1.9-7.el7.tuxcare.els1.src.rpm" version="0.1.9">
          <filename>python2-pyasn1-0.1.9-7.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">a3b1f298ec2f104c15e7743a9e9e5e5ee57f24c21a36cd5231cb7e4c5c2da7dd</sum>
        </package>
        <package arch="noarch" epoch="0" name="python2-pyasn1-modules" release="7.el7.tuxcare.els1" src="python-pyasn1-0.1.9-7.el7.tuxcare.els1.src.rpm" version="0.1.9">
          <filename>python2-pyasn1-modules-0.1.9-7.el7.tuxcare.els1.noarch.rpm</filename>
          <sum type="sha256">3cae09ef033cd1ad905881691174d74b3a795b1285d1eb1bdfb9f123f372c404</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1774874764</id>
    <title>squid: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-33526: fix heap use-after-free due to double rfc1738_escape in ICP error handling
- CVE-2026-33515: fix validation of ICP packet sizes and URLs to prevent out-of-bounds reads
- CVE-2026-32748: fix HttpRequest use-after-free in ICP v3 query handling</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-33526: fix heap use-after-free due to double rfc1738_escape in ICP error handling
- CVE-2026-33515: fix validation of ICP packet sizes and URLs to prevent out-of-bounds reads
- CVE-2026-32748: fix HttpRequest use-after-free in ICP v3 query handling</summary>
    <pushcount>0</pushcount>
    <issued date="2026-03-31 08:46:19 UTC" />
    <updated date="2026-03-31 08:46:19 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1774874764.html" id="CLSA-2026:1774874764" title="CLSA-2026:1774874764" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="7" name="squid" release="17.0.5.el7_9.99.tuxcare.els4" src="squid-3.5.20-17.0.5.el7_9.99.tuxcare.els4.src.rpm" version="3.5.20">
          <filename>squid-3.5.20-17.0.5.el7_9.99.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">ea2b2ffc4c29da8ebaa17ff77b982006d2259b3581aa89bd709ae17077f554eb</sum>
        </package>
        <package arch="x86_64" epoch="7" name="squid-migration-script" release="17.0.5.el7_9.99.tuxcare.els4" src="squid-3.5.20-17.0.5.el7_9.99.tuxcare.els4.src.rpm" version="3.5.20">
          <filename>squid-migration-script-3.5.20-17.0.5.el7_9.99.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">050a6ac7c4faddf994997455d5ebeca18e3b1651bd49de370c9e5afb37041ca1</sum>
        </package>
        <package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.0.5.el7_9.99.tuxcare.els4" src="squid-3.5.20-17.0.5.el7_9.99.tuxcare.els4.src.rpm" version="3.5.20">
          <filename>squid-sysvinit-3.5.20-17.0.5.el7_9.99.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">b511cc239e0af8c8f43489d128ee4d2b02a3d7b815984e520b5dab95a18e4304</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1775223344</id>
    <title>freerdp: Fix of 3 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2023-39355: fix use-after-free in RDPGFX_CMDID_RESETGRAPHICS handling when
  context-&gt;maxPlaneSize == 0; update context-&gt;planesBuffer after free and
  prevent access to freed memory
- CVE-2026-26965: fix heap out-of-bounds write in RLE planar decode that permit
  attacker-controlled pixel data and offset overwrite adjacent function pointer;
  validate (nYDst+nSrcHeight) and (nXDst+nSrcWidth) against destination bounds
  and ensure writes use correct buffer, prevent OOB write
- CVE-2026-26955: fix heap buffer overflow in GDI surface pipeline caused by
  out-of-bounds ClearCodec destination rectangle; add top-level guard in
  clear_decompress() to validate nXDst/nYDst against destination surface
  dimensions protecting all code paths (bands, residual, glyph, subcodec);
  fix subcodec bounds checks to compare against destination dimensions</description>
    <severity>Critical</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2023-39355: fix use-after-free in RDPGFX_CMDID_RESETGRAPHICS handling when
  context-&gt;maxPlaneSize == 0; update context-&gt;planesBuffer after free and
  prevent access to freed memory
- CVE-2026-26965: fix heap out-of-bounds write in RLE planar decode that permit
  attacker-controlled pixel data and offset overwrite adjacent function pointer;
  validate (nYDst+nSrcHeight) and (nXDst+nSrcWidth) against destination bounds
  and ensure writes use correct buffer, prevent OOB write
