The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2023:6818 advisory.
A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE).
Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM). (CVE-2022-0759)
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.
Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n).
Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd). (CVE-2022-1292)
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). (CVE-2022-2068)
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp’s encrypted field and exposes them in read/write mode via the API () instead of marking it as write only. (CVE-2022-3644)
A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.
(CVE-2022-3874)
An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. (CVE-2022-40899)
A blind site-to-site request forgery vulnerability was found in Satellite server. It is possible to trigger an external interaction to an attacker’s server by modifying the Referer header in an HTTP request of specific resources in the server. (CVE-2022-4130)
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. (CVE-2022-41717)
A denial of service vulnerability present in ActiveRecord’s PostgreSQL adapter <7.0.4.1 and <6.1.7.1. When a value outside the range for a 64bit signed integer is provided to the PostgreSQL connection adapter, it will treat the target column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan resulting in potential Denial of Service. (CVE-2022-44566)
A denial of service vulnerability in the Range header parsing component of Rack >= 1.5.0. A Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted. (CVE-2022-44570)
There is a denial of service vulnerability in the Content-Disposition parsingcomponent of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1, 3.0.0.1. This could allow an attacker to craft an input that can cause Content- Disposition header parsing in Rackto take an unexpected amount of time, possibly resulting in a denial ofservice attack vector. This header is used typically used in multipartparsing. Any applications that parse multipart posts using Rack (virtuallyall Rails applications) are impacted. (CVE-2022-44571)
A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. (CVE-2022-44572)
ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-47318. (CVE-2022-46648)
ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648. (CVE-2022-47318)
An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system. (CVE-2023-0118)
A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user’s session, make requests on behalf of the user, and obtain user credentials. (CVE-2023-0119)
A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations. (CVE-2023-1894)
A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1.
Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. (CVE-2023-22792)
A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments.
If malicious user input is passed to either the annotate
query method, the optimizer_hints
query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database withinsufficient sanitization and be able to inject SQL outside of the comment. (CVE-2023-22794)
A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If- None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. (CVE-2023-22795)
A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability. (CVE-2023-22796)
A ReDoS based DoS vulnerability in the GlobalID <1.0.1 which could allow an attacker supplying a carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.
(CVE-2023-22799)
A DoS vulnerability exists in Rack <v3.0.4.2, <v2.2.6.3, <v2.1.4.3 and <v2.0.9.3 within in the Multipart MIME parsing code in which could allow an attacker to craft requests that can be abuse to cause multipart parsing to take longer than expected. (CVE-2023-27530)
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value. (CVE-2023-29406)
sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit e75e358
. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit c457abd5f
. Users are advised to upgrade. There are no known workarounds for this issue. (CVE-2023-30608)
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django’s Uploading multiple files documentation suggested otherwise. (CVE-2023-31047)
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use rebuild_proxies
to reattach the Proxy-Authorization
header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the Proxy-Authorization
header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
(CVE-2023-32681)
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs. (CVE-2023-36053)
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function. (CVE-2023-39325)
GitPython before 3.1.32 does not block insecure non-multi options in clone and clone_from. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439. (CVE-2023-40267)
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. (CVE-2023-44487)
The Ruby on Rails advisory describes this vulnerability as follows: (CVE-2023-27539)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# Rocky Linux Security Advisory RLSA-2023:6818.
##
include('compat.inc');
if (description)
{
script_id(185473);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/09");
script_cve_id(
"CVE-2022-0759",
"CVE-2022-1292",
"CVE-2022-2068",
"CVE-2022-3644",
"CVE-2022-3874",
"CVE-2022-4130",
"CVE-2022-40899",
"CVE-2022-41717",
"CVE-2022-44566",
"CVE-2022-44570",
"CVE-2022-44571",
"CVE-2022-44572",
"CVE-2022-46648",
"CVE-2022-47318",
"CVE-2023-0118",
"CVE-2023-0119",
"CVE-2023-1894",
"CVE-2023-22792",
"CVE-2023-22794",
"CVE-2023-22795",
"CVE-2023-22796",
"CVE-2023-22799",
"CVE-2023-27530",
"CVE-2023-27539",
"CVE-2023-29406",
"CVE-2023-30608",
"CVE-2023-31047",
"CVE-2023-32681",
"CVE-2023-36053",
"CVE-2023-39325",
"CVE-2023-40267",
"CVE-2023-44487"
);
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/10/31");
script_xref(name:"IAVB", value:"2022-B-0059-S");
script_xref(name:"IAVB", value:"2023-B-0052-S");
script_xref(name:"RLSA", value:"2023:6818");
script_xref(name:"IAVB", value:"2023-B-0080-S");
script_xref(name:"CEA-ID", value:"CEA-2024-0004");
script_name(english:"Rocky Linux 8 : Satellite 6.14 (RLSA-2023:6818)");
script_set_attribute(attribute:"synopsis", value:
"The remote Rocky Linux host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the
RLSA-2023:6818 advisory.
