The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2023:2097 advisory.
SnakeYaml’s Constructor() class does not restrict types which can be instantiated during deserialization.
Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml’s SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond. (CVE-2022-1471)
An XSS Vulnerability in Action Pack >= 5.2.0 and < 5.2.0 that could allow an attacker to bypass CSP for non HTML like responses. (CVE-2022-22577)
Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1. (CVE-2022-23514)
Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah >= 2.1.0, < 2.19.1 is vulnerable to cross-site scripting via the image/svg+xml media type in data URIs. This issue is patched in version 2.19.1. (CVE-2022-23515)
Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah >= 2.2.0, < 2.19.1 uses recursion for sanitizing CDATA sections, making it susceptible to stack exhaustion and raising a SystemStackError exception. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1. Users who are unable to upgrade may be able to mitigate this vulnerability by limiting the length of the strings that are sanitized. (CVE-2022-23516)
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4. (CVE-2022-23517)
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions >= 1.0.3, < 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0. This issue is patched in version 1.4.4. (CVE-2022-23518)
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer’s allowed tags in either of the following ways: allow both math and style elements, or allow both svg and style elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include math or svg and style should either upgrade or use the following workaround immediately: Remove style from the overridden allowed tags, or remove math and svg from the overridden allowed tags. (CVE-2022-23519)
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer’s allowed tags to allow both select and style elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both select and style should either upgrade or use this workaround: Remove either select or style from the overridden allowed tags. NOTE: Code is
not impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize. (CVE-2022-23520)
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. (CVE-2022-25857)
A XSS Vulnerability in Action View tag helpers >= 5.2.0 and < 5.2.0 which would allow an attacker to inject content if able to control input into specific attributes. (CVE-2022-27777)
TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data source tzinfo-data, are vulnerable to relative path traversal. With the Ruby data source, time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with require
on demand. In the affected versions, TZInfo::Timezone.get
fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, TZInfo::Timezone.get
can be made to load unintended files with require
, executing them within the Ruby process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions 2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the file has a prefix of tzinfo/definition
within a directory in the load path. Applications should ensure that untrusted files are not placed in a directory on the load path. As a workaround, the time zone identifier can be validated before passing to TZInfo::Timezone.get
by ensuring it matches the regular expression \A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z
. (CVE-2022-31163)
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE. (CVE-2022-32224)
Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is ${prefix:name}, where prefix is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - script - execute expressions using the JVM script execution engine (javax.script) - dns
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. (CVE-2022-38749, CVE-2022-38750, CVE-2022-38751)
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. (CVE-2022-38752)
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression. (CVE-2022-41323)
pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either PreparedStatement.setText(int, InputStream)
or PreparedStatemet.setBytea(int, InputStream)
will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system’s temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no patch is available. If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability.
(CVE-2022-41946)
In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. Additional fix version in 2.13.4.1 and 2.12.17.1 (CVE-2022-42003)
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization. (CVE-2022-42004)
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is ${prefix:name}, where prefix is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - script - execute expressions using the JVM script execution engine (javax.script) - dns - resolve dns records - url - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default. (CVE-2022-42889)
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
(CVE-2023-23969)
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of- service attack. (CVE-2023-24580)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# Rocky Linux Security Advisory RLSA-2023:2097.
##
include('compat.inc');
if (description)
{
script_id(175139);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/22");
script_cve_id(
"CVE-2022-1471",
"CVE-2022-22577",
"CVE-2022-23514",
"CVE-2022-23515",
"CVE-2022-23516",
"CVE-2022-23517",
"CVE-2022-23518",
"CVE-2022-23519",
"CVE-2022-23520",
"CVE-2022-25857",
"CVE-2022-27777",
"CVE-2022-31163",
"CVE-2022-32224",
"CVE-2022-33980",
"CVE-2022-38749",
"CVE-2022-38750",
"CVE-2022-38751",
"CVE-2022-38752",
"CVE-2022-41323",
"CVE-2022-41946",
"CVE-2022-42003",
"CVE-2022-42004",
"CVE-2022-42889",
"CVE-2023-23969",
"CVE-2023-24580"
);
script_xref(name:"RLSA", value:"2023:2097");
script_name(english:"Rocky Linux 8 : Satellite 6.13 Release (Important) (RLSA-2023:2097)");
script_set_attribute(attribute:"synopsis", value:
"The remote Rocky Linux host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the
RLSA-2023:2097 advisory.
- SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization.
Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using
SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend
upgrading to version 2.0 and beyond. (CVE-2022-1471)
- An XSS Vulnerability in Action Pack >= 5.2.0 and < 5.2.0 that could allow an attacker to bypass CSP for
non HTML like responses. (CVE-2022-22577)
- Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on
top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to
excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of
service through CPU resource consumption. This issue is patched in version 2.19.1. (CVE-2022-23514)
- Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on
top of Nokogiri. Loofah >= 2.1.0, < 2.19.1 is vulnerable to cross-site scripting via the image/svg+xml
media type in data URIs. This issue is patched in version 2.19.1. (CVE-2022-23515)
- Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on
top of Nokogiri. Loofah >= 2.2.0, < 2.19.1 uses recursion for sanitizing CDATA sections, making it
susceptible to stack exhaustion and raising a SystemStackError exception. This may lead to a denial of
service through CPU resource consumption. This issue is patched in version 2.19.1. Users who are unable to
upgrade may be able to mitigate this vulnerability by limiting the length of the strings that are
sanitized. (CVE-2022-23516)
- rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain
configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible
to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of
service through CPU resource consumption. This issue has been patched in version 1.4.4. (CVE-2022-23517)
- rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions >=
1.0.3, < 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah
>= 2.1.0. This issue is patched in version 1.4.4. (CVE-2022-23518)
- rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version
1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an
attacker to inject content if the application developer has overridden the sanitizer's allowed tags in
either of the following ways: allow both math and style elements, or allow both svg and style
elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version
1.4.4. All users overriding the allowed tags to include math or svg and style should either upgrade
or use the following workaround immediately: Remove style from the overridden allowed tags, or remove
math and svg from the overridden allowed tags. (CVE-2022-23519)
- rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version
1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to
an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the
application developer has overridden the sanitizer's allowed tags to allow both select and style
elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version
1.4.4. All users overriding the allowed tags to include both select and style should either upgrade or
use this workaround: Remove either select or style from the overridden allowed tags. NOTE: Code is
_not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper
method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize. (CVE-2022-23520)
- The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due
missing to nested depth limitation for collections. (CVE-2022-25857)
- A XSS Vulnerability in Action View tag helpers >= 5.2.0 and < 5.2.0 which would allow an attacker to
inject content if able to control input into specific attributes. (CVE-2022-27777)
- TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using
time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data
source tzinfo-data, are vulnerable to relative path traversal. With the Ruby data source, time zones are
defined in Ruby files. There is one file per time zone. Time zone files are loaded with `require` on
demand. In the affected versions, `TZInfo::Timezone.get` fails to validate time zone identifiers
correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later,
`TZInfo::Timezone.get` can be made to load unintended files with `require`, executing them within the Ruby
process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions
2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path
if their name follows the rules for a valid time zone identifier and the file has a prefix of
`tzinfo/definition` within a directory in the load path. Applications should ensure that untrusted files
are not placed in a directory on the load path. As a workaround, the time zone identifier can be validated
before passing to `TZInfo::Timezone.get` by ensuring it matches the regular expression
`\A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z`. (CVE-2022-31163)
- A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record <
7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the
database (via means like SQL injection), the ability to escalate to an RCE. (CVE-2022-32224)
- Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically
evaluated and expanded. The standard format for interpolation is ${prefix:name}, where prefix is used
to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the
interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances
included interpolators that could result in arbitrary code execution or contact with remote servers. These
lookups are: - script - execute expressions using the JVM script execution engine (javax.script) - dns
- resolve dns records - url - load values from urls, including from remote servers Applications using
the interpolation defaults in the affected versions may be vulnerable to remote code execution or
unintentional contact with remote servers if untrusted configuration values are used. Users are
recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators
by default. (CVE-2022-33980)
- Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the
parser is running on user supplied input, an attacker may supply content that causes the parser to crash
by stackoverflow. (CVE-2022-38749, CVE-2022-38750, CVE-2022-38751)
- Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the
parser is running on user supplied input, an attacker may supply content that causes the parser to crash
by stack-overflow. (CVE-2022-38752)
- In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject
to a potential denial of service attack via the locale parameter, which is treated as a regular
expression. (CVE-2022-41323)
- pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either
`PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create
a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable
by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory
is shared between all users on that system. Because of this, when files and directories are written into
this directory they are, by default, readable by other users on that same system. This vulnerability does
not allow other users to overwrite the contents of these directories or files. This is purely an
information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7,
this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this
vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no patch is available. If you are unable to
patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a
directory that is exclusively owned by the executing user will mitigate this vulnerability.