- CVE-2026-26955: fix heap buffer overflow in GDI surface pipeline caused by
  out-of-bounds ClearCodec destination rectangle; add top-level guard in
  clear_decompress() to validate nXDst/nYDst against destination surface
  dimensions protecting all code paths (bands, residual, glyph, subcodec);
  fix subcodec bounds checks to compare against destination dimensions</summary>
    <pushcount>0</pushcount>
    <issued date="2026-04-10 16:18:55 UTC" />
    <updated date="2026-04-10 16:18:55 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1775223344.html" id="CLSA-2026:1775223344" title="CLSA-2026:1775223344" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="freerdp" release="5.el7_9.tuxcare.els19" src="freerdp-2.1.1-5.el7_9.tuxcare.els19.src.rpm" version="2.1.1">
          <filename>freerdp-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">7f138eb936e1327cd949f3807a46eafd334b00f53d44fad9a4fdcffb13c85987</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els19" src="freerdp-2.1.1-5.el7_9.tuxcare.els19.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els19.i686.rpm</filename>
          <sum type="sha256">ad3c20c044b0cf6cc40894dffd38c676700aff653bab4669fab384a9ec39f460</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-devel" release="5.el7_9.tuxcare.els19" src="freerdp-2.1.1-5.el7_9.tuxcare.els19.src.rpm" version="2.1.1">
          <filename>freerdp-devel-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">6d290eb0ad5c3191f38fe2bbcb89c1e30d14d87182e42928ee3fbf647f7db208</sum>
        </package>
        <package arch="i686" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els19" src="freerdp-2.1.1-5.el7_9.tuxcare.els19.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els19.i686.rpm</filename>
          <sum type="sha256">a8a75fe200f33574491b4092932990850b6f8e2972845657f3d11fc46908a3f2</sum>
        </package>
        <package arch="x86_64" epoch="0" name="freerdp-libs" release="5.el7_9.tuxcare.els19" src="freerdp-2.1.1-5.el7_9.tuxcare.els19.src.rpm" version="2.1.1">
          <filename>freerdp-libs-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">5629459dbabed1832d497b0ede4e721e54c2dd994640e50649074bddf0653465</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els19" src="freerdp-2.1.1-5.el7_9.tuxcare.els19.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els19.i686.rpm</filename>
          <sum type="sha256">ee27c57807c3a6a3d4818441397215d3894c64b43b850076d65f9887f1bd99fb</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr" release="5.el7_9.tuxcare.els19" src="freerdp-2.1.1-5.el7_9.tuxcare.els19.src.rpm" version="2.1.1">
          <filename>libwinpr-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">dffb3c8153d4bb33032cde3bceac28491d2c214194ec57038cbc45bb4a0a2d46</sum>
        </package>
        <package arch="i686" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els19" src="freerdp-2.1.1-5.el7_9.tuxcare.els19.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els19.i686.rpm</filename>
          <sum type="sha256">fd5d36fa01f046a51772d377257677b6ad266bac74d24dd49fcdf21b61541fa3</sum>
        </package>
        <package arch="x86_64" epoch="0" name="libwinpr-devel" release="5.el7_9.tuxcare.els19" src="freerdp-2.1.1-5.el7_9.tuxcare.els19.src.rpm" version="2.1.1">
          <filename>libwinpr-devel-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm</filename>
          <sum type="sha256">f3316af59ced867dfea5e8ffb1a5b76392b84bd53f0f1a4c7a8392f4c8b3b1c2</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1775121288</id>
    <title>ImageMagick: Fix of 7 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2026-28494: fix stack buffer overflow in morphology kernel parsing
- CVE-2026-28691: fix uninitialized pointer dereference in JBIG decoder
- CVE-2026-25989: fix off-by-one boundary check in CastDoubleToLong
- CVE-2026-25985: fix memory allocation without limits in SVG decoder
- CVE-2026-24485: fix infinite loop in PCD decoder
- CVE-2025-66628: fix integer overflow in TIM decoder on 32-bit systems
- CVE-2026-28693: fix integer overflow in DIB/BMP coder</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2026-28494: fix stack buffer overflow in morphology kernel parsing