- A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for
Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure
custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE).
Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle
attacks (MITM). (CVE-2022-0759)
- The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This
script is distributed by some operating systems in a manner where it is automatically executed. On such
operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of
the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.
Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n).
Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd). (CVE-2022-1292)
- In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances
where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection
were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other
places in the script where the file names of certificates being hashed were possibly passed to a command
executed through the shell. This script is distributed by some operating systems in a manner where it is
automatically executed. On such operating systems, an attacker could execute arbitrary commands with the
privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the
OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in
OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). (CVE-2022-2068)
- The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field
and exposes them in read/write mode via the API () instead of marking it as write only. (CVE-2022-3644)
- A command injection flaw was found in foreman. This flaw allows an authenticated user with admin
privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations
in templates, possibly resulting in arbitrary command execution on the underlying operating system.
(CVE-2022-3874)
- An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial
of service via crafted Set-Cookie header from malicious web server. (CVE-2022-40899)
- A blind site-to-site request forgery vulnerability was found in Satellite server. It is possible to
trigger an external interaction to an attacker's server by modifying the Referer header in an HTTP request
of specific resources in the server. (CVE-2022-4130)
- An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server
connections contain a cache of HTTP header keys sent by the client. While the total number of entries in
this cache is capped, an attacker sending very large keys can cause the server to allocate approximately
64 MiB per open connection. (CVE-2022-41717)
- A denial of service vulnerability present in ActiveRecord's PostgreSQL adapter <7.0.4.1 and <6.1.7.1. When
a value outside the range for a 64bit signed integer is provided to the PostgreSQL connection adapter, it
will treat the target column type as numeric. Comparing integer values against numeric values can result
in a slow sequential scan resulting in potential Denial of Service. (CVE-2022-44566)
- A denial of service vulnerability in the Range header parsing component of Rack >= 1.5.0. A Carefully
crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time,
possibly resulting in a denial of service attack vector. Any applications that deal with Range requests
(such as streaming applications, or applications that serve files) may be impacted. (CVE-2022-44570)
- There is a denial of service vulnerability in the Content-Disposition parsingcomponent of Rack fixed in
2.0.9.2, 2.1.4.2, 2.2.4.1, 3.0.0.1. This could allow an attacker to craft an input that can cause Content-
Disposition header parsing in Rackto take an unexpected amount of time, possibly resulting in a denial
ofservice attack vector. This header is used typically used in multipartparsing. Any applications that
parse multipart posts using Rack (virtuallyall Rails applications) are impacted. (CVE-2022-44571)
- A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2,
2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary
parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack
vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are
impacted. (CVE-2022-44572)
- ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby
code by having a user to load a repository containing a specially crafted filename to the product. This
vulnerability is different from CVE-2022-47318. (CVE-2022-46648)
- ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby
code by having a user to load a repository containing a specially crafted filename to the product. This
vulnerability is different from CVE-2022-46648. (CVE-2022-47318)
- An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode
in templates and execute arbitrary code on the underlying operating system. (CVE-2023-0118)
- A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has
incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on
the system can steal another user's session, make requests on behalf of the user, and obtain user
credentials. (CVE-2023-0119)
- A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate
validation. An issue related to specifically crafted certificate names significantly slowed down server
operations. (CVE-2023-1894)
- A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1.
Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the
regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use
large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected
release should either upgrade or use one of the workarounds immediately. (CVE-2023-22792)
- A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments.
If malicious user input is passed to either the `annotate` query method, the `optimizer_hints` query
method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the
database withinsufficient sanitization and be able to inject SQL outside of the comment. (CVE-2023-22794)
- A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-
None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine
to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the
process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running
an affected release should either upgrade or use one of the workarounds immediately. (CVE-2023-22795)
- A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted
string passed to the underscore method can cause the regular expression engine to enter a state of
catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a
possible DoS vulnerability. (CVE-2023-22796)
- A ReDoS based DoS vulnerability in the GlobalID <1.0.1 which could allow an attacker supplying a carefully
crafted input can cause the regular expression engine to take an unexpected amount of time. All users
running an affected release should either upgrade or use one of the workarounds immediately.