(CVE-2022-41946)
- In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a
check in primitive value deserializers to avoid deep wrapper array nesting, when the
UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. Additional fix version in 2.13.4.1 and 2.12.17.1
(CVE-2022-42003)
- In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in
BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is
vulnerable only with certain customized choices for deserialization. (CVE-2022-42004)
- Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and
expanded. The standard format for interpolation is ${prefix:name}, where prefix is used to locate an
instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with
version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that
could result in arbitrary code execution or contact with remote servers. These lookups are: - script -
execute expressions using the JVM script execution engine (javax.script) - dns - resolve dns records -
url - load values from urls, including from remote servers Applications using the interpolation defaults
in the affected versions may be vulnerable to remote code execution or unintentional contact with remote
servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons
Text 1.10.0, which disables the problematic interpolators by default. (CVE-2022-42889)
- In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language
headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service
vector via excessive memory usage if the raw value of Accept-Language headers is very large.
(CVE-2023-23969)
- An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10,
and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could
result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-
service attack. (CVE-2023-24580)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://errata.rockylinux.org/RLSA-2023:2097");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1225819");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1266407");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1630294");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1638226");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1650468");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1761012");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1786358");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1787456");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1813274");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1826648");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1837767");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1841534");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1845489");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1880947");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1888667");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1895976");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1920810");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1931027");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1931533");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1950468");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1952529");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1956210");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1956985");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1963266");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1964037");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1965871");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1978683");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1978995");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1990790");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1990875");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1995097");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1995470");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1997186");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1997199");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2026151");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2029402");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2032040");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2043600");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2050234");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2052904");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2056402");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2057314");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2060099");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2062526");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2063999");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2066323");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2069438");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2073847");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2077363");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2080296");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2080302");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2088156");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2088529");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2094912");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2098079");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2101708");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2102078");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2103936");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2104247");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2105067");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