- CVE-2026-28691: fix uninitialized pointer dereference in JBIG decoder
- CVE-2026-25989: fix off-by-one boundary check in CastDoubleToLong
- CVE-2026-25985: fix memory allocation without limits in SVG decoder
- CVE-2026-24485: fix infinite loop in PCD decoder
- CVE-2025-66628: fix integer overflow in TIM decoder on 32-bit systems
- CVE-2026-28693: fix integer overflow in DIB/BMP coder</summary>
    <pushcount>0</pushcount>
    <issued date="2026-04-03 13:36:40 UTC" />
    <updated date="2026-04-03 13:36:40 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1775121288.html" id="CLSA-2026:1775121288" title="CLSA-2026:1775121288" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="i686" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm</filename>
          <sum type="sha256">3da164fa6fed35bea0e46eccfd2b12421ff20f4873243f1cd36d5ad9faf0172e</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">635c04da62bba39df6acf92807e80ebe2bf186c4b55b76cde0eb6a0b702f9417</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm</filename>
          <sum type="sha256">a157085d243ae08eb5ccbc20b67bf2f86e2e26909abcaa7d415d0eb9ac158ccc</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">db9ae6f3b5f69c4a0cd01650ebf934bd7b9efedf802f9f6dfe5127de78e34f44</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm</filename>
          <sum type="sha256">c425d8472872ac24943ed6be2fad641680be9b37550be5f6032a62ba4baaab47</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-c++-devel" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">311dcafc429c892a446558290b15b38cfceb66e07233de397064b92bde5b11ac</sum>
        </package>
        <package arch="i686" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm</filename>
          <sum type="sha256">4bfa8a7136b1ac5c874dca39e616048ffca07c0d58819b5466fccdc3a5052d9b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-devel" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">eb18e84c50ed77aa8c49521c2b98fbdac339ddf3bb0f306468677886895d91f8</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-doc" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">acbf00de79b6382588be220f270fd8b226c0afd29cbbc751e8b8e7c9d33fa2ba</sum>
        </package>
        <package arch="x86_64" epoch="0" name="ImageMagick-perl" release="7.0.3.el7_9.tuxcare.els9" src="ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.src.rpm" version="6.9.10.68">
          <filename>ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm</filename>
          <sum type="sha256">6f080ccd03291b46b6e6eccf13e8dffb40ff4a1a33399d8b281feea5a10ed8b2</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1775222005</id>
    <title>python: Fix of CVE-2025-15367</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-15367: reject control characters in POP3 commands to prevent
  command injection via newlines</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-15367: reject control characters in POP3 commands to prevent
  command injection via newlines</summary>
    <pushcount>0</pushcount>
    <issued date="2026-04-03 13:37:30 UTC" />
    <updated date="2026-04-03 13:37:30 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1775222005.html" id="CLSA-2026:1775222005" title="CLSA-2026:1775222005" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="python" release="94.0.1.el7_9.tuxcare.els6" src="python-2.7.5-94.0.1.el7_9.tuxcare.els6.src.rpm" version="2.7.5">
          <filename>python-2.7.5-94.0.1.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">907755715a6e8bc5ff0a0be207f1e36b9c0469388cb04f44bc7478af638df095</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-debug" release="94.0.1.el7_9.tuxcare.els6" src="python-2.7.5-94.0.1.el7_9.tuxcare.els6.src.rpm" version="2.7.5">
          <filename>python-debug-2.7.5-94.0.1.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">ff83a4102ef5b4082453c6b6ec77096e160fee2f871e1f6e7a9e9812085a4071</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-devel" release="94.0.1.el7_9.tuxcare.els6" src="python-2.7.5-94.0.1.el7_9.tuxcare.els6.src.rpm" version="2.7.5">
          <filename>python-devel-2.7.5-94.0.1.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">fe053e1793ba2f378aa7b7ebb541f8bfb0b25ad988e76cb8b47b7dd7d75a7b91</sum>
        </package>