(CVE-2023-22799)
- A DoS vulnerability exists in Rack <v3.0.4.2, <v2.2.6.3, <v2.1.4.3 and <v2.0.9.3 within in the Multipart
MIME parsing code in which could allow an attacker to craft requests that can be abuse to cause multipart
parsing to take longer than expected. (CVE-2023-27530)
- The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host
header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send
requests containing an invalid Request.Host or Request.URL.Host value. (CVE-2023-29406)
- sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a
regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was
introduced by commit `e75e358`. The vulnerability may lead to Denial of Service (DoS). This issues has
been fixed in sqlparse 0.4.4 by commit `c457abd5f`. Users are advised to upgrade. There are no known
workarounds for this issue. (CVE-2023-30608)
- In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation
when using one form field to upload multiple files. This multiple upload has never been supported by
forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's
Uploading multiple files documentation suggested otherwise. (CVE-2023-31047)
- Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to
destination servers when redirected to an HTTPS endpoint. This is a product of how we use
`rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent
through the tunnel, the proxy will identify the header in the request itself and remove it prior to
forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must
be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in
Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious
actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
(CVE-2023-32681)
- In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are
subject to a potential ReDoS (regular expression denial of service) attack via a very large number of
domain name labels of emails and URLs. (CVE-2023-36053)
- A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive
server resource consumption. While the total number of requests is bounded by the
http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create
a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound
the number of simultaneously executing handler goroutines to the stream concurrency limit
(MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client
has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows
too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2
for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per
HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the
Server.MaxConcurrentStreams setting and the ConfigureServer function. (CVE-2023-39325)
- GitPython before 3.1.32 does not block insecure non-multi options in clone and clone_from. NOTE: this
issue exists because of an incomplete fix for CVE-2022-24439. (CVE-2023-40267)
- The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation
can reset many streams quickly, as exploited in the wild in August through October 2023. (CVE-2023-44487)
- The Ruby on Rails advisory describes this vulnerability as follows: (CVE-2023-27539)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://errata.rockylinux.org/RLSA-2023:6818");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1265120");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1726504");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1735722");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1813953");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1859112");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1872414");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1885552");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1904201");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1922972");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1925532");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1944710");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1947095");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1949960");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1950836");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1955046");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1967030");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1972308");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1980277");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1992283");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1995783");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2000215");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2002202");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2009069");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2013759");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2043089");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2044537");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2053421");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2055790");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2058404");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2060613");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2069324");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2069666");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2073535");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2077081");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2077633");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2080386");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2081494");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2081777");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2082001");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2088559");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2090620");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2094301");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2096942");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2097310");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2103424");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2105676");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2106473");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2116369");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2117760");