2105441");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2106475");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2106753");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2107011");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2107758");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2108997");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2109634");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2110551");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2111159");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2115970");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2116375");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2118651");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2119053");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2119155");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2119911");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2120640");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2121210");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2121288");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2122617");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2123593");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2123696");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2123835");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2123932");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2124419");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2124520");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2125424");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2125444");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2126200");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2126349");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2126372");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2126695");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2126789");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2126905");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2127180");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2127470");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2127998");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2128038");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2128256");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2128864");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2128894");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2129706");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2129707");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2129709");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2129710");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2129950");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2130596");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2130698");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2131312");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2131369");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2131839");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2132452");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2133343");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2133615");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2134283");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2134682");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2135244");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2135247");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2135418");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2135435");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2136130");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2137318");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2137350");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2137539");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2138887");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2139209");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2139418");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2139441");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2139545");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2140628");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2140807");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2141136");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2141187");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2141455");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2141719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2141810");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2142514");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2142555");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2143451");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2143497");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2143515");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2143695");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2144044");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2147579");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2148433");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2148813");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2149030");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2149543");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2149730");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2149893");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2149896");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2149990");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2150009");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2150261");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2150311");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2150380");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2151333");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2151487");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2151564");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2151827");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2151838");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2151856");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2151935");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2152609");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153234");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153241");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153262");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153273");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153399");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153423");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153701");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153720");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153744");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2153751");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2154184");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2154397");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2154512");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2154734");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2155221");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2155392");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2155527");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2155911");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2156294");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2156295");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2156941");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2157627");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2157869");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2158508");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2158519");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2158565");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2158614");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2158738");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2159776");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2159963");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2159967");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2159974");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160008");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160056");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160112");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160264");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160297");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160497");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160508");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160524");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160528");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160705");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2160752");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2161304");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2161776");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2162129");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2162130");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2162678");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2162736");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2163425");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2163456");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2163457");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2163577");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2163582");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2163788");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164026");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164080");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164330");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164413");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164757");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2164989");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2165482");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2165848");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2165952");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166244");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166293");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166303");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166374");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166424");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166457");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166964");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2166966");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2167685");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168041");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168096");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168168");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168254");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168258");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168330");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