        <package arch="i686" epoch="0" name="python-libs" release="94.0.1.el7_9.tuxcare.els6" src="python-2.7.5-94.0.1.el7_9.tuxcare.els6.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.0.1.el7_9.tuxcare.els6.i686.rpm</filename>
          <sum type="sha256">2d16e50bcf33d3c95804f8691eaf87118d5d395e2c84536e819ae49cb15c05c6</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-libs" release="94.0.1.el7_9.tuxcare.els6" src="python-2.7.5-94.0.1.el7_9.tuxcare.els6.src.rpm" version="2.7.5">
          <filename>python-libs-2.7.5-94.0.1.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">9229b1bd9a966f33e08b5210e49049a927ae5d94a5f497c55c343f2729fe7ade</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-test" release="94.0.1.el7_9.tuxcare.els6" src="python-2.7.5-94.0.1.el7_9.tuxcare.els6.src.rpm" version="2.7.5">
          <filename>python-test-2.7.5-94.0.1.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">eb67744d7b83e7debbd208842d3f4918d844aaae73afa495ee044fa9d8093cd4</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-tools" release="94.0.1.el7_9.tuxcare.els6" src="python-2.7.5-94.0.1.el7_9.tuxcare.els6.src.rpm" version="2.7.5">
          <filename>python-tools-2.7.5-94.0.1.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">caa7f44d27a54bd11759a79a80f24af31a8bb50c7934a3a86878b2b39f20c105</sum>
        </package>
        <package arch="x86_64" epoch="0" name="tkinter" release="94.0.1.el7_9.tuxcare.els6" src="python-2.7.5-94.0.1.el7_9.tuxcare.els6.src.rpm" version="2.7.5">
          <filename>tkinter-2.7.5-94.0.1.el7_9.tuxcare.els6.x86_64.rpm</filename>
          <sum type="sha256">88594ff99cd26cb6f686f88cec2ff7d0d58679f5c5d390aa5d17afcd90caddde</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1775657929</id>
    <title>kernel: Fix of 9 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- ovl: Filter invalid inodes with missing lookup function {CVE-2024-56570}
- ALSA: aloop: Fix racy access at PCM trigger {CVE-2026-23191}
- media: imon: reorganize serialization {CVE-2025-39993}
- usb: xhci: Fix inverted ring_xrun_event check in handle_tx_event() {CVE-2025-37882}
- Revert "VFS: Impose ordering on accesses of d_inode and d_flags"
- Revert "VFS: Combine inode checks with d_is_negative() and d_is_positive() in pathwalk"
- Revert "namei: d_is_negative() should be checked before -&gt;d_seq validation"
- Revert "namei: results of d_is_negative() should be checked after dentry revalidation"
- Revert "namei: -&gt;d_inode of a pinned dentry is stable only for positives"
- scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() {CVE-2026-23193}
- net/sched: cls_u32: use skb_header_pointer_careful() {CVE-2026-23204}
- net: add skb_header_pointer_careful() helper {CVE-2026-23204}
- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089}
- NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid {CVE-2025-68349}
- net/sched: Enforce that teql can only be used as root qdisc {CVE-2026-23074}</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- ovl: Filter invalid inodes with missing lookup function {CVE-2024-56570}
- ALSA: aloop: Fix racy access at PCM trigger {CVE-2026-23191}
- media: imon: reorganize serialization {CVE-2025-39993}
- usb: xhci: Fix inverted ring_xrun_event check in handle_tx_event() {CVE-2025-37882}
- Revert "VFS: Impose ordering on accesses of d_inode and d_flags"
- Revert "VFS: Combine inode checks with d_is_negative() and d_is_positive() in pathwalk"
- Revert "namei: d_is_negative() should be checked before -&gt;d_seq validation"
- Revert "namei: results of d_is_negative() should be checked after dentry revalidation"
- Revert "namei: -&gt;d_inode of a pinned dentry is stable only for positives"
- scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() {CVE-2026-23193}
- net/sched: cls_u32: use skb_header_pointer_careful() {CVE-2026-23204}
- net: add skb_header_pointer_careful() helper {CVE-2026-23204}
- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089}
- NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid {CVE-2025-68349}
- net/sched: Enforce that teql can only be used as root qdisc {CVE-2026-23074}</summary>
    <pushcount>0</pushcount>
    <issued date="2026-04-10 08:33:33 UTC" />