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2122872");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2123306");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2124658");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2125366");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2127134");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2129432");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2130173");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2130871");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2131990");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2134436");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2135215");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2135498");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2135722");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2138172");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2140577");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2140636");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2143051");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2143290");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2145254");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2152951");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2154917");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2156522");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2158510");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2158526");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2158702");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2158780");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2159104");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2159105");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2159291");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2159672");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2159839");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2161209");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2161274");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2161993");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164359");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164400");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164714");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164722");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164730");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164736");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164785");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164789");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164799");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164800");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2165107");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2165866");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2165906");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166404");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166435");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166466");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166640");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2167097");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2167146");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2167371");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2167396");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168414");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2169322");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2169385");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2169682");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2169847");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2170125");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2170127");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2170485");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2170535");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2170917");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2171180");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2172355");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2172564");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2173159");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2173199");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2173535");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2173671");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2173692");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2173757");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2174367");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2174912");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2176214");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2176368");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2176477");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2176870");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2178133");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2178176");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2178307");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2178645");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2178734");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2178775");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2179574");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2179649");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2179721");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2179725");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2180490");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2180760");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2180865");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2180954");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2181226");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2181254");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2181602");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2182353");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2183172");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2183357");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2184278");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2186713");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2186765");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2187599");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2187613");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2187903");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2187967");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2188504");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2188721");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2192565");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2192583");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2192841");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2193088");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2193451");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2196076");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2196085");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2196436");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2196540");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2196775");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2203093");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2203183");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2207782");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2208161");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2208535");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2209037");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2209469");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2209938");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2210284");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2210297");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2211210");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2211394");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2211437");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2211484");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2211502");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2211711");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2211966");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2212148");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2212523");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2212630");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2212740");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2212756");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2212812");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2212996");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213088");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213128");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213190");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213246");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213281");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213486");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213515");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213579");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213582");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213768");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213777");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2213804");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2214261");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2214272");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2214274");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2214290");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2214578");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2215081");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2215093");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2215238");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2215294");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2215426");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2215954");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2215986");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2216194");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2216461");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2216564");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2216757");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2216907");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2217942");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2218004");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2218307");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2218625");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2218878");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2218930");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2218932");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2219648");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2220965");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2220969");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2220978");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2221291");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2221407");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2221621");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2221983");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2222167");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2222444");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2222446");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2222447");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2222705");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2222839");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2222890");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2222907");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2222979");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2223048");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2223050");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2223618");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2223707");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2223891");