168494");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168679");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2168967");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2169299");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2169402");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2169633");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2169858");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2169866");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2170034");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2171399");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2172141");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2172540");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2172939");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2173570");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2173756");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2174734");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2174910");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2175226");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2180417");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2184018");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-33980");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2022-42889");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Apache Commons Text RCE');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/04/30");
script_set_attribute(attribute:"patch_publication_date", value:"2023/05/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/05/05");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-cxx");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-cxx-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-sql-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-sql-devel-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:libdb-utils-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:rocky:linux:8");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Rocky Linux Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RockyLinux/release", "Host/RockyLinux/rpm-list", "Host/cpu");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RockyLinux/release');
if (isnull(os_release) || 'Rocky Linux' >!< os_release) audit(AUDIT_OS_NOT, 'Rocky Linux');
var os_ver = pregmatch(pattern: "Rocky(?: Linux)? release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Rocky Linux');
os_ver = os_ver[1];
if (! preg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Rocky Linux 8.x', 'Rocky Linux ' + os_ver);
if (!get_kb_item('Host/RockyLinux/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Rocky Linux', cpu);
var pkgs = [
{'reference':'libdb-cxx-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-cxx-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-debugsource-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-sql-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-sql-devel-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libdb-utils-debuginfo-5.3.28-42.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}
];
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var el_string = NULL;
var rpm_spec_vers_cmp = NULL;
var epoch = NULL;
var allowmaj = NULL;
var exists_check = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = 'Rocky-' + package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];
if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (reference && _release && (!exists_check || rpm_exists(release:_release, rpm:exists_check))) {
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libdb-cxx / libdb-cxx-debuginfo / libdb-debuginfo / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
rocky | linux | libdb-cxx | p-cpe:/a:rocky:linux:libdb-cxx |
rocky | linux | libdb-cxx-debuginfo | p-cpe:/a:rocky:linux:libdb-cxx-debuginfo |
rocky | linux | libdb-debuginfo | p-cpe:/a:rocky:linux:libdb-debuginfo |
rocky | linux | libdb-debugsource | p-cpe:/a:rocky:linux:libdb-debugsource |
rocky | linux | libdb-sql-debuginfo | p-cpe:/a:rocky:linux:libdb-sql-debuginfo |
rocky | linux | libdb-sql-devel-debuginfo | p-cpe:/a:rocky:linux:libdb-sql-devel-debuginfo |
rocky | linux | libdb-utils-debuginfo | p-cpe:/a:rocky:linux:libdb-utils-debuginfo |
rocky | linux | 8 | cpe:/o:rocky:linux:8 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1471
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22577
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23514
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23515
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23516
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23517
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23518
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23519
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23520
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27777
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31163
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32224
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33980
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38749
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38750
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38751
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41323
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41946
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42003
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42004
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24580
bugzilla.redhat.com/show_bug.cgi?id=1225819
bugzilla.redhat.com/show_bug.cgi?id=1266407
bugzilla.redhat.com/show_bug.cgi?id=1630294