    <updated date="2026-04-10 08:33:33 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1775657929.html" id="CLSA-2026:1775657929" title="CLSA-2026:1775657929" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="x86_64" epoch="0" name="bpftool" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>bpftool-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">4fbf7c9a657e0623c7b5906a914ecb1f38b87d803125ed0d78c9418394059612</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">e6a2a3e443d3191fac89b3ad3069740bb250b57e64e0bc43de997482b2d16300</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-debug-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">a07a3928bcaa799603f5753ed91db4e40aaa7ee3a2eedb0fb15f41ced6052316</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-debug-devel" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-debug-devel-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">7b2cecbc5184f2c19b4679455eb1ab02e9f813bc96dcc5f75f55c38483574f43</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-devel" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-devel-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">cd2904e83da9cc755f91ff5a0ad675dd6f44dd6f549b56afda52dd862ab12047</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-headers" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-headers-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">4150457e75b8d3812d3617f14b23e4b92a777e6022a38abdb398cc069ad61450</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-tools-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">b48198209a9ba4ee25fd6ac842cf9c08a0d16fff1a27c4f8e8f90dc6639a70c7</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">e4dd3e23469f3be98535f380fd3145e74ff9e5439be1a1a463f393c0f00982f5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="kernel-tools-libs-devel" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>kernel-tools-libs-devel-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">68b537f16a945bb3db145494da6a781e82d7da376a89ba3fc23184268098d10b</sum>
        </package>
        <package arch="x86_64" epoch="0" name="perf" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>perf-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">e0f58e78d43ee3e756b4264224feaee9a1da70b732388f1072f9ef466d44abb5</sum>
        </package>
        <package arch="x86_64" epoch="0" name="python-perf" release="1160.144.1.el7.tuxcare.els4" src="kernel-3.10.0-1160.144.1.el7.tuxcare.els4.src.rpm" version="3.10.0">
          <filename>python-perf-3.10.0-1160.144.1.el7.tuxcare.els4.x86_64.rpm</filename>
          <sum type="sha256">9713903cf7e60dbb788df3e37b12529bf9b520ae929fd8fbd12ea47c489a8960</sum>
        </package>
      </collection>
    </pkglist>
  </update>
<update from="packager@tuxcare.com" status="final" type="security" version="1">
    <id>CLSA-2026:1775723090</id>
    <title>python-pip: Fix of 2 CVEs</title>
    <rights>TuxCare License Agreement</rights>
    <release>0</release>
    <description>- CVE-2025-66471: add decompression size limit to bundled urllib3
- CVE-2026-21441: skip decompression when draining redirect responses
  in bundled urllib3</description>
    <severity>Important</severity>
    <solution>Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the CLN.</solution>
    <summary>- CVE-2025-66471: add decompression size limit to bundled urllib3
- CVE-2026-21441: skip decompression when draining redirect responses
  in bundled urllib3</summary>
    <pushcount>0</pushcount>
    <issued date="2026-04-09 14:43:15 UTC" />
    <updated date="2026-04-09 14:43:15 UTC" />
    <references href="https://errata.tuxcare.com/els_os/centos7els/CLSA-2026-1775723090.html" id="CLSA-2026:1775723090" title="CLSA-2026:1775723090" type="self" />
    <pkglist>
      <collection>
        <name>tuxcare-centos7-els</name>
        <package arch="noarch" epoch="0" name="python3-pip" release="8.el7.tuxcare.els2" src="python-pip-9.0.3-8.el7.tuxcare.els2.src.rpm" version="9.0.3">
          <filename>python3-pip-9.0.3-8.el7.tuxcare.els2.noarch.rpm</filename>
          <sum type="sha256">1181453a4ddb8dc706d70ff187ce9ba44ef550c69d460c1912c7b0242b2bc49c</sum>
        </package>
      </collection>
    </pkglist>
  </update>
</updates>