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2223996");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2224031");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2224113");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2224334");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2224494");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2224498");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2225090");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2225141");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2225333");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2225383");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2225402");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2225406");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2225409");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2226950");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2227028");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2227093");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2227271");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2227338");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2228287");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2229788");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2229897");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2230584");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2230934");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2231363");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2231474");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2232370");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2232775");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2234444");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2235231");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2236685");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2239115");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2242803");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2243296");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2245056");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2245930");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-2068");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2023-40267");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/03/25");
script_set_attribute(attribute:"patch_publication_date", value:"2023/11/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/11/11");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-cxx");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-cxx-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-sql-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-sql-devel-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-utils-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:rocky:linux:8");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Rocky Linux Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RockyLinux/release", "Host/RockyLinux/rpm-list", "Host/cpu");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RockyLinux/release');
if (isnull(os_release) || 'Rocky Linux' >!< os_release) audit(AUDIT_OS_NOT, 'Rocky Linux');
var os_ver = pregmatch(pattern: "Rocky(?: Linux)? release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Rocky Linux');
os_ver = os_ver[1];
if (! preg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Rocky Linux 8.x', 'Rocky Linux ' + os_ver);
if (!get_kb_item('Host/RockyLinux/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Rocky Linux', cpu);
var pkgs = [
{'reference':'libdb-cxx-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-cxx-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-debugsource-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-sql-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-sql-devel-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-utils-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}
];
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var el_string = NULL;
var rpm_spec_vers_cmp = NULL;
var epoch = NULL;
var allowmaj = NULL;
var exists_check = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = 'Rocky-' + package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];
if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (reference && _release && (!exists_check || rpm_exists(release:_release, rpm:exists_check))) {
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libdb-cxx / libdb-cxx-debuginfo / libdb-debuginfo / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
rocky | linux | libdb-cxx-debuginfo | p-cpe:/a:rocky:linux:libdb-cxx-debuginfo |
rocky | linux | libdb-debuginfo | p-cpe:/a:rocky:linux:libdb-debuginfo |
rocky | linux | libdb-debugsource | p-cpe:/a:rocky:linux:libdb-debugsource |
rocky | linux | libdb-utils-debuginfo | p-cpe:/a:rocky:linux:libdb-utils-debuginfo |
rocky | linux | libdb-sql-debuginfo | p-cpe:/a:rocky:linux:libdb-sql-debuginfo |
rocky | linux | libdb-sql-devel-debuginfo | p-cpe:/a:rocky:linux:libdb-sql-devel-debuginfo |
rocky | linux | 8 | cpe:/o:rocky:linux:8 |
rocky | linux | libdb-cxx | p-cpe:/a:rocky:linux:libdb-cxx |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0759
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3874
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4130
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41717
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44566
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44570
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44571
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44572
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46648
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47318
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0118
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0119
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27530
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27539
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29406
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31047
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32681
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36053
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40267
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487