bugzilla.redhat.com/show_bug.cgi?id=1638226
bugzilla.redhat.com/show_bug.cgi?id=1650468
bugzilla.redhat.com/show_bug.cgi?id=1761012
bugzilla.redhat.com/show_bug.cgi?id=1786358
bugzilla.redhat.com/show_bug.cgi?id=1787456
bugzilla.redhat.com/show_bug.cgi?id=1813274
bugzilla.redhat.com/show_bug.cgi?id=1826648
bugzilla.redhat.com/show_bug.cgi?id=1837767
bugzilla.redhat.com/show_bug.cgi?id=1841534
bugzilla.redhat.com/show_bug.cgi?id=1845489
bugzilla.redhat.com/show_bug.cgi?id=1880947
bugzilla.redhat.com/show_bug.cgi?id=1888667
bugzilla.redhat.com/show_bug.cgi?id=1895976
bugzilla.redhat.com/show_bug.cgi?id=1920810
bugzilla.redhat.com/show_bug.cgi?id=1931027
bugzilla.redhat.com/show_bug.cgi?id=1931533
bugzilla.redhat.com/show_bug.cgi?id=1950468
bugzilla.redhat.com/show_bug.cgi?id=1952529
bugzilla.redhat.com/show_bug.cgi?id=1956210
bugzilla.redhat.com/show_bug.cgi?id=1956985
bugzilla.redhat.com/show_bug.cgi?id=1963266
bugzilla.redhat.com/show_bug.cgi?id=1964037
bugzilla.redhat.com/show_bug.cgi?id=1965871
bugzilla.redhat.com/show_bug.cgi?id=1978683
bugzilla.redhat.com/show_bug.cgi?id=1978995
bugzilla.redhat.com/show_bug.cgi?id=1990790
bugzilla.redhat.com/show_bug.cgi?id=1990875
bugzilla.redhat.com/show_bug.cgi?id=1995097
bugzilla.redhat.com/show_bug.cgi?id=1995470
bugzilla.redhat.com/show_bug.cgi?id=1997186
bugzilla.redhat.com/show_bug.cgi?id=1997199
bugzilla.redhat.com/show_bug.cgi?id=2026151
bugzilla.redhat.com/show_bug.cgi?id=2029402
bugzilla.redhat.com/show_bug.cgi?id=2032040
bugzilla.redhat.com/show_bug.cgi?id=2043600
bugzilla.redhat.com/show_bug.cgi?id=2050234
bugzilla.redhat.com/show_bug.cgi?id=2052904
bugzilla.redhat.com/show_bug.cgi?id=2056402
bugzilla.redhat.com/show_bug.cgi?id=2057314
bugzilla.redhat.com/show_bug.cgi?id=2060099
bugzilla.redhat.com/show_bug.cgi?id=2062526
bugzilla.redhat.com/show_bug.cgi?id=2063999
bugzilla.redhat.com/show_bug.cgi?id=2066323
bugzilla.redhat.com/show_bug.cgi?id=2069438
bugzilla.redhat.com/show_bug.cgi?id=2073847
bugzilla.redhat.com/show_bug.cgi?id=2077363
bugzilla.redhat.com/show_bug.cgi?id=2080296
bugzilla.redhat.com/show_bug.cgi?id=2080302
bugzilla.redhat.com/show_bug.cgi?id=2088156
bugzilla.redhat.com/show_bug.cgi?id=2088529
bugzilla.redhat.com/show_bug.cgi?id=2094912
bugzilla.redhat.com/show_bug.cgi?id=2098079
bugzilla.redhat.com/show_bug.cgi?id=2101708
bugzilla.redhat.com/show_bug.cgi?id=2102078
bugzilla.redhat.com/show_bug.cgi?id=2103936
bugzilla.redhat.com/show_bug.cgi?id=2104247
bugzilla.redhat.com/show_bug.cgi?id=2105067
bugzilla.redhat.com/show_bug.cgi?id=2105441
bugzilla.redhat.com/show_bug.cgi?id=2106475
bugzilla.redhat.com/show_bug.cgi?id=2106753
bugzilla.redhat.com/show_bug.cgi?id=2107011
bugzilla.redhat.com/show_bug.cgi?id=2107758
bugzilla.redhat.com/show_bug.cgi?id=2108997
bugzilla.redhat.com/show_bug.cgi?id=2109634
bugzilla.redhat.com/show_bug.cgi?id=2110551
bugzilla.redhat.com/show_bug.cgi?id=2111159
bugzilla.redhat.com/show_bug.cgi?id=2115970
bugzilla.redhat.com/show_bug.cgi?id=2116375
bugzilla.redhat.com/show_bug.cgi?id=2118651
bugzilla.redhat.com/show_bug.cgi?id=2119053
bugzilla.redhat.com/show_bug.cgi?id=2119155
bugzilla.redhat.com/show_bug.cgi?id=2119911
bugzilla.redhat.com/show_bug.cgi?id=2120640
bugzilla.redhat.com/show_bug.cgi?id=2121210
bugzilla.redhat.com/show_bug.cgi?id=2121288
bugzilla.redhat.com/show_bug.cgi?id=2122617
bugzilla.redhat.com/show_bug.cgi?id=2123593
bugzilla.redhat.com/show_bug.cgi?id=2123696
bugzilla.redhat.com/show_bug.cgi?id=2123835
bugzilla.redhat.com/show_bug.cgi?id=2123932
bugzilla.redhat.com/show_bug.cgi?id=2124419
bugzilla.redhat.com/show_bug.cgi?id=2124520
bugzilla.redhat.com/show_bug.cgi?id=2125424
bugzilla.redhat.com/show_bug.cgi?id=2125444
bugzilla.redhat.com/show_bug.cgi?id=2126200
bugzilla.redhat.com/show_bug.cgi?id=2126349
bugzilla.redhat.com/show_bug.cgi?id=2126372
bugzilla.redhat.com/show_bug.cgi?id=2126695
bugzilla.redhat.com/show_bug.cgi?id=2126789
bugzilla.redhat.com/show_bug.cgi?id=2126905
bugzilla.redhat.com/show_bug.cgi?id=2127180
bugzilla.redhat.com/show_bug.cgi?id=2127470
bugzilla.redhat.com/show_bug.cgi?id=2127998
bugzilla.redhat.com/show_bug.cgi?id=2128038
bugzilla.redhat.com/show_bug.cgi?id=2128256
bugzilla.redhat.com/show_bug.cgi?id=2128864
bugzilla.redhat.com/show_bug.cgi?id=2128894
bugzilla.redhat.com/show_bug.cgi?id=2129706
bugzilla.redhat.com/show_bug.cgi?id=2129707
bugzilla.redhat.com/show_bug.cgi?id=2129709
bugzilla.redhat.com/show_bug.cgi?id=2129710
bugzilla.redhat.com/show_bug.cgi?id=2129950
bugzilla.redhat.com/show_bug.cgi?id=2130596
bugzilla.redhat.com/show_bug.cgi?id=2130698
bugzilla.redhat.com/show_bug.cgi?id=2131312
bugzilla.redhat.com/show_bug.cgi?id=2131369
bugzilla.redhat.com/show_bug.cgi?id=2131839
bugzilla.redhat.com/show_bug.cgi?id=2132452
bugzilla.redhat.com/show_bug.cgi?id=2133343
bugzilla.redhat.com/show_bug.cgi?id=2133615
bugzilla.redhat.com/show_bug.cgi?id=2134283
bugzilla.redhat.com/show_bug.cgi?id=2134682
bugzilla.redhat.com/show_bug.cgi?id=2135244
bugzilla.redhat.com/show_bug.cgi?id=2135247
bugzilla.redhat.com/show_bug.cgi?id=2135418
bugzilla.redhat.com/show_bug.cgi?id=2135435
bugzilla.redhat.com/show_bug.cgi?id=2136130
bugzilla.redhat.com/show_bug.cgi?id=2137318
bugzilla.redhat.com/show_bug.cgi?id=2137350
bugzilla.redhat.com/show_bug.cgi?id=2137539
bugzilla.redhat.com/show_bug.cgi?id=2138887
bugzilla.redhat.com/show_bug.cgi?id=2139209
bugzilla.redhat.com/show_bug.cgi?id=2139418
bugzilla.redhat.com/show_bug.cgi?id=2139441
bugzilla.redhat.com/show_bug.cgi?id=2139545
bugzilla.redhat.com/show_bug.cgi?id=2140628
bugzilla.redhat.com/show_bug.cgi?id=2140807
bugzilla.redhat.com/show_bug.cgi?id=2141136
bugzilla.redhat.com/show_bug.cgi?id=2141187
bugzilla.redhat.com/show_bug.cgi?id=2141455