bugzilla.redhat.com/show_bug.cgi?id=1265120
bugzilla.redhat.com/show_bug.cgi?id=1726504
bugzilla.redhat.com/show_bug.cgi?id=1735722
bugzilla.redhat.com/show_bug.cgi?id=1813953
bugzilla.redhat.com/show_bug.cgi?id=1859112
bugzilla.redhat.com/show_bug.cgi?id=1872414
bugzilla.redhat.com/show_bug.cgi?id=1885552
bugzilla.redhat.com/show_bug.cgi?id=1904201
bugzilla.redhat.com/show_bug.cgi?id=1922972
bugzilla.redhat.com/show_bug.cgi?id=1925532
bugzilla.redhat.com/show_bug.cgi?id=1944710
bugzilla.redhat.com/show_bug.cgi?id=1947095
bugzilla.redhat.com/show_bug.cgi?id=1949960
bugzilla.redhat.com/show_bug.cgi?id=1950836
bugzilla.redhat.com/show_bug.cgi?id=1955046
bugzilla.redhat.com/show_bug.cgi?id=1967030
bugzilla.redhat.com/show_bug.cgi?id=1972308
bugzilla.redhat.com/show_bug.cgi?id=1980277
bugzilla.redhat.com/show_bug.cgi?id=1992283
bugzilla.redhat.com/show_bug.cgi?id=1995783
bugzilla.redhat.com/show_bug.cgi?id=2000215
bugzilla.redhat.com/show_bug.cgi?id=2002202
bugzilla.redhat.com/show_bug.cgi?id=2009069
bugzilla.redhat.com/show_bug.cgi?id=2013759
bugzilla.redhat.com/show_bug.cgi?id=2043089
bugzilla.redhat.com/show_bug.cgi?id=2044537
bugzilla.redhat.com/show_bug.cgi?id=2053421
bugzilla.redhat.com/show_bug.cgi?id=2055790
bugzilla.redhat.com/show_bug.cgi?id=2058404
bugzilla.redhat.com/show_bug.cgi?id=2060613
bugzilla.redhat.com/show_bug.cgi?id=2069324
bugzilla.redhat.com/show_bug.cgi?id=2069666
bugzilla.redhat.com/show_bug.cgi?id=2073535
bugzilla.redhat.com/show_bug.cgi?id=2077081
bugzilla.redhat.com/show_bug.cgi?id=2077633
bugzilla.redhat.com/show_bug.cgi?id=2080386
bugzilla.redhat.com/show_bug.cgi?id=2081494
bugzilla.redhat.com/show_bug.cgi?id=2081777
bugzilla.redhat.com/show_bug.cgi?id=2082001
bugzilla.redhat.com/show_bug.cgi?id=2088559
bugzilla.redhat.com/show_bug.cgi?id=2090620
bugzilla.redhat.com/show_bug.cgi?id=2094301
bugzilla.redhat.com/show_bug.cgi?id=2096942
bugzilla.redhat.com/show_bug.cgi?id=2097310
bugzilla.redhat.com/show_bug.cgi?id=2103424
bugzilla.redhat.com/show_bug.cgi?id=2105676
bugzilla.redhat.com/show_bug.cgi?id=2106473
bugzilla.redhat.com/show_bug.cgi?id=2116369
bugzilla.redhat.com/show_bug.cgi?id=2117760
bugzilla.redhat.com/show_bug.cgi?id=2122872
bugzilla.redhat.com/show_bug.cgi?id=2123306
bugzilla.redhat.com/show_bug.cgi?id=2124658
bugzilla.redhat.com/show_bug.cgi?id=2125366
bugzilla.redhat.com/show_bug.cgi?id=2127134
bugzilla.redhat.com/show_bug.cgi?id=2129432
bugzilla.redhat.com/show_bug.cgi?id=2130173
bugzilla.redhat.com/show_bug.cgi?id=2130871
bugzilla.redhat.com/show_bug.cgi?id=2131990
bugzilla.redhat.com/show_bug.cgi?id=2134436
bugzilla.redhat.com/show_bug.cgi?id=2135215
bugzilla.redhat.com/show_bug.cgi?id=2135498
bugzilla.redhat.com/show_bug.cgi?id=2135722
bugzilla.redhat.com/show_bug.cgi?id=2138172
bugzilla.redhat.com/show_bug.cgi?id=2140577
bugzilla.redhat.com/show_bug.cgi?id=2140636
bugzilla.redhat.com/show_bug.cgi?id=2143051
bugzilla.redhat.com/show_bug.cgi?id=2143290
bugzilla.redhat.com/show_bug.cgi?id=2145254
bugzilla.redhat.com/show_bug.cgi?id=2152951
bugzilla.redhat.com/show_bug.cgi?id=2154917
bugzilla.redhat.com/show_bug.cgi?id=2156522
bugzilla.redhat.com/show_bug.cgi?id=2158510
bugzilla.redhat.com/show_bug.cgi?id=2158526
bugzilla.redhat.com/show_bug.cgi?id=2158702
bugzilla.redhat.com/show_bug.cgi?id=2158780
bugzilla.redhat.com/show_bug.cgi?id=2159104
bugzilla.redhat.com/show_bug.cgi?id=2159105
bugzilla.redhat.com/show_bug.cgi?id=2159291
bugzilla.redhat.com/show_bug.cgi?id=2159672
bugzilla.redhat.com/show_bug.cgi?id=2159839
bugzilla.redhat.com/show_bug.cgi?id=2161209
bugzilla.redhat.com/show_bug.cgi?id=2161274
bugzilla.redhat.com/show_bug.cgi?id=2161993
bugzilla.redhat.com/show_bug.cgi?id=2164359
bugzilla.redhat.com/show_bug.cgi?id=2164400
bugzilla.redhat.com/show_bug.cgi?id=2164714
bugzilla.redhat.com/show_bug.cgi?id=2164719
bugzilla.redhat.com/show_bug.cgi?id=2164722
bugzilla.redhat.com/show_bug.cgi?id=2164730
bugzilla.redhat.com/show_bug.cgi?id=2164736
bugzilla.redhat.com/show_bug.cgi?id=2164785
bugzilla.redhat.com/show_bug.cgi?id=2164789
bugzilla.redhat.com/show_bug.cgi?id=2164799
bugzilla.redhat.com/show_bug.cgi?id=2164800
bugzilla.redhat.com/show_bug.cgi?id=2165107
bugzilla.redhat.com/show_bug.cgi?id=2165866
bugzilla.redhat.com/show_bug.cgi?id=2165906
bugzilla.redhat.com/show_bug.cgi?id=2166404
bugzilla.redhat.com/show_bug.cgi?id=2166435
bugzilla.redhat.com/show_bug.cgi?id=2166466
bugzilla.redhat.com/show_bug.cgi?id=2166640
bugzilla.redhat.com/show_bug.cgi?id=2167097
bugzilla.redhat.com/show_bug.cgi?id=2167146
bugzilla.redhat.com/show_bug.cgi?id=2167371
bugzilla.redhat.com/show_bug.cgi?id=2167396
bugzilla.redhat.com/show_bug.cgi?id=2168414
bugzilla.redhat.com/show_bug.cgi?id=2169322
bugzilla.redhat.com/show_bug.cgi?id=2169385
bugzilla.redhat.com/show_bug.cgi?id=2169682
bugzilla.redhat.com/show_bug.cgi?id=2169847
bugzilla.redhat.com/show_bug.cgi?id=2170125
bugzilla.redhat.com/show_bug.cgi?id=2170127
bugzilla.redhat.com/show_bug.cgi?id=2170485
bugzilla.redhat.com/show_bug.cgi?id=2170535
bugzilla.redhat.com/show_bug.cgi?id=2170917
bugzilla.redhat.com/show_bug.cgi?id=2171180
bugzilla.redhat.com/show_bug.cgi?id=2172355
bugzilla.redhat.com/show_bug.cgi?id=2172564
bugzilla.redhat.com/show_bug.cgi?id=2173159
bugzilla.redhat.com/show_bug.cgi?id=2173199
bugzilla.redhat.com/show_bug.cgi?id=2173535
bugzilla.redhat.com/show_bug.cgi?id=2173671
bugzilla.redhat.com/show_bug.cgi?id=2173692
bugzilla.redhat.com/show_bug.cgi?id=2173757
bugzilla.redhat.com/show_bug.cgi?id=2174367
bugzilla.redhat.com/show_bug.cgi?id=2174912
bugzilla.redhat.com/show_bug.cgi?id=2176214
bugzilla.redhat.com/show_bug.cgi?id=2176368
bugzilla.redhat.com/show_bug.cgi?id=2176477
bugzilla.redhat.com/show_bug.cgi?id=2176870
bugzilla.redhat.com/show_bug.cgi?id=2178133
bugzilla.redhat.com/show_bug.cgi?id=2178176
bugzilla.redhat.com/show_bug.cgi?id=2178307
bugzilla.redhat.com/show_bug.cgi?id=2178645
bugzilla.redhat.com/show_bug.cgi?id=2178734
bugzilla.redhat.com/show_bug.cgi?id=2178775
bugzilla.redhat.com/show_bug.cgi?id=2179574
bugzilla.redhat.com/show_bug.cgi?id=2179649
bugzilla.redhat.com/show_bug.cgi?id=2179721
bugzilla.redhat.com/show_bug.cgi?id=2179725
bugzilla.redhat.com/show_bug.cgi?id=2180490
bugzilla.redhat.com/show_bug.cgi?id=2180760
bugzilla.redhat.com/show_bug.cgi?id=2180865
bugzilla.redhat.com/show_bug.cgi?id=2180954
bugzilla.redhat.com/show_bug.cgi?id=2181226
bugzilla.redhat.com/show_bug.cgi?id=2181254
bugzilla.redhat.com/show_bug.cgi?id=2181602
bugzilla.redhat.com/show_bug.cgi?id=2182353
bugzilla.redhat.com/show_bug.cgi?id=2183172
bugzilla.redhat.com/show_bug.cgi?id=2183357
bugzilla.redhat.com/show_bug.cgi?id=2184278
bugzilla.redhat.com/show_bug.cgi?id=2186713
bugzilla.redhat.com/show_bug.cgi?id=2186765
bugzilla.redhat.com/show_bug.cgi?id=2187599
bugzilla.redhat.com/show_bug.cgi?id=2187613
bugzilla.redhat.com/show_bug.cgi?id=2187903
bugzilla.redhat.com/show_bug.cgi?id=2187967
bugzilla.redhat.com/show_bug.cgi?id=2188504
bugzilla.redhat.com/show_bug.cgi?id=2188721
bugzilla.redhat.com/show_bug.cgi?id=2192565
bugzilla.redhat.com/show_bug.cgi?id=2192583
bugzilla.redhat.com/show_bug.cgi?id=2192841
bugzilla.redhat.com/show_bug.cgi?id=2193088
bugzilla.redhat.com/show_bug.cgi?id=2193451
bugzilla.redhat.com/show_bug.cgi?id=2196076
bugzilla.redhat.com/show_bug.cgi?id=2196085
bugzilla.redhat.com/show_bug.cgi?id=2196436
bugzilla.redhat.com/show_bug.cgi?id=2196540
bugzilla.redhat.com/show_bug.cgi?id=2196775
bugzilla.redhat.com/show_bug.cgi?id=2203093
bugzilla.redhat.com/show_bug.cgi?id=2203183
bugzilla.redhat.com/show_bug.cgi?id=2207782
bugzilla.redhat.com/show_bug.cgi?id=2208161
bugzilla.redhat.com/show_bug.cgi?id=2208535
bugzilla.redhat.com/show_bug.cgi?id=2209037
bugzilla.redhat.com/show_bug.cgi?id=2209469
bugzilla.redhat.com/show_bug.cgi?id=2209938
bugzilla.redhat.com/show_bug.cgi?id=2210284
bugzilla.redhat.com/show_bug.cgi?id=2210297
bugzilla.redhat.com/show_bug.cgi?id=2211210
bugzilla.redhat.com/show_bug.cgi?id=2211394
bugzilla.redhat.com/show_bug.cgi?id=2211437
bugzilla.redhat.com/show_bug.cgi?id=2211484
bugzilla.redhat.com/show_bug.cgi?id=2211502
bugzilla.redhat.com/show_bug.cgi?id=2211711
bugzilla.redhat.com/show_bug.cgi?id=2211966
bugzilla.redhat.com/show_bug.cgi?id=2212148
bugzilla.redhat.com/show_bug.cgi?id=2212523
bugzilla.redhat.com/show_bug.cgi?id=2212630
bugzilla.redhat.com/show_bug.cgi?id=2212740
bugzilla.redhat.com/show_bug.cgi?id=2212756
bugzilla.redhat.com/show_bug.cgi?id=2212812
bugzilla.redhat.com/show_bug.cgi?id=2212996
bugzilla.redhat.com/show_bug.cgi?id=2213088
bugzilla.redhat.com/show_bug.cgi?id=2213128
bugzilla.redhat.com/show_bug.cgi?id=2213190
bugzilla.redhat.com/show_bug.cgi?id=2213246
bugzilla.redhat.com/show_bug.cgi?id=2213281
bugzilla.redhat.com/show_bug.cgi?id=2213486
bugzilla.redhat.com/show_bug.cgi?id=2213515
bugzilla.redhat.com/show_bug.cgi?id=2213579
bugzilla.redhat.com/show_bug.cgi?id=2213582
bugzilla.redhat.com/show_bug.cgi?id=2213768
bugzilla.redhat.com/show_bug.cgi?id=2213777
bugzilla.redhat.com/show_bug.cgi?id=2213804
bugzilla.redhat.com/show_bug.cgi?id=2214261
bugzilla.redhat.com/show_bug.cgi?id=2214272
bugzilla.redhat.com/show_bug.cgi?id=2214274
bugzilla.redhat.com/show_bug.cgi?id=2214290
bugzilla.redhat.com/show_bug.cgi?id=2214578
bugzilla.redhat.com/show_bug.cgi?id=2215081
bugzilla.redhat.com/show_bug.cgi?id=2215093
bugzilla.redhat.com/show_bug.cgi?id=2215238
bugzilla.redhat.com/show_bug.cgi?id=2215294
bugzilla.redhat.com/show_bug.cgi?id=2215426
bugzilla.redhat.com/show_bug.cgi?id=2215954
bugzilla.redhat.com/show_bug.cgi?id=2215986
bugzilla.redhat.com/show_bug.cgi?id=2216194
bugzilla.redhat.com/show_bug.cgi?id=2216461
bugzilla.redhat.com/show_bug.cgi?id=2216564
bugzilla.redhat.com/show_bug.cgi?id=2216757
bugzilla.redhat.com/show_bug.cgi?id=2216907
bugzilla.redhat.com/show_bug.cgi?id=2217942
bugzilla.redhat.com/show_bug.cgi?id=2218004
bugzilla.redhat.com/show_bug.cgi?id=2218307
bugzilla.redhat.com/show_bug.cgi?id=2218625
bugzilla.redhat.com/show_bug.cgi?id=2218878
bugzilla.redhat.com/show_bug.cgi?id=2218930
bugzilla.redhat.com/show_bug.cgi?id=2218932
bugzilla.redhat.com/show_bug.cgi?id=2219648
bugzilla.redhat.com/show_bug.cgi?id=2220965
bugzilla.redhat.com/show_bug.cgi?id=2220969
bugzilla.redhat.com/show_bug.cgi?id=2220978
bugzilla.redhat.com/show_bug.cgi?id=2221291
bugzilla.redhat.com/show_bug.cgi?id=2221407
bugzilla.redhat.com/show_bug.cgi?id=2221621
bugzilla.redhat.com/show_bug.cgi?id=2221983
bugzilla.redhat.com/show_bug.cgi?id=2222167
bugzilla.redhat.com/show_bug.cgi?id=2222444
bugzilla.redhat.com/show_bug.cgi?id=2222446
bugzilla.redhat.com/show_bug.cgi?id=2222447
bugzilla.redhat.com/show_bug.cgi?id=2222705
bugzilla.redhat.com/show_bug.cgi?id=2222839
bugzilla.redhat.com/show_bug.cgi?id=2222890
bugzilla.redhat.com/show_bug.cgi?id=2222907
bugzilla.redhat.com/show_bug.cgi?id=2222979
bugzilla.redhat.com/show_bug.cgi?id=2223048
bugzilla.redhat.com/show_bug.cgi?id=2223050
bugzilla.redhat.com/show_bug.cgi?id=2223618
bugzilla.redhat.com/show_bug.cgi?id=2223707
bugzilla.redhat.com/show_bug.cgi?id=2223891
bugzilla.redhat.com/show_bug.cgi?id=2223996
bugzilla.redhat.com/show_bug.cgi?id=2224031
bugzilla.redhat.com/show_bug.cgi?id=2224113
bugzilla.redhat.com/show_bug.cgi?id=2224334
bugzilla.redhat.com/show_bug.cgi?id=2224494
bugzilla.redhat.com/show_bug.cgi?id=2224498
bugzilla.redhat.com/show_bug.cgi?id=2225090
bugzilla.redhat.com/show_bug.cgi?id=2225141
bugzilla.redhat.com/show_bug.cgi?id=2225333
bugzilla.redhat.com/show_bug.cgi?id=2225383
bugzilla.redhat.com/show_bug.cgi?id=2225402
bugzilla.redhat.com/show_bug.cgi?id=2225406
bugzilla.redhat.com/show_bug.cgi?id=2225409
bugzilla.redhat.com/show_bug.cgi?id=2226950
bugzilla.redhat.com/show_bug.cgi?id=2227028
bugzilla.redhat.com/show_bug.cgi?id=2227093
bugzilla.redhat.com/show_bug.cgi?id=2227271
bugzilla.redhat.com/show_bug.cgi?id=2227338
bugzilla.redhat.com/show_bug.cgi?id=2228287
bugzilla.redhat.com/show_bug.cgi?id=2229788
bugzilla.redhat.com/show_bug.cgi?id=2229897
bugzilla.redhat.com/show_bug.cgi?id=2230584
bugzilla.redhat.com/show_bug.cgi?id=2230934
bugzilla.redhat.com/show_bug.cgi?id=2231363
bugzilla.redhat.com/show_bug.cgi?id=2231474
bugzilla.redhat.com/show_bug.cgi?id=2232370
bugzilla.redhat.com/show_bug.cgi?id=2232775
bugzilla.redhat.com/show_bug.cgi?id=2234444
bugzilla.redhat.com/show_bug.cgi?id=2235231
bugzilla.redhat.com/show_bug.cgi?id=2236685
bugzilla.redhat.com/show_bug.cgi?id=2239115
bugzilla.redhat.com/show_bug.cgi?id=2242803
bugzilla.redhat.com/show_bug.cgi?id=2243296
bugzilla.redhat.com/show_bug.cgi?id=2245056
bugzilla.redhat.com/show_bug.cgi?id=2245930
errata.rockylinux.org/RLSA-2023:6818