bugzilla.redhat.com/show_bug.cgi?id=2141719
bugzilla.redhat.com/show_bug.cgi?id=2141810
bugzilla.redhat.com/show_bug.cgi?id=2142514
bugzilla.redhat.com/show_bug.cgi?id=2142555
bugzilla.redhat.com/show_bug.cgi?id=2143451
bugzilla.redhat.com/show_bug.cgi?id=2143497
bugzilla.redhat.com/show_bug.cgi?id=2143515
bugzilla.redhat.com/show_bug.cgi?id=2143695
bugzilla.redhat.com/show_bug.cgi?id=2144044
bugzilla.redhat.com/show_bug.cgi?id=2147579
bugzilla.redhat.com/show_bug.cgi?id=2148433
bugzilla.redhat.com/show_bug.cgi?id=2148813
bugzilla.redhat.com/show_bug.cgi?id=2149030
bugzilla.redhat.com/show_bug.cgi?id=2149543
bugzilla.redhat.com/show_bug.cgi?id=2149730
bugzilla.redhat.com/show_bug.cgi?id=2149893
bugzilla.redhat.com/show_bug.cgi?id=2149896
bugzilla.redhat.com/show_bug.cgi?id=2149990
bugzilla.redhat.com/show_bug.cgi?id=2150009
bugzilla.redhat.com/show_bug.cgi?id=2150261
bugzilla.redhat.com/show_bug.cgi?id=2150311
bugzilla.redhat.com/show_bug.cgi?id=2150380
bugzilla.redhat.com/show_bug.cgi?id=2151333
bugzilla.redhat.com/show_bug.cgi?id=2151487
bugzilla.redhat.com/show_bug.cgi?id=2151564
bugzilla.redhat.com/show_bug.cgi?id=2151827
bugzilla.redhat.com/show_bug.cgi?id=2151838
bugzilla.redhat.com/show_bug.cgi?id=2151856
bugzilla.redhat.com/show_bug.cgi?id=2151935
bugzilla.redhat.com/show_bug.cgi?id=2152609
bugzilla.redhat.com/show_bug.cgi?id=2153234
bugzilla.redhat.com/show_bug.cgi?id=2153241
bugzilla.redhat.com/show_bug.cgi?id=2153262
bugzilla.redhat.com/show_bug.cgi?id=2153273
bugzilla.redhat.com/show_bug.cgi?id=2153399
bugzilla.redhat.com/show_bug.cgi?id=2153423
bugzilla.redhat.com/show_bug.cgi?id=2153701
bugzilla.redhat.com/show_bug.cgi?id=2153720
bugzilla.redhat.com/show_bug.cgi?id=2153744
bugzilla.redhat.com/show_bug.cgi?id=2153751
bugzilla.redhat.com/show_bug.cgi?id=2154184
bugzilla.redhat.com/show_bug.cgi?id=2154397
bugzilla.redhat.com/show_bug.cgi?id=2154512
bugzilla.redhat.com/show_bug.cgi?id=2154734
bugzilla.redhat.com/show_bug.cgi?id=2155221
bugzilla.redhat.com/show_bug.cgi?id=2155392
bugzilla.redhat.com/show_bug.cgi?id=2155527
bugzilla.redhat.com/show_bug.cgi?id=2155911
bugzilla.redhat.com/show_bug.cgi?id=2156294
bugzilla.redhat.com/show_bug.cgi?id=2156295
bugzilla.redhat.com/show_bug.cgi?id=2156941
bugzilla.redhat.com/show_bug.cgi?id=2157627
bugzilla.redhat.com/show_bug.cgi?id=2157869
bugzilla.redhat.com/show_bug.cgi?id=2158508
bugzilla.redhat.com/show_bug.cgi?id=2158519
bugzilla.redhat.com/show_bug.cgi?id=2158565
bugzilla.redhat.com/show_bug.cgi?id=2158614
bugzilla.redhat.com/show_bug.cgi?id=2158738
bugzilla.redhat.com/show_bug.cgi?id=2159776
bugzilla.redhat.com/show_bug.cgi?id=2159963
bugzilla.redhat.com/show_bug.cgi?id=2159967
bugzilla.redhat.com/show_bug.cgi?id=2159974
bugzilla.redhat.com/show_bug.cgi?id=2160008
bugzilla.redhat.com/show_bug.cgi?id=2160056
bugzilla.redhat.com/show_bug.cgi?id=2160112
bugzilla.redhat.com/show_bug.cgi?id=2160264
bugzilla.redhat.com/show_bug.cgi?id=2160297
bugzilla.redhat.com/show_bug.cgi?id=2160497
bugzilla.redhat.com/show_bug.cgi?id=2160508
bugzilla.redhat.com/show_bug.cgi?id=2160524
bugzilla.redhat.com/show_bug.cgi?id=2160528
bugzilla.redhat.com/show_bug.cgi?id=2160705
bugzilla.redhat.com/show_bug.cgi?id=2160752
bugzilla.redhat.com/show_bug.cgi?id=2161304
bugzilla.redhat.com/show_bug.cgi?id=2161776
bugzilla.redhat.com/show_bug.cgi?id=2162129
bugzilla.redhat.com/show_bug.cgi?id=2162130
bugzilla.redhat.com/show_bug.cgi?id=2162678
bugzilla.redhat.com/show_bug.cgi?id=2162736
bugzilla.redhat.com/show_bug.cgi?id=2163425
bugzilla.redhat.com/show_bug.cgi?id=2163456
bugzilla.redhat.com/show_bug.cgi?id=2163457
bugzilla.redhat.com/show_bug.cgi?id=2163577
bugzilla.redhat.com/show_bug.cgi?id=2163582
bugzilla.redhat.com/show_bug.cgi?id=2163788
bugzilla.redhat.com/show_bug.cgi?id=2164026
bugzilla.redhat.com/show_bug.cgi?id=2164080
bugzilla.redhat.com/show_bug.cgi?id=2164330
bugzilla.redhat.com/show_bug.cgi?id=2164413
bugzilla.redhat.com/show_bug.cgi?id=2164757
bugzilla.redhat.com/show_bug.cgi?id=2164989
bugzilla.redhat.com/show_bug.cgi?id=2165482
bugzilla.redhat.com/show_bug.cgi?id=2165848
bugzilla.redhat.com/show_bug.cgi?id=2165952
bugzilla.redhat.com/show_bug.cgi?id=2166244
bugzilla.redhat.com/show_bug.cgi?id=2166293
bugzilla.redhat.com/show_bug.cgi?id=2166303
bugzilla.redhat.com/show_bug.cgi?id=2166374
bugzilla.redhat.com/show_bug.cgi?id=2166424
bugzilla.redhat.com/show_bug.cgi?id=2166457
bugzilla.redhat.com/show_bug.cgi?id=2166964
bugzilla.redhat.com/show_bug.cgi?id=2166966
bugzilla.redhat.com/show_bug.cgi?id=2167685
bugzilla.redhat.com/show_bug.cgi?id=2168041
bugzilla.redhat.com/show_bug.cgi?id=2168096
bugzilla.redhat.com/show_bug.cgi?id=2168168
bugzilla.redhat.com/show_bug.cgi?id=2168254
bugzilla.redhat.com/show_bug.cgi?id=2168258
bugzilla.redhat.com/show_bug.cgi?id=2168330
bugzilla.redhat.com/show_bug.cgi?id=2168494
bugzilla.redhat.com/show_bug.cgi?id=2168679
bugzilla.redhat.com/show_bug.cgi?id=2168967
bugzilla.redhat.com/show_bug.cgi?id=2169299
bugzilla.redhat.com/show_bug.cgi?id=2169402
bugzilla.redhat.com/show_bug.cgi?id=2169633
bugzilla.redhat.com/show_bug.cgi?id=2169858
bugzilla.redhat.com/show_bug.cgi?id=2169866
bugzilla.redhat.com/show_bug.cgi?id=2170034
bugzilla.redhat.com/show_bug.cgi?id=2171399
bugzilla.redhat.com/show_bug.cgi?id=2172141
bugzilla.redhat.com/show_bug.cgi?id=2172540
bugzilla.redhat.com/show_bug.cgi?id=2172939
bugzilla.redhat.com/show_bug.cgi?id=2173570
bugzilla.redhat.com/show_bug.cgi?id=2173756
bugzilla.redhat.com/show_bug.cgi?id=2174734
bugzilla.redhat.com/show_bug.cgi?id=2174910
bugzilla.redhat.com/show_bug.cgi?id=2175226
bugzilla.redhat.com/show_bug.cgi?id=2180417
bugzilla.redhat.com/show_bug.cgi?id=2184018
errata.rockylinux.org/RLSA-2023:2097